Wang v. Palo Alto Networks, Inc. et al

Filing 171

ORDER GRANTING DEFENDANTS MOTION FOR SUMMARY JUDGMENT ON CLAIM FOR MISAPPROPRIATION OF TRADE SECRETS UNDER THE STATUTE OF LIMITATIONS by Hon. William Alsup granting 137 Motion for Summary Judgment.(whalc1, COURT STAFF) (Filed on 4/11/2014)

Download PDF
1 2 3 4 5 IN THE UNITED STATES DISTRICT COURT 6 FOR THE NORTHERN DISTRICT OF CALIFORNIA 7 8 QIANG WANG, Plaintiff, 9 United States District Court For the Northern District of California 10 No. C 12-05579 WHA v. ORDER GRANTING DEFENDANTS’ MOTION FOR SUMMARY JUDGMENT ON CLAIM FOR MISAPPROPRIATION OF TRADE SECRETS UNDER THE STATUTE OF LIMITATIONS 11 12 13 PALO ALTO NETWORKS, INC., NIR ZUK, and FENGMIN GONG, Defendants. / 14 15 16 INTRODUCTION In this action alleging misappropriation of trade secrets and patent infringement, 17 defendants move for summary judgment on plaintiff’s misappropriation of trade secrets claim 18 under the statute of limitations. For the reasons stated herein, the motion is GRANTED. 19 20 STATEMENT Plaintiff Qiang Wang is an architect and design engineer in the field of network security. 21 From 2000 to 2012, Wang tried to commercialize his firewall technologies via ventures called 22 GoldShield Networks and ForeSecurity. His efforts were largely unsuccessful. In 2012, 23 after defendant Palo Alto Networks’ successful initial public offering and it was sued in a 24 patent-infringement lawsuit by Juniper Networks, Inc. (in Delaware), Wang commenced this 25 action. Wang allegedly learned about the alleged trade secret theft via news articles covering 26 the initial public offering and the filings in the patent litigation. Wang’s theory is that his former 27 business partner, defendant Fengmin Gong obtained his trust, learned his trade secrets, and 28 misappropriated them for use by Palo Alto Networks. 1 This story begins in the early 2000s when Wang allegedly developed some firewall 2 technologies. This included a “fast signature scan” technology. He filed a patent application 3 thereon in November 2004. (The patent eventually issued and is asserted in the 4 patent-infringement claim.) Wang tried to commercialize his firewall technologies 5 through a venture called GoldShield Networks. Over the course of 2003 to 2010, Wang 6 attempted to interest a number of venture capitalists, competitors, and entities in his technology, 7 but his efforts never took off. This order will retrace the history so that the reader can catalog 8 the moments when plaintiff might have been on notice that his trade secrets had been stolen for 9 purposes of commencing the limitation period. United States District Court For the Northern District of California 10 In February 2005, Wang met defendant Fengmin Gong at a seminar. At the time, Gong 11 was a chief scientist at McAfee, Inc. Upon meeting Gong, Wang disclosed that he had trade 12 secrets in the areas of “fast signature scan,” “application-identification,” “classification,” 13 “network security engine,” and “flow management” — he did not immediately disclose his trade 14 secrets, however (Wang Dep. at 332–34).1 15 Around the same time, defendant Nir Zuk left Juniper Networks, Inc. to form defendant 16 Palo Alto Networks, Inc. Around May and June 2005, Zuk allegedly conceived of his own 17 next-generation firewalls. 18 In April 2005, Wang and Gong entered into a non-disclosure agreement. The agreement 19 “only applie[d] to information related to the ‘fast signature scan’ method discussed” and would 20 terminate in three years. Wang never asked Gong to sign a non-disclosure agreement for any 21 other trade secrets. Nevertheless, during the course of April to July 2005, Wang and Gong met 22 in-person for hours on end and Wang disclosed his trade secrets. Wang also gave Gong a copy 23 of the fast-signature scan patent application and some notes (Wang Dep. at 350–51, 358, 363–64, 24 481, Patchen Decl. Exh. 12). Gong was the only person who knew Wang’s trade secrets. 25 26 1 27 28 Deposition excerpts for Qiang Wang are appended to the declarations of Jonathan Patchen (Exhibits 1, 2) and Gabriel Opatken (Exhibit B). Excerpts of Fengmin Gong’s testimony are appended to Attorney Opatken’s declaration (Exhibit A) and excerpts of Nir Zuk’s testimony are appended to Attorney Patchen’s declaration (Exhibit 3). 2 1 The non-disclosure agreement stated: “Upon termination or expiration of the 2 Agreement, or upon written request of [Qiang Wang], [Fengmin Gong] shall promptly return 3 to [Qiang Wang] all documents and other tangible materials representing the Confidential 4 Information and all copies thereof.” Significantly, Gong never returned any materials provided 5 to him under the agreement — by April 2008, this was a breach (Wang Dep. at 481–82). 