PTAB

IPR2019-00073

Juniper Networks, Inc. v. Finjan, Inc.

1. Case Identification

2. Patent Overview

  • Title: Method and System for Protecting a Computer and a Network from Hostile Downloadables
  • Brief Description: The ’926 patent describes a method and system for managing and protecting against potentially malicious software ("Downloadables"). The system involves generating a unique ID for an incoming Downloadable by hashing it, using that ID to retrieve a corresponding security profile from a database, and then transmitting both the Downloadable and its security profile to a destination computer for safe handling.

3. Grounds for Unpatentability

Ground 1: Claims 15 and 22 are obvious over Browne in view of Islam.

  • Prior Art Relied Upon: Browne (a 1995 ACM Symposium proceeding) and Islam (a 1997 IBM technical report).
  • Core Argument for this Ground:
    • Prior Art Mapping: Petitioner argued that Browne disclosed the core framework of the claims. Browne taught a system for managing software resources (i.e., Downloadables) in a distributed repository. It created a unique Location Independent File Name (LIFN) for each resource by applying an MD5 hash to the file's contents, satisfying the "hashing function" and "Downloadable ID" limitations. Browne further disclosed using this LIFN as a unique key to a simple key/data database on an "LIFN server" to store and retrieve "value-added information," mapping to the "database" and "database manager" elements. Petitioner asserted that Islam supplied the specific content for this "value-added information" by teaching "content stamps." These stamps act as security profiles and contain a "requested domain," which is a list of potentially suspicious operations the downloadable might attempt (e.g., "reading private files," "modify executables"), fulfilling the claim requirement for a "list of suspicious computer operations." Finally, Petitioner argued that Browne's disclosure of transmitting the file from a file server and the "other information" from the LIFN server to the user met the final "transmitting" step.
    • Motivation to Combine (for §103 grounds): A Person of Ordinary Skill in the Art (POSITA) would be motivated to combine the references because Browne explicitly suggested attaching "value-added information," such as "quality assessments," to its software resources using the LIFN as a unique key. A POSITA seeking to implement this feature for security purposes would naturally look to a reference like Islam, which detailed a robust, security-focused form of value-added information. Combining Islam's security profiles with Browne's repository architecture would enhance security, a stated goal of both references, and promote the reuse of security information as envisioned by Browne.
    • Expectation of Success (for §103 grounds): A POSITA would have a reasonable expectation of success because the integration involved storing Islam's "content stamp" data within Browne's key/data database, using Browne's hash-based LIFN as the index key. Petitioner contended this was a straightforward application of known database and network principles without significant technical hurdles.

4. Key Claim Construction Positions

  • The petition dedicated significant argument to several key claim terms, arguing for constructions broader than those potentially advanced by the Patent Owner.
  • "incoming Downloadable": Petitioner argued this term should be construed as "a Downloadable that is arriving at a location in a computer network." This construction opposes limitations to a specific network location (e.g., an internal network) or requiring the Downloadable to be addressed to a specific user, noting that the term "addressed" was explicitly removed from the claims during prosecution.
  • "Downloadable": The proposed construction is "an executable application program, which is downloaded from a source computer and run on the destination computer." This definition was adopted from a related patent incorporated by reference and is foundational to the scope of the claims.
  • "database manager": Petitioner proposed construing this as "a software interface between the database and the user." This construction resists the addition of more complex functionalities like "updating" or "sorting," which Petitioner argued are not required by the specification.
  • "list of suspicious computer operations": The proposed construction is a "list that includes operations that are hostile, potentially hostile, undesirable or potentially undesirable." Petitioner argued this should not be narrowed to require a separate "deeming" step or to require that the list consist only of suspicious operations, citing disclosures of lists containing all operations that could ever be deemed hostile.

5. Arguments Regarding Discretionary Denial

  • Petitioner argued that discretionary denial would be inappropriate under both §314(a) and §325(d).
  • §314(a): Denial was argued as improper because the petition was the first and only one filed by Juniper Networks, not a "follow-on" petition seeking to rely on the same or similar art as a prior petition.
  • §325(d): Petitioner contended that denial based on prior IPRs would be inequitable because the current petition was not cumulative. The newly asserted prior art, Browne and Islam, were never before presented to or considered by the Office. Petitioner specifically argued that Browne rectified the key deficiencies that led to non-institution in prior IPRs, such as by explicitly teaching the creation of a Downloadable ID via hashing and using that ID to retrieve information from a separate database. Furthermore, it was argued that Islam's disclosure of a "list of suspicious computer operations" was more detailed than art considered previously.

6. Relief Requested

  • Petitioner requested the institution of an inter partes review and the cancellation of claims 15 and 22 of Patent 7,613,926 as unpatentable under 35 U.S.C. §103.