throbber
Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 1 of 31
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC.,
`Plaintiff,
`
`v.
`
`SYMANTEC CORP.,
`Defendant.
`
`Case No.14-cv-02998-HSG
`
`CLAIM CONSTRUCTION ORDER
`Re: Dkt. Nos. 72, 151
`
`Plaintiff Finjan, Inc. filed this patent infringement action against Defendant Symantec
`
`Corp. The parties seek construction of a total of twelve claim terms found in eight patents: Patent
`
`Nos. 6,154,844 (“’844 Patent”), 7,613,926 (“’926 Patent”), 8,677,494 (“’494 Patent”), 7,756,996
`
`(“’996 Patent”), 7,930,299 (“’299 Patent”), 8,015,182 (“’182 Patent”), 7,757,289 (“’289 Patent”),
`
`and 8,141,154 (“’154 Patent”). This order follows claim construction briefing, a technology
`
`tutorial, a claim construction hearing, two rounds of supplemental claim construction briefing, and
`a supplemental claim construction hearing held on January 20, 2017.1
`
`I. LEGAL STANDARD
`Claim construction is a question of law to be determined by the Court. Markman v.
`
`Westview Instruments, Inc., 517 U.S. 370, 384 (1996). “The purpose of claim construction is to
`
`determine the meaning and scope of the patent claims asserted to be infringed.” O2 Micro Int’l
`
`Ltd. v. Beyond Innovation Tech. Co., 521 F.3d 1351, 1360 (Fed. Cir. 2008) (internal quotation
`
`marks omitted).
`
`Generally, claim terms should be “given their ordinary and customary meaning”—i.e., “the
`
`1 Following the original claim construction briefing and hearing, the Court granted Defendant’s
`motion to stay the case pending IPR proceedings. Dkt. No. 117. After the U.S. Patent Trial and
`Appeal Board denied institution of IPR on ten of the eleven petitions filed, the Court lifted the stay
`at the parties’ joint request. Dkt. Nos. 124, 127.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 1
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 2 of 31
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`meaning that the terms would have to a person of ordinary skill in the art at the time of the
`
`invention.” Phillips v. AWH Corp., 415 F.3d 1303, 1312-13 (Fed. Cir. 2005) (en banc) (internal
`
`quotation marks omitted). There are only two circumstances where a claim is not entitled to its
`
`plain and ordinary meaning: “1) when a patentee sets out a definition and acts as his own
`
`lexicographer, or 2) when the patentee disavows the full scope of a claim term either in the
`
`specification or during prosecution.” Thorner v. Sony Computer Entm’t Am. LLC, 669 F.3d 1362,
`
`1365 (Fed. Cir. 2012).
`
`When construing claim terms, the Federal Circuit emphasizes the importance of intrinsic
`
`evidence such as the language of the claims themselves, the specification, and the prosecution
`
`history. Phillips, 415 F.3d at 1312-17. The claim language can “provide substantial guidance as
`
`to the meaning of particular claim terms,” both through the context in which the claim terms are
`
`used and by considering other claims in the same patent. Id. at 1314. The specification is likewise
`
`a crucial source of information. Id. at 1315-17. Although it is improper to read limitations from
`
`the specification into the claims, the specification is “the single best guide to the meaning of a
`
`disputed term.” Id. at 1315 (“[T]he specification is always highly relevant to the claim
`
`construction analysis. Usually, it is dispositive.” (internal quotation marks omitted)); see
`
`also Merck & Co. v. Teva Pharms. USA, Inc., 347 F.3d 1367, 1371 (Fed. Cir. 2003) (“[C]laims
`
`must be construed so as to be consistent with the specification . . . .”).
