throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`PALO ALTO NETWORKS, INC.
`Petitioner
`
`v.
`
`FINJAN, INC.
`Patent Owner
`
`
`
`Inter Partes Review No. 2015-019741
`U.S. Patent No. 7,647,633
`
`
`
`PETITIONER’S REPLY
`
`
`
`
`
`
`
`1 Case IPR2016-00480 has been joined with this proceeding.
`
`
`
`

`
`Table of Contents
`
`
`Page
`
`V.
`
`INTRODUCTION .......................................................................................... 1
`I.
`FINJAN IMPROPERLY CONFLATES PAN WITH BLUE COAT ............ 2
`II.
`III. THE BROADEST REASONABLE INTERPRETATION OF CLAIM
`14 IS ITS PLAIN AND ORDINARY MEANING ........................................ 3
`A.
`The claims do not support Finjan’s construction ................................. 4
`B.
`The specification does not support Finjan’s construction .................... 5
`C.
`Extrinsic evidence contradicts Finjan’s proposed construction ........... 7
`IV. FINJAN GROSSLY MISCHARACTERIZES DR. RUBIN’S
`TESTIMONY ................................................................................................. 9
`SHIN, POISON JAVA, AND BROWN WERE PUBLICLY
`ACCESSIBLE .............................................................................................. 12
`A.
`Shin was publicly accessible .............................................................. 12
`B.
`Poison Java was publicly accessible .................................................. 13
`C.
`Brown was publicly accessible .......................................................... 15
`VI. GROUND 1: SHIN RENDERS CLAIMS 14 OBVIOUS ........................... 16
`A.
`Shin renders claim 14 obvious under the broadest reasonable
`interpretation of the claim .................................................................. 16
`1.
`Shin processes “one or more operations of the executable
`code” at the downloadable-information destination ................ 16
`Shin teaches executing “mobile protection code” ................... 17
`2.
`Shin teaches a “mobile code executor” .................................... 18
`3.
`Shin renders claim 14 obvious even under Finjan’s proposed
`construction ........................................................................................ 20
`1.
`Shin does not modify problematic executable code ................ 20
`2.
`Shin does not modify the operation of the executable
`code .......................................................................................... 21
`
`B.
`
`-i-
`
`

`
`Table of Contents
`(continued)
`
`Page
`
`1.
`
`2.
`
`2.
`
`VII. GROUND 4: POISON JAVA IN VIEW OF BROWN RENDERS
`CLAIM 14 OBVIOUS .................................................................................. 22
`A.
`Poison Java + Brown renders claim 14 obvious under the
`broadest reasonable interpretation of the claim ................................. 22
`As with Shin, Finjan’s primary argument turns on the
`construction of claim 14 ........................................................... 22
`Poison Java + Brown processes “one or more operations
`of the executable code” at the downloadable-information
`destination ................................................................................ 22
`Poison Java + Brown teaches executing “mobile
`protection code” ....................................................................... 23
`B. A POSA would have combined Poison Java and Brown................... 24
`C.
`Poison Java + Brown renders claim 14 obvious even under
`Finjan’s proposed construction .......................................................... 25
`1.
`Poison Java + Brown does not modify problematic
`executable code ........................................................................ 25
`Poison Java + Brown does not modify the operation of
`the executable code .................................................................. 26
`VIII. GROUNDS 1 AND 4 RENDER CLAIM 19 OBVIOUS ............................ 27
`IX. FINJAN’S SECONDARY CONSIDERATIONS EVIDENCE
`SHOULD BE GIVEN NO WEIGHT ........................................................... 27
`A.
`Finjan fails to show copying of the challenged claims ...................... 27
`B.
`Finjan fails to establish a nexus between its licensing program
`and the challenged claims .................................................................. 29
`Finjan fails to establish a nexus between commercial success
`and the challenged claims .................................................................. 30
`Finjan fails to establish long-felt need for the claimed invention ...... 30
`D.
`CONCLUSION ............................................................................................. 31
`
`C.
`
`X.
`
`-ii-
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`
`PETITIONER’S REVISED EXHIBIT LIST
`
`1002
`1003
`1004
`
`1008
`
`Exhibit
`Description of Document
`No.
`1001 U.S. Patent No. 7,647,633 (“Edery et al.”)
