Centripetal Networks, Inc. v. Cisco Systems, Inc.

Filing 621

OPINION AND ORDER. The Court FINDS the 856 Patent, the 176 Patent, the 193 Patent, and the 806 Patent claims valid and literally INFRINGED and the 205 Patent NOT INFRINGED. The Court FINDS the actual damages suffered by Centripetal as a result of infringement total $755,808,545; that the infringement was willful and egregious and shall be enhanced by a factor of 2.5x to equal $1,889,521,362.50. The Court awards pre-judgment interest of $13,717,925 applied to the actual damages before enhancement plus its costs. This, accordingly, equals a total award of $1,903,239,287.50 payable in a lump sum due on the judgment date. The Court, additionally, imposes a running royalty of 10% on the apportioned sales of the accused products and their successors for a period of three years, followed by a second three-year term with a running royalty of 5% on said sales upon the terms described supra. It DENIES any further relief to Centripetal at the termination of the second three-year term. Signed by District Judge Henry C. Morgan, Jr., on 10/5/20. (bpet, )

Download PDF
Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 1 of 178 PageID# 23887 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Norfolk Division CENTRIPETAL NETWORKS, INC., Plaintiff, v. CISCO SYSTEMS, INC., Defendant. ) ) ) ) ) ) ) ) ) Civil Action No. 2:18cv94 OPINION AND ORDER After hearing the evidence presented by the parties during the trial on this matter, and considering the entire trial record before this Court, the Court enters the following findings of fact and conclusions of law pursuant to Federal Rule of Civil Procedure 52(a). Any item marked as a finding of fact which may also be interpreted as a conclusion of law is hereby adopted as such. Any item marked as a conclusion of law which may also be interpreted as a finding of fact is hereby adopted as such. I. PROCEDURAL POSTURE 1 1. This patent trial concerns five United States patents involving complex issues in cybersecurity technology heard by the Court without a jury. 2. The case began when Centripetal Networks, Inc. (“Centripetal”) filed a Complaint against Cisco Systems, Inc. (“Cisco”) for infringement of a number of Centripetal’s U.S. Patents on February 13, 2018. Doc. 1. 1 All matters discussed in this Procedural Posture are procedural background and findings of fact. Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 2 of 178 PageID# 23888 3. On March 29, 2018, Centripetal filed an Amended Complaint, asserting infringement of U.S. Patent Nos. 9,566,077 (“the ‘077 Patent”), 9,413,722 (“the ‘722 Patent”), 9,160,713 (“the ‘713 Patent”), 9,124,552 (“the ‘552 Patent”), 9,565,213 (“the ‘213 Patent”), 9,674,148 (“the ‘148 Patent”), 9,686,193 (“the ‘193 Patent”), 9,203,806 (“the ‘806 Patent”), 9,137,205 (“the ‘205 Patent”), 9,917,856 (“the ‘856 Patent”), and 9,500,176 (“the ‘176 Patent”). Doc. 29. 4. Cisco has filed numerous petitions for inter partes review (“IPR”), between July 12, 2018 and September 18, 2018, before the Patent Trial and Appeals Board (“PTAB”) against nine (9) of the eleven (11) Centripetal patents originally asserted against Cisco and filed a Motion to Stay Pending Resolution of IPR Proceedings. The Court granted the stay request on February 25, 2019. Doc. 58. 5. Upon the motion of Centripetal, on September 18, 2019, the Court issued an order, lifting the stay in part with respect to patents and claims not currently subject to IPR proceedings and set the case for trial in April 2020. Doc. 68. The parties later waived a jury trial following the jury trial limitations resulting from the COVID-19 pandemic. 6. At trial, Centripetal asserted that Cisco infringes Claims 63 and 77 of the ‘205 Patent, Claims 9 and 17 of the ‘806 Patent, Claims 11 and 21 of the ‘176 Patent, Claims 18 and 19 of the ‘193 Patent and Claims 24 and 25 of the ‘856 Patent (the ‘Asserted Claims’). Doc. 411 (“Amended Final Pre-Trial Order”). 7. Of the claims not at issue for trial, the PTAB granted institution of IPR of all of the claims of the ‘552 Patent, the ‘713 Patent, the ‘213 Patent, the ‘148 Patent, the ‘077 Patent, and the ‘722 Patent and granted institution of IPR of claims of the ‘205 Patent that are not the subject of this bench trial. Doc. 411. 2 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 3 of 178 PageID# 23889 8. The PTAB has, thus far, invalidated all of the claims of the ‘552 Patent, the ‘713 Patent, the ‘213 Patent, the ‘148 Patent, and the ‘077 Patent and invalidated the unasserted claims of the ‘205 Patent. Centripetal has appealed or may be appealing the PTAB decisions regarding the ‘552 Patent, the ‘713 Patent, the ‘213 Patent, the ‘148 Patent, the ‘077 Patent, and unasserted claims of the ‘205 Patent. Doc. 411. II. WITNESSES AT TRIAL 9. During the twenty-two-day bench trial, and at a later hearing on damages evidence, both parties were given the opportunity to present their evidence live through a video platform approved by the Eastern District of Virginia after Court’s staff was instructed in its operation. Cisco objected to proceeding through a video platform, and also objected to using the platform utilized in favor of its own platform. In its order of April 23, 2020, the Court overruled Cisco’s objections for the reasons stated therein. In light of the use of the video platform, the parties implemented specific trial protocols that are detailed in Appendix B. See Appendix B; Doc. 411 (Amended Pre-Trial Order). At the conclusion of the 22nd day of trial, the parties joined in congratulating the Court’s staff for their handling of the trial evidence by means of the video platform. 10. Due to the complex nature of the technology at issue in the case, the Court requested that each party present a technology tutorial on the first day of trial. The Court has compiled a list of the abbreviations used in the testimony and documents throughout the trial and attached it as Appendix A. For Centripetal, Dr. Nenad Medvidovic presented the technology tutorial and Dr. Kevin Almeroth presented the technology tutorial for Cisco. 11. Centripetal, in its case in chief, called a variety of live fact and expert witnesses including: 3 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 4 of 178 PageID# 23890 • Mr. Steven Rogers – Founder and CEO of Centripetal. Tr. 228:8; • Dr. Sean Moore – Chief Technology Officer and Senior Vice President of Research at Centripetal. Tr. 301:24-25. Dr. Moore is an inventor on all of the asserted patents in this case. Tr. 314:25, 315:1-2; • Dr. Michael Mitzenmacher – an independent expert witness in cybersecurity who presented opinion testimony that the accused products infringe the ‘193 Patent, the ‘806 Patent and the ‘205 Patent. Tr. 431:16-23; • Dr. Eric Cole – an independent expert witness in cybersecurity who presented opinion testimony that the accused products infringe the ‘856 Patent and the ‘176 Patent. Tr. 886:9-11, 975:19-21; • Dr. Nenad Medvidovic – an independent expert witness in cybersecurity who opined about the importance of the patent technology in relation to the accused products. Tr. 1144:22-25, 1145:1-2; • Mr. Jonathan Rogers – Chief Operating Officer at Centripetal. Tr. 1194:11; • Mr. Christopher Gibbs - Senior Vice President of Sales at Centripetal. Tr. 1297:1-2; • Dr. Aaron Striegel – an independent expert witness in computer networking who opined regarding apportionment and the top-level infringing functions of the accused products. Tr. 1337:19-23; • Mr. Lance Gunderson – an independent expert witness in patent damages who opined regarding damages and a reasonable royalty. Tr. 1441:2-14; • Mr. James Malackowski – an independent expert witness in business, intellectual property valuation and patent licensing who opined regarding 4 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 5 of 178 PageID# 23891 the impact of the asserted infringement on Centripetal and damages going forward. Tr. 1573:14-19. 12. Centripetal, additionally, presented testimony from Cisco employees by video deposition including: • • Mr. Rajagopal Venkatraman; • Dr. David McGrew; • Mr. Sunil Amin; • 13. Mr. Saravanan Radhakrishnan; Mr. Sandeep Agrawal. Cisco, in its case in chief, called a variety of live fact and expert witnesses including: • Mr. Michael Scheck – Senior Director of Incident Command at Cisco. Tr. 165:23-24; • Dr. David McGrew – Cisco Fellow who was responsible for leading a research and development project at Cisco that became the Encrypted Traffic Analytics solution. Tr. 1759:10-12; • Dr. Douglas Schmidt – an independent expert witness in networking and network security who opined regarding non-infringement, invalidity, and damages of the ‘856 Patent. Tr. 1813:4; • Mr. Daniel Llewallyn – Software Engineer for Cisco who previously worked at Lancope. Tr. 2141:19; 5 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 6 of 178 PageID# 23892 • Dr. Kevin Almeroth – an independent expert witness in computer networks and network security who opined regarding non-infringement, invalidity and damages of the ‘176 Patent. Tr. 2212:12-18; • Dr. Mark Crovella – an independent expert witness in networking and network security who opined regarding non-infringement, invalidity and damages of the ‘193 Patent. Tr. 2349:18-24; • Mr. Hari Shankar – Principal Engineer and Software Architect at Cisco who is responsible for the design of certain features of the accused products. Tr. 2500:3-5; • Mr. Peter Jones – Distinguished Engineer in the Enterprise Network Hardware Group at Cisco. Tr. 2543:12-17; • Dr. Narasimha Reddy – an independent expert witness in computer networking and computer security who opined regarding non-infringement, invalidity and damages of the ‘806 Patent. Tr. 2580:6-10; • Mr. Matt Watchinski – a Cisco employee responsible for Cisco’s Talos organization, which is Cisco’s threat intelligence organization. Mr. Watchinski previously worked for Sourcefire. Tr. 2682:11-13; • Dr. Kevin Jeffay – an independent expert witness in computer networks and network security who opined regarding non-infringement and damages of the ‘205 Patent. Tr. 2727:11-19; • Mr. Timothy Keanini – Distinguished Engineer at Cisco involved with the Stealthwatch product line. Tr. 2810:4-6; 6 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 7 of 178 PageID# 23893 • Mr. Karthik Subramanian – Partner at a venture capital firm called Evolution Equity Partners. Mr. Subramanian previously led Cisco’s Corporate Development Team for Cybersecurity for about four to four and a half years. Tr. 2827:23, 2828:17-18; • Dr. Stephen Becker – an independent expert witness in economic damages analysis who opined regarding damages if the Court finds the Asserted Patents are infringed and valid. Tr. 2863:3-18. 14. Cisco, additionally, presented testimony from current and former Centripetal employees by video deposition including: • • Mr. Haig Colter; • Dr. Sean Moore; • Mr. Jess Parnell; • Mr. Justin Rogers; • Mr. Christopher Gibbs; • 15. Mr. Douglas DiSabello; Mr. Gregory Akers. Centripetal, in its rebuttal validity case, called live expert witnesses: • Dr. Alexander Orso – an independent expert witness in computer networking and security who opined regarding the validity of the ‘193 Patent and the ‘806 Patent. Tr. 2989:22-25; • Dr. Trent Jaeger – an independent expert witness in computer and network security who opined regarding the validity of the ‘856 Patent and the ‘176 Patent. Tr. 3102:18-23; 7 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 8 of 178 PageID# 23894 • Dr. Aaron Striegel – an independent expert witness in computer networking who opined regarding secondary considerations of non-obviousness for the Asserted Patents. Tr. 3196:16-18. 16. Having had the opportunity to observe the demeanor and hear the live testimony of witnesses by video / audio and by deposition at trial, the Court has made certain credibility determinations, as well as determinations relating to the appropriate weight to accord the testimony. Such determinations are set forth herein where relevant. III. TECHNOLOGY TUTORIAL A. NETWORKING AND CYBERSECURITY TUTORIAL The asserted patents in this case deal with systems that engage in complex computer networking security functions. Accordingly, the Court heard detailed technological testimony regarding the structure and function of computer networks in general, as well as the specific processes employed to secure these networks. The Court begins its factual findings by reciting a review of the presented technology tutorial. i. Overview of Networking The three principal devices that comprise computer networks are switches, routers and firewalls. Tr. 20:5-10. Beginning with switches, Centripetal’s expert Dr. Medvidovic used analogies to explain these complex network devices. He compared the operation of a switch to that of a telephone switchboard operator. Tr. 20:13-22. Therefore, similar to an operator connecting people, switches in a network operate to automatically connect different devices together such as a computer with another computer or a computer to a printer. Tr. 20:24-21:2; see Fig. 1. 8 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 9 of 178 PageID# 23895 FIG. 1 Comparatively, routers function similarly to a 911 dispatcher who sends and controls the distribution of emergency vehicles to the intended location. Tr. 22:9-19. Routers decide the most optimal way to automatically send computing data to a desired location. Tr. 22:24-23:2. They are constantly evaluating current computer traffic and sending data along the most efficient path to its intended destination. Tr. 23:8-14. The combination of routers and switches are the fundamental building blocks of computer networks. Tr. 23:17-23. Together, switches connect local devices into small networks and routers operate to transmit data between these smaller networks – thus forming larger networks. Tr. 26:1-4; see Fig. 2. FIG. 2 The next and final relevant device in computer networks is the firewall. Firewalls, in the context of computer networking, are similar to that of a firewall in an office building or hotel. Tr. 9 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 10 of 178 PageID# 23896 24:13-19. They operate to automatically put a “wall” between valuable assets and any potential danger. Tr. 24:13-19. Therefore, data entering a network is often transmitted in through a firewall and the firewall can perform a variety of functions, such as disallowing the data to enter the network by blocking it. Tr. 25:1-4; see Fig. 3. FIG. 3 Dr. Medvidovic used video access to ESPN.com from a web server as an example of the operation of a firewall. He explained that: any data you try to see or retrieve from the ESPN servers would be on that web server. And that data would travel to you, but before it gets to your computer, it would first go through this firewall, and the firewall may decide to permit that data to go through because it does not violate any policies or rules that you may have for the firewall. . . . So for example, it [the firewall] could be in a company where the company policy is you can’t watch sports during work hours. So in that case, that data from ESPN would be dropped at the firewall and never arrive to you. Tr. 25:8-20. Accordingly, firewalls often sit at the edge of individual networks to control the entry of data from the internet. Tr. 26:1-12. As technology develops, firewall type functionality is often now included inside of other devices such as routers and switches. These devices may be located at different locations within a network – not just at the outside barrier. Tr. 82:8-18. This inclusion of firewall functionality in other devices is in contrast with older network technology where firewalls were responsible for the security of the network, by blocking malicious packets from 10 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 11 of 178 PageID# 23897 entering it, while the routers and switches focused on speed and performance in the transmitting data. Tr. 26:16-22. The combination of thousands of these networking devices into larger and larger networks is responsible for the creation of nationwide networks and the global internet. Tr. 23:24-25, 24:13. Therefore, the global internet as we know it is a network of networks. Tr. 74:1-12. Internet providers, such as Earthlink, Verizon, AT&T, and Cox are in the business of creating large scale networks to connect users to other business networks in order to access data. Tr. 74:1-12, 76:1019. Companies like Netflix, Facebook, Zoom, Google and Amazon operate their own independent networks that connect to the larger internet to send data across the internet to end-users. Tr. 75:2376:9; see Fig. 4. FIG. 4 The international nature of the internet requires that the sending of data between all of these providers be based on uniformly developed standards that are globally applicable. Tr. 77:5-17. One such organization, the Internet Engineering Task Force (“IETF”) is responsible for developing universal internet related standards. Tr. 77:5-17. There are many different standards that are developed to facilitate the transmission of data over the internet. Tr. 77:5-17. These standards are often in the form of protocols. Protocols are the rules of engagement for two computers that specify 11 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 12 of 178 PageID# 23898 how the two computers can work together to communicate back and forth. Tr. 954:5-17. For example, the Hypertext Transfer Protocol (“HTTP”) is used in web pages to transfer data over the internet from computer to computer, the Internet Protocol (“IP”) is a building block in allowing data to use interconnected networks, and the Transmission Control Protocol (“TCP”) is used to deliver information across the internet. Tr. 77:23-78:2, 89:18-21. These protocols are the methods by which data transfer is possible over nationwide and global networks. Tr. 88:19-21. This is a general “high level” overview of these networking concepts. Internet professionals and “experts” use the term “high level” to categorize these basic concepts involved in the transmission of data electronically, as well as the imposition of security upon such transmissions. Moving into the specifics, the transmission of computing data through these devices is done in the form of a network packet or packets. Tr. 26:23-25. The packet is similar to that of a package sent through the United States Postal Service. Tr. 26:24-27:3, 89:2-3. For example, when a user on their computer attempts to watch a video from ESPN.com, that video is a very large amount of information and cannot efficiently be sent in one package. It is, therefore, broken up into a number of smaller units known as packets. Tr. 27:3-14. The packet will flow from the internet and through multiple devices on the network and transmit the requested information to the end user. Tr. 88:114. At any time, there are trillions of packets being exchanged through global networks. Tr. 88:1619. 12 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 13 of 178 PageID# 23899 Packets consist of two different parts: the header and the payload; see Fig. 5. FIG. 5 The header contains information such as the source address, source port, destination address, destination port number, and the protocol being used to transmit the packets. Tr. 107:16-23. These five pieces of information are known as the “5-tuple.” Tr. 108:4. The information contained in the header is inspected by the router or switch to determine where and how to send that individual packet. Tr. 108:7-16. This information can be thought of as a mailing label on a package which contains an individual’s name and mailing address as well as a return address. Tr. 27:24-25. The payload is the portion of the packet that contains the actual content of the data. This information is similar to the content within a postal package, such as a new football or baseball glove. In the ESPN video hypothetical, this would be the actual portion of the video sent by each individual packet. Tr. 28:4-10. This data in the payload part of the packet can be encrypted, meaning the information in the payload can be transmitted in code. Tr. 28:18-25. For example, the hypothetical video from ESPN.com would not usually be encrypted, but often data sent in a packet’s payload containing sensitive information, such as banking or credit card data, will be encrypted. Encryption becomes vital so that this sensitive data is not stolen by bad actors hacking the network. Tr. 28:1825. Encryption works to lock up the data in the payload section of the packet so it cannot be seen 13 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 14 of 178 PageID# 23900 without decryption. Tr. 29:1-5. Consequently, just as with a sealed package, snoopers of network traffic would be unable to see what is in the packet unless it could be unlocked and opened, which is generally known as decrypting the data. But, even when a packet is encrypted, the header information, such as the source and destination, is not encrypted and is visible. Tr. 29:10-16; see Fig. 6. FIG. 6 As previously noted, the hypothetical ESPN video is set in a collection of packets that comprise the video. The collection of all the packets together that make up the transmitted video is known as a packet flow. Tr. 106:15-16. Thus, the header of each packet in this particular flow would contain identifying information that distinguishes this collection of packets from other flows. Tr. 107:16-13. This allows for routers to keep the packets in order and properly distribute the packets to the correct destination. ii. Overview of Networking Security As explained supra, the internet is a very large and complex organization of networks that utilize protocols to relay data from one network device to another resulting in the transmission of data to an end user. Tr. 112:1-6. As a result of the internet’s complexity, there are many methods employed by cyber criminals to transmit malware and gain access to encrypted, secure and confidential information. Tr. 112:7-14. Cyber criminals can use malware or other methods to infect 14 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 15 of 178 PageID# 23901 a network and steal data using a process known as exfiltration. Tr. 343:19-15. Exfiltration is the process by which cyber criminals “exfiltrate” data out of a network by stealing valuable confidential data. Tr. 343:19-15. 2 Therefore, to prevent malware and data exfiltration, cyber defense systems often use a concept known as defense-in-depth, the deployment of a variety of network security devices at different layers of the network, to protect sensitive network data. Cisco’s expert, Dr. Almeroth, compared network defense-in-depth to that of the security used by a federal courthouse, which contains a series of secured entry points to the building, a courtroom or a judge’s chambers. Tr. 112:18-22. Consequently, just like any type of modern security system, there must be different layers of security in a network to be effective in preventing evolving methods of cyberattacks. Tr. 113:3-10, 51:17-21. Therefore, to maximize effectiveness, security measures are often placed at different devices/locations in a network, such as within a firewall, a security gateway, in routers and switches, and also within the end user’s computer. Tr. 113:11-18. Dr. Almeroth outlined that there are multiple approaches used by cybersecurity professionals to effectively develop defense-in-depth security systems. Tr. 117:22-24. Two of the relevant approaches, for purposes of this trial, are known as detect and block through “inline” analysis and “out-of-band” also known as allow and detect. Tr. 118:2-7. These approaches can be used unilaterally or combined to create different styles of network security based on the needs of network administrators. Older security technology focused on a firewall at the border of the network to detect and block malicious packets from entering a network. Tr. 118:8-119:25. The process begins when a packet is sent from the internet to another smaller network. A firewall device, usually located at the entry of the network, operates by inspecting information in the packet to determine if that 2 Typically, this sensitive data often consists of usernames and passwords to your bank accounts, Social Security Numbers, credit card numbers, or confidential financial data of a business. Tr. 444:4-8. 15 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 16 of 178 PageID# 23902 packet is malicious. Tr. 119:18-25. This process is completed by matching information from the header or payload of the packet to rules that are pre-enabled in the firewall type device. Tr. 119:1825. These rules are comprised of previously known information about sources of malicious or otherwise unauthorized traffic. Tr. 122:11. Thus, if information from a packet header is matched to a rule, then the packet is unauthorized to enter the network and is blocked / dropped. 3 Tr. 120:612. A blocked packet is virtually thrown away or could be re-routed to another location for additional inspection. Tr. 120:15-18. If there is no rule that matches the packet, the packet is allowed to proceed into the network and to its final destination. Tr. 120:2-5. Rules are the mechanism that determines which packets are allowed in and out of the network. The collection of rules that are being applied by network devices can also be referred to as Access Control Lists (“ACLs”). Tr. 537:18-21, 2550 1-4. Threats are continually evolving, and as a result, rules can be automatically updated or swapped in switches, routers and firewalls by other management devices in the network that intake “threat intelligence” information. Tr. 126:511. Threat intelligence information is an everchanging collection of information from known viruses and malware that is compiled by third-party providers. Tr. 126:5-11. Devices that manage switches, routers and firewalls often operate by digesting threat intelligence, converting that intelligence into rules, and sending those rules out to intra-network devices such as firewalls, routers and switches that match rules to packets. Tr. 126:5-11. The ability to apply measures in real-time to new or different rules after the packet has cleared the gatekeeping firewall is called proactive security, which is a newer and more effective technology. This process of proactively blocking packets as they travel through the network comes with distinct challenges. The efficacy of this method rests on the ability of network devices to 3 Dropping and blocking can be used interchangeably as they have the same definition in the context of cybersecurity. Tr. 466:23-467:4 16 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 17 of 178 PageID# 23903 continually apply new or different rules to packets. Therefore, as the volume of packets and rules increase, so must the number of devices or the processing speed of current devices to remain effective. Tr. 124:6-19. Without increased speed or adding hardware, there will be extensive delay/latency because the system will be overwhelmed trying to match new or different rules to an overwhelming number of packets. Consequently, this delay can affect user performance on the network (i.e., increase web page loading times). Tr. 126:20-24. Another issue is that a network might have different entry points or destination points for data. Tr. 127:5-8. Therefore, firewall capable devices must be placed at all possible entry and destination points or risk that data could reach an improper destination without the application of updated rules. Tr. 127:5-8. The older allow and detect model operates retroactively by monitoring the entry of packets into the network based upon prior threats to the network. Tr. 129:2-11. The flows are monitored by sensors in network devices and sent to another management device for review. Tr. 132:13-19. When malicious traffic is found, the devices can operate retrospectively, and update rules based upon information found in the forensic investigation. Tr. 133:2. Instead of blocking traffic at the gate, this method allows traffic to go through to its destination and then performs post facto analysis on the flow of the information in the packet headers to determine if there was malicious activity afoot. Tr. 133:24-134:2. The challenges of this model include the lack of the ability to be proactive. It is different than an inline intrusion prevention system because malicious packets are still allowed into the network and then passed on to the destination without blocking. Tr. 141:1114. Both approaches may be combined in different ways to create a defense-in-depth strategy. Tr. 144:5-11. Network administrators can use different combinations of these devices and methods to achieve optimal security personalized for their network. Tr. 144:5-11. 17 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 18 of 178 PageID# 23904 B. OVERVIEW OF THE ACCUSED PRODUCTS In this case, Centripetal accuses various Cisco network devices of using its new solutions and infringing the Asserted Patents. The Court will provide a brief summary of these products. i. Cisco’s Switches The switches at issue in the case are the Catalyst 9000 series (“Catalyst Switches”) including the Catalyst 9300, 9400 and 9500. Tr. 53:20-23. This newer line of switches contains functionality utilized by Cisco to integrate proactive security capabilities within the network. Tr. 54:1-3. ii. Cisco’s Routers There are three different types of routers at issue. These routers are the 1000 series Aggregation Services Router (“ASR”) and the 1000 / 4000 series Integrated Services Router (“ISR”). Tr. 54:22-25, 55:1-2. Their purpose in the network is to provide performance, reliability, and integrate proactive security functionality within networks. Tr. 55:7-10. Like the switches, the routers contain functionality utilized by Cisco to integrate proactive security capabilities within the network. iii. Cisco’s Digital Network Architecture Cisco’s Digital Network Architecture (“DNA”) operates as a network management device. Tr. 55:17-21. It operates to configure and troubleshoot problems in the network. Tr. 55:17-21. Therefore, the primary function is to interact and operate routers and switches. Tr. 55:17-21, 147:19-21. DNA may continually provision the routers and switches so they are capable of being used effectively in the operation of the network. Tr. 56:1-7. The DNA device uses advanced artificial intelligence and machine learning to observe past traffic on the network and has the 18 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 19 of 178 PageID# 23905 capability to change configuration in the network in real time. Tr. 57:20-25. Accordingly, DNA takes that intelligence, operationalizes it, and turns it into rules and policies that Cisco’s switches and routers use for security purposes. Tr. 451:3-24. iv. Cisco’s Stealthwatch The new and improved Stealthwatch device currently provides the ability to collect various security analytics and use it to predict network threats. Tr. 59:1-7. Stealthwatch is, now, enabled to work with other Cisco technologies, such as Cognitive Threat Analytics (“CTA”) and Encrypted Traffic Analytics (“ETA”). Tr. 59:10-15. v. Cognitive Threat Analytics Cognitive Threat Analytics (“CTA”) has various features for monitoring the network. For example, CTA monitors for security breaches within the network by using machine learning. Tr. 60:17-23. CTA is embedded in the Stealthwatch device. Tr. 60:21-23 vi. Identity Services Engine The Identity Services Engine (“ISE”) is a device that ensures user control over the network from any location. Tr. 61:10-16. It provides network-based security regardless of location of the user. Tr. 61:10-16. It is also responsible for tracking the identity of users and user computers on a network and for setting the limits of user and user computer access to other devices in the network. Tr. 149:20-23. vii. Encrypted Traffic Analytics Encrypted Traffic Analytics (“ETA”) is an element of the new Stealthwatch technology and also is embedded in Cisco’s switches and routers. Tr. 61:17-24. ETA deals with the ability to track and analyze encrypted traffic in the network without decrypting said traffic. Tr. 61:19-21. 19 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 20 of 178 PageID# 23906 ETA completes this objective by looking at non-encrypted information in the packet (i.e., header information, 5-tuple) in order to track and analyze particular packet flows. Tr. 62:1-5. viii. Cisco’s Firewalls There are five different firewall products at issue. Tr. 63:10-17. First, there is the Adaptive Security Appliance (“ASA”) with Firepower. Tr. 63:10-17. Then, there are the four series of firewalls: the 1000; 2100; 4100; and the 9300. Tr. 63:10-17. These devices are newly equipped to operate proactively with packet filtering functionality. Tr. 151:23-25. ix. Firepower Management Center The Firepower Management Center (“FMC”) operates the firewalls and does typical firewall functions like managing the network at that particular point in the network, protecting against malware, and checking and proactively blocking attempts at malicious intrusions into the network. Tr. 64:7-10. The FMC, in particular, can configure and operate all the firewall devices in the network. Tr. 153:6-8. x. Complete Picture of a Cisco Network To put all the devices and components together, Figure 7 depicts a Cisco network that utilizes all of the Accused Products: 20 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 21 of 178 PageID# 23907 FIG. 7 (FROM CENTRIPETAL’S TECHNOLOGY TUTORIAL SLIDES) C. THE PARTIES Centripetal is a corporation duly organized in 2009 and existing under the laws of the State of Delaware, with its principal place of business in Herndon, Virginia. Doc. 411 at 1; Tr. 233:22. Centripetal formed as a start-up cybersecurity company focused on using threat intelligence software and firewall hardware to protect cyber networks. Tr. 235:23-25. Centripetal operated to solve the conventional cybersecurity problems in an ever changing and developing industry using both inline and out-of-band methods. Tr. 239:6-15; see PTX-1591; DTX 1270. Cisco is a California corporation with its principal place of business in San Jose, California. Doc. 411. Cisco was founded in 1984 as a hardware networking company. Cisco has dealt in network devices throughout its operation, selling hardware including routers, switches, firewalls and other technologies. Cisco represents itself as the largest provider of network infrastructure and services in the world. PTX-570 at 991. More recently, Cisco has started conducting market 21 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 22 of 178 PageID# 23908 research and has acquired technology start-up companies specialized in software advancements to incorporate security functionality into its hardware. IV. OVERVIEW OF THE EVIDENCE As the technology at issue involves important cybersecurity technology, the Court endeavored to accommodate Centripetal’s motion for an early trial date. The many requests for inter partes review, by necessity, delayed the trial. The Court, therefore, scheduled a trial on those asserted patent claims for which such review had not been requested, as well as those which had survived this review process. Both parties’ technologies are not only at the forefront in protecting intellectual property and confidential personal information, but also operate in the national defense context. With the rapidly developing technology in the field, the Court found it would not be in the public interest to delay the trial until the unknown time when courtrooms would open for traditional civil trials. Accordingly, the Court first scheduled the trial in April of 2020, then due to the restrictions imposed by the COVID-19 pandemic, finally scheduled it for May 8, 2020, to be heard on a court approved video platform. See Doc. 74; 328. Following the tutorial, the initial phase of the trial dealt with Centripetal’s allegations of infringement of ten patent claims, two of which were contained in each of five different patents. However, the two claims at issue in each patent were identical, save for their being designed for different forms of hardware or media utilization. Therefore, the Court dealt with the issues of infringement, validity and damages as to five sets of claim elements. In the presentation of its infringement case, Centripetal called its top-level employees in person, Cisco employees by video deposition, and two expert witnesses. Centripetal presented numerous Cisco technical documents and other Cisco publications which postdated the alleged initial infringement date of June 20, 2017. Cisco’s own documents from this time frame, and the 22 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 23 of 178 PageID# 23909 evidence in general, strongly supported Centripetal’s infringement case as to four of the five asserted patents. Therefore, the Court FINDS that the ‘856 Patent, the ‘176 Patent, the ‘193 Patent, and the ‘806 Patent are valid and directly infringed. Cisco abandoned its claim that the ‘205 Patent was invalid, but argues that it was not infringed and the Court agrees and so FINDS. With regard to the infringement and validity claims, Cisco presented different independent experts witness as to each of the four. All four testified that based upon the infringement theories of Centripetal’s experts, there was no infringement, but if the Court found infringement, that the asserted patents were invalid. Each of them also testified that the prosecution history of the patents precluded the application of the doctrine of equivalents. They also testified that if the patents were found infringing and valid, each of the four had minimal value. The alleged date of the first infringement was June 20, 2017, but virtually all of Cisco’s exhibits, technical documents and demonstratives presented in its infringement and invalidity defense focused on its old technology, not on the current accused products. Their demonstratives of the functionality of Cisco’s accused products were not based upon their own current technical documents, but rather upon inaccurate animations produced post facto for use in the litigation which served to confuse the issues, rather than inform the Court. By contrast, Centripetal utilized Cisco’s own technical documents as exhibits and demonstratives to illustrate the functionality of Cisco’s post June 20, 2017 technology and how it infringed the asserted claims. Moreover, Cisco’s experts also testified that Cisco’s products did not infringe any of the claims of any of the patents at issue, while focusing on distinct elements of the claims. The testimony of these experts on infringement and validity all focused on old Cisco technology, as did most of the testimony of Cisco’s employee witnesses. Cisco’s lockstep strategy of denying any infringement of any of the elements of the four claims where infringement is found, and 23 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 24 of 178 PageID# 23910 backstopping this position by contending that if the Court found infringement the patents were ipso facto invalid, led to a number of factual conflicts in its presentation of its evidence. Cisco’s retained expert witnesses often contradicted Cisco’s own documents as well as Cisco’s own engineers. This common thread weaved a very tangled web, as is illustrated by Dr. Reddy, Cisco’s expert on the ‘806 Patent. Dr. Reddy, in referring to slide 29 of his presentation, opined: SLIDE 29 OF DR. REDDY’S PRESENTATION Q. And, Dr. Reddy, I would like to turn to an exhibit that the Court just saw with Mr. Jones. And I think Mr. Jones provided a pretty good explanation of this exhibit, but if you could just focus on what we’ve highlighted in red and explain to the Court why that will be relevant to your opinions. A. Okay. So the highlighted box at the bottom that says, “network interfaces,” that’s the box to which packets come into the switch, router, or the firewall. And in this example we’re only talking about the switch here. And the packet, as it comes through the network interface, goes through the ingress FIFO, FIFO center, first-in-first-out, and from there the packet is moved into the packet buffers complex, on the top, and the header of the packet is given to the ingress forwarding controller, and the ingress forwarding controller consults the lookup tables, compares the packet header information, and makes decision about this 24 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 25 of 178 PageID# 23911 packet; whether to allow this packet to go forward or to drop the packet or to take any other action at the level of the lookup table. Q. And just to be clear, what is the lookup table? A. This is the product that has the information related to the ACLs, Access Control Lists. Q. Now, Dr. Reddy, have you prepared an animation that shows how the Cisco systems that are being accused process packets that is basically using the diagram we just discussed? A. Yes, I have. Q. Okay. So let’s turn to that, and if you could explain to the Court what this diagram is showing. A. Okay. THE COURT: Can you explain it on the prior slide? THE WITNESS: Yes, Your Honor. MR. JAMESON: This one here, Your Honor? THE COURT: Yes. This is the one that Mr. Jones explained it on, so why not use the same one. MR. JAMESON: He is using the same one. This is an animation, Your Honor, that he has created to try to provide an easier explanation as to what’s happening in the accused products, using the component parts that are shown here. THE COURT: All right. Go on. BY MR. JAMESON: Q. Explain what you’re showing here, Dr. Reddy. THE COURT: Well, that’s a whole different setup. That doesn’t help me any. MR. JAMESON: Okay. BY MR. JAMESON: Q. Dr. Reddy, if you can walk through the steps of the ordinary course of processing packets, even when a rule swap is not being implemented in the accused products, using diagram 29. 25 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 26 of 178 PageID# 23912 A. Okay, will do. So what is -- the box that is highlighted here, the packet enters the switch through the network interface – that’s the yellow/orange box at the bottom -- and the packet is moved from there to ingress FIFO, first-in-first-out, and the packet from there is copied into the packet buffers complex, which is at the top, which is in green. The header of the packet is copied to the ingress forwarding controller to make decision on what to do with this packet. Now, the ingress forwarding controller looks up the ACL rules, the Access Control List rules in the lookup table, and makes decision about this packet, whether packet should be allowed, denied, or whatever other action we need to take. And what I’m going to show, in order to simplify this process, in the next slide as I show the animation, I’m going to start with ingress FIFO and show the packet buffers complex, show the ingress forwarding controller and the lookup table, so those four boxes as we move forward, of the packets. Q. Dr. Reddy, using slide 29, does every packet that comes into the Cisco accused products go through this process? A. The process that I just described is exactly the same for every packet that comes through the switch. Q. So with respect to the packet buffer, does every packet go into the packet buffer as part of processing? A. That’s correct. Every packet is copied there, and the header is inspected by the ingress forwarding controller to make a decision about that packet. Q. And does the packet go into that packet buffer whether a rule swap is taking place or not? A. That’s correct. So every packet -- for every step of the way, every packet that comes in through the switch, no matter what’s going on, is moved into the packet buffer. Q. Okay. Now, using slide 29, what happens when a new rule set has been downloaded and Cisco wants to swap rule sets? A. While the new rule set is being configured, the switch continues processing with the old rule set. So while the new rule set is being configured, the process -- the Cisco switches will continue using the old rule set and continue processing, contrary to what ‘806 teaches, and this is exactly what’s in the background of the ‘806 patent. It’s a continuous processing of the old rule set. Q. And while the accused system is continuing to process packets with the old rule set, are packets moved into a cache? A. No, there is no notion of a cache here. Every packet is taking the same sort of steps. Whether the rule set is being swapped or during the normal course of action, the packets 26 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 27 of 178 PageID# 23913 come though the network interface, into the ingress FIFO. From there, the packets are moved to the packet buffers complex, and there’s no notion of a cache here. Q. Okay. And what happens when the new rule set, rule set 2, has been configured and it’s ready for use? A. At that point, we continue processing the packets as in the normal course of action, and the only difference is that when the packet is now being processed against the rule set, the pointer that was pointing to the old rule set now points to the new rule set, and the packet will be processed for the ingress forwarding controller during the normal course, and now, instead of using the old rule set, it starts using the new rule set. Tr. 2615:2-2619:13. Slide 29 is a representation of a Cisco technical document described by Dr. Jones, DTX-562. The animated slide 29 includes ex post facto red highlighting that limits the operation of transmitting packets to only the ingress and completely ignores egress. Cisco’s noninfringement argument was based upon the packets being subjected to rules only one time and at only one step in the process. Therefore, Dr. Reddy opined on only the application of rules on the ingress half of packet processing performed by the switches and routers. In contrast, Mr. Jones specifically noted that rules are applied on both ingress and egress in describing the processing of packets by using strictly the Cisco technical document in an unaltered form. A more detailed explanation of all these issues in contained in the findings of fact and conclusions of law with respect to the ‘806 Patent. Here is Cisco’s technical diagram used by Mr. Jones in his testimony: 27 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 28 of 178 PageID# 23914 DTX-562 In this diagram, there is a full picture of a packet’s process through a switch or router without any highlighting limitation only on ingress. Therefore, Mr. Jones provided a complete picture of how rules are applied within the accused products on both ingress and egress. To support his opinions, Mr. Jones used Cisco’s own technical documents where Dr. Reddy used an animation prepared for litigation in addition to his own modified version of the technical documents. Tr. 2614-2616. In addition to using a highlighted version of the technical document, Dr. Reddy, in his testimony, ignored Mr. Jones’s egress explanation of the technical document itself, and attempted to explain the product’s functionality by using his own created animation on slide 31: 28 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 29 of 178 PageID# 23915 SLIDE 31 OF DR. REDDY’S PRESENTATION In this animation produced solely for litigation, Dr. Reddy continues to omit the egress processing of packets out of Cisco’s switches and routers. The Court made distinct note of Dr. Reddy’s use of an animation during his direct examination. Tr. 2616:10-20. Dr. Reddy’s testimony is just one example of how Cisco’s experts used their own modified exhibits and ex post facto animations while Centripetal’s experts and Cisco’s own employees relied on Cisco’s technical documents in an unaltered form. Cisco’s experts attempted to challenge every element of all of the claims at issue in its noninfringement case. However, the Court FINDS that Centripetal has proven the direct infringement of each element of the asserted claims in the ‘856 Patent, the ‘176 Patent, the ‘493 Patent, and the ‘806 Patent by a preponderance of the evidence. Most of Cisco’s challenges amounted to no more than conclusory statements by its experts without evidentiary support. Accordingly, in its findings of fact and conclusion of law, the Court has focused on only those elements cited by Cisco’s 29 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 30 of 178 PageID# 23916 infringement experts in their patent by patent outlines of noninfringement theories. The Court will analyze each patent individually, and outline all relevant findings of fact and conclusions of law regarding infringement, validity, and damages. The Court will address the patents in the following order: the ‘856 Patent; the ‘176 Patent; the ‘193 Patent; the ‘806 Patent; and the ‘205 Patent. V. FINDINGS OF FACT AND CONCLUSIONS OF LAW REGARDING INFRINGEMENT AND VALIDITY A. THE ‘856 PATENT i. Findings of Fact Regarding Infringement 1. The ‘856 Patent has been informally known as the Encrypted Traffic Patent. Tr. 884:25. 2. The ‘856 Patent was issued on March 13, 2018. JTX-5. The application for the ‘856 Patent was filed on December 23, 2015. JTX-5. 3. The asserted claims of the ‘856 Patent are Claim 24 and Claim 25. Doc. 411. Claim 24 and Claim 25 are, respectively, a system and computer readable media claims. 4. Claim 24 is laid out below: A packet-filtering system comprising: at least one hardware processor; and memory storing instructions that when executed by the at least one hardware processor cause the packet-filtering system to: receive data indicating a plurality of network-threat indicators, wherein at least one of the plurality of network-threat indicators comprise a domain name identified as a network threat; identify packets comprising unencrypted data; identify packets comprising encrypted data; determine, based on a portion of the unencrypted data corresponding to one or more network-threat indicators of the plurality of network- 30 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 31 of 178 PageID# 23917 threat indicators, packets comprising encrypted data that corresponds to the one or more network-threat indicators; filter, based on at least one of a uniform resource identifier (URI) specified by a plurality of packet-filtering rules, data indicating a protocol version specified by the plurality of packet-filtering rules, data indicating a method specified by the plurality of packetfiltering rules, data indicating a request specified by the plurality of packet-filtering rules, or data indicating a command specified by the plurality of packet-filtering rules: packets comprising the portion of the unencrypted data corresponding to one or more network-threat indicators of the plurality of network-threat indicators; and the determined packets comprising the encrypted data that corresponds to the one or more network threat indicators; and route, by the packet-filtering system, filtered packets to a proxy system based on a determination that the filtered packets comprise data that corresponds to the one or more network-threat indicators. JTX-5. 5. Claim 24 is identical to Claim 25 in every respect except that Claim 25 is a computer readable media 4 claim. Tr. 885:14-24. Claim 25 modifies the introductory language of Claim 24, replacing “[a] packet-filtering system comprising: at least one hardware processor; and memory storing instructions that when executed by the at least one hardware processor cause the packet-filtering system to:” with “[o]ne or more non-transitory computer-readable media comprising instructions that when executed by at least one hardware processor of a packet-filtering system cause the packet-filtering system to:.” JTX-5. For purposes of infringement, the parties treated Claims 24 and 25 the same. 4 Computer readable media is software comprising of source code that is loaded into computer hardware through a device such as a CD-ROM, memory card or flash drive. This media comprises of readable instructions for the intended computer to operate. Tr. 473:4-23. 31 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 32 of 178 PageID# 23918 6. Dr. Sean Moore, an inventor of the ‘856 Patent, describes the ‘856 Patent as a system for stopping cyber-attacks even when the malicious data is embedded within encrypted packets. Tr. 347:8-9. Therefore, the ‘856 Patent deals specifically with Centripetal’s threat filtering technology as applied to encrypted packets. Tr. 347:8-9. 7. The process at the core of this technology involves using unencrypted information located in a packet to determine if there is a threat embedded in the encrypted portion. Centripetal developed this technology as a response to the ever-growing trend of cyber criminals encrypting packets as a way to bypass traditional security procedures. See Tr. 310:20-24, 889:6-12. Thus, Dr. Moore identifies the ‘856 Patent as one of Centripetal’s solutions to operationalize threat intelligence to determine if encrypted packets contain network threats. Tr. 348:1-16. 8. This system is considered an advancement over previous security systems that would fail to detect hidden attacks because the payload was encrypted by cyber criminals. Tr. 887:4-17. 9. Centripetal accuses Cisco’s Catalyst 9000 series switches, the Aggregation Services Router 1000 series routers and Integration Services Router 1000 and 4000 series routers in combination with Cisco’s Stealthwatch and Identity Services Engine of infringing Claims 24 and 25 of the ‘856 Patent. Tr. 886:9-11. Source code for Stealthwatch is compiled in Atlanta. PTX1932. 10. All of the accused devices for the ‘856 Patent are embedded with Cisco’s new 2017 technology known as Encrypted Traffic Analytics (“ETA”). Tr. 887:25-888:6, 890:19-22; PTX561 at 630. Cisco utilized ETA as a response to the growing number of attackers that were using encrypted traffic to bypass standard security protocols. Tr. 889:2-12; PTX-561 at 629 (Cisco 32 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 33 of 178 PageID# 23919 noting that “attackers are also using encryption to conceal malware and evade detection by traditional security products.”). 11. ETA became a critical component of Cisco’s security infrastructure because it provided a new method for identifying hidden threats within encrypted traffic without having to perform the time consuming process of decryption. PTX-561 at 630 (Cisco, in 2019, highlighting ETA as an “innovative and revolutionary technology” that “illuminate[s] the dark corners in encrypted traffic without any decryption by using new types of data elements or telemetry . . .”). 12. In order to detect threats in encrypted traffic without decryption, ETA uses data from the unencrypted portion of the packet and performs advanced security analytics. Tr. 892:710; PTX-561 at 630. Cisco’s documents describe the four main elements of information that is extracted from packets by the ETA technology: 1. Sequence of Packet Lengths and Times (“SPLT”) – SPLT conveys the length (number of bytes) of each packet’s application payload for the first several packets of a flow, along with the interarrival times of those packets. 2. Initial Data Packet (“IDP”) – IDP is used to obtain packet data from the first packet of a flow. It allows extraction of interesting data such as an HTTP URL, DNS hostname and address, and other data elements. 3. Byte Distribution – The byte distribution represents the probability that a specific byte value appears in the payload of a packet within a flow. 4. TLS Specific Features – The TLS handshake is composed of several messages that contain interesting, unencrypted metadata used to extract data elements, such as cipher suite, TLS version, and the client’s public key length. 33 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 34 of 178 PageID# 23920 PTX-561 at 630 (A 2019 Cisco Technical Document). Cisco’s ETA amended NetFlow technology to enable the capture of new information from packets including the IDP and SPLT. Tr. 3127:613; see PTX-996 at 005 (showing that a 2019 version of ETA was updated to include these new categories). 13. Centripetal’s infringement expert, Dr. Eric Cole, outlined and showed Cisco’s technical documents that illustrated the analytical process of how these elements are used by Stealthwatch to detect threats in encrypted traffic. Tr. 910:10-913:4. 14. First, the accused routers and switches will make a determination if the packets are encrypted or unencrypted. Tr. 910:15-17, 943:9-14, 1064:8-14; PTX-989 at 004, 033 (the text accompanying Cisco’s ETA PowerPoint presentation from 2019 that denotes that Cisco “enhanced the network as a sensor to detect malicious patterns in not only non-encrypted traffic but also in encrypted traffic); PTX-1849 at 244 (source code confirming that there is a determination made whether the packet flow is encrypted or unencrypted). 15. After this determination, representations of information from the unencrypted portion of encrypted packets are sent up to Stealthwatch, which is running both ETA and Cognitive Threat Analytics (“CTA”). Tr. 910:15-911:9; PTX-989 at 033; PTX-578 at 061 (noting ETA “[m]akes the most out of the unencrypted fields” in the packet). 16. This information from the unencrypted packets is sent up to Stealthwatch using Cisco’s proprietary logging framework known as NetFlow. Tr. 1078:10-18, 1082:20-24. 17. Using ETA and CTA, Stealthwatch analyzes the NetFlow from the packets and identifies malware threats in encrypted traffic without running any form of standard decryption. Tr. 910:15-911:9, 936:4-20, 941:4-8; PTX-989 at 033; PTX-1010 at 001 (stating Stealthwatch “can detect malware in encrypted traffic without any decryption using Encrypted Traffic 34 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 35 of 178 PageID# 23921 Analytics.”) (emphasis in original); PTX-1009 at 012 (Cognitive Threat Analytics technical release notes illustrating that ETA “[e]nhances existing Stealthwatch / CTA integration with malware detection capability for encrypted traffic without decryption.”). 18. In order to perform the required analysis, Stealthwatch receives real-time threat intelligence indicators contributed by a third-party intelligence provider or directly from Cisco’s Threat Intelligence Group known as Talos. Tr. 912:16-19, 921:13-16; PTX-20 at 001 (showing Stealthwatch has the ability to take threat indicators and “correlate[] suspicious activity in the local network environment with data on thousands of known command-and-control servers . . .” and indicating that Stealthwatch uses ETA to “pinpoint malicious patterns in encrypted traffic to identify threats . . .”); PTX-1081 at 013 (illustrating Stealthwatch’s integration of CTA by using the Global Risk Map to identify known malicious domain data). 19. This threat intelligence sent into Stealthwatch contains many known malicious IP addresses, domain names, protocol versions and other indicators of malicious traffic. Tr. 927:410; PTX-1926 (Mr. Amin, a principal engineer at Cisco, confirming that the new Stealthwatch receives IP addresses and domain names in its threat intelligence information). 20. Using these indicators, Stealthwatch filters the representation of packets in the form of NetFlow. Then, Stealthwatch determines if any encrypted traffic in the network matches any known malicious signatures based on unencrypted information provided in NetFlow such as the IDP, Server Name Indicator (“SNI”) or Transport Layer Security (“TLS”). Tr. 920:22-921:10, 956:3-958:8, 1054:15-20; see PTX-1009 at 012; PTX-996 at 005. 21. Using a platform known as xGRID, Stealthwatch then sends the results of its analysis to the Identity Services Engine (“ISE”). Tr. 910:15-911:9, 912:1-12; PTX-989 at 033. 35 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 36 of 178 PageID# 23922 22. After this communication, ISE will provision rules or change of authorizations (“CoAs”) to the switches and routers. The switches and routers operate inline and are able to drop incoming packets from the malicious source and outgoing packets containing sensitive data attempting to be exfiltrated by embedded malware. Tr. 1965:16-18. 23. Blocked packets are routed to a proxy system, known as a null interface, that is used to drop packet traffic. Tr. 963:24-966:19; PTX-256 at 082,083; see Tr. 2199:21-2203:25. 24. This process is shown by a Cisco technical demonstration of ETA provided in February of 2018. PTX-989. The title page and relevant page are shown below: PTX-989 Cisco Encrypted Traffic Analytics Technical Presentation from February of 2018 36 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 37 of 178 PageID# 23923 25. Cisco’s expert has failed to cite any Cisco technical document produced post June 20, 2017. 26. Cisco has not called any witness who authored any of the Cisco technical documents relied upon by Centripetal in their infringement case. 27. Cisco’s expert witness relies on animations, produced ex post facto, which were designed for litigation and do not accurately portray the current functionality of the accused products. ii. Conclusions of Law Regarding Infringement The Federal Circuit has concisely stated that “[i]nfringement analysis is a two-step process: ‘[f]irst, the court determines the scope and meaning of the patent claims asserted ... [and secondly,] the properly construed claims are compared to the allegedly infringing device.’” N. Am. Container, 37 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 38 of 178 PageID# 23924 Inc. v. Plastipak Packaging, Inc., 415 F.3d 1335, 1344 (Fed. Cir. 2005) (quoting Cybor Corp. v. FAS Techs., Inc., 138 F.3d 1448, 1454 (Fed. Cir. 1998)). First, the Court hereby incorporates its Markman Claim Construction Order for purposes of construing the terms in the Asserted Claims. Doc. 202. The Court has made a modification to one of the terms previously construed via Markman due to a developed understanding of the technology in the case. See Pressure Prods. Med. Supplies v. Greatbatch Ltd., 599 F.3d 1308, 1316 (Fed. Cir. 2010) (“district courts may engage in a rolling claim construction, in which the court revisits and alters its interpretation of the claim terms as its understanding of the technology evolves”). The Court, in analyzing the applicable law, includes a table of the previously construed terms: Term Construction Configured to Plain and ordinary meaning which requires that the device be capable of configuring to do the function. (amended definition) Correlate, based on a plurality of log entries Packet correlator may compare data in one or more log entries with data in one or more other log entries. A changeable set of one or more rules, messages, instructions, files, or data structures, or any combination thereof, associated with one or more packets. Dynamic security policy Generate, based on the correlating, one or more rules. Plain and ordinary meaning. log entries Notations of identifying information for packets. 38 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 39 of 178 PageID# 23925 Indicators of packets associated with network threats, such as network addresses, ports, domain names, uniform resource locators (URLs), or the like. network-threat indicators A gateway computer configured to receive packets and perform a packet transformation function on the packets. packet security gateway Packets Plain and ordinary meaning in the context of the claim in which the term appears. Preambles Preambles are limiting. Proxy system A proxy system which intervenes to prevent threats in communications between devices. Responsive to correlating Plain and ordinary meaning. Rule A condition or set of conditions that when satisfied cause a specific function to occur. Security policy management server A server configured to communicate a dynamic security policy to a packet gateway. The Court has made one notable change from the previous claim construction order. The Court revises the construction of the term “configured to” from “Plain and ordinary meaning which requires that the action actually do the function automatically” to “Plain and ordinary meaning which requires that the device be capable of configuring to do the function.” See Tr. 1646:111647:1. This change is made in light of the Court’s developing knowledge of the patented technology. 39 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 40 of 178 PageID# 23926 To prove infringement, the plaintiff must show the presence of every claim element or its equivalent in the accused device by a preponderance of the evidence. Uniloc USA, Inc. v. Microsoft Corp., 632 F.3d 1292, 1301 (Fed. Cir. 2011); see Cross Med. Prods., Inc. v. Medtronic Sofamor Danek, Inc., 424 F.3d 1293, 1310 (Fed. Cir. 2005) (showing preponderance of the evidence as the proper standard for infringement analysis). This standard does not require a patent owner to present “definite” proof of infringement, but instead requires the patent owner to establish that “infringement was more likely than not to have occurred.” See Warner–Lambert Co. v. Teva Pharms. USA, Inc., 418 F.3d 1326, 1341 n.15 (Fed. Cir. 2005) (citing Advanced Cardiovascular Sys., Inc. v. Scimed Life Sys., Inc., 261 F.3d 1329, 1336 (Fed. Cir. 2001)). This comparison of the claims to an accused product is a fact specific inquiry and may be based on “direct or circumstantial evidence.” W.L. Gore & Assoc, Inc. v. Medtronic, Inc., 874 F. Supp. 2d 526, 541 (E.D. Va. 2012) (citing Martek Biosciences Corp. v. Nutrinova, Inc., 579 F.3d 1363, 1372 (Fed. Cir. 2009)). Literal infringement requires an accused product to embody each and every limitation of the patented claim. V-Formation, Inc. v. Benetton Group SpA, 401 F.3d 1307, 1312 (Fed. Cir. 2005). In contrast, “under the doctrine of equivalents, ‘a product or process that does not literally infringe upon the express terms of a patent claim may nonetheless be found to infringe if there is ‘equivalence’ between the elements of the accused product or process and the claimed elements of the patented invention.’” W.L. Gore & Associates, Inc., 874 F. Supp. 2d at 541 (quoting Warner– Jenkinson Co. v. Hilton Davis Chem. Co., 520 U.S. 17, 21 (1997)). A finding that the doctrine of equivalents applies requires either that “the difference between the claimed invention and the accused product or method was insubstantial or that the accused product or method performs substantially the same function in substantially the same way with substantially the same result as 40 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 41 of 178 PageID# 23927 each claim limitation of the patented product or method.” Id. (quoting AquaTex Indus., Inc. v. Techniche Sols., 479 F.3d 1320, 1326 (Fed. Cir. 2007)). Based on the Court’s factual findings, Centripetal has proven by a preponderance of the evidence that Cisco’s Catalyst 9000 series switches, the Aggregation Services Router 1000 series routers and Integration Services Router 1000 and 4000 series routers in combination with Cisco’s Stealthwatch and Identity Services Engine literally INFRINGE Claims 24 and 25 of the ‘856 Patent. Cisco’s expert on the ‘856 Patent, Dr. Douglas Schmidt testified: I was asked to look first at whether or not the accused Cisco product suite infringed the ‘856 patent. I was also asked to opine on whether the ‘856 patent was valid relative to the prior art. And I was also asked to assume if, in fact, the patent was valid and the accused products infringed, what damages should be assessed, looking at this from a technical point of view of any benefit that the patent provided over what was already known in the prior art. Tr. 1817:13-23. Dr. Schmidt opined that the ‘856 Patent is not-infringed on three different theories, First, Dr. Schmidt concludes that the current Cisco system is exclusively after the fact analysis and does not work on determined packets as required by the claims. Second, he states that the null interface used in the Cisco system is not a proxy system as required by the claims. Third and finally, he argues that packets are not filtered by the Cisco system. The Court disagrees with all of Dr. Schmidt’s theories of non-infringement. Turning to the first theory, Dr. Schmidt began his infringement analysis with a description of slide five of his demonstrative presentation. This slide was used in various forms throughout his presentation, as well as by other Cisco experts, and is reproduced here: 41 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 42 of 178 PageID# 23928 SLIDE FIVE OF DR. SCHMIDT PRESENTATION Dr. Schmidt used the animated slide five, produced ex-post facto for use in the litigation, to support the following opinion: Q. And by the time that telemetry information gets sent along that blue dotted line to the right-hand side -- by the time that happens, where is the packet itself? A. The packets will have long since been received. The packets will typically arrive in a millisecond time frame, which is extremely fast, and the information that’s processed on the right-hand side by the so-called after-the-fact management devices could take minutes, hours, perhaps even days to be processed. Tr. 1815:10-18. Dr. Schmidt indicates throughout his testimony that the new Cisco system is all after the fact analysis and the system “doesn’t work on determined packets.” In his testimony and on slide five, Dr. Schmidt opined that after the fact management devices include Identity Service Engine (“ISE”), Stealthwatch (based on NetFlow), and Encrypted Traffic Analytics (“ETA”). He opined: Q. The accused systems don’t block. 42 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 43 of 178 PageID# 23929 A. Again, don’t block, don’t block what? What are we talking about? Q. Don’t block malware before it infects the host. A. I think my testimony this whole time has been that the accused products here, particularly the ones that are the after-the-fact ones, allow the information to go to the destination and then conduct so-called after-the-fact analysis in order to determine what issues have occurred and what remediations to take place. Tr. 1923:14-23. Dr. Schmidt presented excruciatingly detailed evidence, including animations and text of the old Stealthwatch product, which it acquired from Lancope. Before 2017, Stealthwatch functionality appeared to focus on after the fact forensics, however this was not the case beginning in 2017, as its own software engineer, Mr. Llewallyn, testified while referring to PTX-965: Q. Do you see this is a Cisco Stealthwatch document? It looks like it’s “At a Glance.” Do you see that? A. Yes. Q. And there’s a copyright date on the bottom there of 2017. It might be hard to see, but I'll pull it up. This is a 2017 document? A. Uh-huh. Q. Now, you talked about how Stealthwatch works to monitor internal in the network, correct? A. That’s correct. Q. You also mentioned how it is integrated with Cisco’s Identity Services Engine, right? A. That’s correct. ... Q. It says, “Helps organizations get 360-degree view of their extended network.” Now, what I want to focus on is at the bottom, where it says, “Simplify segmentation throughout your network with centralized control and policy enforcement and address threats faster, both proactively with threat detection and retroactively via advanced forensics.” Now, Stealthwatch, working with other 43 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 44 of 178 PageID# 23930 products in Cisco’s Security Suite, in this case the Identity Services Engine, can proactively protect against threats, correct? A. Well, it’s based on a manual operation, though. Q. But it’s in the code. The computers can do it, right? A. Yes. It provides a way to quarantine the host, by clicking a button. Q. And you can address threats faster, you can proactively -- both proactively with threat detection and retroactively via advanced forensics, correct? A. That’s correct. Tr. 2198:5-2198:20, 2199:3-2199:20. Significantly, Cisco and Dr. Schmidt failed to cite any technical documents or diagrams illustrating the new post 2017 Stealthwatch or other products accused of infringing the ‘856 Patent. An examination of Cisco’s own technical documents and diagrams from post 2017, illustrating the functionality of the accused products, explain why it adopted this new functionality. The diagrams and the accompanying text from Cisco’s technical explanation of ETA, PTX-584 and PTX-570, illustrate why slide five, and the testimony grounded upon it and its variations, are inaccurate: 44 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 45 of 178 PageID# 23931 PTX-584 Cisco Encrypted Traffic Analytics Technical White Paper from 2019 PTX-584 at 402. 45 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 46 of 178 PageID# 23932 PTX-570 Cisco Encrypted Traffic Analytics Technical Deployment Guide from July 2019 PTX-570 at 593. This is further supported by the Cisco Stealthwatch Technical Data Sheet, PTX482: Analyzing this data can help detect threats that may have found a way to bypass your existing controls, before they are able to have a major impact. The solution is Cisco Stealthwatch, which enlists the network to provide end-toend visibility of traffic. This visibility includes knowing every host-seeing who is accessing which information at any given point. From there, it’s important to know what is normal behavior for a particular user or “host” and establish a baseline from which you can be alerted to any change in the user’s behavior the instant it happens. PTZ-482 at 664 (emphasis added). Moreover, Dr. Schmidt’s testimony attempting to contradict PTX-1287, a 2018 Cisco document, is revealing: 46 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 47 of 178 PageID# 23933 Q. So we go to 1287. This is a document describing the Catalyst 9000 switch. “Foundation for a New Era of Intent-based Networking.” Do you see that, Dr. Schmidt? A. I do. Q. Okay. You know Dr. Cole relied on this document in his direct testimony of infringement, correct? A. I believe so. Q. Okay. Now if we turn to Page 28 of that document ending in Bates Number 028, there’s a graphic at the top here and it talks about the Catalyst 9000 Advanced Security Capabilities. Do you see that? A. I do. Q. And you recall Dr. Cole relying on this document, correct? A. Not particularly, no. Q. Okay. Well, if you look at the very bottom it says, “Detect and stop threats, exclamation point.” Do you see that? A. I do. Q. And Dr. Cole used it to show that the Catalyst switches and the routers that have the same operating systems can detect and stop threats prospectively right? Or proactively, correct? A. I don’t believe that that’s what it says, no. Q. So you don’t think this says it’s going to detect and stop threats proactively? A. I don’t know what this slide says in this context. I know that Dr. Cole had an analysis that read the claims in a way that was essentially a non-sequitur, a series of non-sequiturs, and accused things as being part of -- the read on the claims, the patent claims that had nothing to do with the way in which the products operate. Q. I’m asking about your opinion now. When it says, “Detect and stop threats,” does that mean it’s detecting and stopping the threat before they get to the host? A. It’s not clear what it means in this context. I see the words “detect and stop threat.” I don’t see how it applies to the patent that we’re talking about here. 47 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 48 of 178 PageID# 23934 Q. So you don’t know what “detect and stop threat” means is what you’re telling the Court? A. No. I’m just saying I don’t know whether it means what you’re saying it means. THE COURT: Well, what do you think it means over on the right where it says “Before, During and After”? THE WITNESS: It looks like it’s saying that -- so it looks like it’s talking about the fact it’s possible to quarantine something, but I don't know how that refers to the - I don’t know how that refers to the way in which it reads on the claims and whether what Dr. Cole was alleging has anything to do with what the claims are asserting. BY MR. ANDRE: Q. So when it says “During”, during the packets coming in, Full NetFlow-based behavior analytics, Encrypted Traffic Analytics, Policy Enforcement Analytics. You don’t have an understanding of what that’s referring to? A. Again, this particular slide is coming out of thin air here, so I would have to spend a little bit of time looking at it to understand the way it’s being used in this particular context. Tr. 1925:16-1927:21; see PTX-1287 at 028 (depicted below). 48 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 49 of 178 PageID# 23935 PTX-1287 Cisco Catalyst 9000 Switching Technical Presentation from 2018 It’s difficult to comprehend why Dr. Schmidt would state, in his rebuttal of Dr. Cole, that he cannot understand a Cisco post 2017 document because it is “coming out of thin air.” In his preparation for his expert testimony, the Court is unaware how or why he overlooked this crucial Cisco document. Dr. Schmidt, when questioned again about this point, stated: Q. When we talk about Stealthwatch, if we go to the next page, you keep talking about this after-the-fact stuff. On that table on the left there it says, “Real-time detection of attacks by immediately detecting malicious connections from the local environment to the Internet.” Do you see that? A. I do. Q. So does that make you rethink your opinion that the real-time doesn’t mean immediately? A. No, it does not. 49 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 50 of 178 PageID# 23936 Q. So the word “immediately” doesn’t mean immediately in that sentence? A. Again, immediately is always relative to something. We already know that the packets are always delivered to the destination by the time the work goes up, by the time the NetFlow goes up to Stealthwatch and Cognitive Threat Analytics. And so it will detect it as quickly as it can, but it doesn’t say, it doesn’t say before the packets are delivered to the destination, does it? It says real-time detection of attacks by immediately detecting malicious connections. But there’s nothing there about it blocking the traffic, it just says it’s detecting it. Tr. 2113:17-2114:12. Dr. Schmidt’s testimony is directly refuted by Cisco’s own technical documents. For example, Cisco’s Catalyst 9000 at-a-glance guide highlights that this line of switches can “detect and stop threats, even with encrypted traffic.” PTX-199 at 224. (emphasis added). Cisco portrays the benefits of Stealthwatch as “[r]eal time detection of attacks by immediately detecting malicious connections from the local environment to the Internet.” PTX383 at 356. The Stealthwatch Data Sheet confirms that Stealthwatch uses “advanced security analytics to detect and respond to threats in real time.” PTX-482 at 664 (emphasis added). These documents confirm that the accused products are not solely used for detecting, but also for stopping those threats. Furthermore, the Stealthwatch Data Sheet notes that “Stealthwatch can recognize these early signs [of attacks] to prevent high impact . . . [o]nce a threat is identified, you can also conduct forensic investigations to pinpoint the source of the threat . . .” PTX-482 at 665 (emphasis added). The Court asked Dr. Schmidt about the word “also” in PTX-482: THE COURT: Why do you think it says “also” there? THE WITNESS: I think what it’s talking about there, Your Honor, if you take a look, it says “You can determine where else it may have propagated.” If you look at the -THE COURT: Do you think maybe it means you can do the things in the first two sentences and also do the thing in the third sentence? Do you think that’s what “also” means? THE WITNESS: I think it’s trying to say, sir, that if you look -- the forensic investigations they are specifically calling out here are pinpointing where the 50 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 51 of 178 PageID# 23937 problem was, so identifying who the bad guy is, and then determining what else might be infected. So that’s the problem with network threats; they often spread rapidly like viruses. That’s why they’re called viruses. So this is saying you can do additional analysis to not just say one person has a problem, but all the other things in the network that that person’s connected to somehow, that computer has been connecting to, may also be a problem too. I think that’s what “also” means here. THE COURT: I think “also” means “also” . . . Tr. 1974:13-1975:6. Notably when Mr. Schmidt previously read the same sentence from PTX482, he omitted the word “also” “Once a threat is identified, you can ____ conduct forensic investigations.” Tr. 1936:16-17. From his own testimony, it is clear to the Court that Dr. Schmidt is solely limiting his testimony to the forensic after the fact analysis feature in the old pre-2017 Stealthwatch. The Court accepts that Stealthwatch has the features to conduct forensic investigations after the fact. However, Dr. Schmidt, throughout his testimony ignores the presence of the word “also” and “detect and stop” in the technical documents, which denotes that the after the fact investigation is a feature that operates in addition to the ability to stop threats in real time. See Tr. 1974:3-1975:8. Turning to the second theory, this Court, in its Claim Construction Order, has construed a proxy system as a “A proxy system which intervenes to prevent threats in communications between devices.” Mr. Llewallyn, a Cisco software engineer, confirms that Stealthwatch and ISE, working in conjunction, can reconfigure the switches and routers to re-route malicious packets intended for a particular host to a null interface. Tr. 2199:21-2203:25. Cisco contends this use of a null interface falls outside of the Court’s Markman construction. It clearly does not. Cisco’s technical documents describe the null interface as a “virtual interface [that] never forward[s] or receive[s] traffic but packet[s] route[ed] to null interface are dropped.” PTX-256 at 082, 083 In this manner, the null interface causes “packets destined for a particular network to be dropped.” PTX-256 at 082, 083. The technical evidence shows that the null interface is a method, 51 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 52 of 178 PageID# 23938 incorporated into Cisco’s quarantine procedure, for re-routing packets from the intended host serving as an intervening process in the communication to drop packets. Dr. Schmidt opined that the proxy system required by the ‘856 Patent specification must perform some form of decryption. Dr. Schmidt testified as follows: Q. And you actually cited to the specification to show that a proxy system, the analysis had to actually decrypt, correct? You said that this claim requires decryption. Do you recall that? A. I do. Q. All right. So let’s go back to the patent. Column 10, line 15. 15 to 20. Now, this is the point that’s part of the specification you pointed to. Proxy device may receive the packet and decrypt the data in accordance with the parameters as in session 306. Do you see that? A. I do. Q. And you took that to mean that it must decrypt the data in accordance with the parameters, correct? Not that it may, that it must. A. Well, so to be consistent, there’s quite a number of places in columns, basically 8 through 12, where they talk about the role of proxy device, 112, which is the part here. And when they talk about proxy device 112, they’re talking about it in the context, going back to figure 3B, where there is a SSL/TLS session set up that involves sending encrypted packets. And whenever they talk about it in all those different places in columns 8, 9, 10, 11, and 12, they always make it clear that proxy device 12 [sic] receives packets that are encrypted packets and then decrypts them, and then sends the unencrypted data to what they call the man in the middle RuleGate, which is RuleGate 124. And RuleGate 124 then, as it talks about just a little bit further down in the specification, it talks about actually doing the filtering. And it talks about filtering based on the URI, they talk about filtering based on the request, on the method, on the command and so on. And then right after that it talks about how RuleGate 124 sends that information, which at that point is still decrypted – because of course we couldn’t be analyzing it unless it was decrypted -- it then sends it to proxy device 114. And as you read in the spec, it makes it very clear that proxy device 114 then re-encrypts the data and sends it on to the destination. So in all the cases where proxy system is disclosed – and like I said, there are three or four of them in the specification – it’s always talked about in the context of receiving encrypted data and then proxy device 112 will decrypt it and then pass it on in some way. So those are the ways that proxy system are -- proxy system is used in the spec. So that’s where I come up with the reasoning that, A, proxy system is involving decryption and encryption, because it says so very clearly 52 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 53 of 178 PageID# 23939 in the specification, and then reading claims F, F1 and F2, it’s very clear that the analysis that’s done to the filtering, for the most part can’t be done unless the packets are decrypted. MR. ANDRE: Your Honor, I don’t want to interrupt the witness, but I move to strike most of that. It’s not even responsive to my question. He’s going on these long tirades and -- I just asked a very simple question. Anyway. I’ll just ask this question: BY MR. ANDRE: Q. Okay. So I looked at this entire patent. I did a word search. The word “decrypt” shows up one time in this entire patent. One single time. And it’s right there. A. That’s true. And the word unencrypted – Q. Doctor, you just said that – A. -- appears in multiple places. Q. You said that decryption shows up every time they talked about the proxy server. You just testified to that just two seconds ago. A. No, what I said was that if you read the other parts of the patent spec they don’t use the word decrypt, they talk about unencrypting the data. So it says it will send over unencrypted data. So the word decrypt and unencrypted or sending unencrypted data necessarily implies that the data is unencrypted or decrypted. Unencrypted and decrypted are essentially synonyms. So it makes it very clear throughout the specification that, especially to the parts in columns 9, 10, 11 and 12, that that’s what proxy device 112 is doing on the outgoing path. And also they talk about it in terms of proxy device 114 on the incoming path. Q. So you’re saying that unencrypted data -- data that has never been encrypted ever -- and decrypted are synonyms? A. No, thats that’s not what I’m saying. Q. You just said that. A. Well, that’s not what I’m saying. What I’m saying here is very clear: The patent spec talks repeatedly, especially in reference to figure 3B, where information is being received from, I believe it’s on session 306, I think it’s from host 108, if I’m not mistaken, and that information is coming in over an encrypted session. And it makes it very clear in the patent spec that this is an encrypted session. And then it says proxy device 112 receives the encrypted data and then either decrypts it or they sometimes say then send on unencrypted data. 53 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 54 of 178 PageID# 23940 ... Q. Is there ever a disclosure of the proxy system in the specification that doesn’t do any analysis at all; that just drops without first doing analysis? A. No. Q. And a null interface, does it do any analysis at all before it drops a packet? A. No, it does not. Tr. 1941:2-1944:15, 1976:14-20. The specification specifically confirms that another option is to drop the packets. Column 8 starting at line 5 provides: 5 10 15 20 25 30 and one or more of log or drop the packets. Responsive to receiving the packets from proxy device 112, host 106 may generate packets comprising data configured to establish the connection between proxy device 112 and host 106 (e.g., a TCP:ACK handshake message) and, at step #14, may communicate the packets to proxy device 112. Rules 212 may be configured to cause rule gate 120 to one or more of identify the packets, determine ( e.g., based on one or more network addresses included in their network-layer headers) that the packets comprise data corresponding to the network-threat indicators, for example, by correlating the packets with one or more packets previously determined by packet-filtering system 200 to comprise data corresponding to the network-threat indicators based on data stored in logs 214 (e.g., log data generated by packetfiltering system 200 in one or more of steps #6, #7, #12, or #13), and one or more of log or drop the packets. Responsive to receiving the packets from proxy device 114, host 142 may generate packets comprising data conFigured to establish the connection between proxy device 114 and host 142 (e.g., a TCP:SYN-ACK handshake message) and, at step #15, may communicate the packets to proxy device 114. Rules 212 may be configured to cause rule gate 128 to one or more of identify the packets, determine ( e.g., based on one or more network addresses included in their network-layer headers) that the packets comprise data corresponding to the network-threat indicators, for example, by correlating the packets with one or more packets previously determined by packet-filtering system 200 to comprise data corresponding to the network-threat indicators based on 54 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 55 of 178 PageID# 23941 35 40 45 50 55 60 data stored in logs 214 (e.g., log data generated by packetfiltering system 200 in one or more of step #s 6, 7, or 12-14), and one or more of log or drop the packets. Responsive to receiving the packets from host 142, proxy device 114 may generate packets comprising data configured to establish the connection between proxy device 114 and host 142 ( e.g., a TCP:ACK handshake message) and, at step #16, may communicate the packets to host 142. Rules 212 may be configured to cause rule gate 128 to one or more of identify the packets, determine ( e.g., based on one or more network addresses included in their network-layer headers) that the packets comprise data corresponding to the networkthreat indicators, for example, by correlating the packets with one or more packets previously determined by packetfiltering system 200 to comprise data corresponding to the network-threat indicators based on data stored in logs 214 (e.g., log data generated by packet-filtering system 200 in one or more of step #s 6, 7, or 12-15), and one or more of log or drop the packets. Referring to FIG. 3B, proxy device 112 may receive the packets comprising data configured to establish the connection between proxy device 112 and host 106 communicated by host 106 in step #14, and connection 302 (e.g., a TCP connection) between proxy device 112 and host 106 may be established. Similarly, host 142 may receive the packets comprising data configured to establish the connection between proxy device 114 and host 142 communicated by proxy device 114 in step #16, and connection 304 (e.g., a TCP connection) between proxy device 114 and host 142 may be established. JTX-5 at 724. Columns 9-12 of the specification all contain the same alternate phrase “or drop the packets.” In fact, there is at least one mention of “or drop the packets” in each of columns 8-23 of the specification. These multiple references directly contradict Dr. Schmidt. Therefore, it is abundantly evident that Cisco’s null interface serves as a proxy system because it prevents threats in communications between devices, and this type of dropping of packets is shown by the specification to be an alternative to the further analysis of the packets. Therefore, the Patent does not require decryption as “or drop the packets” is already identified as an alternative. 55 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 56 of 178 PageID# 23942 Lastly, Cisco contends that Stealthwatch does not “filter” packets as required by the asserted claims. The Court disagrees. As outlined, Stealthwatch receives NetFlow, which contains representations of the unencrypted portions of encrypted packets. See PTX-578 at 061 (noting ETA “[m]akes the most out of the unencrypted fields” in the packet). These representations contain relevant header information from the packet and flow information utilized by Stealthwatch’s system to determine if the packets were being used in a malicious communication within the network. In this manner, sending these representations containing all header and flow information is no different than sending the packet directly to Stealthwatch because the representation is essentially a copy of the unencrypted portion of the packet. Using this unencrypted data, Stealthwatch discovers a user device infected with malware and “a malicious encrypted flow can be blocked or quarantined by Stealthwatch.” PTX-584 at 403. The Stealthwatch user interface known as the Stealthwatch Management Console (“SMC”) “provides a view of affected users identified by risk type.” Tr. 1920:20-22 (Dr. Schmidt confirming that Stealthwatch may provide alarms and alerts based on views within Stealthwatch), 2205:25-2206:4 (Mr. Llewallyn, a Cisco engineer, confirming Stealthwatch triggers alerts). The SMC allows for the representation of packets currently being processed within the network to be filtered and ordered by information within the unencrypted part of the packet such as protocol version, server name or domain name. Tr. 951:16-20; PTX-570 at 640. Dr. Cole highlights that this process meets the filter element because the Cisco system can identify and filter flows of packets that use certain versions of protocols that may be more vulnerable to malware incorporation. Tr. 953:22-954:2. For example, an outdated version 1.0 of a specific protocol such as TCP may be more vulnerable to be infected with malware than an updated and more secure version 2.0. See Tr. 953:22-955:24; see PTX-570 at 640. The Cisco system is able to filter the 56 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 57 of 178 PageID# 23943 flows of packets to visualize outdated versions and filter flows based on outdated and vulnerable protocol versions. See Tr. 953:22-955:24. Seeing those packet flows, the system responds by implementing rules based solely on blocking an older protocol that may leave the network open to attack. Tr. 953:22-954:2, 2202:5-25 (Mr. Llewallyn highlighting that Stealthwatch and ISE can send rules to routers and switches based on identified packet information such as protocol). Additionally, besides protocol version, Stealthwatch can perform this filtering based on server name, a component embedded within a Uniform Resource Identifier (“URI”). Tr. 957:12-21; see PTX-996 at 005 (noting that server name is part of the Initial Data Packet sent up in a Flow Record to Stealthwatch). URI, like protocol version, can be used to design rules that prevent the exfiltration of packets to that identified destination server. Accordingly, Cisco’s technical documents, as well as its own engineers, confirm that the Cisco system filters packets as required by the asserted claims of the ‘856 Patent. For all the aforementioned reasons, the Court FINDS the accused Cisco products literally infringe Claims 24 and 25 of the ‘856 Patent. iii. Findings of Fact Regarding Validity 28. The priority date of the ‘856 Patent is December 23, 2015. JTX-5. 29. As prior art, Cisco asserts multiple different versions of the old Stealthwatch system (i.e., versions 6.3, 6.5.4, and 6.5.5), and Identity Services Engine version 1.3 including NetFlow functionality embedded in other switches and routers. DTX-311, DTX-312, DTX-343, DTX-364, DTX-380, DTX-409 (All of which are pre-2017 documents). 30. The old Stealthwatch system received information from NetFlow provided by Cisco’s switches and routers. DTX-311 at 010; Tr. 3112:5-11. 57 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 58 of 178 PageID# 23944 31. The old Stealthwatch system operated as an after the fact analysis tool to gather information, after packets reached their final destination, and displayed that information to network administrators. Tr. 3123:18-21. Old Stealthwatch lacked the functionality to use unencrypted portions of data to determine if encrypted portions of traffic had threats hidden within. Tr. 3124:12-3125:6; see DTX-409. Old Stealthwatch did not possess the functionality to differentiate between unencrypted and encrypted traffic. Tr. 3112:4-11, 3122:13-3126:7, 3127:243133:10. 32. The technical documents for the old Stealthwatch system contain no mention of the ability of determining network threat indicators with respect to encrypted packets or analyzing data with respect to the unencrypted portion of encrypted packets, as it did not possess the functionality to determine what portion of the packets are unencrypted or encrypted. Tr. 3111:225. 33. Cisco incorporated the functionality from Centripetal’s technology to differentiate the unencrypted portion of packets from the encrypted portion of packets with its Encrypted Traffic Analytics (“ETA”) technology. ETA was added to Cisco’s network devices after it was released around November 2017. PTX-1009 at 012; PTX-1135 at 046-047; PTX-464 at 066, 069-070; PTX970 at 969; Tr. 3219:13-3223:6; 3238:21-3239:2, 3239:18-24. 34. The prior art asserted by Cisco contained no mention of the identification of encrypted information and/or packets. Tr. 3124:1-3125:1; see DTX-312, DTX-409. 35. Before the addition of ETA, Cisco’s system required using expensive and time- consuming decryption measures to detect threats in encrypted traffic. Tr. 2100:24-2101:18; PTX1417 at 107. 58 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 59 of 178 PageID# 23945 36. Cisco’s ETA also amended Cisco’s preexisting NetFlow technology in 2017 to enhance the capture of new and different information from the unencrypted portion of encrypted packets including the Initial Data Packet (“IDP”) and Sequence of Packet Lengths and Times (“SPLT”). Tr. 3127:6-13, 2103:5-6; see PTX-996 at 005. iv. Conclusions of Law Regarding Validity Patents and their claims are presumed to be valid. 35 U.S.C. § 282(a). This presumption may be rebutted by clear and convincing evidence that the patent at issue is invalid. Sciele Pharma Inc. v. Lupin Ltd., 684 F.3d 1253, 1260 (Fed. Cir. 2012); Tech. Licensing Corp. v. Videotek, Inc., 545 F.3d 1316, 1327 (Fed. Cir. 2008). This high burden of proof lends the necessary deference to the Patent and Trademark Office’s decision to grant the patent. See Sciele Pharma Inc., 684 F.3d at 1260 (“This notion stems from our suggestion that the party challenging a patent in court bears the added burden of overcoming the deference that is due to a qualified government agency presumed to have done its job.”). The clear and convincing standard “is an intermediate standard which lies somewhere between ‘beyond a reasonable doubt’ and a ‘preponderance of the evidence.’” Buildex Inc. v. Kason Indus., Inc., 849 F.2d 1461, 1463 (Fed. Cir. 1988) (quoting Addington v. Texas, 441 U.S. 418, 425 (1979)). This standard is met when the evidence “produces in the mind of the trier of fact an abiding conviction that the truth of [the] factual contentions are highly probable.” Id. Throughout the trial, Cisco’s experts opined that the patents were invalid based on anticipation, obviousness, and in some claims, lack of adequate written description. Starting first with anticipation, in order to anticipate a claim, “a single prior art reference must expressly or inherently disclose each claim limitation.” Finisar Corp. v. DirecTV Group, Inc., 523 F.3d 1323, 1334 (Fed. Cir. 2008). This disclosure must go beyond a mere mention of each 59 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 60 of 178 PageID# 23946 claim limitation, as anticipation “requires the presence in a single prior art disclosure of all elements of a claimed invention arranged as in the claim.” Id. (emphasis in original). To invalidate a patent on the basis of obviousness, a party “must demonstrate by clear and convincing evidence that a skilled artisan would have been motivated to combine the teachings of the prior art references to achieve the claimed invention, and that the skilled artisan would have had a reasonable expectation of success in doing so.” Cumberland Pharms. Inc. v. Mylan Institutional LLC, 846 F.3d 1213, 1221 (Fed. Cir. 2017) (quoting Kinetic Concepts, Inc. v. Smith & Nephew, Inc., 688 F.3d 1342, 1360 (Fed. Cir. 2012)). Dr. Schmidt, in his invalidity testimony, assumed the infringement analysis by Dr. Cole and opined that all of the same functionality that Dr. Cole relies on for infringement was in the accused products prior to the priority date of the ‘856 Patent. Tr. 1984:23-1985:4. Cisco’s technical documents refute this characterization and confirm that Encrypted Traffic Analytics (“ETA”) was truly a new advancement in the identification of threats within encrypted traffic without decryption and not simply an improvement over the previous system. The Catalyst 9000 Switch Guide shows how the accused products, with the addition of ETA, solved difficulties of detecting threats in encrypted traffic: Before the introduction of the Catalyst 9000 series, detecting attacks that hide inside encrypted sessions required unwieldy and expensive measures. In short, it meant installing decryption hardware in the middle of encrypted flows . . . PTX-1417 at 107. Dr. Schmidt’s testimony on the Catalyst 9000 switches confirmed this technical statement that the prior art system employed by Cisco, before ETA, required some form of decryption to detect threats in encrypted traffic. He testified: Q. Okay. Well, why don’t we turn to Page Bates No. 107 of this document. I want to turn your attention to the second -- this is talking about the Encrypted Traffic Analytics on the Catalyst switches. I want to turn your attention to the second paragraph. It states “Before the introduction of the Catalyst 9000 series, detecting 60 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 61 of 178 PageID# 23947 attacks that hide inside encrypted sessions required unwieldy and expensive measures. In short, it meant installing decryption hardware in the middle of encryption flows.” Do you see that? A. I do. Q. And you agree with that statement that’s in the Catalyst manual? A. I think that’s referring -- I think that’s contrasting the so-called inline systems which I believe the ‘856 patent to be focusing on with the after-the-fact analysis that they’re talking about here. Because if you look, “In short, it means installing decryption hardware in the middle of encrypted flows.” I believe that’s what a firewall does and that’s what the prior art Cisco Systems did, and that’s also of course what the ‘856 patent covers. Tr. 2100:24-2101:18 (emphasis added). Dr. Schmidt stated that he accepted Dr. Cole’s construction of the claims to find that the prior art system performs all of the infringing functionality. Based on this testimony, Dr. Schmidt opined that the ‘856 Patent covers a system that uses “decryption hardware” to detect threats in encrypted traffic. The Court agrees that the functionality of Cisco’s prior art primarily employed decryption to deal with threats in encrypted traffic. See PTX-1417 at 107. However, accepting Dr. Cole’s infringement construction of the asserted claims, the Court, in order to find invalidity, would be required to find that Cisco’s prior art disclosed the functionality to identify threats in encrypted traffic without the use of decryption. It is evident to the Court that Cisco lacked this functionality before 2017, yet this infringing functionality is exactly what was embedded in the accused products with the addition of ETA in 2017. The technical documents confirm that Cisco represented it had solved the problems of expensive decryption by delivering “Encrypted Traffic Analytics (ETA) on Catalyst 9000 switches. ETA identifies malware communications in encrypted traffic via passive monitoring: no extra equipment is required and unnatural traffic redirection need not be performed.” PTX-1417 at 107. Cisco completed malware identification in encrypted traffic by “ETA introducing new flow 61 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 62 of 178 PageID# 23948 metadata to help it identify malicious activity hiding within an encrypted flow.” PTX-1417 at 107. Cisco, through ETA, added both the “Initial Data Packer (IDP) and the Sequence of Packet Length and Times (SPLT)” to its use of NetFlow. PTX-1417 at 107. ETA was incorporated into all of the accused products in order to implement the functionality of detecting threats in encrypted traffic by using unencrypted portions of those packets. When asked about the functionality employed in the old Stealthwatch technology, Dr. Schmidt asserted that the 2013 version of Stealthwatch was able to detect and stop threats in encrypted traffic without decryption: Q. All right. Let’s talk a little bit about Stealthwatch. You’re saying that Stealthwatch from 2013 is the same as the Stealthwatch from today essentially? Functionally equivalent? A. I don’t think that’s quite what I said, but my point was with respect to what Dr. Cole is alleging in his infringement analysis as far as what does the filtering and the determining the filtering and the routing, that the capabilities existed in the prior art version of the accused products to do the same capabilities, to be able to detect threats in encrypted traffic without decrypting the traffic as we saw with the botnets, for example; the ability to do other kinds of analysis. I believe his use of the word filtering is inconsistent with the specification, but if that’s the way he wants to use it, there were ways to filter information as we saw in the bot net example as well in my testimony yesterday. Tr. 2110:17-2111-7 (emphasis added). This opinion is directly refuted by Dr. Schmidt’s own prior testimony, Tr. 2100:24-2101:18, as well as the technical documents that describe the functionality of Stealthwatch. PTX-383, a Stealthwatch technical guide from 2018, incorporated language that the 2017 ETA solution enabled Stealthwatch as the “first and only solution in the industry that can detect malware in encrypted traffic without any decryption using Encrypted Traffic Analytics.” PTX-383 at 355. Dr. Schmidt continually attempts to characterize the ETA solution as enhancing previously existing technology to identify threats in encrypted traffic but cites to no Cisco documents pre-2017 showing that the older Stealthwatch system had the capability to do the same functionality as the ETA solution. The only technical documents that confirm this functionality 62 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 63 of 178 PageID# 23949 are from later than the priority date of the ‘856 Patent. In this manner, the technical documents affirm that the infringing functionality was added after the priority date of the ‘856 Patent. Cisco’s press releases from the 2017 timeframe reinforce Centripetal’s contentions based on the technical documents. These releases show Cisco considered Encrypted Traffic Analytics as solving a “network security challenge previously thought to be unsolvable.” PTX-452 at 648. David Goeckeler, Cisco’s senior vice president and general manager of networking and security, highlighted the main advancement as: “ETA uses Cisco’s Talos cyber intelligence to detect known attack signatures even in encrypted traffic, helping ensure security while minting privacy.” PTX452 at 648; see PTX-1135. These statements are shown in PTX-1135, a Cisco Press Release from June 20, 2017, reproduced below: 63 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 64 of 178 PageID# 23950 64 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 65 of 178 PageID# 23951 Dr. Schmidt testified to his characterization of these press releases: Q. But is it your testimony that Cognitive Threat Analytics was on Stealthwatch in 2013? A. It was my testimony that Stealthwatch was capable of doing behavioral analytics, enabling it to be able to detect encrypted threat -- encrypted threats -- or threats in encrypted traffic without requiring decryption. That was my testimony when I talked yesterday. Q. So all these testimony we, all this, the press releases, the documents about Encrypted Traffic Analytics, that’s just all marketing puff; it was really not true, they could do it way before then, right? A. I didn’t say it was marketing puff, I said that the capabilities that were added with ETA, Encrypted Traffic Analytics, were very valuable, and the value came from the additional machine learning insights and classification capabilities that were added at that time frame. It was, in fact, possible for them to do it before that, but they were able to do it better now because they’ve added these additional capabilities. Q. So when they said they solved the unsolvable problem, they had it solved years before, right? A. Well, we don’t know what the unsolvable problem is from that quote. It could very well have been solving it more precisely or solving it more efficiently or solving it more thoroughly. So the insurmountable or unsolvable problem, I never saw an actual definition of that term, so I’m simply assuming that what they meant was they could do a much better job now that they added these enhancements, but that in no way, shape or form means they couldn’t do a good job before. Tr. 2105:1-2106:4. This characterization by Dr. Schmidt of Cisco’s language of “solving the unsolvable problem” as simply an improvement of a previous functionality is insupportable when compared with the technical documents. For all these reasons, Cisco has failed to present clear and convincing evidence that the ‘856 Patent is invalid for anticipation or obviousness. The prior art does not disclose the functionality to identify encrypted packets and then make determinations based on unencrypted information within those packet headers and flows. 65 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 66 of 178 PageID# 23952 The Court now turns to Cisco’s written description argument. To meet the written description requirement, the patentee “must ‘convey with reasonable clarity to those skilled in the art that, as of the filing date sought, he or she was in possession of the invention,’ and demonstrate that by disclosure in the specification of the patent.” Idenix Pharms. LLC v. Gilead Scis. Inc., 941 F.3d 1149, 1163 (Fed. Cir. 2019) (quoting Carnegie Mellon Univ. v. Hoffmann-La Roche Inc., 541 F.3d 1115, 1122 (Fed. Cir. 2008)); see Hynix Semiconductor Inc. v. Rambus Inc., 645 F.3d 1336, 1351 (Fed. Cir. 2011); Ariad Pharms., Inc. v. Eli Lilly & Co., 598 F.3d 1336, 1351 (Fed. Cir. 2010). The hallmark of the written description test is disclosure. Ariad, 598 F.3d at 1351. Therefore, the “test requires an objective inquiry into the four corners of the specification from the perspective of a person of ordinary skill in the art.” Id.; see Idenix, 941 F.3d at 1163. Dr. Schmidt contends that the ‘856 Patent specification does not disclose any type NetFlow invention and, therefore, the claims fail for lack of written description. He opined that if the claims are infringed for filtering representation of packets, then the Patent is invalid for lack of written description because there is no disclosure of this type of scenario within the specification. Tr. 2067:6-25. The Court disagrees with Dr. Schmidt’s conclusion. The specification specifically contains language that a “Packet-filtering system may be configured to correlate packets identified by the packet-filtering system with packets previously identified by packet-filtering system based on data stored in logs.” JTX-5 col. 5 ln. 25-30. The specification continues to mention that: 35 40 For example, for one or more packets logged by packetFiltering system 200 (e.g., the packets comprising the DNS query or the packets comprising the reply to the DNS query), logs 214 may comprise one or more entries indicating one or more of network-layer information (e.g., information derived from one or more network-layer header fields of the packets, such as a protocol type, a destination network address, a source network address, a signature or authentication information (e.g., information from an Internet protocol security (IPsec) encapsulating security payload (ESP)), 66 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 67 of 178 PageID# 23953 45 50 55 or the like), transport-layer information (e.g., a destination port, a source port, a checksum or similar data ( e.g., error detection or correction values, such as those utilized by the transmission control protocol (TCP) or the user datagram protocol (UDP)), or the like), application-layer information (e.g., information derived from one or more applicationLayer header fields of the packets, such as a domain name, a uniform resource locator (URL), a uniform resource identifier (URI), an extension, a method, state information, media-type information, a signature, a key, a timestamp, an application identifier, a session identifier, a flow identifier, sequence information, authentication information, or the like), other data in the packets (e.g., payload data), or one or more environmental variables ( e.g., information associated with but not solely derived from the packets themselves, such as one or more arrival (or receipt) or departure (or transmission) times of the packets . . . JTX-5 col. 5 ln. 31-56; see Tr. 3144:3-21. This section of the specification clearly illustrates the ‘856 Patent invention discloses the logging of certain information from the packets by the packet filtering system. Dr. Jaegar confirmed that viewing this section of the specification as a person skilled in the art would disclose the information required to be used by the packet filtering system. Tr. 3144:3-21. This is the exact type of network information that is contained in NetFlow records. Therefore, looking at the four corners of the ‘856 Patent’s specification, it is evident to a person skilled in the art that the ‘856 Patent made the required disclosure of the logging of information from packets to be used by the packet filtering system. Accordingly, the Court FINDS that Cisco has not proven by clear and convincing evidence that the ‘856 Patent was anticipated, obvious or lacked adequate written description. B. THE ‘176 PATENT i. Findings of Fact Regarding Infringement 1. The ‘176 Patent has been informally known as the “Correlation” Patent. 67 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 68 of 178 PageID# 23954 2. The ‘176 Patent was issued on January 31, 2017. JTX-3. The ‘176 Patent was filed on May 15, 2015 as a continuation of application No.14/618,967, giving the ‘176 Patent a priority date of February 10, 2015. JTX-3. 3. The asserted claims of the ‘176 Patent are Claim 11 and Claim 21. Doc. 411. Claim 11 and Claim 21 are, respectively, a system and computer readable media claim. 4. Claim 11 is laid out below: A system comprising: at least one processor; and a memory storing instructions that when executed by the at least one processor cause the system to: identify a plurality of packets received by a network device from a host located in a first network; generate a plurality of log entries corresponding to the plurality of packets received by the network device; identify a plurality of packets transmitted by the network device to a host located in a second network; generate a plurality of log entries corresponding to the plurality of packets transmitted by the network device; correlate, based on the plurality of log entries corresponding to the plurality of packets received by the network device and the plurality of log entries corresponding to the plurality of packets transmitted by the network device, the plurality of packets transmitted by the network device with the plurality of packets received by the network device; and responsive to correlating the plurality of packets transmitted by the network device with the plurality of packets received by the network device: generate, based on the correlating, one or more rules configured to identify packets received from the host located in the first network; and 68 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 69 of 178 PageID# 23955 provision a device located in the first network with the one or more rules configured to identify packets received from the host located in the first network. 5. Claim 11 is identical to Claim 21 in every respect except that Claim 21 is a computer readable media claim. Tr. 885:14-24. Claim 21 modifies the introductory preamble language of Claim 11 replacing “[a] system comprising: at least one processor; and a memory storing instructions that when executed by the at least one processor cause the system to:” with “[o]ne or more non-transitory computer-readable media comprising instructions that when executed by a computing system cause the computing system to:”. JTX-3. For purposes of infringement, the parties have treated the two claims as identical. 6. Dr. Moore, an inventor of the ‘176 Patent, describes the technology of the ‘176 Patent as the development of a system for identifying malware-infected computers through use of correlation. Tr. 341:3-15. 7. A single communication between two computers on different networks is often broken down into many different segments of packets. Tr. 340:20-341:2. These segments are compared to ascertain if they are a part of the same communications and then the system can make a determination that a computer within the network has been communicating with a computer of a cybercriminal. Tr. 341:3-15. Therefore, the correlation technology in the ‘176 Patent serves as a method to identify computers in a network that have been infected with malware. Tr. 341:18-19. 8. Centripetal accuses Cisco’s Catalyst 9000 series switches, the Aggregation Services Router 1000 series routers and Integration Services Router 1000 and 4000 series routers in combination with Cisco’s Stealthwatch of infringing Claims 11 and 21 of the ‘176 Patent. Tr. 975:19-21. 69 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 70 of 178 PageID# 23956 9. The accused Cisco’s switches and routers share the same operating system known as IOS XE. Tr. 448:11-24; 449:19-450:4; PTX-242 at 816, 817. 10. The accused switches and routers contain processors and memory that stores software instructions. Tr. 477:12-478:14, 484:13-485:3; PTX-1303 at 056. 11. The accused Cisco switches and routers contain processors that function to transmit packets across different external and internal networks. Tr. 977:18-21. 12. Cisco has utilized its own proprietary packet logging technology known as NetFlow. Tr. 983:18-25; PTX-1060 at 008. 13. As packets are transmitted, the accused switches and routers generate NetFlow logs, which are summaries of information from the transmitted packets. Tr. 977:18-25; 984:7-13; PTX1060 at 008. NetFlow includes information such as the source and destination IP address, the source and destination port, and the protocol being used. Tr. 984:7-13; PTX-1060 at 008. 14. The accused switches and routers are capable of generating NetFlow records for packets at both the ingress of the packet into the device and on egress out of the device. Tr. 986:18987:1; PTX-1060 at 023 (showing that the Catalyst 9400 switch is capable of supporting 384,000 NetFlow entries – 192,000 on ingress and 192,000 on egress); PTX-572 at 762; see Tr. 988:12-22 (Dr. Cole explaining PTX-572 showing “When you configure a flow record, you are telling the device to show all of the flow data traffic that enters” -- which is ingress – “or leaves” -- egress – “the device.”). 15. These NetFlow records are sent up to Stealthwatch, which by 2018 was embedded with Cognitive Threat Analytics (CTA) that digests the information from the ingress and egress NetFlow records. PTX-1009 at 009; Tr. 1009:3-14. The new Stealthwatch with CTA also has the functionality to be sent data from proxy sources using another type of logging called Syslog. PTX- 70 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 71 of 178 PageID# 23957 1065 at 005; Tr. 1115:4-116:13 (noting the Stealthwatch “solution uses the Proxy ingestion feature to consume Syslog information . . .”) Customers may use either NetFlow or Syslog data or both within Stealthwatch. PTX-1065 at 005. 16. Stealthwatch correlates NetFlow and/or Syslog information sent by devices on the network and correlates the information to provide a detailed overview of all traffic that is occurring on the network. PTX-1065 at 005. CTA, working within Stealthwatch, can leverage the correlations of NetFlow telemetry to detect malicious threats to the security of the network. PTX1009 at 009; PTX-591 at 522 (using identical language to PTX-1009 in the Stealthwatch Release Notes); see Tr. 997 at 7-12 (“‘telemetry’ is just another word for the NetFlow log information. So the NetFlow telemetry, the NetFlow logs, these are all synonymous terms, so this is another way of referring to logs”). 17. In response to these correlations, Stealthwatch creates a baseline of normal traffic behavior within the network. Based on these normal patterns and known threat indicators, Stealthwatch employs a funnel of analytical techniques to detect advanced threats. PTX-569 at 272; PTX-584 at 402. 18. Stealthwatch, in response to suspicious activity or threats, allows the Identity Services Engine or Stealthwatch Management Console to provision rules to proactively stop that threat. Tr. 1002:13-1003:21; PTX-1089 (showing the use of the Adaptive Network Control (“ANC”) to implement rules). The ANC operates by applying new policies and changing individual user’s authorization on the network according to rules and policies configured by the Identity Services Engine in response to correlated threats on the network. PTX-595 at 179; Tr. 1005:10-19. Both the Identity Services Engine and the Stealthwatch Management Console operate in this fashion. Tr. 1006:19-1007:5. PTX-989. 71 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 72 of 178 PageID# 23958 ii. Conclusions of Law Regarding Infringement Based on the Court’s factual findings, Centripetal has proven by a preponderance of the evidence that Cisco’s Catalyst 9000 series switches, the Aggregation Services Router 1000 series routers and Integration Services Router 1000 and 4000 series routers in combination with Cisco’s Stealthwatch literally INFRINGE Claims 11 and 21 of the ‘176 Patent. Cisco’s expert on the ‘176 Patent, Dr. Kevin Almeroth: was asked to offer opinions, after performing an analysis, on noninfringement as it related specifically to the ‘176 patent; similarly, to offer opinions about whether or not the ‘176 patent was valid; and then several additional opinions relating to the benefits of the patent, technical issues related to damages, and then also copying, to the extent it still exists in this trial. Tr. 2212:12-18. Dr. Almeroth advanced two non-infringement theories. Tr. 2239:17-2240:14. First, that the accused system does not correlate a plurality of transmitted packets with a plurality of received packets as required by the asserted claims of the ‘176 Patent. Tr. 2247:18-2248:4. Second, that the accused system does not generate and provision rules in response to those claimed correlations. Tr. 2247:18-2248:4. Turning to the first theory, Dr. Almeroth opined that Dr. Cole’s infringement opinion relied on the systems’ use of logs provided by Cisco’s proprietary logging technology, NetFlow, as the logs outlined by the claim language. Dr. Almeroth construed the claims to require identification and generation of logs out of the same network device on ingress and egress. Therefore, Dr. Almeroth avers that the Cisco system cannot infringe, because in his opinion, the accused switches and routers do not generate NetFlow on both ingress into a device and egress out of one network device. Tr. 2249:4-18. Cisco’s technical documents refute Dr. Almeroth’s conclusion. Dr. Cole pointed directly to PTX-1060, a Cisco technical document dated December of 2017, showing that the Catalyst switches have the ability to export NetFlow on ingress and egress. 72 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 73 of 178 PageID# 23959 Tr. 986:18-987:1; PTX-1060 at 023 (showing that the Catalyst 9400 switch is capable of supporting 384,000 NetFlow entries – 192,000 on ingress and 192,000 on egress). Dr. Almeroth, on cross-examination, even admitted that the accused switches and routers can be configured to export ingress and egress NetFlow. Q. Isn’t it correct, Dr. Almeroth, that this Cisco document says right here that MPLS Egress and NetFlow Accounting feature can be used -- being use to capture ingress and egress flow statistics for router B, one device. Is that correct? A. That’s what it says. But my last answer was qualified for Stealthwatch. This document, at least what you’re pointing me to here, does not mention Stealthwatch. And that was really my whole point: That you can certainly configure NetFlow ingress and egress, but when you get to troubleshooting Stealthwatch, it’s considered an error within Stealthwatch. Tr. 2286:10-19. In this exchange, Dr. Almeroth confirms that NetFlow can be configured on ingress and egress but shifts the crux of his non-infringement opinion to the fact that Stealthwatch produces an error based on producing both types of NetFlow. To support that claim, Dr. Almeroth relied solely on the presentation of source code from the 6.5.4 version of Stealthwatch that operated without enhanced NetFlow or the integration of Cognitive Threat Analytics (CTA). Tr. 2287:119; see DTX-1616 (showing source code from a previous 6.5.4 version of Stealthwatch that is not accused by Centripetal). He cites to no technical document that confirms that the accused/current version of Stealthwatch produces an error when exporting both ingress and egress NetFlow. In fact, the technical release notes for CTA, which was incorporated into Stealthwatch in 2018, support that CTA produced the ability for the correlation of NetFlow telemetry. PTX-1009 at 009. Dr. Cole, in his infringement opinion on the “identify and generate” elements, relied on a similar claim scope as Dr. Almeroth to show that the claims required that one network device generate logs on a packets’ ingress and egress out of the device. Moreover, Dr. Cole does not explicitly limit his construction of the asserted claims to the limitation of only ingress and egress 73 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 74 of 178 PageID# 23960 out of one device. The Court FINDS, based on the testimony and technical documents, that the accused switches and routers do identify and generate logs on ingress and egress. However, a look at the specification of the ‘176 Patent informs the Court that this is not the only construction that would infringe the asserted claims. These claim elements would also be met if there was identification, generation and correlation of logs from two different network devices on either ingress or egress. Column 8 line 46 of the specification highlights that: 50 55 60 At step 16, packet correlator 128 may utilize log(s) 142 to correlate the packets transmitted by network device(s) 122 with the packets received by network device(s) 122. For example, packet correlator 128 may compare data in entry 306 with data in entry 312 (e.g., network-layer information, transport-layer information, application-layer information, or environmental variable(s)) to correlate Pl' with Pl (e.g., by determining that a portion of the data in entry 306 corresponds with data in entry 312). Similarly, packet correlator 128 may compare data in entry 308 with data in entry 314 to correlate P2' with P2, packet correlator 128 may compare data in entry 310 with data in entry 316 to correlate P3' with P3, packet correlator 128 may compare data in entry 318 with data in entry 324 to correlate P4' with P4, packet correlator 128 may compare data in entry 320 with data in entry 326 to correlate PS' with PS, and packet correlator 128 may compare data in entry 322 with data in entry 328 to correlate P6' with P6. JTX-3 col. 8 ln. 46-63. This section of the specification indicates that the network device that generates the correlated logs may be plural as well as singular. Additionally, this section is showing the correlation may occur between data entries that were processed through two different network devices. Compare JTX-3 col. 8 ln. 46-63 with JTX-3 Fig. 3. Dr. Almeroth, on cross examination, confirms that the use of “a network device” in the claim language may mean more than one network device: Q. And then you said this had to be a single network device, correct? 74 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 75 of 178 PageID# 23961 A. Not quite. It says a network device here, and then later it’s the network device. So it’s the same network device across the limitations. Q. But you do understand that in a patent, when it says A, it can mean one or more; is that correct? A. That’s my understanding. Q. So this could be more than one network device, correct? A. It could be. Tr. 2278:11-20. Therefore, even if the Court were to accept Dr. Almeroth’s conclusion that the accused devices do not process ingress and egress out of the same device, it would still find infringement on the basis that the Cisco system correlates logs between multiple devices within the network on either ingress or egress. Moreover, Dr. Almeroth states that the accused system does not generate and provision rules in response to correlation performed as a result of Stealthwatch and CTA. Dr. Almeroth admits that Stealthwatch with CTA performs correlations, just not those required by the claim language. In explaining the diagram of PTX-1065, Dr. Almeroth opined: Q. Can you explain what’s going on here, Dr. Almeroth? A. Yes. What’s being shown here, if you start in the bottom, it shows two different sources of information that ultimately get correlated. There’s proxy data and there’s NetFlow data. And when Dr. Cole testified, he represented that that NetFlow data included ingress and egress records from the same device, which was actually not the case, as the evidence and the correct operation of the devices show. And then from there, his analysis principally turned on the fact that these documents describe correlation. They absolutely use the word correlation, but it’s not the correlation of the type required by the claims. And the example that’s shown in this particular figure and what’s described in the text below is that you’re correlating NetFlow data, which is not the NetFlow data required by the claim for the reasons I’ve given, with other data. In this case, proxy data. And so even though these documents use the word correlate, what they’re correlating is not the kind of correlation that’s required by the claims. Q. Okay. And if we look, Mr. Simons, at the text below? 75 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 76 of 178 PageID# 23962 BY MR. JAMESON: Q. And I don’t want to go through all of this, but is the same point made in the text below with respect to the comments you made, about the diagram? A. Yes. It’s absolutely the case that Stealthwatch correlates I think what we’ve referred to as threat intelligence with NetFlow records. But what it is not comparing, what it is not correlating is it’s not correlating the NetFlow records to themselves as required by the elements of the claims, because it tries to block or double count those NetFlow records. And so all of this evidence that Dr. Cole relied on that uses the word correlate, over and over again it describes correlation of threat intelligence with NetFlow data, which is not what the claim requires and also is not what the ‘176 patent is about. Tr. 2256:3-2257:10. PTX-1065 Cisco Technical Presentation Involving Operation of Stealthwatch in Combination with CTA in November 2017 76 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 77 of 178 PageID# 23963 The Court agrees with Dr. Almeroth’s assessment that Stealthwatch correlates NetFlow and Syslog information with global threat indicators. PTX-202 states that Stealthwatch “correlates local traffic models with global threat behaviors to give you rich threat context around network traffic . . . and applies encrypted traffic analytics to enhance NetFlow analysis.” PTX-202 at 242. Therefore, it is clear that Stealthwatch uses the NetFlow information within the network to correlate those records to global threat indicators. However, this is not the only use of correlation that Stealthwatch uses in its operation. In order to make use of behavioral analytics, Stealthwatch correlates NetFlow that passes through network devices to create a baseline of normal types of traffic that would pass through the network. This correlation occurs between both NetFlow and other logs provided to Stealthwatch in the form of WebFlow telemetry through the use of Syslog. Therefore, along with matching threats to global threat indicators, Stealthwatch can also detect threats based on abnormal activity that occurs within the network. For example, a large amount of data being transported throughout the network at a time where an office is closed or not conducting business would send up an alert that something malicious may be afoot. Cisco’s technical guide for configuring Netflow and Stealthwatch, PTX-569, illustrates how Stealthwatch “[c]reates a baseline of normal behavior” and “correlates threat behaviors seen in the local environment with those seen globally.” 77 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 78 of 178 PageID# 23964 PTX-569 Cisco Technical Guide for Configuring and Troubleshooting NetFlow for Cisco Stealthwatch from 2018* *The heading in the blue box above states ‘Collect and analyze telemetry’. PTX-569 at 272. This process would require Stealthwatch to correlate NetFlow within the network between multiple devices in order to recognize normal traffic patterns within the network. Accordingly, it is axiomatic that Stealthwatch could then provision rules to stop threats that are detected based on internal network NetFlow correlation with or without global threat indicators. PTX-595 at 179. Therefore, the Court FINDS by a preponderance of the evidence that 78 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 79 of 178 PageID# 23965 Stealthwatch performs the exact type of correlation and provisioning of rules in response to correlations required by the ‘176 Patent. iii. Findings of Fact Regarding Validity 19. The priority date of the ‘176 Patent is February 10, 2015. JTX-4. 20. Sometime in 2012 or 2013, Cisco released and marketed a system known as the Cyber Threat Defense Solution. This system was a collection of Cisco switches and routers, the Identity Services Engine and Lancope’s Stealthwatch. Compare Tr. 2430:1-3; DTX-311 with Tr. 2485:5-10; DTX-664 at 004. 21. Cisco asserts its Cyber Threat Defense Solution, using an older version of Stealthwatch, as the prior art that renders the ‘176 Patent invalid. DTX-311; DTX-312; DTX-343; DTX-463 (All documents from pre-2017). 22. The asserted prior art system leverages Cisco networking technology, including NetFlow, Identity Services Engine, and Stealthwatch. The Stealthwatch version asserted as prior art is version 6.5.4. Tr. 2344:22. This version of Stealthwatch incorporated Stealthwatch Labs Intelligence Center (“SLIC”) threat intelligence information, which contained human collected threat indicators. Tr. 3153:14-19; DTX-312 at 001. 23. Old Stealthwatch was able to automatically respond to alarms generated by worms, viruses and internal policy violations. DTX-463 at 014 (noting Stealthwatch responds to alarms). There is no indication in the pre-2017 documents that Stealthwatch issued rules in response to correlations of NetFlow. 24. Cisco Stealthwatch incorporated Cognitive Threat Analytics in Stealthwatch in 2017. Tr. 2342:6-7. In version 7.0.0 of Stealthwatch released in 2019, CTA was improved with 79 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 80 of 178 PageID# 23966 the ability to leverage threat detection from the analysis of WebFlow, produced by Syslogs, and NetFlow telemetry by correlating the data. PTX-1893 at 011. 25. In response to these correlations, new Stealthwatch creates a baseline of normal traffic behavior within the network. Based on these normal patterns and known threat indicators, Stealthwatch, using CTA, employs a funnel of analytical techniques to detect advanced threats. PTX-569 at 272; PTX-584 at 402 (post-2017 documents). 26. Stealthwatch, in response to suspicious activity or threats, allows the Identity Services Engine or Stealthwatch Management Console to provision rules to proactively stop that threat. Tr. 1002:13-1003:21; PTX-1089 (showing the use of the Adaptive Network Control (“ANC”) to implement rules). The new ANC, which replaced the old quarantine functionality, operates by applying new policies and changing individual user’s authorization on the network according to rules and policies configured by the Identity Services Engine in response to correlated threats on the network. PTX-595 at 179; Tr. 1005:10-19. Both Identity Services Engine and the Stealthwatch Management Console operate in this fashion. Tr. 1006:19-1007:5. iv. Conclusions of Law Regarding Validity Dr. Almeroth opined that the ‘176 Patent is invalid for anticipation, obviousness, and based on written description. Turning first to obviousness, Dr. Almeroth averred, by using Dr. Cole’s testimony, that all of the infringing functionality of the Cisco products is present in the prior art, particularly the Cisco Cyber Threat Defense System. Tr. 2304:9-20. Specifically, Dr. Almeroth contended that prior to the priority date of the ‘176 Patent, Stealthwatch was able to “raise alarms, and then be able to generate and provision rules [based on] the routers and switches exporting NetFlow in combination with Stealthwatch.” Tr. 2305:2-5. The Court disagrees with Dr. Almeroth’s characterization. 80 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 81 of 178 PageID# 23967 Dr. Jaegar, Centripetal’s validity expert in his rebuttal testimony, highlights that the prior art confirms that the old Stealthwatch system is designed as a visibility system allowing administrators to view traffic in the network: Q. How do they characterize the old Stealthwatch Management Console? A. Well, I would characterize the old Stealthwatch systems, Stealthwatch Management Console, or SMC as its shown here, as the core visibility component of the old Stealthwatch system. This is the component that does the showing of information about flows in your network. And as you can see in the bottom paragraph, it talks about administrators, and so this SMC or Stealthwatch Management Console is designed for administrators to be able to look at what’s going on in their networks. Tr. 3152:13-22. The technical documents, from 2014, confirm Dr. Jaegar’s opinion highlighting that [t]he Stealthwatch system by Lancope is a leading solution for network visibility and security intelligence . . . .” PTX-343 at 001. Stealthwatch operates by providing “in-depth visibility and security context needed to thwart evolving threats . . . [and] quickly zooms in on any unusual behavior, immediately sending an alarm to the SMC . . . .” PTX-343. Additionally, the old Stealthwatch operated in response to these alarms. Dr. Jaegar opined: Q. Could you give us your memory of Dr. Almeroth’s testimony and why you disagree with it? A. My recollection is that he was saying that this shows that this adaptable mitigation that’s responsive to alarms, this would satisfy the responsive to correlation limitation. Q. And why do you disagree with his interpretation of this? A. Well, it specifically says in the first sentence that “Lancope customers can direct the Stealthwatch appliance to automatically respond to alarms generated by worms, viruses and internal policy violations.” And so this indicates that the, any -- any addition or automation or -- well, activation, I guess is the word I’m looking for -of these mitigation actions in the old Stealthwatch system is done in response to alarms being triggered and not in response to correlation of logs as is required by the claims. And my understanding is that previous inter partes reviews found that technology that only discloses being responsive to alarms rather than responsive to 81 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 82 of 178 PageID# 23968 correlation of log entries as required by the claim elements, that doesn’t satisfy the responsive to correlation claim element. Tr. 3154:6-25; see DTX-463 at 014. The post-2017 documents illustrate that the generation of rules responsive to correlations was an added functionality with the addition of CTA into Stealthwatch. The release notes for Version 7.0.0 of Stealthwatch, PTX-1893, contain a section titled “What’s New” which shows the additions made to Stealthwatch in this version. PTX-1893 at 011. In this section, the technical document indicates that “CTA can now leverage detections from the analysis of WebFlow telemetry to improve the efficacy of analyzing NetFlow telemetry from Stealthwatch. This is accomplished by the system through correlation of both telemetry types.” PTX-1893 at 011 (a technical document from 2019 showing this type of correlation is an enhancement to the Cognitive engine). Cisco identifies that this technology increases the number of both confirmed and detected threats in the network. Id. Cisco’s presentation on the incorporation of CTA into Stealthwatch shows that the technology “uses the Proxy ingestion feature to consume Syslog information sent from proxy sources . . . [and] then correlate the received syslog and relates it to the flows collected from network devices before and after the proxy . . . .” PTX-1065 at 005 (November 2017 document). This same document highlights that “[b]ringing CTA and Stealthwatch detection together gives us unique ability to combine our local and global detection capabilities.” Id. In response to the local correlations of WebFlow and NetFlow, new Stealthwatch can provision Adaptative Network Control policies based on the identification of behavioral anomalies. See PTX-569 at 272; PTX-595 at 179 (a technical document from 2019 showing how “ANC policies have replaced the previous quarantine and unquarantine feature”). Accordingly, Cisco has failed to present clear and convincing evidence that the “correlate” and “responsive to” functionality was in the Cisco prior art system. Therefore, the prior art does not render the asserted claims anticipated or obvious. 82 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 83 of 178 PageID# 23969 Switching to Cisco’s argument regarding written description. Dr. Almeroth opined that the specification does not disclose to a person skilled in the art that the inventors were in possession of the invention that is covered by the scope of the claims that is alleged in Centripetal’s infringement allegations. Tr. 2333:2-8. He avers that the ‘176 Patent is invalid because the specification of the ‘176 Patent contains no description of Cognitive Threat Analytics, machine learning, artificial intelligence, integrating threat feeds, or NetFlow. Tr. 2333:22-2334:12. The Court FINDS that both the challenged “correlate” and “responsive to” claim elements are adequately disclosed in the specification to meet the written description requirement. Dr. Jaegar opined that a person skilled in the art would be able to look at column 8, lines 46 through 63 of the ‘176 Patent specification and determine that the invention “utilize[s] logs to correlate packets transmitted by one or more network devices with packets received by one or more network devices.” Tr. 3155:16-18; see JTX-3 at col. 8 ln. 46-63. Additionally, for the “responsive to” element, Dr. Jaegar points to column 12, line 55 through column 13, line 13. This section of the specification clearly shows that the invention identifies hosts associated with malicious entities and communicates messages identifying that host. JTX-3 at col. 12 ln. 55 – col. 13 ln. 13. Further, the specification notes that this process occurs in response to the correlation of data, as described in column 8, lines 46 through 63 of the specification. Tr. 3156:9-3157:14. Based on these sections of the specification, the Court finds that a person skilled in the art would have been in possession of the invention at issue. Accordingly, the Court FINDS that Cisco has not proven by clear and convincing evidence that the ‘176 Patent was anticipated, obvious or lacked sufficient written description. 83 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 84 of 178 PageID# 23970 C. THE ‘193 PATENT i. Findings of Fact Regarding Infringement 1. The ‘193 Patent was informally known throughout the trial as the “Forward or Drop / Exfiltration Patent.” Tr. 2356: 2-6. 2. The ‘193 Patent was issued on June 20, 2017. JTX-4. The ‘193 Patent was filed on February 18, 2015 as a continuation of application No.13/795,882, giving the ‘193 Patent a priority date of March 12, 2013. JTX-4. 3. The asserted claims of the ‘193 Patent are Claims 18 and 19. Doc. 411. Claims 18 and 19 are, respectively, a packet filtering system and computer readable media claim. 4. Claim 18 is laid out below: A system comprising: at least one processor; and a memory storing instructions that when executed by the at least one processor cause the system to: receive, from a computing device located in a first network, a plurality of packets wherein the plurality of packets comprises a first portion of packets and a second portion of packets; responsive to a determination that the first portion of packets comprises data corresponding to criteria specified by one or more packet-filtering rules configured to prevent a particular type of data transfer from the first network to a second network, wherein the data indicates that the first portion of packets is destined for the second network: apply, to each packet in the first portion of packets, a first operator, specified by the one or more packet-filtering rules, configured to drop packets associated with the particular type of data transfer; and drop each packet in the first portion of packets; and responsive to a determination that the second portion of packets comprises data that does not correspond to the criteria, wherein the data indicates that the second portion of packets is destined for a third network: 84 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 85 of 178 PageID# 23971 apply, to each packet in the second portion of packets, and without applying the one or more packet-filtering rules configured to prevent the particular type of data transfer from the first network to the second network, a second operator configured to forward packets not associated with the particular type of data transfer toward the third network; and forward each packet in the second portion of packets toward the third network. JTX-4. 5. Claim 19 is identical to Claim 18 in every respect except it is a computer readable media claim. Claim 19 substitutes the introductory language of Claim 18, “A system comprising: at least one processor; and a memory storing instructions that when executed by the at least one processor cause the system to . . .”, with “[o]ne or more non-transitory computer-readable media comprising instructions that when executed by one or more computing devices cause the one or more computing devices to: . . . .” JTX-4; see Tr. 472:21. For purposes of infringement, the parties treated Claims 18 and 19 the same. 6. Dr. Sean Moore, one of the inventors of the ‘193 Patent, testified that the technology claimed in the patent centered around preventing the exfiltration of confidential data by cyber criminals. Tr. 343:14-16. 7. Centripetal’s expert, Dr. Mitzenmacher, defined the asserted claims of the ‘193 Patent as being related to the process of forwarding and dropping packets related to preventing exfiltrations. Tr. 465:18-21. Additionally, Dr. Mitzenmacher opined that the ‘193 Patent applies to the prevention of many different types of data exfiltration. Tr. 467:14-468:17. 8. As previously noted, exfiltration can occur in the context of cyber criminals hacking into the network and stealing data, but it also can occur within networks internally. For example, within one large corporate network there are many different departments or subnetworks, such as finance and human resources. See Tr. 490:17-25. It is common within these multi-departmental 85 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 86 of 178 PageID# 23972 companies that certain departments have access to confidential materials, while for others that access is restricted. 9. Accordingly, the network must restrict the ability of packets with this sensitive information to travel to unauthorized internal departments and external networks, while also allowing packets with no sensitive information to be freely transmitted to other employees within the network. Tr. 467:14-468:17. Therefore, the ‘193 Patent specifically identifies a process by which rules can be enabled to filter packets of data depending on the type of data transfer that is being transmitted throughout the network. Tr. 468:21-469:9. 10. Centripetal accuses Cisco’s Catalyst 9000 series switches, the Aggregation Services Router 1000 series routers and Integration Services Router 1000 and 4000 series routers of infringing Claims 18 and 19 of the ‘193 Patent. Tr. 433:20-434:1. 11. The accused Cisco’s switches and routers share the same operating system known as IOS XE. Tr. 448:11-24; 449:19-450:4; PTX-242 at 816, 817. 12. Cisco compiles the source code that operates the accused switches and routers in the United States. Tr. 462:5-463:18, 464:4-14; PTX-1409 at 5-6. 13. The accused switches and routers contain processors and memory that stores software instructions. Tr. 477:12-478:14, 484:13-485:3; PTX-1303 at 056. One of the processers within the accused Cisco devices are programmable Applied Specific Interred Circuits (“ASIC”), known as Unified Access Data Planes (“UADP”). Tr. 477:24-478:5; PTX-1262 at 994. This type of processer is commonly referred to as a UADP ASIC. Tr. 477:24-478:5; PTX-1262 at 994; PTX1390 at 029. 14. In their operation, the processors work within the accused Cisco switches and routers to receive and transmit packets across a network. 86 PTX-1276 at 216 (2011 Cisco Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 87 of 178 PageID# 23973 document); Tr. 488:1-489:3. During the transmission of packets, the operating system (“IOS XE”), working in conjunction with UADP ASICs, apply a variety of different rules to packets to determine if the packet should be permitted or dropped. PTX-1276 at 215-16. 5 15. Access Control Lists (“ACL”) are often applied to packets on ingress into the device and egress out of the device. PTX-1276 at 215-16. To simplify the process of applying rules, Cisco’s IOS XE utilizes a specific method where labels are applied to packets based on their source or destination. These labels are known as Secure Group Tag / Scalable Group Tag (“SGT”). 6 Tr. 494:12-24; see PTX-1276 at 211. 16. SGTs are attached to categorize packets into different numerical groupings based on information such as the packet’s source IP, destination IP and/or both. PTX-1280 at 021. SGT can also be based on other information that is included in the 5-tuple, such as source port, destination port and protocol. Tr. 2400:24-25 (Dr. Crovella, Cisco’s expert witness, highlighting that a quarantine rule has the ability to look at all information in the 5-tuple), 2404:4 (“[t]he quarantine rule only looks at the 5-tuple…”). 17. As packets enter the switch and router, they perform an initial check to see if there is a specific source SGT attached to each packet that is entering through the switch or router. Tr. 2421:2-8. 18. After the initial check, the switch and/or router applies an initial collection of rules known as a Group Access Control List (“GACL”). A Security Group ACL (“SGACL”) is an 5 The technical document for the switch and router operating system shows that the switches and routers support the application of multiple different ACL rule sets including: Port ACL (“PACL”); Vlan ACL (“VACL”); Router ACL (“RACL”); Client Group ACL (“CGACL”); Security Group ACL or Role Based ACL (“SGACL or RBACL”). PTX1276 at 215. 6 Cisco’s non-infringement expert, Dr. Crovella, confirmed that Secure Group Tag and Scalable Group Tag are in fact the same. Different names are being used at different times because of a marketing change. Tr. 2420:17. 87 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 88 of 178 PageID# 23974 example of a GACL that blocks or permits packets specifically based on SGTs. Tr. 2389:1-3. PTX1276 at 215-16; see Tr. 2423:9-15. 19. On a packet’s ingress into the device, the switch and/or router applies an input SGACL based upon the SGT associated with the source of where the packet was transmitted from. Tr. 2389:1-8; see PTX-1288 at 012 (showing input GACL applied based on ingress client); see also PTX-1276 at 216; PTX-1390 at 86 (2019 document). 20. On a packet’s egress out of a device, the switch and/or router applies an output SGACL based upon the SGT associated with the source, and drops or transmits packets based upon the destination of the packets. Tr. 2389:15-19; see PTX-1288 at 012 (showing output GACL applied based on egress client); see also PTX-1276 at 216; PTX-1390 at 86 (2019 document). 21. Cisco’s expert, Dr. Crovella, confirms that SGACLs are applied on a packet ingress into the switch and/or router and applied on a packet’s egress out of the router and/or switch. Tr. 2389:15-19, 2399:22; PTX-1288 at 012. 22. This SGACL rule-based packet blocking by comparing SGTs is more commonly referred to by Cisco as the quarantine rule. Tr. 2383:12-19, 2423:9-15 (Dr. Crovella noting that other ACLs besides the SGACL are not accused). 23. The quarantine rule operates to block or allow packets that are being transmitted throughout the network. Tr. 494:3-495:14, 496:17-497:13, 536: 24-25, 2419:3-15; see PTX-1262 at 999. 24. The switch and/or router determines whether the packet should be permitted or blocked based on the SGT assigned to that particular source. Tr. 535:10-17; PTX-1280 at 21; see PTX-1262 at 999. This process is completed by the switch and/or router by applying operators, 88 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 89 of 178 PageID# 23975 such as permit or deny, to incoming and exiting packets based upon their assigned SGT. Tr. 531:18-21; PTX-1280 at 021. 22. 25. If a packet’s SGT is not correlated to a SGACL rule on either ingress or egress, then a permit operator is applied to the packet, and it is permitted to be transmitted through the router or switch on to its destination. Tr. 542:17-24; PTX-1288 at 012. But if an SGT matches one of the SGACL rules because of an unpermitted source or destination, a deny operator is applied, and subsequently the packet will be blocked. Tr. 545:8-546:12, 548:11-19; PTX-1288 at 012. 26. In their presentation of evidence, Cisco has failed to cite any technical document produced post June 20, 2017. Cisco relies on ex post facto animations which were designed for litigation, and do not accurately portray the current functionality of the accused products. 27. Cisco has not called any witness who authored any of the Cisco technical documents relied upon by Centripetal in their infringement case. ii. Conclusions of Law Regarding Infringement Based on the Court’s factual findings, Centripetal has proven by a preponderance of the evidence that the Cisco’s Catalyst 9000 series switches, the Aggregation Services Router 1000 series routers and Integration Services Router 1000 and 4000 series routers literally INFRINGE Claims 18 and 19 of the ‘193 Patent. Cisco’s expert on the ‘193 Patent, Dr. Mark Crovella testified: I was asked to consider whether the ‘193 patent was infringed by the accused Cisco technology, I was asked whether it should be considered valid in light of the prior art, and I was also asked about potential damages if we were to assume that it were valid and infringed, whether there were significant benefits over the prior art. Tr. 2349:18-24. Dr. Crovella advanced two theories in his non-infringement opinion. First, that the function which is referred to as a “quarantine” blocks all traffic from a source computer and does not block a “particular data transfer,” as required by the language in the claim. Second, he 89 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 90 of 178 PageID# 23976 averred that Stealthwatch, using NetFlow, cannot identify exfiltrations until it is too late to drop the packet. As to the first theory, Dr. Crovella admits on cross examination to the “two stage” process. This testimony, coupled with Cisco’s technical information from PTX-1284 and PTX-1326, prove that the accused switches and routers have been aided with Cisco’s Identity Services Engine to measure the vulnerability level of individual network risk and assign roles to certain devices based on this analysis. Walking through the operation of the accused products illustrates that the Cisco system operates in a two-stage process that meets the functionality required by the asserted claims. The Cisco packet-filtering system operates by using the Identity Services Engine to assign certain endpoint devices “roles” that determine what type of packets may be sent and/or received by that specific endpoint computer. PTX-1326. Therefore, the Identity Services Engine has the ability to monitor levels of vulnerabilities based on the packets that are being transmitted by switches and routers in the network, and to adjust the permissions based on real-time network operations. As a general example, the Cisco system operates by limiting a computer located in a first network from accessing sensitive data in a protected network, while simultaneously allowing unsensitive data to be accessed. In this manner, packets from the computer in the first network may be allowed to access unprotected resources on the larger internet, but would be restricted from transmitting packets containing secure information. This is shown by Cisco’s technical demonstration, PTX-563: 90 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 91 of 178 PageID# 23977 PTX-563 Cisco Technical Presentation on Rapid Threat Containment from 2018 The accused switches and routers are the specific network devices used to institute this packet filtering system. In their operation, the accused products receive different portions of packets from a first computing network. PTX-1276 at 216. Upon entry into an accused device, each packet is assigned a Scalable/Security Group Tag (“SGT”). The SGT that is attached to each packet is based on the role and/or privileges that is assigned to that specific endpoint computer. Therefore, SGTs, at their most basic level, are assigned to packets based on where the packet is being transmitted from and/or the destination of the transmitted packet. In this manner, the 5-tuple information in the header of the packet, such as the source of the packet’s origin and/or the destination to which it is being transmitted, is the operative data being used to determine the packet’s SGT. This assignment of SGT to packets as they enter the switch or router is the first step in the operation of the quarantine process. 91 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 92 of 178 PageID# 23978 After SGT attachment, the switches and routers execute the second stage. The accused devices utilize specialized rules, known as SGACLs, that deal specifically with forwarding and dropping packets based on what type of SGT is attached to the packet. SGACLs are applied to packets on both ingress in and egress out of switch and/or router. See PTX-1390 at 86. On ingress, the device looks at the SGT that is associated with the source of the packets. This application of SGACLs by the device determines whether packets are allowed to be transmitted by this specific SGT. If packets are allowed to be transmitted by the specific SGT, the packets are permitted into the device where the packets would be subject to another set of SGACLs on egress. On egress, different SGACLs are applied based on the packet’s destination. Egress SGACLs determine if packets associated with this SGT can be sent to the specific destination. Centripetal’s expert, Dr. Mitzenmacher, used PTX-1326 to confirm that Cisco’s quarantine rule operates with this rule-based blocking functionality. Moreover, technical documents, such as Cisco’s Rapid Threat Containment Guide, confirm that switches and routers are programmed to “manually or automatically change your user’s access privileges when there’s suspicious activity, a threat or vulnerabilities discovered.” Tr. 527:4-17; PTX-1326 at 011. Accordingly, the accused Cisco system attaches SGT to packets, and then uses the SGACL quarantine functionality within the switches and/or routers to contain malware infected computers by blocking “access to critical data while their users can keep working on less critical applications.” PTX-1326 at 011. Thus, the Cisco system operates by blocking packets affiliated with a particular type of data transfer to a protected resource, while allowing packets unaffiliated with a protected type of data transfer to be transmitted to their final destination. In this manner, the technical documents confirm that the accused products utilize “packet filtering-rules” that operate to prevent “a particular type of data 92 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 93 of 178 PageID# 23979 transfer” from a first to second network. This functionality is shown by text and diagram included in Cisco’s technical document that outlines the operation of the quarantine feature: PTX-1326 Cisco Identity Services Engine Technical Ordering Guide from August 2019 See PTX-1326 (showing infected endpoints can be denied access to certain types of data while being allowed access to other types of data). This functionality confirms the accused devices operate in the “two-stage” process outlined by both the claims and the specification of the ‘193 Patent. The accused products perform a twostage process by first assigning SGT to packets, based upon the source and/or destination of the packets, and then applies different “operators” or functions, such as permit/deny, to those packets based on the associated packet SGT. Cisco’s infringement expert, Dr. Crovella, on cross 93 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 94 of 178 PageID# 23980 examination confirmed that the accused products perform all the functionality required to infringe the claims: Q. . . .So we have multiple steps. First, the SGT tag is checked to see if it’s present, right? A. That’s right. Q. Then, if the SGT tag is present and it says, “quarantine,” then a quarantine policy is applied, correct? A. That’s right. Q. If the quarantine policy is applied, you check the destination, and if the destination is a protected resource in which it says, do not allow this packet to go there, it will prevent the data transfer from going to that destination, correct? A. That is, in fact, the quarantine policy. In other words, there’s not two steps there. A quarantine policy is, in fact, checking the destination. Q. Okay. And if it says, block the packet, it will be prevented from the data transfer going there, right? A. That’s right. Q. If it’s not in there, and if there is a – it’s able to go through to a permitted network or permitted resource, then the packet would be allowed to go through by the switch or the router. Isn’t that right? A. That’s right. Tr. 2423:19-2424:15; see PTX-563; PTX-1326. Dr. Crovella even concedes that the ‘193 Patent requires a device to “block some communication between the two networks but allow other communication to flow.” Tr. 2400:8-10. This is the exact functionality outlined by the asserted claims. This described system, without the use of Stealthwatch, can identify exfiltrations and drop packets as a result. Therefore, the Court FINDS that Cisco’s second theory of non-infringement is irrelevant to the Court’s determination because the accused system operates to block packets based 94 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 95 of 178 PageID# 23981 on the particular type of data transfer as required by the claims. Cisco’s technical documents, such as PTX-1294 and PTX-1326, demonstrate that Stealthwatch is not involved in the two stages of the infringing functionality. Accordingly, any evidence regarding Stealthwatch has no bearing on infringement for the ‘193 Patent. Based on its analysis, the Court FINDS that the packet filtering system instituted by the accused products infringes Claim 18 and 19 of the ‘193 Patent. iii. Findings of Fact Regarding Validity 28. The priority date of the ‘193 Patent is March 12, 2013. JTX-4. 29. Sometime in 2012 or 2013, Cisco released and marketed a system known as the Cyber Threat Defense Solution. This system was a collection of Cisco switches and routers, the Identity Services Engine and Lancope’s Stealthwatch. Compare Tr. 2430:1-3; DTX-311 with Tr. 2485:5-10; DTX-664 at 004. 30. Cisco asserts the Cyber Threat Defense Solution as the prior art that renders the ‘193 Patent invalid. DTX-311. 31. Switches and routers within Cisco’s Cyber Threat Defense Solution both received packets and created records of packet flows using Cisco’s proprietary logging system known as NetFlow. DTX-311 at 004. 32. The Cyber Threat Defense Solution operates by analyzing NetFlow data and inspecting that data for exfiltrations in the network. DTX-588 at 002. 33. The Cyber Threat Defense Solution contained a quarantine function. At that time, the quarantine function operated by completely isolating a source computer by blocking all packets sent from the computer into the network. Tr. 3011:1-9; DTX-711 at 002. Within this quarantine functionality, there is no mention of allowing access to certain resources while denying access to others. Tr. 3012:1-2. 95 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 96 of 178 PageID# 23982 34. The prior art does not contain any mention of Secure Group Tags or Identity Service Engine’s role-based quarantine functionality. See DTX-588; PTX-1193. 35. The prior art does not contain any mention of the application of operators to filter packets based on the attachment of Secure Group Tags. Tr. 3015:11-18, 3016:10-21, 3017:4-10; see DTX-588. 36. The prior art does not contain any information showing the application of SGACL to filter packets in the same manner shown by Cisco’s technical documents produced after March 12, 2013. Compare PTX-1276 at 211, 216 (showing the application of Secure Group Tags and SGACLs by the IOS-XE operating system) with PTX-1193 at 007 (showing the same diagram, but failing to make mention of any rules attached and filters based on the application of Secure Group Tags). iv. Conclusions of Law Regarding Validity For the ‘193 Patent, Cisco contends it is invalid based on anticipation by the prior art under 35 U.S.C. § 102, and based on obviousness in view of the prior art under 35 U.S.C § 103. First, Cisco has presented no compelling evidence that the alleged prior art system, the Cisco Cyber Threat Defense Solution, operates in a two-stage filtering process, as illustrated by the claims of the ‘193 Patent. See DTX-311. The most complete version of prior art, the Cisco Cyber Threat Defense Solution 1.0 Design and Implementation Guide, makes no mention of the attachment of Secure Group Tags or the application of operators to filter portions of packets based on that packet information. Throughout Dr. Crovella’s testimony, there is clear reliance on multiple prior art references to prove the invalidity case. For those reasons, it is apparent that a single prior art fails to contain all elements of the claimed invention, and Cisco has failed to show anticipation by clear and convincing evidence. 96 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 97 of 178 PageID# 23983 Turning to obviousness, the prior art references advanced by Cisco do not show that a skilled artisan would have been able to combine the teachings in these technical documents and produce the patented invention. Cisco argues that the ‘193 Patent must be invalid because the previous system, that includes older versions of similar switches, routers, ISE and Stealthwatch, has had some method of quarantining and blocking functionality. However, the Court rejects Cisco’s contention that these products have operated in the same manner and functionality just because the system had preexisting baseline functionality and consistent nomenclature. The prior art makes no mention of the infringing packet filtering process. Dr. Crovella relies on PTX-588, DTX-711, DTX-311, and PTX-1193 to contend that a person skilled in the art would have combined these references in order to teach the functionality outlined in the claims of the ‘193 Patent. A review of the asserted prior art shows no mention of the Identity Services Engine packet filtering system that utilizes switches and routers to attach Secure Group Tags, apply operators and then allow certain packets to be transmitted while other packets are subsequently blocked. 7 It is that system which contains the functionality taught by the claims of the ‘193 Patent. Cisco’s own technical documents that were used to show infringing functionality are all from post-2013. See PTX-1288 at 012; PTX-1276 at 216; PTX-1280 at 21; PTX-1294; PTX-1326. Not one selection of asserted prior art shows the infringing switch and router functionality was embedded in any of the Cisco products before the ‘193 Patent’s priority date. These conclusions allow the Court to infer that the infringing functionality was added as a result of newly designed versions of the accused products that occurred after March of 2013. 7 The Patent and Trademark Office denied Inter Partes Review on the ‘193 Patent citing similar concerns regarding the operator limitation. Tr. 3013:20-3014:9; DTX-370. 97 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 98 of 178 PageID# 23984 Accordingly, the Court FINDS that Cisco has failed to present clear and convincing evidence that the prior art would allow a person skilled in the art to combine the prior art to produce a packet filtering system with the functionality taught by Claims 18 and 19 of the ‘193 Patent. D. THE ‘806 PATENT i. Findings of Fact Regarding Infringement 1. The ‘806 Patent was informally known throughout the trial as the “Rule Swap Patent.” 2. The ‘806 Patent was issued on December 1, 2015. JTX-2. The application for the ‘806 Patent was filed on January 11, 2013. 3. The asserted claims of the ‘806 Patent are Claim 9 and Claim 17. Doc. 411. Claim 9 and Claim 17 are, respectively, a system and computer readable media claim. 4. Claim 9 is laid out below: A system comprising: a plurality of processors; and a memory comprising instructions that when executed by at least one processor of the plurality of processors cause the system to: receive a first rule set and a second rule set; preprocess the first rule set and the second rule set to optimize performance of the system for processing packets in accordance with at least one of the first rule set or the second rule set; configure at least two processors of the plurality of processors to process packets in accordance with the first rule set; after preprocessing the first rule set and the second rule set and configuring the at least two processors to process packets in accordance with the first rule set, receive a plurality of packets; process, in accordance with the first rule set, a portion of the plurality of packets; signal, each processor of the at least two processors, to process packets in accordance with the second rule set; and 98 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 99 of 178 PageID# 23985 configure, each processor of the at least two processors to, responsive to being signaled to process packets in accordance with the second rule set: cease processing of one or more packets; cache the one or more packets; reconfigure to process packets in accordance with the second rule set; signal completion of reconfiguration to process packets in accordance with the second rule set; and responsive to receiving signaling that each other processor of the at least two processors has completed reconfiguration to process packets in accordance with the second rule set, process, in accordance with the second rule set, the one or more packets. JTX-2. 5. Claim 9 is identical to Claim 17 in every respect except that Claim 17 is a computer readable media claim. JTX-2. Claim 17 substitutes the introductory language of Claim 9, replacing “[a] system comprising: a plurality of processors; and a memory comprising instructions that when executed by at least one processor of the plurality of processors cause the system to:” with “[o]ne or more non-transitory computer-readable media comprising instructions that when executed by a computing system cause the computing system to:” JTX-2. For purposes of infringement, the parties treated Claims 9 and 17 the same. 6. Dr. Moore, one of the inventors of the ‘806 Patent, defined the technology in the ‘806 Patent as a process by which a network device could perform a live swap of rules without sacrificing any security concerns or dropping packets. Tr. 338:22-339-2. 7. Cyber threat intelligence is often changing, so the rules that are embedded in switches and routers need to be continually updated. Tr. 339:5-10. Therefore, the rules that are being applied need to be continually swapped out from old rules to new rules. Tr. 339:13-25. The most efficient way to do this is by swapping rules while live traffic is going through the device and without any packets being dropped. Tr. 339:13-25. 99 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 100 of 178 PageID# 23986 8. Centripetal accuses Cisco’s Catalyst 9000 series switches, the Aggregation Services Router 1000 series routers and Integration Services Router 1000 and 4000 series routers in combination with Cisco’s Digital Network Architecture of infringing Claims 9 and 17 of the ‘806 Patent. See PTX-1263 at 180 (highlighting Cisco networks are intent-based networks which provide “[p]erimeter-based, reactive security that has been supplanted by network-embedded, content-based security that reaches from the cloud to the enterprise edge”) (2019 document). 9. Additionally, Centripetal accuses Cisco’s Adaptive Security Appliance 5500 series with Firepower services and Cisco’s Firepower Appliance 1000, 2100, 4100, and 9330 series that run Firepower Threat Defense (“Cisco’s Firewalls”) with Firepower Management Center infringe Claims 9 and 17 of the ‘806 Patent. See PTX-1291 at 668 (noting the rule swapping procedures of the Cisco firewall products) (September 2017 document). 10. Cisco compiles source code for the accused switches, routers, and firewalls in the United States. Tr. 462:5-463:18, 464:4-14; PTX-1409 at 5-6. The accused products have a plurality of processors and computer memory which stores software instructions. Tr. 573:8-575:6, 642:4647:11. 11. Cisco’s Digital Network Architecture (“DNA Center”) is the management structure that allows the system to take in or utilize threat intelligence, operationalize it, and turn it into rules and policies that Cisco’s switches and routers use for security purposes. Tr. 451:3-24. 12. The DNA Center receives rule sets from various sources and preprocesses the rule sets to create optimized policies which are distributed to Cisco’s switches and routers. Tr. 575:15577:8, 579:18-580:24, 584:14-585:4, 586:15-587:18, 588:12-589:18, 2571:12-2573:8; PTX-992 at 2; PTX-1294 at 3 (2019 document). 100 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 101 of 178 PageID# 23987 13. Similar to the DNA Center, Firepower Management Center’s Threat Intelligence Director receives rule sets from various sources and preprocesses the rule sets to create optimized policies which are distributed to firewalls. Tr. 655:10-656:20, 673:21-675:5, 680:11-681:10; see Tr. 2537:3-7, 2539:11-17. 14. When new rules are available and sent to Cisco’s switches and routers by the DNA Center, the switches and routers will perform a rule swap without dropping any packets. Tr. 597:10-601:8, 606:15-608:14, 633:24-634:14; see also Tr. 2571:12-2573:8; PTX-1915; PTX-1195 at 001, 003-04. 15. Similarly, when new rules are available and sent to Cisco’s firewalls from the Firepower Management Center, Cisco’s firewalls will perform a rule swap without dropping any packets. PTX-1196 at 001, 007; Tr. 694:22-696:12, 698:8-22, 705:15-707:1. 16. Mr. Peter Jones 8, a distinguished Cisco engineer responsible for building the switching, routing and enterprise network, explained in detail how the accused products process packets and swap rules. Tr. 2543:9-11, 2561:25-2562:1. 17. Mr. Jones explained that the architecture that enables packet processing functionality within the switch and/or router is the Uniform Access Data Plane (“UADP”) processor. Tr. 2562:10-18; DTX-562 at 043. The figure below shows the core architecture in detail: 8 Mr. Jones was one of the architects for the design of the UADP processer used by Cisco’s accused switches and routers. Tr. 2549:10. He also provided multiple technical presentations regarding the operation of the UADP at many Cisco events. See DTX-562 at 006. 101 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 102 of 178 PageID# 23988 DTX-562 Cisco Technical Presentation on UADP Core Architecture in 2019 18. Mr. Jones noted that as packets arrive into a router and/or switch, they enter through the front panel ports and head into the Media Access Control Security (“MACSec”). Tr. 2567:1825. The MACSec serves as an encryption block. Tr. 2567:23. 19. The packet then moves into the Ingress FIFO. The FIFO, or First In First Out, is a small buffer that serves to order packets as they enter the device. Tr.2567:23-2568:3. 20. After the FIFO, the payload of the packet is then sent to the Packet Buffer Complex (“PBC”) for storage. Tr. 2568:4. Simultaneously, the header and address of the packet is sent to the Ingress Forwarding Controller. 21. The Ingress Forwarding Controller processes the packet by matching the header information to a variety of Access Control Lists (“ACL”) that are stored in the look-up tables. Tr. 2568:10-16. Based on those ACLs, the Ingress Forwarding Controller then decides to either drop the packet or transmit it forward. Tr. 2568:10-16. 102 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 103 of 178 PageID# 23989 22. Mr. Jones explicitly noted that if the packet is to be forwarded, it is sent to the Egress Forwarding Controller. Tr. 2568:21-24. He highlighted that the Egress Forwarding Controller operates identically to the Ingress Forwarding Controller. Tr. 2568:21-24. Therefore, for a second time on exit, the payload of the packet is sent to an egress Packet Buffer Complex while the header is sent to the Egress Forwarding Controller. Tr. 2568:21-24; PTX-1390 at 86. 23. It is in the Egress Forwarding Controller that the packet headers are again compared to ACLs that are located in the look-up tables. Tr. 2568:21-24. On egress, the packet can be dropped or further transmitted. Tr. 2568:21-24; PTX-1390 at 86. 24. If the packet is transmitted, it goes through an Egress FIFO, an Egress MACSec, and then out a port on the device. Tr. 2569:1-4. 25. Mr. Jones noted that the UADP operates on its own fixed time pipeline, meaning there will be a packet processed every two or four internal clock periods. The internal clock periods are not set to a normal time scale, but operate in milliseconds. Tr. 2554:22-24. 26. The accused products contain a new FED 2.0 Hitless ACL update. Tr. 3550:18-25. Mr. Jones testified that before the 2.0 Atomic Hitless feature was added to the accused products, performing rule swaps often resulted in a discard of a number of packets. Tr. 2552:20-23. Therefore, the new 2.0 Hitless version updated the products so that new ACLs can be placed into the device and be activated without displacing packet processing. Tr. 2551:2-5; PTX-1303 at 073. Compare the older ACL Process: 103 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 104 of 178 PageID# 23990 PTX-1195 at 003 Cisco FED 2.0 Hitless ACL Update Software Functional Specification 9 from July 2017 PTX-1195 at 003. 9 The 2.1 in front of Current ACL Change Flow within Exhibit PTX-1195 does not refer to a version number, but this is a numerical heading within the document. 104 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 105 of 178 PageID# 23991 With the new 2.0 Hitless ACL Update: PTX-1195 at 003 Cisco FED 2.0 Hitless ACL Update Software Functional Specification from July 2017 10 10 The 2.2 in front of Hitless (Atomic) ACL Change Flow within Exhibit PTX-1195 does not refer to a version number, but this is a numerical heading within the document. 105 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 106 of 178 PageID# 23992 In the same Cisco software technical specification, the requirements of the software dictate that “there will be a short period where both sets of VMR (“Virtual Media Recorder”) rule entries will be installed before the old entries are deleted.” See PTX-1195 at 003. Here is a copy of those Software Requirements: PTX-1195 at 003 Cisco FED 2.0 Hitless ACL Update Software Functional Specification from July 2017 27. ACLs are sent to switches and/or routers from a variety of sources - including Cisco’s Digital Network Architecture. Tr. 2571:12-17. In order to use the rules, the switches and routers must compile them. Tr. 2571:18-21. Accordingly, the DNA Center begins the process by signaling the switches and routers to perform a swap from old to new ACLs. Tr. 2572:14-17. 28. While the ACLs are being compiled within the device, the device uses the old rule set to process packets. Tr. 2571:22-2572:1. The device, after compilation is finished, then signals the processor to begin processing packets with the new updated ACL rule set. Tr. 2572:2-6. 29. This swap of ACL rules within the device occurs in the middle of the two to four clock cycles, when the device is operating in idle and there is no processing of packets. Tr. 2572:10-13. Accordingly, there is a short period where the VMR contains both sets of new and old rules will be installed before the old rules are cleared. See PTX-1195 at 003-04. 106 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 107 of 178 PageID# 23993 30. After the swap is complete, the device performs a memory write and shows a return success function to the end user. Tr. 2573:5-8. 31. After the return is complete, packets are then processed with the newly updated second rule set. Tr. 2572:14-17. 32. Cisco’s expert has failed to cite any technical document produced post June 20, 2017. Cisco’s expert witness relies on animations, produced ex post facto, which were designed for litigation and do not accurately portray the current functionality of the accused products. Exhibit DTX-562, which was altered from its original form as cited by Cisco’s employee Mr. Jones, had emphasis added to it to exclude egress from the presentation of Cisco’s expert Dr. Reddy. See supra sec. IV. Overview of the Evidence (discussing Dr. Reddy’s animations). 33. Cisco has not called any witness who authored any of the Cisco technical documents relied upon by Centripetal in their infringement case. ii. Conclusions of Law Regarding Infringement Based on the Court’s factual findings, Centripetal has proven by a preponderance of the evidence that the Cisco’s Catalyst 9000 series switches, the Aggregation Services Router 1000 series routers and Integration Services Router 1000 and 4000 series routers in combination with Cisco’s Digital Network Architecture literally INFRINGE Claims 9 and 17 of the ‘806 Patent. Additionally, the Court FINDS Cisco’s Adaptive Security Appliance 5500 series with Firepower services and Cisco’s Firepower Appliance 1000, 2100, 4100, and 9330 series that run Firepower Threat Defense (“Cisco’s Firewalls”) with Firepower Management Center literally INFRINGE Claims 9 and 17 of the ‘806 Patent. For Cisco, Dr. Narasimha Reddy testified regarding the ‘806 Patent as to infringement, validity and damages. Dr. Reddy opined that: 107 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 108 of 178 PageID# 23994 The accused product combinations do not infringe the ‘806 [P]atent. Secondly, if the Court were to find that the accused product combinations infringe, the asserted claims are invalid on existing prior art of Cisco before the patents were filed. And for damages, assuming that the products are found to be infringing and that the claims are valid, the contribution of the patent claims are minimal. Tr. 2580:15-23. Dr. Reddy advances three theories of non-infringement for the ‘806 Patent. He avers that the accused products: (1) do not cease processing of packets responsive to a signal; (2) do not cache the packets responsive to a signal; and (3) do not reprocess packets according to a second rule set. To prove that the products do not perform this functionality as required by the claims, Dr. Reddy relied on an animation produced for litigation that directly contradicts Cisco’s own employee testimony and Cisco’s own technical documents. Using this animation, Dr. Reddy opined that the Cisco products never cache or cease processing packets during a rule swap. Tr. 2610-2-8. Turning to the first theory, Cisco employee, Peter Jones, testified that in the operation of packet processing, Cisco’s switches and routers will store packets in a part of the UADP ASIC processor known as the Packet Buffer Complex (“PBC”). The PBC operates as a holding spot for the data in the payload of the packet while the header information is forwarded to another part of the processor for the application of rules. This operation in the Cisco switches and routers is designed to maximize the speed and efficiency of packet processing through software. Tr. 622:1618. Dr. Mitzenmacher highlights that computer scientists use the term buffer and cache interchangeably as a word denoting the use of memory to hold packets for a short period of time. Tr. 628:7-25. Dr. Mitzenmacher referenced that a buffer is a “memory that holds something . . . [o]ften for future use.” In reference to the Court’s question about defining a cache, Dr. Mitzenmacher gave a similar definition of cache in the following exchange: Q. What’s a cache? 108 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 109 of 178 PageID# 23995 A. A cache is also often used, is used in the same way as a memory for holding things. They’re very similar. And with a cache you don’t typically or necessarily have an ordering associated with it. I mean, it can have an ordering, but it doesn’t have to. But a cache is typically used as a memory that holds information that you expect to be using in the near future. Tr. 836:17-23. Martin Hughes, a Cisco Engineer, confirmed Dr. Mitzenmacher’s opinion that a packet buffer is a cache. Mr. Hughes was asked: Q. When the router products receive a packet, do router products store the packet in the cache? A. All products have packet buffers where packets are stored before processing. DTX-1650; see Tr. 628:3-25, 866:8-22. Based on this testimony, it is apparent that the Packet Buffer Complex within the accused switches and routers clearly acts as a memory storage to hold packet information for further use, and therefore performs the same function of a cache, however, Cisco uses a different nomenclature, calling it a packet buffer. Tr. 836:17-23. Accordingly, in the course of packet processing, the accused devices store packets in a cache as required by the claims. As their second theory of non-infringement, Cisco advances that the accused products do not cease processing of packets in response to a rule swap. Mr. Jones, a Cisco Engineer, testified contrary to this assertion. He explained that the newly compiled rules are swapped for the old rules in-between the two to four clock periods that occur within the switches and routers. This swap occurs directly during an idle period where the accused switches and routers are not processing any packets. Tr. 2572:10-20. Therefore, it is apparent that the switches and routers do cease packet processing, at least momentarily, to implement the newly compiled rule set. With regard to both of these theories, Cisco argues that because this process is the normal processing functionality of the accused products, Cisco cannot in theory infringe the claims of the ‘806 Patent. The Court disagrees with Cisco’s argument. It is true that the Cisco products do cache and cease processing packets during their normal packet processing operation. However, Cisco 109 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 110 of 178 PageID# 23996 has implemented the rule swap functionality outlined in the ‘806 Patent to greatly improve the security functionality of its products without dropping packets. The devices, in response to an initial signal, operate to stop processing packets during an idle period, and during the idle period, unprocessed packets are cached within the Packet Buffer Complex. This process is the exact functionality as described by the cease and cache elements of the ‘806 Patent. Lastly, Cisco argues that packets are not reprocessed by a second rule set as required by the claims. First, Cisco is incorrect when it states the claims require a reprocess of packets. The claims clearly state that all that is required is a process through a second rule set. JTX-2. In other words, packets must just be processed by the second rule set – not processed a first time then reprocessed as Cisco suggests. Second, Cisco’s non-infringement expert, Dr. Reddy, does not opine upon or even discuss the egress portion of a packet’s transmission through a switch, router or firewall. Mr. Jones and Cisco’s technical documents confirm that the accused devices apply rules on both ingress into the device and on egress out of the device. Therefore, in their operation, the devices are configured to apply one set of rules on ingress while the very same packet would be subject to a second set of rules on egress within the same device. This process would meet the claim language of the ‘806 Patent to process packets with a first rule set and then in accordance with a second rule set. Accordingly, the accused products practice every claim limitation in Claims 9 and 17 of the ‘806 Patent. Therefore, the Court FINDS the rule swap system instituted by the accused Cisco products literally infringe Claims 9 and 17 of the ‘806 Patent. 110 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 111 of 178 PageID# 23997 iii. Findings of Fact Regarding Validity 34. The priority date of the ‘806 Patent is January 11, 2013. 35. Cisco asserts the functionality from a previous Cisco switch, the Catalyst 6500, and the Cisco Prime Network Control System as prior art for the ‘806 Patent. Tr. 3023:23-25. 36. The prior art functionality asserted within the Catalyst 6500 contains the older version of the Atomic ACL Hitless Update. 37. The Atomic ACL Hitless Update, within the Catalyst 6500 switch, operates by adding a new Access Control List (“ACL”) in the Ternary Content-Addressable Memory (“TCAM”) alongside the old ACL, and merging the two lists together. DTX-686 at 001. This process often overwhelms the TCAM and causes packets to be unintentionally dropped. See DTX-686 at 037038. 38. The Atomic ACL Hitless Update was updated to the FED 2.0 version in 2017. PTX- 1195 at 001; Tr. 3036:12-3037:4. The FED 2.0 Hitless Atomic ACL Update Software Functional Specification shows the differences between the older version of Hitless and the new 2.0 version. PTX-1195 at 002-03; Tr. 3040:2-3042:20. The newer version is accused of infringement by Dr. Mitzenmacher within the Catalyst 9000 switches and accused routers. Tr. 3035:15-25. 39. The older version of Hitless operated by completely stopping the system, eliminating ACLs, merging and replacing those ACLs, then reactivating the processing system. Tr. 3034:23-3035:2. This system resulted in overlap between the old rules and the new rules within the TCAM. This caused packets to be dropped because old ACLs were being applied alongside the new ACLs, causing conflict and disruption. Tr. 3035:3-15, 3040:2-12; see PTX-1195 at 003. 111 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 112 of 178 PageID# 23998 40. The 2.0 Atomic ACL Hitless Update modified the process by eliminating the overlap and implementing rapid swap and replacement of the old ACLs with updated ACLs. Tr. 3041:7-18; see PTX-1195 (technical document from July 2017). 41. Cisco Prime Network Control System’s Release Notes show that Prime operated by monitoring and troubleshooting support for a maximum of packets through the 5000 series Cisco Catalyst switches, allowing viability into critical performance metrics for interfaces, ports endpoints, users and basic switch inventory. DTX-525 at 002. The Release Notes for Prime and Dr. Reddy’s testimony contains no mention of the preprocessing of rules or allowing switches to receive rules sent by Prime. Tr. 3043:10-24; see DTX-525 at 002. There is no evidence that the predecessor 6500 series switch, aided with Cisco Prime, could swap new rules for the old, as opposed to merging old and new rules together. iv. Conclusions of Law Regarding Validity Cisco asserts that the asserted claims of the ‘806 Patent are anticipated and/or are obvious based on the Atomic ACL Hitless Update in the Cisco Catalyst 6500 Supervisor Engine 2T and the Cisco Prime Network Control System. Tr. 2656:5-2657:22. Cisco’s invalidity expert, Dr. Reddy, presented various documents opining that the functionality of Claims 9 and 17 of the ‘806 Patent was included within the prior art. This Court disagrees with the conclusions of Dr. Reddy and FINDS the ‘806 Patent valid. First, the Atomic ACL Hitless Update embedded within the Catalyst 6500 was an older and different functioning process than that which was embedded within the accused switches and routers. The accused devices contain a FED 2.0 version of the Atomic ACL Hitless Update. As evidenced by Centripetal’s expert, Dr. Orso, and PTX-1195, this 2.0 version provided a meaningful update to the system by which old ACLs were swapped for new ACLs. See PTX-1195, 112 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 113 of 178 PageID# 23999 Tr. 3040:2-3042:20. The older version of the Hitless Update, embedded in the 6500, involved merger and application of old and new ACLs that resulted in disruption of packet processing and the unintentional dropping of packets. This rule swapping technique outlined by the ‘806 Patent solved the problem that the old Hitless Update was having. See JTX-2 col. 1 (noting that the ‘806 Patent was addressing the problems faced by network devices “processing packets in accordance with an outdated rule set”). Therefore, it is axiomatic that the claimed invention would have not been obvious in the prior art because the ‘806 invention of rule swapping was the solution to the exact problem outlined by the original Hitless Update. Second, the Cisco Prime technical documents do not contain any functionality of the asserted claims for the ‘806 Patent. The only document presented by Dr. Reddy identifies that Prime provided monitoring and troubleshooting support for Cisco’s switches. There is no clear and convincing evidence from Dr. Reddy’s testimony, or this one document offered by Cisco, that Prime served a similar function as Cisco’s Digital Network Architecture. Accordingly, there is not clear and convincing evidence for the Court to find that Prime caused the Cisco devices to receive first and second rule sets as required by the claims. Therefore, both asserted prior art references fail to teach the invention as described by Claims 9 and 17 of the ‘806 Patent. Accordingly, the Court FINDS that Cisco has not proven by clear and convincing evidence that the ‘806 Patent was anticipated or obvious. E. THE ‘205 PATENT i. Findings of Fact Regarding Infringement 1. The ‘205 Patent has been commonly known as the “dynamic security policy” Patent. Tr. 432:17-20. 113 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 114 of 178 PageID# 24000 2. The ‘205 Patent was issued on September 15, 2015. JTX-1. The application for the ‘205 Patent was filed on October 22, 2012. JTX-1. 3. The asserted claims of the ‘205 Patent are Claims 63 and 77 of the ‘205 Patent. Claims 63 and Claim 77 are, respectively, a system and computer readable media claim. 4. Claim 63 is laid out below: A system, comprising: a security policy management server; and one or more packet security gateways associated with the security policy management server, wherein each packet security gateway of the one or more packet security gateways comprises computer hardware and logic configure to cause the packet security gateway to: receive, from the security policy management server, a dynamic security policy comprising at least one rule specifying a set of network addresses and a Session Initiation Protocol (SIP) Uniform Resource Identifier (URI); receive packets associated with a network protected by the packet security gateway; perform, on the packets, on a packet by packet basis, at least one packet transformation function of multiple packet transformation functions specified by the dynamic security policy; encapsulate at least one packet of the packets that falls within the set of network addresses and matches the SIP URI with a header containing a network address that is different from a destination network address specified by the at least one packet and that corresponds to a network device configured to copy information contained in the at least one packet and to forward the at least one packet to the destination network address; and route, based on the header, the at least one packet to the network address that is different from the destination network address. JTX-1. 114 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 115 of 178 PageID# 24001 5. Claim 63 is identical to Claim 77 in every respect, except that Claim 77 is a computer readable media claim. Claim 77 substitutes the introductory language of Claim 63, replacing “[a] system, comprising: a security policy management server; and one or more packet security gateways associated with the security policy management server, wherein each packet security gateway of the one or more packet security gateways comprises computer hardware and logic configured to cause the packet security gateway to” with “[o]ne or more non-transitory computer-readable media having instructions stored thereon, that when executed, cause each packet security gateway of one or more packet security gateways associated with a security policy management server to:.” JTX-1. For purposes of infringement, the parties have treated the two claims as identical. 6. Dr. Moore, the inventor of the ‘205 Patent, characterizes the technology in the ‘205 Patent as Centripetal’s network protection system that enforces threat intelligence policies on network traffic. 7. Dr. Moore identified that there is a thriving ecosystem of companies that observe behavior on the internet and collect information on who are the cyber criminals, what computers are being controlled, and what types of attacks are being implemented. This information is collected and turned into threat intelligence. 8. Dr. Moore specifically credits the technology in the ‘205 Patent as a system for operationalizing threat intelligence into policies of rules that are uploaded into network devices to block dynamic threats. Tr. 321:5-9, 320:16-25. 9. Cisco’s expert on the ‘205 Patent, Dr. Kevin Jeffay, challenges Dr. Moore’s characterization by noting that the specific claims at issue have no relation to the blocking of malicious traffic. Instead, Dr. Jeffay characterizes the claims at issue as dealing with the 115 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 116 of 178 PageID# 24002 encapsulation, copying and forwarding of voice traffic over the internet. Tr. 2727:11-19, 2732:219. More generally, Dr. Jeffay describes the claims at issue as enabling law enforcement to potentially wiretap internet calls. Tr. 2732:13-16. 10. Centripetal accuses Cisco’s Catalyst 9000 series switches, the Aggregation Services Router 1000 series routers and Integration Services Router 1000 and 4000 series routers, in combination with Cisco’s Digital Network Architecture, of infringing Claims 63 and 77 of the ‘205 Patent. Additionally, Centripetal accuses Cisco’s Adaptive Security Appliance 5500 series with Firepower services and Cisco’s Firepower Appliance 1000, 2100, 4100, and 9330 series that run Firepower Threat Defense (“Cisco’s Firewalls”) with Firepower Management Center of infringing Claims 63 and 77 of the ‘205 Patent. Tr. 7235:16-20. 11. The accused switches, routers and firewalls have the ability to act as packet security gateways. Tr. 732:24-734:22, 735:15-20, 737:24-738:5. 12. Cisco’s Digital Network Architecture Center serves as the “foundational controller . . . at the heart of Cisco’s intent-based network . . . [and] provides a single dashboard for every fundamental management task.” PTX-1294. Accordingly, both the DNA Center and Cisco’s Firepower Management Center manage and update security policies that are employed by the accused devices. Tr. 728:21-730:9; 736:3-13; PTX-1294 at 15. 13. The accused devices process a certain type of network traffic sent by Session Initiation Protocol (“SIP”). Tr. 739:13-18, 2782:12-17; PTX-1408 at 19. SIP is one of the many protocols that is used to transmit information over the internet. Tr. 739:5-9. SIP is primarily used for the sending of voice data, but can be used for video and instant messaging. Tr. 739:5-9, 741:1524, 2729:13-19. 116 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 117 of 178 PageID# 24003 14. Each device, when making a call using SIP, has a unique identifier know as a SIP Uniform Resource Identifier (“SIP URI”) that functions similarly to a telephone number. Tr. 2729:16-23. SIP URI is embedded within SIP traffic to identify the party to the call. Tr. 2729:1623. 15. Cisco’s expert, Dr. Kevin Jeffay, opined that a SIP URI consists of SIP and then a unique identifier of the individual device that is being called. Tr. 2739:1-7. He provided an example of a SIP URI as sip:jeffay@unc.edu. Tr. 2739:8-10. 16. Dr. Jeffay’s opinion is confirmed by the Internet Engineering Task Force’s Request for Comment (“RFC”) 3261 that outlines the procedures for the SIP protocol. RFC 3261 confirms that a SIP URI contains the word SIP, and the document provides a specific example as “sip:user:password@host:port;uri-parameters?headers.” DTX-1296 at 148. RFC 3261 contains many examples of SIP URIs that all contain the word sip. DTX-1296 (listing examples of SIP URIs such as “sip:alice@atlanta.com.”). 17. Centripetal’s expert, Dr. Michael Mitzenmacher, presented that the Firepower Management Center enables the network firewalls to monitor traffic sent by SIP for network exploits. Tr. 748:6-13; PTX-1289 at 912. The technical documents confirm that if any SIP traffic is found to be a threat to the network, rules may be created to prevent any dangers to the network. Tr. 748:19-24; PTX-1289 at 912. 18. The accused products have the capability to handle SIP traffic and can block that traffic that is determined to be malicious. Tr. 750:11-17. 19. However, Dr. Mitzenmacher presented no technical documents that confirm that the accused firewalls have specific rules that contain both a network address and a SIP URI. Tr. 117 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 118 of 178 PageID# 24004 2756:18-2757:2. Furthermore, no Cisco technical document confirms that the accused switches and routers have any rules that contain both a network address and a SIP URI. Tr. 2756:18-2757:2. 20. Dr. Mitzenmacher and Cisco’s technical documents do confirm that the accused switches, routers and firewalls can forward and block packets. Tr. 754:11-756:7; PTX-1276 at 216; PTX-1493 at 009. 21. The accused devices can encapsulate and route packets. Tr. 756:8-758:21, 760:5- 764:16; PTX-1262 at 994; PTX-524 at 309; PTX-1229 at 69; PTX-1293 at 062. However, Dr. Mitzenmacher presented no evidence that the accused devices perform a “copying” of information contained in the packets. Tr. 2749:24-2750:4 (Dr. Jeffay confirming no testimony or evidence on copying). ii. Conclusions of Law Regarding Infringement Cisco expert, Dr. Jeffay, opined that the ‘205 Patent was not infringed for two distinct reasons. First, he opined that Centripetal’s infringement theory relies on the “blocking” of packets, but the asserted claims of the ‘205 Patent require encapsulation and forwarding. Second, he averred that Centripetal has not asserted any proof that the accused products have “at least one rule specifying a set of network addresses and a Session Initiation Protocol (SIP) Uniform Resource Identifier (URI),” as required by the claims. The Court agrees with Dr. Jeffay on both of his noninfringement theories. The Court affirms Dr. Jeffay’s characterization that the ‘205 Patent teaches a method of tapping internet-based phone communications and potentially video via the internet. It may be characterized as a method of spying upon or “hacking” internet communications, which is the converse of the four previous patents that are found as valid and infringed, the function of which is to provide network security. 118 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 119 of 178 PageID# 24005 On his first theory, Dr. Jeffay outlined the main focus of the invention in the ‘205 Patent is on Voice over IP traffic and the encapsulation and forwarding of data. He opined: Q. And turning to slide 5, how many disputes -- on the infringement issue, how many major disputes do you intend to focus on today? A. Well, in my report I documented several disputes, but in the interest of time, we’re going to focus on two here, and these are the two that I think are the easiest to see. And the first one is really sort of a black/white issue; that Centripetal’s theory of infringement focuses on the blocking of packets. And blocking has really been the key to most of this case; that the accused products block packets. But the ‘205 [P]atent is not about blocking packets, it’s about precisely the opposite. It’s about doing things that we’ll come to see are called encapsulation and forwarding, but the point here is that we want the packets to go through to their destination. We’re going to see that the patent is really about enabling law enforcement to potentially wiretap phone calls, so we want the package to go through. And so the ‘205 claims are really about the opposite of what we’ve heard in this case; they’re about letting packets make it to their destination. Tr. 2731:24-2732:19. Dr. Jeffay explained in detail Figure 6 of the ‘205 Patent, walking through the major outline of the invention, as described by the claims: 119 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 120 of 178 PageID# 24006 FIG. 6 from the ‘205 Patent Q. We’ve got figure 6 up now. Dr. Jeffay, could you, using figure 6, walk the Court through the major components of the claimed invention. A. Sure. So this is the world -- this a version of the world in which the claimed invention would operate. So let’s focus first on network A, which is in the upper left-hand corner. And in network A there is a device, UE 600. Now, UE in the patent stands for User Equipment, but what I’d like the Court to think of it -- think of it as a phone. And you can kind of see it’s drawn kind of like an iPhone. So it’s a phone. And what’s going to happen here is that this user in network A is going to make a phone call, a Voice over IP phone call, to a user in network B. So let’s highlight network B, which is on the lower right. And we can see that also there’s a UE 602, User Equipment, just basically another phone, that’s in network B. So a user in network A makes a call to a user in network B, and what the patent is about is using an SPM 120 -- SPM is going to stand for Security Policy Management server; this is the entity that creates security policies. The SPM is going to send a policy that contains a rule to a packet security gateway 112. So the packet security gateway is the thing that actually looks at the packets. Now the rule -- the policy contains a rule, and the rule that’s going to be sent to the packet security gateway is going to contain information to allow the packet security gateway to identify the packets corresponding to this Voice over IP phone call. And when it identifies the right kind of packets, what it’s going to do is a little unusual. It’s going to let the packets go through. It’s not going to block the packets, but it’s not going to send the packets 120 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 121 of 178 PageID# 24007 to their intended destination, which is network B. It’s going to send them to network C, which is shown on the lower left. And in network C you can see that there’s a monitoring device, and what’s going to happen is the packets are going to be routed from the packet security gateway, to network C, to this monitoring device. The monitoring device is then going to copy some information from the packets. It’s going to keep that copied information, because, in theory, that’s what law enforcement wants to see, but then we need the call to go through, so it’s -- the network device 608 is going to unencapsulate the packet, get the original packet, and send it on its way back to network B. Tr. 2735:5-2736:24. In this explanation of the claims, Dr. Jeffay noted explicitly that the claims do not require the blocking of packets because “[i]f the call is blocked, then the packets would be dropped at the packet security gateway 112, and there would be nothing to monitor.” Tr. 2742:1921. Based on an independent reading of the claims, the Court agrees with Dr. Jeffay that the scope of the asserted claims of the ‘205 Patent deal specifically with the functionality to encapsulate, copy and then forward on packets to a different network. To prove infringement, Centripetal’s expert Dr. Mitzenmacher specifically identified the ‘205 Patent as: Q. If we can go to your demonstrative, can you briefly explain what this is showing, in terms of the ‘205 [P]atent, with the dynamic security policy? A. As we’ve seen for all of these systems, they will be given threat intelligence, or gather or absorb threat intelligence, and they can use that to update the rules. In particular, just generally, they have dynamic security policies. They’re constantly getting new information, and over time, they will often update the rule sets in order to deal with new threats accordingly. Tr. 726:21-727:5. Dr. Mitzenmacher, in his infringement opinion, specifically focused on the use of threat intelligence being used to block malicious traffic in the network. In his testimony, Dr. Mitzenmacher confirms that the accused products can perform the encapsulation of packets. Tr. 756:8-758:21, 760:5-764:16. This is confirmed by the Cisco technical documents. PTX-1262 at 994; PTX-524 at 309; PTX-1229 at 69; PTX-1293 at 062. But the encapsulation of packets 121 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 122 of 178 PageID# 24008 described by Dr. Mitzenmacher and the technical documents is not all that is required by the asserted claims. This element of the claim reads: encapsulate at least one packet of the packets that falls within the set of network addresses and matches the SIP URI with a header containing a network address that is different from a destination network address specified by the at least one packet and that corresponds to a network device configured to copy information contained in the at least one packet and to forward the at least one packet to the destination network address . . . JTX-1 (emphasis added). Dr. Mitzenmacher presented no testimony or technical documents that confirmed that the accused products are “configured to” or have the ability to copy information, as outlined by the asserted claims. Tr. 2749:24-2750:4; see PTX-1262 at 994; PTX-524 at 309; PTX-1229 at 69; PTX-1293 at 062. Additionally, there is no evidence in the documents presented by Dr. Mitzenmacher that the encapsulated packets are those that “fall within the set of network addresses and matches the SIP URI with a header containing a network address . . . .” See PTX1262 at 994; PTX-524 at 309; PTX-1229 at 69; PTX-1293 at 062. For these reasons, Centripetal has failed to prove by a preponderance of the evidence that the accused products embody each and every limitation of the patented claim. See V-Formation, Inc. v. Benetton Group SpA, 401 F.3d 1307, 1312 (Fed. Cir. 2005). Turning to the second theory, Dr. Mitzenmacher presented no document that specifies that the accused products contain” at least one rule specifying a set of network addresses and a Session Initiation Protocol (SIP) Uniform Resource Identifier (URI),” as required by the claims. For the accused routers and switches, Dr. Mitzenmacher points to a presentation, PTX-1408, that shows that SIP traffic passes through Cisco’s products. This document’s mere mention of SIP traffic is not compelling evidence that Cisco’s routers and switches have rules that contain SIP URI and network addresses. See Tr. 2756:18-2757:2. PTX-1408. Similarly, for the accused firewalls, Dr. Mitzenmacher turns to PTX-1289 to show that the Cisco firewalls have four SIP keywords that 122 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 123 of 178 PageID# 24009 allow the user to monitor SIP traffic for exploits. PTX-1289 at 808. This document contains no mention of having specific rules that contain SIP URIs in combination with network addresses. Viewing all of the documents and testimony presented by Dr. Mitzenmacher, there is sufficient evidence to conclude that the accused products process SIP traffic. However, there is no compelling evidence to show that the accused products have rules that possess both a SIP URI and a network address, as required by the claims. See Tr. 2756:18-2757:2. Additionally, the Court FINDS that there is no infringement of the ‘205 Patent under the doctrine of equivalents. Dr. Mitzenmacher, in his equivalents testimony, stated: Q. So, go ahead. Can you, please, explain for the Court how the switches, routers, and firewalls perform substantially the same function. A. Certainly. So it provides substantially the same function, which is to block potentially malicious network traffic that’s been determined or related to a Session Initiation Protocol URI. It does this in the same way; by specifying a rule that would block this corresponding traffic. It may do so -- it does so by establishing a rule containing relevant SIP information, such as a domain or an IP address, and it achieves substantially the same result, which is to block that potentially – or create rules which would either block or monitor, or whatever action you want to take, on the corresponding Session Initiation Protocol traffic. Tr. 774:23-775:12. The Court has already determined that the asserted claims cover the encapsulation, copying and forwarding of packets. Blocking packets, as identified by Dr. Mitzenmacher, would not perform substantially the same function in substantially the same way as encapsulation, copying and forwarding. Accordingly, there is no infringement under the doctrine of equivalents. For both of these reasons, the Court FINDS that Centripetal has not met its burden to prove by a preponderance of the evidence that the accused products infringe Claims 63 and 77 of the ‘205 Patent literally or under the doctrine of equivalents. 123 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 124 of 178 PageID# 24010 iii. Validity During trial, Cisco withdrew its claim that the ‘205 Patent was invalid. Tr. 2795:16-24. Therefore, this Court will not address the validity of the ‘205 Patent as it is not required to rule upon the validity of a patent which has not been found infringed. VI. FINDINGS OF FACT AND CONCLUSIONS OF LAW REGARDING DAMAGES A. PAST DAMAGES i. Findings of Fact and Conclusions of Law Regarding Reasonable Royalty Base and Rate “Upon finding for the claimant the court shall award the claimant damages adequate to compensate for the infringement, but in no event less than a reasonable royalty for the use made of the invention by the infringer, together with interest and costs as fixed by the court.” Lucent Techs., Inc. v. Gateway, Inc., 580 F.3d 1301, 1324 (Fed. Cir. 2009) (quoting 35 U.S.C. § 284). In awarding damages under the governing statute, 35 U.S.C. §284, “a reasonable royalty is the minimum permissible measure of damages.” Deere & Co. v. Int’l Harvester Co., 710 F.2d 1551, 1558 n.9 (Fed. Cir. 1983). The Supreme Court has framed reasonable royalty damages achieved through litigation as a court’s duty to assess “the difference between [the patentee’s] pecuniary condition after the infringement, and what his condition would have been if the infringement had not occurred.” Yale Lock Mfg. Co. v. Sargent, 117 U.S. 536, 552 (1886). The burden of proving damages as a result of infringement falls on the patentee. Lucent Techs., Inc., 580 F.3d at 1324. The Federal Circuit has determined two acceptable “alternative categories of infringement compensation.” Id. The first category is based on a patentee’s lost profits. Id. To recover lost profits, “a patent owner must prove a causal relation between the infringement and its loss of profits.” Shockley v. Arcan, Inc., 248 F.3d 1349, 1362 (Fed. Cir. 2001). The patentee is required to “show a reasonable probability that ‘but for’ the infringing activity, the patentee would have 124 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 125 of 178 PageID# 24011 made the infringer’s sales.” Id. The four-factor test for utilizing the lost profit model is laid out in Panduit Corp. v. Stahlin Bros. Fibre Works, Inc., 575 F.2d 1152, 1156 (6th Cir. 1978). 11 The lost profits method is not at issue in this case since Centripetal has not presented any evidence of a causal relationship between suspected lost profits and Cisco’s sales of the infringing technology. The second category, which the Court adopts in this case, is based on the “the reasonable royalty . . . [the patentee] would have received through arms-length bargaining.” Lucent Techs., Inc., 580 F.3d at 1324. In determining this reasonable royalty, patentees have primarily used two distinct methods of calculation. “The first, the analytical method, focuses on the infringer’s projections of profit for the infringing product.” See id. (citing TWM Mfg. Co. v. Dura Corp., 789 F.2d 895, 899 (Fed. Cir. 1986) (describing the analytical method as “subtract[ing] the infringer’s usual or acceptable net profit from its anticipated net profit realized from sales of infringing devices”)). Here, there was insufficient evidence submitted to the Court based on the infringer’s profit projections and thus this method is inappropriate for calculating damages. “The second, more common approach, called the hypothetical negotiation or the ‘willing licensor-willing licensee’ approach, attempts to ascertain the royalty upon which the parties would have agreed had they successfully negotiated an agreement just before infringement began.” Id. The date used for the occurrence of the hypothetical negotiation is the date that infringement began. Wang Labs., Inc. v. Toshiba Corp., 993 F.2d 858, 870 (Fed. Cir. 1993). The evidence at trial supports a first infringement date of June 20, 2017. The Court FINDS the reasonable royalty method to be appropriate based on the evidence presented by both Centripetal and Cisco. 11 “To obtain as damages the profits on sales he would have made absent the infringement, i.e., the sales made by the infringer, a patent owner must prove: (1) demand for the patented product, (2) absence of acceptable non-infringing substitutes, (3) his manufacturing and marketing capability to exploit the demand, and (4) the amount of the profit he would have made.” Panduit Corp. v. Stahlin Bros. Fibre Works, Inc., 575 F.2d 1152, 1156 (6th Cir. 1978). 125 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 126 of 178 PageID# 24012 To determine a reasonable royalty, the Court bases its economic analysis on the factors laid out in Georgia-Pacific Corp. v. U.S. Plywood Corp., 318 F. Supp. 1116, 1120 (S.D.N.Y. 1970). Determining a reasonable royalty involves the Court’s analysis into each of the relevant GeorgiaPacific factors: (1) Any royalties received by the licensor for the licensing of the patent-in-suit, proving or tending to prove an established royalty. (2) The rates paid by licensee to license other patents comparable to the infringed patents. (3) The nature and scope of the license, as exclusive or non-exclusive, or as restricted or non-restricted in terms of its territory or with respect to whom the manufactured product may be sold. (4) The licensor’s established policy and marketing program to maintain its right to exclude others from using the patented invention by not licensing others to use the invention, or by granting licenses under special conditions designed to preserve that exclusivity. (5) The commercial relationship between the licensor and the licensee, such as whether or not they are competitors in the same territory in the same line of business. (6) The effect of selling the patented product in promoting other sales of the licensee; the existing value of the invention to the licensor as a generator of sales of its non-patented items; and the extent of such collateral sales. (7) The duration of the infringed patents and the term of the license. (8) The established profitability of the product made under the infringed patents; its commercial success; and its popularity. 126 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 127 of 178 PageID# 24013 (9) The utility and advantages of the patented invention over the old modes or devices, if any, that had been used for achieving similar results. (10) The nature of the patented invention; the character of the commercial embodiment of it as owned and produced by or for the licensor; and the benefits to those who have used the invention. (11) The extent to which the infringer has made use of the invention; and any evidence that shows the value of that use. (12) The portion of the profit or of the selling price that may be customary in the particular business or in comparable businesses to allow for the use of the invention or analogous inventions. (13) The portion of the profit that arises from the patented invention itself as opposed to profit arising from unpatented features, such as the manufacturing process, business risks, or significant features or improvements added by the accused infringer. (14) The opinion testimony of qualified experts. (15) The amount that a licensor (such as Centripetal) and a licensee (such as Cisco) would have agreed upon (at the time the infringement began) if both sides had been reasonably and voluntarily trying to reach an agreement; that is, the amount which a prudent licensee -- who desired, as a business proposition, to obtain a license to manufacture and sell a particular article embodying the patented invention -- would have been willing to pay as a royalty and yet be able to make a reasonable profit and which amount would have been acceptable by a patentee who was willing to grant a license. See Georgia-Pacific Corp. v. U.S. Plywood Corp., 318 F. Supp. 1116, 1120 (S.D.N.Y. 1970), modified sub nom. Georgia-Pacific Corp. v. U.S. Plywood-Champion Papers, Inc., 446 127 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 128 of 178 PageID# 24014 F.2d 295 (2d Cir. 1971). The Court will examine each of the relevant Georgia-Pacific factors that guide its determination of a proper reasonable royalty rate. 12 Beginning with Georgia-Pacific factors one and two, the only comparable license of the patents-in-suit is the Confidential Binding Term Sheet agreed to in a previous case tried by this Court – Centripetal Networks, Inc., v. Keysight Technologies, Inc. and Ixia, Case No. 2:17-cv-383 (E.D Va.). The Court is limited to this license granted by Centripetal as the only comparable license, as neither party presented any comparable licenses for similar patented inventions or similar infringing products. Tr. 1498:2-10. Although Cisco licensed Stealthwatch for a period of years from Lancope before Cisco acquired the company in 2013, neither Centripetal nor Cisco presented evidence of this or any other license in which Cisco was involved, and the Keysight agreement is the only licensing agreement in which Centripetal has been involved. The Keysight agreement was entered into by Centripetal and Keysight/Ixia during trial to settle the patent claims at issue in that litigation. The patents asserted in the Keysight case are comparable to those in this litigation. Both the ‘205 Patent and the ‘856 Patent were asserted in the Keysight case. The ‘176 Patent, the ‘193 Patent and the ‘806 Patent are in the same patent family and covered similar fields of technology as the patents that were asserted in Keysight. Therefore, the Keysight agreement covers sufficiently similar technology to serve as a comparable technology license in this case. The Keysight agreement granted Keysight/Ixia a three year “worldwide, non-transferable, irrevocable, non-terminable, non-exclusive license” to Centripetal’s worldwide patent portfolio in exchange for a $25 million-dollar lump-sum payment and a 10% royalty of directly competing products and a 5% royalty on non-competing products. See PTX-1125; Tr. 1487:5-1491:2. The 12 Certain factors may be relevant regarding other factors and, therefore, the Court will often address two factors at a time. Additionally, the Court may incorporate relevant information from one factor into its analysis of another factor. For example, the Court often uses factor fourteen (i.e., the opinion testimony of qualified experts) to support its analysis of other factors. 128 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 129 of 178 PageID# 24015 Court agrees with Centripetal’s damages expert, Lance Gunderson, that the 10% running royalty instituted in the Keysight agreement is sufficiently comparable to provide a starting point for determining a reasonable royalty based on a hypothetical negotiation. See Tr. 1486:1-24. This 10% royalty in Keysight was instituted for products that directly compete with Centripetal’s RuleGate gateway product. Cisco’s damages expert, Dr. Becker, contends that the Keysight license is not directly comparable because Keysight was a direct competitor in the threat intelligence gateway market, and Cisco is not. Although Centripetal does not market and sell switches and routers, Cisco has embedded the patented software functionality from the Centripetal patents into the infringing switches and routers that provides the same functionality as the RuleGate product. Centripetal does market and sell firewalls. Accordingly, the Court FINDS that Centripetal and Cisco are direct competitors with respect to the infringing software, as well as firewalls. This incorporation of infringing functionality persuades the Court that the infringing Cisco products are more comparable to the 10% royalty on competing products than the 5% royalty for non-competing products in Keysight. Accordingly, the 10% royalty on directly competing products in the Keysight case provides a comparable baseline license from which the Court can determine a reasonable royalty in this case. The Court recognizes that the Keysight license was obtained in the coercive environment of litigation and not the result of open negotiation. See LaserDynamics, Inc. v. Quanta Computer, Inc., 694 F.3d 51, 77 (Fed. Cir. 2012) (highlighting that “[t]he notion that license fees that are tainted by the coercive environment of patent litigation are unsuitable to prove a reasonable royalty is a logical extension of Georgia–Pacific . . .”). Generally, these types of settlement agreements “should not be considered evidence of an established royalty.” Id. (citing Hanson v. Alpine Valley Ski Area, Inc., 718 F.2d 1075, 1078-79 (Fed. Cir.1983). However, the Federal Circuit has recently 129 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 130 of 178 PageID# 24016 permitted reliance on such agreements “under certain limited circumstances.” Id. In the case of ResQNet.com, Inc. v. Lansa, Inc., the Federal Circuit “permitted consideration of the settlement license on remand” because the “settlement license to the patents-in-suit in a running royalty form was ‘the most reliable license in [the] record.’” Id. (discussing and quoting language from ResQNet); see ResQNet.com, Inc. v. Lansa, Inc., 594 F.3d 860, 872 (Fed. Cir. 2010). Similarly, here, the Court, has only one comparable license in the form of a settlement agreement from the Keysight case. The Court, in its use of this license to determine a reasonable royalty, heeds the guidance of the Federal Circuit to “consider the license in its proper context within the hypothetical negotiation framework to ensure that the reasonable royalty rate reflects “the economic demand for the claimed technology.” Id. Therefore, the Court will analyze the Keysight rate in the context of the other Georgia-Pacific factors to account for the similarities and differences in the Keysight license and the facts present in this case. See AstraZeneca AB v. Apotex Corp., 782 F.3d 1324, 1335 (Fed. Cir. 2015) (finding no error when the district court accounted for similarities and differences between past negotiations and the hypothetical negotiations); see also Elbit Sys. Land & C4I Ltd. v. Hughes Network Sys., LLC, 927 F.3d 1292, 1300 (Fed. Cir. 2019) (collecting cases that show it is appropriate to rely on prior licenses, even in a settlement context, when they are sufficiently compared to the facts and circumstances of the case at issue). Turning to Georgia-Pacific factor three, the scope and nature of the Keysight license weighs in favor of reducing the baseline royalty percentage, because the license presented to Cisco would be limited to the infringing patents instead of a full patent portfolio that was granted in Keysight. Consequently, the Court agrees with Dr. Becker that this factor promotes in favor of a royalty rate reduction. Tr. 2869:2-12. 130 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 131 of 178 PageID# 24017 Georgia-Pacific factor four has some influence on the royalty figure. The Court can infer that Centripetal was at least willing to license its patent portfolio to Keysight, for the terms outlined in the agreement, in order to settle ongoing litigation. This comparable license shows that Centripetal may have been willing to license the asserted patents to Cisco. It is a consideration that would sway the Court to adjust the royalty somewhat in a downward direction. The license is a major consideration in Centripetal’s request for injunctive relief. Georgia-Pacific factor five has minimal impact on the royalty figure. This factor asks the Court to inquire into the commercial relationship of the parties at the hypothetical negotiation. The Court notes that Centripetal has presented evidence that Cisco’s incorporation of the patented functionality into its products would result in substantial lost profits from the competing RuleGate product. Generally, this fact would weigh in favor of increasing the royalty as Centripetal, in the hypothetical negotiation, would consider the substantial loss that may be attributed to licensing the patented technology. 13 From Cisco’s perspective, it would gain substantially from licensing the asserted patents as it could incorporate advanced security functionality into its products, thus improving the profitability of its networking products. See Carnegie Mellon Univ. v. Marvell Tech. Group, Ltd., 807 F.3d 1283, 1304 (Fed. Cir. 2015) (noting “a basic premise of the hypothetical negotiation is the opportunity for making substantial profits if the two sides [are] willing to join forces by arriving at a license of the technology”). 13 “It is a step further, and we think a necessary one, to say that, when the patentee’s business scheme involves a reasonable expectation of making future profits by the continuing sale to the purchaser of the patented machine, of supplies to be furnished by the patentee, which future business he will lose by licensing a competitor to make the machine, this expectant loss is an element to be considered in retroactively determining a reasonable royalty.” Panduit Corp. v. Stahlin Bros. Fibre Works, Inc., 575 F.2d 1152, 1163 (6th Cir. 1978) (quoting Egry Register Co. v. Standard Register Co., 23 F.2d 438, 443 (C.C.A. 6th Cir. 1928)). 131 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 132 of 178 PageID# 24018 However, the Court must consider that Cisco has incorporated the infringing technology into hardware products, such as switches and routers, that Centripetal does not produce or sell. Additionally, even if Centripetal sold versions of the infringing products, it would be difficult to meet the customer demand of these products that Cisco, as the largest provider of network infrastructure and services in the world, would be able to accomplish. See Tr. 1449:17-1451:2. Therefore, Centripetal’s bargaining position in the hypothetical negotiation would be limited by the incentive of Centripetal to license the patented software technology to Cisco in order to take advantage of Cisco’s substantial market share. See Tr. 1449:17-1451:2. The Court FINDS that all these considerations generally neutralize each other and warrant no variance to the royalty number. Georgia-Pacific factor six does call for some upward influence. Cisco has incorporated the patented software functionality into a variety of its routers, switches and firewalls in its network security system. Therefore, the effect of the sales and the profits therefrom are promoted by Centripetal’s software. The upward influence is somewhat offset by the apportionment analysis of Centripetal’s experts. There was no evidence presented that the infringing products contributed to increased sales of any of Cisco’s other non-infringing products. Georgia-Pacific factor seven inquires as to the duration of the patent and terms of the license. The Court’s inquiry into the length of the license is more appropriately construed in terms of an ongoing royalty, and will be addressed in that portion of the Court’s findings. Georgia-Pacific factor eight deals with the profitability of products made under the patent and the commercial success of those products. One of Centripetal’s damages experts, Mr. Gunderson, presented detailed evidence of Cisco’s profitability of the infringing products. The Federal Circuit has expressly noted that “anticipated incremental profits under the hypothesized conditions are conceptually central to constraining the royalty negotiation . . . [and] . . . [e]vidence 132 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 133 of 178 PageID# 24019 of the infringer’s actual profits generally is admissible as probative of his anticipated profits.” Aqua Shield v. Inter Pool Cover Team, 774 F.3d 766, 772 (Fed. Cir. 2014); see Sinclair Refining Co. v. Jenkins Petroleum Process Co., 289 U.S. 689, 698 (1933) (noting “[e]xperience is then available to correct uncertain prophecy”). In the context of the hypothetical negotiation, “the core economic question is what the infringer, in a hypothetical pre-infringement negotiation under hypothetical conditions, would have anticipated the profit-making potential of use of the patented technology to be, compared to using non-infringing alternatives.” Aqua Shield, 774 F.3d at 77071 (emphasis in original) (noting that “[i]f a potential user of the patented technology would expect to earn X profits in the future without using the patented technology, and X + Y profits by using the patented technology, it would seem, as a prima facie matter, economically irrational to pay more than Y as a royalty—paying more would produce a loss compared to forgoing use of the patented technology”). As probative evidence of anticipated profits, Mr. Gunderson provided percentages of Cisco’s actual gross profit in the infringed products from June 20, 2017 to December 31, 2019: Product Gross Profit % Catalyst Switches 67.8% Aggregation Services Router 79.2% Integration Services Router 82.0% Adaptive Security Appliance 56.6% Firepower Appliance 71.1% Firepower Management Center 76.5% 133 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 134 of 178 PageID# 24020 Stealthwatch 81.4% Identity Service Engine 91.5% Digital Network Architecture -1.9% An examination of this data establishes that Cisco was reaping considerable profit margins on products that incorporate the infringing functionality. See Tr. 1495:16-1496:19. Moreover, a Cisco article, published on November 7, 2019, expresses the very high profitability of the new Catalyst 9000 series switches as compared to older models: PTX-515 Cisco Article Published on Website from November 7, 2019 134 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 135 of 178 PageID# 24021 135 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 136 of 178 PageID# 24022 PTX-515. Additionally, Cisco presented no evidence to contest these profit margins or the cost of any non-infringing alternative that would achieve the same functionality as incorporated in the patented technology. See Tr. 1602:8-16 (Mr. Malackowski noting that “Cisco did not suggest or offer any alternatives or even what it would cost to come up with alternatives”). Therefore, at a hypothetical negotiation, Centripetal would hold a considerable advantage due to the lack of noninfringing alternatives and the ability for Cisco to make large profits from the use of the technology. This evidence of high profits and lack of alternatives supports a higher reasonable royalty rate. See Lucent Techs., Inc., 580 F.3d at 1335 (noting that approximately 70–80% profit margin of the products at issue supports a higher versus a lower reasonable royalty). Additionally, Mr. Malackowski, Centripetal’s expert on patent evaluation, testified to his understanding that the Keysight license was structured in the manner it was due partly to the fact that Keysight had no available alternative to infringing the patent technology. See Tr. 1602:8-23. Accordingly, the 10% rate on competing products in the Keysight license had incorporated Keysight’s necessity of using the infringing technology. Here, similar circumstances would be prevalent at the hypothetical negotiation, such as Cisco’s “anticipated” profit margins in using the patented functionality and also the fact that there are no suitable alternatives available. Consequently, this factor supports the Court’s imposition of a higher royalty rate. Georgia-Pacific factor nine asks the Court to look at the utility and advantages of the patented property over the old modes or device. When developing its cybersecurity software system, Cisco repeatedly spent considerable monies to acquire smaller companies that produced software security technology. From 2013 to 2015, Cisco acquired Sourcefire for $2.7 billion, Lancope for $435 million and ThreatGRID for an undisclosed amount. See Tr. 1605:6-15. 136 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 137 of 178 PageID# 24023 Combinations of technology acquired from these companies form the basic elements of the older Cisco technology which preceded the infringing systems. See Tr. 1605:6-23. Cisco took the acquired technology and came up with what it described as the first cybersecurity solution of its type in the industry by adding Centripetal’s patented functionality. Accordingly, these dollar amounts that Cisco paid to acquire two of the three companies is compelling evidence that the underlying older components of the infringing system needed enhancement by adding the infringing functionality from Centripetal to become the industry leader in this new technology as it claims to be. During trial, each of Cisco’s experts on infringement, validity, and damages testified that the patented inventions add minimal value to the products. Their testimony is in direct conflict with Cisco’s technical and marketing documents which contribute the addition of the infringing functionality as a “breakthrough” in building “an intelligent platform with unmatched security.” PTX-1135 (Cisco Press Release from June 20, 2017, reproduced below); PTX-963. 137 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 138 of 178 PageID# 24024 138 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 139 of 178 PageID# 24025 Cisco repeatedly described the addition of Encrypted Traffic Analytics (“ETA”) as solving the “network security challenge previously thought to be unsolvable.” PTX-1135 (David Goeckeler, Cisco’s Senior Vice President of Sales, representing Cisco’s new technology). Additionally, these representations made by as dominant a company as Cisco would have a devastating impact upon Centripetal as the original inventor of the technology. Therefore, under factor nine, Cisco’s technical and marketing documents, as well as previous business acquisitions, support a higher royalty rate, as the addition of the infringing technology greatly improved Cisco’s sales and the profitability of its new infringing versions of the products over older models. See Deere & Co. v. Int’l. Harvester Co., 710 F.2d 1551, 1558 (Fed. Cir. 1983) (supporting a higher royalty rate in light of descriptions that the infringing product had a “bright future”). Cisco’s representations are confirmed by the increase in revenues from previous noninfringing versions of the products vs. the new infringing models. Moreover, the increase in revenues can be analyzed under Georgia-Pacific factor eleven to show the great extent which Cisco has made use of the patented invention. The Court, at the end of the trial, requested both parties to supplement their damages reports with revenue data from the predecessor products compared to the infringing products. See Tr. 2967:17-2973:5. This table summarizes Centripetal’s estimates regarding Cisco’s revenue increase for the infringing products, after the date of first infringement, as compared to the predecessor products sales for the fiscal year before June 20, 2017: 139 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 140 of 178 PageID# 24026 Product Increase in Revenues % Increase in Revenues $ (in millions) Switches 40.9% $3,973.4 Routers 13.2% 501.5 Adaptative Security / Firepower 29.5% 550.4 Stealthwatch 36.0% 70.2 Firepower Management Center 3.5% 1.7 Identity Services Engine 52.0% 225.3 Digital Network Architecture 14 100% 252.9 Total Increase 5,575.4 Tr. 3464:8-14 (Mr. Malackowski describing the increases in revenues for the infringing products). This data supports a finding that the addition of the infringing software functionality to older models of the infringing products support the economic reality of the enormous increase in revenues. There is no evidence that these increases in sales revenue were attributed to improvements in the hardware itself. The infringing software significantly improved existing hardware by not only adding security functionality, but speed and scalability as well. See Tr. 14 There is 100% revenue increase for the Digital Network Architecture, as this product was released in mid-2017, and had no defined predecessor. 140 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 141 of 178 PageID# 24027 2621:5-10, 2634:14-18 (showing how ASICs process packets at high speeds and how Centripetal’s rule swap technology aids that process and is disclosed in the ‘806 Patent); see PTX-547. PTX-547 Centripetal Demonstrative Presentation Presented to Cisco About Patented Technology 141 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 142 of 178 PageID# 24028 Viewing both Cisco’s technical documents, marketing representations and the sales data, the Court FINDS that the patented functionality added very significant value to the older technology. Therefore, this factor supports a substantially increased royalty figure. Accordingly, based upon its analysis of the Georgia-Pacific factors, the Court determines that the weight of the factors as a whole strongly favors Centripetal. As a result, the Court FINDS that the Keysight royalty rate of 10% of the apportioned value of its infringed technology is a reasonable royalty rate to compensate Centripetal for Cisco’s past infringement. This figure is supported both by the comparable factors in the Keysight license and the weight of the GeorgiaPacific factors. Now that the Court has determined a reasonable royalty rate, it must determine the proper royalty base to which to apply the rate in order to reach the final lump sum pretrial damages. Georgia-Pacific factor thirteen looks at the portion of the profit that arises from the patented invention itself as opposed to profit arising from unpatented features, such as the manufacturing process, business risks, or significant features or improvements added by the accused infringer. Therefore, instead of having a primary effect on the royalty rate, this factor is often used to determine the royalty base to which the rate is applied. With regard to the proper royalty base, the Federal Circuit has noted that patent damages awarded for infringement “must reflect the value attributable to the infringing features of the product, and no more.” Commonwealth Sci. & Indus. Research Org. v. Cisco Sys., Inc., 809 F.3d 1295, 1301 (Fed. Cir. 2015) (quoting Ericsson, Inc. v. D–Link Sys., Inc., 773 F.3d 1201, 1226 (Fed. Cir. 2014)). When an infringing product is comprised of multiple components, the infringing portions must be apportioned to represent the value contributed by solely the infringing functionality. See id. “The patentee must ‘give evidence tending to separate or apportion the 142 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 143 of 178 PageID# 24029 [infringer]’s profits and the patentee’s damages between the patented feature and the unpatented features, and such evidence must be reliable and tangible, and not conjectural or speculative.’” Finjan, Inc. v. Blue Coat Sys., Inc., 879 F.3d 1299, 1310 (Fed. Cir. 2018). The Federal Circuit has recognized “there may be more than one reliable method” in order to prove proper damages in an apportionment case. Id. at 1302. Therefore, the apportionment can be done by various ways including “by careful selection of the royalty base to reflect the value added by the patented feature, where that differentiation is possible; by adjustment of the royalty rate so as to discount the value of a product’s non-patented features; or by a combination thereof.” Ericsson, Inc. v. D-Link Sys., Inc., 773 F.3d 1201, 1226 (Fed. Cir. 2014). This flexibility in methodology is centered on “the difficulty that patentees may face in assigning value to a feature that may not have ever been individually sold.” Virnetx, Inc. v. Cisco Sys., Inc., 767 F.3d 1308, 1328 (Fed. Cir. 2014). Therefore, the integral inquiry is “whether the data utilized in the methodology is sufficiently tied to the facts of the case.” Finjan, Inc., 879 F.3d at 1301-02 (“[C]ourts must be proactive to ensure that the testimony presented—using whatever methodology—is sufficiently reliable to support a damages award.”). Sufficient reliability has “never required absolute precision in this task; on the contrary, it is well-understood that this process may involve some degree of approximation and uncertainty.” Virnetx, Inc., 767 F.3d at 1328. Here, Centripetal presented extensive apportionment evidence of the infringing products using the analysis of their apportionment expert, Dr. Striegel. Tr. 1337:19-1342:14. Before Dr. Streigel’s testimony, Cisco objected to Dr. Streigel’s apportionment opinion on the basis that his opinions do not satisfy the essential requirement for reliability under Daubert. Additionally, Cisco’s expert, Dr. Becker, contends that “Dr. Striegel didn’t do an incremental value analysis,” 143 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 144 of 178 PageID# 24030 and simply checked off functions as infringing that did not provide “any improvement to that aspect of the products.” The Court disagrees on both grounds. This is exactly the type of apportionment analysis that was performed in Finjan, Inc. v. Blue Coat Sys., Inc., for which the Federal Circuit found the jury was entitled to rely upon as substantial evidence to support damages. Finjan, Inc., 879 F.3d at 1313-14. In Finjan, Finjan’s expert, Dr. Layne–Farrar, used the defendant’s technical documents to separate the functionality of the accused product. Id. She assumed each box in a diagram of the product “represented one top level function and that each function was equally valuable.” Id. Dr. Layne-Farrar relied on deposition testimony from defendant’s employees and discussions with Finjan’s technical expert, who “identified certain components within the diagram that did and did not infringe.” Id. at 1313. Here, Dr. Striegel performed an almost identical type of apportionment analysis to that of Dr. Layne-Farrar in Finjan. Using Cisco’s technical specification of each of the products, Dr. Striegel identified the top-level functions of each of the products. Tr. 1337:21-23; see PTX-409. Dr. Striegel’s process of identifying the top-level functions by using Cisco’s technical documents is shown by slide eight from his demonstratives (using Catalyst Switches Product Overview, PTX409, as an example for the analysis done with each product): 144 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 145 of 178 PageID# 24031 SLIDE 8 FROM DR. STRIEGEL PRESENTATION See PTX-409 (for clear image of technical features). He then identified which of those top-level functions for each product are implicated by the asserted patents and their asserted claims. See PTX-1931. In order to analyze and present this technical apportionment, Dr. Striegel highlighted all of the materials he relied upon in this analysis: I looked at both public documentation as well as confidential documents including various articles, various videos, various tutorials. I also browsed through numerous depositions. I did have the opportunity to go and browse through the source code on-site. And then I also had discussions with our two other infringing technical experts, Dr. Cole and Dr. Mitzenmacher. Tr. 1338:9-15. This is exactly the type of materials relied upon by Dr. Layne-Farrar in the Finjan case, where the Federal Circuit determined that the jury was entitled to rely upon such information as substantial evidence to support a damages award. Accordingly, the Court FINDS that Dr. 145 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 146 of 178 PageID# 24032 Striegel’s analysis is admissible as “reliable and tangible” evidence of apportionment of the infringing products. See Ericsson, Inc., 773 F.3d at 1226 (highlighting that a court or jury must “apportion the defendant’s profits and the patentee’s damages between the patented feature and the unpatented features” using ‘reliable and tangible’ evidence”). Accordingly, the Court FINDS Dr. Striegel’s apportionment evidence and analysis to be a reliable method to determine a royalty base. As shown supra, Dr. Striegel opined on each of the infringing products, and determined how many of the top-level functions were implicated by infringement of the asserted patents. Dr. Striegel then determined an apportionment percentage for each of the infringing products based off this analysis. PTX-1931 is a summary of those findings made by Dr. Striegel (recreation of PTX-1931): Product Total # of Top- # Infringing Top-Level Apportionment Level Functions % 6 [’856 and ’193 Patent] 31% 15 Functions Catalyst Switches 13 5 [‘176 Patent] 4 [‘806 Patent] Integrated Services Routers 9 4 [All Patents] 44% Aggregated Services Routers 8 2 [All Patents] 25% 15 Even though Dr. Striegel found that six of the thirteen functions were infringed by the ‘856 Patent and ‘193 Patent, he relied on the lower apportionment percentage of 31%. Therefore, the Court adopts that number for its determination of the royalty base in lieu of the 46% alternative based on the ‘856 Patent and the ‘193 Patent. 146 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 147 of 178 PageID# 24033 Firepower / ASA 13 7 [‘806 Patent] 16 54% 10 3 [‘806 Patent] 30% Stealthwatch 5 4 [‘806 Patent] 80% Identity Services Engine 13 5 [‘856 Patent] 38% (including Firepower Management Center) Digital Network Architecture After Dr. Striegel’s technical apportionment, Centripetal’s expert on patent evaluation, Mr. Gunderson, applied these apportionment percentages to total sales revenues from the infringing products since the date of first infringement, June 20, 2017, through December 31, 2019. At the final damages hearing, these figures were updated through Cisco’s sales data ending on June 20, 2020 and totaled $21,467,079,878.00 billion. See Doc. 488, Ex. 7 (updated version produced at damages hearing). The Court adopts Centripetal’s exhibits outlining the sales revenues of Cisco. Cisco presented a patent by patent damages breakdown instead of a full picture of the sales of infringing products. The Court rejected the proposed patent by patent calculation of damages by Cisco’s expert Dr. Becker, in favor of the appointment method utilized by Centripetal’s experts approved by the Federal Circuit in Finjan, Inc. v. Blue Coat Sys., Inc., 879 F.3d 1299, 1310 (Fed. Cir. 2018). 16 Since the ‘205 Patent was found to not infringe the higher number of infringing functionalities found for the ‘806 Patent is used for the Firepower / ASA because this would be the most accurate apportionment ratio. The Court has removed the ‘205 Patent from Dr. Striegel’s chart and applied a 54% apportionment for products where the apportionment was based on the ‘205 Patent. See Doc. 488, Ex. 7. 147 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 148 of 178 PageID# 24034 Here is a reproduction of the apportionment percentages applied to Cisco’s gross revenues from June 20, 2017 through June 20, 2020, by using Centripetal’s update to PTX-1629, Doc. 488, Ex. 7: Product Invoice Gross Revenue Apportionment Apportioned Revenue June 20, 2017 – Factor June 20,2017 – June 20, 2020 17 Percentage June 20, 2020 Catalyst Switches $11,839,742,927 31% $3,670,320,307 Integrated Services Routers $2,375,633,299 44% $1,045,278,652 Aggregated Services Routers $3,456,557,172 25% $864,139,293 Firepower Appliance $2,283,221,005 54% $1,232,939,343 $428,380,587 54% $231,325,517 $67,635,757 54% $36,523,309 Digital Network Architecture $252,855,962 30% $75,856,789 Stealthwatch $266,052,460 80% $212,841,968 Identity Services Engine $497,000,709 38% $188,860,269 TOTAL $21,467,079,878 (billion) (plus subscription) Adaptative Security Appliance (plus subscription) Firepower Management Center 17 $7,558,085,447 (billion) As stated, supra, Centripetal’s exhibit outlining the sales revenues of Cisco goes from June 20,2017 to June 20, 2020. See Doc. 488, Ex. 7 (updated version produced at damages hearing). 148 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 149 of 178 PageID# 24035 Accordingly, based on Mr. Gunderson and the Court’s analysis, the Court FINDS that the correct apportioned royalty base is $7,558,085,447 18 for all of the infringing products based upon gross revenue through June 20, 2020. Doc. 488, Ex. 7. Moreover, as determined supra based on the Georgia-Pacific factors and the analysis of a hypothetical negotiation, the Court FINDS a 10% royalty is appropriate in this case. Accordingly, before the Court adjusts for enhanced damages, the total past damages award is $755,808,545 million (10% royalty rate applied to $7,558,085,447 million royalty base). ii. Findings of Fact Regarding Willful Infringement and Enhanced Damages 1. Centripetal’s RuleGate product practices the patents found to be infringing in this case. Centripetal marks its RuleGate product with the patents that it practices. Tr. 1203:12-1204:3; PTX-528; Tr. 1383:18-1385:15; PTX-1215. 2. In 2015, Centripetal CEO Stephen Rogers had a meeting with Pavan Reddy, a Cisco employee, where Mr. Rogers disclosed Centripetal product offerings and the effectiveness of their solutions. Mr. Reddy and Mr. Rogers had a follow-up meeting in 2015, where Centripetal provided a demonstration of their system and explained why it was an effective method of cyber defense. Tr. 256:8-257:12. 3. As a result of these meetings, on January 26, 2016, Centripetal and Cisco entered into a nondisclosure agreement (“NDA”), requiring Cisco to keep Centripetal’s confidential, proprietary or non-public information “strictly confidential” and “not use any Information in any manner . . . other than solely in connection with its consideration of” a possible partnership. Tr. 1213:16-20; PTX-99. 18 The royalty base begins with the gross sales of the infringing products, whereas the chart outlining the increase in sales of the infringing products as compared to pre-June 20, 2017 sales of Cisco’s predecessor products is estimated as $5,575.4 billion. 149 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 150 of 178 PageID# 24036 4. After Cisco executed the NDA, Centripetal, on February 4, 2016, presented in a WebEx meeting detailed, highly sensitive, confidential and proprietary information about its patented technology and products to Cisco, including details of its patented technology for the Asserted Patents. For example, Centripetal detailed how its “patented filter algorithms eliminate the speed and scalability problem,” how its “patented system, live update, and correlation technologies ‘automate workflow’ and how its “patented” “instant host correlation” conveys “real time analytics.” PTX-547 at 389-91; Tr. 258:21-25, 260:2-18; 1220:1-1222:25. 5. After the WebEx meeting, Cisco’s Engineer, TK Keanini, who attended the WebEx meeting, wrote an internal email, stating the team should “look at these algorithms” that Centripetal had and “study their [patent] claims.” Tr. 1128: 8-1129:5; PTX-134 at 3. 6. The next day, on February 5, 2016, Centripetal’s Jonathan Rogers sent an e-mail to Cisco summarizing the WebEx meeting, noting that Cisco “seemed to hone in on our filter technology and algorithms. The algorithms are a significant networking technology with broad application that we’ve productized for security. There were also a few questions on our patents...” Tr. 1226:10-1227:18; PTX-102; PTX-1046 7. There were a number of follow up meetings with Cisco, including a request from Cisco’s security architect, Joseph Muniz, who was very interested in Centripetal’s patented technology. He requested and received a demonstration of Centripetal’s patented RuleGate product, which he described in an online blog that educates Cisco employees entitled “Cool Tool: Centripetal Networks RuleGate – Threat Intelligence Tool,” and where he stated, “I found this tool to be a pretty cool new approach to leveraging threat data.” Tr. 1299:16-1300:7; 1308:5-15; PTX548, PTX-550 at 647-49, 51. 8. In November and December 2016, Cisco had several meetings with Oppenheimer 150 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 151 of 178 PageID# 24037 & Co., Inc. about Centripetal, pursuant to Centripetal’s engagement with Oppenheimer to evaluate companies who were interested in making a strategic investment in Centripetal. In December 2016, Oppenheimer presented to Cisco additional information about Centripetal, including a list of Centripetal’s patents issued at the time, product offerings that practice the patents, and a highly sensitive, detailed technical disclosure which detailed the core RuleGate functionalities covered by the Asserted Patents. Tr. 1235:11-20, 1237:25-1238:9, 1242:17-1243:11; DTX-1270 at 1, 2528, 30. 9. After all of these detailed meetings with Centripetal, Cisco released its “network of the future” products on June 20, 2017, which incorporated Centripetal’s patented technology. See PTX-1135. Below is Centripetal’s demonstrative, Slide 37, presented during opening statements which accurate reflects the evidence presented at trial surrounding the events of Centripetal and Cisco’s relationship 19. 19 This slide does not attempt to reflect the numerous “hits” on Centripetal’s website by Cisco’s employees. 151 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 152 of 178 PageID# 24038 SLIDE 37 FROM CENTRIPETAL’s OPENING STATEMENT iii. Conclusions of Law Regarding Willful Infringement and Enhanced Damages Under the patent damages provisions of 35 U.S.C. § 284, a court “may increase the damages up to three times the amount found or assessed.” Halo Elecs., Inc. v. Pulse Elecs., Inc., 136 S. Ct. 1923, 1931 (2016) (quoting 35 U.S.C. § 284). The use of “may” in the statute indicates that enhancement under § 284 is within the discretion of the district court. Id. The Supreme Court in Halo Elecs., Inc. v. Pulse Elecs., Inc., explicitly noted that a court exercising discretion to award enhanced damages merits an analysis of “the particular circumstances of each case” unencumbered by the “inelastic constraints” of a rigid framework. Id. at 1932. Although the statute does not include a “precise rule or formula” for an enhanced damages award, the “court’s discretion should be exercised in light of the considerations underlying the grant of that discretion.” Id. Halo, 152 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 153 of 178 PageID# 24039 additionally, mandated that the award of enhanced damages is governed by a preponderance of the evidence standard. Id. at 1934. Historically, enhanced damages have been reserved for infringement behavior that was found to be “egregious.” Id. (explaining “through nearly two centuries of discretionary awards and review by appellate tribunals, “the channel of discretion ha[s] narrowed . . . so that such damages are generally reserved for egregious cases of culpable behavior”). The Halo decision highlights that enhanced damages are warranted as a “punitive” or “vindictive” sanction for egregious conduct described as “willful, wanton, malicious, bad-faith, deliberate, consciously wrongful, flagrant or – indeed – characteristic of a pirate.” Id. at 1932. Additionally, the Supreme Court noted that even if these types of conduct traditionally underlie enhanced damages, there is no requirement that the court find egregious conduct to award enhanced damages. Id. at 1933. Accordingly, in deciding to award enhanced damages, a court, in its discretion, “should take into account the particular circumstances of each case,” while remembering the historical underpinnings that enhanced damages should generally “be reserved for egregious cases typified by willful misconduct.” Id. at 1933-34. The factors laid out in Read Corp. v. Portec, Inc., 970 F.2d 816, 826-827 (Fed. Cir. 1992), overruled on other grounds by Markman v. Westview Inst. Inc., 52 F.3d 967 (Fed. Cir. 1995), have been used post-Halo to aid a district court’s determination of whether a case’s circumstances warrant enhanced damages. See Mich. Motor Techs. LLC v. Volkswagen Aktiengesellschaft, No. 19-10485, 2020 U.S. Dist. LEXIS 122276, at *11 (E.D. Mich. July 13, 2020) (noting that the Read factors are a useful guide, but stating that Halo has eliminated “any rigid formula or set of factors”). These factors are not an exhaustive list, but provide a meaningful guide to determine if the infringer’s conduct was “willful, wanton, malicious, bad-faith, deliberate, 153 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 154 of 178 PageID# 24040 consciously wrongful, or flagrant.” See id.; Finjan, Inc. v. Blue Coat Sys., Inc., 13-CV-03999BLF, 2016 WL 3880774, at *16 (N.D. Cal. July 18, 2016) (applying the Read factors to determine if the infringing conduct warrants enhanced damages). The Read factors are: (1) deliberate copying; (2) defendant’s investigation and good faith-belief of invalidity or noninfringement; (3) litigation behavior; (4) defendant’s size and financial condition; (5) closeness of the case; (6) duration of the misconduct; (7) remedial action by the defendant; (8) defendant’s motivation for harm; and (9) attempted concealment of the misconduct. Green Mt. Glass LLC v. Saint-Gobain Containers, Inc., 300 F. Supp. 3d 610, 628 (D. Del. 2018) (citing Read Corp., 970 F.2d at 816, 826–27). The Federal Circuit in WBIP, LLC v. Kohler Co., distinctly declined to interpret Halo as changing the requirement that willfulness should be decided by the finder of fact before the court determines whether enhanced damages are warranted as a matter of law. See WBIP, LLC v. Kohler Co., 829 F.3d 1317, 1341 (Fed. Cir. 2016). Therefore, the Court, as fact-finder, will address the issue of willful infringement and enhanced damages in tandem, as the Read factors adequately address both issues. Moreover, the Federal Circuit has outlined that “[k]nowledge of the patent alleged to be willfully infringed continues to be a prerequisite” to the court finding that enhanced damages are warranted. Id. Therefore, prior knowledge of the patents at issue appears to be “a necessary but 154 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 155 of 178 PageID# 24041 not sufficient condition for an award of enhanced damages.” Mich. Motor Techs. LLC, 2020 U.S. Dist. LEXIS 122276, at *11-13 (collecting cases noting pre-suit knowledge of the patent is not alone sufficient to uphold a finding of willfulness and requires more factual allegations to meet Halo’s egregious conduct standard). Accordingly, in light of this guidance, the Court will first determine if Cisco has pre-suit knowledge of the patents at issue. Second, the Court will use the Read factors to aid its analysis of whether infringement of the patents was willful, and to what degree enhanced damages should be assessed under the circumstances. The Court FINDS that Cisco willfully infringed the ‘856 Patent, the ‘176 Patent, the ‘193 Patent, and the ‘806 Patent, therefore enhanced damages are warranted under the evidence. The facts illustrate that Cisco had pre-suit knowledge of Centripetal’s asserted patents. First, after signing an NDA, Centripetal presented a detailed PowerPoint presentation to Cisco employees that laid out their patented technology. PTX-547 at 389-91; Tr. 258:21-25, 260:2-18; 1220:1-1222:25. This meeting was presented by Jonathan Rogers, who testified that, at this meeting, he: highlighted the technologies that were patented. We had a number of questions there, and I was offering to have additional discussion on that, as well, if it would be helpful. Tr. 1227:15-18. Contemporaneous emails sent by Jonathan Rogers to the Cisco team state that he was willing to share more information on the patented technology, as the group asked, “a few questions on our patents.” PTX-102. This knowledge of the patents is confirmed by internal emails of Cisco’s engineer, TK Keanini, which detailed the type of functionality covered by Centripetal’s intellectual property and expressing interest in “study[ing] their claims.” PTX-134 at 3; see Tr. 1128:8-1129:5. Moreover, a third-party firm, Oppenheimer, met with Cisco to discuss Centripetal’s product offerings that practice the patents, and presented a highly sensitive, detailed 155 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 156 of 178 PageID# 24042 technical disclosure, which detailed the core RuleGate functionalities covered by the Asserted Patents. Tr. 1235:11-20, 1237:25-1238:9; 1242:17-1243:11; DTX-1270 at 1, 25-28, 30. Second, Centripetal has marked its RuleGate product with a notice indicating the patents practiced by the device. PTX-528 (showing a photograph of the RuleGate device clearly marked with the asserted patents). The evidence presented at trial indicates that the RuleGate device was presented and demonstrated to Cisco employees, indicating that they had direct contact with the label showing the practiced patents. See WBIP, LLC, 829 F.3d at 1342 (noting the marking of a device with the asserted patents is supporting evidence that the infringer knew of the patents). Accordingly, the pre-infringement events indicate that Cisco had direct knowledge of the asserted patents and the functionality of the claims. The Court broadly considers all the circumstances of the case, but several of the Read factors are particularly instructive in the Court’s analysis of enhanced damages. Turning to the Read factors, factor one inquires whether there was deliberate copying of the “ideas and design” of the elements of the claim or the commercial embodiment of the patent. See Read, 970 F.2d at 827 n.7; Arctic Cat Inc. v. Bombardier Recreational Prods., Inc., 198 F. Supp. 3d 1343, 1350 (S.D. Fla. 2016), aff’d, 876 F.3d 1350 (Fed. Cir. 2017). The case of Arctic Cat Inc. v. Bombardier Recreational Products, Inc has similar factual relation to the case here. There, defendant BRP had multiple meetings with Arctic Cat, including testing and demonstrations of its patented embodiment. Id. After meetings and testing, BRP stated that they were not interested in the technology and stopped negotiations with Arctic Cat. Id. Then, four years later, BRP began infringing Arctic Cat’s patents after abandoning its own process. Id. The district court found that BRP’s development of “a very similar system under these circumstances [was] strong evidence of copying and favor[ed] enhancing damages.” Id. Similarly, here, Cisco had multiple meetings with 156 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 157 of 178 PageID# 24043 Centripetal employees and provided detailed presentations of the patents and their functionality. See Georgetown Rail Equip. Co. v. Holland L.P., 6:13-CV-366, 2016 WL 3346084, at *17 (E.D. Tex. June 16, 2016), aff’d, 867 F.3d 1229 (Fed. Cir. 2017) (showing disclosure of patented systems under a non-disclosure as evidence of copying). As detailed in the Court’s factual findings, Cisco was provided with demonstrations of the product and confidential information regarding Centripetal’s proprietary algorithms. Within a year of these meetings, Cisco released the “network of the future,” involving the release of older products embedded with new software functionality that was outlined and detailed to them by disclosure of the patents and multiple technical discussions and demonstrations. The fact that Cisco released products with Centripetal’s functionality within a year of these meetings goes beyond mere coincidence. Therefore, the fact that Cisco’s system mirrors the functionality of the Centripetal patents is compelling evidence that damages should be enhanced for copying. See Crane Sec. Techs., Inc. v. Rolling Optics AB, 337 F. Supp. 3d 48, 57 (D. Mass. 2018) (“The Court observes that the similarities of RO’s technology to Crane’s patented invention, coupled with RO’s extensive knowledge of Crane’s intellectual property rights and products, support the inference of copying that favors enhancement.”) The second Read factor is “whether the infringer, when he knew of the other’s patent protection, investigated the scope of the patent and formed a good-faith belief that it was invalid or that it was not infringed.” Read, 970 F.2d at 827. Cisco presented no evidence of any such investigation and its own technical and marketing documents suggest it would have been difficult to form such a belief. With respect to Read factor three, Cisco’s trial attorneys’ hands were tied by Centripetal’s use of Cisco’s own technical documents, coupled with the adverse testimony of Cisco engineers. 157 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 158 of 178 PageID# 24044 Cisco had to shield the engineers who authored its current technical documents and the executives who praised its new security functionality for “solving problems previously thought unsolvable” from answering to their own writings and statements. On the other hand, while Cisco objected to trying the case on a video/audio platform, and specifically the platform upon which the Court’s staff was trained, its counsel teamed with Centripetal’s counsel to formulate protocols which expanded and improved upon the Court’s standard protocols to promote a more reliable and efficient trial by remote means. Counsel for both parties faithfully followed all of the protocols, were both very well prepared, were mostly courteous to one another and joined in congratulating the Court’s staff on its efficient handling of the trial. Accordingly, while this factor favors enhanced damages, it is mitigated by the professional performance of its trial counsel. The fourth Read factor looks at the infringer’s size and financial condition. Cisco represents itself as the largest provider of network infrastructure and services in the world. PTX570 at 991. As discussed supra, Cisco saw an increase of approximately $5.575 billion dollars over three years by adding the infringing functionality to the predecessor non-infringing product lines. Additionally, Cisco had substantial profit margins during the infringing period from 52% to 92% on the infringing products. 20 See Creative Internet Advert. Corp. v. Yahoo! Inc., 689 F. Supp. 2d 858, 866 (E.D. Tex. 2010) (showing high profit margins as evidence that favors enhanced damages). Accordingly, for a company as large as Cisco with these levels of revenues and profits, an enhanced damages award would not “unduly prejudice [Cisco’s] non infringing business.” Georgetown Rail Equip. Co., 2016 WL 3346084, at *19 (quoting Creative Internet Advert. Corp., 20 The Court leaves out the Digital Network Architecture from this range, as it represents a statistical outlier and it was stated that DNA was a new product with no defined predecessor. 158 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 159 of 178 PageID# 24045 689 F. Supp. 2d at 866). Therefore, based on Cisco’s immense size and commercial success with the infringing products, this factor weighs strongly in favor of enhanced damages. Read factor five deals with the closeness of the case. The Court FINDS that the rulings on the four patents that were found infringed and valid were clear and not a close call. In the presentation of its defense, Cisco repeatedly relied upon animations prepared ex post facto for trial, while ignoring their own technical documents. The great majority of the Cisco technical documents were introduced by Centripetal. Not only did the animations conflict with Cisco’s own technical documents, but in several instances contradicted Cisco’s employee witnesses. Cisco avoided calling the authors of its technical documents as well. There was no testimony that Centripetal attempted to broaden the reach of the four infringed patents, thus opening the door to additional prior art. See 01 Communique Lab., Inc. v. Citrix Sys., 889 F.3d 735, 742 (Fed. Cir. 2018). Nonetheless, Cisco, in its invalidity case, cited its old technology as prior art, while claiming its new technology did not infringe. This led to many inconsistencies in its evidence, on both issues. Of course, Cisco could not rely upon its own documents, as they proved Centripetal’s case. 21 Therefore, this factor weighs heavily in favor of enhanced damages. Read factor six addresses the duration of the misconduct and Read factor seven weighs the remedial action taken by the infringer. While Read factor nine looks at whether the infringer attempted to conceal any misconduct. 22 The infringing conduct has been continuous and unabated without any form of remedial action from June 20, 2017 to the present time. See Acantha LLC v. Depuy Synthes Sales, Inc., 406 F. Supp. 3d 742, 761 (E.D. Wis. 2019) (citing Broadcom Corp. v. Qualcomm Inc., No. SACV 05-467-JVS, 2007 U.S. Dist. LEXIS 62764, 2007 WL 2326838, at *3 21 The ruling on the ‘205 Patent was equally clear in favor of Cisco, yet this was the sole patent found not to clearly infringe. 22 Read factor eight addresses the infringer’s motivation for harm. There was no evidence presented on this factor. 159 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 160 of 178 PageID# 24046 (C.D. Cal. Aug. 10, 2007) (“The length of [defendant’s] infringement (approximately two years), coupled with the fact that infringement continued after [plaintiff] filed suit, supports an increase in damages.”)); see also Crane Sec. Techs., Inc. v. Rolling Optics AB, 337 F. Supp. 3d 48, 59 (D. Mass. 2018) (no remedial action supporting treble damages). Moreover, Cisco, through its course of conduct, continually gathered information from Centripetal as if it intended to buy the technology from Centripetal. Cisco, then, appropriated the information gained in these meetings to learn about Centripetal’s patented functionality and embedded it into its own products. See Liqwd, Inc. v. L’Oréal USA, Inc., No. 17-14-JFB-SRF, 2019 U.S. Dist. LEXIS 215668, at *21 (D. Del. Dec. 16, 2019) (noting how the defendants “concealed their misconduct in gathering information from the plaintiffs so as to create the infringing products” and weighing this factor in favor of enhanced damages). Therefore, all three of these factors weigh in favor of enhanced damages. The Court FINDS that Cisco did not advance any objectively reasonable defenses at trial as to the four infringed and valid patents including the ‘856 Patent, the ‘176 Patent, the ‘193 Patent, and the ‘806 Patent. Its non-infringement case was grounded upon their old technology. The infringing functionality was added to their accused products post June 20, 2017, and resulted in a dramatic increase in sales which Cisco touted in both technical and marketing documents. Cisco’s invalidity evidence often contradicted its non-infringement evidence and failed to recognize the new functionality which it copied from Centripetal during and after the Nondisclosure Agreement. PTX-99. It embedded the copied software functionality from the patents in its post June 20, 2017 switches, routers and firewalls and then ignored the accused products while claiming its pre-June 20, 2017 technology as prior art. Moreover, its damages evidence was deeply flawed in attempting to base its calculations on each patent separately instead 160 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 161 of 178 PageID# 24047 of considering its own sales of the infringing products. Again, the increase in its sales of the accused products illustrates how completely unrealistic its damages evidence was compared to the reality of the marketplace. Accordingly, in the exercise of its discretion, the Court considers the sound legal principles underlying the history of enhanced damages and FINDS this is an egregious case of willful misconduct beyond typical infringement. Halo Elecs., Inc., 136 S. Ct. at 1935. However, there are other considerations. Cisco did prevail as to one of the patents. In considering the cases awarding enhanced damages, and comparing these cases to this case, the Court FINDS that enhancing the damages by a factor of 2.5 is appropriate. Accordingly, the Court’s past damages award of $755,808,545 is properly enhanced by a multiple of 2.5 times to award lump sum past damages of $1,889,521,362.50. iv. Pre-judgment Interest 35 U.S.C. § 284 grants the Court discretionary authority to award interest and costs. 35 U.S.C. § 284; see General Motors Corp. v. Devex Corp., 461 U.S. 648, 653 (1983). The Supreme Court has interpreted the interest provision of section 284 and has instructed courts that prejudgment interest should ordinarily be awarded, “absent some justification for withholding such an award.” Id. at 657. The Supreme Court determined that the “fixed by the court” language in section 284 leaves the court’s some discretion in awarding pre-judgment interest. Id. at 656-57. In determining the rate of pre-judgment interest, “the district court has the discretion to determine whether to use the prime rate, the prime rate plus a percentage, the U.S. Treasury rate, state statutory rate, corporate bond rate, or whatever rate the court deems appropriate under the circumstances.” Century Wrecker Corp. v. E.R. Buske Mfg. Co., 913 F. Supp. 1256, 1280 (N.D. Iowa 1996) (citing Allen Archery, Inc. v. Browning Manuf. Co., 898 F.2d 787, 789 (Fed. Cir. 1990)). 161 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 162 of 178 PageID# 24048 Here, the Court will use the statutory post-judgment rate from the date of first infringement June 20, 2017, of 1.21%. See 28 U.S.C. § 1961. The Court calculates simple interest at the 1.21% rate over the infringement period of three years from June 20, 2017 to June 20, 2020 using the award of damages (excluding enhanced damages) of $755,808,545. This calculation makes an interest determination of $27,243,850. 23 The Court divides this number by two to account for the fact that infringement occurred over this three-year period. Accordingly, the total interest number awarded by the Court is $13,717,925. This interest is added to the final damages award, including the damages enhancement, to reach a final past damages award of $1,903,239,287.50. B. FUTURE DAMAGES “There are several types of relief for ongoing infringement that a court can consider: (1) it can grant an injunction; (2) it can order the parties to attempt to negotiate terms for future use of the invention; (3) it can grant an ongoing royalty; or (4) it can exercise its discretion to conclude that no forward-looking relief is appropriate in the circumstances.” Whitserve, LLC v. Comput Packages, Inc., 694 F.3d 10, 35 (Fed. Cir. 2012). As described herein, the Court has considered the evidence presented at trial and the arguments and proposed findings of fact and conclusions of law advanced by all parties, and FINDS that a permanent injunction is not appropriate relief for the infringement of the ‘856 Patent, the ‘176 Patent, the ‘193 Patent, or the ‘806 Patent, and that an ongoing, future royalty should be imposed for all four Patents. i. Injunctive Relief Centripetal requests injunctive relief with regard to Cisco’s firewall products. In order to merit injunctive relief, Centripetal must prove: “(1) that [they have] suffered an irreparable injury; (2) that remedies available at law, such as monetary damages, are inadequate to compensate for 23 This was calculated using a simple interest formula - I = P x R x T (27,243,850 = 755,808,545 x .0121 x 3). 162 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 163 of 178 PageID# 24049 that injury; (3) that, considering the balance of hardships between the [Proponents and Opponents], a remedy in equity is warranted; and (4) that the public interest would not be disserved by a permanent injunction.” eBay, Inc. v. MercExchange, LLC, 547 U.S. 388, 391 (2006). “[A]n injunction is a drastic and extraordinary remedy, which should not be granted as a matter of course.” Monsanto Co. v. Geertson Seed Farms, 561 U.S. 139, 165 (2010) (citing Weinberger v. Romero–Barcelo, 456 U.S. 305, 311-12 (1982)). “If a less drastic remedy . . . [is] sufficient to redress [Proponents’] injury, no recourse to the additional and extraordinary relief of an injunction [is] warranted.” Id. at 165-66. If the Court were to grant an injunction, it would do so on every infringing product and not solely on Cisco’s firewalls, as Centripetal originally requested. 24 Moreover, the test for injunctive relief is not met in this case. Cisco’s switches, routers, and firewalls make up large portions of the global internet infrastructure. These products are components of both civilian and military networks. Therefore, granting an injunction on the infringing products will likely cause massive adverse effects on the functional capabilities of Cisco’s customers and have an adverse ripple effect on national defense and the protection of the global internet. Therefore, as to factor two, monetary damages are more appropriate to compensate Centripetal for patent infringement. The Keysight license shows that Centripetal is willing to patent its technology to direct competitors. Courts have stated that an injunction is improper where a patent owner has shown that they are willing to accept monetary damages. See EcoServices, LLC v. Certified Aviation Servs., LLC, 340 F. Supp. 3d 1004, 1023 (C.D. Cal. 2018); Cave Consulting Grp., LLC v. Optuminsight, Inc., No. 5:11-CV-00469-EJD, 2016 WL 4658979, at *21 (N.D. Cal. Sept. 7, 2016) (finding that where a patent holder is willing to “forego its patent rights for 24 Centripetal later expanded its request for injunctive relief to additional products. While EBay factor one has been clearly proven, factor two has clearly not. 163 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 164 of 178 PageID# 24050 compensation,” “monetary damages are rarely inadequate”); see also Advanced Cardiovascular Sys., Inc. v. Medtronic Vascular, Inc., 579 F. Supp. 2d 554, 560 (D. Del. 2008) (“The fact that [plaintiff] was selective regarding its licensing compensation—exchanging its technology only for other licenses to competing technology—does not rectify the fact that [plaintiff] was willing, ultimately, to forego its exclusive rights for some manner of compensation. Money damages are rarely inadequate in these circumstances.”). As to factor three, the greater hardship would clearly impact Cisco. Factor four, the public interest, does not support injunctive relief for the same reasons outlined as to factor two. Accordingly, for these reasons, the Court FINDS that an injunction is not an appropriate legal remedy for Cisco’s infringement. ii. Ongoing Royalty Rather, the Court FINDS that an ongoing royalty is proper in this case. An ongoing royalty is essentially a compulsory license for future use of the patented technology during the life of the patents. Indeed, pre-verdict and post-verdict royalties are “fundamental[ly] differen[t].” XY, LLC v. Trans Ova Genetics, 890 F.3d 1282, 1397 (Fed. Cir. 2018). When setting an ongoing royalty for future use, the district court should consider “the change in the parties’ bargaining positions, and the resulting change in economic circumstances.” See id., (“When patent claims are held to be not invalid and infringed, this amounts to a ‘substantial shift in the bargaining position of the parties.”’) (quoting ActiveVideo Networks, Inc. v. Verizon Commc’ns, Inc., 694 F.3d 1312, 1342 (Fed. Cir. 2012)). Such differences include a Court’s determination that certain of the patents at issue are valid, enforceable, and would be infringed by the accused products. See id. The Court should analyze future royalties in the context of the Georgia-Pacific factors. Indeed, this is the approach adopted by other district courts, after modifying the Georgia-Pacific analysis to resolve any uncertainty as to whether the accused product will infringe the patent 164 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 165 of 178 PageID# 24051 claims, whether the asserted patents are enforceable, and whether the asserted patent claims are valid. See Creative Internet Advert. Corp. v. Yahoo! Inc., 674 F. Supp. 2d 847, 860 (E.D. Tex. 2009); Paice LLC v. Toyota Motor Corp., 609 F. Supp. 2d 620, 623-24 (E.D. Tex. 2009); Boston Sci. Corp. v. Johnson & Johnson, No. C 02-00790 SI, 2009 WL 975424 (N.D. Cal. Apr. 9, 2009). As discussed supra, this Court has analyzed the Georgia-Pacific factors in the context of past damages. The Court, here, incorporates its analysis of the previous Keysight license but takes into consideration the distinct differences in determining a past damages award as opposed to an ongoing royalty. Therefore, as it did before, the Court FINDS the Keysight license as a comparable license for use in determining ongoing royalties. In light of that, the Court FINDS an appropriate future royalty is 10% on the APPORTIONED REVENUES OF THE INFRINGING PRODUCTS FOR THREE (3) YEARS, beginning June 21, 2020 and payable annually beginning June 20, 2021, without interest. The revenues shall be apportioned in the same manner as the pre-judgment damages, and shall apply to the infringing technology as described in the Court’s Findings of Fact and Conclusions of Law. Successor products to the infringing product shall pay the same percentage royalty on sales revenue as applied to the current infringing products, so long as the successor products contain any technology found to infringe in this Opinion and Order. As to the four patents infringed, assigning different nomenclature to infringing products, or to Cisco’s software technology found to infringe, shall not relieve Cisco of its obligation to pay its royalty. After this three-year term, the Court FINDS the royalty should be decreased to 5% FOR ANOTHER THREE (3) YEAR TERM. Due to Cisco’s dominant position in the cyber security software and firewall markets and the resulting damage to Centripetal as the first inventor the Court FINDS a six year term is called for in lieu of the three year term agreed upon in Keysight. Similar to the Keysight license, the Court imposes a minimum and maximum on the imposed 165 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 166 of 178 PageID# 24052 ongoing royalty. For the first three-year term at 10%, such annual royalty shall not be less than $167,711,374.10 and shall not be more than $300,076,834. For the second three-year term at 5%, such annual royalty shall not be less than $83,855,867.00 and shall not be more than $150,038,417. The maximum and minimum of each year is based upon the highest and lowest years of apportioned revenues per a full year of infringement from the 2017-2020 time frame. See Doc. 411 Ex. 7. Similarly, the maximum and minimum is reduced by one-half during the second three year term to reflect the reduced royalty rate. See id. At the conclusion of this second term of three years, there shall be no further monetary payments or other relief for the sale or use of the infringing products or their successors 25. VII. CONCLUSION For the reasons stated within, the Court FINDS the ‘856 Patent, the ‘176 Patent, the ‘193 Patent, and the ‘806 Patent claims valid and literally INFRINGED and the ‘205 Patent NOT INFRINGED. The Court FINDS the actual damages suffered by Centripetal as a result of infringement total $755,808,545; that the infringement was willful and egregious and shall be enhanced by a factor of 2.5x to equal $1,889,521,362.50. The Court awards pre-judgment interest of $13,717,925 applied to the actual damages before enhancement plus its costs. This, accordingly, equals a total award of $1,903,239,287.50 payable in a lump sum due on the judgment date. The Court, additionally, imposes a running royalty of 10% on the apportioned sales of the accused products and their successors for a period of three years followed by a second three year term with a running royalty of 5% on said sales upon the terms described supra. It DENIES any further relief to Centripetal at the termination of the second three year term. 25 The minimums and maximums are based upon the minimum apportioned annual revenue of $167,711,374.10 for the period of June 20, 2017 to June 20, 2018 and the maximum apportioned annual revenue of $300,076,834.00 for the period of June 20, 2018 to June 20, 2019. 166 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 167 of 178 PageID# 24053 The Clerk is REQUESTED to electronically deliver a copy of this Opinion and Order to all counsel of record. It is SO ORDERED. /s/ HENRY COKE MORGAN, JR. SENIOR UNITED STATES DISTRICT JUDGE October 5, 2020 Norfolk, Virginia 167 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 168 of 178 PageID# 24054 APPENDIX A EXPLANATION OF ABBREVIATIONS Computer engineers use abbreviations to describe basic functionality as well as to describe the specific functionality of individual patented technology. To assist with interpreting their testimony and documents, the Court has compiled a list of the abbreviations used in the testimony and documents cited in this opinion. ACL Access Control List ACE Access Control Entry ANC Adaptive Network Control ASA Adaptive Security Appliance ASDM Adaptive Security Device Manager ASR Aggregation Services Router ASIC Application-Specific Integrated Circuit CLI Command Line Interface CPU Central Processing Unit CRM Computer-Readable Media CSIRT Computer Security Incident Response Team CTA Cognitive Threat Analytics CTI Cyber Threat Intelligence DNA Digital Network Architecture Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 169 of 178 PageID# 24055 DNS Domain Name Server DOE doctrine of equivalents ETA Encrypted Traffic Analytics FC Flow Collector FMC Firepower Management Center GACL Group Access Control List HTTP/HTTPS HyperText Transfer Protocol (Secure) ISE Identity Services Engine IDP Initial Data Packet IDS Intrusion Detection System IOS-XE Internetwork Operating System – XE IT Manager Information Technology Manager ISR Integrated Services Router IP Internet Protocol IPR inter partes review IPS intrusion prevention system IDS intrusion detection system 2 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 170 of 178 PageID# 24056 ML Machine Learning NAT network address translation NSEL NetFlow Secure Event Logging PBC Packet Buffer Complex PTAB Patent Trial and Appeals Board SD-Access Software Defined Access SGACL Security Group Access Control List SGT Security Group Tag SPLT Sequence of Packet Lengths and Times SIO Security Intelligence Operations SIP Session Initiation Protocol Stealthwatch Stealthwatch Enterprise SLIC Stealthwatch Labs Intelligence Center SMC Stealthwatch Management Console SMTP Simple Mail Transfer Protocol SNI Server Name Indication SSL Secure Sockets Layer 3 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 171 of 178 PageID# 24057 TID Threat Intelligence Director TCAM Ternary Content-Addressable Memory TCP Transmission Control Protocol TCP/IP Transmission Control Protocol/Internet Protocol TLS Transport Layer Security UADP Unified Access Data Plane URI Uniform Resource Identifier URL Uniform Resource Locator VoIP Voice over Internet Protocol VMR Virtual Media Recorder VPN Virtual Private Network 4 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 172 of 178 PageID# 24058 APPENDIX B OUTLINE OF COURT’S PROTOCOLS FOR TRIAL B. Exhibits 1. Exhibit Lists The parties have segregated the documents, summaries and other exhibits that may be offered into evidence at trial into exhibit lists. A joint Exhibit List, including documents identified by both parties and not objected to, is attached as Exhibit A; Centripetal's Exhibit List and Defendants' objections thereto are attached as Exhibit B; Defendants' Exhibit List and Centripetal's objections thereto are attached as Exhibit C. The parties reserve the right to object to any additional documents sought to be added to the Exhibit Lists and further reserve the right to object to any additional documents added to the Exhibit Lists under the Federal Rules of Evidence, the Federal Rules of Civil Procedure, or any other appropriate basis. 2. Efforts to Resolve Objections The parties have been working diligently to resolve or narrow all objections lodged as to their respective exhibits. The parties have successfully resolved many objections and will continue their effo1is to resolve the objections to each other's proposed exhibits. 3. Exhibits to Which No Objections Have Been Made The parties agree that the documents, summaries and other exhibits listed on their Exhibit Lists to which no objection has been specified may be introduced into evidence, without the necessity of further proof of admissibility through a witness, subject to foundational requirements, provided that a witness offers testimony about the exhibit at trial, either live or by deposition. This is without prejudice to motions in Limine and Daubert motions concerning certain of these documents and related testimony. Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 173 of 178 PageID# 24059 4. Cross Examination and Impeachment Exhibits The Exhibit Lists set forth the parties' exhibits for their respective cases-in-chief; the lists do not include potential cross examination or impeachment exhibits that may or may not be introduced into evidence. The Exhibits Lists also include documents relied upon by experts in rendering opinions which may or may not be introduced into evidence. The parties reserve the right to offer exhibits for purposes of impeachment that are not included in the Exhibit Lists. 5. Authenticity Stipulations For Exhibits The Parties stipulate to the authenticity of each document that on its face appears to be generated by a party (plaintiff or defendant), including documents generated by its employees during the course of their employment for a party, and produced in this case by that party. Notwithstanding this stipulation, each party preserves its right to object to the document on any ground other than authenticity. C. Procedures Regarding Witnesses and Exhibits The parties are required to disclose the expected order in which the witnesses will be called, and use good faith in identifying non-demonstrative exhibits that are intended to be used in the direct testimony of each witness or as part of opening statements. Each party must identify to opposing counsel the identity of any live witnesses to be called at trial (and the order in which they will be called) by no later than 6:30 p.m.26three (3) calendar days before the trial day on which that witness is expected to testify (e.g., witnesses to be called on Tuesday must be disclosed by 6:30 p.m. the preceding Saturday). Except for when a fact witness is testifying during trial, fact witnesses are not permitted to witness or have access to the trial proceedings in any manner until after that fact witness has 26 All times identified herein are Eastern Time. 2 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 174 of 178 PageID# 24060 completed all testimony that witness will provide at trial. The only exception is the parties' client representative, who will be allowed to witness and have access to the trial proceedings, even if testifying in the case. Expert witnesses may have access to the trial proceedings while other witnesses are testifying. Any exhibits to be used on direct examination with any live witness must be identified by no later than 7 p.m. two (2) calendar days before the start of the trial day on which that exhibit will be offered (e.g., the exhibit(s) for witnesses to be called on Tuesday must be disclosed by 7 p.m. the preceding Sunday). Objections to exhibits disclosed by a party must be provided by 8 p.m. two (2) calendar days before the start of the trial day on which that exhibit will be offered (e.g., objections to exhibits for witnesses to be called on Tuesday must be provided by 8 p.m. the preceding Sunday). The parties will each designate one or more counsel who shall meet and confer regarding any such objections by 8:30 p.m. on the day when the objections are provided. The notice provisions above shall not apply to illustrative exhibits created in the virtual courtroom during testimony or to the enlargement, highlighting, ballooning, or excerpting of trial exhibits, demonstratives, or testimony, so long as the underlying exhibit is pre-admitted or the party has identified the exhibit or deposition testimony according to the agreed schedule. The parties will cooperate in seeking to have the Court resolve any objections they are unable to resolve among themselves prior to the proposed testimony. Each party will deliver exhibits to the Court that it anticipates using on direct examination by 9 a.m. ET the day of the direct examination in the form of a witness binder. Each party will deliver exhibits to the Court 3 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 175 of 178 PageID# 24061 that it anticipates using on cross-examination by 9 a.m. ET the day of the cross-examination, and to opposing counsel by e-mail prior to commencing cross-examination. Any document that on its face appears to have been authored or prepared by an employee, officer, or agent of a party, or was produced from the files of a party, shall be deemed primafacie authentic under F.R.E.901 and 902, subject to the right of the party against whom such a document is offered to introduce evidence to the contrary. The parties reserve the right to add additional deposition designations to establish the foundation and authenticity of an exhibit to the extent the admissibility of a particular document is challenged. Legible or better quality copies may be offered and received in evidence in lieu of originals thereof, subject to all foundational requirements and other objections which might be made to the admissibility of such originals, and subject to the right of the party against whom they are offered to inspect an original upon request. The parties may use electronic, native versions of exhibits that are spreadsheets or slide presentations to the extent such documents were produced during discovery or otherwise agreed to by both parties. D. Procedures Regarding Deposition Testimony and Discovery Response Designations The parties are required to provide opposing counsel the identity of any deposition designations or designations of discovery responses and a list of any exhibits to be introduced along with those designations according to the schedule set forth above for disclosure of witnesses/exhibits. Objections and counter-designations to any such designations disclosed by a party will be provided according to the schedule set forth above for objections to exhibits. For 4 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 176 of 178 PageID# 24062 deposition testimony, the party introducing the deposition testimony shall be responsible for editing the deposition testimony to include the testimony and any counter-designation testimony, and remove any attorney objections, and provide a final version of the deposition testimony excerpts (testimony clip report) to the other party by 6:30 p.m. the day before the testimony is to be submitted, read or played to the Court. The parties will each designate one or more counsel who will meet and confer regarding any objections, including objections to any applicable counterdesignations 27, by 8:30 p.m. the same day that such objections are disclosed. The parties will cooperate in seeking to have the Court resolve any objections they are unable to resolve among themselves prior to the proposed testimony or presentation of a discovery response. Each side is to provide the discovery response or deposition testimony excerpts of the specific portions of the deposition video(s) to be played or read, to opposing counsel and to the Court at the time each such designation is presented to Court. The parties agree that any counter-designations, to which the other party did not object or to which the Court overruled the objection, will be included in the designation of discovery responses or testimony clip report of deposition designations, and that passages of testimony from a deposition will be presented chronologically. The parties further agree to withdraw any objections or attorney colloquy contained with the deposition designations by both sides to the extent possible. For allocating time between the parties for witnesses presented by deposition, witnesses presented by video or read testimony will be divided by the actual time for designations and counter-designations by each party. For witnesses presented by read testimony, the allocation 27 The parties agreed not to serve objections to counter-designations as part of this pretrial order, and to raise necessary objections to such counter designations at the time of trial. 5 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 177 of 178 PageID# 24063 of trial time will be determined by the ratio of deposition testimony lines designated by each party to the total number of lines read by that witness. No time will be allocated to the parties for deposition testimony submitted to the Court as an exhibit only, with no video or read testimony. Deposition summaries will be offered at trial as appropriate pursuant to Local Rule 30(G). All testimony clip reports for deposition testimony provided to the Court will be admitted as a trial exhibit. The parties' current deposition designations, objections, and counter-designations are attached as Exhibit D (Centripetal) and Exhibit E (Defendant). The parties' discovery responses designations, objections, and counter-designations are attached as Exhibit F (Centripetal) and Exhibit G (Defendant). III. Witnesses The parties agree that for current employees of a party, any such witness that such party expects to call in their case-in-chief will appear live by video. For those non-employee witnesses who will be called in a party's case-in-chief via deposition, the parties agree that any counterdesignated testimony will be presented to the Court together with the designated deposition testimony, subject to the resolution of any objections to the designated or counter-designated testimony, as discussed above. The parties also agree that a party who wishes to call an employee of the other party as part of its case-in-chief can do so by deposition, regardless of the availability of that witness to testify live. The parties agree that all fact and expert witnesses will provide any trial testimony from a location remote from their lawyers or staff working on this matter. A remote location means a home, building or office different from any home, building or office where lawyers or staff working on this matter are present. Furthermore, while providing testimony at trial, no witness 6 Case 2:18-cv-00094-HCM-LRL Document 621 Filed 10/05/20 Page 178 of 178 PageID# 24064 shall access any form of communication other than the Zoom video or audio feed provided by the Court. Once sworn, no witness shall communicate with anyone else regarding the substance of the witness's testimony (absent express permission of the Court) until such time as the witness is excused by the Court from further participation in the trial. The agreement reflected in the foregoing sentence does not apply to fact witnesses or Dr. Medvidovic, Dr. Striegel, and Dr. Almeroth should they be called to testify on more than one occasion during the trial. For such witnesses, the parties agree that they will not communicate or speak with the witness once he begins testimony on the subject matter for which they are in the middle of testimony, as delineated by the Court. Once the witness has completed such testimony and leaves the stand, that witness can speak with counsel before taking the stand to testify at a later time during the trial. 7

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?