Wang v. Palo Alto Networks, Inc. et al
Filing
171
ORDER GRANTING DEFENDANTS MOTION FOR SUMMARY JUDGMENT ON CLAIM FOR MISAPPROPRIATION OF TRADE SECRETS UNDER THE STATUTE OF LIMITATIONS by Hon. William Alsup granting 137 Motion for Summary Judgment.(whalc1, COURT STAFF) (Filed on 4/11/2014)
1
2
3
4
5
IN THE UNITED STATES DISTRICT COURT
6
FOR THE NORTHERN DISTRICT OF CALIFORNIA
7
8
QIANG WANG,
Plaintiff,
9
United States District Court
For the Northern District of California
10
No. C 12-05579 WHA
v.
ORDER GRANTING DEFENDANTS’
MOTION FOR SUMMARY JUDGMENT
ON CLAIM FOR MISAPPROPRIATION
OF TRADE SECRETS UNDER THE
STATUTE OF LIMITATIONS
11
12
13
PALO ALTO NETWORKS, INC.,
NIR ZUK, and FENGMIN GONG,
Defendants.
/
14
15
16
INTRODUCTION
In this action alleging misappropriation of trade secrets and patent infringement,
17
defendants move for summary judgment on plaintiff’s misappropriation of trade secrets claim
18
under the statute of limitations. For the reasons stated herein, the motion is GRANTED.
19
20
STATEMENT
Plaintiff Qiang Wang is an architect and design engineer in the field of network security.
21
From 2000 to 2012, Wang tried to commercialize his firewall technologies via ventures called
22
GoldShield Networks and ForeSecurity. His efforts were largely unsuccessful. In 2012,
23
after defendant Palo Alto Networks’ successful initial public offering and it was sued in a
24
patent-infringement lawsuit by Juniper Networks, Inc. (in Delaware), Wang commenced this
25
action. Wang allegedly learned about the alleged trade secret theft via news articles covering
26
the initial public offering and the filings in the patent litigation. Wang’s theory is that his former
27
business partner, defendant Fengmin Gong obtained his trust, learned his trade secrets, and
28
misappropriated them for use by Palo Alto Networks.
1
This story begins in the early 2000s when Wang allegedly developed some firewall
2
technologies. This included a “fast signature scan” technology. He filed a patent application
3
thereon in November 2004. (The patent eventually issued and is asserted in the
4
patent-infringement claim.) Wang tried to commercialize his firewall technologies
5
through a venture called GoldShield Networks. Over the course of 2003 to 2010, Wang
6
attempted to interest a number of venture capitalists, competitors, and entities in his technology,
7
but his efforts never took off. This order will retrace the history so that the reader can catalog
8
the moments when plaintiff might have been on notice that his trade secrets had been stolen for
9
purposes of commencing the limitation period.
United States District Court
For the Northern District of California
10
In February 2005, Wang met defendant Fengmin Gong at a seminar. At the time, Gong
11
was a chief scientist at McAfee, Inc. Upon meeting Gong, Wang disclosed that he had trade
12
secrets in the areas of “fast signature scan,” “application-identification,” “classification,”
13
“network security engine,” and “flow management” — he did not immediately disclose his trade
14
secrets, however (Wang Dep. at 332–34).1
15
Around the same time, defendant Nir Zuk left Juniper Networks, Inc. to form defendant
16
Palo Alto Networks, Inc. Around May and June 2005, Zuk allegedly conceived of his own
17
next-generation firewalls.
18
In April 2005, Wang and Gong entered into a non-disclosure agreement. The agreement
19
“only applie[d] to information related to the ‘fast signature scan’ method discussed” and would
20
terminate in three years. Wang never asked Gong to sign a non-disclosure agreement for any
21
other trade secrets. Nevertheless, during the course of April to July 2005, Wang and Gong met
22
in-person for hours on end and Wang disclosed his trade secrets. Wang also gave Gong a copy
23
of the fast-signature scan patent application and some notes (Wang Dep. at 350–51, 358, 363–64,
24
481, Patchen Decl. Exh. 12). Gong was the only person who knew Wang’s trade secrets.
25
26
1
27
28
Deposition excerpts for Qiang Wang are appended to the declarations of Jonathan Patchen
(Exhibits 1, 2) and Gabriel Opatken (Exhibit B). Excerpts of Fengmin Gong’s testimony are appended to
Attorney Opatken’s declaration (Exhibit A) and excerpts of Nir Zuk’s testimony are appended to Attorney
Patchen’s declaration (Exhibit 3).
2
1
The non-disclosure agreement stated: “Upon termination or expiration of the
2
Agreement, or upon written request of [Qiang Wang], [Fengmin Gong] shall promptly return
3
to [Qiang Wang] all documents and other tangible materials representing the Confidential
4
Information and all copies thereof.” Significantly, Gong never returned any materials provided
5
to him under the agreement — by April 2008, this was a breach (Wang Dep. at 481–82).
6
During oral argument, Wang’s counsel were asked whether Gong ever requested a suspension
7
or modification of this requirement of the agreement. The answer was no.
8
9
In deposition, Gong described their relationship as one of “mutual trust” (Gong Dep. at
20). Wang spoke of his trust for Gong as well. In Wang’s view, they were united by their vision
United States District Court
For the Northern District of California
10
to “go with content security, rather than [a] traditional firewall” (Wang Dep. at 355, 387–88).
11
Up to the point of the non-disclosure agreement (April 2005), Zuk and Palo Alto Networks had
12
nothing to do with the case.
13
Two months later, in June 2005, plaintiff Wang, defendant Gong, and defendant Zuk met
14
for one hour to discuss combining their efforts, after a referral from Greylock Partners (a venture
15
capital firm). Wang, at the time, believed Palo Alto Networks was a “traditional firewall,
16
conventional firewall” company. A few days later, Wang and Zuk met for breakfast.
17
Wang testified about his discussion with Zuk:
18
Q.
That that [sic] was the substance of what he said about
patents in that meeting?
A.
That is one point. He basically say patent is not very
enforceable, not very useful for — if — like for me,
without money, yeah.
19
20
21
*
*
*
22
Q.
Were you shocked because you understood him to be
saying that he didn’t care about infringing anyone else’s
patents?
A.
Sure.
23
24
25
(Wang Dep. at 25, 27, 373–75). In other words, albeit upon leading and argumentative
26
questioning, Wang asserted that Zuk did not care whether he infringed any patents
27
28
3
1
(Amd. Compl. ¶ 17). Subsequent to the meeting, Gong (who would later join Palo Alto
2
Networks) and Zuk had the following email exchange, dated June 9, 2005 (Patchen Decl.
3
Exh. 44):
4
Hi Nir,
5
Thanks for coming to chat with us.
6
*
7
*
*
9
Thanks,
10
United States District Court
For the Northern District of California
8
The second thing is that . . . What would you consider to be the
main thing respectively for us to win a customer over each of these
players in 18 months: CISCO, Juniper, McAfee?
Fengmin
11
Zuk responded (ellipses in original):
12
Fengmin — the answer to your second question is a big secret of
Palo Alto Networks . . . Let’s wait until you decide joining vs.
starting your own company before we go there . . . In the
meanwhile, please rest assure that both Sequoia and Greylock
believe in our ability to differentiate enough vs. the big guys.
As for your first question, we talked to ~ 20 customers and
analysts. I will [be] more than happy to share names at the right
moment.
13
14
15
16
In August 2005, Gong wrote to Wang: “Here is a copy of my non-compete agreement
17
with McAfee. I had another discussion with him today and he confirmed to me that the company
18
will definitely oppose my involvement with the project because of the overwhelming overlap
19
of the scope” (Opatken Decl. Exh. D). In late 2005, Gong joined Palo Alto Networks as a chief
20
scientist. Zuk then began introducing Gong as a “founder of Palo Alto Networks.” Gong kept
21
Wang informed of his decision to join Palo Alto Networks (Wang Dep. at 388, Patchen Decl.
22
Exh. 51).
23
In January 2006, Gong urged Zuk to license Wang’s technology. Gong wrote in an
24
email, dated January 6, 2006, that he had chatted with Wang: “He has been spending some time
25
to verify the design using a software implementation. He told me that he used ClamAV
26
signatures to test the software. He told me that without me teaming with him, he is planning on
27
licensing/selling that in some form.” In another email, dated January 25, 2006, Gong wrote:
28
“one arrangement could be for him to be on board for FPGA design, applying ideas from his
4
1
patent as appropriate. We pick up his cost for filing so far, and continue to support the
2
application with the agreement that upon approval, we automatically get granted the license
3
for use [sic] it” (Opatken Decl. Exhs. N, O). Zuk, however, decided not to bring in Wang.
4
Meanwhile, Wang continued his efforts to obtain funding for his own operation.
5
In January 2006, Wang and a potential business partner at Rustic Canyon (venture capital
6
firm) created a deck of slides, entitled “Integrated Network Security (INS): Technology
7
and Competitive Landscape,” wherein they listed “Palo Alto” as a player in the “multi-core
8
processors” space. Wang wrote in an email, dated January 26, 2006, “We may want to put
9
Tidal Networks, Palo Alto Networks, . . . into the table” (Patchen Decl. Exhs. 25, 31) (ellipses
United States District Court
For the Northern District of California
10
in original). In other words, as early as January 2006, Wang was monitoring Palo Alto Networks
11
as a competitor.
12
In March 2006, when negotiating with Rustic Canyon regarding valuation of his own
13
venture, Wang stated: “Approach III: compare to other recent deals in the same space Palo Alto
14
Networks’ valuation for the first round funding of $9.5M is over $9M” (Patchen Decl. Exh. 38)
15
(emphasis added). In a follow-on email, dated March 15, 2006, Wang stated: “I believe that
16
Palo Alto Networks didn’t do any development work before the first round funding of $9.5M,
17
while we have put man-years work at this point.” Wang never reached a deal with Rustic
18
Canyon and his potential business partner bowed out in March 2006.
19
In June 2006, Zuk, Gong, and two others filed the patent application which would
20
become U.S. Patent No. 8,009,566 (the “’566 patent”). The ’566 patent is the basis for Wang’s
21
correction-of-inventorship claim.
22
In June 2007, Palo Alto Networks announced on its website the sale of its first
23
commercial product — “Palo Alto Networks has created a next generation firewall that takes an
24
application-centric approach to traffic classification to enable unmatched application visibility
25
and policy control.” “Based on App-IDTM, our revolutionary application classification
26
technology, the PA-4000 Series identifies and controls applications.” The PA-4000 Series is
27
based on “Palo Alto Networks’ patent pending App-IDTM application classification technology”
28
5
1
(Igoe Decl. Exh. 5 at 8–13). After serving as a chief scientist for Palo Alto Networks for more
2
than a year, Gong was pushed out in August 2007.
3
In December 2007, the application for the ’566 patent was published. (The application
was granted in August 2011). The patent application identified the inventors as defendant Nir
5
Zuk, defendant Fengmin Gong, Song Wang, and Siu-Wang Leung. Plaintiff Qiang Wang was
6
not a named inventor on the face of the ’566 patent or patent application. Once the publication
7
was published, it was publicly available to all. It was in the same field as Wang’s still-pending
8
application. Wang contends that defendants misappropriated or misused his trade secrets by
9
including them in the patent application that became the ’566 patent (Patchen Decl. Exh. 8–10).
10
United States District Court
For the Northern District of California
4
The publication of the ’566 patent application in December 2007 was a key event for our statute
11
of limitation purposes.
12
In February 2008, Gong informed Wang that he left Palo Alto Networks “last August”
13
and was working at FireEye, Inc. (Opatken Decl. Exh. X). Gong thereafter joined Huawei
14
Symantec Technologies Co., Ltd. Gong offered (in 2010) to help Wang license or sell his
15
technology to Huawei Symantec. The negotiations fell through, to their disappointment
16
(Wang Dep. at 464, Opatken Decl. Exh. EE).
17
18
19
In November 2008, Wang’s fast-signature scan patent, U.S. Patent No. 7,454,418, issued.
This is the basis for Wang’s patent-infringement claim.
From 2007 to 2009, press releases, events, whitepapers, and other news were publicly
20
available on Palo Alto Networks’ website. The media, including The New York Times,
21
Forbes, Information Security Magazine, Network World, VentureBeat, Dark Reading, eWeek,
22
Information Week, Dow Jones VentureWire, SC Magazine, CRN Magazine, and ZDNet,
23
reported on Palo Alto Networks and its products (Igoe Decl. Exhs. 5–26).
24
In December 2011, Juniper Networks (Zuk’s former employer) filed a patent-
25
infringement lawsuit against Palo Alto Networks. Juniper Networks, Inc. v. Palo Alto Networks,
26
Inc., No. 1:11-cv-01258-SLR (D. Del. Dec. 19, 2011) (Judge Sue Robinson). In August 2012,
27
Wang allegedly learned about the ’566 patent from reading the briefs filed therein (Wang Dep.
28
at 474).
6
1
In July 2012, Palo Alto Networks held a successful initial public offering. Wang testified
2
in deposition that he had thought Palo Alto Networks was a “conventional” firewall company
3
and did not learn that they had become a “content security appliance” company until their initial
4
public offering (Wang Dep. at 282). His emails reveal otherwise.
5
6
7
8
9
Wang soon after reached out to Acacia Research Group in an email, dated July 29, 2012:
Last week Palo Alto Networks (PANW) had a great IPO with a
market cap of $4B. What makes Palo Alto Networks so “hot” is
its\ next-generation Firewalls with Application ID and Content ID,
which is basically adding content scanning into current Firewall.
I was so excite bout [sic] the market opportunity. Could you
please let me know 1) if Acacia could be interesting [sic] in
helping me to enforce my patents and 2) what is a typical deal in
terms of percentage of net recovery, up-front cash payment, etc.?
United States District Court
For the Northern District of California
10
(Patchen Decl. Exh. 22). This was a follow-on solicitation to Wang’s initial effort to reach out to
11
Intellectual Ventures and Acacia Research Group in January 2011 (Patchen Decl. Exhs. 24, 29).
12
Wang commenced this action in October 2012.
13
In sum, summary judgment is appropriate because it is undisputed that (1) Wang
14
practiced in the field of network security, filed his own patent application in 2004, and
15
spent the better part of a decade trying to commercialize and license his technology, (2) Wang
16
disclosed all of his alleged trade secrets to Gong by 2006, (3) Wang knew Gong joined Palo Alto
17
Networks, a known competitor, in 2006, (4) the ’566 patent application (by Zuk, Gong, and two
18
others) was published in December 2007 and disclosed at least some of the alleged trade secrets
19
(the application was filed in June 2006 and granted in August 2011), (5) Gong breached the
20
non-disclosure agreement in April 2008 by failing to return the confidential materials — by this
21
time, the alleged misappropriation which took place in 2006 had already occurred, and (6) this
22
action was filed in October 2012, more than three years later, after a litany of information about
23
Palo Alto Networks’ “patent-pending” “next-generation firewalls” were in the public domain.
24
*
*
*
25
In October 2012, Wang filed this lawsuit against Gong, Zuk, and Palo Alto Networks.
26
The ten-page complaint identified two claims for relief: (1) correction of inventorship
27
and (2) misappropriation of trade secrets. The complaint did not plead patent infringement.
28
The complaint alleged that on “November 7, 2003, Wang applied for a patent on a revolutionary
7
1
fast content scan technology, the foundation of these technologies, and that application
2
eventually issued as U.S. Patent No. 7,454,418” in November 2008 (Compl. ¶ 9). Wang alleged
3
that based on reading articles following Palo Alto Network’s initial public offering, he (id. ¶ 20):
4
discovered the existence of the ’566 patent (issued August 30,
2011), which Gong, Zuk and two other [Palo Alto Networks]
employees had applied for on June 26, 2006. In the original
application, Zuk and Gong were listed as the first and second
inventors.
5
6
7
Wang alleged that the ’566 patent is “based at least in part on (if not completely based on)
8
Wang’s trade secrets” (id. ¶ 30). At our hearing, counsel for plaintiff admitted that the alleged
9
trade secrets were extinguished by the issuance of the patent to the extent disclosed in his own
United States District Court
For the Northern District of California
10
patent.
11
For months in this litigation, Wang rested on Palo Alto Networks’ patent application
12
for the ’566 patent as his main evidence of the alleged misappropriation. In an interrogatory
13
response served in March 2013, Wang stated:
14
15
16
17
18
19
Defendants misappropriated or misused the trade secrets by
including them in their patent application which issued as U.S.
Patent No. [8],009,566 (“the ’566 Patent”). The specific examples
are detailed in Plaintiff’s Response to Interrogatory No. 6.
Defendants also likely misappropriated or misused the trade
secrets in designing and development of the functionality and
features of PAN’s products, and the solicitation of investments for
such development. Absent discovery, however, Plaintiff cannot
point to specific instances of such misappropriation or misuse,
inasmuch as Defendants conducted such design, development and
solicitation in secret.
20
(Patchen Decl. Exh. 8) (emphasis added). Again, the application for the ’566 patent was
21
published in December 2007. It was not until September 2013 that Wang supplemented his
22
response to identify products allegedly incorporating the misappropriated secrets.
23
24
More than seven months after filing his original complaint, in June 2013, Wang
sought leave to amend his complaint — to add for the first time, patent-infringement and
25
26
27
28
8
1
breach-of-contract claims. The patent-infringement claim was added and the case schedule was
2
extended (Dkt. Nos. 85, 86, 88).2
3
This order follows full briefing and oral argument on April 10. On April 4, plaintiff
4
Wang filed a “motion to strike expert report of Vern Paxson and belated production of associated
5
documents,” noticed for May 22 (Dkt. No. 156). On April 9, Wang filed a motion to modify the
6
case management order to reopen discovery on “PAN’s destruction of source code and related
7
issues,” noticed for May 22 (Dkt. No. 164). Trial is scheduled for July 7, 2014.
ANALYSIS
8
9
California Code of Civil Procedure Section 3426.6 states (emphasis added):
12
An action for misappropriation must be brought within three years
after the misappropriation is discovered or by the exercise of
reasonable diligence should have been discovered. For the
purposes of this section, a continuing misappropriation constitutes
a single claim.
13
In other words, “when the statute of limitations begins to run on some of a plaintiff’s trade secret
14
claims against given defendants, the statute also begins to run at that same time as to other
15
trade secret claims against those same defendants, even if there have not yet been any acts of
16
misappropriation of the other trade secrets.” Intermedics, Inc. v. Ventritex, Inc., 822 F. Supp.
17
634, 657 (N.D. Cal. 1993) (Judge Wayne Brazil). When the limitations period would have
18
otherwise commenced, plaintiff has the burden to prove the facts necessary to toll the limitations
19
period. California Sansome Co. v. U.S. Gypsum, 55 F.3d 1402, 1406 (9th Cir. 1995).
20
“[P]laintiffs are required to conduct a reasonable investigation after becoming aware of an
21
injury, and are charged with knowledge of the information that would have been revealed by
22
such an investigation.” Fox v. Ethicon Endo-Surgery, Inc., 35 Cal.4th 797, 807–08 (Cal. 2005).
23
The statute of limitations begins to run when there is actual or constructive notice of a claim.
United States District Court
For the Northern District of California
10
11
24
25
26
27
28
2
One might well ask what claims for misappropriation of trade secrets could possibly persist since
counsel admitted that the trade secrets disclosed to the PTO in Wang’s own patent application were
extinguished by 2008 when Wang’s patent issued. This question was asked at the hearing. Counsel for
Wang replied: “it was those trade secrets that enabled [Palo Alto Networks] to get off the ground. And [to]
get to market in 2007 with — with a product that was — helped them survive.” Counsel for Wang
continued: “it was that engine that helped this company get off the ground . . . The trade secret claim is
much more valuable and broader” (Apr. 10, 2014 Hr’g. Tr. at 19–20).
9
1
“While resolution of the statute of limitations issue is normally a question of fact, where the
2
uncontradicted facts established through discovery are susceptible of only one legitimate
3
inference, summary judgment is proper.” Jolly v. Eli Lilly & Co., 44 Cal.3d 1103, 1112 (Cal.
4
1988). Individuals, even with a fiduciary relationship, cannot sit idly by when facts would
5
sufficiently raise suspicion in a reasonable person. Czajkowski v. Haskell & White, LLP, 208
6
Cal. App. 4th 166, 176–77 (Cal. Ct. App. 2012). The United States Supreme Court has stated
7
that issuance of patents and recordation with the PTO constitute notice to the world of their
8
existence. Sontag Chain Stores Co. Ltd. v. Nat’l Nut Co. of California, 310 U.S. 281, 295 (1940)
9
(dictum).
United States District Court
For the Northern District of California
10
In situations much like ours, other district judges have found misappropriation
11
claims time-barred. In Micrel Inc. v. Monolithic Power Sys., Inc., No. 3:04-cv-04770-JSW,
12
2005 WL 6426678, at *5–6 (N.D. Cal. Dec. 9, 2005) (Judge Jeffrey White), the
13
misappropriation-of-trade-secrets claim was time-barred because issuance of the patent
14
gave plaintiff constructive notice of the claim and plaintiff knew defendant left under false
15
pretenses to form a competing company. In Alamar Biosciences Inc. v. Difco Labs. Inc.,
16
No. 2:94-cv-01856-DFL-PAN, 1996 WL 648286, at *5–6 (E.D. Cal. Feb. 27, 1996)
17
(Judge David Levi), the misappropriation-of-trade-secrets claim was time-barred because
18
plaintiff strongly suspected defendant of having misappropriated trade secrets and a search
19
using relevant terms would have revealed the existence of the patent application within ten
20
minutes. Plaintiff was familiar with the patent search procedure, and “[i]n these circumstances,
21
a reasonable plaintiff is required to take the elementary steps of checking all readily available
22
patent applications.” In Memry Corp. v. Kentucky Oil Technology, N.V., No.
23
5:04-cv-03843-RMW, 2007 WL 2746736, at *9 (N.D. Cal. Sept. 20, 2007) (Judge Ronald
24
Whyte), the misappropriation-of-trade-secrets claim was time-barred because no reasonable juror
25
could have concluded that the plaintiff was unaware of defendants’ plan to claim the invention
26
in their patent application. In Gabriel Technologies Corp. v. Qualcomm Inc., 857 F. Supp. 2d
27
997, 1004–07 (S.D. Cal. 2012) (Judge Anthony Battaglia), the misappropriation-of-trade-secrets
28
claim was time-barred because there was an email indicating suspicion about a “direct rip-off”
10
1
and multiple patent applications containing the alleged trade secrets were published more
2
than three years before the claim was filed. In WesternGeco v. Ion Geophysical Corp.,
3
No. 09-cv-1827, 2009 WL 3497123, at *4–5 (S.D. Tex. Oct. 28, 2009) (Judge Keith Ellison),
4
a breach-of-contract claim was time-barred by the publication of the patent application which
5
constituted constructive notice of the breach triggering the limitations clock. The court held
6
(id. at *4):
7
8
9
United States District Court
For the Northern District of California
10
11
A person is charged with constructive notice of the actual
knowledge that could have been acquired by examining public
records . . . . In the same way that the issuance of a patent by
the PTO constitutes notice to the entire world of its existence,
regardless of whether other persons take it upon themselves to
examine the records, so too, by extension, do the applications
published under the [Patent Cooperation Treaty] constitute notice
to the world of their existence, that is, notice of the specific
technologies to which the applicants lay claim.
12
Our accused wrongdoers filed their patent application disclosing the alleged trade secrets
13
in June 2006. It was published in December 2007. By April 2008, Gong was in violation of his
14
agreement with Wang to return the documents disclosing the trade secrets. This action was
15
commenced in October 2012. This order holds that Wang’s misappropriation of trade secrets
16
claim is time-barred. There are three independent reasons.
17
First, this order holds that an inventor actively practicing in the field and prosecuting
18
his own patent application must be deemed to be on constructive notice of published patent
19
applications in the same field. Here, when the application for the ’566 patent was published
20
in December 2007, Wang was already prosecuting his own patent application in the same field,
21
not to mention, trying to commercialize his own technologies and looking for potential business
22
partners, investors, and licensees. The ’566 patent application undisputedly revealed the alleged
23
trade secrets sued on (or at least some of them). Wang so admitted in his deposition: “And I
24
search Palo Alto Networks’ patent application and I see everything in — pretty much everything
25
in the patent application is already covered by my trading [sic] secret” (Wang Dep. at 474).
26
27
28
11
1
2
Counsel confirmed:
The Court: If [Wang] had read it. He would have known
immediately that Gong had betrayed him. You deny that?
3
Mr. Vickrey: I don’t deny that Your Honor.
4
(Apr. 10, 2014 Hr’g. Tr. at 12).
5
In 1936, the Supreme Court said (in a dictum): “[t]he parties agree that issuance of a
6
patent and recordation in the Patent Office constitute notice to the world of its existence.”
7
Wine Ry. Appliance Co. v. Enter. Ry. Equip. Co., 297 U.S. 387, 393 (1936). The Sontag decision
8
was even stronger: “Constructive notice of their existence goes thus to all the world.” 310 U.S.
9
at 295. The undersigned judge has declined in the past to treat this dictum as a ringing universal
United States District Court
For the Northern District of California
10
rule of law for purposes of commencing a limitations period, see Applera Corp.-Applied
11
Biosystems Grp. v. Illumina, Inc., No. 3:07-cv-02845-WHA, 2008 WL 927963, at *1 (N.D. Cal.
12
Apr. 4, 2008), but surely publication of patents (and now patent applications) must be deemed,
13
as a matter of law, to place those practicing in the same field and prosecuting their own patent
14
applications in the same field on full notice of all of the contents of the publication. Even if in
15
some cases, there might still be an issue whether such notice should have caused a reasonable
16
person to sue, it is crystal clear here that the contents of the ’566 patent application revealed
17
the alleged trade secrets in question. Thus, as a matter of law, plaintiff’s trade secrets claim
18
was time-barred well before the instant action was commenced. This alone is dispositive.
19
The Court is unpersuaded by the decisions cited by Wang. In General Bedding Corp. v.
20
Echevarria, 947 F.2d 1395, 1398–99 (9th Cir. 1991), our court of appeals reversed a grant of
21
summary judgment because genuine issues of material fact remained over constructive notice.
22
It was not clear that a reasonable person would have investigated the relevant patent because
23
the individual alleged to have misappropriated the trade secrets was not listed on the face of the
24
patent. There was also no evidence that plaintiff saw the advertisements allegedly providing
25
constructive notice, especially since they were placed under a different trademark and plaintiff
26
was not expected to connect the advertisement to defendants.
27
By contrast here, Gong and Zuk’s names were listed on the face of the ’566 patent
28
application published in December 2007. Wang knew Gong and Zuk were spearheading
12
1
the Palo Alto Networks effort — an effort in the same space, and news stories about the
2
“next-generation firewall” products were displayed all over the Palo Alto Networks’ website
3
and in popular media channels. Wang must be presumed to have been monitoring patent
4
applications in his own field, for at the time, he was prosecuting his own patent application
5
with the PTO, looking for potential business collaborations, and trying to commercialize and
6
license his technologies.
7
8
9
*
*
*
Second, in April 2008, Gong breached the non-disclosure agreement when he violated his
agreement to return the documents containing Wang’s alleged trade secrets. This is undisputed.
United States District Court
For the Northern District of California
10
Wang knew, moreover, that Gong had gone to work at Palo Alto Networks and was employed
11
in the field of network security. Wang knew that Gong had never asked for relief from his duty
12
to return the trade secrets. This violation involving the trade secrets put Wang on inquiry notice.
13
This too is dispositive in and of itself.
14
15
*
*
*
Third, as yet another stand-alone independent ground, it is critical to remember that the
16
complaint was filed more than three years after the fact and thus the burden is on plaintiff to
17
show the new facts that came to light in the three-year period before suit. Wang has failed to
18
meet this burden, for the two “new facts” urged by him were known to Wang more than three
19
years before suit.
20
Alleged New Fact # 1: Wang argues that he discovered in 2012 that Palo Alto Networks
21
was pursuing “content-based” firewall products as opposed to “conventional” firewall products.
22
In other words, Wang argues that he somehow believed until 2012 that the accused new venture
23
was based on old technology.
24
It is impossible to believe this story and no reasonable jury could believe it. There were a
25
wealth of discovery admissions that Wang knew many years earlier that Palo Alto Networks was
26
pursuing more advanced products, including content-based firewalls. In an email from Wang to
27
Zuk, dated June 2005, Wang asked about the “NFA-DFA algorithm and implementation [Zuk]
28
talked about” and whether the algorithm was “dependent on the number of bytes, the number of
13
1
signatures, and the complexity (wildcards * and ?, or range, etc.) of signatures” (Patchen Decl.
2
Exh. 43). This was the very type of new technology Wang was also pursuing. In another email
3
from Wang to a then-business partner, dated January 2006, Wang stated that their slides
4
canvassing the competitors in the industry should include Palo Alto Networks (id. at Exh. 25).
5
The slides were modified, per Wang’s request, to call out Palo Alto Networks as a competitor
6
in “next-generation approaches” to integrated network security and unified threat management
7
(id. at Exhs. 30, 31). Significantly, Wang testified that signature-scanning algorithms and
8
unified threat management approaches were for content-based, not conventional, firewalls
9
(Wang Dep. at 22–24, 289–90). In an email from Wang to a venture capital firm, dated March
United States District Court
For the Northern District of California
10
2006, Wang compared his effort to “other recent deals in the same space[,] Palo Alto Networks”
11
(Patchen Decl. Exh. 38). These are all Wang’s own admissions and writings. In short, Wang
12
knew Palo Alto Networks was pursuing content-based firewall products on or before 2006.3
13
Alleged New Fact # 2: At oral argument, counsel repeatedly referred to discovering
14
Gong’s “lie” when he read the opposition brief Palo Alto Networks filed in March 2012 in
15
the Juniper Networks action. Palo Alto Networks’ brief had stated:
16
By November and December of 2005, Mr. Zuk and three others
had developed a detailed business plan and architectural schema
for this technology — as evidenced by two presentations
developed by PAN to obtain financing for its work. Zuk Decl.
Exs. A, B. Notably, both presentations expressly list as PAN
founders four individuals: Mr. Zuk (CTO), Dave Stevens
(President and CEO), Gerhard Eshelbeck (VP, Engineering), and
Fengmin Gong (Chief Scientist). As a result of this round of
financing, PAN obtained more than $9 million.
17
18
19
20
21
(Opatken Decl. Exh. GG at 3) (emphasis added). The alleged lie was that Gong told Wang in
22
December 2005 that he was going to Palo Alto Networks when he actually had an offer letter
23
in November 2005, a month earlier. Wang testified that Gong told him in December 2005,
24
“[u]nless we can find funding immediately — immediately, to me, pretty much in next few
25
weeks, and he cannot work with me anymore and have to go to Palo Alto Network (Wang Dep.
26
27
28
3
This paragraph relies only on Wang’s admissions and writings. It is unnecessary to wade
through all of the publicly available web-pages and public notices explaining the product lines of Palo Alto
Networks.
14
1
at 339–40, 388, Opatken Decl. Exh. L). The difference, if any, between November 2005
2
and December 2005 does not and cannot explain the long delay in commencing this action.
3
Earlier in April 2005, Wang had disclosed his trade secrets to Gong and they had tried to design
4
a plan to commercialize them. By the end of the year, Gong was out of work and needed a job
5
and told Wang he would be at Palo Alto Networks unless Wang could get his funding right
6
away. Whatever minor inaccuracy raised from their conversation (and it is hard to see any
7
inaccuracy) had nothing to do with the substance of this case.
8
In sum, plaintiff has not carried his burden to identify any “new fact” that came to his
attention in the three years preceding suit so as to justify the delay. This, too, is dispositive.
10
United States District Court
For the Northern District of California
9
Wang attempts to find safe harbor in Brocade Communications Systems, Inc. v. A10
11
Networks, Inc., 873 F. Supp. 2d 1192, 1217 (N.D. Cal. 2012) (Judge Lucy Koh), and UniRAM
12
Technology, Inc. v. Taiwan Semiconductor Manufacturing Co., 617 F. Supp. 2d 938, 946–48
13
(N.D. Cal. 2007) (Judge Vaughn Walker). In Brocade, Judge Koh found that a jury could
14
reasonably infer from the evidence that plaintiff was not on notice to inquire further because
15
executives were not concerned with the employee departures and viewed the relevant product
16
as non-competitive when it was first introduced. In UniRAM, Judge Walker reviewed four
17
documents for which plaintiff responded with plausible alternatives raising credibility
18
determinations and genuine disputes of material fact. For example, there was no reason to be
19
suspicious about the patent-threat letter because the patent was not issued to defendant and
20
plaintiff was free to believe that the similar product was independently developed. Unlike in
21
UniRam and Brocade, the patent application disclosing at least some of the alleged trade secrets
22
here in question was published in 2007 and Gong undisputedly breached the non-disclosure
23
agreement in 2008.
24
Our situation is also unlike that in Hawthorne v. Umpqua Bank, No. 11-cv-06700-JST,
25
2014 WL 295499, at *4 (N.D. Cal. Jan. 26, 2014) (Judge Jon Tigar). In Hawthorne, a motion
26
for leave to file a third amended class action complaint alleging unfair competition and fraud
27
claims was granted. Here, this is summary judgment wherein both sides have taken discovery
28
15
1
and proffered evidence. No reasonable jury could find that Wang’s trade-secrets claim is not
2
time-barred.
3
4
5
CONCLUSION
For the three independent reasons stated herein, the motion for summary judgment on the
claim for misappropriation of trade secrets (second claim for relief) is GRANTED.
6
7
IT IS SO ORDERED.
8
9
Dated: April 11, 2014.
WILLIAM ALSUP
UNITED STATES DISTRICT JUDGE
United States District Court
For the Northern District of California
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
16
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?