`Declaration of Dr. Aviel D. Rubin in support of Petition for Inter
`Partes Review
`90/013,016, Final Office Action (“633 Reexam”) (May 22, 2015)
`Eva Chen “Poison Java” IEEE Spectrum (1999)
`2015-09-10 Declaration of Gerard P. Grenier in support of the “Poison
`Java” reference
`1005
`1006 Webpage: Workshop and Miscellaneous Publications, Insik Shin
`1007 Webpage: Filewatcher – 7/27/98
`Ian Welch and Robert Stroud “Kava – A Reflective Java Based on
`Bytecode Rewriting” (January 1999)
`Insik Shin and John C. Mitchell “Java Bytecode Modification and
`Applet Security” (1998)
`1009
`Carey Nachenberg “The Evolving Virus Threat”
`1010
`1011 David M. Chess “Security Issues in Mobile Code Systems” (1998)
`R. Braden and J. Postel “Requirements for Internet Gateways” (June
`1987)
`1012
`International Publication No. WO 9821683 (“Touboul”)
`1013
`1014 U.S. Patent No. 6,088,803 (“Tso”)
`1015 U.S. Patent No. 5,889,943 (“Ji”)
`Li Gong et al. “Going Beyond the Sandbox: An Overview of the New
`Security Architecture in the Java Development Kit 1.2” (1997)
`1016
`1017 Webpage: Oracle - Java Security Architect
`Paul Sabanal, Mark Yason, and Mark Vincent “Digging Deep Into the
`Flash Sandboxes” (2012)
`1018
`1019 Webpage: Oracle - Deploying With the Applet Tag
`Yougang Song et al. “BRSS: A Binary Rewriting Security System for
`Mobile Code”
`Yougang Song and Brett D. Fleisch “Utilizing Binary Rewriting for
`Improving End-host Security” IEEE Vol. 18, No. 12 (Dec. 2007)
`Stephen McCamant and Greg Morrisett “Efficient, Verifiable Binary
`Sandboxing for CISC Architecture”
`1022
`1023 Virus Bulletin (March 1991)
`Patent Application 11/159,455 Office Action – Non-Final Rejection
`1024
`
`1020
`
`1021
`
`-iii-
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`
`PETITIONER’S REVISED EXHIBIT LIST
`
`Exhibit
`No.
`
`1025
`
`1026
`1027
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`Description of Document
`Patent Application 11/159,455 – Patent Owner Amendment and
`Response to Office Action Under 37.C.F.R. §1.111
`Patent Application 11/159,455 - Notice of Allowance and Fee(s) due
`(May 26, 2009)
`90/013,016 Reexam Non-Final Office Action (November 19, 2013)
`90/013,016 Reexam Supplemental Amendment to Correct Priority
`Paragraphs Required by 37 CFR §§ 1.78 (August 25, 2014)
`1028
`90/013,016 Reexam Notice of Appeal (June 22, 2015)
`1029
`Patent Application 11/159,455 Data Sheet
`1030
`1031 U.S. Pat. No. 6,804,780 (“Touboul”)
`1032 U.S. Pat. No. 6,480,962 (“Touboul”)
`Plaintiff Finjan, Inc.’s Reply Claim Construction Brief, Finjan, Inc. v.
`Blue Coat Systems, Inc., 13-cv-3999-BLF (July 7, 2014)
`Joint Post-Hearing Claim Construction Chart, Ex. A, Finjan Software,
`Ltd. v. Secure Computing Corporation, et al. 06-cv-369-GMS
`(October 30, 2007)
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Finjan, Inc.
`v. Websense, Inc., 13-cv-4398-BLF (September 23, 2014)
`Order Construing Claims, Finjan, Inc. v. Blue Coat Systems, Inc., 13-
`cv-3999-BLF (October 20, 2014)
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Finjan, Inc.
`v. Proofpoint, Inc. and Armorize Technologies, Inc., 5:13-cv-5808-
`HSG (May 1, 2015)
`Claim Construction Order, Finjan Software, Ltd. v. Secure Computing
`et al. 06-cv-369-GMS (December 11, 2007)
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Finjan, Inc.
`v. Blue Coat Systems, Inc., 13-cv-3999-BLF (June 16, 2014)
`1039
`Provisional Application No. 60/205,591
`1040
`1041 Mark Brown “Using Netscape 3” (1996)
`90/013,016 Reexam Response to Non-Final Office Action (February
`19, 2014)
`Finjan Investor Presentation, Q1 (2013)
`Dr. Frederick Cohen “Computer Viruses: Theory and Experiments”
`(1987)
`
`1042
`1043
`
`1044
`
`-iv-
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`
`PETITIONER’S REVISED EXHIBIT LIST
`
`Exhibit
`No.
`
`1055
`
`1056
`
`Description of Document
`Thomas M. Chen and Jean-Marc Robert “The Evolution of Viruses
`and Worms”
`1045
`1046 Virus Bulletin Issue Archive
`Sandeep Kumar and Eugene H. Spafford “A Generic Virus Scanner in
`C++” (September 17, 1992)
`1047
`1048 Morgan B. Adair “Detecting Viruses in the NetWare Environment”
`1049 Virus Bulletin (November 1991)
`1050 Virus Bulletin (December 1991)
`1051 Webpage: McAfee Antivirus product page
`1052 Webpage: Norton Antivirus product page
`1053 Webpage: Information Security StackExchange
`1054 Webpage: W3Schools, JavaScript Tutorial page
`Sarah Gordon and David Chess “Attitude Adjustment: Trojans and
`Malware on the Internet: An Update”
`Andreas Moser et al. “Limits of Static Analysis for Malware
`Detection”
`Ian Goldberg “A Secure Environment for Untrusted Helper
`Applications (Confining the Wily Hacker)” (July 1996)
`1057
`1058 Wayne A. Jansen “Countermeasures for Mobile Agent Security”
`Byron Cook et al. “Proving Program Termination,” Communications
`of the ACM, Vol. 54, No. 5 (May 2011)
`1059
`1060 Webpage: Schneier on Security
`Javier Esparza “Decidability of Model Checking for Infinite-State
`Concurrent Systems”
`Edmund Clarke et al. “Model Checking and State Explosion Problem”
`Drew Dean et al. “Java Security: From HotJava to Netscape and
`Beyond”
`1063
`1064 NSA Defense in Depth
`1065 Dr. Thomas Porter “The Perils of Deep Packed Inspection”
`Mark J. Smith et al. “Protecting a Private Network: The AltaVista
`Firewall”
`Check Point Firewall-I™ White Paper, Version 3.0 (June 1997)
`Emin Gün Sirer et al. “Design and Implementation of a Distributed
`Virtual Machine for Networked Computers”
`
`1061
`1062
`
`1066
`1067
`
`1068
`
`-v-
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`
`PETITIONER’S REVISED EXHIBIT LIST
`
`Exhibit
`No.
`
`1069
`
`1070
`
`1071
`
`1072
`
`Description of Document
`Intrusion Detection Systems Group Test (Edition 2) – An NSS Group
`Report
`Dries Vanoverberghe and Frank Piessens “A Caller-Side Inline
`Reference Monitor for an Object-Oriented Intermediate Language”
`Ulfar Erlingsson “The Inlined Reference Monitor Approach to
`Security Policy Enforcement” (2004)
`Ari Luotonen and Kevin Altis “World-Wide Web Proxies” (April
`1994)
`James Gosling and Henry McGilton “The Java™ Language
`Environment: A White Paper” (May 1996)
`1073
`1074 Webpage: “A Simple Guide to HTML”
`David M. Martin Jr. et al. “Blocking Java Applets at the Firewall”
`(1997)
`Eric Perlman and Ian Kallen “Common Internet File Formats”
`“Developing Stored Procedures in Java: An Oracle Technical White
`Paper” (April 1999)
`1077
`Larry L. Peterson et al. “OS Support for General-Purpose Routers”
`1078
`Roel Wieringa “Traceability and Modularity in Software Design”
`1079
`1080 U.S. Patent No. 6,434,499 (“Ulrich”)
`90/013,016 Reexam Renewed Petition to Accept Unintentionally
`Delayed Priority Claim Under 37 C.F.R. § 1.78
`Declaration of Peter Kent in support of the “Brown” reference (Sept.
`13, 2015)
`1082
`1083 U.S. Patent No. 7,058,822 (“Edery”)
`Curriculum Vitae of Dr. Aviel Rubin
`1084
`Provisional Application No. 60/030,639
`1085
`1086 U.S. Patent No. 6,092,194 (“Touboul”)
`1087 U.S. Patent No. 6,167,520 (“Touboul”)
`2014-02-18 Phil Hartstein declaration in 90/013,016 Reexam
`1088
`90/013,016 Reexam Final Rejection (September 8, 2014)
`1089
`1090 Webpage: Finjan Software Company Overview
`Excerpted Markman Hearing Transcript, Finjan, Inc. v. Blue Coat
`Systems, Inc., 13-cv-3999-BLF (August 22, 2014)
`1091
`1092 Affidavit of Christopher Butler of the Internet Archive (“Brown”)
`
`1075
`1076
`
`1081
`
`-vi-
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`
`PETITIONER’S REVISED EXHIBIT LIST
`
`Exhibit
`Description of Document
`No.
`1093 Affidavit of David Sherfesee of Alexa Internet
`1094 U.S. Application No. 09/861,229
`1095 Affidavit of Christopher Butler of the Internet Archive (“Shin”)
`1096 October 3, 2016 Conference Call Transcript for IPR2015-01974
`Deposition Transcript of Michael T. Goodrich, Ph.D., IPR2015-01974
`(Oct. 17, 2016)
`1097
`1098 Deposition Transcript of Harry Bims, IPR2015-01974 (Oct. 26, 2016)
`Declaration of Nenad Medvidovic in support of Plaintiff Finjan, Inc.’s
`Opening Claim Construction Brief, Finjan, Inc. v. Blue Coat Sys., Inc.,
`No. 5:13-cv-039999-BLF (June 16, 2014), ECF 65-1.
`Redacted Deposition Transcript of Nenad Medvidovic, Ph.D., Finjan,
`Inc. v. Blue Coat Sys., Inc., No. 5:13-cv-039999-BLF (May 23, 2014).
`1100
`1101 Website: Finjan Software Press Release, Wayback Machine
`
`1099
`
`-vii-
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`I.
`
`INTRODUCTION
`This IPR turns on the construction of a single element of claim 14. In its
`
`institution decision, the Board correctly determined that the broadest reasonable
`
`interpretation (BRI) of claim 14 is its plain and ordinary meaning. Nothing in the
`
`specification dictates inserting a negative requirement that the claimed “mobile
`
`protection code” not modify the executable code. In fact, the ’633 includes
`
`embodiments where the mobile protection code does modify the executable code.
`
`Two of Finjan’s own experts acknowledge that fact. Until recently, so did Finjan.
`
`During prior litigation, Finjan advocated for the same plain-and-ordinary
`
`construction it now opposes. Finjan attempts to minimize its prior admissions by
`
`falsely suggesting that Petitioner Palo Alto Networks (“PAN”) also took
`
`inconsistent positions in prior litigation. More specifically, Finjan repeatedly uses
`
`the term “Petitioner” when referring to joinder petitioner Blue Coat to imply—
`
`wrongly—that Blue Coat’s litigation positions are attributable to PAN.
`
`Finjan’s remaining arguments fail as well. First, both Shin (Ground 1) and
`
`the combination of Poison Java and Brown (Ground 4) teach every element of
`
`claim 14, whether or not the Board adopts Finjan’s flawed construction. Second,
`
`unrebutted testimony confirms that all three references were publicly available
`
`before the earliest possible priority date. Third, Finjan’s evidence of alleged
`
`1
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`secondary considerations is entitled to no weight because it fails to show any
`
`nexus.
`
`II.
`
`FINJAN IMPROPERLY CONFLATES PAN WITH BLUE COAT
`In its Response, Finjan defines “Petitioner” (singular) to refer to PAN and
`
`joinder party Blue Coat. (Paper 22 at 2.) Finjan then uses “Petitioner” in an attempt
`
`to attribute Blue Coat’s litigation positions to PAN. (Id. at 2, 42, 43.) In particular,
`
`Finjan suggests—without actually arguing—that PAN should be bound by Blue
`
`Coat’s litigation arguments, a result that would violate PAN’s Due Process rights.
`
`See Blonder-Tongue Labs., Inc. v. Univ. of Ill. Found., 402 U.S. 313, 329 (1971).
`
`III. THE BROADEST REASONABLE INTERPRETATION OF CLAIM 14 IS PLAIN AND
`ORDINARY MEANING
`Finjan argues that the BRI of claim 14 is “the plain and ordinary meaning,
`
`wherein the mobile protection code was communicated to the downloadable-
`
`information destination without modifying the executable code.” (Paper 22 at 12–
`
`19 (emphasis added).) This construction was adopted under the Phillips standard,
`
`over Finjan’s objections, in the Finjan v. Blue Coat litigation. (Ex. 1036 at 15.) But
`
`neither intrinsic nor extrinsic evidence supports Finjan’s attempt to import a
`
`negative limitation into the term. Imaginal Systematic, LLC v. Leggett & Platt, 805
`
`F.3d 1102, 1110 (Fed. Cir. 2015); Santarus, Inc. v. Par Pharmaceutical, Inc., 694
`
`F.3d 1344, 1351 (Fed. Cir. 2012). The BRI of “causing mobile protection code to
`
`2
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`be executed . . .” is its plain and ordinary meaning. Cuozzo Speed Techs., LLC v.
`
`Lee, 136 S.Ct. 2131, 2146 (2016).
`
`A. The claims do not support Finjan’s construction
`Claim 14 is silent as to whether mobile protection code (MPC) modifies
`
`executable code when it is communicated to the downloadable-information
`
`destination. (See Ex. 1001 at 21:57-22:5; Ex. 1097, (“Goodrich Dep.”) at 22:8–9.)
`
`Finjan acknowledged this fact in prior litigation involving the ’633 patent: “Blue
`
`Coat attempts to read in the requirement that the executable code is not modified
`
`when implementing the MPC. Nowhere in the claim or intrinsic record is this
`
`requirement stated or implied.” (Ex. 1039 at 19; Ex. 1035 at 8.)
`
`Finjan now argues the “downloadable-information including executable
`
`code” received at the information re-communicator must be the same executable
`
`code that is transferred to and executed at the downloadable-information
`
`destination. (Paper 6 at 33; Paper 22 at 14–15.) But the Board properly recognized
`
`that claim 14 “does not require ‘the executable code’ to encompass the entirety or
`
`an intact version of executable code received.” (Paper 7 at 14 (emphasis omitted).)
`
`The BRI of claim 14 is therefore its plain and ordinary meaning, and the Board
`
`should reject Finjan’s proposed negative limitation.
`
`3
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`The specification does not support Finjan’s construction
`B.
`Under the BRI standard, it is improper to read limitations into a claim unless
`
`the specification includes an explicit definition of the terms or a disavowal of claim
`
`scope. In re Am. Acad. of Sci. Tech Ctr., 367 F.3d 1359, 1365–67 (Fed. Cir. 2004).
`
`Negative limitations must not be read into the claim unless the specification
`
`“express[es] any manifest exclusion or restriction as it pertains specifically to the
`
`meaning of [the term]” and “describes a reason to exclude the relevant limitation.”
`
`Santaru, 694 F.3d at 1351; Imaginal, No. 2014-1845, slip op. at *13. The ’633
`
`does not disavow or define claim 14’s terms, manifest an exclusion or restriction
`
`that executable code not be modified, or provide a reason to exclude modifying
`
`executable code.
`
`Finjan’s proposed construction reads out multiple embodiments in which
`
`MPC modifies executable code. For example, the ’633 discloses modifying a
`
`Downloadable’s Application Program Interface (API) Import Address Table (IAT)
`
`to redirect the Downloadable’s requests for system resources: “[T]he IAT can be
`
`modified so that any call to an API can be redirected to a function within the MPC
`
`[mobile protection code].” (Ex. 1001 at 17:51–53.) Finjan’s expert acknowledged
`
`that “[t]he downloadable API in this instance is modified.” (Goodrich Dep. at
`
`18:21–22.) The ’633 patent also discloses that executable code can be
`
`“compressed, encrypted or otherwise encoded” (Ex. 1001 at 13:29–30), all of
`
`4
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`which are modifications, whether or not they change the operations of the
`
`executable code. (Ex. 2022, (“Rubin Dep.”) at 108:4–11.) Even Finjan’s expert
`
`agreed that compression is modification. (Ex. 1100 at 173:22–174:16.)
`
`Finjan relies primarily on the Finjan v. Blue Coat claim construction order.
`
`(Paper 22 at 12–19.) But that construction was formulated under the Phillips
`
`standard, not BRI. 37 C.F.R. § 42.100(b). The Board is not bound by a district
`
`court’s claim construction. EMC Corp. v. Secure Axcess, LLC, IPR2014-00475,
`
`Paper 30 (PTAB Sept. 8, 2015). Regardless, the Blue Coat court did not identify
`
`any disavowal or definition of claim 14’s terms. (Ex. 1036 at 10.) Rather, it just
`
`concluded that IAT modification did not involve modifying “problematic
`
`executable code.” (Ex. 1036 at 9; Paper 22 at 18.)
`
`C. Extrinsic evidence contradicts Finjan’s proposed construction
`Testimony from Finjan’s own experts contradicts Finjan’s current position.
`
`First, Finjan expert Dr. Harry Bims recently confirmed that the claims cover
`
`MPC that modifies executable code. To support his commercial success opinions,
`
`Dr. Bims relied on infringement charts showing how Proofpoint’s Enterprise
`
`Protection and Targeted Attack Protection allegedly infringe the ’633. (Ex. 2020,
`
`¶¶ 28-29.) The claim chart makes clear that Proofpoint’s MPC modifies the
`
`executable code:
`
`5
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`Proofpoint Products also provide options to remove the code
`completely or provide code-level remediation, such as modification
`of the malicious code to make it harmless, before sending to the
`destination computer.
`
`(Ex. 2032 (emphasis added).) Dr. Bims confirmed that re-writing malicious code to
`
`make it harmless is a modification of the executable code. (Ex. 1098 (“Bims
`
`Dep.”) at 23:19-23.) Dr. Bims also confirmed that he (1) applied Finjan’s proposed
`
`constructions for all relevant claim limitations, (2) agreed with the analysis in the
`
`claim chart, (3) adopted that analysis as his own, and (4) concluded that the
`
`evidence in the chart was (in his opinion) sufficient to prove infringement. (Bims
`
`Dep. at 13:20-16:3.)
`
`A second Finjan expert, Dr. Nenad Medvidovic, opined during Blue Coat
`
`litigation that the construction Finjan now proposes for claim 14 would exclude
`
`multiple embodiments that modify the executable code:
`
`Some embodiments include the concatenation of the MPC with the
`executable code for delivery as a single package to the information-
`destination, the encryption of executable code, or compressed
`executable code…. In each of those embodiments, the executable
`code is being modified.
`
`(Ex. 1099 at 8 (citations omitted).) Dr. Medvidovic also testified that MPC can be
`
`transferred with or without modifying the executable code, and that either
`
`6
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`embodiment is “completely consistent with the patent, both the specification and
`
`the claims.” (Ex. 1100 at 173:22-175:17.)
`
`IV. FINJAN MISCHARACTERIZES DR. RUBIN’S TESTIMONY
`Finjan incorrectly asserts that Dr. Rubin failed to provide his interpretation
`
`of certain claim elements.2 (Paper 22 at 20–21.) Dr. Rubin explicitly identified
`
`BRIs for two key terms: “mobile protection code” and “information re-
`
`communicator” and stated that he applied plain and ordinary meaning for all other
`
`terms. (Ex. 1002 at ¶¶ 79–84, 34). Dr. Rubin testified at length about his claim
`
`interpretations during deposition. (See, e.g., Rubin Dep. at 105:2–135:21.)
`
`Finjan’s suggestion that Dr. Rubin refused to answer questions about his
`
`claim interpretation during his deposition (Paper 22 at 20–21) is misleading.
`
`Dr. Rubin answered every question asked of him about claims 14 and 19. When
`
`Finjan’s counsel asked Dr. Rubin about claim 13, which is not under review in this
`
`
`2 Finjan also suggests that Dr. Rubin’s declaration should be given no weight
`
`because of an alleged failure to articulate the Graham factors. (Paper 22 at 20–21.)
`
`As a technical expert, Dr. Rubin “need not articulate the Graham factors to offer
`
`testimony on obviousness so long as our findings are guided by those factors.”
`
`Mitek Systems, Inc. v. Rothschild Mobile Imaging Innovations, LLC, IPR2015-
`
`00622, Paper 35 at 38 (PTAB July 20, 2016).
`
`7
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`proceeding, PAN’s counsel asked Finjan’s counsel to explain the relevance of the
`
`question. (Rubin Dep. at 89:6–94:12.) After discussing (and resolving) the issue
`
`off the record, Finjan’s counsel proceeded with questions concerning Dr. Rubin’s
`
`interpretation of claim 13, all of which Dr. Rubin answered. (Id.)
`
`Finjan also incorrectly asserts Dr. Rubin failed to consider secondary
`
`considerations. Dr. Rubin testified that he considered a declaration submitted in ex
`
`parte reexamination by Phil Hartstein, Finjan’s president and CEO. (See Ex. 1002
`
`at 133; Ex. 1088; Rubin Dep. at 176:18–209:8.) While Finjan complains that
`
`Dr. Rubin did not review approximately 500 pages of exhibits attached to and
`
`summarized in Mr. Hartstein’s declaration, Dr. Rubin considered the evidence
`
`available to him at the time he prepared his original declaration and correctly
`
`determined that no additional analysis was required because Finjan failed to
`
`demonstrate the required nexus. See, e.g., Apple, Inc. v. Ameranth, Inc.,
`
`CBM2015-00080, Paper 44, at *36–37 (PTAB Aug. 26, 2016); C&D Zodiac, Inc.
`
`v. B/E Aerospace, Inc., IPR2014-00727, Paper 15 at *17 (PTAB Oct. 29, 2014)
`
`(requiring consideration of secondary indicia only when such evidence is present);
`
`Petroleum Geo-Services Inc. v. WesternGeco LLC, IPR2014-01477, Paper 18 at 32
`
`(PTAB Mar. 17, 2015).
`
`8
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`V.
`
`SHIN, POISON JAVA, AND BROWN WERE PUBLICLY ACCESSIBLE
`Prior art references are publicly accessible if they were “disseminated or
`
`otherwise made available to the extent that persons interested and ordinarily skilled
`
`in the subject matter or art, exercising reasonable diligence, can locate it.” In re
`
`Wyer, 655 F.2d 221 (CCPA 1981).
`
`Shin was publicly accessible
`A.
`Evidence of Shin’s publication includes: (1) a 1998 publication date on the
`
`author’s website; (2) publication on a different website maintained by the author
`
`no later than April 18, 1998; (3) cataloguing by yet another website with a July 27,
`
`1998 date stamp; (4) citation in the January 1999 Kava paper; and (5) Dr. Rubin’s
`
`testimony that he recalls reading Shin when it was first published. (Paper 1 at 4-5.)
`
`Finjan ignores Dr. Rubin’s testimony and the cumulative nature of this
`
`evidence and points to a case where the only evidence of public accessibility was
`
`publication on a website, without any showing that the reference was actually
`
`viewed or downloaded. See Blue Calypso LLC v. Groupon, Inc., 815 F.3d 1331,
`
`1349–50 (Fed. Cir. 2016). Here, by contrast, unrebutted evidence confirms that
`
`interested members of the public actually accessed Shin before the priority dates.
`
`(See Ex. 1008 (citing Shin in 1999); Rubin Dep. at 75:10-16, 70:21-71:11.).)
`
`9
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`Poison Java was publicly accessible
`B.
`Poison Java is an IEEE magazine article with an August 1999 publication
`
`date on its face. (Ex. 1004.) The Board routinely allows petitioners to rely on IEEE
`
`publication dates as evidence of publication. Microsoft Corp. v. Bradium Techs.
`
`LLC, IPR2016-00448, Paper 9 at 13-14 (PTAB July 25, 2016) (“The Board has
`
`accepted the copyright date of an IEEE publication as evidence of its public
`
`availability.”); Ericsson, Inc. v. Intellectual Ventures I LLC, IPR2014-00527, Paper
`
`No. 41 at 12 (PTAB May 18, 2015).
`
`Additionally, IEEE employee Gerard Grenier testified Poison Java was
`
`included in the print version of the IEEE Spectrum magazine published in August
`
`1999. (Ex. 1005; Ex. 2023.) Finjan complains that Mr. Grenier relied on IEEE
`
`business records and practices for his testimony. But IEEE’s routine business
`
`practices are sufficient to establish the date by which Shin became publicly
`
`accessible. Constant v. Advanced Micro-Devices, Inc., 848 F.2d 1560 (Fed.
`
`Cir.), cert. denied, 988 U.S. 892 (1988); In re Hall, 781 F.2d 897 (Fed. Cir. 1986).
`
`And later electronic publication of Poison Java does not change the August 1999
`
`publication date of the original print version.
`
`Finally, Finjan does not dispute Dr. Rubin’s testimony that he received the
`
`August 1999 issue of IEEE Spectrum magazine in the mail and read Poison Java:
`
`10
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`“I was subscribed to IEEE Spectrum and read that article [Poison Java] when it
`
`came out.” (Rubin Dep. at 75:19–21.)
`
`C. Brown was publicly accessible
`Brown itself indicates a 1996 copyright date, and it was advertised on the
`
`publisher’s website at least as early as 1997. (Ex. 1041 at 2; Ex. 1092.) A member
`
`of the public could have found and purchased Brown via this website or by calling
`
`the phone number listed on the website for book orders. (See Ex. 1092 at 3.) Peter
`
`Kent, one of the authors of Brown, testified: (1) he received a copy of Brown from
`
`the publisher shortly after it was first published in September 1996; (2) he
`
`compared his copy of Brown to the December 1996 version cited in the Petition
`
`and confirmed that the relevant text was identical; (3) Brown received a Library of
`
`Congress number and ISBN number—index numbers used by the Library of
`
`Congress and on Amazon.com in 1996; and (4) the publisher would not have
`
`printed the December 1996 version if the September 1996 version was not already
`
`selling. (Ex. 2024 at 17:11-18:7, 20:12–22:22, 25:14–26:25, 31:5-32:22.)
`
`Finjan attacks the sufficiency of individual pieces of evidence but offers no
`
`contrary evidence. (Paper 22 at 25-26.) Mr. Kent’s testimony, the publisher’s
`
`website, and Brown itself show that Brown was disseminated or otherwise made
`
`available to interested members of the public before the priority date. In re
`
`Wyer, 655 F.2d 221, 226.
`
`11
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`VI. GROUND 1: SHIN RENDERS CLAIM 14 OBVIOUS
`Under the BRI of “causing mobile protection code to be executed by the
`
`mobile code executor at a downloadable-information destination such that one or
`
`more operations of the executable code, if attempted, will be processed by the
`
`mobile protection code,” Shin teaches every limitation of claim 14. Even if the
`
`Board adopts Finjan’s narrower construction, Shin still renders the claim obvious.
`
`A.
`
`Shin renders claim 14 obvious
`Shin processes “one or more operations of the executable
`1.
`code” at the downloadable-information destination
`Finjan does not dispute that Shin teaches processing executable code at a
`
`downloadable-information destination. (Ex. 1009 at 4, 16.) Instead, Finjan
`
`argues—without support—that the executable code processed at the destination is
`
`not the same executable code received at the information re-communicator. (Paper
`
`22 at 29.) But, as the Board noted in its institution decision, claim 14 “does not
`
`require ‘the executable code’ to encompass the entirety or an intact version of the
`
`executable code received” at the re-communicator. (Paper 7 at 14.) To the contrary,
`
`the claim requires only that “one or more operations” of the executable code be
`
`processed at the destination. (Id.; Ex. 1001 at 22:3.)
`
`Shin teaches executing “mobile protection code”
`2.
`Finjan next argues that Shin does not teach “mobile protection code”
`
`because Shin “rewrite[s] the incoming applet so that it cannot perform malicious
`12
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`operations.” (Paper 22 at 29–30.) But Shin’s safeguarding code merely substitutes
`
`safe classes and methods for potentially-dangerous classes and methods (Ex. 1009
`
`at 4), and Shin expressly states that its substituted classes and methods were
`
`running (i.e., executed) at a client computer (the downloadable-information
`
`destination): “The safeguarding code was running on a Sun Ultra 1 Model 170
`
`with Netscape Navigator™ Gold 3.01.” (Ex. 1009 at 16 (emphasis added.)
`
`Accordingly, Shin discloses executing MPC.
`
`Finjan incorrectly states that Petitioner relies on the same Shin code for both
`
`the “mobile protection code” and “executable code” limitations of claim 14. (Paper
`
`22 at 30.) To the contrary, Petitioner identified Shin’s “safeguarding code” as MPC
`
`and the incoming applet as including executable code: “Shin discloses executing
`
`safeguarding code (‘mobile protection code’) at an HTTP client …. Shin also
`
`discloses that the safeguarding code processes operations attempted by the applet
`
`(‘executable code’) ….” (Paper 1 at 42–43.) While both the safeguarding code
`
`(MPC) and one or more operations of the applet (executable code) are executed at
`
`the downloadable-information destination, they are not the same thing. (Id.; Ex.
`
`1009 at 4, 16.)
`
`Shin teaches a “mobile code executor”
`3.
`Finjan’s last argument concerning Shin asserts that, because Shin’s authors
`
`used an HTTP client program in place of a browser to test the performance of their
`
`13
`
`

`
`Petitioner’s Reply
`IPR2015-01974
`
`safeguarding code, Shin does not teach or suggest a “mobile code executor.”
`
`(Paper 22 at 31–34.) But the Java Virtual Machine (“JVM”) incorporated in 2000-
`
`era web browsers is a “mobile code exec

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket