throbber
Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`
`Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`
`Juniper Exhibit 1097
`Juniper Networks, Inc. v. Packet Intelligence LLC
`Page 00001
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 2 of 18
`
`1
`
`2
`
`PACKET INTELLIGENCE LLC (“Packet Intelligence” and “Plaintiff” herein) by and
`
`through its undersigned attorneys hereby demands a jury trial and alleges the following in support
`
`L») of its Complaint for patent
`
`infringement against Defendant JUNIPER NETWORKS,
`
`INC.
`
`4
`
`5
`
`\DOO\10\
`
`(“Juniper” and “Defendant” herein).
`
`I. THE PARTIES
`
`1.
`
`Packet Intelligence LLC is a limited liability company existing under the laws of
`
`Texas since June 2012. Plaintiff maintains its principal place of business at 705B Mulberry Ave,
`
`Celebration, FL 34747.
`
`2.
`
`Upon information and belief, Juniper Networks, Inc. is a Delaware Corporation, with
`
`10
`
`a principal place of business at 1133 Innovation Way, Sunnyvale, CA 94089. Defendant may be
`
`11
`
`served with process through its Registered Agent, CT Corporation System located at 818 Seventh
`
`12 Street, Suite 930, Los Angeles, CA 90017.
`
`13
`
`14
`
`II. JURISDICTION AND VENUE
`
`3.
`
`This is an action for infringement of several United States Patents. Federal question
`
`15
`
`jurisdiction is conferred to this Court over such action under 28 U.S.C. §§ 1331 and 1338(a).
`
`16
`
`4.
`
`Defendant has sufficient minimum contacts with the Northern District of California
`
`17
`
`such that this venue is fair and reasonable. Defendant has committed such purposeful acts and/or
`
`18
`
`transactions in this District that it reasonably should know and expect that it could be hailed into
`
`19
`
`this Court as a consequence of such activities. Defendant has transacted and, at the time of the filing
`
`20 of this Complaint, continues to transact business within the Northern District of California.
`
`21
`
`5.
`
`Further, Defendant makes or sells products that are and have been used, offered for
`
`22
`
`sale, sold, and/or purchased in the Northern District of California. Defendant directly and/or through
`
`23
`
`its distribution network, places infringing products or systems within the stream of commerce, which
`
`24
`
`stream is directed at this District, with the knowledge and/or understanding that those products will
`
`25
`
`be sold and/0r used in the Northern District of California.
`
`26
`
`6.
`
`For these reasons, personal jurisdiction exists and venue is proper in this Court under
`
`27 28 U.S.C. §§ 1391(b) and (c) and 28 U.S.C. § 1400(b), respectively.
`
`28
`
`
`2697.001/1426122.1
`2
`Case No,
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`Page 00002
`
`Page 00002
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 3 of 18
`
`III. THE PATENTS-IN—SUIT
`
`7.
`
`The patents-in—suit are early pioneer patents in the field of network traffic processing
`
`and monitoring. Each of the asserted patents claim priority to provisional U.S. Patent Application
`
`No. 60/141,903 entitled “Method and Apparatus for Monitoring Traffic in a Network,” filed in the
`
`United States Patent and Trademark Office on June 30, 1999.
`
`8.
`
`Mr. Russell S. Dietz, the first listed inventor on four of the five patents-in—suit, is a
`
`recognized thought leader who publishes and lectures regularly on network data management, cloud
`
`computing and virtualization security solutions. Mr. Dietz has more than 30 years of experience in
`
`the technology and security space. He has a proven record of success as Chief Technology Officer
`
`of multiple hardware, software and systems security companies, and is a recognized pioneer and
`
`innovator in cloud computing and virtualization security solutions. He has more than 20 years of
`
`leadership and expertise
`
`anticipating trends,
`
`and evaluating new technologies
`
`in data
`
`communications, data management and Enterprise security. He is an active member of the Internet
`
`and Engineering Task Force (IETF), Optical Intemetworking Forum (OIF) and the Cloud
`
`Computing Interoperability Forum (CCIF).
`
`9.
`
`On November 18, 2003, the United States Patent and Trademark Office (USPTO)
`
`duly and legally issued U.S. Patent No. 6,651,099 (“the ’099 Patent”) entitled “Method and
`
`Apparatus for Monitoring Traffic in a Network.” Packet Intelligence owns all substantial rights to
`
`the ’099 Patent, including the right to sue and recover damages for all infringement thereof.
