Fortinet, Inc. v. Forescout Technologies, Inc.

Filing 174

ORDER - Claim Construction Order. Signed by Judge Edward M. Chen on 11/28/2022. (emcsec, COURT STAFF) (Filed on 11/28/2022)

Download PDF
Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 1 of 58 1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 7 FORTINET, INC., Plaintiff, 8 CLAIM CONSTRUCTION ORDER v. 9 United States District Court Northern District of California Case No. 20-cv-03343-EMC 10 FORESCOUT TECHNOLOGIES, INC., 11 Defendant. 12 13 14 I. INTRODUCTION Fortinet, Inc. (“Fortinet”) brought this action against Forescout Technologies, Inc. 15 16 (“Forescout”), asserting infringement of five patents. Forescout counterclaimed with infringement 17 of six of its own patents and with tortious interference claims. 18 For the 11 patents-in-suit, each party proposed eight terms for the Court to construe. (See 19 Docket No. 142 (Joint Claim Construction Statement) at 2–3.) The parties have agreed on the 20 construction of six additional terms. (Id. at 1.) 21 22 23 II. A. BACKGROUND Factual Background Fortinet sells cybersecurity products, software, and services to large institutional 24 customers. (Docket No. 67 (“FAC”) at ¶ 4.) Many of its products “provide[] network visibility to 25 see devices connected to a network as well as the ability to control those devices and users.” (Id. 26 at ¶ 26.) 27 28 Forescout competes with Fortinet in that market. (Id. at ¶ 6.) On February 9, 2020, Forescout publicly announced a major acquisition of all its outstanding shares by Advent Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 2 of 58 1 International (“Advent”), a global private equity investor. (Docket No. 107 (“Countercl.”) at ¶¶ 2 135-136.) That month, Fortinet attempted to initiate licensing discussions with Forescout. It 3 persisted through April without success. (FAC at ¶¶ 10-12.) Then, in May, one business day 4 before Advent’s acquisition’s scheduled closing, Fortinet filed this action and began a campaign to 5 allegedly smear Forescout before its existing and potential customers. (Countercl. at ¶¶ 138-145.) 6 Advent paused the acquisition, but eventually closed the deal on financial terms much less 7 favorable to Forescout. (Id. at ¶ 146.) 8 B. United States District Court Northern District of California 9 Procedural Background Fortinet filed suit in May 2020 for contributory, induced, and willful infringement of three 10 patents relating to cybersecurity technology. (Docket No. 1.) Ruling on Forescout’s motion to 11 dismiss, the Court declined to invalidate Fortinet’s three patents under 35 U.S.C. § 101 and found 12 that Fortinet has sufficiently pled induced infringement. (Docket No. 55.) The Court dismissed 13 Fortinet’s contributory and willful infringement claims with leave to amend. (Id.) 14 Fortinet then filed its Amended Complaint, asserting two additional patents. (FAC.) 15 Forescout again moved to dismiss. (Docket No. 71.) The Court declined to invalidate the two 16 newly asserted patents’ claims under Section 101. (Docket No. 94.) It also dismissed Fortinet’s 17 willful infringement claims but found induced and contributory infringement claims adequately 18 pled. (Id.) 19 Forescout then counterclaimed against Fortinet, alleging infringement of six patents and 20 tortious interference based on Fortinet’s extrajudicial statements. (Docket No. 107.) The Court 21 denied Fortinet’s motion to dismiss the tort claims or the infringement claims under Section 101. 22 (Docket No. 133.) 23 III. FORTINET’S EXPERT’S QULIFICATIONS AND OPINIONS 24 As an initial matter, Forescout asks the Court to disregard the declaration of Fortinet’s 25 expert, Michael Shamos, Ph.D., J.D., for three reasons: (1) Dr. Shamos “never identifies what 26 legal standard he applied for means-plus-function claims.” (Docket No. 147 (“Forescout Resp.”) 27 at 11.) (2) Dr. Shamos is not a POSITA under either party’s definitions. (Id.) (3) Dr. Shamos’s 28 declaration accompanying Fortinet’s reply brief is untimely as it came over a month after claim 2 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 3 of 58 1 construction discovery had closed. (Docket No. 151 (“Forescout Sur-reply”) at 8.) The Court 2 addresses each reason below. 3 A. Forescout first urges the Court to disregard Dr. Shamos’s declarations because he fails to 4 5 identify the legal standard for means-plus-function claims. (Forescout Resp. at 11.) Federal Rule 6 of Evidence 702 requires a qualified expert to apply “reliable principles and methods” in forming 7 his or her opinions. Fed. R. Evid. 702(c). An expert thus should identify the principles and 8 methods applied so that the court or the jury can evaluate the expert’s testimony. Here, Dr. Shamos does not explicitly outline the legal standard for construing means-plus- 9 United States District Court Northern District of California The Legal Standard Dr. Shamos Applied Is Identifiable And Reliable 10 function limitations in his declarations, but appears to have applied Williamson v. Citrix Online, 11 LLC to his analysis. 792 F.3d 1339, 1350 (Fed. Cir. 2015). In paragraph 39 of his declaration, for 12 example, Dr. Shamos opines, “Because ‘module’ is a nonce word (standing for a hardware or 13 software component), it is possible that ‘earmark provisioning module’ is a mean[s]-plus-function 14 term under pre-AIA 35 U.S.C. §112¶6.” (Ex. A1 (“Shamos Decl.”) at ¶ 39.) That reasoning is 15 consistent with the standard set forth in Williamson. See 792 F.3d at 1350 (“‘Module’ is a well- 16 known nonce word that can operate as a substitute for ‘means’ in the context of § 112, para. 6.”). 17 Dr. Shamos’s opinion therefore is distinguishable from that in the case cited by Forescout, 18 NetFuel, Inc. v. Cisco Sys. Inc., No. 5:18-cv-02352-EJD, 2020 WL 1274985, at *11 (N.D. Cal. 19 Mar. 17, 2020). There, the court was unable to follow the expert’s methodology to calculate 20 royalty. Id. at *7 (finding expert’s conclusion to be “impermissible black box without sound 21 economic and factual predicates”) (internal quotation marks omitted). Although Dr. Shamos 22 should have identified the legal standard for means-plus-function limitations, his methodology is 23 not so undiscernible or unreliable to warrant being disregarded. 24 25 26 27 28 1 Exhibits A-G refer to the exhibits to the Declaration of Anthony P. Biondo in Support of Fortinet’s Opening Claim Construction Brief (Docket No. 146). Exhibits H-P refer to exhibits to the Declaration of Matthew R. McCullough in Support of Defendant Forescout Technologies, Inc.’s Responsive Claim Construction Brief (Docket No. 147-1). Exhibit Q refers to the exhibit to the Declaration of Anthony P. Biondo in Support of Fortinet’s Reply Claim Construction Brief (Docket No. 149-1). 3 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 4 of 58 1 2 Dr. Shamos Qualifies As A POSITA Forescout also asks the Court to disregard Dr. Shamos’s declarations because he lacks 3 experience in network access security systems and thus is not a POSITA under either party’s 4 definition. (Forescout Resp. at 11–12.) Forescout observes that neither Fortinet nor Dr. Shamos 5 even contends that he is a POSITA. (Forescout Sur-reply at 8.) In response, Fortinet points out 6 that Dr. Shamos has a Ph.D. in computer science, and has taught courses in computer networking, 7 wireless communication and Internet architecture, Internet protocols, and electronic payment 8 systems. (Docket No. 146 (“Fortinet Br.”) at 24.) Fortinet also submitted a new declaration from 9 Dr. Shamos accompanying its reply brief setting forth the following qualifications: 10 11 United States District Court Northern District of California B. 12 13 14 15 16 17 18 Dr. Shamos is the Distinguished Career Professor in the School of Computer Science at Carnegie Mellon University; he has testified before legislatures on computer security; he authored an article on E-Voting Security in IEEE Security and Privacy in 2012, and was a guest editor of that issue; he authored a security analysis of the firmware of an electronic voting machine; and he supervised a graduate software project for Samsung to detect attempts to introduce malware into computer systems. (Docket No. 149 (“Fortinet Reply”) at 25; Ex. Q (“4/25/22 Shamos Decl.”) at ¶¶ 6-19.) Dr. Shamos qualifies as a POSITA under Forescout’s definition. Forescout’s expert, Eric 19 Cole, Ph.D., defines a POSITA as “a person with a bachelor’s degree in computer science, 20 computer engineering, or electrical engineering and at least three years of experience in 21 networking operating systems and cybersecurity, or a person with a master’s degree in one of the 22 foregoing and at least two years of experience in the aforementioned fields.” (Ex. B (“Cole 23 Decl.”) at ¶ 19.) And “an individual with additional education or additional industrial experience 24 could still be of ordinary skill in the art if that additional education or experience compensates for 25 a deficit in one of the other aspects of the requirements stated above.” (Id.) 26 As described above, Dr. Shamos has a Ph.D. and years of experience in computer security. 27 Although computer security is different from network or cybersecurity, experience in the former 28 combined with Dr. Shamos’s additional education may compensate for a deficit in the latter, as Dr. 4 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 5 of 58 1 Dole contemplates. Additionally, by submitting the declarations, Dr. Shamos implicitly considers 2 himself qualified as a POSITA under his own definition that requires “one to two years of work 3 experience in implementing network security functions” and in “implementing network security 4 functions.” (Shamos Decl. at ¶¶ 12, 16–17, 21, 25.) Thus, Dr. Shamos implicitly acknowledges 5 that he has experience in cybersecurity, as Dr. Cole requires. Because Dr. Shamos qualifies as a POSITA under Forescout’s definition, the Court does 6 7 not disregard his opinions. 8 C. United States District Court Northern District of California 9 The Court Declines To Strike Dr. Shamos’s New Declaration In its claim construction sur-reply brief, Forescout asked the Court to strike Dr. Shamos’s 10 declaration accompanying Fortinet’s reply brief (Forescout Sur-reply at 8). The sole authority that 11 Forescout cites to support its request concerns a motion to strike an untimely expert report dressed 12 up as a rebuttal declaration. See Mallinckrodt, Inc. v. Masimo Corp., 254 F. Supp. 2d 1140, 1156– 13 58 (C.D. Cal. 2003) (granting motion to strike 33-page “rebuttal” declaration submitted with 14 opening claim construction brief when previously submitted expert report was rubber-stamped 15 two-pager). 16 Dr. Shamos’s new declaration does not appear to have prejudiced Forescout. In its sur- 17 reply brief, Forescout criticized Fortinet for relying on that declaration for two terms. For one 18 term, Fortinet relied on “Dr. Shamos’[s] untimely new declaration for the proposition that the 19 preamble provides antecedent basis.” (Forescout Sur-reply at 9.) But Dr. Shamos also opined so 20 in his Claim Construction Report on the Fortinet Patents served on Forescout in May 2021. (See 21 Ex. G (“Shamos Rpt.”) at ¶ 77; Docket No. 146-1 at ¶ 8.) For the other term, Fortinet made 22 arguments in the reply brief “based on Dr. Shamos’[s] untimely declaration, which relies on 23 Figure 5” of U.S. Patent No. 9,894,034. (Forescout Sur-reply at 13.) But Forescout anticipated 24 that argument and even included its annotated Figure 5 in its responsive brief. (Forescout Resp. at 25 23.) Regardless, Forescout has had an opportunity to address Dr. Shamos’s new declaration in its 26 sur-reply brief. See, e.g., Forescout Sur-reply at 9 (stating that “Dr. Cole’s declaration stands 27 unrebutted” after considering Dr. Shamos’ new declaration). Forescout has not shown prejudice 28 by Dr. Shamos’s new declaration. 5 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 6 of 58 1 D. Summary In sum, the Court denies Forescout’s request to disregard Dr. Shamos’s declarations 2 3 because Dr. Shamos is qualified, applied identifiable and reliable legal standard, and his 4 declaration accompanying Fortinet’s reply brief did not substantially prejudice Forescout. IV. 5 6 Legal Standard 7 1. 8 “[T]he interpretation and construction of patents claims, which define the scope of the 9 United States District Court Northern District of California A. CLAIM CONSTRUCTION Claim Construction patentee’s rights under the patent, is a matter of law exclusively for the court.” Markman v. 10 Westview Instruments, Inc., 52 F.3d 967, 970–71 (Fed. Cir. 1995). Claim terms are generally 11 given their plain and ordinary meaning, which is the meaning one of ordinary skill in the art would 12 ascribe to a term when read in the context of the claim, specification, and prosecution history. See 13 Phillips v. AWH Corp., 415 F.3d 1303, 1313–14 (Fed. Cir. 2005) (en banc). “There are only two 14 exceptions to this general rule: 1) when a patentee sets out a definition and acts as his own 15 lexicographer, or 2) when the patentee disavows the full scope of a claim term either in the 16 specification or during prosecution.” Kyocera Senco Indus. Tools, Inc. v. ITC, 22 F.4th 1369, 17 1378 (Fed. Cir. 2022) (quoting Thorner v. Sony Computer Ent. Am. LLC, 669 F.3d 1362, 1365 18 (Fed. Cir. 2012)). 19 2. 20 A patent specification must “conclude with one or more claims particularly pointing out Definiteness 21 and distinctly claiming the subject matter which the applicant regards as [the] invention.” 35 22 U.S.C. § 112, ¶ 2 (2006).2 “[A] patent is invalid for indefiniteness if its claims, read in light of the 23 specification delineating the patent, and the prosecution history, fail to inform, with reasonable 24 certainty, those skilled in the art about the scope of the invention.” Nautilus, Inc. v. Biosig 25 26 27 28 The American Invents Act (AIA) revised the pertinent provision of Section 112 to read: “The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention.” 35 U.S.C. § 112(b). The revision is not substantive. The patents at issue in this case are a mix of preand post-AIA patents. The parties have not argued that the Court should assess their definiteness differently. 6 2 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 7 of 58 1 Instruments, Inc., 572 U.S. 898, 901 (2014). To comply with § 112, a patent “must provide 2 objective boundaries for those of skill in the art.” Interval Licensing LLC v. AOL, Inc., 766 F.3d 3 1364, 1371 (Fed. Cir. 2014). “The scope of claim language cannot depend solely on the 4 unrestrained, subjective opinion of a particular individual.” Datamize, LLC v. Plumtree Software, 5 Inc., 417 F.3d 1342, 1350 (Fed. Cir. 2005), abrogated on other grounds by Nautilus, 572 U.S. at 6 901. The patent challenger “ha[s] the burden of proving indefiniteness by clear and convincing 7 evidence.” BASF Corp. v. Johnson Matthey Inc., 875 F.3d 1360, 1365 (Fed. Cir. 2017). 8 3. 9 “Means-plus-function” limitations generally refer to those invoking § 112 ¶ 6, now 10 United States District Court Northern District of California 11 12 13 14 15 Means-Plus-Function codified as § 112(f). That paragraph provides: An element in a claim for a combination may be expressed as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof, and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof. 35 U.S.C. § 112 ¶ 6. The overall means-plus-function analysis involves two steps. At step one, courts “determine whether a limitation is drafted in means-plus-function 16 format” by determining whether the limitation “connotes sufficiently definite structure to a person 17 of ordinary skill in the art.” Dyfan, LLC v. Target Corp., 28 F.4th 1360, 1365 (Fed. Cir. 2022). 18 Courts presume that “a claim limitation is not drafted in means-plus-function format in the 19 absence of the term ‘means.’” Id. “The presumption can be overcome if a challenger 20 demonstrates that the claim term fails to recite sufficiently definite structure.” Id. (citation and 21 internal quotation marks omitted). The essential inquiry is “whether the words of the claim are 22 understood by persons of ordinary skill in the art to have a sufficiently definite meaning as the 23 name for structure.” Williamson, 792 F.3d at 1348. Such an inquiry turns on “[i]ntrinsic 24 evidence, such as the claims themselves and the prosecution history,” as well as extrinsic 25 evidence. Dyfan, 28 F.4th at 1365–66. 