Fortinet, Inc. v. Forescout Technologies, Inc., No. 3:2020cv03343 - Document 94 (N.D. Cal. 2021)

Court Description: ORDER Granting in Part and Denying in Part 71 Defendant's Motion to Dismiss. Signed by Judge Edward M. Chen on 6/14/2021. (emcsec, COURT STAFF) (Filed on 6/14/2021)

Download PDF
Fortinet, Inc. v. Forescout Technologies, Inc. Doc. 94 1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 7 FORTINET, INC., Plaintiff, 8 United States District Court Northern District of California 9 Case No. 20-cv-03343-EMC ORDER GRANTING IN PART AND DENYING IN PART DEFENDANT’S MOTION TO DISMISS v. 10 FORESCOUT TECHNOLOGIES, INC., 11 Defendant. Docket No. 71 12 13 14 I. INTRODUCTION 15 In this case, Plaintiff Fortinet, Inc. (“Fortinet”) alleges that Defendant Forescout 16 Technologies, Inc. (“Forescout”) has committed numerous acts of patent infringement. Fortinet 17 brings claims for contributory, induced, and willful infringement against Forescout based on five 18 patents relating to cybersecurity technology. 19 In November 2020, the Court granted in part and denied in part Forescout’s motion to 20 dismiss Fortinet’s original complaint, which asserted three of the patents currently at issue. See 21 Docket No. 55 (“Order”). The Court rejected Forescout’s contention that the three patents claimed 22 ineligible subject matter and were therefore invalid under 35 U.S.C. § 101; it also found that 23 Fortinet sufficiently stated a claim for induced infringement. Order at 1. The Court granted 24 Forescout’s motion with respect to Fortinet’s contributory and willful infringement claims, finding 25 them inadequately pled. Id. Fortinet was given leave to amend, id., and filed its Amended 26 Complaint in December 2020. See Docket No. 67 (“Compl.”). 27 28 Pending before the Court is Forescout’s motion to dismiss Fortinet’s Amended Complaint. See Docket No. 71 (“Mot”). In the new motion, Forescout argues that the two newly asserted Dockets.Justia.com 1 patents claim ineligible subject matter under § 101 and that Fortinet has failed to adequately plead 2 induced, contributory, or willful infringement of any of the five patents in suit. See id. For the 3 reasons given below, the Court GRANTS the motion with respect to Fortinet’s willful 4 infringement claims and DENIES the motion as to all other issues. II. 5 6 A. Factual Background According to the Amended Complaint, Fortinet sells “cybersecurity products, software, 7 United States District Court Northern District of California BACKGROUND 8 and services” to large institutional customers. Compl. ¶ 3; see also id. ¶¶ 21-23. Many of 9 Fortinet’s product offerings specifically address “[t]he proliferation of [Internet of Things] 10 devices,” which “has made it necessary for organizations to improve their visibility into what is 11 attached to their networks.” Id. ¶ 25. The company’s products thus “provide[] network visibility 12 to see devices connected to a network as well as the ability to control those devices and users.” Id. 13 ¶ 26. 14 Fortinet is the owner, by assignment, of five patents relating to cybersecurity and network 15 access control. These include United States Patent No. 8,458,314 (“’314 Patent”), titled “System 16 and method for offloading IT network tasks”; No. 9,369,299 (“’299 Patent”), titled “Network 17 access control system and method for devices connecting to network using remote access control 18 methods”; No. 9,948,662 (“’662 Patent”), titled “Providing security in a communication network”; 19 No. 9,894,034 (“’034 Patent”), titled “Automated Configuration of Endpoint Security 20 Management”; and No. 9,503,421 (“’421 Patent”), titled “Security Information and Event 21 Management.” Id. ¶¶ 2, 30-39. 22 Forescout is a competitor of Fortinet, also selling cybersecurity products to businesses. 23 See id. ¶ 6. In February 2020, “Fortinet attempted to initiate licensing discussions with Forescout” 24 on the belief that Forescout's product offerings infringe the aforementioned patents. Id. ¶ 10. 25 Fortinet continued its attempts throughout March and April 2020, eventually providing Forescout 26 with “identification of specific patents that are infringed by Forescout's technology.” Id. ¶¶ 11-12. 27 Forescout has so far refused to engage in licensing negotiations. Id. ¶ 12. 28 2 1 United States District Court Northern District of California 2 B. Procedural Background In its original complaint, Fortinet alleged infringement of the ’314, ’299, and ’662 Patents 3 on theories of induced, contributory, and willful infringement. Docket No. 1 ¶¶ 37, 49, 51, 63, 65, 4 77. Forescout moved to dismiss for failure to state a claim, arguing primarily that the ’314, ’299, 5 and ’662 Patents are all “directed to an abstract idea that lacks any inventive concept, and are 6 therefore patent-ineligible” under 35 U.S.C. § 101. Order at 4; see also Docket No. 24. More 7 specifically, Forescout contended that the patents focus on “the abstract idea of controlling access” 8 to a computer network “using conventional technology.” Order at 4. Forescout also asserted that 9 the original complaint did not “adequately plead indirect infringement” because it failed to allege 10 “any factual allegations regarding the knowledge and intent elements of Fortinet's claims for 11 contributory and induced infringement,” and that it “fail[ed] to adequately plead willful 12 infringement” since it did not allege facts showing “that Forescout's conduct [was] egregious.” Id. 13 In ruling on the earlier motion to dismiss, the Court declined to invalidate the ’314, ’299, 14 and ’662 Patents on § 101 grounds. The Court agreed with Forescout that the ’314 and ’662 15 Patents are directed to abstract ideas, id. at 10-12, 17-18, but was unable to conclude, at this early 16 stage of the litigation, that the patents lacked an inventive concept, id. at 12-14, 18-19. The Court 17 also declined to hold that the ’299 Patent is directed to an abstract idea because the invention 18 plausibly recites a technological solution to a technological problem. See id. at 14-16. While the 19 Court expressed its skepticism about the ultimate validity of the ’314, ’299, and ’662 Patents and 20 stated that “the outcome of claim construction,” in particular, “might make it appropriate . . . to 21 revisit the eligibility questions” later in the proceedings, the Court could not conclude that the 22 patents claim ineligible subject matter on a motion to dismiss. See id. at 19. 23 Regarding Forescout’s arguments that Fortinet’s original complaint failed to adequately 24 allege induced, contributory, or willful infringement, the Court disagreed with the first point but 25 agreed with the latter two. It held that the complaint “set forth sufficient facts showing a ‘specific 26 intent to encourage another’s infringement,’” and so stated a claim for inducement. See id. at 22- 27 23. But the Court ruled that the complaint did not adequately allege contributory infringement 28 because it did not establish “that Forescout’s products are not suitable for a substantial non3 1 infringing use,” as the applicable statute requires. Id. at 24-25. The complaint also failed to state 2 a claim for willful infringement because it alleged only that Forescout knew of the patents in suit 3 and continued to sell its own products—not that Forescout’s conduct was “egregious,” “wanton,” 4 or “malicious.” See id. at 25-27. The Court therefore granted in part and denied in part 5 Forescout’s motion to dismiss, giving Fortinet leave to amend. Id. at 27. 6 7 Fortinet filed its Amended Complaint in December 2020. See Compl. Forescout then moved to dismiss the Amended Complaint. See Mot. III. 8 United States District Court Northern District of California 9 LEGAL STANDARD Federal Rule of Civil Procedure 8(a)(2) requires a complaint to include “a short and plain 10 statement of the claim showing that the pleader is entitled to relief.” Fed. R. Civ. P. 8(a)(2). A 11 complaint that fails to meet this standard may be dismissed pursuant to Rule 12(b)(6). See Fed. R. 12 Civ. P. 12(b)(6). To overcome a Rule 12(b)(6) motion to dismiss after the Supreme Court's 13 decisions in Ashcroft v. Iqbal, 556 U.S. 662 (2009), and Bell Atlantic Corp. v. Twombly, 550 U.S. 14 544 (2007), a plaintiff's “factual allegations [in the complaint] must . . . suggest that the claim has 15 at least a plausible chance of success.” See Levitt v. Yelp! Inc., 765 F.3d 1123, 1135 (9th Cir. 16 2014) (internal quotation omitted). The court “accept[s] factual allegations in the complaint as 17 true and construe[s] the pleadings in the light most favorable to the nonmoving party.” Manzarek 18 v. St. Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir. 2008). But “allegations in a 19 complaint . . . may not simply recite the elements of a cause of action [and] must contain sufficient 20 allegations of underlying facts to give fair notice and to enable the opposing party to defend itself 21 effectively.” Levitt, 765 F.3d at 1135 (quoting Starr v. Baca, 652 F.3d 1202, 1216 (9th Cir. 22 2011)). “A claim has facial plausibility when the plaintiff pleads factual content that allows the 23 court to draw the reasonable inference that the defendant is liable for the misconduct alleged.” 24 Iqbal, 556 U.S. at 678. “The plausibility standard is not akin to a ‘probability requirement,’ but it 25 asks for more than a sheer possibility that a defendant has acted unlawfully.” Id. (quoting 26 Twombly, 550 U.S. at 556). 27 Under the Patent Act of 1952, patents are “presumed valid.” 35 U.S.C. § 282(a). “As 28 such, an alleged infringer asserting an invalidity defense pursuant to § 101 bears the burden of 4 United States District Court Northern District of California 1 proving invalidity by clear and convincing evidence.” Cisco Sys., Inc. v. Uniloc USA, Inc., 386 F. 2 Supp. 3d 1185, 1190 (N.D. Cal. 2019) (citing Microsoft Corp. v. i4i Ltd. P’ship, 564 U.S. 91, 95 3 (2011)). 4 “Patent eligibility under 35 U.S.C. § 101 is ultimately an issue of law” but “may contain 5 underlying issues of fact.” Berkheimer v. HP Inc., 881 F.3d 1360, 1365 (Fed. Cir. 2018). “Like 6 other legal questions based on underlying facts,” patent eligibility “may be, and frequently has 7 been, resolved on a Rule 12(b)(6) or (c) motion where the undisputed facts . . . require a holding of 8 ineligibility under the substantive standards of law.” SAP Am., Inc. v. InvestPic, LLC, 898 F.3d 9 1161, 1166 (Fed. Cir. 2018). Thus, “[a]lthough claim construction is often desirable, and may 10 sometimes be necessary, to resolve whether a patent claim is directed to patent-eligible subject 11 matter,” it is not “an inviolable prerequisite to a validity determination under § 101,” and may be 12 eschewed “[w]here the court has a full understanding of the basic character of the claimed subject 13 matter.” Voip-Pal.Com, Inc. v. Apple Inc., 375 F. Supp. 3d 1110, 1124 (N.D. Cal. 2019) (internal 14 quotations omitted). 