Fortinet, Inc. v. Forescout Technologies, Inc.
Filing
55
ORDER by Judge Edward M. Chen Granting in Part and Denying in Part 24 Defendant's Motion to Dismiss. (emcsec, COURT STAFF) (Filed on 11/2/2020)
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 1 of 27
1
2
3
4
UNITED STATES DISTRICT COURT
5
NORTHERN DISTRICT OF CALIFORNIA
6
7
FORTINET, INC.,
Plaintiff,
8
9
Case No. 20-cv-03343-EMC
v.
FORESCOUT TECHNOLOGIES, INC.,
11
United States District Court
Northern District of California
10
Defendant.
ORDER GRANTING IN PART AND
DENYING IN PART DEFENDANT’S
MOTION TO DISMISS
Docket No. 24
12
13
I.
14
INTRODUCTION
15
Plaintiff Fortinet, Inc. (“Fortinet”) brought this action against Defendant Forescout
16
Technologies, Inc. (“Forescout”) for patent infringement. Fortinet owns three patents relating to
17
cybersecurity technology that, it alleges, Forescout has indirectly and willfully infringed. Pending
18
before the Court is Forescout’s motion to dismiss for failure to state a claim on the grounds that
19
(1) Fortinet’s patents claim ineligible subject matter and (2) Fortinet fails adequately to plead
20
indirect or willful infringement. See Docket No. 24 (“Mot.”). For the reasons stated below, the
21
Court DENIES Forescout’s motion to dismiss the asserted patents on subject-matter eligibility
22
grounds. It also DENIES Forescout’s motion as to Fortinet’s claims of inducement. The Court,
23
however, GRANTS the motion as to Fortinet’s claims of contributory and willful infringement
24
with leave to amend.
25
26
II.
BACKGROUND
The complaint alleges the following. Fortinet is a company that sells “cybersecurity
27
products, software, and services” to large institutional customers. Docket No. 1 (“Compl.”) ¶ 3.
28
In 2018, Fortinet became the owner, by assignment, of three patents relating to network access
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 2 of 27
1
control security technology. Id. ¶¶ 5, 30-32. These include United States Patent Nos. 8,458,314
2
(“the ’314 Patent”), titled “System and method for offloading IT network tasks; 9,369,299 (“the
3
’299 Patent”), titled “Network access control system and method for devices connecting to
4
network using remote access control methods”; and 9,948,662 (“the ’662 Patent”), titled
5
“Providing security in a communication network.” Id. ¶¶ 2, 30-32.
6
Fortinet describes the ’314 Patent as “a method of delegating control of computer network
access from network administrators to sponsors” through the creation of digital “templates and
8
profiles that associate network users with a sponsor.” Id. ¶ 44. The ’299 Patent is characterized as
9
“a system for out-of-band control of network access,” featuring such technological components as
10
“a server device,” a “terminal device,” a “remote access device,” and a “network access filter.” Id.
11
United States District Court
Northern District of California
7
¶ 58. And the ’662 Patent claims “a method of providing security in a communication network”
12
whereby “a network security device selectively disables application of security features based on a
13
trust level associated with [an] external network.” Id. ¶ 72.
14
Forescout is a competitor of Fortinet, also selling cybersecurity products to businesses.
15
See id. ¶ 6. In February 2020, “Fortinet attempted to initiate licensing discussions with Forescout”
16
on the belief that Forescout’s product offerings infringe the ’314, ’299, and ’662 Patents. Id. ¶ 10.
17
Fortinet continued its attempts throughout March and April of this year, eventually providing
18
Forescout with “identification of specific patents that are infringed by Forescout’s technology.”
19
Id. ¶¶ 11-12. As of the filing of the Complaint, Forescout “ha[d] not indicated a willingness” to
20
engage in licensing negotiations. Id. ¶ 12.
21
Fortinet filed its Complaint on May 15, 2020, alleging three counts of patent infringement
22
on theories of inducement, contributory infringement, and willful infringement. See, e.g., id.
23
¶¶ 37, 49, 51, 63, 65, 77. Forescout filed its motion for failure to state a claim on July 13, 2020.
24
See Mot.
25
26
III.
LEGAL STANDARD
Federal Rule of Civil Procedure 8(a)(2) requires a complaint to include “a short and plain
27
statement of the claim showing that the pleader is entitled to relief.” Fed. R. Civ. P. 8(a)(2). A
28
complaint that fails to meet this standard may be dismissed pursuant to Rule 12(b)(6). See Fed. R.
2
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 3 of 27
1
Civ. P. 12(b)(6). To overcome a Rule 12(b)(6) motion to dismiss after the Supreme Court's
2
decisions in Ashcroft v. Iqbal, 556 U.S. 662 (2009), and Bell Atlantic Corp. v. Twombly, 550 U.S.
3
544 (2007), a plaintiff's “factual allegations [in the complaint] must . . . suggest that the claim has
4
at least a plausible chance of success.” Levitt v. Yelp! Inc., 765 F.3d 1123, 1135 (9th Cir. 2014)
5
(internal quotation omitted). The court “accept[s] factual allegations in the complaint as true and
6
construe[s] the pleadings in the light most favorable to the nonmoving party.” Manzarek v. St.
7
Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir. 2008). But “allegations in a
8
complaint . . . may not simply recite the elements of a cause of action [and] must contain sufficient
9
allegations of underlying facts to give fair notice and to enable the opposing party to defend itself
effectively.” Levitt, 765 F.3d at 1135 (quoting Starr v. Baca, 652 F.3d 1202, 1216 (9th Cir.
11
United States District Court
Northern District of California
10
2011)). “A claim has facial plausibility when the plaintiff pleads factual content that allows the
12
court to draw the reasonable inference that the defendant is liable for the misconduct alleged.”
13
Iqbal, 556 U.S. at 678. “The plausibility standard is not akin to a ‘probability requirement,’ but it
14
asks for more than a sheer possibility that a defendant has acted unlawfully.” Id. (quoting
15
Twombly, 550 U.S. at 556).
16
Under the Patent Act of 1952, patents are “presumed valid.” 35 U.S.C. § 282(a). “As
17
such, an alleged infringer asserting an invalidity defense pursuant to § 101 bears the burden of
18
proving invalidity by clear and convincing evidence.” Cisco Sys., Inc. v. Uniloc USA, Inc., 386 F.
19
Supp. 3d 1185, 1190 (N.D. Cal. 2019) (citing Microsoft Corp. v. i4i Ltd. P’ship, 564 U.S. 91, 95
20
(2011)).
21
“Patent eligibility under 35 U.S.C. § 101 is ultimately an issue of law” but “may contain
22
underlying issues of fact.” Berkheimer v. HP Inc., 881 F.3d 1360, 1365 (Fed. Cir. 2018). “Like
23
other legal questions based on underlying facts,” patent eligibility “may be, and frequently has
24
been, resolved on a Rule 12(b)(6) or (c) motion where the undisputed facts . . . require a holding of
25
ineligibility under the substantive standards of law.” SAP America, Inc. v. InvestPic, LLC, 898
26
F.3d 1161, 1166 (Fed. Cir. 2018). Thus, “[a]lthough claim construction is often desirable, and
27
may sometimes be necessary, to resolve whether a patent claim is directed to patent-eligible
28
subject matter,” it is not “an inviolable prerequisite to a validity determination under § 101,” and
3
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 4 of 27
1
may be eschewed “[w]here the court has a full understanding of the basic character of the claimed
2
subject matter.” Voip-Pal.Com, Inc. v. Apple Inc., 375 F. Supp. 3d 1110, 1124 (N.D. Cal. 2019)
3
(internal quotations omitted).
IV.
4
DISCUSSION
In moving to dismiss Fortinet’s complaint, Forescout argues that the ’314, ’299, and ’662
5
6
Patents are all “directed to an abstract idea that lacks any inventive concept, and are therefore
7
patent-ineligible.” Mot. at 1. More specifically, it alleges that the patents focus on “the abstract
8
idea of controlling access” to a computer network “using conventional technology.” Id. at 2.
9
Forescout also contends that the complaint does not “adequately plead indirect infringement”
because it “fails to plead any factual allegations regarding the knowledge and intent elements of
11
United States District Court
Northern District of California
10
Fortinet’s claims for contributory and induced infringement.” Id. at 1. Lastly, Forescout asserts
12
that the complaint “fails to adequately plead willful infringement” since it does not allege facts
13
showing “that Forescout’s conduct is egregious.” Id. Fortinet counters that its asserted patents
14
“are directed to patentable subject matter and incorporate inventive concepts—and to the extent
15
Forescout disputes the patents’ advancement over prior art, that fact issue precludes a finding of
16
invalidity at this stage.” Docket No. 27 (“Opp’n”) at 1. Fortinet also argues that the complaint
17
satisfies the pleading requirements for indirect and willful infringement, “provid[ing] ample notice
18
of Fortinet’s allegations.” Id.
19
A.
20
Patent-Eligible Subject Matter
Section 101 of the Patent Act defines the scope of patent-eligible subject matter. It
21
provides: “Whoever invents or discovers any new and useful process, machine, manufacture, or
22
composition of matter, or any new and useful improvement thereof, may obtain a patent therefor.”
23
35 U.S.C. § 101. But the Supreme Court has long excluded from patent protection “laws of
24
nature, natural phenomena, and abstract ideas,” Diamond v. Diehr, 450 U.S. 175, 185 (1981),
25
which are “the basic tools of scientific and technological work,” Gottschalk v. Benson, 409 U.S.
26
63, 67 (1972). The Court has “described the concern that drives this exclusionary principle as one
27
of pre-emption,” since granting “a monopoly over an abstract idea” would “pre-empt use of [the
28
idea] in all fields” and thus “impede innovation more than it would tend to promote it.” Alice
4
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 5 of 27
1
Corp. Pty. Ltd. v. CLS Bank Intern., 573 U.S. 208, 216 (2014) (internal citations omitted). The
2
Court has also cautioned, however, that lower courts must “tread carefully in construing this
3
exclusionary principle” since, “[a]t some level, ‘all inventions . . . embody, use, reflect, rest upon,
4
or apply laws of nature, natural phenomena, or abstract ideas.’” Id. at 217 (quoting Mayo
5
Collaborative Servs. v. Prometheus Labs., Inc., 566 U.S. 66, 71 (2012)).
6
In Alice, the Court codified a two-part test, first articulated in Mayo, for “distinguishing
patents that claim laws of nature, natural phenomena, and abstract ideas from those that claim
8
patent-eligible applications of those concepts.” 573 U.S. at 217. At step one, a court must
9
“determine whether the claims at issue are directed to a patent-ineligible concept”—i.e., a law of
10
nature, natural phenomenon, or abstract idea. Id. at 218. If so, then the court moves to step two,
11
United States District Court
Northern District of California
7
“consider[ing] the elements of each claim both individually and ‘as an ordered combination’ to
12
determine whether [any] additional elements ‘transform the nature of the claim’ into a patent-
13
eligible application” of the ineligible subject matter. Id. at 217 (quoting Mayo, 566 U.S. at 79,
14
78). The Court has described this second step as “a search for an ‘inventive concept’”: “an
15
element or combination of elements that is ‘sufficient to ensure that the patent in practice amounts
16
to significantly more than a patent upon the [ineligible subject matter] itself.’” Id. at 217-18
17
(quoting Mayo, 566 U.S. at 72-73).
18
Lower courts have conceded that, in the wake of Mayo and Alice, “precision has been
19
elusive in defining an all-purpose boundary between the abstract and the concrete.” Affinity Labs
20
of Tex., LLC v. DirecTV, LLC, 838 F.3d 1253, 1258 (Fed. Cir. 2016) (internal quotation omitted).
21
Nevertheless, the Supreme Court and the Federal Circuit have established certain parameters for
22
conducting the step-one and step-two inquiries.
23
At Alice step one, courts “look at the ‘focus of the claimed advance over the prior art’ to
24
determine if the claim’s ‘character as a whole’ is directed to excluded subject matter,” Affinity
25
Labs, 838 F.3d at 1257-58 (internal quotation omitted), such as an abstract idea. While the
26
“Supreme Court has not established a definitive rule to determine what constitutes an ‘abstract
27
idea,’” Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1334 (Fed. Cir. 2016), it has identified
28
algorithms, mathematical formulae, “fundamental economic practice[s] long prevalent in our
5
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 6 of 27
1
system of commerce,” and other “method[s] of organizing human activity” as abstract ideas. See
2
Alice, 573 U.S. at 218-20 (citing Bilski v. Kappos, 561 U.S. 593, 599 (2010)). Courts therefore
3
often begin the step-one analysis by simply “compar[ing] claims at issue to those claims already
4
found to be directed to an abstract idea in previous cases,” Enfish, 822 F.3d at 1334.1
The closer question at step one, however, tends to be not “whether the claims involve a
5
6
patent-ineligible concept,” but whether they are “directed to excluded subject matter.” Enfish, 822
7
F.3d at 1335 (internal quotation omitted) (emphasis added). With computer technology in
8
particular, a typical crux of the step-one analysis is “whether the focus of the claims is on the
9
specific asserted improvement in computer capabilities . . . or, instead, on a process that qualifies
as an ‘abstract idea’ for which computers are invoked merely as a tool.” Id. at 1336; see also
11
United States District Court
Northern District of California
10
Ancora Techs., Inc. v. HTC America, Inc., 908 F.3d 1343, 1347 (identifying this passage from
12
Enfish as the key inquiry in cases “involving software innovations”). The Federal Circuit has
13
made clear that merely applying an “abstract idea . . . on a generic computer” does not satisfy step
14
one, BASCOM Global Internet Servs., Inc. v. AT&T Mobility LLC, 827 F.3d 1341, 1348 (Fed. Cir.
15
2016) (internal quotation omitted), nor does “[l]imiting the invention to a technological
16
environment” such as the Internet, Berkheimer, 881 F.3d at 1367 (internal quotation omitted).
17
And “[t]he patent has to describe how to solve the problem in a manner that encompasses
18
something more than the principle in the abstract” to claim eligible subject matter. Dropbox, Inc.
19
v. Synchronoss Techs., Inc., 855 Fed. Appx. 529, 533 (Fed. Cir. 2020) (internal quotation omitted).
20
See Affinity Labs, 838 F.3d at 1258 (holding an invention abstract at step one where there was
21
“nothing in [the patent] that is directed to how to implement” the claimed idea); Ancora, 908 F.3d
22
at 1348 (holding an invention patentable at step one where the claim “specifically identifies how
23
th[e] functional improvement is effectuated in an assertedly unexpected way”). In sum, courts at
24
step one ask whether a patent’s claimed advance represents a concrete “technological solution to a
25
technological problem.” Packet Intelligence LLC v. NetScout Sys., Inc., 965 F.3d 1299, 1309
26
27
28
For some of the “varied approaches to determining whether particular claims are directed to an
abstract idea” that courts have taken, see Voip-Pal.Com, 374 F. Supp. 3d at 1125-26.
6
1
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 7 of 27
1
(Fed. Cir. 2020).2
If the patent is directed to a patent-ineligible concept (e.g., an abstract idea), at Alice step
2
3
two, the essential inquiry is whether “the elements of [a] claim both individually and ‘as an
4
ordered combination’” go beyond “‘well-understood, routine, conventional activit[ies]’ previously
5
known to the industry.” Alice, 573 U.S. at 217, 225 (quoting Mayo, 566 U.S. at 79, 73); see also
6
Berkheimer, 881 F.3d at 1367 (“The second step of the Alice test is satisfied when the claim
7
limitations involve more than performance of ‘well-understood, routine, [and] conventional
8
activities previously known to the industry.’”). The Federal Circuit has thus held that, in the case
9
of a computer-implemented invention, any “concrete, tangible components” (e.g., computer
hardware) that claims recite “must involve more than performance of ‘well-understood, routine,
11
United States District Court
Northern District of California
10
conventional activit[ies]’ previously known to the industry” to render an abstract idea patent-
12
eligible. In re TLI Commc’ns LLC, 823 F.3d 607, 613 (Fed. Cir. 2016) (quoting Alice, 573 U.S. at
13
225). The components themselves, however, may supply an inventive concept if they amount to
14
more than “generic computer components.” See Customedia Techs., LLC v. Dish Network Corp.,
15
951 F.3d 1359, 1366 (Fed. Cir. 2020). And “an inventive concept can be also found in the non-
16
conventional and non-generic arrangement of known, conventional pieces” of computing
17
components. BASCOM, 827 F.3d at 1350.3
18
With the step-two analysis, “[t]he question of whether a claim element or combination of
19
elements is well-understood, routine and conventional to a skilled artisan in the relevant field is a
20
question of fact,” one that “must be proven by clear and convincing evidence.” Berkheimer, 881
21
F.3d at 1368. As a result, “whether a claim recites patent eligible subject matter is a question of
22
23
24
25
26
27
28
See also SRI Int’l, Inc. v. Cisco Sys., Inc., 930 F.3d 1295, 1303 (Fed. Cir. 2019) (upholding
patent eligibility at step one because “the claims are directed to a technological solution to a
technological problem”); Prism Techs., LLC v. T-Mobile USA, Inc., 696 Fed. Appx. 1014, 1017
(Fed. Cir. 2017) (denying eligibility at step one because claims did not “cover a concrete, specific
solution to a real-world problem”).