`
`Documents assigning the ’099 Patent to Packet Intelligence were recorded at the USPTO on
`
`February 1, 2013 at Reel/Frame 29737-613. Attached hereto as Exhibit A is a true and correct copy
`
`of the ’099 Patent. The ’099 patent has been cited as pertinent prior art by either an applicant, or a
`
`USPTO examiner, during the prosecution of more than 275 issued patents and published patent
`
`applications.
`
`10.
`
`On December 16, 2003,
`
`the USPTO duly and legally issued U.S. Patent No.
`
`6,665,725 (“the ’725 Patent”) entitled “Processing Protocol Specific Information in Packets
`
`Specified by a Protocol Description Language.” Packet Intelligence owns all substantial rights to
`
`the ’725 Patent, including the right to sue and recover damages for all infringement thereof.
`
`
`2697.001/1426122.1
`3
`Case No.
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Page 00003
`
`Page 00003
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 4 of 18
`
`Documents assigning the ’725 Patent to Packet Intelligence were recorded at the USPTO on
`
`February 1, 2013 at Reel/Frame 29737-613. A true and correct copy of the ’725 Patent is attached
`
`hereto as Exhibit B.
`
`11.
`
`The ’725 patent has been cited as pertinent prior art by either an applicant, or a
`
`USPTO examiner, during the prosecution of more than 260 issued patents and published patent
`
`applications.
`
`12.
`
`On August 3, 2004, the USPTO duly and legally issued U.S. Patent No. 6,771,646
`
`(“the ’646 Patent”) entitled “Associative Cache Structure for Lookups and Updates of Flow Records
`
`in a Network Monitor.” Packet Intelligence owns all substantial rights to the ’646 Patent, including
`
`the right to sue and recover damages for all infringement thereof. Documents assigning the ’646
`
`Patent to Packet Intelligence were recorded at the USPTO on February 1, 2013 at Reel/Frame 29737-
`
`613. A true and correct copy of the ’646 Patent is attached hereto as Exhibit C.
`
`13.
`
`The ’646 patent has been cited as pertinent prior art by either an applicant, or a
`
`USPTO examiner, during the prosecution of more than 170 issued patents and published patent
`
`applications.
`
`14.
`
`On January 4, 2005, the USPTO duly and legally issued U.S. Patent No. 6,839,751
`
`(“the ’751 Patent”) entitled “Re-Using Information from Data Transactions for Maintaining
`
`Statistics in Network Monitoring.” Packet Intelligence owns all substantial rights to the ’751 Patent,
`
`including the right to sue and recover damages for all infringement thereof. Documents assigning
`
`the ’751 Patent to Packet Intelligence were recorded at the USPTO on February 1, 2013 at
`
`Reel/Frame 29737-613. A true and correct copy of the ’751 Patent is attached hereto as Exhibit D.
`
`15.
`
`The ’751 patent has been cited as pertinent prior art by either an applicant, or a
`
`USPTO examiner, during the prosecution of more than 100 issued patents and published patent
`
`applications.
`
`16.
`
`On October 11, 2005, the USPTO duly and legally issued U.S. Patent No. 6,954,789
`
`(“the ’789 Patent”) entitled “Method and Apparatus for Monitoring Traffic in a Network.” Packet
`
`Intelligence owns all substantial rights to the ’789 Patent, including the right to sue and recover
`
`damages for all infringement thereof. Documents assigning the ’789 Patent to Packet Intelligence
`
`
`2697.001/1426122.1
`4
`Case No,
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Page 00004
`
`Page 00004
`
`

`

`Networks, Inc. v. Packet Intelligence LLC
`
`See Palo Alto
`
`Packet Intelligence LLC v. Huawei Devices USA Inc.
`
`Packet Intelligence LLC v. Cisco Systems, Inc.
`
`Packet Intelligence LLC v. Cisco Systems, Inc.
`
`Packet Intelligence LLC v. NetScout Systems, Inc. et al
`
`Packet Intelligence LLC v. Sandvine Corporation and Sandvine Incorporated ULC
`
`Page 00005
`
`

`

`inter partes
`
`in Limine
`
`Packet Intelligence LLC v. Nokia of America Corporation,
`
`Packet Intelligence LLC v. Ericsson Inc.,
`
`inter partes
`
`Page 00006
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 7 of 18
`
`22.
`
`Traffic classification involves detecting the underlying protocols used within a data
`
`packet, as well as the applications or user activity responsible for generating network traffic. It also
`
`involves identifying the underlying protocols/applications of a flow along with recording traffic
`
`statistics.
`
`Such classification and monitoring provide network administrators with detailed
`
`information about their networks, which can be used to diagnose network problems, control
`
`bandwidth allocation, and ensure an appropriate quality of service for users.
`
`23.
`
`Conventional network monitors categorized network transmissions into “connection
`
`77
`flows. A connection flow refers to the packets involved in a single connection and relate to a
`
`negotiated transmission between specific addresses on two devices. A connection flow correlates
`
`to the source and destination IP address/port pairs used on both ends of the connection without
`
`inspecting the packet’s payload deeper than the headers of the transport layer1 containing port
`
`information. The problem with only tracking connection flows is that certain applications and
`
`protocols may generate multiple connections.
`
`In other words, a single application may spawn
`
`multiple connections for a single activity. For example, if user A wants to have a Skype call with
`
`user B, the Skype application may create multiple connections between computer A and B to
`
`conduct the call. There might be one connection which supplies setup information, a second
`
`connection for transmitting video information, and a third connection for transmitting audio
`
`information. Conventional network monitors would consider these three separate connections even
`
`though they originated from a single Skype call.
`
`24.
`
`The Asserted Patents improved upon these conventional network monitoring systems
`
`and methods by categorizing network transmissions into “conversational flows” rather than merely
`
`in “connection flows.” Unlike connection flow, conversational flow is the sequence of packets that
`
`are exchanged in any direction as a result of a particular activity—for instance, the running of an
`
`application on a server as requested by a client—which may include multiple connections,
`
`transmissions, or exchanges in either direction between the participants in the conversation. This
`
`1 The functionality underlying network communications is often viewed in terms of conceptual
`See
`See
`layers,
`such
`as
`those
`defined
`in
`the
`7 Layer
`081 Model.
`081 Model,
`https://en.wikipedia.org/wiki/OSI model (visited July 27, 2018). Several different protocol options
`may be available at each layer to accomplish specific tasks needed by the layer above it.
`
`2697.001/1426122.1
`7
`Case No,
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`Page 00007
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Page 00007
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 8 of 18
`
`addressed the problem of disjointed flows in network communications through “virtually
`
`concatenating,” or linking, all related conversational exchanges.
`
`25.
`
`“Conversational flows” are identified through parsing and analyzing data packets at
`
`deeper layers to extract information used to classify each data packet, determining whether it
`
`belongs to an existing conversational flow or is part of a new conversational flow. This is
`
`accomplished,
`
`in part, by populating a parsing/extraction operations memory and a state
`
`patterns/operations and database with machine operations that implement programmable rules and
`
`instructions for inspecting packets to identify patterns forming conversational flows.
`
`26.
`
`Network traffic is inspected for pattern recognition to determine protocol types and
`
`headers for each protocol
`
`layer. Extracted packet
`
`information is compared to stored data
`
`corresponding to prior network transmissions to determine whether a current transmission belongs
`
`to a known flow comprising previously inspected transmissions. Extracted data may also be used
`
`to determine the different states, state transitions, and/or state operations to be performed
`
`corresponding to a conversational
`
`flow to aid in predicting and/or identifying subsequent
`
`transmissions within a conversational flow and/or to determine the termination of a conversational
`
`flow. One of the many advantages of the invention is properly analyzing the packets exchanged
`
`between a client and a server and maintaining information relevant to the current state of each of
`
`these conversational flows.
`
`27.
`
`Classifying transmissions in the context of conversational flows provides several
`
`benefits over conventional network monitoring systems and methods, including accommodation
`
`of: more flexible and effective stateful firewall operations to permit network operators greater
`
`flexibility in configuring network security policies; more robust understanding of the quality of
`
`service (“QoS”) and bandwidth usage of a multiple connection flow application whereby certain
`
`network traffic could be excluded fiom data usage limits, bandwidth throttling may be applied to
`
`specific applications or services, and access to certain web browser applications may be restricted
`
`at specified times; and, eavesdropping or lawfiJl interception, by cloning all of the traffic of a
`
`conversational flow, which allows another user on the network, or elsewhere, to read the content
`
`exchanged over the network without the knowledge of the original recipient.