6 During oral argument, Wang’s counsel were asked whether Gong ever requested a suspension 7 or modification of this requirement of the agreement. The answer was no. 8 9 In deposition, Gong described their relationship as one of “mutual trust” (Gong Dep. at 20). Wang spoke of his trust for Gong as well. In Wang’s view, they were united by their vision United States District Court For the Northern District of California 10 to “go with content security, rather than [a] traditional firewall” (Wang Dep. at 355, 387–88). 11 Up to the point of the non-disclosure agreement (April 2005), Zuk and Palo Alto Networks had 12 nothing to do with the case. 13 Two months later, in June 2005, plaintiff Wang, defendant Gong, and defendant Zuk met 14 for one hour to discuss combining their efforts, after a referral from Greylock Partners (a venture 15 capital firm). Wang, at the time, believed Palo Alto Networks was a “traditional firewall, 16 conventional firewall” company. A few days later, Wang and Zuk met for breakfast. 17 Wang testified about his discussion with Zuk: 18 Q. That that [sic] was the substance of what he said about patents in that meeting? A. That is one point. He basically say patent is not very enforceable, not very useful for — if — like for me, without money, yeah. 19 20 21 * * * 22 Q. Were you shocked because you understood him to be saying that he didn’t care about infringing anyone else’s patents? A. Sure. 23 24 25 (Wang Dep. at 25, 27, 373–75). In other words, albeit upon leading and argumentative 26 questioning, Wang asserted that Zuk did not care whether he infringed any patents 27 28 3 1 (Amd. Compl. ¶ 17). Subsequent to the meeting, Gong (who would later join Palo Alto 2 Networks) and Zuk had the following email exchange, dated June 9, 2005 (Patchen Decl. 3 Exh. 44): 4 Hi Nir, 5 Thanks for coming to chat with us. 6 * 7 * * 9 Thanks, 10 United States District Court For the Northern District of California 8 The second thing is that . . . What would you consider to be the main thing respectively for us to win a customer over each of these players in 18 months: CISCO, Juniper, McAfee? Fengmin 11 Zuk responded (ellipses in original): 12 Fengmin — the answer to your second question is a big secret of Palo Alto Networks . . . Let’s wait until you decide joining vs. starting your own company before we go there . . . In the meanwhile, please rest assure that both Sequoia and Greylock believe in our ability to differentiate enough vs. the big guys. As for your first question, we talked to ~ 20 customers and analysts. I will [be] more than happy to share names at the right moment. 13 14 15 16 In August 2005, Gong wrote to Wang: “Here is a copy of my non-compete agreement 17 with McAfee. I had another discussion with him today and he confirmed to me that the company 18 will definitely oppose my involvement with the project because of the overwhelming overlap 19 of the scope” (Opatken Decl. Exh. D). In late 2005, Gong joined Palo Alto Networks as a chief 20 scientist. Zuk then began introducing Gong as a “founder of Palo Alto Networks.” Gong kept 21 Wang informed of his decision to join Palo Alto Networks (Wang Dep. at 388, Patchen Decl. 22 Exh. 51). 23 In January 2006, Gong urged Zuk to license Wang’s technology. Gong wrote in an 24 email, dated January 6, 2006, that he had chatted with Wang: “He has been spending some time 25 to verify the design using a software implementation. He told me that he used ClamAV 26 signatures to test the software. He told me that without me teaming with him, he is planning on 27 licensing/selling that in some form.” In another email, dated January 25, 2006, Gong wrote: 28 “one arrangement could be for him to be on board for FPGA design, applying ideas from his 4 1 patent as appropriate. We pick up his cost for filing so far, and continue to support the 2 application with the agreement that upon approval, we automatically get granted the license 3 for use [sic] it” (Opatken Decl. Exhs. N, O). Zuk, however, decided not to bring in Wang. 4 Meanwhile, Wang continued his efforts to obtain funding for his own operation. 5 In January 2006, Wang and a potential business partner at Rustic Canyon (venture capital 6 firm) created a deck of slides, entitled “Integrated Network Security (INS): Technology 7 and Competitive Landscape,” wherein they listed “Palo Alto” as a player in the “multi-core 8 processors” space. Wang wrote in an email, dated January 26, 2006, “We may want to put 9 Tidal Networks, Palo Alto Networks, . . . into the table” (Patchen Decl. Exhs. 25, 31) (ellipses United States District Court For the Northern District of California 10 in original). In other words, as early as January 2006, Wang was monitoring Palo Alto Networks 11 as a competitor. 12 In March 2006, when negotiating with Rustic Canyon regarding valuation of his own 13 venture, Wang stated: “Approach III: compare to other recent deals in the same space Palo Alto 14 Networks’ valuation for the first round funding of $9.5M is over $9M” (Patchen Decl. Exh. 38) 15 (emphasis added). In a follow-on email, dated March 15, 2006, Wang stated: “I believe that 16 Palo Alto Networks didn’t do any development work before the first round funding of $9.5M, 17 while we have put man-years work at this point.” Wang never reached a deal with Rustic 18 Canyon and his potential business partner bowed out in March 2006. 19 In June 2006, Zuk, Gong, and two others filed the patent application which would 20 become U.S. Patent No. 8,009,566 (the “’566 patent”). The ’566 patent is the basis for Wang’s 21 correction-of-inventorship claim. 22 In June 2007, Palo Alto Networks announced on its website the sale of its first 23 commercial product — “Palo Alto Networks has created a next generation firewall that takes an 24 application-centric approach to traffic classification to enable unmatched application visibility 25 and policy control.” “Based on App-IDTM, our revolutionary application classification 26 technology, the PA-4000 Series identifies and controls applications.” The PA-4000 Series is 27 based on “Palo Alto Networks’ patent pending App-IDTM application classification technology” 28 5 1 (Igoe Decl. Exh. 5 at 8–13). After serving as a chief scientist for Palo Alto Networks for more 2 than a year, Gong was pushed out in August 2007. 3 In December 2007, the application for the ’566 patent was published. (The application was granted in August 2011). The patent application identified the inventors as defendant Nir 5 Zuk, defendant Fengmin Gong, Song Wang, and Siu-Wang Leung. Plaintiff Qiang Wang was 6 not a named inventor on the face of the ’566 patent or patent application. Once the publication 7 was published, it was publicly available to all. It was in the same field as Wang’s still-pending 8 application. Wang contends that defendants misappropriated or misused his trade secrets by 9 including them in the patent application that became the ’566 patent (Patchen Decl. Exh. 8–10). 10 United States District Court For the Northern District of California 4 The publication of the ’566 patent application in December 2007 was a key event for our statute 11 of limitation purposes. 12 In February 2008, Gong informed Wang that he left Palo Alto Networks “last August” 13 and was working at FireEye, Inc. (Opatken Decl. Exh. X). Gong thereafter joined Huawei 14 Symantec Technologies Co., Ltd. Gong offered (in 2010) to help Wang license or sell his 15 technology to Huawei Symantec. The negotiations fell through, to their disappointment 16 (Wang Dep. at 464, Opatken Decl. Exh. EE). 17 18 19 In November 2008, Wang’s fast-signature scan patent, U.S. Patent No. 7,454,418, issued. This is the basis for Wang’s patent-infringement claim. From 2007 to 2009, press releases, events, whitepapers, and other news were publicly 20 available on Palo Alto Networks’ website. The media, including The New York Times, 21 Forbes, Information Security Magazine, Network World, VentureBeat, Dark Reading, eWeek, 22 Information Week, Dow Jones VentureWire, SC Magazine, CRN Magazine, and ZDNet, 23 reported on Palo Alto Networks and its products (Igoe Decl. Exhs. 5–26). 24 In December 2011, Juniper Networks (Zuk’s former employer) filed a patent- 25 infringement lawsuit against Palo Alto Networks. Juniper Networks, Inc. v. Palo Alto Networks, 26 Inc., No. 1:11-cv-01258-SLR (D. Del. Dec. 19, 2011) (Judge Sue Robinson). In August 2012, 27 Wang allegedly learned about the ’566 patent from reading the briefs filed therein (Wang Dep. 28 at 474). 6 1 In July 2012, Palo Alto Networks held a successful initial public offering. Wang testified 2 in deposition that he had thought Palo Alto Networks was a “conventional” firewall company 3 and did not learn that they had become a “content security appliance” company until their initial 4 public offering (Wang Dep. at 282). His emails reveal otherwise. 5 6 7 8 9 Wang soon after reached out to Acacia Research Group in an email, dated July 29, 2012: Last week Palo Alto Networks (PANW) had a great IPO with a market cap of $4B. What makes Palo Alto Networks so “hot” is its\ next-generation Firewalls with Application ID and Content ID, which is basically adding content scanning into current Firewall. I was so excite bout [sic] the market opportunity. Could you please let me know 1) if Acacia could be interesting [sic] in helping me to enforce my patents and 2) what is a typical deal in terms of percentage of net recovery, up-front cash payment, etc.? United States District Court For the Northern District of California 10 (Patchen Decl. Exh. 22). This was a follow-on solicitation to Wang’s initial effort to reach out to 11 Intellectual Ventures and Acacia Research Group in January 2011 (Patchen Decl. Exhs. 24, 29). 12 Wang commenced this action in October 2012. 13 In sum, summary judgment is appropriate because it is undisputed that (1) Wang 14 practiced in the field of network security, filed his own patent application in 2004, and 15 spent the better part of a decade trying to commercialize and license his technology, (2) Wang 16 disclosed all of his alleged trade secrets to Gong by 2006, (3) Wang knew Gong joined Palo Alto 17 Networks, a known competitor, in 2006, (4) the ’566 patent application (by Zuk, Gong, and two 18 others) was published in December 2007 and disclosed at least some of the alleged trade secrets 19 (the application was filed in June 2006 and granted in August 2011), (5) Gong breached the 20 non-disclosure agreement in April 2008 by failing to return the confidential materials — by this 21 time, the alleged misappropriation which took place in 2006 had already occurred, and (6) this 22 action was filed in October 2012, more than three years later, after a litany of information about 23 Palo Alto Networks’ “patent-pending” “next-generation firewalls” were in the public domain. 24 * * * 25 In October 2012, Wang filed this lawsuit against Gong, Zuk, and Palo Alto Networks. 26 The ten-page complaint identified two claims for relief: (1) correction of inventorship 27 and (2) misappropriation of trade secrets. The complaint did not plead patent infringement. 28 The complaint alleged that on “November 7, 2003, Wang applied for a patent on a revolutionary 7 1 fast content scan technology, the foundation of these technologies, and that application 2 eventually issued as U.S. Patent No. 7,454,418” in November 2008 (Compl. ¶ 9). Wang alleged 3 that based on reading articles following Palo Alto Network’s initial public offering, he (id. ¶ 20): 4 discovered the existence of the ’566 patent (issued August 30, 2011), which Gong, Zuk and two other [Palo Alto Networks] employees had applied for on June 26, 2006. In the original application, Zuk and Gong were listed as the first and second inventors. 5 6 7 Wang alleged that the ’566 patent is “based at least in part on (if not completely based on) 8 Wang’s trade secrets” (id. ¶ 30). At our hearing, counsel for plaintiff admitted that the alleged 9 trade secrets were extinguished by the issuance of the patent to the extent disclosed in his own United States District Court For the Northern District of California 10 patent. 11 For months in this litigation, Wang rested on Palo Alto Networks’ patent application 12 for the ’566 patent as his main evidence of the alleged misappropriation. In an interrogatory 13 response served in March 2013, Wang stated: 14 15 16 17 18 19 Defendants misappropriated or misused the trade secrets by including them in their patent application which issued as U.S. Patent No. [8],009,566 (“the ’566 Patent”). The specific examples are detailed in Plaintiff’s Response to Interrogatory No. 6. Defendants also likely misappropriated or misused the trade secrets in designing and development of the functionality and features of PAN’s products, and the solicitation of investments for such development. Absent discovery, however, Plaintiff cannot point to specific instances of such misappropriation or misuse, inasmuch as Defendants conducted such design, development and solicitation in secret. 20 (Patchen Decl. Exh. 8) (emphasis added). Again, the application for the ’566 patent was 21 published in December 2007. It was not until September 2013 that Wang supplemented his 22 response to identify products allegedly incorporating the misappropriated secrets. 23 24 More than seven months after filing his original complaint, in June 2013, Wang sought leave to amend his complaint — to add for the first time, patent-infringement and 25 26 27 28 8 1 breach-of-contract claims. The patent-infringement claim was added and the case schedule was 2 extended (Dkt. Nos. 85, 86, 88).2 3 This order follows full briefing and oral argument on April 10. On April 4, plaintiff 4 Wang filed a “motion to strike expert report of Vern Paxson and belated production of associated 5 documents,” noticed for May 22 (Dkt. No. 156). On April 9, Wang filed a motion to modify the 6 case management order to reopen discovery on “PAN’s destruction of source code and related 7 issues,” noticed for May 22 (Dkt. No. 164). Trial is scheduled for July 7, 2014. ANALYSIS 8 9 California Code of Civil Procedure Section 3426.6 states (emphasis added): 12 An action for misappropriation must be brought within three years after the misappropriation is discovered or by the exercise of reasonable diligence should have been discovered. For the purposes of this section, a continuing misappropriation constitutes a single claim. 13 In other words, “when the statute of limitations begins to run on some of a plaintiff’s trade secret 14 claims against given defendants, the statute also begins to run at that same time as to other 15 trade secret claims against those same defendants, even if there have not yet been any acts of 16 misappropriation of the other trade secrets.” Intermedics, Inc. v. Ventritex, Inc., 822 F. Supp. 17 634, 657 (N.D. Cal. 1993) (Judge Wayne Brazil). When the limitations period would have 18 otherwise commenced, plaintiff has the burden to prove the facts necessary to toll the limitations 19 period. California Sansome Co. v. U.S. Gypsum, 55 F.3d 1402, 1406 (9th Cir. 1995). 20 “[P]laintiffs are required to conduct a reasonable investigation after becoming aware of an 21 injury, and are charged with knowledge of the information that would have been revealed by 22 such an investigation.” Fox v. Ethicon Endo-Surgery, Inc., 35 Cal.4th 797, 807–08 (Cal. 2005). 23 The statute of limitations begins to run when there is actual or constructive notice of a claim. United States District Court For the Northern District of California 10 11 24 25 26 27 28 2 One might well ask what claims for misappropriation of trade secrets could possibly persist since counsel admitted that the trade secrets disclosed to the PTO in Wang’s own patent application were extinguished by 2008 when Wang’s patent issued. This question was asked at the hearing. Counsel for Wang replied: “it was those trade secrets that enabled [Palo Alto Networks] to get off the ground. And [to] get to market in 2007 with — with a product that was — helped them survive.” Counsel for Wang continued: “it was that engine that helped this company get off the ground . . . The trade secret claim is much more valuable and broader” (Apr. 10, 2014 Hr’g. Tr. at 19–20). 9 1 “While resolution of the statute of limitations issue is normally a question of fact, where the 2 uncontradicted facts established through discovery are susceptible of only one legitimate 3 inference, summary judgment is proper.” Jolly v. Eli Lilly & Co., 44 Cal.3d 1103, 1112 (Cal. 4 1988). Individuals, even with a fiduciary relationship, cannot sit idly by when facts would 5 sufficiently raise suspicion in a reasonable person. Czajkowski v. Haskell & White, LLP, 208 6 Cal. App. 4th 166, 176–77 (Cal. Ct. App. 2012). The United States Supreme Court has stated 7 that issuance of patents and recordation with the PTO constitute notice to the world of their 8 existence. Sontag Chain Stores Co. Ltd. v. Nat’l Nut Co. of California, 310 U.S. 281, 295 (1940) 9 (dictum). United States District Court For the Northern District of California 10 In situations much like ours, other district judges have found misappropriation 11 claims time-barred. In Micrel Inc. v. Monolithic Power Sys., Inc., No. 3:04-cv-04770-JSW, 12 2005 WL 6426678, at *5–6 (N.D. Cal. Dec. 9, 2005) (Judge Jeffrey White), the 13 misappropriation-of-trade-secrets claim was time-barred because issuance of the patent 14 gave plaintiff constructive notice of the claim and plaintiff knew defendant left under false 15 pretenses to form a competing company. In Alamar Biosciences Inc. v. Difco Labs. Inc., 16 No. 2:94-cv-01856-DFL-PAN, 1996 WL 648286, at *5–6 (E.D. Cal. Feb. 27, 1996) 17 (Judge David Levi), the misappropriation-of-trade-secrets claim was time-barred because 18 plaintiff strongly suspected defendant of having misappropriated trade secrets and a search 19 using relevant terms would have revealed the existence of the patent application within ten 20 minutes. Plaintiff was familiar with the patent search procedure, and “[i]n these circumstances, 21 