throbber
Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page1 of 36
`
`
`
`PAUL J. ANDRE (State Bar No. 196585)
`pandre@kramerlevin.com
`LISA KOBIALKA (State Bar No. 191404)
`lkobialka@kramerlevin.com
`JAMES HANNAH (State Bar No. 237978)
`jhannah@kramerlevin.com
`KRAMER LEVIN NAFTALIS & FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`Telephone: (650) 752-1700
`Facsimile: (650) 752-1800
`
`Attorneys for Plaintiff
`FINJAN, INC.
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`OAKLAND DIVISION
`
`
`
`Case No.:
`
`COMPLAINT FOR PATENT
`INFRINGEMENT
`
`DEMAND FOR JURY TRIAL
`
`
`FINJAN, INC., a Delaware Corporation,
`
`
`
`
`
`
`
`Plaintiff,
`
`v.
`
`
`BLUE COAT SYSTEMS, INC., a Delaware
`Corporation,
`
`Defendant.
`
`
`
`
`
`
`
`
`
`
`____________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Blue Coat Systems - Exhibit 1096
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page2 of 36
`
`
`
`COMPLAINT FOR PATENT INFRINGEMENT
`
`Plaintiff Finjan, Inc. (“Finjan”) files this Complaint for Patent Infringement and Jury Demand
`
`against Defendant Blue Coat Systems, Inc. (“Defendant” or “Blue Coat”) and alleges as follows:
`
`THE PARTIES
`
`1.
`
`Finjan is a Delaware corporation, with its corporate headquarters at 1313 N. Market
`
`Street, Suite 5100, Wilmington, Delaware 19801. Finjan’s U.S. operating business was previously
`
`headquartered at 2025 Gateway Place, San Jose, California 95110.
`
`2.
`
`Blue Coat is a Delaware corporation with its principal place of business at 420 North
`
`Mary Avenue, Sunnyvale, California 94085.
`
`JURISDICTION AND VENUE
`
`3.
`
`This action arises under the Patent Act, 35 U.S.C. § 101 et seq. This Court has
`
`original jurisdiction over this controversy pursuant to 28 U.S.C. §§ 1331 and 1338.
`
`4.
`
`5.
`
`Venue is proper in this Court pursuant to 28 U.S.C. §§ 1391(b) and (c) and/or 1400(b).
`
`This Court has personal jurisdiction over Defendant. Upon information and belief,
`
`Defendant does business in this District and has, and continues to, infringe and/or induce the
`
`infringement in this District. Defendant also markets its products primarily in and from this District.
`
`In addition, the Court has personal jurisdiction over Defendant because it has established minimum
`
`contacts with the forum and the exercise of jurisdiction would not offend traditional notions of fair
`
`play and substantial justice.
`
`INTRADISTRICT ASSIGNMENT
`
`6.
`
`Pursuant to Local Rule 3-2(c), Intellectual Property Actions are assigned on a district-
`
`wide basis.
`
`
`
`1
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page3 of 36
`
`
`
`FINJAN’S INNOVATIONS
`
`7.
`
`Finjan was founded in 1997 as a wholly-owned subsidiary of Finjan Software Ltd., an
`
`Israeli corporation. Finjan was a pioneer in the developing proactive security technologies capable of
`
`detecting previously unknown and emerging online security threats recognized today under the
`
`umbrella of “malware.” These technologies protect networks and endpoints by identifying suspicious
`
`patterns and behaviors of content delivered over the Internet. Finjan has been awarded, and continues
`
`to prosecute, numerous patents in the United States and around the world resulting directly from
`
`Finjan’s more than decade-long research and development efforts, supported by a dozen inventors.
`
`8.
`
`Finjan built and sold software, including APIs, and appliances for network security
`
`using these patented technologies. These products and customers continue to be supported by
`
`Finjan’s licensing partners. At its height, Finjan employed nearly 150 employees around the world
`
`building and selling security products and operating the Malicious Code Research Center through
`
`which it frequently published research regarding network security and current threats on the Internet.
`
`Finjan’s pioneering approach to online security drew equity investments from two major software and
`
`technology companies, the first in 2005, followed by the second in 2006. Through 2009, Finjan has
`
`generated millions of dollars in product sales and related services and support revenues
`
`9.
`
`Finjan’s founder and original investors are still involved with and invested in the
`
`company today, as are a number of other key executives and advisors. Currently, Finjan is a
`
`technology company applying its research, development, knowledge and experience with security
`
`technologies to working with inventors, investing in and/or acquiring other technology companies,
`
`investing in a variety of research organizations, and evaluating strategic partnerships with large
`
`companies.
`
`2
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page4 of 36
`
`
`
`10.
`
`On October 12, 2004, U.S. Patent No. 6,804,780 (“the ‘780 Patent”), entitled
`
`SYSTEM AND METHOD FOR PROTECTING A COMPUTER AND A NETWORK FROM
`
`HOSTILE DOWNLOADABLES, was issued to Shlomo Touboul. A true and correct copy of the
`
`‘780 Patent is attached to this Complaint as Exhibit A and is incorporated by reference herein.
`
`11.
`
`All rights, title, and interest in the ‘780 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘780 Patent. Finjan has been the sole owner of the ‘780 Patent since its issuance.
`
`12.
`
`The ‘780 Patent is generally directed towards methods and systems for generating a
`
`Downloadable ID. By generating an identification for each examined Downloadable, the system
`
`allows the Downloadable to be recognized without reevaluation. Such recognition increases
`
`efficiency while also saving valuable resources, such as memory and computing power.
`
`13.
`
`On June 6, 2006, U.S. Patent No. 7,058,822 (“the ‘822 Patent”), entitled MALICIOUS
`
`MOBILE CODE RUNTIME MONITORING SYSTEM AND METHODS, was issued to Yigal
`
`Mordechai Edery, Nimrod Itzhak Vered, David R. Kroll and Shlomo Touboul. A true and correct
`
`copy of the ‘822 Patent is attached to this Complaint as Exhibit B and is incorporated by reference
`
`herein.
`
`14.
`
`All rights, title, and interest in the ‘822 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘822 Patent. Finjan has been the sole owner of the ‘822 Patent since its issuance.
`
`15.
`
`The ‘822 Patent is generally directed towards computer networks and more
`
`particularly provides a system that protects devices connected to the Internet from undesirable
`
`operations from web-based content. One of the ways this is accomplished is by determining whether
`
`any part of such web-based content can be executed and then trapping such content and neutralizing
`
`possible harmful effects using mobile protection code. Additionally, the system provides a way to
`
`analyze such web-content to determine whether it can be executed.
`
`3
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page5 of 36
`
`
`
`16.
`
`On January 12, 2010, U.S. Patent No. 7,647,633 (“the ‘633 Patent”), entitled
`
`MALICIOUS MOBILE CODE RUNTIME MONITORING SYSTEM AND METHODS, was issued
`
`to Yigal Mordechai Edery, Nimrod Itzhak Vered, David R. Kroll and Shlomo Touboul. A true and
`
`correct copy of the ‘633 Patent is attached to this Complaint as Exhibit C and is incorporated by
`
`reference herein.
`
`17.
`
`All rights, title, and interest in the ‘633 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘633 Patent. Finjan has been the sole owner of the ‘633 Patent since its issuance.
`
`18.
`
`The ‘633 Patent is generally directed towards computer networks, and more
`
`particularly, provides a system that protects devices connected to the Internet from undesirable
`
`operations from web-based content. One of the ways this is accomplished is by determining whether
`
`any part of such web-based content can be executed and then trapping such content and neutralizing
`
`possible harmful effects using mobile protection code.
`
`19.
`
`On November 28, 2000, U.S. Patent No. 6,154,844 (“the ‘844 Patent”), entitled
`
`SYSTEM AND METHOD FOR ATTACHING A DOWNLOADABLE SECURITY PROFILE TO
`
`A DOWNLOADABLE, was issued to Shlomo Touboul and Nachshon Gal. A true and correct copy
`
`of the ‘844 Patent is attached to this Complaint as Exhibit D and is incorporated by reference herein.
`
`20.
`
`All rights, title, and interest in the ‘844 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘844 Patent. Finjan has been the sole owner of the ‘844 Patent since its issuance.
`
`21.
`
`The ‘844 Patent is generally directed towards computer networks, and more
`
`particularly, provides a system that protects devices connected to the Internet from undesirable
`
`operations from web-based content. One of the ways this is accomplished is by linking a security
`
`profile to such web-based content to facilitate the protection of computers and networks from
`
`malicious web-based content.