`
`
`2697.001/1426122.1
`8
`Case No,
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Page 00008
`
`Page 00008
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 9 of 18
`
`V. THE ACCUSED PRODUCTS
`
`28.
`
`The “Accused Products” include Defendant’s products, such as gateway and firewall
`
`products that include the Application Identification feature, and/or the Juniper Application Aware
`
`feature or other similar functionality. These products include, but are not limited to: SRX Series
`
`Gateway and/0r Firewall products both physical and virtual/containerized platforms (including but
`
`not limited to SRXlOO, SRXllO, SRXZlO, SRX220, SRX240, SRX300, SRX320, SRX340,
`
`SRXSSO, SRX650, SRXlSOO, SRX4100, SRX4200, SRX4600, SRX5400, SRX5600, SRX5800,
`
`VSRX, and cSRX), the Juniper MX Series routers including both physical and Virtual platforms
`
`(including but not limited to Virtual MX (VMX), MXS. MXlO, MX40, MX80, MX104, MX150,
`
`MX204, MX240, MX480, MX960, MX2008, MXZOlO, MX2020, MX10003, MX 10008, and
`
`MX10016), and the NFX Series Network Services Platform products both physical and Virtual
`
`platforms (including but not limited to NFXlSO and NFX250) and any predecessor or successor
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`models.
`
`29.
`
`The Application Identification and Application Aware features of the Accused
`
`Products allow inspection of packets at layers 3-7 of the OSI model to allow identification of a
`
`protocol associated with the packet and to determine the particular application associated with the
`
`packet. Defendant’s documentation describes this capability as shown below:
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`2697.001/1426122.1
`9
`Case No.
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`Page 00009
`
`Page 00009
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 10 of 18
`
`Junos OS Next—Generation Application Identification
`
`Next—generation application identification builds on the legacy application identification
`functionality and provides more effective detection capabilities for evasive applications
`such as Skype, BitTorrent. and Tor.
`
`Junos 05 application identification recognizes Web—based and other applications and
`protocols at different network layers using characteristics other than port number.
`Applications are identified by using a protocol bundle containing application signatures
`and parsing information. The identification is based on protocol parsing and decoding
`and session management.
`
`The detection mechanism has its own data feed and constructs to identify applications.
`
`The following features are supported in application identification:
`
`- Support for protocols and applications, including video streaming, peer—to—peer
`communication. social networking, and messaging
`Identification of services within applications
`
`.
`
`- Ability to distinguish actions launched within an application (such as login, browse,
`
`chat, and file transfer)
`
`. Support for all versions of protocols and application decoders and dynamic updates
`of decoders
`
`- Support for encrypted and compressed traffic and most complex tunneling protocols
`
`. Ability to identify all protocols from Layer 3 to Layer 7 and above Layer 7
`
`See “Junos OS — Application Security Feature Guide for Security Devices,” at p. 28.
`
`30.
`
`A flow chart of the process by which the Accused Products identify the application
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`10
`
`11
`
`12
`
`1
`
`3
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`that corresponds to a packet is shown below in the excerpt from Defendant’s documentation:
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`2697.001/1426122.1
`10
`Case No.
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`Page 00010
`
`Page 00010
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 11 of 18
`
`Application Identification Match Sequence
`
`Figure l on page 29 shows the sequence in which mapping techniques are applied and
`how the application is determined.
`
`Figure 7: Mapping Sequence
`
`iFirst Packet
`
`.
`.
`Match
`Checkapplication
`4’ system cache —> Application
` No
`Process packet
`
`
`
`
`
`
`Application
`
`Classified?
`
`
`Application
`
`Application lD
`‘ Done
`
`
`
`
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`See “Junos OS — Application Security Feature Guide for Security Devices,” at p. 29.
`
`31.
`
`The flow chart shows several decision points during the processing of a packet in the
`
`Application Identification feature. The Accused Products can be used to implement one or more of
`
`the AppSecure models, such as AppTrack, AppFW, AproS, AppDoS, and IPS. For instance,
`
`AproS can be used to implement Quality of Service (“QOS”) policies that are applied to packets
`
`based on the application that is identified. A network operator using the Accused Products can set
`
`QOS policies that can limit the bandwidth for certain applications during peak hours or prioritize
`
`packets associated with applications requiring more bandwidth, e. g., streaming video.
`
`VI. PATENT INFRINGEMENT (U.S. Patent No. 6,651,099!
`
`32.
`
`33.
`
`Packet Intelligence realleges paragraphs 1 through 31 as though fully set forth herein.
`
`Defendant has infringed directly and continues to infringe directly, either literally or
`
`under the doctrine of equivalents, at least claim 1 of the ’099 Patent by its manufacture, sale, offer
`
`
`2697.001/1426122.1
`1 1
`Case No,
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`Page 00011
`
`Page 00011
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 12 of 18
`
`for sale, and use of any one or more of the Accused Products. Defendant is therefore liable for
`
`infringement of the ’099 Patent pursuant to 35 U.S.C. § 271.
`
`34.
`
`As of the time Defendant first had notice of Plaintiff’s allegations of infiingement of
`
`one or more claims of the ’099 Patent by Defendant, which is no later than the date of the notice
`
`letter sent by Packet Intelligence on January 18, 2019, Defendant indirectly infringed and continues
`
`to indirectly infringe at least claim 1 of the ’099 Patent by active inducement under 35 U.S.C.
`
`§27l(b). Defendant has induced, caused, urged, encouraged, aided and abetted its direct and
`
`indirect customers to make, use, sell, offer for sale and/or import one or more of the Accused
`
`Products, and thus indirectly infringes at least claim 1 of the ’099 Patent. Defendant has done so by
`
`acts including but not limited to (1) selling such products including features that—when used or
`
`resold—infringe, either literally or under the doctrine of equivalents, the ’099 Patent; (2) marketing
`
`the infringing capabilities of such products; and (3) providing instructions, technical support, and
`
`other support and encouragement for the use of such products, including at least the documents
`
`referenced above. Such conduct by Defendant was intended to and actually did result in direct
`
`infringement by Defendant’s direct and indirect customers, including the making, using, selling,
`
`offering for sale and/or importation of the Accused Products in the United States.
`
`35.
`
`Defendant’s infringement of the ’099 Patent has damaged Packet Intelligence, and
`
`Defendant is liable to Packet Intelligence in an amount to be determined at trial that compensates
`
`Packet Intelligence for the infringement, which by law can be no less than a reasonable royalty.
`
`36.
`
`As of the time Defendant first had notice of the ’099 Patent, at least as early as
`
`January 18, 2019, Defendant has continued with its infringement despite the objectively high
`
`likelihood that its actions constitute infringement and Defendant’s subjective knowledge of this
`
`obvious risk. As Defendant has no good faith belief that it does not infringe the ’099 Patent, at least
`
`Defendant’s continued infringement of the ’099 Patent is willful and deliberate, entitling Packet
`
`Intelligence to increased damages under 35 U.S.C. § 284 and to attorneys’ fees and costs incurred
`
`in prosecuting this action under 35 U.S.C. § 285.
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`2697.001/1426122.1
`12
`Case No,
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`Page 00012
`
`Page 00012
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 13 of 18
`
`VII. PATENT INFRINGEMENT (U.S. Patent No. 6,665,725)
`
`37.
`
`38.
`
`Packet Intelligence realleges paragraphs 1 through 31 as though fully set forth herein.
`
`Defendant has infringed directly and continues to infringe directly, either literally or
`
`under the doctrine of equivalents, at least claim 17 of the ’725 Patent by its manufacture, sale, offer
`
`for sale, and use of any one or more of the Accused Products. Defendant is therefore liable for
`
`infringement of the ’725 Patent pursuant to 35 U.S.C. § 271.
`
`39.
`
`As of the time Defendant first had notice of Plaintiff’s allegations of infiingement of
`
`one or more claims of the ’725 Patth by Defendant, at least as early as January 18, 2019, Defendant
`
`indirectly infringed and continues to indirectly infringe at least claim 17 of the ’725 Patent by active
`
`inducement under 35 U.S.C. § 271(b). Defendant has induced, caused, urged, encouraged, aided
`
`and abetted its direct and indirect customers to make, use, sell, offer for sale and/or import one or
`
`more of the Accused Products, and thus indirectly infringes at least claim 17 of the ’725 Patent.
`
`Defendant has done so by acts including but not limited to (1) selling such products including
`
`features that—when used or resold—infringe, either literally or under the doctrine of equivalents,
`
`the ’725 Patent; (2) marketing the infringing capabilities of such products; and (3) providing
`
`instructions, technical support, and other support and encouragement for the use of such products,
`
`including at least the documents referenced above. Such conduct by Defendant was intended to and
`
`actually did result in direct infringement by Defendant’s direct and indirect customers, including the
`
`making, using, selling, offering for sale and/or importation of the Accused Products in the United
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`States.
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`40.
`
`Defendant’s infringement of the ’725 Patent has damaged Packet Intelligence, and
`
`Defendant is liable to Packet Intelligence in an amount to be determined at trial that compensates
`
`Packet Intelligence for the infringement, which by law can be no less than a reasonable royalty.
`
`41.
`
`As of the time Defendant first had notice of the ’725 Patent, at least as early as
`
`January 18, 2019, Defendant has continued with its infringement despite the objectively high
`
`likelihood that its actions constitute infringement Defendant’s subjective knowledge of this obvious
`
`risk. As Defendant has no good faith belief that it does not infringe the ’725 Patent, at least
`
`Defendant’s continued infringement of the ’725 Patent is willful and deliberate, entitling Packet
`
`
`2697.001/1426122.1
`13
`Case No,
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`Page 00013
`
`Page 00013
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 14 of 18
`
`Intelligence to increased damages under 35 U.S.C. § 284 and to attorneys’ fees and costs incurred
`
`in prosecuting this action under 35 U.S.C. § 285.
`
`VIII. PATENT INFRINGEMENT (U.S. Patent No. 6,771,646)
`
`42.
`
`Packet Intelligence realleges paragraphs 1 through 31 as though fully set forth
`
`herein.
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`43.
`
`Defendant has infringed directly and continues to infringe directly, either literally or
`
`under the doctrine of equivalents, at least claim 7 of the ’646 Patent by its manufacture, sale, offer
`
`for sale, and use of any one or more of the Accused Products. Defendant is therefore liable for
`
`infringement of the ’646 Patent pursuant to 35 U.S.C. § 271.
`
`44.
`
`As of the time Defendant first had notice of Plaintiff’s allegations of infiingement of
`
`one or more claims of the ’646 Patent by Defendant, which is no later than the January 18, 2019,
`
`Defendant indirectly infringed and continues to indirectly infringe at least claim 7 of the ’646 Patent
`
`by active inducement under 35 U.S.C. § 271(b). Defendant has induced, caused, urged, encouraged,
`
`aided and abetted its direct and indirect customers to make, use, sell, offer for sale and/or import
`
`one or more of the Accused Products, and thus indirectly infringes at least claim 7 of the ’646 Patent.
`
`Defendant has done so by acts including but not limited to (1) selling such products including
`
`features that—when used or resold—infringe, either literally or under the doctrine of equivalents,
`
`the ’646 Patent; (2) marketing the infringing capabilities of such products; and (3) providing
`
`instructions, technical support, and other support and encouragement for the use of such products,
`
`including at least the documents referenced above. Such conduct by Defendant was intended to and
`
`actually did result in direct infringement by Defendant’s direct and indirect customers, including the
`
`making, using, selling, offering for sale and/or importation of the Accused Products in the United
`
`23
`
`States.
`
`24
`
`25
`
`26
`
`27
`
`28
`
`45.
`
`Defendant’s infringement of the ’646 Patent has damaged Packet Intelligence, and
`
`Defendant is liable to Packet Intelligence in an amount to be determined at trial that compensates
`
`Packet Intelligence for the infringement, which by law can be no less than a reasonable royalty.
`
`46.
`
`As of the time Defendant first had notice of the ’646 Patent, at least as early as
`
`January 18, 2019 2017, Defendant has continued with its infringement despite the objectively high
`
`
`2697.001/1426122.1
`14
`Case No,
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`Page 00014
`
`Page 00014
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 15 of 18
`
`likelihood that its actions constitute infringement and Defendant’s subjective knowledge of this
`
`obvious risk. As Defendant has no good faith belief that it does not infringe the ’646 Patent, at least
`
`Defendant’s continued infringement of the ’646 Patent is willful and deliberate, entitling Packet
`
`Intelligence to increased damages under 35 U.S.C. § 284 and to attorneys’ fees and costs incurred
`
`in prosecuting this action under 35 U.S.C. § 285.
`
`\DOO\10\
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`IX. PATENT INFRINGEMENT (U.S. Patent No. 6,839,751)
`
`47.
`
`48.
`
`Packet Intelligence realleges paragraphs 1 through 31 as though fully set forth herein.
`
`Defendant has infringed directly and continues to infringe directly, either literally or
`
`under the doctrine of equivalents, at least claim 17 of the ’751 Patent by its manufacture, sale, offer
`
`for sale, and use of any one or more of the Accused Products. Defendant is therefore liable for
`
`infringement of the ’751 Patent pursuant to 35 U.S.C. § 271.
`
`49.
`
`As of the time Defendant first had notice of Plaintiff’s allegations of infiingement of
`
`one or more claims of the ’751 Patent by Defendant, which is no later than the January 18, 2109,
`
`Defendant indirectly infringed and continues to indirectly infringe at least claim 17 of the ’751
`
`Patent by active inducement under 35 U.S.C. § 271(b). Defendant has induced, caused, urged,
`
`encouraged, aided and abetted its direct and indirect customers to make, use, sell, offer for sale
`
`and/or import one or more of the Accused Products, and thus indirectly infringes at least claim 17
`
`of the ’751 Patent. Defendant has done so by acts including but not limited to (1) selling such
`
`products including features that—when used or resold—infringe, either literally or under the
`
`doctrine of equivalents, the ’751 Patent; (2) marketing the infringing capabilities of such products;
`
`and (3) providing instructions, technical support, and other support and encouragement for the use
`
`of such products, including at least the documents referenced above. Such conduct by Defendant
`
`was intended to and actually did result in direct infringement by Defendant’s direct and indirect
`
`customers, including the making, using, selling, offering for sale and/or importation of the Accused
`
`25
`
`Products in the United States.
`
`26
`
`27
`
`28
`
`50.
`
`Defendant’s infringement of the ’751 Patent has damaged Packet Intelligence, and
`
`Defendant is liable to Packet Intelligence in an amount to be determined at trial that compensates
`
`Packet Intelligence for the infringement, which by law can be no less than a reasonable royalty.
`
`
`2697.001/1426122.1
`15
`Case No,
`PACKET INTELLIGENCE LLC’S COMPLAINT FOR PATENT INFRINGEMENT
`
`Page 00015
`
`Page 00015
`
`

`

`Case 3:19-cv-04741-WHO Document 1 Filed 08/13/19 Page 16 of 18
`
`51.
`
`As of the time Defendant first had notice of the ’751 Patent, at least as early as
`
`January 18, 2019, Defendant has continued with its infringement despite the objectively high
`
`likelihood that its actions constitute infringement and Defendant’s subjective knowledge of this
`
`obvious risk. As Defendant has no good faith belief that it does not infringe the ’75 1 Patent, at least
`
`Defendant’s continued infringement of the ’751 Patent is willful and deliberate, entitling Packet
`
`Intelligence to increased damages under 35 U.S.C. § 284 and to attorneys’ fees and costs incurred
`
`in prosecuting this action under 35 U.S.C. § 285.
`
`X. PATENT INFRINGEMENT (US. Patent No. 6,954,789)
`
`52.
`
`Packet Intelligence realleges paragraphs 1 through 31 as though fully set forth
`
`\DOO\10\
`
`10
`
`herein.
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`53.
`
`Defendant has infringed directly and continues to infringe directly, either literally or
`
`under the doctrine of equivalents, at least claim 19 of the ’789 Patent by its manufacture, sale, offer
`
`for sale, and use of any one or more of the Accused Products. Defendant is therefore liable for
`
`infringement of the ’789 Patent pursuant to 35 U.S.C. § 271.
`
`54.
`
`As of the time Defendant first had notice of Plaintiff’s allegations of infiingement of
`
`one or more claims of the ’789 Patent by Defendant, which is no later than the filing date of this
`
`complaint, Defendant, indirectly infringed and continues to indirectly infringe at least claim 19 of
`
`the ’789 Patent by active inducement under 35 U.S.C. § 271(b). Defendant has induced, caused,
`
`urged, encouraged, aided and abetted its direct and indirect customers to make, use, sell, offer for
`
`sale and/or import one or more of the Accused Products, and thus indirectly infringes at least claim
`
`19 of the ’789 Patent. Defendant has done so by acts including but not limited to (1) selling such
`
`products including features that—when used or resold—infringe, either literally or under the
`
`doctrine of equivalents, the ’789 Patent; (2) marketing the infring

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket