Implicit Networks, Inc. v. F5 Networks, Inc.

Filing 173

ORDER GRANTING DEFENDANTS' MOTIONS FOR SUMMARY JUDGMENT 165 in case 3:10-cv-03365-SI; 155 166 169 196 in case 3:10-cv-04234-SI (Illston, Susan) (Filed on 3/13/2013)

Download PDF
1 2 3 4 5 IN THE UNITED STATES DISTRICT COURT 6 FOR THE NORTHERN DISTRICT OF CALIFORNIA 7 IMPLICIT NETWORKS INC, 8 9 United States District Court For the Northern District of California 10 Nos. C10-3365 SI; C 10-4234 SI Plaintiff, v. F5 NETWORKS INC, 11 Defendant. / 12 13 IMPLICIT NETWORKS INC, Plaintiff, 14 15 16 17 ORDER GRANTING DEFENDANTS’ MOTIONS FOR SUMMARY JUDGMENT v. JUNIPER NETWORKS, INC. Defendant. / 18 19 Currently before the Court are summary judgment motions by defendant Juniper Networks (Case 20 No. 10-4234 SI) and defendant F5 Networks (Case No. 10-3365 SI) for non-infringement; and a motion 21 for summary judgment by defendant Juniper Networks, in which defendant F5 Networks joins, as to 22 invalidity of the asserted patents. Having considered the arguments of counsel and the papers submitted, 23 the Court GRANTS defendants’ motions. 24 25 BACKGROUND 26 In these two related cases, plaintiff Implicit Networks, Inc. accuses defendants’ products of 27 infringing two patents owned by plaintiff: U.S. Patent No. 6,629,163, as issued September 30, 2003 and 28 as it emerged after reexamination on June 22, 2010 (‘163 Patent); and U.S. Patent No. 7,711,857 (‘857 1 Patent), issued May 4, 2010 as a continuation application from ‘163. In early 2012, Juniper filed 2 requests for inter partes reexamination on both patents. The inter partes proceedings are still pending, 3 although the examiners have issued Patent Action Closing Prosecutions (ACPs) concluding that both 4 patents are invalid as anticipated and/or obvious. According to Implicit, the patents cover a modular networking system which dynamically selects 6 software routines (“modules” or “beads”) after the arrival of the first packet of a message to build a data 7 processing path for the subsequent packets of the message (“flow”). See, e.g., Implicit’s Opposition to 8 Motion for Summary Judgment on Invalidity (“Invalidity Oppo.”) at 4-7. Since Implicit’s system 9 creates the processing path dynamically and only after the arrival of the first packet, Implicit’s system 10 United States District Court For the Northern District of California 5 is flexible and can be changed to accommodate different processing steps, can be adapted to handle 11 different sorts of technology/flows, and can adopt “policies” based on administrator direction. Id. 12 Implicit accuses two lines of products made by defendant Juniper Networks, Inc.: the SRX and 13 J series of gateways and routers that use “flow based” processing of internet traffic. Implicit accuses 14 F5’s “BIG-IP” IP networking products which act as intermediaries and transfer data between users (e.g., 15 a consumer) and servers (e.g., an e-commerce business like Amazon). The BIG-IP products help 16 “enterprise applications” sort and get traffic to the appropriate servers. 17 18 19 DISCUSSION I. Defendants’ Motion on Invalidity 20 Juniper, joined by F5, moves for summary judgment on invalidity, arguing that the asserted 21 claims are invalid as disclosed or rendered obvious by Daniel Decasper, et al., “Router Plugins: A 22 Software Architecture for Next Generation Routers,” Computer Communication Review, a publication 23 of ACM SIGCOMM, Vol. 28, No. 4 Oct. 1998. (Decasper98). Juniper also argues that the asserted 24 claims are rendered obvious by Decasper98 in combination with IBM, Local Area Network Products 25 Concepts and Products: Routers and Gateways (May 1996) (IBM96) and Mark Nelson and Jean Loup 26 Gailly, the Data Compression Book, M&T Books (2nd ed. 1996) (Nelson). 27 Juniper notes that the PTO examiners in both of the pending inter partes reexamination 28 proceedings have rejected all of the asserted claims. The PTO issued an Action Closing Prosecution 2 (ACP) in the ‘163 Patent reexam on October 1, 2012 and issued an ACP in the ‘857 Patent reexam on 2 December 21, 2012. See ‘163 Patent ACP, Declaration of Douglas Dixon [Dixon Decl., Docket No. 3 167-5], Ex 15; ‘857 Patent ACP, Docket No. 201 The two panels of examiners found that Claims 1, 4 5, and 35 in the ‘163 Patent and Claims 1, 4 and 10 of the ‘857 Patent were anticipated in light of 5 Decasper98 and obvious in light of Decasper98 alone and/or in combination with IBM96 and Nelson.1 6 Implicit contends that the PTO actions are irrelevant for two reasons. First, the PTO examiners applied 7 only a “preponderance of the evidence” standard of review in determining invalidity, but this Court must 8 apply the higher “clear and convincing” standard. Second, Implicit notes that the inter partes 9 proceedings are far from over. Following the issuance of the ACPs, patent owners are allowed to submit 10 United States District Court For the Northern District of California 1 additional comments to the examiners and an appeal may follow. See, e.g., Manual of Patent Examining 11 Procedures, §§2671, 2672. 12 As relevant to the motion for summary judgment on invalidity, the parties’ dispute centers on 13 five claim limitations, designated by the parties “1a,” “1b,” “1e,” “1f” and “1g” and shown in bold 14 below, which are all present in Claim 1 of the ‘163 Patent: 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Claim 1 of ‘163 Patent: 1. A method in a computer system for processing a message having a sequence of packets, the method comprising: [1a] providing a plurality of components, each component being a software routine for converting data with an input format into data with an output format; [1b] for the first packet of the message, dynamically identifying a non-predefined sequence of components for processing the packets of the message such that the output format of the components of the non-predefined sequence match the input format of the next component in the non-predefined sequence, wherein dynamically identifying includes selecting individual components to create the non-predefined sequence of components after the first packet is received; and storing an indication of each of the identified components so that the nonpredefined sequence does not need to be re-identified for subsequent packets of the message; and for each of a plurality of packets of the message in sequence, [1e] for each of a plurality of components in the identified non-predefined sequence, retrieving state information relating to performing the processing of the component with the previous packet of the message; [1f] performing the processing of the identified component with the 1 For the ‘163 Patent, the PTO also found that the claims were anticipated and/or obvious in light of Patent No. 6,243,667 (Kerr). See generally Dixon Decl., Ex. 15. However, the PTO rejected that same argument with respect to Claims 1, 4, and 10 in the ‘857 Patent ACP. ‘857 ACP at 35. 3 1 packet and the retrieved state information; and storing state information relating to the processing of the component [1g] with packet for use when processing the next packet of the message. 2 3 4 See Dixon Decl., Ex 15 (italics added in reexamination; bold added by Court to show limitations 5 involved in challenge to validity); see also Dixon Decl., Ex. 19 (Report of Dr. Scott Nettles on 6 Infringement by Juniper; identifying limitations within claims).2 7 8 A. 9 Legal Standard i. In General United States District Court For the Northern District of California 10 A patent is presumed valid after the PTO examination process, based on “the basic proposition 11 that a government agency such as the then Patent Office was presumed to do its job.” Am. Hoist & 12 Derrick Co. v. Sowa & Sons, Inc., 725 F.2d 1350, 1359 (Fed. Cir. 1984) (abrogated on other grounds 13 by Therasense, Inc. v. Becton, Dickinson & Co., 649 F.3d 1276 (Fed. Cir. 2011)) (citing Morgan v. 14 Daniels, 153 U.S. 120 (1894)). The defendant carries a high burden on summary judgment of invalidity, 15 as the “moving party seeking to invalidate a patent at summary judgment must submit such clear and 16 convincing evidence of invalidity so that no reasonable jury could find otherwise.” Eli Lilly & Co. v. 17 Barr. Labs, 251 F. 3d 955, 962 (Fed. Cir. 2001). The presumption of validity can nonetheless be 18 overcome with sufficient evidence. See Magnivision, Inc. v. Bonneau Co., 115 F.3d 956, 960 (Fed. Cir. 19 1997) (“The validity of a patent is always subject to plenary challenge on its merits. A court may 20 invalidate a patent on any substantive ground, whether or not that ground was considered by the patent 21 22 23 24 25 26 27 28 2 Juniper argues that the elements of the other asserted claims not corresponding to the five limitations identified by Implicit ( i.e., non-contested elements of claims 1, 15 and 35 of the ‘163 Patent and non-contested elements of Claims 1, 4, and 10 of the ‘857 Patent) are disclosed by Decasper98 and, therefore, at a minimum partial summary judgment should be entered in Juniper’s favor on those claims/elements. See Juniper Motion re Invalidity at 19-21. Implicit does not contest this in its Opposition. In Reply, Juniper also argues that because Implicit only challenges whether Decasper98 covers sub-aspects of each of the limitations identified in Claim 1 (e.g., Implicit does not dispute that Decasper98 discloses “a plurality of components, each component being a software routine” from 1a) summary judgment should be granted in Juniper’s favor on the “undisputed aspects” of elements 1a, 1b, 1e, 1f and 1g. Juniper Reply on Invalidity at 2; see also Juniper’s Slides from Summary Judgment Hearing at 4-8 (identifying undisputed claim elements). 