throbber
Case 1:18-cv-01519-MN Document 194 Filed 10/09/20 Page 1 of 8 PageID #: 6724
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF DELAWARE
`
`FINJAN LLC, a Delaware Limited Liability
`Company,
`
`Plaintiff,
`
`v.
`
`RAPID7, INC., a Delaware Corporation
`and RAPID7 LLC, a Delaware Limited
`Liability Company,
`
`Defendants.
`
`C.A. No. 1:18-cv-01519-MN
`
`Jury Trial Demanded
`
`REDACTED VERSION
`(Filed on October 9, 2020)
`
`LETTER TO THE HONORABLE MARYELLEN NOREIKA
`REGARDING MOTION FOR PARTIAL SUMMARY JUDGMENT
`
`Richard L. Renck (No. 3893)
`DUANE MORRIS LLP
`222 Delaware Avenue, Suite 1600
`Wilmington, DE 19801-1659
`Tel.: (302) 657-4900
`Fax: (302) 657-4901
`RLRenck@duanemorris.com
`
`Counsel for Defendants
`Rapid7, Inc. and Rapid7 LLC
`
`Sealed Version
`Dated: October 2, 2020
`
`*OF COUNSEL:
`L. Norwood Jameson
`Matthew C. Gaudet
`David C. Dotson
`John R. Gibson
`Robin McGrath
`Jennifer H. Forte
`DUANE MORRIS LLP
`1075 Peachtree Street NE, Suite 2000
`Atlanta, GA 30309
`Tel.: (404) 253-6900
`wjameson@duanemorris.com
`mcgaudet@duanemorris.com
`dcdotson@duanemorris.com
`
`Jarrad M. Gunther
`Joseph A. Powers
`DUANE MORRIS LLP
`30 South 17th St.
`Philadelphia, PA 19103-4196
`Tel.: (215) 979-1837
`jmgunther@duanemorris.com
`japowers@duanemorris.com
`
`

`

`Case 1:18-cv-01519-MN Document 194 Filed 10/09/20 Page 2 of 8 PageID #: 6725
`
`Jordana Garellek
`DUANE MORRIS LLP
`1540 Broadway
`New York, NY 10036-4086
`Tel.: (212) 471-1829
`jgarellek@duanemorris.com
`
`*admitted pro hac vice
`
`2
`
`

`

`Case 1:18-cv-01519-MN Document 194 Filed 10/09/20 Page 3 of 8 PageID #: 6726
`
`RICHARD L. RENCK
`E-MAIL: RLRenck@duanemorris.com
`
`October 2, 2020
`
`VIA ECF
`
`REDACTED VERSION
`
`The Honorable Judge Maryellen Noreika
`844 N. King Street, Unit 19, Room 4324
`Wilmington, DE 19801-3555
`Re: Finjan LLC v. Rapid7, Inc. and Rapid7 LLC, Case No. 18-1519-MN (D. Del.)
`
`Dear Judge Noreika:
`
`Defendants Rapid7, Inc. and Rapid7 LLC (collectively, “Rapid7”) respectfully seek
`permission to file a motion for partial summary judgment of non-infringement regarding all but
`one accused product, for one asserted patent. Rapid7’s products are in entirely different areas of
`cybersecurity than the asserted patents. Accordingly, there are fundamental and irreconcilable
`differences between Rapid7’s products and the asserted patents.
`Finjan’s patents are about determining whether a file sent to a user is malware, i.e., a file
`that will create or exploit a vulnerability on the user’s network or applications. Thus, the emphasis
`is on analyzing the incoming file. Many companies offer such products (and Finjan has already
`sued or licensed most of them), but Rapid7 is not one of them. Rapid7 is in a completely different
`part of the computer security market. Rapid7’s products predominantly examine the user’s
`computer network or applications to identify “vulnerabilities,” which are areas that are potentially
`vulnerable to attack by malware/malicious code, as explained by both Finjan’s expert Dr.
`Medvidovic and Rapid7’s expert Dr. Almeroth.
`
`
`
`
`
`
`As explained below, Finjan attempts to fit a square peg in a round hole asserting its patents (related
`to inspecting incoming files for malware) against Rapid7’s products (which predominantly inspect
`a customer’s network or own web application to determine if they are vulnerable to attack).
`The asserted Patents in this case are U.S. 8,677,494 (’494 Patent); 8,079,086 (’086 Patent);
`8,141,154 (’154 Patent); 7,757,289 (’289 Patent); 7,975,305 (’305 Patent); 8,225,408 (’408
`Patent); and 7,613,918 (’918 Patent). D.I. 1-1. The relevant accused products are InsightVM,
`Nexpose, InsightAppSec, AppSpider, InsightIDR, and Metasploit. For purposes of Rapid7’s
`proposed motion, InsightVM and Nexpose (collectively “Nexpose”) operate the same way, and
`InsightAppSec and AppSpider (collectively, “AppSpider”) operate the same way (although
`InsightVM and InsightAppSec are not at issue for the ’494 and ’086 Patents). Accused
`functionality relevant to the various products and asserted patents is discussed below.
`’305, ’408, ’494, ’086 Patents – Nexpose, AppSpider, and Metasploit Products
`Each of these patents relates to detecting malware. The ’305 Patent asserted claim requires
`receiving an “incoming Downloadable” and scanning it “to recognize potential computer exploits
`DUANE MORRIS LLP
`
`222 DELAWARE AVENUE, SUITE 1600 WILMINGTON, DE 19801-1659
`
`PHONE: +1 302 657 4900 FAX: +1 302 657 4901
`
`

`

`Case 1:18-cv-01519-MN Document 194 Filed 10/09/20 Page 4 of 8 PageID #: 6727
`
`The Honorable Judge Maryellen Noreika
`October 2, 2020
`Page 2
`therewithin . . . computer exploits being portions of program code that are malicious.” D.I. 1-
`1, ’305 Patent, cl. 25. The ’408 Patent asserted claims similarly require “indicating [. . .] the
`presence of potential exploits within the incoming stream” of program code, again specifying that
`“exploits” are “portions of program code that are malicious.” D.I. 1-1, ’408 Patent, cl. 1, 4, 22,
`29. Similarly, all asserted claims of the ’494 Patent, and asserted claims 1, 4, 17, and 24 of the
`’086 Patent require receiving an “incoming Downloadable” and “deriving security profile data for
`the Downloadable, including a list of suspicious computer operations that may be attempted
`by the Downloadable.” D.I. 1-1, ’494 Patent, cl. 1;’086 Patent cl. 1, 4, 17, 24. Asserted claim 42
`of the ’086 Patent requires receiving an “incoming Downloadable” and “retrieving security profile
`data . . . including a list of suspicious computer operations that may be attempted by the
`Downloadable”. D.I. 1-1, ’086 Patent, cl. 42. The Court construed “list of suspicious operations”
`in the ’494 and ’086 Patents as “list of computer operations derived from a received
`Downloadable that are deemed hostile or potentially hostile.” D.I. 123 at 2. The Court construed
`“Downloadable” as “an executable application program, which is downloaded from a source
`computer and run on a destination computer.” Id. at 1.
`It is undisputed that that Nexpose and AppSpider identify vulnerabilities within a
`customer’s network or a customer’s web applications. Ex. C, Green Tr. 58:14-17; Ex. D,
`Giakouminakis Tr. 55:15-23. Likewise, it is undisputed that Metasploit is a penetration testing
`tool that tests a customer’s network or applications through the use of attack modules to verify
`vulnerabilities on the customer’s network or applications. Ex. E, Cook Tr. 19:13-20:17, 24:18-
`25:22. The issue at summary judgment is a legal question for the Court: whether vulnerabilities
`can satisfy the asserted claims’ requirements relating to identifying potentially malicious program
`code (’305 and ’408 Patents) or computer operations derived from a received Downloadable that
`are deemed hostile or potentially hostile (’494 and ’086 Patents).
`A vulnerability is a potential weakness in a computer system that may be exploited by
`malicious code or hostile operations. Customers use Nexpose, AppSpider, and Metasploit to
`identify and validate vulnerabilities in their networks, and prioritize what vulnerabilities their IT
`team should remediate first. These Rapid7 products are akin to a security consultant checking a
`house to determine if there are unlocked doors or windows – i.e., potential vulnerabilities – that a
`malicious intruder might use to enter the house, and providing the homeowner with a report
`ranking which windows or doors are most likely to be used by an intruder. Finjan’s patents, in
`contrast, are akin to the home owner hiring a security guard to stand in front of the house and
`determine whether people seeking to enter are malicious intruders, so they can be turned away.
`An unlocked window is not itself malicious/hostile, but rather it potentially renders the house more
`vulnerable to malicious/hostile activity. These are two completely different approaches to security.
`There is no factual dispute that Nexpose, AppSpider and Metasploit do not detect malicious
`code or potentially hostile operations that an incoming executable application program can
`perform. For example, Rapid7’s Rule 30(b)(6) designee for Nexpose confirmed that it cannot
`detect anything other than vulnerabilities.
`
`). He further testified
` Finjan, not
`surprisingly, stopped asking these basic questions in subsequent depositions for other accused
`products, but the same is true for AppSpider and Metasploit. Any attempt by Finjan to manufacture
`a factual dispute can be fully addressed during the summary judgment briefing process.
`
`

`

`Case 1:18-cv-01519-MN Document 194 Filed 10/09/20 Page 5 of 8 PageID #: 6728
`
`The Honorable Judge Maryellen Noreika
`October 2, 2020
`Page 3
`’494 and ’086 Patent – InsightIDR Product
`Finjan also alleges the InsightIDR product infringes the ’494 and ’086 Patents. Each
`asserted claim of the ’494 and ’086 Patents requires “receiv[ing] an incoming Downloadable” and
`either deriving or retrieving “security profile data for the incoming Downloadable” that includes a
`“list of suspicious computer operations that may be attempted by the Downloadable.” ’494 Patent,
`cl. 10; ’086 Patent, cl. 1, 17, 24, 42. Unlike the above Rapid7 products, InsightIDR has the ability
`to identify behaviors or activity occurring on a customer’s network that are potentially malicious.
`It does so by monitoring activity that takes place on a customer’s network
`
`owever, InsightIDR
`does not monitor (or analyze, inspect, scan, etc.) any incoming application programs to determine
`if they perform suspicious operations. InsightIDR thus does not receive an “incoming
`Downloadable,” and does not derive or retrieve a security profile “including a list of suspicious
`computer operations that may be attempted by the Downloadable.”
`For both patents, Finjan alleges that “Insight Agents [which are a component of
`InsightIDR] receive Downloadables through monitoring employee and server endpoints.” Ex. F,
`Cole Rep. ¶¶ 309, 509. Finjan’s expert identifies as an “incoming Downloadable” information
`such as log data gathered from a customer network, or
` First, the information received by Insight Agents
`and evaluated by InsightIDR is not an “incoming Downloadable” (i.e., an incoming “executable
`application program”), and Finjan’s expert does not even attempt to explain how it could be. For
`the only thing he identifies that could even arguably be considered a “Downloadable”, he misstates
`the testimony of Rapid7’s Rule 30(b)(6) designee, arguing that
`. To the contrary, the testimony states
`
`that
`
` Id.
`Second, the information Finjan identifies as “security profile data” is not “a list of
`suspicious computer operations that may be attempted by the Downloadable”. The information
`InsightIDR receives
`
` Ex. G, Adams Tr. at 97:23-98:25; Ex. F, Cole Rep. 375, 376. In other words,
`InsightIDR does not scan incoming Downloadables to identify suspicious operations that they may
`perform. Instead, it observes activity that is already happening on the customer’s network and
`attempts to determine whether that activity is potentially malicious.
`’154 Patent – All Accused Products
`The only asserted claim of the ’154 Patent requires “transmitting [an input to a call to a
`
`1 Finjan identifies, e.g.,
`
`

`

`Case 1:18-cv-01519-MN Document 194 Filed 10/09/20 Page 6 of 8 PageID #: 6729
`
`The Honorable Judge Maryellen Noreika
`October 2, 2020
`Page 4
`first function within content received over a network] to the security computer for inspection, when
`the first function is invoked;” “receiving an indicator from the security computer whether it is safe
`to invoke the second function with the input;” and “invoking a second function with the input,
`only if a security computer indicates that such invocation is safe.” ’154 Patent, cl. 1.
`For Nexpose (including in combination with Metasploit) and AppSpider, Finjan accuses a
`“web spidering” capability, which “crawls” (i.e., accesses) a web page and performs tests on the
`web page to identify vulnerabilities. Ex. H, Mitz. Rep. ¶¶ 236, 287; Ex. I, Mitz. Tr. 93:6-94:14.
`Finjan argues that the process of crawling the web page and testing it for vulnerabilities invokes
`the “functions” within that webpage, including the claimed “first function”. Ex. H, Mitz. Rep. ¶¶
`239, 298-299; Ex. I, Mitz. Tr. at 30:9-23, 90:13-19, 94:17-24. Finjan argues that the process of
`testing the crawled webpage to identify vulnerabilities or to identify associated risk scores is
`indicating whether “such invocation is safe.” Ex. H, Mitz. Rep. ¶¶ 429, 441; Ex. I, Mitz. Tr. 104:2-
`8. Finjan alleges that the “second function” that is invoked is “the same as the first function.” Ex.
`H, Mitz. Rep. ¶¶ 305, 339. This theory fails as a matter of law because it cannot satisfy the
`requirement of “invoking a second function with the input, only if a security computer indicates
`that such invocation is safe.” Because Finjan has alleged that the scanning and crawling process
`invokes all functions within the web page, then any alleged “second function” within that webpage
`was already invoked in order to determine whether any vulnerability exists as a threshold issue
`(i.e., before anything is sent to the alleged “security computer,” and before the “security computer”
`can indicate whether the input is safe). Therefore, the alleged “second function” is not invoked
`“only if” the “security computer” indicates that such invocation is safe, as required by the claim.
`For the InsightIDR product (including in combination with Nexpose), Finjan accuses
`functionality in which
`
`Finjan argues that the “input” is
`
`acknowledges,
`
`” Ex. H, Mitz. Rep. ¶ 365. However, as Finjan
`
` This cannot satisfy the requirements of claim 1. First,
`
`, “only if” safe as required by claim 1. Finjan does not
`identify any “second function” that is invoked with
` as its “input,” and it is undisputed that
` is not used as an input to any “second function”. Ex. I, Mitz. Tr. 135:18-136:8; Ex. H,
`Mitz. Rep. ¶¶ 365, 367. Second, it is undisputed that InsightIDR’s Insight Agent creates
`. The claim, however, requires that the accused
`
`

`

`Case 1:18-cv-01519-MN Document 194 Filed 10/09/20 Page 7 of 8 PageID #: 6730
`
`The Honorable Judge Maryellen Noreika
`October 2, 2020
`Page 5
`“content processor” (i.e., Insight Agent) “process[] content received over a network, the content
`including a call to a first function, and the call including an input.” ’154 Patent, cl. 1. The Insight
`Agent does not receive
`(i.e., the alleged “input”) over a network; rather, the Insight Agent
`generates
`. Ex. H, Mitz. Rep. ¶ 362; Ex. I, Mitz. Tr. 133:15-25.
`’289 Patent: Nexpose, Nexpose + Metasploit, AppSpider
`The asserted claims of the ’289 Patent require receiving an “input”. Then, “if the input
`includes a call to an original function”, the claims require an “input modifier” for “replacing the
`call to the original function with a corresponding call to a substitute function, the substitute
`function being operational to send the input for inspection.” D.I. 1-1, ’289 Patent, cl. 41. Finjan
`has not identified anything in a received “input” that is “replaced” by the accused products. Finjan
`also does not identify any “substitute function” that replaces “the call to the original function”
`within the received “input”, and that is “operational to send the input for inspection.”
`Finjan alleges that the claimed “input modifier” is the Nexpose Scan engine and AppSpider
`scan engine. Ex. H, Mitz. Rep. ¶¶ 531, 552. It is undisputed that the Nexpose and AppSpider scan
`engines can crawl web content, determine associated vulnerabilities, and send the results
`. The only mention in Dr. Mitzenmacher’s
`analysis of Nexpose of any alleged “substitute function being operational to send the input for
`inspection” is an unsupported statement that
`
` Id. at ¶¶ 531,
` contain a “substitute function” or that they
`579. Finjan provides no evidence
`are “operational to send the input for inspection.” Instead,
`Indeed, Dr. Mitzenmacher agreed during his deposition
`
` Id. at 147:11-148:19. An expert’s
`unsupported restatement of claim language – which is all Finjan has here – is not a disputed fact.
`With respect to AppSpider, Dr. Mitzenmacher simply re-states the claim language in
`connection with a citation to a source code file, with no explanation as to how the source code file
`allegedly supports his restatement of the claim language. Ex. H, Mitz. Rep. ¶ 561. Again, this is
`not sufficient to create a factual dispute, as AppSpider likewise does not modify an input or use a
`“substitute function” “operational to send the input for inspection.”
`’918 Patent – Nexpose and AppSpider
`The asserted claims of the ’918 Patent require receiving “executable code (‘CODE-C’),
`where CODE-C includes (i) wrapper executable code (‘CODE-B’), (ii) potentially malicious
`executable code (‘CODE-A’), and (iii) information about a computer account for CODE-A.” D.I.
`1-1, ’918 Patent, cl. 22, 28, 33. “CODE-C” was construed as “combined code”. D.I. 123 at 2.
`In his expert report, Finjan’s Dr. Cole argues that CODE-C (i.e., “combined code”) is
`satisfied if two things are somehow “associated with one another”. Ex. F, Cole Rep. ¶¶ 694, 705,
`711; see also id. at ¶ 689 (“because the validation is associated with the Downloadable, together
`they form CODE-C”). However, during his deposition, he admitted that
`Ex. J, Cole Tr. 85:20-25. Finjan does not identify any two pieces
`of code that were put together as “CODE-C”, instead arguing that data that is “associated with”
`other data is good enough. However, an “association” between two things is not combining them.
`
`

`

`Case 1:18-cv-01519-MN Document 194 Filed 10/09/20 Page 8 of 8 PageID #: 6731
`
`The Honorable Judge Maryellen Noreika
`October 2, 2020
`Page 6
`
`Very truly yours,
`
`/s/ Richard L. Renck
`Richard L. Renck (#3893)
`
`Counsel for Rapid7, Inc. and Rapid7 LLC
`
`RLR/chp
`Attachments
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket