SlideShare a Scribd company logo
Finjan Your Claims into Patent Eligibility
Finjan v. Blue Coat Systems, Inc.
(case no. 2016-2520; January 2018)
Presented by Jens Jenkins, 09 March 2018
© 2017 Workman Nydegger
Background
• Finjan is a cybersecurity company that provides various
security services, including mobile VPN and virus screening
services. Finjan owns several patents related to
cybersecurity.
• Blue Coat is a software company that is owned by
Symantec. Blue Coat has various web security products,
including WebPulse and ProxySG that performing virus
and malware screening.
• On August 28, 2013, Finjan brought suit against Blue Coat
in the Northern District of California for infringement of
U.S. Patent 6,154,844 (the ‘844 patent), entitled System
and Method for Attaching a Downloadable Security Profile to
a Downloadable), as well as other Finjan patents.
Background
• The district court found that the Blue Coat
products did infringe the ‘844 patent and three
other Finjan patents. The total reasonable royalty
damages award was about $40 million, of which
$24 million was attributed to infringement of the
‘844 patent.
• Blue Coat appealed the district court's rulings on
subject matter eligibility of the '844 patent. Blue
Coat also appealed the findings of infringement of
the ‘844 patent and two other patents, as well as
the awarded damages.
Finjan Patent Claim: US 6,154,844
A method comprising:
receiving by an inspector a Downloadable;
generating by the inspector a first Downloadable
security profile that identifies suspicious code in the
received Downloadable; and
linking by the inspector the first Downloadable
security profile to the Downloadable before a web server
makes the Downloadable available to web clients.
Additional Background / Context
• Finjan was Decided by CAFC on January 10, 2018.
Circuit Judges: Dyk, Linn and Hughes.
• Prior to Finjan, virus screening claims were found to be
patent ineligible for being directed to a well-known and
abstract idea. (e.g., Intellectual Ventures I LLC v. Symantec
Corp., 838 F. 3d 1307, Court of Appeals, Federal Circuit
2016
– We agree with the district court that receiving e-mail (and other data file)
identifiers, characterizing e-mail based on the identifiers, and
communicating the characterization - in other words, filtering files/e-mail -
is an abstract idea.
IV Patent Claim: US 6,460,050
A method for identifying characteristics of data files,
comprising:
receiving, on a processing system, file content
identifiers for data files from a plurality of file content
identifier generator agents, each agent provided on a
source system and creating file content IDs using a
mathematical algorithm, via a network;
determining, on the processing system, whether
each received content identifier matches a
characteristic of other identifiers; and
outputting, to at least one of the source systems
responsive to a request from said source system, an
indication of the characteristic of the data file based
on said step of determining.
Juxtapose
Finjan Claim (Patent Eligible)
A method comprising:
receiving by an inspector a Downloadable;
generating by the inspector a first Downloadable security profile that identifies suspicious
code in the received Downloadable; and
linking by the inspector the first Downloadable security profile to the Downloadable before
a web server makes the Downloadable available to web clients.
IV Claim (Patent Ineligible)
A method for identifying characteristics of data files, comprising:
receiving, on a processing system, file content identifiers for data files from a plurality of
file content identifier generator agents, each agent provided on a source system and creating file
content IDs using a mathematical algorithm, via a network;
determining, on the processing system, whether each received content identifier matches a
characteristic of other identifiers; and
outputting, to at least one of the source systems responsive to a request from said source
system, an indication of the characteristic of the data file based on said step of determining.
Analysis:
Improvements To A Computer are Patent-Eligible
• We determined in Intellectual Ventures I LLC v.
Symantec Corp., 838 F.3d 1307, 1319 (Fed. Cir.
2016), that “[b]y itself, virus screening is well-known
and constitutes an abstract idea.” We also found that
performing the virus scan on an intermediary
computer—so as to ensure that files are scanned
before they can reach a user's computer—is a
“perfectly conventional” approach and is also
abstract. Id. at 1321. Here the claimed method does a
good deal more.
• Our cases confirm that software-based innovations
can make “non-abstract improvements to computer
technology” and be deemed patent-eligible subject
matter at step 1. Enfish, 822 F.3d at 1335–36.
Alice/Mayo Analysis: Quick Review
How do you define Improvement?
(Is it just something New/Different? POSSIBLY)
•
•
The question, then, is whether this behavior-based virus scan in the '844 patent constitutes an
improvement in computer functionality. We think itdoes.
Claim 1 of the '844 patent scans a downloadable and attaches the virus scan results to the downloadable in
the form of a newly generated file: a “security profile that identifies suspicious code in the received
Downloadable.” The district court's claim construction decision emphasizes that this “identif[y] suspicious
code” limitation can only be satisfied if the security profile includes “details about the suspicious code in the
received downloadable, such as ․ ‘all potentially hostile or suspicious code operations that may be
attempted by the Downloadable.’” … The security profile must include the information about potentially
hostile operations produced by a “behavior-based” virus scan. This operation is distinguished from
traditional, “code-matching” virus scans that are limited to recognizing the presence of previously-
identified viruses, typically by comparing the code in a downloadable to a database of known suspicious
•
code.
The “behavior-based” approach to virus scanning was pioneered by Finjan and is disclosed in the '844
patent's specification. In contrast to traditional “code-matching” systems, which simply look for the
presence of known viruses, “behavior-based” scans can analyze a downloadable's code and determine
whether it performs potentially dangerous or unwanted operations.
• claim 1Similarly, the method of employs a new kind of file that enables a computer security system to do
things it could not do before. The security profile approach allows access to be tailored for different users
and ensures that threats are identified before a file reaches a user's computer. The fact that the security
profile “identifies suspicious code” allows the system to accumulate and utilize newly available, behavior-
based information about potential threats. The asserted claims are therefore directed to a non-
abstract improvement in computer functionality, rather than the abstract idea of computer
security writ large.
Characterization of Improvements Can Help
• “The security profile approach also enables more
flexible and nuanced virus filtering.”
Say all the WORDS
• Improve/Improving
• Reduce/Reducing
• Enable/Enabling
• Facilitate/Facilitating
…
USPTO Eligibility Reference Guide
https://www.uspto.gov/sites/default/files/documents/ieg-qrs.pdf (page 3/3)
Takeaways
• Frame it
• State / Characterize the improvement(s) with ‘all
the words’ to identify how specific limitations
improve functioning of computer system
• Be proactive (initiate discussions with Examiner)
I Am An Improvement
To A Computer System
Discussion?
?

More Related Content

What's hot

Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
Parsons Corporation
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
ahmad abdelhafeez
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
00heights
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
Sagar Rahurkar
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
Chandan Sah
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
Muzzammil Wani
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
Marco Alamanni
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Nicholas Davis
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
AltheimPrivacy
 
Digital Forensics Projects Assistance
Digital Forensics Projects Assistance Digital Forensics Projects Assistance
Digital Forensics Projects Assistance
Network Simulation Tools
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
Tawhidur Rahman
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
Kranthi
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Singgih Prasetya
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
yash sawarkar
 
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & TomorrowDigital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Pankaj Choudhary
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
Jake K.
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Vikas Jain
 

What's hot (20)

Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Digital Forensics Projects Assistance
Digital Forensics Projects Assistance Digital Forensics Projects Assistance
Digital Forensics Projects Assistance
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & TomorrowDigital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 

Similar to 2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (updated) (002)

cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
Mayank Diwakar
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
RoshiniVijayakumar1
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
Teja Bheemanapally
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
VaishnaviBorse8
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Adnan Mansha
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
Nicole Black
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
Aubrey Owens
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
Patrick Garrett
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
Samantha Vargas
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
Firoze Hussain
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
Sweta Kumari Barnwal
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
Robert Ambrogi
 
Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3
sabtolinux
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docx
smile790243
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
Mayank Diwakar
 
JAVA projects 2014
JAVA projects 2014JAVA projects 2014
JAVA projects 2014
Senthilvel S
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
Firoze Hussain
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
JIEMS Akkalkuwa
 

Similar to 2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (updated) (002) (20)

cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docx
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
JAVA projects 2014
JAVA projects 2014JAVA projects 2014
JAVA projects 2014
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 

More from Workman Nydegger

Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Workman Nydegger
 
Core Wireless Licensing v. LG Electronics: User Interfaces & Patent-Eligible ...
Core Wireless Licensing v. LG Electronics: User Interfaces & Patent-Eligible ...Core Wireless Licensing v. LG Electronics: User Interfaces & Patent-Eligible ...
Core Wireless Licensing v. LG Electronics: User Interfaces & Patent-Eligible ...
Workman Nydegger
 
Copyright Basics, Zach Smart
Copyright Basics, Zach SmartCopyright Basics, Zach Smart
Copyright Basics, Zach Smart
Workman Nydegger
 
Legal Fees and Engagement Letters – Rule 1.5 of the Utah Rules of Professiona...
Legal Fees and Engagement Letters – Rule 1.5 of the Utah Rules of Professiona...Legal Fees and Engagement Letters – Rule 1.5 of the Utah Rules of Professiona...
Legal Fees and Engagement Letters – Rule 1.5 of the Utah Rules of Professiona...
Workman Nydegger
 
Overview on Information Disclosure Statement Practice by Justin Cassell
Overview on Information Disclosure Statement Practice by Justin CassellOverview on Information Disclosure Statement Practice by Justin Cassell
Overview on Information Disclosure Statement Practice by Justin Cassell
Workman Nydegger
 
Navigating the Patent Prosecution Highway
Navigating the Patent Prosecution HighwayNavigating the Patent Prosecution Highway
Navigating the Patent Prosecution Highway
Workman Nydegger
 
Overview of After Final Practice at the USPTO- Justin Cassell
Overview of After Final Practice at the USPTO- Justin CassellOverview of After Final Practice at the USPTO- Justin Cassell
Overview of After Final Practice at the USPTO- Justin Cassell
Workman Nydegger
 
Defining Your Line- Pete Malen
Defining Your Line- Pete MalenDefining Your Line- Pete Malen
Defining Your Line- Pete Malen
Workman Nydegger
 
Protecting Your Inventions Internationally Using the PCT: A User's Perspective
Protecting Your Inventions Internationally Using the PCT: A User's PerspectiveProtecting Your Inventions Internationally Using the PCT: A User's Perspective
Protecting Your Inventions Internationally Using the PCT: A User's Perspective
Workman Nydegger
 
E-Commerce Enforcement- Tim Nichols
E-Commerce Enforcement- Tim NicholsE-Commerce Enforcement- Tim Nichols
E-Commerce Enforcement- Tim Nichols
Workman Nydegger
 
Procedures for Deposition of a Biological Sample to Overcome a 112 Enablement...
Procedures for Deposition of a Biological Sample to Overcome a 112 Enablement...Procedures for Deposition of a Biological Sample to Overcome a 112 Enablement...
Procedures for Deposition of a Biological Sample to Overcome a 112 Enablement...
Workman Nydegger
 
Arguing Alice- Down the Rabbit Hole
Arguing Alice- Down the Rabbit HoleArguing Alice- Down the Rabbit Hole
Arguing Alice- Down the Rabbit Hole
Workman Nydegger
 
Streaming under the DMCA Disney Enter., Inc. et al. v. VidAngel, Inc.
Streaming under the DMCA Disney Enter., Inc. et al. v. VidAngel, Inc.Streaming under the DMCA Disney Enter., Inc. et al. v. VidAngel, Inc.
Streaming under the DMCA Disney Enter., Inc. et al. v. VidAngel, Inc.
Workman Nydegger
 
A Walk-through of Supplemental Examination
A Walk-through of Supplemental ExaminationA Walk-through of Supplemental Examination
A Walk-through of Supplemental Examination
Workman Nydegger
 
Cuozzo and Inter Partes Review
Cuozzo and Inter Partes Review Cuozzo and Inter Partes Review
Cuozzo and Inter Partes Review
Workman Nydegger
 
Enhanced Damages for Patent Infringement - Workman Nydegger
Enhanced Damages for Patent Infringement - Workman NydeggerEnhanced Damages for Patent Infringement - Workman Nydegger
Enhanced Damages for Patent Infringement - Workman Nydegger
Workman Nydegger
 

More from Workman Nydegger (16)

Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
 
Core Wireless Licensing v. LG Electronics: User Interfaces & Patent-Eligible ...
Core Wireless Licensing v. LG Electronics: User Interfaces & Patent-Eligible ...Core Wireless Licensing v. LG Electronics: User Interfaces & Patent-Eligible ...
Core Wireless Licensing v. LG Electronics: User Interfaces & Patent-Eligible ...
 
Copyright Basics, Zach Smart
Copyright Basics, Zach SmartCopyright Basics, Zach Smart
Copyright Basics, Zach Smart
 
Legal Fees and Engagement Letters – Rule 1.5 of the Utah Rules of Professiona...
Legal Fees and Engagement Letters – Rule 1.5 of the Utah Rules of Professiona...Legal Fees and Engagement Letters – Rule 1.5 of the Utah Rules of Professiona...
Legal Fees and Engagement Letters – Rule 1.5 of the Utah Rules of Professiona...
 
Overview on Information Disclosure Statement Practice by Justin Cassell
Overview on Information Disclosure Statement Practice by Justin CassellOverview on Information Disclosure Statement Practice by Justin Cassell
Overview on Information Disclosure Statement Practice by Justin Cassell
 
Navigating the Patent Prosecution Highway
Navigating the Patent Prosecution HighwayNavigating the Patent Prosecution Highway
Navigating the Patent Prosecution Highway
 
Overview of After Final Practice at the USPTO- Justin Cassell
Overview of After Final Practice at the USPTO- Justin CassellOverview of After Final Practice at the USPTO- Justin Cassell
Overview of After Final Practice at the USPTO- Justin Cassell
 
Defining Your Line- Pete Malen
Defining Your Line- Pete MalenDefining Your Line- Pete Malen
Defining Your Line- Pete Malen
 
Protecting Your Inventions Internationally Using the PCT: A User's Perspective
Protecting Your Inventions Internationally Using the PCT: A User's PerspectiveProtecting Your Inventions Internationally Using the PCT: A User's Perspective
Protecting Your Inventions Internationally Using the PCT: A User's Perspective
 
E-Commerce Enforcement- Tim Nichols
E-Commerce Enforcement- Tim NicholsE-Commerce Enforcement- Tim Nichols
E-Commerce Enforcement- Tim Nichols
 
Procedures for Deposition of a Biological Sample to Overcome a 112 Enablement...
Procedures for Deposition of a Biological Sample to Overcome a 112 Enablement...Procedures for Deposition of a Biological Sample to Overcome a 112 Enablement...
Procedures for Deposition of a Biological Sample to Overcome a 112 Enablement...
 
Arguing Alice- Down the Rabbit Hole
Arguing Alice- Down the Rabbit HoleArguing Alice- Down the Rabbit Hole
Arguing Alice- Down the Rabbit Hole
 
Streaming under the DMCA Disney Enter., Inc. et al. v. VidAngel, Inc.
Streaming under the DMCA Disney Enter., Inc. et al. v. VidAngel, Inc.Streaming under the DMCA Disney Enter., Inc. et al. v. VidAngel, Inc.
Streaming under the DMCA Disney Enter., Inc. et al. v. VidAngel, Inc.
 
A Walk-through of Supplemental Examination
A Walk-through of Supplemental ExaminationA Walk-through of Supplemental Examination
A Walk-through of Supplemental Examination
 
Cuozzo and Inter Partes Review
Cuozzo and Inter Partes Review Cuozzo and Inter Partes Review
Cuozzo and Inter Partes Review
 
Enhanced Damages for Patent Infringement - Workman Nydegger
Enhanced Damages for Patent Infringement - Workman NydeggerEnhanced Damages for Patent Infringement - Workman Nydegger
Enhanced Damages for Patent Infringement - Workman Nydegger
 

Recently uploaded

快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
devaki57
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
Parsons Behle & Latimer
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Anti Money Laundering & know client.pptx
Anti Money Laundering & know client.pptxAnti Money Laundering & know client.pptx
Anti Money Laundering & know client.pptx
TarunKumarSingh37
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 

Recently uploaded (20)

快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Anti Money Laundering & know client.pptx
Anti Money Laundering & know client.pptxAnti Money Laundering & know client.pptx
Anti Money Laundering & know client.pptx
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 

2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (updated) (002)

  • 1. Finjan Your Claims into Patent Eligibility Finjan v. Blue Coat Systems, Inc. (case no. 2016-2520; January 2018) Presented by Jens Jenkins, 09 March 2018 © 2017 Workman Nydegger
  • 2. Background • Finjan is a cybersecurity company that provides various security services, including mobile VPN and virus screening services. Finjan owns several patents related to cybersecurity. • Blue Coat is a software company that is owned by Symantec. Blue Coat has various web security products, including WebPulse and ProxySG that performing virus and malware screening. • On August 28, 2013, Finjan brought suit against Blue Coat in the Northern District of California for infringement of U.S. Patent 6,154,844 (the ‘844 patent), entitled System and Method for Attaching a Downloadable Security Profile to a Downloadable), as well as other Finjan patents.
  • 3. Background • The district court found that the Blue Coat products did infringe the ‘844 patent and three other Finjan patents. The total reasonable royalty damages award was about $40 million, of which $24 million was attributed to infringement of the ‘844 patent. • Blue Coat appealed the district court's rulings on subject matter eligibility of the '844 patent. Blue Coat also appealed the findings of infringement of the ‘844 patent and two other patents, as well as the awarded damages.
  • 4. Finjan Patent Claim: US 6,154,844 A method comprising: receiving by an inspector a Downloadable; generating by the inspector a first Downloadable security profile that identifies suspicious code in the received Downloadable; and linking by the inspector the first Downloadable security profile to the Downloadable before a web server makes the Downloadable available to web clients.
  • 5. Additional Background / Context • Finjan was Decided by CAFC on January 10, 2018. Circuit Judges: Dyk, Linn and Hughes. • Prior to Finjan, virus screening claims were found to be patent ineligible for being directed to a well-known and abstract idea. (e.g., Intellectual Ventures I LLC v. Symantec Corp., 838 F. 3d 1307, Court of Appeals, Federal Circuit 2016 – We agree with the district court that receiving e-mail (and other data file) identifiers, characterizing e-mail based on the identifiers, and communicating the characterization - in other words, filtering files/e-mail - is an abstract idea.
  • 6. IV Patent Claim: US 6,460,050 A method for identifying characteristics of data files, comprising: receiving, on a processing system, file content identifiers for data files from a plurality of file content identifier generator agents, each agent provided on a source system and creating file content IDs using a mathematical algorithm, via a network; determining, on the processing system, whether each received content identifier matches a characteristic of other identifiers; and outputting, to at least one of the source systems responsive to a request from said source system, an indication of the characteristic of the data file based on said step of determining.
  • 7. Juxtapose Finjan Claim (Patent Eligible) A method comprising: receiving by an inspector a Downloadable; generating by the inspector a first Downloadable security profile that identifies suspicious code in the received Downloadable; and linking by the inspector the first Downloadable security profile to the Downloadable before a web server makes the Downloadable available to web clients. IV Claim (Patent Ineligible) A method for identifying characteristics of data files, comprising: receiving, on a processing system, file content identifiers for data files from a plurality of file content identifier generator agents, each agent provided on a source system and creating file content IDs using a mathematical algorithm, via a network; determining, on the processing system, whether each received content identifier matches a characteristic of other identifiers; and outputting, to at least one of the source systems responsive to a request from said source system, an indication of the characteristic of the data file based on said step of determining.
  • 8. Analysis: Improvements To A Computer are Patent-Eligible • We determined in Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307, 1319 (Fed. Cir. 2016), that “[b]y itself, virus screening is well-known and constitutes an abstract idea.” We also found that performing the virus scan on an intermediary computer—so as to ensure that files are scanned before they can reach a user's computer—is a “perfectly conventional” approach and is also abstract. Id. at 1321. Here the claimed method does a good deal more. • Our cases confirm that software-based innovations can make “non-abstract improvements to computer technology” and be deemed patent-eligible subject matter at step 1. Enfish, 822 F.3d at 1335–36.
  • 10. How do you define Improvement? (Is it just something New/Different? POSSIBLY) • • The question, then, is whether this behavior-based virus scan in the '844 patent constitutes an improvement in computer functionality. We think itdoes. Claim 1 of the '844 patent scans a downloadable and attaches the virus scan results to the downloadable in the form of a newly generated file: a “security profile that identifies suspicious code in the received Downloadable.” The district court's claim construction decision emphasizes that this “identif[y] suspicious code” limitation can only be satisfied if the security profile includes “details about the suspicious code in the received downloadable, such as ․ ‘all potentially hostile or suspicious code operations that may be attempted by the Downloadable.’” … The security profile must include the information about potentially hostile operations produced by a “behavior-based” virus scan. This operation is distinguished from traditional, “code-matching” virus scans that are limited to recognizing the presence of previously- identified viruses, typically by comparing the code in a downloadable to a database of known suspicious • code. The “behavior-based” approach to virus scanning was pioneered by Finjan and is disclosed in the '844 patent's specification. In contrast to traditional “code-matching” systems, which simply look for the presence of known viruses, “behavior-based” scans can analyze a downloadable's code and determine whether it performs potentially dangerous or unwanted operations. • claim 1Similarly, the method of employs a new kind of file that enables a computer security system to do things it could not do before. The security profile approach allows access to be tailored for different users and ensures that threats are identified before a file reaches a user's computer. The fact that the security profile “identifies suspicious code” allows the system to accumulate and utilize newly available, behavior- based information about potential threats. The asserted claims are therefore directed to a non- abstract improvement in computer functionality, rather than the abstract idea of computer security writ large.
  • 11. Characterization of Improvements Can Help • “The security profile approach also enables more flexible and nuanced virus filtering.”
  • 12. Say all the WORDS • Improve/Improving • Reduce/Reducing • Enable/Enabling • Facilitate/Facilitating …
  • 13. USPTO Eligibility Reference Guide https://www.uspto.gov/sites/default/files/documents/ieg-qrs.pdf (page 3/3)
  • 14. Takeaways • Frame it • State / Characterize the improvement(s) with ‘all the words’ to identify how specific limitations improve functioning of computer system • Be proactive (initiate discussions with Examiner) I Am An Improvement To A Computer System