throbber
2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
` UNITED STATES PATENT AND TRADEMARK OFFICE
` BEFORE THE PATENT TRIAL AND APPEAL BOARD
` Patent No. 8,661,498
`
`&
`
`ZSCALER, INC.
` Petitioner,
` vs. IPR2017-01342
`SYMANTEC CORPORATION,
` Patent Owner.
`________________________________/
`
` ---oOo---
`VIDEOTAPED DEPOSITION OF DR. BJORN MARKUS JAKOBSSON
` Friday, January 26, 2018
` ---oOo---
`
`Reported by:
`LORRIE L. MARCHANT, RMR, CRR, CCRR, CBC
`CSR No. 10523
`Job No. 124415
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!2!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’
`
` INDEX
` INDEX OF EXAMINATION
` EXAMINATION BY PAGE
` MR. RICH 6
` ---oOo---
` INDEX OF PREVIOUSLY MARKED EXHIBITS
` EXHIBIT DESCRIPTION PAGE
` Exhibit 1003 Declaration of Dr. Markus 30
` Jakobsson in Support of Petition
` for Inter Partes Review of U.S.
` Patent No. 8,661,498
` Exhibit 1001 U.S. Patent No. 8,661,498 B2 37
` Exhibit 1008 U.S. Patent No. 7,681,032 B2 37
` Exhibit 2005 Decision Institution of Inter 51
` Partes Review
` Exhibit 2006 Excerpted pages from book 119
` entitled "Phishing and
` Countermeasures"
` Exhibit 1012 Document entitled "Identifying 144
` and Filtering Near-Duplicate
` Documents"
`
` ---oOo---
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!3!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`(
`
` BE IT REMEMBERED that on Friday, January
`26, 2018, commencing at the hour of 7:58 a.m.,
`thereof, at Keker, Van Nest & Peters, LLP, 633
`Battery Street, San Francisco California, before me,
`LORRIE L. MARCHANT, CSR, RPR, CRR, CRP, CLR, a
`Certified Shorthand Reporter for the State of
`California, personally appeared
` DR. BJORN MARKUS JAKOBSSON,
`called as a witness by the Patent Owner herein, who,
`being by me first duly sworn/affirmed, was thereupon
`examined and testified as hereinafter set forth.
` ---oOo---
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!4!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
` A P P E A R A N C E S
`
`)
`
`Appearing as counsel on behalf of Petitioner:
` KEKER, VAN NEST & PETERS, LLP
` BY: LEO LAM, ESQ.
` JUSTINA K. SESSIONS, ESQ.
` 633 Battery Street
` San Francisco, CA 94111
` Phone: (415) 391-5400
` e-mail: llam@keker.com
` jsessions@keker.com
`
`Appearing as counsel on behalf of Patent Owner:
` BAKER BOTTS, LLP
` BY: HARRISON RICH, ESQ.
` CHAD C. WALTERS, ESQ.
` 2001 Ross Avenue
` Dallas, TX 75201
` Phone: (214) 953-6511
` e-mail: harris.rich@bakerbotts.com
` chad.walters@bakerbotts.com
`
`Also present:
` Erik Parker, Videographer
` ---oOo---
`
`#
`
`$ %
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!5!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`*
`
` SAN FRANCISCO, CALIFORNIA
` FRIDAY, JANUARY 26, 2018
` 7:58 A.M.
` THE VIDEOGRAPHER: Good morning, everyone.
`Here begins Media No. 1 of the videotaped deposition
`of Dr. Marcus Jakobsson, in the matter of Zscaler,
`Inc., versus Symantec Corporation, et al., being
`held at Keker, Van Nest & Peters, 633 Battery
`Street, San Francisco, California 94111.
` Today's date is January 26th, 2018, and the
`time is approximately 7:58 a.m.
` Would counsel please identify yourselves
`and your affiliations.
` MR. LAM: Leo Lam and Justina Sessions from
`Keker, Van Nest & Peters for Petitioner, Zscaler.
` MR. RICH: Harrison Rich and Chad Walters
`of Baker Botts for patent owner, Symantec
`Corporation.
` THE VIDEOGRAPHER: My name is Erik Parker,
`and I'm the videographer, here with our court
`reporter, Lorrie Marchant.
` Would the reporter please swear in the
`witness.
`///
`///
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!6!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`+
`
` DR. BJORN MARKUS JAKOBSSON,
` FIRST DULY SWORN/AFFIRMED, TESTIFIED AS FOLLOWS:
` EXAMINATION BY MR. RICH
` BY MR. RICH:
` Q. Good morning.
` A. Good morning.
` Q. Will you please state your name.
` A. Bjorn Markus Jakobsson.
` Q. And where do you live, sir?
` A. Portola Valley, California.
` Q. And what do you do for a living?
` A. I'm chief scientist at a company called
`Agari.
` Q. What does Agari do?
` A. Agari does e-mail security.
` Q. What do you mean by "e-mail security"?
` A. Agari has two products. One is a product
`that detects and blocks what is called spoofed
`e-mails. The second product is a product that
`detects and blocks targeted e-mail attacks.
` Q. Do you have any other jobs?
` A. I occasionally consult.
` Q. What type of consulting?
` A. Patent litigation consulting.
` Q. How many patent litigation cases have you
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!7!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`,
`
`worked on?
` A. All in all?
` Q. Yeah.
` A. Maybe 20.
` Q. 20.
` And what percentage of your income comes
`from the litigation consulting?
` A. About 10 percent.
` Q. How many cases are you working on right
`now?
` A. This is the only active case right now.
` Q. Of the 20 cases that you've consulted on,
`how many cases have dealt with Internet security?
` A. The majority of them.
` Q. Have any of the cases dealt with data
`leakage?
` A. Yes.
` Q. What case or cases?
` A. There's at least one case in which data
`leakage was considered. And that is actually a case
`also involving Symantec, where I represented
`Symantec.
` Q. Do you remember the name of the case?
` A. I remember the parties in the case. It was
`Columbia University and Symantec.
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!8!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`-
`
` Q. How long ago was that?
` A. On the order of two years ago.
` Q. And was that a district court case?
` A. I can't recall.
` Q. Or was it an IPR?
` A. No, not an IPR.
` Q. So it was a district court case?
` A. I think so.
` Q. But it -- maybe your terminology is the
`issue with district court.
` Was it a litigation, or was it an IPR?
` A. It was not an IPR.
` Q. So it was a litigation?
` A. Yes.
` Q. Was Symantec the patentee there?
` A. Would you repeat your question, please?
` Q. Was Symantec the patent owner in that case?
` A. No.
` Q. They were being sued for patent
`infringement?
` A. I don't remember the details of the case.
` Q. And it was two years ago?
` A. Approximately.
` Q. So you know that Symantec was not the
`patent owner?
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!9!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`.
`
` A. It was a case that I believe involved
`patents, but I'm not certain whether it was a patent
`litigation case. I think it was -- the case
`involved a conflict over the previous engagement
`between Columbia University and Symantec.
` Q. Did you render an opinion on patent
`infringement?
` A. I believe I did, yes.
` Q. As part of that opinion, did you study
`Symantec's product?
` A. No. I'm sorry. I need to back off.
` I did not render an opinion regarding
`patent infringement, and I did not study Symantec's
`product. I studied what Columbia was doing. I was
`representing Symantec.
` Q. And why did you study what Columbia was
`doing if Symantec was not the patent owner?
` A. I do not remember the details of the case.
` Q. Have you ever been deposed before?
` A. Yes, I have.
` Q. How many times?
` A. On the order of ten.
` Q. And you understand you took an oath to tell
`the truth today?
` A. Yes.
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!;!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`&%
`
` Q. You understand that there's a court
`reporter here typing up the questions I'm asking and
`the answers you're giving?
` A. I do.
` Q. And you understand you'll have an
`opportunity to review the transcript and make any
`corrections that you want to make?
` A. Yes.
` Q. Is there any reason you can't give your
`best, most honest testimony today?
` A. No.
` Q. How many times have you rendered an expert
`opinion in a patent case?
` A. On the order of 15 times.
` Q. And of those 15 times, how many of those
`times were on behalf of the patent holder?
` A. Pretty much half of them.
` Q. Of the times that you weren't rendering an
`opinion on behalf of the patent holder, did you ever
`render an opinion that the patent was valid?
` A. Not that I can recall.
` Q. So every time you were representing -- or
`let me rephrase.
` Every time you were rendering an opinion
`for the defense, your opinion was that the patent
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!21!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`&&
`
`was invalid?
` A. When you say "defense," do you mean --
` Q. The nonpatentee.
` A. I carefully screen cases before I agree to
`be involved. So I only take cases that I believe
`I'm going to represent the party that is right. So
`I go to great pains to avoid situations where I
`wouldn't agree with the party I represent.
` Q. So every time that you were offering an
`opinion on behalf of the nonpatent holder, you found
`that the patent was invalid?
` A. I was not always considering validity of
`the patent. Sometimes I would consider
`infringement.
` Q. Every time that you were considering
`validity of the patent from the perspective of the
`nonpatent holder, you found that the patent was
`nonvalued -- invalid?
` A. I can't recall with certainty. If there
`was a disagreement with the party I represented, I
`would tell them early on that I would not feel
`comfortable rendering an opinion that they would
`want to hear.
` Q. You were retained by the nonpatent holder
`here?
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!22!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`&’
`
` A. I was retained by Zscaler here.
` Q. Have you ever testified in a district
`court?
` A. Yes.
` Q. Is this the first IPR you've worked on?
` A. No.
` Q. How many IPRs have you worked on?
` A. Approximately five.
` Q. Were any of those IPRs in the Internet
`security space?
` A. Yes.
` Q. And do you remember the -- the names of
`those cases?
` A. Not the full names.
` Q. Were any of the cases involving Symantec?
` A. Not that I can recall.
` Q. When did Zscaler retain you?
` A. I have an awful memory for dates. I'm
`sorry.
` Q. Was it the year 2017?
` A. Maybe very early 2017.
` Q. Did Zscaler also retain you for the
`district court case?
` A. Yes.
` Q. Are you planning to offer an opinion of
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!23!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`&(
`
`infringement in that case?
` A. I have not been asked to do so yet. But if
`I were to be asked, I would offer an opinion.
` Q. And have you been asked to offer opinion of
`invalidity in that case?
` A. We haven't spoken much about that case.
` Q. Is that "no"?
` A. I don't remember the details. It's been a
`long time since we spoke about the district case.
` Q. So you don't know what you were retained
`for in the district court?
` A. As an expert witness.
` Q. Sitting here today, are you personally
`represented by a lawyer?
` MR. WALTERS: Can we go off the record?
` THE VIDEOGRAPHER: We're going off the
`record. The time is 8:09 a.m.
` (Recess taken, from 8:09 to 8:10.)
` THE VIDEOGRAPHER: We are back on the
`record. The time is 8:11 a.m.
` MR. RICH: Welcome back.
` THE WITNESS: Thank you.
` BY MR. RICH:
` Q. Sitting here today, are you personally
`represented by a lawyer?
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!24!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`&)
`
` A. I do have a personal lawyer.
` Q. Is that Mr. Lam?
` A. No.
` Q. So you're not represented by anybody in
`this room?
` A. No.
` Q. Since you've been retained, how much time
`have you spent on this IPR?
` A. I would need to consult my spreadsheet to
`know for sure.
` Q. Can you estimate the amount of time that
`you spent on this IPR?
` A. Give me a moment.
` My estimate would be between 50 and 100
`hours.
` Q. Okay. And that includes all of your time
`reviewing prior art?
` A. Yes. But it's a rather approximate
`measure.
` Q. It includes all of your time consulting
`with the attorneys?
` A. Yes. But, again, it's a rather approximate
`measure.
` Q. Right. And that estimate includes all of
`your time drafting the declaration?
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!25!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`&*
`
` A. Yes.
` Q. Have you billed all of your time to
`Zscaler?
` A. Not yet.
` Q. What rate are you charging?
` A. 625 per hour.
` Q. Have you charged any other rates during the
`course of this IPR?
` A. To Zscaler?
` Q. Right.
` A. No.
` Q. What did you do to prepare for today's
`deposition?
` A. I met with counsel yesterday and had a
`phone call with counsel the day before yesterday.
`Over the past week, I have been reviewing the
`materials. And I did that last night as well.
` Q. Who did you meet with?
` A. Leo Lam and Tina -- Tina Sessions.
` Q. About how much time each day?
` A. Yesterday we met for three hours and 45
`minutes.
` Q. What about the day before?
` A. The day before was a phone call of a little
`bit more than an hour.
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!26!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`&+
` Q. You mentioned you reviewed materials. What
`materials did you review?
` A. I reviewed my declaration last night.
` Q. Is the declaration the only thing that you
`reviewed to prepare for today's deposition?
` A. No.
` Q. What else did you review?
` A. I reviewed the Court's -- the PTAB's
`decision. Is that -- no, I am using the wrong term
`now.
` Q. Institution decision?
` A. Yes. Thank you.
` I reviewed the appellate patent. And I
`reviewed the '498 patent. I reviewed portions of
`the history. I'm missing a word here.
` Q. The file history of the '498 patent?
` A. Thank you.
` Nothing else comes to mind right now.
` Q. Did you review the petition?
` A. Yes, I did.
` Q. And Zscaler provided its strongest
`arguments in the petition?
` MR. LAM: Objection. Vague.
` MR. RICH: Counsel, that's an improper
`speaking objection.
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!27!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`&,
` THE WITNESS: Would you please explain what
`you mean.
` BY MR. RICH:
` Q. Zscaler provided its best arguments in the
`petition?
` MR. LAM: Objection. Vague.
` THE WITNESS: As opposed to at another
`time?
` MR. RICH: Counsel, that's an improper
`speaking objection in the PTAB.
` THE WITNESS: I'm sorry. Do you mean as
`opposed to at other times or as opposed to Symantec?
` BY MR. RICH:
` Q. Zscaler wouldn't have provided its weakest
`arguments, would it?
` A. In my view, the arguments in the petition
`were strong.
` Q. Did Zscaler withhold its best arguments?
` A. Not to my knowledge.
` MR. LAM: Objection. Vague. Hang on.
`Objection. Vague.
` MR. RICH: Again, the PTAB does not allow
`vagueness objections. Please limit your objections
`to "Objection. Form."
` THE WITNESS: Not to my knowledge.
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!28!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`&-
`
` MR. LAM: Counsel, I disagree.
` BY MR. RICH:
` Q. And you made your strongest arguments in
`the declaration?
` MR. LAM: Objection. Vague.
` THE WITNESS: I'm not so sure how to answer
`the question. I'm sorry.
` BY MR. RICH:
` Q. Did you withhold any arguments from the
`petition?
` A. No, I did not.
` Q. Did you review Symantec's preliminary
`response?
` A. Yes, I did.
` Q. And have you spoken to anybody about this
`IPR other than Zscaler's attorneys?
` A. No. Yes, I have. I'm sorry. I have
`spoken with attorneys for Quinn Emanuel about this,
`because I was working for them, representing
`Symantec in the case referred to before.
` Q. They represent Symantec?
` A. Symantec in the case against Columbia, and
`I spoke to them about this case. I would like to
`say about eight or nine months ago.
` Q. And what were those discussions about?
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!29!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`&.
`
` A. They wished for me not to be engaged in
`this case.
` Q. Did you discuss the substance of the case
`with them?
` A. No, I did not.
` Q. Can you tell me a little bit about your
`education.
` MR. LAM: Can you hold on one second. I
`will admit I was wrong. I shouldn't have said the
`word "vague." I should have just said "form."
` MR. RICH: Thank you, Counsel.
` MR. LAM: So -- but in any event, you
`answered the questions.
` THE WITNESS: Thank you.
` BY MR. RICH:
` Q. Tell us a little bit about your educational
`background after college -- or starting with college
`and on.
` A. I have a master's degree in computer
`engineering. I have a master's degree in computer
`science and engineering. And I have a Ph.D. in
`computer science and engineering. The first one of
`these three is from a Swedish university called Lund
`Institute of Technology. That's L-U-N-D.
` The two latter are from University of
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!2;!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’%
`California, at San Diego. The last degree was from
`1998, or at least 1998 was when I defended my
`thesis.
` Q. Have you also taught college courses?
` A. Yes. Sorry. One correction. I meant to
`say 1997. I think it came out as '98.
` Q. Fair enough.
` A. I have taught college courses, yes.
` Q. Have any of those courses involved data
`leakage technology?
` A. Yes, they have.
` Q. You've also worked for a number of large
`research labs?
` A. That is correct.
` Q. Did any of your research involve data
`leakage?
` A. Yes.
` Q. Can you tell me about -- when that
`occurred?
` Let me rephrase.
` Can you just tell me about the research
`involving data loss.
` A. One form of data is what's referred to as
`PII, personally identifiable information. Detecting
`its leakage, it's important to detect potential
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!31!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’&
`
`fraud. That is something that many organizations
`are concerned with.
` When I was principal scientist at PayPal,
`that was one of the important aspects, to detect
`when PII was being or might be leaked. I am, in my
`current position, involved in detection of messages
`that, whether incoming or outgoing, trigger a
`policy.
` Q. While you were at PayPal, did you develop a
`product that detected data loss?
` A. PayPal does not have products, per se.
` Q. Did you write any code that would have
`detected data loss?
` A. I haven't written code for many years;
`however, I often work with developers who write
`code.
` Q. You also cofounded FatSkunk?
` A. That is correct.
` Q. That was a mobile malware company?
` A. Yes.
` Q. They did antivirus?
` A. Yes.
` Q. So that was scanning for viruses?
` A. Yes.
` Q. And that's -- is that different than data
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!32!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’’
`
`loss?
` A. Yes, it is.
` Q. In what way?
` A. Whereas antivirus technology sometimes use
`similar techniques, from data loss prevention
`techniques, the goal is different.
` The goal of antivirus is to determine
`whether, first of all, a machine is infected or not,
`and, second, whether a piece of information arriving
`at a machine poses a risk to that machine.
` Q. What would be an antivirus scanning
`technique?
` A. Are you referring in general?
` Q. Yeah, just in general.
` A. In general, there are two very common
`techniques. One is referred to as a signature-based
`method, and the other one behavioral.
` Q. What's the signature-based method?
` A. Signature-based method looks for strings
`representing malicious code to determine whether a
`machine has or is receiving something that is of
`high risk.
` Q. What do you mean by "malicious code"?
` A. Such as a virus.
` Q. So you would detect malicious code by
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!33!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’(
`
`scanning for the malicious code?
` MR. LAM: Objection. Form and foundation.
` THE WITNESS: What you would do is you
`would scan, for example, attachments and
`communication to determine whether there's a match
`with a signature or a signature is a representative
`of code that is dangerous.
` BY MR. RICH:
` Q. Code that is dangerous -- let me rephrase.
` What do you mean, "code that is dangerous"?
`You're talking about malicious code?
` A. Yes.
` Q. And that's -- malicious code is something
`different than information that you're trying to
`protect from leaking from an organization?
` A. The underlying methods are closely related
`in the case of the approach that involves
`signatures.
` Q. But the malicious code itself is something
`different than the information that you want to
`protect from leaking?
` A. So when you say "leaking," do you mean
`leaving the organization, or do you mean leaving or
`entering the organization?
` Q. When I'm talking about "leaking," I'm
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!34!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’)
`talking about sensitive information that may -- you
`want to protect.
` So sensitive information that you want to
`protect from leaving an organization is different
`than malicious code.
` A. So there would be two clear similarities.
