Finjan, Inc. v. Blue Coat Systems, Inc.

Filing 156

ORDER DENYING #104 BLUE COAT'S MOTION FOR JUDGMENT ON THE PLEADINGS. Signed by Judge Beth Labson Freeman on 12/13/2016. (patentlcsjS, COURT STAFF) (Filed on 12/13/2016)

Download PDF
1 2 3 UNITED STATES DISTRICT COURT 4 NORTHERN DISTRICT OF CALIFORNIA 5 SAN JOSE DIVISION 6 7 FINJAN, INC., Case No. 15-cv-03295-BLF Plaintiff, 8 v. 9 10 BLUE COAT SYSTEMS, LLC, ORDER DENYING BLUE COAT’S MOTION FOR JUDGMENT ON THE PLEADINGS Defendant. United States District Court Northern District of California 11 12 13 Defendant Blue Coat Systems, LLC (“Blue Coat”) brings this motion for judgment on the 14 pleadings that U.S. Patent No. 8,677,494 (the “’494 patent”) is invalid for failure to claim patent- 15 eligible subject matter under 35 U.S.C. § 101. ECF 104. For the reasons discussed below, the 16 Court DENIES Blue Coat’s motion. 17 I. BACKGROUND The ’494 Patent 18 A. 19 Finjan owns the ’494 patent, which is entitled “Malicious Mobile Code Runtime 20 Monitoring System and Methods.” The ’494 patent was filed on November 7, 2011 and issued on 21 March 18, 2014, but belongs to a long line of continuation and continuation-in-part applications 22 which originated from patent applications filed in 1996. One of these parent applications resulted 23 in U.S. Patent No. 6,092,194 (the “’194 patent”), which the ’494 patent identifies in its 24 specification and states is “incorporated by reference.” ’494 patent, col. 1 ll. 33-38. 25 The ’494 patent generally relates to systems and methods for protecting devices on an 26 internal network from code, applications, and/or information downloaded from the Internet that 27 perform malicious operations. Id., Abstract. According to the ’494 patent, at the time of 28 invention, virus protection strategies for networked computers “met with limited success at best” 1 because virus scanning was localized and reactive: virus protection programs were installed on 2 individual computers and only protected against known viruses. Id., col. 2 ll. 11-21. Because of 3 this, these “program[s] [would] inevitably [be] surmounted by some new virus,” at which point 4 they would need to be updated or replaced and the cycle would begin again. Id. In addition, 5 certain types of viruses were “not well recognized or understood, let alone protected against.” Id., 6 col. 2 ll. 22-24. This included viruses that were hidden in executable programs such as 7 “Downloadables.”1 Id., col. 2 ll. 23-30. “Accordingly, there remains a need for efficient, accurate, 8 and flexible protection of computers and other network connectable devices from malicious 9 Downloadables.” Id., col. 2 ll. 45-48. The ’494 patent purports to address this problem by detecting whether downloadable 10 United States District Court Northern District of California 11 content contains potentially malicious code before it is allowed to be run on the destination 12 computer. See id., col. 5 l. 60-col. 6 l. 6. At a high level, the disclosed embodiments describe a 13 protection engine that generally resides on a network server and inspects incoming downloads for 14 executable code. See id., col. 2 l. 20-col. 3 l. 4; ’194 patent, col. 3 ll. 10-21. The claims are 15 directed to a narrow aspect of this, which involve a solution consisting of three basic steps that 16 appear to be most closely detailed in the ’194 patent: First, an incoming Downloadable is intercepted. ’494 patent, col. 21 l. 20, col. 22 l. 8. The 17 18 ’194 specification describes an “Internal Network Security System” which sits in between an 19 external computer network and the internal computer network and “examines Downloadables 20 received from external computer network 105, and prevents Downloadables deemed suspicious 21 from reaching the internal computer network 115.” ’194 patent, col. 3 ll. 10-13. Second, the Downloadable is scanned and “security profile data,” which includes “a list of 22 23 suspicious computer operations that may be attempted by the Downloadable,” is derived. ’494 24 patent, col. 21 ll. 21-23, col. 22 ll. 10-13. The ’194 specification discloses a “code scanner” 25 component that scans through a Downloadable and generates the “security profile data” (also 26 27 28 1 The parties agree in their Patent Local Rule 4-3 Joint Claim Construction Statement that a “Downloadable” is “an executable application program, which is downloaded from a source computer and run on the destination computer.” ECF 79 at 1. 2 1 referred to as “Downloadable Security Profile (DSP) data,” ’194 patent, col. 4 ll. 17-18). ’194 2 patent, col. 5 ll. 41-42. Figure 7 of the ’194 specification illustrates this process: 3 4 5 6 7 8 9 10 United States District Court Northern District of California 11 12 13 14 15 16 17 18 Id., Fig. 7. At the beginning of the process, the code scanner “disassemble[s] the machine code of 19 the Downloadable.” Id., col. 9 ll. 23-24. Next, the code scanner iterates through the machine 20 code, (1) resolving the next command in the machine code, (2) “determin[ing] whether the 21 resolved command is suspicious,” and, if so, (3) “decod[ing] and register[ing] the suspicious 22 command and its command parameters as DSP data.” Id., col. 9 ll. 20-42. The format of the DSP 23 data is “based on command class (e.g., file operations, network operations, registry operations, 24 operating system operations, resource usage thresholds).” Id., col. 9 ll. 38-42. Examples of 25 operations deemed potentially hostile include: 26 27 28 File operations: READ a file, WRITE a file; Network operations: LISTEN on a socket, CONNECT to a socket, SEND data, RECEIVE data, VIEW INTRANET; Registry operations: READ a registry item, WRITE a registry item; Operating system operations: EXIT WINDOWS, EXIT BROWSER, 3 1 2 3 4 START PROCESS/THREAD, KILL PROCESS/THREAD, CHANGE PROCESS/THREAD PRIORITY, DYNAMICALLY LOAD A CLASS/LIBRARY, etc.; and Resource usage thresholds: memory, CPU, graphics, etc. Id., col. 5 l. 59-col. 6 l. 4. Third, the “security profile data” is stored in a database. ’494 patent, col. 21 ll. 24-25, col. 5 22 ll. 14-16. The’194 specification discloses that, after DSP data is generated, it is stored in a 6 “DSP data” data object according to the Downloadable’s ID. ’194 patent, col. 6 ll. 9-10 (“[t]he 7 code scanner 325 then stores the DSP data into DSP data 310 (corresponding to its Downloadable 8 ID)”). The DSP data is then stored in “security database 240,” along with other data such as 9 security policies, a list of known Downloadables, and a list of known Certificates. See id., col. 3 10 ll. 47-50, col. 4 ll. 15-18. United States District Court Northern District of California 11 The ’194 specification discloses that DSP data stored in the database can be compared, 12 along with other information, against a security policy to determine whether the Downloadable 13 should be permitted to be run on the destination computer. See id., col. 6 ll. 13-20. However, the 14 claims themselves do not recite this, nor any subsequent use of the security profile data, after it 15 gets stored in the database. ’494 patent, col. 21 ll. 22-23, col. 22 ll. 8-17. 16 17 18 19 20 21 22 23 24 25 Finjan currently asserts claims 1, 10, 14, 15, and 18. Mot. 2, ECF 104. Independent claims 1 and 10 recite: 1. A computer-based method, comprising the steps of: receiving an incoming Downloadable; deriving security profile data for the Downloadable, including a list of suspicious computer operations that may be attempted by the Downloadable; and storing the Downloadable security profile data in a database. 10. A system for managing Downloadables, comprising: a receiver for receiving an incoming Downloadable; a Downloadable scanner coupled with said receiver, for deriving security profile data for the Downloadable, including a list of suspicious computer operations that may be attempted by the Downloadable; and a database manager coupled with said Downloadable scanner, for storing the Downloadable security profile data in a database. 26 Id., col. 21 ll. 22-23, col. 22 ll. 8-17. Claim 14 additionally requires that the Downloadable 27 include a program script. Id., col. 22 ll. 26-27. Claim 15 specifically names suspicious computer 28 operations. Id., col. 22 ll. 28-30. Claim 18 requires that the Downloadable scanner comprise a 4 1 disassembler. Id., col. 22 ll. 37-39. 2 B. 3 The parties’ dispute predates the instant case. On August 28, 2013, Finjan initiated a first Procedural History 4 patent infringement action, Case No. 5:13-CV-03999-BLF (“Finjan I”), against Blue Coat, 5 alleging that Blue Coat infringed U.S. Patent Nos. 6,154,844 (the “’844 patent”), 6,965,968 (the 6 “’968 patent”), 7,418,731 (the “’731 patent”), 6,804,780 (the “’780 patent”), 7,058,822 (the “’822 7 patent”), and 7,647,633 (the “’663 patent”). The parties tried all six patents before a jury who, on 8 August 4, 2015, found that Blue Coat infringed the ’844, ’968,’731,’780, and ’633 patents. Finjan 9 I, ECF 438 at 2-3. The Court upheld these findings in its post-trial rulings. Finjan I, ECF 543. In addition, the Court held a bench trial where it decided, among other things, that the ’844 patent 11 United States District Court Northern District of California 10 was not patent-ineligible under 35 U.S.C. § 101. Finjan I, ECF 486 at 13-18. The Court entered 12 final judgment on July 18, 2016. Finjan I, ECF 556. On July 7, 2015, five days before the beginning of trial in Finjan I, Finjan initiated the 13 14 instant suit. ECF 1. Here it asserts three patents from Finjan I (the ’844 patent, the ’968 patent, 15 and the ’731 patent), the ’494 patent, and six others (U.S. Patent Nos. 8,566,580 (the “’580 16 patent”); 8,079,086 (the “’086 patent”); 8,225,408 (the “’408 patent”); 9,141,786 (the “’786 17 patent”); 9,189,621 (the “’621 patent”); and 9,219,755 (the “’755 patent”)). On September 16, 18 2016, Blue Coat filed a motion for judgment on the pleadings that the asserted claims of the ’494 19 patent are invalid for failure to claim patent-eligible subject matter under 35 U.S.C. § 101. ECF 20 104. 21 II. 22 LEGAL STANDARD A. Motion for Judgment on the Pleadings Under Fed. R. Civ. P. 12(c) 23 Rule 12(c) provides that “[a]fter the pleadings are closed—but early enough not to delay 24 trial—a party may move for judgment on the pleadings.” Fed. R. Civ. P. 12(c). “A judgment on 25 the pleadings is properly granted when, taking all allegations in the pleadings as true, the moving 26 party is entitled to judgment as a matter of law.” Enron Oil Trading & Transp. Co. v. Walbrook 27 Ins. Co., 132 F.3d 526, 528 (9th Cir. 1997) (citing McGann v. Ernst & Young, 102 F.3d 390, 392 28 (9th Cir. 1996)). When ruling on a Rule 12(c) motion, the Court must “accept factual allegations 5 1 in the complaint as true and construe the pleadings in the light most favorable to the nonmoving 2 party.” Manzarek v. St. Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir. 2008). Any 3 existing ambiguities must be resolved in favor of the pleading. Walling v. Beverly Enters., 476 4 F.2d 393, 396 (9th Cir. 1973). 5 “If, on a motion under Rule 12(b)(6) or 12(c), matters outside the pleadings are presented 6 to and not excluded by the court, the motion must be treated as one for summary judgment under 7 Rule 56.” Fed. R. Civ. P. 12(d). A court, however, may “consider certain materials—documents 8 attached to the complaint, documents incorporated by reference in the complaint, or matters of 9 judicial notice—without converting the motion to dismiss into a motion for summary judgment.” 10 United States v. Ritchie, 342 F.3d 903, 908 (9th Cir. 2003). United States District Court Northern District of California 11 B. 12 35 U.S.C. § 101 provides that “[w]hoever invents or discovers any new and useful process, Patent Validity Challenges Under 35 U.S.C. § 101 13 machine, or composition of matter, or any new and useful improvement thereof, may obtain a 14 patent therefor, subject to the conditions and requirements of this title.” However, the Supreme 15 Court has recognized that these broad categories contain an implicit exception: “[l]aws of nature, 16 natural phenomena, and abstract ideas are not patentable.” Ass’n for Molecular Pathology v. 17 Myriad Genetics, Inc., 133 S. Ct. 2107, 2116, 186 L. Ed. 2d 124 (2013) (internal quotation marks 18 and citation omitted). 19 To determine whether a claim falls outside this exception, the Supreme Court has 20 established a two-step framework: First, the court must “determine whether the claims at issue are 21 directed to a patent-ineligible concept.” Alice Corp. Pty. Ltd. v. CLS Bank Int’l, ––– U.S. ––––, 22 134 S.Ct. 2347, 189 L.Ed.2d 296 (2014). Second, if the claims are directed to patent-ineligible 23 subject matter, the Court must “consider the elements of each claim both individually and ‘as an 24 ordered combination’ to determine whether the additional elements ‘transform the nature of the 25 claim’ into a patent-eligible application.” Id. (quoting Mayo Collaborative Servs. v. Prometheus 26 Laboratories, Inc., 132 S.Ct. 1289, 1298, 1297, 182 L. Ed. 2d 321 (2012)). The Supreme Court 27 has described this as a “search for an ‘inventive concept’—i.e., an element or combination of 28 elements that is ‘sufficient to ensure that the patent in practice amounts to significantly more than 6 1 a patent upon the [ineligible concept] itself.’” Id. In evaluating step one, “the ‘directed to’ inquiry applies a stage-one filter to claims, 3 considered in light of the specification, based on whether ‘their character as a whole is directed to 4 excluded subject matter.’” Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1335 (Fed. Cir. 2016) 5 (quoting Internet Patents Corp. v. Active Network, Inc., 790 F.3d 1343, 1346 (Fed. Cir. 2015)). In 6 the software context, claims may fail step one because they are directed to an abstract idea. The 7 Federal Circuit has found this to be true in a number of cases, and some commonalities have 8 emerged. For example, fundamental economic activities and business practices, even if performed 9 on a computer, are often abstract. OIP Techs., Inc. v. Amazon.com, Inc., 788 F.3d 1359, 1362 10 (Fed. Cir. 2015), cert. denied, 136 S. Ct. 701, 193 L. Ed. 2d 522 (2015) (collecting cases). In 11 United States District Court Northern District of California 2 addition, “we have treated collecting information, including when limited to particular content 12 (which does not change its character as information), as within the realm of abstract ideas.” Elec. 13 Power Grp., LLC v. Alstom S.A., 830 F.3d 1350, 1353 (Fed. Cir. 2016) (collecting cases); see also, 14 e.g., In re TLI Commc’ns LLC Patent Litig., 823 F.3d 607, 611 (Fed. Cir. 2016); FairWarning IP, 15 LLC v. Iatric Sys., Inc., 839 F.3d 1089, 1095 (Fed. Cir. 2016). Mental steps, including 16 mathematical algorithms, are also generally considered abstract ideas. Elec. Power Grp., 830 F.3d 17 at 1353 (collecting cases); see, e.g., Parker v. Flook, 437 U.S. 584, 589-90, 98 S.Ct. 2522, 57 18 L.Ed.2d 451 (1978); Gottschalk v. Benson, 409 U.S. 63, 67, 93 S.Ct. 253, 34 L.Ed.2d 273 (1972). 19 However, the Federal Circuit has recognized that “precision has been elusive in defining an all- 20 purpose boundary between the abstract and the concrete.” Internet Patents, 790 F.3d at 1345. 21 Courts must tow the fine line between assessing a claim’s “character as a whole” and “describing 22 the claims at such a high level of abstraction and untethered from the language of the claims [such 23 that it] all but ensures that the exceptions to § 101 swallow the rule.” Enfish, 822 F.3d at 1335, 24 1337. 25 To date, the Federal Circuit has provided two examples of software claims that are not 26 directed to an abstract idea. First, in Enfish, the Federal Circuit determined that claims directed to 27 a specific type of self-referential table constituted a specific “solution to a problem in the software 28 arts” such that they were “non-abstract improvements to computer technology.” 822 F.3d at 1339. 7 1 The court noted that “[t]he Supreme Court has suggested that claims ‘purport[ing] to improve the 2 functioning of the computer itself,’ or ‘improv[ing] an existing technological process’ might not 3 succumb to the abstract idea exception.” Id. at 1335. The court found that because the claims 4 focused “on the specific asserted improvement in computer capabilities (i.e., the self-referential 5 table for a computer database)” instead of “a process that qualifies as an ‘abstract idea’ for which 6 computers are invoked merely as a tool,” they were not directed to an abstract idea. Id. at 1335- 7 36, 1339. 8 9 Second, in McRO, Inc. v. Bandai Namco Games Am. Inc., the Federal Circuit found that patents that automated part of a preexisting method for 3-D facial expression animation were not abstract because they “focused on a specific asserted improvement in computer animation, i.e., the 11 United States District Court Northern District of California 10 automatic use of rules of a particular type.” 837 F.3d 1299, 1314 (Fed. Cir. 2016). Here too the 12 court found that this was not the case of using a computer as a tool to implement an abstract idea; 13 instead, the claims set forth a process of following a distinct set of rules, which was different from 14 the process used by human animators, to improve animation technology. Id. at 1314 (“It is the 15 incorporation of the claimed rules, not the use of the computer, that ‘improved [the] existing 16 technological process’ by allowing the automation of further tasks.”). This moved the clams 17 beyond the realm of the abstract. Id. 18 However, not all claims relating to computer technologies are not abstract. Where the 19 focus of the claims is on “certain independently abstract ideas that use computers as tools” instead 20 of “an improvement in computers as tools,” claims may fail step one. See, e.g., Elec. Power Grp., 21 830 F.3d at 1354; see, e.g., Affinity Labs of Texas, LLC v. DIRECTV, LLC, 838 F.3d 1253, 1262 22 (Fed. Cir. 2016) (claims relating to “deliver[ing] content to a handheld wireless electronic device” 23 were directed to an abstract idea because they claimed “the general concept of out-of-region 24 delivery of broadcast content through the use of conventional devices, without offering any 25 technological means of effecting that concept”); Synopsys, Inc. v. Mentor Graphics Corp., 839 26 F.3d 1138, 1140 (Fed. Cir. 2016) (claims related to logic circuit design in computer hardware were 27 “drawn to the abstract idea of: translating a functional description of a logic circuit into a hardware 28 component description of the logic circuit”); Tranxition, Inc. v. Lenovo (United States) Inc., No. 8 1 2015-1907, 2016 WL 6775967, at *3 (Fed. Cir. Nov. 16, 2016) (claims relating to migration of 2 computer settings were directed to an abstract idea because “manual migration is an abstract idea” 3 and the claims merely “automate[d] the migration of data between two computers”). This has 4 proven true for patents in the computer security space. For example, in BASCOM Glob. Internet 5 Servs., Inc. v. AT&T Mobility LLC, the Federal Circuit found that claims2 reciting an Internet 6 content filtering system were directed to an abstract idea because “filtering content . . . is a 7 longstanding, well-known method of organizing human behavior, similar to concepts previously 8 found to be abstract.” 827 F.3d 1341, 1348 (Fed. Cir. 2016). In Intellectual Ventures I LLC v. 9 Symantec Corp., the Federal Circuit found claims3 related to filtering unwanted content from email were directed to an abstract idea because “it was long-prevalent practice for people 11 United States District Court Northern District of California 10 receiving paper mail to look at an envelope and discard certain letters, without opening them, from 12 sources from which they did not wish to receive mail based on characteristics of the mail” and 13 2 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 One of the asserted claims, claim 1 of U.S. Patent No. 5,987,606 , recited: 1. A content filtering system for filtering content retrieved from an Internet computer network by individual controlled access network accounts, said filtering system comprising: a local client computer generating network access requests for said individual controlled access network accounts; at least one filtering scheme; a plurality of sets of logical filtering elements; and a remote ISP server coupled to said client computer and said Internet computer network, said ISP server associating each said network account to at least one filtering scheme and at least one set of filtering elements, said ISP server further receiving said network access requests from said client computer and executing said associated filtering scheme utilizing said associated set of logical filtering elements. 827 F.3d at 1345 (quoting U.S. Patent No. 5,987,606 at col. 6 l. 62-col. 7 l. 10). 3 One of the asserted claims, claim 9 of U.S. Patent No. 6,460,050, recited: 9. A method for identifying characteristics of data files, comprising: receiving, on a processing system, file content identifiers for data files from a plurality of file content identifier generator agents, each agent provided on a source system and creating file content IDs using a mathematical algorithm, via a network; determining, on the processing system, whether each received content identifier matches a characteristic of other identifiers; and outputting, to at least one of the source systems responsive to a request from said source system, an indication of the characteristic of the data file based on said step of determining. 838 F.3d at 1313 (quoting U.S. Patent No. 6,460,050 at col. 8, ll. 13-26). 9 1 “[c]haracterizing e-mail based on a known list of identifiers is no less abstract.” 838 F.3d 1307, 2 1314 (Fed. Cir. 2016). The court found these claims distinguishable from those in Enfish and 3 McRO because there was no “specific or limiting recitation of . . . improved computer 4 technology;” instead, they merely “use[d] generic computers to perform generic computer 5 functions.” Id. at 1315, 1316. Thus, non-abstract claims that “improve the functioning of the 6 computer itself,” Alice, 134 S.Ct. at 2359, such as those in Enfish and McRO, remain a narrow 7 class. 8 In assessing step two, courts must “consider the elements of each claim both individually and ‘as an ordered combination’” and assess whether there are any “additional features” in the 10 claims that constitute an “inventive concept.” Alice, 134 S.Ct. at 2357. This inventive concept 11 United States District Court Northern District of California 9 “must be significantly more than the abstract idea itself,” BASCOM, 827 F.3d at 1349, “must be 12 more than well-understood, routine, conventional activity,” Affinity, 838 F.3d at 1262, “and cannot 13 simply be an instruction to implement or apply the abstract idea on a computer.” BASCOM, 827 14 F.3d at 1349. For example, it may be found in an “inventive set of components or methods,” 15 “inventive programming,” or an inventive approach in “how the desired result is achieved.” Elec. 16 Power Grp., 830 F.3d at 1355. 17 To date, the Federal Circuit has found an inventive concept in three cases. First, in DDR 18 Holdings, LLC v. Hotels.com, L.P., the Federal Circuit found that claims that addressed the 19 “Internet-centric problem” of third-party merchant advertisements that would “lure . . . visitor 20 traffic away” from a host website (because clicking on the advertisement would redirect the visitor 21 to the merchant’s website) amounted to an inventive concept. 773 F.3d 1245, 1248, 1259 (Fed. 22 Cir. 2014). The claims solved this problem by generating composite websites that combined the 23 visual elements of the host’s webpage with the content of the third-party merchant. Id. at 1248. 24 The Federal Circuit reasoned that the claims “specify how interactions with the Internet are 25 manipulated to yield a desired result” such that the interactions are “not merely the routine or 26 conventional use of the Internet.” Id. at 1259. Accordingly, there was sufficient transformation 27 for the claims to not be patent-ineligible. Id. 28 Second, in BASCOM, the Federal Circuit found that the claims directed to Internet content 10 1 filtering recited the inventive concept of “install[ing] a filtering tool at a specific location, remote 2 from the end-users, with customizable filtering features specific to each end user.” 827 F.3d at 3 1350. The court reasoned that “an inventive concept can be found in the non-conventional and 4 non-generic arrangement of known, conventional pieces.” Id. The court found this to be the case 5 there because the patents claimed a specific type of content filtering that took advantage of an ISP 6 server’s ability to associate internet requests with user accounts. Id. Thus, they “harnesse[d] [a] 7 technical feature of the network” to claim a “specific method of filtering Internet content cannot 8 be said, as a matter of law, to have been conventional or generic.” Id. 9 Third, in Amdocs (Israel) Ltd. v. Openet Telecom, Inc., the Federal Circuit found that claims relating to solutions for managing accounting and billing data over large, disparate 11 United States District Court Northern District of California 10 networks recited an inventive concept because they contained “specific enhancing limitation[s] 12 that necessarily incorporates the invention’s distributed architecture—an architecture providing a 13 technological solution to a technological problem.” No. 2015-1180, 2016 WL 6440387, at *11 14 (Fed. Cir. Nov. 1, 2016). Use of this “distributed architecture” transformed the claims into 15 patentable subject matter. Id. 16 Nevertheless, not all technological aspects of how a patented invention is implemented 17 supply a basis for finding an “inventive concept.” A claim that simply takes an abstract idea and 18 adds “the requirement to perform it on the Internet, or to perform it on a set of generic computer 19 components . . . would not contain an inventive concept.” BASCOM, 827 F.3d at 1350. For 20 example, in Content Extraction & Transmission LLC v. Wells Fargo Bank, Nat. Ass’n, the Federal 21 Circuit found that claims directed to the abstract ideas of extracting data and recognizing patterns 22 did not recite an inventive concept because they simply recited “generic scanner and computer to 23 perform well-understood, routine, and conventional activities commonly used in industry.” 776 24 F.3d 1343, 1348 (Fed. Cir. 2014), cert. denied, 136 S. Ct. 119, 193 L. Ed. 2d 208 (2015). In 25 Affinity Labs, the court found there was no inventive concept because “[t]he claim simply recites 26 the use of generic features of cellular telephones, such as a storage medium and a graphical user 27 interface, as well as routine functions, such as transmitting and receiving signals, to implement the 28 underlying idea.” 838 F.3d at 1262. In Intellectual Ventures I, the court found that the claimed 11 1 email filtering methods and systems did not recite an inventive concept because “the asserted 2 claims describe only generic computer elements” or “generic computers that use generic virus 3 screening technology.” 838 F.3d at 1316, 1320. 4 concept remains one that court must approach cautiously, “scrutiniz[ing] the claim elements more 5 microscopically” than in step one. Elec. Power Grp., 830 F.3d at 1354. Accordingly, the search for an inventive In addition to these principles, several other considerations may be helpful in conducting a 6 7 § 101 analysis: First, the Supreme Court has recognized that the “concern that undergirds [the] 8 § 101 jurisprudence” is preemption. Alice, 134 S. Ct. at 2358. If a claim is so abstract so as to 9 “pre-empt use of [the claimed] approach in all fields, and would effectively grant a monopoly over an abstract idea” is not patent-eligible. Bilski v. Kappos, 561 U.S. 593, 612, 130 S. Ct. 3218, 11 United States District Court Northern District of California 10 3231, 177 L. Ed. 2d 792 (2010). However, the inverse is not true: “[w]hile preemption may signal 12 patent ineligible subject matter, the absence of complete preemption does not demonstrate patent 13 eligibility.” FairWarning, 839 F.3d at 1098 (internal quotation marks and citation omitted). Second (and relatedly), “claims that are ‘so result-focused, so functional, as to effectively 14 15 cover any solution to an identified problem’ are frequently held ineligible under section 101.” 16 Affinity Labs, 838 F.3d at 1265. For example, in Elec. Power Grp., the Federal Circuit found that 17 claims directed to “any way of effectively monitoring multiple sources on a power grid” instead of 18 “some specific way of enabling a computer to monitor data from multiple sources across an 19 electric power grid” did not contain an inventive concept. 830 F.3d at 1356. The Federal Circuit 20 has noted that this framework “is one helpful way of double-checking the application of the 21 Supreme Court's framework to particular claims—specifically, when determining whether the 22 claims meet the requirement of an inventive concept in application.” Id. 23 III. 24 DISCUSSION With these principles in mind, the Court turns to the claims at issue. As set forth below, 25 the Court finds that the asserted claims of the ’494 patent are not patent-ineligible because, 26 although they are directed to an abstract idea, they recite an inventive concept. 134 S. Ct. at 2355. Relevance of ’194 Patent 27 A. 28 Before turning to the merits, this case requires the Court to clarify the scope of materials 12 1 relevant to its analysis. This case presents an interesting scenario where the claims themselves are 2 basic and broad, but significant clarifying detail is provided in a specification that belongs not to 3 the ’494 patent itself, but to a parent patent (the ’194 patent), which the ’494 patent identifies and 4 declares to be “hereby incorporated by reference.” ’494 patent, col. 1 ll. 37-38. Finjan, 5 unsurprisingly, urges the Court to pay particular attention to these details and argues that the ’494 6 patent successfully incorporates them by reference. Hrg. Tr. at 24:2-25:18, 50:6-53:4. Blue Coat 7 responds that the focus must remain on the claims themselves and that, in any event, the ’494 8 patent does not identify the ’194 disclosure with sufficient particularity to incorporate it by 9 reference. ECF 144 at 1-3. The Court addresses these issues in turn. 10 As with any matter involving the scope of the patent grant, “[t]he § 101 inquiry must focus United States District Court Northern District of California 11 on the language of the Asserted Claims themselves.” Synopsys, 839 F.3d at 1142. Accordingly, 12 “the complexity of the implementing software or the level of detail in the specification does not 13 transform a claim reciting only an abstract concept into a patent-eligible system or method.” 14 Accenture Glob. Servs., GmbH v. Guidewire Software, Inc., 728 F.3d 1336, 1345 (Fed. Cir. 2013). 15 Nevertheless, the specification, as a helpful tool in understanding claim scope, is not to be ignored 16 entirely. See Enfish, 822 F.3d at 1335 (“The ‘directed to’ inquiry applies a stage-one filter to 17 claims, considered in light of the specification, based on whether their character as a whole is 18 directed to excluded subject matter.”) (internal quotation marks and citation omitted). The Court 19 is not required to undertake a full claim construction process in order to do this. Content 20 Extraction, 776 F.3d at 1349 (“Although the determination of patent eligibility requires a full 21 understanding of the basic character of the claimed subject matter, claim construction is not an 22 inviolable prerequisite to a validity determination under § 101.”). Rather, the Court may interpret 23 the claims in the light most favorable to the non-moving party, Finjan, bounded by what Federal 24 Circuit law on claim construction allows. See Manzarek, 519 F.3d at 1031 (in ruling on a Rule 25 12(c) motion, a court must “construe the pleadings in the light most favorable to the nonmoving 26 party”); cf. Ultramercial, Inc. v. Hulu, LLC, 722 F.3d 1335, 1339-40 (Fed. Cir. 2013), cert. 27 granted, judgment vacated sub nom. WildTangent, Inc. v. Ultramercial, LLC, 134 S. Ct. 2870, 189 28 L. Ed. 2d 828 (2014) (“At summary judgment, the district court may choose to construe the claims 13 1 in accordance with this court’s precedent, or if not it may choose to give a construction most 2 favorable to the patentee, and to apply the usual rules pertaining to summary judgment from there, 3 and still require clear and convincing evidence of ineligible subject matter.”).4 Accordingly, in assessing patent eligibility here, the Court must restrict itself to the 4 5 language of the asserted claims of the ’494 patent, which recite, in relatively broad terms, only 6 three basic functions: receiving, deriving, and storing. Nevertheless, each of these functions 7 should be read in light of the specification, including its detailed descriptions of how a 8 “Downloadable” is “receiv[ed]” or how “security profile data” is “deriv[ed].” Because the Court 9 must construe the pleadings in favor of Finjan, Manzarek, 519 F.3d at 1031, the Court must err on the side of incorporating more—not less—particularities from the specification into its 11 United States District Court Northern District of California 10 understanding of the claims, while still refraining from importing limitations from the 12 specification into the claim, Phillips v. AWH Corp., 415 F.3d 1303, 1323 (Fed. Cir. 2005). In 13 addition, the Court will rely on the parties’ agreed-upon construction of “Downloadable” as “an 14 executable application program, which is downloaded from a source computer and run on the 15 destination computer.” ECF 79 at 1. This leads to the question of what constitutes the specification in this case. The ’494 16 17 patent identifies itself as an eventual “continuation of assignee’s US. patent application Ser. No. 18 08/964,388, filed on Nov. 6, 1997 by inventor Shlomo Touboul, now US. Pat. No. 6,092,194, also 19 entitled ‘System and Method for Protecting a Computer and a Network from Hostile 20 Downloadables’ and hereby incorporated by reference.” ’494 patent, col. 1 ll. 33-38. The Court 21 finds that this language is sufficient to incorporate the entire ’194 patent by reference. According 22 to the Federal Circuit, “[t]o incorporate material by reference, the host document must identify 23 with detailed particularity what specific material it incorporates and clearly indicate where that 24 4 25 26 27 28 Although Ultramercial has been vacated by the Supreme Court, the Federal Circuit has continued to cite to this portion of the opinion approvingly. See Bancorp Servs., L.L.C. v. Sun Life Assur. Co. of Canada (U.S.), 687 F.3d 1266, 1273-74 (Fed. Cir. 2012) (“Although Ultramercial has since been vacated by the Supreme Court, we perceive no flaw in the notion that claim construction is not an inviolable prerequisite to a validity determination under § 101. We note, however, that it will ordinarily be desirable—and often necessary—to resolve claim construction disputes prior to a § 101 analysis, for the determination of patent eligibility requires a full understanding of the basic character of the claimed subject matter.”). 14 1 material is found in the various documents.” Zenon Envtl., Inc. v. U.S. Filter Corp., 506 F.3d 2 1370, 1378 (Fed. Cir. 2007). Here, the ’494 patent identifies the material it is incorporating with 3 sufficient particularly: it indicates that it is incorporating the entire ’194 patent, and provides 4 enough information for the reader to locate this information. More detail, such as identification of 5 specific subject matter, is not necessary, as holding otherwise would render any incorporation of a 6 document in full a practical impossibility. 7 Blue Coat nevertheless contends that Federal Circuit precedent directs otherwise, citing 8 two decisions which declined to incorporate the entirety of another patent’s disclosure. However, 9 these cases are inapposite, as they relate to instances where only discussion of a particular topic from another specification was being incorporated. See Zenon Envtl., Inc., 506 F.3d at 1379 11 United States District Court Northern District of California 10 (incorporating language stated that “[f]urther details relating to the construction and deployment of 12 a most preferred skein are found in the parent U.S. Pat. No. 5,639,373, and in Ser. No. 08/690,045, 13 the relevant disclosures of each of which are included by reference thereto as if fully set forth 14 herein”); Cook Biotech Inc. v. Acell, Inc., 460 F.3d 1365, 1375 (Fed. Cir. 2006) (incorporating 15 language stated that “[t]he preparation of UBS from a segment of urinary bladder is similar to the 16 procedure for preparing intestinal submucosa detailed in U.S. Patent No. 4,902,508, the disclosure 17 of which is expressly incorporated herein by reference”). In those cases, it would make sense that 18 incorporation language would require more particularity. Here, it does not. Accordingly, the 19 Court is persuaded that the ’494 patent successfully incorporates the entirety of the ’194 patent’s 20 disclosure by reference. 21 22 23 B. Patent Eligibility Under 35 U.S.C. § 101 i. Alice Step One: Whether the Claims are Directed to an Abstract Idea Having clarified that the ’194 patent is part of the ’494 specification and that its disclosures 24 are relevant to the Court’s understanding of the claimed functions, the Court proceeds to assess 25 whether the asserted claims are patent-eligible under § 101. In step one of the Alice framework, 26 the Court must determine whether the “claims, considered in light of the specification, based on 27 whether their character as a whole is directed to excluded subject matter.” Enfish, 822 F.3d at 28 1335; Alice, 134 S. Ct. at 2355. 15 1 Blue Coat contends that the asserted claims pass step one because they are directed to the 2 abstract idea of data gathering—i.e., “receiving information, identifying certain characteristics of 3 that information, and storing those characteristics.” Mot. 6, ECF 104. Blue Coat analogizes the 4 claim elements to steps that could be performed by a mailroom clerk: the clerk receives a package 5 in a mailroom, makes a list on a notepad of potentially hazardous materials in the package, and 6 stores the notepad in a cabinet. Id. According to Blue Coat, this is the same type of data gathering 7 that the Federal Circuit has found abstract in other cases, including Elec. Power Grp., 830 F.3d at 8 1354; OIP Techs., 788 F.3d at 1361; and Mayo, 132 S. Ct. at 1297-98. Mot. 7-8, ECF 104. Blue 9 Coat also argues that this case is distinguishable from Enfish and McRO because the claims are broader and more abstract than those that were at issue in those cases: instead of reciting a specific 11 United States District Court Northern District of California 10 type of security profiling technology, they claim the general concept of security profiling. Reply 12 2-3, ECF 115. According to Blue Coat, this is not enough for the claims at issue to be considered 13 non-abstract improvements to computer technology. Id. 14 Finjan responds that the claims are not abstract because they are directed to a computer- 15 specific solution to a computer-specific problem: malware on a computer network. Opp. 4-5, ECF 16 109. Finjan argues that Blue Coat’s position relies on an overgeneralization: the claimed solution 17 relies on a specific type of data security profile which must include a list of computer operations; 18 to that, Finjan, argues, there is no non-computer equivalent. Opp. 5-6, 9-10, ECF 109. For this 19 reason, Finjan presses, the asserted claims fall squarely within the Federal Circuit’s ruling in 20 Enfish because, by providing a better way to detect malware, they are “directed to a specific 21 improvement to the way computers operate.” Opp. 6-7, ECF 109. 22 The Court agrees with Blue Coat that the asserted claims are directed to an abstract idea. 23 Although they are deployed in the context of malware detection, the asserted claims merely recite 24 the familiar concepts of gathering data, analyzing that data for certain characteristics, and storing 25 the results of that analysis. These are fundamental concepts germane to any type of content 26 analysis. See Intellectual Ventures I, 838 F.3d at 1314 (quoting Alice, 134 S.Ct. at 2356) (“The 27 Supreme Court has held that ‘fundamental . . . practice[s] long prevalent’ are abstract ideas.”). 28 This is true even when the asserted claims are given the full benefit of the technical details 16 disclosed in the ’194 patent. At their heart, they claim nothing more than a solution that scans 2 through data (e.g., the disassembled code from the code scanner, ’194 patent, col. 5 ll. 41-45, col. 3 9 ll. 20-42), identifies certain characteristics (e.g., the operations that match its pre-existing list of 4 operations, ’194 patent, col. 5 l. 45-col. 6 l. 4), and stores the results of the analysis (e.g., the list of 5 suspicious operations encountered, stored as formatted DSP data, ’194 patent, col. 6 ll. 9-10). 6 This is not inherently different from how a human would perform a classification process with 7 pencil and paper. This observation is true of both independent claims (claims 1 and 10) and 8 dependent claims (claims 14, 15, and 18), as the additional limitations in the dependent claims 9 simply restrict the context in which this process is performed. The focus, however, remains the 10 same. Accordingly, the “character as a whole” of the claims is directed to data collection and 11 United States District Court Northern District of California 1 analysis, an abstract idea. 12 This finding is consistent with conclusions that the Federal Circuit has reached in similar 13 cases. In a number of cases, the court has found that claims directed to data collection and 14 analysis recited an abstract idea. See Elec. Power Grp., 830 F.3d at 1353 (collecting cases); see 15 also, e.g., In re TLI Commc’ns LLC Patent Litig., 823 F.3d at 611; FairWarning, 839 F.3d at 16 1098. This has held true even where the data collection and analysis was used to solve computer- 17 related problems, such as malware. See, e.g., BASCOM, 827 F.3d at 1348 (claims directed to 18 content filtering on the Internet recited an abstract idea); Intellectual Ventures I, 838 F.3d at 1314 19 (claims directed to filtering email for spam and viruses recited an abstract idea). The claims at 20 issue here are no less abstract than those at issue in BASCOM and Intellectual Ventures I. If 21 anything, they are more so, as they recite fewer steps and less technical detail. Compare U.S. 22 Patent No. 5,987,606 at col. 6 l. 62-col. 7 l. 10 and U.S. Patent No. 6,460,050 at col. 8, ll. 13-26, 23 with ’494 patent at col. 21 ll. 18-25, col. 22 ll. 7-17, 26-30, 37-39. 24 Finjan nevertheless contends that the claims are not abstract because they provide a better 25 way to solve the computer-specific problem of malware on a computer network, and are thus, as in 26 Enfish, “directed to a specific improvement to the way computers operate.” Op. 4-7. The Court 27 disagrees. Simply because claims recite a computer technology does not mean that they are not 28 directed to an abstract idea. See, e.g., Affinity Labs, 838 F.3d at 1262; Synopsys, 839 F.3d at 1140; 17 1 Tranxition, No. 2015-1907, 2016 WL 6775967, at *3. Instead, in order to be non-abstract under 2 Enfish/McRO, claims must focus on an “improvement in computers as tools” rather than “uses of 3 existing computers as tools in aid of processes focused on ‘abstract ideas.’” Elec. Power Grp., 4 830 F.3d at 1354. The asserted claims here focus on the latter. They recite use of generic 5 computer components to perform data collection and analysis generally. They do not recite an 6 improvement to a particular computer technology used in malware detection —they do not, for 7 example, claim an improvement to a specific, preexisting malware detection algorithm or recite 8 special data structures that fundamentally improve the process of detecting malware. Although the 9 Court appreciates that “deriving security profile data” may, if construed narrowly, involve a certain process of extracting code and identifying certain suspicious operations, the “character as a 11 United States District Court Northern District of California 10 whole” of this process remains focused on the abstract idea of data collection and analysis, not on 12 a fundamental improvement to computer operation. Enfish, 822 F.3d at 1335. Accordingly, for 13 these reasons, the claims are directed to an abstract idea under step one of Alice, 134 S. Ct. at 14 2355. 15 The Court notes that this conclusion differs from the result it reached Finjan I, where it 16 determined that the asserted claims (claims 1, 7, 11, 15, and 41) of the ’844 patent were not 17 directed to an abstract idea. Finjan I, ECF 486 at 13-18. This determination predated many of the 18 Federal Circuit decisions that now guide the Court’s step one analysis, including Enfish, 822 F.3d 19 at 1339, McRO, 837 F.3d at 1314, Elec. Power Grp., 830 F.3d at 1353, BASCOM, 827 F.3d at 20 1348, and Intellectual Ventures I, 838 F.3d at 1314. If, to any extent, the Court’s reasoning in 21 Finjan I conflicts with Federal Circuit precedent, Federal Circuit precedent controls. Further, in 22 Finjan I, the Court found the Patent Office’s guidance persuasive. See “2014 Interim Guidance on 23 Patent Subject Matter Eligibility (Interim Eligibility Guidance) for USPTO personnel to use when 24 determining subject matter eligibility under 35 U.S.C. § 101 in view of recent decisions by the 25 U.S. Supreme Court, including Alice Corp., Myriad, and Mayo,” available at 26 www.uspto.gov/patent/laws-and-regulations/examination-policy (last visited November 9, 2015) 27 (hereinafter “Patent Office’s Guidance”). The example claim given in the Patent Office’s 28 Guidance is distinguishable from the asserted claims of the ’494 patent because the example claim 18 1 is directed to creating a sanitized version of a suspicious file, not merely collecting and analyzing 2 information from that file. The asserted claims of the ’494 patent are also more different from the 3 example claim than the asserted claims of the ’844 patent because the ’844 claims recite taking a 4 protective step (specifically, “linking by the inspector the first Downloadable security profile to 5 the Downloadable before a web server makes the Downloadable available to web clients”), 6 whereas the ’494 claims stop at collecting and storing data. 7 8 ii. Alice Step Two: Whether the Asserted Claims Contain an “Inventive Concept” Sufficient to Confer Patent Eligibility Because the claims are directed to an abstract idea, the Court turns to step two, which 9 10 requires that it “consider the elements of each claim both individually and ‘as an ordered combination’” to identify whether they recite an “inventive concept” which “‘transform[s] the 11 United States District Court Northern District of California nature of the claim’ into a patent-eligible application.” Alice, 134 S.Ct. at 2355. (quoting Mayo, 12 132 S.Ct. at 1298, 1297). 13 Blue Coat argues that the claims do not contain an “inventive concept” because they recite 14 only routine, well-understood features (e.g., computer, database, scanner, manager) and activities 15 (e.g., receiving, deriving, storing), none of which is inventive or transformative. Mot. 8-12, ECF 16 104. Finjan responds that the claims do contain an “inventive concept” because they recite a novel 17 approach to malware detection that is based on deriving a profile of actual, suspicious operations 18 that may be attempted by a file, which is a non-conventional and non-generic arrangement of 19 computer elements. Opp. 13, ECF 109. 20 The Court agrees with Finjan that the claims, taken as an ordered combination, recite an 21 inventive concept sufficient to render them patent-eligible. As the ’494 patent explains, at the 22 time of invention, virus protection was localized and reactive: virus protection programs were 23 installed on individual, end-user computers and only checked to see if incoming files were known 24 25 26 27 viruses. ’494 patent, col. 2 ll. 11-21. The ’494 patent claims both spatial and temporal alterations to this paradigm, the combination of which results in “non-conventional and non-generic arrangement of known, conventional pieces” that are sufficiently transformative to constitute an “inventive concept.” BASCOM, 827 F.3d at 1350. 28 19 1 First, spatially, the ’494 claims move malware profiling from its traditional location on 2 end-user computers to an intermediate location on the network. Although not explicit in the 3 claims, the specification makes clear that all of the asserted claims recite operations that are 4 performed on a network server, not an end-user’s computer. All embodiments of the protection 5 engines disclosed in the ’494 and ’194 specifications reside on a network server. See ’494 patent, 6 col. 2 l. 20-col. 3 l. 4; ’194 patent, col. 3 ll. 10-21. In addition, the ’194 specification discloses 7 that the code scanner, the particular component that performs the analysis to derive the data 8 security profile, resides in the Internal Network Security System, which sits in between the 9 external computer network and end-user computers. ’194 patent, Fig. 1; col. 3 ll. 10-13. Accordingly, the claimed “receiving,” viewed in a light most favorable to Finjan, refers to an 11 United States District Court Northern District of California 10 operation that happens at an intermediate network location, not on an end-user computer. (And by 12 extension, the “receiver” in claim 10 refers to a component at this network location.) As such, the 13 ’494 claims harness specific network architecture and use it in a “non-conventional and non- 14 generic arrangement” to offer improved malware protection for an internal computer network as a 15 whole. BASCOM, 827 F.3d at 1350. Accordingly, this is a “specific technical solution beyond 16 simply using generic computer concepts in a conventional way” which helps transform the claims 17 into patentable subject matter. Id. at 1352. 18 Second, temporally, the ’494 claims shift malware profiling logic from something that 19 must be applied to a single, complete file to something that must be applied to extracted aspects or 20 components of a file (namely, operations) after it has been decomposed. Although this process is 21 not laid out in the claims themselves, the Court finds that “deriving security profile data,” if 22 construed in a light most favorable to Finjan, at least requires a process of parsing through a 23 Downloadable and creating a list of all potentially suspicious computer operations. The claims 24 themselves recite that “security profile data” must include “a list of suspicious computer 25 operations that may be attempted by the Downloadable.” ’494 patent, col. 21 ll. 22-23, col. 22 ll. 26 11-12. By necessity, then, “deriving” must include some means of extracting and identifying 27 these operations. Only the ’194 specification uses the phrase “downloadable security profile 28 data,” and the only embodiment of deriving security profile data that it discloses involves a precise 20 1 process of decomposing code and extracting operations. ’194 patent, col. 9 ll. 20-42, Fig. 7. 2 Thus, a person of ordinary skill in the art would understand “deriving security profile data” to 3 refer to this type of process. At the time, this move from profiling at the file level to profiling at 4 the operation level was non-conventional rearrangement of the malware profiling process. See 5 ’494 patent, col. 2 ll. 11-21. This provided for better, more effective malware detection because 6 even if a new virus was launched into the network, it could still be detected because it performed 7 certain suspicious operations. See ’494 patent, col. 2 ll. 56-64. This too constituted a “specific 8 technical solution beyond simply using generic computer concepts in a conventional way,” which 9 helps transform the claims into patentable subject matter. BASCOM, 827 F.3d at 1352. Taking these spatial and temporal shifts together, viewed in the light most favorable to 10 United States District Court Northern District of California 11 Finjan, the Court concludes that the claims recite an inventive concept, rendering them not patent- 12 ineligible even though they are directed to an abstract idea. 13 IV. CONCLUSION 14 For the foregoing reasons, the Court concludes that the asserted claims of the ’494 patent 15 are not patent-ineligible under 35 U.S.C. § 101 because, although they are directed to an abstract 16 idea, they contain an inventive concept sufficient to transform these claims into patentable subject 17 matter. Accordingly, the Court DENIES Blue Coat’s motion for judgment on the pleadings. 18 19 IT IS SO ORDERED. 20 21 22 23 Dated: December 13, 2016 ______________________________________ BETH LABSON FREEMAN United States District Judge 24 25 26 27 28 21

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?