a reasonable plaintiff is required to take the elementary steps of checking all readily available 22 patent applications.” In Memry Corp. v. Kentucky Oil Technology, N.V., No. 23 5:04-cv-03843-RMW, 2007 WL 2746736, at *9 (N.D. Cal. Sept. 20, 2007) (Judge Ronald 24 Whyte), the misappropriation-of-trade-secrets claim was time-barred because no reasonable juror 25 could have concluded that the plaintiff was unaware of defendants’ plan to claim the invention 26 in their patent application. In Gabriel Technologies Corp. v. Qualcomm Inc., 857 F. Supp. 2d 27 997, 1004–07 (S.D. Cal. 2012) (Judge Anthony Battaglia), the misappropriation-of-trade-secrets 28 claim was time-barred because there was an email indicating suspicion about a “direct rip-off” 10 1 and multiple patent applications containing the alleged trade secrets were published more 2 than three years before the claim was filed. In WesternGeco v. Ion Geophysical Corp., 3 No. 09-cv-1827, 2009 WL 3497123, at *4–5 (S.D. Tex. Oct. 28, 2009) (Judge Keith Ellison), 4 a breach-of-contract claim was time-barred by the publication of the patent application which 5 constituted constructive notice of the breach triggering the limitations clock. The court held 6 (id. at *4): 7 8 9 United States District Court For the Northern District of California 10 11 A person is charged with constructive notice of the actual knowledge that could have been acquired by examining public records . . . . In the same way that the issuance of a patent by the PTO constitutes notice to the entire world of its existence, regardless of whether other persons take it upon themselves to examine the records, so too, by extension, do the applications published under the [Patent Cooperation Treaty] constitute notice to the world of their existence, that is, notice of the specific technologies to which the applicants lay claim. 12 Our accused wrongdoers filed their patent application disclosing the alleged trade secrets 13 in June 2006. It was published in December 2007. By April 2008, Gong was in violation of his 14 agreement with Wang to return the documents disclosing the trade secrets. This action was 15 commenced in October 2012. This order holds that Wang’s misappropriation of trade secrets 16 claim is time-barred. There are three independent reasons. 17 First, this order holds that an inventor actively practicing in the field and prosecuting 18 his own patent application must be deemed to be on constructive notice of published patent 19 applications in the same field. Here, when the application for the ’566 patent was published 20 in December 2007, Wang was already prosecuting his own patent application in the same field, 21 not to mention, trying to commercialize his own technologies and looking for potential business 22 partners, investors, and licensees. The ’566 patent application undisputedly revealed the alleged 23 trade secrets sued on (or at least some of them). Wang so admitted in his deposition: “And I 24 search Palo Alto Networks’ patent application and I see everything in — pretty much everything 25 in the patent application is already covered by my trading [sic] secret” (Wang Dep. at 474). 26 27 28 11 1 2 Counsel confirmed: The Court: If [Wang] had read it. He would have known immediately that Gong had betrayed him. You deny that? 3 Mr. Vickrey: I don’t deny that Your Honor. 4 (Apr. 10, 2014 Hr’g. Tr. at 12). 5 In 1936, the Supreme Court said (in a dictum): “[t]he parties agree that issuance of a 6 patent and recordation in the Patent Office constitute notice to the world of its existence.” 7 Wine Ry. Appliance Co. v. Enter. Ry. Equip. Co., 297 U.S. 387, 393 (1936). The Sontag decision 8 was even stronger: “Constructive notice of their existence goes thus to all the world.” 310 U.S. 9 at 295. The undersigned judge has declined in the past to treat this dictum as a ringing universal United States District Court For the Northern District of California 10 rule of law for purposes of commencing a limitations period, see Applera Corp.-Applied 11 Biosystems Grp. v. Illumina, Inc., No. 3:07-cv-02845-WHA, 2008 WL 927963, at *1 (N.D. Cal. 12 Apr. 4, 2008), but surely publication of patents (and now patent applications) must be deemed, 13 as a matter of law, to place those practicing in the same field and prosecuting their own patent 14 applications in the same field on full notice of all of the contents of the publication. Even if in 15 some cases, there might still be an issue whether such notice should have caused a reasonable 16 person to sue, it is crystal clear here that the contents of the ’566 patent application revealed 17 the alleged trade secrets in question. Thus, as a matter of law, plaintiff’s trade secrets claim 18 was time-barred well before the instant action was commenced. This alone is dispositive. 19 The Court is unpersuaded by the decisions cited by Wang. In General Bedding Corp. v. 20 Echevarria, 947 F.2d 1395, 1398–99 (9th Cir. 1991), our court of appeals reversed a grant of 21 summary judgment because genuine issues of material fact remained over constructive notice. 22 It was not clear that a reasonable person would have investigated the relevant patent because 23 the individual alleged to have misappropriated the trade secrets was not listed on the face of the 24 patent. There was also no evidence that plaintiff saw the advertisements allegedly providing 25 constructive notice, especially since they were placed under a different trademark and plaintiff 26 was not expected to connect the advertisement to defendants. 27 By contrast here, Gong and Zuk’s names were listed on the face of the ’566 patent 28 application published in December 2007. Wang knew Gong and Zuk were spearheading 12 1 the Palo Alto Networks effort — an effort in the same space, and news stories about the 2 “next-generation firewall” products were displayed all over the Palo Alto Networks’ website 3 and in popular media channels. Wang must be presumed to have been monitoring patent 4 applications in his own field, for at the time, he was prosecuting his own patent application 5 with the PTO, looking for potential business collaborations, and trying to commercialize and 6 license his technologies. 7 8 9 * * * Second, in April 2008, Gong breached the non-disclosure agreement when he violated his agreement to return the documents containing Wang’s alleged trade secrets. This is undisputed. United States District Court For the Northern District of California 10 Wang knew, moreover, that Gong had gone to work at Palo Alto Networks and was employed 11 in the field of network security. Wang knew that Gong had never asked for relief from his duty 12 to return the trade secrets. This violation involving the trade secrets put Wang on inquiry notice. 13 This too is dispositive in and of itself. 14 15 * * * Third, as yet another stand-alone independent ground, it is critical to remember that the 16 complaint was filed more than three years after the fact and thus the burden is on plaintiff to 17 show the new facts that came to light in the three-year period before suit. Wang has failed to 18 meet this burden, for the two “new facts” urged by him were known to Wang more than three 19 years before suit. 20 Alleged New Fact # 1: Wang argues that he discovered in 2012 that Palo Alto Networks 21 was pursuing “content-based” firewall products as opposed to “conventional” firewall products. 22 In other words, Wang argues that he somehow believed until 2012 that the accused new venture 23 was based on old technology. 24 It is impossible to believe this story and no reasonable jury could believe it. There were a 25 wealth of discovery admissions that Wang knew many years earlier that Palo Alto Networks was 26 pursuing more advanced products, including content-based firewalls. In an email from Wang to 27 Zuk, dated June 2005, Wang asked about the “NFA-DFA algorithm and implementation [Zuk] 28 talked about” and whether the algorithm was “dependent on the number of bytes, the number of 13 1 signatures, and the complexity (wildcards * and ?, or range, etc.) of signatures” (Patchen Decl. 2 Exh. 43). This was the very type of new technology Wang was also pursuing. In another email 3 from Wang to a then-business partner, dated January 2006, Wang stated that their slides 4 canvassing the competitors in the industry should include Palo Alto Networks (id. at Exh. 25). 5 The slides were modified, per Wang’s request, to call out Palo Alto Networks as a competitor 6 in “next-generation approaches” to integrated network security and unified threat management 7 (id. at Exhs. 30, 31). Significantly, Wang testified that signature-scanning algorithms and 8 unified threat management approaches were for content-based, not conventional, firewalls 9 (Wang Dep. at 22–24, 289–90). In an email from Wang to a venture capital firm, dated March United States District Court For the Northern District of California 10 2006, Wang compared his effort to “other recent deals in the same space[,] Palo Alto Networks” 11 (Patchen Decl. Exh. 38). These are all Wang’s own admissions and writings. In short, Wang 12 knew Palo Alto Networks was pursuing content-based firewall products on or before 2006.3 13 Alleged New Fact # 2: At oral argument, counsel repeatedly referred to discovering 14 Gong’s “lie” when he read the opposition brief Palo Alto Networks filed in March 2012 in 15 the Juniper Networks action. Palo Alto Networks’ brief had stated: 16 By November and December of 2005, Mr. Zuk and three others had developed a detailed business plan and architectural schema for this technology — as evidenced by two presentations developed by PAN to obtain financing for its work. Zuk Decl. Exs. A, B. Notably, both presentations expressly list as PAN founders four individuals: Mr. Zuk (CTO), Dave Stevens (President and CEO), Gerhard Eshelbeck (VP, Engineering), and Fengmin Gong (Chief Scientist). As a result of this round of financing, PAN obtained more than $9 million. 17 18 19 20 21 (Opatken Decl. Exh. GG at 3) (emphasis added). The alleged lie was that Gong told Wang in 22 December 2005 that he was going to Palo Alto Networks when he actually had an offer letter 23 in November 2005, a month earlier. Wang testified that Gong told him in December 2005, 24 “[u]nless we can find funding immediately — immediately, to me, pretty much in next few 25 weeks, and he cannot work with me anymore and have to go to Palo Alto Network (Wang Dep. 26 27 28 3 This paragraph relies only on Wang’s admissions and writings. It is unnecessary to wade through all of the publicly available web-pages and public notices explaining the product lines of Palo Alto Networks. 14 1 at 339–40, 388, Opatken Decl. Exh. L). The difference, if any, between November 2005 2 and December 2005 does not and cannot explain the long delay in commencing this action. 3 Earlier in April 2005, Wang had disclosed his trade secrets to Gong and they had tried to design 4 a plan to commercialize them. By the end of the year, Gong was out of work and needed a job 5 and told Wang he would be at Palo Alto Networks unless Wang could get his funding right 6 away. Whatever minor inaccuracy raised from their conversation (and it is hard to see any 7 inaccuracy) had nothing to do with the substance of this case. 8 In sum, plaintiff has not carried his burden to identify any “new fact” that came to his attention in the three years preceding suit so as to justify the delay. This, too, is dispositive. 10 United States District Court For the Northern District of California 9 Wang attempts to find safe harbor in Brocade Communications Systems, Inc. v. A10 11 Networks, Inc., 873 F. Supp. 2d 1192, 1217 (N.D. Cal. 2012) (Judge Lucy Koh), and UniRAM 12 Technology, Inc. v. Taiwan Semiconductor Manufacturing Co., 617 F. Supp. 2d 938, 946–48 13 (N.D. Cal. 2007) (Judge Vaughn Walker). In Brocade, Judge Koh found that a jury could 14 reasonably infer from the evidence that plaintiff was not on notice to inquire further because 15 executives were not concerned with the employee departures and viewed the relevant product 16 as non-competitive when it was first introduced. In UniRAM, Judge Walker reviewed four 17 documents for which plaintiff responded with plausible alternatives raising credibility 18 determinations and genuine disputes of material fact. For example, there was no reason to be 19 suspicious about the patent-threat letter because the patent was not issued to defendant and 20 plaintiff was free to believe that the similar product was independently developed. Unlike in 21 UniRam and Brocade, the patent application disclosing at least some of the alleged trade secrets 22 here in question was published in 2007 and Gong undisputedly breached the non-disclosure 23 agreement in 2008. 24 Our situation is also unlike that in Hawthorne v. Umpqua Bank, No. 11-cv-06700-JST, 25 2014 WL 295499, at *4 (N.D. Cal. Jan. 26, 2014) (Judge Jon Tigar). In Hawthorne, a motion 26 for leave to file a third amended class action complaint alleging unfair competition and fraud 27 claims was granted. Here, this is summary judgment wherein both sides have taken discovery 28 15 1 and proffered evidence. No reasonable jury could find that Wang’s trade-secrets claim is not 2 time-barred. 3 4 5 CONCLUSION For the three independent reasons stated herein, the motion for summary judgment on the claim for misappropriation of trade secrets (second claim for relief) is GRANTED. 6 7 IT IS SO ORDERED. 8 9 Dated: April 11, 2014. WILLIAM ALSUP UNITED STATES DISTRICT JUDGE United States District Court For the Northern District of California 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 16

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?