`
`Despite the importance of intrinsic evidence, courts may also consider extrinsic evidence—
`
`technical dictionaries, learned treatises, expert and inventor testimony, and the like—to help
`
`construe the claims. Phillips, 415 F.3d at 1317-18. For example, dictionaries may reveal what the
`
`ordinary and customary meaning of a term would have been to a person of ordinary skill in the art
`
`at the time of the invention. Frans Nooren Afdichtingssystemen B.V. v. Stopaq Amcorr Inc., 744
`
`F.3d 715, 722 (Fed. Cir. 2014) (“Terms generally carry their ordinary and customary meaning in
`
`the relevant field at the relevant time, as shown by reliable sources such as dictionaries, but they
`
`always must be understood in the context of the whole document—in particular, the specification
`
`(along with the prosecution history, if pertinent).”). Extrinsic evidence is, however, “less
`
`significant than the intrinsic record in determining the legally operative meaning of claim
`2
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 2
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 3 of 31
`
`
`
`language.” Phillips, 415 F.3d at 1317 (internal quotation marks omitted).
`
`II.
`
`DISPUTED TERMS
`For the first time the Court can recall in any of its patent cases, the parties have failed to
`
`reach agreement as to the construction of even one initially disputed claim term.
`
`A.
`
`“Downloadable” (’844, ’926, ’494)
`Finjan’s Construction
`an executable application program, which is
`downloaded from a source computer and run
`on the destination computer
`
`Symantec’s Construction
`mobile code that is requested by an ongoing
`process and downloaded from a source computer
`to a destination computer for automatic
`execution
`The Court adopts Finjan’s construction.
`
`The parties’ dispute concerning this term reduces to whether an explicit definition in the
`
`specification controls over a narrower definition referenced in the prosecution history. Finjan
`
`argues that the ’844 Patent expressly defines the term “Downloadable” in its specification:
`
` A
`
` Downloadable is an executable application program, which is
`downloaded from a source computer and run on the destination
`computer.
`’844 Patent at 1:44-47. Finjan asserts that this express definition ends the inquiry. See Edwards
`
`Lifesciences LLC v. Cook Inc., 582 F.3d 1322, 1329 (Fed. Cir. 2009) (holding that the court will
`
`adopt a definition where “the patentee acted as his own lexicographer and clearly set forth a
`
`definition of the disputed claim term in either the specification or prosecution history” (internal
`
`quotation marks omitted)).
`
`Symantec proposes a construction drawn from the prosecution history of another Finjan
`
`patent (the ’194 Patent), which predates the patents at issue in this case. According to Symantec,
`
`the examiner rejected the initial ’194 Patent application over U.S. Patent No. 5,623,600 (the “Ji
`
`Patent”). The Ji Patent disclosed a virus scanner that “detect[s] . . . viruses attached to executable
`
`files.” Dkt. No. 74 (“Def. Resp. Br.”) at 2. Symantec directs the Court to a passage of the
`
`prosecution history in which it argues that the inventors of the ’194 Patent distinguished their
`
`invention from the Ji Patent on the ground that the Ji Patent “does not teach hostile Downloadable
`
`detection,” because “[a]s is well known in the art, a Downloadable is mobile code that is requested
`
`by an ongoing process, downloaded from a source computer to a destination computer for
`3
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 3
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 4 of 31
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`automatic execution.” Id. (internal quotation marks omitted) (emphasis in original).
`
`The Court adopts Finjan’s construction, and agrees that the patentee acted as his own
`
`lexicographer in defining this term. The Court is not persuaded by Symantec’s argument based on
`
`the prosecution history of the ’194 patent, and finds that the cited history does not reflect a “clear
`
`and unmistakable disavowal” in any event. See Verizon Servs. Corp. v. Vonage Holdings Corp.,
`
`503 F.3d 1295, 1306 (Fed. Cir. 2007) (“To operate as a disclaimer, the statement in the
`
`prosecution history must be clear and unambiguous, and constitute a clear disavowal of scope.”).
`
`B.
`
`“Database” (’926, ’494)
`Finjan’s Construction
`a collection of interrelated data organized
`according to a database schema to serve one
`or more applications
`
`
`Symantec’s Construction
`Organized collection of data
`
`The Court adopts Finjan’s construction.
`
`
`
`When engaging in claim construction, district courts have granted “reasoned deference” to
`
`claim construction orders outside their jurisdiction that address the same term in the same patent,
`
`given the importance of uniformity in claim construction. See Visto Corp. v. Sproqit Techs., Inc.,
`
`445 F. Supp. 2d 1104, 1108 (N.D. Cal. 2006); Maurice Mitchell Innovations, L.P. v. Intel Corp.,
`
`No. 2:04-CV-450, 2006 WL 1751779, at *4 (E.D. Tex. June 21, 2006), aff’d, 249 F. App’x 184
`
`(Fed. Cir. 2007); see also Finisar Corp. v. DirecTV Grp., Inc., 523 F.3d 1323, 1329 (Fed. Cir.
