Fortinet, Inc. v. Forescout Technologies, Inc.
Filing
133
ORDER by Judge Edward M. Chen Denying 115 Plaintiff's Motion to Dismiss Counterclaims. (emcsec, COURT STAFF) (Filed on 11/29/2021)
1
2
3
4
UNITED STATES DISTRICT COURT
5
NORTHERN DISTRICT OF CALIFORNIA
6
7
FORTINET, INC.,
Case No. 20-cv-03343-EMC
Plaintiff,
8
v.
9
FORESCOUT TECHNOLOGIES, INC.,
11
United States District Court
Northern District of California
10
Defendant.
ORDER DENYING PLAINTIFF’S
MOTION TO DISMISS
COUNTERCLAIMS
Docket No. 115
12
13
I.
14
INTRODUCTION
In this action, Defendant Forescout Technologies, Inc. (“Forescout”) counterclaims against
15
16
Plaintiff Fortinet, Inc. (“Fortinet”), alleging that Fortinet infringed six of its patents and tortiously
17
interfered with its business relations.
18
Pending before the Court is Fortinet’s motion to dismiss Forescout’s counterclaim.
19
Fortinet argues that four of Forescout’s patents claimed ineligible subject matter under 35 U.S.C. §
20
101 and that Forescout’s claim for tortious interference should be dismissed due to: (1) lack of
21
subject matter jurisdiction, (2) federal law preemption of the state claim, and (3) failure to state a
22
plausible claim. For the following reasons, the Court DENIES Fortinet’s motion to dismiss.
23
A.
24
Factual Background
Fortinet sells cybersecurity products, software, and services to large institutional
25
customers. Docket No. 67 at 1. Forescout is a competitor of Fortinet in the cybersecurity market
26
and owns U.S. Patent No. 8,590,004 (“the ‘004 Patent”) (Method and System for Dynamic
27
Security Using Authentication Server); Patent No. 10,652,116 (“the ‘116 Patent”) (Device
28
Classification); Patent No. 10,530,764 (“the ‘764 Patent”) (Post-Connection Client Certificate
1
Authentication); Patent No. 6,363,489 (“the ‘489 Patent”) (Method for Automatic Intrusion
2
Detection and Deflection in a Network); and Patent No. 10,652,278 (“the ‘278 Patent”)
3
(Compliance Monitoring). Counterclaim at 53, 55, 57, 60.
4
On February 9, 2020, Forescout publicly announced a major acquisition in which Advent
5
International (“Advent”), a global private equity investor, would acquire all outstanding shares of
6
Forescout. Id. at 43. One business day before Advent was scheduled to close the acquisition,
7
Fortinet filed its Complaint, then allegedly engaged in a campaign to smear Forescout. Id.
8
Fortinet allegedly told CRN, an industry news source, that Fortinet:
9
[D]oesn't take litigation lightly and has only engaged in lawsuits to
protect its intellectual property on seldom occasions when it is left
no alternative. But Forescout's wrongful incorporation of Fortinet's
intellectual property into its product offerings is material and goes
to the heart of Fortinet's business.
10
United States District Court
Northern District of California
11
12
Id. at 46.
13
Forescout further alleges that Fortinet falsely raised doubts on Forescout’s financial
14
solvency to “existing and potential customers.” Id. Fortinet's major accounts manager distributed
15
a sample email used to “target folks looking at or using ForeScout,” which stated the following:
16
With (insert company name) 's up and coming investment in (insert
NAC, zero trust security, whatever way you would like to describe
the project) I wanted to insure you were aware of the ongoing
legal problems and future of Forescout. In short, Fortinet has filed
lawsuit against Forescout for patent infringement related to
technology held within FortiNAC. Their acquisition by Advent
and bid to be taken private was put on hold resulting in Forescout
now filing a lawsuit against Advent, all this leaving Forescout on
uncertain ground financially. This information is all public and
can information on it is readily accessible.” – From here, you
could include any of the various links to articles detailing the
situation with Forescout, the financial comparison, or any other
info you think would resonate. Below are some [links to articles
about Forescout's legal problems caused by Fortinet][.]
17
18
19
20
21
22
23
24
Id. at 46–47.
25
B.
26
Procedural Background
Fortinet alleged infringement of three patents in its original Complaint and two additional
27
patents in its Amended Complaint. Docket No. 1; Docket No. 67. In November 2020 and June
28
2021, the Court granted in part and denied in part Forescout’s motions to dismiss which argued
2
1
that the patents claimed ineligible subject matter and were, therefore, invalid under § 101. Docket
2
No. 24; Docket No. 71.
In July 2021, Forescout brought counterclaims against Fortinet, alleging infringement of
3
4
six patents, as well as a claim for tortious interference based on extrajudicial statements made by
5
Fortinet. On August 17, 2021, Fortinet moved to dismiss the counterclaims, including the ‘116,
6
‘764, ‘489, and ‘278 Patents.
II.
7
LEGAL STANDARD
The Federal Rule of Civil Procedure 8(a)(2) requires a complaint to include “a short and
8
plain statement of the claim showing that the pleader is entitled to relief.” Fed. R. Civ. P. 8(a)(2).
10
A complaint that fails to meet this standard may be dismissed pursuant to the Federal Rule of Civil
11
United States District Court
Northern District of California
9
Procedure 12(b)(6). See Fed. R. Civ. P. 12(b)(6). To overcome a Rule 12(b)(6) motion to dismiss
12
after the Supreme Court's decisions in Ashcroft v. Iqbal, 556 U.S. 662 (2009), and Bell Atl. Corp.
13
v. Twombly, 550 U.S. 544, 127 (2007), a plaintiff's “factual allegations [in the complaint] 'must . . .
14
suggest that the claim has at least a plausible chance of success.” Levitt v. Yelp! Inc., 765 F.3d
15
1123, 1135 (9th Cir. 2014). The court “accept[s] factual allegations in the complaint as true and
16
construe[s] the pleadings in the light most favorable to the nonmoving party.” Manzarek v. St.
17
Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir. 2008). However, “allegations in a
18
complaint . . . may not simply recite the elements of a cause of action [and] must contain sufficient
19
allegations of underlying facts to give fair notice and to enable the opposing party to defend itself
20
effectively.” Levitt, 765 F.3d at 1135. “A claim has facial plausibility when the plaintiff pleads
21
factual content that allows the court to draw the reasonable inference that the defendant is liable
22
for the misconduct alleged.” Ashcroft, 556 U.S. at 678. “The plausibility standard is not akin to a
23
probability requirement, but it asks for more than a sheer possibility that a defendant has acted
24
unlawfully.” Id.
III.
25
26
A.
DISCUSSION
Patent Subject Matter Eligibility Under § 101
27
Under the Patent Act of 1952, patents are “presumed valid.” 35 U.S.C. § 282(a). “As
28
such, an alleged infringer asserting an invalidity defense pursuant to § 101 bears the burden of
3
1
proving invalidity by clear and convincing evidence.” Cisco Sys., Inc. v. Uniloc USA, Inc., 386 F.
2
Supp. 3d 1185, 1190 (N.D. Cal. 2019) (citing Microsoft Corp. v. I4I Ltd. P'ship, 564 U.S. 91, 95,
3
131 (2011)). “Patent eligibility under 35 U.S.C. § 101 is ultimately an issue of law” but “may
4
contain underlying issues of fact.” Berkheimer v. HP Inc., 881 F.3d 1360, 1365 (Fed. Cir. 2018).
5
“Like other legal questions based on underlying facts,” patent eligibility “may be, and frequently
6
has been, resolved on a Rule 12(b)(6) or (c) motion where the undisputed facts . . . require a
7
holding of ineligibility under the substantive standards of law.” SAP Am., Inc. v. InvestPic, LLC,
8
898 F.3d 1161, 1166 (Fed. Cir. 2018). Thus, “[a]lthough claim construction is often desirable, and
9
may sometimes be necessary, to resolve whether a patent claim is directed to patent-eligible
subject matter,” it is not “an inviolable prerequisite to a validity determination under § 101,” and
11
United States District Court
Northern District of California
10
may be eschewed “[w]here the court has a full understanding of the basic character of the claimed
12
subject matter.” Voip-Pal.Com, Inc. v. Apple Inc., 375 F. Supp. 3d 1110, 1124 (N.D. Cal. 2019).
13
Section 101 defines the scope of patent-eligible subject matter. It provides: “Whoever
14
invents or discovers any new and useful process, machine, manufacture, or composition of matter,
15
or any new and useful improvement thereof, may obtain a patent therefor.” 35 U.S.C. § 101.
16
Patents may not be obtained for “laws of nature, natural phenomena, [or] abstract ideas.” Alice
17
Corp. Pty. v. CLS Bank Int'l, 573 U.S. 208, 217 (2014). In Alice, the Supreme Court established a
18
two-step test that district courts must apply in a patent eligibility analysis under §101.
19
At step one, the court must “determine whether the claims at issue are directed to a patent-
20
ineligible concept,” i.e., a law of nature, natural phenomenon, or an abstract idea. Id. at 218. If
21
so, then the court moves to step two, which “consider[s] the elements of each claim both
22
individually and 'as an ordered combination' to determine whether [any] additional elements
23
'transform the nature of the claim' into a patent-eligible application” of the ineligible subject
24
matter. Id. at 217 (quoting Mayo Collaborative Servs. v. Prometheus Lab'ys, Inc., 566 U.S. 66,
25
78–79 (2012)).
26
While the precise contours of what constitutes an “abstract idea” under step one remains
27
elusive, the Supreme Court has identified algorithms, mathematical formulae, “fundamental
28
economic practice[s] long prevalent in our system of commerce,” and other “method[s] of
4
1
organizing human activity” as impermissibly abstract. Alice, 573 U.S. at 218–20 (citing Bilski v.
2
Kappos, 561 U.S. 593, 599 (2010)). To determine whether the claims at issue are directed to one
3
of those patent-ineligible concepts, the courts “look to whether the claims . . . focus on a specific
4
means or method that improves the relevant technology or are instead directed to a result or effect
5
that itself is the abstract idea and merely invoke generic processes and machinery.” McRO, Inc. v.
6
Bandai Namco Games Am. Inc., 837 F.3d 1299, 1314 (Fed. Cir. 2016).
7
Merely applying an “abstract idea . . . on a generic computer” does not satisfy step one.
Bascom Glob. Internet Servs., Inc. v. AT&T Mobility LLC, 827 F.3d 1341, 1348 (Fed. Cir. 2016).
9
Nor does “[l]imiting the invention to a technological environment” such as the Internet transform
10
an otherwise abstract idea into non-abstract one. Berkheimer, 881 F.3d at 1367. According to the
11
United States District Court
Northern District of California
8
Federal Circuit, a computer-based patent should specifically “describe how to solve the problem
12
[it addresses] in a manner that encompasses something more than the principle in the abstract” to
13
claim eligible subject matter at step one. See Dropbox, Inc. v. Synchronoss Techs., Inc., 815 F.
14
App'x 529, 533 (Fed. Cir. 2020) (Fed. Cir. 2020); see also Ancora Techs., Inc. v. HTC Am., Inc.,
15
908 F.3d 1343, 1348 (Fed. Cir. 2018) (holding an invention patentable at step one where the claim
16
“specifically identifies how th[e] functional improvement is effectuated in an assertedly
17
unexpected way”). Put another way, courts at Alice step one seek to determine whether a patent's
18
claimed advance represents a concrete “technological solution to a technological problem.” See
19
Packet Intel. LLC v. NetScout Sys., Inc., 965 F.3d 1299, 1309 (Fed. Cir. 2020); see also Prism
20
Techs. LLC v. T-Mobile USA, Inc., 696 F. App'x 1014, 1017 (Fed. Cir. 2017) (denying eligibility
21
at step one because the claims did not “cover a concrete, specific solution to a real-world
22
problem”). In this regard, the focus is placed on a patent’s specificity.
23
If a patent is directed to an abstract idea at Alice step one, then Alice step two considers
24
whether “the elements of [a] claim both individually and as an ordered combination” go beyond
25
“well-understood, routine, [and] conventional activit[ies] previously known to the industry.”
