From Casetext: Smarter Legal Research

Finjan, Inc. v. Sonicwall, Inc.

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN JOSE DIVISION
Mar 26, 2019
Case No. 17-cv-04467-BLF (N.D. Cal. Mar. 26, 2019)

Opinion

Case No. 17-cv-04467-BLF

03-26-2019

FINJAN, INC., Plaintiff, v. SONICWALL, INC., Defendant.


ORDER CONSTRUING CLAIMS IN U.S. PATENT NOS. 6,154,844; 6,965,968; 7,058,822; 7,613,926; 7,647,633; 8,225,408

Plaintiff Finjan, Inc. ("Finjan") brings this patent infringement lawsuit against Defendant Sonicwall, Inc. ("Sonicwall"), alleging infringement of ten patents, including six that are at issue in the present claim construction dispute: U.S. Patent Nos. 6,154,844 (the "'844 Patent"); 6,965,968 (the "'968 Patent"); 7,058,822 (the "'822 Patent"); 7,613,926 (the "'926 Patent"); 7,647,633 (the "'633 Patent"); and 8,225,408 (the "'408 Patent"). The Court held a Markman hearing on March 1, 2019 ("the Hearing") for the purpose of construing ten disputed terms in the above listed patents.

I. BACKGROUND

The asserted patents are directed to network security technologies that detect online threats from malware. Finjan asserts that Sonicwall's products and services infringe the asserted patents. See generally Compl., ECF 1. Each of the six patents at issue in the present claim construction dispute is summarized below.

A. The '822 Patent and '633 Patent

The '822 Patent is titled "Malicious Mobile Code Runtime Monitoring System and Methods" and was issued on June 6, 2006. Ex. 1 to Kastens Decl. (the '822 Patent), ECF 89-2. The '633 Patent has the same name and specification and was issued on January 12, 2010. Ex. 2 to Kastens Decl. (the '633 Patent), ECF 89-2. These related patents provide systems and methods for protecting devices on an internal network from code, applications, and/or information downloaded from the Internet that perform malicious operations. See, e.g., '633 Patent at Abstract. At a high level, some embodiments include a protection engine that resides on a network server and monitors incoming information for executable code. Id. at 2:20-3:4. Upon detection of executable code, the protection engine deploys a "mobile protection code" and protection policies to a downloadable-destination. Id. at 3:5-21. At the destination, the Downloadable is executed, typically within a sandboxed environment, and malicious or potentially malicious operations that run or attempt to run are intercepted and neutralized by the mobile protection code according to set protection policies. See id. at 3:22-40.

B. The '844 Patent

The '844 Patent is titled "System and Method for Attaching a Downloadable Security Profile to a Downloadable" and was issued on November 28, 2000. Ex. 3 to Kastens Decl. (the '844 Patent), ECF 89-2. This patent claims systems and methods for inspecting Downloadables for suspicious code or behavior according to a set of rules and generating a profile of the results from the inspection. See, e.g., id. at 1:62-3:7. In some embodiments, a content inspection engine generates a security profile and links that profile to a Downloadable. Id. at 2:3-11. The profile can include certificates that are later read by a protection engine to determine whether or not to trust the profile. Id. at 2:20-48. By providing verifiable profiles, the claimed systems and methods may efficiently protect computers from hostile Downloadables. Id. at 2:61-3:7.

C. The '926 Patent

The '926 Patent is titled "Method and System for Protecting a Computer and a Network from Hostile Downloadables" and was issued on November 3, 2009. Ex. 4 to Kastens Decl. (the '926 Patent), ECF 89-2. The patent provides "protection systems and methods [for] [p]rotecting a personal computer ("PC") or other persistently or even intermittently network accessible devices or processes from harmful, undesirable, suspicious or other 'malicious' operations." Id. at 2:27-31. To achieve this goal, some embodiments utilize a protection engine in order to determine whether potential downloadables include executable code. See, e.g., id. at 9:57-62.

D. The '408 Patent

The '408 Patent is titled "Method and System for Adaptive Rule-Based Content Scanners" and was issued on July 17, 2012. Ex. 5 to Kastens Decl. (the '408 Patent), ECF 89-2. The patent provides "a method and system for scanning content that includes mobile code, to produce a diagnostic analysis of potential exploits within the content." Id. at 1:59-61. The invention uses an adaptive rule-based content ("ARB") scanner, which dynamically scans and diagnoses incoming Internet content. See id. at 1:65-2:24. The system generates a parse tree based on tokens and patterns of tokens it identifies, then identifies exploits (the malicious portions of the code) within the parse tree. See id. at 2:25-57.

E. The '968 Patent

The '968 Patent is titled "Method and System for Adaptive Rule-Based Content Scanners" and was issued on July 17, 2012. Ex. 6 to Kastens Decl. (the '968 Patent), ECF 89-2. Content from the Internet can be cached so that the same web page does not have to be retrieved each time a user on the network requests the page. However, users on the same network may have different security policies—different sets of rules that govern whether a file is allowed through the security filter. The '968 Patent provides a system and method of managing cached content in relation to multiple security policies by, inter alia, providing a "policy-based index . . . indicating allowability of cached content relative to a plurality of policies." See id. at 1:63-2:7. A cache manager may then utilize the policy-based index to determine whether cached content is allowable for a different user than the original user who requested it and block cached content from being delivered to users for whom it is not allowed. Id. at 2:7-11.

II. LEGAL STANDARD

A. General Principles

Claim construction is a matter of law. Markman v. Westview Instruments, Inc., 517 U.S. 370, 387 (1996). "It is a 'bedrock principle' of patent law that 'the claims of a patent define the invention to which the patentee is entitled the right to exclude.'" Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc) (internal citation omitted). As such, "[t]he appropriate starting point . . . is always with the language of the asserted claim itself." Comark Commc'ns, Inc. v. Harris Corp., 156 F.3d 1182, 1186 (Fed. Cir. 1998).

Claim terms "are generally given their ordinary and customary meaning," defined as "the meaning . . . the term would have to a person of ordinary skill in the art in question . . . as of the effective filing date of the patent application." Phillips, 415 F.3d at 1313 (internal citation omitted). The court reads claims in light of the specification, which is "the single best guide to the meaning of a disputed term." Id. at 1315; see also Lighting Ballast Control LLC v. Philips Elecs. N. Am. Corp., 744 F.3d 1272, 1284-85 (Fed. Cir. 2014) (en banc). Furthermore, "the interpretation to be given a term can only be determined and confirmed with a full understanding of what the inventors actually invented and intended to envelop with the claim." Phillips, 415 F.3d at 1316 (quoting Renishaw PLC v. Marposs Societa' per Azioni, 158 F.3d 1243, 1250 (Fed. Cir. 1998)). The words of the claims must therefore be understood as the inventor used them, as such understanding is revealed by the patent and prosecution history. Id. The claim language, written description, and patent prosecution history thus form the intrinsic record that is most significant when determining the proper meaning of a disputed claim limitation. Id. at 1315-17; see also Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996).

Evidence external to the patent is less significant than the intrinsic record, but the court may also consider such extrinsic evidence as expert and inventor testimony, dictionaries, and learned treatises "if the court deems it helpful in determining 'the true meaning of language used in the patent claims.'" Philips, 415 F.3d at 1318 (quoting Markman, 52 F.3d at 980). However, extrinsic evidence may not be used to contradict or change the meaning of claims "in derogation of the 'indisputable public records consisting of the claims, the specification and the prosecution history,' thereby undermining the public notice function of patents." Id. at 1319 (quoting Southwall Techs., Inc. v. Cardinal IG Co., 54 F.3d 1570, 1578 (Fed. Cir. 1995)).

B. Means-Plus-Function Claims

Paragraph 6 of 35 U.S.C § 112 provides for means-plus-function claiming: "An element in a claim for a combination may be expressed as a means . . . for performing a specified function . . . and such claim shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof." When a claim uses the term "means" to describe a limitation, it creates a presumption that the inventor used the term to invoke § 112 ¶ 6. Biomedino v. Waters Technologies, 490 F.3d 946, 950 (Fed. Cir. 2007). The "presumption can be rebutted when the claim, in addition to the functional language, recites structure sufficient to perform the claimed function in its entirety." Id.

Paragraph 6 of 35 U.S.C. § 112 was replaced with newly designated § 112(f) when the America Invents Act ("AIA"), Pub. L. No. 112-29, took effect on September 16, 2012. Because the patents herein were filed before that date, the Court refers to the pre-AIA version of § 112.

If a court concludes that a claim limitation is a means-plus-function limitation, "two steps of claim construction remain: 1) the court must first identify the function of the limitation; and 2) the court must then look to the specification and identify the corresponding structure for that function." Id. The claim limitation will then be construed to cover that corresponding structure and equivalents thereof. 35 U.S.C § 112 ¶ 6.

III. AGREED CONSTRUCTIONS

The parties agree on the construction of several terms. See Joint Claim Construction Statement, ECF 80. Some of the agreed upon terms appear in U.S. Patent Nos. 6,804,780 (the "'780 Patent"); 7,975,305 (the "'305 Patent"); and 8,677,494 (the "'494 Patent"), which are asserted in this action but not subject to claim construction dispute. The Court approves and adopts the following constructions:

Claim Term

Agreed Construction

"Downloadable"('844 Patent, claims 1, 15, 41, 43;'494 Patent, claim 10;'780 Patent, claims 1, 9, 17;'926 Patent, claim 22)

"an executable application program, which is downloadedfrom a source computer and run on the destination computer"

"database"('494 Patent, claim 10;'926 Patent, claim 22;'305 Patent, claims 1, 13)

"a collection of interrelated data organized according to adatabase schema to serve one or more applications"

"means for fetching at least onesoftware component identified bythe one or more references"('780 Patent, claim 17)

Governed by 35 U.S.C. § 112(6)Function: fetching at least one software component identifiedby the one or more referencesStructure: ID generator programmed to perform thealgorithm of step 820 disclosed in the '780 Patent at Fig. 8;9:62-64; and 4:56-66.

"means for obtaining aDownloadable that includes oneor more references to softwarecomponents required to beexecuted by the Downloadable"('780 Patent, claim 17)

Governed by 35 U.S.C. § 112(6)Function: obtaining a Downloadable that includes one ormore references to software components required to beexecuted by the DownloadableStructure: ID generator programmed to perform thealgorithm of step 810 disclosed in the '780 Patent at Fig. 8;9:60-62; and 4:50-54.

"parse tree"('408 Patent, claims 1, 9, 22)

"a hierarchical structure of interconnected nodes built fromscanned content"

"policy index"('968 Patent, claim 1)

"a data structure indicating allowability of cached contentrelative to a plurality of policies"

IV. DISCUSSION

Prior to the Hearing the parties stipulated to forgo oral argument on disputed terms two, three, four, and five under the expectation that the Court would adopt the constructions for these terms entered in Finjan Inc. v. Cisco Systems, Inc., Case No. 17-cv-00072-BLF ("the Cisco case"). See Stipulation to Streamline Issues for Oral Argument, ECF 122. In so stipulating the parties have not waived any of their respective appellate rights and have not withdrawn any of their respective positions as set forth in the claim construction briefing in the instant action. See id. at 1. As set forth below, the Court does adopt the constructions previously entered in the Cisco case for disputed terms two, three, four, and five and includes discussion in the present order that mirrors the discussion in the Cisco case for these terms. In addition, the Court adopts a construction for disputed term one that is identical to the construction in the Cisco case although here the Court annotates term one to make clear an implicit limitation. The Court discusses in turn the ten disputed terms.

A. Disputed terms in the '822 Patent and '633 Patent

1. "mobile protection code" ('633 Patent claims 1, 8, and 14) ('822 Patent claims 1 and 9)

Finjan's Proposal

Sonicwall's Proposal

Court's Construction

"code that,at runtime, monitors orintercepts actually orpotentially malicious codeoperations without modifyingthe executable code"

"mobile executable code that,at runtime, monitors for andintercepts actually orpotentially malicious codeoperations without modifyingthe executable code"

"code that,at runtime, monitors orintercepts actually orpotentially malicious codeoperations without modifyingthe executable code"where the mobile protectioncode itself must be executable

As a representative example, the disputed term "mobile protection code" appears in independent claim 1 of the '633 Patent, which recites:

1. A computer processor-based method, comprising:

receiving, by a computer, downloadable-information;

determining, by the computer, whether the downloadable-information includes executable code; and

based upon the determination, transmitting from the computer mobile protection code to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code.
'633 Patent at 20:54-62 (emphasis added).

Finjan argues that its proposed construction is proper because it is consistent with how a person of ordinary skill in the art would understand the intrinsic record and because its proposed construction has already been adopted in this District by this Court. See Opening Br. at 4-5, ECF 89. Indeed, prior claim construction orders issued in the same jurisdiction are entitled to substantial deference. See Finjan, Inc. v. Symantec Corp., 2017 WL 550453, at *3 (N.D. Cal. Feb. 10, 2017) ("If anything, to the extent possible, the degree of deference should be greater where the prior claim construction order was issued in the same jurisdiction."); Visto Corp. v. Sproqit Techs., Inc., 445 F. Supp. 2d 1104, 1107-08 (N.D. Cal. 2006) (explaining that the Supreme Court has stressed the particular importance of intrajurisdictional uniformity in claim construction).

In Finjan, Inc. v. Blue Coat Sys., Inc., 2014 WL 5361976 (N.D. Cal. Oct. 20, 2014) ("Blue Coat I"), the undersigned considered precisely the term "mobile protection code" in the very same '633 Patent and construed the term as "code that, at runtime, monitors or intercepts actually or potentially malicious code operations." Id. at *3; see also Finjan, Inc. v. Proofpoint, Inc., 2015 WL 7770208, at *5 (N.D. Cal. Dec. 3, 2015) (Judge Gilliam adopting an identical construction for the same term in the same patent). Finjan's proposed construction in the instant action seeks to append the phrase "without modifying the executable code" but is otherwise identical to the construction adopted by this Court in Blue Coat I and Proofpoint. Review of the undersigned's Blue Coat I order confirms that appending "without modifying the executable code" to the Court's prior construction is consistent with the Court's prior order. In Blue Coat I, the Court considered the related term "causing mobile protection code to be executed . . ." and construed it to require that "the mobile protection code [is] communicated . . . without modifying the executable code." 2014 WL 5361976, at *8 (emphasis added). The Court additionally noted that "the intrinsic evidence . . . indicate[s] that the MPC [mobile protection code] travels to the destination without modifying executable code." Id. Moreover, here, Sonicwall includes the "without modifying the executable code" language in its own proposed construction. See Responsive Br. at 1, ECF 109. In sum, Finjan's proposed construction of "mobile protection code" in the instant action is effectively the same as that adopted in Blue Coat I and Proofpoint and entitled to deference, see Symantec, 2017 WL 550453, at *3.

The Court has carefully considered Sonicwall's construction but is not persuaded Sonicwall's arguments overcome the deference provided Finjan's proposed construction. For example, Sonicwall seeks a construction that the mobile protection code "monitors for and intercepts" malicious code. Responsive Br. at 1 (emphasis added). In other words, Sonicwall argues that "monitors" and "intercepts" are "essentially synonymous." Id. at 3. The intrinsic evidence reveals that the mobile protection code "monitor[s] or otherwise intercepts]" such malicious operations. See '633 Patent at 3:7-11 (emphasis added). While this may indicate that "monitoring" is a subset of "intercepting" it does not equate the two terms. Moreover, the specification further states that "the mobile protection code . . . enables various Downloadable operations to be detected, intercepted or further responded to via protection operations." Id. at 2:52-55 (emphasis added). This statement does not preclude monitoring that is separate from intercepting. Thus, the Court does not find the intrinsic evidence sufficiently clear to justify departure from the prior claim construction orders that explicitly construed mobile protection code to "monitor[] or intercept[]," see Blue Coat I, 2014 WL 5361976, at *3; Proofpoint, 2015 WL 7770208, at *5.

However, Sonicwall does point out that the undersigned previously found that "the 'code' in 'mobile protection code' must be executable code." See Finjan, Inc. v. Blue Coat Sys., LLC, 283 F. Supp. 3d 839, 870-71 (N.D. Cal. 2017) ("Blue Coat II") (summary judgment order discussing an implicit limitation in the undersigned's claim construction order in Blue Coat I); see also Responsive Br. at 2. The Court has reviewed its reasoning in Blue Coat II and agrees that the "mobile protection code" must be executable code. At the Hearing, Finjan agreed that an annotation to reflect this limitation would be "consistent with [the Court's] previous order." See Hearing Tr. at 7:18-19, ECF 127. Thus, the Court annotates the term to make clear this limitation implicit in the undersigned's prior constructions of the term.

Accordingly, for the reasons above, the Court adopts Finjan's construction as annotated.

2. "A computer program product, comprising a computer usable medium having a computer readable program code therein, the computer readable program code adapted to be executed for computer security, the method comprising:" ('633 Patent claim 14)

Finjan's Proposal

Sonicwall's Proposal

Court's Construction

The typographical error in thepreamble is corrected to read:"A computer programproduct, comprising acomputer usable mediumhaving a computer readableprogram code therein, thecomputer readable programcode adapted to be executedfor computer security,comprising:"

The phrase "the method"should not be struck from thepreamble. As written, theclaim is indefinite underIPXL for reciting a mix ofstatutory classes of subjectmatter.

The typographical error in thepreamble is corrected to read:"A computer programproduct, comprising acomputer usable mediumhaving a computer readableprogram code therein, thecomputer readable programcode adapted to be executedfor computer security,comprising:"

The parties dispute whether the words "the method" in the preamble to claim 14 of the '633 Patent are the result of a typographical error and properly removed in construing the claim. Finjan argues that the words should be removed while Sonicwall argues that the words should remain and render the claim indefinite under IPXL Holdings, L.L.C. v. Amazon.com, Inc., 430 F.3d 1377 (Fed. Cir. 2005). See Opening Br. at 7-8; Responsive Br. at 4-7.

The undersigned considered precisely this issue in Blue Coat I, 2014 WL 5361976. In Blue Coat I the parties also disputed whether the words "the method" in the preamble to claim 14 were a typographical error. Id. at *7. The undersigned agreed with Plaintiff Finjan and construed the term "to correct the typographical error" resulting in a construction identical to Finjan's proposed construction in the instant action. See id. at *7-8; Opening Br. at 7. The undersigned further noted that "the corrected preamble can be reasonably interpreted to set forth a computer readable program code that, when executed, performs the limitations of the claim." Blue Coat I, 2014 WL 5361976, at *7.

When a patentee seeks a correction of claim language, "a district court can do so only if (1) the correction is not subject to reasonable debate based on consideration of the claim language and the specification and (2) the prosecution history does not suggest a different interpretation of the claims." Novo Indus., L.P. v. Micro Molds Corp., 350 F.3d 1348, 1354 (Fed. Cir. 2003). Sonicwall argues that in Blue Coat I the undersigned was "not presented with the language of the dependent claims and prosecution history that: (i) contradicts Finjan's correction; and (ii) suggests a different possible interpretation of the preamble." Responsive Br. at 4. In other words, Sonicwall contends that the Court's construction in Blue Coat I is not valid because the Court's "correction" to remove the words "fails both of the[] [Novo] requirements" when considering "the dependent claims and prosecution history" of the '633 Patent. See Responsive Br. at 4.

However, contrary to Sonicwall's suggestion, the undersigned was faced with essentially the same record and arguments in Blue Coat I. For example, Blue Coat argued—as Sonicwall does here—that during the prosecution of the '633 Patent the preamble was amended to be in line with Ex Parte Bo Li, 88 U.S.P.Q.2d 1695 (2008), and thus not transformed into a proper Beauregard claim. See Blue Coat's Responsive Br. at 22-23, ECF 66 in 5:13-cv-03999; Responsive Br. 4-5. As another example, Blue Coat argued that "a person of ordinary skill in the art looking at the claim language, specification, and prosecution history would be left to surmise various inconsistent corrections," see Blue Coat's Responsive Br. at 23 (relying on Nova, 350 F.3d at 1357), while Sonicwall likewise argues that the "claims" and "prosecution [history] suggest[] a different interpretation" under Nova, see Responsive Br. at 5. In Blue Coat I, the undersigned considered and rejected the arguments raised by Blue Coat and Sonicwall makes a no more compelling case here.

Computer-readable media claims—such as claims covering programs encoded on tangible computer-readable media—are commonly referred to as Beauregard claims after In re Beauregard, 53 F.3d 1583 (Fed. Cir. 1995).

Sonicwall additionally argues that because dependent claims 15 to 20 refer to "the method of claim 14" there is reasonable debate about how the claim should be corrected. See Responsive Br. at 4 (citing '633 Patent) (emphasis removed). However, Sonicwall cannot credibly argue that dependent claims 15 to 20 were not available to the Court in deciding Blue Coat I. Indeed, the Court previously found that the corrected preamble to claim 14 sets forth not a method but "a computer readable program code." Blue Coat I, 2014 WL 5361976, at *7. Moreover, the Court's prior construction in Blue Coat I is entitled to deference, see Symantec, 2017 WL 550453, at *3, and Finjan seeks an identical construction here. In sum, the Court adopts Finjan's construction.

Having removed the words "the method" from claim 14, the Court need not and does not reach Sonicwall's indefiniteness arguments under IPXL which depend on inclusion of the words "the method." See Responsive Br. at 6-7; see also Finjan, Inc. v. Blue Coat Sys., Inc., 2015 WL 3630000, at *12 (N.D. Cal. June 2, 2015) (finding claim 14 of the '633 Patent not indefinite as construed to not include the words "the method").

B. Disputed terms in the '844 Patent

The parties dispute three terms in the '844 Patent. All three terms appear in independent claim 43 which recites:

43. An inspector system comprising:

means for receiving a Downloadable;

means for generating a first Downloadable security profile that identifies suspicious code in the received Downloadable; and

means for linking the first Downloadable security profile to the Downloadable before a web server makes the Downloadable available to web clients.
'844 Patent at 14:34-42 (emphasis added).

Sonicwall's briefing raises a threshold issue regarding the three disputed terms recited in claim 43. See Responsive Br. at 7-9. Specifically, Sonicwall contends that claim 43 is directed to the "inspector 125" embodiment as opposed to the "network gateway 110" embodiment in the '844 Patent. Id. Finjan disagrees. See Reply Br. at 4-5, ECF 110. Because the parties' disagreement pertains to a common issue in the disputed terms, the Court addresses that issue first.

Sonicwall argues that claim 43 is an "inspector system" claim and "cannot be read onto a network gateway" for several reasons. See Responsive Br. at 7. Sonicwall first contends that the preamble of claim 43 recites "an inspector system" and that Finjan added this word during prosecution. See Responsive Br. at 8 (emphasis in original). According to Sonicwall, Finjan argued before the patent examiner that "the claims were distinct from [the] Ji [prior art reference] because Ji disclosed a network gateway whereas the claims are directed to an 'inspector.'" Id. (citing Ex. E to McGrath Decl. (5/3/2000 Response) at 4, ECF 109-6). On this basis, Sonicwall claims that Finjan manifested a clear intention to limit the claim scope to "inspector 125" while excluding gateway embodiments. Id. at 8.

Sonicwall then asserts that claim 43 requires the inspector system to generate a Downloadable Security Profile ("DSP") and link the DSP to the Downloadable before a web server makes the Downloadable available to web clients. Responsive Br. at 8. In Sonicwall's view, only the inspector 125 is described in the specification as both "generating" and "linking" the DSP. Id. Sonicwall further asserts that the generic protection engine of the network gateway only generates the DSP and passes the Downloadable without linking the Downloadable to the DSP. Id. According to Sonicwall, because claim 43 recites functions that are performed only by inspector 125, the corresponding structure of the three disputed terms of the '844 Patent must be a structure within the inspector 125. Id. at 9.

Finjan responds that Sonicwall's construction is inconsistent with decisions issued by courts within this District. See Reply Br. at 4-5. Finjan also argues that the '844 Patent discloses embodiments "where the inspector is at different locations, including at the network gateway." Id. at 5.

After carefully reviewing the parties' briefing, the record, and the undersigned's prior decision on this same issue in the Cisco case, the Court agrees with Finjan's position. First, Sonicwall's reliance on the fact that the preamble of claim 43 recites "inspector" is unpersuasive. "[W]hen a patentee defines a structurally complete invention in the claim body and uses the preamble only to state a purpose or intended use for the invention, the preamble is not a claim limitation." Novatek, Inc. v. Sollami Co., 559 F. App'x 1011, 1015 (Fed. Cir. 2014) (internal quotation marks and citation omitted). That said, "clear reliance on the preamble during prosecution to distinguish the claimed invention from prior art transforms the preamble into a claim limitation." Catalina Mktg. Int'l, Inc. v. Coolsavings.com, Inc., 289 F.3d 801, 808 (Fed. Cir. 2002). Here, the Court finds that the preamble of claim 43 is not a limitation. The body of the claim structurally defines the claimed invention. In addition, the prosecution history of the '844 Patent does not clearly show that Finjan distinguished the Ji reference by adding "inspector" to the preamble. Rather, Finjan emphasized that the Ji reference is distinguishable because it "does not teach generating [DSP] or linking the [DSP] to a Downloadable before the web server makes the Downloadable security profile available to web clients" and fails to disclose "examining an already linked [DSP] by network gateways." See Ex. E to McGrath Decl. (5/3/2000 Response) at 5 (emphasis in original). These statements do not pertain to the preamble. Thus, the prosecution history does not show that Finjan clearly relied on the preamble to limit claim 43. Catalina, 289 F.3d at 808.

To the extent that Sonicwall invokes the prosecution disclaimer doctrine, its argument fails. Any disclaimer must be "clear and unmistakable" and cannot be "amenable to multiple reasonable interpretations." Omega Eng'g, Inc, v. Raytek Corp., 334 F.3d 1314, 1325-26 (Fed. Cir. 2003). Here, at best, Finjan's patent prosecution statements are ambiguous and thus do not support Sonicwall's position. As such, Finjan's statements do not show that it "clearly and unmistakabl[y]" disavowed "network gateway" embodiments from the claim scope. Id. In fact, other courts have reached the same conclusion after reviewing the prosecution history of the '844 Patent. See Finjan, Inc. v. Symantec Corp., 2017 WL 550453, at *16 (N.D. Cal. Feb. 10, 2017) ("The Court does not read this language to establish . . . that an inspector by definition can never be at the gateway, or to amount to a clear and unmistakable disavowal.").

Second, the Court is unpersuaded by Sonicwall's argument that claim 43 excludes "network gateway" embodiments on the grounds that the specification discloses only inspector 125 to "generate" and "link" the DSP. To be sure, the '844 Patent expressly discloses that content inspection engine 160 in the inspector 125 of Fig. 1 to both generate and link DSP to a Downloadable. See, e.g., '844 Patent at 8:36-9:4. However, the specification also explicitly describes that the content inspection engine 525 which may be located at the network gateway generates DSP for a Downloadable and that the content inspection engine 525 is "similar to the content inspection engine 160 of the inspector 125." Id. at 7:62-64, 7:67-8:2. The specification further explains that the content inspection engine 525 generates DSP for the received Downloadable as described with reference to Figs. 4 and 6, id. at 9:63-65, where it is disclosed that content inspection engine 160 attaches DSP, id. at 7:13-16, 8:36-9:4. Based on those disclosures, and in particular, given that the '844 Patent expressly describes that the content inspection engine 160 at the network gateway is similar to those in the inspector 125, a person of ordinary skill in the art would understand that the content inspection engine located at the gateway can link DSP to the Downloadable. The Court therefore rejects Sonicwall's argument that the "linking" limitation in claim 43 shows that "network gateway" embodiments are excluded.

Accordingly, the Court concludes that claim 43 covers embodiments where the inspector is located at the network gateway. This interpretation of claim 43 is consistent with the construction of other courts. Symantec, 2017 WL 550453, at *16.

The Court now addresses the three disputed terms in the '844 Patent separately below.

1. "means for receiving a Downloadable" (claim 43)

Finjan's Proposal

Sonicwall's Proposal

Court's Construction

Function: receiving aDownloadableStructure: Downloadable fileinterceptor

Function: receiving aDownloadableStructure: inspector 125 thatis external to a networkgateway

Function: receiving aDownloadableStructure: Downloadable fileinterceptor

There is no dispute that this term is a means-plus-function limitation and that the function is "receiving a Downloadable." See Opening Br. at 9; Responsive Br. at 9. The Court therefore adopts the function agreed by the parties.

The parties, however, dispute the structure for this limitation. Finjan argues that the proper structure is "Downloadable file interceptor" because the '844 Patent disclose this element to perform "the function of receiving a Downloadable." Opening Br. at 9. Finjan points out that Judge Gilliam and Judge Orrick in this District determined that the proper structure is "Downloadable file interceptor." Id. (citing Finjan, Inc. v. Symantec Corp., 2017 WL 550453, at *3-4 (N.D. Cal. Feb. 10, 2017); Finjan, Inc. v. Sophos, Inc., 2015 WL 890621, at *8 (N.D. Cal. Mar. 2, 2015) ("[T]he structure for 'means for receiving a Downloadable' is unambiguous: the Downloadable file interceptor.")).

Sonicwall counters that the structure is the "inspector 125, which is external to network gateway 110." Responsive Br. at 9. Sonicwall's proposal is based on its argument that claim 43 excludes "network gateway" embodiments. See id. However, as discussed earlier, the Court rejects Sonicwall's position that claim 43 does not cover "network gateway" embodiments. Thus, the Court finds that Sonicwall's proposed structure is improper.

The remaining issue is whether the "Downloadable file interceptor" is the proper structure. The specification clearly discloses that the Downloadable file interceptor performs the function of receiving a Downloadable. See, e.g., '844 Patent at 9:22-23. The parties, however, dispute the location of the Downloadable file interceptor. Sonicwall contends that this structure is not part of the inspector 125 on the grounds that it exists only on the network gateway or computer client. Responsive Br. at 9. Finjan counters that there is no basis for a distinction between "inspector" claims and "gateway" claims. See Reply Br. at 4.

After reviewing the '844 Patent and the Court's analysis of this term in the Cisco case, the Court agrees with Finjan's proposed structure. The specification describes a generic protection engine that includes the Downloadable file interceptor for receiving incoming Downloadables. See '844 Patent at 7:41-48. This generic protection engine includes content inspection engine 525 that is similar to the content inspection engine 160 of the inspector 125, which is external to the gateway as depicted in Fig. 1. Id. at 7:19-8:2. The specification further describes that the content inspection engine 160 receives Downloadables like the generic protection engine. See id. at 4:52-56 ("[T]he Downloadable ID for the Downloadable will be the same each time the content inspection engine 160 (or a protection engine as illustrated in FIG. 5) receives the same Downloadable . . . ."). Based on those disclosures, a person of ordinary skill in the art would understand that inspector 125 with the content inspection engine 160 can include the structure of the Downloadable file interceptor described in relation to the protection engine in order to receive Downloadables. Accordingly, although the '844 Patent expressly discusses the Downloadable file interceptor in connection to embodiments pertaining to the network gateway or computer client ('844 Patent at 7:41-44, 9:19-10:23), the Court finds that a person of ordinary skill in the art would understand that the Downloadable file interceptor may be located on inspector 125.

The Court also notes that Judge Gilliam and Judge Orrick's claim construction orders determined the proper structure as the "Downloadable file interceptor." Symantec Corp., 2017 WL 550453, at *3-4; Sophos, 2015 WL 890621, at *8. The Court's above conclusion is consistent with those orders. Thus, the Court is further persuaded that the "Downloadable file interceptor" is the correct structure for the "means for receiving a Downloadable." Symantec, 2017 WL 550453, at *3 (explaining that prior claim construction orders issued in the same jurisdiction may receive deference). The Court finds no reason to depart from the prior claim construction orders.

For the above reasons, the Court adopts Finjan's construction.

2. "means for generating a first Downloadable security profile that identifies suspicious code in the received Downloadable" (claim 43)

Finjan's Proposal

Sonicwall's Proposal

Court's Construction

Function: generating a firstDownloadable security profilethat identifies suspicious codein the received DownloadableStructure: content inspectionengine programmed toperform the algorithmdisclosed at col. 8, lines 51-60 of the '844 Patent

Function: generating a firstDownloadable security profilethat identifies suspicious codein the received DownloadableStructure: content inspectionengine 160 of inspector 125programmed to perform thealgorithm disclosed at col. 8,lines 49-60 of the '844 Patentand col. 4, lines 36-47, 54-57, col. 8, lines 23-24, col. 9,lines 20-42 and Fig. 7 of U.S.Patent No. 6,092,194.

Function: generating a firstDownloadable security profilethat identifies suspicious codein the received DownloadableStructure: content inspectionengine programmed toperform the algorithmdisclosed at col. 8, lines 51-60 of the '844 Patent

The parties do not dispute that this term is a means-plus-function limitation and that the function is "generating a first Downloadable security profile that identifies suspicious code in the received Downloadable." Opening Br. at 11; Responsive Br. at 10. The Court therefore adopts the function agreed by the parties.

The parties, however, diverge on the proper structure for this limitation. Finjan asserts that its proposed structure is correct because the structure is "taken directly from the specification of the '844 Patent as it relates to generating a [DSP]." Opening Br. at 11. Finjan further asserts that Judge Gilliam adopted the same structure in Symantec, 2017 WL 550453, at *6-7. See Opening Br. at 11.

Sonicwall first responds that the proper structure should be "tied to inspector 125" but that Finjan's proposal fails to do so. Responsive Br. at 10. Sonicwall next argues that the specification of the '844 Patent "provides almost no detail of how the content inspection engine 160 generates a DSP that identifies suspicious code in the received Downloadable" and that code is distinct from operations. See Responsive Br. at 10 (emphasis in original). Based on this assertion, Sonicwall contends that the Court must look to U.S. Patent Application No. 08/964,388 (now U.S. Patent No. 6,092,194 ("the '194 Patent")), which the '844 Patent incorporates by reference, to construe the proper structure. Id. at 10.

Sonicwall's first contention is based on the argument that claim 43 excludes "network gateway" embodiments. But, again, the Court rejects Sonicwall's argument that claim 43 does not cover "network gateway" embodiments. The Court therefore is unpersuaded by Sonicwall's first contention that the proper structure should be tied to inspector 125.

Regarding Sonicwall's second contention, the Court is unconvinced by Sonicwall's reliance on the '194 Patent even if that patent were properly incorporated by reference into the '844 Patent. The '194 Patent does not mention "content inspection engine" and the Court is unable to identify with particularity which algorithms disclosed in the '194 Patent pertain to the "content inspection engine" described in the '844 Patent. On the other hand, the '844 Patent itself sufficiently discloses the algorithm for the content inspection engine that performs the agreed upon function:

As stated above, generating a DSP [by the content inspection engine]
includes examining the Downloadable 205 (and the Downloadable components) for all suspicious operations that will or may be performed by the Downloadable, all suspicious code patterns, all known viruses, etc. Generating a DSP may include comparing all operations that will or may be performed against a list of suspicious operations or against a list of rules, e.g., a rules base 165. Accordingly, if an operation in the Downloadable 205 matches one of the suspicious operations or violates one of the rules, then the operation is listed in the DSP 215.
'844 Patent at 8:51-60. Similar narrative algorithms have been found to disclose sufficient structure. See Typhoon Touch Techs., Inc. v. Dell, Inc., 659 F.3d 1376, 1385-86 (Fed. Cir. 2011). As such, the Court finds that the proper algorithm is disclosed in col. 8, lines 51-60 of the '844 Patent. Indeed, Judge Gilliam reached the same conclusion. Symantec, 2017 WL 550453, at *6-7 (declining to rely on the '194 Patent and holding that the '844 Patent disclosed sufficient structure).

Moreover, Sonicwall's argument that Court must look to the '194 Patent on the grounds that code is distinct from operations is unavailing. Finjan's proposed algorithm in the '844 Patent describes "generating a DSP includes examining the Downloadable . . . for all suspicious operations that will or may be performed by the Downloadable, all suspicious code patterns, all known viruses, etc." '844 Patent at 8:51-55 (emphasis added). As an example, the '844 Patent discloses that a DSP can be generated using a "rules base." Id. at 8:55-58. Moreover, the specification discloses that a set of rules may include a "list of suspicious code patterns." Id. at 2:7-8. Thus, although Sonicwall is correct that "code" is distinct from "operations," its argument is unavailing. Based on those disclosures, the Court finds that a person of ordinary skill in art would understand how the content inspection engine performs the function based on the algorithm disclosed in col. 8, lines 51-60 of the '844 Patent.

Accordingly, the Court adopts Finjan's proposed construction.

3. "means for linking the first Downloadable security profile to the Downloadable before a web server makes the Downloadable available to web clients" (claim 43)

Finjan's Proposal

Sonicwall's Proposal

Court's Construction

Function: linking the firstDownloadable security profileto the Downloadable before aweb server makes the

Function: linking the firstDownloadable security profileto the Downloadable before aweb server makes the

Function: linking the firstDownloadable security profileto the Downloadable before aweb server makes the

Downloadable available toweb clientsStructure: content inspectionengine programmed toperform the algorithm of step630 disclosed at Fig. 6; col. 8,lines 65-67; and col. 6, lines13-24 of the '844 Patent.

Downloadable available toweb clientsStructure: content inspectionengine 160 of inspector 125programmed to perform step630 of Fig. 6, disclosed at col.8, lines 65-67 and col. 6, lines13-20 of the '844 Patent.Specifically, attaching aDownloadable security profileto the Downloadable (col. 8,lines 65-67 and col. 6, lines13-18) or attaching to theDownloadable a pointer thatpoints to a storedDownloadable security profile(col. 6, lines 18-20).

Downloadable available toweb clientsStructure: content inspectionengine programmed toperform step 630 of Fig. 6,disclosed at col. 8, lines 65-67 and col. 6, lines 13-20 ofthe '844 Patent.Specifically, attaching aDownloadable security profileto the Downloadable (col. 8,lines 65-67 and col. 6, lines13-18) or attaching to theDownloadable a pointer thatpoints to a storedDownloadable security profile(col. 6, lines 18-20).

There is no dispute that this term is a means-plus-function limitation and that the function is "linking the first Downloadable security profile to the Downloadable before a web server makes the Downloadable available to web clients." Opening Br. at 13; Responsive Br. at 11. The Court therefore adopts the agreed upon function.

The parties disagree on the structure for this limitation. Finjan argues that its proposed construction is the one adopted by Judge Gilliam in Symantec, 2017 WL 550453, at *8. See Opening Br. at 13-14. Finjan further contends that its proposal is consistent with the scope of the agreed function and does not incorporate unnecessary and confusing elements. Id. at 14.

Sonicwall counters that its proposal specifies that the content inspection engine must be part of the inspector 125. See Responsive Br. at 11. However, like Sonicwall's earlier arguments, this contention is based on Sonicwall's view that claim 43 excludes "network gateway" embodiments. The Court rejects that view and thus is unconvinced by this counter-argument. Thus, to the extent that its proposal references content inspection engine 160 and inspector 125, Sonicwall's construction is improper.

Sonicwall also argues that the specification discloses only two methods for linking the DSP to the Downloadable: "(1) attaching the DSP to the Downloadable and (2) attaching a pointer to the Downloadable that points to the DSP stored in the network system 100." Responsive Br. at 11-12. Sonicwall further asserts that col. 6, lines 20-24 of the specification should be excluded from Finjan's proposal. See id. at 12. That portion of the '844 Patent states the following:

The term "linking" herein will be used to indicate an association between the Downloadable 205 and the DSP 215 (including using a pointer from the Downloadable 195 to the DSP 215, attaching the DSP 215 to the Downloadable 205, etc.)
'844 Patent at 6:20-24. Sonicwall argues that this portion of the specification only identifies the two methods for linking (which are already disclosed in col. 6, lines 13-20 and col. 8, lines 65-67) and that the reference to "an association" and "etc." are not algorithms that provide corresponding structure. See Responsive Br. at 12. As discussed below, the Court agrees with Sonicwall on this point.

In allowing means-plus-function limitations, "Congress . . . plac[ed] specific constraints on how such a limitation is to be construed, namely, by restricting the scope of coverage to only the structure, materials, or acts described in the specification as corresponding to the claimed function and equivalents thereof." Williamson v. Citrix Online, LLC, 792 F.3d 1339, 1347 (Fed. Cir. 2015) (emphasis added). Here, the parties both propose algorithms for the structure and thus agree that the specification must describe an algorithm to sufficiently disclose the structure. See Aristocrat Techs. Australia Pty Ltd. v. Int'l Game Tech., 521 F.3d 1328, 1333 (Fed. Cir. 2008) ("[C]omputer-implemented means-plus-function term is limited to the corresponding structure disclosed in the specification and equivalents thereof, and the corresponding structure is the algorithm." (citation omitted) (emphasis added)). In other words, the structure of the disputed means-plus-function term at issue is limited to the algorithm disclosed in the specification. See id.

Here, as Sonicwall argues, col. 6, lines 20-24 of the specification merely restates the function "linking the first Downloadable security profile to the Downloadable" by referring "linking" as an "association" but fails to specify how the content inspection engine performs the claimed function. Thus, that passage does not adequately disclose an algorithm (other than the two methods which Sonicwall does not dispute). See Aristocrat, 521 F.3d at 1334 (specification did not contain an algorithm sufficient to disclose structure, when language identified by plaintiff "simply describe[d] the function to be performed, not the algorithm by which it is performed"). Because col. 6, lines 20-24 does not disclose anything beyond the two methods of linking by attaching the DSP or the pointer to the DSP, the Court finds that this portion of the specification does not disclose additional algorithm that corresponds to the structure of the means-plus-function claim.

Finjan's counter-arguments are unpersuasive. First, Finjan asserts that Judge Gilliam adopted its proposed construction including col. 6, lines 20-24 of the '844 Patent. See Opening Br. at 13-14. However, Judge Gilliam expressed that the sentence "[t]he term 'linking' herein will be used to indicate an association between the Downloadable 205 and the DSP 215 (including using a pointer from the Downloadable 195 to the DSP 215, attaching the DSP 215 to the Downloadable 205, etc.)" appears to "simply restate the function 'linking the first Downloadable security profile to the Downloadable' rather than providing an algorithm for how that function is accomplished, an approach the Federal Circuit has found to be insufficient." Symantec, 2017 WL 550453, at *8 (emphasis in original). Nevertheless, Judge Gilliam adopted that passage as part of the construction because the parties' proposal covered that portion of the '844 Patent. Id. The Court need not give much deference to Judge Gilliam's construction when he identified an issue with the parties' proposal but nevertheless accepted it.

Finjan made additional counter-arguments in the Cisco case that the Court likewise rejected. See ECF 134 at 13-16 in Finjan Inc. v. Cisco Systems, Inc., Case No. 17-cv-00072-BLF.

Second, Finjan argues that it would be improper to limit the term to examples of linking by "attaching the DSP and the pointer." See Reply Br. at 8; see also Opening Br. at 14-15. However, the Court's rejection of Finjan's position is not improper. As mentioned above, section 112 ¶ 6 requires a means-plus-function claim to cover "only the structure, materials, or acts described in the specification." Williamson, 792 F.3d at 1347. The '844 Patent discloses only the two methods identified in col. 6, lines 13-20 and col. 8, lines 65-67 as the algorithm, and thus the scope of the dispute term must be limited to that disclosure. See Williamson, 792 F.3d at 1347.

Based on the foregoing, the Court adopts Sonicwall's proposed structure with the exception of the reference to inspector 125 as set forth in the following: "content inspection engine programmed to perform step 630 of Fig. 6, disclosed at col. 8, lines 65-67 and col. 6, lines 13-20 of the '844 Patent. Specifically, attaching a Downloadable security profile to the Downloadable (col. 8, lines 65-67 and col. 6, lines 13-18) or attaching to the Downloadable a pointer that points to a stored Downloadable security profile (col. 6, lines 18-20)."

C. Disputed term in the '926 Patent

1. "destination computer" (claim 22)

Finjan's Proposal

Sonicwall's Proposal

Court's Construction

No construction necessary—plain and ordinary meaning

"client computer to which theincoming Downloadable isdirected"

No construction necessary—plain and ordinary meaning

The parties contest the meaning of the term "destination computer" in claim 22 of the '926 Patent. Claim 22 recites:

22. A system for managing Downloadables, comprising:

a receiver for receiving an incoming Downloadable;

a Downloadable identifier for performing a hashing function on the incoming Downloadable to compute an incoming Downloadable ID;

a database manager for retrieving security profile data for the incoming Downloadable from a database of Downloadable security profiles indexed according to Downloadable IDs, based on the incoming Downloadable ID, the security profile data including a list of suspicious computer operations that may be attempted by the Downloadable; and

a transmitter coupled with said receiver, for transmitting the incoming Downloadable and a representation of the retrieved Downloadable security profile data to a destination computer, via a transport protocol transmission.
'926 Patent at 22:20-35 (emphasis added).

Finjan argues that the plain and ordinary meaning of "destination computer" is consistent with the intrinsic record "because this term when read in the context of the claim is easy to understand." See Opening Br. at 16. Finjan contends that the term is "self-explanatory" and simply describes "a computer that is a destination." See id. Finjan further argues that Sonicwall's proposed "client computer" construction would exclude embodiments because "the '926 Patent describes embodiments in which the 'destination computer' is not [] limited" to "client computer[s]." See id. at 16-17. In support, Finjan points to Judge Orrick's reasoning in an order on post-trial motions that "Finjan has presented evidence that 'destination computer' [in the '926 Patent] may have many meanings." See Finjan, Inc. v. Sophos, Inc., 244 F. Supp. 3d 1016, 1049- 50 (N.D. Cal. 2017) (finding that jury's finding of infringement of the '926 Patent was supported by substantial evidence).

Sonicwall counters that a "plain and ordinary meaning" does not resolve the parties' principal dispute—"whether the destination computer is limited to the client computer to which the incoming Downloadable is directed . . . or includes other computers that may receive the Downloadable." See Responsive Br. at 13. Sonicwall argues that the term "destination computer" does not appear in the specification of the '926 Patent but does appear in the specification of the '780 Patent (which is incorporated by reference), and that the '780 Patent "makes clear that 'destination computer' means the client computer to which the incoming Downloadable is directed." See id. at 13. Specifically, Sonicwall points to language in the '780 Patent specification stating that "[a] Downloadable is an executable application program, which is downloaded from a source computer and run on the destination computer." See '780 Patent at 1:50-53, ECF 1-4; see also Responsive Br. at 13-14. Sonicwall contends that one of ordinary skill in the art would read "destination computer" to mean "client computer" because during prosecution of the '780 Patent the applicant stated that "[t]he present invention concerns generation of an ID for mobile code downloaded to a client computer, referred to as a Downloadable." See 7/31/2003 Amendment at 7 (emphasis added), Ex. I to McGrath Decl., ECF 109-10. Sonicwall additionally argues that Finjan's proposal would "improperly render the word 'destination' utterly superfluous" because "the claims would have the exact same meaning both with and without the word 'destination.'" See Responsive Br. at 14 (emphasis removed).

The crux of this dispute is whether the "destination computer" in claim 22 of the '926 Patent must be a "client computer." For the reasons discussed below, the Court finds that the "destination computer" in claim 22 is not so limited and may be a computer other than a "client computer." As an initial matter, Judge Orrick considered this issue in Finjan, Inc. v. Sophos, Inc., 244 F. Supp. 3d 1016, 1049-50 (N.D. Cal. 2017), and found that Finjan had presented sufficient evidence that "destination computer" does not refer exclusively to an end-user (e.g. client) computer to withstand a post-trial motion for judgment as a matter of law. 244 F. Supp. 3d at 1049. While Judge Orrick's ruling was not a claim construction order and thus not afforded substantial deference, see Symantec, 2017 WL 550453, at *3 (N.D. Cal. Feb. 10, 2017), Judge Orrick's reasoning is nonetheless persuasive. Indeed, Judge Orrick noted that "the word 'destination' adds something—it emphasizes that the computer to which the downloadable is being transmitted is not any computer, but rather a particular computer." See Sophos, 244 F. Supp. 3d at 1049 (emphasis in original). Judge Orrick concluded that Finjan had presented evidence that "destination computer" had "many meanings under the '926 Patent," and was thus not limited to end-user/client computers. See id. at 1049-50.

Sonicwall's arguments to the contrary are unconvincing. First, the claims refer simply to a "destination computer" without further limitation and neither the '926 Patent specification nor the '780 Patent specification defines the destination computer to be a client computer. In support of its argument that "destination computer" and "client computer" are interchangeable Sonicwall relies on the applicant's statement during prosecution that "[t]he present invention concerns generation of an ID for mobile code downloaded to a client computer, referred to as a Downloadable." See 7/31/2003 Amendment at 7 (emphasis added); see also Responsive Br. at 14. However, for prosecution disclaimer to attach, "disavowing actions or statements made during prosecution [must] be both clear and unmistakable." Omega Eng'g, Inc, v. Raytek Corp., 334 F.3d 1314, 1325-26 (Fed. Cir. 2003). Here, the applicant's statement merely defines "Downloadable" and indicates that the Downloadable may be downloaded to a client computer but does not clearly and unmistakably disavow the scope of "destination computer," which is not mentioned at all. Thus, the applicant did not disclaim the full scope of "destination computer" in this statement during prosecution.

Second, contrary to Sonicwall's contention, permitting the term "destination computer" to capture destinations other than a client computer does not "render the word 'destination' utterly superfluous," see Responsive Br. at 14. Just as Judge Orrick reasoned in Sophos, see 244 F. Supp. 3d at 1049, the word "destination" still requires that the Downloadable be transmitted to a particular computer at which the Downloadable is run, rather than any computer whatsoever. See '780 Patent at 1:50-53 ("A Downloadable is an executable application program, which is downloaded from a source computer and run on the destination computer.") (emphasis added). Accordingly, "destination" is not rendered superfluous even where the "destination computer" is not a "client computer."

This definition of "Downloadable" matches the parties' agreed upon construction of "Downloadable." See supra Section III; Joint Claim Construction Statement at 1, ECF 80.

Finally, "claim terms must be given their plain and ordinary meaning to one of skill in the art." Thorner v. Sony Computer Ent. Am. LLC, 669 F.3d 1362, 1367 (Fed. Cir. 2012). A "patentee is free to choose a broad term and expect to obtain the full scope of its plain and ordinary meaning unless the patentee explicitly redefines the term or disavows its full scope." Id. On its face, claim 22 does not include the limitation proposed by Sonicwall and the Court does not find sufficient support in the remainder of the intrinsic record to implicitly read in such a requirement. In addition, Sonicwall's argument that the "plain and ordinary meaning" does not resolve the parties' principal dispute as to whether "destination computer" equals "client computer" is unavailing. See Responsive Br. at 13. If the Court is to give the patentee's choice of terms any effect, the two terms are necessarily not synonymous. Thus, the Court's construction resolves the principal dispute.

In sum, the Court adopts the plain and ordinary meaning of the disputed term.

D. Disputed terms in the '408 Patent

The parties dispute two terms in the '408 Patent. Both terms appear in claim 9, which recites in part:

9. A computer system for multi-lingual content scanning, comprising:

. . . a scanner instantiator, stored on the medium and executed by the computer, operatively coupled to said receiver and said multi-lingual language detector for instantiating a scanner for the specific programming language, in response to said determining, the scanner comprising:

a rules accessor for accessing parser rules and analyzer rules for the specific programming language, wherein the parser rules define certain patterns in terms of tokens, tokens being lexical constructs for the specific programming language, and wherein the analyzer rules identify certain combinations of tokens and patterns as being indicators of potential exploits, exploits being portions of program code that are malicious . . .
'408 Patent at 20:35-60 (emphasis added). Each term is discussed in turn.

1. "instantiating, by the computer, a scanner for the specific programming language" / "instantiating a scanner for the specific programming language" (claims 1, 9 and 22)

Finjan's Proposal

Sonicwall's Proposal

Court's Construction

No construction necessary—plain and ordinary meaningAlternatively:"initializing a scanner for thespecific programminglanguage"

"substituting specific data,instructions, or both into ageneric program unit to makeit usable for scanning thespecific programminglanguage"

"substituting specific data,instructions, or both into ascanner to make it usable forscanning the specificprogramming language"

As proposed by Finjan at the Hearing. See Hearing Tr. at 32:5-11, ECF 127.

The '408 Patent provides "a method and system for scanning content that includes mobile code, to produce a diagnostic analysis of potential exploits within the content." Id. at 1:59-61. The invention uses an adaptive rule-based content ("ARB") scanner, which dynamically scans and diagnoses incoming Internet content. See id. at 1:65-2:24. Unlike "prior art scanners that are hard-coded for one particular type of content," id. at 2:2-3, the claimed ARB scanners "are able to adapt [themselves] dynamically to scan a specific type of content" and the ARB scanner systems are "preferably designed as a generic architecture that is language-independent, and is customized for a specific language through use of a set of language-specific rules," id. at 1:65-2:1, 6:17-20.

Finjan argues that "[t]his term does not require construction because it can be readily understood by a person of ordinary skill in the art." Opening Br. at 18. Finjan posits that a person of ordinary skill in the art reviewing the '408 Patent would understand "instantiating" to mean "initializing." See id. Finjan therefore contends that the plain and ordinary meaning of the disputed term is "initializing a scanner for the specific programming language" or that the Court should adopt that meaning in the alternative. See id.; Hearing Tr. at 32:5-11, ECF 127.

The Court disagrees. The '408 Patent does not use "instantiating" and "initializing" synonymously. Instead, the specification makes clear that the patentee intended the words to have different effect. For example, in a paragraph discussing scanners, the specification recites:

ARB scanner factory module 630 instantiates a scanner repository 640. Repository 640 produces a single instance of each ARB scanner defined in the archive file. Preferably, each instance of an ARB scanner is able to initialize itself and populate itself with the requisite data.
'408 Patent at 15:30-35. Here, the "instantiates" step takes place before and separate from the "initialize" step. If the Court is to give the patentee's choice of terms any effect, the two words are necessarily not synonymous. Thus, the Court turns to the question of whether Sonicwall's proposal is appropriate.

Sonicwall argues that its proposed construction should govern because the specification states that the ARB scanner is "preferably designed as a generic architecture that is language-independent, and is customized for a specific language through use of a set of language-specific rules." See '408 Patent at 6:17-20 (emphasis added); see also Responsive Br. at 18. Sonicwall further argues that the specification explains that the "[t]okenizer 210 and normalizer 240 are generic modules that can be adapted to process any content language, by providing a description of the content language with a rule file." See '408 Patent at 8:7-9 (emphasis added); see also Responsive Br. at 16. Sonicwall contends that therefore the scanner is customized using "language-specific data [] substituted into a generic module to allow the scanning of a specific programming language." See Responsive Br. at 16. Sonicwall additionally points out that its proposed construction was adopted by the PTAB as the "broadest reasonable construction . . . in light of the specification." See id. at 18 (quoting and citing 3/29/2016 IPR Decision at 11-12, Ex. K to McGrath Decl., ECF 109-12).

Finjan counters that "a different claim construction standard is applied in the IPR" and that Sonicwall's proposed construction would "import limitations into the claims when describing a more general component of the scanner." See Reply Br. at 11.

Indeed, the PTAB's construction in IPR is not binding on this Court and is not afforded deference. See SkyHawke Techs., LLC v. Deca Int'l Corp., 828 F.3d 1373, 1376 (Fed. Cir. 2016). However, Sonicwall's proposed construction is on point and helpful to the jury, with one exception. The Court is not convinced that "a generic program unit" properly captures the scope of the disputed term, which concerns "a scanner." See Responsive Br. at 15; '408 Patent claim 9. The '408 Patent makes clear that the ARB scanner system is "preferably designed as a generic architecture," see id. at 6:17-18 (emphasis added), but does not mandate that a scanner is necessarily "a generic program unit." Moreover, the word "instantiating" is at the crux of this dispute, not the word "scanner." Accordingly, the Court replaces Sonicwall's proposed language "a generic program unit" with the claim language "a scanner."

"'Claim construction' is for the purpose of explaining and defining terms in the claims, and usually requires use of words other than the words that are being defined." Abbott Labs. V. Sandoz, Inc., 544 F.3d 1341, 1360 (Fed. Cir. 2008). Finjan's proposal that "instantiating a scanner" has a plain and ordinary meaning will not aid the jury. On the other hand, Sonicwall's proposal as modified by the Court clarifies that "instantiating a scanner" means "substituting specific data, instructions, or both into a scanner" to make it useable for scanning the specific programming language. The words of the claim must be understood as the inventor used them. See Phillips, 415 F.3d at 1316. Here, "substituting specific data, instructions, or both" is consistent with the patentee's use of "instantiating" which describes a procedure of customizing or setting up "a scanner for the specific programming language" after a "specific one of a plurality of programming languages" is identified. See, e.g., '408 Patent claim 1; '408 Patent claim 9. Thus, the Court finds that Sonicwall's proposed construction as modified by the Court is consistent with the claim language and provides the requisite guidance to the jury.

Based on the foregoing, the Court adopts the following construction: "substituting specific data, instructions, or both into a scanner to make it usable for scanning the specific programming language."

2. "a rules accessor for accessing parser rules and analyzer rules for the specific programming language" (claim 9)

Finjan's Proposal

Sonicwall's Proposal

Court's Construction

No construction necessary—plain and ordinary meaning

Governed by 35 U.S.C.§ 112(6)Function: for accessingparser rules and analyzerrules for the specificprogramming languageStructure: indefinite under§ 112(2) for failure todisclose correspondingstructure

Governed by 35 U.S.C.§ 112(6)Function: accessingparser rules and analyzerrules for the specificprogramming languageStructure: indefinite under§ 112(2) for failure todisclose correspondingstructure

The parties dispute whether this term is a means-plus-function claim governed by 35 U.S.C. § 112 ¶ 6 and if so, whether adequate structure is disclosed. Finjan points out that the word "means" does not appear in the claim language of the '408 Patent and argues that Sonicwall cannot rebut the presumption against invoking § 112 ¶ 6. See Opening Br. at 20; see also Williamson v. Citrix Online, LLC, 792 F.3d 1339, 1349 (Fed. Cir. 2015). Finjan contends that "rules accessor" is "[not] a nonce word because the term connotes a specific structure for identifying and providing access to information which in this case is access to the parser and analyzer rules." See Opening Br. at 20. Finjan further argues that even if this term were a mean-plus-function term, it is not indefinite because "a rules accessor" alone "is sufficient structure." See id. at 21 n.4; see also Reply Br. at 12.

On the other hand, Sonicwall contends that the "rules accessor" limitation is governed by § 112 ¶ 6 because "'rules accessor' does not have a commonly understood meaning" and because the term is not viewed by those of skill in the art "to connote a particular structure." See Responsive Br. at 20. Sonicwall further contends that "'rules accessor' is simply another way of saying 'means for accessing rules'" with "no independent structural limitation." See id. at 21. Sonicwall next argues that the '408 Patent specification fails to disclose corresponding structure because "there is no mention made [] of a rules accessor" and because "the entire concept of rules being accessed is missing" as well as any "algorithm for performing the recited function." See id.

a. Invoking 35 U.S.C. § 112 ¶ 6

To determine whether a claim invokes § 112, the Court must determine if the claim limitation is drafted in the means-plus-function format. Here, the disputed claim limitation does not use the term "means." Thus, there is a presumption that the limitation does not invoke § 112 ¶ 6. See Williamson, 792 F.3d at 1348. However, this presumption is rebuttable and § 112 ¶ 6 will apply "if the challenger demonstrates that the claim term fails to 'recite sufficiently definite structure' or else recites 'function without reciting sufficient structure for performing that function.'" See id. at 1349 (internal citation omitted). For the reasons discussed below, the Court finds that Sonicwall has demonstrated that the claim term "fails to recite sufficiently definite structure" or "recites function without reciting sufficient structure for performing that function" to overcome this presumption.

Sonicwall presents search results showing that neither "rules accessor" nor "accessor" are recognized terms or components in various computer, technical, or IT dictionaries. See McGrath Decl. ¶ 13, ECF 109-1; Ex. L to McGrath Decl., ECF 109-13. In response, Finjan cites the definition of "access" in a computer dictionary and argues that according to that definition the meaning of "rules accessor" is self-explanatory—that "it is a component that accesses the data." See Reply Br. at 11-12; see also Webster's New World Dictionary of Computer Terms (Sixth Edition), Ex. C to Kastens Decl., ECF 110-4. Finjan's argument misses the point. The key question is not what the "rules accessor" accesses, but whether "rules accessor" is understood by a person of ordinary skill in the art as an identifiable structure. In other words, whether the words "rules accessor" or "accessor" "provide [] indication of structure" or instead merely "set[] forth the same black box recitation of structure for providing the same specified function as if the term 'means' had been used," see Williamson, 792 F.3d at 1350. Sonicwall contends that "rules accessor" is a "nonce term" because it was "coined specifically for the patent" and "provides no direction as to a particular structure." See Responsive Br. at 20-21 (internal quotation and citation omitted).

Indeed, replacing "rules accessor for accessing [] rules" in claim 9 of the '408 Patent with "means for accessing [] rules" does not alter the structure. Under either reading, the term is merely a description of the function performed. Put differently, "rules accessor" simply takes the function being performed and states it in terms of a device. See Advanced Ground Info. Sys., Inc. v. Life360, Inc., 830 F.3d 1341, 1348 (Fed. Cir. 2016) (finding "symbol generator" analogous to "means for generating symbols" on similar grounds). Accordingly, Finjan's argument that "rules accessor" connotes specific structure through "access to the parser and analyzer rules" fails. See Opening Br. at 20. At bottom, "rules accessor" does not designate structure. Cf. Skky, Inc. v. MindGeek, s.a.r.l., 859 F.3d 1014, 1020 (Fed. Cir. 2017) (finding that "wireless device" is "used in common parlance . . . to designate structure) (internal citation omitted).

The Court must additionally consider whether the claim language and specification "describe how the [rules accessor], by its interaction with the other components in the [scanner instantiator], is understood as the name for structure." See Williamson, 792 F.3d at 1351. In Williamson, the Federal Circuit found that "the claim does not describe how the 'distributed learning control module' interacts with other components in the distributed learning control server in a way that might inform the structural character . . . or otherwise impart structure." Id. at 1351. Instead, "portions of the claim [] describe certain inputs and outputs at a very high level." Id. Likewise, here, the claim does not explain how the "rules accessor" interacts with other components (the tokenizer, parser, and notifier) of the "scanner instantiator" sufficient to impart structure. See '408 Patent at 20:48-21:8. Although these components may depend on the output of the "rules accessor," see., e.g., id. at 20:63-67 (parser operating "in accordance with the parser rules accessed by said rules accessor"), such interaction is only described at a high level and merely reflects the same black box recitation of structure provided by "rules accessor."

Finjan relies on Finjan, Inc. v. Proofpoint, Inc., 2015 WL 7770208 (N.D. Cal. Dec. 3, 2015) for the proposition that claim 9 of the '408 Patent provides "detailed context" sufficient to connote structure. See Opening Br. at 19-20. Proofpoint is inapposite. While the Proofpoint court found that the claim language "informs the [content processor]'s structural character," see 2015 WL 7770208, at *11, it did not rule that the claim language alone imparted sufficient structure. Instead, the Proofpoint court relied heavily on disclosures in the specification and figures to find sufficient structure for the disputed term "content processor." See 2015 WL 7770208, at *11 (identifying specific language and diagrams in the specification describing the content processor's operation and interaction with other system components). Here, unlike in Proofpoint, the '408 Patent specification is silent as to the disputed functional term. Moreover, the tokenizer, parser, and notifier of claim 9 simply act in accordance with the outputs of the "rules accessor" and do not serve to inform or "to cabin the scope of the functional term" itself, see Diebold Nixdorf, Inc. v. Int'l. Trade Comm'n, 899 F.3d 1291, 1300-01 (Fed. Cir. 2018). Thus, the "rules accessor" could be any structure capable of performing the claimed function and lacks structural meaning. See id. at 1301.

b. Disclosure of corresponding structure

Having found that the disputed term invokes § 112 ¶ 6, the Court next determines whether the specification discloses sufficient structure that corresponds to the claimed function. This is a two-step process. "The court must first identify the claimed function." Williamson, 792 F.3d at 1351. "Then, the court must determine what structure, if any, disclosed in the specification corresponds to the claimed function." Id. "If the patentee fails to disclose adequate corresponding structure, the claim is indefinite." Id. For the reasons discussed below, the Court finds that the '408 Patent specification fails to disclose sufficient structure that corresponds to the claimed function in the disputed term.

Finjan argues that the claimed function is "accessing data, which in this case are the parser and analyzer rules." See Reply Br. at 12. Sonicwall contends that the function is simply the portion of the claim language "for accessing parser rules and analyzer rules for the specific programming language." See Responsive Br. at 18; see also '408 Patent at 20:53-54. The Court agrees with Sonicwall. Finjan's "accessing data" proposal is overbroad. Claim 9 makes clear that the "rule accessor" is specifically "for accessing parser rules and analyzer rules for the specific programming language." See '408 Patent at 20:53-54. Accordingly, the Court adopts Sonicwall's proposed function with the exception of dropping the word "for" at the beginning of Sonicwall's proposal.

The Court next looks to the specification for structure corresponding to the claimed function. The specification refers to "use of a set of language-specific rules," see, e.g., id. at 6:19-20, but makes no mention of an "accessor," "rules accessor," or the concept of accessing rules, see generally '408 Patent Specification. Finjan makes two arguments in support of its position that the specification adequately discloses structure. Neither is persuasive.

First, Finjan argues that under In re Katz Interactive Call Processing Pat. Litig., 639 F.3d 1303 (Fed. Cir. 2011), "no explicit structure for accessing data would be required, as accessing the described parser rules and analyzer rules[] is a known concept of computer operation," see Reply Br. at 12. The Court disagrees. Katz held that a standard microprocessor can serve as sufficient structure for "functions [that] can be achieved by any general purpose computer without special programming." 639 F.3d at 1316. The Katz court held that claim terms involving basic "processing," "receiving," and "storing" functions were not necessarily indefinite because a general purpose computer need not "be specially programmed to perform the recited function." Id. The Federal Circuit has since clarified that the Katz exception is "narrow" and applies "only in the rare circumstances where any general-purpose computer without any special programming can perform the function." See Ergo Licensing, LLC v. CareFusion 303, Inc., 673 F.3d 1361, 1364 (Fed. Cir. 2012) (declining to apply the Katz exception to the function of "controlling the adjusting means").

Here, the claimed function of "accessing parser rules and analyzer rules for the specific programming language" is not a basic "processing" or "storing" function or the like that could be performed on a general-purpose computer, see Katz, 639 F.3d at 1316. Instead, the function would require special programming adapted to specific requirements—e.g., the ability to access "parser rules" and "analyzer rules," which are patent specific. See Ergo, 673 F.3d at 1365 ("A specially adapted computer is not a general-purpose computer."). Thus, the narrow Katz exception does not apply.

Second, Finjan argues that the specification discloses sufficient structure by way of an "ARB rule file" and "an internal table, for rules to store and access variables." See '408 Patent at 10:4-7, 13:1-2; see also Reply Br. at 12. The Court has reviewed the cited portions of the specification and is not persuaded. The "ARB rule file" refers to "parserrules" and "analyzerrules" but does not include or discuss a concept or manner of accessing those rules. See '408 Patent at 10:4-9. Likewise, the cited "internal table, for rules . . ." does not concern accessing parser rules or analyzer rules but is instead a "symbol table" related to pattern recognition by a parsing rule. See '408 Patent at 8:46-48, 12:64-13:2. Accordingly, the specification lacks the requisite structure.

In sum, the Court finds that the '408 Patent specification fails to disclose sufficient structure corresponding to the function of "accessing parser rules and analyzer rules for the specific programming language."

c. Conclusion

Because the specification of the '408 Patent does not disclose sufficient structure for the "rules accessor" functional term and claim 9 includes this term, claim 9 is indefinite under 35 U.S.C. § 112 ¶ 2.

E. Disputed terms in the '968 Patent

The '968 Patent provides a system and method of managing cached content in relation to multiple security policies by, inter alia, providing a "policy-based index . . . indicating allowability of cached content relative to a plurality of policies." See id. at 1:63-2:7. A cache manager may then utilize the policy-based index to determine whether cached content is allowable for a different user than the original user who requested it and block cached content from being delivered to users for whom it is not allowed. Id. at 2:7-11. The parties dispute two terms in the '968 Patent. Both terms appear in claim 1, which recites:

1. A policy-based cache manager, comprising:

a memory storing a cache of digital content, a plurality of policies, and a policy index to the cache contents, the policy index including entries that relate cache content and policies by indicating cache content that is known to be allowable relative to a given policy, for each of a plurality of policies;

a content scanner, communicatively coupled with said memory, for scanning a digital content received, to derive a corresponding content profile; and

a content evaluator, communicatively coupled with said memory, for determining whether a given digital content is allowable relative to a given policy, based on the content profile, the results of which are saved as entries in the policy index.
'968 Patent at 9:47-62 (emphasis added). Each term is discussed in turn.

1. "polic[y/ies]" (claims 1 and 13)

Finjan's Proposal

Sonicwall's Proposal

Court's Construction

No construction necessary—plain and ordinary meaningAlternatively:"a rule or rules for managinga security system"

"rule(s) or set(s) of rules thatdetermine whether a piece ofcontent can be accessed by auser"

"rule(s) for managing asecurity system"

At the Hearing Finjan clarified it is alternatively seeking a construction of "a rule or rules for managing a security system." See Hearing Tr. at 60:12-15; see also Reply Br. at 12. Finjan argues that the '968 Patent specification includes examples where the term "policy" generally refers to rules for managing a security system and that Sonicwall's proposal reads in limitations not present in the claim language. See Opening Br. at 21-22. Sonicwall counters that "[t]he Federal Circuit - and Finjan - previously agreed with Sonicwall's proposed construction." See Responsive Br. at 22 (citing Finjan, Inc. v. Blue Coat Sys., Inc., 879 F.3d 1299, 1308 (Fed. Cir. 2018)). Sonicwall also argues that its proposed "piece of content" and "accessed by a user" limitations are consistent with the "purpose of the invention [the '968 Patent]." See Responsive Br. at 23-24.

As an initial matter, the Court is not persuaded that Sonicwall's proposed construction is dictated by the Federal Circuit's statement that "[t]he patentee agrees that a 'policy' is a rule or set of rules that determines whether a piece of content can be accessed by a user," see Finjan, Inc. v. Blue Coat Sys., Inc., 879 F.3d 1299, 1308 (Fed. Cir. 2018) (finding that Blue Coat was entitled to JMOL of non-infringement of claim 1 of the '968 Patent). Although Finjan apparently agreed with such a description before the Federal Circuit, the context here is entirely different. First, the Federal Circuit was reviewing the district court's ruling on post-trial motions for judgment as a matter of law, not claims construction. Moreover, "polic[y/ies]" was not construed. Second, the Federal Circuit's order does not specify whether Finjan agreed that the recited description captured the full scope of the claim term "policy," or whether Finjan was asked that question. Indeed, the crux of the instant dispute is whether "polic[y/ies]" captures only what Sonicwall proposes or Finjan's more broad alternative construction.

Turning to the question of term scope, the Court finds that Sonicwall's proposed construction is impermissibly narrow. The intrinsic record simply does not limit "polic[y/ies]" to rules that determine whether a piece of content can be accessed by a user. Instead, the term also more generally contemplates rules for managing a security system. See, e.g., '968 Patent at 3:65-4:1 ("The policy may, for example, indicate which URL's are to be blocked or which computer viruses are known and should thus be blocked."). As another example, a policy may contain "URL filtering [] used to block 'undesirable' web pages from being delivered." See id. at 1:40-42. In other words, a policy may firewall certain sources at the outset and therefore is not limited to determining whether a piece of content can be accessed by a user. Accordingly, Sonicwall's proposal is inapposite.

In sum, the Court adopts Finjan's alternative proposed construction with a minor grammatical alteration to read "rule(s) for managing a security system."

2. "[content] profile" (claims 1 and 13)

Finjan's Proposal

Sonicwall's Proposal

Court's Construction

No construction necessary—plain and ordinary meaningAlternatively:"information describing thereceived content"

"a set of characteristics orqualities that identify a typeor category of digital content"

"information describing thereceived content"

Discussion at the Hearing narrowed this dispute. Although not apparent in its briefing, Finjan clarified it is alternatively seeking a construction of "information describing the received content." See Hearing Tr. at 75:11-13, 81:6-11; see also Reply Br. at 14. Sonicwall argued that a "plain and ordinary" construction is not helpful but indicated that Finjan's alternative construction is not "far off" Sonicwall's proposal. See Hearing Tr. at 77:20-24. The Court agrees that a plain and ordinary construction would not be helpful to the jury due to commonplace definitions of "profile" or "content profile" that may conflate with the term as used in the '968 Patent. Thus, the Court analyzes Finjan's alternative construction vs. Sonicwall's proposed construction.

Finjan argues that "Sonicwall's proposed construction . . . includes a number of limitations that are not supported by the intrinsic record." See Opening Br. at 23. Finjan further argues that Sonicwall's construction is based "on a construction adopted by the PTAB during an IPR, who in turn relied on a dictionary definition . . . . [that] includes requirements that are inconsistent with the specification." See Reply Br. at 14. Sonicwall counters that its proposal is based on the construction adopted by the PTAB in two IPR proceedings and that "the 'content profile' must contain information that can be compared to a policy to determine whether the content is allowable." See Responsive Br. at 25.

Quite frankly, the Court does not see a great deal of space between Finjan's alternative construction and Sonicwall's proposed construction. Both use broad language—Finjan proposes "information" and Sonicwall proposes "characteristics or qualities." Indeed, "content profile" as used in the '968 Patent is a broad term—claim 1 outlines that the content profile corresponds to "digital content received." See '968 Patent at 9:55-57; see also '968 Patent at 8:27-28 ("[T]he content filter scans content [] to derive a profile thereof."). The Court agrees with Sonicwall that the "content profile" must contain information that can be compared to a policy to determine whether the content is allowable. See '968 Patent at 9:57-61 ("determining whether a given digital content is allowable relative to a given policy, based on the content profile . . .)

(emphasis added). However, Finjan's alternative construction includes this requirement by construing "content profile" as "information describing the received content." See Reply Br. at 14. Accordingly, the Court need not rely on Sonicwall's proposal which is based on the PTAB's dictionary-guided construction. See Philips, 415 F.3d at 1318.

All in all, the Court finds that Finjan's alternative construction is consistent with the intrinsic record and more helpful to the jury than Sonicwall's proposal. Accordingly, the Court adopts Finjan's alternative construction.

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

//

V. ORDER

As set forth above, the Court construes the disputed terms as follow:

Claim Term

Court's Construction

"mobile protection code"('633 Patent, claims 1, 8, and 14);('822 Patent claims 1 and 9)

"code that, at runtime, monitors or interceptsactually or potentially malicious codeoperations without modifying the executablecode"where the mobile protection code itself mustbe executable

"A computer program product, comprising acomputer usable medium having a computerreadable program code therein, the computerreadable program code adapted to be executedfor computer security, the method comprising:"('633 patent, claim 14)

The typographical error in the preamble iscorrected to read:"A computer program product, comprising acomputer usable medium having a computerreadable program code therein, the computerreadable program code adapted to beexecuted for computer security, comprising:"

"means for receiving a Downloadable"('844 Patent, claim 43)

Function: receiving a DownloadableStructure: Downloadable file interceptor

"means for generating a first Downloadablesecurity profile that identifies suspicious codein the received Downloadable"('844 Patent, claim 43)

Function: generating a first Downloadablesecurity profile that identifies suspicious codein the received DownloadableStructure: content inspection engineprogrammed to perform the algorithmdisclosed at col. 8, lines 51-60 of the '844Patent

"means for linking the first Downloadablesecurity profile to the Downloadable before aweb server makes the Downloadable availableto web clients"('844 Patent, claim 43)

Function: linking the first Downloadablesecurity profile to the Downloadable before aweb server makes the Downloadableavailable to web clientsStructure: content inspection engineprogrammed to perform step 630 of Fig. 6,disclosed at col. 8, lines 65-67 and col. 6,lines 13-20 of the '844 Patent.Specifically, attaching a Downloadablesecurity profile to the Downloadable (col. 8,lines 65-67 and col. 6, lines 13-18) orattaching to the Downloadable a pointer thatpoints to a stored Downloadable securityprofile (col. 6, lines 18-20).

"destination computer"('926 Patent, claim 22)

No construction necessary—plain andordinary meaning

"instantiating, by the computer, a scanner forthe specific programming language" /"instantiating a scanner for the specificprogramming language"('408 Patent, claims 1, 9, and 22)

"substituting specific data, instructions, orboth into a scanner to make it usable forscanning the specific programming language"

"a rules accessor for accessing parser rules andanalyzer rules for the specific programminglanguage"('408 Patent, claim 9)

Function: accessingparser rules and analyzerrules for the specific programming languageStructure: indefinite under § 112(2) forfailure to disclose corresponding structure

"polic[y/ies]"('968 Patent, claims 1 and 13)

"rule(s) for managing a security system"

"[content] profile"('968 Patent, claims 1 and 13)

"information describing the received content"

The Court also adopts the following constructions that the parties agreed to in their Joint Claim Construction Statement:

Claim Term

Agreed Construction

"Downloadable"('844 Patent, claims 1, 15, 41, 43;'494 Patent, claim 10;'780 Patent, claims 1, 9, 17;'926 Patent, claim 22)

"an executable application program, which is downloadedfrom a source computer and run on the destination computer"

"database"('494 Patent, claim 10;'926 Patent, claim 22;'305 Patent, claims 1, 13)

"a collection of interrelated data organized according to adatabase schema to serve one or more applications"

"means for fetching at least onesoftware component identified bythe one or more references"('780 Patent, claim 17)

Function: fetching at least one software component identifiedby the one or more referencesStructure: ID generator programmed to perform thealgorithm of step 820 disclosed in the '780 Patent at Fig. 8;9:62-64; and 4:56-66.

"means for obtaining aDownloadable that includes oneor more references to softwarecomponents required to beexecuted by the Downloadable"('780 Patent, claim 17)

Function: obtaining a Downloadable that includes one ormore references to software components required to beexecuted by the DownloadableStructure: ID generator programmed to perform thealgorithm of step 810 disclosed in the '780 Patent at Fig. 8;9:60-62; and 4:50-54.

"parse tree"('408 Patent, claims 1, 9, 22)

"a hierarchical structure of interconnected nodes built fromscanned content"

"policy index"('968 Patent, claim 1)

"a data structure indicating allowability of cached contentrelative to a plurality of policies"

IT IS SO ORDERED. Dated: March 26, 2019

/s/_________

BETH LABSON FREEMAN

United States District Judge


Summaries of

Finjan, Inc. v. Sonicwall, Inc.

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN JOSE DIVISION
Mar 26, 2019
Case No. 17-cv-04467-BLF (N.D. Cal. Mar. 26, 2019)
Case details for

Finjan, Inc. v. Sonicwall, Inc.

Case Details

Full title:FINJAN, INC., Plaintiff, v. SONICWALL, INC., Defendant.

Court:UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN JOSE DIVISION

Date published: Mar 26, 2019

Citations

Case No. 17-cv-04467-BLF (N.D. Cal. Mar. 26, 2019)

Citing Cases

Finjan LLC v. Sonicwall, Inc.

During claim construction, the parties agreed that "Downloadable" means "an executable application program,…

Finjan LLC v. Palo Alto Networks, Inc.

This issue was first addressed in Finjan, Inc. v. Blue Coat Sys., Inc., No. 13-cv-03999-BLF, 2014 WL 5361976,…