15 16 IV. DISCUSSION As with Forescout’s earlier motion to dismiss, the parties focus most of their attention on 17 § 101 issues. In the instant motion, Forescout argues that the two patents asserted for the first time 18 in the Amended Complaint, the ’034 and ’421 Patents, claim ineligible subject matter. Forescout 19 contends that both are directed to simple abstract ideas—the ’034 Patent to “selecting a course of 20 action based on a determined condition . . . and then launching predetermined functions,” the ’421 21 Patent to “performing a set of tasks and collecting data from those tasks.” Mot. at 6. Forescout 22 further argues that neither patent “recite[s] any specialized hardware, technological improvement, 23 or any other allegedly inventive concept.” Id. The patents thus fail both steps of the Supreme 24 Court’s Alice test, see infra, and must be invalidated under § 101. Forescout also maintains that 25 the Amended Complaint fails to state a claim for induced or contributory infringement because the 26 pleading merely recites “legal standards without any supporting factual contentions as to [the 27 accused products’] lack of substantial non-infringing uses.” Mot. at 3. Forescout lastly contends 28 that Fortinet’s willful infringement claims also fail because the Amended Complaint “again fails 5 1 to allege any facts showing that Forescout’s conduct has been in any way egregious.” Id. Fortinet responds that the ’034 and ’421 Patents claim eligible subject matter under § 101 United States District Court Northern District of California 2 3 because they are not directed to abstract ideas. Instead, they address “specific problems in the . . . 4 field of network security and endpoint security.” Docket No. 73 (“Opp’n”) at 2. Fortinet also 5 suggests that, even if the patents incorporate abstract ideas, the Court should refrain from 6 invalidating them “at such an early state of litigation,” id., where the Court must accept a 7 complaint’s allegations about a patent’s advances over the prior art “as true and consider them 8 important in [the] determination that [the patent’s] claims are drawn to a technological 9 improvement,” id. at 3-4 (quoting CardioNet, LLC v. InfoBionic, Inc., 955 F.3d 1358, 1367 (Fed. 10 Cir. 2020)). Regarding the sufficiency of Fortinet’s infringement allegations, Fortinet argues that 11 the Amended Complaint adds sufficient factual support to its claims for contributory and willful 12 infringement (which the Court previously found deficient), as well as its claims for induced 13 infringement (which the Court earlier deemed adequate). Id. at 1. 14 A. 15 Patent-Eligible Subject Matter Section 101 of the Patent Act defines the scope of patent-eligible subject matter. It 16 provides: “Whoever invents or discovers any new and useful process, machine, manufacture, or 17 composition of matter, or any new and useful improvement thereof, may obtain a patent therefor.” 18 35 U.S.C. § 101. But the Supreme Court has long excluded from patent protection “laws of 19 nature, natural phenomena, and abstract ideas,” Diamond v. Diehr, 450 U.S. 175, 185 (1981), 20 which are “the basic tools of scientific and technological work,” Gottschalk v. Benson, 409 U.S. 21 63, 67 (1972). The Court has “described the concern that drives this exclusionary principle as one 22 of pre-emption,” since granting “a monopoly over an abstract idea” would “pre-empt use of [the 23 idea] in all fields” and thus “impede innovation more than it would tend to promote it.” Alice 24 Corp. Pty. Ltd. v. CLS Bank Int’l, 573 U.S. 208, 216 (2014) (internal citations omitted). The 25 Court has also cautioned, however, that lower courts must “tread carefully in construing this 26 exclusionary principle” since, “[a]t some level, ‘all inventions . . . embody, use, reflect, rest upon, 27 or apply laws of nature, natural phenomena, or abstract ideas.’” Id. at 217 (quoting Mayo 28 Collaborative Servs. v. Prometheus Labs., Inc., 566 U.S. 66, 71 (2012)). 6 United States District Court Northern District of California 1 In Alice, the Court codified a two-part test, first articulated in Mayo, for “distinguishing 2 patents that claim laws of nature, natural phenomena, and abstract ideas from those that claim 3 patent-eligible applications of those concepts.” 573 U.S. at 217. At step one, a court must 4 “determine whether the claims at issue are directed to a patent-ineligible concept,” i.e., a law of 5 nature, natural phenomenon, or abstract idea. Id. at 218. If so, then the court moves to step two, 6 “consider[ing] the elements of each claim both individually and ‘as an ordered combination’ to 7 determine whether [any] additional elements ‘transform the nature of the claim’ into a patent- 8 eligible application” of the ineligible subject matter. Id. at 217 (quoting Mayo, 566 U.S. at 79, 9 78). The Court has described this second step as “a search for an ‘inventive concept’”—“an 10 element or combination of elements that is ‘sufficient to ensure that the patent in practice amounts 11 to significantly more than a patent upon the [ineligible subject matter] itself.’” Id. at 217-18 12 (quoting Mayo, 566 U.S. at 72-73). 13 Lower courts have conceded that, in the wake of Mayo and Alice, “precision has been 14 elusive in defining an all-purpose boundary between the abstract and the concrete.” Affinity Labs 15 of Tex., LLC v. DirecTV, LLC, 838 F.3d 1253, 1258 (Fed. Cir. 2016) (internal quotation omitted). 16 Nevertheless, the Supreme Court and the Federal Circuit have established certain parameters for 17 conducting the step-one and step-two inquiries. 18 At step one, courts “look at the ‘focus of the claimed advance over the prior art’ to 19 determine if the patent claim's ‘character as a whole’ is directed to excluded subject matter,” 20 Affinity Labs, 838 F.3d at 1257-58 (internal quotation omitted), such as an abstract idea. While 21 the “Supreme Court has not established a definitive rule to determine what constitutes an ‘abstract 22 idea,’” Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1334 (Fed. Cir. 2016), it has identified 23 algorithms, mathematical formulae, “fundamental economic practice[s] long prevalent in our 24 system of commerce,” and other “method[s] of organizing human activity” as impermissibly 25 abstract, Alice, 573 U.S. at 218-20 (citing Bilski v. Kappos, 561 U.S. 593, 599 (2010)). Courts 26 therefore often begin the step-one analysis by simply “compar[ing] claims at issue to those claims 27 28 7 1 already found to be directed to an abstract idea in previous cases.”1 See Enfish, 822 F.3d at 1334. The closer question at step one, however, tends to be not “whether the claims involve a United States District Court Northern District of California 2 3 patent-ineligible concept,” but whether they are “directed to excluded subject matter.” See Enfish, 4 822 F.3d at 1335 (internal quotation omitted) (emphasis added). With computer technology in 5 particular, a typical crux in the step-one analysis is “whether the focus of the claims is on the 6 specific asserted improvement in computer capabilities . . . or, instead, on a process that qualifies 7 as an ‘abstract idea’ for which computers are invoked merely as a tool.” Id. at 1336; see also 8 Ancora Techs., Inc. v. HTC Am., Inc., 908 F.3d 1343, 1347 (Fed. Cir. 2018) (identifying this 9 question as the key issue in cases “involving software innovations”). Merely applying an “abstract 10 idea . . . on a generic computer” does not satisfy step one. BASCOM Global Internet Servs., Inc. v. 11 AT&T Mobility LLC, 827 F.3d 1341, 1348 (Fed. Cir. 2016) (internal quotation omitted). Nor does 12 “[l]imiting the invention to a technological environment” such as the Internet transform an 13 otherwise abstract idea into one satisfying step one. Berkheimer, 881 F.3d at 1367 (internal 14 quotation omitted). The Federal Circuit has also suggested that a computer-based patent should 15 “describe how to solve the problem [it addresses] in a manner that encompasses something more 16 than the principle in the abstract” to claim eligible subject matter at step one. See Dropbox, Inc. v. 17 Synchronoss Techs., Inc., 855 Fed. Appx. 529, 533 (Fed. Cir. 2020) (internal quotation omitted); 18 see also Affinity Labs, 838 F.3d at 1258 (holding an invention abstract at step one where there was 19 “nothing in [the patent] that is directed to how to implement” the claimed idea); Ancora, 908 F.3d 20 at 1348 (holding an invention patentable at step one where the claim “specifically identifies how 21 th[e] functional improvement is effectuated in an assertedly unexpected way”). Put another way, courts at Alice step one seek to determine whether a patent's claimed 22 23 advance represents a concrete “technological solution to a technological problem.” See Packet 24 Intelligence LLC v. NetScout Sys., Inc., 965 F.3d 1299, 1309 (Fed. Cir. 2020); see also SRI Int'l, 25 Inc. v. Cisco Sys., Inc., 930 F.3d 1295, 1303 (Fed. Cir. 2019) (upholding patent eligibility at step 26 one because “the claims are directed to a technological solution to a technological problem”); 27 28 For some of the “varied approaches to determining whether particular claims are directed to an abstract idea” that courts have taken, see Voip-Pal.Com, 374 F. Supp. 3d at 1125-26. 8 1 1 Prism Techs., LLC v. T-Mobile USA, Inc., 696 Fed. Appx. 1014, 1017 (Fed. Cir. 2017) (denying 2 eligibility at step one because claims did not “cover a concrete, specific solution to a real-world 3 problem”). In this regard, the focus is placed on a patent’s specificity. United States District Court Northern District of California 4 If a patent is directed to an abstract idea at Alice step one, then the essential inquiry at Alice 5 step two is whether “the elements of [a] claim both individually and ‘as an ordered combination’” 6 go beyond “‘well-understood, routine, conventional activit[ies]’ previously known to the 7 industry.” Alice, 573 U.S. at 217, 225 (quoting Mayo, 566 U.S. at 79, 73); see also Berkheimer, 8 881 F.3d at 1367 (“The second step of the Alice test is satisfied when the claim limitations involve 9 more than performance of ‘well-understood, routine, [and] conventional activities previously 10 known to the industry.’”). The Federal Circuit has thus held that, in the case of a computer- 11 implemented invention, any “concrete, tangible components” (e.g., computer hardware) recited in 12 the claims “must involve more than performance of ‘well-understood, routine, conventional 13 activit[ies]’ previously known to the industry” to render an abstract idea patent-eligible. In re TLI 14 Commc’ns LLC, 823 F.3d 607, 613 (Fed. Cir. 2016) (quoting Alice, 573 U.S. at 225). The 15 components themselves, however, may supply an inventive concept if they amount to more than 16 “generic computer components.” See Customedia Techs., LLC v. Dish Network Corp., 951 F.3d 17 1359, 1366 (Fed. Cir. 2020). And “an inventive concept can be also found in the non- 18 conventional and non-generic arrangement of known, conventional pieces” of computing 19 components. BASCOM, 827 F.3d at 1350. 20 With the step-two analysis, “[t]he question of whether a claim element or combination of 21 elements is well-understood, routine[,] and conventional to a skilled artisan in the relevant field is 22 a question of fact.” Berkheimer, 881 F.3d at 1368. As a result, “whether a claim recites patent 23 eligible subject matter is a question of law which may contain underlying facts,” and it is only 24 “[w]hen there is no genuine issue of material fact regarding whether the claim elements or claimed 25 combination is well-understood, routine, [or] conventional to a skilled artisan in the relevant field” 26 that eligibility “can be decided . . . as a matter of law” on a motion to dismiss or at summary 27 judgment. Id. In other words, if there is a genuine dispute as to whether the claimed combination 28 of elements is routine or conventional to a skilled artisan in the field, a motion to dismiss or 9 1 summary judgment must be denied. A fact-based question such as this one, moreover, “that is 2 pertinent to the invalidity conclusion must be proven by clear and convincing evidence” by the 3 party challenging the patent. Id. 1. 