British Telecommunications plc v. Fortinet, Inc.

CourtDistrict Court, D. Delaware
DecidedAugust 5, 2021
Docket1:18-cv-01018
StatusUnknown

This text of British Telecommunications plc v. Fortinet, Inc. (British Telecommunications plc v. Fortinet, Inc.) is published on Counsel Stack Legal Research, covering District Court, D. Delaware primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
British Telecommunications plc v. Fortinet, Inc., (D. Del. 2021).

Opinion

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE BRITISH TELECOMMUNICATIONS PLC and BT AMERICAS, INC., Plaintiff, y Civil Action No. 18-1018-CFC

FORTINET, INC., Defendant.

MEMORANDUM ORDER Plaintiffs British Telecommunications PLC and BT Americas, Inc. (collectively BT), have sued Defendant Fortinet, Inc., for infringement of U.S. Patent Nos. 7,159,237 (the #237 patent), 7,370,358 (the #358 patent), 7,693,971 (the #971 patent), 7,774,845 (the #845 patent), and 7,895,641 (the #641 patent). D.J. 1. The Magistrate Judge held a Markman hearing for the asserted patents on November 18, 2020 and issued a Report and Recommendation on April 15, 2021. 141. Both BT and Fortinet filed objections, collectively disputing seven claim constructions. D.I. 142; D.I. 143. I review de novo the Magistrate Judge’s conclusions. See S¢. Clair Intellectual Prop. Consultants, Inc. v. Matsushita Elec. Indus. Co., 691 F. Supp. 2d 538, 541-42 (D. Del. 2010) (“Objections to the magistrate judge’s conclusions

with regard to the legal issue of claim construction are reviewed de novo.”); Fed. R. Civ. P. 72(b)(3). I. BACKGROUND The asserted patents cover systems and methods for monitoring computer networks to detect security threats. The #237 and #641 patents share a common written description. Claim 1 of the #237 patent recites [a] method of operating a probe as part of a security monitoring system for a computer network, comprising: a) collecting status data from at least one monitored component of said network; b) analyzing status data to identify potentially security related events represented in the status data, wherein the analysis includes filtering followed by an analysis of post-filtering residue, wherein the post- filtering residue is data neither discarded nor selected by filtering; c) transmitting information about said identified events to an analyst associated with said security monitoring system; d) receiving feedback at the probe based on empirically derived information reflecting operation of said security monitoring system; and e) dynamically modifying an analysis capability of said probe during operation thereof based on said received feedback. Claim 1 of the #358 patent recites [a] computer security system comprising: a plurality of inter-communicating computers including software agents together forming a plurality of agent groups, each agent corresponding with other agents in its

respective group but not with agents in other groups via a message-exchange system including the exchange of group specific tags; means for maintaining and tracking groupwide measures of agent status or behavior, and means for comparing actual behavior patterns of the measure for a given group with known normal behavior patterns and determining that a security threat does or may exist when the actual behavior patterns diverge from normal behavior patterns. Claim 1 of the #971 patent recites [a] computer network management system comprising: a communication network having a policy-based manager means distributed across said network, the distributed policy-based manager comprising a plurality of distributed management agents arranged in a hierarchy and being associated with sub-networks of said network, each of said agents includes means to register local network components with itself, to identify and store one or more roles associated with the component and to obtain policies relevant to the stored roles of the registered components, wherein each of the policies are locally stored and specify a subject role identifying the components in the system which are expected to respond to a policy and an action element specifying an action to be carried out. Claim 1 of the #845 patent recites [a] computer security system for use in a network environment comprising at least a group of user computers arranged to communicate over a network, the system comprising:

a warming message exchange system operable to allow communications from the group of user computers of warning messages relating to a piece or set of suspect data identified by one or more of the group of user computers as a possible security threat; an identity generator operable to generate an identifier of the piece or set of suspect data; a message counting system operable to maintain a count for every particular piece or set of suspect data based on a number of warning messages communicated over the network relating to each of the piece or set of suspect data; and a network security system operable to act in respect of any particular piece or set of suspect data when the count maintained therefor is substantially equal to or greater than at least one threshold value, wherein the threshold value is greater than one. Claim 1 of the #641 patent recites [a] system for operating a probe as part of a security monitoring system for a computer network, the system comprising: a) a sensor coupled to collect status data from at least one monitored component of the network; b) a filtering subsystem coupled to analyze status data to identify potentially security-related events represented in the status data, wherein the analysis includes filtering followed by an analysis of post- filtering residue, wherein the post-filtering residue is data neither discarded nor selected by filtering; c) a communications system coupled to transmit information about the identified events to an analyst system associated with the security monitoring system; d) a receiver for receiving feedback at the probe based on empirically-derived information reflecting operation of the security monitoring system; and

e) a modification control system for dynamically modifying an analysis capability of the probe during operation thereof based on the received feedback. Il. LEGALSTANDARDS FOR CLAIM CONSTRUCTION “It is a bedrock principle of patent law that the claims of a patent define the invention to which the patentee is entitled the right to exclude.” Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc). “‘[T]here is no magic formula or catechism for conducting claim construction.’ Instead, the court is free to attach the appropriate weight to appropriate sources ‘in light of the statutes and policies that inform patent law.’” SoftView LLC v. Apple Inc., 2013 WL 4758195, at *1 (D. Del. Sept. 4, 2013) (quoting Phillips, 415 F.3d at 1324). It is necessary to construe claim terms whenever there is a fundamental dispute between parties about their meaning. O2 Micro Int’l Ltd. vy. Beyond Innovation Tech. Col., Ltd., 521 F.3d 1352, 1362 (Fed. Cir. 2008). Construing the claims of a patent is a question of law. Markman v. Westview Instruments, Inc., 52 F.3d 967, 977-78 (Fed. Cir. 1995), aff'd, 517 U.S. 370, 388-90 (1996). Unless a patentee acts as its own lexicographer by setting forth a special definition or disavows the full scope of a claim term, the words in a claim are to be given their ordinary and accustomed meaning. Thorner v. Sony Comput. Ent. Am. LLC, 669 F.3d 1362, 1365 (Fed. Cir. 2012). “[T]he ordinary and customary meaning of a claim term is the meaning that the term would have to a person of

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
British Telecommunications plc v. Fortinet, Inc., Counsel Stack Legal Research, https://law.counselstack.com/opinion/british-telecommunications-plc-v-fortinet-inc-ded-2021.