`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`Palo Alto Networks, Inc.
`Petitioner
`
`v.
`
`Finjan, Inc.
`Patent Owner
`
`Case IPR2015-019741
`Patent No. 7,647,633 B2
`
`
`
`Petitioner’s Updated List of Exhibits
`
`
`1 Case IPR2016-00480 has been joined with this proceeding.
`
`
`
`
`
`
`
`
`Petitioner’s Updated List of Exhibits
`
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`
`
`UPDATED LIST OF EXHIBITS
`
`Description of Document
`
`1002
`1003
`1004
`
`1008
`
`Exhibit
`No.
`1001 U.S. Patent No. 7,647,633 (“Edery et al.”)
`Declaration of Dr. Aviel D. Rubin in support of Petition for Inter
`Partes Review
`90/013,016, Final Office Action (“633 Reexam”) (May 22, 2015)
`Eva Chen “Poison Java” IEEE Spectrum (1999)
`2015-09-10 Declaration of Gerard P. Grenier in support of the “Poison
`1005
`Java” reference
`1006 Webpage: Workshop and Miscellaneous Publications, Insik Shin
`1007 Webpage: Filewatcher – 7/27/98
`Ian Welch and Robert Stroud “Kava – A Reflective Java Based on
`Bytecode Rewriting” (January 1999)
`Insik Shin and John C. Mitchell “Java Bytecode Modification and
`1009
`Applet Security” (1998)
`1010
`Carey Nachenberg “The Evolving Virus Threat”
`1011 David M. Chess “Security Issues in Mobile Code Systems” (1998)
`R. Braden and J. Postel “Requirements for Internet Gateways” (June
`1012
`1987)
`1013
`International Publication No. WO 9821683 to (“Touboul”)
`1014 U.S. Patent No. 6,088,803 (“Tso”)
`1015 U.S. Patent No. 5,889,943 (“Ji”)
`Li Gong et al. “Going Beyond the Sandbox: An Overview of the New
`1016
`Security Architecture in the Java Development Kit 1.2” (1997)
`1017 Webpage: Oracle - Java Security Architect
`Paul Sabanal, Mark Yason, and Mark Vincent “Digging Deep Into the
`1018
`Flash Sandboxes” (2012)
`1019 Webpage: Oracle - Deploying With the Applet Tag
`1020 Yougang Song et al. “BRSS: A Binary Rewriting Security System for
`
`1
`
`
`
`
`
`
`
`
`
`Petitioner’s Updated List of Exhibits
`
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`
`
`Description of Document
`
`Exhibit
`No.
`
`1021
`
`1025
`
`1026
`1027
`
`1033
`
`Mobile Code”
`Yougang Song and Brett D. Fleisch “Utilizing Binary Rewriting for
`Improving End-host Security” IEEE Vol. 18, No. 12 (Dec. 2007)
`Stephen McCamant and Greg Morrisett “Efficient, Verifiable Binary
`1022
`Sandboxing for CISC Architecture”
`1023 Virus Bulletin (March 1991)
`1024
`Patent Application 11/159,455 Office Action – Non-Final Rejection
`Patent Application 11/159,455 – Patent Owner Amendment and
`Response to Office Action Under 37.C.F.R. §1.111
`Patent Application 11/159,455 - Notice of Allowance and Fee(s) due
`(May 26, 2009)
`90/013,016 Reexam Non-Final Office Action (November 19, 2013)
`90/013,016 Reexam Supplemental Amendment to Correct Priority
`1028
`Paragraphs Required by 37 CFR §§ 1.78 (August 25, 2014)
`1029
`90/013,016 Reexam Notice of Appeal (June 22, 2015)
`1030
`Patent Application 11/159,455 Data Sheet
`1031 U.S. Pat. No. 6,804,780 (“Touboul”)
`1032 U.S. Pat. No. 6,480,962 (“Touboul”)
`Plaintiff Finjan, Inc.’s Reply Claim Construction Brief, Finjan, Inc. v.
`Blue Coat Systems, Inc., 13-cv-3999-BLF (July 7, 2014)
`Joint Post-Hearing Claim Construction Chart, Ex. A, Finjan Software,
`Ltd. v. Secure Computing Corporation, et al. 06-cv-369-GMS
`(October 30, 2007)
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Finjan, Inc.
`v. Websense, Inc., 13-cv-4398-BLF (September 23, 2014)
`Order Construing Claims, Finjan, Inc. v. Blue Coat Systems, Inc., 13-
`cv-3999-BLF (October 20, 2014)
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Finjan, Inc.
`v. Proofpoint, Inc. and Armorize Technologies, Inc., 5:13-cv-5808-
`HSG (May 1, 2015)
`
`1034
`
`1035
`
`1036
`
`1037
`
`2
`
`
`
`
`
`
`
`
`
`Petitioner’s Updated List of Exhibits
`
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`
`
`Exhibit
`No.
`
`Description of Document
`
`1038
`
`1042
`1043
`
`1044
`
`Claim Construction Order, Finjan Software, Ltd. v. Secure Computing
`et al. 06-cv-369-GMS (December 11, 2007)
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Finjan, Inc.
`v. Blue Coat Systems, Inc., 13-cv-3999-BLF (June 16, 2014)
`1039
`1040
`Provisional Application No. 60/205,591
`1041 Mark Brown “Using Netscape 3” (1996)
`90/013,016 Reexam Response to Non-Final Office Action (February
`19, 2014)
`Finjan Investor Presentation, Q1 (2013)
`Dr. Frederick Cohen “Computer Viruses: Theory and Experiments”
`(1987)
`Thomas M. Chen and Jean-Marc Robert “The Evolution of Viruses
`1045
`and Worms”
`1046 Virus Bulletin Issue Archive
`Sandeep Kumar and Eugene H. Spafford “A Generic Virus Scanner in
`1047
`C++,” (September 17, 1992)
`1048 Morgan B. Adair “Detecting Viruses in the NetWare Environment”
`1049 Virus Bulletin (November 1991)
`1050 Virus Bulletin, (December 1991)
`1051 Webpage: McAfee Antivirus product page
`1052 Webpage: Norton Antivirus product page
`1053 Webpage: Information Security StackExchange
`1054 Webpage: W3Schools, JavaScript Tutorial page
`Sarah Gordon and David Chess “Attitude Adjustment: Trojans and
`Malware on the Internet: An Update”
`Andreas Moser et al. “Limits of Static Analysis for Malware
`Detection”
`Ian Goldberg “A Secure Environment for Untrusted Helper
`1057
`Applications (Confining the Wily Hacker)” (July 1996)
`1058 Wayne A. Jansen “Countermeasures for Mobile Agent Security”
`Byron Cook et al. “Proving Program Termination,” Communications
`of the ACM, Vol. 54, No. 5 (May 2011)
`3
`
`1055
`
`1056
`
`1059
`
`
`
`
`
`
`
`
`
`1061
`1062
`
`1066
`1067
`
`1068
`
`1069
`
`1070
`
`1071
`
`1072
`
`1075
`1076
`
`Exhibit
`No.
`1060 Webpage: Schneier on Security
`Javier Esparza “Decidability of Model Checking for Infinite-State
`Concurrent Systems”
`Edmund Clarke et al. “Model Checking and State Explosion Problem”
`Drew Dean et al. “Java Security: From HotJava to Netscape and
`1063
`Beyond”
`1064 NSA Defense in Depth
`1065 Dr. Thomas Porter “The Perils of Deep Packed Inspection”
`Mark J. Smith et al. “Protecting a Private Network: The AltaVista
`Firewall”
`Check Point Firewall-I™ White Paper, Version 3.0 (June 1997)
`Emin Gün Sirer et al. “Design and Implementation of a Distributed
`Virtual Machine for Networked Computers”
`Intrusion Detection Systems Group Test (Edition 2) – An NSS Group
`Report
`Dries Vanoverberghe and Frank Piessens “A Caller-Side Inline
`Reference Monitor for an Object-Oriented Intermediate Language”
`Ulfar Erlingsson “The Inlined Reference Monitor Approach to
`Security Policy Enforcement” (2004)
`Ari Luotonen and Kevin Altis “World-Wide Web Proxies” (April
`1994)
`James Gosling and Henry McGilton “The Java™ Language
`1073
`Environment: A White Paper” (May 1996)
`1074 Webpage: “A Simple Guide to HTML”
`David M. Martin Jr. et al. “Blocking Java Applets at the Firewall”
`(1997)
`Eric Perlman and Ian Kallen “Common Internet File Formats”
`“Developing Stored Procedures in Java: An Oracle Technical White
`1077
`Paper” (April 1999)
`Larry L. Peterson et al. “OS Support for General-Purpose Routers”
`1078
`1079
`Roel Wieringa “Traceability and Modularity in Software Design”
`1080 U.S. Patent No. 6,434,499 (“Ulrich”)
`
`Petitioner’s Updated List of Exhibits
`
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`
`
`Description of Document
`
`4
`
`
`
`
`
`
`
`
`
`
`
`
`
`Petitioner’s Updated List of Exhibits
`
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`
`
`Exhibit
`No.
`
`1081
`
`Description of Document
`90/013,016 Reexam Renewed Petition to Accept Unintentionally
`Delayed Priority Claim Under 37 C.F.R. § 1.78
`2015-09-13 Declaration of Peter Kent in support of the “Brown”
`1082
`reference
`1083 U.S. Patent No. 7,058,822 (“Edery”)
`1084
`Curriculum Vitae of Dr. Aviel Rubin
`1085
`Provisional Application No. 60/030,639
`1086 U.S. Patent No. 6,092,194 (“Touboul”)
`1087 U.S. Patent No. 6,167,520 (“Touboul”)
`1088
`2014-02-18 Phil Hartstein declaration in 90/013,016 Reexam
`1089
`90/013,016 Reexam Final Rejection (September 8, 2014)
`1090 Webpage: Finjan Software Company Overview
`Excerpted Markman Hearing Transcript, Finjan, Inc. v. Blue Coat
`Systems, Inc., 13-cv-3999-BLF (August 22, 2014)
`1091
`1092 Affidavit of Christopher Butler of the Internet Archive (“Brown”)
`1093 Affidavit of David Sherfesee of Alexa Internet
`1094 U.S. Application No. 09/861,229
`1095 Affidavit of Christopher Butler of the Internet Archive (“Shin”)
`1096 October 3, 2016 Conference Call Transcript for IPR2015-01974
`
`
`
`Dated: October 5, 2016
`
`COOLEY LLP
`ATTN: Patent Group
`1299 Pennsylvania Ave., NW, Suite 700
`Washington, DC 20004
`Tel: (703) 456-8000
`Fax: (202) 842-7899
`
`
`
`
`
`
`5
`
`
`
`
`
`
`Respectfully submitted,
`COOLEY LLP
`
`By:
`
`
`
`/Orion Armon/
`Orion Armon
`Reg. No. 65,421
`
`
`
`
`
`
`
`
`
`
`
`Petitioner’s Updated List of Exhibits
`
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`
`
`CERTIFICATE OF SERVICE
`
`Pursuant to 37 C.F.R. § 42.6(e), the undersigned certifies that on October 4,
`
`2016, a complete and entire copy of Petitioner’s Exhibit 1096 was served via
`
`electronic mail, and on October 5, 2016, a complete and entire copy of this
`
`Petitioner’s Updated List of Exhibits was served by filing this document through
`
`the E2E System and via electronic mail upon the following counsel of record for
`
`Jeffrey H. Price
`KRAMER LEVIN NAFTALIS &
`FRANKEL LLP
`1177 Avenue of the Americas
`New York, NY 10036
`Phone: (212) 715-7502
`Fax: (212) 715-8302
`jprice@kramerlevin.com
`
`Michael T. Rosato
`Andrew S. Brown
`WILSON SONSINI GOODRICH
`& ROSATI
`701 Fifth Avenue, Suite 5100
`Seattle, WA 98104-7036
`Phone: (206) 883-2925
`Fax: (206) 883-2699
`mrosato@wsgr.com
`asbrown@wsgr.com
`
`
`
`
`
`By:
`
`
`
`/Orion Armon/
`Orion Armon
`Reg. No. 65,421
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Patent Owner:
`
`
`
`
`James Hannah
`KRAMER LEVIN NAFTALIS &
`FRANKEL LLP
`
`
`
`990 Marsh Road
`
`
`
`Menlo Park, CA 94025
`
`
`Phone: (650) 752-1712
`
`
`Fax: (650) 752-1812
`
`
`jhannah@kramerlevin.com
`
`
`
`
`
`Michael Kim
`
`
`
`Finjan, Inc.
`2000 University Ave., Ste. 600
`E. Palo Alto, CA 94303
`
`Phone: 650.397.9567
`
`
`mkim@finjan.com
`
`
`
`USPTO Reg. No. 40,450