26 At step two, if the limitation is drafted in a means-plus-function format, courts then 27 “determine[e] ‘what structure, if any, disclosed in the specification corresponds to the claimed 28 function.’” Dyfan, LLC, 28 F.4th at 1365 (quoting Williamson, 792 F.3d at 1349–51). A means7 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 8 of 58 1 plus-function claim is indefinite if the specification fails to disclose adequate corresponding 2 structure to perform the claimed function. Williamson, 792 F.3d at 1351–52. The step one inquiry 3 is distinct from, but “may be similar to[,] looking for corresponding structure in the specification.” 4 Apple Inc. v. Motorola, Inc., 757 F.3d 1286, 1296 (Fed. Cir. 2014), abrogated on other grounds by 5 Williamson, 792 F.3d at 1349. 6 B. 7 U.S. Patent No. 6,363,489 (the “’489 patent”) 1. “Returning An Earmark” And “Earmark Provisioning Module” 8 10 United States District Court Northern District of California 11 12 13 14 Forescout’s Proposal Fortinet’s Proposal 9 “returning an earmark” (claim 1) Indefinite “earmark provisioning module” (claim 15) Plain and ordinary meaning Court’s Construction Plain and ordinary meaning Indefinite Claim 1 recites: 15 1. A method for detecting and handling a communication from an unauthorized source on a network, the method comprising the steps of: 16 (a) receiving the communication from the unauthorized source; 17 (b) analyzing the communication for detecting an information gathering procedure; 18 19 20 21 22 23 24 25 26 27 28 (c) if said information-gathering procedure is detected, indicating a source address of the communication as a suspected network reconnaissance collector; (d) returning an earmark to said suspected reconnaissance collector, such that said earmark includes specially crafted false data, and such that said earmark includes data that can serve to identify an unauthorized source; (e) analyzing each subsequent communication for a presence of said earmark; (f) if said earmark is present, indicating source address of the communication as a suspected network reconnaissance collector, and (g) if said source address is said intruder source address, applying intrusion handling procedures towards the communication from said intruder source address. 8 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 9 of 58 1 2 3 (’489 patent at claim 1 (emphasis added).) Claim 15 recites: 15. A system for detecting and handling the communication from an unauthorized source on a network, the system comprising: (a) An entry point to the network such that the communication passes through said entry point to reach the network; 4 5 (b) an earmark provisioning module for preparing earmarks for sending to unauthorized source, such that said earmarks are specially crafted false data that will identify an unauthorized source; 6 7 (c) An intrusion detection module for analyzing the communication and for detecting said earmark in the communication; and 8 9 (d) An intrusion-handling module for handling the communication if said earmark is detected by said intrusion detection module. 10 United States District Court Northern District of California 11 12 (Id. at claim 15 (emphasis added).) Fortinet asserts that both terms are indefinite because (1) they 13 are “highly subjective,” and (2) they are means-plus-function terms that lack sufficient structure in 14 the specification. (Fortinet Reply at 1–2.) 15 16 17 a. The Two “Earmark” Terms Are Not So Subjective As To Render Them Indefinite The parties agree that “earmark” is a patentee-defined term that means (claim 15)—or 18 includes (claim 1)—“specially crafted false data” to identify an unauthorized source. (Fortinet Br. 19 at 5; Forescout Resp. at 2; ’489 patent at 2:13-14 (“The mark is specifically crafted false data[.]”).) 20 Fortinet argues that the “specially crafted” nature of “earmark” independently renders the term 21 indefinite because it is purely subjective. (Fortinet Reply at 2.) Fortinet’s expert, Dr. Shamos, 22 opines that the specification does not explain—and a POSITA would not understand—the 23 difference between “false data” and “specially crafted false data.” (Shamos Decl. at ¶ 38.) 24 Forescout’s expert, Dr. Cole, counters that “false data” refers to “randomly generated data” that 25 serve no purpose, while “specially crafted false data” refer to those tailored “to identify an 26 unauthorized source.” (Cole Decl. at ¶ 32.) He points to “fake user names and passwords” as an 27 example of “specially crafted false data” in the specification. (Id. (citing ’489 patent at 8:23-26).) 28 “Earmark” is not indefinite for subjectiveness. Claim terms are “purely subjective” if 9 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 10 of 58 1 “they turn[] on a person’s tastes or opinion,” and courts look to the written description to 2 determine whether some standard exists to guide a person as to the scope of the claims. Sonix 3 Tech. Co. v. Publications Int’l, Ltd., 844 F.3d 1370, 1378 (Fed. Cir. 2017). Here, the claim 4 language itself makes clear that “earmark” is not purely subjective because the false data 5 constituting the “earmark” must be specially crafted so that they “can serve to identify an 6 unauthorized source.” (’489 patent at claim 1.) Whether false data can fulfill that purpose is 7 objective. It does not turn on a person’s taste or opinion. 8 United States District Court Northern District of California 9 Fortinet’s sole authority does not support its position. In that case, the court found the term “unobtrusive manner” highly subjective because the claim language offers no objective 10 indication of the “unobtrusive manner,” and the prosecution history highlights the difficulty in 11 pinning down the relationship between the term and the patents’ embodiments. Interval Licensing 12 LLC v. AOL, Inc., 766 F.3d 1364, 1372–73 (Fed. Cir. 2014). Here, in contrast, the ’489 patent 13 includes (i) guidance on what makes some false data “specially crafted,” i.e., they must “serve to 14 identify an unauthorized source” (’489 patent at claim 1), (ii) how they are used, i.e., they are 15 gathered by an unauthorized user (id. at 2:14-15), and (iii) at least one example of “specifically 16 crafted false data,” i.e., “fake user names and passwords” (id. at 8:23-26). These details provide 17 guidance on how to distinguish between “specially crafted false data” and generic “false data.” 18 Fortinet thus has not proven by clear and convincing evidence that the “earmark” terms are 19 indefinite for subjectiveness. 20 21 b. Means-Plus-Function Fortinet separately argues that the “earmark” terms are indefinite as means-plus-function 22 terms lacking corresponding structures. (Fortinet Reply at 1.) Absent the term “means,” 23 “returning an earmark” and “earmark provisioning module” are presumed not means-plus-function 24 terms. See Dyfan, 28 F.4th at 1365. To overcome that presumption, Fortinet must show—by a 25 preponderance of the evidence—that “persons of ordinary skill in the art would not have 26 understood [those] limitations to connote structure in light of the claim as a whole.” Id. at 1367. 27 28 i. “Returning An Earmark” Is Not A Means-Plus-Function Term Fortinet argues that “returning an earmark” is a means-plus-function term because it only 10 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 11 of 58 1 claims a function—to “identify an unauthorized source”—but does not recite how to craft an 2 earmark or how it identifies the unauthorized source. (Fortinet Br. at 5.) Forescout argues that 3 claim 1 resembles a typical method claim and “recites the acts necessary to support the specified 4 function.” (Forescout Resp. at 2.) United States District Court Northern District of California 5 Although identifying an unauthorized source may be a function of an “earmark,” the term 6 “returning an earmark” recites no such function to invoke § 112, ¶ 6. Without claiming a function, 7 even a term explicitly reciting “means” does not qualify as a means-plus-function limitation. See 8 Wenger Mfg., Inc. v. Coating Machinery Systems, Inc., 239 F.3d 1225, 1236–37 (Fed. Cir. 2001) 9 (affirming “means defining a plurality of separate product coating zones” not subject to § 112, ¶ 6 10 because there was no recited function corresponding to “means”); York Prods., Inc. v. Cent. 11 Tractor Farm & Family, 99 F.3d 1568, 1574 (Fed.Cir.1996) (“Without an identified function, the 12 term ‘means’ in this claim cannot invoke 35 U.S.C. § 112, ¶ 6.”); Microchip Tech. Inc. v. Nuvoton 13 Tech. Corp. Am., No. 19-CV-01690-SI, 2020 WL 978636, at *11 (N.D. Cal. Feb. 28, 2020) 14 (holding “port control module” not means-plus-function limitation without recited function). 15 “Returning an earmark” thus is unlike the limitations in Fortinet’s cited cases. Both 16 concern terms solely describing the functions being performed. See Advanced Ground Info. Sys. v. 17 Life360, Inc., 830 F.3d 1341, 1348 (Fed. Cir. 2016) (finding “symbol generator” means-plus- 18 function term as “it is simply an abstraction that describes the function being performed (i.e., the 19 generation of symbols)”); Rain Computing, Inc. v. Samsung Elecs. Am., Inc., 989 F.3d 1002, 1006 20 (Fed. Cir. 2021) (finding “user identification module” means-plus-function term “because it 21 merely describes the function of the module: to identify a user”). 22 Even if the term claims a function, Fortinet has not shown that an “earmark” cannot 23 connote sufficient structure. “[W]here a claim recites a function, but then goes on to elaborate 24 sufficient structure, material, or acts within the claim itself to perform entirely the recited function, 25 the claim is not in means-plus-function format.” Sage Products, Inc. v. Devon Industries, Inc., 26 126 F.3d 1420, 1427–28 (Fed. Cir. 1997). Fortinet presents no convincing argument that an 27 “earmark,” namely, “specially crafted false data,” provides insufficient structure for Fortinet’s 28 proposed function of “identify[ing] an unauthorized source.” (Fortinet Br. at 5.) 11 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 12 of 58 1 In sum, Fortinet has not shown by a preponderance of evidence that “returning an 2 earmark” is a means-plus-function limitation. It thus is not indefinite for lacking a corresponding 3 structure. ii. 4 5 Unlike “returning an earmark,” “earmark provisioning module” is a means-plus-function 6 term. At the outset, “‘[m]odule’ is a well-known nonce word that can operate as a substitute for 7 ‘means.’” Williamson, 989 F.3d at 1350. Accordingly, although this term does not recite “means” 8 and thus is presumed not a means-plus-function limitation, that presumption is much weaker than 9 for “returning an earmark.” The claim language does not provide sufficient structure for “earmark provisioning 10 United States District Court Northern District of California “Earmark Provisioning Module” Is A Means-Plus-Function Term 11 module”—a patentee coined term. Claim 15 only recites the function of the “earmark 12 provisioning module,” i.e., preparing or creating earmarks, without explaining how to do so. Nor 13 does the prefix “earmark provisioning” impart structure. See Rain Computing, 989 F.3d at 1006 14 (holding “user identification module” “merely describes the function of the module: to identify a 15 user”). Forescout contends that how an “earmark provisioning module” interacts with other claim 16 17 elements defines the structure of the module. (Forescout Resp. at 2.) Referring to Figure 1 18 (reproduced below), Forescout’s expert, Dr. Cole, testifies, “a[n] [ear]mark provisioning module 19 22 provides false information to unauthorized source 20 and hence to the unauthorized user” that 20 “acts as mark and enables traffic from unauthorized source 20, or even from a different 21 unauthorized source (not shown) to be identified later if an intrusion attempt is made.” (Cole 22 Decl. at ¶ 31 (quoting ’489 patent at 4:61–66).) 23 /// 24 /// 25 /// 26 /// 27 /// 28 /// 12 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 13 of 58 1 2 3 4 5 6 7 8 9 10 United States District Court Northern District of California 11 12 13 14 15 16 17 18 19 20 21 22 (’489 patent at Fig. 1.) The cited specification provides “nothing more than a restatement of the function, as recited in the claim.” Traxcell Techs., LLC v. Sprint Communs. Co. LP, 15 F.4th 1121, 1134 (Fed. Cir. 2021) (quotation omitted). Also, mere relationship with other elements alone does not provide sufficient structure. See Media Rights Technologies, Inc. v. Capital One Financial Corp., 800 F.3d 1366, 1372–73 (Fed. Cir. 2015) (finding written description of “copyright compliance mechanism,” including how it was connected to various parts of the system, how it functioned, and its potential functional components, was insufficient to define limitation in specific structural terms to render it a non-means-plus-function term). Forescout thus has failed to point to sufficient structure of the “earmark provisioning module.” 23 Contrary to the specification, Forescout’s counsel also suggested that the “[ear]mark 24 database” was the structure for the “earmark provisioning module” at the claim construction 25 hearing. (9/30/22 Hrg. Tr. at 57:9-22.) The “[ear]mark database” corresponds to box 28 in Figure 26 1, while the “[ear]mark provisioning module” corresponds to box 22 in the same figure. 27 (Compare ’489 patent at 5:22, 5:28 with id. at 4:57, 4:61, 4:67, 5:3-4, 5:12-13.) Hence, the 28 13 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 14 of 58 1 “[ear]mark database” is distinct from the “[ear]mark provisioning module.” Because “earmark provisioning module” does not connote sufficiently definite structure, it 2 3 is a means-plus-function term subject to § 112 ¶ 6. The Court next performs the second step to 4 determine the structure corresponding to the claimed function. iii. 5 And Is Therefore Indefinite 6 The claimed function of “earmark provisioning module” is to provide earmarks. The 7 8 parties generally agree that the term means “a module that provisions earmarks.” (Shamos Decl. 9 at ¶ 36; Cole Decl. at ¶ 29 (“[T]he plain meaning of [earmark provisioning module] recites a 10 module that creates earmarks.”).) Next, the Court needs to “determine what structure, if any, disclosed in the specification 11 United States District Court Northern District of California “Earmark Provisioning Module” Lacks Corresponding Structure 12 corresponds to the claimed function.” Rain Computing, 989 F.3d at 1007. “If the function is 13 performed by a general-purpose computer or microprocessor, then the second step generally 14 further requires that the specification disclose the algorithm that the computer performs to 15 accomplish that function.” Id. Here, the specification does not disclose a structure corresponding to the claimed function. 16 17 It only describes that the module provides marks3 “according to techniques which matches the 18 probing method used by unauthorized users to gather information,” without explaining what those 19 techniques are. (’489 patent at 5:4-6.) It refers to the “mark provisioning method” in a single 20 black box in a figure. (Id. at Fig. 1.) Although the specification describes that modules—including the earmark provisioning 21 22 module—“are installed on protected network” and “may be implemented as software, firmware, 23 hardware or a combination thereof,” it does not disclose an algorithm to achieve the claimed 24 function of provisioning or creating earmark function. (’489 patent at 4:49-54.) In Rain 25 Computing, the Federal Circuit found the claim limitation “user identification module” to be an 26 27 28 “Earmark” does not appear anywhere in the specification, but the specification refers to “marks.” Forescout contends that those are substitutes for each other. Fortinet agrees that the “earmark” of the claims may be a type of “mark.” (Fortinet Br. at 6.) The Court therefore treats “earmarks” as interchangeable with “marks.” 14 3 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 15 of 58 1 indefinite means-plus-function term. 989 F.3d at 1008. The specification provided structural 2 examples of “computer-readable media or storage device[s]” that were linked to the function of 3 the “user identification module”—much like the firmware and hardware disclosed here. Id. at 4 1007–08. But the court found them insufficient without an algorithm to achieve the claimed 5 function. Id. The court highlighted that the fact that the “user identification module” includes 6 software algorithms, as is the case here. Id. at 1008. United States District Court Northern District of California 7 Likewise, in Advanced Ground Info. Sys., the Federal Circuit found indefinite “signal 8 generator,” when the specification generally described that a signal was generated from certain 9 databases—similar to the “mark database” in Figure 1 of the ’489 patent—without disclosing an 10 algorithm. 830 F.3d at 1349. The court found it not enough to “only address[] the medium 11 through which the symbols are generated,” and not the means of doing so. Id. Here too, the ’489 12 patent only discloses the database through which the earmarks are generated, but not the means of 13 doing so. 14 Accordingly, the specification of the ’489 patent fails to disclose any structure 15 corresponding to the recited function of “earmark provisioning module.” The asserted claims 16 containing this term are thus indefinite under 35 U.S.C. § 112, ¶ 2, and claim 15 is therefore 17 invalid. 18 2. “Said Intruder Source Address” 19 20 21 Fortinet’s Proposal “said intruder source address” (claim 1) Indefinite Forescout’s Proposal The source address indicated in limitation (f) Court’s Construction The source address indicated in limitation (f) 22 23 Claim 1 recites: 25 1. A method for detecting and handling a communication from an unauthorized source on a network, the method comprising the steps of: 26 (a) receiving the communication from the unauthorized source; 27 (b) analyzing the communication for detecting an information gathering procedure; 24 28 15 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 16 of 58 1 2 3 4 5 6 7 8 9 United States District Court Northern District of California 10 (c) if said information-gathering procedure is detected, indicating a source address of the communication as a suspected network reconnaissance collector; (d) returning an earmark to said suspected reconnaissance collector, such that said earmark includes specially crafted false data, and such that said earmark includes data that can serve to identify an unauthorized source; (e) analyzing each subsequent communication for a presence of said earmark; (f) if said earmark is present, indicating source address of the communication as a suspected network reconnaissance collector, and (g) if said source address is said intruder source address, applying intrusion handling procedures towards the communication from said intruder source address. 11 (’489 patent at claim 1 (emphasis added).) Fortinet argues that the disputed term is indefinite 12 because one cannot discern with reasonable certainty whether the “source address” refers to that in 13 limitation (c) or (f). Forescout responds that “source address” refers to that in limitation (f). 14 “A claim is indefinite when it contains words or phrases where the meaning is unclear, 15 which may be the result of the lack of an antecedent basis.” In re Downing, 754 F. App’x 988, 16 996 (Fed. Cir. 2018) (citing In re Packard, 751 F.3d 1307, 1310, 1314 (Fed. Cir. 2014)). “But the 17 lack of an antecedent basis does not render a claim indefinite as long as the claim apprises one of 18 ordinary skill in the art of its scope and, therefore, serves the notice function required by § 112 ¶ 19 2.” Id. (cleaned up). “Whether th[e] claim, despite lack of explicit antecedent basis for [‘intruder 20 source address,’] nonetheless has a reasonably ascertainable meaning must be decided in context.” 21 Energizer Holdings, Inc. v. Int’l Trade Comm’n, 435 F.3d 1366, 1370 (Fed. Cir. 2006). 22 Here, “said intruder source address” lacks an antecedent basis. The parties agree that “said 23 intruder source address” refers to the “source address” in either step (c) or step (f). (Forescout 24 Resp. at 13; Fortinet Reply at 3.) The Court therefore determines whether the context informs a 25 POSITA to which “source address” the term refers. 26 Claim Language. The claim language indicates that “said intruder source address” refers 27 to the “source address” in limitation (f). The claimed method is directed to “detecting and 28 handling a communication from an unauthorized source.” (’489 patent at claim 1.) To 16 United States District Court Northern District of California Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 17 of 58 1 accomplish that, Forescout’s expert, Dr. Cole, explains, the claimed invention indicates a “source 2 address” as a “suspected network reconnaissance collector” that seeks to gather information in 3 step (c). (Cole Decl. at ¶ 38.) In response, the invention “return[s] an earmark” to the “suspected 4 reconnaissance collector.” (Id.) Steps (e) and (f) identify the source address of the device that 5 sends the earmark, indicating that device as an intruder. (Id.) Using that identified address, step 6 (g) applies the intrusion-handling procedures if “said source address” from step (c) (the address of 7 the suspect) matches “said intruder source address” from step (f) (the address of the intruder who 8 attempted to use the earmark). (Id.) It may be argued that Forescout’s reading would render 9 meaningless the phrase “indicating source address of the communication as a suspected network 10 reconnaissance collector” in step (f). But reading it otherwise would render redundant steps (d), 11 (e), and (f), steps substantial and seemingly central to the patent. On balance, it is more logical to 12 interpret “said intruder source address” as referring to “the source address” indicated in step (f). 13 Specification. The specification supports Forescout’s interpretation. In response to 14 “probes,” i.e., information gathering, from unauthorized source 20, [ear]mark provisioning module 15 22 provides an earmark to it. (’489 patent at 4:61-5:6.) In subsequent communications from that 16 source, intrusion detection module 24 analyzes whether the communications include the earmark. 17 (Id. at 5:14-24.) Once the earmark is identified, “unauthorized source 20 is registered in an 18 intruder database 30,” including its source address or “other intruder identifying factor.” (Id. at 19 5:24-28.) 20 Figure 2, a flowchart of an exemplary method for probe and intrusion detection, also 21 reflects this process. (Id. at 5:61-62.) Step 1 in Figure 2 corresponds to step (a) in claim 1— 22 receiving the communication from an unauthorized source. (Id. at 6:6-7.) Next, the information is 23 analyzed for “scan detection,” i.e., information gathering, as in claim 1’s step (b). (Id. at 6:7-8.) 24 Once information gathering has been detected, an earmark is returned to the unauthorized source 25 which is also added to the intruder database. (Id. at 6:28-31.) “[I]f the source address is found in 26 the intruder database . . . the unauthorized source of the packet is proactively handled as described 27 with regard to FIG. 3.” (Id. at 6:57-60.) 28 17 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 18 of 58 1 2 3 4 5 6 7 8 9 10 United States District Court Northern District of California 11 12 13 14 15 16 17 18 19 20 21 22 23 24 (Id. at Fig. 2.) 25 If “said intruder source address” in step (g) refers to “source address” in step (c), the 26 method teaches “applying intrusion handling procedures towards the communication” once 27 “information-gathering procedure is detected.” (Id. at claim 1.) But that would ignore the 28 specification that describes “provid[ing] false information to unauthorized source 20” in response 18 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 19 of 58 1 to information gathering. (Id. at 4:61-5:6.) In contrast, if “said intruder source address” in step (g) 2 refers to “source address” in step (f), the method teaches “applying intrusion handling procedures 3 towards the communication” once an “earmark is present” in an unauthorized source’s subsequent 4 communication. (Id. at claim 1.) That reading is consistent with the specification where an 5 unauthorized source communicating an earmark would be added to an intruder database (id. at 6 6:28-31), and “if the source address is found in the intruder database . . . the unauthorized source 7 of the packet is proactively handled.” (Id. at 6:57-60.). In short, the specification supports that “said intruder source address” refers to the “source United States District Court Northern District of California 8 9 address” in limitation (f). Fortinet argues that referring to the specification is tantamount to 10 reading an embodiment into the claim. (Fortinet Reply at 3.) But Fortinet’s own authority 11 consulted the specification, and properly so. See Bushnell Hawthorne, LLC v. Cisco Sys., 813 F. 12 App’x 522, 527 (Fed. Cir. 2020) (finding “said different IP Address” indefinite where 13 specification provided several potential interpretations of “different IP Address”). Prosecution history. The prosecution history does not shed much light on the meaning of 14 15 “said intruder source address.” After the patent issued, the patentee sought correction to provide 16 antecedent basis to the disputed term. The Examiner rejected that request, but provided no 17 reasoning. 18 On balance, the broader context suggests that a POSITA would have understood the 19 antecedent basis of “said intruder source address” to refer to the “source address” in limitation (f). 20 C. 21 U.S. Patent Nos. 8,590,004 (the “’004 patent”) and 9,027,079 (the “’079 patent”) 1. “Dynamic Security Policy” 22 23 24 25 Fortinet’s Proposal “dynamic security policy” (’004 patent Indefinite claim 10; ’079 patent claim 10) Forescout’s Proposal Court’s Construction Plain and ordinary meaning Plain and ordinary meaning 26 The ’004 patent is directed to a method and system for controlling access to a computer 27 network. (’004 patent at Abstract.) They do so by authenticating, and granting a certain access 28 level to, an access point. (Id.) The ’004 patent shares a common specification with its 19 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 20 of 58 1 2 3 4 5 6 10. A method for regulating access to resources on a data network comprising: receiving authentication credentials from an access point through which the client is attempting to connect to network resources; retrieving data from an authentication server; 11 retrieving data from a Dynamic Security Data & Policy Database (DSDPD), which DSDPD includes rules indicating network resource access provisions to be applied to a given client device based on: (1) data received from the given client device indicating the compliance of the given client device with specific security policies and (2) security information said DSDPD retrieves from a network security and monitoring system (NSMS), wherein said NSMS monitors a history of network resource access authorization requests, which history includes: 12 (a) identities of parties who requested authorizations; and 13 (b) results of the authorization requests; 14 processing the retrieved data from the authentication server and the DSDPD, wherein said processing is computed according to a dynamic security policy; and 7 8 9 10 United States District Court Northern District of California continuation—the ’079 patent. The relevant claims recite: 15 16 17 18 19 20 21 22 23 24 25 26 27 28 sending a response to the network access point based on the processing of the retrieved data. (’004 patent at claim 10 (emphasis added).) 10. A method for regulating access via access points to resources on a data network, said method comprising: receiving authentication credentials from an access point through which a device is attempting to connect to network resources; retrieving data from an authentication server; retrieving data from a Dynamic Security Data & Policy Database (DSDPD), which DSDPD includes rules indicating network resource access provisions to be applied to a given device based on: (1) compliance of the given device with specific security policies and (2) security information said DSDPD retrieves from a network security and monitoring system (NSMS) comprising processing circuitry communicatively coupled to the network and configured to monitor access of end systems to the network via one or more access points; 20 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 21 of 58 1 2 3 4 5 6 7 8 9 10 United States District Court Northern District of California 11 performing a first processing of the retrieved data from the authentication server and the DSDPD, wherein said first processing is computed according to a dynamic security policy; and sending a response to the network access point granting the first device quarantined access to the network, based on the processing of the retrieved data; performing further compliance testing of the first device via the quarantined access; re-determining access to network resources to be granted to the first device based on results of the further compliance testing and a second processing of the retrieved data from the authentication server and the DSDPD. (’079 patent at claim 10 (emphasis added).) Fortinet contends that “dynamic security policy” is indefinite because the specifications do 12 not explain what is “dynamic” about the security policy. (Fortinet Br. at 8–9.) Specifically, it 13 argues that Forescout, through its expert, offers several definitions of “dynamic” and that those 14 definitions are highly subjective. (Id. at 9–10.) The Court disagrees. 15 First, although the specifications do not expressly define “dynamic security policy,” a 16 POSITA may ascertain its meaning from that of individual words. See Bancorp Services, L.L.C. v. 17 Hartford Life Ins. Co., 359 F.3d 1367, 1372 (Fed. Cir. 2004) (declining to find term indefinite 18 where “the components of the term have well-recognized meanings, which allow the reader to 19 infer the meaning of the entire phrase with reasonable confidence”). The parties agree that 20 “security policy” by itself is likely meaningful. (Shamos Decl. at ¶ 56; Cole Decl. at ¶ 56.) 21 Fortinet’s expert, Dr. Shamos, does not dispute that “dynamic” has several well-known 22 meanings but explains that each meaning covers a different scope. (Shamos Decl. at ¶ 56.) 23 Forescout’s expert, Dr. Cole, responds that the specifications and prosecution history support and 24 provide guidance on the term’s broad scope: a security policy may be “dynamic” by accounting 25 for changes to a device’s network provisions based on changes to that device’s security policy 26 compliance (Cole Decl. at ¶¶ 56, 57 (citing ’004 patent at claim 1, 3:40-44, 9:60-10:6, ’079 patent 27 at 3:62-66, 10:15-28, Resp. to Office Action of Oct. 6, 2011)); it may be “dynamic” by requiring 28 updates responding to the ever-changing nature of cyber security (id. (citing ’004 patent at 3:5521 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 22 of 58 1 2 “[B]readth is not indefiniteness.” BASF, 875 F.3d at 1367. Fortinet has failed to show that 3 Forescout’s proposed construction, though broad, falls outside a reasonable range of 4 implementations that the claim language permits. See Capital Sec. Sys. v. NCR Corp., 725 F. 5 App’x 952, 957 (Fed. Cir. 2018) (holding “ascertains an apparent signature” not indefinite as 6 POSITA would understand scope to include all four implementations suggested by patentee’s 7 expert). 8 United States District Court Northern District of California 57, ’079 patent at 7:61-63)). Second, the term “dynamic” is neither a term of degree nor a purely subjective claim 9 phrase. Although a security policy may be “dynamic” in several ways, Fortinet has not provided 10 evidence that whether it is considered dynamic “depends on the unpredictable vagaries of any one 11 person’s opinion.” Interval Licensing, 766 F.3d at 1371 (internal quotation marks and citation 12 omitted). 13 14 15 In sum, Fortinet has not shown clear and convincing evidence that “dynamic security policy” is indefinite. 2. “Dynamic Security Data & Policy Database” 16 17 18 Fortinet’s Proposal “Dynamic Security Data & Policy Database” Indefinite Forescout’s Proposal Court’s Construction Plain and ordinary meaning Plain and ordinary meaning 19 20 Fortinet contends “Dynamic Security Data & Policy Database” to be indefinite for two 21 reasons: (1) the term does not make clear what is “dynamic” about the component; (2) the claim 22 language and specification fail to recite sufficient structure, invoking § 112 ¶ 6 and rendering the 23 claim indefinite. (Fortinet Reply at 6.) The Court disagrees with the first reason as explained 24 above. For the reasons below, the second reason also fails. 25 Absent the term “means,” “Dynamic Security Data & Policy Database” is presumed not to 26 be a means-plus-function limitation. See Dyfan, 28 F.4th at 1365. Fortinet may overcome that 27 presumption by showing that the limitation “fails to recite sufficiently definite structure.” Id. 28 (internal quotation marks and citation omitted). It argues that “database” imparts insufficient 22 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 23 of 58 1 structure to perform the claimed functions, including “storing data,” “being ‘dynamic,’” and 2 “‘retriev[ing]’ security information from other components.” (Fortinet Br. at 11–12.) Fortinet has 3 failed to overcome that presumption here. United States District Court Northern District of California 4 The term “Dynamic Security Data & Policy Database” does not have an obvious claimed 5 function. The claim language simply describes what the database stores and how it operates— 6 namely, it stores rules that specify network access provisions and security policies. (See, e.g., 7 ’004 patent at claim 1 (“a Dynamic Security Data & Policy Database (DSDPD), which DSDPD 8 includes rules indicating network resource access provisions to be applied to a given client 9 device”).) “Without an identified function, the term ‘means’ in [a] claim cannot invoke 35 U.S.C. 10 § 112, ¶ 6.” York Prod., 99 F.3d at 1574. This is more so here where the term does not recite 11 “means.” Cf. Microchip Tech., 2020 WL 978636, at *11–*12 (finding “port control module” not 12 means-plus-function limitation term where claim did not recite any function of said module). 13 The two cases cited by Fortinet are distinguishable because their disputed terms clearly 14 have claimed functions. See Egenera, Inc. v. Cisco Sys., 972 F.3d 1367, 1370 (Fed. Cir. 2020) 15 (finding claim language “configuration logic for receiving and responding to said software 16 commands” clearly identified claimed function as the portion after the word “for”); Synchronoss 17 Techs., Inc. v. Dropbox, Inc., 987 F.3d 1358, 1367 (Fed. Cir. 2021) (noting claimed function of 18 “user identifier module” was “identifying a user”). 19 20 21 In sum, Fortinet did not overcome the presumption that “Dynamic Security Data & Policy Database” is not a means-plus-function term. The plain and ordinary meaning governs. 3. “Dynamic Security Authentication Service Server” 22 Fortinet’s Proposal 23 24 25 26 27 28 “Dynamic Security Authentication Service Server” (’079 patent at claims 1, 18, 20) Forescout’s Proposal Plain and ordinary meaning Indefinite Court’s Construction Plain and ordinary meaning The relevant claims recite: 1. A data network access security system for regulating access via 23 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 24 of 58 1 2 3 4 5 6 7 8 9 10 United States District Court Northern District of California 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 access points to resources on a data network, said system comprising: a network security and monitoring system (NSMS) comprising processing circuitry communicatively coupled to the network and configured to monitor access of end systems to the network via one or more access points, wherein an access point is any network device adapted to provide computational devices access to the network; and a Dynamic Security Authentication Service Server (DSASS) comprising processing circuitry communicatively coupled to the network, the one or more access points, said NSMS and an authentication server external to said DSASS, said DSASS including: a Dynamic Security Data & Policy Database (DSDPD), which DSDPD includes rules indicating network resource access provisions to be applied to a given device based on: (a) compliance of the given device with specific security policies; (b) security information received from said NSMS and (c) authentication information received from the authentication server an access policy module adapted to: (1) receive authentication credentials of a user, from an access point through which the user is attempting to connect to network resources using a first device, (2) cause the access point to initially grant the first device quarantined access to the network based on (i) data received from the authentication server in relation to the authentication credentials and (ii) compliance data associated with the first device received from said DSDPD; (3) after the first device has been granted quarantined access, facilitate further compliance testing of the first device via the quarantined access; (4) determine access to network resources to be granted to the first device based on results of the further compliance testing and the data received from: (i) the authentication server external to said DSASS and (ii) said DSDPD; and (5) cause the access point to grant the first device the determined access to the network resources. (’079 patent at claim 1 (emphasis added).) 18. A data network access security system for regulating access via access points to resources on a data network, said system comprising: 24 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 25 of 58 1 2 3 4 5 6 7 8 9 10 United States District Court Northern District of California 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 a network security and monitoring system (NSMS) comprising processing circuitry communicatively coupled to the network and configured to monitor access of end systems to the network via one or more access points; and a Dynamic Security Authentication Service Server (DSASS) comprising processing circuitry communicatively coupled to the network, the one or more access points, said NSMS and an authentication server external to said DSASS, said DSASS including: a Dynamic Security Data & Policy Database (DSDPD), which DSDPD includes rules indicating network resource access provisions to be applied to a given device based on: (a) compliance of the given device with specific security policies; (b) security information received from said NSMS and (c) authentication information received from the authentication server external to said DSASS; an access policy module adapted to: (1) receive authentication credentials of a user, from an access point through which the user is attempting to connect to network resources using a first device, (2) cause the access point to initially grant the first device quarantined access to the network based on data received from: (i) the authentication server external to said DSASS and (ii) said DSDPD; (3) after the first device has been granted quarantined access, facilitate compliance testing of the first device via the quarantined access; (4) determine access to network resources to be granted to the first device based on results of the compliance testing and the data received from: (i) the authentication server external to said DSASS and (ii) said DSDPD; and (5) cause the access point to grant the first device the determined access to the network resources. (Id. at claim 18 (emphasis added).) 20. The system according to claim 18, wherein said DSASS is a Dynamic Security Authentication Service Proxy Server. (Id. at claim 20 (emphasis added).) Fortinet argues that “Dynamic Security Authentication Service Server” (“DSASS”) is 27 indefinite for several reasons. None are persuasive. First, Fortinet argues that this term invokes § 28 112 paragraph 6 without any corresponding structure in the specification. (Fortinet Reply at 7.) 25 United States District Court Northern District of California Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 26 of 58 1 “Dynamic Security Authentication Service Server” does not recite “means,” so Fortinet must 2 overcome the presumption that it is not a means-plus-function term. See Dyfan, 28 F.4th at 1365. 3 It has not done so here. At the outset, both parties’ experts agree that a POSITA would understand 4 the term to connote the structure of a server. (Shamos Decl. at ¶ 63 (“I believe a POSITA would 5 interpret ‘Dynamic Security Authentication Service Server’ as a server that provides ‘Dynamic 6 Security Authentication Service.’”); Cole Decl. at ¶ 63.) Moreover, claims 1 and 18 of the ’079 7 patent define DSASS to “compris[e] processing circuitry communicatively coupled to the 8 network, the one or more access points” and includes “a Dynamic Security Data & Policy 9 Database” and “an access policy module.” Although Fortinet’s expert, Dr. Shamos, finds this 10 term ambiguous because of the word “dynamic,” he does not opine that the term lacks structure. 11 (See Shamos Decl. at ¶¶ 58-63.) Fortinet thus has not overcome the presumption that DSASS is 12 not a means-plus-function term. Second, Fortinet appears to argue that DSASS is indefinite because this patentee-coined 13 14 term does not appear anywhere in the specification. (Fortinet Reply at 7–8.) “There is no 15 requirement that the words in the claim must match those in the specification disclosure.” In re 16 Skvorecz, 580 F.3d 1262, 1268–69 (Fed. Cir. 2009) (quoting MPEP § 2173.05(e)). The claim 17 language itself defines the components of DSASS. And Fortinet’s own expert appears to 18 understand its meaning. (See Shamos Decl. at ¶ 63 (“I believe a POSITA would interpret 19 ‘Dynamic Security Authentication Service Server’ as a server that provides ‘Dynamic Security 20 Authentication Service.’ . . . I believe a POSITA would find ‘Security Authentication Service’ to 21 likely refer to an ‘authentication service for computer security[.]’”).) Therefore, Fortinet has not 22 shown by clear and convincing evidence that the term is so “insolubly ambiguous” as to render it 23 indefinite. Nautilus, 572 U.S. at 911. Finally, Fortinet again takes issue with the term “dynamic.” (Fortinet Reply at 7–8.) For 24 25 the same reason explained above, “dynamic” does not render this limitation indefinite. 26 /// 27 /// 28 /// 26 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 27 of 58 1 D. U.S. Patent No. 10,530,764 (the “’764 patent”) 2 3 4 5 6 Fortinet’s Proposal “corporate device” (claim 1) Indefinite Forescout’s Proposal Plain and ordinary meaning Court’s Construction “authorized device” Claim 1 recites: 1. A system comprising: 7 a memory; and 8 a processing device operatively coupled to the memory, the processing device to: 9 10 United States District Court Northern District of California 11 detect a connection of an endpoint device at a network switch coupled to a network; 12 restrict access of the endpoint device to prevent the endpoint device from accessing resources of the network by applying a VLAN assignment to the network switch; 13 establish a connection with the endpoint device; 14 validate a client certificate corresponding to the endpoint device to authenticate the endpoint device as a corporate device, wherein to validate the client certificate, the processing device to: 15 16 17 18 19 20 21 receive the client certificate from the endpoint device, the client certificate comprising a subject name, a client public key and a digital signature of the client public key by a certificate authority; retrieve a certificate authority certificate from the certificate authority, the certificate authority certificate comprising a certificate public key; verify the digital signature of the client public key using the certificate authority public key; and 22 verify the subject name using the client public key; and 23 24 25 26 grant the endpoint device access to the resources of the network. (’764 patent at claim 1 (emphasis added).) Fortinet argues that the term “corporate device” is indefinite “because it is fatally 27 ambiguous.” (Fortinet Br. at 16.) In Fortinet’s primary authority, the claim found to be indefinite 28 recites a step of displaying an image or images “in an unobtrusive manner.” Interval Licensing, 27 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 28 of 58 1 766 F.3d at 1368. The Federal Circuit first found the phrase “unobtrusive manner” “highly 2 subjective and, on its face, provides little guidance to one of skill in the art.” Id. at 1371. After 3 finding the term “purely subjective,” the court looked to the written description for guidance. Id. 4 The specification at issue included multiple embodiments, but it was unclear as to which 5 embodiment the phrase related. Id. at 1373. The court found that even taking a narrow view of the 6 specification and assuming that the phrase applied to only one of the embodiments, the lone 7 example in the specification left the skilled artisan “to wonder what other forms of display are 8 unobtrusive and non-distracting.” Id. A POSITA is left “to consult the unpredictable vagaries of 9 any one person’s opinion.” Id. (quotation omitted). Unlike the term “unobtrusive manner,” “corporate device” is not “highly subjective” on its United States District Court Northern District of California 10 11 face subject to “vagaries of any one person’s opinion.” Id. Pointing to claim language, Dr. Cole, 12 Forescout’s expert, opines that “a POSITA would have recognized that a ‘corporate device’ is an 13 ‘endpoint device’ that has been successfully authenticated” in accordance with the rest of the 14 method. (Cole Decl. at ¶ 70.) That is because, he explains, the claim so distinguishes between a 15 “corporate device” and other end point devices. (Id.; ’764 patent at claim 1 (“validate a client 16 certificate corresponding to the endpoint device to authenticate the endpoint device as a corporate 17 device”).) The specification confirms that a “corporate device” is an authenticated device. The 18 19 specification recites, “NAC agent interface 215 may receive a client certificate from NAC agent 20 112, which may be used to authenticate endpoint device 110 and determine whether endpoint 21 device 110 is a corporate device.” (’764 patent at 5:29-32.) Forescout’s expert, Dr. Cole, explains 22 that “NAC agents use claimed certificates to authenticate endpoint devices to determine whether 23 they are a corporate device or not.” (Cole Decl. at ¶ 71.) Similarly, the specification distinguishes 24 between “corporate devices” and “unauthorized devices” (’764 patent at 1:51-62), as well as 25 between “corporate devices and “rogue device” (id. at 2:60-63). Thus, the specification teaches 26 that a “corporate device” is an “authorized device,” rather than an “unauthorized” or “rogue” 27 device. 28 Fortinet argues that Forescout’s interpretation would effectively read out the phrase “as a 28 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 29 of 58 1 corporate device” from the claim, requiring only the validation of the certificate. (Fortinet Br. at 2 16–17; Fortinet Reply at 9.) But “surplusage may exist in some claims,” ERBE Elektromedizin 3 GmbH v. Canady Tech. LLC, 629 F.3d 1278, 1286 (Fed. Cir. 2010), and thus the mere fact that 4 this claim may involve surplusage does not render the disputed term indefinite. Fortinet also points to certain prosecution history to argue that a “corporate device” cannot United States District Court Northern District of California 5 6 simply mean any authenticated device. During prosecution, the applicant distinguished prior art 7 for failing to disclose the “authenticate the endpoint device as a corporate device” limitation. (Ex. 8 F at 202.) The applicant did not explain why, but the prior art appears to concern “user 9 authentication” as opposed to device authentication. (Id. (prior art describing “VPN handler 68 10 uses the selected certificate for user authentication . . .”).) The Court’s construction therefore does 11 not contradict the prosecution history. In sum, Fortinet has not shown by clear and convincing evidence that “corporate device” is 12 13 indefinite and the Court construes it as “authorized device.” 14 E. 15 16 17 18 19 U.S. Patent No. 10,652,116 (the “’116 patent”) Fortinet’s Proposal “determine a device type classification” Indefinite (claim 11) Forescout’s Proposal Court’s Construction Plain and ordinary meaning Plain and ordinary meaning Claim 11 of the ’116 patent recites, 11. A system comprising: 20 a memory; and 21 a processing device, operatively coupled to the memory, to: 22 23 24 access data associated with a device, wherein the data associated with the device comprises traffic analysis data associated with the device and data received from an external system; 25 periodically determine a device type classification for the device based on the data associated with device; and 26 store the device type classification for the device; and 27 apply a security policy to classified device based on the device meeting particular criteria of the security policy. 28 29 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 30 of 58 1 United States District Court Northern District of California 2 (’116 patent at claim 11 (emphasis added).) Fortinet argues that “determine a device type classification” is indefinite for two reasons. 3 First, Fortinet contends that the term does not define what a “device type” classification is, how it 4 differs from “a classification for the device” in claim 1, and what distinguishes a categorization 5 into groups that are based upon “device type” from groups that are not. Forescout responds that a 6 POSITA would understand the meaning and scope of the term based on the plain meaning of each 7 word individually, and the specification provides examples of classifying devices into groups 8 based on the types of devices. 9 The term “determine a device type classification” has a plain and ordinary meaning. 10 Fortinet’s expert opines—and Forescout’s expert offers no contrary testimony—that each word in 11 the claim term has a well-understood meaning to a POSITA. (Cole Decl. at ¶ 77.) 12 13 14 Moreover, the specification explains that devices may be classified into “groups based on types of devices”: 18 A device classification heuristic may be used to classify devices into different groups. . . . The groups may be based on types of devices. For example, one group may be for devices that have a particular operating system, a second group for medical devices (e.g., a magnetic resonance imaging (MRI) device, a X-ray device, or computed tomography (CT) scanning device), and a third group for operational technology devices (e.g., device configured to detect or cause changes in physical processes through direct monitoring or control of physical devices such as valves, pumps, etc.). 19 (’116 patent at 3:59-4:7.) The specification also describes that a device type might be grouped by 20 how the device is connected to the network, such as by Ethernet or wireless connections: 15 16 17 21 22 23 24 While it may be possible to determine certain types of identifying information (e.g., IP address, MAC address, etc.) with respect to many types of network-connected devices (e.g., those connected via a Ethernet connection or Wi-Fi™), in certain scenarios it may be difficult to determine with a high degree of accuracy certain characteristics of a particular device (e.g., whether such a device is an access point) and thereby classify the device. 25 (Id. at 2:9-17 (emphasis added).) “Because the intrinsic evidence here provides a general 26 guideline and examples sufficient to enable a person of ordinary skill in the art to determine the 27 scope of the claims . . . the claims are not indefinite.” Enzo Biochem, Inc. v. Applera Corp., 599 28 F.3d 1325, 1335 (Fed. Cir. 2010) (citation and quotation marks omitted). 30 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 31 of 58 United States District Court Northern District of California 1 Fortinet argues that “a device type classification” cannot simply refer to the classification 2 of device types under its ordinary meaning. According to Fortinet, claim differentiation mandates 3 that the disputed “a device type classification” in claim 11 must have a different meaning from “a 4 classification for the device” in claim 1—another independent claim. Forescout responds that the 5 patent does not have to “expressly define what is and is not a device type.” (Forescout Resp. at 8.) 6 Fortinet fails to show that claim differentiation applies. “‘[C]laim differentiation’ refers to 7 the presumption that an independent claim should not be construed as requiring a limitation added 8 by a dependent claim.” Curtiss-Wright Flow Control Corp. v. Velan, Inc., 438 F.3d 1374, 1380 9 (Fed. Cir. 2006). The Federal Circuit “has declined to apply the doctrine of claim differentiation 10 where ‘the claims are not otherwise identical in scope.’” Apple, Inc. v. Ameranth, Inc., 842 F.3d 11 1229, 1238 (Fed. Cir. 2016) (quoting Indacon, Inc. v. Facebook, Inc., 824 F.3d 1352, 1358 (Fed. 12 Cir. 2016)). Fortinet does not contend that claim 1—an independent method claim—has the same 13 scope as claim 11—an independent system claim. Fortinet’s sole authority construed a term in an 14 independent claim using dependent claims. Karlin Tech., Inc. v. Surgical Dynamics, Inc., 177 15 F.3d 968, 972 (Fed. Cir. 1999). That is not the case here, as both claims 1 and 11 are independent 16 claims. Claim differentiation therefore does not apply. 17 Fortinet similarly points to the specification to argue that “classification for a/the device” 18 must have a different meaning from “device type classification.” (Fortinet Br. at 18.) The 19 specification has indeed used both terms in the same paragraph: 20 21 22 23 24 Classification determiner 308 is configured to determine a classification of a device based on information received from one or more components (e.g., third party interface 302, agent interface 304, traffic analyzer 306, classification determiner 308, device interface 310, and network interface 312) of system 300, as described herein. Classification determiner 308 may further store a device type classification of the device. Classification determiner 308 may be configured to determine the device type classification of the device periodically. 25 (’116 patent at 8:44-53 (emphasis added).) Fortinet’s expert opines that “classification of the 26 device” must have a different meaning from “device type classification” because the classification 27 determiner 308 is configured to determine both. (Shamos Decl. at ¶ 72.) But that part of the 28 specification could be consistent with the opposite conclusion that the terms mean the same 31 United States District Court Northern District of California Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 32 of 58 1 throughout that paragraph. Assuming the two “classification” terms are synonymous, the 2 specification simply describes that the classification determiner 308 can be configured to (1) 3 determine “a classification of a device” (or, synonymously, “device type classification”) (’116 4 patent at 8:44-45), (2) store that determination (id. at 8:49-50), and (3) determine that 5 classification periodically (id. at 51-53 (emphasis added)). The specification therefore does not 6 support Fortinet’s argument that “device type classification” cannot mean “classification for a/the 7 device.” 8 Additionally, Fortinet argues that “the patent leaves unclear what distinguishes a 9 categorization into groups that are based upon ‘device type’ from groups that are not.” (Fortinet 10 Br. at 18.) Forescout contends that “a type of device is essentially the group that it belongs to.” 11 (9/30/22 Hrg. Tr. at 84:11-12.) Forescout’s contention is consistent with the Court’s construction. Second, Fortinet argues that the disputed term “is a pure recitation of function, with the 12 13 closest potential structure being a generic ‘processing device,’ invoking § 112(f), and the 14 specification lacks the disclosure of an algorithm for how this device type classification is made.” 15 (Fortinet Reply at 10.) In effect, Fortinet argues that a different term—“processing device”—is an 16 indefinite means-plus-function term. Forescout points out that Fortinet did not elect “processing 17 device” for the Court to construe. The Court agrees and does not construe it herein. 18 F. 19 20 U.S. Patent No. 10,652,278 (the “’278 patent”) 1. “Standard Based Compliance Rule” Fortinet’s Proposal 22 “standard based compliance rule” Indefinite (claim 1) 23 Claim 1 recites, 21 Forescout’s Proposal Plain and ordinary meaning Court’s construction Plain and ordinary meaning 24 1. A method comprising: 25 detecting, by a compliance monitoring device, a device coupled to a network in response to the device being coupled to the network; 26 27 determining a classification of the device based on traffic information associated with the device; 28 accessing a compliance rule based on the classification of the 32 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 33 of 58 1 2 3 4 5 6 performing, by a processing device of the compliance monitoring device, a compliance scan on the device based on the compliance rule; determining a compliance level of the device based on a result of the compliance scan of the device; and performing an action based on the compliance level. 7 (’278 patent at claim 1 (emphasis added).) Fortinet argues that “standard based compliance rule” 8 is indefinite because the term leaves open (1) what it means to be “based on a standard” and (2) 9 what a “standard” is. (Fortinet Reply at 11.) Neither argument is persuasive. 10 United States District Court Northern District of California device, wherein the compliance rule is a standard based compliance rule; Fortinet first argues that it is unclear whether “standard based” “requires the rule to be 11 defined in a language that is standardized, or to be implementing a rule that is described in a 12 standard.” (Fortinet Reply at 11 (emphasis in original).) Fortinet refers to the definition of 13 SCAP—an example of a “standard based compliance rules” (’278 patent at 2:28-31): 14 15 16 SCAP is a set of open standard XML based languages for writing configuration benchmarks for computing devices. SCAP can also be used to create a benchmark of vulnerabilities that devices should not contain. 17 (Id. at 2:21-24.) “SCAP rules” is the only example of “standard based compliance rules” 18 described in the specification. (See id. at 2:28-31 (“[A] device communicatively coupled to a 19 network can be scanned using standard based compliance rules (e.g., SCAP rules) and a 20 compliance level is computed.”).) 21 The specification, viewed as a whole, suggests that a “standard based compliance rule” is 22 one implementing a standard, rather than a rule written in a standardized language. First, the ’278 23 patent—directed to “checking device compliance and remediation of device compliance issues” 24 (id. at 1:7-8)—does not concern the computer language in which one writes a compliance rule. 25 Second, the specification describes “perform[ing] compliance checks according to compliance 26 rules of the compliance benchmark,” (id. at 2:59-60), indicating that a “standard based compliance 27 rule” is akin to a “benchmark” based compliance rule. Such an understanding is consistent with 28 SCAP’s purpose of creating “benchmarks for computing devices.” (Id. at 2:21-24.) Put 33 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 34 of 58 1 differently, SCAP rules are “standard based compliance rules” because they are based on 2 benchmarks created by SCAP. Therefore, the claim and specification make clear that the term 3 does not refer to any standardized language, but rather a rule implementing a standard. Fortinet then argues that “there is no definitive way of telling what is and what is not a 4 5 standard.” (Fortinet Br. at 20 (quoting Shamos Decl. at ¶ 77).) Its expert, Dr. Shamos, explains 6 that the “process by which a set of rules becomes a ‘standard’ is undefined—some ‘standards’ 7 simply become de facto standards through common acceptance, although it is not clear exactly 8 when this occurs.” (Shamos Decl. at ¶ 77.) At the claim construction hearing, Forescout responds 9 that the “standard” in the disputed term “refers to industry standards.” (9/30/22 Hrg. Tr. at 35:14- 10 United States District Court Northern District of California 11 15.) Nothing in the claim or the specification limits the “standard” to an “industry standard” 12 and neither expert so opines. Forescout’s authorities do not help it. The disputed term in one case 13 cited by Forescout explicitly recited “industry standard” and no party asserted indefiniteness. E. 14 Digital Corp. v. New Dane, No. 13-CV-2897-H-BGS, 2014 WL 7139698, at *15 (S.D. Cal. Dec. 15 12, 2014) (construing “industry standard data storage format”). In the other case, the disputed 16 terms refer to various specific standards by name, such as USB, ADB, SCSI, and RS-232, and 17 standards from specific named organizations. See Hewlett-Packard Dev. Co., L.P. v. Gateway, 18 Inc., No. CIV. 04CV0613-BLSP, 2005 WL 6225388, at *1 (S.D. Cal. Sept. 7, 2005). 19 Nonetheless, the word “standard” has an ascertainable, ordinary meaning. Forescout’s 20 expert opines, and Fortinet’s expert does not dispute, that each word of the term has a well- 21 understood meaning to a POSITA. (Cole Decl. at ¶ 89.) Although different dictionaries offer 22 slightly varying definitions, all suggest that a “standard” refers to an agreed-upon protocol. (See 23 Dictionary of Computer Science (2016) (“A publicly available definition of a hardware or 24 software component, resulting from international, national, or industrial agreement.”); Newton’s 25 Telecom Dictionary (2016) (“standard . . . mean[s] something such as a specification established 26 as a yardstick, gauge, or criterion by authority, custom, or general consent”; “standards” means 27 “[a]n agreed-upon rule, regulation, protocol, dimension, interface and/or, technical 28 specification.”).) SCAP, an example of “standard based compliance rules” referred to the 34 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 35 of 58 1 specification, is consistent with that definition. It is an agreed-upon “secure content automation 2 protocol.” (’278 patent at 2:20-21; see also Security Content automation Protocol, Computer 3 Security Resource Center, National Institute of Standards and Technology, available at 4 https://csrc.nist.gov/projects/security-content-automation-protocol, last accessed on Nov. 22, 2022 5 (“The Security Content Automation Protocol (SCAP) is a synthesis of interoperable specifications 6 derived from community ideas.”).) A POSITA therefore can determine the scope of the invention 7 with reasonable certainty. See Bancorp, 359 F.3d at 1372 (declining to find term indefinite where 8 “the components of the term have well-recognized meanings, which allow the reader to infer the 9 meaning of the entire phrase with reasonable confidence”). United States District Court Northern District of California 10 Fortinet also argues that what constitutes “standard” may change with time. (Fortinet 11 Reply at 12.) In essence, Fortinet contends that the patent claim may cover a standard not 12 disclosed or even contemplated in the patent. Forescout responds that the natural evolution of 13 standards does not render the term indefinite, much like how the scope of “computing devices” 14 changes over time. (Forescout Sur-reply at 7.) Although a “standard” may change with time, the 15 meaning of “standard based compliance rule” does not—it always refers to a compliance rule 16 based on an agreed-upon protocol. Fortinet’s sole authority is in apposite. In Meds. Co. v. Mylan, 17 Inc., the Federal Circuit rejected a construction where, in an ongoing commercial production 18 process, a competitor would not know whether it is consistently producing batches of the requisite 19 impurity until all future batches are produced. 853 F.3d 1296, 1303 (Fed. Cir. 2017). No such 20 ongoing process exists here. 21 22 23 In sum, Fortinet has not proven the disputed term to be indefinite by clear and convincing evidence. The Court accords “standard based compliance rule” its plain and ordinary meaning. 2. “Compliance Level” 24 25 26 27 28 “compliance level” (claim 1) Fortinet’s Proposal “quantitative score indicating the extent to which a device is in compliance with compliance rules” Forescout’s Proposal Plain and ordinary meaning 35 Court’s Construction Plain and ordinary meaning Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 36 of 58 1 2 1. A method comprising: 3 detecting, by a compliance monitoring device, a device coupled to a network in response to the device being coupled to the network; 4 5 6 7 8 9 10 11 United States District Court Northern District of California Claim 1 recites, 12 determining a classification of the device based on traffic information associated with the device; accessing a compliance rule based on the classification of the device, wherein the compliance rule is a standard based compliance rule; performing, by a processing device of the compliance monitoring device, a compliance scan on the device based on the compliance rule; determining a compliance level of the device based on a result of the compliance scan of the device; and performing an action based on the compliance level. 13 (’278 patent at claim 1 (emphasis added).) The parties primarily disagree on whether the 14 compliance level can include a simple binary “pass/fail” as well as gradation levels. (Fortinet 15 Reply at 13.) Forescout argues that it does, and Fortinet disagrees and construes “compliance 16 level” as “quantitative score indicating the extent to which a device is in compliance with 17 compliance rules.” 18 The plain and ordinary meaning of “compliance level” does not exclude a two-level 19 compliance. The word “level” generally refers to “a relative amount, intensity[,] or 20 concentration.” See Dictionary of Science and Technology (2007). Forescout’s expert agrees. 21 (See Cole Decl. at ¶ 84 (“[A] skilled artisan would have understood that ‘compliance level’ may 22 mean any indicator showing the extent to which a device is following compliance rules, such as a 23 (i) “high risk, medium risk, or low risk” indicator showing whether devices pose a security risk or 24 (ii) a “Pass/No Pass” indicator showing whether a device is or is not compliant with a particular 25 compliance rule.”).) Fortinet’s expert does not opine to the contrary. The Court therefore gives 26 “compliance level” its ordinary meaning which may encompass a simple binary “pass/fail.” 27 28 Fortinet observes that “every embodiment of or reference to a ‘compliance level’ in the specification is quantitative in nature,” but that alone does not narrow the term’s plain and 36 United States District Court Northern District of California Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 37 of 58 1 ordinary meaning. (Fortinet Br. at 22–23 (emphasis in original).) Each instance in which the 2 specification describes the “compliance level” as percentage or numerical points is in context of an 3 example. (See ’278 patent at 4:39-42 (“The compliance rules may have weights associated 4 therewith thereby enabling the calculating of a compliance score or level, e.g., as a percentage or a 5 number of points.”), 5:1-8 (“For example, if the compliance level is 20% or below, then operating 6 system updates may be initiated via an update management system on the network (not shown) to 7 attempt to update the device and increase compliance. The device may then be rescanned and upon 8 obtaining a compliance level of 80% or above, compliance monitoring device 102 may grant the 9 device network access.”), 6:10-14 (“The compliance level can be determined based on the result of 10 the scan according to each rule (e.g., whether the device meets a condition of a rule) and a weight 11 assigned to each rule (e.g., a certain number of points or a percentage assigned to each rule).”), 12 6:26-30 (“For example, the first threshold may be 70 percent compliance, so a device with a 13 compliance level that is 70 percent or above will be granted a relatively high level of network 14 access while a device with a compliance level below the first threshold may be granted different 15 network access, if any.”).) “Such examples are ‘not sufficient to redefine the term . . . to have 16 anything other than its plain and ordinary meaning.’” Ancora Techs., Inc. v. Apple, Inc., 744 F.3d 17 732, 735 (Fed. Cir. 2014) (quoting IGT v. Bally Gaming Int'l, Inc., 659 F.3d 1109, 1118 (Fed. Cir. 18 2011)) (where only instances of embodiments indicating narrower construction were found in 19 examples, holding that specification’s description for “preferred embodiment” was not limiting). 20 There is no indication that the examples in the specifications were intended to be treated as a 21 claims limitation. The specification also discloses computing a “compliance level” (see, e.g., id. at 22 2:28-31), but that does not preclude a simple pass/fail. For example, a computed “compliance 23 level” of 1 could indicate pass while 0 fail. The specification here therefore does not redefine 24 “level.” 25 Fortinet’s proposed construction—“quantitative score indicating the extent to which a 26 device is in compliance with compliance rules”—also is confusing. The word “score” typically 27 connotes numbers, such as test scores, and “quantitative score” strengthens that connotation. But 28 Fortinet contends that “compliance level” includes an indicator of “high,” “medium,” or “low” 37 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 38 of 58 1 risk, which are not numerical. Fortinet justifies such inclusion because high/medium/low 2 “expresses a comparable quantity (or level) of risk.” (Fortinet Br. at 22 (emphasis in original).) 3 No principled reason exists for why “compliance level” encompasses those three qualitative levels 4 but not the two “pass/fail” levels that also expresses a comparable quantity of risk. For example, 5 “pass” may correspond to low, and “fail” to high, security risk. Therefore, Fortinet has not 6 overcome the “heavy presumption” that a claim term carries its ordinary and customary meaning. 7 Teleflex v. Ficosa N. Am. Corp., 299 F.3d 1313, 1325 (Fed. Cir. 2002). 8 G. 9 U.S. Patent No. 9,369,299 (the “’299 patent”) 1. “Said Network Access” 10 United States District Court Northern District of California 11 12 Fortinet’s Proposal “said network access” (claims 1, 3, 4, 8) No construction required Forescout’s Proposal Court’s Construction Indefinite No construction required 13 14 15 Claim 1 recites, 1. A system for out-of-band control of network access supporting multiple connections comprising: 16 17 18 a network comprising a server device, at least one terminal device, and a communication link between them; at least one remote access device (RAD) comprising memory, and communicatively coupled to said network; and 19 20 a Network Access Control Server (NACS) comprising memory, controlling said network access, wherein said network access control is out of band and comprises: 21 identity management of said connections; 22 endpoint compliance of said connections; and 23 usage policy enforcement of said connections; 24 25 26 wherein said enforcement is out of band and is accomplished on said RAD, comprising communicating with said RAD to make real-time changes to its running configuration, whereby said enforcement is vendor-independent and said system is RADagnostic; 27 28 said network access control comprising receiving a connect attempt to said network from a user device; 38 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 39 of 58 1 said RAD authenticating connecting user to said NACS for said out of band network control; 2 said NACS capturing RAD identification, location; 3 4 restricting access to said network by said user device with a network access filter (NAF) configured on said RAD; 5 said RAD directing said client device to an agent; 6 on said user device, running said agent; 7 said agent identifying client to said NACS; 8 modifying said NAF based on compliance; and 9 monitoring post-connection of successful connections. 10 (’299 patent at claim 1 (emphasis added).) United States District Court Northern District of California 11 2. The system of claim 1, wherein said network access comprises agents whereby said agents collect identity and health information about user and said RAD. 12 13 (Id. at claim 2 (emphasis added).)4 14 3. The system of claim 1, wherein said network access comprises: 15 a VPN concentrator that is said RAD; 16 at least one of a, Remote Access Server (RAS), firewall, intrusion protection detection system, a switch, a router, an authentication authorization and accounting (AAA) directory server, Bootstrap Protocol (BOOTP), Dynamic Host Configuration Protocol (DHCP), and Domain Name System (DNS). 17 18 19 20 (Id. at claim 3 (emphasis added).) 21 4. The system of claim 1, wherein said network access comprises a connection attempt comprising constructing a connection model from information about user and said RAD. 22 23 (Id. at claim 4 (emphasis added).) 24 8. The system of claim 5, wherein said network access of said connecting user device is controlled by filters based on identity and location of connecting user and said RAD. 25 26 (Id. at claim 8 (emphasis added).) 27 28 4 Claim 2 is not asserted, but Forescout asks the Court to consider it for the purpose of construing the disputed term. (Forescout Resp. at 14 n.2.) Fortinet did not oppose. (Fortinet Reply at 15.) 39 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 40 of 58 1 2 argues that the term lacks an antecedent basis and “no reasonably ascertainable meaning is 3 apparent.” (Forescout Resp. at 13.) Fortinet points to the preamble as the antecedent basis. The 4 preamble recites, “A system for out-of-band control of network access supporting multiple 5 connections comprising.” Forescout disagrees because the preamble refers to “network access 6 supporting multiple connections” generally but not any specific instance of “network access.” (Id. 7 at 14 (emphasis added).) 8 9 United States District Court Northern District of California Forescout contends that “said network access” is indefinite for two reasons. First, it Bushnell, Forescout’s primary authority, is inapposite. 813 F. App’x at 526. The Federal Circuit there found “said different IP Address” indefinite. After noting that the term lacks 10 antecedent basis, it found neither the claim language nor the specification clarifies which of the 11 three classes of IP address the disputed term references—“one or more IP Addresses,” “one or 12 more second IP Addresses,” or “one or more third IP Addresses.” Id. Each potential antecedent 13 basis “is presumed to have a separate meaning” and “presumed to refer to different classes of IP 14 addresses.” Id. (emphasis in original). Unlike that in Bushnell, the preamble provides the only 15 possible antecedent basis for “said network access.” 16 Forescout’s expert, Dr. Cole, does not persuade otherwise. He opines that “[a] POSITA 17 would ordinarily understand the term ‘said network access’ to apply to a specific instance of 18 network access, i.e. the ‘said’ network access as distinguished from other network accesses.” (Ex. 19 J (“5/21/21 Cole Decl.”) at ¶ 35.) He appears to have rested his conclusion on the fact that “said 20 network access” is singular, while access to network by multiple connections should be plural. 21 But the preamble clearly uses “network access” in singular form to refer to access by multiple 22 connections. Forescout has not provided any intrinsic evidence why “said network access” must 23 refer to a specific network access as opposed to “network access supporting multiple connections” 24 generally. 25 Second, Forescout points to dependent claims 2, 3, 4, and 8. It observes, “the phrase ‘said 26 network access’ refers to an unspecified network access (claim 1), (software) agents (claim 2), a 27 VPN concentrator (physical device) plus one other system such as a server or firewall (claim 3), a 28 connection attempt comprising constructing a connection model (claim 4), and is tied to a specific 40 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 41 of 58 1 connecting user device (claim 8).” (Forescout Resp. at 15.) Fortinet responds that the “dependent 2 claims just recite that ‘said network access . . . comprises’ various other components, much like 3 the preamble of Claim 1.” (Fortinet Reply at 15.) United States District Court Northern District of California 4 Neither party’s argument persuades. Contrary to Fortinet’s argument, the preamble of 5 claim 1 recites “[a] system . . . comprising” while the dependent claims recite “said network 6 access comprises.” The dependent claims thus simply do not “refer to ‘said network access’ in 7 exactly the same way as independent claim 1.” (Id.) Although Forescout may be correct that 8 “said network access” cannot technically include all the components in the dependent claims, 9 “[t]he dependent claim tail cannot wag the independent claim dog.” Multilayer Stretch Cling Film 10 Holdings, Inc. v. Berry Plastics Corp., 831 F.3d 1350, 1360 (Fed. Cir. 2016) (citation omitted). 11 “[T]he language of a dependent claim cannot change the scope of an independent claim whose 12 meaning is clear on its face.” Id. Because claim 1’s preamble clearly provides the requisite 13 antecedent basis, the Court declines to find “said network access” indefinite. 14 2. “Said System” 15 16 17 18 19 20 21 22 Fortinet’s Proposal “said system” (claim 11) “said NACS” Forescout’s Proposal Court’s Construction Indefinite “said NACS” Claim 11 recites, 11. A method for out of band control for secure network access of a user device to a network comprising the steps of: receiving a connect attempt to said network from said user device; 23 authenticating connecting user to a network access control server (NACS) by a remote access device (RAD) for out of band network control; 24 capturing RAD identification, location by said NACS; 25 providing out of band network enforcement comprising restricting access to said network by said user device with a network access filter (NAF) configured on said RAD; wherein said enforcement is out of band and is accomplished on said RAD, comprising communicating with said RAD to make realtime changes to its running configuration, whereby said enforcement is vendor-independent and said system is RAD41 26 27 28 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 42 of 58 1 2 3 4 5 United States District Court Northern District of California 6 agnostic; directing said client device to an agent by said RAD; running said agent on said user device; identifying client to said NACS by said agent; modifying said NAF based on compliance; monitoring post-connection of successful connections. 7 (’299 patent at claim 11 (emphasis added).) Forescout argues that “said system” appears in claim 8 11 without an antecedent basis and a POSITA would not know whether it refers to the “remote 9 access device (RAD),” the “Intrusion Protection / Intrusion Detection System,” the “client 10 device,” or the network access control server (NACS). (Forescout Resp. at 15–16; 5/21/21 Cole 11 Decl. at ¶¶ 47, 50.) Dr. Shamos, Fortinet’s expert, opines that claim 11 recites no other system 12 besides NACS. (4/25/22 Shamos Decl. at ¶ 62.) 13 A POSITA would not understand “said system” to refer to RAD. Claim 11 describes “said 14 system” as “RAD-agnostic.” Fortinet correctly observes that “it is unclear how a RAD itself could 15 be RAD-agnostic.” (Fortinet Reply at 16.) And the claim recites “said RAD” in the same 16 limitation as “said system,” so they are “presumed to have different meanings.” Helmsderfer v. 17 Bobrick Wash-room Equip., Inc., 527 F.3d 1379, 1382 (Fed. Cir. 2008). 18 “Said system” could not refer to the “Intrusion Protection / Intrusion Detection System.” 19 That system is not actually claimed. Cf. In re Downing, 754 F. App’x 988, 996 (Fed. Cir. 2018) 20 (holding “the end user” refers to “end user” referenced in claim rather than other end users 21 disclosed in the specification). 22 “Said system” also could not refer to the “client device.” Nowhere does the specification 23 disclose a client device as RAD-agnostic. To the contrary, claim 11 describe the “client device” to 24 be “an agent by said RAD.” 25 Having ruled out all alternative, the Court finds that “said system” refers to NACS. The 26 specification confirms so. The claim makes clear that “said system” must be “RAD-agnostic.” 27 And the specification describes NACS as RAD-agnostic. (See, e.g., ’299 patent at 2:40-42 (“[T]he 28 network access control is RAD agnostic.”), 4:29-39 (“[T]he invention [a system and method for 42 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 43 of 58 1 network access control] . . . is remote access device (RAD) agnostic . . . .”).) The specification 2 thus establishes that “said system” refers to “said NACS.” 3 3. “Said System Is RAD-Agnostic” 4 5 6 Fortinet’s Proposal “said system is RAD-agnostic” (claims 1, 11) “said NACS supports RADs from multiple vendors” Forescout’s Proposal “The state of being unaffected by the manufacturer of the RAD” Court’s Construction “said system is unaffected by the manufacturer of RAD” 7 8 9 Claim 1 recites, 1. A system for out-of-band control of network access supporting multiple connections comprising: 10 United States District Court Northern District of California 11 12 a network comprising a server device, at least one terminal device, and a communication link between them; at least one remote access device (RAD) comprising memory, and communicatively coupled to said network; and 13 14 a Network Access Control Server (NACS) comprising memory, controlling said network access, wherein said network access control is out of band and comprises: 15 identity management of said connections; 16 endpoint compliance of said connections; and 17 usage policy enforcement of said connections; 18 19 20 wherein said enforcement is out of band and is accomplished on said RAD, comprising communicating with said RAD to make real-time changes to its running configuration, whereby said enforcement is vendor-independent and said system is RADagnostic; 21 22 23 said network access control comprising receiving a connect attempt to said network from a user device; said RAD authenticating connecting user to said NACS for said out of band network control; 24 said NACS capturing RAD identification, location; 25 26 restricting access to said network by said user device with a network access filter (NAF) configured on said RAD; 27 said RAD directing said client device to an agent; 28 on said user device, running said agent; 43 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 44 of 58 1 said agent identifying client to said NACS; 2 modifying said NAF based on compliance; and 3 monitoring post-connection of successful connections. 4 5 6 7 8 United States District Court Northern District of California 9 (’299 patent at claim 1 (emphasis added).) Claim 11 recites, 11. A method for out of band control for secure network access of a user device to a network comprising the steps of: receiving a connect attempt to said network from said user device; authenticating connecting user to a network access control server (NACS) by a remote access device (RAD) for out of band network control; 10 capturing RAD identification, location by said NACS; 11 providing out of band network enforcement comprising restricting access to said network by said user device with a network access filter (NAF) configured on said RAD; wherein said enforcement is out of band and is accomplished on said RAD, comprising communicating with said RAD to make realtime changes to its running configuration, whereby said enforcement is vendor-independent and said system is RADagnostic; 12 13 14 15 16 17 18 19 20 21 22 directing said client device to an agent by said RAD; running said agent on said user device; identifying client to said NACS by said agent; modifying said NAF based on compliance; monitoring post-connection of successful connections. (Id. at claim 11 (emphasis added).) A patentee may act as his or her own lexicographer if the patentee “clearly set[s] forth a 23 definition of the disputed claim term,” and “clearly express[es] an intent to define the term.” GE 24 Lighting Sols., LLC v. AgiLight, Inc., 750 F.3d 1304, 1309 (Fed. Cir. 2014) (quotation omitted). 25 The patentee’s lexicography must appear “with reasonable clarity, deliberateness, and precision.” 26 Renishaw PLC v. Marposs Societa’ per Azioni, 158 F.3d 1243, 1248 (Fed. Cir. 1998). 27 28 In the ’299 patent, the patentee expressly defined “(vendor)-agnostic” as follows: Terms used in this application are described below. 44 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 45 of 58 … (vendor)-agnostic—The state of being unaffected by the manufacturer of network devices being managed in the network. 1 United States District Court Northern District of California 2 3 (’299 patent, 4:40–51.) The parenthesis around “vendor” suggests that this definition must cover 4 more than “vendor-agnostic.” Besides the definition of “(vendor)-agnostic,” the specification only 5 mentions “agnostic” three times: one “vendor-agnostic” (id. at 5:54), and two “RAD agnostic” (id. 6 at 2:41, 4:36). Therefore, the definition of “(vendor)-agnostic” must relate to “RAD agnostic.” In 7 this regard, neither party advocates the swapping out “vendor” with “RAD,” i.e., “the state of 8 being unaffected by RAD,” presumably because NACS interacts with RAD and thus must be 9 affected. Instead, both parties’ proposed constructions of “RAD agnostic” involve RAD 10 manufacturers. It is therefore obvious that what the system is agnostic about must be of RAD 11 manufacturers. The Court therefore construes “said system is RAD-agnostic” as “said system is 12 unaffected by the manufacturer of RAD.” 13 The Court’s construction addresses the parties’ concerns with each other’s construction. 14 Unlike Forescout’s proposal, the Court’s construction is grammatically correct. It is consistent 15 with the specification’s characterization of a RAD-agnostic embodiment as a “multi-vendor 16 solution.” (Id. at 4:36.) It derives from patentee’s express definition of “(vendor)-agnostic” and is 17 therefore consistent with Forescout’s authority that “a patentee-specified definition controls.” 18 (Forescout Resp. at 17 (citing 3M Innovative Props. Co. v. Avery Dennis Corp., 350 F.3d 1365, 19 1371 (Fed. Cir. 2003)).) It further avoids using “multi-vendor” which Forescout argues to be 20 indefinite. (Forescout Sur-reply at 11.) 21 /// 22 /// 23 /// 24 /// 25 /// 26 /// 27 /// 28 /// 45 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 46 of 58 1 H. U.S. Patent No. 8,458,314 (the “’314 patent”)5 2 Fortinet’s Proposal 3 4 5 6 7 8 9 “said template of said users and devices is associated” (claim 1) “said templates of said users and devices are associated” “said template of said endpoint” (claims 15, 20) “said template records for endpoints” Forescout’s Proposal Indefinite Court’s Construction The Court construes the phrase of “said template of said users and devices is associated with said profile of said sponsor” as “a said template of said users and devices is associated with a said profile of said sponsor.” The Court construes the phrase “said template of said endpoint is associated with said profile of said sponsor” as “a said template of said endpoint is associated with a said profile of said sponsor.” 10 United States District Court Northern District of California 11 Claim 1 recites, 12 1. A method for control of computer network resources connected to a computer network supporting network endpoints by delegating control from a network administrator to at least one sponsor comprising the steps of: 13 14 creating templates for users and devices of said computer network by said network administrator at an administrator account on a workstation connected to said computer network; 15 16 17 creating profiles used to control said resources of said computer network; 18 associating said templates with said profiles; 19 creating at least one said sponsor by said network administrator; 20 associating, by said network administrator, at least one of said profiles with said sponsor; 21 22 delegating, by said network administrator, network management administrative privileges to said sponsor, 23 transferring responsibility for said users and devices from said 24 25 26 27 28 On November 15, 2022, the Patent Trial and Appeal Board (“PTAB”) issued its Final Written Decision in an Inter Partes Review proceeding determining that all challenged claims (claims 1– 13, 15–18, and 20) of the ’314 patent are unpatentable. (Docket No. 173.) This encompasses all claims of the ’314 patent asserted by Fortinet in this litigation (claims 1, 3, 5–8, 10, 11, 13, and 17). If affirmed, “[t]hat affirmance . . . has an immediate issue-preclusive effect on any pending or co-pending actions involving the patent.” XY, LLC v. Trans Ova Genetics, 890 F.3d 1282, 1294 (Fed. Cir. 2018). Since Fortinet’s time to appeal has not run, the Court still construes the disputed term of the ’314 patent. 46 5 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 47 of 58 1 2 3 4 5 6 7 8 9 United States District Court Northern District of California 10 network administrator to said sponsor when said template of said users and devices is associated with said profile of said sponsor; and controlling of said computer network resources by said sponsor, using said templates assigned to said sponsor by said network administrator, wherein said sponsor is constrained by said network administrator by said at least one associated profile, said sponsors not having network management administrative privileges over said network administrator. (’314 patent at claim 1 (emphasis added).) Claim 15 recites, 15. A system for control of network resources supporting network endpoints by delegating control from a network administrator to at least one network sponsor comprising: in a network database, creating template records for endpoints of said network by said network administrator; 11 in said network database, creating at least one profile used to control said endpoints; 12 associating said templates with said profiles; 13 in said network database, creating at least one sponsor record by said network administrator; 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 associating at least one of said profiles with said sponsor record by said network administrator; delegating, by said network administrator, network management administrative privileges to said sponsor, transferring responsibility for said endpoint from said network administrator to said sponsor when said template of said endpoint is associated with said profile of said sponsor; and by executing instructions in a microprocessor, controlling of said network resources by said sponsor, using said templates assigned to said sponsor by said network administrator, wherein said sponsor is constrained by said network administrator by said at least one associated profile. (Id. at claim 15 (emphasis added).) Claim 20 recites, 20. An apparatus for control of network resources supporting network endpoints by delegating control from a network administrator to at least one network sponsor comprising: a network database containing template records for endpoints of said network, wherein said template comprises a set of rules or patterns defining scope of IT task, limitations of said endpoint and identification of an association between said endpoint and said sponsor; 47 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 48 of 58 1 2 3 at least one microprocessor executing instructions associating said templates with said profiles; 4 in said network database at least one sponsor record; 5 at least one microprocessor executing instructions associating at least one of said profiles with said sponsor record; 6 7 8 9 10 11 United States District Court Northern District of California in said network database at least one profile used to control said endpoints; 12 13 at least one microprocessor executing instructions delegating, by said network administrator, network management administrative privileges to said network sponsor, transferring responsibility for said endpoint from said network administrator to said network sponsor when said template of said endpoint is associated with said profile of said sponsor record of said network sponsor; and at least one microprocessor executing instructions controlling said network resources by said sponsor, using said templates assigned to said sponsor by said network administrator, wherein said sponsor is constrained by said network administrator by said at least one associated profile. 14 (Id. at claim 20 (emphasis added).) Claim 1 is representative of the three claims. Although claims 15 15 and 20 recite “template record,” the parties agree that it is not distinct from “template.” 16 (Forescout Resp. at 18 n.1.) 17 The Court finds neither parties’ construction satisfactory. Forescout argues that “said 18 template” is indefinite because it lacks an antecedent basis and does not have a “reasonably 19 ascertainable meaning.” (Forescout Resp. at 18.) Specifically, the claims “first recite creating 20 ‘templates’ plural and later recite transferring responsibility when a singular ‘said template’ is 21 associated with a profile.” (Id.) And the claims do not recite “which actor chooses the template or 22 how that singular template is chosen from among the multiple templates created.” (Id.) Dr. Cole 23 for Forescout testified that a POSITA would conclude that the reference to “said template” 24 singular has no reasonably ascertainable meaning. (5/21/21 Cole Decl. at ¶ 55.) Fortinet responds 25 that there is no other set of templates referenced in any of the claims, so “said template” must refer 26 to the “templates” plural. (Fortinet Reply at 18.) 27 28 The Court disagrees that “said template” singular has no ascertainable meaning. The claim language does not require differentiation among the templates plural, so “said template” simply 48 United States District Court Northern District of California Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 49 of 58 1 refers to one of the antecedent templates. The claimed method broadly recites “creating templates 2 for users and devices” and associating those templates with profiles. Whoever chooses a template 3 from the pool of templates through whatever means does not seem to make any difference to the 4 claimed method. 5 Forescout’s authorities are distinguishable. In two of the three cases, the plural terms that 6 could serve as the antecedent basis have multiple potential meanings. For instance, in Intelligent 7 Agency, LLC v. 7-Eleven, Inc., the disputed term “said reference point” could refer to multiple 8 reference points. No. 4:20-CV-0185-ALM, 2022 WL 760203, at *33 (E.D. Tex. Mar. 11, 2022). 9 Thus, it is unclear which reference point one should use to determine “which user among said 10 second plurality of users has the strongest connection with said reference point” as the claim 11 requires. Id. Similarly, as described earlier, the claim in Bushnell recites three classes of IP 12 addresses, each presumed to have a separate meaning. 813 F. App’x at 526. The specification 13 there in provided several potential interpretations of “different IP Address.” Id. In Imperium (IP) 14 Holdings v. Apple Inc., the claim recited “groups of pixels, wherein each of said groups of pixels 15 include[] a red pixel having an output” and “a first analog-to-digital converter connected to the 16 output of the red pixel for converting the output of the red pixels . . . .” 920 F. Supp. 2d 747, 751 17 (E.D. Tex. 2013). The mixed use of “red pixel” and “red pixels” created an ambiguity as to 18 “whether the outputs of multiple pixels are converted into one digital signal per pixel or are 19 instead combined into one digital signal for all pixels.” Id. at 757. In all three cases, the claim 20 language requires differentiation of a singular from among the plural. As discussed above, that is 21 not the case here. 22 Fortinet construes “said template of said users and devices is associated” as “said templates 23 of said users and devices are associated.” (Fortinet Reply at 18 (emphasis added).) It, in effect, 24 changes the singular to plural in order to obtain the equivalence it asserts was clearly intended. Its 25 own expert, however, appears to reject that construction. As Dr. Shamos opines: 26 27 28 If the limitation read, “when said templates of said users and devices are associated with said profile of said sponsor,” the antecedent basis would be all the templates created in the “creating” step, and it is unlikely that all such templates would be associated with a single profile. Therefore, the plural could not be used. 49 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 50 of 58 1 (4/25/22 Shamos Decl. at ¶ 71 (emphasis in original).) Fortinet’s authorities are not on point. Baldwin Graphic v. Siebert merely describes the 2 3 general rule that “a” or “an” can “mean[] more than one.” 512 F.3d 1338, 1342–43 (Fed. Cir. 4 2008). There, the court held “said fabric roll” does not mandate the singular “a pre-soaked fabric 5 roll”—the term to which “said fabric roll” refers back. Id. at 1343. Here, in contrast, the referred- 6 back term is unequivocally plural while the anaphoric phrase is singular. Aircraft Tech Pubs. v. 7 Avantext, Inc. does not even concern any lack of antecedent basis. No. C 07-4154 SBA, 2009 8 U.S. Dist. LEXIS 105623, at *17–18 (N.D. Cal. Nov. 10, 2009). Having found neither parties’ construction satisfactory and that the claim language does United States District Court Northern District of California 9 10 not differentiate among the templates, the Court agrees with Dr. Shamos that, in this context, “the 11 word ‘a’ is implied before ‘said template.’” (4/25/22 Shamos Decl. at ¶ 71.) “That is, the sponsor 12 only obtains privileges over a particular user or device when the template of that user or device 13 has been associated with the profile of that sponsor.” (Id.) Because the same issue exists for “said 14 profile,” the Court construes the entire phrase of “said template of said users and devices is 15 associated with said profile of said sponsor” as “a said template of said users and devices is 16 associated with a said profile of said sponsor,” and “said template of said endpoint is associated 17 with said profile of said sponsor” as “a said template of said endpoint is associated with a said 18 profile of said sponsor.” This construction is consistent with the structure of the patent claim’s 19 language. Cf. Novo Indus., L.P. v. Micro Molds Corp., 350 F.3d 1348, 1354 (Fed. Cir. 2003) (A 20 district court may correct an “obvious minor typographical [or] clerical” error in a patent if (1) 21 “the correction is not subject to reasonable debate based on consideration of the claim language 22 and the specification” and (2) “the prosecution history does not suggest a different interpretation 23 of the claims.”). 24 /// 25 /// 26 /// 27 /// 28 /// 50 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 51 of 58 1 I. U.S. Patent No. 9,948,662 (the “’662 patent”) 2 Fortinet’s Proposal 3 4 “trust level” (claims 1 and 9) Plain and ordinary meaning 5 6 7 8 9 10 United States District Court Northern District of California 11 12 13 Forescout’s Proposal “one of multiple (two or more) trust levels corresponding to the number of security features that can be disabled” Court’s Construction “one of multiple (two or more) trust levels corresponding to the number of security features that can be disabled” Claim 1 recites, 1. A method comprising: receiving, by a network security device within an enterprise network, an application protocol request directed to an external network that is originated by a client device associated with the enterprise network; determining, by the network security device, based on the application protocol request whether a network parameter of the external network is associated with a set of trusted networks; and 17 selectively disabling, by the network security device, application of a subset of security features of a plurality of security features to be applied to network traffic exchanged between the client device and the external network while the client device is accessing the external network when a result of said determining is affirmative, wherein the subset of security features are selected based on a trust level associated with the external network. 18 (’662 patent at claim 1 (emphasis added).) Claim 3 depends on claim 1 and recites, 19 3. The method of claim 1, further comprising assigning the trust level to the external network, the trust level being selected from a plurality of trust levels in which a higher trust level corresponds to disabling a greater number of the plurality of security features and a lower trust level corresponds to disabling a lesser number of the plurality of security features. 14 15 16 20 21 22 23 24 (Id. at claim 3 (emphasis added).) Claim 9 recites, 9. A network security device comprising: 25 at least one processor; and 26 a computer-readable medium storing instructions that, when executed by the at least one processor, cause the at least one processor to perform a method comprising: 27 28 receiving an application protocol request directed to an external 51 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 52 of 58 1 2 3 4 5 6 7 United States District Court Northern District of California 8 network that is originated by a client device associated with an enterprise network protected by the network security device; determining based on the application protocol request whether a network parameter of the external network is associated with a set of trusted networks; and selectively disabling application of a subset of security features of a plurality of security features to be applied to network traffic exchanged between the client device and the external network while the client device is accessing the external network when a result of said determining is affirmative, wherein the subset of security features are selected based on a trust level associated with the external network. (Id. at claim 9 (emphasis added).) 9 Forescout argues that a “trust level” must reflect more than a simple binary yes/no 10 determination of whether a network is trusted primarily for two reasons. First, Forescout argues 11 that claims 1 and 9 recite two separate limitations relating to trust; the first—the “determining” 12 limitation—is a simple yes/no determination, so the second limitation reciting “trust level” must 13 reflect more than a binary choice. Fortinet responds that the “determining” step describes whether 14 a “trust level” is assigned at all, rather than a yes/no determination. (Fortinet Reply at 20–21 15 (citing ’662 patent at 9:48-51 (“no match is found in the trusted network parameters database, the 16 network security device assumes that no trust level is assigned to the external network”).) 17 The Court agrees with Forescout. The “determining” limitation recites “determining . . . 18 whether a network parameter of the external network is associated with a set of trusted networks.” 19 (’662 patent at claims 1, 9.) Only “when a result of said determining is affirmative” (i.e., a “yes” 20 determination) do the claimed method or device selectively disable “application of a subset of 21 security features” that “are selected based on a trust level associated with the external network.” 22 (Id.) Simply put, a trust level is relevant for selecting security features only after an external 23 network is determined to be trusted. Thus, a trust level must encompass more than a trusted / not 24 trusted determination. 25 Second, as Forescout observes, every reference to trust levels in the specification relates to 26 multiple distinct trust levels. (Forescout Resp. at 20 (citing ’662 patent at 8:48-52 (“A trust level 27 to be assigned to an external network is selected from multiple trust levels, such that, a higher trust 28 level corresponds to disabling a greater number of security features and a lower trust level 52 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 53 of 58 1 corresponds to disabling a lesser number of security features.”), 8:53-9:7 (example of having five 2 trust levels corresponding to disabling different kinds and amounts of security features), 11:19-22 3 (An “administrator or user may be able to assign different trust levels to external networks based 4 on their own discretion.”)).) Fortinet responds that dependent claim 3 corresponds to the embodiment with multiple United States District Court Northern District of California 5 6 trust levels, so the independent claim 1 must have a broader scope and encompass both multiple 7 trust levels and simple yes/no determinations. Otherwise, according to Fortinet, claims 1 and 3 8 would have identical scopes. Not so. Claim 1 simply requires selecting a subset of security 9 “based on a trust level.” Claim 3 further explains how to do so—“a higher trust level corresponds 10 to disabling a greater number of the plurality of security features and a lower trust level 11 corresponds to disabling a lesser number of the plurality of security features.” (’662 patent at 12 claim 3.) Construing a “trust level” to reflect more than a yes/no determination therefore does not 13 render claims 1 and 3 to have coextensive scopes. The Court adopts Forescout’s construction. 14 J. U.S. Patent No. 9,894,034 (the “’034 patent) 15 16 17 18 19 Fortinet’s Proposal “initialization of a client security application” (claim 1) “startup of the client security application” “initialization of the endpoint security application” (claim 15) “startup of the endpoint security application” Forescout’s Proposal Indefinite Court’s Construction Plain and ordinary meaning 20 21 Claim 1 recites, 22 1. A method comprising: 23 during initialization of a client security application running on a client device: 24 25 26 27 28 determining, by the client security application, a network connection state of the client device with respect to a private network; selecting, by the client security application, a configuration for the client security application based on the determined network connection state; and 53 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 54 of 58 1 2 3 4 5 6 7 8 9 10 United States District Court Northern District of California 11 12 13 14 15 launching, by the client security application, one or more functions of the client security application that are designated by the selected configuration to be performed by the client security application, wherein the one or more functions include one or more of web content filtering, anti-virus scanning and network access logging. (’034 patent at claim 1 (emphasis added).) Claim 15 recites, 15. A non-transitory computer-readable storage medium embodying a set of instructions, representing an endpoint security application, which when executed by one or more processors of a computer system, cause the one or more processors to perform a method comprising: during initialization of the endpoint security application: determining, by the endpoint security application, a network connection state of the computer system with respect to a private network; selecting a configuration of the endpoint security application based on the determined network connection state; and launching, by the endpoint security application, one or more functions of the endpoint security application that are designated by the selected configuration to be performed by the endpoint security application, wherein the one or more functions include one or more of web content filtering, antivirus scanning and network access logging. 16 (Id. at claim 15 (emphasis added).) The parties’ dispute centers on the word “initialization.” 17 Forescout’s expert opines that “initialization” has many different meanings to a POSITA. 18 (5/21/21 Cole Decl. at ¶ 83.) From a user’s perspective, for example, initialization of a program 19 like Microsoft Word could be when the user clicks the icon and a loading window opens, or when 20 a blank document opens and the user can start typing. (Id.) Fortinet’s expert finds there to be 21 “nothing unclear to a POSITA about the initialization process of an application.” (4/25/22 22 Shamos Decl. at ¶ 84.) Fortinet proposes to construe “initiation” as “startup.” 23 The specification describes “initialization” consistent with its ordinary meaning. Both 24 experts agree that Figure 5 (reproduced below) explains a “startup procedure” (’034 patent at 8:57- 25 58) for the client security application, including the three claimed steps in claim 1. (4/25/22 26 Shamos Decl. at ¶ 86; 5/21/21 Cole Decl. at ¶ 86.) From starting the application in 501 to 27 launching the application in 506, Figure 5 describes the preparation of the client security 28 application to perform its tasks. Further, that meaning is supported by extrinsic evidence. 54 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 55 of 58 1 Initialization generally refers to the “prepar[ation] of hardware or software to perform a task.” 2 (Webster’s New World Computer Dictionary (10th ed. 2003).) 3 4 5 6 7 8 9 10 United States District Court Northern District of California 11 12 13 14 15 16 17 18 19 20 21 22 (’034 patent at Fig. 5.) The temporal connotation of “initialization’s” ordinary meaning also comports with the 23 prosecution history. During prosecution, the applicant emphasized that “initialization” is a 24 “timing requirement. (Ex. L at 3 (distinguishing prior art because it “overlooked limitations 25 requiring the timing of the ‘determining,’ ‘selecting,’ and ‘launching’ limitations to be ‘during 26 initialization of a client security application running on a client device.’”).) The ordinary meaning 27 of “initialization” has a temporal connotation because it relates to preparation of the application. 28 The Court thus accords the disputed term its plain and ordinary meaning. 55 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 56 of 58 1 Fortinet’s proposed construction simply swaps out “initialization” for “startup,” but as 2 Forescout’s expert, Dr. Cole, opines, “[t]he term ‘startup’ is no more clear than ‘initialized.’” 3 (5/21/21 Cole Decl. at ¶ 89.) The Court therefore declines to adopt Fortinet’s construction. It also 4 declines to find the term indefinite because the claim language provides the steps of the 5 preparation as consistent with the ordinary meaning of “initiation.” 6 K. U.S. Patent No. 9,503,421 (the “’421 patent) 7 8 9 “security information and event management (SIEM) device” 10 United States District Court Northern District of California 11 “SIEM device” 12 “SIEM system” 13 (claims 1, 8, 15-28) Fortinet’s Proposal Forescout’s Proposal Court’s Construction “a device that collects logs of security events from security devices” “a device/system that identifies and manages security threats by collecting and analyzing logs of security events” “a device/system that identifies and manages security threats by collecting and analyzing logs of security events” 14 15 The parties agree that “SIEM” is a well-known term of art, that intrinsic evidence does not 16 expressly define this term, and that an SIEM device is a device that collects security event 17 information. (Fortinet Reply at 23; Forescout Sur-reply at 14.) The parties disagree whether the 18 construction of “SIEM” must include a requirement of purpose. (Fortinet Reply at 23.) After the 19 Court ordered the parties to further meet and confer on this term, they submitted revised 20 definitions shown above, but the fundamental dispute remains. (Docket No. 169.) 21 Evidence suggests that a POSITA would understand SIEM devices to identify security 22 threats. (5/28/21 Cole Decl. at ¶ 93.) Newton’s Telecom Dictionary (28th ed. 2014) defines 23 “SIEM” as “[t]he automated creation, updating, and analysis of event logs on an enterprise 24 network, for the purpose of identifying problems and/or threats, and/or to fulfill a legal or 25 regulatory requirement.” (Ex. P.) Similarly, Fortinet’s own website explains SIEM as follows: 26 27 28 Security information and event management (SIEM) solutions collect logs and analyze security events along with other data to speed threat detection and support security incident and event management, as well as compliance. Essentially, a SIEM technology system collects data from multiple sources, enabling faster response 56 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 57 of 58 1 2 Ex. O (https://www.fortinet.com/resources/cyberglossary/what-is-siem). Fortinet argues that 3 Forescout plucked the definition from Fortinet’s marketing material eight years after the priority 4 date of the ’421 patent. But Fortinet neither argues that the definition on its website deviated from 5 how a POSITA would understand the term, nor contends that SIEM’s definition has changed over 6 time. The Court therefore agrees with Forescout’s identified function of SIEM devices. 7 United States District Court Northern District of California to threats. If an anomaly is detected, it might collect more information, trigger an alert, or quarantine an asset. Although identifying security threats is “the typical purpose of an SIEM device” (Fortinet 8 Reply at 24), Fortinet contends that it would be “improper to give weight to it” because it “is 9 nowhere to be found in either the specification or the claims.” (Id.) Fortinet instead relies on 10 statement in the “Description of Related Art” that “[an] SIEM device may be deployed to collect 11 results of the tasks performed by the security devices.” (Id. (quoting ’421 patent at 1:30-32).) 12 Since “SIEM” is well known to a POSITA, the specification needs not describe its function. “The 13 law is clear that patent documents need not include subject matter that is known in the field of the 14 invention and is in the prior art, for patents are written for persons experienced in the field of the 15 invention.” S3 Inc. v. NVIDIA Corp., 259 F.3d 1364, 1371 (Fed. Cir. 2001). 16 Fortinet objects to construing a term to include the purpose for a structure because it “has 17 long been held to have no patentable weight.” (Fortinet Reply at 24; accord Docket No. 169 at 1.) 18 But the ’421 patent does not claim SIEM as an invention, so no “patentable weight” needs to be 19 given. Fortinet’s authorities also do not concern claim construction. Catalina Mktg. Int’l v. 20 Coolsavings.com, Inc. relates to a claim preamble’s limiting effects. 289 F.3d 801, 809 (Fed. Cir. 21 2002) (“[P]reambles describing the use of an invention generally do not limit the claims because 22 the patentability of apparatus or composition claims depends on the claimed structure, not on the 23 use or purpose of that structure.”). In re Schreiber held that prior art anticipates as long as it 24 discloses the structure even if for a different purpose. 128 F.3d 1473, 1477 (Fed. Cir. 1997) (“It is 25 well settled that the recitation of a new intended use for an old product does not make a claim to 26 that old product patentable.”). 27 28 Because the parties agree that SIEM devices identify and manage security threats, the Court adopts Forescout’s construction. 57 Case 3:20-cv-03343-EMC Document 174 Filed 11/28/22 Page 58 of 58 1 V. CONCLUSION 2 The Court construes the disputed terms as explained above. 3 4 IT IS SO ORDERED. 5 6 Dated: November 28, 2022 7 8 9 ______________________________________ EDWARD M. CHEN United States District Judge 10 United States District Court Northern District of California 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 58

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?