5 The ’034 Patent concerns “[s]ystems and methods for managing configuration of a client 6 security application based on a network environment in which the client device is operating.” 7 Compl. ¶ 37 (quoting ’034 Patent at Abstract). Claim 1, one of the patent’s two independent 8 claims and the focus of the parties’ discussion in their moving papers, recites: 9 10 11 United States District Court Northern District of California The ’034 Patent 4 12 13 14 15 16 17 18 19 20 1. A method comprising: during initialization of a client security application running on a client device: [1] determining, by the client security application, a network connection state of the client device with respect to a private network; [2] selecting, by the client security application, a configuration for the client security application based on the determined network’s connection state; and [3] launching, by the client security application, one or more functions of the client security application that are designated by the selected configuration to be performed by the client security application, wherein the one or more functions include one or more of web content filtering, anti-virus scanning and network access logging. ’034 Patent at Clm. 1 (bracketed numbers added). According to the patent’s specification, “it is a challenge in network security management 21 to keep a network secure while allowing many different devices to connect to the network.” 22 Compl. ¶ 37 (citing ’034 Patent at 1:23-25). One way that user devices can connect to a network 23 remotely is through a client security application, which must be configured “based on information 24 regarding the network environment in which the user device is operating.” Id. (citing ’034 Patent 25 at 1:50-54). The inventors of the ’034 Patent solved the aforementioned security challenge “by 26 having the client security application [1] determine [the user device’s] network connection state 27 with respect to a private network, [2] select a configuration based on this, and [3] launch 28 functionality” (e.g., “web content filtering, anti-virus scanning, and network access logging”) 10 1 “based on [the application’s] determination and selected configuration.” Id. (citing ’034 Patent at 2 1:56-60) (bracketed numbers added). The invention purportedly represents an advance over the 3 prior art, which “typically required users to change the configuration of their device manually 4 when changing networks or access methods in order for the corresponding functions of the client 5 security application to be launched.” Id. (citing ’034 Patent at 1:44-50). The Amended Complaint 6 states that the patent “solved this problem in a non-conventional way” and that the “ordered 7 combination of the claimed steps is not generic and was neither routine nor conventional at the 8 time of invention.” Id. Forescout argues that the ’034 Patent is “directed to [a] simple abstract idea[]” and United States District Court Northern District of California 9 10 therefore fails step one of the Alice test. Mot. at 6. That abstract idea is “selecting a course of 11 action based on a condition”—i.e., a “network connection state to a private network”—“and then 12 launching predetermined functions.” Id. at 8, 6. This process, Forescout insists, represents “a 13 simple type of if/then logic that is a common and well-understood business organization 14 strategy.”2 Id. at 8. Forescout analogizes this process to that of “generating tasks based on rules 15 to be completed upon the occurrence of an event,” which the Federal Circuit has found abstract. 16 See Mot. at 6, 9 (quoting Accenture Glob. Servs., GmbH v. Guidewire Software, Inc., 728 F.3d 17 1336, 1344 (Fed. Cir. 2013)). “Here,” Forescout concludes, “the ‘event’ is connecting to a 18 network, the ‘rules’ are the selected configuration, and the ‘tasks’ are the functions designated by 19 that configuration.” Id. at 9. Computers are therefore being invoked “merely as tools to execute 20 fundamental economic practices.” Id. at 10 (quoting Smartflash LLC v. Apple Inc., 680 Fed. 21 Appx. 977, 982 (Fed. Cir. 2017)). Forescout also analogizes the ’034 Patent (as well as the ’421 Patent) to network-access- 22 23 control inventions that the Federal Circuit invalidated in Prism Technologies LLC v. T-Mobile 24 USA, Inc., 696 Fed. Appx. 1014 (Fed. Cir. 2017), Ericsson Inc. v. TCL Communication 25 Technology Holdings Ltd., 955 F.3d 1317 (Fed. Cir. 2020), and Dropbox, Inc. v. Synchronoss 26 27 28 The if/then logic runs as follows: “[I]f the network is connected, select configuration X; but if the network is disconnected, select configuration Y.” Mot. at 10. These different configurations then launch “certain generic programs, such as ‘web content filtering’ or ‘anti-virus scanning.’” Id. 11 2 United States District Court Northern District of California 1 Technologies, 815 Fed. Appx. 529 (Fed. Cir. 2020). See Mot. at 6-8. In those cases, the Federal 2 Circuit held that “controlling access to, or limiting permission to, resources” is an unpatentable 3 abstract idea. See Ericsson, 955 F.3d at 1326; see also Prism, 696 Fed. Appx. at 1017 (stating that 4 “providing restricted access to resources” is abstract); Dropbox, 815 Fed. Appx. at 532 (stating 5 that “controlling access to data” is abstract). Forescout further argues that, much as in Prism, the 6 claims at issue here “relate to network security functions based on . . . basic mental functions that 7 could be performed by a human” being “keeping a mental or written list of which programs to 8 launch when connecting to a network.” Mot. at 10. And as in Dropbox, the “determination of 9 whether a user is connected to a ‘private network’” amounts to “nothing more than [a] functionally 10 recited ‘black box’” that fails to explain “how the selection of a ‘configuration’ is accomplished or 11 how the one or more ‘functions’ are ‘designated’ by the configuration.” Id. (quoting Dropbox, 12 815 Fed. Appx. at 532-33). This lack of explanation, Forescout contends, precludes the ’034 13 Patent from representing a properly technological solution to a technological problem. See id. at 14 10-11. 15 Fortinet counters that the ’034 Patent “provides a concrete, technological solution” to 16 problems of endpoint security management through “its specialized ‘client security application.’” 17 Opp’n at 4. Specifically, the application responds to specific “problems encountered by client 18 devices that need to connect to multiple network environments, and by computer networks that 19 need to allow many different kinds of devices to connect to a network from both inside and 20 outside of it.” Id. In arguing that the application offers “specific concrete solutions” to network 21 security challenges, Fortinet analogizes this case to Enfish, where a self-referential table for a 22 computer database claimed “multiple benefits” over conventional databases (e.g., “increased 23 flexibility, faster search times, and smaller memory requirements”) and so constituted “an 24 improvement to computer functionality itself.” See 822 F.3d at 1330-33, 1336-37. Enfish thus 25 ruled that the self-referential table was not directed to an abstract idea but to a properly 26 technological solution to a technological problem. See id. at 5 (discussing Enfish, 822 F.3d at 27 28 12 1 1336-37); see also Order at 11-12 (discussing the same passage from Enfish).3 “Several 2 dependent claims further limit Claim 1,” Fortinet adds, “and recite various means of achieving the 3 specific concrete solutions of the invention.” Id.; see also id. (providing examples from Claims 5- 4 9). In arguing that the ’034 Patent is directed to more than an abstract idea, Fortinet disputes United States District Court Northern District of California 5 6 Forescout’s contention that “the claims could be met by ‘keeping a mental or written list of which 7 programs to launch when connecting to a network.’” Id. at 6 (quoting Mot. at 10). The “client 8 security application’s methods of determining a ‘network connection state,’” Fortinet argues, are 9 far more complicated than the analog comparison would allow, as the claims “may encompass 10 information beyond what is readily accessible to a human operator.” Id. For example, “based on 11 [a] network connection state, the client security application . . . automatically and flexibly 12 implements its configuration by launching various features, such as web content filtering . . . [,] 13 that are more effective at securing large computer networks when automatically deployed at scale 14 across an entire network.” Id. (citing ’034 Patent at 5:48-65). In contrast, “the manual application 15 of security configurations” that Forescout posits as a substitute for the ’034 Patent “is a problem to 16 be addressed,” since “[p]ast reliance on users performing manual security tasks undercut the 17 effectiveness of the computer itself.” Id. at 7 (citing ’034 Patent at 1:35-54) (internal quotation 18 omitted). As with the patents contested in the previous motion to dismiss, the step-one inquiry 19 20 presents a close question. First, the caselaw that the parties rely on provides only limited 21 guidance, as it does not address technology directly analogous to that which is at issue here. See 22 Enfish, 822 F.3d at 1334. Second, as in many “cases involving computer-related claims,” the step- 23 one and step-two inquiries here overlap, such that “an analysis of whether there are arguably 24 25 26 27 28 3 As with the previous motion to dismiss, Fortinet also relies on Ancora and Packet Intelligence, where the Federal Circuit held, respectively, that method patents recited “a specific technique that depart[ed] from earlier approaches to solve a specific computer problem” and provided a “granular, nuanced, and useful” advance over previous approaches “rather than an abstract result.” Opp’n at 5-6 (quoting Ancora, 908 F.3d at 1348; Packet Intelligence, 965 F.3d at 1310); see also Order at 13-16 (discussing these cases). As in these cases, Fortinet concludes, the patent at issue here is directed to “improvement to computer functionality.” Id. at 5. 13 United States District Court Northern District of California 1 concrete improvements in the recited computer technology could take place under step two.” See 2 id. at 1339; see also Ancora, 908 F.3d at 1349 (recognizing “overlaps between . . . step one and 3 step two considerations”). The Court therefore adopts a flexible approach in “characteriz[ing] 4 what the claims are directed to,” taking both step-one and step-two considerations into account 5 below. See Enfish, 822 F.3d at 1339. Third, a question underlying much of the parties’ dispute 6 concerns the role of a patent’s specification in determining whether the invention is directed to 7 eligible subject matter at step one. The parties addressed this issue at some length during the 8 hearing on Forescout’s motion. See, e.g., Docket No. 79 (“Hearing Tr.”) at 8-22, 37-41. The 9 Court has reviewed the authorities cited by the parties and concludes that there exist two 10 conflicting lines of Federal Circuit caselaw—one that stresses the role of the specification in the 11 step-one analysis and another that minimizes it. With respect to the first line of caselaw, Enfish established that a patent’s specification can 12 13 be relevant at Alice step one. There, the Federal Circuit stated that “the ‘directed to’ inquiry 14 applies a stage-one filter to claims, considered in light of the specification, based on whether their 15 character as a whole is directed to excluded subject matter.” 