`
`4
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page6 of 36
`
`
`
`22.
`
`On November 15, 2005, U.S. Patent No. 6,965,968 (“the ‘968 Patent”), entitled
`
`POLICY-BASED CACHING, was issued to Shlomo Touboul. A true and correct copy of the ‘968
`
`Patent is attached to this Complaint as Exhibit E and is incorporated by reference herein.
`
`23.
`
`All rights, title, and interest in the ‘968 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘968 Patent. Finjan has been the sole owner of the ‘968 Patent since its issuance.
`
`24.
`
`The ‘968 Patent is generally directed towards methods and systems for enabling
`
`policy-based cache management to determine if digital content is allowable relative to a policy. One
`
`of the ways this is accomplished is scanning digital content to derive a content profile and
`
`determining whether the digital content is allowable for a policy based on the content profile.
`
`25.
`
`On August 26, 2008, U.S. Patent No. 7,418,731 (“the ‘731 Patent”), entitled
`
`METHOD AND SYSTEM FOR CACHING AT SECURE GATEWAYS, was issued to Shlomo
`
`Touboul. A trued and correct copy of the ‘731 Patent is attached to this Complaint as Exhibit F and is
`
`incorporated by reference herein.
`
`26.
`
`All rights, title, and interest in the ‘731 Patent have been assigned to Finjan, who is the
`
`sole owner of the ‘731 Patent. Finjan has been the sole owner of the ‘731 Patent since its issuance.
`
`27.
`
`The ‘731 Patent is generally directed towards methods and systems for enabling
`
`policy-based cache management to determine if digital content is allowable relative to a policy. One
`
`of the ways this is accomplished is scanning digital content to derive a content profile, including at
`
`least one computer command the content would perform, and determining whether the digital content
`
`is allowable for a policy based on the content profile.
`
`5
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page7 of 36
`
`
`
`BBLUE COAAT
`
`
`
`
`
`Blue CCoat makes, uses, sells, offers for saale, and/or immports into t
`
`
`
`
`
`
`
`
`
`
`
`he United Sttates and
`
`
`
`
`
`28.
`
`
`
`the oftware and tances and SoyAV Appliaftware, Proxynces and SofySG Applianthis Distrrict its Proxy
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`WebPulsse Cloud Serrvice, shownn below:
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`
`
`http://wwww.bluecoat..com/documments/downlooad/d84549cc4-05f3-4c644-920c-f48cddccad4ae/4ee23e1a8-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`b292-4afff-9271-e24331918dc0f att 2 (attachedd as Exhibit GG).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The BBlue Coat ProoxySG Applliances and SSoftware aree a family off proxy appliiances
`
`
`
`
`
`
`
`29.
`
`
`
`
`
`
`
`
`
`and softwware placed aat the Internnet gateway tto provide seecurity with
`
`
`
`
`
`respect to WWeb-based
`
`
`
`communications andd support security, acceleeration and ppolicy controol features off the appliannce. See
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`http://wwww.sec.gov/AArchives/edggar/data/10995600/00011193125111611263/d10k.hhtm at 8 (attaached as
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Exhibit HH). The ProxxySG Appliaances and Sooftware incluude the ProxxySG 300, PProxySG 6000,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ProxySGG 900, PrxySSG 9000, ProoxySG softwware and Secuure Web Gaateway Virtuual Appliancee. See
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`_________ _________________________________________________________________________________
`
`
`
`6
`
`
`
`
`
`
`
`
`
`COMPLAAINT FOR PPATENT INNFRINGEMMENT
`
`
`
`
`CCASE NO.
`
`1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8
`1 2 3 4 5 6 7 8 9
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page8 of 36
`
`
`
`http://www.bluecoat.com/products/proxysg (attached as Exhibit I); see also
`
`bcs_ds_SWG_VA_EN_v2a.pdf, at 1 (attached as Exhibit J).
`
`30.
`
`The Blue Coat ProxySG Appliances and Software enforce network policy utilizing the
`
`Blue Coat Content Policy Language (“CPL”) that evaluates every Web request. The Blue Coat
`
`ProxySG implements policy layers by selecting and customizing policy. In this way, CPL is used to
`
`scan HTML and ASX files for active content and remove it or replace it with a customized message
`
`indicating a policy violation. See Content_Policy_Language_Reference_Guide.c.pdf at 17-18, 476
`
`(attached as Exhibit K). CPL is also used to detect and remove executables with hidden file types.
`
`See Preventing_Malware_with_Blue_Coat_Proxies 2.pdf at 3-4 (attached as Exhibit L).
`
`31.
`
`The Blue Coat ProxySG Appliances and Software replace active content such as Script
`
`Tags, JavaScript Entities, JavaScript Strings, JavaScript Events, Embed Tags and Object Tags. See
`
`SGOS_6.3.x_Visual_Policy_Manager_Reference.d.pdf at Ch. 4, 201-03 (attached as Exhibit M).
`
`32.
`
`CPL includes the “define active_content” rule for removing or replacing active content
`
`in HTML or ASX documents. This definition is invoked by a transform action in a define action
`
`definition block, and that block in turn enables an action as a result of policy evaluation. See
`
`Content_Policy_Language_Reference_Guide.c.pdf at 476 (attached as Exhibit N).
`
`33.
`
`The Blue Coat ProxySG Appliances and Software are able to cache an object each
`
`time a request is received and check its object store for a cached copy.
`
`Preventing_Malware_with_Blue_Coat_Proxies.pdf at 7 (attached as Exhibit K).
`
`34.
`
`The Blue Coat ProxyAV Appliances and Software are designed for use with ProxySG
`
`Appliances and Software and provide inline threat protection and malware scanning of Web content
`
`at the Internet gateway. The ProxyAV Appliances and Software work in conjunction with BlueCoat
`
`WebPulse and WebFilter to prevent entry of viruses, Trojans, worms and other forms of malicious
`
`7
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page9 of 36
`
`
`
`content into the end user’s network. See
`
`http://www.sec.gov/Archives/edgar/data/1095600/000119312511161263/d10k.htm at 9 (attached as
`
`Exhibit H). The ProxyAV Appliances and Software include the ProxyAV 510, ProxyAV 1200,
`
`ProxyAV 1400, ProxyAV 2400 and ProxyAV software. See
`
`http://www.bluecoat.com/products/proxyav (attached as Exhibit O).
`
`35.
`
`The Blue Coat ProxyAV Appliances and Software scan objects such as webpages and
`
`create a secure hash fingerprint of the file’s content and compare its contents to a database of hashes
`
`from previously scanned objects. See
`
`Integrating_the_ProxySG_and_ProxyAV_Appliances_(SGOS_5.4).e.pdf at 14 (attached as Exhibit
`
`P).
`
`36.
`
`The Blue Coat WebPulse service is a cloud-based infrastructure utilizing multiple
`
`technologies to analyze URL requests and can be used with the ProxySG Appliances and Software,
`
`ProxyAV Appliances and Software, Blue Coat WebThreat Blade, Blue Coat WebFilter and Blue Coat
`
`Web Security Service. WebPulse includes Dynamic Real-Time Rating (“DRTR”) to analyze
`
`unknown content in real-time. DRTR looks for characteristics of the content that may indicate
`
`danger. Access to suspicious content triggers a response from the real-time malware detection
`
`modules indicating a category for the content to be blocked immediately. See
`
`Bcs_WebPulse_Tech_Overview_wp_v1b.pdf at 7-8 (attached as Exhibit Q); see also
`
`bcs_ds_Web_Security_Service_EN_v5a.pdf at 1 (attached as Exhibit R).
`
`BLUE COAT’S INFRIGEMENT OF FINJAN’S PATENTS
`
`37.
`
`Defendant has been and is now infringing the ‘780 Patent, the ‘822 Patent, the ‘633
`
`Patent, the ‘844 Patent, the ‘968 Patent and the ‘731 Patent (collectively “the Patents-In-Suit”) in this
`
`judicial District, and elsewhere in the United States by, among other things, making, using,
`
`8
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page10 of 36
`
`
`
`importing, selling, and/or offering for sale the claimed system and methods on the Blue Coat
`
`ProxySG Appliances and Software, ProxyAV Appliances and Software and WebPulse.
`
`38.
`
`In addition to directly infringing the Patents-In-Suit pursuant to 35 U.S.C. § 271(a)
`
`either literally or under the doctrine of equivalents, Defendant indirectly infringes the Patents-In-Suit
`
`pursuant to 35 U.S.C. § 271(b) by instructing, directing and/or requiring others, including its users
`
`and developers, to perform all or some of the steps of the method claims, either literally or under the
`
`doctrine of equivalents, of the Patents-In-Suit.
`
`39.
`
`In addition to directly infringing the ‘822 Patent and ‘633 Patent pursuant to 35 U.S.C.
`
`§ 271(a) either literally or under the doctrine of equivalents, Defendant indirectly infringes the ‘822
`
`Patent and the ‘633 Patent pursuant to 35 U.S.C. § 271(c) by selling a material component of a
`
`patented machine or apparatus for use in practicing the claims of the ‘822 Patent and ‘633 Patent,
`
`either literally or under the doctrine of equivalents, by its customers, users and developers, and
`
`especially adapted for use in an infringement of the ‘822 Patent and ‘633 Patent.
`
`COUNT I
`(Direct Infringement of the ‘780 Patent pursuant to 35 U.S.C. § 271(a))
`
`40.
`
`Finjan repeats, realleges, and incorporates by reference, as if fully set forth herein, the
`
`allegations of the preceding paragraphs, as set forth above.
`
`41.
`
`Defendant has infringed and continues to infringe one or more claims of the ‘780
`
`Patent in violation of 35 U.S.C. § 271(a).
`
`42.
`
`Defendant’s infringement is based upon literal infringement or, in the alternative,
`
`infringement under the doctrine of equivalents.
`
`43.
`
`Defendant’s acts of making, using, importing, selling, and/or offering for sale infringing
`
`products and services have been without the permission, consent, authorization or license of Finjan.
`
`9
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page11 of 36
`
`
`
`44.
`
`Defendant’s infringement includes, but is not limited to, the manufacture, use, sale,
`
`importation and/or offer for sale of Defendant’s products and services, including, but not limited to,
`
`the ProxyAV Appliances and Software, which embody the patented invention of the ‘780 Patent.
`
`45.
`
`As a result of Defendant’s unlawful activities, Finjan has suffered and will continue to
`
`suffer irreparable harm for which there is no adequate remedy at law. Accordingly, Finjan is entitled
`
`to preliminary and/or permanent injunctive relief.
`
`46.
`
`Defendant’s infringement of the ‘780 Patent has injured and continues to injure Finjan
`
`in an amount to be proven at trial.
`
`COUNT II
`(Indirect Infringement of the ‘780 Patent pursuant to 35 U.S.C. § 271(b))
`
`47.
`
`Finjan repeats, realleges, and incorporates by reference, as if fully set forth herein, the
`
`allegations of the preceding paragraphs, as set forth above.
`
`48.
`
`Defendant has induced and continues to induce infringement of at least claims 1-8 and
`
`16 of the ‘780 Patent under 35 U.S.C. § 271(b).
`
`49.
`
`In addition to directly infringing the ‘780 Patent, Defendant indirectly infringes the
`
`‘780 Patent pursuant to 35 U.S.C. § 271(b) by instructing, directing and/or requiring others,
`
`including, but not limited to, its customers, users and developers, to perform all or some of the steps
`
`of the method claims, either literally or under the doctrine of equivalents, of the ‘780 Patent, where
`
`all the steps of the method claims are performed by either Blue Coat or its customers, users or
`
`developers, or some combination thereof. Defendant knew or was willfully blind to the fact that it
`
`was inducing others, including customers, users and developers, to infringe by practicing, either
`
`themselves or in conjunction with Defendant, one or more method claims of the ‘780 Patent.
`
`50.
`
`Defendant knowingly and actively aided and abetted the direct infringement of the
`
`‘780 Patent by instructing and encouraging its customers, users and developers to use the Blue Coat
`
`10
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page12 of 36
`
`
`
`ProxyAV Appliances and Software. Such instructions and encouragement include, but are not
`
`limited to, advising third parties to use the Blue Coat ProxyAV Appliances and Software in an
`
`infringing manner, providing a mechanism through which third parties may infringe the ‘780 Patent,
`
`specifically through the use of the Blue Coat ProxyAV Appliances and Software, advertising and
`
`promoting the use of the Blue Coat ProxyAV Appliances and Software in an infringing manner, and
`
`distributing guidelines and instructions to third parties on how to use the Blue Coat ProxyAV
`
`Appliances and Software in an infringing manner.
`
`51.
`
`Blue Coat regularly updates and maintains the Blue Coat website
`
`(http://www.bluecoat.com) and the BlueTouch Online website (https://bto.bluecoat.com and
`
`https://kb.bluecoat.com) to provide demonstration, instruction, and technical assistance to users to
`
`help them use the Blue Coat ProxyAV Appliances and Software, including:
`
` Blue Coat® Systems ProxyAV® Appliance: Configuration and Management Guide (see e.g.,
`http://bto.bluecoat.com/doc/19366, attached as Exhibit S, directs users in the use and
`management of the Blue Coat ProxyAV Appliances and states that “it is vital to dedicate more
`attention to securing Web traffic.”);
`
` Blue Coat ProxyAV 1200/1400/2400 Datasheet (see e.g.,
`bcs_ds_proxyav_1200_1400_2400_EN-v7a.pdf, attached as Exhibit T, states that “ProxyAV
`appliances also provide in-line threat protection and malware scanning of web content at the
`gateway.”);
`
` Security Empowers Business (see e.g., bcs_wp_Security_Empowers_Business_EN_2.3.pdf,
`attached as Exhibit U, states that “Implemented and used properly, security is about
`empowerment. It’s about boosting efficiency, driving productivity, accelerating innovation,
`increasing collaboration, optimizing user experiences, and expanding the awesome power of
`technology”);
`
` Unified Web Security Solutions (see e.g., bcs_wp_Unified_Security_EN_v2b.pdf, attached as
`Exhibit V, states that “IT and security professionals must be able to manage and enforce
`consistent policies throughout the entire work force”).
`
`52.
`
`Blue Coat instructs users, including employees, to use and test the ProxyAV
`
`Appliances and Software. For example, Blue Coat has the BlueTouch Training Services that provide
`
`a technical expert to assist users in installing, configuring, and troubleshooting Blue Coat products.
`
`11
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page13 of 36
`
`
`
`Blue Coat has training centers with courses and certification related to the Blue Coat products. See
`
`http://www.bluecoat.com/support/training/bluetouch-training-services (attached as Exhibit W).
`
`53.
`
`Blue Coat provides value added resellers, system integrators and distributors with the
`
`Blue Coat Channel Advantage Program to encourage and expand use of the Blue Coat ProxyAV
`
`Appliances and Software. The Blue Coat Channel Advantage Program offers “compelling top- and
`
`bottom-line growth opportunities to Blue Coat partners.” The Blue Coat Channel Advantage
`
`Program also offers several partner level tiers to further encourage and expand the use of the Blue
`
`Coat ProxyAV Appliances and Software. See http://www.bluecoat.com/partners/channel-advantage-
`
`program (attached as Exhibit X).
`
`54.
`
`Blue Coat regularly updates and maintains the Blue Coat website and BlueTouch
`
`Online to provide demonstration, instruction, and technical assistance to users to help them use the
`
`Blue Coat ProxyAV Appliances and Software. (http://bluecoat.com/support/technical-support,
`
`https://bto.bluecoat.com/ and https://kb.bluecoat.com).
`
`55.
`
`Defendant has had knowledge of the ’780 Patent at least as of the time it learned of
`
`this action for infringement and, by continuing the actions described above, has had the specific intent
`
`to or was willfully blind to the fact that its actions would induce infringement of the ‘780 Patent.
`
`56.
`
`Blue Coat actively and intentionally maintains its website to promote the Blue Coat
`
`ProxyAV Appliances and Software and to encourage potential customers, users and developers to use
`
`the Blue Coat ProxyAV Appliances and Software in the manner described by Finjan.
`
`(http://bluecoat.com/support/technical-support, https://bto.bluecoat.com/ and
`
`https://kb.bluecoat.com).
`
`57.
`
`Blue Coat actively updates its websites, including Blue Coat’s BlueTouch Online
`
`information center, to promote the Blue Coat ProxyAV Appliances and Software, including the
`
`12
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page14 of 36
`
`
`
`Content Policy Language, to encourage customers, users and developers to practice the methods
`
`taught in the ‘780 Patent. (http://bluecoat.com/support/technical-support, https://bto.bluecoat.com
`
`and https://kb.bluecoat.com).
`
`COUNT III
`(Direct Infringement of the ‘822 Patent pursuant to 35 U.S.C. § 271(a))
`
`58.
`
`Finjan repeats, realleges, and incorporates by reference, as if fully set forth herein, the
`
`allegations of the preceding paragraphs, as set forth above.
`
`59.
`
`Defendant has infringed and continues to infringe one or more claims of the ‘822
`
`Patent in violation of 35 U.S.C. § 271(a).
`
`60.
`
`Defendant’s infringement is based upon literal infringement or, in the alternative,
`
`infringement under the doctrine of equivalents.
`
`61.
`
`Defendant’s acts of making, using, importing, selling, and/or offering for sale infringing
`
`products and services have been without the permission, consent, authorization or license of Finjan.
`
`62.
`
`Defendant’s infringement includes, but is not limited to, the manufacture, use, sale,
`
`importation and/or offer for sale of Defendant’s products and services, including but not limited to
`
`the ProxySG Appliances and Software, which embody the patented invention of the ‘822 Patent.
`
`63.
`
`As a result of Defendant’s unlawful activities, Finjan has suffered and will continue to
`
`suffer irreparable harm for which there is no adequate remedy at law. Accordingly, Finjan is entitled
`
`to preliminary and/or permanent injunctive relief.
`
`64.
`
`Defendant’s infringement of the ‘822 Patent has injured and continues to injure Finjan
`
`in an amount to be proven at trial.
`
`COUNT IV
`(Indirect Infringement of the ‘822 Patent pursuant to 35 U.S.C. §§ 271(b)-(c))
`
`65.
`
`Finjan repeats, realleges, and incorporates by reference, as if fully set forth herein, the
`
`allegations of the preceding paragraphs, as set forth above.
`
`13
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page15 of 36
`
`
`
`66.
`
`Defendant has induced and continues to induce infringement of at least claims 1, 4, 6
`
`and 8 of the ‘822 Patent under 35 U.S.C. § 271(b).
`
`67.
`
`In addition to directly infringing the ‘822 Patent, Defendant indirectly infringes the
`
`‘822 Patent pursuant to 35 U.S.C. § 271(b) by instructing, directing and/or requiring others, including
`
`but not limited to its customers, users and developers, to perform all or some of the steps of the
`
`method claims, either literally or under the doctrine of equivalents, of the ‘822 Patent, where all the
`
`steps of the method claims are performed by either Blue Coat or its customers, users or developers, or
`
`some combinations thereof. Defendant knew or was willfully blind to the fact that it was inducing
`
`others, including customers, users and developers, to infringe by practicing, either themselves or in
`
`conjunction with Defendant, one or more method claims of the ‘822 Patent.
`
`68.
`
`Defendant has contributorily infringed and continues to contributorily infringe at least
`
`claims 1, 2, 4, 9, 10, 12, 15, 28, 31, 33, 34 and 35 of the ‘822 Patent under 35 U.S.C. § 271(c).
`
`69.
`
`In addition to directly infringing the ‘822 Patent, Defendant indirectly infringes the
`
`‘822 Patent pursuant to 35 U.S.C. § 271(c) by selling the ProxySG Appliances and Software, a
`
`material component of a patented machine or apparatus for use in practicing the claims of the ‘822
`
`Patent by its customers, users and developers, and especially adapted for use in an infringement of the
`
`‘822 Patent. The ProxySG Appliances and Software are not a staple article or commodity of
`
`commerce suitable for substantial non-infringing use. Defendant knew or was willfully blind to the
`
`fact that it contributed to the direct infringement of one or more claims of the ‘822 Patent by others,
`
`either literally or under the doctrine of equivalents, including customers, users and developers.
`
`70.
`
`Defendant knowingly and actively aided and abetted the direct infringement of the
`
`‘822 Patent by instructing and encouraging its customers, users and developers to use the Blue Coat
`
`ProxySG Appliance and Software. Such instructions and encouragement include, but are not limited
`
`14
`__________________________________________________________________________________
`COMPLAINT FOR PATENT INFRINGEMENT
`CASE NO.
`
`1 2 3 4 5 6 7 8 9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`

`
`Case5:13-cv-03999-BLF Document1 Filed08/28/13 Page16 of 36
`
`
`
`to, advising third parties to use the Blue Coat ProxySG Appliances and Software in an infringing
`
`manner; providing a mechanism through which third parties may infringe the ‘822 Patent, specifically
`
`through the use of the Blue Coat ProxySG Appliances and So

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket