`pandre@kramerlevin.com
`LISA KOBIALKA (State Bar No. 191404)
`lkobialka@kramerlevin.com
`JAMES HANNAH (State Bar No. 237978)
`jhannah@kramerlevin.com
`KRAMER LEVIN NAFTALIS & FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`Telephone: (650) 752-1700
`Facsimile: (650) 752-1800
`
`Attorneys for Plaintiff
`FINJAN, INC.
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`
`
`Case No.:
`
`COMPLAINT FOR PATENT
`INFRINGEMENT
`
`DEMAND FOR JURY TRIAL
`
`
`FINJAN, INC., a Delaware Corporation,
`
`
`WEBSENSE, INC., a Delaware Corporation,
`
`Defendant.
`
`
`
`
`
`
`
`
`
`
`
`Plaintiff,
`
`v.
`
`
`
`
`
`
`____________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000001
`
`Symantec 1014
`IPR of U.S. Pat. No. 8,677,494
`
`
`
`
`
`COMPLAINT FOR PATENT INFRINGEMENT
`
`Plaintiff Finjan, Inc. (“Finjan”) files this Complaint for Patent Infringement and Jury Demand
`
`against Defendant Websense, Inc. (“Defendant” or “Websense”) and alleges as follows:
`
`THE PARTIES
`
`1.
`
`Finjan is a Delaware corporation, with its corporate headquarters at 1313 N. Market
`
`Street, Suite 5100, Wilmington, Delaware 19801. Finjan’s U.S. operating business was previously
`
`headquartered at 2025 Gateway Place, San Jose, California 95110.
`
`2.
`
`Websense is a Delaware corporation, with its principal place of business at 10240
`
`Sorrento Valley Road, San Diego, California 92121.
`
`JURISDICTION AND VENUE
`
`3.
`
`This action arises under the Patent Act, 35 U.S.C. §§ 101 et seq. This Court has
`
`original jurisdiction over this controversy pursuant to 28 U.S.C. §§ 1331 and 1338.
`
`4.
`
`5.
`
`Venue is proper in this Court pursuant to 28 U.S.C. §§ 1391(b) and (c) and/or 1400(b).
`
`This Court has personal jurisdiction over Defendant. Upon information and belief,
`
`Defendant does business in this District and has, and continues to, infringe and/or induce the
`
`infringement in this District. Defendant also markets its products primarily in and from this District.
`
`In addition, the Court has personal jurisdiction over Defendant because it has established minimum
`
`contacts with the forum and the exercise of jurisdiction would not offend traditional notions of fair
`
`play and substantial justice.
`
`INTRADISTRICT ASSIGNMENT
`
`6.
`
`Pursuant to Local Rule 3-2(c), Intellectual Property Actions are assigned on a district-
`
`wide basis.
`
`1
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000002
`
`
`
`
`
`FINJAN’S INNOVATIONS
`
`7.
`
`Finjan was founded in 1997 as a wholly-owned subsidiary of Finjan Software Ltd., an
`
`Israeli corporation. Finjan was a pioneer in the developing proactive security technologies capable of
`
`detecting previously unknown and emerging online security threats recognized today under the
`
`umbrella of “malware.” These technologies protect networks and endpoints by identifying suspicious
`
`patterns and behaviors of content delivered over the Internet. Finjan has been awarded, and continues
`
`to prosecute, numerous patents in the United States and around the world resulting directly from
`
`Finjan’s more than decade-long research and development efforts, supported by a dozen inventors.
`
`8.
`
`Finjan built and sold software, including APIs, and appliances for network security
`
`using these patented technologies. These products and customers continue to be supported by
`
`Finjan’s licensing partners. At its height, Finjan employed nearly 150 employees around the world
`
`building and selling security products and operating the Malicious Code Research Center through
`
`which it frequently published research regarding network security and current threats on the Internet.
`
`Finjan’s pioneering approach to online security drew equity investments from two major software and
`
`technology companies, the first in 2005, followed by the second in 2006. Through 2009, Finjan has
`
`generated millions of dollars in product sales and related services and support revenues.
`
`9.
`
`Finjan’s founder and original investors are still involved with and invested in the
`
`company today, as are a number of other key executives and advisors. Currently, Finjan is a
`
`technology company applying its research, development, knowledge and experience with security
`
`technologies to working with inventors, investing in and/or acquiring other technology companies,
`
`investing in a variety of research organizations, and evaluating strategic partnerships with large
`
`companies.
`
`2
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000003
`
`
`
`
`
`10.
`
`On June 6, 2006, U.S. Patent No. 7,058,822 (“the ‘822 Patent”), entitled MALICIOUS
`
`MOBILE CODE RUNTIME MONITORING SYSTEM AND METHODS, was issued to Yigal
`
`Mordechai Edery, Nimrod Itzhak Vered, David R. Kroll and Shlomo Touboul. A true and correct
`
`copy of the ‘822 Patent is attached to this Complaint as Exhibit A and is incorporated by reference
`
`herein.
`
`11.
`
`All rights, title, and interest in the ‘822 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘822 Patent. Finjan has been the sole owner of the ‘822 Patent since its issuance.
`
`12.
`
`The ‘822 Patent is generally directed towards computer networks and more
`
`particularly provides a system that protects devices connected to the Internet from undesirable
`
`operations from web-based content. One of the ways this is accomplished is by determining whether
`
`any part of such web-based content can be executed and then trapping such content and neutralizing
`
`possible harmful effects using mobile protection code. Additionally, the system provides a way to
`
`analyze such web-content to determine whether it can be executed.
`
`13.
`
`On January 12, 2010, U.S. Patent No. 7,647,633 (“the ‘633 Patent”), entitled
`
`MALICIOUS MOBILE CODE RUNTIME MONITORING SYSTEM AND METHODS, was issued
`
`to Yigal Mordechai Edery, Nimrod Itzhak Vered, David R. Kroll and Shlomo Touboul. A true and
`
`correct copy of the ‘633 Patent is attached to this Complaint as Exhibit B and is incorporated by
`
`reference herein.
`
`14.
`
`All rights, title, and interest in the ‘633 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘633 Patent. Finjan has been the sole owner of the ‘633 Patent since its issuance.
`
`15.
`
`The ‘633 Patent is generally directed towards computer networks, and more
`
`particularly, provides a system that protects devices connected to the Internet from undesirable
`
`operations from web-based content. One of the ways this is accomplished is by determining whether
`
`3
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000004
`
`
`
`
`
`any part of such web-based content can be executed and then trapping such content and neutralizing
`
`possible harmful effects using mobile protection code.
`
`16.
`
`On July 17, 2012, U.S. Patent No. 8,225,408 (“the ‘408 Patent”), entitled METHOD
`
`AND SYSTEM FOR ADAPTIVE RULE-BASED CONTENT SCANNERS, was issued to Moshe
`
`Rubin, Moshe Matitya, Artem Melnick, Sholomo Touboul, Alexander Yermakov and Amit Shaked.
`
`A true and correct copy of the ‘408 Patent is attached to this Complaint as Exhibit C and is
`
`incorporated by reference herein.
`
`17.
`
`All rights, title, and interest in the ‘408 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘408 Patent. Finjan has been the sole owner of the ‘408 Patent since its issuance.
`
`18.
`
`The ‘408 Patent is generally directed towards a scanner for identifying potential
`
`exploits within an incoming data stream. One way this is accomplished is to create a parse tree for
`
`the incoming content and dynamically detecting combinations of nodes of the parse tree that indicate
`
`potential exploits in the content.
`
`19.
`
`On March 20, 2012, U.S. Patent No. 8,141,154 (“the ‘154 Patent”), entitled SYSTEM
`
`AND METHOD FOR INSPECTING DYNAMICALLY GENERATED EXECUTABLE CODE, was
`
`issued to David Gruzman and Yuval Ben-Itzhak. A true and correct copy of the ‘154 Patent is
`
`attached to this Complaint as Exhibit D and is incorporated by reference herein.
`
`20.
`
`All rights, title, and interest in the ‘154 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘154 Patent. Finjan has been the sole owner of the ‘154 Patent since its issuance.
`
`21.
`
`The ‘154 Patent is generally directed towards a gateway computer protecting a client
`
`computer from dynamically generated malicious content. One way this is accomplished is to use a
`
`content processor to process a first function and invoke a second function if a security computer
`
`indicates that it is safe to invoke the second function.