822 F.3d at 1335 (internal quotation 16 omitted) (emphasis added). Elsewhere in the discussion, the court focused primarily on the claim 17 language of the disputed patent, asking “whether the claims are directed to an improvement to 18 computer functionality versus being directed to an abstract idea.” Id. (emphasis added). The 19 Enfish court emphasized, however, that its “conclusion that the claims [were] directed to an 20 improvement to an existing technology [was] bolstered by the specification’s teachings that the 21 claimed invention achieves other benefits over conventional” technology in the field. Id. at 1337 22 (emphasis added). Enfish therefore made clear that a specification may serve, at a minimum, to 23 “bolster[]” or “confirm” a court’s interpretation of standalone claim language.4 See id. at 1337, 24 25 26 27 28 4 As Forescout observed during the motion hearing, Hearing Tr. at 40, the patent at issue in Enfish was a means-plus-function invention under 35 U.S.C. § 112(f), which requires that courts first “determine the claimed function” and then “identify the corresponding structure in the written description of the patent that performs the function.” See 822 F.3d at 1336 & n.3 (internal quotation omitted). While the Enfish court may therefore have been unusually solicitous of the specification given the nature of the disputed patent, the court did not expressly limit its analysis to patents governed by § 112(f), nor did this aspect of the case seem determinative to the Alice step-one analysis. 14 1 United States District Court Northern District of California 2 1339. The Federal Circuit went further in CardioNet, where it reversed a district court’s 3 invalidation, on § 101 grounds, of a patent related to cardiac monitoring technology. See 955 F.3d 4 at 1362. In framing the “directed to” inquiry, the court stated that while it looks first to claim 5 language it “also consider[s] the patent’s written description, as it informs [the court’s] 6 understanding of the claims.” Id. at 1367-68; see also id. at 1368 (quoting Chamberlain Group, 7 Inc. v. Techtronic Industries Co., 935 F.3d 1341, 1346 (Fed. Cir. 2019), for the principle that a 8 “specification [is] helpful in illuminating what a claim is ‘directed to’”). And when the court 9 performed the step-one analysis, it devoted less attention to the claim language than to the 10 specification, particularly its explanation of how “the claimed invention achieves multiple 11 technological improvements” over the prior art. See id. at 1368-69. The court also emphasized 12 the role of the dependent claims in showing that the invention satisfied Alice step one, “as they 13 further specif[ied] the physical features or operations” of the patented device. Id. at 1369. 14 In upholding the disputed patent on § 101 grounds, the CardioNet court analogized to 15 earlier cases in which the Federal Circuit did likewise. Specifically, it pointed to Visual Memory 16 LLC v. NVIDIA Corp., 867 F.3d 1253 (Fed. Cir. 2017), where the court ruled that the contested 17 claims were “directed to an improved computer memory system, not to [an] abstract idea.” 18 CardioNet, 955 F.3d at 1369 (quoting Visual Memory, 867 F.3d at 1257, 1259). The CardioNet 19 court then noted (without any discussion of the actual claim language at issue in Visual Memory): 20 “Important to our determination was the fact that the written description described technical 21 ‘advantages offered by’ the claimed memory system,” such as the system’s ability “to 22 accommodate ‘different types of processors.’” Id. (quoting Visual Memory, 867 F.3d at 1259-60). 23 “Weighing ‘all factual inferences drawn from the specification . . . in favor of Visual Memory, the 24 non-moving party,’ [the court] reversed the district court’s decision that the claims were 25 ineligible.” Id. (quoting Visual Memory, 867 F.3d at 1362). Visual Memory was therefore 26 analogous to CardioNet, where the patent’s “written description identifie[d] a number of 27 advantages gained by the elements recited in the claimed cardiac monitoring device.” Id. The 28 CardioNet court again “accept[ed] those statements as true and consider[ed] them important in 15 1 [its] determination that the claims [were] drawn to a technological improvement” and thus 2 satisfied Alice step one. Id. at 1370. Taken together, CardioNet and Visual Memory seem to stand for the proposition that a United States District Court Northern District of California 3 4 patent’s specification may play an “important” role in the step-one, or “directed to,” inquiry and 5 that a district court should consider the specification when deciding whether the patent is focused 6 more on an abstract idea or a technological solution to a technological problem. See id. at 1367- 7 70. These cases also stress that “all factual inferences drawn from the specification” are to be 8 resolved in favor of the nonmoving party at the pleadings stage. See id. at 1369. And unlike other 9 recent cases such as Ericsson and Dropbox, which suggest that computer-based inventions must 10 “describe how to solve the [technological] problem” they address in meaningful detail, see 11 Dropbox, 815 Fed. Appx. at 533 (emphasis in original), neither CardioNet nor Visual Memory 12 focus on this issue in upholding subject-matter eligibility at step one. See CardioNet, 955 F.3d at 13 1368-69; see also Visual Memory, 867 F.3d at 1260-61 (drawing inferences about “how to 14 implement the claimed invention” in favor of the non-moving party on a motion to dismiss and 15 stating that such a question is, in any event, “an enablement issue under 35 U.S.C. § 112, not an 16 eligibility issue under § 101”). In American Axle & Manufacturing, Inc. v. Neapco Holdings LLC, 967 F.3d 1285 (Fed. 17 18 Cir. 2020), however, the Federal Circuit minimized the role of the specification at Alice step one 19 and instead emphasized “the failure of the claims to designate how to achieve the desired result.” 20 Id. at 1302. There, the court held that a patent claim concerning driveline propeller shafts was 21 directed to ineligible subject matter. Specifically, the claim was “directed to the mere application” 22 of a law of nature “to achieve the [invention’s] desired result” and failed to “provid[e] [a] 23 particular means of how . . . to do so.” See id. at 1291; see also id. at 1294-95 (reaching the same 24 conclusion).5 In conducting the step-one inquiry, the American Axle court stated that relevant 25 26 27 28 In developing this argument, the American Axle majority refuted the dissent’s objection that the majority had “improperly merg[ed] enablement and eligibility” inquiries. See 967 F.3d at 1302. Section 101, the court stated, “is concerned with whether the claims are directed to” ineligible subject matter, “not whether the specification has adequately described how to make and use the concretely claimed structures and steps,” which is the focus of the enablement inquiry. Id. (emphasis added); cf. Visual Memory, 867 F.3d at 1260-62 (distinguishing between the 16 5 United States District Court Northern District of California 1 Supreme Court caselaw “focus[es] on the claims, not the specification, to determine section 101 2 eligibility,” and that, according to Federal Circuit precedent, “features that are not claimed are 3 irrelevant as to step 1 or step 2 of the Mayo/Alice analysis.” Id. at 1293 (emphasis added); see 4 also Accenture, 728 F.3d at 1345 (“[T]he level of detail in the specification does not transform a 5 claim reciting only an abstract concept into a patent-eligible system or method.”). Accordingly, 6 the court’s “directed to” inquiry focused almost exclusively on “the face of the claim,” not the 7 specification, in concluding that the claim was entirely functional and lacked the requisite 8 specificity to satisfy § 101. See Am. Axle, 967 F.3d at 1294; see id. at 1298 (referring to the 9 “claim on its face”). American Axle thus provides that a patent’s claimed limitations are 10 paramount at Alice step one, and that limitations contained only in a specification are “irrelevant” 11 to the § 101 analysis. See id. at 1293. 12 Given the Federal Circuit’s ambiguous caselaw on the question of the specification’s 13 precise role at step one of the Alice test, as well as the level of detail the invention must provide in 14 explaining how it functions, the Court believes it prudent, at this still-early stage of the litigation, 15 to construe the focus of the ’034 Patent “in light of the specification,” Enfish, 822 F.3d at 1335, 16 and to credit the specification’s account of whether and how “the claimed invention achieves 17 multiple technological improvements” over the prior art, CardioNet, 955 F.3d at 1368-69. 18 The Court nevertheless agrees with Forescout that Claim 1 of the ’034 Patent appears, on 19 its face, to be abstract. According to Claim 1, the method entails a client security application 20 enabling a client device (1) to “determin[e]” its “network connection state,” (2) to “select[] . . . a 21 configuration for the client security application” based on this network connection state, and (3) to 22 “launch[] . . . one or more” predetermined “functions of the client security application,” including 23 “web content filtering, anti-virus scanning, [or] network access logging.” See’034 Patent at Clm. 24 As Forescout argues, this relatively simple three-step process seems directed to little more than 25 “the abstract idea of making a selection based on a condition.” Docket No. 74 (“Reply”) at 1. The 26 claim language also lacks the kind of technological specificity concerning how the invention’s 27 28 enablement and eligibility inquiries). 17 United States District Court Northern District of California 1 desired result (i.e., improved endpoint security management) is achieved that the Federal Circuit 2 has oftentimes required to satisfy step one. See, e.g., Dropbox, 815 Fed. Appx. at 532-33; 3 Ericsson, 955 F.3d at 1326 (holding an invention abstract at step one where, inter alia, it did “not 4 specify how the claim” achieved its desired result). Restricted solely to the language of Claim 1, 5 therefore, the Court would have little trouble concluding that the ’034 Patent recites ineligible 6 subject matter at Alice step one. 7 As Fortinet contends, however, other features of the ’034 Patent suggest that it may satisfy 8 the step-one inquiry, at least in light of cases such as CardioNet and Visual Memory. First, several 9 dependent claims refer to specific technological features that plausibly restrict the invention to the 10 realm of the technologically concrete rather than the abstract. Claim 5, for example, comprises a 11 limitation of dependent Claim 3, and entails a “Dynamic Host Configuration Protocol (DHCP) 12 client of the client device” sending a “DHCP packet to a network appliance” and then 13 “receiving . . . an acknowledgment DHCP packet” that contains the appliance’s “identification 14 information.” ’034 Patent at Clm. 5. Claim 8 then further limits Claim 5 so that the 15 aforementioned functions “include one or more of Secure Sockets Layer (SSL)/Internet Protocol 16 Security Protocol (IPSec) Virtual Private Networking (VPN), application firewalling, two-factor 17 authentication, vulnerability scanning and Wide Area Network (WAN) optimization.” Id. at Clm. 18 8. While Forescout insists that such features are merely “conventional,” Reply at 4, the Court is 19 unable to deduce as much from the claims themselves or the specification. Rather, these 20 dependent-claim limitations seem to “further specif[y] the physical features or operations” of the 21 patented device, suggesting that it is directed to something that is technologically concrete. See 22 CardioNet, 955 F.3d at 1369. 23 Additionally, the ’034 Patent’s specification provides reasonably detailed explanations of 24 how the invention functions in preferred embodiments and suggests “that the claimed invention 25 achieves [multiple] benefits over conventional” technology in the field. See Enfish, 822 F.3d at 26 1337. Describing Figure 5, for instance, the specification explains that “[a]fter the appropriate 27 configuration is selected based on the client device’s network environment state . . . the client 28 security application continues the startup procedure by launching the functions/engines that are 18 United States District Court Northern District of California 1 associated with the corresponding configuration.” ’034 Patent at 8:55-59. The specification then 2 provides a more detailed example of how the startup procedure works: “[W]hen an off-net 3 configuration is selected and SSL/IPsec VPN and web filtering are enabled . . . the client security 4 application launches a VPN dial-up module and establishes a VPN connection with a gateway of a 5 private network using predefined VPN parameters.” Id. at 8:59-65. Based on details like these in 6 the specification, it may be argued that the’034 Patent is “more effective at securing large 7 computer networks when automatically deployed at scale across an entire network,” and that the 8 manual version of patent’s security tasks “reduc[es] the security of the entire network by limiting 9 compliance with security protocols to that provided by human users.” See id. at 6-7 (citing ’034 10 Patent at 1:35-54). Absent further developments in this case (e.g., claim construction or expert 11 testimony), the Court is reluctant to reach a conclusion at this stage as to whether “the claimed 12 invention achieves multiple technological improvements” over the prior art. See CardioNet, 955 13 F.3d at 1368-69. 14 Nevertheless, even if the Court were to find the ’034 Patent directed to ineligible subject 15 matter at step one, it would be hard pressed to reach the same conclusion at step two— 16 recognizing, again, that “an analysis of whether there are arguably concrete improvements in the 17 recited computer technology could take place under” either step one or step two. See Enfish, 822 18 F.3d at 1339. The step-two inquiry, as stated above, focuses on whether the claims contain an 19 “inventive concept,” i.e., “a claim element or combination of elements” that goes beyond that 20 which is “well-understood, routine[,] and conventional to a skilled artisan in the relevant field.” 21 Berkheimer, 881 F.3d at 1368. 22 Here, Fortinet plausibly argues that “fact questions exist as to whether the limitations of at 23 least Claims [1 and 5] contain features, either individually or in an ordered combination, that are 24 non-generic, not well understood, and not well known.” Opp’n at 15. Claim 5, as noted above, 25 involves “sending, by a [DHCP] client of the client device, a DHCP packet to a network appliance 26 of the one or more network appliances,” and then “receiving[,] by the DHCP client, an 27 acknowledgement DHCP packet containing . . . identification information.” ’034 Patent at Clm. 5. 28 Similarly, Claim 14 recites identification information that “comprises (i) a serial number or a hash 19 1 value of the serial number of the one or more network appliances, (ii) a unique name of the one or 2 more network appliances or (iii) a hash value of a plurality of serial numbers of the one or more 3 network appliances.” Id. at Clm. 14. Again, the Court cannot conclude at this stage of the 4 litigation that clear and convincing evidence proves this combination of claim elements to be 5 “well-understood, routine[,] and conventional to a skilled artisan in the relevant field.” See 6 Berkheimer, 881 F.3d at 1368. United States District Court Northern District of California 7 The Court therefore declines, at this time, to hold the ’034 Patent invalid on the grounds of 8 § 101, whether viewed in light of the step-one or step-two analyses, or as a consolidation thereof. 9 The Court clarifies that its ruling here is not prejudicial to Forescout’s ability to renew its subject- 10 matter-eligibility arguments at a later stage of the litigation, such as at summary judgment. The 11 Court also observes that, as with the ’314, ’299, and ’662 Patents, it remains skeptical of the 12 ultimate validity of ’034 Patent, especially given Fortinet’s failure, to this point, to articulate 13 meaningful differences between the patent’s independent and dependent claims. For now, 14 however, the Court DENIES Forescout’s motion to dismiss on the grounds that the ’034 Patent 15 claims ineligible subject matter. The ’421 Patent 16 2. 17 The ’421 Patent claims “[s]ystems and methods . . . for conducting work flows by [a 18 Security Information and Event Management (“SIEM”)] device to carry out a complex task 19 automatically.” ’421 Patent at Abstract. Claim 1, one of the patent’s two independent claims and 20 the focus of the parties’ discussion in their moving papers, recites: 21 1. A method comprising: 22 [1] creating, by a security information and event management (SIEM) device associated with a private network, a work flow, said work flow including information defining a plurality of security tasks that are to be performed by one or more security devices associated with the private network and managed by the SIEM device, wherein the plurality of security tasks include operations that are intended to protect the private network against attacks; 23 24 25 26 27 [2] starting, by the SIEM device, the work flow by scheduling the one or more security devices to perform the plurality of security tasks defined in the work flow; and 28 [3] collecting, by the SIEM device, results of the plurality of 20 security tasks after they are performed by the one or more security devices. 1 2 Id. at Clm. 1 (bracketed numbers added). According to the patent’s specification, contemporary computer networks “may comprise United States District Court Northern District of California 3 4 hundreds of . . . devices located in different places, including multiple security devices deployed to 5 protect the network from attacks.” Compl. ¶ 39 (citing ’421 Patent at 1:21-25). As part of these 6 networks, SIEM devices “may be deployed to aggregate results of tasks performed by the various 7 security devices on a network and alert network administrators” in event of a security breach. Id. 8 (citing ’421 Patent at 1:30-35). But “problems arise in that the tasks conducted by these disparate 9 security devices are independent,” and so may involve “different parameters” and “different 10 configurations depending on the device . . . and its manufacturer.”6 Id. (citing ’421 Patent at 1:35- 11 36). There was thus “a need for improved SIEM devices that may schedule multiple complex 12 tasks of various security devices to achieve comprehensive management of multiple security 13 devices.” Id. (citing ’421 Patent at 1:43-55). The ’421 Patent allegedly solved this problem “in a 14 non-conventional way by having the SIEM configured to allow users [1] to create a work flow that 15 includes multiple security tasks to be performed by one or more security devices, [2] performing 16 these tasks, and [3] collecting the results of these tasks after they are performed.” Id. (citing ’421 17 Patent at 1:50-60, 18:17-42) (bracketed numbers added). As with the ’034 Patent, the Amended 18 Complaint asserts that “[t]he claims of the ’421 Patent include inventive concepts” and that “the 19 ordered combination of the recited limitations is not generic and was neither routine nor 20 conventional at the time of invention.” Id. In arguing that the ’421 Patent is directed to ineligible subject matter, Forescout argues that 21 22 the “idea of ‘conducting work flows’ to carry out tasks and then collecting data about those tasks 23 is a longstanding human activity,” and that the patent merely automates this abstract idea. Mot. at 24 11; see also id. at 12 (asserting that the ’421 Patent is directed to the idea of “organizing a list of 25 tasks and collecting data related to them,” which is “a basic mental process that could be 26 27 28 At the motion hearing, Fortinet offered, as a simple example of the problem the ’421 Patent was designed to solve, the need to “make Apple and Windows machines work on the same network.” See Hearing Tr. at 30. 21 6 United States District Court Northern District of California 1 performed” manually).7 Forescout analogizes the claims at issue here those in Yodlee, Inc. v. 2 Plaid Technologies Inc., 2016 WL 2982503 (D. Del. May 23, 2016), where the court observed that 3 “individuals have long identified sub-tasks of a more complex undertaking, managed the 4 completion of such sub-tasks, and conveyed the results to the requesting party.” Id. (quoting 2016 5 WL 2982503, at *17). To illustrate its point, the court offered the example of “a travel agent 6 planning a trip,” which involves identifying sub-tasks (such as booking flights and reserving hotel 7 rooms), contacting third parties (such as airlines and hotels) to complete those tasks, and relaying 8 the results of those tasks back to the customer. Id. (quoting 2016 WL 2982503 at *17). “The ’421 9 Patent,” Forescout concludes, “merely takes this concept and limits it to the field of network 10 security”—a maneuver that does not make otherwise abstract ideas patentable under § 101. Id. 11 (citing SAP, 898 F.3d at 1169). Forescout further argues that the ’421 Patent is infected with the 12 same “black box” problem identified in Dropbox, as the key terms of Claim 1 (e.g., “work flow,” 13 “functions,” and “security tasks”) are “described in functional language” and the patent “fail[s] to 14 limit how” they work. Id. at 13. Forescout lastly urges that all of the dependent claims “are 15 directed to the same abstract idea as claim 1.” Id. Fortinet counters that the ’421 Patent solves the technological problem of a “need for 16 17 improved SIEM devices that may schedule multiple tasks of various security devices to 18 automatically achieve comprehensive management.” Opp’n at 8 (quoting ’421 Patent at 1:43-46). 19 Fortinet explains that the SIEM device “presents advancements over the prior art” by, for example, 20 “allow[ing] for ‘the results of previous tasks in the work flow [to] be transferred to subsequent 21 tasks’”; earlier SIEM devices, in contrast, “could not take the results of one security task and 22 transfer them to another task.” Id. at 9 (quoting ’421 Patent at 1:37-39, 2:40-42). Fortinet also 23 disputes Forescout’s analogy to the Yodlee court’s travel-agent example, arguing that the ’421 24 Patent does not claim the work flow, but “the transformation of it into specific tasks by a 25 specialized SIEM device coordinating with a variety of security devices, and then executing those 26 27 28 As with the ’034 Patent, Forescout associates the claimed method with the abstract idea in Accenture, “generating tasks based on rules to be completed upon the occurrence of an event.” See Mot. at 12 (quoting 728 F.3d at 1344). 22 7 1 tasks.” Id. (citing ’421 Patent at 12:23-25). Fortinet offers that the ’421 Patent “improve[s] the 2 functioning of large networks comprising many security devices.” Id. at 10; see also Enfish, 822 3 F.3d at 1339 (upholding subject-matter eligibility at Alice step one where the invention was 4 directed to “concrete improvements in the recited computer technology” rather than an abstract 5 idea). Fortinet also rejects Forescout’s contention that the claims describe “black boxes,” as the 6 claims recite specific technological components (e.g., a SIEM device and “work flow templates”), 7 id., and the specification further “explain[s] how the elements recited in the claims refer to specific 8 technological features,” id. (quoting Packet Intelligence, 965 F.3d at 1310). 9 10 United States District Court Northern District of California 11 The Court again conducts the step-one inquiry in light of the Federal Circuit’s forgiving standard for subject-matter eligibility, as articulated in CardioNet and Visual Memory. To start, the language of Claim 1 of the ’421 Patent is again abstract. The claim “on its 12 face” involves three straightforward steps performed by a SIEM device: (1) “creating . . . a work 13 flow” that includes “security tasks” performed by other “security devices” on a computer network, 14 (2) “starting . . . the work flow . . . by scheduling” the security devices “to perform” the security 15 tasks, and (3) “collecting . . . results” of the security tasks after the security devices perform those 16 tasks. See ’421 Patent at Clm. 1; see also Am. Axle, 967 F.3d at 1294, 1298 (focusing on “the face 17 of the claim”). Whether or not the abstract idea to which the method is directed is merely 18 “organizing and monitoring the completion of tasks,” as Forescout suggests, Claim 1 is written in 19 functional terms and lacks the kind of specific “limiting detail that confines the claim to a 20 particular solution to an identified problem.” See Affinity Labs, 838 F.3d at 1269; cf. Am. Axle, 21 967 F.3d at 1298 (stating that an invention may successfully incorporate ineligible subject matter 22 where it provides “a specific and detailed series of steps . . . that limit[] the possibility of 23 preempting the [ineligible subject matter] itself”). 24 Additionally, Forescout’s analogy between the three-step process of Claim 1 and the 25 travel-agent example in Yodlee is revealing, suggesting that the conversion of work flows in Claim 26 1 “into specific tasks [monitored] by a specialized [actor] coordinating with a variety of [other 27 actors], and then executing those tasks,” closely resembles longstanding analog versions of work 28 flow execution and data collection. See Reply at 6. This resemblance weighs against finding 23 United States District Court Northern District of California 1 Claim 1 patent-eligible, as limiting otherwise abstract “claims to a particular field of invention”— 2 e.g., network security—“does not move the claims out of the realm of abstract ideas.” See SAP, 3 898 F.3d at 1169; see also Credit Acceptance Corp. v. Westlake Servs., 859 F.3d 1044, 1055 (Fed. 4 Cir. 2017) (stating that “mere automation of manual processes using generic computers does not 5 constitute a patentable improvement in computer technology”). 6 As with the ’034 Patent, however, Fortinet raises colorable arguments in favor of finding 7 the ’421 Patent non-abstract at step one. Fortinet notes, first, the greater degree of technological 8 specificity contained in some of the patent’s dependent claims. For example, Claim 11 derives 9 from Claim 1 but limits the aforementioned work flow to “a website automatic discovery work 10 flow” and the aforementioned security tasks to “a service discovery, a test Hypertext Transfer 11 Protocol (HTTP) service and a website scan.” ’421 Patent at Clm. 11. And Claim 13, which also 12 depends from Claim 1, confines the work flow to “a closed-loop security event processing work 13 flow,” which in turn “comprises event collecting, leakage verification and emergency response 14 processing.” Id. at Clm. 13. This level of computer-oriented detail suggests that the ’421 15 Patent—at least in its dependent claims—may be “understood as being necessarily rooted in 16 computer technology in order to solve a specific problem in the realm of computer networks.” See 17 SRI Int’l, 930 F.3d at 1303. 18 Fortinet also looks to the specification, which asserts that the specialized SIEM device 19 “presents significant advancements over the prior art.” Opp’n at 9. The specification states that 20 earlier SIEM devices could perform many of the tasks claimed by the’421 Patent but that they 21 were hindered by the “different parameters” of “security devices from different manufacturers” 22 and could not transfer the results of one security task to another. ’421 Patent at 1:30-43. “Thus, 23 there is a need,” the specification concluded, “for improved SIEM devices that may schedule 24 multiple tasks of various security devices to automatically achieve comprehensive management.” 25 Id. at 1:43-46. And in one preferred embodiment of the invention, the SIEM device schedules a 26 work flow in which the constituent security tasks are “sequentially or concurrently executed by 27 multiple security devices despite the security devices being from different manufacturers and/or 28 having different parameters or formats for conducting the tasks.” Id. at 12:57-61. The ’421 24 1 Patent’s specification therefore “identifies a number of advantages gained by the elements recited 2 in the claimed” invention, and the Court must “accept those statements as true and consider them 3 important” in conducting the step-one inquiry. See CardioNet, 955 F.3d at 1369-70. United States District Court Northern District of California 4 The specification also mitigates concerns that the ’421 Patent is merely a “black box,” see 5 Dropbox, 815 Fed. Appx. at 533, as it contains lengthy explanations about how the invention’s 6 preferred embodiments function. The discussion of Figure 2, for example, runs from the middle 7 of column 6 to the top of column 12, and identifies such specific components as a “device adapter 8 layer,” “a WAF,” “an IPS/IDS,” and “a vulnerability scanner.” ’421 Patent at 11:62-65. This 9 level of detail in identifying the embodiment’s hardware components arguably suggests that the 10 patent provides specific guidance on how it operates and achieves its intended result. On the other 11 hand, it is not clear that this type of specificity actually provides “a specific and detailed series of 12 steps” for performing the claimed method sufficient to satisfy step one. See Am. Axle, 967 F.3d at 13 1298. As noted above with respect to the ’034 Patent, that determination would benefit from 14 further developments in the case, such as claim construction and expert testimony. 15 Further, if the Court were to find the ’421 Patent directed to an abstract idea at step one, it 16 would once more have difficulty concluding, on a motion to dismiss, that the patent lacks an 17 inventive concept at step two. Fortinet argues, for instance, that the ’421 Patent’s “specialized 18 SIEM device” was “neither well-understood, routine, nor conventional” in the prior art, as it 19 achieved novel benefits by scheduling and executing security tasks automatically and 20 comprehensively. See Opp’n at 15-16 (citing, e.g., ’421 Patent at 1:37-46). Fortinet further 21 contends that even if the ordered combination of Claim 1’s elements was generic, routine, or 22 conventional, the dependent claims’ elements are not. Claims 2 and 13, for example, “introduce 23 additional elements into [the patent’s] ordered combination, including the ability to create 24 template work flows” and “the use of a closed-loop security event processing work flow.” Id. at 25 16 (citing ’421 Patent at Clms. 2 and 13). As Fortinet again emphasizes, “the question of whether 26 the recited steps and features constitute an inventive concept is a fact question that must be 27 decided in Fortinet’s favor at th[e] motion to dismiss stage.” Id. (citing Berkheimer, 881 F.3d at 28 1368). Fortinet also suggests, not unreasonably, that claim construction may be expected to focus 25 1 the parties’ dispute, especially “given, for example, Forescout’s sweeping interpretation of the 2 claim term ‘security tasks.’” Id. The Court therefore declines to hold, at this stage of the litigation, that the ’421 Patent 3 4 claims ineligible subject matter. It notes, however, that it remains doubtful of the patent’s ultimate 5 validity on § 101 grounds, and that Fortinet will face a higher bar in demonstrating as much as the 6 case progresses. The Court thus DENIES Forescout’s motion to dismiss the ’421 Patent on the 7 grounds of subject-matter eligibility, but its ruling here is without prejudice to Forescout’s ability 8 to re-raise the § 101 issue later in the proceedings. 9 B. United States District Court Northern District of California 10 Infringement Allegations Section 271(a) of the Patent Act provides that “whoever without authority makes, uses, 11 offers to sell, or sells any patented invention . . . during the term of the patent therefor, infringes 12 the patent.” 35 U.S.C. § 271(a). Infringement may be either direct or indirect but “liability for 13 indirect infringement of a patent requires direct infringement” by a third party. See In re Bill of 14 Lading Transmission & Processing Sys. Patent Litig., 681 F.3d 1323, 1333 (Fed. Cir. 2012). 15 Based on the Court’s resolution of Forescout’s earlier motion to dismiss, the parties do not dispute 16 that Fortinet has sufficiently alleged direct infringement of the asserted patents by Forescout’s 17 “customers, purchasers, users[,] and developers.” See Order at 21. The parties instead contest the 18 sufficiency of the Amended Complaint’s factual allegations in stating claims for induced, 19 contributory, and willful infringement. 20 1. Induced Infringement 21 Under § 271(b) of the Patent Act, “[w]hoever actively induces infringement of a patent 22 shall be liable as an infringer.” 35 U.S.C. § 271(b). Addressing the intent element of this 23 provision, the Supreme Court has held that induced infringement “requires knowledge that the 24 induced acts constitute patent infringement.” Glob.-Tech Appliances, Inc. v. SEB S.A., 563 U.S. 25 754, 766 (2011). Thus, a plaintiff alleging inducement must show that the defendant “both (1) 26 ‘knew of the patent’ and (2) knew as well ‘that the induced acts constitute patent infringement.’” 27 Google LLC v. Princeps Interface Techs., 2020 WL 1478352, at *3 (N.D. Cal. Mar. 26, 2020) 28 (quoting Commil USA, LLC v. Cisco Sys., Inc., 575 U.S. 632, 640 (2015)) (emphasis in original); 26 1 Glob.-Tech, 563 U.S. at 766 (first holding that “induced infringement under § 271(b) requires 2 knowledge that the induced acts constitute patent infringement”). The Supreme Court has further 3 clarified, however, that a defendant’s good-faith “belief regarding validity cannot negate the 4 scienter required under § 271(b),” as the statutory language requiring that a defendant “actively 5 induce[d] infringement” requires only an “intent to ‘bring about the desired result,’ which is 6 infringement.” See Commil, 575 U.S. at 642 (quoting Glob-Tech, 563 U.S. at 760) (emphasis 7 added); cf. id. at 648 (“Because only valid patents can be infringed, anyone with a good-faith 8 belief in a patent’s invalidity necessarily believes the patent cannot be infringed. And it is 9 impossible for anyone who believes that a patent cannot be infringed to induce actions that he 10 United States District Court Northern District of California 11 knows will infringe.”) (Scalia, J., dissenting). In its prior order, the Court found that Fortinet’s allegations of inducement were 12 sufficiently pled. The Court first noted that Forescout possessed knowledge of its allegedly 13 infringing activity at least as of the filing of the original complaint; as a result, “the crux of the 14 inducement question [was] whether Fortinet ha[d] set forth sufficient facts showing a specific 15 intent to encourage another’s infringement.” Order at 22 (internal quotation omitted). The 16 original complaint stated that “Forescout ‘instruct[s], direct[s], and/or requir[es] others, including 17 customers, purchasers, users and developers, to perform some of the steps of the method claims’ 18 via specific instructional materials on Forescout’s website.” See id. (quoting, e.g., Docket No. 1 19 ¶ 39). The complaint also described the content of Forescout’s instructional materials (specifically 20 in their teaching of how to infringe the asserted patents) in additional detail and provided URLs 21 for those materials. See id. at 23 (citing, e.g., Docket No. 1 ¶¶ 72-73). The Court held that the 22 first set of allegations, standing alone, was insufficient to state a claim for inducement because it 23 failed to show that the defendant possessed the requisite specific intent. Id. (citing Hypermedia 24 Navigation v. Google LLC, 2019 WL 1455336, at *3 (N.D. Cal. Apr. 2, 2019)). But the Court 25 found that Fortinet’s second set of allegations was adequate to plead inducement because the 26 “numerous references to public material on [the defendant’s] website . . . give rise to an inference 27 of specific intent,” and suggest that Forescout’s materials “actively coached customers to use the 28 accused devices in an infringing manner.” Id. (quoting Software Rsch., Inc. v. Dynatrace LLC, 27 United States District Court Northern District of California 1 316 F. Supp. 3d 1112, 1135 (N.D. Cal. 2018) and Firstface Co., Ltd. v. Apple, Inc., 2019 WL 2 1102374, at *1 (N.D. Cal. Mar. 8, 2019)). The Court nevertheless encouraged Fortinet to “provide 3 greater clarity and specificity in its inducement allegations” in any future pleading. Id. at 23-24. 4 In the instant motion, Forescout acknowledges that the Court previously sustained 5 Fortinet’s inducement claims but argues that “Fortinet did not comply” with the Court’s 6 instructions to allege more specific facts in its Amended Complaint. Mot. at 22. Fortinet responds 7 that it complied with the earlier order, pointing to new paragraphs 48, 63, and 78 in the Amended 8 Complaint, which concern the three previously asserted patents, and paragraphs 93 and 104, which 9 concern the two newly asserted patents. See Opp’n at 20-21 & n.3. Fortinet thus argues that it has 10 “further bolstered” factual allegations already deemed sufficient to survive a motion to dismiss. 11 See id. at 22. 12 Fortinet has sufficiently pled inducement with respect to both the original and newly 13 asserted patents. For example, Paragraphs 93 and 94 of the Amended Complaint, concerning the 14 ’034 Patent, read as follows: 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Forescout's technical documentation evidences specific intent, at least as of the filing [of] this Amended Complaint, to encourage infringement of the ’034 Patent. Forescout's CounterACT Admin Guide (https://www.forescout.com/wpcontent/uploads/2018/11/counteract administration-guide-8.0.1.pdf), its HPS Inspection Engine Configuration Guide (https://www.forescout.com/company/resources/hps-inspectionengine-configuration-guide-10-7-1/), its SecureConnector Advanced Features How-to Guide (https://www.forescout.com/company/resources/secure-connectoradvanced-features-how-to-guide-8-0/), and its Forescout Windows Applications Configuration Guide (https://www.forescout.com/company/resources/windowsapplications-19-0-12/) instruct users on how to infringe the claims of ’034 Patent. These materials actively coach users to use the ’034 Accused Products in an infringing manner. Indeed, these materials instruct customers to infringe each and every element of at least claim 1 of the ’034 Patent and, on their own, fully support Fortinet's allegations of infringement. By at least the filing of this Amended Complaint, Fortinet disclosed the existence of the ’034 patent and identified at least some of Forescout's and others' activities that infringe the ’034 patent. Thus, based on this disclosure, Forescout had knowledge of the ’034 patent, including claim 1, and that its activities infringe the ’034 patent, including claim 1, since at least the filing of this Amended Complaint. Based on Fortinet's disclosures, Forescout has also 28 known or should have known since at least the filing of this Amended Complaint that its customers, distributors, suppliers, and other purchasers of the ’034 Accused Products are infringing the ’034 patent, including claim 1. 1 2 3 Compl. ¶¶ 93-94 (emphasis added). Fortinet’s inducement allegations with respect to the ’421 4 Patent contain a similar amount of factual detail. See id. ¶¶ 103-04, 108. United States District Court Northern District of California 5 These references to particular instructional materials, inclusion of URLs for those 6 materials, and allegations that Fortinet “disclosed the existence of the [asserted patents]” to 7 Forescout and that the materials “instruct customers to infringe each and every element of at least 8 claim 1 of [each] Patent,” id. ¶ 93, plausibly state a claim for induced infringement. Forescout 9 protests that Fortinet fails to “link[] any specific part of a manual to any specific patent claim 10 infringement allegation.” Reply at 12-13. But that information can be “further detailed in 11 Fortinet’s infringement contentions” as the litigation proceeds. See Opp’n at 21. At present, the 12 Amended Complaint gives Forescout adequate notice of the nature of Fortinet’s inducement 13 claims and the specific instructional materials that Fortinet will use to support those claims, which 14 is all that is required by Rule 8. 15 16 The Court therefore DENIES Forescout’s motion with respect to Fortinet’s claim for induced infringement. 17 2. Contributory Infringement 18 Under § 271(c) of the Patent Act, a plaintiff pleading contributory infringement must show 19 that the defendant sells (or offers to sell) a component of a patent, “knowing the same to be 20 especially made or especially adapted for use in an infringement of such patent, and not a staple 21 article or commodity of commerce suitable for substantial noninfringing use.” 35 U.S.C. § 271(c). 22 The plaintiff must “provide factual underpinnings for its allegations” that the accused products are 23 made or especially adapted for an infringing use and “that there are no substantial noninfringing 24 uses of the accused devices.” Uniloc USA, Inc. v. Logitech, Inc., 2018 WL 6025597, at *3 (N.D. 25 Cal. Nov. 17, 2018). A complaint that “merely paraphrases the contributory infringement statute 26 and presents no factual underpinnings” fails to satisfy Rule 8 and must be dismissed. Google, 2020 27 WL 1478352, at *5. 28 In its previous order, the Court held that Fortinet’s original complaint failed to adequately 29 1 plead contributory infringement. The complaint contained only a single paragraph, repeated for 2 each asserted patent, that simply “parrot[ed]” the contributory infringement statute. See Order at 3 24. While the Court allowed that these statements could suggest that the accused products are 4 “especially made or especially adapted for an infringing use,” the statements failed to “allege facts 5 establishing that Forescout’s products are not suitable for a substantial non-infringing use.” Id. at 6 24-25. The Court thus granted Forescout’s motion to dismiss with leave to amend. Id. at 25. 7 Forescout observes that Fortinet’s Amended Complaint still “includes only a single . . . 8 paragraph alleging contributory infringement,” repeated five times for each asserted patent and 9 with the name of Forescout’s accused product substituted accordingly. The relevant paragraph 10 United States District Court Northern District of California 11 reads: 19 On information and belief, Forescout further contributes to the infringement of one or more claims of the ’314 patent under 35 U.S.C. § 271(c) by offering to sell, selling, and/or importing into the United States a component of the ’314 Accused Products, or a material or apparatus for use in practicing a process claimed in the ’314 patent, that constitutes a material part of the invention, knowing the same to be especially made or especially adapted for use in an infringement of the ’314 patent, including claim 1, and is not a staple article or commodity of commerce suitable for substantial noninfringing use. The Forescout CounterACT software as sold by Forescout includes software components (e.g., the Guest Management Portal) which are programmed to be used to infringe the methods for delegating limited admin control through the use of sets of profiles and templates. These software components, sold as part of CounterACT, are especially made for an infringing use, and have no substantial noninfringing use other than to practice the claimed methods. 20 Compl. ¶ 50 (emphasis added); see also id. ¶¶ 65, 80, 95, 110. The paragraph’s first sentence is a 21 verbatim repetition of the sentence that comprised the entirety of the contributory-infringement 22 allegation in the original complaint. The second and third sentences (italicized above) have been 23 newly added to the Amended Complaint. 12 13 14 15 16 17 18 24 The issue, therefore, is whether Fortinet’s new allegation that each accused product 25 “includes software components . . . which are programmed to be used to infringe the [patented] 26 methods” suffices to state a claim for contributory infringement. Forescout argues that the 27 statement “at most relates to the first prong of the contributory infringement test, i.e., that ‘the 28 accused products are made or are especially adapted for an infringing use.’” Mot. at 21. But, 30 United States District Court Northern District of California 1 Forescout contends, the statement “contains no ‘factual underpinnings’ for any allegation ‘that 2 there are no substantial noninfringing uses of the accused products,’” which was the basis for the 3 Court’s dismissal of Fortinet’s earlier contributory infringement claims. Id. (quoting Order at 24). 4 Fortinet responds by comparing its new allegation to those that have been found sufficient 5 to state a claim for contributory infringement in this District and elsewhere. In Software Research, 6 this Court found the allegation that an accused product, “when used in its normal and intended 7 usage . . . , infringes” adequate to show “that there are no other substantial uses of” the accused 8 product “that do not infringe.” Opp’n at 18 (quoting Software Rsch., 316 F. Supp. 3d at 1136). 9 Similarly, in Firstface the court held the allegation that accused products were “specifically 10 programmed and/or configured to implement” the asserted patents sufficient for pleading 11 contributory infringement. Id. at 19 (quoting Firstface, 2019 WL 1102374 at *2). And in 12 PanOptis Patent Management LLC v. BlackBerry Corp., the court found the allegation that 13 accused products were “installed and configured” by the defendant “to practice the patented 14 operations and structures” adequate for showing that the products had no substantial non- 15 infringing uses. See id. (discussing PanOptis, 2017 WL 780885, at *5 (E.D. Tex. Feb. 10, 2017)). 16 Fortinet thus concludes that while a “plaintiff must ‘plead facts that allow an inference that the 17 components sold or offered for sale have no substantial non-infringing uses’ in order to state a 18 contributory infringement claim,” id. at 20 (quoting In re Bill of Lading, 681 F.3d at 1337) 19 (emphasis added), a plaintiff need not “prove that the accused products have no substantial non- 20 infringing uses at the pleading stage,” id. at 18 (quoting Software Research, 316 F. Supp. 3d at 21 1136) (emphasis added). 22 While the issue is a close one, the Court finds the Amended Complaint’s allegations 23 sufficient. Under Twombly and Iqbal, a complaint must allege facts sufficient to make the 24 plaintiff’s entitlement to relief plausible (rather than probable, on the one hand, or merely 25 possible, on the other). See, e.g., Iqbal, 556 U.S. at 678. The new allegations state a plausible 26 claim that the accused products are “made or especially adapted” for an infringing use and that 27 they lack any “substantial noninfringing use.” See 35 U.S.C. § 271(c). The Amended Complaint 28 expressly states that Forescout’s products “are especially made for an infringing use, and have no 31 1 substantial noninfringing use other than to practice the claimed methods.” See, e.g., Compl. ¶ 50. 2 It also identifies the specific “component” of each accused product that is alleged to infringe 3 Fortinet’s patents. See id. Admittedly, some degree of conclusory pleading is inherent where a 4 plaintiff seeks to “prove a negative,” i.e., that an accused product is incapable of a substantial non- 5 infringing use. See Hearing Tr. at 42. But the allegations that Forescout’s software components 6 are “programmed . . . to infringe,” Compl. ¶ 50, are sufficient to “allow an inference that the 7 components . . . have no substantial non-infringing uses.” See In re Bill of Lading, 681 F.3d at 8 1337 (emphasis added). The Court therefore DENIES Forescout’s motion with respect to Fortinet’s contributory 9 United States District Court Northern District of California 10 infringement claim. 11 3. Willful Infringement 12 Section 284 of the Patent Act directs courts to award a prevailing claimant “damages 13 adequate to compensate for the infringement” and “may increase the damages up to three times the 14 amount found or assessed.” 35 U.S.C. § 284. The Supreme Court has held that while district 15 courts should “take into account the particular circumstances of each case in deciding whether to 16 award [enhanced] damages,” “such punishment should generally be reserved for egregious cases 17 typified by willful misconduct.” See Halo Elecs., Inc. v. Pulse Elecs., Inc., 136 S. Ct. 1923, 1934 18 (2016). Enhanced damages, that is, “are not to be meted out in a typical infringement case, but are 19 instead designed as a ‘punitive’ or ‘vindictive’ sanction for egregious infringement behavior,” i.e., 20 behavior that is “willful, wanton, malicious, bad-faith, deliberate, consciously wrongful, flagrant, 21 or . . . characteristic of a pirate.” Id. at 1932. “Since Halo, courts in this District have required 22 willful infringement claims to show both knowledge of the . . . [p]atents and egregious’ conduct in 23 order to survive a motion to dismiss.” Google, 2020 WL 1478352, at *2 (emphasis in original) 24 (internal quotation omitted). A defendant’s culpability for egregious conduct “is generally 25 measured against the knowledge of the actor at the time of the challenged conduct.” Halo, 136 S. 26 Ct. at 1933 (emphasis added). “The subjective willfulness of a patent infringer,” therefore, “may 27 warrant enhanced damages, without regard to whether his infringement was objectively reckless.” 28 Id. 32 United States District Court Northern District of California 1 In its prior order, the Court ruled that Fortinet’s original complaint failed to offer “factual 2 allegations supporting [the theory] that Forescout has engaged in ‘egregious conduct.’” Order at 3 25. Fortinet’s previous willful infringement claim was pled in a single paragraph (repeated for 4 each asserted patent), which stated that “Forescout [has] act[ed] recklessly and continues to 5 willfully, wantonly, and deliberately engage in acts of infringement of the’ asserted patents.” Id. 6 at 26 (quoting Docket No. 1 ¶ 9). The Court analogized Fortinet’s allegations to those in Finjan, 7 Inc. v. Cisco Systems, Inc., 2017 WL 2462423, at *12-15 (N.D. Cal. June 7, 2017), and Google v. 8 Princeps, supra, where courts held that “conclusory allegations of knowledge and infringement 9 could not satisfy” Halo’s egregious-conduct requirement. See Order at 26-27. While the original 10 complaint established that “Forescout had knowledge of its infringement once the complaint was 11 filed,” it failed to establish that Forescout had engaged in “egregious” misconduct. Id. at 27. 12 In its Amended Complaint, Fortinet again seeks “increased damages under 35 U.S.C. 13 § 284.” See, e.g., Compl. ¶¶ 57. The pleading again includes a single allegation of willful 14 infringement, repeated almost verbatim for each of the asserted patents, which reads: 15 16 17 18 19 20 21 Despite outreach from Fortinet seeking to inform Forescout of its infringement of Fortinet patents and discuss potential remedies, Forescout refused to participate with [sic] any discussion with Fortinet for months, while continuing to infringe by selling the Accused Products and services. This refusal to received [sic] information related to its infringement constitutes egregious conduct by Forescout and willful blindness to its own infringement, making this an exceptional case and justifying an award to Fortinet of increased damages under 35 U.S.C. § 284 . . . . Compl. ¶ 57 (emphasis added); see also id. at ¶¶ 72, 87, 102, 117. Forescout argues that Fortinet “has not identified any new factual allegation that would 22 support a willful infringement claim; it is simply parroting the exact same willfulness claim that 23 the Court already dismissed.” Mot. at 24. In response, Fortinet emphasizes that the Amended 24 Complaint’s “willfulness allegations are based not simply on continued infringement following 25 notice of the asserted patents, but rather on [Forescout’s] refusal to participate in discussions 26 regarding its infringement,” and that the allegations are sufficient to sustain a willfulness claim. 27 Opp’n at 22 (citing TC Tech. LLC v. Spring Corp., 2019 WL 529678, at *3 (D. Del. Feb. 11, 28 2019). The TC Technology court allowed a willful infringement claim to proceed where, inter 33 1 alia, the defendant allegedly “received a patent offering from plaintiff prior to litigation and ‘made 2 no effort to design around [the patent] . . . or negotiate a license with [plaintiff.]’” Id. at 22-23 3 (quoting TC Tech., 2019 WL 529678, at *3). Fortinet also argues that its allegations are sufficient 4 to plead Forescout’s willful blindness (which may suffice to state a claim for willful infringement) 5 because they plausibly show that Forescout took “deliberate actions to avoid confirming a high 6 probability of wrongdoing.” Id. (quoting Glob.-Tech, 563 U.S. at 769). Fortinet’s arguments regarding both traditional willful infringement and willful blindness United States District Court Northern District of California 7 8 are unavailing. The Amended Complaint alleges the following facts: (1) that in late February 9 2020 “Fortinet attempted to initiate licensing discussions with Forescout”; (2) that “Fortinet 10 continued [to] make substantial attempts to engage with Forescout, including [via] 11 correspondence,” from March to May of 2020; (3) that Forescout “delayed progressing the 12 discussions” during this period; (4) that “Forescout has refused to have its internal business 13 employees discuss this matter with business representative of Fortinet,” instead making available 14 “Forescout’s outside counsel” for an important phone call on April 24, 2020; and (5) that 15 “Forescout still has not indicated a willingness” to license the contested patents. See Compl. 16 ¶¶ 10-12. While the Amended Complaint thus contains statements to the effect that Forescout 17 declined to engage in serious licensing negotiations during the early months of 2020, its account is 18 far more redolent of a run-of-the-mill patent dispute than the “egregious infringement behavior” 19 that the Supreme Court has identified as meriting enhanced damages for infringement.8 See Halo, 20 136 S. Ct. at 1932. 21 In particular, Fortinet’s generalized allegations that Forescout “delayed progressing 22 [licensing] discussions” in early 2020 do not plausibly show that Forescout knew its conduct to be 23 egregious, i.e., “wanton, malicious, [or] bad-faith.” See id. Nor do they establish willful 24 blindness, which requires that Forescout “subjectively believe[d] that there [was] a high 25 26 27 28 Fortinet’s allegation that Forescout has permitted only its legal representatives, rather than “internal business employees,” to discuss a licensing agreement, for example, falls short of the mark, as “[r]etaining counsel is not ‘egregious conduct’” within the meaning of Halo. See Mot. at 25; see also Halo, 136 S. Ct. at 132 (describing “egregious infringement behavior” as, e.g., “consciously wrongful, flagrant, or . . . characteristic of a pirate”). 34 8 1 probability that” it was infringing Fortinet’s asserted patents. See Reply at 14-15 (quoting Global- 2 Tech Appliances, 563 U.S. at 769). In this respect, Fortinet’s allegations are far less probative of 3 subjective willfulness than those in TC Technology, the case on which Fortinet most heavily relies. 4 There, the court found that the plaintiff adequately pled willful blindness where it alleged that the 5 defendant, inter alia, “did not conduct a patent search,” “had an in-house counsel policy of not 6 reviewing patent sale offerings,” and “received a patent offering” from the plaintiff “six months 7 before launching its [allegedly infringing] services.” 2017 WL 529678 at *3 (emphasis added). 8 Fortinet’s allegations here simply do not show culpable knowledge of likely infringement, as they 9 plausibly did in TC Technology. United States District Court Northern District of California 10 The Court therefore GRANTS Forescout’s motion to dismiss Fortinet’s claims for willful 11 infringement. Because Fortinet was previously given leave to amend and failed to add new factual 12 allegations to its complaint, the Court denies Fortinet further leave to amend. See, e.g., Bonin v. 13 Calderon, 59 F.3d 815, 845 (9th Cir. 1995) (stating that “a district court does not abuse its 14 discretion in denying a motion to amend where the movant presents no new facts . . . and provides 15 no satisfactory explanation for his failure to fully develop his contentions”). 16 V. CONCLUSION 17 For the reasons given above, the Court DENIES Forescout’s motion to dismiss Fortinet’s 18 Amended Complaint on the grounds that the ’034 and ’421 Patents claim ineligible subject matter 19 under 35 U.S.C. § 101. The Court also DENIES Forescout’s motion with respect to Fortinet’s 20 claims for induced and contributory infringement. The Court GRANTS the motion with respect 21 to Fortinet’s willful infringement claims without further leave to amend. 22 This order disposes of Docket No. 71. 23 24 IT IS SO ORDERED. 25 26 27 28 Dated: June 14, 2021 ______________________________________ EDWARD M. CHEN United States District Judge 35

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.