Finjan, Inc. v. Blue Coat Sys., LLC

283 F. Supp. 3d 839
CourtDistrict Court, N.D. California
DecidedJuly 28, 2017
DocketCase No. 15–cv–03295–BLF
StatusPublished
Cited by7 cases

This text of 283 F. Supp. 3d 839 (Finjan, Inc. v. Blue Coat Sys., LLC) is published on Counsel Stack Legal Research, covering District Court, N.D. California primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Finjan, Inc. v. Blue Coat Sys., LLC, 283 F. Supp. 3d 839 (N.D. Cal. 2017).

Opinion

BETH LABSON FREEMAN, United States District Judge

Before the Court are the parties' respective motions for summary judgment. Plaintiff Finjan, Inc. ("Finjan") seeks summary judgment that Defendant Blue Coat Systems, Inc.'s ("Blue Coat") Internet security software products infringe one of its patents and that several of its patents are not invalid. Blue Coat seeks summary judgment that certain of its products do not infringe several of Finjan's patents. After careful consideration, Finjan's Motion for Summary Judgment is GRANTED IN PART and DENIED IN PART and Blue Coat's Motion for Summary Judgment is GRANTED IN PART and DENIED IN PART.

I. BACKGROUND

A. The Technology and the Asserted Patents

Finjan asserts ten patents against Blue Coat: U.S. Patent No. 8,677,494 ("the '494 patent") ; U.S. Patent No. 8,566,580 ("the '580 patent") ; U.S. Patent No. 8,079,086 ("the '086 patent") ; U.S. Patent No. 8,225,408 ("the '408 patent") ; U.S. Patent No. 6,154,844 ("the '844 patent") ; U.S. Patent No. 6,965,968 ("the '968 patent") ; U.S. Patent No. 7,418,731 ("the '731 patent") ; U.S. Patent No. 9,141,786 ("the '786 patent") ; U.S. Patent No. 9,189,621 ("the '621 patent") ; and U.S. Patent No. 9,219,755 ("the '755 patent") (collectively, "the Asserted Patents"). Broadly speaking, the patents relate to two technology areas: (1) content-based security, and (2) secure sockets layer ("SSL") communication.

i. Content-Based Security

At a high level, content-based security identifies, isolates, and neutralizes actually or potentially malicious code in files downloaded from the Internet based on the detected behavior and characteristics of the code in those files, rather than scanning and maintaining a list of known viruses and actual malicious code signatures.

The '844 patent claims a system and methods of network protection where an inspector reviews a "Downloadable" for suspicious code or behavior according to a set of rules. '844 patent, col. 2 ll. 3-19. A *845"Downloadable" is "an executable application program, which is downloaded from a source computer and run on the destination computer." ECF 180 at 1. The inspector generates a profile characterizing the areas of suspicion and then attaches that profile to the Downloadable. Id. By providing verifiable profiles, the object of the invention is to provide flexible, efficient protection against known and unknown hostile Downloadables without having to re-inspect the same Downloadable each time. Id. , col. 2 l. 61-col. 3 l. 7.

The '494 patent also relates to inspecting a "Downloadable" for suspicious behavior. '494 patent, Abstract. Its claims, however, are directed to a narrower aspect of this, which involve the solution of: (1) intercepting an incoming Downloadable; (2) scanning the Downloadable and deriving "security profile data," which includes "a list of suspicious computer operations that may be attempted by the Downloadable;" and (3) storing the "security profile data" in a "database." Id. , col. 21 l. 20, col. 22 l. 8.

The '086 patent also concerns a discrete aspect of inspecting a "Downloadable" for suspicious behavior. '086 patent, Abstract. Similar to the '494 patent, its claims recite (1) receiving an incoming Downloadable and (2) scanning it and deriving "security profile data," which includes "a list of suspicious computer operations that may be attempted by the Downloadable." Id. , col. 22 ll. 9-15. However, instead of storing the "security profile data" in a database, the '086 patent claims "transmitting the Downloadable and a representation of the Downloadable security profile data to a destination computer." Id. , col. 22 ll. 16-20.

The '731 patent describes systems and methods of operating computer and network gateways that protect an intranet of computers. '731 patent, Abstract. The claimed inventions provide for caching of security information and policies at the gateway. Id. This caching of specific types of security profiles and security policies mitigates network latency-delay in the transmission of data-caused when the gateway processes downloadable information to protect intranet devices. Id. , col. 1 ll. 55-67.

The '968 patent is directed to policy-based caching, and more specifically to the management of multiple caches. '968 patent, Abstract. Content from the Internet can be cached so that the same web page does not have to be retrieved each time a user on the network requests the page. See id. , col. 3 ll. 34-40. However, users on the same network can also have different security policies-sets of rules that govern whether a file is allowed through the security filter. Id. , col. 4 ll. 14-19. The '968 patent provides a system and method of managing cached content in relation to multiple security policies by, inter alia, providing a "policy-based index ... indicating allowability of cached content relative to a plurality of policies" that can be easily utilized by a cache manager to determine whether cached content is allowable for different requesting users.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Palomar Techs., Inc. v. Mrsi Sys., LLC
373 F. Supp. 3d 322 (District of Columbia, 2019)
Lecat's Ventriloscope v. MT Tool & Mfg.
351 F. Supp. 3d 1100 (E.D. Illinois, 2018)
Sionyx, LLC v. Hamamatsu Photonics K.K.
330 F. Supp. 3d 574 (District of Columbia, 2018)

Cite This Page — Counsel Stack

Bluebook (online)
283 F. Supp. 3d 839, Counsel Stack Legal Research, https://law.counselstack.com/opinion/finjan-inc-v-blue-coat-sys-llc-cand-2017.