2
At times, the Federal Circuit’s decisions have obscured the distinctions between the first and
second steps of the Alice test. Thus, in Enfish the court noted that, in computer-related cases,
“there may be close calls about how to characterize what the claims are directed to” and that “an
analysis of whether there are arguably concrete improvements in the recited computer technology”
could take place under either steps one or two. 822 F.3d at 1339; see also Ancora, 908 F.3d at
1349 (recognizing “overlaps between some step one and step two considerations”).
7
3
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 8 of 27
1
law which may contain underlying facts,” and it is only “[w]hen there is no genuine issue of
2
material fact regarding whether the claim elements or claimed combination is well-understood,
3
routine, [or] conventional to a skilled artisan in the relevant field” that eligibility “can be decided
4
. . . as a matter of law” on a motion to dismiss or at summary judgment. Id. If there is a genuine
5
dispute as to whether the claimed combination of elements is routine or conventional to a skilled
6
artisan in the field, a motion to dismiss or summary judgment must be denied.
7
As a final matter, “courts sometimes find it helpful to assess claims against the policy
8
rationale for § 101,” i.e., preemption. Voip-Pal.Com, 375 F. Supp. 3d at 1129. The Federal
9
Circuit has explained that “[w]hile preemption may signal patent ineligible subject matter, the
absence of complete preemption does not demonstrate patent eligibility.” Intellectual Ventures I
11
United States District Court
Northern District of California
10
LLC v. Symantec Corp., 838 F.3d 1307, 1321 (Fed. Cir. 2016) (internal quotation omitted).
12
Nevertheless, courts upholding eligibility have sometimes justified their decisions by pointing to
13
the lack of a preemption risk. See, e.g., BASCOM, 827 F.3d at 1350 (“Nor do the claims preempt
14
all ways of filtering content on the Internet; rather, they recite a specific, discrete implementation
15
of the abstract idea of filtering content.”). In this regard, the patent’s claim specificity in
16
explaining how the invention works or is performed informs the breadth of any potential
17
preemption reach.
18
1.
19
The ’314 Patent “relates to network management, in particular, offloading Administrator
The ’314 Patent
20
information technology (IT) network tasks to people such as business/department heads or
21
automated mechanisms within the system.” ’314 Pat. at 1:12-15. According to Fortinet, “the
22
invention solves problems faced by network administrators . . . tasked with configuring, adding,
23
and granting network permissions to a variety of different endpoint devices.” Opp’n at 3. Claim
24
1—which is “the only claim cited in the Complaint,” Mot. at 9, and is deemed “illustrative” by
25
Fortinet, Opp’n at 4—recites:
26
27
28
1. A method for control of computer network resources connected to
a computer network supporting network endpoints by delegating
control from a network administrator to at least one sponsor
comprising the steps of:
8
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 9 of 27
creating templates for users and devices of said computer network
by said network administrator at an administrator account on a
workstation connected to said computer network;
1
2
3
creating profiles used to control said resources of said computer
network;
4
associating said templates with said profiles;
5
creating at least one said sponsor by said network administrator;
6
associating, by said network administrator, at least one of said
profiles with said sponsor;
7
delegating, by said network administrator, network management
administrative privileges to said sponsor,
8
9
transferring responsibility for said users and devices from said
network administrator to said sponsor when said template of said
users and devices is associated with said profile of said sponsor; and
10
United States District Court
Northern District of California
11
controlling of said computer network resources by said sponsor,
using said templates assigned to said sponsor by said network
administrator, wherein said sponsor is constrained by said network
administrator by said at least one associated profile, said sponsors
not having network management administrative privileges over said
network administrator.
12
13
14
15
Id. at Clm. 1.4
a.
16
Step One
17
Forescout argues that Fortinet’s asserted patents all fail step one of Alice because they are
18
directed to “the abstract idea of controlling access to a network.” Mot. at 8. With the ’314 Patent
19
in particular, Forescout contends that it recites the (somewhat more limited) “abstract idea of
20
controlling access . . . by delegating certain responsibility from administrators to sponsors,” which
21
is “a common and well-understood business organization strategy.” Id. at 8-9. Forescout relies
22
primarily on three recent Federal Circuit cases—Prism Technologies LLC v. T-Mobile USA, Inc.,
23
Ericsson Inc. v. TCL Communication Technology Holdings Ltd., and Dropbox, Inc. v. Synchronoss
24
25
26
27
28
As with the other asserted patents, Fortinet does not classify Claim 1 as “representative” and in
fact refers to the patents’ dependent claims in arguing for subject-matter eligibility. In
Berkheimer, the Federal Circuit explained that courts may not treat a claim as representative
simply because the patentee “only asserted” a particular “independent claim” and “focused all of
his primary arguments” on that claim through the summary-judgment phase of litigation. See 881
F.3d at 1365. Given the resolution of this motion, however, the Court addresses only the
independent claims that the parties focused on in their briefs.
9
4
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 10 of 27
1
Technologies—holding that “controlling access to, or limiting permission to, resources” is an
2
unpatentable abstract idea. See Ericsson, 955 F.3d 1317, 1326 (Fed. Cir. 2020); Mot. at 6-8.5
3
Forescout also maintains that the ’314 Patent relies on technological processes that are either
4
generic or unexplained to control network access, and so “fail[s] to recite any technological
5
solution” at step one. Mot. at 10.
Fortinet counters that the ’314 Patent is not directed to an abstract idea but to specific
6
7
“technical problems” “faced by network administrators (‘admins’) tasked with configuring,
8
adding, and granting network permissions to a variety of different endpoint devices.” Opp’n at 3-
9
4 (citing ’314 Pat. at 1:19-28). Fortinet also argues that the patent’s use of “profiles and
templates” represents “a specific, technical solution” to these administrative problems, rather than
11
United States District Court
Northern District of California
10
generic or functional computing components. Id. at 6-7. Along the way, Fortinet stresses that
12
courts must not oversimplify or overgeneralize the focus of patent claims, id. at 1, 6, and must
13
credit “statements in the specification that the claimed invention purported to solve weaknesses in
14
the prior art” as true on a motion to dismiss, id. at 6 (quoting Packet Intelligence, 965 F.3d at
15
1309).6
The Court concludes that the ’314 Patent is directed to an abstract idea and so fails Alice
16
17
step one. While Forescout mischaracterizes and oversimplifies the patent as simply a method for
18
“controlling access” or “classifying and organizing data,” Mot. at 9, it fairly describes the patent as
19
being directed to “controlling [network] access by delegating authority,” Docket No. 28 (“Reply”)
20
21
22
23
24
25
26
27
28
See also Prism, 696 Fed. Appx. 1014, 1017 (Fed. Cir. 2017) (holding that “providing restricted
access to resources” is abstract); Dropbox, 815 Fed. Appx. 529, 532 (Fed. Cir. 2020) (affirming
that “controlling access to data” is abstract).
5
6
The Federal Circuit has sent conflicting signals about the role of the specification in the Alice
test. In Packet Intelligence the court explained that, in an “eligibility analysis, we consider the
claim as a whole . . . and read it in light of the specification.” 965 F.3d at 1309 (citing Data
Engine Techs. LLC v. Google LLC, 906 F.3d 999, 1011 (Fed. Cir. 2018)). On the other hand,
cases like Ericsson and Dropbox hold that “[w]hile the specification may be ‘helpful in
illuminating what a claim is directed to . . . the specification must always yield to the claim
language’ when identifying the ‘true focus of a claim.’” Ericsson, 955 F.3d at 1325 (quoting
ChargePoint, Inc. v. SemaConnect, Inc., 920 F.3d 759, 766 (Fed. Cir. 2019)). The Court here
interprets the focus of the asserted patents “in light of the specification” (especially at the step-one,
“directed to” inquiry), but remains mindful the claim language ultimately controls the eligibility
analysis.
10
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 11 of 27
1
at 1. This focus, though narrower than mere network access control, remains abstract. As
2
Forescout asserts, “[d]elegating authority from one person to another within a business is exactly
3
the sort of ‘longstanding commercial practice’ and ‘method of organizing human activity’ that the
4
Supreme Court has stated are within the realm of abstract ideas.” Mot. at 10 (citing Alice, 573
5
U.S. at 220). And “‘[m]erely limiting the field of use of th[is] abstract idea to a particular existing
6
technological environment’—e.g., computer networks—‘does not render the claims any less
7
abstract.” Reply at 2 (quoting Affinity Labs, 838 F.3d at 1259).
The ’314 Patent’s claims therefore “involve a patent-ineligible concept,” Enfish, 822 F.3d
8
9
at 1335, and Fortinet’s efforts to cast them as a “technological solution to a technological
problem,” Packet Intelligence, 965 F.3d at1309, are unpersuasive. As discussed above, in order to
11
United States District Court
Northern District of California
10
satisfy the solution-to-a-problem standard a patent must bring about “improvement[s] in computer
12
or network functionality.” Affinity Labs, 838 F.3d at 1262. Fortinet argues that the ’314 Patent
13
does so “by, inter alia, enhancing system security, minimizing the risk of errors and abuse, and
14
benefitting from department-specific knowledge.” Opp’n at 5 (citing ’314 Pat. at 6:26-36; Enfish,
15
822 F.3d at 1337). But the Federal Circuit has recently explained that “[t]o be a patent-eligible
16
improvement to computer functionality . . . the claims must be directed to an improvement to the
17
functionality of the computer or network platform itself,” Customedia Techs., 951 F.3d at 1365
18
(emphasis added), and so go beyond mere “incidental improvements to computer functionality”
19
via refinement of the abstract idea, Reply at 2 (emphasis in original).7 Here, the benefits that
20
Fortinet attributes to “[l]imited management” “are inherent to the abstract idea of controlling
21
access and delegating authority, which does not even require a computer.” Id. at 2. The ’314
22
Patent is not directed to a specific improvement to the functionality of the computer or network
23
platform itself. Cf. Enfish, 822 F.3d at 1336-37 (finding claims non-abstract where they achieved
24
“benefits over conventional databases, such as increased flexibility, faster search times, and
25
26
27
28
See also Ericsson, 955 F.3d at 1330-31 (“Even assuming that this collection of elements led to a
more efficient way of controlling resource access, ‘our precedent is clear that merely adding
computer functionality to increase the speed or efficiency of the process does not confer patent
eligibility on an otherwise abstract idea.’”) (quoting Intellectual Ventures I LLC v. Capital One
Bank (USA), 792 F.3d 1363, 1370 (Fed. Cir. 2015)).
11
7
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 12 of 27
1
smaller memory requirements,” and so recited “an improvement to computer functionality itself”).
b.
2
Step Two
Proceeding to Alice step two,8 the parties dispute whether the ’314 Patent recites an
3
“inventive concept,” and specifically whether its key components—the “templates” and
5
“profiles”—entail more than “well-understood, routine, conventional activit[ies] previously known
6
to the industry,” Alice, 573 U.S. at 217. Forescout argues that the ’314 Patent’s templates and
7
profiles are merely generic or functional abstractions. Forescout characterizes these components
8
as mere “data,” Mot. at 10—a description that Fortinet does not entirely refute when it defines the
9
templates and profiles as “sets of definitions, rules, and patterns that control the manner in which
10
sponsors can manage IT tasks,” Opp’n at 14 n.5. Forescout analogizes the templates and profiles
11
United States District Court
Northern District of California
4
with the claimed advance in Dropbox, “a set of software and hardware components in the
12
computer system” that “analyzed the ‘user’s security level’ to determine whether to allow access”
13
to a network. See 815 Fed. Appx. at 532-33; Mot. at 8. The Federal Circuit disparaged this
14
“access checker” mechanism as a “black box”—a “functional abstraction” that failed “to describe
15
how to solve the problem” it purportedly addressed. Dropbox, 815 Fed. Appx. at 533.
Fortinet counters that its “template and profile disclosures are robust and detail various
16
17
template and profile embodiments.” Opp’n at 7. It also argues that the recited features of
18
“creating sponsor profiles and templates, and establishing an association between them before
19
granting limited sponsor control, . . . were neither well-understood, routine, nor conventional” at
20
the time of invention. Id. at 14.9 Throughout this discussion, Fortinet emphasizes that
21
“[q]uestions relating to whether the claims recite an inventive concept—such as, whether a
22
claimed technical improvement was well-understood, routine, and conventional at the time of
23
invention—are questions of fact that must be proven by clear and convincing evidence.” Id. at 13-
24
25
26
27
28
8
The parties argue over the profiles and templates at both steps one and two of the Alice inquiry.
As discussed above, the step-one and step-two analyses often overlap, and the Court concludes
that the components are more appropriately addressed at step two.
Fortinet points to the specification’s assertion that there was a “need for IT [departments] to be
able to automate and/or delegate the process of provisioning guest access” because they frequently
struggle to balance the competing needs of network security and connectivity. Id. (quoting ’314
Pat. at 1:19-32; 1:49-50).
12
9
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 13 of 27
1
14 (citing BASCOM, 827 F.3d at 1352).
The Federal Circuit’s caselaw addressing just how much specificity a patent must contain
2
3
in order to avoid this “black box” problem is ambiguous. In Ericsson, for example, the court
4
rejected eligibility at step one where claims recited “standard components that are put to use via
5
[an] ‘access controller’ limitation” but did not “specify how the claim” achieved its intended
6
result. 955 F.3d at 1326. In Packet Intelligence, however, the court conferred eligibility at step
7
one where the claims recited such seemingly vague components as a “parser subsystem,” “flow-
8
entry memory,” and “lookup engine,” and so adequately “detail[ed] how” its intended result was
9
achieved. 965 F.3d at 1309. The court has not offered clear guidance on how to distinguish the
10
inventive from the uninventive in the context of software components; see infra.
Here, Forescout plausibly asserts that the templates and profiles are entirely “abstract—
United States District Court
Northern District of California
11
12
they are merely information, processed on generic computers, and automating paper access
13
credentials.” Reply at 8. And both the patent itself and Fortinet’s opposition brief are not
14
especially satisfactory in explaining just how the templates and profiles actually work. But given
15
the early stage of this litigation, the Court cannot conclude, as a matter of law, that these
16
components’ “ordered combination” was “well-understood, routine, and conventional to a skilled
17
artisan at the time of the patent,” which is indeed “a factual determination.” Berkheimer, 881 F.3d
18
at 1369.10 Moreover, forbearing early adjudication is further warranted by the potential
19
informative value of claim construction and by the patent’s dependent claims, which purportedly
20
recite inventive ways of creating profiles and templates (e.g., by “defin[ing] the sponsors’ limited
21
management by template type, time period, viewing or modifying authority, device type and
22
registration, and deleting or disabling authority”). See Opp’n at 5 (citing ’314 Pat. at Clm. 3).
Although a close question, the Court declines to conclude, at this juncture, that the ’314
23
24
Patent is invalid under § 101 as a matter of law. This ruling is without prejudice to revisiting
25
26
27
28
10
In fact, the Federal Circuit in Berkheimer reversed a grant of summary judgment to the
defendant where a patent specification’s “claimed improvement increase[d] efficiency and
computer functionality over the prior art systems.” Id. This contention created “a genuine issue of
material fact” that made “summary judgment inappropriate” for those claim limitations that
captured the alleged improvements. Id.
13
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 14 of 27
1
§ 101 eligibility at a later stage.
The ’299 Patent
2
2.
3
According to its specification, the ’299 Patent “relates to computer communications
4
security, in particular, network access control (NAC) and its use for securing networks by
5
controlling the access of electronic devices connecting to those networks using remote access
6
connection methods such as Virtual Private Networks or Dialup services.” ’299 Pat. at 1:14-19.
7
Independent Claim 1 recites:
8
1. A system for out-of-band control of network access supporting
multiple connections comprising:
9
a network comprising a server device, at least one terminal device,
and a communication link between them;
10
United States District Court
Northern District of California
11
at least one remote access device (RAD) comprising memory, and
communicatively coupled to said network; and
12
a Network Access Control Server (NACS) comprising memory,
controlling said network access, wherein said network access control
is out of band and comprises:
13
14
identity management of said connections;
endpoint compliance of said connections;
and usage policy enforcement of said connections;
15
16
wherein said enforcement is out of band and is accomplished on said
RAD, comprising communicating with said RAD to make real-time
changes to its running configuration, whereby said enforcement is
vendor-independent and said system is RAD-agnostic;
17
18
19
said network access control comprising receiving a connect attempt
to said network from a user device;
20
21
said RAD authenticating connecting user to said NACS for said out
of band network control;
22
said NACS capturing RAD identification, location;
23
restricting access to said network by said user device with a network
access filter (NAF) configured on said RAD;
24
said RAD directing said client device to an agent;
on said user device, running said agent;
said agent identifying client to said NACS;
modifying said NAF based on compliance; and monitoring postconnection of successful connections.
25
26
27
28
Id. at Clm. 1.
14
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 15 of 27
Forescout argues that the claim is patent-ineligible at Alice step one because it is directed
1
2
to “the abstract idea of controlling access, in the context of a network using various computing
3
devices . . . and generic software . . . to implement generically-described network control
4
functionalities . . . .” Mot. at 12. Forescout compares the ’299 Patent’s computing devices (e.g.,
5
the “Remote Access Device” and “Network Access Control Server”) and network control
6
functionalities (e.g., “identity management,” “compliance,” and “usage policy enforcement”) with
7
the similarly nebulous components recited in Ericsson and Dropbox (e.g., an “access manager,”
8
“access checker,” and “access filter”). Id. It also characterizes the claim’s “network access filter”
9
as the kind of “black box” that was deemed incapable of conferring eligibility in Dropbox. Id.
Fortinet describes the ’299 Patent as another technological solution to a technological
10
United States District Court
Northern District of California
11
problem, directed not to the abstract idea of network access control but “to a specific solution for
12
providing out-of-band, RAD-agnostic network access control through use of a NAF.” Opp’n at
13
10.11 The purported benefits of this system include reductions in “network congestion,”
14
“enhance[d] system security,” and “increase[d] access control versatility.” Id. at 9. Fortinet
15
analogizes the ’299 Patent to the claimed advance in Ancora, where the Federal Circuit held that a
16
patent addressing the “vulnerability of license-authorization software to hacking” was not directed
17
to an abstract idea at step one. See 908 F.3d at 1349. Rather, it constituted “a non-abstract
18
computer-functionality improvement,” achieved through “a specific technique that departs from
19
earlier approaches.” Id. at 1348. Importantly, the claim “specifically identifie[d] how that
20
functionality improvement [was] effectuated in an assertedly unexpected way,” i.e., by using an
21
unconventional portion of a computer’s memory to store a license record. Id. at 1348-49. Fortinet
22
also contends that the ’299 Patent’s recitation of a network access filter (“NAF”) is not the “black
23
box” that Forescout makes it out to be, as it adequately “details how the NAF” controls network
24
access by user devices. Opp’n at 10.
25
26
27
28
11
Fortinet explains that computer networks faced the problem of a growing number of
“connections methods (e.g., dedicated, directly wired, dial-up, wireless, and virtual private
networks (VPN)) that increase the need for complex access control and security.” Id. at 8 (citing
’299 Pat. at 1:23-38). The solution achieved by the ’299 Patent was “a system for providing outof-band (i.e., out of the network data path) control of network access capable of supporting
multiple devices and connections.” Id.; see also ’299 Pat. at 1:43-46.
15
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 16 of 27
The step-one inquiry again presents a close question. The technical jargon of the ’299
1
2
Patent is difficult to parse, and both the meaning and structure of the patent’s key components—
3
the NAF, the RAD, the NACS—remain vague.12 As discussed above, the distinction between the
4
uninventive control features in Prism, Ericsson, and Dropbox (an “access manager,” “access
5
checker,” etc.) and the inventive features in Ancora (a “license record”) or Packet Intelligence (a
6
“parser subsystem,” “look-up engine,” etc.) is less than clear. Given these uncertainties, the
7
question of whether the ’299 Patent recites a technological solution to a technological problem
8
with adequate specificity can be answered more confidently with additional facts and claim
9
construction. Forescout argues, that the ’299 Patent merely recites a kind of Trojan horse for
claiming the very idea of resource access.13 While the vagueness of the ’299 Patent’s components
11
United States District Court
Northern District of California
10
invites skepticism about its ultimate viability, the Court cannot yet decide on a Rule 12(b)(6)
12
motion to dismiss, that the patent does not represent a technological solution to a technological
13
problem.
14
3.
15
According to its specification, the ’662 Patent relates to “methods and systems for
The ’662 Patent
16
providing security in a communication network by selectively enabling various features for
17
scanning user traffic streams.” ’662 Pat. at 1:16-20. “Illustrative” Claim 1 recites, Opp. at 11:
18
1. A method comprising:
19
receiving, by a network security device within an enterprise
network, an application protocol request directed to an external
network that is originated by a client device associated with the
enterprise network;
20
21
determining, by the network security device, based on the
application protocol request whether a network parameter of the
external network is associated with a set of trusted networks; and
22
23
24
25
26
27
28
In this, the ’299 Patent resembles the claimed advance in Prism, where the court held ineligible
a four-step process for network access control, that included: “(1) receiving identity data from a
device with a request for access to resources; (2) confirming the authenticity of the identity data
associated with that device; (3) determining whether the device identified is authorized to access
the resources requested; and (4) if authorized, permitting access to the requested resources.” 696
Fed. Appx. at 1017.
12
13
Another way of putting this point is that there appears little risk of Fortinet preempting the
entire field of “controlling resources” through its recitation of the patent’s key limitations.
16
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 17 of 27
1
selectively disabling, by the network security device, application of
a subset of security features of a plurality of security features to be
applied to network traffic exchanged between the client device and
the external network while the client device is accessing the external
network when a result of said determining is affirmative, wherein
the subset of security features are selected based on a trust level
associated with the external network.
2
3
4
5
’662 Pat. at Clm. 1.
a.
6
Step One
At Alice step one, Forescout again argues that the patent is directed to “the abstract idea of
7
controlling access,” in this case by “using unspecified security features on a network based on
9
simply analyzing data.” Mot. at 13. Once more, it analogizes to Prism and Dropbox: as in the
10
latter case, the claims here “recite the use of a ‘trust level,’” which the court in the earlier case
11
United States District Court
Northern District of California
8
held insufficient to constitute a technological solution. Id. at 14 (citing Dropbox, 815 Fed. Appx.
12
at 533). And as in Dropbox, the claims here fail to explain “how the ‘selectively disabling’ (or
13
any other claim step) is accomplished.” Mot. at 14. Fortinet responds that the ’662 Patent is not
14
abstract because it solves “the technical problem” that occurs when security features are deployed
15
indiscriminately to out-of-network traffic streams. Opp’n at 11 (citing ’662 Pat. at 1:16-51). The
16
patent “solved this problem by selectively disabling and enabling security features on traffic
17
streams based on the trust level of the destination,” with the resulting benefit of “higher system
18
performance” through “optimize[d] utilization of the system resources.” Id. (citing ’662 Pat. at
19
12:55-66). Fortinet analogizes to the claimed advances recently deemed patent-eligible by the
20
Federal Circuit in Packet Intelligence and SRI International v. Cisco Systems, Inc. See id. at 11-
21
12.
Fortinet’s analogies here are strained, as Packet Intelligence and SRI are firmly focused on
22
23
the particularities of computer-network technology.14 With the ’662 Patent, in contrast, it is easy
24
to generalize the claimed advance as a far broader “method of organizing human activity.” See
25
26
27
28
In Packet Intelligence, the court held that a claim “solve[d] a technological problem” “unique to
computer networks,” i.e., “identifying disjointed connection flows in a network environment” to
provide more “granular, nuanced, and useful classifications of network traffic.” 965 F.3d at 130910. And in SRI, it held that “using a plurality of network monitors” and “integrating reports from
the monitors” solved a specifically “technological problem arising in computer networks:
identifying hackers or potential intruders into the network.” 930 F.3d at 1303.
17
14
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 18 of 27
1
Alice, 573 U.S. at 220. As Forescout notes, “[r]elaxing security measures for trusted users is an
2
abstract and longstanding human activity, no different than waiving x-ray checkpoints for pilots
3
and flight attendants.” Reply at 5; see also Dropbox, 815 Fed. Appx. at 532 (denying eligibility to
4
“a nearly identical system for controlling access that ‘provide[s] the resource only if the trust level
5
for the mode of identification is sufficient for the sensitivity level of the resource’”). Forescout
6
also makes the sensible point that the benefits to system performance claimed by Fortinet are
7
merely incidental to “not limiting access” and do not flow—as they must at step one—from “an
8
improvement in the functionality of the . . . network platform itself.” Reply at 6 (quoting
9
Customedia, 951 F.3d at 1364). The ’662 Patent is therefore directed to “the abstract idea of
disabling security for trusted communication,” id., reciting ineligible subject matter at Alice step
11
United States District Court
Northern District of California
10
one.
12
13
b.
Step Two
Proceeding to Alice step two, Forescout emphasizes that the patent neither “require[s] any
14
special hardware . . . nor does [it] disclose any novel hardware”; instead, the hardware that it
15
mentions “is conventional and described in highly generic and functional terms.” Mot. at 19.
16
Indeed, Forescout shows that the specification identifies many well-known “network security
17
devices” (e.g., “network firewalling, VPN, antivirus,” etc.), “teaches the use of known client
18
computing devices” (e.g., “fax machines, printers, scanners,” etc.), and “further identifies multiple
19
known network types for use in the invention” (e.g., “direct connect, Ethernet,” etc.). Id. at 19-20
20
(quoting ’662 Pat. at 4:6-12, 5:13-20, 5:24-35). “The patent also admits that security features
21
[recited in the claims] were known in ‘conventional methods and systems.’” Id. at 20 (quoting
22
’662 Pat. at 1:39-51).
23
As with the ’299 Patent, Fortinet argues that the inventive concept of the ’662 Patent is the
24
very idea to which it was directed at step one, i.e., “selectively disabling a subset of security
25
features upon a determination that an external network is trusted.” Opp’n at 17. But if the focus
26
of the claim is found to be a patent-ineligible abstract idea then that same idea cannot also
27
constitute an inventive concept at step two. See Chamberlain Grp., Inc. v. Techtronic Indus. Co.,
28
935 F.3d 1341, 1349 (Fed. Cir. 2019) (confirming that “the abstract idea that the claims are
18
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 19 of 27
1
directed to” “cannot be an inventive concept”). Beyond this contention, Fortinet offers only the
2
conclusory and “boilerplate” statement that “the ordered combination of the recited limitations is
3
not generic and was neither routine nor conventional at the time of invention.” Reply at 9; Opp’n
4
at 17.
But Fortinet also contends that dependent claims 7, 9, and 15 “further limit and explain the
5
6
content and structure of the step of receiving a trust identifier” and that the specification
7
“describes how the specific claimed methods address shortcomings in ‘conventional methods and
8
systems.’” Opp’n at 17 (quoting ’662 Pat. at 1:39-51, 1:55-58). While these allegations are
9
perhaps little more than the boilerplate Fortinet elsewhere offers in arguing for the inventiveness
of the ’662 Patent, it again points out that these issues represent “exactly the type of fact question”
11
United States District Court
Northern District of California
10
that cannot be resolved on the pleadings. See id. (citing Berkheimer, 881 F.3d at 1368). Forescout
12
makes the colorable argument that, in this case, the Court need only look “to the specification,
13
which describes the [components] as either performing basic computer functions . . . or
14
performing functions ‘known’ in the art.” In re TLI Commc’ns, 823 F.3d at 613-14. This
15
discussion underscores the potential value of claim construction and development of facts that
16
may inform the § 101 analysis.
17
4.
Conclusion
18
As the foregoing indicates, the Court remains skeptical of the subject-matter eligibility of
19
Fortinet’s asserted patents (especially the ’662 Patent). But it cannot, at this juncture, hold that the
20
’662 Patent invalid under § 101. This decision not to dismiss does not preclude Forescout from
21
re-raising the § 101 issue at a later stage of litigation, such as at summary judgment. In fact, at the
22
hearing on Forescout’s motion to dismiss, counsel for Fortinet agreed that the outcome of claim
23
construction might make it appropriate for the Court to revisit the eligibility questions addressed
24
above. Docket No. 45 (“Tr.”) at 22.
Accordingly, for the reasons stated above, Forescout’s motion to dismiss is DENIED on
25
26
subject-matter eligibility grounds without prejudice.
27
B.
28
Infringement
Section 271(a) of the Patent Act provides that “whoever without authority makes, uses,
19
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 20 of 27
1
offers to sell, or sells any patented invention . . . during the term of the patent therefor, infringes
2
the patent.” 35 U.S.C. § 271(a). Infringement may be either direct or indirect. “[L]iability for
3
indirect infringement of a patent requires direct infringement.” In re Bill of Lading Transmission
4
& Processing Sys. Patent Litig., 681 F.3d 1323, 1333 (Fed. Cir. 2012). A failure to sufficiently
5
plead direct infringement therefore requires dismissal of indirect infringement claims, as well. See
6
AlterG, Inc. v. Boost Treadmills LLC, 388 F. Supp. 3d 1133, 1143 (N.D. Cal. 2019).
1.
8
To be liable for direct infringement, a device must practice all elements of a claim. See
9
Drone Labs, LLC v. Dedrone Holdings, Inc., No. 19-cv-01281-EMC, 2019 WL 4345955, at *4
10
(N.D. Cal. Sept. 12, 2019) (dismissing complaint where plaintiff failed to allege infringement of
11
United States District Court
Northern District of California
7
Direct Infringement
all claim limitations). As a result, “[a] direct infringement claim does not satisfy the standards of
12
Twombly and Iqbal where it does not at least contain factual allegations that the accused product
13
practices every element of at least one exemplary claim.” AlterG, Inc., 388 F. Supp. 3d at 1142-43.
14
At the same time, however, “nothing about Twombly and Iqbal suggests that a patent infringement
15
complaint that largely tracks the language of the claims to allege infringement is insufficient per
16
se.” Avago Techs., 2016 WL 1623920, at *4. “[T]his District generally has not required detailed
17
infringement theories until the time that infringement contentions are served, which is typically
18
several months after a complaint has been filed.” Id. (citing Patent L.R. 3-1).15
Forescout argues that Fortinet’s complaint fails to plead direct infringement for two
19
20
reasons. First, “Fortinet fails to clearly identify who is the direct infringer”; second, the
21
“Complaint is almost entirely devoid of factual allegations about the accused products.” Mot. at
22
21. But its arguments here are unavailing under the aforementioned standard for infringement
23
allegations. Forescout acknowledges that the complaint focuses “on ‘customers, purchasers, users
24
and developers’ of the accused products,” even as it “fails to identify by name a single person or
25
entity that allegedly is a direct infringer.” Id. But, as the Federal Circuit has concluded, “[t]o state
26
27
28
15
In accordance with Patent Local Rule 3-1, Fortinet submitted its infringement contentions to
Forescout on August 27, 2020, well in advance of the hearing on Forescout’s motion to dismiss.
See Docket No. 46-2.
20
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 21 of 27
1
a claim for indirect infringement . . . a plaintiff need not identify a specific direct infringer if it
2
pleads facts sufficient to allow an inference that at least one direct infringer exists.” In re Bill of
3
Lading, 681 F.3d at 1336 (emphasis in original). Forescout also acknowledges that, for each of
4
the asserted patents, “Fortinet identifies the accused products,” maps claim language onto the
5
functionality of the infringing products, and cites two specific user manuals found on Forescout’s
6
website that allegedly enable direct infringement. Mot. at 21-22. In this District, allegations with
7
this amount of detail suffice to survive a motion to dismiss.16
Fortinet has therefore established a plausible underlying claim of direct infringement
8
9
against Forescout’s “customers, purchasers, users and developers.” Id. at 21. The Court therefore
proceeds to analyze whether Fortinet has carried its additional burdens of pleading inducement
11
United States District Court
Northern District of California
10
and contributory infringement.
12
2.
Inducement
13
Under § 271(b) of the Patent Act, “[w]hoever actively induces infringement of a patent
14
shall be liable as an infringer.” 35 U.S.C. § 271(b). Addressing the intent element of this
15
provision, the Supreme Court has held that induced infringement “requires knowledge that the
16
induced acts constitute patent infringement.” Glob.-Tech Appliances, Inc. v. SEB S.A., 563 U.S.
17
754, 766 (2011). Thus, a plaintiff alleging inducement must show that the defendant “both (1)
18
‘knew of the patent’ and (2) ‘knew as well that ‘the induced acts constitute patent infringement.’”
19
Google LLC v. Princeps Interface Techs., No. 19-cv-06566-EMC, 2020 WL 1478352, at *3 (N.D.
20
Cal. Mar. 26, 2020) (quoting Commil USA, LLC v. Cisco Sys., Inc., 135 S. Ct. 1920, 1926 (2015)).
21
The Supreme Court has further clarified that a defendant’s “belief regarding validity cannot negate
22
the scienter required under § 271(b).” Commil USA, 135 S. Ct. at 1928.
Arguing, again, that Fortinet has failed to adequately allege direct infringement, Forescout
23
24
25
26
27
28
For instance, this Court in Avago Technologies declined to dismiss a plaintiff’s infringement
allegations where they contained “sufficient specificity to provide at least some notice” of the
basic nature of the claim to the defendant. 2016 WL 1623920, at *4. And in Software Research,
Inc. v. Dynatrace LLC, this Court again denied a motion to dismiss where the complaint “(i)
sufficiently identified the accused product” and “(ii) sufficiently described the functionality of [the
accused product] and tied it to the claim limitations in the patents-in-suit.” 316 F. Supp. 3d 1112,
1132 (N.D. Cal. 2018).
21
16
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 22 of 27
1
also contends that Fortinet’s inducement claim should fail because the complaint “fails to plead
2
any factual allegations that Forescout knew its products were infringing and instead relies solely
3
on knowledge of the patent by virtue of Fortinet’s Complaint.” Mot. at 24. Fortinet responds (1)
4
that the Complaint adequately alleges direct infringement; (2) that “it is undisputed that Forescout
5
knew of the Asserted Patents at least as of the filing of the Complaint”; and (3) that, “with regard
6
to intent, the Complaint alleges that Forescout ‘instruct[s], direct[s], and/or requir[es] others,
7
including customers, purchasers, users and developers, to perform some of the steps of the method
8
claims” via instructional materials on Forescout’s website. Opp’n at 22 (quoting Compl. ¶¶ 39,
9
53, 67; 40, 54, 68).
10
As Fortinet has adequately pled direct infringement, see supra, and Forescout
United States District Court
Northern District of California
11
acknowledges that it had knowledge of the alleged infringement once the complaint was filed, the
12
crux of the inducement question is whether Fortinet has set forth sufficient facts showing a
13
“specific intent to encourage another’s infringement.” Google, 2020 WL 1478352, at *3. This
14
Court has addressed the issue on several occasions. In CAP Co., Ltd. v. McAfee, Inc., it dismissed
15
an inducement action for failing to plead specific intent. The patentee in that case claimed
16
inducement by alleging that the accused products were “sold directly to customers and used by
17
them pursuant to [defendant’s] user manual guides, and support articles,” but made only “passing
18
references” to the documents “without ever saying what those materials contain.” CAP, No. 14-
19
cv-05068-JD, 2015 WL 3945875, at *3, *5 (N.D. Cal. June 26, 2015). Similarly, in Hypermedia
20
Navigation v. Google LLC, the Court reached the same conclusion where the plaintiff “only
21
state[d] bald conclusions that an end user following [defendant’s] instructions results in
22
infringement.” No. 18-cv-06137-HSG, 2019 WL 1455336, at *3 (N.D. Cal. Apr. 2, 2019). And
23
in Google, a patentee alleged that the company had induced infringement by “distributing the
24
Accused Instrumentalities and providing instructional materials and/or services related to the
25
Accused Instrumentalities.” 2020 WL 1478352, at *4. The Court again dismissed the case
26
because, as in CAP, the patentee’s allegations made only “general and imprecise references” to
27
instructional materials without “ever say[ing] what those materials contain.” Id.
28
Fortinet argues here that its “factual allegations go beyond those at issue” in Google
22
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 23 of 27
because the Complaint “provides ‘specific instructional materials or services as examples’ and
2
explains how the public product materials support infringement.” Opp’n at 23 (quoting Google,
3
2020 WL 1478352, at *5). As to the first contention, Hypermedia held that referencing
4
“instructions in the links provided in the complaint,” as Fortinet has done here, is insufficient by
5
itself to survive a motion to dismiss. See 2019 WL 1455336, at *3. The court found that such
6
evidence at most established that “an end user following [the] instructions in the links” commits
7
infringement, but not that the defendant possessed the requisite “specific intent to encourage
8
others’ infringement.” Id. Fortinet’s second contention—that it “explains how the public product
9
materials support infringement”—presents a closer question. Fortinet points to the complaint’s
10
repeated assertion that Forescout “instruct[s], direct[s], and/or requir[es] others . . . to perform
11
United States District Court
Northern District of California
1
some of the steps of the method claims.” Opp’n at 22 (quoting Compl. at ¶¶ 39, 53, 67). But this
12
statement reads more like a “formulaic recitation[] of the relevant legal standard[]” than a properly
13
factual allegation. Mot. at 24.
14
In the section of its opposition devoted to direct infringement, however, Fortinet describes
15
the function of Forescout’s instructional materials. For example, “the Complaint describes how
16
the ’622 Accused Products infringe based on publicly-available product materials, e.g., ‘defin[ing]
17
Legitimate Traffic based on source information such as source or destination address,’ and
18
‘disab[ling] features such as Threat Protection features based on traffic type,’” and provides URLs
19
for those materials. Opp’n at 20 (quoting Compl. at ¶¶ 72-73). Fortinet analogizes these
20
allegations to those in Firstface Co., Ltd. v. Apple, Inc., which stated that the defendant “actively
21
coached customers to use the accused devices in an infringing manner through online tutorials and
22
similar instructional matters.” No. 18-cv-02245-JD, 2019 WL 1102374, at *1 (N.D. Cal. Mar. 8,
23
2019). It also cites Software Research, Inc. v. Dynatrace LLC, where the Court held that
24
“numerous references to public material on [the defendant’s] website . . . give rise to an inference
25
of specific intent.” 316 F. Supp. 3d 1112, 1135 (N.D. Cal. 2018).
26
While Fortinet’s inducement claim thus presents another close question, the Court
27
concludes that Fortinet has set forth its allegations with enough detail and specificity to survive a
28
motion to dismiss. The Court DENIES Forescout’s motion with respect to Fortinet’s inducement
23
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 24 of 27
1
theory of infringement. However, since Fortinet is likely to amend its complaint (see below), it
2
should provide greater clarity and specificity in its inducement allegations.
3.
4
Under § 271(c) of the Patent Act, a plaintiff stating a claim for contributory infringement
5
must show that the defendant sells (or offers to sell) a component of a patent, “knowing the same
6
to be especially made or especially adapted for use in an infringement of such patent, and not a
7
staple article or commodity of commerce suitable for substantial noninfringing use.” 35 U.S.C.
8
§ 271(c). A plaintiff pleading contributory infringement must “provide factual underpinnings for
9
its allegations” that the accused products are made or are especially adapted for an infringing use
10
or “that there are no substantial noninfringing uses of the accused devices.” Uniloc USA, Inc. v.
11
United States District Court
Northern District of California
3
Contributory Infringement
Logitech, Inc., No. 18-cv-01304-LHK, 2018 WL 6025597, at *3 (N.D. Cal. Nov. 17, 2018). A
12
complaint that “merely paraphrases the contributory infringement statute and presents no factual
13
underpinnings” fails to satisfy Rule 8 and must be dismissed. Google, 2020 WL 1478352, at *5.
14
The analysis here overlaps somewhat with the inducement inquiry and the parties devote
15
scant space in their briefs specifically to the contributory-infringement issue. See Mot. at 24;
16
Opp’n at 24; Reply at 14-15. The key question is whether Fortinet sufficiently alleged that
17
Forescout’s accused products are, per § 271(c), “especially made or especially adapted” for an
18
infringing use and are not “suitable for substantial noninfringing use.” Forescout identifies a
19
single paragraph in the complaint (repeated for each asserted patent) that expressly deals with
20
contributory infringement. See Mot. at 24. The paragraph states:
21
22
23
24
Forescout further contributes to the infringement of one or more
claims of the [asserted] patent . . . by offering to sell, selling, and/or
importing into the United States a component of the [ ] Accused
Products . . . knowing the same to be especially made or especially
adapted for use in an infringement of the [asserted] patent . . . and is
not a staple article or commodity of commerce suitable for
substantial noninfringing use.
25
Id. (quoting Compl. ¶¶ 42, 56, 70. As Forescout argues, this language “simply parrots the legal
26
test” for contributory infringement.
27
28
Fortinet counters by quoting from Software Research, which states that a “plaintiff need
not prove that the accused products have no substantial non-infringing uses at the pleading stage.”
24
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 25 of 27
1
Opp’n at 24 (quoting 316 F. Supp. 3d at 1316). But that decision still requires a patentee to
2
“alleg[e] one or more infringing uses of the accused products and alleg[e] that the products have
3
no other uses,” and it declined to dismiss only because the complaint “sufficiently suggest[ed] that
4
there are no other substantial uses of [the accused product] that do not infringe.” 316 F. Supp. 3d
5
at 1316 (emphasis added). Here, while the complaint as a whole perhaps implies that the accused
6
products are “especially made or especially adapted for an infringing use,” it fails to allege facts
7
establishing that Forescout’s products are not suitable for a substantial non-infringing use. See
8
Reply at 14.
9
10
The Court therefore GRANTS Forescout’s motion to dismiss Fortinet’s contributoryinfringement claims, but gives Fortinet leave to amend.
United States District Court
Northern District of California
11
4.
12
Section 284 of the Patent Act directs courts to award a prevailing claimant “damages
13
adequate to compensate for the infringement” and “may increase the damages up to three times the
14
amount found or assessed.” 35 U.S.C. § 284. Thus, “a finding of direct infringement is a
15
prerequisite for willful infringement,” AlterG, 388 F. Supp. 3d at 1143, and “willfulness is
16
relevant [only] to damages calculations,” Google, 2020 WL 1478352, at *2. The Supreme Court
17
has explained that “courts should generally only award enhanced damages . . . in ‘egregious cases
18
typified by willful misconduct.’” Id. (quoting Halo Elecs., Inc. v. Pulse Elecs., Inc., 136 S. Ct.
19
1923, 1934 (2016)). Such damages “are not to be meted out in a typical infringement case, but are
20
instead designed as a ‘punitive’ or ‘vindictive’ sanction for egregious infringement behavior,” i.e.,
21
behavior that is “‘willful, wanton, malicious, bad-faith, deliberate, consciously wrongful, flagrant,
22
or—indeed—characteristic of a pirate.” Halo, 136 S. Ct. at 1932. “Since Halo, courts in this
23
District have required willful infringement claims to show both knowledge of the ... [p]atents and
24
egregious’ conduct in order to survive a motion to dismiss.” Google, 2020 WL 1478352, at *2
25
(internal quotation omitted).
26
Willful Infringement
In addition to repeating its argument that Fortinet has failed to plead direct infringement,
27
Forescout asserts that the complaint “contains no factual allegations supporting that Forescout has
28
engaged in ‘egregious conduct.’” Mot. at 25. As Forescout points out, Fortinet’s willful
25
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 26 of 27
1
infringement claim “is pled in a single paragraph, repeated for each patent,” declaring that
2
“Forescout is acting recklessly and continues to willfully, wantonly, and deliberately engage in
3
acts of infringement of the” asserted patents. Id. (quoting Compl. at ¶ 9). Fortinet responds that
4
its allegations concerning “pre-suit outreaches to Forescout concerning its patent portfolio” and
5
the fact that “Forescout continues to sell the Accused Products and services” suffice to survive a
6
motion to dismiss. Opp’n at 24.
7
Based on this District’s precedents, Forescout makes the stronger argument. Fortinet relies
8
primarily on UPF Innovations, LLC v. Intrinsic ID, Inc. for the proposition that (1) notifying an
9
accused infringer of infringement and (2) alleging that the infringer continues to infringe after
notification suffices to plead willfulness. See Opp’n at 24 (quoting UPF, No. 19-cv-02711-VC,
11
United States District Court
Northern District of California
10
2019 WL 4729601, at *1 (N.D. Cal. Sept. 17, 2019)). It is true that under the reasoning of UPF
12
Fortinet’s allegations might suffice to survive Rule 12(b)(6). But UPF is a brief, four-paragraph
13
order that cites, in the relevant passage, to out-of-circuit caselaw decided before the Supreme
14
Court’s Halo decision—which clearly requires a showing of “egregious infringement behavior.”
15
See id.; Halo, 136 S. Ct. at 1932.
16
In Finjan, Inc. v. Cisco Systems, on the other hand, the Court dismissed the plaintiff’s
17
claims of willful infringement because it failed to allege facts showing either knowledge or
18
egregious conduct by the defendant. See No. 17-cv-00072-BLF, 2017 WL 2462423, at *12-15
19
(N.D. Cal. June 7, 2017). There, Finjan alleged that Cisco was “willfully, wantonly, and
20
deliberately engag[ing] in acts of infringement” because, “despite knowledge of Finjan’s patent
21
portfolio,” it “ha[d] sold and continue[d] to sell the accused products.” Id. at *7. The Court held
22
that such “conclusory allegations of knowledge and infringement” could not satisfy the
23
requirement of “specific factual allegations about Cisco’s subjective intent, or any other aspects of
24
Cisco’s behavior that would suggest its behavior was ‘egregious.’” Id. at *15. Similarly, in
25
Google the Court dismissed the defendant’s willful infringement claim for failing to “plead
26
specific factual allegations of egregious conduct.” 2020 WL 1478352, at *3. Even though the
27
patentee satisfied the knowledge requirement by “specifically nam[ing] the . . . patent at issue in
28
the present suit” in its complaint, its allegations that Google’s infringement was willful because it
26
Case 3:20-cv-03343-EMC Document 55 Filed 11/02/20 Page 27 of 27
1
2
implemented a design-around in response to the suit did “not establish egregious conduct.” Id.
Fortinet’s allegations here do not differ meaningfully from those found insufficient in
3
either Finjan or Google. While Forescout had knowledge of its infringement once the complaint
4
was filed, Fortinet does not adequately allege that Forescout’s conduct was “egregious” under
5
Halo. As a result, Forescout’s motion to dismiss Fortinet’s claim for willful infringement is
6
GRANTED with leave to amend.
V.
7
CONCLUSION
8
For the foregoing reasons, the Court DENIES Forescout’s motion to dismiss on the
9
grounds of subject-matter eligibility. It also DENIES Forescout’s motion as to Fortinet’s induced
infringement claims. It GRANTS Forescout’s motion as to Fortinet’s contributory and willful
11
United States District Court
Northern District of California
10
infringement claims without prejudice, with leave to amend within thirty (30) days of the date of
12
this order.
13
This order disposes of Docket No. 24.
14
15
IT IS SO ORDERED.
16
17
Dated: November 2, 2020
18
19
20
______________________________________
EDWARD M. CHEN
United States District Judge
21
22
23
24
25
26
27
28
27
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?