`
`4
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000005
`
`
`
`
`
`WEBSENSE
`
`22. Websense makes, uses, sells, offers for sale, and/or imports into the United States and
`
`this District its TRITON Products, Web Security Gateway Products, Data Security Products, the
`
`CyberSecurity Intelligence (“CSI”) Service and the ThreatSeeker Network Service.
`
`23. Websense’s TRITON Products include the software and appliances running TRITON
`
`Enterprise, TRITON Security Gateway Anywhere and TRITON Security Gateway. See
`
`http://www.websense.com/content/websense-triton-security-products.aspx (attached as Exhibit E).
`
`24. Websense’s Web Security Gateway Products include the software and appliances
`
`running Web Security Gateway, Web Security Gateway Anywhere, Cloud Web Security Gateway
`
`and ACE in the Cloud. See http://www.websense.com/content/websense-web-security-products.aspx
`
`(attached as Exhibit F).
`
`25. Websense’s Data Security Products include the software and appliances running Data
`
`Security Suite and Data Security Gateway. See http://www.websense.com/content/websense-data-
`
`security-products.aspx (attached as Exhibit G).
`
`26.
`
`Shown below is a diagram of Websense’s products and services. See
`
`WP_HoneyGrid_Computing.pdf at 5 (attached as Exhibit H):
`
`5
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000006
`
`
`
`
`
`
`
`
`
`27.
`
`The TRITON Products, Web Security Gateway Products and CSI Service rely on the
`
`Websense ThreatSeeker Network. The ThreatSeeker Network seeks out threats contained within
`
`web, social media and email content and analyzes three to five billion requests per day. The TRITON
`
`Products, Web Security Gateway Products, CSI Service and Websense ThreatSeeker Network utilizes
`
`Websense’s Advanced Classification Engine (“ACE”) to detect malicious content. ACE and the
`
`ThreatSeeker Network are maintained by Websense and the Websense Security Labs. See
`
`http://www.websense.com/content/websense-triton-security-products.aspx (attached as Exhibit E);
`
`http://www.websense.com/content/web-security-gateway-features.aspx (attached as Exhibit I);
`
`datasheet-ace-in-the-cloud-en.pdf (attached as Exhibit J); datasheet-csi-en.pdf (attached as Exhibit
`
`K); and http://www.websense.com/content/websense-threatseeker-network.aspx (attached as Exhibit
`
`6
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000007
`
`
`
`
`
`
`
`L). Showwn below is a diagram depicting techhnologies inn Websense’ss ACE. See
`
`
`
`
`
`
`
`
`
`
`
`
`
`datasheet-acce-in-the-
`
`
`
`cloud-en.pdf at 2 (atttached as Exxhibit J):
`
`
`
`
`
`
`
`
`
`28.
`
`
`
`ACE pprovides inliine contextuual defenses
`
`
`
`
`
`
`
`
`
`
`
`for web, emmail, data andd mobile secuurity
`
`
`
`using anaalytics to creeate a compoosite risk scoore for downnloaded conttent and is thhe primary enngine for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`all of Weebsense’s TRRITON Prodducts. ACE iincludes Reaal-Time Secuurity Classiffication (“RTTSC”) for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`detectionn of exploit ccode and malicious browwser plugins,, JavaScript, ActiveX, shhell code, exxploit kits,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cross-sitee scripts andd incorporateed built-in paarsing, obfusscation detecction and de--obfuscationn. See
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Websensse_ACE_77__WhitePaperr.pdf at 3-4 ((attached as
`
`
`
`
`
`
`
`Exhibit M);
`
` see also
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`
`
`ACE_Inssight_Samplle.pdf (attachhed as Exhibbit N), http:///www.webseense.com/coontent/webseense-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`advancedd-classificatiion-engine.aaspx (attacheed as Exhibitt O).
`
`
`
`
`
`29.
`
`
`
`CSI SService includes the ThreeatScope onlline sandboxx for detectinng potential mmalware.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The ThreeatScope moonitors all acttivity of poteential malwaare and docuuments all acctivity in a ddetailed
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`report inccluding the iinfection proocess, post-innfection actiivities includding networkk communic
`
`
`
`
`
`
`
`
`
`
`
`
`
`ations,
`
`
`
`system-leevel events aand processees and registrry changes aand file moddifications. TThreatScopee takes the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`observedd behavior annd correlatess it with knowwn threats too provide infformation onn zero-day thhreats in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`_________ _________________________________________________________________________________
`
`
`
`7
`
`
`
`
`
`
`
`
`
`COMPLAAINT FOR PPATENT INNFRINGEMMENT
`
`
`
`
`CCASE NO.
`
`1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8
`1 2 3 4 5 6 7 8 9
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`19
`
`20
`
`21
`
`22
`
`000008
`
`
`
`
`
`real-time. See datasheet-csi-en.pdf (attached as Exhibit K); see also ThreatReport-Complete.pdf
`
`(attached as Exhibit P).
`
`30. Websense Data Security Products and TRITON Products detect unusual behavior in a
`
`network such as small amounts of confidential data being sent over multiple communications
`
`channels, or over an extended period of time. See www.websense.com/content/data-security-suite-
`
`features.aspx (attached as Exhibit Q). Websense Data Security Products and TRITON Products
`
`include cumulative incident memory that remembers a user’s breaches over time and creates incidents
`
`when a threshold is met, as well as machine learning for establishing examples of content that a user
`
`wants to protect. See v7.7 Release Notes for Websense® Data Security at 2-3 (attached as Exhibit
`
`R).
`
`31. Websense TRITON Products and Web Security Gateway Products can filter files
`
`based on their true file type. The TRITON Products and Web Security Gateway Products utilize
`
`content stripping to remove unwanted or potentially malicious content. See Triton_web_help.pdf at
`
`pages 198-99, 282-83 and 286-87 (attached as Exhibit S).
`
`WEBSENSE’S INFRINGEMENT OF FINJAN’S PATENTS
`
`32.
`
`Defendant has been and is now infringing the ‘822 Patent, the ‘633 Patent, the ‘408
`
`Patent and the ‘154 Patent (collectively “the Patents-In-Suit”) in this judicial District, and elsewhere
`
`in the United States by, among other things, making, using, importing, selling, and/or offering for sale
`
`the claimed systems and methods on the Websense TRITON Products, Web Security Gateway
`
`Products, Data Security Products, CSI Service, ThreatSeeker Network and products or services using
`
`ACE.
`
`33.
`
`In addition to directly infringing the Patents-In-Suit pursuant to 35 U.S.C. § 271(a)
`
`either literally or under the doctrine of equivalents, Defendant indirectly infringes the ‘822 Patent, the
`
`8
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000009
`
`
`
`
`
`‘633 Patent and the ‘408 Patent pursuant to 35 U.S.C. § 271(b) by instructing, directing and/or
`
`requiring others, including its users and developers, to perform all or some of the steps of method
`
`claims of the ‘822 Patent, the ‘633 Patent and the ‘408 Patent, respectively, either literally or under
`
`the doctrine of equivalents.
`
`COUNT I
`(Direct Infringement of the ‘822 Patent pursuant to 35 U.S.C. § 271(a))
`
`34.
`
`Finjan repeats, realleges, and incorporates by reference, as if fully set forth herein, the
`
`allegations of the preceding paragraphs, as set forth above.
`
`35.
`
`Defendant has infringed and continues to infringe one or more claims of the ‘822
`
`Patent in violation of 35 U.S.C. § 271(a).
`
`36.
`
`Defendant’s infringement is based upon literal infringement or, in the alternative,
`
`infringement under the doctrine of equivalents.
`
`37.
`
`Defendant’s acts of making, using, importing, selling, and/or offering for sale infringing
`
`products and services have been without the permission, consent, authorization or license of Finjan.
`
`38.
`
`Defendant’s infringement includes, but is not limited to, the manufacture, use, sale,
`
`importation and/or offer for sale of Defendant’s products and services, including but not limited to
`
`Websense TRITON Products, Web Security Gateway Products, CSI Service and Websense products
`
`and services using ACE or ThreatSeeker, which embody the patented invention of the ‘822 Patent.
`
`39.
`
`As a result of Defendant’s unlawful activities, Finjan has suffered and will continue to
`
`suffer irreparable harm for which there is no adequate remedy at law. Accordingly, Finjan is entitled
`
`to preliminary and/or permanent injunctive relief.
`
`40.
`
`Defendant’s infringement of the ‘822 Patent has injured and continues to injure Finjan
`
`in an amount to be proven at trial.
`
`9
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000010
`
`
`
`
`
`COUNT II
`(Indirect Infringement of the ‘822 Patent pursuant to 35 U.S.C. § 271(b))
`
`41.
`
`Finjan repeats, realleges, and incorporates by reference, as if fully set forth herein, the
`
`allegations of the preceding paragraphs, as set forth above.
`
`42.
`
`Defendant has induced and continues to induce infringement of at least claims 1, 2, 4,
`
`5, 6, 8, 16, 17, 18, 19, 23, and 24 of the ‘822 Patent under 35 U.S.C. § 271(b).
`
`43.
`
`In addition to directly infringing the ‘822 Patent, Defendant indirectly infringes the
`
`‘822 Patent pursuant to 35 U.S.C. § 271(b) by instructing, directing and/or requiring others, including
`
`but not limited to its customers, users and developers, to perform all or some of the steps of the
`
`method claims, either literally or under the doctrine of equivalents, of the ‘822 Patent, where all the
`
`steps of the method claims are performed by either Websense or its customers, users or developers, or
`
`some combination thereof. Defendant knew or was willfully blind to the fact that it was inducing
`
`others, including customers, users and developers, to infringe by practicing, either themselves or in
`
`conjunction with Defendant, one or more method claims of the ‘822 Patent.
`
`44.
`
`Defendant knowingly and actively aided and abetted the direct infringement of the
`
`‘822 Patent by instructing and encouraging its customers, users and developers to use the Websense
`
`TRITON Products, Web Security Gateway Products, CSI Service and Websense products and
`
`services using ACE or ThreatSeeker. Such instructions and encouragement include, but are not
`
`limited to, advising third parties to use the Websense TRITON Products, Web Security Gateway
`
`Products, CSI Service and Websense products and services using ACE or ThreatSeeker in an
`
`infringing manner; providing a mechanism through which third parties may infringe the ‘822 Patent,
`
`specifically through the use of the Websense TRITON Products, Web Security Gateway Products,
`
`CSI Service and Websense products and services using ACE or ThreatSeeker, advertising and
`
`promoting the use of the Websense TRITON Products, Web Security Gateway Products, CSI Service
`
`10
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000011
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`and Websense products and services using ACE or ThreatSeeker in an infringing manner, and
`
`distributing guidelines and instructions to third parties on how to use the Websense TRITON
`
`Products, Web Security Gateway Products, CSI Service and Websense products and services using
`
`ACE or ThreatSeeker in an infringing manner.
`
`45. Websense regularly updates and maintains the Websense website
`
`(http://www.websense.com) and the Websense Support Center
`
`(http://www.websense.com/content/support.aspx), as well as the Websense ACE InsightTM and
`
`ThreatScopeTM Portals (see http://csi.websense.com/ and http://csi.websense.com/ThreatScope/Index)
`
`to provide demonstration, instruction, and technical assistance to users to help them use the Websense
`
`TRITON Products, Web Security Gateway Products, CSI Service and Websense products and
`
`services using ACE or ThreatSeeker, including:
`
`•
`
`Industry firsts make Websense® TRITONTM second to none (see e.g.,
`http://www.websense.com/content/TRITONseven7.aspx, attached as Exhibit T, states that
`“Websense TRITON solutions give you the best defense against advanced threats.”);
`
`• TRITON – Web Security Help: Websense® Web Security Solutions (see e.g.,
`triton_web_help.pdf at 17, attached as Exhibit S, describes how to use the TRITON product
`and that “[t]o learn to use Websense Web Security solutions and find answers to your
`questions, browse this guide …”);
`
`• Sample ACE InsightTM and ThreatScopeTM Reports (see e.g., ACE_Insight_Sample.pdf,
`attached as Exhibit N, and ThreatReport-Complete.pdf, attached as Exhibit P);
`
`• Websense® CyberSecurity IntelligenceTM Services Datasheet (see e.g., datasheet-csi-en.pdf,
`attached as Exhibit K, states that “[s]ecurity analysts say that in-house resources alone are not
`enough. Websense CyberSecurity Intelligence (CSI) services let your IT staff join forces with
`Websense Security LabsTM…”);
`
`• About Websense® Security Labs (see e.g.,
`http://securitylabs.websense.com/content/about.aspx, attached as Exhibit U, states that “[w]ith
`emerging threats changing their attack profiles at unprecedented rates, security professionals
`must wisely predict the future to provide today’s proactive solutions.”);
`
`• Security Overview: Websense® ACE (Advanced Classification Engine) (see e.g.,
`Websense_ACE_77_WhitePaper.pdf, attached as Exhibit M, states that “[w]ith the declining
`effectiveness of security solutions previously considered ‘core’, it is vital to consider what ACE
`
`11
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`000012
`
`
`
`
`
`can offer through Websense web, email, data, and mobile security solutions, whether through
`appliance gateways or cloud security services or a hybrid deployment.”); and
`
`• The Websense® ThreatSeeker® Network: Leveraging Websense HoneyGrid Computing (see
`e.g., WP_HoneyGrid_Computing.pdf at 3, attached as Exhibit H, states when describing
`ThreatSeeker that “[s]ecurity teams have no choice but to find a reliable way to allow
`productive use of the Internet, while safeguarding essential enterprise information from loss or
`theft.”).
`
`46. Websense instructs users, including employees, to use and test the Websense TRITON
`
`Products, Web Security Gateway Products, CSI Service and Websense products and services using
`
`ACE or ThreatSeeker. For example, Websense provides a technical expert to assist users in
`
`installing, configuring, and troubleshooting Websense products. See
`
`http://www.websense.com/content/training-and-technical-certification.aspx (attached as Exhibit V).
`
`Websense maintains portals at www.MyWebsense.com, http://csi.websense.com/ and
`
`http://csi.websense.com/ThreatScope/Index that customers use to access updated patches and
`
`hotfixes, product news, evaluations and technical support resources. See
`
`http://www.websense.com/content/TechnicalSupportPrograms.aspx (attached as Exhibit W).
`
`47. Websense provides security solution providers, managed service providers and system
`
`integrators with the Websense Global Partner Program to encourage and expand use of the Websense
`
`TRITON Products, Web Security Gateway Products, CSI Service and Websense products and
`
`services using ACE or ThreatSeeker. The Websense Global Partner Program “offers a suite of
`
`benefits to enable business growth, including security industry expertise, tools and support to help
`
`increase sales and customer satisfaction.” See https://www.websense.com/content/websense-partner-
`
`programs.aspx (attached as Exhibit X). The Websense Global Partner Program also offers access to
`
`Websense expertise, discounts, sales and technical training and tools. Websense also offers the
`
`TRITON Security Alliance Program and the OEM Partner Program. See
`
`https://www.websense.com/content/websense-triton-security-alliance.aspx (attached as Exhibit Y).
`
`12
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000013
`
`
`
`
`
`Websense utilizes indirect distributors and value-added resellers, which in North America includes
`
`Ingram Micro, Arrow Enterprise Computing Solutions and ComputerLinks, to distribute Websense
`
`products and provide credit facilities, marketing support and other services. See Websense Form 10-
`
`Q of March 31, 2013 at 16 (attached as Exhibit Z).
`
`48.
`
`Defendant has had knowledge of the ’822 Patent at least as of the time it learned of
`
`this action for infringement and, by continuing the actions described above, has had the specific intent
`
`to or was willfully blind to the fact that its actions would induce infringement of the ‘822 Patent. On
`
`information and belief, Websense also had prior knowledge of the ‘822 Patent because Defendant is
`
`involved in a lawsuit involving U.S. Patent No. 6,092,194 (“the ‘194 Patent”), also owned by Finjan,
`
`Inc., and which shares the inventor Shlomo Touboul with the ‘822 Patent. Furthermore, Websense
`
`had knowledge of the ‘822 Patent because the ‘822 Patent was cited as prior art during the
`
`prosecution of at least the following patents assigned to Websense, or a Websense foreign entity: U.S.
`
`Patent Nos. 8,015,174, 8,015,250, 8,020,209, 8,024,471, 8,135,831, 8,141,147, 8,150,817 and
`
`8,244,817.
`
`49. Websense actively and intentionally maintains its website to promote the Websense
`
`TRITON Products, Web Security Gateway Products, CSI Service and Websense products and
`
`services using ACE or ThreatSeeker and to encourage potential customers, users and developers to
`
`use the Websense TRITON Products, Web Security Gateway Products, CSI Service and Websense
`
`products and services using ACE or ThreatSeeker in the manner described by Finjan
`
`(http://www.websense.com/content/Home.aspx, http://www.websense.com/content/support.aspx,
`
`www.MyWebsense.com, http://csi.websense.com/ and http://csi.websense.com/ThreatScope/Index).
`
`50. Websense actively updates its websites, including Websense’s Support Center, to
`
`promote the Websense TRITON Products, Web Security Gateway Products, CSI Service and
`
`13
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000014
`
`
`
`
`
`Websense products and services using ACE or ThreatSeeker to encourage customers, users and
`
`developers to practice the methods taught in the ‘822 Patent
`
`(http://www.websense.com/content/Home.aspx, http://www.websense.com/content/support.aspx,
`
`www.MyWebsense.com, http://csi.websense.com/ and http://csi.websense.com/ThreatScope/Index).
`
`COUNT III
`(Direct Infringement of the ‘633 Patent pursuant to 35 U.S.C. § 271(a))
`
`51.
`
`Finjan repeats, realleges, and incorporates by reference, as if fully set forth herein, the
`
`allegations of the preceding paragraphs, as set forth above.
`
`52.
`
`Defendant has infringed and continues to infringe one or more claims of the ‘633
`
`Patent in violation of 35 U.S.C. § 271(a).
`
`53.
`
`Defendant’s infringement is based upon literal infringement or, in the alternative,
`
`infringement under the doctrine of equivalents.
`
`54.
`
`Defendant’s acts of making, using, importing, selling, and/or offering for sale infringing
`
`products and services have been without the permission, consent, authorization or license of Finjan.
`
`55.
`
`Defendant’s infringement includes, but is not limited to, the manufacture, use, sale,
`
`importation and/or offer for sale of Defendant’s products and services, including but not limited to
`
`Websense TRITON Products, Web Security Gateway Products, CSI Service and Websense products
`
`and services using ACE or ThreatSeeker, which embody the patented invention of the ‘633 Patent.
`
`56.
`
`As a result of Defendant’s unlawful activities, Finjan has suffered and will continue to
`
`suffer irreparable harm for which there is no adequate remedy at law. Accordingly, Finjan is entitled
`
`to preliminary and/or permanent injunctive relief.
`
`57.
`
`Defendant’s infringement of the ‘633 Patent has injured and continues to injure Finjan
`
`in an amount to be proven at trial.
`
`14
`__________________________________________________________________________________
`
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`000015
`
`
`
`
`
`COUNT IV
`(Indirect Infringement of the ‘633 Patent pursuant to 35 U.S.C. § 271(b))
`
`58.
`
`Finjan repeats, realleges, and incorporates by reference, as if fully set forth herein, the
`
`allegations of the preceding paragraphs, as set forth above.
`
`59.
`
`Defendant has induced and continues to induce infringement of at least claims 1, 2, 3,
`
`4, 6, 7, 14, 15, 16, 17, 18, 19, 20, 28, 29, 30 and 31 of the ‘633 Patent under 35 U.S.C. § 271(b).
`
`60.
`
`In addition to directly infringing the ‘633 Patent, Defendant indirectly infringes the
`
`‘633 Patent pursuant to 35 U.S.C. § 271(b) by instructing, directing and/or requiring others, including
`
`but not limited to its customers, users and developers, to perform all or some of the steps of the
`
`method claims, either literally or under the doctrine of equivalents, of the ‘633 Patent, where all the
`
`steps of the method claims are performed by either Websense or its customers, users or developers, or
`
`some combination thereof. Defendant knew or was willfully blind to the fact that it was inducing
`
`others, including customers, users and developers, to infringe by practicing, either themselves or in
`
`conjunction with Defendant, one or more method claims of the ‘633 Patent.
`
`61.
`
`Defendant knowingly and actively aided and abetted the direct infringement of the
`
`‘633 Patent by instructing and encouraging its customers, users and developers to use the Websense
`
`TRITON Products, Web Security Gateway Products, CSI Service and Websense products and
`
`services using ACE or ThreatSeeker. Such instructions and encouragement include, but are not
`
`limited to, advising third parties to use the Websense TRITON Products, Web Security Gateway
`
`Products, CSI Service a