4 1 examiner.”).3 The moving party’s burden is “especially difficult” when the prior art references presented were 3 considered by the patent examiner during prosecution. Glaxo Group Ltd. v. Apotex, Inc., 376 F.3d 1339, 4 1348 (Fed. Cir. 2004). But when, as here, additional evidence is presented by the moving party, “the 5 burden may be more or less easily carried because of the additional evidence.” Applied Materials, Inc. 6 v. Advanced Semiconductor Materials Am., Inc., 98 F.3d 1563, 1569 (Fed. Cir. 1996). New evidence 7 supporting an invalidity contention may “carry more weight” than evidence previously considered by 8 the PTO. Microsoft Corp. v. i4i Ltd. P’ship, 131 S.Ct. 2238, 2251 (2011).4 As the Supreme Court has 9 held, “[s]imply put, if the PTO did not have all material facts before it, its considered judgment may lose 10 United States District Court For the Northern District of California 2 significant force. . . . And, concomitantly, the challenger’s burden to persuade the jury of its invalidity 11 defense by clear and convincing evidence may be easier to sustain.” Id. (internal citations omitted). 12 13 14 ii. Anticipation Under 35 U.S.C. § 102(b): 15 A person shall be entitled to a patent unless– 16 *** (b) the invention was patented or described in a printed publication in this or a foreign country or in public use or on sale in this country, more than one year prior to the date of the application for patent in the United States . . . . 17 18 19 20 21 22 23 24 25 26 In determining validity of a patent claim over the prior art, a two-step process applies. The first step is the claim construction by the Court. See Smiths Indus. Med. Sys., Inc. v. Vital Signs, Inc., 183 F.3d 1347, 1353 (Fed. Cir. 1999). The second step is a comparison of the asserted claims against the prior art reference. A determination that a claim is invalid for anticipation requires a finding that “each and every limitation is found either expressly or inherently in a single prior art reference.” Celeritas 3 See also Interconnect Planning Corp. v. Feil, 774 F.2d 1132, 1139 (Fed. Cir. 1985) (“[t]he Examiner’s decision, on an original or reissue application, is never binding on the court. It is, however, evidence the court must consider in determining whether the party asserting invalidity has met its statutory burden by clear and convincing evidence.”). 4 27 28 Citing SIBIA Neurosciences, Inc. v. Cadus Pharmaceutical Corp., 225 F.3d 1349, 1355-1356 (Fed.Cir. 2000) (“[T]he alleged infringer’s burden may be more easily carried because of th[e] additional [evidence]”); Group One, Ltd. v. Hallmark Cards, Inc., 407 F.3d 1297, 1306 (Fed. Cir. 2005) (similar). 5 1 Techs. Inc. v. Rockwell Int’l Corp., 150 F.3d 1354, 1360, 47 USPQ2d 1516, 1522 (Fed. Cir. 1998). The 2 Federal Circuit has held that “it is axiomatic that that which would literally infringe if later anticipates 3 if earlier.” Bristol-Myers Squibb Co. v. Ben Venue Laboratories, Inc., 246 F.3d 1368, 1378 (Fed. Cir. 4 2001); see also Lewmar Marine, Inc. v. Barient, Inc., 827 F.2d 744, 747 (Fed. Cir. 1987).5 5 6 iii. Obviousness Defendants must prove by clear and convincing evidence that “the subject matter as a whole 8 would have been obvious at the time the invention was made to a person having ordinary skill in the art 9 to which said subject matter pertains.” 35 U.S.C. § 103(a); KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 10 United States District Court For the Northern District of California 7 406 (2007). Obviousness under 35 U.S.C. § 103 is a question of law, with underlying factual 11 considerations regarding (1) the scope and content of the prior art, (2) the differences between the prior 12 art and the claimed invention, (3) the level of ordinary skill in the art, and (4) any relevant secondary 13 considerations. Graham v. John Deere Co. of Kansas City, 383 U.S. 1, 17-18 (1966); see also Brown 14 & Williamson Tobacco Corp. v. Philip Morris, Inc., 229 F.3d 1120, 1124 (Fed. Cir. 2000). A claimed 15 invention is invalid for obviousness “if the differences between the subject matter sought to be patented 16 and the prior art are such that the subject matter as a whole would have been obvious at the time the 17 invention was made to a person having ordinary skill in the art to which said subject matter pertains.” 18 35 U.S.C. § 103.6 19 “Although it is well settled that the ultimate determination of obviousness is a question of law, 20 it is also well understood that there are factual issues underlying the ultimate obviousness decision.” 21 McGinley v. Franklin Sports, Inc., 262 F.3d 1339, 1349 (Fed. Cir. 2001). Summary judgment may be 22 23 24 5 Implicit does not contest that Decasper98, IBM96 and Nelson are publications under 35 U.S.C. § 102(b) which could qualify as prior art. 6 25 26 27 28 The parties’ experts describe a “person of ordinary skill in the art” differently. Juniper’s expert (Dr. Calvert) describes the person as one with a bachelor’s degree in a relevant field and at least four years’ work experience or a master’s degree in a relevant field and two years experience. See Declaration of Dr. Kenneth I. Calvert [Docket No. 167-1] and Exhibit 2 [Calvert Invalidity Expert Report], ¶ 42. Implicit’s expert describes the person as having a bachelor’s degree in the relevant field and at least two years’ experience. Expert Report of Dr. Scott Nettles on Validity Rebuttal [Docket No. 167-9], ¶ 30. Implicit points out the distinction, but does not argue that the distinction matters for resolution of the arguments made in the invalidity motion. 6 1 appropriate if “the content of the prior art, the scope of the patent claim, and the level of ordinary skill 2 in the art are not in material dispute, and the obviousness of the claim is apparent in light of these 3 factors.” KSR, 550 U.S. at 427 (citing Graham, 383 U.S. at 17). However, a factual dispute as to any 4 one of these elements will defeat the motion. Helifix Ltd. v. Blok-Lok, Ltd., 208 F.3d 1339, 1346 (Fed. 5 Cir. 2000). 6 B. 8 Juniper’s expert, Dr. Kenneth L. Calvert, concludes that Decasper98 alone anticipates or renders 9 obvious claims 1, 15, 35 of the ‘163 Patent as well as claims 1, 4 and 10 of the ‘857 Patent. See Calvert 10 United States District Court For the Northern District of California 7 Declaration [Docket No. 167-1] and Exhibit 2 [Calvert Invalidity Expert Report] ¶¶ 543-611.7 11 Decasper98 describes a general “framework” for IP processing, that is “extensible” and can be applied 12 to applications other than IP processing. Decasper98 (Dixon Ex. 1) at 2. Dr. Calvert argues Decasper98 13 describes a router system for processing message flows comprising multiple packets. Calvert Invalidity 14 Report, ¶¶ 544-545. In Decasper98, packets traveling through the system encounter “gates” and at that 15 point the system dynamically loads “plug-ins” (software routines) to process the message flow. See 16 Decasper98 at 1,2, 4; see also Calvert Invalidity Report ¶¶ 546, 548. 17 “identification unit” which stores information relating to processing of particular types of packets, as 18 well as “pointers to state information for each plugin that uses state information.” Calvert Invalidity 19 Report, ¶549. The system maintains two types of state, including a “pointer” to the particular plugin 20 and a pointer to “private data” for the plugin instance associated with the particular packet within a flow. 21 Id., ¶ 557. Based on those and other conclusions not contested by Implicit, Dr. Calvert opines that 22 Decasper98 anticipates the asserted claims of the patents at issue. Id., ¶¶ 543, 567.8 Whether Decasper98 Anticipates or Renders Obvious the Asserted Claims Descasper98 uses an 23 The PTO examiners in both the ‘163 and ‘857 inter partes reexams have likewise concluded that 24 the patents in suit are anticipated and/or rendered obvious in light of Descasper98. See ‘163 Patent ACP 25 26 7 As discussed below, Dr. Calvert also finds that Decasper98 in view of IBM96 alone and with Nelson likewise render the asserted claims obvious. Calvert Invalidity Report ¶¶ 673-700. 27 8 28 The Court notes that Decasper98 also expressly contemplates use of the framework in an edgerouter. Decasper98 at 2. 7 at 93,118 [Dixon Decl., Ex 15]; ‘857 Patent ACP at 7, 19.9 In the ‘163 Patent ACP, the examiner found 2 that Decasper98 used “‘plug-ins’ as the claimed ‘individual components’ that are dynamically selected 3 to create a sequence in accordance with this claim limitation.” ‘163 Patent ACP at 11, 20 (emphasis in 4 original). The examiner also found that simply because Decasper98 might be designed to handle one 5 type of traffic (IP), did not mean it could not read on the format-matching or compatibility limitation 6 of the claims. Id., 21-22. Finally, the examiner found that Descasper98 teaches the maintenance of 7 message-specific state information as required by the claims. Id., at 36; see also id. 118-137 [rejecting 8 Claims 15 and 35 as anticipated by Decasper98].10 In the ‘857 ACP, the examiner found Claims 1, 4 9 and 10 anticipated by Decasper98. ‘857 ACP at 7.11 In particular, the examiner found that even 10 United States District Court For the Northern District of California 1 assuming Decasper98 uses a single IP format, Decasper98 still discloses the input and output matching 11 feature of the claims. ‘857 ACP at 16. The examiner also found that Decasper98 discloses storing state 12 information for each of the plug-in sequences/software routines to be used in processing the next packets 13 as recited in the challenged claims. Id., at 18-19. 14 In opposition, Implicit argues that Decasper98 cannot anticipate the claim limitations of the ‘163 15 patent identified above because Decasper98 describes a simple “one format fast router” which routes 16 only IP packets. As Decapser98 handles only one type of format of message (IP),12 it cannot cover the 17 demultiplexing (conversion) processing claimed by the patents in suit, nor does it necessarily have to 18 maintain state information for the processing of all packets in the message/flow. As such, Implicit 19 argues, Decasper98 cannot anticipate Implicit’s inventions. Implicit, however, does not rely on its 20 21 22 23 24 25 26 27 28 9 The Court recognizes that in the reexaminations the PTO is considering validity under a preponderance of the evidence standard, as opposed to the clear and convincing evidence standard that applies here. The reasoning of the PTO, however, is persuasive and supports the Court’s conclusions. 10 The examiner in the ‘163 Patent ACP also rejected Claim 1 as obvious in light of Decasper98. ‘163 Patent ACP at 93-117. 11 In the alternative, the examiner in the ‘857 Patent ACP rejected Claims 1, 4 and 10 as obvious under Decasper98, as well as obvious under Decasper in view of IBM96 and IBM96 and Nelson combined. Id., at 19, 22, 31. 12 As the parties explained in the tutorial IP (Internet Protocol) is responsible for addressing hosts and routing packets of messages across the internet. See, e.g., Defendants’ Technology Tutorial at 10. 8 1 expert to contradict Dr. Calvert and Juniper’s assertions on these key points. Indeed, the Rebuttal 2 Expert Report on Invalidity of Dr. Scott Nettles, Implicit’s expert, attempts to distinguish Decasper98 3 on different grounds, namely: (1) that Decasper98 does not dynamically identify components because 4 components are initially identified by a static core; (2) plugins in Decasper98 are not components or 5 software routines as defined by the Court; and (3) Decasper98 does not process packets so that input 6 format matches output format. Nettles Invalidity Rebuttal Report ¶¶ 67-75. Implicit’s opposition 7 arguments – Decasper98 does not convert data and fails to maintain state – are made without citation 8 to expert support, although Nettles does assert that Decasper98 is a one-format system. See, e.g., Nettles 9 Invalidity Rebuttal Report, ¶ 64. United States District Court For the Northern District of California 10 11 i. Effect of PTO Not Considering Decasper98 in Prior Proceedings 12 As an initial matter, Implicit disputes the impact – in terms of the deference the Court should 13 provide to the presumption of validity of the patents – of the failure of the PTO to consider Decasper98 14 as prior art in the prosecution proceedings. Implicit argues that the failure of the PTO to consider 15 Decasper98 does not lower Juniper’s burden to demonstrate invalidity by clear and convincing evidence 16 under Microsoft Corp. v. i4i Ltd. P’ship, 131 S.Ct. at 2251, because the invention disclosed in 17 Decasper98 is cumulative to prior art that was disclosed in the prosecution, namely Dietz, Method and 18 Apparatus for Monitoring Traffic in a Network, United States Patent No. 6,651,099 (Dietz). See 19 Invalidity Oppo. at 9. While Implicit attaches the Dietz patent to the Declaration of Spencer Hosie in 20 Opposition to Invalidity (Hosie Invalid. Decl.), Implicit does not provide any analysis – by way of an 21 expert or argument in its brief – as to how it believed Decasper98 was cumulative to Dietz. Instead, 22 Implicit criticizes Juniper’s expert, Dr. Calvert, for failing to address Dietz. Id. 23 Dietz does not describe a router or gateway – the types of devices at issue here – but a “monitor 24 and method of examining packets.” By contrast, Decasper98 teaches an architecture “to quickly and 25 efficiently classify packets into flows, and to apply different policies to different flows” through 26 “dynamically loaded” plug-ins. Dixon Decl., Ex. 1 at 2. Decasper98, on its face, closely matches the 27 inventions covered by the patents in suit, while Dietz does not. Moreover, in his expert report Dr. 28 9 1 Calvert did address Dietz, if only to determine whether it, in combination with another reference (Kerr) 2 rendered obvious the patents in suit. Calvert Invalidity Report, ¶¶318-331. Finally, in issuing the Office 3 Actions and the Patent ACPs rejecting the asserted claims based in significant part on Decasper98, the 4 PTO has apparently agreed that Decasper98 was a substantial new piece of prior art and not cumulative 5 to Dietz, which had been before the PTO on its initial consideration. See, e.g., MPEP § 2647 (requests 6 for reexamination “will be denied if a substantial new question of patentability is not found based on 7 patents or printed publication.”). In sum, Implicit has not shown that the Dietz reference is cumulative to the aspects of 9 Decasper98 that Juniper – and the PTO in the inter partes reexam– rely on. As such, Juniper faces a 10 United States District Court For the Northern District of California 8 somewhat lighter burden under the clear and convincing evidence standard for demonstrating invalidity. 11 12 ii. Format Matching/Conversion 13 Implicit’s main argument against Decasper98 acting as an anticipating (or obviating) reference 14 is that Decasper98 is a one format system – the packets that are processed are IP and the packets that 15 come out of processing are IP. According to Implicit, the system covered by the patents is a system that 16 converts data to ensure input and output formats match. Implicit and its expert acknowledge that – 17 based on Implicit’s arguments during claim construction – the Court has already held that the 18 “components” or software routines in Implicit’s system need not always “convert” data, but Implicit and 19 Dr. Nettles contend that a system like Decasper98, which does not convert any data, cannot disclose the 20 system covered by the patents. See Invalidity Oppo. at 13. Juniper responds that based on the Court’s 21 claim construction, the components/software routines – the plug-ins in Decasper98 – need not actually 22 convert anything; simple processing is enough. See Claim Construction Order [Docket No. 69 in Case 23 No. 10-4234] at 9 (“‘conversion’ is not a necessary limitation with respect to the processing of each 24 packet”).13 Juniper also contends, supported by Dr. Calvert, that Decasper98 discloses the possibility 25 26 27 28 13 In issuing its ACPs the PTO likewise agreed that Implicit’s claims, as construed, can cover processing of data and need not convert data or formats. See, e.g., ‘163 ACP at 16 (Decasper98 invention “can cover protocol stacks conforming to the OSI model, even where the same general type of processing is performed at each layer, and in a predetermined order”) and at 22 (“within IP, various plugins handle various different formatting needs”); ‘857 ACP at 15 (“There is no requirement of 10 1 of using a conversion plug-in, which – as Implicit’s expert agrees – is “conversion” pursuant to the 2 patent claims. See Calvert Invalidity Report ¶ 553; Dixon Decl., Ex. 20 [Nettles Depo..] at 191:11- 3 192:16.14 4 The Court concludes, based on clear and convincing evidence not contradicted by Implicit’s 5 expert, that the system described in Decasper98 processes the IP packets in a manner that anticipates 6 Implicit’s inventions. 7 8 iii. State Information Implicit also argues that Decasper98 cannot anticipate or render obvious Implicit’s system 10 United States District Court For the Northern District of California 9 because the Decasper98 system does not maintain “state” regarding each components’ processing of a 11 specific message, as required by the claims. Implicit argues that as a basic IP router, Decasper98 is not 12 guaranteed to even see all packets of a particular message and, therefore, cannot manage the processing 13 and maintenance of all packets of a particular message or flow, which is essential to the ‘163 Patent. 14 See Oppo. at 9-10, 13. Relatedly, Implicit argues that given its structure, Decasper98 maintains only 15 “soft state” information and not “hard state” as required by the ‘163 Patent to ensure all packets in a 16 message are processed consistent with the dynamically identified path. Soft state, according to Implicit, 17 means that the state information could be dumped at any time, jeopardizing the ability of a system to 18 fully process all packets in a flow that, for example, contains TCP data. Oppo. at 14. 19 Juniper responds that because Decasper98 explicitly indicates it can be implemented as a router 20 at the edge of a network, it would – in that configuration – see every message in a particular flow. See 21 Decasper98 at 2; Juniper Reply on Invalidity at 7. Implicit did not address or rebut this point during oral 22 argument. Juniper also notes that Implicit has no evidence that Decasper98 cannot maintain “hard” state 23 and that Implicit’s citation to portions of Decasper98 that allow an administrator to “reset state 24 25 26 27 28 multiple formats or any conversion of format in the claims”) and at 17 (nonetheless evidence showed that plugins in Decasper98 have differences in format, “which would require coordination of formats between the plug-ins.”). 14 Juniper also notes that the patents’ inventor, Edward Balassanian, testified that an all IP processing system could satisfy the input/output matching limitations. Dixon Decl., Ex. 34 [Balassanian Rule 30(b)(6) deposition] at 1054:14-24. 11 1 information,” i.e., dump it when useful, does not undermine the fact that Decasper98 maintains state for 2 the flows it processes. Juniper Reply on Invalidity at 7-8 & n.8 (noting that Decasper98 explains that 3 the administrator can set the system to clear out or recycle cached entries in a flow table as necessary, 4 but also the system is capable of exponential expansion to handle more cached records, demonstrating 5 an ability to keep “hard state”); see also Decasper98 at 5, 9. The Court agrees with Juniper’s evidence 6 that Decasper98 demonstrates the “maintenance of state” limitation of the patents. 7 8 As such, the Court finds that based on clear and convincing evidence, which was not before the PTO initially, Decasper98 anticipates the asserted claims. 9 United States District Court For the Northern District of California 10 iv. Obviousness as Single Prior Art Reference 11 Having found that Decasper98 anticipates the asserted claims, the Court need not reach whether 12 Decasper98 renders the asserted claims obvious. The Court notes, however, that Implicit’s argument 13 against Decasper98 as an obviousness reference is based on its “meta-level” argument that Decasper98 14 cannot anticipate because it is a single-format basic router. As discussed above, the Court has found 15 that Decasper98 explicitly contemplates use as an edge-router, contemplates and ensures input and 16 output format matching within the parameters of IP processing, and likewise contemplates the use of 17 a conversion “plug-in” which could convert data (if that limitation were required, although under the 18 Court’s Claim Construction Order, it is not). Those findings support a conclusion that Implicit’s claims 19 are unpatentable over (as rendered obvious by) Decasper98. 20 21 22 23 24 25 26 27 28 C. Whether Decasper98 in Combination with IBM96 and Nelson Render the Asserted Claims Obvious The Court has found that Decasper98 alone both anticipates the ‘163 patent and renders it obvious. Further, the Court finds that Decasper98 in combination with IBM96 and Nelson render the asserted claims obvious. IBM96 and Nelson disclose the use of software components (plugins) for data compression and/or decompression, that according to Juniper and Dr. Calvert, one skilled in the art could have appreciated applying within the Decasper98 system. See Calvert Invalidity Report, ¶¶ 673-700. Dr. 12 1 Calvert explains that IBM96 teaches compression as a useful technique for gateways and routers, and 2 that it would have been obvious for one skilled in the art to use IBM’s stateful compression component 3 with the “extensible” Decasper98 router. Id., ¶¶ 674, 675, 678, 684. Dr. Calvert contends that Nelson, 4 which further elaborates on specific compression algorithms that can be used to implement a “stateful” 5 compression plugin, would likewise have been obvious to use with Decasper98’s flexible and 6 expandable router architecture. Id., ¶¶ 689, 691.15 Implicit responds that the IBM96 and Nelson references cannot combine with Decasper98 to 8 render the asserted claims obvious because IBM96 and Nelson speak to “stateful compression” of data. 9 Compression of data does not alter its format, and so these references cannot disclose the conversion 10 United States District Court For the Northern District of California 7 aspects of Implicit’s patents. However, as noted above, the Court has rejected the requirement that each 11 packet be converted. Implicit also argues that a stateful compression algorithm would require all 12 packets of a message to be maintained together, something which Decasper98 as a “node router” 13 couldn’t do. However, as noted above, Decasper98 explicitly disclosed its use as an “edge router,” 14 which could maintain the packets. Finally, Implicit relies on Dr. Nettles’ conclusion that there would 15 be no motive to combine Decasper98 with IMB96 and/or Nelson because the compression techniques 16 discussed in IBM96 and Nelson are not suitable for IP routers. Nettles Invalidity Rebuttal Report, ¶¶ 17 102, 108. Dr. Nettles does not explain in any detail why the IP router described by Decasper98 would 18 not function with or could not be reasonably combined with IBM96 – which contemplates use of 19 compression algorithm with a router – and/or Nelson, and the argument is not fleshed out in Implicit’s 20 brief. See Invalidity Oppo. at 15 (stating simply that “[n]or would there be motive to combine Decasper 21 and the compression combinations,” citing to Nettles Invalidity Rebuttal Report, ¶ 102). Dr. Calvert’s 22 23 15 24 25 26 27 28 In the ‘857 ACP, the examiner rejected Claims 1, 4 and 10 in light of Decasper98 in view of IBM96, in light of Decasper98 teaching use of router plugins and IBM96 teaching a router platform having a compression algorithm. The examiner found that combining the two would have been obvious in an effort to achieve faster data transmission and processing. ‘857 ACP at 22-23 (citing Nelson to illustrate features of a stateful compression algorithm). In light of the extensible nature of Decasper98, IBM96’s teaching use of a compression algorithm in a router, and the higher data rates, improved response times, and lower costs from compression in transmitting data, the examiner found explicit reasons as to why the references would be combined by one skilled in the art. Id., at 24; see also id. at 35 (noting LZ compression algorithm discussed in Nelson applied in the router architecture of IBM96 provides the basis to add it as a Decasper98 plugin). 13 1 discussions on reasonableness and motive for those skilled in the art for combining Decasper98 and 2 IBM96 and/or Nelson are much more thorough, and stand essentially unrebutted. 3 D. 5 Finally, Implicit can challenge Juniper’s obviousness argument by showing that the “commercial 6 success” of its inventions covered by the patents “supports its contention of nonobviousness.” Demaco 7 Corp. v. F. Von Langsdorff Licensing, Ltd., 851 F.2d 1387, 1392 (Fed. Cir. 1988). In order to defeat 8 a showing of obviousness on summary judgment, a patentee must make a “prima facie case” showing 9 “both that there is commercial success, and that the thing (product or method) that is commercially 10 United States District Court For the Northern District of California 4 successful is the invention disclosed and claimed in the patent.” Id., at 1392. Implicit relies on its 11 development and sales contracts with Intel, AMD and Raytheon. Invalidity Oppo. at 7 & 16. In 12 particular, Implicit relies on an agreement it entered into with Intel to develop products (which never 13 made it to market), Implicit’s discussion with Sprint about an Implicit prototype, and an “approach” 14 about investment made by a venture capital firm. Invalidity Oppo. at 7-8. Objective Evidence of Nonobviousness 15 Juniper responds that Implicit has failed to show that any of its commercial embodiments 16 actually satisfy the asserted claims’ elements, and that the development agreements and inquiries 17 Implicit relies on do not show any true “commercial success.” The Court agrees with Juniper. 18 While Implicit mentions contracts with Intel, AMD and Raytheon, Implicit does not cite to 19 copies of those contracts or provide expert analysis explaining that the use of the asserted patents’ 20 technology was key to those contracts. (See, e.g., Calvert Invalidity Report, ¶ 775 (noting no evidence 21 that contracts with Intel and AMD embodied technology of patents in suit and citing Balassanian 22 deposition admitting the Raytheon contract had nothing to do with the patents-in-suit)). Implicit relies 23 on the fact that Intel’s due diligence engineer testified that Implicit’s technology was novel, and that 24 Intel entered into agreements with Implicit to develop an early version of an Ipad-type device and digital 25 music player, and that Intel’s venture capital business “approached” Implicit about investing in the 26 company in late 2001. Oppo. at 7. However, there is no evidence before the Court that the technology 27 covered by the contracts with Intel or the technology discussed by the engineer in his deposition 28 14 1 included the technology at issue in the asserted patents. See Ex. A to the Hosie Decl., at 61-68; see also 2 Calvert Invalidity Report, ¶ 778.16 3 Implicit also relies on the conclusion of Sprint, which met with Implicit’s predecessor company 4 BeComm in early February 1999. Oppo at. 16. According to a document created around that time by 5 Sprint, Sprint considered the BeComm communication platform prototype (Portal) to be unique, 6 exciting, and a good strategic opportunity for Sprint. See Hosie Decl., Ex. G at SP-175-0731. Sprint, 7 however, made that assessment “based on information to date and assuming further assessment is 8 positive.” Id. There is no evidence that Sprint’s initial reactions, based on two meetings on one day, 9 were supported by further assessment. An initial reaction based on a preliminary exposure cannot show United States District Court For the Northern District of California 10 that Implicit achieved “commercial success” or was addressing a long felt but unresolved need.17 11 For the foregoing reasons, the Court finds – based on clear and convincing evidence presented 12 by Juniper’s expert – that the asserted claims in the ‘163 and ‘857 patents are anticipated as well as 13 rendered obvious by Decasper98 alone and/or in combination with IBM96 and Nelson. The conclusion 14 is supported by the findings of the Patent Office ACPs. The Court also finds that in light of the strong 15 evidence of obviousness, Implicit’s weak evidence of secondary of non-obviousness cannot overcome 16 that conclusion. 17 Concluding that the asserted claims of the patents are invalid, the Court need not reach whether 18 Juniper and F5 are entitled to summary judgment on non-infringement. However, as discussed below, 19 as alternate grounds to granting the motion for summary judgment as to invalidity, the Court finds that 20 defendants are entitled to summary judgment on non-infringement as well. 21 22 23 24 16 Moreover, even if the Implicit technology Intel was seeking to secure through its contract with Implicit was the technology of the asserted claims, Implicit has cited no evidence that any of the projects Implicit worked on for Intel were released to market or that the duration or terms of the Intel contracts amounted to commercial success. See Calvert Invalidity Report, ¶ 775. 25 17 26 27 28 The PTO noted that Mr. Balassanian did not demonstrate that any commercial success of his company (presumably the contracts with Intel, AMD and Raytheon) was due to the claimed features of the ‘857 patent. ‘857 ACP at 44. The PTO also viewed skeptically Implicit’s assertion that commercial success was shown by numerous licenses Implicit had negotiated with other third-parties for use of the technology, because it was “reasonable to assume the licenses were taken in lieu of defending [] infringement suits.” Id. at 46-47. 15 1 II. Juniper’s Motion for Summary Judgment on Non-infringement 2 Juniper moves for summary judgment arguing that Implicit has failed in its burden to establish 3 a material issue of fact on its infringement claims. Juniper rests its argument on the fact that Implicit’s 4 expert did not consider the code for the actual accused products – the SRX and J series – and as a result 5 had to extrapolate as to how the SRX and J series products work from generalities present in the 6 operating code (JUNOS) that both products use. That “high level” assumption, according to Juniper, 7 cannot carry Implicit’s burden in opposing summary judgment. For the reasons discussed below, the 8 Court agrees and rejects Implicit’s attempt to shift its own burden – to show a material question of fact 9 supporting infringement in this technically complex case with highly specific claim limitations – onto United States District Court For the Northern District of California 10 Juniper. L & W, Inc. v. Shertech, Inc., 471 F.3d 1311, 1318 (Fed. Cir. 2006). 11 12 A. 13 To find infringement, “the court must determine that every claim limitation is found in the 14 accused device.” Playtex Products, Inc. v. Procter & Gamble Co., 400 F.3d 901, 909 (Fed. Cir. 2005) 15 (internal citations omitted). Summary judgment of non-infringement is a two-step analysis. First, the 16 claims of the patent must be construed to determine their scope, as a question of law. Pitney Bowes, Inc. 17 v. Hewlett-Packard Co., 182 F.3d 1298, 1304 (Fed. Cir. 1999) (internal citation omitted). Second, “a 18 determination must be made as to whether the properly construed claims read on the accused device.” 19 Id. The determination of infringement is generally a question of fact. Lockheed Martin Corp. v. Space 20 Sys./Loral, Inc., 324 F.3d 1308, 1318 (Fed. Cir. 2003). Since the ultimate burden of proving 21 infringement rests with the patentee, an accused infringer may establish that summary judgment is 22 proper “either by providing evidence that would preclude a finding of infringement, or by showing that 23 the evidence on file fails to establish a material issue of fact essential to the patentee’s case.” Novartis 24 Corp. v. Ben Venue Labs., Inc., 271 F.3d 1043, 1046 (Fed. Cir. 2001). Legal Standard 25 26 B. 27 As an initial matter, Implicit moves to exclude the expert testimony of Juniper’s non- Motion to Exclude Expert Testimony of Dr. Alexander 28 16 1 infringement expert, Dr. Peter Alexander. Juniper opposes that motion and, in response, cross-moves 2 to exclude the expert testimony of Implicit’s infringement expert, Dr. Scott Nettles. Implicit attacks Dr. 3 Alexander’s testimony on two grounds. The first ground is that Dr. Alexander did not independently 4 explore how the accused products operate and, therefore, his opinions are baseless. The second ground 5 is that when Dr. Alexander testified that Implicit’s expert Dr. Scott Nettles failed to prove by a 6 “preponderance of the evidence” that Juniper infringed, Dr. Alexander is not only incorrect, he is 7 attempting to usurp the jury’s function. Federal Rule of Evidence 702 provides that expert testimony is admissible if “scientific, 9 technical, or other specialized knowledge will assist the trier of fact to understand the evidence or to 10 United States District Court For the Northern District of California 8 determine a fact in issue.” Fed. R. Evid. 702. Expert testimony under Rule 702 must be both relevant 11 and reliable. Daubert v. Merrell Dow Pharms., 509 U.S. 579, 589 (1993). When considering evidence 12 proffered under Rule 702, the trial court must act as a “gatekeeper” by making a preliminary 13 determination that the expert's proposed testimony is reliable. Elsayed Mukhtar v. Cal. State Univ., 299 14 F.3d 1053, 1063 (9th Cir. 2002), amended by 319 F.3d 1073 (9th Cir. 2003). 15 Regarding Implicit’s first argument, the Court finds that given the scope of Dr. Alexander’s role 16 – which was to rebut Implicit’s expert’s infringement analysis – Dr. Alexander was not required to 17 conduct the in-depth “infringement analysis” Implicit contends he should have undertaken. Moreover, 18 Implicit’s arguments do not establish that Dr. Alexander’s opinions are unreliable such that they should 19 be excluded, but go more to the weight a jury may give to Dr. Alexander’s opinion (assuming Dr. 20 Alexander’s understanding of the accused products is relevant to his assertion that Dr. Nettles’ opinions 21 are deficient). With respect to the second argument, the Court finds that Implicit’s contentions 22 regarding the deficiencies in Dr. Alexander’s testimony (i.e., how Dr. Alexander criticized Dr. Nettles’ 23 conclusions and the basis for those criticisms) go to the weight a jury might give Dr. Alexander’s 24 conclusions and not their admissibility. 25 cross-examination, presentation of contrary evidence, and careful instruction on the burden of proof are 26 the traditional and appropriate means of attacking shaky but admissible evidence.”). Finally, the fact 27 that Dr. Alexander opines that Dr. Nettles has not established infringement by a preponderance of the See, e.g., Daubert, 28 17 509 U.S. at 596 (“Vigorous 1 evidence, is not a basis on which to exclude his testimony. See, e.g., Symbol Technologies, Inc. v. 2 Opticon, Inc., 935 F.2d 1569, 1575 (Fed. Cir. 1991) (“testimony on the ultimate issue of infringement 3 is permissible in patent cases”). 4 Implicit’s Motion to Exclude the testimony of Dr. Alexander, therefore, is DENIED. As 5 Juniper’s cross-motion to exclude Dr. Nettles’ report is made only in the alternative to its opposition 6 to Implicit’s motion to exclude Dr. Alexander’s testimony, that motion is likewise DENIED. 7 C. 9 Juniper argues that Implicit has failed to produce any evidence that the accused products – the 10 United States District Court For the Northern District of California 8 SRX and J-Series gateways and routers – contain all of the claim limitations. Juniper argues that by 11 relying only on an analysis of source code from a product series that is not alleged to infringe (the 12 “Multiservices” products) , and by relying on general technical and marketing documents regarding the 13 JUNOS operating system that is used across Juniper products, Implicit has failed to prove that the SRX 14 and J series products infringe. Non-infringement 15 Implicit does not contest that its expert, Pavel Treskunov, limited his code analysis to the 16 Multiservices products, as well as plug-ins/software components used by the Multiservices products. 17 Nor does Implicit contest that its infringement expert, Dr. Scott Nettles, relied on the Treskunov code 18 analysis to create his expert report regarding infringement. Indeed, throughout his report Dr. Nettles 19 relies on the Multiservices code and a list of plugins for the Multiservices products. See, e.g., Nettles 20 Expert Infringement Report, Ex. A [Ex. 8 to Hefazi Decl.], ¶ 14 (citing to Exhibit 3 for list of plug-ins 21 related to flow based processing); ¶ 32 (citing code). But nowhere in his discussion does Dr. Nettles 22 acknowledge that the code and plugins are for the Multiservices products. Nor does Dr. Nettles explain 23 why he believes that the Multiservices code and plugins he analyzes are used in the SRX or J-series 24 products, so that the SRX and J-series products would read on each limitation of the asserted claims. 25 Relatedly, as Juniper’s non-infringement expert Dr. Alexander points out, when Dr. Nettles conducts 26 his limitation-by-limitation infringement analysis, Dr. Nettles does not distinguish between different 27 types of SRX products (branch vs. high end) or between the SRX and J series products. See Alexander 28 18 1 Report, ¶ 71.18 Dr. Alexander, on the other hand, explains that Nettles’ reliance on the CPCD plugin19 is 3 misplaced, as that plugin is not used in the SRX or J series products. Alexander Report, ¶¶ 75-83. Dr. 4 Nettles’ reliance on the “mspman” packet handling code, which is related to the Multiservices PIC 5 Manager,20 is also misplaced as Dr. Alexander concludes the Multiservices PIC add-on card is a product 6 for routers that is not used by the SRX or J series products. Alexander Report, ¶¶ 84-96. Dr. Alexander 7 also criticizes Dr. Nettles’ reliance on the “service sets” concept, which Dr. Nettles uses as the basis for 8 his flow-based processing analysis and of the “dynamically identifying a non-predefined sequence of 9 components” limitations. Alexander Report, ¶¶ 87. Dr. Alexander concludes that the Service Set was 10 United States District Court For the Northern District of California 2 designed for use with the Multiservices products and is not used in the accused products. Id.; see also 11 id., ¶¶ 88-97. 12 Implicit argues that it can rely on Treskunov’s and Nettles’ analysis under the “proxy” or 13 exemplar infringement theory because the Multiservices products as well as the SRX and J series 14 products all use the One JUNOS Operating System. Therefore, Implicit argues that all of the products 15 can be assumed to operate and infringe in the way Dr. Nettles asserts that Multiservices products 16 infringe. However, Implicit provides no legal authority that would allow a device that is not accused 17 of infringing to be the proxy for accused devices.21 18 19 20 21 22 23 18 As a specific example see Dr. Nettles’s evidentiary support for asserting SRX and J series products read on Claim 1a, where Dr. Nettles does not cite any documents specifically regarding the J series products. Nettles Infringement Report, ¶ 71 (citing evidence, including Multiservices plugins as support for meeting Claim 1a limitation), ¶ 73 (citing Junos Security document referencing SRX but not J series products as support for meeting Claim 1a limitation). 19 See Nettles Infringement Report at 37 (example of “CPCD plugin handling first packet”); at 51 (“example of CPCD plugin returning ‘session ignore’ code as a result of the processing of the first packet of a session”). 24 20 See Nettles Infringement Report at 20 (discussing the mspman daemon). 25 21 26 27 28 Under the “proxy” theory, an expert who analyzes only one device in depth can testify that other accused products operate similarly as to the specific claim at issue. See, e.g., Tivo, Inc. v. Echostar Communications Corp., 516 F.3d 1290, 1308 (Fed. Cir. 2008) (“there is nothing improper about an expert testifying in detail about a particular device and then stating that the same analysis applies to other allegedly infringing devices that operate similarly, without discussing each type of device in detail.”). 19 1 More importantly, Dr. Nettles provides no reasoned opinion showing that the SRX and J series 2 products actually operate in the same way – for purposes of infringement analysis – as the Multiservices 3 products. A patentee cannot “simply ‘assume’ that all of [accused infringer’s] products are like the ones 4 that [the patentee] tested and thereby shift to [the accused infringer] the burden to show that is not the 5 case.” L & W, Inc. v. Shertech, Inc., 471 F.3d 1311, 1318 (Fed. Cir. 2006). As Dr. Alexander points 6 out, having a single operating system “does not mean [] that all of that software is loaded on each and 7 every system.” Tavakoli Depo. at 151:4-19; see also Alexander Report, ¶ 74.22 Different products have 8 different functionality enabled and use different portions of the JUNOS code tree. Tavakoli Depo. at 9 151:16-19. United States District Court For the Northern District of California 10 To support its argument that the Multiservices products operate in the same way – for purposes 11 of infringement – as the SRX and J series products, Implicit relies on the deposition testimony of 12 Krishna Narayanaswamy, a Juniper deponent. In his testimony, Mr. Narayanaswamy agreed that the 13 Multiservice DPC used “Junos-based” “flow-based” processing as did the J series routers and the SRX 14 products. Narayanaswamy Depo. [Exhibit B to Hosie Declaration re Juniper Infringement] at 190:16 - 15 192:3. However, that testimony does not establish that the “flow-based” processing being discussed in 16 general would read on the very specific claim limitations in this case.23 Therefore, while Implicit has 17 shown – by citation to deposition testimony and Juniper’s technical documents – that Juniper products 18 use JUNOS as the base source code (see, e.g., Appendix A to Expert Report on Infringement of Dr. 19 Scott Nettles at 7 (citing JUNOS OS: The Power of One Operating System at 1)), Implicit has not shown 20 how the accused products use specifically identifiable portions of JUNOS to support a finding that the 21 accused products read on every element of the asserted claims. 22 23 22 24 25 26 For example, Dr. Alexander points out that Dr. Nettles cites to JUNOS source code allowing for both flow-based and packet-based processing. Nettles Infringement Report, ¶¶ 31-32. According to Dr. Alexander, Dr. Nettles further contends that the high-end SRX series cannot perform packetbased processing. Alexander Report, ¶ 86. The fact that one of the SRX products at issue does not perform a function that is enabled by JUNOS shows the weakness of Implicit’s argument. Simply demonstrating that all products draw code blocks from JUNOS cannot support of showing of infringement here, especially considering the differences between the accused products. 27 23 28 Mr. Narayanaswamy also testified that other Juniper products were “flow-based” but did not operate on JUNOS. Id., at 192. 20 1 That missing connection cannot, on this summary judgment record, be made based on the fact 2 that all of Juniper’s products – or at least the SRX, J and Multiservices products – operate “flow based” 3 processing. As Implicit’s own founder testified, the patents at issue do not automatically cover “flow 4 based” processing systems. Balassanian Depo. at 985:5-9 (Ex. B. to Hefazi Reply Decl.[Docket No. 5 191-3]). Rather, specific elements of the patent claims at issue – e.g., dynamically identifying 6 components to process the data after receipt of the first packet, maintain state specific to a software 7 routine for a specific message that is not information related to an overall path – must be shown to be 8 practiced within the “flow based” processing used by the SRX and J series products.24 Implicit’s 9 evidence simply fails to make a showing sufficient to create a material issue of fact to defeat Juniper’s United States District Court For the Northern District of California 10 summary judgment motion. 11 Finally, Implicit repeatedly criticizes Juniper for failing to rebut Implicit and Dr. Nettles’ high- 12 level generalized arguments that the One JUNOS source code allows for an inference that the accused 13 products operate similarly to the actually-analyzed Multiservices products. However, Implicit is 14 impermissibly attempting to shift its own burden – to show a material question of fact supporting 15 Juniper’s infringement – onto Juniper. L & W, Inc. v. Shertech, Inc., 471 F.3d at 1318. Implicit has the 16 burden, especially in a technically complex case such as this, to show by expert testimony how the 17 accused products actually work. See, e.g., Centricut, LLC v. Esab Group, Inc., 390 F.3d 1361, 1370 18 (Fed. Cir. 2004) (“the patentee cannot satisfy its burden of proof by relying on testimony from those 19 who are admittedly not an expert in the field.”). Dr. Nettles’ assertions about JUNOS are far too 20 generalized and rely too much on technical citations and code for products other than the SRX and J 21 series, to support a claim-by-claim and limitation-by-limitation infringement analysis necessary to meet 22 Implicit’s burden in opposing summary judgment. See, e.g., Eugene Baratto, LLC v. Brushstrokes Fine 23 Art, Inc., 701 F. Supp. 2d 1068, 1080-81 (W.D. Wis. March 24, 2010) (exemplar approach “does not 24 25 26 27 28 24 Given the complex nature of the products at issue, and the specific, technical requirements of the asserted claims (e.g., maintaining component-based state information that is not related to the overall processing path), “even slight variations in product functionality may easily be the difference between infringement and non-infringement.” Alexander Report, ¶ 74. As such, even assuming that portions of the JUNOS code may practice on the method claimed, there still needs to be evidence showing not only that the accused products utilize the infringing aspects of the JUNOS code but how that use of that code in the accused products infringes. That showing has not been made here. 21 1 work when the only evidence supporting such grouping is merely that different versions of a product 2 are part of the same family and have the same basic functionality.” Baratto v. Brushstrokes Fine Art, 3 Inc., 701 F. Supp. 2d 1068, 1081 (W.D. Wis. 2010) (internal quotation omitted)). 4 The Court concludes, therefore, that Implicit has failed to raise a material question of fact on 5 infringement against Juniper, further supporting the grant of Summary Judgment in Juniper’s favor.25 6 7 III. F5’s Motion for Summary Judgment on Non-infringement F5 argues that its products do not meet the “dynamically identifying” and “non-predefined 9 sequence” post-first packet limitations because the accused F5 “BIG-IP” products use sequences of 10 United States District Court For the Northern District of California 8 components (Hudfilters) that have been fully identified and arranged (in Hudchains) prior to any data 11 entering the system. Implicit responds that the BIG-IP products infringe because the Hudchains are 12 simply processing policies, and F5’s products create a “stateful” message-specific path (the Connflow) 13 after the first packet of a message enters the system. It is the creation of the Connflow, Implicit argues, 14 that satisfies the dynamic identification of a non-predefined sequence of components limitation. For 15 the reasons discussed below, the Court agrees with F5, and finds Implicit has not raised a material issue 16 of fact as to the “dynamically identifying” and “non-predefined sequence of components” limitations.26 17 18 A. 19 As discussed in the Claim Construction Order, according to Implicit’s complaint, the heart of The Technology of the Patents and F5’s BIG-IP Products 20 21 25 22 23 24 25 26 27 28 Juniper also argues, as an alternate ground for summary judgment of non-infringement, that the source code and other materials relied upon by Implicit and Dr. Nettles fail to show that both of the accused products meet three other limitations: (1) that they “select individual components” in a compatibility check; (2) that the plurality of components selected meet the limitations requiring them to keep specific pieces of state; and (3) that the components are “dynamically identified” after the first packet is received. Because the Court has granted summary judgment of non-infringement, the Court need not reach these arguments but notes that Juniper has made a strong case that its products do not practice these three limitations. 26 F5 also argues that the accused products do not read on the “for each of a plurality of packets of the message in sequence,” “state information” and selecting components based on a “message” limitations. However, given the Court’s findings set out in this order, it need not reach F5’s additional arguments. See Kahn v. GMC, 135 F.3d 1472, 1477 (Fed. Cir. 1998) (“The absence of even a single limitation of [a claim] from the accused device precludes a finding of literal infringement.”). 22 the patents’ invention is a networking process where “discrete computer function[s], e.g., processing 2 http server requests over TCP/IP, streaming a video web-based client, or managing voice-over-ip calls, 3 would be built into a discrete software module, called a ‘bead.’” The system devised could 4 “dynamically” “receive a stream of data – say video – determine what services were necessary to render 5 that content and where the content was to be rendered, and then assemble – or string together – the 6 requisite service beads (modules) at run-time.” See, e.g., FAC [Docket No. 31, Case No. 10-3365], ¶ 7 16. This system, according to Implicit, dramatically departed from the prior art where a developer of 8 applications had to anticipate who would use the applications and for which devices and content, and 9 then build-in the ability to handle the anticipated demands. Id., ¶ 11. The prior art model had many 10 United States District Court For the Northern District of California 1 short falls, including an “ever-increasing complexity, cost, and processing overhead . . . Given that all 11 anticipated uses had to be preconfigured at build-time, any unanticipated new use, e.g., a different 12 format or a different device, would simply break the system. The developer had to have the foresight 13 to specify explicitly all possible configurations in advance, a difficult task in a rapidly changing world.” 14 Id., ¶ 12. 15 The ‘163 Patent entered reexamination in 2008 and emerged in June 2010 with additional 16 limitations. The purpose and result of the reexamination was to distinguish the ‘163 series of patents 17 from the prior art, and specifically from David Mosberger, “Scout: A Path-Based Operating System,” 18 Doctoral Dissertation Submitted to the University of Arizona. See Claim Construction Order at 3. The 19 ‘163 reexamination added a number of significant limitations in order to distinguish Mosberger, 20 including “dynamically identifying a non-predefined sequence of components” for processing 21 “messages,” wherein “dynamically identifying includes selecting individual components to create the 22 non-predefined sequence of components. . . .” ‘163 Reexam. 23 As discussed in the Claim Construction Order, Implicit’s September 1, 2009 Amendment and 24 Response in the ‘163 Reexam cited to the ‘163 specification distinguishing prior art systems which 25 “typically use predefined configuration information” to load the correct series of conversion routines 26 that make up the “path.” 9/1/09 Amendment and Response at 18. Implicit was attempting to distinguish 27 itself from prior art which had to “pre-bake” complete processing sequences for all potential formats 28 23 1 of data a system might want to process at compile time; Implicit patented inventions which require that 2 the sequences of components to be used to process messages be dynamically identified during run-time 3 but post-first packet, in order to accommodate for new data formats or different devices. See, e.g., FAC, 4 ¶ 12. Implicit’s Amendment and Response makes clear that what it was disclaiming in the prior art was 5 use of preconfigured sequences of routines, in other words preconfigured processing paths. See 9/1/09 6 Amendment and Response at 18 (“[T]he sequence of conversion routines (or ‘path’) is not configured 7 prior to receiving the first packet of a message.”); see also 2/8/10 Amendment and Response at 16. The accused F5 products are all part of the BIG-IP line of products. The BIG-IP products are 9 application controllers that allow clients to manage, inspect, transform and route their application traffic. 10 United States District Court For the Northern District of California 8 Declaration of Dr. James Storer, ¶ 42. For example, an internet users’ application request (e.g., placing 11 an order with an e-retailer, seeking access to bank account information) travels over the internet to an 12 F5 customer’s BIG-IP, which then processes and forwards the request to specific servers on the client- 13 side. Id., ¶ 43. Given the massive amounts of data being processed per second, the BIG-IP products 14 are designed to help increase the speed and performance of the client websites. Id. ¶ 41. 15 The BIG-IP products use a common operating system, Traffic Management Operating System 16 (TMOS). TMOS is a “modular,” or “pluggable” operating system. Id. ¶ 50. Within that system are 17 modules known as Hudfilters, which are code units that perform a processing step on the network traffic. 18 Id. ¶ 53. Hudchains are comprised of an identified set of Hudfilters that have been interconnected to 19 form a data processing sequence. Id. ¶ 54. The contents of the Hudchains – Hudfilters connected in a 20 specific sequence – are determined by Profiles selected by clients within the boundaries of F5’s hard- 21 coded configuration rules, called Hudfilter constraints. Id., ¶ 56. BIG-IP ships with a set of Profiles 22 that control the behavior and processing of particular types of network traffic, and client system 23 administrators can select which Profiles to implement or can build custom Profiles (for example, client 24 administrators can decide to enable cookie encryption for HTTP profiles). Id. Once the system 25 administrator selects or creates the Profiles, the BIG-IP system will use a Hudchain template to create 26 the Hudchains that include all necessary Hudfilters to process the client’s traffic in light of the client’s 27 needs. Id., ¶ 64. The Hudchain template is then built, using a Hudchain_select command, which 28 24 1 ensures compatibility between the Hudfilters. Id., ¶¶ 65-66. At that point, the system constructs the 2 actual Hudchain by implementing the Hudchain_construct function. Id., ¶ 67. The system will then 3 assign the Hudchain a “listener” pointer which, when a particular type of traffic arrives, will direct the 4 packets to the Hudfilters specified in the Hudchain for processing that type of message. Id., ¶¶ 68, 69. 5 As such, the Hudchains are fully identified and determined before any network traffic enters the system. 6 Id., ¶ 69. Once the first packet of a message or flow hits the system and a TCP connection is established 8 – which requires the exchange of information between the user computer and the client server and 9 therefore occurs only after the exchange of three preliminary packets of a message/flow27 – the system 10 United States District Court For the Northern District of California 7 creates a Connflow. The Connflow is a dedicated area of memory in the system, that has a pointer to 11 the first Hudfilter of an existing Hudchain to allow the processing of the flow. Id., ¶70; see also id. 12 ¶¶86-87. The Connflow stores information unique to a particular flow and tracks, for example, the 13 Hudfilter’s connection state and the expected sequence number of the next packet of the flow. Id., ¶ 87. 14 However, the individual Hudfilters processing the packets as well as the Hudchains setting out the 15 parameters for the processing, are stored in separate memory space and are loaded into the system on 16 initialization. Id. Once a message/flow starts to be processed, any changes in the Hudchain or additions 17 to the functionality of the Hudfilters, will not be applied to any existing flow.28 Those changes will only 18 be applied to new flows that enter the system after the revised or new Hudchain is constructed. Id., ¶ 19 70. 20 Implicit and its expert Dr. Scott Nettles do not dispute that this is the basic design and 21 configuration of the BIG-IP products. Instead, as discussed below, the main point of dispute between 22 the parties is whether the Hudchain or the Connflow is the “sequence” or “path” that needs to be 23 dynamically-identified by the system post-first packet in order to read on the claim limitations. Because 24 the parties’ arguments hinge on claim construction – and largely reiterate arguments made during Claim 25 26 27 See id., ¶ 81. 27 28 28 For example, the system allows client administrators to implement iRules to enhance the functionality of specific Hudfilters. Id., ¶ 71. 25 1 Construction – they lend themselves to resolution on summary judgment. See, e.g., Rheox, Inc. v. 2 Entact, Inc., 276 F.3d 1319, 1324 (Fed. Cir. 2002). 3 B. 5 As noted above, the Court defined “non-predefined sequence of components” as “a sequence of 6 software routines that was not identified before the first packet of a message was received.” Claim 7 Construction Order at 6. In doing so, the Court noted that in the initial ‘163 Reexam, Implicit did not 8 disclaim the ability to rely in “some part” on predefined “configuration information” to identify the non- 9 predefined sequence, but disclaimed the use of “pre-configured paths.” Id. The Court also noted that 10 United States District Court For the Northern District of California 4 the claim language itself requires that identification of the sequence occur “after the first packet is 11 received.” Id. Non-Predefined Sequence of Components 12 F5 argues that its BIG-IP products cannot meet this limitation because the sequence of 13 components is pre-defined – it is defined in the Hudchains before any traffic hits the system. Implicit 14 counters that F5’s Connflows, created post-first packet, are the actual processing paths followed by the 15 packets in a message and that they represent the “sequence of components” identified “after the first 16 packet is received” which satisfy this limitation. The Court rejects Implicit’s argument. Implicit 17 attempts to add a requirement – that the method not only identify the sequence of components to be 18 used to process a particular type of message/flow but also “create” an actual, “stateful” path in memory 19 that will track the processing of one particular message/flow. 20 recognizes the distinction between the Hudchains (which set out how types of messages/flows will be 21 processed) and the Connflows (which keep in memory the pointers to the initial Hudfilters and keep 22 track of the actual processing of the packets of a specific flow/message), but the identification and 23 selection of the individual components to form the processing sequence is what is required by the claim 24 language. That is what happens when the Hud_construct function creates the Hudchains based on the See Oppo. at 13, 19.29 The Court 25 26 29 27 28 Apparently, this is why Implicit proposed construing “create” as used in “wherein dynamically identifying includes selecting individual components to create the non-predefined sequence of components after the first packet is received” to mean “instantiate in memory.” Claim Construction Order at 11. The Court rejected Implicit’s attempt and adopted the plain meaning of create. Id. 26 1 Policies adopted by the BIG-IP clients. This conclusion is consistent with Implicit’s repeated 2 characterization of its invention as one which was different from prior art because Implicit’s patents 3 identify the individual components needed process the message (the sequence) dynamically and post- 4 first packet. See, e.g., 9/1/09 Amendment and Response at 12 (“configuring a path at build time (i.e., 5 identifying the components used to process message packets before actually receiving any message 6 packets) is fundamentally different than configuring a path at run-time (i.e., identifying the components 7 for processing message packets after receiving the packets). . . .”). It was this dynamic selection of 8 components, occurring post-first packet, that would allow Implicit’s system to accommodate a message 9 carrying a new format or needing to be delivered to a new device.30 FAC, ¶ 12.31 United States District Court For the Northern District of California 10 It is true that Implicit did not disavow using pre-configured processing information “in some 11 part.” See Claim Construction Order at 6. However, Implicit’s did disclaim the use of a pre-configured 12 sequence of components, as represented in the BIG-IP products as the Hudchain. Id. It is not disputed 13 that the Hudchains which set out the processing routines to be applied to every authorized type of 14 message/flow are defined and loaded into the system’s memory prior to the arrival of the first packet. 15 Therefore, they cannot read on this significant limitation. 16 17 C. 18 In the Court’s Claim Construction Order, the Court adopted the plain meaning of “dynamically 19 identifying” because it was adequately defined in the wherein clause of the claim language (“wherein Dynamically Identifying and Selecting Individual Components 20 21 30 22 23 24 25 26 27 28 The undisputed fact that thousands of flows could use the same Hudchain at the same time but only one Connflow is created for each message/flow (see Oppo. at 12), does not change the Court’s conclusion. The fact that Connflows are necessary to provide memory enabling and tracking the processing of each message/flow does not make them into a “non-predefined sequence of components.” The Connflow is simply a feature that allows the identified, predefined sequence controlled by the Hudchain to run. 31 Implicit does not dispute that if the BIG-IP products receive a data packet that is not recognized or pre-authorized for processing by a specific Hudchain, the packet will not be processed. See Storer Report, ¶ 95; see also id., ¶¶ 69, 153 (noting that in order to process high volumes of network traffic, BIG-IP uses preset processing sequences; a non-predetermined system using dynamic selection of processing routines “could not achieve the data throughput requirements of a large enterprise application.”). BIG-IP, therefore, functions in a way that is contrary to the purpose of Implicit’s inventions. 27 1 dynamically identifying includes selecting individual components to create the non-predefined sequence 2 of components after the first packet is received”). Claim Construction Order at 7. The Court also 3 construed “selecting individual components” as “selecting the individual software routines of the 4 sequence so that the input and output formats of the software routines are compatible.” Id., at 11. 5 6 i. Dynamically Identifying 7 F5 argues that the BIG-IP products cannot meet the limitation of “dynamically identifying” a 8 non-predefined sequence, where “dynamically identifying includes selecting individual components to 9 create the non-predefined sequence of components after the first packet is received.” Claim United States District Court For the Northern District of California 10 Construction Order at 7. F5 notes that no dynamic identification occurs post-first packet because the 11 Hudchains determine the components to be used for processing prior to any information hitting the 12 system. Implicit responds that because the actual processing of the packets is controlled by the 13 Connflow, which is not created until post-first packet, this limitation is met. However, the Connflow 14 is a structure in the memory used to track the actual processing of a specific message. By contrast, the 15 dynamic identification limitation is aimed at selecting the individual software routines, which in the 16 BIG-IP products happens through the predefined Hudchains prior to any traffic hitting the system. For 17 the same reasons as discussed above, the BIG-IP products cannot meet this limitation.32 18 19 ii. Selecting Individual Components 20 The Claim Construction Order found that a “necessary” part of selecting individual components 21 is determining the compatibility between the output of one software routine and the input of the next. 22 Claim Construction Order at 11. F5 argues that Implicit has failed to identify a “compatibility check” 23 in the BIG-IP products that operates during the dynamic identification of the individual components 24 which, under Implicit’s argument, allegedly occurs during the instantiation of the Connflow. Instead, 25 26 27 28 32 This analysis is not altered by calling the “non-predefined sequence of components” a “path,” as Implicit’s expert, Dr. Nettles, does repeatedly. See Nettles Infringement Report, ¶¶ 53-59. The claims do not require the dynamic selection of a physical processing path, they require the dynamic selection of the full sequence of processing components. There is no support for Implicit’s attempt to redefine the claims. 28 F5 argues that the compatibility check in the BIG-IP products is handled by the Hudfilter constraints 2 implemented prior to the building of the actual, predefined Hudchains. Implicit responds that the claims 3 do not require any particular “process” for ensuring compatibility, other than application of general 4 policies (for example, industry standards) which ensure the packets of a message can be handed off for 5 further processing from one component to the next. Implicit also argues that this “compatibility” can 6 be ensured when components are matched together in creating F5’s Hudchains or Implicit’s 7 LabelMapGet utility. Oppo. F5 at 24. However, like the “selecting of individual components” step of 8 which it is a part, the compatibility step has to be done post-first packet. Implicit points to no evidence 9 that there is any type of compatibility check in BIG-IP, other than in the Hudfilter constraints step run 10 United States District Court For the Northern District of California 1 before the Hudchains are put in place and run well before the instantiation of the Connflow.33 11 Moreover, whether or not Implicit’s LabelMapGet utility functions in a similar manner to the Hudfilter 12 constraints used by BIG-IP products, there is no dispute that LabelMapGet is used in Implicit’s 13 inventions post-first packet.34 14 15 For these additional reasons, F5’s BIG-IP products do not read on necessary limitations in the claims and summary judgment should be granted in F5’s favor.35 16 17 /// 18 /// 19 20 21 22 33 See Nettles Deposition [Ex. C to Brun Decl.] at 158:23-159:6 (testifying that F5 satisfies the selecting individual components limitation by applying constraints before the first packet of a flow is received). 23 34 24 25 26 27 28 Relatedly, although Implicit’s inventions may “rely[] in some part on ‘predefined configuration information’” in light of the LabelMapGet function used in a preferred embodiment, Implicit disclaimed use of a pre-defined sequence of processing components. Claim Construction Order at 6. The amended claim language and Implicit’s statements in the Reexam therefore require some dynamic-identification of individual components, ensuring the packets are compatible, post arrival of the first packet. Implicit has not pointed to any feature in the BIG-IP products that does this. 35 Having determined that at least these significant limitations are not met by F5's products, the Court need not address F5’s remaining non-infringement arguments. 29 1 CONCLUSION 2 For the foregoing reasons and for good cause shown, the Court GRANTS defendants’ motion 3 for summary judgment on invalidity. The Court also GRANTS both defendants’ motions for summary 4 judgment on non-infringement. 5 6 IT IS SO ORDERED. 7 Dated: March 13, 2013 8 SUSAN ILLSTON United States District Judge 9 United States District Court For the Northern District of California 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 30

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?