throbber
Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`
`Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`
`Juniper Exhibit 1095
`Juniper Networks, Inc. v. Packet Intelligence LLC
`Page 00001
`
`

`

`Case 3:19-cv-02471—WHO Document 18 Filed 07/02/19 Page 2 of 21
`
`
`
`PACKET INTELLIGENCE LLC,
`
`Counterclaimant
`
`v.
`
`PALO ALTO NETWORKS, INC.
`
`Counter-Defendant.
`
`PACKET INTELLIGENCE LLC (“Packet Intelligence” and “Counterclaimant” herein)
`
`makes the following answer to Plaintiff PALO ALTO NETWORKS, INC.’s (“Palo Alto
`
`Networks” and “Plaintiff” herein) Original Complaint for Declaratory Judgment of Non-
`
`Infringement. Packet Intelligence demands a jury trial on all issues triable as of right.
`
`NATURE OF THE ACTION
`
`1.
`
`Packet Intelligence admits that Palo Alto Networks has filed a declaratory judgment
`
`action of non-infringement but denies the remaining allegations in Paragraph 1.
`
`PARTIES
`
`2.
`
`Packet Intelligence admits the allegations in Paragraph 2, upon information and
`
`belief.
`
`3.
`
`Packet Intelligence admits the allegations in Paragraph 3.
`
`JURISDICTION AND VENUE
`
`4.
`
`5.
`
`Packet Intelligence admits the allegations in Paragraph 4.
`
`Packet Intelligence admits that it sent a notice letter to Palo Alto Networks on
`
`January 18, 2019 alleging infringement of the Patents-in—Suit. Counterclaimant denies the
`
`remaining allegations Paragraph 5.
`
`6.
`
`Packet Intelligence admits that it has sent notice letters to other companies with
`
`locations in this District but denies the remaining allegations of Paragraph 6.
`
`7.
`
`Packet Intelligence admits that it acquired the Patents-in—Suit from Exar
`
`Corporation of Fremont, California but denies the remaining allegations of Paragraph 7.
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`2597-000/1414720-1
`2
`Case No. 3 : l9-cv—02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00002
`
`Page 00002
`
`

`

`Case 3:19-cv-02471—WHO Document 18 Filed 07/02/19 Page 3 of 21
`
`8.
`
`Packet Intelligence admits that it entered into a settlement agreement related to the
`
`Patents-in—Suit with Cisco Systems, Inc. for which Packet Intelligence received monetary
`
`consideration but denies remaining allegations of Paragraph 8.
`
`9.
`
`Packet Intelligence admits that it has an agreement with Russell Dietz of San Jose,
`
`California and that it has directed communications to Mr. Dietz regarding the Patents-in—Suit.
`
`Packet Intelligence also admits that it has directed communications to Joseph Maixner regarding
`
`the Patents-in—Suit. Packet Intelligence denies the remaining allegations of Paragraph 9.
`
`10.
`
`Packet Intelligence denies the allegations in Paragraph 10.
`
`INTRADISTRICT ASSIGNMENT
`
`11.
`
`Packet Intelligence admits the allegations in Paragraph 11.
`
`FACTUAL ALLEGATIONS
`
`THE PATENTS-IN-SUIT
`
`12.
`
`13.
`
`14.
`
`15.
`
`16.
`
`17.
`
`18.
`
`Packet Intelligence admits the allegations in Paragraph 12.
`
`Packet Intelligence admits the allegations in Paragraph 13.
`
`Packet Intelligence admits the allegations in Paragraph 14.
`
`Packet Intelligence admits the allegations in Paragraph 15.
`
`Packet Intelligence admits the allegations in Paragraph 16.
`
`DISPUTE BETWEEN PALO ALTO NETWORKS AND
`
`PACKET INTELLIGENCE CONCERNING THE PATENTS-IN-SUIT
`
`Packet Intelligence admits the allegations in Paragraph 17.
`
`Packet Intelligence admits that Plaintiff’s counsel responded to Packet
`
`Intelligence’s letter. Except as so admitted, the allegations in Paragraph 18 are denied.
`
`19.
`
`Packet Intelligence admits that an actual and justiciable controversy exists between
`
`the parties and that Plaintiff purports to bring a declaratory judgment action of non-infringement
`
`against Packet Intelligence. However, Packet Intelligence denies that such declaratory judgment
`
`has any factual or legal basis and denies that Plaintiff is entitled to any relief.
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`2597-000/1414720-1
`3
`Case No. 3 : 19-cv—02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00003
`
`Page 00003
`
`

`

`Case 3:19-cv-02471—WHO Document 18 Filed 07/02/19 Page 4 of 21
`
`FIRST CLAIM FOR RELIEF
`
`DECLARATORY JUDGMENT OF NON-INFRINGEMENT OF THE ’099 PATENT
`
`20.
`
`Packet Intelligence admits that Plaintiff purports to bring a declaratory judgment
`
`action of non-infringement against Packet Intelligence. However, Packet Intelligence denies that
`
`such declaratory judgment has any factual or legal basis and denies that Plaintiff is entitled to any
`
`relief.
`
`21.
`
`22.
`
`Packet Intelligence denies the allegations in Paragraph 21.
`
`Packet Intelligence denies the allegations in Paragraph 22.
`
`SECOND CLAIM FOR RELIEF
`
`DECLARATORY JUDGMENT OF NON-INFRINGEMENT OF THE ’725 PATENT
`
`23.
`
`Packet Intelligence admits that Plaintiff purports to bring a declaratory judgment
`
`action of non-infringement against Packet Intelligence. However, Packet Intelligence denies that
`
`such declaratory judgment has any factual or legal basis and denies that Plaintiff is entitled to any
`
`relief.
`
`24.
`
`25.
`
`Packet Intelligence denies the allegations in Paragraph 24.
`
`Packet Intelligence denies the allegations in Paragraph 25.
`
`THIRD CLAIM FOR RELIEF
`
`DECLARATORY JUDGMENT OF NON-INFRINGEMENT OF THE ’751 PATENT
`
`26.
`
`Packet Intelligence admits that Plaintiff purports to bring a declaratory judgment
`
`action of non-infringement against Packet Intelligence. However, Packet Intelligence denies that
`
`such declaratory judgment has any factual or legal basis and denies that Plaintiff is entitled to any
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`relief.
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`27.
`
`28.
`
`Packet Intelligence denies the allegations in Paragraph 27.
`
`Packet Intelligence denies the allegations in Paragraph 28.
`
`FOURTH CLAIM FOR RELIEF
`
`DECLARATORY JUDGMENT OF NON-INFRINGEMENT OF THE ’789 PATENT
`
`29.
`
`Packet Intelligence admits that Plaintiff purports to bring a declaratory judgment
`
`action of non-infringement against Packet Intelligence. However, Packet Intelligence denies that
`
`
`2697.000/1414720.1
`4
`Case No. 3 : 19-cv—02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00004
`
`Page 00004
`
`

`

`Case 3:19-cv-02471—WHO Document 18 Filed 07/02/19 Page 5 of 21
`
`such declaratory judgment has any factual or legal basis and denies that Plaintiff is entitled to any
`
`relief.
`
`30.
`
`31.
`
`Packet Intelligence denies the allegations in Paragraph 30.
`
`Packet Intelligence denies the allegations in Paragraph 31.
`
`FIFTH CLAIM FOR RELIEF
`
`DECLARATORY JUDGMENT OF NON-INFRINGEMENT OF THE ’646 PATENT
`
`32.
`
`Packet Intelligence admits that Plaintiff purports to bring a declaratory judgment
`
`action of non-infringement against Packet Intelligence. However, Packet Intelligence denies that
`
`such declaratory judgment has any factual or legal basis and denies that Plaintiff is entitled to any
`
`relief.
`
`33.
`
`34.
`
`Packet Intelligence denies the allegations in Paragraph 33.
`
`Packet Intelligence denies the allegations in Paragraph 34.
`
`PRAYER FOR RELIEF
`
`Packet Intelligence denies all allegations of Paragraphs A through D of Plaintiff’s Prayer for
`
`Relief and further denies that any relief should be granted to Plaintiff.
`
`AFFIRMATIVE DEFENSE OF INFRINGEMENT
`
`Packet Intelligence contends that Palo Alto Networks infringes claims of each of the
`
`Patents-in—Suit directly, as well as by inducing infringement and by contributing to infringement.
`
`Packet Intelligence reserves the right to amend its Answer to assert additional affirmative defenses
`
`as the case progresses.
`
`COUNTERCLAIMS
`
`Plaintiff Packet Intelligence LLC, by and through its undersigned attorneys hereby
`
`demands a jury trial and alleges the following in support of its Counterclaims for patent
`
`infringement against Palo Alto Networks:
`
`1.
`
`THE PARTIES
`
`1.
`
`Packet Intelligence LLC is a limited liability company existing under the laws of
`
`Texas since June 2012. Plaintiff maintains its principal place of business at 505 East Travis
`
`Street
`
`Suite 209, Marshall, TX 75670.
`
`
`2697.000/1414720.1
`5
`Case No. 3 : 19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`1 2
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Page 00005
`
`Page 00005
`
`

`

`Case 3:19-cv-02471—WHO Document 18 Filed 07/02/19 Page 6 of 21
`
`2.
`
`Upon information and belief, Palo Alto Networks is a Delaware Corporation, with
`
`a principal place of business at 3000 Tannery Way, Santa Clara, California 95054.
`
`11.
`
`JURISDICTION AND VENUE
`
`3.
`
`This is an action for infringement of several United States patents. Federal
`
`question jurisdiction is conferred to this Court over such action under 28 U.S.C. §§ 1331 and
`
`l 3 3 8(a).
`
`4.
`
`Palo Alto Networks maintains a regular and established place of business within
`
`the Northern District of California at 3000 Tannery Way, Santa Clara, California 95054. Palo
`
`Alto Networks develops and/or sells the Accused Products, identified below, from this location.
`
`5.
`
`For these reasons, personal jurisdiction exists and Packet Intelligence contends that
`
`venue is proper in this Court under 28 U.S.C. §§ 1391(b) and (c).
`
`III.
`
`THE PATENTS-IN—SUIT
`
`6.
`
`The patents-in—suit are early pioneer patents in the field of network traffic
`
`processing and monitoring. Each of the asserted patents claim priority to provisional US. Patent
`
`Application No. 60/141,903 entitled “Method and Apparatus for Monitoring Traffic in a
`
`Network,” filed in the United States Patent and Trademark Office on June 30,1999.
`
`7.
`
`Mr. Russell S. Dietz, the first listed inventor on four of the five patents-in—suit, is a
`
`recognized thought leader who publishes and lectures regularly on network data management,
`
`cloud computing and virtualization security solutions. Mr. Dietz has more than 30 years of
`
`experience in the technology and security space and has a proven record of success as Chief
`
`Technology Officer of multiple hardware, software and systems security companies, and is a
`
`recognized pioneer and innovator in cloud computing and virtualization security solutions. He has
`
`more than 20 years of leadership and expertise anticipating trends, and evaluating new
`
`technologies in data communications, data management and Enterprise security. Mr. Dietz is an
`
`active member of the Internet and Engineering Task Force (IETF), Optical Internetworking Forum
`
`(01F) and the Cloud Computing Interoperability Forum (CCIF).
`
`8.
`
`On November 18, 2003, the United States Patent and Trademark Office (USPTO)
`
`duly and legally issued US. Patent No. 6,651,099 (“the ’099 Patent”) entitled “Method and
`
`
`2597-000/1414720-1
`6
`Case No. 3 : 19-cv—02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Page 00006
`
`Page 00006
`
`

`

`Case 3:19-cv-02471—WHO Document 18 Filed 07/02/19 Page 7 of 21
`
`Apparatus for Monitoring Traffic in a Network.” Packet Intelligence owns all substantial rights to
`
`the ’099 Patent, including the right to sue and recover damages for all infringement thereof.
`
`Documents assigning the ’099 Patent to Packet Intelligence were recorded at the USPTO on
`
`February 1, 2013 at Reel/Frame 29737-613. Attached hereto as Exhibit A is a true and correct
`
`copy of the ’099 Patent.
`
`9.
`
`The ’099 patent has been cited as pertinent prior art by either an applicant, or a
`
`USPTO examiner, during the prosecution of more than 275 issued patents and published patent
`
`applications.
`
`10.
`
`On December 16, 2003, the USPTO duly and legally issued US. Patent No.
`
`6,665,725 (“the ’725 Patent”) entitled “Processing Protocol Specific Information in Packets
`
`Specified by a Protocol Description Language.” Packet Intelligence owns all substantial rights to
`
`the ’725 Patent, including the right to sue and recover damages for all infringement thereof.
`
`Documents assigning the ’725 Patent to Packet Intelligence were recorded at the USPTO on
`
`February 1, 2013 at Reel/Frame 29737-613. A true and correct copy of the ’725 Patth is attached
`
`hereto as Exhibit B.
`
`11.
`
`The ’725 patent has been cited as pertinent prior art by either an applicant, or a
`
`USPTO examiner, during the prosecution of more than 260 issued patents and published patent
`
`applications.
`
`12.
`
`On August 3, 2004, the USPTO duly and legally issued US. Patent No. 6,771,646
`
`(“the ’646 Patent”) entitled “Associative Cache Structure for Lookups and Updates of Flow
`
`Records in a Network Monitor.” Packet Intelligence owns all substantial rights to the ’646 Patent,
`
`including the right to sue and recover damages for all infringement thereof. Documents assigning
`
`the ’646 Patent to Packet Intelligence were recorded at the USPTO on February 1, 2013 at
`
`Reel/Frame 29737-613. A true and correct copy of the ’646 Patent is attached hereto as Exhibit C.
`
`13.
`
`The ’646 patent has been cited as pertinent prior art by either an applicant, or a
`
`USPTO examiner, during the prosecution of more than 170 issued patents and published patent
`
`applications.
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`2597-000/1414720-1
`7
`Case No. 3 : 19-cv—02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00007
`
`Page 00007
`
`

`

`Packet Intelligence LLC v. Huawei Devices USA Inc.
`
`Page 00008
`
`

`

`Packet Intelligence LLC v. Cisco Systems, Inc.
`
`Packet Intelligence LLC v. Cisco Systems, Inc.
`
`Packet Intelligence LLC v. NetScout Systems, Inc. et al
`
`Packet Intelligence LLC v. Sandvine Corporation and Sandvine Incorporated ULC
`
`inter partes
`
`in Limine
`
`Packet Intelligence LLC v. Nokia of America Corporation,
`
`Packet Intelligence LLC v. Ericsson Inc.,
`
`inter partes
`
`Page 00009
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 10 of 21
`
`20.
`
`Palo Alto Networks has been aware of the status of these litigations and IPRs and
`
`of the existence and subject matter of the Asserted Patents since at least January 18, 2019, at
`
`which time Packet Intelligence sent a notice letter alleging Palo Alto Networks infringes the
`
`Asserted Patents.
`
`IV.
`
`BACKGROUND AND FACTS
`
`\DOOQON
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`21.
`
`The Asserted Patents are generally directed to systems and methods for classifying
`
`and monitoring network traffic as well as the use of state operations and state-of-the—fiow analysis
`
`to accommodate classification and monitoring of network traffic. These innovative concepts
`
`enable classification of data packets passing through a network to provide detailed insight and
`
`information to network managers and operators. More specifically, the Asserted Patents disclose
`
`and claim improved techniques for monitoring network traffic through, among other things,
`
`categorizing network traffic into “conversational flows” — relating sequences of data packets
`
`exchanged in any direction over a network comprising multiple connections among network
`
`devices, which may be client or server devices, based on specific application activity. This was an
`
`improvement over conventional systems and methods for classifying and monitoring network
`
`traffic based only on “connection flows” — data packets transmitted over a single network
`
`17
`
`connection.
`
`22.
`
`Traffic classification involves detecting the underlying protocols used within a data
`
`packet, as well as the applications or user activity responsible for generating network traffic. It
`
`also involves identifying the underlying protocols/applications of a flow along with recording
`
`traffic statistics. Such classification and monitoring provide network administrators with detailed
`
`information about their networks, which can be used to diagnose network problems, control
`
`bandwidth allocation, and ensure an appropriate quality of service for users.
`
`23.
`
`Conventional network monitors categorized network transmissions into
`
`“connection flows.” A connection fiow refers to the packets involved in a single connection and
`
`relate to a negotiated transmission between specific addresses on two devices. A connection flow
`
`correlates to the source and destination IP address/port pairs used on both ends of the connection
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`2697.000/1414720.1
`10
`Case No. 3 : 19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00010
`
`Page 00010
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 11 of 21
`
`without inspecting the packet’s payload deeper than the headers of the transport layer1 containing
`
`port information. The problem with only tracking connection flows is that certain applications and
`
`protocols may generate multiple connections. In other words, a single application may spawn
`
`multiple connections for a single activity. For example, if user A wants to have a Skype call with
`
`user B, the Skype application may create multiple connections between computer A and B to
`
`conduct the call. There might be one connection which supplies setup information, a second
`
`connection for transmitting video information, and a third connection for transmitting audio
`
`information. Conventional network monitors would consider these three separate connections
`
`even though they originated from a single Skype call.
`
`24.
`
`The Asserted Patents improved upon these conventional network monitoring
`
`systems and methods by categorizing network transmissions into “conversational flows” rather
`
`than merely in “connection flows.” Unlike connection flow, conversational flow is the sequence
`
`of packets that are exchanged in any direction as a result of a particular activity—for instance, the
`
`running of an application on a server as requested by a client—which may include multiple
`
`connections, transmissions, or exchanges in either direction between the participants in the
`
`conversation. This addressed the problem of disjointed flows in network communications through
`
`“virtually concatenating,” or linking, all related conversational exchanges.
`
`25.
`
`“Conversational flows” are identified through parsing and analyzing data packets at
`
`deeper layers to extract information used to classify each data packet, determining whether it
`
`belongs to an existing conversational flow or is part of a new conversational flow. This is
`
`accomplished, in part, by populating a parsing/extraction operations memory and a state
`
`patterns/operations and database with machine operations that implement programmable rules and
`
`instructions for inspecting packets to identify patterns forming conversational flows.
`
`26.
`
`Network traffic is inspected for pattern recognition to determine protocol types and
`
`headers for each protocol layer. Extracted packet information is compared to stored data
`
`1 The functionality underlying network communications is often viewed in terms of conceptual
`See
`layers, such as those defined in the 7 Layer OSI Model. See OSI Model,
`https://en.wikipedia.org/wiki/OSI_model (visited July 27, 2018). Several different protocol
`options may be available at each layer to accomplish specific tasks needed by the layer above it.
`
`2697.000/1414720.1
`1 1
`Case No. 3 : 19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`\DOOQON
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Page 00011
`
`Page 00011
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 12 of 21
`
`corresponding to prior network transmissions to determine whether a current transmission belongs
`
`to a known flow comprising previously inspected transmissions. Extracted data may also be used
`
`to determine the different states, state transitions, and/or state operations to be performed
`
`corresponding to a conversational flow to aid in predicting and/or identifying subsequent
`
`transmissions within a conversational flow and/or to determine the termination of a conversational
`
`flow. One of the many advantages of the invention is properly analyzing the packets exchanged
`
`between a client and a server and maintaining information relevant to the current state of each of
`
`these conversational flows.
`
`27.
`
`Classifying transmissions in the context of conversational flows provides several
`
`benefits over conventional network monitoring systems and methods, including accommodation
`
`of: more flexible and effective stateful firewall operations to permit network operators greater
`
`flexibility in configuring network security policies; more robust understanding of the quality of
`
`service (“QoS”) and bandwidth usage of a multiple connection flow application whereby certain
`
`network traffic could be excluded from data usage limits, bandwidth throttling may be applied to
`
`specific applications or services, and access to certain web browser applications may be restricted
`
`at specified times; and, eavesdropping or lawfill interception, by cloning all of the traffic of a
`
`conversational flow, which allows another user on the network, or elsewhere, to read the content
`
`exchanged over the network without the knowledge of the original recipient.
`
`V.
`
`THE ACCUSED PRODUCTS
`
`28.
`
`The “Accused Products” include Palo Alto Networks products, such as firewall
`
`products that include the App-ID feature other similar functionality. These products include, but
`
`are not limited to: PA-Series Firewall products (PA-200, PA-220, PA—220R, PA-7000, PA-7050,
`
`PA-7080; VM—Series Firewall products (VM-SO, VM-lOO, VM-300, VM-SOO, VM-700) and
`
`K2-Series Firewall Products.
`
`29.
`
`The App-ID feature of the Accused Products allows inspection of packets at layers
`
`3-7 of the OSI model to allow identification of a protocol associated with the packet and to
`
`determine the particular application associated with the packet. Palo Alto Networks’
`
`documentation describes this capability as shown below:
`
`
`2697.000/1414720.1
`12
`Case No. 3 : 19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Page 00012
`
`Page 00012
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 13 of 21
`
`App-ID” uses as many as four identification techniques to
`
`determine the exact identity of applications traversing the
`
`network—irrespective of port. protocol, evasive tactic, or
`
`SSL encryption. Identifying the application is the very first
`
`task performed by App—ID. providing administrators with
`
`the greatest amount of application knowledge and the
`
`most flexibility in terms of safe application.
`
`See “App-ID Technology Brief”, at p. 1, which can be found at the URL:
`
`https://media.paloa1tonetworks.com/documents/techbrief—app-id.pdf.
`
`30.
`
`A flow chart of the process by which the Accused Products identify the application
`
`to which a is shown below in Palo Alto Networks’ documentation shown below:
`
`App-ID
`
`Start
`
`1Check —>
`IP/Port
`
`4-—Pulliyclitk‘t
`
`KNOWN PROTOCOL DECODER
`
`Decryption
`(SSL or SSH)
`
`Dec‘ode
`
`Check
`Signatures
`
`u
`.
`Polity Chek
`
`)
`
`—> Check Application —>
`Signatures
`
`J.
`
`
`
`{—Polity(he
`
`—> IDENYiFIED TRAFFICthO DECODlNGJ
`
`\ UNKNOWN PROTOCOLDECODER
`Apply Heuristics —-> I :
`Poliiv Chair
`
`REPORT& ENFORCE POLICY
`
`See “App-ID Technology Brief”, at p. 1.
`
`31.
`
`The flow chart shows several decision points during the processing of a packet in
`
`the App-ID feature. The Accused Products can be used to implement Quality of Service (“QOS”)
`
`policies that are applied to packets based on the application that is identified. A network operator
`
`using the Accused Products can set QOS policies that can limit the bandwidth for certain
`
`applications during peak hours or prioritize packets associated with applications requiring more
`
`bandwidth, e.g., streaming Video.
`
`
`2697.000/1414720.1
`13
`Case No. 3 : 19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00013
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Page 00013
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 14 of 21
`
`w
`PATENT INFRINGEMENT
`
`U.S. Patent No. 6,651,099
`
`32.
`
`Packet Intelligence realleges paragraphs 1 through 31 as though fully set forth
`
`herein.
`
`33.
`
`Palo Alto Networks has infringed directly and continues to infringe directly, either
`
`literally or under the doctrine of equivalents, at least claim 1 of the ’099 Patent by its manufacture,
`
`sale, offer for sale, and use of any one or more of the Accused Products. Palo Alto Networks is
`
`therefore liable for infringement of the ’099 Patent pursuant to 35 U.S.C. § 271.
`
`34.
`
`As of the time Palo Alto Networks first had notice of Counterclaimant’s allegations
`
`of infringement of one or more claims of the ’099 Patent by Palo Alto Networks, which is no later
`
`than the date of the notice letter sent by Packet Intelligence on January 18, 2019, Palo Alto
`
`Networks indirectly infringed and continues to indirectly infringe at least claim 1 of the ’099
`
`Patent by active inducement under 35 U.S.C. § 271(b). Palo Alto Networks has induced, caused,
`
`urged, encouraged, aided and abetted its direct and indirect customers to make, use, sell, offer for
`
`sale and/or import one or more of the Accused Products, and thus indirectly infringes at least
`
`claim 1 of the ’099 Patent. Palo Alto Networks has done so by acts including but not limited to
`
`(1) selling such products including features that—when used or resold—infringe, either literally or
`
`under the doctrine of equivalents, the ’099 Patent; (2) marketing the infringing capabilities of such
`
`products; and (3) providing instructions, technical support, and other support and encouragement
`
`for the use of such products, including at least the documents referenced above. Such conduct by
`
`Palo Alto Networks was intended to and actually did result in direct infringement by Palo Alto
`
`Networks’ direct and indirect customers, including the making, using, selling, offering for sale
`
`and/or importation of the Accused Products in the United States.
`
`35.
`
`Palo Alto Networks’ infringement of the ’099 Patent has damaged Packet
`
`Intelligence, and Palo Alto Networks is liable to Packet Intelligence in an amount to be determined
`
`at trial that compensates Packet Intelligence for the infringement, which by law can be no less than
`
`a reasonable royalty.
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`2697.000/1414720.1
`14
`Case No. 3 : 19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00014
`
`Page 00014
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 15 of 21
`
`36.
`
`As of the time Palo Alto Networks first had notice of the ’099 Patent, at least as
`
`early as January 18, 2019, Palo Alto Networks has continued with its infringement despite the
`
`objectively high likelihood that its actions constitute infringement and Palo Alto Networks’
`
`subjective knowledge of this obvious risk. As Palo Alto Networks has no good faith belief that it
`
`does not infringe the ’099 Patent, at least Palo Alto Networks’ continued infringement of the ’099
`
`Patent is willful and deliberate, entitling Packet Intelligence to increased damages under 35 U.S.C.
`
`§ 284 and to attorneys’ fees and costs incurred in prosecuting this action under 35 U.S.C. § 285.
`
`w
`PATENT INFRINGEMENT
`
`U.S. Patent No. 6,665,725
`
`37.
`
`Packet Intelligence realleges paragraphs 1 through 36 as though fully set forth
`
`herein.
`
`38.
`
`Palo Alto Networks has infringed directly and continues to infringe directly, either
`
`literally or under the doctrine of equivalents, at least claim 17 of the ’725 Patent by its
`
`manufacture, sale, offer for sale, and use of any one or more of the Accused Products. Palo Alto
`
`Networks is therefore liable for infringement of the ’725 Patent pursuant to 35 U.S.C. § 271.
`
`39.
`
`As of the time Palo Alto Networks first had notice of Counterclaimant’s allegations
`
`of infringement of one or more claims of the ’725 Patent by Palo Alto Networks, at least as early as
`
`January 18, 2019, Palo Alto Networks indirectly infringed and continues to indirectly infringe at
`
`least claim 17 of the ’725 Patent by active inducement under 35 U.S.C. § 271(b). Palo Alto
`
`Networks has induced, caused, urged, encouraged, aided and abetted its direct and indirect
`
`customers to make, use, sell, offer for sale and/or import one or more of the Accused Products,
`
`and thus indirectly infringes at least claim 17 of the ’725 Patent. Palo Alto Networks has done so
`
`by acts including but not limited to (1) selling such products including features that—when used
`
`or resold—infringe, either literally or under the doctrine of equivalents, the ’725 Patent; (2)
`
`marketing the infringing capabilities of such products; and (3) providing instructions, technical
`
`support, and other support and encouragement for the use of such products, including at least the
`
`documents referenced above. Such conduct by Palo Alto Networks was intended to and actually
`
`did result in direct infringement by Palo Alto Networks’ direct and indirect customers, including
`
`
`2697.000/1414720.1
`15
`Case No. 3 : 19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Page 00015
`
`Page 00015
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 16 of 21
`
`the making, using, selling, offering for sale and/or importation of the Accused Products in the
`
`United States.
`
`40.
`
`Palo Alto Networks’ infringement of the ’725 Patent has damaged Packet
`
`Intelligence, and Palo Alto Networks is liable to Packet Intelligence in an amount to be determined
`
`at trial that compensates Packet Intelligence for the infringement, which by law can be no less than
`
`a reasonable royalty.
`
`41.
`
`As of the time Palo Alto Networks first had notice of the ’725 Patent, at least as
`
`early as January 18, 2019, Palo Alto Networks has continued with its infringement despite the
`
`objectively high likelihood that its actions constitute infringement Palo Alto Networks’ subjective
`
`knowledge of this obvious risk. As Palo Alto Networks has no good faith belief that it does not
`
`infringe the ’725 Patent, at least Palo Alto Networks’ continued infringement of the ’725 Patent is
`
`willful and deliberate, entitling Packet Intelligence to increased damages under 35 U.S.C. § 284
`
`and to attorneys’ fees and costs incurred in prosecuting this action under 35 U.S.C. § 285.
`
`w
`PATENT INFRINGEMENT
`
`U.S. Patent No. 6,771,646
`
`42.
`
`Packet Intelligence realleges paragraphs 1 through 41 as though fully set forth
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`herein.
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`43.
`
`Palo Alto Networks has infringed directly and continues to infringe directly, either
`
`literally or under the doctrine of equivalents, at least claim 7 of the ’646 Patent by its manufacture,
`
`sale, offer for sale, and use of any one or more of the Accused Products. Palo Alto Networks is
`
`therefore liable for infringement of the ’646 Patth pursuant to 35 U.S.C. § 271.
`
`44.
`
`As of the time Palo Alto Networks first had notice of Counterclaimant’s allegations
`
`of infringement of one or more claims of the ’646 Patent by Palo Alto Networks, which is no later
`
`than the January 18, 2019, Palo Alto Networks indirectly infringed and continues to indirectly
`
`infringe at least claim 7 of the ’646 Patth by active inducement under 35 U.S.C. § 271(b). Palo
`
`Alto Networks has induced, caused, urged, encouraged, aided and abetted its direct and indirect
`
`customers to make, use, sell, offer for sale and/or import one or more of the Accused Products,
`
`and thus indirectly infringes at least claim 7 of the ’646 Patent. Palo Alto Networks has done so
`
`
`2697.000/1414720.1
`16
`Case No. 3 : 19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00016
`
`Page 00016
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 17 of 21
`
`by acts including but not limited to (1) selling such products including features that—when used
`
`or resold—infringe, either literally or under the doctrine of equivalents, the ’646 Patent; (2)
`
`marketing the infringing capabilities of such products; and (3) providing instructions, technical
`
`support, and other support and encouragement for the use of such products, including at least the
`
`documents referenced above. Such conduct by Palo Alto Networks was intended to and actually
`
`did result in direct infringement by Palo Alto Networks’ direct and indirect customers, including
`
`the making, using, selling, offering for sale and/or importation of the Accused Products in the
`
`United States.
`
`45.
`
`Palo Alto Networks’ infringement of the ’646 Patent has damaged Packet
`
`Intelligence, and Palo Alto Networks is liable to Packet Intelligence in an amount to be determined
`
`at trial that compensates Packet Intelligence for the infringement, which by law can be no less than
`
`a reasonable royalty.
`
`46.
`
`As of the time Palo Alto Ne

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket