Fortinet, Inc. v. SRI International, Inc.
Filing
85
TENTATIVE RULINGS AND QUESTIONS RE CLAIM CONSTRUCTION. Signed by Judge Jeffrey S. White on October 3, 2013. (jswlc3, COURT STAFF) (Filed on 10/3/2013)
1
2
3
4
5
IN THE UNITED STATES DISTRICT COURT
6
FOR THE NORTHERN DISTRICT OF CALIFORNIA
7
8
FORTINET, INC.,
9
Plaintiff,
United States District Court
For the Northern District of California
10
11
v.
Defendant.
/
13
CHECK POINT SOFTWARE
TECHNOLOGIES, INC.,
15
16
17
18
TENTATIVE RULINGS AND
QUESTIONS RE CLAIM
CONSTRUCTION
SRI INTERNATIONAL, INC.,
12
14
No. C 12-02540 JSW
No. C 12-03231 JSW
Plaintiff,
v.
SRI INTERNATIONAL, INC.,
Defendant.
/
19
20
TO ALL PARTIES AND THEIR ATTORNEYS OF RECORD, PLEASE TAKE NOTICE OF
21
THE FOLLOWING TENTATIVE RULING AND QUESTIONS FOR THE HEARING SCHEDULED
22
ON OCTOBER 8, 2013, AT 1:30 p.m.:
23
The Court has reviewed the parties’ briefs and, thus, does not wish to hear the parties reargue
24
matters addressed in those pleadings. If the parties intend to rely on legal authorities not cited in their
25
briefs, they are ORDERED to notify the Court and opposing counsel of those authorities reasonably in
26
advance of the hearing and to make copies available at the hearing. If the parties submit such additional
27
authorities, they are ORDERED to submit the citations to the authorities only, without argument or
28
additional briefing. Cf. N.D. Civil Local Rule 7-3(d). The parties will be given the opportunity at oral
1
argument to explain their reliance on such authority. The Court suggests that associates or of counsel
2
attorneys who are working on this case be permitted to address some or all of the Court’s questions
3
contained herein.
4
5
The parties shall each have 60 minutes to present their respective arguments on claim
construction. The Court provides its tentative constructions of the disputed terms.
6
1.
7
The term “network monitors appears in Claims 1, 4, 6, 13, 16, and 18 of the ‘615 Patent, and
8
Claims 1, 4, 6, 12, 15, and 17 of the ‘203 Patent. The term “the monitors” appears in Claim 1 of both
9
the ‘615 and the ‘203 Patents. The parties agree that “the monitors” refers to “network monitors.”
“Network monitors”/“the monitors”
United States District Court
For the Northern District of California
10
SRI argues that the term “network monitors” must be construed to mean “software and/or
11
hardware that can collect, analyze and/or respond to data.” (Parties’ Final Joint Claim Construction
12
Statement (“Statement”) at App. A.) Fortinet and Check Point (collectively, “the Plaintiffs”), on the
13
other hand, argue that the term must be construed to mean “software and/or hardware that can detect
14
suspicious activity by analyzing network traffic data.” (Id.)
15
It appears that the key dispute between the parties is whether all “network monitors” must be
16
capable of detecting suspicious activity through the analysis of network traffic data. SRI argues that the
17
construction the Plaintiffs advance would improperly require hierarchical monitors to include this
18
capability. SRI further contends that the Plaintiffs’ proposed construction creates a redundancy in the
19
claim language. What is the Plaintiffs’ best argument that it is not confusing and redundant to construe
20
“network monitors,” in the context of the claim, to read “detecting, by the ‘software and/or hardware
21
that can detect suspicious activity by analyzing network traffic data,’ suspicious network activity based
22
on analysis of network traffic data”?
23
24
The Court tentatively adopts the following construction: “software and/or hardware that can
collect, analyze and/or respond to data.”
25
2.
26
The term “suspicious network activity” appears in Claims 1 and 13 of the ‘615 Patent, and
27
28
“Suspicious network activity”
Claims 1 and 12 of the ‘203 Patent.
SRI argues that the term “suspicious network activity” must be construed to mean “activity that
2
1
indicates a known or possible malicious attack on the network.” (Statement at App. A.) The Plaintiffs,
2
on the other hand, argue that the term must be construed to mean “network traffic with attributes of a
3
suspected, but unconfirmed, intrusion.” (Id.)
The key areas of dispute between the parties are: (1) whether “suspicious network activity” can
5
encompass known attacks; and (2) whether “network activity” is synonymous with “network traffic.”
6
How does SRI contend that “suspicious network activity” can include known threats, when the Patent
7
specifications distinguish between “intrusion reports” relating to known malicious activity, and
8
“suspicion reports” that presumably relate to unconfirmed threats? (See ‘203 Patent at 7:38-45.)
9
Additionally, why does SRI argue that it is improper to construe “network activity” as “network traffic”
10
United States District Court
For the Northern District of California
4
when the Patent specifications appear to use the terms interchangeably? (Compare ‘203 Patent at 11:41-
11
44 with id. at 1:55-57.)
12
13
The Court tentatively adopts the following construction: “network traffic with attributes of a
suspected, but unconfirmed, intrusion.”
14
3.
15
The term “automatically receiving and integrating” appears in Claim 1 of both the ‘615 and the
16
“Automatically receiving and integrating”
‘203 Patents.
17
SRI argues that the term “automatically receiving and integrating” must be construed to mean
18
“without user intervention, receiving reports of suspicious activity and combining those reports into a
19
different end product; i.e., something more than simply collecting and reiterating data.” (Statement at
20
App. A.) The Plaintiffs, on the other hand, argue that the term must be construed to mean “without user
21
intervention, receiving reports of suspicious activity and combining those reports into a different end
22
product (i.e., something more than simply collecting and reiterating data) for purposes of detecting a
23
suspected attack or threat.” (Id.)
24
The key dispute between the parties is whether detecting a suspected attack or threat is the sole
25
purpose of “automatically receiving and integrating.” How do the Plaintiffs reconcile this proposed
26
limitation with language in the specifications that sets forth other goals for integration, such as alerting
27
other network entities, identifying attacks to other network entities, and determining the proper response
28
in which the system should engage? (See ‘203 Patent at 2:10-14, 3:23-42.)
3
1
The Court tentatively adopts the following construction: “without user intervention, receiving
2
reports of suspicious activity and combining those reports into a different end product; i.e., something
3
more than simply collecting and reiterating data.”
4
4.
5
The term [hierarchical monitors] “adapted to automatically receive and integrate” appears in
6
[hierarchical monitors] “adapted to automatically receive and integrate”
Claim 13 of the ‘615 Patent and Claim 12 of the ‘203 Patent.
SRI argues that the term [hierarchical monitors] “adapted to automatically receive and integrate”
8
must be construed to mean “capable of receiving reports of suspicious activity and, without user
9
intervention, combining those reports into a different end product; i.e., something more than simply
10
United States District Court
For the Northern District of California
7
collecting and reiterating data.” (Statement at App. A.) The Plaintiffs, on the other hand, argue that the
11
term “adapted to” does not be construed, and the remainder of the term must be construed to mean
12
“without user intervention, receiving reports of suspicious activity and combining those reports into a
13
different end product (i.e., something more than simply collecting and reiterating data) for purposes of
14
detecting a suspected attack or threat.” (Id.)
15
The key dispute between the parties is whether “adapted to” should be construed as synonymous
16
with “capable of.” How does SRI respond to case law indicating that “adapted to” is most commonly
17
defined more narrowly than “capable of”? See, e.g., Aspex Eyewear, Inc. V. Marchon Eyewear, Inc.,
18
672 F.3d 1335, 1349 (Fed. Cir. 2012); Brocade Commc’ns Sys., Inc. V. A10 Networks, Inc., No. C 10-
19
3428 PSG, 2013 WL 831528, at *10-11 (N.D. Cal. Jan. 10, 2013).
20
The Court tentatively adopts the following construction: “without user intervention, receiving
21
reports of suspicious activity and combining those reports into a different end product; i.e., something
22
more than simply collecting and reiterating data.”
23
24
25
26
5.
“Detecting, by the network monitors, suspicious activity based on analysis of
network traffic data”
The term “detecting, by the network monitors, suspicious activity based on analysis of network
traffic data” appears in Claim 1 of both the ‘615 and ‘203 Patents.
27
SRI argues that the term “detecting, by the network monitors, suspicious activity based on
28
analysis of network traffic data” must be construed to mean “detecting based on an analysis of data
4
1
derived from or describing network packets and excluding analysis that is limited solely to host
2
operating system audit logs.” (Statement at App. A.) The Plaintiffs, on the other hand, argue that the
3
term must be construed to mean “detecting, by the network monitors, suspicious network activity based
4
on direct examination of network packets.” (Id.)
5
The key dispute between the parties is whether “detecting” requires direct examination of data.
6
Why is SRI not estopped from arguing for its proposed construction by its express assertions during
7
reexamination that “analysis of network traffic data” requires direct examination of network packets?
8
(See, e.g., Appeal Brief at 7; Reply Brief at 5.)
9
United States District Court
For the Northern District of California
10
11
12
The Court tentatively adopts the following construction: “detecting, by the network monitors,
suspicious network activity based on direct examination of network packets.”
6.
“Said plurality of network monitors detecting suspicious network activity based on
analysis of network traffic data”
13
The term “said plurality of network monitors detecting suspicious network activity based on
14
analysis of network traffic data” appears in Claim 13 of the ‘615 Patent and Claim 12 of the ‘203 Patent.
15
SRI argues that the term “said plurality of network monitors detecting suspicious network
16
activity based on analysis of network traffic data” must be construed to mean “capable of detecting
17
based on an analysis of data derived from or describing network packets and excluding analysis that is
18
limited solely to host operating system audit logs.” (Statement at App. A.) The Plaintiffs, on the other
19
hand, argue that the term must be construed to mean “said plurality of network monitors detecting
20
suspicious network activity based on direct examination of network packets.” (Id.)
21
The key dispute between the parties – apart from that described above in Claim term 5 – is
22
whether the network monitors must be actively detecting suspicious network activity, or merely capable
23
of performing that function. How does SRI reconcile its proposed construction with the Claim language
24
indicating that the network monitors are already deployed and actively detecting suspicious network
25
activity? (See ‘203 Patent, Claim 12.)
26
27
The Court tentatively adopts the following construction: “said plurality of network monitors
detecting suspicious network activity based on direct examination of network packets.”
28
5
1
7.
2
The terms “network monitors deployed”/“network monitors are deployed” appears in Claims
3
“Network monitors deployed”/“network monitors are deployed”
13 and 18 of the ‘615 Patent, and Claims 12 and 17 of the ‘203 Patent.
SRI argues that the terms “network monitors deployed”/“network monitors are deployed” must
5
be construed to mean “network monitors that can be configured and/or installed.” (Statement at App.
6
A.) The Plaintiffs, on the other hand, note that the parties agree that “deploying a plurality of network
7
monitors” means “configuring and/or installing two or more network monitors,” and that “software is
8
configured and hardware is installed.” (Id.) The Plaintiffs contend that this claim term does not require
9
additional construction, but argue that if the Court construes the term, it must be construed to mean
10
United States District Court
For the Northern District of California
4
“network monitors that are configured and/or installed” and that “software is configured and hardware
11
is installed.” (Id.)
12
13
14
15
The key dispute between the parties is whether “deployed” means that the network monitors are
configured or installed, or merely capable of being configured or installed.
The Court tentatively adopts the following construction: “network monitors that are configured
and/or installed” and “software is configured and hardware is installed.”
16
8.
17
The term “correlating intrusion reports reflecting underlying commonalities” appears in Claim
18
“Correlating intrusion reports reflecting underlying commonalities”
2 of both the ‘615 and the ‘203 Patents.
19
SRI argues that the term “correlating intrusion reports reflecting underlying commonalities”
20
must be construed to mean “combining the reports to reflect underlying commonalities.” (Statement
21
at App. A.) Check Point agrees with SRI’s proposed construction. (Id. at 2 n.1.) Fortinet, on the other
22
hand, argues that the term either needs no construction, or in the alternative, it must be construed to
23
mean “combining intrusion reports with underlying commonalities to identify more global threats.” (Id.
24
at App. A.)
25
The key dispute between SRI and Fortinet is whether the sole purpose of combining the reports
26
is to identify more global threats to the network. What is Fortinet’s best argument that the purpose of
27
combining reports should be solely to identify more global threats?
28
The Court tentatively adopts the following construction: “combining the reports to reflect
6
1
underlying commonalities.”
2
9.
3
The term “correlating intrusion reports reflecting underlying commonalities” appears in Claim
4
“Correlating intrusion reports reflecting underlying commonalities”
14 of the ‘615 Patent, and Claim 13 of the ‘203 Patent.
SRI argues that the term “correlating intrusion reports reflecting underlying commonalities” in
6
the context of these Claims must be construed to mean “capable of combining the reports to reflect
7
underlying commonalities.” (Statement at App. A.) The Plaintiffs do not believe this term needs
8
additional construction but argue that it must be construed consistently with Claim term 8, above. (Id.)
9
The key dispute between the parties is whether integration requires hierarchical monitors to be
10
United States District Court
For the Northern District of California
5
correlating reports or whether it merely requires that they possess the capability to correlate reports.
11
How does SRI respond to the Plaintiffs’ contention that the claimed system does not exist unless the
12
hierarchical monitors are actually correlating reports?
13
14
The Court tentatively adopts the following construction: “combining the reports to reflect
underlying commonalities.”
15
10.
16
The term “network traffic data” appears in Claims 1 and 13 of the ‘615 Patent, and Claims 1 and
17
“Network traffic data”
12 of the ‘203 Patent.
18
SRI does not believe that this term requires construction. (Statement at App. A.) However,
19
should the Court construe the term, SRI argues that the term “network traffic data” must be construed
20
to mean “data derived from or describing network packets.” (Id.) The Plaintiffs, on the other hand,
21
argue that the term must be construed to mean “network traffic data” is comprised of “network packets.”
22
(Id.)
23
The key dispute between the parties is whether network traffic data can be equated with network
24
packets. What is SRI’s best argument that it should not be bound by its own statement during
25
reexamination that “the phrase ‘network traffic data’ refers to data obtained from network traffic, i.e.,
26
network packets”?
27
//
28
//
7
1
2
3
The Court tentatively adopts the following construction: “network traffic data” is comprised of
“network packets.”
IT IS SO ORDERED.
4
5
Dated: October 3, 2013
JEFFREY S. WHITE
UNITED STATES DISTRICT JUDGE
6
7
8
9
United States District Court
For the Northern District of California
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
8
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?