`
`MICHAEL FRANZ
`
`NETSKOPE, INC.
`
`vs.
`
`FORTINET, INC.
`
`
`
`
`
`May 10, 2024
`
`Volume II
`
`
`
`
`
`Fortinet Ex. 2017, Page 1 of 48
`
`Fortinet Ex. 2017, Page 1 of 48
`
`
`
`· · · · UNITED STATES PATENT AND TRADEMARK OFFICE
`
`· · · · ·BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`NETSKOPE, INC.,· · · · · · ·)
`· · · · · · · · · · · · · · )
`· · · · · · Petitioner,· · ·) PTAB Case No. IPR2023-00459
`· · · · · · · · · · · · · · )
`· · · · · · ·vs.· · · · · · ) Patent No. 10,084,825
`· · · · · · · · · · · · · · )
`FORTINET, INC.,· · · · · · ·)
`· · · · · · · · · · · · · · )
`· · · · · · Patent Owner.· ·)
`____________________________)
`
`· · · · · · · ·DEPOSITION OF MICHAEL FRANZ
`
`· · · · · · · · · · · · ·VOLUME II
`
`· · · · · · · · · Sacramento, California
`
`· · · · · · · · · ·Friday, May 10, 2024
`
`· · · · · · · REPORTED BY:· Matthew Sculatti
`· · · · · · · · · · · · · · CSR No. 13558
`
`Fortinet Ex. 2017, Page 2 of 48
`
`
`
`· · · · UNITED STATES PATENT AND TRADEMARK OFFICE
`
`· · · · ·BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`NETSKOPE, INC.,· · · · · · ·)
`· · · · · · · · · · · · · · )
`· · · · · · Petitioner,· · ·) PTAB Case No. IPR2023-00459
`· · · · · · · · · · · · · · )
`· · · · · · ·vs.· · · · · · ) Patent No. 10,084,825
`· · · · · · · · · · · · · · )
`FORTINET, INC.,· · · · · · ·)
`· · · · · · · · · · · · · · )
`· · · · · · Patent Owner.· ·)
`____________________________)
`
`· · ·Deposition of MICHAEL FRANZ, VOLUME II, taken before
`
`Matthew Sculatti, a Certified Shorthand Reporter for the
`
`State of California, commencing at 1:26 P.M.,
`
`Friday, May 10, 2024.· This deposition was reported
`
`remotely.
`
`Fortinet Ex. 2017, Page 3 of 48
`
`
`
`APPEARANCES:
`
`· · FOR THE PETITIONER:
`
`· · · · ·PERKINS COIE LLP
`
`· · · · ·BY:· THOMAS MILLIKAN, ATTORNEY AT LAW
`
`· · · · ·BY:· KAY LI, ATTORNEY AT LAW
`
`· · · · ·11452 El Camino Real
`
`· · · · ·Suite 300
`
`· · · · ·San Diego, California 92130-2080
`
`· · · · ·TEL:· (858) 720-5700
`
`· · · · ·FAX:· (858) 720-5799
`
`· · · · ·tmillikan@perkinscoie.com
`
`· · · · ·bli@perkinscoie.com
`
`· · FOR THE PATENT OWNER:
`
`· · · · ·QUINN EMANUEL URQUHART & SULLIVAN, LLP
`
`· · · · ·BY:· QUINCY LU, ATTORNEY AT LAW
`
`· · · · ·865 South Figueroa Street
`
`· · · · ·10th Floor
`
`· · · · ·Los Angeles, California 90017
`
`· · · · ·TEL:· (213) 443-3717
`
`· · · · ·FAX:· (213) 443-3100
`
`· · · · ·quincylu@quinnemanuel.com
`
`Fortinet Ex. 2017, Page 4 of 48
`
`
`
`· · · · · · · · · · · · I N D E X
`
`WITNESS· · · · · · · · ·EXAMINATION· · · · · · · · · ·PAGE
`
`MICHAEL FRANZ· · · · · ·By Mr. Lu· · · · · · · · · · · ·85
`
`· · · · · · · · · · ·E X H I B I T S
`
`EXHIBIT· · · · DESCRIPTION· · · · · · · · · · · · · · PAGE
`
`Exhibit 1019· ·Rebuttal Declaration of Michael Franz· ·114
`· · · · · · · ·in Support of Petitioner's Reply to
`· · · · · · · ·Patent Owner's Response
`
`Fortinet Ex. 2017, Page 5 of 48
`
`
`
`· · · Sacramento, California; Friday, May 10, 2024;
`
`· · · · · · · · · · · · ·1:26 P.M.
`
`· · · · · · · · · · · MICHAEL FRANZ,
`
`having been administered an oath, was examined and
`
`testified as follows:
`
`· · · · · · · · · · · ·EXAMINATION
`
`BY MR. LU:
`
`· · Q· · Good afternoon, Dr. Franz.
`
`· · A· · Good afternoon.
`
`· · Q· · You have been previously deposed in this case;
`
`correct?
`
`· · A· · Yes, that's true.
`
`· · Q· · And since then, you submitted a supplemental
`
`declaration --
`
`· · A· · Yes.
`
`· · Q· · -- in this case?
`
`· · A· · Yes.
`
`· · Q· · And so you understand you're here today to
`
`testify about that supplemental declaration?
`
`· · A· · Yes.
`
`· · Q· · Okay.· In terms of this deposition today, did you
`
`do anything to prepare for it?
`
`· · A· · I -- I reread some of the documents, most
`
`Fortinet Ex. 2017, Page 6 of 48
`
`
`
`importantly my -- you know, obviously, the supplemental
`
`declaration and some of the other -- other documents.· So
`
`the paralegal at Perkins Coie sent me a full folder of the
`
`pleadings and exhibits that I actually have in front of me
`
`right now on my computer.
`
`· · Q· · Okay.· So you have hard copies of --
`
`· · A· · Not hard copies.· I have -- I have soft copies.
`
`I -- I didn't print them out.
`
`· · Q· · I see.· Okay.· So you have -- on your computer,
`
`you have copies of all of the exhibits, including your
`
`declarations in this case?
`
`· · A· · Yes.· So I don't know if it's all the exhibits,
`
`but it's -- I believe it's the full set, yes.· And -- and
`
`they came -- they came directly from the law firm. I
`
`haven't actually looked at every single one of them.
`
`· · Q· · Okay.· I -- I assume you have the relevant --
`
`the -- the important ones.· And if you don't, we -- I can
`
`upload the exhibit.
`
`· · · · ·Did you meet with anybody to prepare for today's
`
`deposition?
`
`· · A· · I met with the two attorneys that you see present
`
`right now from Perkins Coie yesterday.
`
`· · Q· · And so that would be Ms. Li and Mr. Millikan?
`
`· · A· · Correct.
`
`· · Q· · And how long did you meet with them yesterday?
`
`Fortinet Ex. 2017, Page 7 of 48
`
`
`
`· · A· · Oh, perhaps an hour and 15 minutes.
`
`· · Q· · And did you meet with anybody before yesterday to
`
`prepare for this deposition?
`
`· · A· · For this deposition, no.
`
`· · Q· · Okay.· And do you have any notes in front of you,
`
`whether physical or, you know, on your computer?
`
`· · A· · No.
`
`· · Q· · And you don't have any other applications open
`
`besides Zoom and whatever PDF viewer you're using?
`
`· · A· · Correct.· I think I may have -- on -- on another
`
`screen, I have my e-mail open.· I closed that right now
`
`because I needed the link in order to join you.· Okay.
`
`It's closed now.
`
`· · Q· · Okay.· That's fine.
`
`· · · · ·Now, Dr. Franz, you are here as an expert in the
`
`field of computer networking; correct?
`
`· · A· · I'm here as an -- as an -- as an expert on the
`
`field of computer security networking and other fields
`
`that's relevant to this -- to this proceeding, yes.
`
`· · Q· · And -- and computer networking is one of the
`
`fields that's relevant to this proceeding; correct?
`
`· · A· · Well, computer network security is.· We have --
`
`we have this discussion previously, whether distributed
`
`computing was -- was -- was relevant.· So my expertise is
`
`in network security and related systems software.
`
`Fortinet Ex. 2017, Page 8 of 48
`
`
`
`· · Q· · Okay.· And -- and how long have you been an
`
`expert in network security?
`
`· · A· · So I mean, for many years I published in the --
`
`the main conference on -- on Network and Distributed
`
`Systems Symposium maybe for ten years.· I -- I would have
`
`to look at my -- my -- my resume.· But much of my research
`
`has been informed in the space of either, you know,
`
`distributing computations between client server systems;
`
`you know, having mobile devices in networks where some of
`
`the work was offloaded to servers; and then the whole
`
`problem of keeping these devices secured in the possible
`
`presence of malware moving via the network; and some other
`
`things.· So if you look at that, it's probably 20 years
`
`that I've been working in this -- in this space.
`
`· · Q· · And -- and when did you graduate college or
`
`university?
`
`· · A· · So I am actually year '94.· And my master's
`
`degree in '89.
`
`· · Q· · And what were -- what subjects were your PhD
`
`or -- and your master's?
`
`· · A· · So my -- I actually built one of the very first
`
`mobile code systems, where you had programs that you
`
`compiled to a -- you know, a machine-independent
`
`representation that moved across the network and at the
`
`other -- you know, at the other side, was dynamically
`
`Fortinet Ex. 2017, Page 9 of 48
`
`
`
`recreated.· So I built one of the very first portable code
`
`systems about two years before Java was introduced.
`
`· · Q· · I see.· So you -- you've been -- so you just
`
`testified that this project you worked on involved
`
`computer networks; correct?
`
`· · A· · So which project?· Excuse me, again.
`
`· · Q· · This, what you called, the very first mobile code
`
`system.· You mentioned it involved a machine-independent
`
`representation --
`
`· · A· · So --
`
`· · Q· · -- that moved across the network?
`
`· · A· · So --
`
`· · Q· · Does this project involve computer networking?
`
`· · A· · My PhD project?
`
`· · Q· · Yes?
`
`· · A· · My PhD project was -- was based on the -- on
`
`the -- on the machine-independent representation.· The
`
`idea there was -- was -- was that you could get
`
`portability for free.· At the time, you know, the -- the
`
`system that I built initially was just the -- the fact
`
`that you could take a -- a portable format and generate it
`
`for a specific computer.· I actually demonstrated this by
`
`doing it from a -- from a disc, reading it from a disc and
`
`doing it.· But very soon afterwards, like two years later,
`
`Java came.· And then this whole -- so that would have been
`
`Fortinet Ex. 2017, Page 10 of 48
`
`
`
`in 1996.
`
`· · · · ·And from then onwards, obviously, the whole game
`
`became mobile code that moves across computer networks.
`
`So if you look at my publication history, there's going to
`
`be some work about how do you make sure that a program
`
`that moves across a mobile network doesn't cause harm to
`
`the target computer; all right?· That's still a problem
`
`today.
`
`· · Q· · Okay.· And so for your PhD project, did it
`
`involve building a computer network?
`
`· · A· · My PhD program did not involve building a
`
`computer network, no.
`
`· · Q· · Did it involve using a computer network?
`
`· · A· · The actual PhD project did not.
`
`· · Q· · Okay.· Let me ask it this way:· How long have you
`
`been familiar with computer networks?
`
`· · A· · A long time.
`
`· · Q· · Over --
`
`· · A· · Yes.
`
`· · Q· · Over 30 years?
`
`· · A· · I was certainly using computer networks when I
`
`was still a graduate student.· And -- and after that, yes.
`
`· · Q· · And what years were you a graduate student?
`
`· · A· · I was a graduate student between '89 and '94.
`
`· · Q· · And while you were a graduate student or, you
`
`Fortinet Ex. 2017, Page 11 of 48
`
`
`
`know, earlier or even a little bit later, did you build
`
`any computer networks?
`
`· · A· · I did not build a computer network, no.· What do
`
`you even mean by building a computer network?· Do you mean
`
`putting the cables together?· Do you mean installing the
`
`software?· Do you mean -- what exactly are you -- are you
`
`referring to about that?
`
`· · Q· · Well, I mean, I was pretty young in the 1990s; so
`
`I'm not too familiar with how networks worked at that
`
`time, but whatever definition.· So -- so we can go with
`
`the first one, putting the cables together.
`
`· · · · ·Is that something that you did in the 1990s or
`
`even in the early 2000s?
`
`· · A· · I would probably have plugged computers into --
`
`into -- into switches and cabled my -- my computer to
`
`something, yes.· But I wouldn't call that building a
`
`network necessarily, yes.
`
`· · Q· · I see.· What -- what would you call that then?
`
`· · A· · Connecting to a network.· I mean, obviously,
`
`you're talking about my graduate-student days.· I mean,
`
`definitely in the years later, you know, I have been
`
`working on projects that were deeply involved in trying to
`
`make networks of computers work better together.
`
`· · Q· · All right.· So in these networks that you at
`
`least were familiar with in the '90s or early 2000s, what
`
`Fortinet Ex. 2017, Page 12 of 48
`
`
`
`were some of the components that would have been involved
`
`or would have been part of that network?
`
`· · A· · So the interesting thing is actually that, since
`
`you talked about my graduate-student days, in my
`
`graduate-student days, we actually -- I was a student at
`
`ETH Zurich.· And my advisor was a very famous man who just
`
`passed away last year.· And we actually had a total
`
`computer infrastructure that was built in-house.· So we
`
`did actually not use a standard network.
`
`· · · · ·We actually used computers that were called Ceres
`
`that were built by some other grad students.· And we ran
`
`our own operating system, and we ran our own physical
`
`hardware to do the networking.· And we programmed our own
`
`networking stack.· It's just that I wasn't the person
`
`doing that, but other grad students were.· It was a -- not
`
`a standard off-the-shelf computing environment, but it was
`
`actually an entirely in-house built environment from the
`
`hardware all the way up to the programming language and
`
`the operating system, including the networking stack.
`
`· · Q· · Okay.· Would you agree that in the 1990s, one of
`
`the standard ways -- or one of the standard types of
`
`networks was an Ethernet network?
`
`· · A· · I -- I agree that one of the standards was an
`
`Ethernet network.· We were not using Ethernet at the time.
`
`· · Q· · Are you familiar with Ethernet networks?
`
`Fortinet Ex. 2017, Page 13 of 48
`
`
`
`· · A· · I'm familiar with Ethernet networks, yes.
`
`· · Q· · Were you familiar with Ethernet networks in the
`
`'90s or early 2000s?
`
`· · A· · Yes.
`
`· · Q· · So in an Ethernet network, what would be some of
`
`the components that made up that network?
`
`· · A· · What do you mean by "components"?· What --
`
`· · Q· · Well, physical hardware.· What would be some of
`
`the physical hardware that made up an Ethernet network in
`
`the 1990s or early 2000s?
`
`· · A· · As far as the -- the -- you know, the -- the
`
`consumer, you had -- you had an Ethernet card somewhere in
`
`your -- in your computer that at that time was -- might
`
`have been a -- a discrete piece of hardware that you
`
`plugged into a board somewhere.· And then you attach an
`
`Ethernet cable, and you might have had a switch or
`
`something that you plugged the other end of the cable
`
`into.
`
`· · Q· · Okay.· What is a switch?
`
`· · A· · A switch is a -- a box that -- that switches
`
`connection -- you know, that has multiple devices it plugs
`
`into.· And it routes traffic from one end to another -- to
`
`another end.
`
`· · Q· · Okay.· I'm not sure if it actually does any
`
`routing.· But putting that aside, did routers exist in the
`
`Fortinet Ex. 2017, Page 14 of 48
`
`
`
`1990s and early 2000s for Ethernet networks?
`
`· · A· · Yeah.· I think we were using routers and switches
`
`pretty -- sometimes interchangeably; so -- so both of
`
`these existed, yes.
`
`· · Q· · And what about hubs?· Have you ever heard that?
`
`An Ethernet hub?
`
`· · A· · I've -- I've heard that term, yes.
`
`· · Q· · So besides hubs, switches, or routers, or the
`
`Ethernet cards in a client device, were there any other
`
`sort of physical components that were commonly used in an
`
`Ethernet network?
`
`· · A· · Specifically on an Ethernet network?
`
`· · Q· · Yeah?
`
`· · A· · I mean, I don't know what -- what exactly you're
`
`getting at.
`
`· · Q· · Which -- which part of my question did you not
`
`understand?
`
`· · A· · What other kind of device are you -- are you --
`
`are you -- are you looking for?
`
`· · Q· · I'm not -- I'm -- I'm asking you if there were
`
`any other sort of devices.· If you can't think of any,
`
`then you can say that.
`
`· · A· · Okay.· I -- if you're -- you're asking about
`
`Ethernet in the 1990s, so that's a -- a long time ago.
`
`Yes.
`
`Fortinet Ex. 2017, Page 15 of 48
`
`
`
`· · Q· · Okay.· So let me -- let me just clarify.· So
`
`you've identified switches, routers, Ethernet cards, and a
`
`client device.· I mentioned hubs.· And I'm just trying to
`
`figure out if there's anything else -- any other sort of
`
`physical component that was commonly used in an Ethernet
`
`network in the '90s or early 2000s.· Do you know if there
`
`was?
`
`· · A· · I -- I would have to look into that.· It was a
`
`long time ago.· I'm not quite sure how that relates to --
`
`to this case, but -- but, you know, that was a time when
`
`there was still lots of different networking technologies
`
`that -- that coexisted.· So...
`
`· · Q· · Okay.· So you said --
`
`· · A· · I --
`
`· · Q· · Oh, go ahead.
`
`· · A· · Yeah.· I mean --
`
`· · Q· · Sorry.
`
`· · A· · So at that time, you know, I had an office.· And
`
`I -- I had a computer that -- that I connected to -- to --
`
`to an Ethernet.· And -- and some of the other
`
`infrastructure was managed by other people.
`
`· · Q· · So just talking about Ethernet networks, if you
`
`wanted to network more -- like, three or more client
`
`devices together, could you do that without a switch or a
`
`router or a similar piece of hardware?
`
`Fortinet Ex. 2017, Page 16 of 48
`
`
`
`· · A· · So -- say that again.· Ask the question again,
`
`please.
`
`· · Q· · Let me -- let me clarify.· So just talking about
`
`Ethernet networks in the '90s or early 2000s.· If you
`
`wanted to have three client devices on the same network
`
`and each one only has a single Ethernet card, would you be
`
`able to put them on the same network without using a
`
`switch or a router or a hub or a similar piece of
`
`hardware?
`
`· · A· · Yeah.· I believe the -- the early Ethernets,
`
`right -- they were -- they actually used a common -- a
`
`common box.· But, you know, I think by the time that
`
`you're talking, most of the Internet was already switched
`
`to Ethernet.
`
`· · Q· · Okay.· So -- sorry.· Was that a yes or a no?
`
`· · A· · There were specific networks where it was an --
`
`an open bus, and -- yes.· And so people -- people
`
`talked -- that was the whole point of the original
`
`Ethernet, that you would actually listen to see if there
`
`was any traffic.· And you would -- you would talk on the
`
`network.· And only -- and only one person could talk at
`
`the same time.· And if there was a collision, then there
`
`was a backup scheme where -- where people -- where the --
`
`the computers would -- would randomly wait to -- so
`
`hopefully, someone would -- would then start talking
`
`Fortinet Ex. 2017, Page 17 of 48
`
`
`
`and -- and have the -- have the bus to themselves, the
`
`bandwidth.· But -- but, obviously, the -- the shared
`
`resources limited the throughput so people moved away from
`
`that quite early.· Now you're talking about a quite
`
`specific technology that hasn't been used in a long time.
`
`· · Q· · Would you agree that networks today are more
`
`complicated than the networks that we were discussing from
`
`the 1990s or early 2000s?
`
`· · · · ·MS. LI:· Objection.· Form.
`
`· · · · ·THE WITNESS:· Yeah.· What -- can you define what
`
`"complicated" is?
`
`BY MR. LU:
`
`· · Q· · Do you have an understanding of network
`
`complexity?
`
`· · A· · There's -- there's many different dimensions of
`
`network complexity.· I mean, certainly, we have more
`
`devices today.
`
`· · Q· · Okay.· Besides more devices, are there any other
`
`dimensions of network complexity?
`
`· · A· · I mean, we have -- we have more diversity on the
`
`networks.· We have more devices.· We have different
`
`networking technologies that coexist.· We have devices
`
`that move.· You know, they are -- they are on the network
`
`somewhere.· And then they disappear, and they appear
`
`somewhere totally different because someone has unplugged
`
`Fortinet Ex. 2017, Page 18 of 48
`
`
`
`a laptop and plugged it in somewhere else.· There are --
`
`there are lots of things that, you know, the scale --
`
`everything -- so many more devices on networks.· So yes,
`
`there's more stuff going on.
`
`· · Q· · So you said -- I believe you said we have more
`
`diversity on the networks.· What did you mean by that?
`
`· · A· · So we have people -- we have devices that connect
`
`Wi-Fi.· We have devices that connect via cellular
`
`networks.· We have mobile phones.· We have tablets.· We
`
`have mainframes.· We have -- you know, there's -- there
`
`are more different devices that are networked than there
`
`were.
`
`· · Q· · I see.
`
`· · · · ·And you also said we have more devices.· Now, I
`
`assume you're talking about we have numerically more
`
`devices supported in networks; is that correct?
`
`· · A· · For the total number of network devices is
`
`probably larger than the number of people on this planet
`
`by several factors.· Several factors, yes.
`
`· · Q· · And -- and so just to clarify, in networks today,
`
`they tend to be larger, have more devices than networks
`
`from the 1990s to early 2000s; is that what you're saying?
`
`· · · · ·MS. LI:· Objection.· Form.
`
`· · · · ·THE WITNESS:· So I was talking about the total
`
`devices in the world that are networked; all right?· So
`
`Fortinet Ex. 2017, Page 19 of 48
`
`
`
`these are -- these are on -- on different networks.· And
`
`those networks themselves are then interconnected.
`
`BY MR. LU:
`
`· · Q· · Okay.· And so you also said we have, you know, a
`
`diversity of devices including like Wi-Fi and mobile
`
`phones and tablets and mainframes.
`
`· · · · ·Are there physical components that have to -- or
`
`that are -- not have to -- let me withdraw.
`
`· · · · ·So you said there was a diversity of devices,
`
`including Wi-Fi and mobile phones and tablets and
`
`mainframes.· Do networks today use physical components to
`
`handle that diversity of devices?
`
`· · A· · Okay.· So first of all, Wi-Fi is not a -- is not
`
`a -- not a kind of device.· So -- so there's a diversity
`
`of connection techniques, which include, you know, mobile
`
`networks and Wi-Fi.· There's a diversity of devices, which
`
`includes mobile phones, tablets, and these devices.
`
`And -- what is the second part of your question?
`
`· · Q· · The second part is do networks today use physical
`
`components to handle this diversity of devices or
`
`connection types?
`
`· · A· · That's a very vague question.· So -- so, you
`
`know -- so networks have been -- have been, obviously,
`
`trying to -- to keep up with the number of devices, yes.
`
`· · Q· · I mean, earlier we were talking about hubs and
`
`Fortinet Ex. 2017, Page 20 of 48
`
`
`
`switches and routers.· Are there other types of physical
`
`components used in today's networks to handle the
`
`diversity of devices and networking protocols?
`
`· · A· · Well, for example, if you have a wireless device
`
`and you need a base station to connect that wireless
`
`device somehow; right?· So there's -- there's
`
`corresponding infrastructure for the different networking
`
`technologies.
`
`· · Q· · And if you wanted to give a label to the physical
`
`components of the infrastructure, what label would you
`
`give it?
`
`· · A· · I'm not sure I understand your question.· What do
`
`you mean by "label"?
`
`· · Q· · Well, so there's hardware and the infrastructure.
`
`And then there's client devices that connect to the
`
`infrastructure.
`
`· · · · ·Is there like a term that we can use to call that
`
`hardware and infrastructure?
`
`· · A· · I -- I just called it infrastructure; right?· So
`
`for each different kind of technology, you would have a
`
`different kind of infrastructure.· So for example, for
`
`a -- for my Wi-Fi network, I call it a base station.
`
`· · Q· · Does it make sense to call them network
`
`appliances?
`
`· · A· · I would -- I do not believe that, you know, a
`
`Fortinet Ex. 2017, Page 21 of 48
`
`
`
`mobile phone provider would call their cell tower a -- a
`
`network appliance.
`
`· · Q· · Okay.· But would --
`
`· · A· · I would -- I would be surprised if they did.
`
`· · Q· · Okay.· But what about like a Wi-Fi router?· Would
`
`that be a network appliance?
`
`· · A· · Okay.· I mean, I'm sure that there may be people
`
`who would call a wireless bay station a -- an appliance.
`
`That might be a -- a term that -- that someone might use
`
`in a -- in a marketing kind of environment.· But...
`
`· · Q· · But you wouldn't use it that way?· Is that what
`
`you're saying?
`
`· · A· · Well, I'm -- when I'm talking about a wireless
`
`base station, I'm being very specific.· And I -- I call it
`
`a wireless base station.
`
`· · Q· · Okay.· Would you call a firewall a network
`
`appliance?
`
`· · A· · When I'm talking about a firewall specifically, I
`
`call it a firewall.· But --
`
`· · Q· · Okay.· But you wouldn't -- I'm sorry.· You
`
`wouldn't call it a network appliance?· Is that what you're
`
`saying?
`
`· · · · ·MS. LI:· Objection.· Form.
`
`· · · · ·THE WITNESS:· So, you know, if we are -- if we
`
`are talking about a group of devices, then -- then -- then
`
`Fortinet Ex. 2017, Page 22 of 48
`
`
`
`yes.· The -- the term "appliance" might be appropriate if
`
`they -- they share the -- the property that they are, you
`
`know, devices with a small operating system that, you
`
`know, running -- you know, that are -- that are managed
`
`and that -- you know, the word "appliance" comes from
`
`something like a kitchen appliance; right?· So that is
`
`a -- a device that -- that requires very little
`
`interaction and that does a specific -- small set of
`
`specific tasks, mostly without requiring interaction.
`
`BY MR. LU:
`
`· · Q· · Okay.· Do you know who Dr. Wenke Lee is?
`
`· · A· · Yes.
`
`· · Q· · Okay.· And you understand he is an expert hired
`
`by your client, Netskope, in other IPR proceedings against
`
`Fortinet; correct?
`
`· · A· · I understood that, yes.
`
`· · Q· · Have you ever met Dr. Lee?
`
`· · A· · Yes.
`
`· · Q· · Have you ever spoken with him?
`
`· · A· · Yes.
`
`· · Q· · Have you spoken to him about these cases?
`
`· · A· · No.
`
`· · Q· · When was the last time that you spoke with
`
`Dr. Lee?
`
`· · A· · I believe it's been after the pandemic.· So -- so
`
`Fortinet Ex. 2017, Page 23 of 48
`
`
`
`we attend some of the same computer security conferences,
`
`and so, you know, if we sat next to each other during some
`
`dinners, but we usually talk about scientific topics.
`
`· · Q· · I see.· Do you agree that Dr. Lee meets your
`
`definition of a person of an ordinary skill in the art?
`
`· · A· · Certainly.
`
`· · Q· · Okay.· So do you have a copy of the -- of
`
`Exhibit 1001 in front of you, or do you have access to a
`
`copy of Exhibit 1001?
`
`· · A· · That is the patent itself; right?
`
`· · Q· · Yes.
`
`· · A· · Okay.· Yes.
`
`· · Q· · Okay.· Let me open it up, as well.
`
`· · · · ·MS. LI:· Counsel, do you mind just dropping it
`
`into the chat anyway just to --
`
`· · · · ·MR. LU:· Okay.· Sure.· Yeah.· Hold on.· Give me a
`
`second then.
`
`· · · · ·All right.· It's uploading.· Do you see it?
`
`· · · · ·THE WITNESS:· Yes.
`
`· · · · ·MS. LI:· Yes.
`
`· · · · ·MR. LU:· Okay.· Great.
`
`BY MR. LU:
`
`· · Q· · Okay.· So, Dr. Franz, do you have it open?
`
`Exhibit --
`
`· · A· · Yes.
`
`Fortinet Ex. 2017, Page 24 of 48
`
`
`
`· · Q· · Okay.· Great.
`
`· · · · ·Could you turn to page 12, which is listing the
`
`claims?
`
`· · A· · Okay.
`
`· · Q· · Now, I wanted to ask you about -- well, I wanted
`
`to ask you about claim 1, which starts on page 11.
`
`· · A· · Okay.
`
`· · Q· · But the limitations I wanted to look at are on
`
`the next page, page 12.· So if you see on page 12, column
`
`11, line 4, there is a determining step.
`
`· · · · ·Do you see that?
`
`· · A· · Yes.
`
`· · Q· · "Determining by the first network security
`
`appliance, one or more network security operations that
`
`are executed by the second network security appliance."
`
`· · A· · I see that.
`
`· · Q· · Okay.· And then the next step is also a
`
`determining step; correct?
`
`· · A· · Correct.
`
`· · Q· · And so I'll just read it into the record.· This
`
`limitation says, "Determining by the first network
`
`security appliance, one or more local network security
`
`operations that are to be executed by the first network
`
`security appliance based on the one or more network
`
`security operations that are executed by the second
`
`Fortinet Ex. 2017, Page 25 of 48
`
`
`
`network security appliance, including skipping, by the
`
`first network security appliance, the one or more network
`
`security operations that are executed by the second
`
`network security appliance."
`
`· · · · ·Do you see that?
`
`· · A· · I see that.
`
`· · Q· · Can you tell me in your own words how you
`
`interpret these two limitations?
`
`· · A· · So -- so this patent is talking very specifically
`
`about a set of cooperate -- you know, of -- of -- of
`
`network devices that are cooperating with each other for
`
`the purpose of security; all right?· So that's some --
`
`somewhat different from you asking me what was going on at
`
`the end of the 1990s in the specific context of Ethernet.
`
`So -- and, you know, we actually have a -- you know, a
`
`very specific context given in the specification that
`
`talks about, you know, a first network security appliance
`
`that receives incoming traffic.
`
`· · · · ·And then, you know, it actually gives, you
`
`know -- it presents an embodiment as an example, where you
`
`can see that, you know, there's traffic that is -- that is
`
`routed.· You know, there's -- there's -- there's a VPN
`
`and -- and so on.· So what -- what this -- what this claim
`
`says is that you have a first network security appliance
`
`that is able to determine whether traffic that is -- that
`
`Fortinet Ex. 2017, Page 26 of 48
`
`
`
`comes into it came from a -- a second network security
`
`appliance that is participating in this -- in this
`
`collaboration.· And -- and after it determined that --
`
`that it did come from -- from that other second -- other
`
`security appliance, then it -- it determines what
`
`operations that second appliance may have already -- the
`
`security -- network security operations that other
`
`appliance has already performed.
`
`· · · · ·And then after that, it determines, you know,
`
`which -- which operations itself needs to be executed
`
`based on its knowledge of what security operations have
`
`already been performed by the previous -- by the -- by the
`
`second appliance that -- that previously processed this
`
`traffic.
`
`· · Q· · All right.· So that was a pretty long answer.
`
`Maybe I can try to summarize it a bit.
`
`· · A· · (Unintelligible response).
`
`· · Q· · That's okay.· That's okay.
`
`· · · · ·So with respect to these two determining steps in
`
`column 11, what's going on is that you have two network
`
`security appliances.· The first one determines whether the
`
`second one has already performed a network security
`
`operation on the traffic.· And if it has, then one of the
`
`things it can do is skip that particular operation that
`
`was already executed; correct?
`
`Fortinet Ex. 2017, Page 27 of 48
`
`
`
`· · · · ·MS. LI:· Objection.· Form.
`
`· · · · ·THE WITNESS:· That's what it says there.· It
`
`says, you know, determine and including skipping by the
`
`first network security appliance to one or more network
`
`security operations that are executed by the second
`
`network security appliance.
`
`BY MR. LU:
`
`· · Q· · Okay.· And you -- you would agree that the first
`
`network security appliance is cooperating with the second
`
`network security appliance in these limitations; correct?
`
`· · · · ·MS. LI:· Objection.· Form.
`
`· · · · ·THE WITNESS:· Well, the -- the goal of this whole
`
`thing is -- is to avoid duplicate work through
`
`cooperation.
`
`BY MR. LU:
`
`· · Q· · Okay.· And specifically these two determining
`
`steps, they accomplish the goal of avoiding duplicate work
`
`through cooperation; correct?
`
`· · A· · Well, it's not just these -- it's not just the
`
`two steps.· It's the -- the whole setup; right?· You need
`
`to also first set things up so that -- that, you know, you
`
`actually know what -- what -- what that means; right?· So
`
`you need -- you need to be able to identify that; right?
`
`It starts on the previous page.
`
`· · Q· · Right.· No.· I understand that, but I'm just
`
`Fortinet Ex. 2017, Page 28 of 48
`
`
`
`trying to figure out where is the cooperation going on.
`
`And my question is would you agree that these two
`
`determining steps, that is where the first and second
`
`network security appliances are cooperating?
`
`· · A· · The whole thing is -- the whole protocol is -- is
`
`the cooperation.
`
`· · Q· · Okay.· But in column 11, these two determining
`
`steps, there is cooperation going on; correct?
`
`· · · · ·MS. LI:· Objection.· Form.
`
`· · · · ·THE WITNESS:· The -- the steps are -- these two
`
`steps are -- are -- are carried out by the first network
`
`security appliance; right?· So it's --
`
`BY MR. LU:
`
`· · Q· · Uh-huh.
`
`· · A· · -- it's the avoiding of the duplicate work
`
`that's -- that's happening in those steps.
`
`· · Q· · Okay.· And would you agree that in those steps
`
`the first network security appliance is cooperating with
`
`the second network security appliance?
`
`· · A· · At that point, the second one is no longer
`
`involved.
`
`· · Q· · So is it your testimony that they're not
`
`cooperating in these steps?
`
`· · A· · As I said, the whole thing is the cooperation.
`
`The -- the -- the -- the cooperation is the -- is the --
`
`Fortinet Ex. 2017, Page 29 of 48
`
`
`
`the whole protocol that enables the second -- sorry.· It
`
`enables the first network security appliance to decide to
`
`not repeat network security operations that it has
`
`determined have already been -- been performed by the
`
`second one.
`
`· · Q· · Okay.· And so which limitation would you say is
`
`where the first network security appliance, quote,
`
`"decides to not repeat network security operation that it
`
`has determined have already been performed by the second
`
`one," end quote?
`
`· · A· · Well, that's the limitation that says determining
`
`by the first network security appliance one or more local
`
`network security operations that are to be executed by the
`
`first network security appliance based on the one or more
`
`network security operations that are executed by the
`
`second network security appliance, including skipping, by
`
`the first network security appliance, the one or more
`
`network security operations that are executed by the
`
`second network security appliance.
`
`· · Q· · Okay.· So that's the limitation at column 11
`
`starting at line 7 -- correct? -- that you just re

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site