Finjan, Inc. v. Zscaler, Inc.

Filing 72

ORDER GRANTING MOTION TO COMPEL by Judge Jon S. Tigar granting 61 Motion to Compel. (wsn, COURT STAFF) (Filed on 8/31/2018)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 7 FINJAN, INC., Plaintiff, 8 ZSCALER, INC., Re: ECF No. 61 Defendant. 11 United States District Court Northern District of California ORDER GRANTING MOTION TO COMPEL v. 9 10 Case No. 17-cv-06946-JST 12 Before the Court is Defendant Zscaler, Inc.’s motion to compel further infringement 13 14 contentions. ECF No. 61. For the reasons stated below, the Court GRANTS the motion. 15 I. BACKGROUND 16 Plaintiff Finjan, Inc. and Zscaler are competitors in the malware security field. ECF No. 1 17 ¶¶ 7, 26. Finjan alleges that Zscaler’s products infringe four patents owned by Finjan: U.S. Patent 18 Nos. 6,804,780 (“the ’780 patent”); 7,647,633 (“the ’633 patent”); 8,677,494 (“the ’494 patent”); 19 and 7,975,305 (“the ’305 patent”). Id. ¶ 21. Finjan served its infringement contentions on May 9, 20 2018. ECF No. 46-3. Zscaler now moves the Court to order “Finjan to revise its infringement 21 contentions to identify, for each item called for in each asserted claim, the specific component or 22 data structure within Zscaler’s system that constitutes the claimed item, arranged in the manner 23 called for in the claim.” Id. 24 II. 25 LEGAL STANDARD To satisfy Patent Local Rule 3–1, a “plaintiff [must] compare an accused product to its 26 patents on a claim by claim, element by element basis for at least one of each defendant’s 27 products.” Tessenderlo Kerley, Inc. v. OR-Cal, Inc., No. C 11-04100 WHA, 2012 WL 1253178, 28 at *2 (N.D. Cal. Apr. 13, 2012) (citations omitted). The rule forces parties to “crystallize their 1 theories of the case early in the litigation and to adhere to those theories once they have been 2 disclosed.” Alberta Telecommunications Research Ctr. v. Rambus Inc., No. C06-02595 RMWRS, 3 2007 WL 4170564, at *1 (N.D. Cal. Nov. 19, 2007). Specifically, Patent Local Rule 3–1(c) 4 requires the plaintiff to produce a “chart identifying specifically where and how each limitation of 5 each asserted claim is found within each Accused Instrumentality.” Patent L.R. 3–1(c). “This 6 burden cannot be met simply by parroting claim language or referencing screenshots and/or 7 website content.” Finjan, Inc. v. Proofpoint, Inc., No. 13-CV-05808-HSG, 2015 WL 1517920, at 8 *6 (N.D. Cal. Apr. 2, 2015). “[T]he degree of specificity under Local Rule 3–1 must be sufficient 9 to provide reasonable notice to the defendant [as to] why the plaintiff believes it has a ‘reasonable chance of proving infringement.’” Id. at *2 (citations omitted). 11 United States District Court Northern District of California 10 III. 12 DISCUSSION Zscaler argues that Finjan’s infringement contentions are largely comprised of generic 13 marketing literature, screenshots, and websites – presented at a high level – without explanations 14 as to how Zscaler’s products specifically infringe particular claim elements. ECF No. 61 at 6. 15 Finjan highlights a few of the many contentions it finds deficient. Id. The Court agrees the 16 contentions as a whole are insufficient to put Zscaler on notice of how its products specifically 17 infringe the patent claims at issue. The ’633 Patent 18 A. 19 The ’633 patent claims a system for transmitting “mobile protection code” to a computer to 20 which downloadable information is sent if that downloadable information is determined to contain 21 executable code. Id. at 7. In order to satisfy Rule 3-1, Finjan’s contentions must describe the 22 “structure, act or material,” of Zscaler’s products that allegedly infringe each claim element. 23 Finjan, 2015 WL 1517920, at *2. Zscaler argues that Finjan fails to specify precisely what in 24 Zscaler’s products transmits “mobile protection code.” ECF No. 61 at 7. Finjan’s contentions 25 explain that mobile protection code is “code and information pertaining to the task and 26 parameters.” Id. The contentions also specify that the code “is executable and includes 27 28 2 1 information using API’s1 . . . , parameters to run the sample file or URL, a hash of the file, [and] 2 information contained in a JSON file which includes information regarding the sample or URL.” 3 ECF No. 65 at 7-8. These details explain what mobile protection code is, but do not explain how 4 any Zscaler product transmits such code. While the contentions purport to describe how Zscaler’s products send mobile protection 5 6 code, a closer examination makes clear that the contentions lack any meaningful, clear, or specific 7 description. The contentions describe that Zscaler’s Cloud Architecture Products send mobile 8 protection code and downloadable information to sandbox servers “as shown below.” Id. at 8. 9 But the text below sheds no light on any particular structure, act or material that sends mobile protection code. ECF No. 61-2 at 61. The only reference to the sandbox in the text below 11 United States District Court Northern District of California 10 provides: “With the exception of sandboxing, all inspection engines run within the ZEN.” Id. 12 Finjan’s contentions leave Zscaler in the dark as to what part of its product transmits mobile 13 protection code and infringes the claims. Finjan has not met its “obligation to map specific 14 elements of Defendant[’]s[] alleged infringing products onto the Plaintiff’s claim 15 construction.” Finjan, 2015 WL 1517920, at *7 (“At a minimum, Finjan was required to 16 expressly discuss the particular claim elements identified in each Claim and map those elements 17 onto the features of the allegedly infringing products. . . . Neither the Court nor the Defendant[] 18 should be required to guess which aspects of the accused products allegedly infringe each claim 19 element.”). The ’780 Patent 20 B. 21 Claim 1 of the ’780 patent claims a system comprising of both (1) a communications 22 engine, which obtains a downloadable that includes references to software components required to 23 be executed by the downloadable; and (2) an ID generator, coupled to the communications engine, 24 which fetches software components identified by those references and performs a hashing function 25 to generate an ID for the downloadable. ECF No. 61 at 8-9. Finjan’s contentions provide that 26 each, or a combination of each, of Zscaler’s accused products (the Cloud Sandbox, Cloud 27 28 1 API stands for “application programming interface.” 3 1 Architecture, and Zulu URL Risk Analyzer) act as the communications engine – and the very 2 same set of products, individually or collectively, also act as the ID generator. Id. at 9-10. Zscaler 3 argues that Finjan’s contentions fail to explain which particular parts of its products make up the 4 separate communications engine and ID generator. Id. 5 Finjan points to many pages of contentions which it believes explain how Zscaler’s 6 products carry out the elements of the claims. ECF No. 65 at 10. But these pages consist of little 7 more than the text of the patent, followed by text copied verbatim from Zscaler’s general 8 marketing materials, without any explanation as to how the products featured in the marketing 9 materials constitute a structure, act or material that carries out the claims. Finjan, 2015 WL 1517920, at *2; ECF No. 61-3 at 54; id. at 58-59. The same is true of Finjan’s contentions for the 11 United States District Court Northern District of California 10 ID generator. ECF No. 61-3 at 68-69. For example, one contention describes that Zscaler’s Cloud 12 Sandbox is an ID generator coupled to the communications engine which performs a hashing 13 function on the downloadable and fetched software components. ECF No. 61-3 at 76 (copying the 14 patent text). The contention goes on to describe that the sandbox report assigns a hash ID, but it 15 does not describe that, or in what way, the ID generator is coupled with the communications 16 engine. Id. at 76-77. Finjan’s claims chart merely “provide[s] generic allegations that do not 17 identify specific . . . components [of the product or products] that reportedly correspond to the 18 claims limitation . . . in a manner that gives defendant fair notice as to where the alleged infringing 19 [products] are locat[ed]. Instead [Finjan] simply repeats the same generic descriptions and cuts- 20 and-pastes them beside each element of every claim.” Bender v. Infineon Techs. N. Am. Corp., 21 No. C09-02112JW (HRL), 2010 WL 964197, at *2 (N.D. Cal. Mar. 16, 2010). The ’494 Patent 22 C. 23 Claim 10 of the ’494 patent claims a downloadable scanner coupled with a receiver which 24 receives an incoming downloadable and derives security profile data for that downloadable, 25 including a list of suspicious computer operations the downloadable may attempt. ECF No. 61 at 26 10. Zscaler argues that Finjan’s contentions fail to explain what elements of its products list 27 suspicious computer operations. Id. at 11. While Finjan points to a contention which lists 28 suspicious operations that Zscaler’s sandbox product can recognize, the contention fails to connect 4 1 that list to any downloadable scanner coupled with a receiver. ECF No. 61-4 at 26. The 2 contention does not constitute a “narrative explanation of how the product group infringes” and is 3 accordingly insufficient. Implicit Networks Inc. v. Hewlett-Packard Co., No. C 10-03746 SI, 2011 4 WL 3954809, at *2 (N.D. Cal. Sept. 7, 2011). The ’305 Patent 5 D. 6 Finally, claim 1 of the ’305 patent claims a network interface housed within a computer, 7 which receives incoming content from an internet application running on the computer, and a 8 database of parser and analyzer rules also stored on that computer. ECF No. 61 at 12-13. The 9 patent therefore claims a computer which contains all three of: a network interface, an internet application, and a dataset of parser and analyzer rules. Zscaler’s contentions fail to describe any 11 United States District Court Northern District of California 10 product that is, or contains, a computer which does all three. For example, one contention 12 explains that Zscaler’s ZEN product is a computer, and simultaneously an internet application – 13 but fails to describe how the product contains a network interface and dataset of parser and 14 analyzer rules. ECF No. 61-5 at 8. Finjan points to another contention which explains that 15 Zscaler’s Cloud Sandbox contains a threat database that includes parsing rules to sort conditions 16 as token patterns capable of being parsed by the product. Id. at 13. While this contention details 17 the parser element, it does not explain how the product also contains a network interference and 18 internet application. See also id. at 18 (explaining similarly that a product parses but failing to 19 describe a network interface and internet application). Because the contentions fail to specifically 20 identify what portion of Zscaler’s specific product or products disclose a computer containing all 21 three of a network interface, internet application, and dataset, the contentions are inadequate. See 22 Tessenderlo, 2012 WL 1253178, at *2 (“Broad inferences cannot stand in place of factual 23 information.”). 24 /// 25 /// 26 /// 27 /// 28 /// 5 1 CONCLUSION 2 Zscaler’s motion to compel more specific infringement contentions is GRANTED. 3 Pursuant to the paries’ agreement, Finjan must file amended contentions within 45 days of the 4 issuance of this order. Zscaler’s unopposed request to amend its invalidity contentions and claim 5 construction positions 30 days later is also GRANTED. 6 7 8 9 IT IS SO ORDERED. Dated: August 31, 2018 ______________________________________ JON S. TIGAR United States District Judge 10 United States District Court Northern District of California 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 6

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?