Finjan, Inc. v. Sonicwall, Inc.
Filing
132
ORDER CONSTRUING CLAIMS IN U.S. PATENT NOS. 6,154,844; 6,965,968; 7,058,822; 7,613,926; 7,647,633; 8,225,408. Signed by Judge Beth Labson Freeman on 3/26/2019. (blflc3S, COURT STAFF) (Filed on 3/26/2019)
1
2
3
UNITED STATES DISTRICT COURT
4
NORTHERN DISTRICT OF CALIFORNIA
5
SAN JOSE DIVISION
6
7
FINJAN, INC.,
Plaintiff,
8
v.
9
10
SONICWALL, INC.,
ORDER CONSTRUING CLAIMS IN
U.S. PATENT NOS. 6,154,844; 6,965,968;
7,058,822; 7,613,926; 7,647,633; 8,225,408
Defendant.
11
United States District Court
Northern District of California
Case No. 17-cv-04467-BLF
12
13
Plaintiff Finjan, Inc. (“Finjan”) brings this patent infringement lawsuit against Defendant
14
Sonicwall, Inc. (“Sonicwall”), alleging infringement of ten patents, including six that are at issue
15
in the present claim construction dispute: U.S. Patent Nos. 6,154,844 (the “’844 Patent”);
16
6,965,968 (the “’968 Patent”); 7,058,822 (the “’822 Patent”); 7,613,926 (the “’926 Patent”);
17
7,647,633 (the “’633 Patent”); and 8,225,408 (the “’408 Patent”). The Court held a Markman
18
hearing on March 1, 2019 (“the Hearing”) for the purpose of construing ten disputed terms in the
19
above listed patents.
20
I.
BACKGROUND
21
The asserted patents are directed to network security technologies that detect online threats
22
from malware. Finjan asserts that Sonicwall’s products and services infringe the asserted patents.
23
See generally Compl., ECF 1. Each of the six patents at issue in the present claim construction
24
dispute is summarized below.
25
A.
26
The ’822 Patent is titled “Malicious Mobile Code Runtime Monitoring System and
The ’822 Patent and ’633 Patent
27
Methods” and was issued on June 6, 2006. Ex. 1 to Kastens Decl. (the ’822 Patent), ECF 89-2.
28
The ’633 Patent has the same name and specification and was issued on January 12, 2010. Ex. 2
1
to Kastens Decl. (the ’633 Patent), ECF 89-2. These related patents provide systems and methods
2
for protecting devices on an internal network from code, applications, and/or information
3
downloaded from the Internet that perform malicious operations. See, e.g., ’633 Patent at
4
Abstract. At a high level, some embodiments include a protection engine that resides on a
5
network server and monitors incoming information for executable code. Id. at 2:20–3:4. Upon
6
detection of executable code, the protection engine deploys a “mobile protection code” and
7
protection policies to a downloadable-destination. Id. at 3:5–21. At the destination, the
8
Downloadable is executed, typically within a sandboxed environment, and malicious or potentially
9
malicious operations that run or attempt to run are intercepted and neutralized by the mobile
10
protection code according to set protection policies. See id. at 3:22–40.
The ’844 Patent
United States District Court
Northern District of California
11
B.
12
The ’844 Patent is titled “System and Method for Attaching a Downloadable Security
13
Profile to a Downloadable” and was issued on November 28, 2000. Ex. 3 to Kastens Decl. (the
14
’844 Patent), ECF 89-2. This patent claims systems and methods for inspecting Downloadables
15
for suspicious code or behavior according to a set of rules and generating a profile of the results
16
from the inspection. See, e.g., id. at 1:62–3:7. In some embodiments, a content inspection engine
17
generates a security profile and links that profile to a Downloadable. Id. at 2:3–11. The profile
18
can include certificates that are later read by a protection engine to determine whether or not to
19
trust the profile. Id. at 2:20–48. By providing verifiable profiles, the claimed systems and
20
methods may efficiently protect computers from hostile Downloadables. Id. at 2:61–3:7.
The ’926 Patent
21
C.
22
The ’926 Patent is titled “Method and System for Protecting a Computer and a Network
23
from Hostile Downloadables” and was issued on November 3, 2009. Ex. 4 to Kastens Decl. (the
24
’926 Patent), ECF 89-2. The patent provides “protection systems and methods [for] [p]rotecting a
25
personal computer (“PC”) or other persistently or even intermittently network accessible devices
26
or processes from harmful, undesirable, suspicious or other ‘malicious’ operations.” Id. at 2:27–
27
31. To achieve this goal, some embodiments utilize a protection engine in order to determine
28
whether potential downloadables include executable code. See, e.g., id. at 9:57–62.
2
The ’408 Patent
1
D.
2
The ’408 Patent is titled “Method and System for Adaptive Rule-Based Content Scanners”
3
and was issued on July 17, 2012. Ex. 5 to Kastens Decl. (the ’408 Patent), ECF 89-2. The patent
4
provides “a method and system for scanning content that includes mobile code, to produce a
5
diagnostic analysis of potential exploits within the content.” Id. at 1:59–61. The invention uses an
6
adaptive rule-based content (“ARB”) scanner, which dynamically scans and diagnoses incoming
7
Internet content. See id. at 1:65–2:24. The system generates a parse tree based on tokens and
8
patterns of tokens it identifies, then identifies exploits (the malicious portions of the code) within
9
the parse tree. See id. at 2:25–57.
The ’968 Patent
E.
11
United States District Court
Northern District of California
10
The ’968 Patent is titled “Method and System for Adaptive Rule-Based Content Scanners”
12
and was issued on July 17, 2012. Ex. 6 to Kastens Decl. (the ’968 Patent), ECF 89-2. Content
13
from the Internet can be cached so that the same web page does not have to be retrieved each time
14
a user on the network requests the page. However, users on the same network may have different
15
security policies—different sets of rules that govern whether a file is allowed through the security
16
filter. The ’968 Patent provides a system and method of managing cached content in relation to
17
multiple security policies by, inter alia, providing a “policy-based index . . . indicating
18
allowability of cached content relative to a plurality of policies.” See id. at 1:63–2:7. A cache
19
manager may then utilize the policy-based index to determine whether cached content is allowable
20
for a different user than the original user who requested it and block cached content from being
21
delivered to users for whom it is not allowed. Id. at 2:7–11.
22
II.
LEGAL STANDARD
23
A.
24
Claim construction is a matter of law. Markman v. Westview Instruments, Inc., 517 U.S.
25
370, 387 (1996). “It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the
26
invention to which the patentee is entitled the right to exclude.’” Phillips v. AWH Corp., 415 F.3d
27
1303, 1312 (Fed. Cir. 2005) (en banc) (internal citation omitted). As such, “[t]he appropriate
28
starting point . . . is always with the language of the asserted claim itself.” Comark Commc’ns,
General Principles
3
1
2
Inc. v. Harris Corp., 156 F.3d 1182, 1186 (Fed. Cir. 1998).
Claim terms “are generally given their ordinary and customary meaning,” defined as “the
3
meaning . . . the term would have to a person of ordinary skill in the art in question . . . as of the
4
effective filing date of the patent application.” Phillips, 415 F.3d at 1313 (internal citation
5
omitted). The court reads claims in light of the specification, which is “the single best guide to the
6
meaning of a disputed term.” Id. at 1315; see also Lighting Ballast Control LLC v. Philips Elecs.
7
N. Am. Corp., 744 F.3d 1272, 1284–85 (Fed. Cir. 2014) (en banc). Furthermore, “the
8
interpretation to be given a term can only be determined and confirmed with a full understanding
9
of what the inventors actually invented and intended to envelop with the claim.” Phillips, 415
F.3d at 1316 (quoting Renishaw PLC v. Marposs Societa’ per Azioni, 158 F.3d 1243, 1250 (Fed.
11
United States District Court
Northern District of California
10
Cir. 1998)). The words of the claims must therefore be understood as the inventor used them, as
12
such understanding is revealed by the patent and prosecution history. Id. The claim language,
13
written description, and patent prosecution history thus form the intrinsic record that is most
14
significant when determining the proper meaning of a disputed claim limitation. Id. at 1315–17;
15
see also Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996).
16
Evidence external to the patent is less significant than the intrinsic record, but the court
17
may also consider such extrinsic evidence as expert and inventor testimony, dictionaries, and
18
learned treatises “if the court deems it helpful in determining ‘the true meaning of language used
19
in the patent claims.’” Philips, 415 F.3d at 1318 (quoting Markman, 52 F.3d at 980). However,
20
extrinsic evidence may not be used to contradict or change the meaning of claims “in derogation
21
of the ‘indisputable public records consisting of the claims, the specification and the prosecution
22
history,’ thereby undermining the public notice function of patents.” Id. at 1319 (quoting
23
Southwall Techs., Inc. v. Cardinal IG Co., 54 F.3d 1570, 1578 (Fed. Cir. 1995)).
24
B.
25
Paragraph 6 of 35 U.S.C § 112 provides for means-plus-function claiming: “An element in
26
a claim for a combination may be expressed as a means . . . for performing a specified function . . .
27
and such claim shall be construed to cover the corresponding structure, material, or acts described
Means-Plus-Function Claims
28
4
1
in the specification and equivalents thereof.”1 When a claim uses the term “means” to describe a
2
limitation, it creates a presumption that the inventor used the term to invoke § 112 ¶ 6. Biomedino
3
v. Waters Technologies, 490 F.3d 946, 950 (Fed. Cir. 2007). The “presumption can be rebutted
4
when the claim, in addition to the functional language, recites structure sufficient to perform the
5
claimed function in its entirety.” Id.
6
If a court concludes that a claim limitation is a means-plus-function limitation, “two steps
7
of claim construction remain: 1) the court must first identify the function of the limitation; and 2)
8
the court must then look to the specification and identify the corresponding structure for that
9
function.” Id. The claim limitation will then be construed to cover that corresponding structure
and equivalents thereof. 35 U.S.C § 112 ¶ 6.
11
United States District Court
Northern District of California
10
III.
AGREED CONSTRUCTIONS
The parties agree on the construction of several terms. See Joint Claim Construction
12
13
Statement, ECF 80. Some of the agreed upon terms appear in U.S. Patent Nos. 6,804,780
14
(the “ʼ780 Patent”); 7,975,305 (the “’305 Patent”); and 8,677,494 (the “’494 Patent”), which are
15
asserted in this action but not subject to claim construction dispute. The Court approves and
16
adopts the following constructions:
17
Claim Term
Agreed Construction
18
“Downloadable”
19
(’844 Patent, claims 1, 15, 41, 43;
’494 Patent, claim 10;
’780 Patent, claims 1, 9, 17;
’926 Patent, claim 22)
“an executable application program, which is downloaded
from a source computer and run on the destination computer”
20
21
“database”
22
(’494 Patent, claim 10;
’926 Patent, claim 22;
’305 Patent, claims 1, 13)
23
“a collection of interrelated data organized according to a
database schema to serve one or more applications”
24
25
26
27
28
1
Paragraph 6 of 35 U.S.C. § 112 was replaced with newly designated § 112(f) when the America
Invents Act (“AIA”), Pub. L. No. 112-29, took effect on September 16, 2012. Because the patents
herein were filed before that date, the Court refers to the pre-AIA version of § 112.
5
2
“means for fetching at least one
software component identified by
the one or more references”
3
(’780 Patent, claim 17)
1
5
7
8
9
“means for obtaining a
Downloadable that includes one
or more references to software
components required to be
executed by the Downloadable”
United States District Court
Northern District of California
Function: obtaining a Downloadable that includes one or
more references to software components required to be
executed by the Downloadable
Structure: ID generator programmed to perform the
algorithm of step 810 disclosed in the ’780 Patent at Fig. 8;
9:60–62; and 4:50–54.
11
“parse tree”
12
(’408 Patent, claims 1, 9, 22)
14
Governed by 35 U.S.C. § 112(6)
(’780 Patent, claim 17)
10
13
Function: fetching at least one software component identified
by the one or more references
Structure: ID generator programmed to perform the
algorithm of step 820 disclosed in the ’780 Patent at Fig. 8;
9:62–64; and 4:56–66.
4
6
Governed by 35 U.S.C. § 112(6)
“policy index”
(’968 Patent, claim 1)
“a hierarchical structure of interconnected nodes built from
scanned content”
“a data structure indicating allowability of cached content
relative to a plurality of policies”
15
16
17
IV.
DISCUSSION
Prior to the Hearing the parties stipulated to forgo oral argument on disputed terms two,
18
three, four, and five under the expectation that the Court would adopt the constructions for these
19
terms entered in Finjan Inc. v. Cisco Systems, Inc., Case No. 17-cv-00072-BLF (“the Cisco case”).
20
See Stipulation to Streamline Issues for Oral Argument, ECF 122. In so stipulating the parties
21
have not waived any of their respective appellate rights and have not withdrawn any of their
22
respective positions as set forth in the claim construction briefing in the instant action. See id.
23
at 1. As set forth below, the Court does adopt the constructions previously entered in the Cisco
24
case for disputed terms two, three, four, and five and includes discussion in the present order that
25
mirrors the discussion in the Cisco case for these terms. In addition, the Court adopts a
26
construction for disputed term one that is identical to the construction in the Cisco case although
27
here the Court annotates term one to make clear an implicit limitation. The Court discusses in turn
28
the ten disputed terms.
6
1
2
3
4
5
6
A.
Disputed terms in the ’822 Patent and ’633 Patent
1. “mobile protection code” (’633 Patent claims 1, 8, and 14) (’822 Patent
claims 1 and 9)
Finjan’s Proposal
“code that,
at runtime, monitors or
intercepts actually or
potentially malicious code
operations without modifying
the executable code”
Sonicwall’s Proposal
“mobile executable code that,
at runtime, monitors for and
intercepts actually or
potentially malicious code
operations without modifying
the executable code”
Court’s Construction
“code that,
at runtime, monitors or
intercepts actually or
potentially malicious code
operations without modifying
the executable code”
7
where the mobile protection
code itself must be executable
8
9
10
United States District Court
Northern District of California
11
As a representative example, the disputed term “mobile protection code” appears in
independent claim 1 of the ’633 Patent, which recites:
1. A computer processor-based method, comprising:
12
receiving, by a computer, downloadable-information;
13
determining, by the computer, whether the downloadable-information includes
executable code; and
14
15
16
17
18
19
20
21
22
23
24
25
26
27
based upon the determination, transmitting from the computer mobile protection
code to at least one information-destination of the downloadable-information, if the
downloadable-information is determined to include executable code.
’633 Patent at 20:54–62 (emphasis added).
Finjan argues that its proposed construction is proper because it is consistent with how a
person of ordinary skill in the art would understand the intrinsic record and because its proposed
construction has already been adopted in this District by this Court. See Opening Br. at 4–5,
ECF 89. Indeed, prior claim construction orders issued in the same jurisdiction are entitled to
substantial deference. See Finjan, Inc. v. Symantec Corp., 2017 WL 550453, at *3 (N.D. Cal. Feb.
10, 2017) (“If anything, to the extent possible, the degree of deference should be greater where the
prior claim construction order was issued in the same jurisdiction.”); Visto Corp. v. Sproqit Techs.,
Inc., 445 F. Supp. 2d 1104, 1107–08 (N.D. Cal. 2006) (explaining that the Supreme Court has
stressed the particular importance of intrajurisdictional uniformity in claim construction).
In Finjan, Inc. v. Blue Coat Sys., Inc., 2014 WL 5361976 (N.D. Cal. Oct. 20, 2014) (“Blue
Coat I”), the undersigned considered precisely the term “mobile protection code” in the very same
28
7
1
’633 Patent and construed the term as “code that, at runtime, monitors or intercepts actually or
2
potentially malicious code operations.” Id. at *3; see also Finjan, Inc. v. Proofpoint, Inc., 2015
3
WL 7770208, at *5 (N.D. Cal. Dec. 3, 2015) (Judge Gilliam adopting an identical construction for
4
the same term in the same patent). Finjan’s proposed construction in the instant action seeks to
5
append the phrase “without modifying the executable code” but is otherwise identical to the
6
construction adopted by this Court in Blue Coat I and Proofpoint. Review of the undersigned’s
7
Blue Coat I order confirms that appending “without modifying the executable code” to the Court’s
8
prior construction is consistent with the Court’s prior order. In Blue Coat I, the Court considered
9
the related term “causing mobile protection code to be executed . . .” and construed it to require
that “the mobile protection code [is] communicated . . . without modifying the executable code.”
11
United States District Court
Northern District of California
10
2014 WL 5361976, at *8 (emphasis added). The Court additionally noted that “the intrinsic
12
evidence . . . indicate[s] that the MPC [mobile protection code] travels to the destination without
13
modifying executable code.” Id. Moreover, here, Sonicwall includes the “without modifying the
14
executable code” language in its own proposed construction. See Responsive Br. at 1, ECF 109.
15
In sum, Finjan’s proposed construction of “mobile protection code” in the instant action is
16
effectively the same as that adopted in Blue Coat I and Proofpoint and entitled to deference, see
17
Symantec, 2017 WL 550453, at *3.
18
The Court has carefully considered Sonicwall’s construction but is not persuaded
19
Sonicwall’s arguments overcome the deference provided Finjan’s proposed construction. For
20
example, Sonicwall seeks a construction that the mobile protection code “monitors for and
21
intercepts” malicious code. Responsive Br. at 1 (emphasis added). In other words, Sonicwall
22
argues that “monitors” and “intercepts” are “essentially synonymous.” Id. at 3. The intrinsic
23
evidence reveals that the mobile protection code “monitor[s] or otherwise intercept[s]” such
24
malicious operations. See ’633 Patent at 3:7–11 (emphasis added). While this may indicate that
25
“monitoring” is a subset of “intercepting” it does not equate the two terms. Moreover, the
26
specification further states that “the mobile protection code . . . enables various Downloadable
27
operations to be detected, intercepted or further responded to via protection operations.” Id. at
28
2:52–55 (emphasis added). This statement does not preclude monitoring that is separate from
8
1
intercepting. Thus, the Court does not find the intrinsic evidence sufficiently clear to justify
2
departure from the prior claim construction orders that explicitly construed mobile protection code
3
to “monitor[] or intercept[],” see Blue Coat I, 2014 WL 5361976, at *3; Proofpoint, 2015 WL
4
7770208, at *5.
5
However, Sonicwall does point out that the undersigned previously found that “the ‘code’
6
in ‘mobile protection code’ must be executable code.” See Finjan, Inc. v. Blue Coat Sys., LLC,
7
283 F. Supp. 3d 839, 870–71 (N.D. Cal. 2017) (“Blue Coat II”) (summary judgment order
8
discussing an implicit limitation in the undersigned’s claim construction order in Blue Coat I); see
9
also Responsive Br. at 2. The Court has reviewed its reasoning in Blue Coat II and agrees that the
“mobile protection code” must be executable code. At the Hearing, Finjan agreed that an
11
United States District Court
Northern District of California
10
annotation to reflect this limitation would be “consistent with [the Court’s] previous order.” See
12
Hearing Tr. at 7:18–19, ECF 127. Thus, the Court annotates the term to make clear this limitation
13
implicit in the undersigned’s prior constructions of the term.
14
Accordingly, for the reasons above, the Court adopts Finjan’s construction as annotated.
15
2. “A computer program product, comprising a computer usable medium
having a computer readable program code therein, the computer readable
program code adapted to be executed for computer security, the method
comprising:” (’633 Patent claim 14)
16
17
18
19
20
21
22
23
24
25
26
27
Finjan’s Proposal
The typographical error in the
preamble is corrected to read:
“A computer program
product, comprising a
computer usable medium
having a computer readable
program code therein, the
computer readable program
code adapted to be executed
for computer security,
comprising:”
Sonicwall’s Proposal
The phrase “the method”
should not be struck from the
preamble. As written, the
claim is indefinite under
IPXL for reciting a mix of
statutory classes of subject
matter.
Court’s Construction
The typographical error in the
preamble is corrected to read:
“A computer program
product, comprising a
computer usable medium
having a computer readable
program code therein, the
computer readable program
code adapted to be executed
for computer security,
comprising:”
The parties dispute whether the words “the method” in the preamble to claim 14 of the
’633 Patent are the result of a typographical error and properly removed in construing the claim.
Finjan argues that the words should be removed while Sonicwall argues that the words should
remain and render the claim indefinite under IPXL Holdings, L.L.C. v. Amazon.com, Inc., 430 F.3d
28
9
1
1377 (Fed. Cir. 2005). See Opening Br. at 7–8; Responsive Br. at 4–7.
The undersigned considered precisely this issue in Blue Coat I, 2014 WL 5361976. In
2
3
Blue Coat I the parties also disputed whether the words “the method” in the preamble to claim 14
4
were a typographical error. Id. at *7. The undersigned agreed with Plaintiff Finjan and construed
5
the term “to correct the typographical error” resulting in a construction identical to Finjan’s
6
proposed construction in the instant action. See id. at *7–8; Opening Br. at 7. The undersigned
7
further noted that “the corrected preamble can be reasonably interpreted to set forth a computer
8
readable program code that, when executed, performs the limitations of the claim.” Blue Coat I,
9
2014 WL 5361976, at *7.
When a patentee seeks a correction of claim language, “a district court can do so only if
10
United States District Court
Northern District of California
11
(1) the correction is not subject to reasonable debate based on consideration of the claim language
12
and the specification and (2) the prosecution history does not suggest a different interpretation of
13
the claims.” Novo Indus., L.P. v. Micro Molds Corp., 350 F.3d 1348, 1354 (Fed. Cir. 2003).
14
Sonicwall argues that in Blue Coat I the undersigned was “not presented with the language of the
15
dependent claims and prosecution history that: (i) contradicts Finjan’s correction; and (ii) suggests
16
a different possible interpretation of the preamble.” Responsive Br. at 4. In other words,
17
Sonicwall contends that the Court’s construction in Blue Coat I is not valid because the Court’s
18
“correction” to remove the words “fails both of the[] [Novo] requirements” when considering “the
19
dependent claims and prosecution history” of the ’633 Patent. See Responsive Br. at 4.
However, contrary to Sonicwall’s suggestion, the undersigned was faced with essentially
20
21
the same record and arguments in Blue Coat I. For example, Blue Coat argued—as Sonicwall
22
does here—that during the prosecution of the ’633 Patent the preamble was amended to be in line
23
with Ex Parte Bo Li, 88 U.S.P.Q.2d 1695 (2008), and thus not transformed into a proper
24
Beauregard claim.2 See Blue Coat’s Responsive Br. at 22–23, ECF 66 in 5:13-cv-03999;
25
Responsive Br. 4–5. As another example, Blue Coat argued that “a person of ordinary skill in the
26
27
28
2
Computer-readable media claims—such as claims covering programs encoded on tangible
computer-readable media—are commonly referred to as Beauregard claims after In re
Beauregard, 53 F.3d 1583 (Fed. Cir. 1995).
10
1
art looking at the claim language, specification, and prosecution history would be left to surmise
2
various inconsistent corrections,” see Blue Coat’s Responsive Br. at 23 (relying on Nova, 350 F.3d
3
at 1357), while Sonicwall likewise argues that the “claims” and “prosecution [history] suggest[] a
4
different interpretation” under Nova, see Responsive Br. at 5. In Blue Coat I, the undersigned
5
considered and rejected the arguments raised by Blue Coat and Sonicwall makes a no more
6
compelling case here.
7
Sonicwall additionally argues that because dependent claims 15 to 20 refer to “the method
8
of claim 14” there is reasonable debate about how the claim should be corrected. See Responsive
9
Br. at 4 (citing ’633 Patent) (emphasis removed). However, Sonicwall cannot credibly argue that
dependent claims 15 to 20 were not available to the Court in deciding Blue Coat I. Indeed, the
11
United States District Court
Northern District of California
10
Court previously found that the corrected preamble to claim 14 sets forth not a method but “a
12
computer readable program code.” Blue Coat I, 2014 WL 5361976, at *7. Moreover, the Court’s
13
prior construction in Blue Coat I is entitled to deference, see Symantec, 2017 WL 550453, at *3,
14
and Finjan seeks an identical construction here. In sum, the Court adopts Finjan’s construction.
15
Having removed the words “the method” from claim 14, the Court need not and does not
16
reach Sonicwall’s indefiniteness arguments under IPXL which depend on inclusion of the words
17
“the method.” See Responsive Br. at 6–7; see also Finjan, Inc. v. Blue Coat Sys., Inc., 2015 WL
18
3630000, at *12 (N.D. Cal. June 2, 2015) (finding claim 14 of the ’633 Patent not indefinite as
19
construed to not include the words “the method”).
Disputed terms in the ’844 Patent
20
B.
21
The parties dispute three terms in the ’844 Patent. All three terms appear in independent
22
23
claim 43 which recites:
43. An inspector system comprising:
24
means for receiving a Downloadable;
25
means for generating a first Downloadable security profile that identifies
suspicious code in the received Downloadable; and
26
27
28
means for linking the first Downloadable security profile to the Downloadable
before a web server makes the Downloadable available to web clients.
’844 Patent at 14:34–42 (emphasis added).
11
Sonicwall’s briefing raises a threshold issue regarding the three disputed terms recited in
1
2
claim 43. See Responsive Br. at 7–9. Specifically, Sonicwall contends that claim 43 is directed to
3
the “inspector 125” embodiment as opposed to the “network gateway 110” embodiment in
4
the ’844 Patent. Id. Finjan disagrees. See Reply Br. at 4–5, ECF 110. Because the parties’
5
disagreement pertains to a common issue in the disputed terms, the Court addresses that issue first.
6
Sonicwall argues that claim 43 is an “inspector system” claim and “cannot be read onto a
7
network gateway” for several reasons. See Responsive Br. at 7. Sonicwall first contends that the
8
preamble of claim 43 recites “an inspector system” and that Finjan added this word during
9
prosecution. See Responsive Br. at 8 (emphasis in original). According to Sonicwall, Finjan
argued before the patent examiner that “the claims were distinct from [the] Ji [prior art reference]
11
United States District Court
Northern District of California
10
because Ji disclosed a network gateway whereas the claims are directed to an ‘inspector.’” Id.
12
(citing Ex. E to McGrath Decl. (5/3/2000 Response) at 4, ECF 109-6). On this basis, Sonicwall
13
claims that Finjan manifested a clear intention to limit the claim scope to “inspector 125” while
14
excluding gateway embodiments. Id. at 8.
15
Sonicwall then asserts that claim 43 requires the inspector system to generate a
16
Downloadable Security Profile (“DSP”) and link the DSP to the Downloadable before a web
17
server makes the Downloadable available to web clients. Responsive Br. at 8. In Sonicwall’s
18
view, only the inspector 125 is described in the specification as both “generating” and “linking”
19
the DSP. Id. Sonicwall further asserts that the generic protection engine of the network gateway
20
only generates the DSP and passes the Downloadable without linking the Downloadable to the
21
DSP. Id. According to Sonicwall, because claim 43 recites functions that are performed only by
22
inspector 125, the corresponding structure of the three disputed terms of the ’844 Patent must be a
23
structure within the inspector 125. Id. at 9.
Finjan responds that Sonicwall’s construction is inconsistent with decisions issued by
24
25
courts within this District. See Reply Br. at 4–5. Finjan also argues that the ’844 Patent discloses
26
embodiments “where the inspector is at different locations, including at the network gateway.” Id.
27
at 5.
28
After carefully reviewing the parties’ briefing, the record, and the undersigned’s prior
12
decision on this same issue in the Cisco case, the Court agrees with Finjan’s position. First,
2
Sonicwall’s reliance on the fact that the preamble of claim 43 recites “inspector” is unpersuasive.
3
“[W]hen a patentee defines a structurally complete invention in the claim body and uses the
4
preamble only to state a purpose or intended use for the invention, the preamble is not a claim
5
limitation.” Novatek, Inc. v. Sollami Co., 559 F. App’x 1011, 1015 (Fed. Cir. 2014) (internal
6
quotation marks and citation omitted). That said, “clear reliance on the preamble during
7
prosecution to distinguish the claimed invention from prior art transforms the preamble into a
8
claim limitation.” Catalina Mktg. Int'l, Inc. v. Coolsavings.com, Inc., 289 F.3d 801, 808 (Fed. Cir.
9
2002). Here, the Court finds that the preamble of claim 43 is not a limitation. The body of the
10
claim structurally defines the claimed invention. In addition, the prosecution history of the ’844
11
United States District Court
Northern District of California
1
Patent does not clearly show that Finjan distinguished the Ji reference by adding “inspector” to the
12
preamble. Rather, Finjan emphasized that the Ji reference is distinguishable because it “does not
13
teach generating [DSP] or linking the [DSP] to a Downloadable before the web server makes the
14
Downloadable security profile available to web clients” and fails to disclose “examining an
15
already linked [DSP] by network gateways.” See Ex. E to McGrath Decl. (5/3/2000 Response)
16
at 5 (emphasis in original). These statements do not pertain to the preamble. Thus, the
17
prosecution history does not show that Finjan clearly relied on the preamble to limit claim 43.
18
Catalina, 289 F.3d at 808.
19
To the extent that Sonicwall invokes the prosecution disclaimer doctrine, its argument
20
fails. Any disclaimer must be “clear and unmistakable” and cannot be “amenable to multiple
21
reasonable interpretations.” Omega Eng'g, Inc, v. Raytek Corp., 334 F.3d 1314, 1325–26 (Fed.
22
Cir. 2003). Here, at best, Finjan’s patent prosecution statements are ambiguous and thus do not
23
support Sonicwall’s position. As such, Finjan’s statements do not show that it “clearly and
24
unmistakabl[y]” disavowed “network gateway” embodiments from the claim scope. Id. In fact,
25
other courts have reached the same conclusion after reviewing the prosecution history of the ’844
26
Patent. See Finjan, Inc. v. Symantec Corp., 2017 WL 550453, at *16 (N.D. Cal. Feb. 10, 2017)
27
(“The Court does not read this language to establish . . . that an inspector by definition can never
28
be at the gateway, or to amount to a clear and unmistakable disavowal.”).
13
1
Second, the Court is unpersuaded by Sonicwall’s argument that claim 43 excludes
2
“network gateway” embodiments on the grounds that the specification discloses only inspector
3
125 to “generate” and “link” the DSP. To be sure, the ’844 Patent expressly discloses that content
4
inspection engine 160 in the inspector 125 of Fig. 1 to both generate and link DSP to a
5
Downloadable. See, e.g., ’844 Patent at 8:36–9:4. However, the specification also explicitly
6
describes that the content inspection engine 525 which may be located at the network gateway
7
generates DSP for a Downloadable and that the content inspection engine 525 is “similar to the
8
content inspection engine 160 of the inspector 125.” Id. at 7:62–64, 7:67–8:2. The specification
9
further explains that the content inspection engine 525 generates DSP for the received
Downloadable as described with reference to Figs. 4 and 6, id. at 9:63–65, where it is disclosed
11
United States District Court
Northern District of California
10
that content inspection engine 160 attaches DSP, id. at 7:13–16, 8:36–9:4. Based on those
12
disclosures, and in particular, given that the ’844 Patent expressly describes that the content
13
inspection engine 160 at the network gateway is similar to those in the inspector 125, a person of
14
ordinary skill in the art would understand that the content inspection engine located at the gateway
15
can link DSP to the Downloadable. The Court therefore rejects Sonicwall’s argument that the
16
“linking” limitation in claim 43 shows that “network gateway” embodiments are excluded.
17
Accordingly, the Court concludes that claim 43 covers embodiments where the inspector is
18
located at the network gateway. This interpretation of claim 43 is consistent with the construction
19
of other courts. Symantec, 2017 WL 550453, at *16.
20
21
22
23
24
25
26
The Court now addresses the three disputed terms in the ’844 Patent separately below.
1. “means for receiving a Downloadable” (claim 43)
Finjan’s Proposal
Function: receiving a
Downloadable
Sonicwall’s Proposal
Function: receiving a
Downloadable
Court’s Construction
Function: receiving a
Downloadable
Structure: Downloadable file
interceptor
Structure: inspector 125 that
is external to a network
gateway
Structure: Downloadable file
interceptor
There is no dispute that this term is a means-plus-function limitation and that the function
27
is “receiving a Downloadable.” See Opening Br. at 9; Responsive Br. at 9. The Court therefore
28
adopts the function agreed by the parties.
14
1
The parties, however, dispute the structure for this limitation. Finjan argues that the proper
2
structure is “Downloadable file interceptor” because the ’844 Patent disclose this element to
3
perform “the function of receiving a Downloadable.” Opening Br. at 9. Finjan points out that
4
Judge Gilliam and Judge Orrick in this District determined that the proper structure is
5
“Downloadable file interceptor.” Id. (citing Finjan, Inc. v. Symantec Corp., 2017 WL 550453,
6
at *3–4 (N.D. Cal. Feb. 10, 2017); Finjan, Inc. v. Sophos, Inc., 2015 WL 890621, at *8 (N.D. Cal.
7
Mar. 2, 2015) (“[T]he structure for ‘means for receiving a Downloadable’ is unambiguous: the
8
Downloadable file interceptor.”)).
9
Sonicwall counters that the structure is the “inspector 125, which is external to network
gateway 110.” Responsive Br. at 9. Sonicwall’s proposal is based on its argument that claim 43
11
United States District Court
Northern District of California
10
excludes “network gateway” embodiments. See id. However, as discussed earlier, the Court
12
rejects Sonicwall’s position that claim 43 does not cover “network gateway” embodiments. Thus,
13
the Court finds that Sonicwall’s proposed structure is improper.
14
The remaining issue is whether the “Downloadable file interceptor” is the proper structure.
15
The specification clearly discloses that the Downloadable file interceptor performs the function of
16
receiving a Downloadable. See, e.g., ’844 Patent at 9:22–23. The parties, however, dispute the
17
location of the Downloadable file interceptor. Sonicwall contends that this structure is not part of
18
the inspector 125 on the grounds that it exists only on the network gateway or computer client.
19
Responsive Br. at 9. Finjan counters that there is no basis for a distinction between “inspector”
20
claims and “gateway” claims. See Reply Br. at 4.
21
After reviewing the ’844 Patent and the Court’s analysis of this term in the Cisco case, the
22
Court agrees with Finjan’s proposed structure. The specification describes a generic protection
23
engine that includes the Downloadable file interceptor for receiving incoming Downloadables.
24
See ’844 Patent at 7:41–48. This generic protection engine includes content inspection engine 525
25
that is similar to the content inspection engine 160 of the inspector 125, which is external to the
26
gateway as depicted in Fig. 1. Id. at 7:19–8:2. The specification further describes that the content
27
inspection engine 160 receives Downloadables like the generic protection engine. See id. at 4:52–
28
56 (“[T]he Downloadable ID for the Downloadable will be the same each time the content
15
1
inspection engine 160 (or a protection engine as illustrated in FIG. 5) receives the same
2
Downloadable . . . .”). Based on those disclosures, a person of ordinary skill in the art would
3
understand that inspector 125 with the content inspection engine 160 can include the structure of
4
the Downloadable file interceptor described in relation to the protection engine in order to receive
5
Downloadables. Accordingly, although the ’844 Patent expressly discusses the Downloadable file
6
interceptor in connection to embodiments pertaining to the network gateway or computer client
7
(’844 Patent at 7:41–44, 9:19–10:23), the Court finds that a person of ordinary skill in the art
8
would understand that the Downloadable file interceptor may be located on inspector 125.
9
The Court also notes that Judge Gilliam and Judge Orrick’s claim construction orders
determined the proper structure as the “Downloadable file interceptor.” Symantec Corp., 2017
11
United States District Court
Northern District of California
10
WL 550453, at *3–4; Sophos, 2015 WL 890621, at *8. The Court’s above conclusion is
12
consistent with those orders. Thus, the Court is further persuaded that the “Downloadable file
13
interceptor” is the correct structure for the “means for receiving a Downloadable.” Symantec,
14
2017 WL 550453, at *3 (explaining that prior claim construction orders issued in the same
15
jurisdiction may receive deference). The Court finds no reason to depart from the prior claim
16
construction orders.
17
18
19
20
21
For the above reasons, the Court adopts Finjan’s construction.
2. “means for generating a first Downloadable security profile that identifies
suspicious code in the received Downloadable” (claim 43)
Finjan’s Proposal
Function: generating a first
Downloadable security profile
that identifies suspicious code
in the received Downloadable
Sonicwall’s Proposal
Function: generating a first
Downloadable security profile
that identifies suspicious code
in the received Downloadable
Court’s Construction
Function: generating a first
Downloadable security profile
that identifies suspicious code
in the received Downloadable
Structure: content inspection
engine programmed to
perform the algorithm
disclosed at col. 8, lines 51–
60 of the ’844 Patent
Structure: content inspection
engine 160 of inspector 125
programmed to perform the
algorithm disclosed at col. 8,
lines 49–60 of the ’844 Patent
and col. 4, lines 36–47, 54–
57, col. 8, lines 23–24, col. 9,
lines 20–42 and Fig. 7 of U.S.
Patent No. 6,092,194.
Structure: content inspection
engine programmed to
perform the algorithm
disclosed at col. 8, lines 51–
60 of the ’844 Patent
22
23
24
25
26
27
28
The parties do not dispute that this term is a means-plus-function limitation and that the
16
1
function is “generating a first Downloadable security profile that identifies suspicious code in the
2
received Downloadable.” Opening Br. at 11; Responsive Br. at 10. The Court therefore adopts
3
the function agreed by the parties.
4
The parties, however, diverge on the proper structure for this limitation. Finjan asserts that
5
its proposed structure is correct because the structure is “taken directly from the specification of
6
the ’844 Patent as it relates to generating a [DSP].” Opening Br. at 11. Finjan further asserts that
7
Judge Gilliam adopted the same structure in Symantec, 2017 WL 550453, at *6–7. See Opening
8
Br. at 11.
9
Sonicwall first responds that the proper structure should be “tied to inspector 125” but that
Finjan’s proposal fails to do so. Responsive Br. at 10. Sonicwall next argues that the
11
United States District Court
Northern District of California
10
specification of the ’844 Patent “provides almost no detail of how the content inspection engine
12
160 generates a DSP that identifies suspicious code in the received Downloadable” and that code
13
is distinct from operations. See Responsive Br. at 10 (emphasis in original). Based on this
14
assertion, Sonicwall contends that the Court must look to U.S. Patent Application No. 08/964,388
15
(now U.S. Patent No. 6,092,194 (“the ’194 Patent”)), which the ’844 Patent incorporates by
16
reference, to construe the proper structure. Id. at 10.
17
Sonicwall’s first contention is based on the argument that claim 43 excludes “network
18
gateway” embodiments. But, again, the Court rejects Sonicwall’s argument that claim 43 does not
19
cover “network gateway” embodiments. The Court therefore is unpersuaded by Sonicwall’s first
20
contention that the proper structure should be tied to inspector 125.
21
Regarding Sonicwall’s second contention, the Court is unconvinced by Sonicwall’s
22
reliance on the ’194 Patent even if that patent were properly incorporated by reference into
23
the ’844 Patent. The ’194 Patent does not mention “content inspection engine” and the Court is
24
unable to identify with particularity which algorithms disclosed in the ’194 Patent pertain to the
25
“content inspection engine” described in the ’844 Patent. On the other hand, the ’844 Patent itself
26
sufficiently discloses the algorithm for the content inspection engine that performs the agreed
27
upon function:
28
As stated above, generating a DSP [by the content inspection engine]
17
includes examining the Downloadable 205 (and the Downloadable
components) for all suspicious operations that will or may be
performed by the Downloadable, all suspicious code patterns, all
known viruses, etc. Generating a DSP may include comparing all
operations that will or may be performed against a list of suspicious
operations or against a list of rules, e.g., a rules base 165.
Accordingly, if an operation in the Downloadable 205 matches one of
the suspicious operations or violates one of the rules, then the
operation is listed in the DSP 215.
1
2
3
4
5
6
’844 Patent at 8:51–60. Similar narrative algorithms have been found to disclose sufficient
7
structure. See Typhoon Touch Techs., Inc. v. Dell, Inc., 659 F.3d 1376, 1385–86 (Fed. Cir. 2011).
8
As such, the Court finds that the proper algorithm is disclosed in col. 8, lines 51–60 of the ’844
9
Patent. Indeed, Judge Gilliam reached the same conclusion. Symantec, 2017 WL 550453, at *6–7
(declining to rely on the ’194 Patent and holding that the ’844 Patent disclosed sufficient
11
United States District Court
Northern District of California
10
structure).
12
Moreover, Sonicwall’s argument that Court must look to the ’194 Patent on the grounds
13
that code is distinct from operations is unavailing. Finjan’s proposed algorithm in the ’844 Patent
14
describes “generating a DSP includes examining the Downloadable . . . for all suspicious
15
operations that will or may be performed by the Downloadable, all suspicious code patterns, all
16
known viruses, etc.” ’844 Patent at 8:51–55 (emphasis added). As an example, the ’844 Patent
17
discloses that a DSP can be generated using a “rules base.” Id. at 8:55–58. Moreover, the
18
specification discloses that a set of rules may include a “list of suspicious code patterns.” Id.
19
at 2:7–8. Thus, although Sonicwall is correct that “code” is distinct from “operations,” its
20
argument is unavailing. Based on those disclosures, the Court finds that a person of ordinary skill
21
in art would understand how the content inspection engine performs the function based on the
22
algorithm disclosed in col. 8, lines 51–60 of the ’844 Patent.
23
24
25
26
27
28
Accordingly, the Court adopts Finjan’s proposed construction.
3. “means for linking the first Downloadable security profile to the
Downloadable before a web server makes the Downloadable available
to web clients” (claim 43)
Finjan’s Proposal
Function: linking the first
Downloadable security profile
to the Downloadable before a
web server makes the
Sonicwall’s Proposal
Function: linking the first
Downloadable security profile
to the Downloadable before a
web server makes the
18
Court’s Construction
Function: linking the first
Downloadable security profile
to the Downloadable before a
web server makes the
1
Downloadable available to
web clients
Downloadable available to
web clients
Downloadable available to
web clients
Structure: content inspection
engine programmed to
perform the algorithm of step
630 disclosed at Fig. 6; col. 8,
lines 65–67; and col. 6, lines
13–24 of the ’844 Patent.
Structure: content inspection
engine 160 of inspector 125
programmed to perform step
630 of Fig. 6, disclosed at col.
8, lines 65–67 and col. 6, lines
13–20 of the ’844 Patent.
Specifically, attaching a
Downloadable security profile
to the Downloadable (col. 8,
lines 65–67 and col. 6, lines
13–18) or attaching to the
Downloadable a pointer that
points to a stored
Downloadable security profile
(col. 6, lines 18–20).
Structure: content inspection
engine programmed to
perform step 630 of Fig. 6,
disclosed at col. 8, lines 65–
67 and col. 6, lines 13–20 of
the ’844 Patent.
Specifically, attaching a
Downloadable security profile
to the Downloadable (col. 8,
lines 65–67 and col. 6, lines
13–18) or attaching to the
Downloadable a pointer that
points to a stored
Downloadable security profile
(col. 6, lines 18–20).
2
3
4
5
6
7
8
9
10
United States District Court
Northern District of California
11
12
There is no dispute that this term is a means-plus-function limitation and that the function
13
is “linking the first Downloadable security profile to the Downloadable before a web server makes
14
the Downloadable available to web clients.” Opening Br. at 13; Responsive Br. at 11. The Court
15
therefore adopts the agreed upon function.
16
The parties disagree on the structure for this limitation. Finjan argues that its proposed
17
construction is the one adopted by Judge Gilliam in Symantec, 2017 WL 550453, at *8. See
18
Opening Br. at 13–14. Finjan further contends that its proposal is consistent with the scope of the
19
agreed function and does not incorporate unnecessary and confusing elements. Id. at 14.
20
Sonicwall counters that its proposal specifies that the content inspection engine must be
21
part of the inspector 125. See Responsive Br. at 11. However, like Sonicwall’s earlier arguments,
22
this contention is based on Sonicwall’s view that claim 43 excludes “network gateway”
23
embodiments. The Court rejects that view and thus is unconvinced by this counter-argument.
24
Thus, to the extent that its proposal references content inspection engine 160 and inspector 125,
25
Sonicwall’s construction is improper.
26
Sonicwall also argues that the specification discloses only two methods for linking the
27
DSP to the Downloadable: “(1) attaching the DSP to the Downloadable and (2) attaching a pointer
28
to the Downloadable that points to the DSP stored in the network system 100.” Responsive Br. at
19
1
11–12. Sonicwall further asserts that col. 6, lines 20–24 of the specification should be excluded
2
from Finjan’s proposal. See id. at 12. That portion of the ’844 Patent states the following:
The term “linking” herein will be used to indicate an association
between the Downloadable 205 and the DSP 215 (including using a
pointer from the Downloadable 195 to the DSP 215, attaching the
DSP 215 to the Downloadable 205, etc.)
3
4
5
6
’844 Patent at 6:20–24. Sonicwall argues that this portion of the specification only identifies the
7
two methods for linking (which are already disclosed in col. 6, lines 13–20 and col. 8, lines 65–67)
8
and that the reference to “an association” and “etc.” are not algorithms that provide corresponding
9
structure. See Responsive Br. at 12. As discussed below, the Court agrees with Sonicwall on this
10
United States District Court
Northern District of California
11
point.
In allowing means-plus-function limitations, “Congress . . . plac[ed] specific constraints on
12
how such a limitation is to be construed, namely, by restricting the scope of coverage to only the
13
structure, materials, or acts described in the specification as corresponding to the claimed
14
function and equivalents thereof.” Williamson v. Citrix Online, LLC, 792 F.3d 1339, 1347 (Fed.
15
Cir. 2015) (emphasis added). Here, the parties both propose algorithms for the structure and thus
16
agree that the specification must describe an algorithm to sufficiently disclose the structure. See
17
Aristocrat Techs. Australia Pty Ltd. v. Int’l Game Tech., 521 F.3d 1328, 1333 (Fed. Cir. 2008)
18
(“[C]omputer-implemented means-plus-function term is limited to the corresponding structure
19
disclosed in the specification and equivalents thereof, and the corresponding structure is
20
the algorithm.” (citation omitted) (emphasis added)). In other words, the structure of the disputed
21
means-plus-function term at issue is limited to the algorithm disclosed in the specification. See id.
22
Here, as Sonicwall argues, col. 6, lines 20–24 of the specification merely restates the
23
function “linking the first Downloadable security profile to the Downloadable” by referring
24
“linking” as an “association” but fails to specify how the content inspection engine performs the
25
claimed function. Thus, that passage does not adequately disclose an algorithm (other than the
26
two methods which Sonicwall does not dispute). See Aristocrat, 521 F.3d at 1334 (specification
27
did not contain an algorithm sufficient to disclose structure, when language identified by plaintiff
28
“simply describe[d] the function to be performed, not the algorithm by which it is performed”).
20
1
Because col. 6, lines 20–24 does not disclose anything beyond the two methods of linking by
2
attaching the DSP or the pointer to the DSP, the Court finds that this portion of the specification
3
does not disclose additional algorithm that corresponds to the structure of the means-plus-function
4
claim.
Finjan’s counter-arguments3 are unpersuasive. First, Finjan asserts that Judge Gilliam
5
6
adopted its proposed construction including col. 6, lines 20–24 of the ’844 Patent. See Opening
7
Br. at 13–14. However, Judge Gilliam expressed that the sentence “[t]he term ‘linking’ herein will
8
be used to indicate an association between the Downloadable 205 and the DSP 215 (including
9
using a pointer from the Downloadable 195 to the DSP 215, attaching the DSP 215 to the
Downloadable 205, etc.)” appears to “simply restate the function ‘linking the first Downloadable
11
United States District Court
Northern District of California
10
security profile to the Downloadable’ rather than providing an algorithm for how that function is
12
accomplished, an approach the Federal Circuit has found to be insufficient.” Symantec, 2017 WL
13
550453, at *8 (emphasis in original). Nevertheless, Judge Gilliam adopted that passage as part of
14
the construction because the parties’ proposal covered that portion of the ’844 Patent. Id. The
15
Court need not give much deference to Judge Gilliam’s construction when he identified an issue
16
with the parties’ proposal but nevertheless accepted it.
Second, Finjan argues that it would be improper to limit the term to examples of linking by
17
18
“attaching the DSP and the pointer.” See Reply Br. at 8; see also Opening Br. at 14–15.
19
However, the Court’s rejection of Finjan’s position is not improper. As mentioned above, section
20
112 ¶ 6 requires a means-plus-function claim to cover “only the structure, materials, or acts
21
described in the specification.” Williamson, 792 F.3d at 1347. The ’844 Patent discloses only the
22
two methods identified in col. 6, lines 13–20 and col. 8, lines 65–67 as the algorithm, and thus the
23
scope of the dispute term must be limited to that disclosure. See Williamson, 792 F.3d at 1347.
24
Based on the foregoing, the Court adopts Sonicwall’s proposed structure with the
25
exception of the reference to inspector 125 as set forth in the following: “content inspection engine
26
programmed to perform step 630 of Fig. 6, disclosed at col. 8, lines 65–67 and col. 6, lines 13–20
27
28
3
Finjan made additional counter-arguments in the Cisco case that the Court likewise rejected. See
ECF 134 at 13–16 in Finjan Inc. v. Cisco Systems, Inc., Case No. 17-cv-00072-BLF.
21
1
of the ’844 Patent. Specifically, attaching a Downloadable security profile to the Downloadable
2
(col. 8, lines 65–67 and col. 6, lines 13–18) or attaching to the Downloadable a pointer that points
3
to a stored Downloadable security profile (col. 6, lines 18–20).”
4
5
6
7
8
9
10
United States District Court
Northern District of California
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
C.
Disputed term in the ’926 Patent
1. “destination computer” (claim 22)
Finjan’s Proposal
Sonicwall’s Proposal
No construction necessary—
“client computer to which the
plain and ordinary meaning
incoming Downloadable is
directed”
Court’s Construction
No construction necessary—
plain and ordinary meaning
The parties contest the meaning of the term “destination computer” in claim 22 of the ’926
Patent. Claim 22 recites:
22. A system for managing Downloadables, comprising:
a receiver for receiving an incoming Downloadable;
a Downloadable identifier for performing a hashing function on the incoming
Downloadable to compute an incoming Downloadable ID;
a database manager for retrieving security profile data for the incoming
Downloadable from a database of Downloadable security profiles indexed
according to Downloadable IDs, based on the incoming Downloadable ID, the
security profile data including a list of suspicious computer operations that may be
attempted by the Downloadable; and
a transmitter coupled with said receiver, for transmitting the incoming
Downloadable and a representation of the retrieved Downloadable security profile
data to a destination computer, via a transport protocol transmission.
’926 Patent at 22:20–35 (emphasis added).
Finjan argues that the plain and ordinary meaning of “destination computer” is consistent
with the intrinsic record “because this term when read in the context of the claim is easy to
understand.” See Opening Br. at 16. Finjan contends that the term is “self-explanatory” and
simply describes “a computer that is a destination.” See id. Finjan further argues that Sonicwall’s
proposed “client computer” construction would exclude embodiments because “the ’926 Patent
describes embodiments in which the ‘destination computer’ is not [] limited” to “client
computer[s].” See id. at 16–17. In support, Finjan points to Judge Orrick’s reasoning in an order
on post-trial motions that “Finjan has presented evidence that ‘destination computer’ [in the ’926
Patent] may have many meanings.” See Finjan, Inc. v. Sophos, Inc., 244 F. Supp. 3d 1016, 1049–
22
1
50 (N.D. Cal. 2017) (finding that jury’s finding of infringement of the ’926 Patent was supported
2
by substantial evidence).
3
Sonicwall counters that a “plain and ordinary meaning” does not resolve the parties’
4
principal dispute—“whether the destination computer is limited to the client computer to which
5
the incoming Downloadable is directed . . . or includes other computers that may receive the
6
Downloadable.” See Responsive Br. at 13. Sonicwall argues that the term “destination computer”
7
does not appear in the specification of the ’926 Patent but does appear in the specification of
8
the ’780 Patent (which is incorporated by reference), and that the ’780 Patent “makes clear that
9
‘destination computer’ means the client computer to which the incoming Downloadable is
directed.” See id. at 13. Specifically, Sonicwall points to language in the ’780 Patent specification
11
United States District Court
Northern District of California
10
stating that “[a] Downloadable is an executable application program, which is downloaded from a
12
source computer and run on the destination computer.” See ’780 Patent at 1:50–53, ECF 1-4; see
13
also Responsive Br. at 13–14. Sonicwall contends that one of ordinary skill in the art would read
14
“destination computer” to mean “client computer” because during prosecution of the ’780 Patent
15
the applicant stated that “[t]he present invention concerns generation of an ID for mobile code
16
downloaded to a client computer, referred to as a Downloadable.” See 7/31/2003 Amendment
17
at 7 (emphasis added), Ex. I to McGrath Decl., ECF 109-10. Sonicwall additionally argues that
18
Finjan’s proposal would “improperly render the word ‘destination’ utterly superfluous” because
19
“the claims would have the exact same meaning both with and without the word ‘destination.’”
20
See Responsive Br. at 14 (emphasis removed).
21
The crux of this dispute is whether the “destination computer” in claim 22 of the ’926
22
Patent must be a “client computer.” For the reasons discussed below, the Court finds that the
23
“destination computer” in claim 22 is not so limited and may be a computer other than a “client
24
computer.” As an initial matter, Judge Orrick considered this issue in Finjan, Inc. v. Sophos, Inc.,
25
244 F. Supp. 3d 1016, 1049–50 (N.D. Cal. 2017), and found that Finjan had presented sufficient
26
evidence that “destination computer” does not refer exclusively to an end-user (e.g. client)
27
computer to withstand a post-trial motion for judgment as a matter of law. 244 F. Supp. 3d
28
at 1049. While Judge Orrick’s ruling was not a claim construction order and thus not afforded
23
1
substantial deference, see Symantec, 2017 WL 550453, at *3 (N.D. Cal. Feb. 10, 2017), Judge
2
Orrick’s reasoning is nonetheless persuasive. Indeed, Judge Orrick noted that “the word
3
‘destination’ adds something—it emphasizes that the computer to which the downloadable is
4
being transmitted is not any computer, but rather a particular computer.” See Sophos, 244
5
F. Supp. 3d at 1049 (emphasis in original). Judge Orrick concluded that Finjan had presented
6
evidence that “destination computer” had “many meanings under the ’926 Patent,” and was thus
7
not limited to end-user/client computers. See id. at 1049–50.
8
9
Sonicwall’s arguments to the contrary are unconvincing. First, the claims refer simply to a
“destination computer” without further limitation and neither the ’926 Patent specification nor
the ’780 Patent specification defines the destination computer to be a client computer. In support
11
United States District Court
Northern District of California
10
of its argument that “destination computer” and “client computer” are interchangeable Sonicwall
12
relies on the applicant’s statement during prosecution that “[t]he present invention concerns
13
generation of an ID for mobile code downloaded to a client computer, referred to as a
14
Downloadable.” See 7/31/2003 Amendment at 7 (emphasis added); see also Responsive Br.
15
at 14. However, for prosecution disclaimer to attach, “disavowing actions or statements made
16
during prosecution [must] be both clear and unmistakable.” Omega Eng'g, Inc, v. Raytek Corp.,
17
334 F.3d 1314, 1325–26 (Fed. Cir. 2003). Here, the applicant’s statement merely defines
18
“Downloadable” and indicates that the Downloadable may be downloaded to a client computer but
19
does not clearly and unmistakably disavow the scope of “destination computer,” which is not
20
mentioned at all. Thus, the applicant did not disclaim the full scope of “destination computer” in
21
this statement during prosecution.
22
Second, contrary to Sonicwall’s contention, permitting the term “destination computer” to
23
capture destinations other than a client computer does not “render the word ‘destination’ utterly
24
superfluous,” see Responsive Br. at 14. Just as Judge Orrick reasoned in Sophos, see 244 F. Supp.
25
3d at 1049, the word “destination” still requires that the Downloadable be transmitted to a
26
particular computer at which the Downloadable is run, rather than any computer whatsoever.
27
See ’780 Patent at 1:50–53 (“A Downloadable is an executable application program, which is
28
24
1
downloaded from a source computer and run on the destination computer.”4) (emphasis added).
2
Accordingly, “destination” is not rendered superfluous even where the “destination computer” is
3
not a “client computer.”
Finally, “claim terms must be given their plain and ordinary meaning to one of skill in the
4
5
art.” Thorner v. Sony Computer Ent. Am. LLC, 669 F.3d 1362, 1367 (Fed. Cir. 2012). A
6
“patentee is free to choose a broad term and expect to obtain the full scope of its plain and
7
ordinary meaning unless the patentee explicitly redefines the term or disavows its full scope.” Id.
8
On its face, claim 22 does not include the limitation proposed by Sonicwall and the Court does not
9
find sufficient support in the remainder of the intrinsic record to implicitly read in such a
requirement. In addition, Sonicwall’s argument that the “plain and ordinary meaning” does not
11
United States District Court
Northern District of California
10
resolve the parties’ principal dispute as to whether “destination computer” equals “client
12
computer” is unavailing. See Responsive Br. at 13. If the Court is to give the patentee’s choice of
13
terms any effect, the two terms are necessarily not synonymous. Thus, the Court’s construction
14
resolves the principal dispute.
15
In sum, the Court adopts the plain and ordinary meaning of the disputed term.
16
D.
17
The parties dispute two terms in the ’408 Patent. Both terms appear in claim 9, which
18
recites in part:
9. A computer system for multi-lingual content scanning, comprising:
19
20
. . . a scanner instantiator, stored on the medium and executed by the computer,
operatively coupled to said receiver and said multi-lingual language detector for
instantiating a scanner for the specific programming language, in response to
said determining, the scanner comprising:
21
22
a rules accessor for accessing parser rules and analyzer rules for the specific
programming language, wherein the parser rules define certain patterns in terms
of tokens, tokens being lexical constructs for the specific programming language,
and wherein the analyzer rules identify certain combinations of tokens and patterns
as being indicators of potential exploits, exploits being portions of program code
that are malicious . . .
23
24
25
26
Disputed terms in the ’408 Patent
’408 Patent at 20:35–60 (emphasis added). Each term is discussed in turn.
27
28
This definition of “Downloadable” matches the parties’ agreed upon construction of
“Downloadable.” See supra Section III; Joint Claim Construction Statement at 1, ECF 80.
25
4
1. “instantiating, by the computer, a scanner for the specific programming
language” / “instantiating a scanner for the specific programming language”
(claims 1, 9 and 22)
1
2
Finjan’s Proposal
No construction necessary—
plain and ordinary meaning
3
4
Alternatively:
“initializing a scanner for the
specific programming
language”5
5
6
Sonicwall’s Proposal
“substituting specific data,
instructions, or both into a
generic program unit to make
it usable for scanning the
specific programming
language”
Court’s Construction
“substituting specific data,
instructions, or both into a
scanner to make it usable for
scanning the specific
programming language”
The ’408 Patent provides “a method and system for scanning content that includes mobile
7
8
code, to produce a diagnostic analysis of potential exploits within the content.” Id. at 1:59–61.
9
The invention uses an adaptive rule-based content (“ARB”) scanner, which dynamically scans and
diagnoses incoming Internet content. See id. at 1:65–2:24. Unlike “prior art scanners that are
11
United States District Court
Northern District of California
10
hard-coded for one particular type of content,” id. at 2:2–3, the claimed ARB scanners “are able to
12
adapt [themselves] dynamically to scan a specific type of content” and the ARB scanner systems
13
are “preferably designed as a generic architecture that is language-independent, and is customized
14
for a specific language through use of a set of language-specific rules,” id. at 1:65–2:1, 6:17–20.
Finjan argues that “[t]his term does not require construction because it can be readily
15
16
understood by a person of ordinary skill in the art.” Opening Br. at 18. Finjan posits that a person
17
of ordinary skill in the art reviewing the ’408 Patent would understand “instantiating” to mean
18
“initializing.” See id. Finjan therefore contends that the plain and ordinary meaning of the
19
disputed term is “initializing a scanner for the specific programming language” or that the Court
20
should adopt that meaning in the alternative. See id.; Hearing Tr. at 32:5–11, ECF 127.
21
The Court disagrees. The ’408 Patent does not use “instantiating” and “initializing”
22
synonymously. Instead, the specification makes clear that the patentee intended the words to have
23
different effect. For example, in a paragraph discussing scanners, the specification recites:
24
ARB scanner factory module 630 instantiates a scanner repository 640.
Repository 640 produces a single instance of each ARB scanner defined in the
archive file. Preferably, each instance of an ARB scanner is able to initialize itself
and populate itself with the requisite data.
25
26
27
28
5
As proposed by Finjan at the Hearing. See Hearing Tr. at 32:5–11, ECF 127.
26
1
’408 Patent at 15:30–35. Here, the “instantiates” step takes place before and separate from the
2
“initialize” step. If the Court is to give the patentee’s choice of terms any effect, the two words
3
are necessarily not synonymous. Thus, the Court turns to the question of whether Sonicwall’s
4
proposal is appropriate.
5
Sonicwall argues that its proposed construction should govern because the specification
6
states that the ARB scanner is “preferably designed as a generic architecture that is language-
7
independent, and is customized for a specific language through use of a set of language-specific
8
rules.” See ’408 Patent at 6:17–20 (emphasis added); see also Responsive Br. at 18. Sonicwall
9
further argues that the specification explains that the “[t]okenizer 210 and normalizer 240 are
generic modules that can be adapted to process any content language, by providing a description
11
United States District Court
Northern District of California
10
of the content language with a rule file.” See ’408 Patent at 8:7–9 (emphasis added); see also
12
Responsive Br. at 16. Sonicwall contends that therefore the scanner is customized using
13
“language-specific data [] substituted into a generic module to allow the scanning of a specific
14
programming language.” See Responsive Br. at 16. Sonicwall additionally points out that its
15
proposed construction was adopted by the PTAB as the “broadest reasonable construction . . . in
16
light of the specification.” See id. at 18 (quoting and citing 3/29/2016 IPR Decision at 11–12,
17
Ex. K to McGrath Decl., ECF 109-12).
18
Finjan counters that “a different claim construction standard is applied in the IPR” and that
19
Sonicwall’s proposed construction would “import limitations into the claims when describing a
20
more general component of the scanner.” See Reply Br. at 11.
21
Indeed, the PTAB’s construction in IPR is not binding on this Court and is not afforded
22
deference. See SkyHawke Techs., LLC v. Deca Int’l Corp., 828 F.3d 1373, 1376 (Fed. Cir. 2016).
23
However, Sonicwall’s proposed construction is on point and helpful to the jury, with one
24
exception. The Court is not convinced that “a generic program unit” properly captures the scope
25
of the disputed term, which concerns “a scanner.” See Responsive Br. at 15; ’408 Patent claim 9.
26
The ’408 Patent makes clear that the ARB scanner system is “preferably designed as a generic
27
architecture,” see id. at 6:17–18 (emphasis added), but does not mandate that a scanner is
28
necessarily “a generic program unit.” Moreover, the word “instantiating” is at the crux of this
27
1
dispute, not the word “scanner.” Accordingly, the Court replaces Sonicwall’s proposed language
2
“a generic program unit” with the claim language “a scanner.”
3
“‘Claim construction’ is for the purpose of explaining and defining terms in the claims, and
4
usually requires use of words other than the words that are being defined.” Abbott Labs. V.
5
Sandoz, Inc., 544 F.3d 1341, 1360 (Fed. Cir. 2008). Finjan’s proposal that “instantiating a
6
scanner” has a plain and ordinary meaning will not aid the jury. On the other hand, Sonicwall’s
7
proposal as modified by the Court clarifies that “instantiating a scanner” means “substituting
8
specific data, instructions, or both into a scanner” to make it useable for scanning the specific
9
programming language. The words of the claim must be understood as the inventor used them.
See Phillips, 415 F.3d at 1316. Here, “substituting specific data, instructions, or both” is
11
United States District Court
Northern District of California
10
consistent with the patentee’s use of “instantiating” which describes a procedure of customizing or
12
setting up “a scanner for the specific programming language” after a “specific one of a plurality of
13
programming languages” is identified. See, e.g., ’408 Patent claim 1; ’408 Patent claim 9. Thus,
14
the Court finds that Sonicwall’s proposed construction as modified by the Court is consistent with
15
the claim language and provides the requisite guidance to the jury.
16
Based on the foregoing, the Court adopts the following construction: “substituting specific
17
data, instructions, or both into a scanner to make it usable for scanning the specific programming
18
language.”
19
20
21
22
23
24
25
26
27
2.
“a rules accessor for accessing parser rules and analyzer rules for the
specific programming language” (claim 9)
Finjan’s Proposal
No construction necessary—
plain and ordinary meaning
Sonicwall’s Proposal
Governed by 35 U.S.C.
§ 112(6)
Court’s Construction
Governed by 35 U.S.C.
§ 112(6)
Function: for accessing
parser rules and analyzer
rules for the specific
programming language
Function: accessing
parser rules and analyzer
rules for the specific
programming language
Structure: indefinite under
§ 112(2) for failure to
disclose corresponding
structure
Structure: indefinite under
§ 112(2) for failure to
disclose corresponding
structure
28
28
1
The parties dispute whether this term is a means-plus-function claim governed by
2
35 U.S.C. § 112 ¶ 6 and if so, whether adequate structure is disclosed. Finjan points out that the
3
word “means” does not appear in the claim language of the ’408 Patent and argues that Sonicwall
4
cannot rebut the presumption against invoking § 112 ¶ 6. See Opening Br. at 20; see also
5
Williamson v. Citrix Online, LLC, 792 F.3d 1339, 1349 (Fed. Cir. 2015). Finjan contends that
6
“rules accessor” is “[not] a nonce word because the term connotes a specific structure for
7
identifying and providing access to information which in this case is access to the parser and
8
analyzer rules.” See Opening Br. at 20. Finjan further argues that even if this term were a mean-
9
plus-function term, it is not indefinite because “a rules accessor” alone “is sufficient structure.”
10
See id. at 21 n.4; see also Reply Br. at 12.
United States District Court
Northern District of California
11
On the other hand, Sonicwall contends that the “rules accessor” limitation is governed by
12
§ 112 ¶ 6 because “‘rules accessor’ does not have a commonly understood meaning” and because
13
the term is not viewed by those of skill in the art “to connote a particular structure.” See
14
Responsive Br. at 20. Sonicwall further contends that “‘rules accessor’ is simply another way of
15
saying ‘means for accessing rules’” with “no independent structural limitation.” See id. at 21.
16
Sonicwall next argues that the ’408 Patent specification fails to disclose corresponding structure
17
because “there is no mention made [] of a rules accessor” and because “the entire concept of rules
18
being accessed is missing” as well as any “algorithm for performing the recited function.” See id.
19
20
a. Invoking 35 U.S.C. § 112 ¶ 6
To determine whether a claim invokes § 112, the Court must determine if the claim
21
limitation is drafted in the means-plus-function format. Here, the disputed claim limitation does
22
not use the term “means.” Thus, there is a presumption that the limitation does not invoke § 112
23
¶ 6. See Williamson, 792 F.3d at 1348. However, this presumption is rebuttable and § 112 ¶ 6
24
will apply “if the challenger demonstrates that the claim term fails to ‘recite sufficiently definite
25
structure’ or else recites ‘function without reciting sufficient structure for performing that
26
function.’” See id. at 1349 (internal citation omitted). For the reasons discussed below, the Court
27
finds that Sonicwall has demonstrated that the claim term “fails to recite sufficiently definite
28
structure” or “recites function without reciting sufficient structure for performing that function” to
29
1
overcome this presumption.
2
Sonicwall presents search results showing that neither “rules accessor” nor “accessor” are
3
recognized terms or components in various computer, technical, or IT dictionaries. See McGrath
4
Decl. ¶ 13, ECF 109-1; Ex. L to McGrath Decl., ECF 109-13. In response, Finjan cites the
5
definition of “access” in a computer dictionary and argues that according to that definition the
6
meaning of “rules accessor” is self-explanatory—that “it is a component that accesses the data.”
7
See Reply Br. at 11–12; see also Webster’s New World Dictionary of Computer Terms (Sixth
8
Edition), Ex. C to Kastens Decl., ECF 110-4. Finjan’s argument misses the point. The key
9
question is not what the “rules accessor” accesses, but whether “rules accessor” is understood by a
person of ordinary skill in the art as an identifiable structure. In other words, whether the words
11
United States District Court
Northern District of California
10
“rules accessor” or “accessor” “provide [] indication of structure” or instead merely “set[] forth the
12
same black box recitation of structure for providing the same specified function as if the term
13
‘means’ had been used,” see Williamson, 792 F.3d at 1350. Sonicwall contends that “rules
14
accessor” is a “nonce term” because it was “coined specifically for the patent” and “provides no
15
direction as to a particular structure.” See Responsive Br. at 20–21 (internal quotation and citation
16
omitted).
17
Indeed, replacing “rules accessor for accessing [] rules” in claim 9 of the ’408 Patent with
18
“means for accessing [] rules” does not alter the structure. Under either reading, the term is
19
merely a description of the function performed. Put differently, “rules accessor” simply takes the
20
function being performed and states it in terms of a device. See Advanced Ground Info. Sys., Inc.
21
v. Life360, Inc., 830 F.3d 1341, 1348 (Fed. Cir. 2016) (finding “symbol generator” analogous to
22
“means for generating symbols” on similar grounds). Accordingly, Finjan’s argument that “rules
23
accessor” connotes specific structure through “access to the parser and analyzer rules” fails. See
24
Opening Br. at 20. At bottom, “rules accessor” does not designate structure. Cf. Skky, Inc. v.
25
MindGeek, s.a.r.l., 859 F.3d 1014, 1020 (Fed. Cir. 2017) (finding that “wireless device” is “used
26
in common parlance . . . to designate structure) (internal citation omitted).
27
28
The Court must additionally consider whether the claim language and specification
“describe how the [rules accessor], by its interaction with the other components in the [scanner
30
1
instantiator], is understood as the name for structure.” See Williamson, 792 F.3d at 1351. In
2
Williamson, the Federal Circuit found that “the claim does not describe how the ‘distributed
3
learning control module’ interacts with other components in the distributed learning control server
4
in a way that might inform the structural character . . . or otherwise impart structure.” Id. at 1351.
5
Instead, “portions of the claim [] describe certain inputs and outputs at a very high level.” Id.
6
Likewise, here, the claim does not explain how the “rules accessor” interacts with other
7
components (the tokenizer, parser, and notifier) of the “scanner instantiator” sufficient to impart
8
structure. See ’408 Patent at 20:48–21:8. Although these components may depend on the output
9
of the “rules accessor,” see., e.g., id. at 20:63–67 (parser operating “in accordance with the parser
rules accessed by said rules accessor”), such interaction is only described at a high level and
11
United States District Court
Northern District of California
10
merely reflects the same black box recitation of structure provided by “rules accessor.”
12
Finjan relies on Finjan, Inc. v. Proofpoint, Inc., 2015 WL 7770208 (N.D. Cal. Dec. 3,
13
2015) for the proposition that claim 9 of the ’408 Patent provides “detailed context” sufficient to
14
connote structure. See Opening Br. at 19–20. Proofpoint is inapposite. While the Proofpoint
15
court found that the claim language “informs the [content processor]’s structural character,” see
16
2015 WL 7770208, at *11, it did not rule that the claim language alone imparted sufficient
17
structure. Instead, the Proofpoint court relied heavily on disclosures in the specification and
18
figures to find sufficient structure for the disputed term “content processor.” See 2015 WL
19
7770208, at *11 (identifying specific language and diagrams in the specification describing the
20
content processor’s operation and interaction with other system components). Here, unlike in
21
Proofpoint, the ’408 Patent specification is silent as to the disputed functional term. Moreover,
22
the tokenizer, parser, and notifier of claim 9 simply act in accordance with the outputs of the
23
“rules accessor” and do not serve to inform or “to cabin the scope of the functional term” itself,
24
see Diebold Nixdorf, Inc. v. Int’l. Trade Comm’n, 899 F.3d 1291, 1300–01 (Fed. Cir. 2018). Thus,
25
the “rules accessor” could be any structure capable of performing the claimed function and lacks
26
structural meaning. See id. at 1301.
27
28
b.
Disclosure of corresponding structure
Having found that the disputed term invokes § 112 ¶ 6, the Court next determines whether
31
1
the specification discloses sufficient structure that corresponds to the claimed function. This is a
2
two-step process. “The court must first identify the claimed function.” Williamson, 792 F.3d
3
at 1351. “Then, the court must determine what structure, if any, disclosed in the specification
4
corresponds to the claimed function.” Id. “If the patentee fails to disclose adequate corresponding
5
structure, the claim is indefinite.” Id. For the reasons discussed below, the Court finds that the
6
’408 Patent specification fails to disclose sufficient structure that corresponds to the claimed
7
function in the disputed term.
8
Finjan argues that the claimed function is “accessing data, which in this case are the parser
and analyzer rules.” See Reply Br. at 12. Sonicwall contends that the function is simply the
10
portion of the claim language “for accessing parser rules and analyzer rules for the specific
11
United States District Court
Northern District of California
9
programming language.” See Responsive Br. at 18; see also ’408 Patent at 20:53–54. The Court
12
agrees with Sonicwall. Finjan’s “accessing data” proposal is overbroad. Claim 9 makes clear that
13
the “rule accessor” is specifically “for accessing parser rules and analyzer rules for the specific
14
programming language.” See ’408 Patent at 20:53–54. Accordingly, the Court adopts Sonicwall’s
15
proposed function with the exception of dropping the word “for” at the beginning of Sonicwall’s
16
proposal.
17
The Court next looks to the specification for structure corresponding to the claimed
18
function. The specification refers to “use of a set of language-specific rules,” see, e.g., id. at 6:19–
19
20, but makes no mention of an “accessor,” “rules accessor,” or the concept of accessing rules, see
20
generally ’408 Patent Specification. Finjan makes two arguments in support of its position that
21
the specification adequately discloses structure. Neither is persuasive.
22
First, Finjan argues that under In re Katz Interactive Call Processing Pat. Litig., 639 F.3d
23
1303 (Fed. Cir. 2011), “no explicit structure for accessing data would be required, as accessing the
24
described parser rules and analyzer rules[] is a known concept of computer operation,” see Reply
25
Br. at 12. The Court disagrees. Katz held that a standard microprocessor can serve as sufficient
26
structure for “functions [that] can be achieved by any general purpose computer without special
27
programming.” 639 F.3d at 1316. The Katz court held that claim terms involving basic
28
“processing,” “receiving,” and “storing” functions were not necessarily indefinite because a
32
1
general purpose computer need not “be specially programmed to perform the recited function.”
2
Id. The Federal Circuit has since clarified that the Katz exception is “narrow” and applies “only in
3
the rare circumstances where any general-purpose computer without any special programming can
4
perform the function.” See Ergo Licensing, LLC v. CareFusion 303, Inc., 673 F.3d 1361, 1364
5
(Fed. Cir. 2012) (declining to apply the Katz exception to the function of “controlling the adjusting
6
means”).
7
Here, the claimed function of “accessing parser rules and analyzer rules for the specific
8
programming language” is not a basic “processing” or “storing” function or the like that could be
9
performed on a general-purpose computer, see Katz, 639 F.3d at 1316. Instead, the function
would require special programming adapted to specific requirements—e.g., the ability to access
11
United States District Court
Northern District of California
10
“parser rules” and “analyzer rules,” which are patent specific. See Ergo, 673 F.3d at 1365 (“A
12
specially adapted computer is not a general-purpose computer.”). Thus, the narrow Katz exception
13
does not apply.
14
Second, Finjan argues that the specification discloses sufficient structure by way of an
15
“ARB rule file” and “an internal table, for rules to store and access variables.” See ’408 Patent at
16
10:4–7, 13:1–2; see also Reply Br. at 12. The Court has reviewed the cited portions of the
17
specification and is not persuaded. The “ARB rule file” refers to “parser_rules” and
18
“analyzer_rules” but does not include or discuss a concept or manner of accessing those rules. See
19
’408 Patent at 10:4–9. Likewise, the cited “internal table, for rules . . .” does not concern
20
accessing parser rules or analyzer rules but is instead a “symbol table” related to pattern
21
recognition by a parsing rule. See ’408 Patent at 8:46–48, 12:64–13:2. Accordingly, the
22
specification lacks the requisite structure.
23
In sum, the Court finds that the ’408 Patent specification fails to disclose sufficient
24
structure corresponding to the function of “accessing parser rules and analyzer rules for the
25
specific programming language.”
26
27
28
c.
Conclusion
Because the specification of the ’408 Patent does not disclose sufficient structure for the
“rules accessor” functional term and claim 9 includes this term, claim 9 is indefinite under 35
33
1
U.S.C. § 112 ¶ 2.
2
E.
3
The ’968 Patent provides a system and method of managing cached content in relation to
Disputed terms in the ’968 Patent
4
multiple security policies by, inter alia, providing a “policy-based index . . . indicating
5
allowability of cached content relative to a plurality of policies.” See id. at 1:63–2:7. A cache
6
manager may then utilize the policy-based index to determine whether cached content is allowable
7
for a different user than the original user who requested it and block cached content from being
8
delivered to users for whom it is not allowed. Id. at 2:7–11. The parties dispute two terms in the
9
’968 Patent. Both terms appear in claim 1, which recites:
10
United States District Court
Northern District of California
11
12
13
14
15
16
17
18
19
20
21
22
23
1. A policy-based cache manager, comprising:
a memory storing a cache of digital content, a plurality of policies, and a policy
index to the cache contents, the policy index including entries that relate cache
content and policies by indicating cache content that is known to be allowable
relative to a given policy, for each of a plurality of policies;
a content scanner, communicatively coupled with said memory, for scanning a
digital content received, to derive a corresponding content profile; and
a content evaluator, communicatively coupled with said memory, for determining
whether a given digital content is allowable relative to a given policy, based on the
content profile, the results of which are saved as entries in the policy index.
’968 Patent at 9:47–62 (emphasis added). Each term is discussed in turn.
1. “polic[y/ies]” (claims 1 and 13)
Finjan’s Proposal
No construction necessary—
plain and ordinary meaning
Alternatively:
“a rule or rules for managing
a security system”
Sonicwall’s Proposal
“rule(s) or set(s) of rules that
determine whether a piece of
content can be accessed by a
user”
Court’s Construction
“rule(s) for managing a
security system”
At the Hearing Finjan clarified it is alternatively seeking a construction of “a rule or rules
24
for managing a security system.” See Hearing Tr. at 60:12–15; see also Reply Br. at 12. Finjan
25
argues that the ’968 Patent specification includes examples where the term “policy” generally
26
refers to rules for managing a security system and that Sonicwall’s proposal reads in limitations
27
not present in the claim language. See Opening Br. at 21–22. Sonicwall counters that “[t]he
28
Federal Circuit – and Finjan – previously agreed with Sonicwall’s proposed construction.” See
34
1
Responsive Br. at 22 (citing Finjan, Inc. v. Blue Coat Sys., Inc., 879 F.3d 1299, 1308 (Fed. Cir.
2
2018)). Sonicwall also argues that its proposed “piece of content” and “accessed by a user”
3
limitations are consistent with the “purpose of the invention [the ’968 Patent].” See Responsive
4
Br. at 23–24.
5
As an initial matter, the Court is not persuaded that Sonicwall’s proposed construction is
6
dictated by the Federal Circuit’s statement that “[t]he patentee agrees that a ‘policy’ is a rule or set
7
of rules that determines whether a piece of content can be accessed by a user,” see Finjan, Inc. v.
8
Blue Coat Sys., Inc., 879 F.3d 1299, 1308 (Fed. Cir. 2018) (finding that Blue Coat was entitled to
9
JMOL of non-infringement of claim 1 of the ’968 Patent). Although Finjan apparently agreed
with such a description before the Federal Circuit, the context here is entirely different. First, the
11
United States District Court
Northern District of California
10
Federal Circuit was reviewing the district court’s ruling on post-trial motions for judgment as a
12
matter of law, not claims construction. Moreover, “polic[y/ies]” was not construed. Second, the
13
Federal Circuit’s order does not specify whether Finjan agreed that the recited description
14
captured the full scope of the claim term “policy,” or whether Finjan was asked that question.
15
Indeed, the crux of the instant dispute is whether “polic[y/ies]” captures only what Sonicwall
16
proposes or Finjan’s more broad alternative construction.
17
Turning to the question of term scope, the Court finds that Sonicwall’s proposed
18
construction is impermissibly narrow. The intrinsic record simply does not limit “polic[y/ies]” to
19
rules that determine whether a piece of content can be accessed by a user. Instead, the term also
20
more generally contemplates rules for managing a security system. See, e.g., ’968 Patent at 3:65–
21
4:1 (“The policy may, for example, indicate which URL’s are to be blocked or which computer
22
viruses are known and should thus be blocked.”). As another example, a policy may contain
23
“URL filtering [] used to block ‘undesirable’ web pages from being delivered.” See id. at 1:40–42.
24
In other words, a policy may firewall certain sources at the outset and therefore is not limited to
25
determining whether a piece of content can be accessed by a user. Accordingly, Sonicwall’s
26
proposal is inapposite.
27
28
In sum, the Court adopts Finjan’s alternative proposed construction with a minor
grammatical alteration to read “rule(s) for managing a security system.”
35
1
2
3
4
5
6
2. “[content] profile” (claims 1 and 13)
Finjan’s Proposal
No construction necessary—
plain and ordinary meaning
Sonicwall’s Proposal
“a set of characteristics or
qualities that identify a type
or category of digital content”
Court’s Construction
“information describing the
received content”
Alternatively:
“information describing the
received content”
Discussion at the Hearing narrowed this dispute. Although not apparent in its briefing,
Finjan clarified it is alternatively seeking a construction of “information describing the received
8
content.” See Hearing Tr. at 75:11–13, 81:6–11; see also Reply Br. at 14. Sonicwall argued that a
9
“plain and ordinary” construction is not helpful but indicated that Finjan’s alternative construction
10
is not “far off” Sonicwall’s proposal. See Hearing Tr. at 77:20–24. The Court agrees that a plain
11
United States District Court
Northern District of California
7
and ordinary construction would not be helpful to the jury due to commonplace definitions of
12
“profile” or “content profile” that may conflate with the term as used in the ’968 Patent. Thus, the
13
Court analyzes Finjan’s alternative construction vs. Sonicwall’s proposed construction.
14
Finjan argues that “Sonicwall’s proposed construction . . . includes a number of limitations
15
that are not supported by the intrinsic record.” See Opening Br. at 23. Finjan further argues that
16
Sonicwall’s construction is based “on a construction adopted by the PTAB during an IPR, who in
17
turn relied on a dictionary definition . . . . [that] includes requirements that are inconsistent with
18
the specification.” See Reply Br. at 14. Sonicwall counters that its proposal is based on the
19
construction adopted by the PTAB in two IPR proceedings and that “the ‘content profile’ must
20
contain information that can be compared to a policy to determine whether the content is
21
allowable.” See Responsive Br. at 25.
22
Quite frankly, the Court does not see a great deal of space between Finjan’s alternative
23
construction and Sonicwall’s proposed construction. Both use broad language—Finjan proposes
24
“information” and Sonicwall proposes “characteristics or qualities.” Indeed, “content profile” as
25
used in the ’968 Patent is a broad term—claim 1 outlines that the content profile corresponds to
26
“digital content received.” See ’968 Patent at 9:55–57; see also ’968 Patent at 8:27–28 (“[T]he
27
content filter scans content [] to derive a profile thereof.”). The Court agrees with Sonicwall that
28
the “content profile” must contain information that can be compared to a policy to determine
36
1
whether the content is allowable. See ’968 Patent at 9:57–61 (“determining whether a given
2
digital content is allowable relative to a given policy, based on the content profile . . .)
3
(emphasis added). However, Finjan’s alternative construction includes this requirement by
4
construing “content profile” as “information describing the received content.” See Reply Br.
5
at 14. Accordingly, the Court need not rely on Sonicwall’s proposal which is based on the
6
PTAB’s dictionary-guided construction. See Philips, 415 F.3d at 1318.
7
All in all, the Court finds that Finjan’s alternative construction is consistent with the
8
intrinsic record and more helpful to the jury than Sonicwall’s proposal. Accordingly, the Court
9
adopts Finjan’s alternative construction.
//
11
United States District Court
Northern District of California
10
//
12
//
13
//
14
//
15
//
16
//
17
//
18
//
19
//
20
//
21
//
22
//
23
//
24
//
25
//
26
//
27
//
28
//
37
1
2
3
V.
ORDER
As set forth above, the Court construes the disputed terms as follow:
Court’s Construction
“code that, at runtime, monitors or intercepts
actually or potentially malicious code
operations without modifying the executable
code”
Claim Term
“mobile protection code”
4
5
(’633 Patent, claims 1, 8, and 14);
(’822 Patent claims 1 and 9)
6
7
8
9
10
“A computer program product, comprising a
computer usable medium having a computer
readable program code therein, the computer
readable program code adapted to be executed
for computer security, the method comprising:”
“means for receiving a Downloadable”
“A computer program product, comprising a
computer usable medium having a computer
readable program code therein, the computer
readable program code adapted to be
executed for computer security, comprising:”
Function: receiving a Downloadable
(’844 Patent, claim 43)
“means for generating a first Downloadable
security profile that identifies suspicious code
in the received Downloadable”
Structure: Downloadable file interceptor
Function: generating a first Downloadable
security profile that identifies suspicious code
in the received Downloadable
(’844 Patent, claim 43)
Structure: content inspection engine
programmed to perform the algorithm
disclosed at col. 8, lines 51–60 of the ’844
Patent
Function: linking the first Downloadable
security profile to the Downloadable before a
web server makes the Downloadable
available to web clients
(’633 patent, claim 14)
United States District Court
Northern District of California
11
12
13
14
15
16
17
18
19
where the mobile protection code itself must
be executable
The typographical error in the preamble is
corrected to read:
“means for linking the first Downloadable
security profile to the Downloadable before a
web server makes the Downloadable available
to web clients”
20
(’844 Patent, claim 43)
Structure: content inspection engine
programmed to perform step 630 of Fig. 6,
disclosed at col. 8, lines 65–67 and col. 6,
lines 13–20 of the ’844 Patent.
Specifically, attaching a Downloadable
security profile to the Downloadable (col. 8,
lines 65–67 and col. 6, lines 13–18) or
attaching to the Downloadable a pointer that
points to a stored Downloadable security
profile (col. 6, lines 18–20).
27
“destination computer”
No construction necessary—plain and
ordinary meaning
28
(’926 Patent, claim 22)
21
22
23
24
25
26
38
1
2
3
4
5
6
7
“instantiating, by the computer, a scanner for
the specific programming language” /
“instantiating a scanner for the specific
programming language”
“substituting specific data, instructions, or
both into a scanner to make it usable for
scanning the specific programming language”
(’408 Patent, claims 1, 9, and 22)
“a rules accessor for accessing parser rules and
analyzer rules for the specific programming
language”
Function: accessing
parser rules and analyzer
rules for the specific programming language
(’408 Patent, claim 9)
“polic[y/ies]”
Structure: indefinite under § 112(2) for
failure to disclose corresponding structure
“rule(s) for managing a security system”
(’968 Patent, claims 1 and 13)
“[content] profile”
“information describing the received content”
8
9
10
United States District Court
Northern District of California
11
12
(’968 Patent, claims 1 and 13)
The Court also adopts the following constructions that the parties agreed to in their Joint
Claim Construction Statement:
13
14
15
16
17
18
19
20
21
22
Claim Term
Agreed Construction
“Downloadable”
“an executable application program, which is downloaded
from a source computer and run on the destination computer”
(’844 Patent, claims 1, 15, 41, 43;
’494 Patent, claim 10;
’780 Patent, claims 1, 9, 17;
’926 Patent, claim 22)
“database”
(’494 Patent, claim 10;
’926 Patent, claim 22;
’305 Patent, claims 1, 13)
“means for fetching at least one
software component identified by
the one or more references”
Function: fetching at least one software component identified
by the one or more references
(’780 Patent, claim 17)
Structure: ID generator programmed to perform the
algorithm of step 820 disclosed in the ’780 Patent at Fig. 8;
9:62–64; and 4:56–66.
“means for obtaining a
Downloadable that includes one
or more references to software
components required to be
executed by the Downloadable”
Function: obtaining a Downloadable that includes one or
more references to software components required to be
executed by the Downloadable
23
24
25
26
27
28
“a collection of interrelated data organized according to a
database schema to serve one or more applications”
(’780 Patent, claim 17)
Structure: ID generator programmed to perform the
algorithm of step 810 disclosed in the ’780 Patent at Fig. 8;
9:60–62; and 4:50–54.
39
1
“parse tree”
2
(’408 Patent, claims 1, 9, 22)
3
“policy index”
4
(’968 Patent, claim 1)
“a hierarchical structure of interconnected nodes built from
scanned content”
“a data structure indicating allowability of cached content
relative to a plurality of policies”
5
6
7
8
9
10
United States District Court
Northern District of California
11
IT IS SO ORDERED.
Dated: March 26, 2019
______________________________________
BETH LABSON FREEMAN
United States District Judge
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
40
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?