`
`2008) (“In the interest of uniformity and correctness, this court consults the claim analysis of
`
`different district courts on the identical terms in the context of the same patent.”) Under this
`
`standard, the court considers the prior claim construction order for its persuasive value, while still
`
`ultimately reaching its own independent judgment. Visto, 445 F. Supp. 2d at 1108-09; Maurice
`
`Mitchell, 2006 WL 1751779, at *4; see also B-50.com, LLC v. InfoSync Servs., LLC, No. 3:10-
`
`CV-1994-D, 2012 WL 4866508, at *4 (N.D. Tex. Oct. 15, 2012) (deferring “where appropriate” to
`
`construction of same patent claim by court outside jurisdiction in furtherance of the “patent law
`
`goal of uniformity”). If anything, to the extent possible, the degree of deference should be greater
`
`where the prior claim construction order was issued in the same jurisdiction. As observed by
`
`Judge Chen, the Supreme Court has stressed the particular importance of intrajurisdictional
`4
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 4
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 5 of 31
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`uniformity in claim construction, see Visto, 445 F. Supp. 2d at 1107-08 (discussing Markman, 517
`
`U.S. at 390-91), such that claim construction orders from within the jurisdiction arguably should
`
`receive greater deference than those from outside it, see id. at 1108.
`
`In Finjan, Inc. v. Sophos, Inc., No. 14-CV-01197-WHO, 2015 WL 890621, at *2-4 (N.D.
`
`Cal. Mar. 2, 2015), Judge Orrick adopted Finjan’s identical proposed construction of “database” in
`
`the same patents at issue here, on the ground that this construction reflects the patents’ “context”
`
`and the “well-accepted definition of the term.” While still independently weighing the arguments
`
`made by the parties here, the Court is persuaded by Judge Orrick’s thorough reasoning for
`
`adopting Finjan’s construction, and accepts that reasoning in toto to arrive at the same
`
`construction of “database” here. The Court’s holding is also consistent with the policy favoring
`
`uniformity in claim construction to the extent possible, particularly within the same district.
`
`C.
`
`“Means for Receiving a Downloadable” (’844)
`Finjan’s Construction
`Symantec’s Construction
`Function: receiving a Downloadable
`Function: receiving a Downloadable
`
`
`Structure: Downloadable file interceptor
`Structure: indefinite
`
`The Court adopts Finjan’s construction.
`
`As reflected above, the parties do not dispute that this is a means-plus-function claim under
`
`section 112(f), or that the claimed function is “receiving a Downloadable.” Compare Dkt. No. 72
`
`(“Pl. Br.”) at 11-12 with Def. Resp. Br. at 8-9. Instead, their dispute concerns the corresponding
`
`structure that performs that function. Compare Pl. Br. at 12-13 with Def. Resp. Br. 9-10.
`
`Symantec argues that “means for receiving a Downloadable” is indefinite because Finjan’s
`
`proposed structure—a Downloadable file interceptor—is a general purpose processor or computer
`
`“programmed to perform the disclosed algorithm,” Def. Resp. Br. at 9, but the ’844 Patent does
`
`not disclose an algorithm for performing that function. See Noah Sys., Inc. v. Intuit Inc., 675 F.3d
`
`1302, 1317 (Fed. Cir. 2012) (“[R]estat[ing] the function associated with the means-plus-function
`
`limitation . . . is insufficient to provide the required corresponding structure.”). Finjan asserts that
`
`the specification designates the “Downloadable file interceptor” as the structure performing the
`
`“receiving a Downloadable” function, and that the Federal Circuit’s decision in In re Katz
`5
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 5
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 6 of 31
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Interactive Call Processing Patent Litig., 639 F.3d 1303 (Fed. Cir. 2011), requires no more.
`
`The Court agrees that the specification of the ’844 Patent designates the “Downloadable
`
`file interceptor” as the structure that performs the “receiving a Downloadable” function.
`
`“Downloadable file interceptor” is mentioned in the specification several times. Figure 5 labels a
`
`“Downloadable file interceptor” in a flow chart. The specification states that Figure 5 represents
`“a generic protection engine [ ], which . . . includes a Downloadable file interceptor 505 for
`
`intercepting incoming Downloadables (i.e. Downloadable files) for inspection, and a file reader . .
`
`. .” ’844 Patent at 7:41-58 (emphasis added). The specification also uses the term “Downloadable
`
`file interceptor” in relation to Figure 7, described as “a flowchart illustrating a method 700 for
`
`examining a Downloadable (whether or not signed and inspected).” Id. at 9:19-22. The method
`700 “begins with the Downloadable file interceptor 505 in step 705 receiving a Downloadable
`
`file.” Id. at 9:22-23 (emphasis added). These passages clearly identify the “Downloadable file
`
`interceptor” as the corresponding structure.
`
`The key question is whether, under the Katz exception, the patentee was excused from
`
`disclosing an algorithm performing the “receiving” function. Katz states that “[a]bsent a possible
`
`narrower construction of the terms ‘processing,’ ‘receiving,’ and ‘storing,’ discussed below, those
`
`functions can be achieved by any general purpose computer without special programming. As
`
`such, it [is] not necessary to disclose more structure than the general purpose processor that
`
`performs those functions.” Katz, 639 F.3d at 1316. The Federal Circuit discussed the Katz
`
`exception at some length in EON Corp. IP Holdings LLC v. AT&T Mobility LLC, 785 F.3d 616
`
`(Fed. Cir. 2015). The EON decision characterized the Katz exception as “narrow,” and read the
`
`case to stand for the principle that “a microprocessor can serve as structure for a computer-
`
`implemented function only where the claimed function is ‘coextensive’ with a microprocessor
`
`itself.” Id. at 621-22. EON cited “‘receiving’ data, ‘storing’ data, and ‘processing’ data”—the
`
`functions at issue in Katz—as “[e]xamples of such coextensive functions.” Id. at 622. EON held
`
`that “[a] microprocessor or general purpose computer lends sufficient structure only to basic
`
`functions of a microprocessor,” and indicated that “[a]ll other computer-implemented functions
`
`require disclosure of an algorithm.” Id. at 623.
`6
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 6
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 7 of 31
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Symantec argues that the Katz exception does not apply because that decision only
`
`concerns functions that can be performed by a “general purpose computer without special
`
`programming.” Def. Resp. Br. at 9-10 (citing Katz, 639 F.3d at 1316). In support of its
`
`argument, Symantec offers the opinion of Dr. Richard Ford, who contends that receiving a
`
`downloadable at a network gateway is a “non-trivial” task that does require special programing.
`
`Receiving a Downloadable at a network gateway is a non-trivial
`task. I have experience developing software that performs this task.
`It requires that the Downloadable file interceptor parse the network
`protocol that is sending the downloadable. This activity needs to
`happen at multiple levels; for example, for the case of a file sent
`over HTTP, the Downloadable file interceptor would need to be able
`to track traffic in multiple different protocols, including HTTP,
`TCP, IP and ICMP. Furthermore, the system would need to act as a
`bridge, not only intercepting traffic, but also sending some traffic on
`to its destination. An additional complication is that network
`packets can be fragmented into smaller “chunks.” These chunks
`need to be re-assembled in order to recover the higher-level
`information. The Downloadable file interceptor must also be able to
`deal with packets that are dropped during transmission. All this
`requires programming to perform these specialized tasks.
`Dkt. No. 74-1 (“Ford Decl.”) at ¶ 43. Finjan argues that Dr. Ford’s opinion is “unsupported,” Dkt.
`
`No. 77 (“Pl. Reply Br.”) at 7, and directs the Court to the declaration of its own expert, Dr. Nenad
`
`Medvidovic. Dr. Medvidovic opines that “[a] person of ordinary skill in the art would be able to
`
`determine the proper function and structure of this element with a reasonable certainty when the
`
`claim is read in light of the specification and prosecution history.” Dkt. No. 72-1 (“Medvidovic
`
`Decl.”) at ¶ 18.
`
`The Court does not find Dr. Medvidovic’s declaration relevant to the key issue under Katz.
`
`See EON, 785 F.3d at 623 (“EON also argues that a microprocessor can serve as sufficient
`
`structure for a software function if a person of ordinary skill in the art could implement the
`
`software function. This argument is meritless. In fact, we have repeatedly and unequivocally
`
`rejected this argument: a person of ordinary skill in the art plays no role whatsoever in determining
`
`whether an algorithm must be disclosed as structure for a functional claim element.”). However,
`
`the Court agrees with those courts that have found that “means for receiving” functions are not
`
`indefinite when they fail to specify an algorithm. See Sophos, 2015 WL 890621, at *8-9 (holding
`
`that the ’844 patent need not specify an algorithm as the corresponding structure to the simple
`7
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 7
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 8 of 31
`
`
`
`“Receiving a Downloadable” function); Freeny v. Murphy USA Inc., No. 2:13–CV–791–RSP,
`
`2015 WL 294102, at *37 (E.D. Tex. Jan. 21, 2015) (“means for receiving” data does not require
`
`algorithm); e–LYNXX Corp. v. Innerworkings, Inc., No. 1:10–CV–2535, 2012 WL 4484921, at
`
`*19 (M.D. Pa. Sept. 27, 2012) (“means for receiving an electronic communication” does not
`
`require disclosed algorithm). But see Porto Tech. Co. v. Cellco P’ship, No. 3:13CV265–HEH,
`
`2013 WL 6571844, at *6-7 (E.D. Va. Dec. 13, 2013) (“means for receiving” traffic map does not
`
`fall under Katz exception).
`
`The Court finds that the Federal Circuit’s reasoning in EON supports this conclusion.
`
`EON directly reaffirmed that “receiving data” is a function coextensive with the microprocessor so
`
`as not to require disclosure of an algorithm. 785 F.3d at 622. The Court does not find anything in
`
`Dr. Ford’s opinion to overcome this straightforward holding. While Dr. Ford asserts that a
`
`number of more complex operations ultimately need to occur at the network gateway, the Court
`
`agrees with Judge Orrick’s conclusion in Sophos that the context of the ’844 Patent establishes
`
`that “‘Receiving a Downloadable’ is a simple function that consists of accepting or intercepting
`
`downloaded content when it is initially downloaded and before more complex operations process
`
`the file,” so as to be performable by a general purpose microprocessor. 2015 WL 890621 at *9.
`
`D.
`
`“Means for Generating a First Downloadable Security Profile that Identifies
`Suspicious Code in the Received Downloadable” (’844)
`Finjan’s Construction
`Symantec’s Construction
`Function: generating a first Downloadable
`Function: generating a first Downloadable
`security profile that identifies suspicious
`security profile that identifies suspicious code in
`code in the received Downloadable
`the received Downloadable
`
`
`Structure: content inspection engine
`Structure: a processor programmed to perform
`programmed to perform the algorithm
`the algorithm disclosed at col. 5, lines 42-45 and
`disclosed at Col. 8, lines 51-60 of the ’844
`col. 9, lines 20-42 of U.S. Patent No. 6,092,194
`Patent, which involves performing the steps
`of examining the operations of the received
`Downloadable, comparing the operations of
`the received Downloadable to a list of
`suspicious operations or rules, and creating a
`data structure based on matches to suspicious
`operations or rules violations
`
`The Court adopts the undisputed construction of the term’s function and adopts in
`8
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 8
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 9 of 31
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`part Finjan’s construction of the term’s structure. Specifically, the Court construes the term’s
`
`structure as “content inspection engine programmed to perform the algorithm disclosed at Col. 8,
`
`lines 51-60 of the ’844 Patent.”
`
`The parties do not dispute that the function of this claim is “generating a first
`
`Downloadable security profile that identifies suspicious code in the received Downloadable.”
`
`Compare Pl. Br. at 13-14 with Def. Resp. Br. at 11. And, based on the parties’ supplemental
`
`briefs, there is no longer a dispute that the structure must consist of an algorithm, as required by
`
`the Federal Circuit’s holding that “[a] computer-implemented means-plus-function term is limited
`
`to the corresponding structure disclosed in the specification and equivalents thereof, and the
`
`corresponding structure is the algorithm.” Harris Corp. v. Ericsson Inc., 417 F.3d 1241, 1253-54
`
`(Fed. Cir. 2005) (finding that district court erred in construing structure as a “symbol processor,”
`
`because that construction did not incorporate any disclosed algorithm); see also WMS Gaming,
`
`Inc. v. Int’l Game Tech., 184 F.3d 1339, 1348 (Fed. Cir. 1999) (finding that district court erred by
`failing to limit the claim to the algorithm disclosed in the specification).2 However, the parties
`now offer competing identifications of the algorithm comprising the structure.
`
`The Federal Circuit has explained that “[t]he usage ‘algorithm’ in computer systems has
`
`broad meaning, for it encompasses ‘in essence a series of instructions for the computer to follow,
`
`whether in mathematical formula, or a word description of the procedure to be implemented by a
`
`suitably programmed computer.” Typhoon Touch Techs., Inc. v. Dell, Inc., 659 F.3d 1376, 1384
`
`(Fed. Cir. 2011) (citation omitted). “The specification can express the algorithm ‘in any
`
`understandable terms including as a mathematical formula, in prose, or as a flow chart, or in any
`
`other manner that provides sufficient structure.’” Noah Sys., Inc., 675 F.3d at 1312 (quoting
`
`
`2 Plaintiff initially proposed to define the structure as “content inspection engine.” See Pl. Br. at
`13-14. The Court ordered supplemental briefing after lifting the stay, pointing out that Plaintiff’s
`construction appeared inconsistent with the requirements of Harris Corp. and WMS Gaming. Dkt.
`No. 164. Plaintiff then abandoned its proposed construction and offered a new one. Dkt. No. 166
`(“Pl. Add’l Supp. Br.”). At oral argument on the supplemental claim construction briefs,
`Plaintiff’s counsel could offer no explanation as to why its initial construction failed to meet the
`requirements of binding Federal Circuit authority that is over ten years old. The Court does not
`appreciate having its time wasted in this manner, and finds it unacceptable that Plaintiffs complied
`with plainly applicable authority only after being prompted long after the parties submitted their
`proposed constructions.
`
`9
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 9
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 10 of 31
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Finisar, 523 F.3d at 1340). The specification itself must adequately disclose the algorithm, and
`
`“the testimony of one of ordinary skill in the art cannot supplant the total absence of structure
`
`from the specification.” Id. (internal quotation marks omitted).
`
`The Court finds that Finjan’s identification of the algorithm is correct, but declines to
`
`include its paraphrasing in the claim construction. The “content inspection engine” is mentioned
`
`many times in the patent specification. The overall function and structure of the content
`
`inspection engine is described in the summary of the invention as follows:
`
`The inspector includes a content inspection engine that uses a set of
`rules to generate a Downloadable security profile corresponding to
`a Downloadable. The content inspection engine links the
`Downloadable security profile to the Downloadable. The set of
`rules may include a list of suspicious operations, or a list of
`suspicious code patterns. The first content inspection engine may
`link to the Downloadable a certificate that identifies the content
`inspection engine which created the Downloadable security profile.
`The system may include additional content inspection engines for
`generating and linking additional Downloadable security profiles to
`the Downloadable.
`’844 Patent at 2:3-14 (emphasis added). This language demonstrates that the content inspection
`
`engine performs the function of “generating a first Downloadable security profile for the received
`
`Downloadable.” See id. at 2:51-52; see also id. at 2:3-5 (“[A] content inspection engine . . . uses a
`
`set of rules to generate a Downloadable security profile . . . .”). Similarly, it is clear that “[t]he
`
`content inspection engine links the Downloadable security profile to the Downloadable.” Id. at
`
`2:5-7.
`
`Both parties contend that the ’194 patent is incorporated by reference in the ’844 patent,
`
`compare Pl. Add’l Supp. Br. at 3-4 with Dkt. No. 165 (“Def. Add’l Supp. Br.”) at 4-5, and both
`
`sides refer to column 9, lines 24-28 and 34-42 of the ’194 patent in their additional supplemental
`
`briefs as relevant to identifying the means for the “generating” function, compare Pl. Add’l Supp.
`
`Br. at 5 with Def. Add’l Supp. Br. at 5. But the ’844 patent nowhere specifically identifies a
`
`particular section of the ’194 patent as setting out the algorithm for that function. See ’844 Patent
`
`at 4:59-64 (asserting that “[g]enerating a DSP and generating a Downloadable ID are described in
`
`great detail with reference to the patent application [that led to issuance of the ’194 Patent], which
`
`has been incorporated by reference above,” but failing to cite any particular section of the
`10
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 10
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 11 of 31
`
`
`
`application containing this “great detail”); compare Advanced Display Sys., Inc. v. Kent State
`
`Univ., 212 F.3d 1272, 1282 (Fed. Cir. 2000) (“To incorporate material by reference, the host
`
`document must identify with detailed particularity what specific material it incorporates and
`
`clearly indicate where that material is found in the various documents.”). The parties’ dispute thus
`
`appears to come down to whether the identified sections of the ’194 patent are themselves the
`
`algorithm, or whether instead the narrative summary of steps described in the ’844 patent is
`
`sufficient on its own to supply the required algorithm.
`
`Confronted with a hodgepodge of vague and cryptically-drafted cross-references, the Court
`
`takes the simplest tack and finds the algorithm to be the series of steps set out in the ’844 patent at
`
`8:51-60, which describe in narrative form how to “generat[e] a DSP.” Specifically, that portion of
`
`the ’844 patent states as follows:
`
`As stated above, generating a DSP includes examining the
`Downloadable 205 (and the Downloadable components) for all
`suspicious operations that will or may be performed by the
`Downloadable, all suspicious code patterns, all known viruses, etc.
`Generating a DSP may include comparing all operations that will or
`may be performed against a list of suspicious operations or against a
`list of rules, e.g., a rules base 165. Accordingly, if an operation in
`the Downloadable 205 matches one of the suspicious operations or
`violates one of the rules, then the operation is listed in the DSP 215.
`’844 patent at 8:51-60. This narrative algorithm is similar to ones that have been found by the
`
`Federal Circuit to disclose sufficient structure. See Typhoon Touch, 659 F.3d at 1385-86 (four-
`
`step algorithm for “computer-implemented cross-referencing” disclosed sufficient structure, where
`
`algorithm consisted of entry of a response, search for entered response in a library of responses,
`
`determination of whether a match existed, and execution of an action if match existed); Noah Sys.,
`
`675 F.3d at 1313 (algorithm for “means for providing access” was sufficiently disclosed where
`
`specification provided that authorized agents were provided with passcodes and could not enter,
`
`delete, review, adjust or process data inputs within master ledger unless passcode was verified).
`
`The Court declines to further paraphrase the algorithm as suggested by Finjan.
`
`//
`
`//
`
`//
`
`11
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`United States District Court
`
`Juniper Ex. 1028-p. 11
`Juniper v Finjan
`
`

`

`Case 4:14-cv-02998-HSG Document 170 Filed 02/10/17 Page 12 of 31
`
`
`
`E.
`
`
`“Means for Linking the First Downloadable Security Profile to the
`Downloadable Before a Web Server Makes the Downloadable Available to
`Web Clients” (’844)
`Finjan’s Construction
`Function: linking the first Downloadable
`security profile to the Downloadable before a
`web server makes the Downloadable
`available to web clients
`
`
`Structure: content inspection engine
`programmed to perform the algorithm
`disclosed at col. 6, lines 20-24 of the ’844
`Patent, which involves performing the step
`of associating the Downloadable with a
`Downloadable security profile
`The Court adopts the undisputed construction of the term’s function, but accepts
`
`Symantec’s Construction
`Function: linking the first Downloadable
`security profile to the Downloadable before a
`web server makes the Downloadable available
`to web clients
`
`Structure: a processor programmed to perform
`the algorithm of steps 630 and 645 disclosed at
`Fig. 6, col. 8 lines 65-67, col. 6, lines 13-24, and
`col. 5, lines 3-13
`
`neither party’s construction of the term’s structure. Instead, the Court adopts the following
`
`construction of the term’s structure: “conte

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket