throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`__________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________
`
`
`Juniper Networks, Inc.,
`Petitioner
`
`v.
`
`Finjan, Inc.,
`Patent Owner
`___________
`
`U.S. Patent No. 7,647,633
`
`Issued: January 12, 2010
`
`Named Inventors:
`Yigal Mordechai Edery, Nimrod Itzhak Vered, David R. Kroll,
`and Shlomo Touboul
`
`Title: Malicious Mobile Code Run-time Monitoring System and Methods
`___________
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 7,647,633
`
`
`
`
`Mail Stop: PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`

`

`
`
`TABLE OF CONTENTS
`
` Page(s)
`STATUTORY REQUIREMENTS ........................................................ 1
`
`I.
`
`A. Notice of Real Party-In-Interest (37 C.F.R. § 42.8(b)(1)) ........... 1
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`Notice of Related Matters (37 C.F.R. § 42.8(b)(2)) .................... 1
`
`Designation of Lead and Back-up Counsel (37 C.F.R.
`§ 42.8(b)(3)) ................................................................................. 2
`
`Service Information (37 C.F.R. § 42.8(b)(4)) .............................. 3
`
`Certification of Word Count ........................................................ 3
`
`Fees ............................................................................................... 3
`
`G. Grounds for Standing ................................................................... 3
`
`H.
`
`Identification of Challenge ........................................................... 4
`
`II.
`
`TECHNOLOGY BACKGROUND ON THE ‘633 PATENT ............... 5
`
`III. LEVEL OF ORDINARY SKILL IN THE ART .................................... 6
`
`IV. PRIORITY .............................................................................................. 7
`
`V.
`
`CLAIM CONSTRUCTION ................................................................... 8
`
`A.
`
`“Executable Code” (All Challenged Claims) .............................. 8
`
`B. Mobile Protection Code (All Challenged Claims) ....................... 9
`
`C.
`
`D.
`
`E.
`
`“Downloadable-information” (All Challenged Claims) ............ 10
`
`“Determining…” (Claims 1 and 8) ............................................ 11
`
`“A Computer Program Product … The Method
`Comprising” (Claims 14 and 19) ............................................... 11
`
`F.
`
`“Information Re-communicator” (Claims 14 and 19) ............... 12
`
`
`
`i
`
`

`

`
`
`“Information Monitor” (Claim 8) .............................................. 13
`
`G.
`
`VI. OVERVIEW OF THE PRIOR ART .................................................... 13
`
`A.
`
`B.
`
`C.
`
`D.
`
`Jensen ......................................................................................... 13
`
`Sonnenberg ................................................................................. 14
`
`Hanson ........................................................................................ 15
`
`Lemay ......................................................................................... 16
`
`VII. GROUND 1: CLAIMS 1, 8, 14, AND 19 ARE OBVIOUS
`OVER SONENBERG IN VIEW OF JENSEN .................................... 17
`
`A. Overview of the Combination .................................................... 17
`
`B.
`
`i.
`
`ii.
`
`iii.
`
`iv.
`
`Claim 1 ....................................................................................... 18
`
`Preamble: “A computer processor-based method,
`comprising:” ............................................................................... 18
`
`Element 1(a): receiving, by a computer, downloadable-
`information; ................................................................................ 19
`
`Element 1(b): determining, by the computer, whether the
`downloadable-information includes executable code; and ........ 20
`
`Element 1(c): based upon the determination, transmitting
`from the computer mobile protection code to at least one
`information-destination of the downloadable-
`information, if the downloadable-information is
`determined to include executable code. ..................................... 25
`
`a. Mobile Protection Code ............................................................. 25
`
`b.
`
`c.
`
`d.
`
`transmitting from the computer … to at least one
`information-destination of the downloadable-information ........ 28
`
`If the downloadable-information is determined to include
`executable code .......................................................................... 29
`
`Based upon the Determination ................................................... 30
`
`
`
`ii
`
`

`

`C.
`
`i.
`
`ii.
`
`iii.
`
`iv.
`
`D.
`
`i.
`
`ii.
`
`iii.
`
`iv.
`
`
`
`Claim 8 ....................................................................................... 32
`
`Preamble: A computer processor-based system for
`computer security, the system comprising ................................. 32
`
`8(a): an information monitor for receiving downloadable-
`information by a computer; ........................................................ 32
`
`8(b): a content inspection engine communicatively
`coupled to the information monitor for determining, by
`the computer, whether the downloadable-information
`includes executable code; and .................................................... 33
`
`8(c): a protection agent engine communicatively coupled
`to the content inspection engine for causing mobile
`protection code (“MPC”) to be communicated by the
`computer to at least one information-destination of the
`downloadable-information, if the downloadable-
`information is determined to include executable code. ............. 34
`
`Claim 14 ..................................................................................... 35
`
`Preamble: A computer program product, comprising a
`computer usable medium having a computer readable
`program code therein, the computer readable program
`code adapted to be executed for computer security, the
`method comprising: .................................................................... 35
`
`14(a): providing a system, wherein the system comprises
`distinct software modules, and wherein the distinct
`software modules comprise an information re-
`communicator and a mobile code executor; .............................. 35
`
`14(b): receiving, at the information re-communicator,
`downloadable-information including executable code;
`and .............................................................................................. 37
`
`14(c): causing mobile protection code to be executed by
`the mobile code executor at a downloadable-information
`destination such that one or more operations of the
`executable code at the destination, if attempted, will be
`processed by the mobile protection code. .................................. 37
`
`
`
`iii
`
`

`

`
`
`Claim 19 ..................................................................................... 37
`
`Reasons to Combine ................................................................... 38
`
`The Combination Yields Predictable Results ............................ 43
`
`E.
`
`F.
`
`G.
`
`VIII. GROUND 2: CLAIMS 1 AND 8 ARE OBVIOUS OVER
`HANSON IN VIEW OF LEMAY ....................................................... 45
`
`A. Overview of the Combination .................................................... 45
`
`B.
`
`i.
`
`ii.
`
`iii.
`
`iv.
`
`C.
`
`i.
`
`ii.
`
`iii.
`
`iv.
`
`D.
`
`Claim 1 ....................................................................................... 46
`
`Preamble ..................................................................................... 46
`
`Element 1(a) ............................................................................... 47
`
`Element 1(b) ............................................................................... 49
`
`Element 1(c) ............................................................................... 52
`
`Claim 8 ....................................................................................... 55
`
`Preamble ..................................................................................... 55
`
`Element 8(a) ............................................................................... 55
`
`Element 8(b) ............................................................................... 56
`
`Element 8(c) ............................................................................... 56
`
`Reasons to Combine ................................................................... 56
`
`IX. GROUND 3: CLAIMS 1, 8, 14, AND 19 ARE OBVIOUS
`OVER HANSON .................................................................................. 60
`
`A.
`
`B.
`
`i.
`
`ii.
`
`Claims 1 and 8 ............................................................................ 60
`
`Claim 14 ..................................................................................... 61
`
`Preamble ..................................................................................... 61
`
`Element 14(a) ............................................................................. 61
`
`
`
`iv
`
`

`

`
`
`Element 14(b) ............................................................................. 63
`
`Element 14(c) ............................................................................. 63
`
`Claim 19 ..................................................................................... 63
`
`iii.
`
`iv.
`
`C.
`
`X.
`
`THERE ARE NO OBJECTIVE INDICIA OF NON-
`OBVIOUSNESS ................................................................................... 63
`
`XI.
`
`§ 325(d) DOES NOT APPLY .............................................................. 66
`
`A.
`
`B.
`
`C.
`
`This petition includes new prior art and arguments. .................. 68
`
`This petition does not involve substantially the same
`prior art or arguments. ................................................................ 69
`
`Juniper is a new petitioner relying largely on non-
`cumulative art. ............................................................................ 72
`
`XII. § 314(a) DOES NOT APPLY .............................................................. 73
`
`
`
`
`
`v
`
`

`

`
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`Alcatel-Lucent USA Inc. v. Oyster Optics, LLC,
`IPR2017-02146, Paper 12 (P.T.A.B. Feb. 28, 2018) ........................................................73
`
`Becton, Dickinson & Co. v. B. Braun Melsungen AG,
`IPR2017-01587, Paper 8 (P.T.A.B. Dec. 15, 2017) ...................................................66, 72
`
`Gen. Plastic Indus. Co. v. Canon Kabushiki Kaisha,
`IPR2016-01357 et al., Paper 19 (P.T.A.B. Sept. 6, 2017) ................................................73
`
`Unified Patent Inc. v. John L. Berman,
`IPR2016-01571, Paper 10 (P.T.A.B. Dec. 14, 2016) .......................................................72
`
`Statutes
`
`35 U.S.C. § 102 .............................................................................................................4, 33, 41
`
`35 U.S.C. § 314(a) ..................................................................................................................73
`
`35 U.S.C. § 325(d) ............................................................................................................66, 72
`
`Rules
`
`37 C.F.R. § 42.8 ....................................................................................................................2, 3
`
`
`
`vi
`
`

`

`
`
`EXHIBIT LIST
`
`Exhibit Description
`1001
`U.S. Patent No. 7,647,633 (‘633 Patent)
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`
`
`File History for the ‘633 Patent
`
`Curriculum Vitae of Dr. Seth Nielson
`
`Expert Declaration of Dr. Seth Nielson (“Nielson Dec.”)
`
`U.S. Patent No. 7,076,650 (“Sonnenberg”)
`
`Christian Jensen & Daniel Hagimot, “Protection Wrappers: A Simple
`and Portable Sandbox for Un-trusted Applications,” Proceedings on the
`8th ACM SIGOPS European Workshop on Support for Composing
`Distributed Applications (“Jensen”)
`
`Authenticating Declaration for Jensen (Ex. 1006)
`
`International Application No. PCT/US/01117 (“Hanson”)
`
`Laura Lemay et al., Teach Yourself Java in 21 Days, Sams.net
`Publishing (1996) (“Lemay”)
`
`Select Exerts from Ex Parte Reexamination No. 90/013,016
`
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Dkt. No. 176,
`Finjan, Inc. v. Juniper Networks, Inc., Case No. 3:17-cv-05659-WHA
`(N.D. Cal. Aug. 6, 2018)
`
`Plaintiff Finjan, Inc.’s Reply Claim Construction Brief, Dkt. No. 187,
`Finjan, Inc. v. Juniper Networks, Inc., Case No. 3:17-cv-05659-WHA
`(N.D. Cal. Aug. 27, 2018)
`
`Declaration of Nenad Medvidovic in Support of Finjan’s Opening Claim
`Construction Brief, Dkt. No. 142-1, Finjan, Inc. v. Proofpoint, Inc.,
`Case No. 4:13-cv-05808-HSG (N.D. Cal. May 1, 2015)
`
`Declaration of Nenad Medvidovic in Support of Finjan’s Opening Claim
`Construction Brief, Dkt. No. 65-1, No. 5:13-cv-03999-BLF (N.D. Cal.
`June 16, 2014)
`
`vii
`
`

`

`
`
`
`Exhibit Description
`1015
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Dkt. No. 142,
`Finjan, Inc. v. Proofpoint, Inc., Case No. 4:13-cv-05808-HSG (N.D.
`Cal. May 1, 2015)
`
`1016
`
`1017
`
`1018
`
`1019
`
`Plaintiff Finjan, Inc.’s Reply Claim Construction Brief, Dkt. No. 145,
`Finjan, Inc. v. Proofpoint, Inc., Case No. 4:13-cv-05808-HSG (N.D.
`Cal. May 22, 2015)
`
`Plaintiff Finjan, Inc.’s Reply Claim Construction Brief, Dkt. No. 67,
`Finjan, Inc. v Blue Coat Systems, Inc., Case No. 5:13-cv-03999-BLF
`(N.D. Cal. July 7, 2014)
`
`U.S. Patent No. 5,983,348 (“Ji”)
`
`U.S. Patent No. 5,732,275
`
`1020 Martin Salois & Robert Charpentier, “Dynamic Detection of Malicious
`Code in COTS Software,” Defence Research Establishment Valcartier
`(April 2000)
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`Dmitry Gryaznov, “Scanners of The Year 2000: Heuristics,” Virus
`Bulletin Conference, pp.225-234 (Sept. 1995), including authenticating
`declaration of Martijn Grooten
`
`U.S. Patent No. 5,974,549 (“Golan”)
`
`U.S. Patent No. 6,119,165
`
`Plaintiff Finjan, Inc.’s Initial Disclosure of Asserted Claims And
`Infringement Contentions And Document Production Pursuant to Patent
`Local Rules 3-1 And 3-2, Finjan, Inc. v. Juniper Networks, Inc., Case
`No. 3:17-cv-05659-WHA (N.D. Cal. Mar. 3, 2018)
`
`Declaration of Dr. Michael Mitzenmacher in Support of Plaintiff Finjan,
`Inc.’s Opposition to Defendant Juniper Networks, Inc.’s Motion for
`Summary Judgment, Dkt. No. 129-1, Finjan, Inc. v. Juniper Networks,
`Inc., Case No. 3:17-cv-05659-WHA (N.D. Cal. June 28, 2018)
`
`1026
`
`Order On Discovery Dispute, Dkt. No. 207, Finjan, Inc. v. Juniper
`Networks, Inc., Case No. 3:17-cv-05659-WHA (N.D. Cal. Oct. 9, 2018)
`
`
`
`viii
`
`

`

`
`
`
`Exhibit Description
`1027
`Jeffrey O. Kephart et al., “An immune System for Cyberspace,” IEEE
`International Conference on Systems, Man, and Cybernetics (Oct. 12-
`15, 1997)
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`Finjan Press Release, available at:
`https://www.finjan.com/news-media/press-releases/detail/652/finjan-
`announces-license-and-settlement-agreement-with
`
`Select Exerts from Ex Parte Reexamination No. 90/013,652
`
`Alan Freedman, The Computer Desktop Encyclopedia, 2nd ed. (1999)
`
`Bryan Pfaffenberger, Webster’s New World Dictionary of Computer
`Terms, 8th ed. (2000)
`
`RFC #822, Standard for the Format of ARPA Internet Text Messages,
`IEEE (1982), available at: https://www.ietf.org/rfc/rfc822.txt
`
`U.S. Patent No. 6,065,118
`
`Tony Bartoletti et al., Secure Software Distribution System, Lawrence
`Livermore National Laboratory (1997), available at:
`https://csrc.nist.gov/csrc/media/publications/conference-
`paper/1997/10/10/proceedings-of-the-20th-nissc-
`1997/documents/191.pdf
`
`Verdict Form, Dkt. No. 438, Finjan, Inc. v. Blue Coat Systems, Inc.,
`Case No. 5:13-cv-03999-BLF (N.D. Cal. Aug. 4, 2015)
`
`Stefan Norberg, Building a Windows NT Bastion Host in Practice,
`Hewlett Packard (1999)
`
`1037 Marco Pistoia et al., Java 2 Network Security, IBM International
`Technical Support Organization (1999)
`
`
`
`
`
`ix
`
`

`

`
`
`
`
`I.
`
`STATUTORY REQUIREMENTS
`A. Notice of Real Party-In-Interest (37 C.F.R. § 42.8(b)(1))
`
`Petitioner Juniper Networks, Inc. (“Juniper”) is a public company with no
`
`parent corporation and is the sole real party-in-interest.
`
`B. Notice of Related Matters (37 C.F.R. § 42.8(b)(2))
`
`The ‘633 Patent was previously the subject of IPR2016-01974, which was
`
`joined by IPR2016-00480 and IPR2016-00966. The lead IPR was terminated after
`
`Final Written Decision without appeal. The ‘633 Patent is also currently the
`
`subject of pending IPR2018-00391.
`
`The ‘633 Patent was also previously the subject of ex parte reexaminations
`
`90/013,016 and 90/013,652, both of which are now complete.
`
`Petitioner and Patent Owner are currently involved in pending litigation that
`
`includes the assertion of the ‘633 Patent challenged herein. See Finjan, Inc. v.
`
`Juniper Networks, Inc., Case No. 3:17-cv-05659-WHA (N.D. Cal.). The ‘633
`
`Patent is currently asserted in the following other ongoing litigations:
`
`• Finjan, Inc. v. Palo Alto Networks, Inc., No. 4:14-cv-04908-PJH (N.D. Cal.)
`
`• Finjan, Inc. v. Cisco Systems, Inc., No. 5:17-cv-00072-BLD (N.D. Cal.)
`
`• Finjan, Inc. v. Sonicwall, Inc., No. 5:17-cv-04467-BLF (N.D. Cal.)
`
`
`
`1
`
`

`

`
`
`• Finjan, Inc. v. Check Point Software Technologies Inc., No. 5:18-cv-02621-
`
`WHO (N.D. Cal.)
`
`• Finjan, Inc. v. Zscaler, Inc., No. 3:17-cv-06946 (N.D. Cal.)
`
`The ‘633 Patent was previously asserted in the following completed litigations:
`
`• Finjan, Inc. v. Blue Coat Systems, Inc., No. 5:13-cv-03999-BLF (N.D. Cal.)
`
`• Finjan, Inc. v. FireEye, Inc., No. 4:13-cv-03133-SBA (N.D. Cal.)
`
`• Finjan, Inc. v. Proofpoint, Inc., No. 4:13-cv-05805-HSG (N.D. Cal.)
`
`• Finjan, Inc. v. Websense, Inc., No. 5:13-cv-04398-BLF (N.D. Cal.)
`
`consolidated with 5:14-cv-01353-BLF (N.D. Cal.)
`
`The ‘633 Patent purports to be a continuation or continuation-in-part of a
`
`number of other patents (see ‘633 Patent at 1:7-25), many of which have been
`
`subject to litigation or other post-grant proceedings. This statement is provided in
`
`the interest of full disclosure, although Juniper does not believe that any such other
`
`litigation or post-grant proceedings would affect or be affected by a decision in this
`
`proceeding.
`
`To the best of Petitioner’s knowledge, there are no other judicial or
`
`administrative matters that would affect or be affected by a decision in this
`
`proceeding.
`
`C. Designation of Lead and Back-up Counsel (37 C.F.R. § 42.8(b)(3))
`
`Lead Counsel: Michael Fleming, Reg. No. 67,933
`
`
`
`2
`
`

`

`
`
`Backup Counsel: Joshua Glucoft, Reg. No. 67,696
`
`Backup Counsel: Rebecca Carson (Pro Hac Vice motion forthcoming)
`
`Contact information for Lead and Backup Counsel is as follows:
`
`Irell & Manella LLP
`1800 Avenue of the Stars, Suite 900
`Los Angeles, CA 90067
`Telephone: (310) 277-1010
`Fax: (310) 203-7199
`
`D.
`
`Service Information (37 C.F.R. § 42.8(b)(4))
`
`Please address all correspondence to lead counsel at the address above.
`
`Petitioner consents to email service at: Juniper-FinjanIPRs@irell.com.
`
`E. Certification of Word Count
`
`Petitioner certifies that the word count in this petition is 13,931 words, as
`
`counted by the word-processing program used to generate this petition, where such
`
`word count excludes the title page, table of contents, table of authorities, exhibit
`
`list, mandatory notices under § 42.8, certificate of service, and this word count.
`
`F.
`
`Fees
`
`The Office is authorized to charge Deposit Account No. 09-0946 for any
`
`fees required.
`
`G. Grounds for Standing
`
`Petitioner certifies that the ‘633 Patent is eligible for IPR and that Petitioner
`
`is not barred or estopped from requesting an IPR of the ‘633 Patent.
`
`
`
`3
`
`

