throbber
Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`
`Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`Pro Hac Vice To Be Filed
`
`Juniper Exhibit 1095
`Juniper Networks, Inc. v. Packet Intelligence LLC
`Page 00001
`
`

`

`waF&FWwNO
`oOOoNSNNHN
`
`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 2 of 21
`
`
`
`PACKET INTELLIGENCE LLC,
`
`Counterclaimant
`
`v.
`
`PALO ALTO NETWORKS,INC.
`
`Counter-Defendant.
`
`
`PACKET INTELLIGENCELLC (“PacketIntelligence” and “Counterclaimant” herein)
`
`makes the following answer to Plaintiff PALO ALTO NETWORKS,INC.’s (“Palo Alto
`
`Networks” and “Plaintiff” herein) Original Complaint for Declaratory Judgment of Non-
`
`Infringement. Packet Intelligence demandsa jury trial on all issuestriable as ofright.
`
`NATURE OF THE ACTION
`
`1,
`
`Packet Intelligence admits that Palo Alto Networks hasfiled a declaratory judgment
`
`action of non-infringement but denies the remaining allegations in Paragraph 1.
`
`PARTIES
`
`Packet Intelligence admits the allegations in Paragraph 2, upon information and
`
`Packet Intelligence admits the allegations in Paragraph 3.
`
`JURISDICTION AND VENUE
`
`Packet Intelligence admits the allegations in Paragraph 4.
`
`Packet Intelligence admits that it sent a notice letter to Palo Alto Networks on
`
`belief.
`
`2.
`
`3.
`
`4.
`
`5.
`
`January 18, 2019 alleging infringement of the Patents-in-Suit. Counterclaimant denies the
`
`remaining allegations Paragraph5.
`
`6.
`
`Packet Intelligence admits that it has sent notice letters to other companies with
`
`locations in this District but denies the remaining allegations of Paragraph 6.
`
`7.
`
`PacketIntelligence admits that it acquired the Patents-in-Suit from Exar
`
`Corporation of Fremont, California but denies the remaining allegations of Paragraph7.
`
`
`2697.000/1414720.1
`2
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00002
`
`Page 00002
`
`

`

`waF&FWwNO
`oOOoNSNNHN
`
`10.—Packet Intelligence denies the allegations in Paragraph 10.
`
`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 3 of 21
`
`8.
`
`Packet Intelligence admits that it entered into a settlement agreementrelated to the
`
`Patents-in-Suit with Cisco Systems, Inc. for which Packet Intelligence received monetary
`
`consideration but denies remaining allegations of Paragraph8.
`
`9.
`
`Packet Intelligence admits that it has an agreement with Russell Dietz of San Jose,
`
`California and that it has directed communications to Mr. Dietz regarding the Patents-in-Suit.
`
`PacketIntelligence also admits that it has directed communications to Joseph Maixner regarding
`
`the Patents-in-Suit. Packet Intelligence denies the remaining allegations of Paragraph 9.
`
`INTRADISTRICT ASSIGNMENT
`
`11.
`
`Packet Intelligence admits the allegations in Paragraph 11.
`
`FACTUAL ALLEGATIONS
`
`THE PATENTS-IN-SUIT
`
`12.
`
`13.
`
`14.
`
`15.
`
`16.
`
`Packet Intelligence admits the allegations in Paragraph 12.
`
`Packet Intelligence admits the allegations in Paragraph 13.
`
`‘Packet Intelligence admits the allegations in Paragraph 14.
`
`Packet Intelligence admits the allegations in Paragraph 15.
`
`Packet Intelligence admits the allegations in Paragraph 16.
`
`DISPUTE BETWEEN PALO ALTO NETWORKS AND
`
`PACKET INTELLIGENCE CONCERNING THE PATENTS-IN-SUIT
`
`17.
`
`Packet Intelligence admits the allegations in Paragraph 17.
`
`18.—_Packet Intelligence admits that Plaintiff’s counsel responded to Packet
`
`Intelligence’s letter. Except as so admitted, the allegations in Paragraph 18 are denied.
`
`19.
`
`Packet Intelligence admits that an actual and justiciable controversy exists between
`
`the parties and that Plaintiff purports to bring a declaratory judgment action of non-infringement
`
`against Packet Intelligence. However, Packet Intelligence denies that such declaratory judgment
`
`has any factual or legal basis and denies that Plaintiff is entitled to any relief.
`
`
`2697.000/1414720.1
`3
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00003
`
`Page 00003
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 4 of 21
`
`keWwNO
`
`FIRST CLAIM FOR RELIEF
`
`DECLARATORY JUDGMENT OF NON-INFRINGEMENT OF THE ’099 PATENT
`
`20.
`
`Packet Intelligence admits that Plaintiff purports to bring a declaratory judgment
`
`action of non-infringement against Packet Intelligence. However, Packet Intelligence denies that
`
`such declaratory judgmenthasany factual or legal basis and denies that Plaintiff is entitled to any
`
`relief.
`
`21.
`
`22.
`
`Packet Intelligence denies the allegations in Paragraph 21.
`
`Packet Intelligence denies the allegations in Paragraph 22.
`
`SECOND CLAIM FOR RELIEF
`
`DECLARATORY JUDGMENT OF NON-INFRINGEMENT OF THE ’725 PATENT
`
`23.
`
`Packet Intelligence admits that Plaintiff purports to bring a declaratory judgment
`
`action of non-infringement against Packet Intelligence. However, Packet Intelligence denies that
`
`such declaratory judgmenthasany factual or legal basis and denies that Plaintiff is entitled to any
`
`relief.
`
`24.
`
`25.
`
`Packet Intelligence denies the allegations in Paragraph 24.
`
`Packet Intelligence denies the allegations in Paragraph 25.
`
`THIRD CLAIM FOR RELIEF
`
`DECLARATORY JUDGMENT OF NON-INFRINGEMENT OF THE ’751 PATENT
`
`26.
`
`Packet Intelligence admits that Plaintiff purports to bring a declaratory judgment
`
`action of non-infringement against Packet Intelligence. However, Packet Intelligence denies that
`
`such declaratory judgmenthasany factual or legal basis and denies that Plaintiff is entitled to any
`
`relief.
`
`27.
`
`28.
`
`Packet Intelligence denies the allegations in Paragraph 27.
`
`Packet Intelligence denies the allegations in Paragraph 28.
`
`FOURTH CLAIM FOR RELIEF
`
`DECLARATORY JUDGMENT OF NON-INFRINGEMENT OF THE ’789 PATENT
`
`29.
`
`Packet Intelligence admits that Plaintiff purports to bring a declaratory judgment
`
`action of non-infringement against Packet Intelligence. However, Packet Intelligence denies that
`
`
`2697.000/1414720.1
`4
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00004
`
`Page 00004
`
`

`

`Case 3:19-cv-02471-WHO Document18 Filed 07/02/19 Page 5 of 21
`
`such declaratory judgmenthas any factual or legal basis and denies that Plaintiff is entitled to any
`
`relief.
`
`30.
`
`31.
`
`Packet Intelligence denies the allegations in Paragraph 30.
`
`Packet Intelligence denies the allegations in Paragraph 31.
`
`FIFTH CLAIM FOR RELIEF
`
`DECLARATORY JUDGMENT OF NON-INFRINGEMENT OF THE °646 PATENT
`
`32.
`
`Packet Intelligence admits that Plaintiff purports to bring a declaratory judgment
`
`action of non-infringement against Packet Intelligence. However, Packet Intelligence denies that
`
`such declaratory judgmenthasany factual or legal basis and denies that Plaintiff is entitled to any
`
`vAF&FWwN
`oOOoNSNNHN
`
`relief.
`
`33.
`
`34.
`
`Packet Intelligence denies the allegations in Paragraph 33.
`
`Packet Intelligence denies the allegations in Paragraph 34.
`
`PRAYER FOR RELIEF
`
`Packet Intelligence deniesall allegations of Paragraphs A through D ofPlaintiff's Prayer for
`
`Relief and further denies that any relief should be granted to Plaintiff.
`
`AFFIRMATIVE DEFENSE OF INFRINGEMENT
`
`Packet Intelligence contends that Palo Alto Networksinfringes claims of each of the
`
`Patents-in-Suit directly, as well as by inducing infringement and by contributing to infringement.
`
`Packet Intelligence reserves the right to amend its Answerto assert additional affirmative defenses
`
`as the case progresses.
`
`COUNTERCLAIMS
`
`Plaintiff Packet Intelligence LLC, by and throughits undersigned attorneys hereby
`
`demandsa jury trial and alleges the following in support of its Counterclaims for patent
`
`infringement against Palo Alto Networks:
`
`I.
`
`THE PARTIES
`
`1,
`
`PacketIntelligence LLCis a limited liability company existing under the laws of
`
`Texas since June 2012. Plaintiff maintains its principal place of business at 505 East Travis Street
`
`Suite 209, Marshall, TX 75670.
`
`
`2697.000/1414720.1
`5
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00005
`
`Page 00005
`
`

`

`Case 3:19-cv-02471-WHO Document18 Filed 07/02/19 Page 6 of 21
`
`waF&FWwNO
`oOOoNSNNHN
`
`2.
`
`Upon information and belief, Palo Alto Networks is a Delaware Corporation, with
`
`a principal place of business at 3000 Tannery Way, Santa Clara, California 95054.
`
`IL.
`
`JURISDICTION AND VENUE
`
`3.
`
`This is an action for infringement of several United States patents. Federal
`
`question jurisdiction is conferred to this Court over such action under 28 U.S.C. §§ 1331 and
`
`1338(a).
`
`4,
`
`Palo Alto Networks maintains a regular and established place of business within
`
`the Northern District of California at 3000 Tannery Way, Santa Clara, California 95054. Palo
`
`Alto Networks develops and/or sells the Accused Products, identified below, from this location.
`
`5.
`
`For these reasons, personaljurisdiction exists and Packet Intelligence contendsthat
`
`venueis proper in this Court under 28 U.S.C. §§ 1391(b) and (c).
`
`Il.
`
`THE PATENTS-IN-SUIT
`
`6.
`
`The patents-in-suit are early pioneer patents in the field of networktraffic
`
`processing and monitoring. Each of the asserted patents claim priority to provisional U.S. Patent
`
`Application No. 60/141,903 entitled “Method and Apparatus for Monitoring Traffic in a
`
`Network,”filed in the United States Patent and Trademark Office on June 30, 1999.
`
`7.
`
`Mr. Russell S. Dietz, the first listed inventor on four of the five patents-in-suit, is a
`
`recognized thought leader who publishes and lectures regularly on network data management,
`
`cloud computing and virtualization security solutions. Mr. Dietz has more than 30 years of
`
`experience in the technology and security space and has a proven record of success as Chief
`
`Technology Officer of multiple hardware, software and systems security companies, andis a
`
`recognized pioneer and innovator in cloud computing andvirtualization security solutions. He has
`
`more than 20 years of leadership and expertise anticipating trends, and evaluating new
`
`technologies in data communications, data management and Enterprise security. Mr. Dietz is an
`
`active memberofthe Internet and Engineering Task Force (IETF), Optical Internetworking Forum
`
`(OIF) and the Cloud Computing Interoperability Forum (CCIF).
`
`8.
`
`On November18, 2003, the United States Patent and Trademark Office (USPTO)
`
`duly and legally issued U.S. Patent No. 6,651,099 (“the 099 Patent”) entitled “Method and
`
`
`2697.000/1414720.1
`6
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00006
`
`Page 00006
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 7 of 21
`
`waF&FWwNO
`oOOoNSNNHN
`
`Apparatus for Monitoring Traffic in a Network.” Packet Intelligence ownsall substantial rights to
`
`the °099 Patent, including the right to sue and recover damagesforall infringement thereof.
`
`Documents assigning the ’099 Patent to Packet Intelligence were recorded at the USPTO on
`
`February 1, 2013 at Reel/Frame 29737-613. Attached hereto as Exhibit A is a true and correct
`
`copy of the ’099 Patent.
`
`9.
`
`The 099 patent has been cited as pertinent prior art by either an applicant, or a
`
`USPTO examiner, during the prosecution of more than 275 issued patents and published patent
`
`applications.
`
`10.
`
`On December 16, 2003, the USPTO duly and legally issued U.S. Patent No.
`
`6,665,725 (“the ’725 Patent”) entitled “Processing Protocol Specific Information in Packets
`
`Specified by a Protocol Description Language.” Packet Intelligence ownsall substantial rights to
`
`the ’725 Patent, including the right to sue and recover damagesforall infringement thereof.
`
`Documents assigning the ’725 Patent to Packet Intelligence were recorded at the USPTO on
`
`February 1, 2013 at Reel/Frame 29737-613. A true and correct copy of the ’725 Patent is attached
`
`hereto as Exhibit B.
`
`11.
`
`The ’725 patent has been cited as pertinentprior art by either an applicant, or a
`
`USPTO examiner, during the prosecution of more than 260 issued patents and published patent
`
`applications.
`
`12.
`
`On August 3, 2004, the USPTO duly and legally issued U.S. Patent No. 6,771,646
`
`(“the ’646 Patent”) entitled “Associative Cache Structure for Lookups and Updates of Flow
`
`Records in a Network Monitor.” Packet Intelligence ownsall substantial rights to the ’646 Patent,
`
`including the right to sue and recover damagesforall infringement thereof. Documents assigning
`
`the 646 Patent to Packet Intelligence were recorded at the USPTO on February 1, 2013 at
`
`Reel/Frame 29737-613. A true and correct copy of the ’646 Patent is attached hereto as Exhibit C.
`
`13.
`
`The °646 patent has been cited as pertinentprior art by either an applicant, or a
`
`USPTO examiner, during the prosecution of more than 170 issued patents and published patent
`
`applications.
`
`
`2697.000/1414720.1
`7
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00007
`
`Page 00007
`
`

`

`Packet Intelligence LLC v. Huawei Devices USA Inc.
`
`Page 00008
`
`

`

`Packet Intelligence LLC v. Cisco Systems, Inc.
`
`Packet Intelligence LLC v. Cisco Systems, Inc.
`
`Packet Intelligence LLC v. NetScout Systems, Inc. et al
`
`Packet Intelligence LLC v. Sandvine Corporation and Sandvine Incorporated ULC
`
`inter partes
`
`in Limine
`
`Packet Intelligence LLC v. Nokia of America Corporation,
`
`Packet Intelligence LLC v. Ericsson Inc.,
`
`inter partes
`
`Page 00009
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 10 of 21
`
`waF&FWwNO
`oOOoNSNNHN
`
`20.
`
`Palo Alto Networks has been aware ofthe status of these litigations and IPRs and
`
`of the existence and subject matter of the Asserted Patents since at least January 18, 2019, at
`
`which time PacketIntelligence sent a notice letter alleging Palo Alto Networks infringes the
`
`Asserted Patents.
`
`IV.
`
`BACKGROUND AND FACTS
`
`21.
`
`The Asserted Patents are generally directed to systems and methodsforclassifying
`
`and monitoring network traffic as well as the use of state operations and state-of-the-flow analysis
`
`to accommodate classification and monitoring of networktraffic. These innovative concepts
`
`enable classification of data packets passing through a network to provide detailed insight and
`
`information to network managers and operators. More specifically, the Asserted Patents disclose
`
`and claim improved techniques for monitoring networktraffic through, among otherthings,
`
`categorizing networktraffic into “conversational flows” — relating sequences of data packets
`
`exchanged in any direction over a network comprising multiple connections among network
`
`devices, which may beclient or server devices, based on specific application activity. This was an
`
`improvement over conventional systems and methodsfor classifying and monitoring network
`
`traffic based only on “connection flows” — data packets transmitted over a single network
`
`connection.
`
`22.
`
`Traffic classification involves detecting the underlying protocols used within a data
`
`packet, as well as the applications or user activity responsible for generating networktraffic. It
`
`also involves identifying the underlying protocols/applications of a flow along with recording
`
`traffic statistics. Such classification and monitoring provide network administrators with detailed
`
`information about their networks, which can be used to diagnose network problems, control
`
`bandwidth allocation, and ensure an appropriate quality of service for users.
`
`23.|Conventional network monitors categorized network transmissions into
`
`“connection flows.” A connection flow refers to the packets involved in a single connection and
`
`relate to a negotiated transmission between specific addresses on two devices. A connection flow
`
`correlates to the source and destination IP address/port pairs used on both ends of the connection
`
`
`2697.000/1414720.1
`10
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00010
`
`Page 00010
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 11 of 21
`
`waF&FWwNO
`oOOoNSNNHN
`
`without inspecting the packet’s payload deeper than the headersof the transport layer! containing
`
`port information. The problem with only tracking connection flowsis that certain applications and
`
`protocols may generate multiple connections. In other words, a single application may spawn
`
`multiple connections for a single activity. For example, if user A wants to have a Skypecall with
`
`user B, the Skype application may create multiple connections between computer A and B to
`
`conduct the call. There might be one connection which supplies setup information, a second
`
`connection for transmitting video information, and a third connection for transmitting audio
`
`information. Conventional network monitors would consider these three separate connections
`
`even thoughthey originated from a single Skypecall.
`
`24.
`
`The Asserted Patents improved upon these conventional network monitoring
`
`systems and methods by categorizing network transmissions into “conversational flows” rather
`
`than merely in “connection flows.” Unlike connection flow, conversational flow is the sequence
`
`of packets that are exchangedin any direction as a result of a particular activity—for instance, the
`
`running of an application on a server as requested by a client—which may include multiple
`
`connections, transmissions, or exchangesin either direction between the participants in the
`
`conversation. This addressed the problem ofdisjointed flows in network communications through
`
`“virtually concatenating,” or linking, all related conversational exchanges.
`
`25.
`
`“Conversational flows” are identified through parsing and analyzing data packets at
`
`deeper layers to extract information used to classify each data packet, determining whetherit
`
`belongsto an existing conversational flow or is part of a new conversational flow. This is
`
`accomplished, in part, by populating a parsing/extraction operations memory anda state
`
`patterns/operations and database with machine operations that implement programmable rules and
`
`instructions for inspecting packets to identify patterns forming conversational flows.
`
`26.
`
`Networktraffic is inspected for pattern recognition to determine protocol types and
`
`headers for each protocol layer. Extracted packet information is compared to stored data
`
`' The functionality underlying network communicationsis often viewed in terms of conceptual
`See
`layers, such as those defined in the 7 Layer OSI Model. See OSI Model,
`https://en.wikipedia.org/wiki/OSLmodel(visited July 27, 2018). Several different protocol
`options may be available at each layer to accomplish specific tasks needed by the layer aboveit.
`
`2697.000/1414720.1
`11
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00011
`
`Page 00011
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 12 of 21
`
`waF&FWwNO
`oOOoNSNNHN
`
`corresponding to prior network transmissions to determine whethera current transmission belongs
`
`to a knownflow comprising previously inspected transmissions. Extracted data may also be used
`
`to determinethe different states, state transitions, and/or state operations to be performed
`
`corresponding to a conversational flow to aid in predicting and/or identifying subsequent
`
`transmissions within a conversational flow and/or to determine the termination of a conversational
`
`flow. One of the many advantagesof the invention is properly analyzing the packets exchanged
`
`between a client and a server and maintaining information relevant to the current state of each of
`
`these conversational flows.
`
`27.
`
`Classifying transmissions in the context of conversational flows provides several
`
`benefits over conventional network monitoring systems and methods, including accommodation
`
`of: more flexible and effective stateful firewall operations to permit network operators greater
`
`flexibility in configuring network security policies; more robust understanding of the quality of
`
`service (“QoS”) and bandwidth usage of a multiple connection flow application whereby certain
`
`networktraffic could be excluded from data usage limits, bandwidth throttling may be applied to
`
`specific applications or services, and access to certain web browser applications may berestricted
`
`at specified times; and, eavesdropping or lawful interception, by cloningall of thetraffic of a
`
`conversational flow, which allows another user on the network, or elsewhere, to read the content
`
`exchanged overthe network without the knowledge of the original recipient.
`
`V.
`
`THE ACCUSED PRODUCTS
`
`28.
`
`The “Accused Products” include Palo Alto Networks products, such as firewall
`
`products that include the App-ID feature other similar functionality. These products include, but
`
`are not limited to: PA-Series Firewall products (PA-200, PA-220, PA-220R, PA-7000, PA-7050,
`
`PA-7080; VM-Series Firewall products (VM-50, VM-100, VM-300, VM-500, VM-700) and
`
`K2-Series Firewall Products.
`
`29.
`
`The App-ID feature of the Accused Products allows inspection of packets at layers
`
`3-7 of the OSI model to allow identification of a protocol associated with the packet and to
`
`determine the particular application associated with the packet. Palo Alto Networks’
`
`documentation describes this capability as shown below:
`
`
`2697.000/1414720.1
`12
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00012
`
`Page 00012
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 13 of 21
`
`waWwNO
`oOOoNSNNHN
`
`App-ID™ uses as manyas four identification techniques to
`determine the exact identity of applications traversing the
`network—irrespective of port, protocol, evasive tactic, or
`SSL encryption. Identifying the application is the very first
`task performed by App-ID, providing administrators with
`the greatest amount of application knowledge and the
`most flexibility in terms of safe application.
`
`See “App-ID Technology Brief”, at p. 1, which can be found at the URL:
`
`https://media.paloaltonetworks.com/documents/techbrief-app-id.pdf.
`
`30.
`
`A flow chart of the process by which the Accused Products identify the application
`
`— oS
`
`to which a is shown below in Palo Alto Networks’ documentation shown below:
`
`App-ID
`
`KNOWN PROTOCOL DECODER
`
`olde
`
`Check
`Signatures
`
`oc”
`Check
`Policy
`
`)
`
`Check —j»U= Check Application —pU©———ye IDENTIFIED TRAFFIC (NO DECODING)
`
`Decryption
`(SSL or SSH)
`Start
`3s
`5
`|
`6
`
`IP/Port
`Signatures

`
`
`
`eePolicyCheck
`
`UNKNOWN PROTOCOL DECODER
`
`ApplyHeuristics —>= _
`
`Policy
`
`Check
`
`|
`
`REPORT & ENFORCE POLICY
`
`See “App-ID Technology Brief”, at p. 1.
`
`31.
`
`The flow chart showsseveral decision points during the processing of a packet in
`
`the App-ID feature. The Accused Products can be used to implement Quality of Service (“QOS”)
`
`policies that are applied to packets based on the application that is identified. A network operator
`
`using the Accused Products can set QOSpolicies that can limit the bandwidth for certain
`
`applications during peak hours or prioritize packets associated with applications requiring more
`
`bandwidth, e.g., streaming video.
`
`
`2697.000/1414720.1
`13
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00013
`
`Page 00013
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 14 of 21
`
`COUNTI
`PATENT INFRINGEMENT
`U.S. Patent No. 6,651,099
`
`waF&FWwNO
`oOOoNSNNHN
`
`32.
`
`PacketIntelligence realleges paragraphs 1 through 31 as though fully set forth
`
`herein.
`
`33.
`
`Palo Alto Networkshas infringed directly and continues to infringe directly, either
`
`literally or under the doctrine of equivalents, at least claim 1 of the °099 Patent by its manufacture,
`
`sale, offer for sale, and use of any one or more of the Accused Products. Palo Alto Networksis
`
`therefore liable for infringement of the 099 Patent pursuant to 35 U.S.C. § 271.
`
`34.
`
`As of the time Palo Alto Networksfirst had notice of Counterclaimant’s allegations
`
`of infringement of one or more claimsof the °099 Patent by Palo Alto Networks, which is no later
`
`than the date of the notice letter sent by Packet Intelligence on January 18, 2019, Palo Alto
`
`Networksindirectly infringed and continuesto indirectly infringe at least claim 1 of the ’099
`
`Patent by active inducement under 35 U.S.C. § 271(b). Palo Alto Networks has induced, caused,
`
`urged, encouraged, aided and abetted its direct and indirect customers to make,use,sell, offer for
`
`sale and/or import one or more of the Accused Products, and thus indirectly infringes at least
`
`claim 1 of the °099 Patent. Palo Alto Networks has doneso by acts including but not limited to
`
`(1) selling such products including features that—when used or resold—infringe,either literally or
`
`under the doctrine of equivalents, the ’099 Patent; (2) marketing the infringing capabilities of such
`
`products; and (3) providing instructions, technical support, and other support and encouragement
`
`for the use of such products, including at least the documents referenced above. Such conduct by
`
`Palo Alto Networks was intended to and actually did result in direct infringement by Palo Alto
`
`Networks’ direct and indirect customers, including the making, using,selling, offering for sale
`
`and/or importation of the Accused Products in the United States.
`
`35.
`
`Palo Alto Networks’ infringement of the ’099 Patent has damaged Packet
`
`Intelligence, and Palo Alto Networksis liable to Packet Intelligence in an amount to be determined
`
`at trial that compensates Packet Intelligence for the infringement, which by law can be no less than
`
`a reasonableroyalty.
`
`
`2697.000/1414720.1
`14
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00014
`
`Page 00014
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 15 of 21
`
`36.
`
`Asofthe time Palo Alto Networksfirst had notice of the ’099 Patent, at least as
`
`early as January 18, 2019, Palo Alto Networks has continued with its infringement despite the
`
`objectively high likelihood that its actions constitute infringement and Palo Alto Networks’
`
`subjective knowledge of this obvious risk. As Palo Alto Networks has no goodfaith belief that it
`
`does not infringe the ’099 Patent, at least Palo Alto Networks’ continued infringement of the ’099
`
`Patent is willful and deliberate, entitling Packet Intelligence to increased damages under 35 U.S.C.
`
`§ 284 and to attorneys’ fees and costs incurred in prosecuting this action under 35 U.S.C. § 285.
`
`waF&FWwNO
`oOOoNSNNHN
`
`COUNTI
`PATENT INFRINGEMENT
`U.S. Patent No. 6,665,725
`
`37.
`
`Packet Intelligence realleges paragraphs | through 36 as though fully set forth
`
`herein.
`
`38.
`
`Palo Alto Networkshas infringed directly and continues to infringe directly, either
`
`literally or under the doctrine of equivalents, at least claim 17 of the ’725 Patent byits
`
`manufacture, sale, offer for sale, and use of any one or more of the Accused Products. Palo Alto
`
`Networksis therefore liable for infringement of the °725 Patent pursuant to 35 U.S.C. § 271.
`
`39.
`
`As of the time Palo Alto Networksfirst had notice of Counterclaimant’s allegations
`
`of infringement of one or more claims of the ’725 Patent by Palo Alto Networks, at least as early as
`
`January 18, 2019, Palo Alto Networksindirectly infringed and continues to indirectly infringe at
`
`least claim 17 of the ’725 Patent by active inducement under 35 U.S.C. § 271(b). Palo Alto
`
`Networks has induced, caused, urged, encouraged, aided and abetted its direct and indirect
`
`customers to make, use, sell, offer for sale and/or import one or more of the Accused Products,
`
`and thusindirectly infringes at least claim 17 of the °725 Patent. Palo Alto Networks has done so
`
`by acts including but not limited to (1) selling such products including features that—when used
`
`or resold—infringe, either literally or under the doctrine of equivalents, the °725 Patent; (2)
`
`marketing the infringing capabilities of such products; and (3) providing instructions, technical
`
`support, and other support and encouragementfor the use of such products, includingat least the
`
`documents referenced above. Such conduct by Palo Alto Networks was intended to and actually
`
`did result in direct infringement by Palo Alto Networks’ direct and indirect customers, including
`
`
`2697.000/1414720.1
`15
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00015
`
`Page 00015
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 16 of 21
`
`waF&FWwNO
`oOOoNSNNHN
`
`the making, using, selling, offering for sale and/or importation of the Accused Products in the
`
`United States.
`
`40.
`
`Palo Alto Networks’ infringement of the °725 Patent has damaged Packet
`
`Intelligence, and Palo Alto Networksis liable to Packet Intelligence in an amount to be determined
`
`at trial that compensates Packet Intelligence for the infringement, which by law can be no less than
`
`a reasonableroyalty.
`
`Al,
`
`Asofthe time Palo Alto Networksfirst had notice of the ’°725 Patent, at least as
`
`early as January 18, 2019, Palo Alto Networks has continued with its infringement despite the
`
`objectively high likelihood that its actions constitute infringement Palo Alto Networks’ subjective
`
`knowledge of this obvious risk. As Palo Alto Networks has no goodfaith belief that it does not
`
`infringethe ’725 Patent, at least Palo Alto Networks’ continued infringementof the ’725 Patentis
`
`willful and deliberate, entitling Packet Intelligence to increased damages under 35 U.S.C. § 284
`
`and to attorneys’ fees and costs incurred in prosecuting this action under 35 U.S.C.§ 285.
`
`COUNTIII
`PATENT INFRINGEMENT
`U.S. Patent No. 6,771,646
`
`42.
`
`Packet Intelligence realleges paragraphs 1 through 41 as thoughfully set forth
`
`herein.
`
`43.
`
`Palo Alto Networks has infringed directly and continuesto infringe directly, either
`
`literally or under the doctrine of equivalents, at least claim 7 of the °646 Patent by its manufacture,
`
`sale, offer for sale, and use of any one or more of the Accused Products. Palo Alto Networksis
`
`therefore liable for infringement of the ’646 Patent pursuant to 35 U.S.C. § 271.
`
`44.
`
` Asofthe time Palo Alto Networksfirst had notice of Counterclaimant’s allegations
`
`of infringement of one or more claimsof the °646 Patent by Palo Alto Networks, which is no later
`
`than the January 18, 2019, Palo Alto Networks indirectly infringed and continuesto indirectly
`
`infringe at least claim 7 of the °646 Patent by active inducement under 35 U.S.C. § 271(b). Palo
`
`Alto Networks has induced, caused, urged, encouraged, aided and abettedits direct and indirect
`
`customers to make, use, sell, offer for sale and/or import one or more of the Accused Products,
`
`and thus indirectly infringes at least claim 7 of the ’646 Patent. Palo Alto Networks has done so
`
`
`2697.000/1414720.1
`16
`Case No. 3:19-cv-02471-WHO
`DEFENDANT PACKET INTELLIGENCE LLC’S ANSWER AND COUNTERCLAIMS
`
`Page 00016
`
`Page 00016
`
`

`

`Case 3:19-cv-02471-WHO Document 18 Filed 07/02/19 Page 17 of 21
`
`waF&FWwNO
`oOOoNSNNHN
`
`by acts including but not limited to (1) selling such products including features that—when used
`
`or resold—infringe, either literally or under the doctrine of equivalents, the °646 Patent; (2)
`
`marketing the infringing capabilities of such products; and (3) providing instructions, technical
`
`support, and other support and encouragementfor the use of such products, includingat least the
`
`documents referenced above. Such conduct by Palo Alto Networks was intended to and actually
`
`did result in direct infringement by Palo Alto Networks’ direct and indirect customers, including
`
`the making, using, selling, offering for sale and/or importation of the Accused Products in the
`
`United States.
`
`45.
`
`Palo Alto Networks’ infringementof the ’646 Patent has damaged Packet
`
`Intelligence, and Palo Alto Networksis liable to Packet Intelligence in an amount to be determined
`
`at trial that compensates Packet Intelligence for the infringement, which by law can be no less than
`
`a reasonableroyalty.
`
`46.
`
`Asofthe time Palo Alto Networksfirst had notice of the ’646 Patent, at least as
`
`early as January 18, 2019 2017, Palo Alto Networks has continued with its infringement despite
`
`the objectively high likelihood that its actions constitute infringement and Palo Alto Networks’
`
`subjective knowledge of this obvious risk. As Palo Alto Networks has no goodfaith belief that it
`
`does not infringe the ’646 Patent, at least Palo Alto Networks’ continued infringementof the ’646
`
`Patent is willful and deliberate, entitling Packet Intelligence to increased damages under 35 U.S.C.
`
`§ 284 and to attorneys’ fees and costs incurred in prosecuting this action under 35 U.S.C. § 285.
`
`COUNT IV
`PATENT INFRINGEMENT
`U.S. Patent No. 6,839,751
`
`47.
`
`Packet Intelligence realleges paragraphs 1 through 46 as thoughfully set forth
`
`herein.
`
`48.
`
`Palo Alto Networks has infringed directly and continuesto infringe directly, either
`
`literally or under the doctrine of equivalents, at least claim 17

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket