-
Finjan, Inc. v. Blue Coat Systems, Inc. DC CAFC
- 5:13-cv-03999
- N.D. Cal.
- Judge: Beth Labson Freeman +1
- Filed: 08/28/2013
- Closed: 11/20/2015
- Latest Docket Entry: 03/05/2018
- PACER
- Docket updated daily
1
Plaintiff
1
Defendant
0
Accused
Products
6
Patents-in-Suit
815
Days in
Litigation
-
Finjan, Inc. v. Blue Coat Systems, Inc. DC CAFC
- 5:13-cv-03999
- N.D. Cal.
- Judge: Beth Labson Freeman +1
- Filed: 08/28/2013
- Closed: 11/20/2015
- Latest Docket Entry: 03/05/2018
- PACER
- Docket updated daily
Cause of Action
Willful Patent Infringement
Assigned Judge
Outcome Summary
- Patent Information
-
Validity & Enforceability
Claim # | Claim Text | Outcome |
---|---|---|
14 |
A computer program product, comprising a computer usable medium having a computer readable program code therein, the computer readable program code adapted to be executed for computer security, the method comprising: providing a system, wherein the
view more
|
Valid (102)
Entry 438 |
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A computer gateway for an intranet of computers, comprising: a scanner for scanning incoming files from the Internet and deriving security profiles for the incoming files, wherein each of the security profiles comprises a list of computer commands
view more
|
Valid (102)
Entry 438 |
17 |
A computer-readable storage medium storing program code for causing a computer to perform the steps of: retrieving a requested file from the Internet; scanning the retrieved file to determine computer commands that the file is programmed to perform;
view more
|
Valid (102)
Entry 438 |
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A method comprising: receiving by an inspector a Downloadable; generating by the inspector a first Downloadable security profile that identifies suspicious code in the received Downloadable; and linking by the inspector the first Downloadable
view more
|
Valid (102)
Entry 438 |
7 |
The method of claim 1, wherein the Downloadable includes a JavaScript.TM. script.
|
Valid (102)
Entry 438 |
11 |
The method of claim 1, wherein the first Downloadable security profile includes a list of operations deemed suspicious by the inspector.
|
Valid (102)
Entry 438 |
15 |
An inspector system comprising: memory storing a first rule set; and a first content inspection engine for using the first rule set to generate a first Downloadable security profile that identifies suspicious code in a Downloadable, and for
view more
|
Valid (102)
Entry 438 |
41 |
A computer-readable storage medium storing program code for causing a data processing system on an inspector to perform the steps of: receiving a Downloadable; generating a first Downloadable security profile that identifies suspicious code in
view more
|
Valid (102)
Entry 438 |
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A policy-based cache manager, comprising: a memory storing a cache of digital content, a plurality of policies, and a policy index to the cache contents, the policy index including entries that relate cache content and policies by indicating cache
view more
|
Valid (102)
Entry 438 Entry 543 |
Claim # | Claim Text | Outcome |
---|---|---|
9 |
A system for generating a Downloadable ID to identify a Downloadable, comprising:</claim-text> a communications engine for obtaining a Downloadable that includes one or more references to software components required to be executed by the
view more
|
Valid (102)
Entry 438 |
13 |
The system of claim 9, wherein the Downloadable includes HTML code.
|
Valid (102)
Entry 438 |
Claim # | Claim Text | Outcome |
---|---|---|
9 |
A processor-based system, comprising: an information monitor for receiving downloadable-information; a content inspection engine communicatively coupled to the information monitor for determining whether the downloadable-information includes
view more
|
Valid (102)
Entry 438 |
10 |
The system of claim 9, wherein at least one of the detection-indicators indicates a level of downloadable-information characteristic and executable code characteristic correspondence.
|
Valid (102)
Entry 438 |
-
Infringement
Blue Coat Systems Incorporated
- 6 Details
Accused Product | Patent # | Claim # | Outcome |
---|---|---|---|
ProxyAV Appliances and SoftwareProxySG Appliances and SoftwareWebPulse | US 6,154,844 A |
1, 7, 11, 15, 41
|
Infringement
Entry 556Entry 438 Entry 543 |
ProxyAVProxyAV Appliances and SoftwareProxySGProxySG Appliances and SoftwareWebPulseWebPulse,ProxySG Appliances and Software,ProxyAV Appliances and Software,WebPulse,ProxySG Appliances and Software,ProxyAV Appliances and Software,WebPulse,ProxySG Appliances and Software,ProxyAV Appliances and Software | US 6,804,780 B1 |
9, 13
|
Infringement
Entry 556Entry 438 Entry 543 |
ProxyAV Appliances and SoftwareProxySGProxySG Appliances and SoftwareWebPulseWebPulse,ProxySG Appliances and Software,ProxyAV Appliances and Software,WebPulse,ProxySG Appliances and Software,ProxyAV Appliances and Software | US 6,965,968 B1 |
1
|
Infringement
Entry 556Entry 438 Entry 543 |
ProxySGProxySG’s Pop-Up Blocker | US 7,058,822 B2 |
9, 10
|
No infringement
Entry 438Entry 265 |
ProxyAVProxySGWebPulse,ProxySG Appliances and Software,ProxyAV Appliances and Software | US 7,418,731 B2 |
1, 17
|
Infringement
Entry 438Entry 543 |
CASMAAProxySGWebPulse,ProxySG Appliances and Software,ProxyAV Appliances and Software,WebPulse,ProxySG Appliances and Software,ProxyAV Appliances and Software,WebPulse,ProxySG Appliances and Software,ProxyAV Appliances and Software,WebPulse,ProxySG Appliances and Software,ProxyAV Appliances and Software | US 7,647,633 B2 |
8, 14
|
Infringement
Entry 438Entry 543 Entry 265 |