SUE L. ROBINSON, District Judge
On December 19, 2011, Juniper Networks Inc. ("Juniper"), a Delaware corporation involved in the design, manufacture and sale of firewall technologies, filed suit
Juniper is a leading manufacturer of computer networking technologies, including firewalls. (D.I. 1 at ¶ 1) In April 2004, Juniper bought the company NetScreen, an industry innovator in high-end network security devices, for $4 billion; Net-Screen's intellectual property rights were included as a part of this acquisition. (Id. at ¶ 13) Yuming Mao ("Mao") and Nir Zuk ("Zuk"), employees of NetScreen, began working for Juniper after the acquisition. (Id. at ¶ 14) Zuk left Juniper in February 2005 to start PAN, which also develops firewall devices. (D.I. 21 at 3) In January of 2006, Mao left Juniper for employment at PAN. (Id.)
Presently before the court are several motions: Juniper's motion for summary judgment of assignor estoppel (D.I.172); competing motions for summary judgment of validity of the '612 and '347 patents (D.I. 170; D.I. 204); and competing motions for summary judgment regarding infringement (D.I. 176; D.I. 202). The court has jurisdiction pursuant to 28 U.S.C. §§ 1331 and 1338(a).
"The court shall grant summary judgment if the movant shows that there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law." Fed.R.Civ.P. 56(a). The moving party bears the burden of demonstrating the absence of a genuine issue of material fact. Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 586 n. 10, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986). A party asserting that a fact cannot be — or, alternatively, is — genuinely disputed must support the assertion either by citing to "particular parts of materials in the record, including depositions, documents, electronically stored information, affidavits or declarations, stipulations (including those made for the purposes of the motions only), admissions, interrogatory answers, or other materials," or by "showing that the materials cited do not establish the absence or presence of a genuine dispute, or that an adverse party cannot produce admissible evidence to support the fact." Fed.R.Civ.P. 56(c)(1)(A) & (B). If the moving party has carried its burden, the nonmovant must then "come forward with specific facts showing that there is a genuine issue for trial." Matsushita, 475 U.S. at 587, 106 S.Ct. 1348 (internal quotation marks omitted). The court will "draw all reasonable inferences in favor of the nonmoving party, and it may not make credibility determinations or weigh the evidence." Reeves v. Sanderson Plumbing Prods., Inc., 530 U.S. 133, 150, 120 S.Ct. 2097, 147 L.Ed.2d 105 (2000).
To defeat a motion for summary judgment, the non-moving party must "do more than simply show that there is some metaphysical doubt as to the material facts." Matsushita, 475 U.S. at 586-87, 106 S.Ct. 1348; see also Podobnik v. U.S. Postal Service, 409 F.3d 584, 594 (3d Cir.
The court previously found that the doctrine of assignor estoppel negated PAN's affirmative defense of invalidity of the '634 patent. (D.I.53, D.I.54) The parties stipulated that this ruling applied to the '752 patent. (D.I.80) As to the '700, '347, '723 and '459 patents, the court found that issues of material fact precluded resolution of the issue, because privity is determined based upon a balancing of the equities, a fact-sensitive inquiry that must be resolved outside the pleadings. (D.I.80)
In Diamond Scientific Co. v. Ambico, Inc., 848 F.2d 1220, 1224 (Fed. Cir.1988), the Federal Circuit reaffirmed the existence of the doctrine of assignor estoppel. As the court explained, "[a]ssignor estoppel is an equitable doctrine that prevents one who assigned the rights to a patent (or patent application) from later contending that what was assigned is a nullity. The estoppel also operates to bar other parties in privity with the assignor, such as a corporation founded by the assignor." Id. As the Court explained, the doctrine recognizes "the implicit representation by the assignor that the patent rights that he is assigning (presumably for value) are not worthless .... To allow the assignor to make that representation at the time of the assignment (to his advantage) and later to repudiate it (again to his advantage) could work an injustice against the assignee." Id. After concluding that assignor estoppel remained a valid defense, the Federal Circuit stated that an analysis of the doctrine "must be concerned mainly with the balance of equities between the parties." Id. at 1225.
The Federal Circuit, in Shamrock Technologies, Inc. v. Medical Sterilization, Inc., 903 F.2d 789, 793 (Fed.Cir.1990), reiterated that "[a]ssignor estoppel is an equitable doctrine ... that is mainly concerned with the balance of the equities between the parties ... [and t]hose in privity with the assignor partake of that balance; hence, extension of the estoppel to those in privity is justified."
In the case at bar, Mao and/or Zuk are listed as inventors on each of the 723, '459, 700, '347, and '612 patents. (See '723 patent listing Mao and Zuk as inventors; '459 patent listing Mao as an inventor; '700 patent listing Mao as an inventor; '347 patent listing Mao as an inventor; and '612 patent listing Mao as an inventor) With the exception of the '723 patent,
Mao requested and received the title "founder and chief architect" when he joined PAN. (D.I. 22 at ¶ 7) Zuk testified that he "is not a title person" and has no problem with Mao having the title founder. (D.I. 174, ex. 17 128:2-130:19) Mao has consistently held himself out as a founder (including to customers) and PAN's website describes him as such. (D.I. 174, exs. 9, 11, 12, 14, 16 at 583:24-584:7, 584:20-585:3) In 2010, PAN recognized Mao as its founder and commended his efforts in its China market. (Id., ex. 29) While a November 2005 presentation delivered to investors did not list Mao as a founder, a December 2005 presentation listed Mao as a member of the "Founding Team."
For completeness, the court turns to the balance of equities and the relationship of Mao and PAN. Zuk testified that he "needed Yuming Mao to work mostly on the connections between the hardware and
While the investment presentations outlined the core functions and schema that resulted in the PA-4000 series of products, PAN was in the early stages of product development at the time Mao started work, with "maybe 1 or 2 percent of the product ... done ..." and no prototype. (D.I. 201, ex. 1 at 253:24-254:16, 260:1-261:7, 264:11-266:2; D.I. 174, ex. 19 at 81:11-14, 84:15-19, ex. 27) Mao wrote an early technical specification relating to the PA-4000 series. (D.I.174, ex. 32) That Mao could not recall if these features were implemented into the product is not dispositive, as the query is whether Mao was closely involved in the development of products and with the company. (D.I. 201, ex. 1 at 573:3-14) Mao testified to his involvement in the product's development (including specific examples of product features) and his critical role with PAN. (See e.g., D.I. 174, ex. 15 at 289:9-290:20, 296:9-14, 300:1-10, 305:23-306:7, 516:21-519:15) Considering the balance of equities and the relationship of Mao and PAN, the evidence demonstrates that Mao is in privity with PAN, therefore, the Mao patents are subject to assignor estoppel.
As to the '723 patent, Zuk's employment contract with NetScreen included an agreement to assign his inventions to NetScreen, which PAN does not dispute. (D.I. 173 at 17; D.I. 174, exs. 20, 48) Juniper diligently sought an executed assignment and oath from Zuk, however, Zuk declined to comply with the requests. Juniper filed the application with the PTO and was allowed to proceed without Zuk's signature. The court concludes that the employment contract properly assigned the patent to Juniper.
Claim construction is a matter of law. Phillips v. AWH Corp., 415 F.3d 1303, 1330 (Fed.Cir.2005) (en banc). Claim construction focuses on intrinsic evidence — the claims, specification and prosecution history — because intrinsic evidence is "the most significant source of the legally operative meaning of disputed claim language." Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed.Cir.1996); Markman v. Westview Instruments, Inc., 52 F.3d 967, 979 (Fed.Cir.1995) (en banc), aff'd, 517 U.S. 370, 116 S.Ct. 1384, 134 L.Ed.2d 577 (1996). Claims must be interpreted
Claim construction starts with the claims, id. at 1312, and remains centered on the words of the claims throughout. Interactive Gift Express, Inc. v. Compuserve, Inc., 256 F.3d 1323, 1331 (Fed.Cir.2001). In the absence of an express intent to impart different meaning to claim terms, the terms are presumed to have their ordinary meaning. Id. Claims, however, must be read in view of the specification and prosecution history. Indeed, the specification is often "the single best guide to the meaning of a disputed term." Phillips, 415 F.3d at 1315.
A patent is infringed when a person "without authority makes, uses or sells any patented invention, within the United States ... during the term of the patent." 35 U.S.C. § 271(a). A two-step analysis is employed in making an infringement determination. See Markman v. Westview Instruments, Inc., 52 F.3d 967, 976 (Fed. Cir.1995). First, the court must construe the asserted claims to ascertain their meaning and scope. See id. Construction of the claims is a question of law subject to de novo review. See Cybor Corp. v. FAS Techs., 138 F.3d 1448, 1454 (Fed.Cir.1998). The trier of fact must then compare the properly construed claims with the accused infringing product. See Markman, 52 F.3d at 976. This second step is a question of fact. See Bai v. L & L Wings, Inc., 160 F.3d 1350, 1353 (Fed.Cir.1998).
"Direct infringement requires a party to perform each and every step or element of a claimed method or product." BMC Res., Inc. v. Paymentech, L.P., 498 F.3d 1373, 1378 (Fed.Cir.2007), overruled on other grounds by 692 F.3d 1301 (Fed. Cir.2012). "If any claim limitation is absent from the accused device, there is no literal infringement as a matter of law." Bayer AG v. Elan Pharm. Research Corp., 212 F.3d 1241, 1247 (Fed.Cir.2000). If an accused product does not infringe an independent claim, it also does not infringe any claim depending thereon. See Wahpeton Canvas Co. v. Frontier, Inc., 870 F.2d 1546, 1553 (Fed.Cir.1989). However, "[o]ne may infringe an independent claim and not infringe a claim dependent on that claim." Monsanto Co. v. Syngenta Seeds, Inc., 503 F.3d 1352, 1359 (Fed.Cir.2007) (quoting Wahpeton Canvas, 870 F.2d at 1552) (internal quotations omitted). A product that does not literally infringe a patent claim may still infringe under the doctrine of equivalents if the differences between an individual limitation of the claimed invention and an element of the accused product are insubstantial. See Warner-Jenkinson Co. v. Hilton Davis Chem. Co., 520 U.S. 17, 24, 117 S.Ct. 1040, 137 L.Ed.2d 146 (1997). The patent owner has the burden of proving infringement and must meet its burden by a preponderance of the evidence. See SmithKline Diagnostics, Inc. v. Helena Lab. Corp., 859 F.2d 878, 889 (Fed.Cir.1988) (citations omitted).
When an accused infringer moves for summary judgment of non-infringement, such relief may be granted only if one or more limitations of the claim in question does not read on an element of the accused product, either literally or under the doctrine of equivalents. See Chimie v. PPG Indus., Inc., 402 F.3d 1371, 1376 (Fed.Cir.2005); see also TechSearch, L.L.C. v. Intel Corp., 286 F.3d 1360, 1369 (Fed.Cir.2002) ("Summary judgment of noninfringement is ... appropriate where the patent owner's proof is deficient in meeting an essential part of the legal standard for infringement, because such failure will render all other facts immaterial.").
For there to be infringement under the doctrine of equivalents, the accused product or process must embody every limitation of a claim, either literally or by an equivalent. Warner-Jenkinson, 520 U.S. at 41, 117 S.Ct. 1040. An element is equivalent if the differences between the element and the claim limitation are "insubstantial." Zelinski v. Brunswick Corp., 185 F.3d 1311, 1316 (Fed.Cir.1999). One test used to determine "insubstantiality" is whether the element performs substantially the same function in substantially the same way to obtain substantially the same result as the claim limitation. See Graver Tank & Mfg. Co. v. Linde Air Products Co., 339 U.S. 605, 608, 70 S.Ct. 854, 94 L.Ed. 1097 (1950). This test is commonly referred to as the "function-way-result" test. The mere showing that an accused device is equivalent overall to the claimed invention is insufficient to establish infringement under the doctrine of equivalents. The patent owner has the burden of proving infringement under the doctrine of equivalents and must meet its burden by a preponderance of the evidence. See SmithKline Diagnostics, Inc. v. Helena Lab. Corp., 859 F.2d 878, 889 (Fed.Cir. 1988) (citations omitted).
The doctrine of equivalents is limited by the doctrine of prosecution history estoppel. In Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., Ltd., 535 U.S. 722, 122 S.Ct. 1831, 152 L.Ed.2d 944 (2002) ("Festo VII"), the Supreme Court stated:
Id. at 734-735, 122 S.Ct. 1831. In other words, the prosecution history of a patent, as the public record of the patent proceedings, serves the important function of identifying the boundaries of the patentee's property rights. Once a patentee has narrowed the scope of a patent claim as a condition of receiving a patent, the patentee may not recapture the subject matter surrendered. In order for prosecution history estoppel to apply, however, there must be a deliberate and express surrender of subject matter. See Southwall Tech., Inc. v. Cardinal IG Co., 54 F.3d 1570, 1580 (Fed.Cir.1995).
Once a court has determined that prosecution history estoppel applies, it must determine the scope of the estoppel. See id. This requires an objective examination into the reason for and nature of the surrendered subject matter. Id.; see also Augustine Med., Inc. v. Gaymar Indus., Inc., 181 F.3d 1291, 1299 (Fed.Cir. 1999). If one of ordinary skill in the art would consider the accused product to be surrendered subject matter, then the doctrine
"[A] narrowing amendment made to satisfy any requirement of the Patent Act" creates a presumption that "the patentee surrendered all subject matter between the broader and the narrower language" and bars any equivalents. Festo VII., 535 U.S. at 736, 740, 122 S.Ct. 1831; see also Honeywell Int'l, Inc. v. Hamilton Sundstrand, 370 F.3d 1131, 1139 (Fed.Cir. 2004) (prosecution history estoppel "bar[s] the patentee from asserting equivalents if the scope of the claims has been narrowed by an amendment during prosecution.").
Thus, a presumption of prosecution history estoppel is established by showing that the patentee made a narrowing amendment and that "the reason for that amendment was a substantial one relating to patentability." Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., 344 F.3d 1359, 1366 (Fed.Cir.2003) (en banc). There are three exceptions to this presumption: (1) the equivalent was "unforeseeable at the time of the narrowing amendment"; (2) the rationale for the amendment "bore no more than a tangential relation to the equivalent in question"; or (3) "some other reason suggested that the patentee could not reasonably have been expected to describe the alleged equivalent." Festo VII., 535 U.S. at 740-41, 122 S.Ct. 1831.
The patents-in-suit are directed to inventions for computer networks and systems using hardware, software, or combinations thereof. Physical hardware encompasses components such as circuits, wires, and computer chips (e.g., a central processing unit or "CPU"). One chip may contain multiple hardware components, such as electronic switches (e.g., transistors or logic gates).
Computer systems use memory to facilitate the storage and manipulation of software and other data. Memory comes in numerous varieties and can be shared by multiple other components in a system. There are two primary ways of sending data in memory to parts of a computer system that need to use it. The first is to create a new copy of the data in a new memory location sometimes called "passing by value," and the second is to communicate a "pointer" to the location in memory where the data is held, sometimes called "passing by reference." Data may be structured or organized in memory to facilitate its use. For example, data may be grouped into larger structures of multiple (often related) data values, and formatted depending on how the data entries are to be looked up and accessed. Data elements can be organized sequentially in a "linked list," or for fast lookup in a "hash table."
Computers systems may be connected via networks (like the internet). Data is broken down into packets (with additional metadata) to communicate. A common format for data packets includes multiple layers of metadata information, each corresponding to a particular networking function. Firewalls are designed to permit or deny network transmissions based upon a set of rules, and are frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. As such, firewalls are critical to running secure networks.
The '634 patent describes the use of "plural security devices but only one flow table," which "can result in faster response time" in network security. (2:13-26 and fig. 1) The single flow table improves the efficiency of packet processing in a network security device. The integration of multiple security devices for network security combines the strengths (and mitigates the limitations) of various types of security devices, for example, a firewall or an intrusion prevention system (IPS). (1:15-2:9; 2:56-3:12)
Independent claim 1 recites:
(7:10-40) Independent claim 19 recites:
(8:34-65)
The court construes this limitation as "at least two physical devices, each of which performs a security function." This is consistent with the specification, which provides examples of security devices, i.e., firewall, IPS, and flow based router. (See e.g., 4:19-23) Figure 9 describes "a network topology where a session module, firewall, IPS and router are included in a single security device." (2:48-50) According to the asserted claim language, each security device processes data
"Unless the steps of a method actually recite an order, the steps are not ordinarily construed to require one. However, such a result can ensue when the method steps implicitly require that they be performed in the order written." Interactive Gift Express, Inc. v. Compuserve Inc., 256 F.3d 1323, 1342-43 (Fed.Cir. 2001). This limitation does not require that the "extracting" step occur before the "forwarding" step. The plain meaning of "forwarding" does not compel the conclusion that the "extraction" step must be performed first. Mantech Envtl. Corp. v. Hudson Envtl. Servs., Inc., 152 F.3d 1368, 1375-76 (Fed.Cir.1998) (holding that the steps of a method claim had to be performed in order, as each subsequent step referenced something logically indicating the prior step had been performed). Further, the specification states "the steps of the invention can be performed in a different order and still achieve desirable results." Interactive Gift, 256 F.3d at 1343 (directing courts to determine whether the rest of the specification "directly or implicitly requires such a narrow construction").
PAN's technical and marketing documents describe the accused products
The claim language recites, "the computer network including two or more security devices for processing data packets." Citing to one question and answer in Juniper's expert's testimony,
PAN argues that prosecution history estoppel prevents Juniper from arguing infringement based on the doctrine of equivalents. The original claim language required "the computer network having one or more devices for processing the packet" and "extracting flow instructions for two or more devices from the single flow record." (D.I. 151, ex. 10 at JA-1140) The claims were amended to require "the computer network including two or more security devices" throughout. (Id. at JA-567-68) Juniper explained during reexamination that allowing "sub-components of [a] single security device" to meet the "two or more security devices" claim limitation would "effectively write[] the multiple `security
The '347 patent describes technology for efficient packet processing in a firewall, using "a first set of rules for sorting incoming IP packets into initially allowed packets and initially denied packets." (Abstract) The initially denied packets are then processed or sorted into allowed or denied packets. (5:45-49) Denied packets are dropped, and allowed packets pass through the firewall. Id.
Independent claim 1 recites:
(7:22-29) Independent claim 14 recites:
(8:11-18)
The specification describes "an engine for sorting incoming IP packets into initially allowed and denied packets using a fixed set of rules" and "further sort[ing] the initially denied packets into allowed packets and denied packets, using dynamically generated rules. The denied packets are dropped and the allowed packets are permitted to enter the network." (3:5-14) Contrary to PAN's suggestion, the term "drop" is consistently used in conjunction with finally denied packets. (Id.; fig.6) The court declines to construe this term, and in accordance with Juniper's suggestion, the plain and ordinary meaning shall apply.
Analyzing the source code, the parties' experts reached opposing conclusions regarding whether the "default rule" satisfies the claim language. Juniper's expert, Dr. Rubin, explained that received packets are "initially allowed" or "assigned the security action `deny.' ... An initially denied packet will ultimately be discarded, if it is not further sorted as an allowed packet, for example through the processing or sorting described below." (D.I. 178, ex. A at ¶¶ 845-49) PAN's expert, Dr. Mitzenmacher, explained that the "packets are not `initially denied' because intra-zone packets are allowed before a deny action is ever set for the packet." (D.I. 211 at ¶ 157) Further, "the default action [cannot] itself be considered a set of `rules' (plural), because there is only a single rule (if no other rule applies, deny the packet)." (Id.
The '612 patent is a continuation of the '347 patent, and its claims are directed to a filter that applies "dynamically-generated rules" after the application of "fixed rules" by the ACL engine. (3:17-26, 6:35-47) The firewall engine dynamically adds or modifies rules based on a sequence of data packets received by a network. (3:9-12) The newly added or modified rules may (for example) be designed to respond to or mitigate a network attack identified based on analysis of data received.
Independent claim 1 recites:
(7:47-56) Independent claim 13 recites:
(8:61-67)
The parties agree that a "rule" must exist across multiple sessions. The background of the invention provides that "[r]ules specify actions to be applied as against certain packets." (2:37-40) The specification distinguishes between "rules" and "look-up tables." For example, "the firewall engine may first check a stored look-up table with criteria relating to ongoing current applications or services, before searching the rules," and "packets ... may be processed using the look-up table instead of a rule search." (5:14-16, 40-42) A look-up table has "contents" and stores "information," such as "the IP address, port and protocol corresponding to each current application or service." (5:18-22) Further, information may be "written to the look-up table." (5:39-40) The court construes the limitation as "actions to be applied against packets, as distinct from a look-up table, which is a data structure that stores information."
PAN disputes (without reference to expert reports or testimony) that its products do not add rules dynamically as required by the claim language. Dr. Rubin explains that several features of the accused products, including SYN flood, Block IP and Reconnaissance Protection, perform this dynamic step. Dr. Rubin's testing showed that a new rule was added "in the event that traffic was detected attempting to download a particular file via FTP transfer." (D.I. 178, ex. A at ¶¶ 934-36, 957-58, 985)
The experts disagree on whether the Block IP feature uses entries stored in a look up table. Dr. Rubin opines that the "operation adds a block rule to the table ..." and the entries are stored in a "hash table," which is different from a "look-up table." (D.I. 178, ex. A at ¶¶ 957-61; D.I. 149, ex. E at 90:13-15; D.I. 179, ex. B at 80:10-81:14, 82:3-83:25) On the other hand, Dr. Mitzenmacher opines that a "block table" is a "look-up table" and satisfies the claim limitation. (D.I. 211 at ¶ 192) The experts also disagree on whether the claim requires each rule to have "multiple matching criteria" and whether the rules used by the accused products contain "multiple criteria." (D.I. 178, ex. A at ¶¶ 933, 936; D.I. 211 at ¶¶ 192-193, 203) The court concludes that genuine issues of material fact exist and, therefore, the competing motions for summary judgment are denied.
The '752 patent is directed to an apparatus and method for sharing information between primary and secondary security systems, which provide protection "upon a failover event." (Abstract) Specifically, the two security systems each store information for flows that they are actively processing, as well as flow information synchronized from the other security system. (8:17-29) By doing so, each system can take over processing that ordinarily would be performed by the other, if the other system experiences a failover event. (Id.) Only when a failover event occurs does the system activate the "secondary portion" of the flow table and move the records from that portion into the "primary portion." (9:59-61) When these records are moved into the "primary portion," the system can label them, so they can be
Independent claim 1 recites:
(12:22-63) independent claim 13 recites:
A system, comprising:
(13:45-14:19)
The court adopts PAN's proposed construction, "the portion of the flow table that stores information for processing packets when all security devices are operational." This construction finds support in the specification, which explains that a "session module ... may also facilitate the operation of the security devices by communicating flow information to a respective device for processing a given packet." (4:54-57) The primary portion "store[s] flow information for which the session module is actively participating in the processing of the packets." (8:20-22)
The court construes this limitation as "a separate portion of the same flow table that stores information for processing packets if there is a failover event." While the primary and secondary portions "may be integrated in [a] flow table," the specification and claims distinguish the "secondary portion" from the "primary portion" of the flow table. (8:27-29, fig.10) The secondary "portion of the flow table [is] dedicated to stor[ing] information related to the operation of the given session module as a secondary security system." (8:23-25) A flow table may contain "multiple secondary portions corresponding to multiple primary security systems for which a given session module may be providing failover support." (8:30-32)
The parties' experts disagree on whether the flow tables in the accused products satisfy the claim limitation requiring a primary portion and a secondary portion. The specification describes "records of the primary and secondary portions" being integrated in a flow table. Further, "the record may include a label indicating to which security system the record belongs."
Juniper's original claims required "a primary security system" and "a secondary security system" for processing packets and the security systems were "operable to maintain flow information ... to facilitate processing of the packets." (D.I. 153, ex. 13 at JA-2144) Juniper amended the claims to include "a primary portion" and "a secondary portion" of a flow table. (Id.) This amendment narrowed the scope of the claim to require a flow table with two portions, and Juniper argued that the prior art did not disclose
(Id. at JA-2158-59) This amendment, along with the court's construction requiring that the secondary portion be separate from the primary portion, prevents Juniper from arguing at trial that a flow table without portions satisfies the claim language under the doctrine of equivalents. Contrary to Juniper's assertion that this difference "bear[s] no more than a tangential relation" to the asserted basis for equivalency, the court concludes that the "portioning" of the flow table is integral to Juniper's argument. PAN's motion for summary judgment in this regard is granted.
Conventional networks include different packet processing engines such as a firewall, an intrusion detection system, or a flow-based router. (1:48-60) Each of these processing engines can examine different layers within a packet. (1:38-40) The different engines work together to allow "efficient processing of packets at different network levels." (3:63-64) After processing, tags may be attached to packets, which include information that is useful to other engines when they are processing or routing the packet. (5:19-33)
Independent claim 1 recites:
(11:35-54) Independent claim 9 recites:
A method comprising:
(12:20-36)
The claim language requires that the first, second, and third engines be "different." The specification recites a "multiple processor system," "packet processing devices," and "a group of processing engines." (2:20-36; 4:11-12) Particularly, the specification calls out "a first processor" and "a second processor." The court construes the limitations respectively as, "a first processor" and "a second processor."
The court agrees with Juniper that this limitation does not require construction. The term "route" in the context of the claims is understood by its plain and ordinary meaning. The court clarifies that "routing" does not exclude the use of pointers. The '634 patent was incorporated by reference (1:11-12) and provides for "a pointer to a location of a given packet... in memory and a pointer to information containing the relative position of the packet in a flow."
The court adopts Juniper's construction of "a tag," which is "a structure for holding data." Contrary to PAN's argument, the specification does not require that the tag necessarily be "sent along" with the packet. Tags may be sent over different paths or over a common path. (5:4-8) "[I]f the firewall processing engine determines that a packet is part of an attack, a tag including a communication action flag can be sent to flow engine ... informing flow engine ... not to route any more packets from the same session as the packet." (7:51-55)
PAN's construction for "associate... a tag" is adopted, "form a connection with a tag." A tag may be "attached" to a packet or "appended or prepended to the packet." (2:60-61,4:23)
Dr. Mitzenmacher performed an experiment and concluded that "slow path and fast path processing for a single packet can indeed run on the same core of the Cavium." (D.I. 211 at ¶ 84) However, Dr. Rubin analyzed the source code and opined that "the Slowpath Engine and the Fastpath Engine can be run on different cores of the Cavium chip." (D.I. 178, ex. A at ¶ 656)
The parties' experts also disagree on whether the first engine "routes" packets to other engines. Dr. Mitzenmacher explains that "neither the packet information, nor the pointer to the packet in the [Work Queue Entry] WQE, is sent from a source to a destination in this process by the scheduler .... Thus, not even the pointer to the packet is "routed" ...." (D.I. 211 at ¶ 80) However, Dr. Rubin opines that "after a packet is received by the SSO Unit in the accused PAN products, it is packaged into a data structure called a Work Queue Entry .... the Cavium accesses and processes the packet by reference to the WQE, including its `pointer to the Packet Data Buffer.'"
The claims require that the "second engine ... associate a tag with the packet." PAN asserts through attorney argument and by reference to Dr. Rubin's expert report and testimony, that Dr. Rubin's opinion is incorrect because the WQE is the "data structure" that holds session and group data and "the WQE is associated with the packet before the SSO receives it."
The '700 patent shares a specification with the '459 patent, as described below. Independent claim 2 of the '700 patent recites:
An L2 device comprising:
('700 patent, 11:1-18) During prosecution of the '700 patent, Juniper amended the claims to add "associated with intra-zone transfer, without inspection by the firewall engine," and argued that the prior art did not disclose transferring intra-zone packets "without inspection by the L2 device's firewall engine." (D.I. 152, ex. 11 at JA-1285) When allowing the claims, the examiner agreed with Juniper that "the prior art of record do[es] not teach the limitation `wherein intra-zone packets are not inspected by the firewall' (see similar, but not identical language)," and "do[es] not teach the limitation `transfer[ing] noninspected packets within the first or second security zones' (see similar, but not identical language)." (Id. at JA-1171-72.)
The '459 patent is a direct continuation of, and shares a specification with, the '700 patent. The '459 patent describes the use of zone-specific policies, which allow security systems to differentiate between inter-zone packets (i.e., packets sent between two or more security zones) and intra-zone packets (i.e., packets that stay in the same security zone). (6:62-65, 10:42-59) "Packets are either directly processed (e.g., intra-zone packets) or processed after a security screening (e.g., for inter-zone packets)." (6:25-27) The specification explains that "communications that are intra-zone ... will not require inspection," while inter-zone communications "will invoke an inspection process." (8:26-31) For example, the '459 patent describes ways to bypass one or more types of security screening for intra-zone packets traveling within a distinct security domain, to increase processing efficiency. The examiner allowed the claims for "substantially similar ... reasons" to the '700 patent.
Independent claim 1 of the '459 patent recites:
(10:43-59) Independent claim 12:
A network device comprising:
(11:24-50)
The court construes the limitation as "inspection by applying one or more security policies." The specification supports this construction, providing that "policies can be established for inspecting or otherwise screening packets" and, if "an inspection is to occur, an appropriate policy is retrieved." (7:19-21; 9:5-6)
The court construes the limitation as "without inspection." The specification states, "communications that are intra-zone... will not require inspection." (8:26-29) The packets are evaluated "to determine if inspection is required." (9:27-28) This construction makes clear that the inspection process is not performed. "Screening engine ... examines each packet received from a respective port ... and determines whether security screening is to be performed." (6:45-47) This construction is also consistent with the prosecution history discussed above.
The parties' experts disagree on whether the "without performing the screening" limitation is met by the accused products. Dr. Mitzenmacher explains that all incoming packets are subject to inspection of information in the header to determine whether the packet should be discarded, prior to policy look up. (D.I. 211 at ¶ 230) Further, the look up policy "is called for intra-zone packets" as well, therefore, Dr. Mitzenmacher opines that the accused products do not meet the claim limitation. For the '459 patent, Juniper argues that the incoming packet inspection is irrelevant as it occurs prior to policy look up and is not the infringement contention at issue. Dr. Rubin explains that the application of a "deny" security policy to interzone packets, when the product runs in default mode, infringes the claim limitation. (D.I. 178, ex. A at ¶¶ 1249, 1265, 1276) Dr. Mitzenmacher opines that to determine whether the default rule applies requires that a security inspection be performed. (D.I. 211 at ¶ 225-227)
Relying on the same arguments described above, PAN argues that the claims of the '700 patent "require that packets traveling within a security zone (`intra-zone packets') are routed `without the inspection by the firewall engine' or specify that such intra-zone packets are to remain `non-inspected." In response, Juniper advances the opinions of its expert that the accused products employ a "zone specific security approach." (D.I. 178, ex. A at ¶¶ 1103, 1122) After reviewing the expert reports, the court concludes that a classic battle of the experts exists with respect to the asserted claim limitations of the '459 and '700 patents, resulting in genuine issues of material fact. The parties' competing motions for summary judgment are denied.
PAN moves for summary judgment of non-infringement of the '459 and '700 patents under the doctrine of equivalents. The asserted claims of the '700 patent route intra-zone packets "without inspection by the firewall engine," and the asserted claims of the '459 patent do so "without performing the security screening." The prosecution history for the '700 patent discussed above and the court's construction forecloses argument by Juniper that intra-zone packets may be inspected and still meet these claim limitations under the doctrine of equivalents. See e.g., Invitrogen Corp. v. Clontech Laboratories, Inc., 429 F.3d 1052, 1078 (Fed. Cir.2005) (recognizing that "an amendment to a related limitation in the parent application [that] distinguishes prior art and thereby specifically disclaims a later (though differently worded) limitation in the continuation application" can create estoppel) (citing Elkay Mfg. Co. v. EBCO Mfg. Co., 192 F.3d 973, 978-79 (Fed.Cir. 1999)). The court grants PAN's motion for summary judgment in this regard.
Juniper moves for partial summary judgment for approximately 73 "undisputed claim elements" found in 56 of the 65 asserted claims, arguing that Dr. Rubin's report
The court has provided a construction in quotes for the claim limitations at issue. The parties are expected to present the claim construction to the jury consistently with any explanation or clarification herein provided by the court, even if such language is not included within the quotes.
For the foregoing reasons, Junipers' motion for summary judgment of assignor estoppel (D.I.172) is granted and the competing motions for summary judgment of validity of the patents-in-suit (D.I.170, D.I. 204) are denied as moot. Juniper's motion for summary judgment of infringement is denied. (D.I.176) PAN's motion for summary judgment of non-infringement is granted in part and denied in part. (D.I. 202)
At Wilmington this 6th day of February 2014, consistent with the memorandum opinion issued this same date;
IT IS ORDERED that:
1. Juniper's motion for summary judgment of assignor estoppel (D.I.172) is granted.
2. The competing motions for summary judgment of validity of the patents-in-suit (D.I.170, D.I.204) are denied as moot.
3. Juniper's motion for summary judgment of infringement is denied. (D.I.176)
4. PAN's motion for summary judgment of non-infringement is granted in part and denied in part. (D.I.202)
5. The court has provided a construction in quotes for the claim limitations at issue. The parties are expected to present the claim construction to the jury consistently with any explanation or clarification herein provided by the court, even if such language is not included within the quotes.
PAN asserts that Juniper's doctrine of equivalents arguments would ensnare the prior art reference, Baraka. However, neither PAN nor its expert provides analysis for this proposition or matches the prior art element by element to any asserted claim. (D.I. 203 at 38-39; D.I. 211 at ¶ 204) As this is a matter of law for the court to decide, should PAN wish to move forward with this argument, it will need to provide the court with a proffer before trial. The burden would then shift to Juniper "to prove that the range of equivalents which it seeks would not ensnare the prior art." Wilson Sporting Goods, 904 F.2d at 685.