`

`
`
`H.
`Identification of Challenge
`• Ground 1: Claims 1, 8, 14, and 19 are obvious over U.S. Patent No.
`
`7,076,650 (“Sonnenberg”) in view of Christian Jensen & Daniel
`
`Hagimot, “Protection Wrappers: A Simple and Portable Sandbox for
`
`Un-trusted Applications,” Proceedings on the 8th ACM SIGOPS
`
`European Workshop on Support for Composing Distributed
`
`Applications (“Jensen”). Sonnenberg and Jensen are prior art at least
`
`under pre-AIA § 102(e) and (b), respectively.
`
`• Ground 2: Claims 1 and 8 are obvious over International Application
`
`No. PCT/US/01117 (“Hanson”) in view of “Teach Yourself Java in 21
`
`Days,” by Laura Lemay et al. (“Lemay”). Hanson and Lemay are
`
`prior art at least under pre-AIA § 102(b).
`
`• Ground 3: Claims 1, 8, 14, and 19 are obvious over Hanson.
`
`
`
`4
`
`
`
`
`
`

`

`
`
`II. TECHNOLOGY BACKGROUND ON THE ‘633 PATENT
`The process of the ‘633 Patent begins when a node on the network, such as a
`
`proxy server, receives information on its way to its destination. “[R]eceived
`
`information [is] referred to as a ‘potential-Downloadable’, and received
`
`information found to include executable code [is] referred to as a ‘Downloadable’
`
`or equivalently as a ‘detected-Downloadable’….” Id. at 9:18-22. When the
`
`intermediate node receives downloadable-information, the node “analyzes the
`
`potential-Downloadable and determines whether the potential-Downloadable
`
`includes executable code. If not, [the proxy server] enables the not executable
`
`potential-Downloadable [] to be delivered to its destination in an unaffected
`
`manner. In conjunction with determining that the potential-Downloadable is a
`
`detected-Downloadable, [the proxy server] also causes mobile protection code or
`
`‘MPC’ [] to be communicated to the Downloadable-destination of the
`
`Downloadable, more suitably in conjunction with the detected-Downloadable….”
`
`Id. at 9:52-62.
`
`This process is illustrated in the following cropped portions of Figure 3,
`
`where a Protection Engine residing on a server determines whether the received
`
`information (indicated by the arrow inbound to the Server) includes executable
`
`code; if not, then the file is sent to its destination by itself, but if the file does
`
`
`
`5
`
`

`

`
`
`include executable code, then the file is sent to its destination along with Mobile
`
`Protection Code (“MPC”) as part of a “sandbox package” (Element 340):
`
`
`“The sandboxed package includes mobile protection code (‘MPC’) for causing one
`
`or more predetermined malicious operations or operation combinations of a
`
`Downloadable to be monitored or otherwise intercepted.” ‘633 Patent at 3:7-11. If
`
`the underlying file does not even have executable code in it, then there is no need
`
`to send a sandboxed package, which is why the intermediate node on the network
`
`would determine whether the underlying file has executable code.
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`A person of ordinary skill in the art of the ‘633 Patent would have a
`
`bachelor’s degree in computer science or related field and two years of industry
`
`experience or an advanced degree in computer science or related field. See Nielson
`
`
`
`6
`
`

`

`
`
`Dec. ¶ 24; see also IPR2015-01974, Ex. 2019 ¶ 25 and IPR2015-01974, Ex. 1002
`
`¶ 29 (experts opining regarding similar level of skill).
`
`IV. PRIORITY
`The priority date of the challenged claims is no earlier than May 17, 2000,
`
`the filing date of the provisional application to which the ‘633 Patent claims
`
`priority. As background, the ‘633 Patent is a continuation and continuation-in-part
`
`of a number of different patents. But during ex parte reexamination 90/013,016,
`
`the Examiner already found that “The disclosures of the 6,167,520 and 6,092,194
`
`patents [to which the ‘633 Patent claims priority] appear to be completely silent on
`
`teaching or suggesting the transmission of mobile protection code from a server
`
`computer to a client computer when it is determined that downloadable-
`
`information includes executable code.” Ex. 1010 at 6. As a result, the Examiner
`
`held that claim 1 of the ‘633 Patent had an effective filing date of May 17, 2000.
`
`Ex. 1010 at 7. Claim 8 has an effectively verbatim limitation, so it too has an
`
`effective filing date no earlier than May 17, 2000—as found by the Examiner in ex
`
`parte reexamination 90/013,652. Ex. 1029 at 10. Finjan has already had a full
`
`chance to be heard on this issue that was finally decided and is therefore estopped
`
`from arguing otherwise.
`
`Although Claim 14 and, by dependency, Claim 19 do not expressly include
`
`the “determining” limitation, they too are not entitled to priority earlier than May
`
`
`
`7
`
`

`

`
`
`17, 2000 because the ‘520 and ‘194 patents do not teach anything at all about
`
`Mobile Protection Code. Neither of those patents ever use that term, nor do they
`
`ever discuss or use the term “sandbox.” Nor do they ever teach how one would
`
`“cause mobile protection code to be executed … at a downloadable-information
`
`destination” as required by Claims 14 and 19. As such, a POSITA would not have
`
`recognized that the inventors possessed the invention of Claims 14 and 19 as of the
`
`filing of the ‘520 or ‘194 patents, and therefore those claims are not entitled to a
`
`priority date earlier than May 17, 2000. See Nielson Dec. ¶ 27.
`
`V. CLAIM CONSTRUCTION
`The ‘633 Patent has not yet expired, so broadest reasonable interpretation is
`
`the appropriate standard for claim construction in this proceeding.
`
`A.
`
`“Executable Code” (All Challenged Claims)
`
`The Board previously construed the term “executable code” in IPR2015-
`
`01974, Paper 49 at 10 as “includ[ing] programs or computer instructions that are
`
`executed by a computer.” The Board further “determine[d] that the ‘executable
`
`code’ at the destination is not modified.” Id. at 18. In IPR2018-00391, Paper 7 at
`
`9, the Board readopted this understanding that “the executable code whose
`
`operations are processed by the mobile protection code at the destination is the
`
`same as the executable code received, i.e., it undergoes no modification.” Juniper
`
`adopts the Board’s prior construction for this petition.
`
`
`
`8
`
`

`

`
`
`B. Mobile Protection Code (All Challenged Claims)
`
`The broadest reasonable interpretation of “Mobile Protection Code”
`
`(“MPC”) is “code for causing one or more predetermined malicious operations or
`
`operation combinations of a Downloadable to be monitored or otherwise
`
`intercepted.” This construction comes directly from what Finjan represented was
`
`the definition of the term as provided at 3:7-11 of the ‘633 Patent:
`
`The sandboxed package includes mobile protection code
`(“MPC”) for causing one or more predetermined
`malicious operations or operation combinations of a
`Downloadable to be monitored or otherwise intercepted.
`
`Ex. 1015 at 6 (“This straightforward definition from the intrinsic record should be
`
`used for construction….”)1; see also Ex. 1016 at 1-2 and Ex. 1017 at 1-2 (two
`
`additional instances where Finjan refers to the above as a “definition”).
`
`In application, this construction means that the MPC may work in
`
`conjunction with other software, including the operating system, in order to effect
`
`monitoring or intercepting. Finjan itself explained this application:
`
`Neither the claims nor the specification require that MPC
`“itself,” without interaction with other code, to monitor or
`intercept potentially malicious code. … The ‘633 Patent
`specifically describes how monitoring and intercepting is
`
`
`1 All emphasis is added unless noted otherwise.
`
`
`
`9
`
`

`

`
`
`performed by the MPC in conjunction with other
`resident programs (like the operating system). See, e.g.,
`‘633 Patent at Col. 18, ll. 1-24 (describing how the
`operating system initializes the MPC).
`Ex. 1012 at 2-3; see also id. at Ex. 1011 at 6 (substantially similar argument by
`
`Finjan).
`
`C.
`
`“Downloadable-information” (All Challenged Claims)
`
`The BRI of “downloadable-information” is “information transmitted over a
`
`network.” See Nielson ¶ 34. The ‘633 Patent describes downloadable-information
`
`very broadly to include effectively any type of information that can be transmitted
`
`over a network:
`
`including web pages, streaming media,
`resources
`transaction-facilitating information, program updates or
`other downloadable information…. Such information can
`also include more traditionally viewed “Downloadables”
`or “mobile code” (i.e. distributable components), as well
`as downloadable application programs or other further
`Downloadables, such as those that are discussed herein. (It
`will be appreciated that interconnected networks can also
`provide various other resources as well.)
`‘633 Patent at 6:2-11. This construction is also consistent with the plain and
`
`ordinary meaning of what it means to “download” information. See, e.g., Ex. 1030
`
`
`
`10
`
`

`

`
`
`at 5 (defining “download: To receive a file transmitted over a network”); see also
`
`Ex. 1031 at 5 (substantially similar definition).
`
`D.
`
`“Determining…” (Claims 1 and 8)
`
`In IPR2018-00391, Paper 7 at 9, the Board readopted a construction set forth
`
`by the Board in ex parte re-examination Control No. 90/013,016. Specifically, the
`
`Board readopted the construction of “distinguishing between two alternative
`
`possibilities: executable code is included in the downloadable-information, and
`
`executable code is not included in the downloadable-information.” Juniper adopts
`
`the Board’s prior construction for this petition.
`
`In the parallel District Court litigation, Finjan has proposed a broader
`
`construction of the term as “detecting content that is likely to be of an executable
`
`type that can carry executable content.” Ex. 1011 at 9-10. This petition also
`
`address this broader construction should the Board adopt Finjan’s construction as
`
`the broadest reasonable interpretation.
`
`E.
`
`“A Computer Program Product … The Method Comprising”
`(Claims 14 and 19)
`
`Finjan has admitted that the preamble of Claim 14 improperly recites both a
`
`“product” and a “method” but maintains the issue is simply a “typographical error”
`
`such that “Finjan asks that the claim be corrected so that the words ‘the method’
`
`are removed.” Ex. 1011 at 6-7. Juniper does not agree that the Board (or a District
`
`Court) has the authority to overlook this admitted error in the absence of a
`
`
`
`11
`
`

`

`
`
`certificate of correction because the correction is subject to reasonable dispute, and
`
`therefore the claim is indefinite at least under IPXL. However, for purposes of this
`
`petition only, Juniper adopts Finjan’s proposed correction of striking “the method”
`
`and converting the preamble into a Beauregard preamble. See Ex. 1011 at 7.
`
`F.
`
`“Information Re-communicator” (Claims 14 and 19)
`
`The BRI of an “information re-communicator” is its plain and ordinary
`
`meaning of “a component capable of receiving downloadable-information and re-
`
`communicating that information.” See Nielson ¶ 36. Claim 14 recites “receiving,
`
`at the information re-communicator, downloadable-information,” so the
`
`component must be capable of receiving downloadable-information. And as its
`
`name implies, it must be able to re-communicate that information to another node.
`
`This construction is reasonable per the plain language of the claims, as nothing
`
`requires that the claimed re-communicator be located at any specific point in a
`
`network nor that it receive/re-communicate information from/to any specific
`
`node(s) on a network(s). Indeed, nothing in the specification requires that the
`
`construction be limited any further, as the ‘633 Patent at 2:58-62 describes re-
`
`communicators broadly as simply a network-connectable device akin to a server:
`
`“one or more network servers, firewalls or other network connectable information
`
`re-communicating devices (as are referred to herein summarily one or more
`
`‘servers’ or ‘re-communicators’).”
`
`
`
`12
`
`

`

`
`
`“Information Monitor” (Claim 8)2
`
`G.
`
`The BRI of an “information monitor” is its plain and ordinary meaning of “a
`
`component capable of receiving and monitoring downloadable-information.” See
`
`Nielson ¶ 37. Claim 8 recites “an information monitor for receiving
`
`downloadable-information,” so the component must be capable of receiving
`
`downloadable-information. And as its name implies, it must be capable of
`
`monitoring that information. The ‘633 Patent at 2:58-66 teaches that the
`
`information monitor is included within a “protection engine” that is in turn
`
`operable within an information-re-communicator; therefore, since an information
`
`re-communicator could be located anywhere in a network and receive/re-
`
`communicate information from/to any node(s) on a network(s), the BRI of
`
`“information monitor” is similarly broad. Nothing in the claim language or the
`
`specification suggests that this construction is unreasonably broad.
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket