throbber
Trials@uspto.gov Paper: 58
`571-272-7822 Entered: March 15, 2017
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`SYMANTEC CORP. and
`BLUE COAT SYSTEMS LLC,
`Petitioner,
`
`v.
`
`FINJAN, INC.,
`Patent Owner.
`____________
`
`Case IPR2015-018921
`Patent 8,677,494 B2
`____________
`
`
`
`Before ZHENYU YANG, CHARLES J. BOUDREAU, and
`SHEILA F. McSHANE, Administrative Patent Judges.
`
`BOUDREAU, Administrative Patent Judge.
`
`
`
`FINAL WRITTEN DECISION
`35 U.S.C. § 318(a) and 37 C.F.R. § 42.73
`
`
`
`
`
`
`
`1 Case IPR2016-00890 has been joined with the instant proceeding.
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`I. INTRODUCTION
`Symantec Corp. and Blue Coat Systems, Inc., now known as Blue
`Coat Systems LLC,2 (collectively, “Petitioner”) filed petitions requesting
`inter partes review of claims 1, 2, 5, 6, 10, 11, 14, and 15 of U.S. Patent
`No. 8,677,494 B2 (Ex. 1001, “the ’494 patent”). Paper 1 (“Petition” or
`“Pet.”); see also IPR2016-00890, Paper 2.
`Based on the information provided in the Petition, and in
`consideration of the Preliminary Response (Paper 7) of Patent Owner,
`Finjan, Inc., we instituted a trial pursuant to 35 U.S.C. § 314(a) with respect
`to claims 1, 2, 5, 6, 10, 11, 14, and 15 and subsequently joined Case
`IPR2016-00890 with the instant case. Paper 9 (“Decision on Institution” or
`“Dec. on Inst.”); see also Paper 30 (copy of decision instituting inter partes
`review in Case IPR2016-00890 and granting motion for joinder; also filed as
`IPR2016-00890, Paper 8).
`After institution, Patent Owner filed a Partial Request for Rehearing
`Pursuant to 37 C.F.R. §§ 42.71(c) and 42.71(d) (Paper 13), challenging our
`decision to institute trial, and we issued a Decision Denying Patent Owner’s
`Request for Rehearing (Paper 21, “Rehearing Decision” or “Reh’g Dec.”).
`Thereafter, Patent Owner filed a Response (Paper 27 (“PO Resp.”)), and
`Petitioner filed a Reply (Paper 31, “Pet. Reply”). Petitioner proffered
`Declarations of Sylvia Hall-Ellis, Ph.D. (Ex. 1006) and Jack W.
`Davidson, Ph.D. (Ex. 1018) with its Petition; and a Reply Declaration of
`Dr. Davidson (Ex. 1027), a Supplemental Declaration of Dr. Hall-Ellis
`(Ex. 1037), and Declarations of Richard Ford, D.Phil. (Ex. 1038) and Joseph
`
`
`2 See Paper 54, 1.
`
`2
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`Kiegel (Ex. 1041) with its Reply. Patent Owner proffered Declarations of
`Nenad Medvidovic, Ph.D. (Ex. 2007) and S.H. Michael Kim (Ex. 2010) with
`its Response. Also, deposition transcripts were filed for Dr. Medvidovic
`(Ex. 1034), Dr. Hall-Ellis (Ex. 2011), and Dr. Davidson (Ex. 2012).
`Patent Owner moves to exclude certain of Petitioner’s Exhibits,
`including each of the Declarations proffered with the Reply. Paper 41.
`Petitioner filed an Opposition (Paper 48) to the motion, and Patent Owner
`filed a reply (Paper 51).
`Patent Owner also filed an identification of arguments alleged to
`exceed the proper scope of Petitioner’s Reply (Paper 39), to which Petitioner
`filed a response (Paper 46). Patent Owner further filed a Motion for
`Observations on Testimony of Dr. Davidson (Paper 42), and Petitioner filed
`a response thereto (Paper 47).
`An oral hearing was held on December 16, 2016; a transcript of the
`hearing is included in the record (Paper 56, “Tr.”).
`We have jurisdiction under 35 U.S.C. § 6. This Final Written
`Decision is issued pursuant to 35 U.S.C. § 318(a) and 37 C.F.R. § 42.73.
`For the reasons that follow, we determine that Petitioner has shown by a
`preponderance of the evidence that claims 1, 2, and 6 of the ʼ494 patent are
`unpatentable.
`We also deny-in-part and dismiss-in-part Patent Owner’s Motion to
`Exclude.
`
`II. BACKGROUND
`
`A. Related Proceedings
`The parties identify six district court actions involving the ’494 patent:
`Finjan, Inc. v. Sophos, Inc., No. 3:14-cv-01197 (N.D. Cal. 2014) (“the
`
`3
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`Sophos litigation”), Finjan v. Websense, Inc., No. 14-cv-01353 (N.D. Cal.
`2014), Finjan, Inc. v. Symantec Corp., No. 3:14-cv-02998 (N.D. Cal. 2014),
`Finjan, Inc. v. Palo Alto Networks, Inc., No. 3:14-cv-04908 (N.D. Cal.
`2014), Finjan, Inc. v. Blue Coat Systems, Inc., No. 5:15-cv-03295 (N.D. Cal.
`2015), and Finjan, Inc. v. Cisco Systems Inc., No. 17-cv-00072 (N.D. Cal.
`2017). Pet. 1; Paper 6, 1; PO Resp. 57; Paper 54, 1.
`The ’494 patent is also the subject of an inter partes review in Palo
`Alto Networks, Inc. v. Finjan, Inc., Case IPR2016-00159, to which Blue
`Coat Systems, Inc. v. Finjan, Inc., Case IPR2016-01174, has been joined;
`and was the subject of denied petitions for inter partes review in Sophos Inc.
`v. Finjan, Inc., Case IPR2015-01022, Symantec Corp. v. Finjan, Inc., Case
`IPR2015-01897, and Blue Coat Systems, Inc. v. Finjan, Inc., Case
`IPR2016-01443.
`
`B. The ’494 Patent
`The ’494 patent, entitled “Malicious Mobile Code Runtime
`Monitoring System and Methods,” issued March 18, 2014, from U.S. Patent
`Application No. 13/290,708 (“the ’708 application”), filed November 7,
`2011. Ex. 1001, [21], [22], [45], [54]. On its face, the ’494 patent purports
`to claim priority from nine earlier applications: (1) U.S. Provisional
`Application No. 60/030,639 (“the ’639 provisional”), filed November 8,
`1996; (2) U.S. Patent Application No. 08/790,097, filed January 29, 1997,
`and issued as U.S. Patent No. 6,167,520 (“the ’520 patent”); (3) U.S. Patent
`Application No. 08/964,388 (“the ’388 application”), filed November 6,
`1997, and issued as U.S. Patent No. 6,092,194 (Ex. 1013, “the ’194 patent”);
`(4) U.S. Patent Application No. 09/539,667, filed March 30, 2000, and
`issued as U.S. Patent No. 6,804,780 (Ex. 2028, “the ’780 patent”);
`
`4
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`(5) U.S. Patent Application No. 09/551,302, filed April 18, 2000;
`(6) U.S. Provisional Patent Application No. 60/205,591, filed May 17, 2000;
`(7) U.S. Patent Application No. 09/861,229, filed May 17, 2001;
`(8) U.S. Patent Application No. 11/370,114 (“the ’114 application”), filed
`March 7, 2006; and (9) U.S. Patent Application No. 12/471,942, filed
`May 26, 2009. Ex. 1001, [63]. In our Decision on Institution in Case
`IPR2016-00159, we determined on the record then before us in that case that
`the ’494 patent is not entitled to an earlier priority date than the November 6,
`1997, filing date of the ’388 application, due to the failure of the
`intermediate ’114 application to include priority claims either to the
`’639 provisional or to the ’097 application. See IPR2016-00159, slip op. at
`10–13 (PTAB May 13, 2016) (Paper 8). That determination does not affect
`any of our conclusions in this case.
`The ’494 patent describes protection systems and methods “capable of
`protecting a personal computer (‘PC’) or other persistently or even
`intermittently network accessible devices or processes from harmful,
`undesirable, suspicious or other ‘malicious’ operations that might otherwise
`be effectuated by remotely operable code.” Ex. 1001, 2:51–56. “Remotely
`operable code that is protectable against can include,” for example,
`“downloadable application programs, Trojan horses and program code
`groupings, as well as software ‘components’, such as Java™ applets,
`ActiveX™ controls, JavaScript™/Visual Basic scripts, add-ins, etc., among
`others.” Id. at 2:59–64.
`
`5
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`C. Illustrative Challenged Claims
`Of the challenged claims, claims 1 and 10 are independent. Those
`claims are illustrative and are reproduced below:
`1. A computer-based method, comprising the steps of:
`receiving an incoming Downloadable;
`deriving security profile data for the Downloadable,
`including a list of suspicious computer operations that may be
`attempted by the Downloadable; and
`storing the Downloadable security profile data in a database.
`
`10. A system for managing Downloadables, comprising:
`a receiver for receiving an incoming Downloadable;
`a Downloadable scanner coupled with said receiver, for
`deriving security profile data for the Downloadable, including a
`list of suspicious computer operations that may be attempted by
`the Downloadable; and
`a database manager coupled with said Downloadable
`scanner, for storing the Downloadable security profile data in a
`database.
`
`Ex. 1001, 21:19–25, 22:7–16. Each of challenged claims 2, 5, and 6
`depends directly from claim 1; and each of challenged claims 11, 14, and 15
`depends directly from claim 10. Id. at 21:26–28, 21:33–37, 22:17–20,
`22:26–30.
`
`D. Instituted Ground of Unpatentability
`The Petition asserted five grounds of unpatentability. Pet. 5. We
`instituted trial in this case only on the asserted ground that claims 1, 2, 5, 6,
`10, 11, 14, and 15 of the ’494 patent are unpatentable under 35 U.S.C. § 103
`over Morton Swimmer et al., Dynamic Detection and Classification of
`
`6
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`Computer Viruses Using General Behaviour Patterns, Virus Bull. Conf. 75
`(Sept. 1995) (Ex. 1005, “Swimmer”). Dec. on Inst. 34.
`
`III. ANALYSIS
`
`A. Claim Construction
`The ’494 patent expired no later than January 29, 2017. See Paper 55,
`1 (Patent Owner representing that January 29, 2017, was the expiration date
`of the ’494 patent and that Petitioner does not dispute that date). In an inter
`partes review, we construe claims of an expired patent according to the
`standard applied by the district courts. See In re Rambus Inc., 694 F.3d 42,
`46 (Fed. Cir. 2012). Specifically, because the expired claims of a patent are
`not subject to amendment, we apply the principles set forth in Phillips v.
`AWH Corp., 415 F.3d 1303, 1312–17 (Fed. Cir. 2005) (en banc). Under that
`standard, the words of a claim are generally given their ordinary and
`customary meaning, which is the meaning the term would have to a person
`of ordinary skill at the time of the invention, in the context of the entire
`patent including the specification. See Phillips, 415 F.3d at 1312–13. Only
`those terms in controversy need to be construed, and only to the extent
`necessary to resolve the controversy. See Vivid Techs., Inc. v. Am. Sci. &
`Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999).
`For purposes of this Decision, we address three claim terms and
`phrases, each of which is recited in both independent claims 1 and 10:
`(1) “list of suspicious computer operations”; (2) “database”; and (3) “storing
`the Downloadable security profile data in a database.”
`
`7
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`1. “list of suspicious computer operations”
`Neither party identified “list of suspicious computer operations” as
`requiring construction prior to institution, and we did not provide an express
`construction of that phrase in the Decision on Institution. In the Decision on
`Institution, we were persuaded, however, by Petitioner’s contentions that the
`DOS functions corresponding to the “function numbers” included in
`Swimmer’s audit trail include the same types of operations referred to by
`applications related to the ’494 patent as examples of “suspicious
`operations,” including the four specific types of operations that are recited as
`“suspicious computer operations” in challenged dependent claims 6 and 15.
`Dec. on Inst. 22 (citing Pet. 17–18, 21–22).
`In the Patent Owner Response, Patent Owner contends “[a] ‘list of
`suspicious computer operations’ is properly construed as ‘a list of computer
`operations deemed suspicious’” (PO Resp. 10). According to Patent Owner,
`“[t]he ’494 Patent requires this construction, specifically that the operations
`are deemed to be suspicious.” Id. “For example,” Patent Owner contends,
`“the ’194 Patent, which is incorporated by reference into the ’494 Patent,
`explains how generating the ‘list of suspicious computer operations’ first
`requires that a determination be made as to whether the operations to be
`listed are suspicious.” Id. (citing Ex. 1013, 9:20–42, Fig. 7; Ex. 2007 ¶¶ 47–
`48, 65). Patent Owner further contends that Petitioner’s argument that DOS
`function numbers identified by Swimmer correspond to the same types of
`operations identified in one related application (i.e., the ’639 provisional,
`Ex. 1002) is both factually incorrect, in that the cited portion of the ’639
`provisional “relates to ‘fundamental computer operations,’ not “suspicious
`computer operations[’]” (Id. at 10–11 (citing Ex. 1002, 18:9–13)), and
`
`8
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`contrary to the law, in “relying on knowledge gleaned from the ’494 Patent
`itself—namely the insight to deem some subset of ‘calls made to an
`operating system, a file system, a network system, and to memory’ as
`suspicious in deriving a list of the suspicious computer operations that may
`be attempted by a Downloadable” (id. at 11).
`Regarding the first point, Patent Owner points out that certain
`disclosure in the ’194 patent “actually relates to ‘suspicious computer
`operations,’” providing “An Example List of Operations Deemed
`Potentially Hostile.” Id. (citing Ex. 1013, 5:50–54; quoting Ex. 1013, 5:58–
`6:4 (emphasis added by Patent Owner)). Patent Owner contends this
`“mean[s] that there is no a priori understanding of what constitutes a
`‘suspicious computer operation,’” but “[r]ather, some subset of all possible
`computer operations must first be deemed suspicious in order to derive a list
`of suspicious computer operations for a Downloadable.” Id. (citing Ex.
`1013, 5:58–6:4, 9:20–42, Fig. 7). Regarding the second point, Patent Owner
`argues, “in assessing obviousness Petitioner may consider ‘only knowledge
`which was within the level of ordinary skill in the art at the time the claimed
`invention was made,’ but may not consider the claimed invention itself.” Id.
`at 11–12 (quoting In re McLaughlin, 443 F.2d 1392, 1395 (CCPA 1971)).
`Finally, Patent Owner contends “the Board appears to have misunderstood
`how dependent claims 6 and 15 limit claims 1 and 10, respectively,” as
`“claims 6 and 15 do not equate all ‘calls made to an operating system, a file
`system, a network system, and to memory’ with suspicious computer
`operations . . . .” Id. at 12 (citing Dec. on Inst. 22). Rather, Patent Owner
`contends, “a person of ordinary skill in the art would understand these
`claims to require that certain ‘calls made to an operating system, a file
`
`9
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`system, a network system, and to memory’ be among those computer
`operations that have been deemed ‘suspicious.’” Id. (citing Ex. 2007 ¶¶ 69,
`97).
`
`Petitioner replies that the phrase “list of suspicious computer
`operations” should be given its plain and ordinary meaning consistent with
`the specification of the ’494 patent, which, Petitioner asserts, is “a list
`including one or more types of computer operations that could be used by
`the Downloadable in a potentially hostile or undesirable manner (e.g.,
`operating system, file system, or memory operations).” Pet. Reply 5 (citing
`Ex. 1013, 3:17–21, 5:58–6:4). Petitioner contends that the ’194 patent,
`incorporated by reference in the ’494 patent, “explains that examples of
`‘suspicious’ operations include file system operations (e.g., reading and
`writing files), OS [operating system] operations, and registry, network, and
`memory operations” (id. (citing Ex. 1013, 5:57–6:4)), and “[i]n turn, the
`system determines whether an operation in a Downloadable is ‘suspicious’
`simply by determining ‘whether [it] is one of the operations identified in the
`list described above’ (i.e., at [Ex. 1013,] 5:57–6:4)” (id. (quoting Ex. 1013,
`9:20–42)). Petitioner also relies on the testimony of Dr. Davidson as
`explaining that a person of ordinary skill in the art would have appreciated
`that these were the types of computer operations used by viruses to do harm.
`Id. at 5–6 (citing Ex. 1018 ¶¶ 75–81, 97–100). According to Petitioner,
`Patent Owner’s construction, which “merely rearranges the claim language
`and inserts the word ‘deemed,’” is both unhelpful and unreasonably narrow
`because it reads an additional “deeming” step into the claims. Id. at 6.
`Petitioner contends Patent Owner’s position that such a step is required is
`“directly contradicted by the ’194 patent,” which, Petitioner contends,
`
`10
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`“makes clear that an operation is ‘suspicious’ merely because it is a type of
`operation that could be used in a potentially hostile manner (e.g., file system
`operations)” by “stat[ing] that [Downloadable security profile (“DSP”)] data
`may include ‘a list of all operations in the Downloadable code which could
`ever be deemed potentially hostile.’” Id. at 7 (quoting Ex. 1013, 5:51–59
`(emphasis added by Petitioner)). In other words, Petitioner contends, “at the
`time an operation is included in the list, there has been no determination yet
`of whether that particular operation is actually being used in a potentially
`hostile or ‘suspicious’ manner.” Id. (citing Ex. 1018 ¶¶ 91–96).
`We agree with Petitioner that Patent Owner’s proposed construction is
`unhelpful to an understanding of the scope of the challenged claims insofar
`as it “merely rearranges the claim language and inserts the word ‘deemed’”
`(Pet. Reply 6). More helpful is the portion of the ’194 patent cited by
`Petitioner that explains that DSP data may include “a list of all operations in
`the Downloadable code which could ever be deemed potentially hostile.”
`Ex. 1013, 5:51–53 (emphasis added)). The inclusion of the phraseology “all
`operations . . . which could ever be deemed potentially hostile” in that
`passage renders it more objective, and “potentially hostile” captures our
`understanding of the meaning of “suspicious” in the context of the claims in
`light of the intrinsic and extrinsic evidence of record. Indeed, column 9,
`lines 20–42, of the ’194 patent, cited by Patent Owner in support of its
`assertion that “generating the ‘list of suspicious computer operations’ first
`requires that a determination be made as to whether the operations to be
`listed are suspicious” (see PO Resp. 10), directly links the term “suspicious”
`with “the list described above with reference to FIG. 3”—i.e., the “list of all
`
`11
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`operations in the Downloadable code which could ever be deemed
`potentially hostile.”
`Because we determine that column 5, line 50, to column 6, line 4, of
`the ’194 patent, incorporated by reference into the ’494 patent (see Ex. 1001,
`1:35–38), provides the most probative evidence on the record before us as to
`the meaning of “list of suspicious computer operations” as recited in the
`challenged claims, we conclude that phrase is properly construed as a “list of
`all operations that could ever be deemed potentially hostile,” non-limiting
`examples of which includes file operations; network operations; registry
`operations; operating systems operations; resource usage threshold
`operations, memory operations, CPU operations, and graphics operations.
`Ex. 1013, 5:50–6:4.
`Notwithstanding our conclusion regarding the proper construction of
`“list of suspicious computer operations,” however, as we discuss in greater
`detail, infra Section III.B.4.a.iii, our ultimate conclusions in this proceeding
`do not turn on our adoption of this construction, Patent Owner’s proposed
`construction, or Petitioner’s proposed construction.
`
`2. “database”
`In the Decision on Institution, in view of competing constructions
`advanced in the Petition and the Preliminary Response, we construed the
`term “database” as “a collection of interrelated data organized according to a
`database schema to serve one or more applications.” Dec. on Inst. 7–11. As
`we explained, we agreed with Patent Owner that that construction, which
`was previously articulated by the district court in the Sophos litigation and
`applied by the Board in prior proceedings, represented the broadest
`reasonable interpretation in light of the claim language and the specification
`
`12
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`of the ’494 patent. Id. at 10; see Ex. 2002, 7 (Finjan, Inc. v. Sophos, Inc.,
`No. 14-cv-01197 (N.D. Cal. 2014), Claim Construction Order at 7);
`Ex. 2003, 8–10 (Sophos, Inc. v. Finjan, Inc., Case IPR2015-00907, slip op.
`at 8–10 (Paper 8) (concerning related U.S. Patent No. 7,613,926)); Ex. 2004,
`9–10 (Sophos, Inc. v. Finjan, Inc., Case IPR2015-01022, slip op. at 9–10
`(Paper 7) (concerning the ’494 patent)).
`Neither Petitioner nor Patent Owner challenges that construction, per
`se, post-institution. Patent Owner contends, however, that “[t]he practical
`import of this construction excludes log files from being databases.” PO
`Resp. 7 (emphasis added). In support of its contention, Patent Owner asserts
`that the district court explained in the claim construction order in the Sophos
`litigation that “the term ‘database’ is not broad enough to include a log file.”
`Id. (quoting Ex. 2002, 7). According to Patent Owner, the district court
`“based its reasoning of the intrinsic record which demonstrates that
`databases and log files are separate and distinct entities.” Id. “For
`example,” Patent Owner alleges, “the specification designates the database
`that stores DSP with box ‘Security Database 240’ while an event log is
`designated with box ‘Event Log 245,’” and “[t]he ’494 Patent further
`describes how databases and log files function differently by describing how
`logging results in an event log is an action that is distinct from storing in a
`security database.” Id. at 7–8 (reproducing Ex. 1013, Fig. 2; citing Ex.
`1013, 7:2–6); see also id. at 8 (reproducing and referring to Ex. 1013, Fig. 3,
`as allegedly illustrating that “[t]his logging functionality is distinct from
`storing in a database, which allows DSP to be efficiently retrieved from the
`database, as shown by the bidirectional arrow between the DSP data 310
`stored within Security Database 240 and Code Scanner 325 as compared to
`
`13
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`the arrow from logical engine 333 to record-keeping engine 335 to event log
`245”), 9 (“The data storage device 230 stores a security database 240, which
`includes security information for determining whether a received
`Downloadable is to be deemed suspicious.” (quoting Ex. 1013, 3:47–50)).
`Patent Owner concludes, “[b]ecause the District Court’s holding is based on
`sound reasoning, it should generally be followed in these proceedings.” Id.
`at 9.
`
`Petitioner “maintain[s] this is not the broadest reasonable
`interpretation of ‘database,’ but adopt[s] the Board’s construction solely for
`purposes of this IPR.” Pet. Reply 2 n.2. Petitioner additionally takes issue
`with Patent Owner’s assertion, among others, that the database cannot be a
`log file. Id. at 2–5.
`We note that despite Patent Owner’s assertions regarding what “the
`specification designates” and what “the ’494 Patent further describes” (see
`PO Resp. 7–8), the citations and figures reproduced by Patent Owner in
`support of those assertions are not from the ’494 patent, but instead are from
`the ancestral ’194 patent. Although the ’494 patent incorporates by
`reference the ’194 patent, among other patents and applications (see supra
`Section II.B), the ’494 patent includes different versions of the cited figures
`and different descriptions thereof. Further, despite Patent Owner’s
`bookending of those figures, citations, and quotations from the ’194 patent
`with arguments regarding the district court’s claim construction order in the
`Sophos litigation, we find that that order did not refer to the ’194 patent. See
`Ex. 2002.
`Nonetheless, we agree that the district court found that the parties’
`disagreement in the Sophos litigation “center[ed] on whether ‘database’
`
`14
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`includes ‘simple files such as a log file,’” where, “[a]ccording to Finjan, a
`log file is unstructured collection of data on a computer,” and explained that
`“database” should be construed, in part, “because the parties dispute the
`categorization of ‘log file’ as a ‘database.’” Id. at 4. The court found, based
`on references to a “database” in the ’494 patent itself, that “a database is
`used as an information source that serves protection engines when they
`inspect Downloadables.” Id. at 5–6. The court also found that the related
`’780 patent “reflects the same understanding of database in its reference to a
`‘security database,’” and separately “refers to an ‘event log,’ stating that it
`‘includes determination results for each Downloadable examined and
`runtime indications of the internal network security system.” Id. at 6
`(quoting Ex. 2028, 3:62–64). The court concluded:
`The patent’s language and context supports Finjan’s
`definition of a database. The specifications illustrate that a
`“database” serves applications, a characteristic that is not
`included in Sophos’s definition. The fact that a database assists
`applications also undermines Sophos’s argument that a log file is
`a database, because a log file is more properly understood as a
`passive record, instead of a storage device that interacts with an
`application. The ’780 patent also differentiates between log files
`and “databases” by referring to them separately.
`In addition, Finjan’s expert, Nenad Medvidovic, states that
`a person of ordinary skill in the art would understand “database”
`to mean “a collection of interrelated data organized according to
`a database schema to serve one or more applications.”
`[Dr.] Medvidovic further states
`that “[a] person would
`understand a simple log file is not a database because it is not
`structured like a database . . . A database, on the other hand, is a
`structured software component that allows user and other
`software components to store and retrieve data in an efficient
`manner.” . . . [Dr.] Medvidovic’s definition appears reasonable
`when compared to the language of the patent and the definitions
`from computing dictionaries such as the IBM Dictionary of
`
`15
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`Computing and the IEEE Standard Dictionary of Electrical and
`Electronics Terms.
`
`. . . .
`I am persuaded by Finjan’s assertion that “[t]he claim
`language of the asserted patents all relate to the storage of data
`within the database in the context of the security profile or the
`downloadable security profile. The system actively uses these
`security profiles to detect malware and manage the system, not
`just for archival storage.” Therefore, I find that a log file does
`not qualify as a database in the context of this patent. Because
`Finjan’s definition appears to reflect both the context of the
`patent as well as a well-accepted definition of the term, I adopt
`Finjan’s construction of “database.”
`
`
`Id. at 6–7 (internal citations omitted).
`Although our construction of the term “database” in the Decision on
`Institution was rendered under the “broadest reasonable interpretation”
`standard applicable to unexpired patents (see 37 C.F.R. § 42.100(b)), we
`conclude, in view of the parties’ arguments and cited evidence, and having
`considered the district court’s explanation set forth in the claim construction
`order in the Sophos litigation, that there is no reason to modify our
`construction of “database” set forth in the Decision on Institution, which
`mirrors the district court’s express construction. Accordingly, we again
`construe “database” as “a collection of interrelated data organized according
`to a database schema to serve one or more applications.” To the extent that
`construction would exclude a log file consisting of an “unstructured
`collection of data on a computer,” we agree for the reasons articulated by the
`district court that such a simple, unstructured log file would not be a
`database. See Ex. 2002, 4–7. However, we do not agree with Patent
`Owner’s suggestion that this construction necessarily excludes all log files
`from being databases. See infra Section III.B.4.a.iv. In particular, we credit
`
`16
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`Dr. Davidson’s deposition testimony that the word “log” refers to the kind of
`data that is stored in a file, not to the file’s format or organization, and that a
`log file can, therefore, be considered a database “if it’s organized in a
`fashion . . . for a database, which it’s an interrelated collection of data
`organized according to the scheme of serving one or more applications.”
`Ex. 2041, 50:8–51:1; see also id. at 52:2–10 (“Q. So a log file would be
`considered a database, correct? A. Again, it depends on how it’s organized
`whether it would be considered a database. . . . [I]t’s not like it's one or the
`other. It could be both.”). In contrast, we understand the district court’s
`stated exclusion of “log files” from the construction of “database” to have
`been based on a fundamentally different interpretation of “log file” than
`Dr. Davidson’s, informed by Patent Owner’s representation in the district
`court litigation that a log file is an “unstructured collection of data.” See Ex.
`2002, 4:20–21. In view of the clear disconnection between Dr. Davidson’s
`and the district court’s interpretations of the term “log file,” we disagree
`with Patent Owner’s contentions that “[t]he practical import” of our
`construction is to exclude log files from being databases (see PO Resp. 7)
`and that Dr. Davidson’s “admission” that Swimmer’s audit trail is a database
`“is decisive” (id. at 9).
`
`3. “storing the Downloadable security profile data in a database”
`Neither party identified “storing the Downloadable security profile
`data in a database” as requiring construction prior to institution, and we did
`not provide an express construction of that phrase in the Decision on
`Institution. In the Patent Owner Response, Patent Owner contends that the
`phrase “storing the Downloadable security profile data in a database” is
`properly construed as “placing the derived DSP data into the database.” PO
`
`17
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`Resp. 13. More particularly, according to Patent Owner, a person of
`ordinary skill in the art would understand the term “storing” to mean “to
`place in storage” (id. at 13 (citing Ex. 2007 ¶ 71; Ex. 2027 (IBM Dictionary
`of Computing, 10th Ed.), 653)), and that understanding is “also reflected by
`how the specification3 describes storing in a database, namely by placing
`DSP data 310 into Security Database 240” (id. (citing Ex. 1013, Fig. 3)). “In
`contrast,” Patent Owner speculates, Petitioner “equates storing to
`converting.” Id. at 14. According to Patent Owner, this is necessarily the
`case “because ‘storing’ is an action that is never used in describing
`Swimmer’s audit trail.” Id. Patent Owner contends that “reading ‘storing’
`so broadly that it includes ‘converting’ is completely at odds with the
`understanding of one of skill in the art at the time and does not reasonably
`reflect the disclosure of the ’494 Patent.” Id. at 15. Patent Owner also
`contends that construction of this phrase is “necessary in order to avoid
`Petitioner’s conflation of claim terms.” Id. In particular, Patent Owner
`asserts, “Petitioner seeks to map Swimmer’s generation of an audit trail to
`both the claimed ‘deriving DSP data’ and ‘storing the DSP data in a
`database’” (id. (citing Pet. 16–20; Dec. on Inst. 16, 23)), thereby improperly
`reading the “storing . . . in a database” limitation out of the claim (id. at 15–
`16). According to Patent Owner, “the unequivocal disclosure in the ’494
`Patent and Petitioner’s misleading attempt to conflate claim terms” require
`that Patent Owner’s construction be adopted “to make clear that ‘deriving
`DSP data’ is separate from ‘storing the DSP data in a database,’ and that the
`
`
`3 As with its references to “the specification” in connection with the term
`“database,” Patent Owner’s reference to “the specification” here is not to the
`’494 patent itself, but instead to the related ’194 patent.
`
`18
`
`

`

`IPR2015-01892
`Patent 8,677,494 B2
`
`DSP data is only placed in the database upon derivation of the profile,
`including the list of suspicious computer operations.” Id. at 16.
`Petitioner replies that the phrase needs no further construction and
`should be given its plain and ordinary meaning, namely, “th

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket