1:24-cv-01288
UMBRA Tech Ltd Uk v. Juniper Networks Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: UMBRA Technologies Ltd. (UK) (British Virgin Islands), UMBRA Technologies Limited (CN) (Hong Kong), & UMBRA Technologies (US) Inc. (Delaware)
- Defendant: Juniper Networks, Inc. (Delaware)
- Plaintiff’s Counsel: DEVLIN LAW FIRM LLC
 
- Case Identification: 1:24-cv-01288, D. Del., 12/20/2024
- Venue Allegations: Plaintiff alleges that venue is proper in the District of Delaware because Defendant Juniper Networks, Inc. is a Delaware corporation and is therefore a resident of the district.
- Core Dispute: Plaintiff alleges that Defendant’s network virtualization and software-defined wide area networking (SD-WAN) products infringe four patents related to secure network optimization, cloud-based firewalls, and virtual networking technologies.
- Technical Context: The dispute centers on technologies for managing and securing large, distributed corporate networks, particularly SD-WAN and cloud-based security systems that offer advantages over traditional network architectures.
- Key Procedural History: The complaint notes that U.S. Patent No. 10,574,482 was previously the subject of a petition for Inter Partes Review (IPR2024-00498) filed by Cisco Systems, Inc. The Patent Trial and Appeal Board (PTAB) denied institution of the IPR, a procedural outcome that may suggest the patent’s asserted claims have withstood an initial validity challenge. The ’482 patent has also been asserted in other litigations which have been dismissed or stayed.
Case Timeline
| Date | Event | 
|---|---|
| 2015-01-28 | U.S. Patent No. 11,240,064 Priority Date | 
| 2015-04-07 | U.S. Patent Nos. 10,574,482, 11,799,687, & 12,160,328 Priority Date | 
| 2020-02-25 | U.S. Patent No. 10,574,482 Issued | 
| 2022-02-01 | U.S. Patent No. 11,240,064 Issued | 
| 2023-10-24 | U.S. Patent No. 11,799,687 Issued | 
| 2024-12-03 | U.S. Patent No. 12,160,328 Issued | 
| 2024-12-20 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,574,482 - “MULTI-PERIMETER FIREWALL IN THE CLOUD”
- Issued: February 25, 2020.
- The Invention Explained:- Problem Addressed: The patent’s background section describes the limitations of traditional network security, where a firewall is typically placed at the edge between a local area network (LAN) and a broader network like the internet (Compl. ¶15; ’482 Patent, col. 5:60-65). This architecture creates performance bottlenecks and complexity, especially for distributed organizations where traffic from remote branches must be routed back to a central, firewalled gateway before accessing the internet or cloud resources (Compl. ¶13; ’482 Patent, col. 2:1-9).
- The Patented Solution: The invention proposes a distributed, multi-perimeter firewall system operating within a global virtual network (GVN), or "in the cloud" ('482 Patent, Abstract). Instead of a single gateway, the system uses multiple access point servers, with a first firewall performing one type of inspection (e.g., stateful packet inspection) and a second firewall performing another (e.g., deep packet inspection) ('482 Patent, col. 2:35-58). These distributed firewalls can communicate and share threat information, creating a more dynamic and scalable security perimeter within the network itself ('482 Patent, Abstract; Fig. 11).
- Technical Importance: This approach extends firewall utility beyond the traditional network edge, addressing the performance and security limitations of centralized architectures for cloud-centric and geographically dispersed networks (Compl. ¶15).
 
- Key Claims at a Glance:- The complaint asserts infringement of at least one claim but does not specify which claims are asserted, instead referencing an unprovided exhibit (Compl. ¶27-28). Independent claim 1 is representative.
- The essential elements of independent claim 1 include:- A first perimeter firewall in communication with a first access point server.
- A second perimeter firewall in communication with a second access point server.
- The first and second perimeter firewalls share threat information.
- The first perimeter firewall performs stateful packet inspection.
- The second perimeter firewall performs deep packet inspection on a cloned copy of traffic.
 
- The complaint reserves the right to assert additional claims (Compl. ¶28).
 
U.S. Patent No. 11,240,064 - “SYSTEM AND METHOD FOR A GLOBAL VIRTUAL NETWORK”
- Issued: February 1, 2022.
- The Invention Explained:- Problem Addressed: The patent identifies problems with long-distance network connectivity and throughput arising from "distance, protocol limitations, peering, interference, and/or other problems and threats," which persist even as "last mile" connectivity has improved (Compl. ¶16; ’064 Patent, col. 1:31-34).
- The Patented Solution: The invention describes a system for connecting devices through a global virtual network that overcomes the unpredictability of the public internet. The system selects a communication path from a "plurality of communication paths" based on a "security rating" of the selected path, thereby increasing security in managing traffic ('064 Patent, col. 42:15-46:35). This allows the system to route data through optimized and secure intermediate tunnels rather than leaving the path to the policies of various internet carriers ('064 Patent, Abstract; Compl. ¶17).
- Technical Importance: This technology provides a method for creating reliable and secure software-defined wide-area networks (SD-WAN) by intelligently routing traffic over the public internet to avoid congestion and security threats (Compl. ¶12).
 
- Key Claims at a Glance:- The complaint asserts infringement of at least one claim but does not specify which claims are asserted, instead referencing an unprovided exhibit (Compl. ¶34-35). Independent claim 1 is representative.
- The essential elements of independent claim 1 include:- A first device in communication with a first endpoint device and a second device in communication with a second endpoint device.
- The first and second devices are connected with a communication path.
- The communication path is selected from a plurality of communication paths.
- The selection is based on a security rating of the selected communication path.
 
- The complaint reserves the right to assert additional claims (Compl. ¶35).
 
Multi-Patent Capsules
- Patent Identification: U.S. Patent No. 11,799,687, “SYSTEM AND METHOD FOR VIRTUAL INTERFACES AND ADVANCED SMART ROUTING IN A GLOBAL VIRTUAL NETWORK,” issued October 24, 2023. 
- Technology Synopsis: This patent addresses the lack of control over data routes on the public internet, which depend on the policies of intermediate network players (Compl. ¶17; ’687 Patent, col. 2:23-26). The invention uses "virtual interfaces" (VIFs) that act as "hook points" for multiple network tunnels, enabling the system to shift resource-intensive operations and improve quality of service within a global virtual network (Compl. ¶17; ’687 Patent, col. 7:2-8). 
- Asserted Claims: The complaint asserts at least one claim (Compl. ¶41). 
- Accused Features: The complaint accuses "Juniper systems and methods, including one or more hardware and software products for network virtualization and related services" (Compl. ¶41). 
- Patent Identification: U.S. Patent No. 12,160,328, “MULTI-PERIMETER FIREWALL IN THE CLOUD,” issued December 3, 2024. 
- Technology Synopsis: The complaint states this patent is in the same family and has a matching specification to the ’482 Patent (Compl. ¶15). The invention resolves technical problems related to implementing multi-perimeter firewalls in a cloud environment, particularly concerning stateful and deep-packet inspections, thereby extending the utility of firewalls beyond the traditional network edge (Compl. ¶15; ’328 Patent, col. 5:53-6:06). 
- Asserted Claims: The complaint asserts at least one claim (Compl. ¶48). 
- Accused Features: The complaint accuses "Juniper systems and methods, including one or more hardware and software products for network virtualization and related services" (Compl. ¶48). 
III. The Accused Instrumentality
Product Identification
- The complaint broadly identifies the "Accused Instrumentalities" as "Juniper systems and methods, including one or more hardware and software products for network virtualization and related services" (Compl. ¶27, ¶34, ¶41, ¶48). The complaint references Exhibits 5 through 8 for more specific product identifications, but these exhibits were not filed with the complaint.
Functionality and Market Context
- The complaint alleges that Juniper's products are implemented in "virtualized network architectures" that utilize the patented inventions (Compl. ¶14). These products are alleged to provide functionalities related to "secure network optimization, virtual networks...SD-WAN, [and] advanced smart routing (ASR)" (Compl. ¶12). The complaint does not provide specific technical details about how the accused products operate. No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint references but does not include claim-chart exhibits that would map claim elements to the accused instrumentalities. The infringement theories are therefore summarized below in prose.
- ’482 Patent and '328 Patent Infringement Allegations: The complaint's narrative theory for the ’482 Patent and the related ’328 Patent is that Juniper’s network virtualization products implement a "multi-perimeter firewall system in a cloud" (Compl. ¶15). This system allegedly resolves problems related to "stateful and deep-packet inspections in the firewall system in the cloud," thereby infringing claims directed to a distributed firewall architecture where multiple firewalls communicate and share threat information (Compl. ¶15, ¶27, ¶48). 
- ’064 Patent and '687 Patent Infringement Allegations: The complaint's narrative theory for the ’064 Patent and the related ’687 Patent is that Juniper’s SD-WAN and advanced smart routing products infringe claims directed to operating a global virtual network (Compl. ¶12, ¶16-17). The infringement theory suggests that Juniper's products improve long-distance connectivity and throughput by intelligently selecting from a plurality of communication paths based on security or other advanced routing criteria, thereby practicing the patented methods (Compl. ¶34, ¶41). 
- Identified Points of Contention: - Architectural Questions: A central question for the ’482 and ’328 patents will be whether Juniper's security architecture contains the distinct "first perimeter firewall" and "second perimeter firewall" that "share threat information" as recited in the claims, or if it functions as a more integrated system that does not map to the claimed componentized structure. The requirement for deep packet inspection to be performed on a "cloned copy of traffic" in claim 1 of the '482 patent may also be a point of dispute.
- Functional Questions: For the ’064 and ’687 patents, a key technical question is what criteria Juniper's "advanced smart routing" systems use for path selection. The analysis may turn on whether these criteria can be properly characterized as a "security rating" ('064 Patent) or rely on "virtual interfaces" acting as "hook points" for multiple tunnels ('687 Patent), or if the routing is based on conventional performance metrics like latency and packet loss, which could suggest a mismatch in technical operation.
 
V. Key Claim Terms for Construction
- Term from ’482 Patent: "share threat information" - Context and Importance: This term is central to the collaborative aspect of the claimed multi-perimeter firewall. Its construction will determine whether any data exchange between security components satisfies the limitation or if a more specific type of security-focused data interchange is required. Practitioners may focus on this term because the functionality of many modern security platforms involves communication between different modules, and the scope of this term will be critical to the infringement analysis.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent specification describes the shared information as including "heuristic patterns, signatures of known threats, known malicious source IP addresses, or attack vectors," which could support a construction covering a wide range of security-related data ('482 Patent, col. 2:54-58).
- Evidence for a Narrower Interpretation: The specification also mentions that threat information "may be shared via a central control server" ('482 Patent, col. 2:58-59). A defendant might argue that this disclosure, tied to a specific embodiment, suggests a more structured and centralized sharing mechanism is required, rather than any ad-hoc communication.
 
 
- Term from ’064 Patent: "security rating" - Context and Importance: The path selection in the asserted claims is explicitly based on this criterion. The dispute will likely center on whether Juniper's routing decisions are based on something that can be fairly characterized as a "security rating" or on other non-security performance metrics.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent states that the invention "increases security in managing traffic" by selecting a path based on this rating, suggesting that any metric contributing to security could fall within the term's scope ('064 Patent, col. 42:15-18).
- Evidence for a Narrower Interpretation: The patent does not appear to provide an explicit definition or detailed examples of what constitutes a "security rating." A defendant may argue that in the absence of a specific definition, the term should be limited to metrics explicitly and primarily concerned with security (e.g., threat levels, encryption status) and should not be construed to cover general quality-of-service metrics like latency or jitter, which are common in the art of network routing.
 
 
VI. Other Allegations
- Indirect Infringement: The complaint does not contain specific counts or factual allegations for indirect infringement.
- Willful Infringement: The complaint does not contain an explicit allegation of willful infringement. However, the prayer for relief includes a request for a declaration that the case is "exceptional under 35 U.S.C. § 285," a remedy often associated with findings of willful infringement or litigation misconduct (Compl. Prayer for Relief ¶C).
VII. Analyst’s Conclusion: Key Questions for the Case
- A central issue will be one of architectural mapping: Does Juniper's integrated SD-WAN and security architecture, as it actually operates, contain the distinct, collaborating "first perimeter firewall" and "second perimeter firewall" components as claimed in the '482 and '328 patents, or does its functionality arise from a different, more holistic structure?
- A key technical question will be one of functional characterization: Do the algorithms used by Juniper's "advanced smart routing" products for path selection rely on a "security rating" as required by the '064 patent, or are they based on conventional network performance metrics like latency and packet loss, raising a question of a fundamental mismatch in technical operation?
- An overarching evidentiary question will be the basis of infringement: Given the complaint's reliance on general allegations against a broad product portfolio and its reference to unprovided exhibits, what specific evidence will emerge during discovery to substantiate the claims of infringement for each asserted patent against specific Juniper products and their precise functionalities?