26
Alice, 573 U.S. at 217, 225 (quoting Mayo Collaborative Services, 566 U.S. at 73, 79). This
27
second step is also described as “a search for an inventive concept.” Id. at 217–18 (quoting Mayo
28
Collaborative Services, 566 U.S. at 72–73). In the case of a computer-implemented invention, the
5
1
Federal Circuit has held that components recited in the claims “must involve more than
2
performance of ‘well-understood, routine, conventional activit[ies]’ previously known to the
3
industry” to render an abstract idea patent-eligible. In re TLI Commc'ns LLC Pat. Litig., 823 F.3d
4
607, 613 (Fed. Cir. 2016). The components themselves may supply an inventive concept if they
5
amount to more than “generic computer components.” See Customedia Techs., LLC v. Dish
6
Network Corp., 951 F.3d 1359, 1366 (Fed. Cir. 2020). Further, “an inventive concept can also be
7
found in the non-conventional and non-generic arrangement of known, conventional pieces” of
8
computing components. Bascom, 827 F.3d at 1350.
Courts have recognized that step one and step two of the Alice test may overlap in many
10
“cases involving computer-related claims,” such that “an analysis of whether there are arguably
11
United States District Court
Northern District of California
9
concrete improvements in the recited computer technology could take place” under both steps.
12
See Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1339 (Fed. Cir. 2016); see also Amdocs
13
(Israel) Ltd. v. Openet Telecom, Inc., 841 F.3d 1288, 1294 (Fed. Cir. 2016) (observing that recent
14
cases ‘‘suggest that there is considerable overlap between step one and step two, and in some
15
situations [the inventive concept] analysis could be accomplished without going beyond step
16
one.’’). Therefore, this Court previously adopted “a flexible approach in ‘characteriz[ing] what
17
the claims are directed to,’ taking both step[]one and step[]two considerations into account[.]”
18
Fortinet, Inc. v. Forescout Techs., Inc., No. 20-CV-03343-EMC, 2021 WL 2412995, at *8 (N.D.
19
Cal. June 14, 2021). In addition, this Court previously discussed the role of a patent’s
20
specification at length and concluded that “at this still-early stage of the litigation, [the Court
21
should] construe the focus of [the patent] ‘in light of the specification,’ . . . and to credit the
22
specification's account of whether and how ‘the claimed invention achieves multiple technological
23
improvements’ over the prior art[.]” Id. at *10; see also Enfish, 822 F.3d at 1335.
The ‘489 Patent
24
1.
25
The ‘489 Patent concerns a method and a system for providing security to a network by
26
“identifying an unauthorized user who is attempting to gain access to a node on the network, and
27
. . . actively blocking that unauthorized user from further activities.” ‘489 Patent, at abstract. This
28
is accomplished by marking false data which allows identification of intrusions of a network. Id.
6
1
2
Claim 1 states the following:
3
1. A method for detecting and handling a communication from an
unauthorized source on a network, the method comprising the steps
of:
4
(a) receiving the communication from the unauthorized source,
5
(b) analyzing the communication for detecting an information
gathering procedure;
6
7
8
9
10
United States District Court
Northern District of California
11
12
13
14
15
16
17
18
19
(c) if said information-gathering procedure is detected, indicating a
source address of the communication as a suspected network
reconnaissance collector;
(d) returning an earmark to said Suspected reconnaissance collector,
Such that Said earmark includes specially crafted false data, and
such that said earmark includes data that can serve to identify an
unauthorized Source;
(e) analyzing each subsequent communication for a presence of Said
earmark,
(f) if said earmark is present, indicating source address of the
communication as a suspected network reconnaissance collector,
and
(g) if said source address is said intruder source address, applying
intrusion handling procedures towards the communication from said
intruder source address.
‘489 Patent, at Claim 1.
a.
Step One
Courts at Alice step one seek to determine whether a patent represents a concrete
20
“technological solution to a technological problem.” Packet Intel., 965 F.3d at 1309. Fortinet
21
argues that the ‘489 Patent is directed to the abstract idea of detecting unauthorized users by
22
baiting them with false information, then waiting for that falsified data to appear to take action
23
against them. Docket No. 115 (“Mot.”) at 8. Fortinet argues that the idea of “baiting” an intruder
24
with false information is a well-known “method of organizing human activity” that is
25
impermissibly abstract under Alice. Id. Further, Fortinet notes that collecting and analyzing
26
information for detecting and notifying fraud or misuse was already found to be abstract by the
27
Federal Circuit. Id. (citing Bozeman Fin. LLC v. Fed. Rsrv. Bank of Atlanta, 955 F.3d 971, 977
28
(Fed. Cir. 2020); FairWarning IP, LLC v. Iatric Sys., Inc., 839 F.3d 1089, 1094 (Fed. Cir. 2016)).
7
1
Therefore, Fortinet argues that the claim “do[es] no more than break the abstract idea into basic
2
steps.” Reply at 2 (quoting Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 714 (Fed. Cir. 2014).
3
Further, Fortinet notes that what exactly constitutes “specially crafted” data is undescribed. Id.
4
Forescout counters that the ‘489 Patent claims a specific improvement over the prior art:
5
improved accuracy. Docket No. 116 (“Opp’n”) at 5. Forescout argues that this is a problem
6
specific to computer networks and the ‘489 Patent recites a specific technique for computer
7
network security that departs from earlier approaches. Id. at 6.
8
9
The Court first examines whether the ‘489 Patent addresses a technological problem.
Fortinet argues that the presence of intruders is not confined to a computer network environment,
therefore, the problem is not unique to computer networks. Mot. at 8. Forescout notes that
11
United States District Court
Northern District of California
10
conventional networks used heuristics, resulting in many false alarms that “nullifie[d] the
12
usefulness of such systems[,]” which created “a need for a useful security protection method.”
13
Opp’n at 3–5. Therefore, Forescout contends that the ‘489 Patent claims an improvement directed
14
toward solving a unique problem to intruder detection on computer networks, which is an
15
“improvement in computer network technology.” Opp’n at 5 (citing SRI Int'l, Inc. v. Cisco Sys.,
16
Inc., 930 F.3d 1295, 1303 (Fed. Cir. 2019), vacated in part on other grounds, 930 F.3d 1295 (Fed.
17
Cir. 2019)). As Fortinet states, baiting an intruder is an abstract idea, and the mere fact that the
18
claim is limited to a network environment does not make it non-abstract. Intell. Ventures I LLC v.
19
Cap. One Bank (USA), 792 F.3d 1363, 1366 (Fed. Cir. 2015) (“An abstract idea does not become
20
nonabstract by limiting the invention to a particular field of use or technological environment,
21
such as the Internet.”). However, while intruders are not confined to a computer network,
22
“identifying hackers or potential intruders to the network” is a technological problem arising in
23
computer networks. SRI Int’l, 930 F.3d at 1303.
24
Second, the parties argue as to whether the claimed improvement is a technological
25
solution. Claim 1 can be summarized as follows: “receiving” communication from a device,
26
“analyzing” it for suspicious activity, “identifying” the intruder using an earmark that is “specially
27
crafted false data,” “analyzing” subsequent communications for the presence of the earmark, then
28
“applying” intruder handling protocols. Fortinet argues that the ‘489 Patent simply attempts to
8
1
claim the idea of “baiting an intruder with false information[,]”a “well-known human activity” that
2
“constitute[s an] abstract idea” like Ericsson. Mot. a 9–10 (citing Ericsson Inc. v. TCL Commc'n
3
Tech. Holdings Ltd., 955 F.3d 1317, 1326–27 (Fed. Cir. 2020) (finding that claims were ineligible
4
for being directed to the abstract idea of controlling access to resources).
5
However, unlike Fortinet’s representation, the ‘489 Patent is distinguished from Ericsson,
6
as the claimed method is not the type of activity that “can be performed in the human mind, or by
7
a human using a pen and paper.” Id. Ericsson does not apply because the human mind is not
8
equipped to detect suspicious activity by using false data.
9
A closer analogy can be found in SRI Int’l. The patent in SRI Int’l claimed an automated
computer network intrusion detection method “using a specific technique—using a plurality of
11
United States District Court
Northern District of California
10
network monitors that each analyze[d] specific types of data on the network and integrating
12
reports from the monitors—to solve a technological problem arising in computer networks:
13
identifying hackers or potential intruders into the network[.]” SRI Int’l, 930 F.3d at 1303. The
14
Federal Circuit agreed with the district court that the claims were “more complex than merely
15
reciting a known practice on the Internet and [were] better understood as being necessarily rooted
16
in computer technology in order to solve a specific problem in the realm of computer networks.”
17
Id. The ‘489 Patent addresses the same specific technological problem of identifying potential
18
intruders into the network and provides that while prior art would normally use a firewall to
19
prevent unauthorized entry, the ‘489 Patent uses security modules with false information that
20
allows the unauthorized source to be identified later. Id. at 4:48–50, 63–66. This technology-
21
based approach can fairly be characterized as a technological solution directed to improving
22
intruder detection on computer networks by improving accuracy, protecting the network, and
23
avoiding false alarms. Opp’n at 5.
24
Fortinet argues that neither the language of the claims nor the specification detail
25
technological specificity sufficient to demonstrate that the invention is a technological
26
improvement. Reply at 2; Mot. a 9–10. Forescout counters that the ‘489 Patent’s claims a
27
specific technological solution in its use of “specially crafted false data” and “imitative (fake)
28
network services to identify and isolate intruders.” Opp’n at 5–6. The parties disagree on whether
9
1
this “specially crafted false data” has the requisite specificity. Fortinet argues that “precisely how
2
to ‘specially craft’ this data is not claimed, and instead is left entirely to the implementor . . . Any
3
data that is in some way ‘specially crafted,’ such that it can be used to identify the bad actor, will
4
suffice.” Reply at 2. Indeed, Claim 1 describes “specially crafted false data” sparsely as an
5
“earmark includ[ing] data that can serve to identify an unauthorized source.” ‘489 Patent, at
6
Claim 1. Limited solely to the language of Claim 1, the ‘489 Patent should arguably be deemed
7
abstract due to its lack of specificity.
8
9
However, the specification provides a greater degree of technological specificity that may
satisfy the step one inquiry. According to the specification, the mark is “designed such that any
attempt by an unauthorized user to use such false data results in the immediate identification of the
11
United States District Court
Northern District of California
10
unauthorized user as hostile.” ‘489 Patent at 2:16–18. The mark also includes an identifier for
12
later identifying the unauthorized user which “[p]referably . . . features numeric data, which can be
13
identified easily and preferably uniquely in order to avoid mistaken identification of an authorized
14
user as being unauthorized.” Id. at 5:7–12. The specification also provides that this mark is
15
attached after identifying possible unauthorized users that perform a “scan,” which is a method of
16
information collection used by unauthorized users. Id. at 6:10–11. Once a “scan” is detected, the
17
unauthorized user is added to the intruder database, and a mark is returned to the user. Id. at 28–
18
34. If the unauthorized user returns, the suspected user is matched with the previous source
19
address stored in the intruder database, allowing additional confirmation that the suspect is
20
actually hostile. Id. at 39–51. This mark database is preferably “structured such that each entry
21
has the form of . Such an entry represents a false network service,
22
which does not exist on the network. Thus, accessing such a network service is considered to be
23
hostile, indicating the presence of an intruder, as legitimate users would not attempt to access the
24
service.” Id. at 6:45–51. This detail regarding the “specially crafted false data” and “false
25
network service” suggests that the ‘489 Patent describes a specific technique to solve a
26
technological problem arising in computer networks. Further, the dependent claims describe the
27
limitations in greater detail. For example, Claim 9 limits the information gathering procedure to
28
be selected from the group consisting of a scan, a Domain Name Service (DNS) zone transfer, a
10
1
“finger” probe, NIS/LDAP interrogation, and sniffing. ‘489 Patent at Claim 9. The “specially
2
crafted false data” used for Claim 9 are specifically defined in the specification as below:
3
The DNS zone transfer probe involves the interrogation of a DNS
server in order to receive a list of host names and addresses in the
network. Marks against this method are prepared by defining names
and addresses of non-existent hosts within the network at the DNS
server. The identifier associated with such a mark is the IP address
of the non existent host.
4
5
6
The "finger probe is performed by interrogating a host computer,
which is a node on the network, for active users with the “finger”
service of the UNIX operating system. Replying to such an
interrogation with the name of a non-existent user or users provides
the marks for this method. The mark is in the form of , such that this combination provides the identifier for
detecting any subsequent intrusion attempts.
7
8
9
10
NIS/LDAP interrogation involves NIS and/or LDAP data bases
which are often used to store site-specific information and which
provide access methods over the network. Unless these databases
are protected, the unauthorized user can interrogate these databases
remotely, and retrieve information such as user names, encrypted
passwords, network node (computer) names and addresses, and so
forth. Marks against this probing method are prepared by
constructing a fake NIS and/or LDAP database, which contain any
of the previously described information items as mark.
United States District Court
Northern District of California
11
12
13
14
15
The sniffing method involves recording network activities within the
network, particularly after the unauthorized user has penetrated the
network and has gained high level privileges . . . Marks against this
probing method are provided by simulating sessions over the
network, and including fake user names and passwords during these
“sessions”. The mark has the form of .
16
17
18
19
20
Id. at 7:61–8:26.
21
Fortinet may ultimately prove that the above description of the “specially crafted false
22
data” or “false network service” provides no meaningful detail sufficient to take the invention
23
beyond an abstract concept. However, the Court cannot make such a determination on a Rule
24
12(b)(6) motion. For the purposes of a motion to dismiss, all factual inferences are made in favor
25
of the patentholder. The Court cannot conclude as a matter of law at this juncture that the patent
26
claims are directed to an abstract idea rather than a technological improvement in computer
27
technology.
28
11
b.
1
Step Two
Nevertheless, even if the Court were to find the ‘489 Patent to be ineligible subject matter
2
3
at step one, the Court is reluctant to find the ‘489 Patent ineligible at step two because the same
4
concerns recited at step one apply to step two. “An analysis of whether there are arguably
5
concrete improvements in the recited computer technology could take place under either step one
6
or step two.” Fortinet, 2021 WL 2412995 at *8 (quoting Enfish, 822 F.3d at 1339).
7
At Alice step two, the Court must determine whether the claims contain an “inventive
8
concept” sufficient to “transform” the abstract idea of using an earmark into a patent-eligible
9
“application” of the abstract idea. Alice, 573 U.S. at 217–18. Alice step two is satisfied when the
claims recite more than performance of “well-understood, routine, conventional activities[,]”
11
United States District Court
Northern District of California
10
which is a question of fact. Id. at 225; Berkheimer, 881 F.3d at 1368.
12
Fortinet argues that the ‘489 Patent fails to recite an inventive concept, as it simply
13
instructs the practitioner to “implement the abstract idea . . . on a generic computer,” which “does
14
nothing significant to differentiate a process from ordinary mental processes,” and therefore
15
should be excluded under § 101. Mot. at 10 (quoting Alice, 573 U.S. at 225; Elec. Power Grp.,
16
LLC v. Alstom S.A., 830 F.3d 1350, 1355 (Fed. Cir. 2016)). According to Fortinet, this method
17
does not require any configuration other than the conventional machine on a conventional network
18
and therefore does not “transform” the idea into an invention. Id.
Forescout argues that “an inventive concept can be found in the non-conventional and non-
19
20
generic arrangement of known, conventional pieces.” Bascom, 827 F.3d at 1349–50. Forescout
21
argues that the claims “when considered as a whole, detect and mitigate any unauthorized, hostile
22
sources by using false data requested by that source,” which is an inventive concept. Opp’n at 7.
23
Therefore, Forescout states that it is premature to conclude that the components of the claims as
24
combined were “well-understood, routine, and conventional” at the time of the invention in 1999.
25
Id.
26
Like step one, it would be difficult to conclude at this point that the ordered combination of
27
elements lacks an inventive concept. The ‘489 Patent, on its face, plausibly presents claims
28
directed to specific improvements that recite more than what was conventional. Forescout notes
12
1
that conventional systems used heuristics which had a “high rate of false alarms, which
2
nullifie[d]” the usefulness of such systems. Opp’n at 7. Further, the specification states that the
3
invention departs from the prior art method, which featured a firewall installed at the entry point to
4
prevent unauthorized entry that could be circumvented. ‘489 Patent at 4:42–47. The current
5
invention places security modules containing the earmark instead of a firewall and identifies an
6
unauthorized source as hostile “by analyzing its communication for false earmarked data” and
7
providing “an imitative, false network service rather than . . . the actual service on the network.”
8
‘489 Patent at 7:27–28. Forescout contends that this combination results in much more accurate
9
hostile source identifications and allows confirmation, which are improvements over the
conventional systems. Opp’n at 7. (citing '489 Patent at 1:36–37). Like step one, it cannot be
11
United States District Court
Northern District of California
10
determined at this stage of the litigation whether this “false earmarked data,” “false network
12
service,” or their combination thereof were “well-understood, routine, and conventional to a
13
skilled artisan in the relevant field”; questions of fact “must be proven by clear and convincing
14
evidence.” See Berkheimer, 881 F.3d at 1360. Therefore, the Court denies the motion to dismiss
15
for the ‘498 Patent.
The ‘116 Patent
16
2.
17
The ‘116 Patent concerns “device classification.” Specifically, “systems, methods, and
18
related technologies for device classification are described. Claim 1 recites:
19
1. A method comprising:
20
Detecting a device coupled to a network in response to the device
being coupled to the network;
21
22
23
Accessing first data associated with the device from an agent
installed on the device;
24
Accessing second data associated with the device from an external
system, wherein the second data associated with the device
comprises traffic data associated with the device;
25
Analyzing the traffic data of the device;
26
Determining a classification for the device based on the first data
associated with the device and the traffic data;
27
28
and storing the classification for the device.
13
1
2
3
‘116 Patent, at Claim 1.
a.
Step One
At Alice step one, Fortinet argues that the ‘116 Patent’s claims are directed to an abstract
4
idea of classifying devices on a network using more than one source of data. Mot. at 14. Fortinet
5
further argues that the claims describe the “data” being analyzed only in “extremely generic
6
terms,” which could be any data about the device. Id. Fortinet relies on several Federal Circuit
7
cases that had found claims combining multiple sources of data to be abstract. Id. (citing Credit
8
Acceptance Corp. v. Westlake Servs., 859 F.3d 1044, 1054 (Fed. Cir. 2017) (finding claims
9
reciting a method of “combining [] two sources of information to create a financing package” to be
directed to an abstract idea); Bozeman, 955 F.3d at 979 (finding claims reciting a method of
11
United States District Court
Northern District of California
10
“reducing check fraud by receiving financial transaction data from two sources” to be directed to
12
an abstract idea)). Fortinet also notes that the Federal Circuit has found the idea of classifying
13
devices to be a well-known “method of organizing a human activity.” Id. (citing Content
14
Extraction & Transmission LLC v. Wells Fargo Bank, Nat. Ass’n, 776 F.3d 1343, 1347 (Fed. Cir.
15
2014) (finding claims reciting a method of processing information and storing them according to
16
their classification to be abstract)).
17
The ‘116 Patent seems to claim a solution to a problem unique to computer networks that
18
improves network monitoring. The ‘116 Patent states that previous conventions resulted in
19
frequent false negatives and false positives which could “only provide high-level rough
20
classifications” that were unusable. Opp’n at 9 (citing ‘116 Patent at 2:51–54). This problem was
21
exacerbated by the proliferation of the Internet of Things (“IoT”), which are “systems and devices
22
being used for various applications and locations ranging from households to large industrial
23
environments.” Id. This problem of inaccuracy that is exacerbated by the IoT recites a problem
24
unique to computer networks and is improved by the ‘116 Patent.
25
The next question is then whether the claims “specifically identifies how th[e] functional
26
improvement is effectuated in an assuredly unexpected way.” Ancora Techs., 908 F.3d at 1348.
27
Forescout argues that this problem of inaccuracy is solved by “combining multiple sources: an
28
agent installed on the device and an external system” which contains “traffic data associated from
14
1
2
devices.” Opp’n at 9–10; see ‘116 Patent 2:66–3:01, 9:56–57.
At first glance, the claimed method boils down to using two different sets of data to
3
classify a device instead of using one set of data. Merely using several sources of information
4
does not make an abstract idea any less abstract; nor does merely applying an “abstract idea . . . on
5
a generic computer” satisfy step one. Bascom, 827 F.3d at 1348. Collecting and analyzing data is
6
an abstract concept. See, e.g., Electric Power Group, LLC, 830 F.3d at 1351–56 (holding that
7
“systems and methods for performing real-time performance monitoring . . . by collecting data
8
from multiple data sources, analyzing the data, and displaying the results” was abstract because
9
the claims focused merely on the abstract idea of collecting, analyzing, and displaying
10
United States District Court
Northern District of California
11
information).
However, the ‘116 Patent contains greater technological specificity than cases relied on by
12
Fortinet. Bozeman was directed to the abstract idea of collecting information to check for
13
transaction fraud or errors. 955 F.3d at 980. Credit Acceptance was directed to the abstract idea
14
of processing an application for financing a purchase. 859 F.3d at 1054. Unlike these cases, the
15
‘116 Patent is directed to an improvement in computer network security. Opp’n at 11.
16
A better analogy can be found in SRI Int’l, in which the Federal Circuit found that a
17
method of hierarchical event monitoring and analysis within a network that “deploy[ed] a plurality
18
of network monitors, detect[ed] suspicious network activity based on analysis of network traffic
19
data selected from one or more of [the listed categories], generat[ed] . . . reports . . . and
20
automatically receiv[ed] and integrat[ed] the reports of suspicious activity, by one or more
21
hierarchical monitors” to be sufficiently specific. SRI Int’l, 930 F.3d at 1303 (“The claims are
22
directed to using a specific technique—using a plurality of network monitors that each analyze
23
specific types of data on the network and integrating reports from the monitors.”). The Federal
24
Circuit noted that “the claims are not directed to just analyzing data from multiple sources . . .
25
[but] to an improvement in computer network technology” because the claims “recited using
26
network monitors to detect suspicious network activity based on analysis of network traffic data,
27
generating reports of that suspicious activity, and integrating those reports using hierarchical
28
monitors.” Id.
15
Taking the language of the claims and the specification together, the ‘116 Patent provides greater
2
technological specificity than Credit Acceptance, Bozeman, and Electric Power Group and more
3
closely mirrors SRI Int’l. Claim 1 clarifies that the second set of data used is from “an external
4
system” and “comprises traffic data” associated with the device. ‘116 Patent at Claim 1. The
5
specification further provides that the analysis of this traffic data can be through “active” or
6
“passive” traffic analysis, which may be a configurable option by the user on a per device basis or
7
network segment basis. Id. at 6:33–47. Passive traffic analysis includes observing
8
“communications to and from the device to be classified with other devices.” Id. at 6:37–39.
9
Active traffic analysis may analyze behavior “in response to communication that is sent to the
10
device to be classified from the device performing classification” by methods such as actively
11
United States District Court
Northern District of California
1
probing ports. Id. at 6:35, 40–44. This suggests that characterizing the ‘116 Patent as merely
12
combining two sets of data may be an oversimplification, as the specification indicates that the
13
usage of traffic data enables the device to not only receive data but actively seek it out by sending
14
communications to the device and observing its response. See id. The specification further
15
suggests that it is possible to use passive traffic analysis to determine classification and use active
16
traffic analysis to “confirm or fine tune the classification.” Id. at 6:49–52. Therefore, the two
17
types of analysis enabled by traffic data may also allow an additional confirmation step. See id.
18
This level of computer network-specific detail provided in the specification suggests that the
19
patent may be “understood as being necessarily rooted in computer technology in order to solve a
20
specific problem in the realm of computer networks.” See SRI Int’l, 930 F.3d at 1303. Therefore,
21
the Court declines to find the ‘116 Patent abstract at Alice step one on a Rule 12(b)(6) motion.
22
23
b.
Step Two
The Court does not need to consider Alice step two, as it does not find the ‘116 Patent
24
directed to an abstract ineligible subject matter at step one. Nevertheless, the Court also declines
25
to find that the ‘116 Patent fail Alice step two at this stage. Step two of Alice requires an
26
“inventive concept” that must involve more than “well-understood, routine, conventional activity
27
previously known to the industry.” Id. at 225. Any abstract idea must be “transform[ed]” into a
28
patent-eligible “application” of the abstract idea to pass this test. Alice, 573 U.S. at 217–18.
16
1
Fortinet argues that the ‘116 Patent fails to recite an inventive concept because claim 1
2
recites simple components “recited at a high level of generality[,]” and the steps of “accessing”
3
and “analyzing” data and “determining” classification simply recites the abstract idea itself.
4
Fortinet claims that the configuration provided does not add sufficient substance to the underlying
5
abstract idea and merely serves as “a conduit for the abstract idea.” Id. Therefore, nothing
6
transforms the idea into an invention and merely uses “well-understood, routine, conventional
7
components to apply [an] abstract idea.” Mot. at 16 (citing Yu v. Apple, Inc., 1 F.4th 1040, 1045
8
(Fed. Cir. 2021). Fortinet analogizes the ‘116 Patent to the patent in Universal Secure Registry, in
9
which the court found that the claims failed to recite a new authentication technique since the
techniques being combined were known, and their combination failed to “achieve[] more than the
11
United States District Court
Northern District of California
10
expected sum of the security provided by each technique.” Reply at 7 (citing Universal Secure
12
Registry LLC v. Apple Inc., No. 2020-2044, 2021 WL 3778395, at *10 (Fed. Cir. Aug. 26, 2021).
13
Forescout contends that the claims considered as a whole transform the abstract idea into a
14
“particular, practical application of that abstract idea[.]” Opp’n at 12 (citing Bascom, 827 F.3d at
15
1349–50). Forescout argues that having a second data set composed of traffic data solves the
16
unique problem of inaccurate and unreliable classifications in conventional network monitoring in
17
a specific and technological way beyond the general and expected improvement of accuracy
18
achieved through using additional datasets. Id.
19
Here, the Court finds similarity to Amdocs, a case with a similar patent claim that
20
combined two different datasets. Amdocs, 841 F.3d at 1300. In Amdocs, the Federal Circuit found
21
that claims correlating two network accounting records to enhance the first record had an inventive
22
concept, providing unconventional solutions to technological problems and advantages over the
23
prior art. Id. The Federal Circuit examined previous decisions that discussed claims related to the
24
collection and classification of data and explained that “claims involving the mere collection and
25
manipulation of information”—like Content Extraction and In re TLI Commc’ns— “do not satisfy
26
§ 101—under either step one or step two.” Id. at 1300; Content Extraction, 776 F.3d at 1347
27
(finding that collecting data, recognizing certain data within the collected data set, and storing the
28
recognized data was abstract); In re TLI Commc’ns, 823 F.3d at 613 (finding that the claims were
17
1
directed to the abstract idea of “classifying and storing digital images in an organized manner.”).
2
On the other hand, eligibility can be found “when somewhat facially-similar claims are directed to
3
an improvement in computer functionality under step one, see Enfish, 822 F.3d at 1335, or recite a
4
sufficiently inventive concept under step two—particularly when the claims solve a technology-
5
based problem, even with conventional, general components, combined in an unconventional
6
manner.” Id. (citing Bascom, 827 F.3d at 1349–52; DDR Holdings, LLC v. Hotels.com, L.P., 773
7
F.3d 1245, 1256–59 (Fed. Cir. 2014) (finding that the “ordered combination” of the elements
8
recited an invention that was not merely routine or conventional).
9
The Federal Circuit then concluded that the claims were “much closer to those in Bascom
and DDR Holdings than those in . . . Content Extraction and In re TLI Commc’ns.” Id. at 1300–02
11
United States District Court
Northern District of California
10
(noting that in Bascom, the individual limitations were generic, but the ordered combination of
12
them recited an inventive concept that improved the performance of the computer system itself
13
because installing a filtering tool at a specific location permitted both the benefits of a filter on a
14
local computer and an internet server). The solution only required “generic components,”
15
including network devices and “gatherers” which “gather” information. Id. However, like
16
Bascom, the benefits of the patent were possible because of the distributed, remote enhancement
17
that produced an unconventional result of reduced data flows and the possibility of a smaller
18
database. “Enhance,” which was construed as meaning “to apply a number of field enhancements
19
in a distributed fashion[,]” was a “critical advancement over the prior art” by enabling “load
20
distribution.” Id. at 1300–02. This “enhancing limitation” which depended on the invention’s
21
“distributed architecture” and the “network devices and gatherers . . . working together in a
22
distributed manner” “necessarily required that these generic components operate in an
23
unconventional manner to achieve an improvement in computer functionality.” Id. at 1301–02.
24
Similarly, Forescout plausibly asserts that the combination of the elements recites an
25
invention beyond what was merely routine or conventional that “improved the performance of the
26
computer system itself,” through its use of “traffic data” and “external system.” The ‘116 Patent
27
describes the conventional classification methodologies that relied on media access control (MAC)
28
addresses and hypertext transfer protocol (HTTP) user-agent strings as “particularly limited and
18
1
narrow in their classification abilities and in many cases unable to classify devices.” ‘116 Patent
2
at 1:18–23. This is because “certain characteristics of a particular device (e.g., whether such a
3
device is an access point) can be more difficult to determine with a high degree of accuracy.” Id.
4
at 2:8–17. According to Forescout, this technological problem is solved by the combination of
5
two datasets, wherein the second set of data is retrieved from an external system and comprised of
6
traffic data. Id. As discussed in the Alice step one analysis, the specification of the ‘116 Patent
7
suggests that the usage of traffic information may not merely act as additional collected data but
8
be specifically used to “confirm or fine tune the classification” through its two types of analysis.
9
‘116 Patent at 6:49–52. Further, the usage of an “external system” and “traffic data” may provide
not only an additional confirmation process but also a more comprehensible view of the device.
11
United States District Court
Northern District of California
10
See ‘116 Patent at 10:16–21, 6:49–52. An example data flow of device information provided in
12
the specification indicates that “the traffic and log analysis component may provide
13
comprehensive layer 2-layer 7 device information as well as device authentication information
14
(e.g., device login information) and segmentation information (e.g., network segment[s] such as a
15
data center or accounting network address range).” Id. at 10: 17–21.
16
Taking the specification into account, the ‘116 Patent seems closer to the claims in Amdocs
17
than the claims in Universal Secure Registry. Unlike Universal Secure Registry, in which nothing
18
in the specification or motion indicated that the claim achieves more than the “expected sum” of
19
the two datasets, the claims here suggest results beyond the expected sum. While Fortinet argues
20
that the features of the claim are merely “conventional” and do not amount to a meaningful and
21
unexpected result, the Court cannot make this assumption. Inferences must be resolved in
22
Forescout’s favor at the motion to dismiss stage, and there is a plausible argument that the above
23
features constitute an inventive concept. Berkeimer, 881 F.3d at 1368. Like Amdocs, the use of a
24
second data from an “external system” comprising of “traffic data” which includes more than, e.g.,
25
mere summarizing of data, may “operate in an unconventional manner to achieve an improvement
26
in computer functionality.” Id. at 1300–01. Absent further developments in this case such as
27
claim construction or expert testimony, the Court cannot conclude at this juncture whether there is
28
an “inventive concept” that goes beyond that which is “well-understood, routine and conventional
19
1
to a skilled artisan in the relevant field.” Berkheimer, 881 F.3d at 1368.
The ‘278 Patent
2
3.
3
The ‘278 Patent relates to a method of compliance monitoring in which the claim
4
“detect[s]” a device, “determine[s] a classification of the device[,]” “accesse[s] a compliance
5
rule[,]” “perform[s]” a compliance scan, then performs an “action” based on its compliance level.
6
'278 Patent at Claim 1. Claim 1 recites:
7
1. A method comprising
8
detecting, by a compliance monitoring device, a device coupled to a
network in response to the device being coupled to the network;
9
determining a classification of the device based on traffic
information associated with the device;
10
accessing a compliance rule based on the classification of the
device, wherein the compliance rule is a standard based compliance
rule;
United States District Court
Northern District of California
11
12
performing, by a processing device of the compliance monitoring
device, a compliance scan on the device based on the compliance
rule;
13
14
determining a compliance level of the device based on a result of the
compliance scan of the device; and performing an action based on
the compliance level.
15
16
17
18
Id.
a.
Step One
19
Fortinet argues that the ‘278 Patent is directed to the abstract idea of assessing compliance
20
based on device classification. Mot. at 20 (citing In re TLI Commc’ns, 823 F.3d at 611). It argues
21
that the idea of treating devices differently for compliance purposes is a common method of
22
organizing human activity and often a necessary step in assessing compliance with any set of
23
regulations. Id. It also argues that the compliance scanning uses existing technology and merely
24
“reduce[s] the burden on a system administrator by automating a task they would already perform
25
manually in effectively the same way.” Reply at 11.
26
Forescout counters that the ‘278 Patent allows for “automated and continuous compliance
27
checks,” which solves a problem specific to computer networks using a specific technological
28
solution: allowing automated use of different compliance rules for different types of devices rather
20
1
than manually doing so. Id. at 15, 18. Forescout compares the ‘278 Patent to the patent in Finjan,
2
asserting that it has similar improvements that “enables more flexible and nuanced” compliance
3
monitoring and that the classification allows customization of the compliance scans. Opp’n at 16
4
(citing Finjan, Inc. v. Blue Coat Sys., 879 F.3d 1299, 1299 (Fed. Cir. 2018).
5
First, the ‘278 Patent seems to identify a technological problem arising in computer
6
networks: preventing “access to network resources by unauthorized devices” and “effectively
7
manag[ing] access” for authorized devices. This problem is unique to computer networks in the
8
face of the “proliferation of network-connected devices” such as smartphones, tablets and
9
wearable devices. ‘278 Patent at 1:50–55.
10
However, Forescout’s argument that this technological problem is solved using a
United States District Court
Northern District of California
11
technological solution is not persuasive. It describes the solution only as follows: “e.g., the
12
standard based compliance rule, automatic classification, and automatic compliance scanning”
13
which “improves the functioning of the computer network . . . by preventing unauthorized access
14
by non-compliant devices.” Opp’n at 16. As such, Forescout fails to “specifically identif[y] how
15
th[e] functional improvement is effectuated in an assuredly unexpected way.” Ancora Techs., 908
16
F.3d at 1348. The ‘278 Patent essentially boils down to assessing compliance based on a device
17
classification, treating devices differently for compliance purposes, and automating the
18
implementation by a computer. See Mot. at 19.
19
As Fortinet contends, classification of data is a well-established “basic concept” under
20
Alice step one, and merely combining the idea of classifying and applying a compliance action
21
based on the classification does not make the patent non-abstract. RecogniCorp, LLC v. Nintendo
22
Co., 855 F.3d 1322, 1327 (Fed. Cir. 2017) (“Adding one abstract idea . . . to another abstract idea
23
. . . does not render the claim non-abstract.”). The limitations of the claims are also generic. First,
24
the method detects a device using any “compliance monitoring device,” but this device can be a
25
“computing system, [or] a network device . . . etc.” that monitors for compliance—i.e., generic
26
computer and network components which amounts to merely “a generic environment in which to
27
carry out the abstract idea.” ‘278 Patent at 4:14–19; In re TLI Commc’ns, 823 F.3d at 611. The
28
classification of the device is based on “traffic information,” but the significance of this traffic
21
1
information is not specified in the patent nor argued by Forescout. The “standard based
2
compliance rule” is no less generic, as the specification describes this limitation as “using
3
available standard based compliance content[,]” meaning that any available compliance rule falls
4
under Claim 1. ‘278 Patent at 3:21. Once a compliance scan is performed based on the rule, then
5
an “action” is performed. Again, this action can be anything. Forescout attempts to argue that this
6
“action” limitation is narrowed in its dependent claims, which “provide exemplary actions,
7
including ‘changing network access,’ ‘automatically initiating an update service,’ and ‘initiating a
8
patch service.’” Opp’n at 16. However, these dependent claims do not contain meaningful
9
limitations as they provide no more than generic compliance actions. Therefore, the claim
describes a combination of abstract ideas using generic parts and processes, which generally boils
11
United States District Court
Northern District of California
10
down to performing a classification and treating the classified items differently depending on their
12
classes—an abstract idea.
13
Similarly, the need to perform tasks automatically by itself is not a unique technical
14
problem. In re TLI Commc’ns, 823 F.3d at 613; OIP Techs., Inc. v. Amazon.com, Inc., 788 F.3d
15
1359, 1363 (Fed. Cir. 2015); Cellspin Soft, Inc. v. Fitbit, Inc., 927 F.3d 1306, 1316 (Fed. Cir.
16
2019). Making a “process more efficient” in itself does not “render an abstract idea less abstract.”
17
Secured Mail Sols. LLC v. Universal Wilde, Inc., 873 F.3d 905, 910 (Fed. Cir. 2017). Therefore,
18
mere automation of manual processes using generic computers as a tool does not constitute a
19
patentable improvement in computer technology. Credit Acceptance, 859 F.3d at 1055.
20
Finally, Forescout’s analogy to Finjan that the ‘278 Patent similarly “enables more flexible
21
and nuanced network compliance management” is inapposite because Forescout ignores the larger
22
ground on which the Federal Circuit found the claim non-abstract. Opp’n at 16; Finjan, 879 F.3d
23
at 1304. In Finjan, the Federal Circuit found a patent that described a new “behavior-based”
24
approach to virus scanning in contrast to the traditional “code-matching” system to be
25
eligible. 879 F.3d at 1304. However, Forescout does not claim a new approach to compliance
26
management. Forescout fails to demonstrate a new approach here comparable to that in Finjan.
27
See Opp’n at 18.
28
For the foregoing reasons, the Court finds the ‘278 Patent directed to the abstract idea of
22
1
automatically classifying devices and then assessing compliance and performing actions based on
2
compliance rules.
3
b.
4
Step Two
Accepting that the asserted claims are directed to an abstract idea, the Court turns to step
5
two to assess whether “the elements of each claim both individually and ‘as an ordered
6
combination’ . . . 'transform the nature of the claim' into a patent-eligible application.” Alice, 573
7
U.S. at 218.
8
9
Fortinet argues that the ‘278 Patent fails to recite an inventive concept and merely recites
the abstract idea of assessing compliance based on device classification. Mot. at 20. Fortinet
argues that the compliance monitoring device merely detects and scans devices, creating “a
11
United States District Court
Northern District of California
10
generic environment”—i.e., a computer network—” in which to carry out the abstract idea.” Id.
12
(citing Ericsson, 955 F.3d at 1326–27). Fortinet further notes that only general and conventional
13
hardware components are mentioned in the ‘278 Patent. Reply at 12 (citing ‘278 Patent at 2:10–
14
15). Forescout alleges that “the claims, when considered as a whole, perform a specific sequence
15
of device classification and standard based compliance scanning that was not well-understood,
16
routine, or conventional at the time of the invention.” Opp’n at 18–20.
17
From the specification it is clear, and Forescout does not argue otherwise, that the claims’
18
individual limitations recite only generic computer and network components. However, an
19
inventive concept can be found in the “non-conventional and non-generic arrangement of known,
20
conventional pieces.” Bascom, 827 F.3d at 1350; see also DDR Holdings, 773 F.3d at 1256–59;
21
Amdocs, 841 F.3d at 1300–01.
22
According to Forescout and the ‘278 Patent, the prior art used a “golden image”—“a
23
computing system image that has been customized to a particular configuration that may be copied
24
onto multiple computing systems or devices.” ‘278 Patent at 2:2–5; Opp’n at 14–15. Forescout
25
argues that the manual and pre-specified “golden image” approach is improved by the use of
26
“adaptable, device-specific compliance standards” achieved through “combin[ing] standards based
27
compliance with policy based network access control [(“NAC”)].” Opp’n at 17, 20 (citing ‘278
28
Patent at 2:25–28).
23
1
The ‘278 Patent states that its novel combination “allows the direct linking of compliance
2
within a NAC product to the results of a compliance scan based on the content.” ‘278 Patent at
3
3:26–28. Notably, the specification points out that the combination is advantageous because “the
4
use of standards based compliance content . . . is not dependent on or related to the particular
5
[NAC] solution being used.” Id. at 3:33–37. The specification further explains that “the modular
6
nature of [the] system may allow the components to be independent and allow flexibility to enable
7
or disable individual components or to extent/upgrade components without affecting other
8
components thereby providing scalability and extensibility.” Id. at 8:30–35. Further, the use of
9
standards based compliance content is defined technically rather than a “prose-based configuration
checklist being input to a NAC based policy engine[,]” thereby “avoid[ing] misinterpretations or
11
United States District Court
Northern District of California
10
misconfigurations.” Id. at 3:37–39.
12
Forescout also contends that “automated and multi-device compliance scanning” is a
13
specific improvement over conventional systems. Opp’n at 19. The specification provides that
14
“[a]utomated device compliance can be difficult to determine and review with existing
15
methodologies.” Id. at 2:6–10. According to Forescout, conventional systems had a problem—
16
there being too many devices connected to a network at once—that a conventional classification
17
system could not effectively manage. Opp’n at 19–20. Therefore, it claims that solving the
18
computer-specific problem of enforcing compliance by the numerous and different types of
19
devices on a network by automatically classifying them and applying a compliance rule is
20
inventive and not merely conventional. Id. Device classification also allows for customizing the
21
compliance scans such as performing a particular scan based on the device’s operating system.
22
Opp’n at 16–17 (citing ’278 patent at 3:43–51 (“[T]he compliance scans can be performed on
23
selected devices communicatively coupled to a network that have been classified as having a
24
particular operating system, e.g., Microsoft Windows.”)). The invention therefore “remove[s] the
25
need for network administrators to have to manually specific [sic] IP addresses or IP address
26
ranges for compliance scanning[,]” distinguishing the prior art approach of merely copying a
27
“golden image,” which is a previously specified “particular configuration.” ‘278 Patent at 2:2–5;
28
3:43–51.
24
In addition, the ‘278 Patent suggests benefits beyond mere automation. As described
1
2
previously, the invention allows for “adaptable and device-specific” compliance checks and its
3
modular structure enables flexible control that provides “scalability and extensibility” and
4
“avoid[s] misinterpretations or misconfigurations.” Opp’n at 17; ‘278 Patent at 3:37–39; 8:30–
5
35. It also “enables more flexible and nuanced” network compliance management through
6
allowing customization rather than being limited to particular configurations like the conventional
7
system. Opp’n at 16; ‘278 Patent at 5:29–34 (“For example, a user could open a compliance rules
8
file and remove one or more rules or modify one or more weights associated with the rules.”).
9
Finally, the “automated and continuous compliance checks” “enable the ongoing monitoring of
network devices and activity” and “can be also performed real-time[.]” Id. at 1:57–58; 3:5–7, 16–
11
United States District Court
Northern District of California
10
17.
Therefore, Forescout’s claims at the very least plausibly recite an inventive concept under
12
13
Alice step two, raising fact issues as to whether “conventional systems had difficulty effectively
14
managing access to network resources and required manual compliance” that the ‘278 Patent
15
“solved . . . by combining standards based compliance with policy based network access
16
control[,]” enabling automation, multi-device compliance scanning, and customization. Opp’n at
17
20. Considering that “whether a claim element or combination of elements is well-understood,
18
routine and conventional to a skilled artisan in the relevant field is a question of fact,” and the
19
court must weigh all factual inferences drawn from the specification in favor of Forescout, it is
20
premature to decide eligibility at this stage of the litigation. Berkheimer, 881 F.3d at 1368.
21
Further, Fortinet fails to establish that, as a matter of law, the ordered combination of the
22
limitations in the claims is conventional and not innovative. Thus, the ‘278 Patent creates fact
23
issues that preclude judgment for dismissal under Rule 12(b)(6), and the Court denies the motion
24
to dismiss as to the ‘278 Patent.
The ‘764 Patent
25
4.
26
The ‘764 Patent relates to a post-connection client certificate authentication. Claim 1
27
28
recites:
1. A system comprising:
25
1
A memory; and
2
A processing device operatively coupled to the memory, the
processing device to:
3
4
5
Detect a connection of an endpoint device at a network switch
coupled to a network;
6
Restrict access of the endpoint device to prevent the endpoint device
from accessing resources of the network by applying a VLAN
assignment to the network switch;
7
Establish a connection with the endpoint device;
8
Validate a client certificate corresponding to the endpoint device to
authenticate the endpoint device as a corporate device, wherein to
validate the client certificate, the processing device to:
9
10
Receive the client certificate from the endpoint name, the
client certificate from the endpoint device, the client
certificate comprising a subject name, a client public key and
a digital signature of the client public key by a certificate
authority;
United States District Court
Northern District of California
11
12
13
Retrieve a certificate authority certificate from the certificate
authority, the certificate authority certificate comprising a
certificate public key;
14
15
Verify the digital signature of the client public key using the
certificate authority public key; and
16
Verify the subject name using the client public key; and
17
18
19
20
Grant the endpoint device access to the resources of the network
‘764 Patent, at Claim 1.
a.
Step One
21
Fortinet argues that the ‘764 Patent is “directed to the abstract idea of validating
22
authorization after connection” and that it uses generic computer components that perform their
23
usual functions. Mot. at 24. Forescout again rebuts that the ‘764 Patent is not directed to an
24
abstract idea but recites a “technological solution to a technological problem.” According to
25
Forescout, prior NAC devices had to choose between prior art solutions that offered either tight
26
security or timeliness in granting access, but not both. Opp’n at 21. Further, it argues that prior
27
art had a “major drawback” because of its “fail-closed” system. Id. For example, if the device
28
fails in any way—i.e., a power outage—then all new connections were automatically denied,
26
1
which dampened user experience. Id. at 22. Forescout contends that the ‘764 Patent solves this
2
problem in dependent Claim 5, which describes a “fail-open” system that grants access upon a
3
NAC’s failure during authentication. Therefore, the ‘764 Patent claims a functional improvement
4
by allowing connection to the network with limited access, after which the device is validated,
5
allowing for smoother user experience while blocking access to sensitive resources until
6
verification. Id. at 22–25.
7
First, the balancing problem between user experience and network security is “a problem
8
specifically arising in the realm of computer networks.” DDR Holdings, 773 F.3d at 1257. The
9
balance of speed and security required in network access is the type of issue that is unique to
computer networks, especially considering the fact that improving either one necessarily
11
United States District Court
Northern District of California
10
compromises the other. There is thus a technological problem addressed by the ‘764.
12
The parties disagree as to whether Claim 1 is directed to a “specific technique.” Opp’n at
13
23. Fortinet compares the ‘764 Patent to Ericsson and Dropbox. Mot. at 24–25; Ericsson, 955
14
F.3d at 1326–27 (finding that all four components of the claim “collapsed” into the abstract idea of
15
controlling access to resources); Dropbox, 815 F. App’x at 529 (affirming the district court’s
16
finding that the patents were directed to functional results, not technological solutions). Although
17
the ‘764 does not detail its technical aspects at length, it offers more technology-based
18
improvements than Dropbox and Ericsson. In Ericsson, the patent’s purported inventive concept
19
did not appear in the language of the claims. Ericsson, 955 F.3d at 1328–9. In Dropbox, the
20
claims “recited conventional elements in a purely functional manner, without implementation
21
detail even in the specification.” Dropbox, 815 F. App'x at 533.
22
In contrast, Claim 1 places emphasis on the new ordering of authentication using the
23
specific technique of “post-connect certificate authentication,” which enables “limited access” to a
24
network instead of granting either complete access or no access at all. See ‘764 Patent at Claim 1;
25
Opp’n at 24–25. The specification clarifies this technique as utilizing a “Public-Private Key
26
Infrastructure with X.509 client certificates installed on connecting corporate endpoints” as “an
27
alternative to the pre-connect 802.1x protocol, using a post-connect paradigm.” ‘764 Patent at
28
2:22–26.
27
1
Claim 1 further provides that a processing device detects a connection of an endpoint
2
device at a “network switch,” “restricts access” by applying a “VLAN assignment” to the network
3
switch, establishes a connection with the device, and authenticates the device by validating and
4
verifying a client certificate provided by the device using a client “public key.” Id. at Claim 1. If
5
the client certificate is validated, the NAC device grants network access except for the most
6
sensitive parts of the network. Id. at 2:44–49. Further evaluation is then possible to remove such
7
restrictions or revoke the certificate. Id. at 2:49–56. According to the specification, this limited
8
access is possible because a network switch may be “configured such that when it detects a new
9
connection to the communication network, it immediately applies an access control list (ACL) or
wireless role to prevent the connecting device accessing the connecting device accessing any
11
United States District Court
Northern District of California
10
network resources except for the NAC device and potentially other resources[.]” Id. at 2:26–34.
12
An ACL manager can create, manage, and apply the ACL to switch to control what network
13
resources a particular device has access to. Id. at 4:50–64. This level of detail contained in Claim
14
1 and the specification suggests that the ‘764 Patent does not simply describe a post-verification
15
scenario but a solution that is technology-based.
16
Additionally, Claim 1 affords a completely new “fail-open” system described in Claim 5,
17
which solves the problem of the “fail-close” system. Opp’n at 26. Claim 5 describes a system
18
wherein the device is processed to “not restrict access of the endpoint device to the resources of
19
the network when a NAC in the network suffers a failure during authentication of the endpoint
20
device.” ‘764 Patent at Claim 5. In a “fail-open” configuration, all ports on the switch are
21
initially configured in an “open” mode instead of a “restrict” mode and only restricted when a new
22
device is connected. ‘764 Patent at 5:10–17. Therefore, upon failure, during which the device is
23
unable to restrict the ports, “all new and pending connections are granted access to the network as
24
a matter of policy.” See id. at 2:65–68; 5:14–17. This “fail-open” system is an improvement that
25
“solv[es] yet another problem in the prior art related to failures (e.g., power failures) during
26
authentication,” and is possible through this novel post-connect paradigm of Claim 1. Opp’n at
27
23–25 (citing ‘764 Patent at 2:22–49, 57–3:3) (“Allowing a device to connect first and then
28
performing certificate authentication before providing access to sensitive resources . . . allows for
28
1
2
a “fail-open” system[.]”).
For the aforementioned reasons, the ‘764 Patent is “directed to improvements to the
3
functionality of a computer or network platform itself,” rather than simply “a process or system
4
that qualifies an abstract idea for which computers are invoked merely as a tool.” Uniloc USA,
5
Inc. v. LG Electronics USA, Inc., 957 F. 3d 1303, 1306–07 (Fed. Cir. 2020). Further, statements
6
such that the ’764 patent claims an improvement over the prior art approach of using the “802.1x
7
protocol which ensures connecting devices are authenticated using an X.509 digital certificate, or
8
other credentials, prior to even gaining access to the network[,]” must be taken as true in
9
conducting the step-one inquiry. ‘764 Patent at 2:7–10; see CardioNet, 955 F.3d at 1369–70.
10
United States District Court
Northern District of California
11
12
Thus, the ‘764 Patent is not directed to a patent-ineligible abstract idea.
b.
Step Two
As the ‘764 Patent is not directed to a patent-ineligible abstract idea, the inventive concept
13
portion of the analysis need not be addressed. Nevertheless, even if the Court were to find the
14
‘764 Patent to be directed to an abstract idea, Forescout’s allegations support a reasonable
15
inference that the ‘764 Patent contains features that go beyond “well-understood, routine, and
16
conventional” activities as described above. Alice step two “consider[s] the elements of each
17
claim both individually and ‘as an ordered combination’ to determine whether the additional
18
elements ‘transform the nature of the claim’ into a patent-eligible application.” Alice, 573 U.S. at
19
217 (quoting Mayo, 566 U.S. at 77–78). Even if each element of Claim 1 individually is
20
conventional, “an inventive concept can be found in the non-conventional and non-generic
21
arrangement of known, conventional pieces.” Bascom, 827 F.3d at 1350. Here, Forescout places
22
the inventive concept on the new ordering of authentication, and this new ordering seems to be
23
achieved through techniques that are arguably non-conventional and non-generic, to give “limited
24
access” to a device. Opp’n at 25. This “post-connect paradigm” is purported to be an invention
25
that is achieved using “a working Public-Private Key Infrastructure with X.509 client certificates”
26
as “an alternative to the pre-connect 802.x protocol.” Id.; 2:15–17, 2:23–26, 4:63–64. In addition,
27
there are sufficient details in the specification to suggest that this novel approach achieves a
28
specific improvement beyond the conventional system, as discussed in step one. Enfish, 822 F.3d
29
1
at 1339 (“[A]n analysis of whether there are concrete improvements in the recited computer
2
technology could take place under step two.”).
In sum, Forescout claims to improve conventional systems that “are limited and narrow in
3
4
their authentication abilities[,] . . . negatively affect the user experience[,]” and compromise
5
security. Id. at 27 (citing ’764 patent at 1:17–20, 1:66–2:5). The achievement of the “post-
6
connect paradigm” using “Public-Private Key Infrastructure with X.509 client certificates” was
7
more than a “well-understood, routine, and conventional” technique. Therefore, the Court finds
8
that the ‘764 Patent recites patent-eligible subject matter at both step one and step two of Alice.
9
B.
10
Tortious Interference with Business Relations
Forescout alleges that Fortinet made false statements to Forescout’s existing and
United States District Court
Northern District of California
11
prospective customers by “republish[ing]” its patent infringement complaint allegations to the
12
media, and representing that they were facing “uncertain ground financially” to its customers.
13
Mot. at 29. Fortinet claims that the tortious interference claim should be dismissed for three
14
reasons: (1) the alleged conduct is not subject to this Court’s subject matter jurisdiction, (2) the
15
alleged statements are protected by federal law, which preempts the state law claim, and (3) the
16
alleged conduct does not satisfy California law to state a claim for tortious interference. Id.
17
1.
Subject Matter Jurisdiction
18
Under 28 U.S.C. § 1367(a), a federal district court which possesses original jurisdiction
19
may hear other state law claims “that are so related to claims in the action within such original
20
jurisdiction that they form part of the same case or controversy under Article III of the United
21
States Constitution.” In order for a claim to “form part of the same case or controversy,” the
22
claims must “derive from a common nucleus of operative fact.” United Mine Workers of Am. v.
23
Gibbs, 383 U.S. 715, 725 (1966).
24
28 U.S.C. § 1338(a) grants federal district courts original jurisdiction of any civil action
25
arising under any federal statute relating to patents. Christianson v. Colt Indus. Operating Corp.,
26
486 U.S. 800, 800 (1988). In Christianson, the U.S. Supreme Court clarified the scope of §
27
1338(a), finding that § 1338(a) confers jurisdiction over not only causes of action created by
28
federal patent law but also extends to cases in which the plaintiff's cause of action depends on the
30
1
resolution of a substantial question of federal patent law. Additive Controls & Measurement Sys.,
2
Inc. v. Flowdata, Inc., 986 F.2d 476, 477–78 (Fed. Cir. 1993) (citing Christianson, 486 U.S. at
3
808–09).
4
Fortinet argues that there is no common nucleus of operative fact with the federal claims.
Specifically, Fortinet asserts that the fact that the claim arose as a result of the patent dispute is
6
insufficient for supplemental jurisdiction and that the tortious interference claim is otherwise
7
unrelated to the patents. Mot. at 34–35. Fortinet also points out that the statement regarding
8
financial insolvency does not relate to the alleged patent infringement. Id. Forescout contends
9
that the tortious interference claim depends on the proof of the falsity of the infringement claim—
10
a substantial question of federal patent law—and therefore must be brought in federal court. See
11
United States District Court
Northern District of California
5
Opp’n at 35.
12
Courts have previously found federal jurisdiction for tortious interference claims based on
13
related issues of patent infringement, finding that the claims “form part of the same case or
14
controversy.” See, e.g., Mikohn Gaming Corp. v. Acres Gaming, Inc., 165 F.3d 891, 894 (Fed.
15
Cir. 1998) (finding that the district court had jurisdiction for the interference claim under § 1338
16
and § 1367). Additive Controls, while not a tortious interference case, also concerned a patent
17
dispute in which the defendant asserted a counterclaim of business disparagement when the
18
plaintiff sent letters to the defendant’s current and potential customers that warned them about its
19
alleged patent infringement. Additive Controls, 986 F.2d at 477. The Federal Circuit found it
20
proper that the business disparagement claim was removed to federal court, as it depended upon a
21
substantial question of patent law. Id. at 478–79 (“[The] allegedly disparaging statement was its
22
accusation that [the plaintiff] infringed the . . . patent. To prove this aspect of its case (falsity),
23
[the plaintiff] must show that its product does not infringe the . . . patent.”).
24
District courts have found that “claims aris[ing] out of the same dispute over the . . .
25
patent” are sufficient for supplemental jurisdiction over tortious interference claims because
26
“[t]he question of the patents’ validity []provides the ‘common nucleus of operative fact’ essential
27
to the determination of both [the plaintiff’s patent] claims in this suit and [the defendant’s]
28
counterclaim [of tortious interference].” Tools Aviation, LLC v. Digital Pavilion Elecs. LLC, No.
31
1
20-CV-02651-PKCVMS, 2021 WL 4340949, at *4 (E.D.N.Y. Sept. 23, 2021) (finding jurisdiction
2
because the claim “involve[d] the question of whether [the p]laintiff has validly asserted
3
infringement of its patents or, as [the d]efendants contend, used the prospect of an infringement
4
suit to threaten [the d]efendants’ business partners.”); see also Clear Lam Packaging, Inc. v. Rock-
5
Tenn Co., No. 02 C 7491, 2003 WL 22012203, at *2–3 (N.D. Ill. Aug. 22, 2003) (declining to
6
dismiss a tortious interference claim for lack of subject matter jurisdiction because, among other
7
reasons, “all the claims arise out of the same dispute over the . . . patent and therefore derive ‘from
8
a common nucleus of operative fact.’”).
9
Like Additive Controls and Tools Aviation, the tortious interference claim in this case
involves a statement that implicates Fortinet’s right to assert infringement, which raises questions
11
United States District Court
Northern District of California
10
of patent validity and infringement. The communications are not tortious if it asserts a valid
12
patent right. Whether Fortinet has valid patent rights related to the patents at issue and their
13
potential infringement are questions of patent law.
14
As Fortinet’s right to relief involves the resolution of a substantial question of patent law,
15
Forescout’s patent and tortious interference claims arise in the same “nucleus of operative fact.”
16
Although Forescout attempts to argue that some of Fortinet’s statements were beyond assertions of
17
patent rights, whether such statements were “far in excess of accurate notification of [the
18
plaintiff’s] patent rights” in bad faith goes to the merits of the claim, not subject matter
19
jurisdiction. See Clear Lam Packaging, Inc., 2003 WL 22012203, at *2–3 (finding subject matter
20
jurisdiction and thereafter discussing whether defamatory statements regarding the plaintiff’s
21
“stability and ability to meet customer needs” supported an allegation of bad faith). Thus, the
22
Court declines to dismiss the tort claim for lack of subject matter jurisdiction.
23
2.
Preemption
24
The Supremacy Clause of the U.S. Constitution states that “the Laws of the United States
25
. . . shall be the supreme Law of the Land[.]” U.S. Const. Art. VI, cl. 2. The Supremacy Clause
26
preempts state law by means of express preemption, field preemption, or conflict preemption. See
27
English v. Gen. Elec. Co., 496 U.S. 72, 78–79 (1990). Federal patent law does not provide
28
explicit preemption. Id. at 1332; 35 U.S.C. §§ 1–376 (2000). See also Dow Chemical Co. v.
32
1
Exxon Corp., 139 F.3d 1470, 1473–75 (Fed. Cir.1998). The Federal Circuit has explained that
2
conflict preemption, not field preemption, is used to preempt state law with patent law. See
3
Hunter Douglas, Inc. v. Harmonic Design, Inc., 153 F.3d 1318, 1335 (Fed. Cir. 1998) (overruled
4
on other grounds by Midwest Indus., Inc. v. Karavan Trailers, Inc., 175 F.3d 1356 (Fed. Cir.1999)
5
(“[C]onflict preemption is a more precise means of determining which state law causes of action
6
are preempted than the blunt tool of field preemption.”). Conflict preemption occurs in two ways:
7
“when it is impossible for a private party to comply with both state and federal requirements . . . or
8
when state law ‘stands as an obstacle to the accomplishment and execution of the full purposes
9
and objectives of Congress[.]’” Hunter Douglas, 153 F.3d at 1332 (quoting Hines v. Davidowitz,
312 U.S. 52, 67 (1941)). The Federal Circuit has noted the “essential criteria” for determining
11
United States District Court
Northern District of California
10
whether there is such conflict preemption considers the “objectives of the federal patent laws”:
12
13
14
15
16
17
First, patent law seeks to foster and reward invention; second it
promotes disclosure of inventions to stimulate further innovation
and to permit the public to practice the invention once the patent
expires; third, the stringent requirements for patent protection seek
to assure that ideas in the public domain remain there for the free
use of the public.
153 F.3d at 1333; see also Dow Chemical, 139 F.3d at 1473–74.
The court must assess whether the alleged tortious conduct to determine whether “a state
18
law tort, ‘as-applied,’ conflicts with federal patent law.” Id. at 1335–37 (finding that this conduct-
19
based approach is in harmony with the Federal Circuit’s obstacle preemption in Dow Chemical).
20
Under this formulation, “if a plaintiff bases its tort action on conduct that is protected or governed
21
by federal patent law, then the plaintiff may not invoke the state law remedy, which must be
22
preempted for conflict with federal patent law. Conversely, if the conduct is not so protected or
23
governed, then the remedy is not preempted.” Id.
24
As part of federal patent law, the Federal Circuit has “uniformly upheld a patentee’s right
25
to publicize the issuance of patents and to so inform potential infringers.” Mikohn Gaming Corp,
26
165 F.3d at 897. Federal patent law contemplates this right to notice “to inform a potential
27
infringer of the existence of the patent, whereby the recipient of the information may adjust its
28
activities, perhaps seek a license, or otherwise act to protect itself.” Id.; Hunter Douglas, 153 F.3d
33
1
at 1336. “Indeed, [the statute] . . . makes marking or specific notice of the patent to the accused
2
infringer a prerequisite to the recovery of damages.” Id. “Patents would be of little value if
3
infringers of them could not be notified of the consequences of infringement, or proceeded against
4
in the courts. Such action . . . cannot be said to be illegal.” 800 Adept, Inc. v. Murex Sec., Ltd.,
5
539 F.3d 1354, 1369 (Fed. Cir. 2008) (citing Virtue v. Creamery Package Mfg. Co., 227 U.S. 8,
6
37–38 (1913)). Therefore, preventing notice of patent rights, including the publication of the
7
patents and assertions of infringement, would be contrary to the purposes and objectives of patent
8
law to reward invention through allowing the patentholders to assert such rights. Further, the
9
Federal Circuit explained:
10
United States District Court
Northern District of California
11
12
13
The propriety of that notice depends on patent law and the patent
issues to which the notice pertains. National uniformity, in
confluence with the national scope of the patent grant and the
general federal exclusivity in patent causes, require that
determination of the propriety of [the plaintiff’s] actions in giving
notice of its patent rights is governed by federal statute and
precedent and is not a matter of state tort law.
14
Mikohn Gaming Corp., 165 F.3d at 896. Therefore, “federal patent law bars the imposition of
15
liability for publicizing a patent in the marketplace unless the plaintiff can show that the
16
patentholder acted in bad faith.” Id.
17
As federal patent law preempts state-law tort liability for good faith conduct in
18
communications asserting patent infringement and potential litigation, state-law tort claims
19
survive only if it is based on “a showing of ‘bad faith’ action in asserting infringement[.]”
20
Globetrotter Software, Inc. v. Elan Computer Grp., Inc., 362 F.3d 1367, 1374 (Fed. Cir. 2004);
21
Zenith Elecs. Corp. v. Exzec, Inc., 182 F.3d 1340, 1355 (Fed. Cir. 1999). Patent law “recognizes a
22
presumption that the assertion of a duly granted patent is made in good faith”; therefore, the party
23
arguing against the preemption has the burden of proving bad faith. Id. at 1374–77 (“[T]o avoid
24
preemption, bad faith must be alleged and ultimately proven, even if bad faith is not otherwise an
25
element of the tort claim.”) (internal quotation marks omitted); 800 Adept, Inc, 539 F.3d at 1370
26
(“[A] party attempting to prove bad faith on the part of a patentee enforcing its patent rights has a
27
heavy burden to carry.”).
28
In sum, to determine whether the tortious interference claim is preempted, a two-part
34
1
examination is relevant. First, the court determines whether Fortinet’s alleged conduct falls within
2
the scope of protection of patent rights—i.e., whether the communications served to notify
3
potential infringers of the patents or went beyond such notification. If the conduct was beyond the
4
scope of a patent right, such conduct is not protected and therefore cannot be a basis for
5
preemption. If the conduct was within the scope of patent rights, the Court must then proceed to
6
the next step to determine whether preemption applies. The second step considers whether the
7
conduct was made in bad faith. In this case, Forescout has the burden of alleging and proving bad
8
faith.
a.
9
10
Scope of Patent Rights
Fortinet contends that its actions were proper because statements informing others in the
United States District Court
Northern District of California
11
industry of a party’s infringement claims are protected and therefore preempted by patent law.
12
Further, Fortinet asserts that it has the right to notify users of Forescout’s products as the users are
13
also potential direct infringers and should be informed of the risk of an injunction. Reply at 17
14
(citing Globetrotter, 362 F.3d at 1374). Forescout argues that Fortinet’s wrongful conduct went
15
“far beyond the protected activity of simply notifying a party of potential patent infringement.”
16
Opp’n at 1.
17
As Forescout argues, Fortinet’s communications include both assertions of patent
18
infringement and other statements unrelated to a patentee’s right to publicize the “issuance of
19
patents and to so inform potential infringers.” Mikohn Gaming Corp., 165 F.3d at 897. Therefore,
20
a statement-by-statement examination of Fortinet’s communications is warranted in order to assess
21
whether Fortinet’s communications are protected by patent law and fall under preemption.
22
Fortinet’s email reads that its purpose was “to insure [Forescout’s customers that they]
23
were aware of the ongoing legal problems and future of Forescout” and proceeds to inform the
24
readers that “Fortinet has filed lawsuit against Forescout for patent infringement related to
25
technology held within FortiNAC.” Such statements relate to Fortinet’s assertion of patent
26
infringement. They “inform potential infringers” —the users of the infringing product—of their
27
patent right and the impending litigation within the rights of the patentee. See 35 U.S.C.A. §
28
271(a); Judkins v. HT Window Fashions Corp., 514 F. Supp. 2d 753, 765 (W.D. Pa. 2007), aff'd
35
1
sub nom. Judkins v. HT Window Fashion Corp., 529 F.3d 1334 (Fed. Cir. 2008) (noting that while
2
customers are rarely sued, “[they] are nonetheless infringers, and therefore, plaintiff is within his
3
rights to inform them of possible infringement of his patent.”). Therefore, these statements fall
4
squarely within Fortinet’s patent rights and a state tort claim precluding this right would conflict
5
with the purposes and objectives of federal patent law.
6
Fortinet’s statement to CRN that Forescout’s “wrongful incorporation” of its patents “is
7
material and goes to the heart of Fortinet’s business” is also an assertion of patent infringement
8
protected by patent law. Fortinet had the right to publicize its statement to the press, to inform
9
potential users of the products and the marketplace, in order to publicize its patents and warn
potential users that using the products would constitute infringement. See Hunter Douglas, 153
11
United States District Court
Northern District of California
10
F.3d at 1336; see also Mikohn Gaming Corp., 165 F.3d at 897.
12
Similarly, the statement to CRN that Fortinet “doesn’t take litigation lightly and has only
13
engaged in lawsuits to protect its intellectual property on seldom occasions when it is left no
14
alternative” informs Forescout and relevant parties of the litigation and communicates Fortinet’s
15
belief that they have a robust case. Such statements regarding the strength of the patent are
16
relevant to the purpose of notifying potential infringing users so that they can determine their
17
response to the assertion of infringement, and therefore fall under Fortinet’s patent rights. See
18
Globetrotter, 362 F.3d at 1374.
19
On the other hand, Fortinet’s statement that Forescout was left “on uncertain ground
20
financially” does not assert a patent right nor advance any of the objectives of patent law, and
21
therefore falls outside the governance of patent law. As such, tort claims based on extraneous
22
statements about Forescout’s financial situation do not obstruct the objectives of patent law, and
23
the Court finds these statements not preempted. However, the aforementioned statements
24
asserting Fortinet’s patent rights must proceed to the next step of the analysis, and Forescout must
25
show bad faith regarding these statements to survive preemption.
26
27
28
b.
Bad Faith
The bad faith standard has objective and subjective components. Golan v. Pingel Enter.,
Inc., 310 F.3d 1360, 1371 (Fed. Cir. 2002). The objective component requires a showing that the
36
1
infringement allegations are “objectively baseless.” Id. (citing Globetrotter, 362 F.3d at 1375).
2
The subjective component relates to a showing that the patentee demonstrated subjective bad faith
3
in enforcing the patent. Globetrotter, 362 F.3d at 1370. A party claiming bad faith patent
4
enforcement “must present affirmative evidence sufficient for a reasonable jury to conclude that
5
the patentee acted in bad faith, in light of the burden of clear and convincing evidence that will
6
adhere at trial.” Springs Window Fashions LP v. Novo Indus., L.P., 323 F.3d 989, 999
7
(Fed.Cir.2003); Golan v. Pingel Enter., Inc., 310 F.3d 1360, 1371 (Fed.Cir.2002).
8
9
c.
Objective Bad Faith
In order to ascertain whether Fortinet’s infringement allegations were made in “bad faith,”
the trial court is required to determine whether those allegations were objectively baseless.
11
United States District Court
Northern District of California
10
Globetrotter, 362 F.3d at 1375. Objective baselessness can be established if the patents at issue
12
are “obviously invalid or plainly not infringed.” Id.; see also Zenith, 182 F.3d at 1354
13
(“Obviously, if the patentee knows that the patent is invalid, unenforceable, or not infringed, yet
14
represents to the marketplace that a competitor is infringing the patent, a clear case of bad faith is
15
made out.”). This requires a showing that “the infringement allegations [were] such that no
16
reasonable litigant could reasonably expect success on the merits.” Dominant Semiconductors
17
Sdn. Bhd. v. OSRAM GmbH, 524 F.3d 1254, 1260 (Fed. Cir. 2008); 800 Adept, 539 F.3d at 1370
18
(citing Pro. Real Est. Invs., Inc. v. Columbia Pictures Indus., Inc., 508 U.S. 49, 50 (1993) (“[T]he
19
issue is whether the evidence was such that [defendant] could not have had a reasonable basis for
20
believing that the patent was valid when it asserted the patent against [plaintiff’s] customers.”);
21
see also Mikohn Gaming Corp., 165 F.3d at 897 (“Federal precedent is that communications to
22
possible infringers concerning patent rights is not improper if the patentholder has a good faith
23
belief in the accuracy of the communication.”).
24
Of the numerous arguments Forescout makes in support of finding objective baselessness,
25
the most notable is that Fortinet “knew, or should have known, [the asserted patents] were invalid
26
and/or not infringed by Forescout.” Opp’n at 1. Forescout asserts that patents are invalid under §
27
101 and because of prior art, including the accused product itself. Opp’n at 29 (citing Nuance
28
Commc’ns, Inc. v. MModal LLC, No. 17-1484-MN-SRF, 2018 WL 6804488, at *4 (D. Del. Dec.
37
1
27, 2018) (denying the Rule 12 motion because “[the counterclaimant] identifie[d] numerous
2
specific prior art references under §§ 102 and 103 purporting to show that [the plaintiff] ha[d] no
3
basis for alleging the Asserted Patents [were] valid and enforceable.”). Forescout also notes that
4
the question of bad faith is a factual contest and cannot be resolved on a motion to dismiss.
5
Opp’n. at 33. Fortinet argues that Forescout did not meet the high bar of showing bad faith and
6
failed to sufficiently plead that Fortinet's infringement lawsuit is objectively unreasonable. Mot. at
7
31–34. Indeed, it is true that bad faith is a high bar that must be found by clear and convincing
8
evidence. Zenith, 182 F.3d at 1352; 800 Adept, 539 F.3d at 1370 (The “party attempting to prove
9
bad faith on the part of a patentee enforcing its patent rights has a heavy burden to carry.”).
10
United States District Court
Northern District of California
11
Fortinet also notes that patents are entitled to a presumption of validity. Mot. at 32.
The Court finds that it is premature to determine the question of bad faith at this stage.
12
First, the question of patent validity is “open to reasonable debate at this point.” As Fortinet
13
argues, the Court finds that there is no obvious invalidity under § 101 in light of the uncertainty
14
discussed in sections above as to how Alice applies to the patents in question. Nor can the Court
15
determine at this stage whether Forescout’s assertions of the patent’s invalidity for anticipation
16
and obviousness under §§ 102 and 103 are so obvious that Fortinet could not have “realistically
17
expected success on the merits at the time the suit was filed.” Hoffman-La Roche Inc. v.
18
Genpharm Inc., 50 F. Supp. 2d 367, 380 (D.N.J. 1999). On the other hand, Forescout specifically
19
identifies numerous prior art that purports to anticipate or render obvious the patents at issue, as
20
well as their exemplary combinations. Docket No. 107-1 at 7–10; Docket No. 107-2 at 7–10.
21
That identification is sufficient to meet the plausibility requirement at this stage. See, e.g., Nuance
22
Commc’ns, Inc., 2018 WL 6804488, at *4 (“MModal identifies numerous specific prior art
23
references under §§ 102 and 103 purporting to show that Nuance has no basis for alleging the
24
Asserted Patents are valid and enforceable. Consequently, MModal meets the standard of
25
plausibility required at the 12(b)(6) stage.”) (citation omitted). Therefore, Forescout’s pleadings
26
“adequately allege bad faith by pointing to a specific basis” for its allegations. Id.; Indect USA
27
Corp. v. Park Assist, LLC, No. 3:18-CV-02409-BENMDD, 2019 WL 3780274, at *8 (S.D. Cal.
28
Aug. 12, 2019).
38
1
Second, the Court must also consider whether there was a basis for Fortinet to reasonably
2
believe that Forescout infringed its patents. 800 Adept, Inc., 539 F.3d at 1371. However,
3
Forescout alleges nothing about whether Fortinet undertook a reasonable investigation regarding
4
the infringement. Cf. Sandisk Corp. v. LSI Corp., No. C 09-02737 WHA, 2009 WL 3047375, at
5
*3 (N.D. Cal. Sept. 18, 2009) (dismissing the plaintiff’s claim when the plaintiff alleged that the
6
defendant “knew or should have known its allegations of infringement were false” but failed to
7
provide any specific facts to support such an assertion and because the defendant had analyzed and
8
determined that plaintiff’s products infringed). “The resolution of the question whether plaintiffs’
9
suit is objectively baseless . . . involves the determination of whether plaintiffs undertook a
reasonable investigation before filing suit, whether plaintiffs knew or should have known that
11
United States District Court
Northern District of California
10
[Forescout] had not infringed the [Fortinet] patents, and whether a reasonable litigant could have
12
realistically expected success on the merits at the time the suit was filed.” Id. Reasonableness is a
13
generally question of fact; the Court cannot at this juncture determine whether there was objective
14
bad faith.
15
16
17
18
Therefore, because the questions of patent validity and infringement are not obvious, it is
premature to determine the question of objective bad faith at this stage of the litigation.
d.
Subjective Bad Faith
Finding subjective bad faith is primarily concerned with the parties using litigation as a
19
weapon when it is a mere “sham”; therefore, the subjective prong of this test looks to the
20
“subjective expectation of success” in the underlying litigation. Pro. Real Est. Invs., 508 U.S. at
21
57. For example, accusing a competitor of patent infringement for an invalid patent and never
22
actually filing the infringement suit shows that there was never any subjective expectation of
23
success. In such cases, the patent infringement action is used merely as a weapon. Globetrotter,
24
362 F.3d at 1375. Subjective bad faith focuses on “whether the baseless lawsuit conceals an
25
attempt to interfere directly with the business relationships of a competitor.” Nuance Commc’ns,
26
Inc., 2018 WL 6804488, at *3 (internal quotation marks omitted). This includes the history of
27
bringing patent infringement suits against its market competitors as a predicate to acquiring them,
28
threats to sue as retribution for a failure to sell, dissemination of misleading press release with
39
1
false accusations of patent infringement, never actually filing an infringement lawsuit, the timing
2
of communications alleging infringement, or inadequate investigation. Id.; Globetrotter, 362 F.3d
3
at 1375; Dominant Semiconductors, 524 F.3d at 1264; Well Master Corp. v. Luckyshot LLC, No.
4
19-CV-01617-CMA-STV, 2019 WL 11314994, at *3 (D. Colo. Dec. 10, 2019).
5
In its motion to dismiss, Fortinet does not meaningfully engage with the subjective bad
6
faith analysis and acknowledges that it focused its briefing on the objective prong. Mot. at 31, n4.
7
Fortinet is correct that “[a]n objectively reasonable effort to litigate “cannot be [a] sham regardless
8
of subjective intent.” Globetrotter, 362 F.3d at 1375–76 (quoting Pro. Real Est. Invs, 508 U.S. at
9
57) (“Absent a showing that the infringement allegations are objectively baseless, it is unnecessary
to reach the question of the patentee's intent.”). 800 Adept, 539 F.3d at 1370. However, the
11
United States District Court
Northern District of California
10
question of subjective intent remains relevant as absent a sufficient allegation of subjective bad
12
faith, any applicable preemption cannot be overcome.
13
Forescout alleges that Fortinet filed its lawsuit with the intention of interfering with
14
Forescout’s corporate acquisition and customer relations. Counterclaim at 46. It reasons that
15
Fortinet “knew or should have known” that the lawsuit was baseless, that it filed its suit one
16
business day before the acquisition was scheduled to close, and included extraneous allegations
17
relating to the acquisition in the Complaint. Id. Fortinet’s knowledge or recklessness as to patent
18
invalidity, if established, would indicate that it filed sham litigation to tortiously interfere with the
19
competitor’s business. Conbraco Indus., Inc. v. Mitsubishi Shindoh Co., No. 3:14-CV-00368-
20
RJC, 2015 WL 3506487, at *3 (W.D.N.C. Jan. 30, 2015). In light of these allegations, the truth
21
and accuracy of which cannot yet be adjudicated, the Court cannot find that Forescout has failed to
22
plausibly plead subjective bad faith. Accordingly, the Court cannot find preemption of Fortinet’s
23
tortious interference claim as a matter of law at this juncture.
24
3.
Claim for Tortious Interference
25
Forescout asserts a claim for tortious interference. Fortinet argues that Forescout’s claim
26
fails because Forescout has not specified which form of tortious interference it claims. In
27
California, there are two distinct forms of tortious interference: “intentional interference with
28
contract and intentional interference with prospective economic advantage.” Korea Supply Co. v.
40
1
Lockheed Martin Corp., 29 Cal.4th 1134, 1157 (2003). Fortinet notes that Forescout merely
2
pleads “tortious interference with business relationships” and argues that the claim mixes the
3
elements of the two torts, ultimately failing to plead either claim. Reply at 22.
4
5
a.
Intentional Interference with Contract
Fortinet argues that a claim of intentional interference with contract fails because
6
Forescout did not identify a specific contract. Reply at 21. Forescout contends that it has pled the
7
essential elements of a tortious interference claim, noting that intentional interference with an
8
existing contract is a “wrong in and of itself.” Id. at 1158. However, no contract was identified.
9
Korea Supply, 29 Cal.4th at 1157. Even assuming that the botched acquisition deal with Advent is
the contractual relationship at issue, intentional inference is a tort that requires an enforceable
11
United States District Court
Northern District of California
10
contract, which Forescout did not have. Therefore, there is no claim of intentional interference
12
with a specific contract. PMC, Inc. v. Saban Ent., Inc., 45 Cal. App. 4th 579 (1996) (“[A] cause of
13
action for intentional interference with contract requires an underlying enforceable contract.”),
14
overruled on other grounds by Korea Supply, 29 Cal.4th at 1134.
15
b.
Intentional Interference with Prospective Economic Advantage
16
In California, intentional interference with prospective economic advantage has five
17
elements: (1) the existence, between the plaintiff and some third party, of an economic relationship
18
that contains the probability of future economic benefit to the plaintiff; (2) the defendant’s
19
knowledge of the relationship; (3) intentional acts by the defendants designed to disrupt the
20
relationship; (4) actual disruption of the relationship; and (5) harm proximately caused by the
21
defendant’s action. Id. at 1153. The defendant’s intentional acts must be wrongful and
22
independently actionable by some measure beyond the interference itself. Della Penna v. Toyota
23
Motor Sales, U.S.A., Inc., 11 Cal.4th 376, 393 (1995). The tort does not punish lawful
24
competition, choice of commercial relationships, or pursuit of commercial objectives, even if
25
carried out with an improper motive. Korea Supply, 29 Cal.4th at 1158–59.
26
Fortinet argues that Forescout failed to adequately plead two elements of its claims. First,
27
Fortinet states that Forescout failed to establish how Fortinet committed an independently
28
actionable wrong. Mot. at 36. Independently actionable violations include violations of law or
41
1
unethical practices such as violence, misrepresentation, defamation, libel, or infringement. Ingrid
2
& Isabel, LLC v. Baby Be Mine, LLC, 70 F. Supp. 3d 1105, 1120 (N.D. Cal. 2014). Forescout
3
counters that there was independently actionable wrong because Fortinet’s conduct included
4
misrepresentation, defamation and unfounded litigation as its claims are objectively baseless
5
because Fortinet knew or should have known that its claims were not infringed and were invalid or
6
patent-ineligible. Opp’n at 36. While it is premature to determine whether Fortinet’s infringement
7
action was objectively baseless, Forescout has sufficiently pled a claim of wrong to survive a
8
motion to dismiss. Id.
9
Second, Fortinet argues that Forescout failed to identify any particular customers it was
deprived of. Mot. at 37. In order to state a claim for intentional interference with prospective
11
United States District Court
Northern District of California
10
business advantage, the plaintiff must allege facts showing that the defendant interfered with the
12
plaintiff's relationship with an “identifiable buyer.” Westside Ctr. Associates v. Safeway Stores,
13
Inc., 42 Cal.App.4th 507, 527 (1996). Allegations that a defendant interfered with the plaintiff's
14
relationship with an “as yet unidentified” customer generally will not suffice. Id. Merely stating
15
that an ongoing relationship with customers was harmed is conclusory and insufficiently pleaded.
16
Sybersound Recs., Inc. v. UAV Corp., 517 F.3d 1137, 1151 (9th Cir. 2008); see also Amaretto
17
Ranch Breedables, LLC v. Ozimals, Inc., 790 F. Supp. 2d 1024, 1032 (N.D. Cal. 2011). Fortinet
18
argues that the tort requires Forescout to show that Fortinet’s actions affected more than a
19
relationship with “repeat customers.” Reply at 22 (citing Google Inc. v. Am. Blind & Wallpaper
20
Factory, Inc., No. C-03-05340 JF, 2005 WL 832398, at *9 (N.D. Cal. Mar. 30, 2005) (relationship
21
with “repeat customers who “probabl[y] will continue to seek to visit its Web site and purchase its
22
goods and services” was too speculative and did not “rise to the level of the requisite promise of
23
future economic advantage.”)).
24
Forescout contends that identification of a specific customer is unnecessary, and some
25
manner of an economic relationship is all that is required. Opp’n at 37. Forescout is correct—an
26
identification by name is not required, just “that the defendant was aware its actions would
27
frustrate the legitimate expectations of a specific, albeit unnamed, party.” Roy Allan Slurry Seal,
28
Inc. v. Am. Asphalt S., Inc., 184 Cal. Rptr. 3d 279, 284 (Ct. App. 2015), rev'd on other grounds, 2
42
1
Cal. 5th 505 (2017) (citing Ramona Manor Convalescent Hosp. v. Care Enterprises, 177 Cal.
2
App. 3d 1120, 1133 (Ct. App. 1986)). However, “while . . . a plaintiff need not give the name of
3
the third-party, none of them abrogates the requirement that a plaintiff still must allege sufficient
4
facts to allow the Court to plausibly infer some real third-party—named or unnamed—existed and
5
expected to partake in the relationship.” Logistick, Inc. v. AB Airbags, Inc., No. 321-CV-00151,
6
2021 WL 2433944, at *5 (S.D. Cal. June 15, 2021).
7
Courts in this district have not found this requirement to be a high bar at the motion to
8
dismiss stage. It is sufficient that the plaintiff plausibly alleges “specific facts putting the
9
defendant on notice that a third-party . . . existed.” Id. at *7. For instance, in Code Rebel, the
Court found that alleging interference with “actual and potential customers” for a specific program
11
United States District Court
Northern District of California
10
to be sufficient:
12
15
Plaintiff alleges that an economic and business relationship existed
between Plaintiff and its actual and prospective customers of the
iRAPP programs. Although Plaintiff does not specifically identify
existing third parties with whom there was an existing economic or
business relationship, Plaintiff's allegation of interference with
“actual and potential customers” is sufficient to satisfy federal
pleading requirements.
16
Code Rebel, LLC v. Aqua Connect, Inc., No. CV-13-4539, 2013 WL 5405706, at *5–7 (C.D. Cal.
17
Sept. 24, 2013) (citation omitted).
13
14
18
Similarly, in Logistick, the defendant argued that the plaintiff failed to name its customers
19
and to specify what actions its customers took toward purchasing the plaintiff’s products.
20
Logistick, Inc., 2021 WL 2433944 at *5. The plaintiff had only argued that “it [was] evident from
21
the [c]omplaint that these customers were consumers of [the p]laintiff’s disposable load bars that
22
compete with [the d]efendant’s . . . product.” Id. This was sufficient for the court to find that
23
“specific facts putting the defendant on notice that a third-party, indeed, existed[,]” and therefore
24
sufficient to pass the Twombly/Iqbal standard. Id. at *7.
25
Therefore, Code Rebel and Logistick suggest that while merely pointing to “customers” or
26
“repeated customers” generally is insufficient, alleging that a relationship with customers existed
27
for specific products is sufficient to plausibly allege that a relationship existed and pass the Rule
28
12(b)(6) stage. In this case, Forescout alleges that Fortinet’s sample email was used to “target
43
1
folks looking at or using ForeScout.” Counterclaim at 46. However, only one product, FortiNAC,
2
is at issue and specified in the sample email. See Complaint at 46–47. Therefore, like the “actual
3
and prospective customers” of iRAPP programs in Code Rebel, the allegation that Fortinet
4
interfered with “current and prospective customers” of FortiNAC products is “sufficient to satisfy
5
federal pleading requirements.” Code Rebel, 2013 WL 5405706, at *6.
IV.
6
CONCLUSION
7
For the foregoing reasons, the Court DENIES Fortinet’s motion to dismiss.
8
This order disposes of Docket No. 115.
9
10
IT IS SO ORDERED.
United States District Court
Northern District of California
11
12
Dated: November 29, 2021
13
14
15
______________________________________
EDWARD M. CHEN
United States District Judge
16
17
18
19
20
21
22
23
24
25
26
27
28
44
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?