`One is that you wish to disrupt the transmission of
`the data, whether this is sensitive information or
`code. And the other one is that the methods are
`commonly related based on the principles they're
`using.
` The goals, though, are very different. And
`the adversarial model, as it's often referred to, is
`different.
` Q. I'm not wondering about the methodology.
`I'm just asking is malicious code different than
`sensitive information that you want to protect?
` A. It's different in the adversarial model and
`the goals, but it's similar in terms of the
`technical approach often taken to contain it and
`identify it.
` Q. So my question is just is the malicious
`code something different than sensitive information,
`not whether the methods or the models are similar.
` A. I need to know in what sense you mean
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!35!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’*
`
`"different." Because there are both similarities
`and differences, and it depends on which one you're
`asking me about.
` Q. In the context of antivirus scanning,
`malicious code is something different than sensitive
`information you want to protect?
` A. Yes. But the methods are related to each
`other for achieving the goal you're referring to.
` Q. Did FatSkunk do data loss prevention?
` MR. LAM: What was that word?
` MR. RICH: We were talking about FatSkunk
`earlier. I'll reask the question.
` BY MR. RICH:
` Q. Did your company, FatSkunk, do data loss
`prevention?
` A. Not directly. But indirectly, yes. Let me
`qualify that. Data can be lost when a device has
`been corrupted. By "corrupted," I mean running
`malicious code. You often wish to make sure that
`data isn't lost by first making sure that the device
`isn't running malicious code.
` One of the goals of FatSkunk was to perform
`such determination before any sensitive information
`was accessed and could be leaked; however,
`FatSkunk's technology was not directly addressing
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!36!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’+
`data leak prevention but was only directly effecting
`the detection of malicious code.
` Q. So what you're saying is that they were
`looking for malicious code, and that malicious code
`could be used to steal sensitive information?
` A. That would be one of the reasons why it
`would be produced.
` Q. Okay. So you were -- at FatSkunk, they
`were scanning for the malicious code, but that
`wasn't scanning for, you know, the sensitive
`information itself?
` A. We actually did not scan for malicious
`code. We tried to identify its absence. "Scanning
`for" means to look for its presence.
` Q. So you looked for its absence?
` A. Yes.
` Q. And did that involve scanning for anything?
` A. Yes.
` Q. You have a lot of patents, don't you?
` A. Do you mean where I'm inventor?
` Q. Yes.
` A. Yes.
` Q. Over 100; is that right?
` A. Yes.
` Q. Do any of your patents involve data loss
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!37!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’,
`
`prevention?
` A. When you say "involve," do you mean
`associated with or that the subject matter by itself
`is data loss prevention?
` Q. Do any of your patents in any way relate to
`data loss?
` A. Many relate to the detection of malicious
`code or a machine that is not in a pure
`unadulterated state. That is a desirable condition
`for accessing sensitive data. And, therefore, being
`able to determine that a device is secure in this
`regard and then allow it access to data is
`indirectly relating to data loss prevention, but not
`directly.
` Q. So some of the patents may look for
`malicious code is what you're saying?
` MR. LAM: Objection. Form.
` THE WITNESS: No. They look for the
`absence of malicious code, to put it somewhat
`simplified.
` BY MR. RICH:
` Q. Have you ever drafted patent claims?
` A. Yes, I have.
` Q. How many times have you drafted patent
`claims?
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!38!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’-
`
` A. At least 20 times.
` Q. Have you ever drafted a patent
`specification?
` A. Yes.
` Q. How many times?
` A. At least 50 times.
` Q. Do you know what an office action is?
` A. Yes.
` Q. Have you ever drafted a response to an
`office action?
` A. Yes.
` Q. How many times?
` A. By drafting the office action, do you mean
`provide arguments or to complete the writing of it?
` Q. Both.
` A. I've never completed the writing of it.
`But I have often provided the technical insights
`that were used by the patent attorney I worked with
`to finalize the office action -- response to the
`office action. I'm sorry.
` Q. You've given speeches at the patent office?
` A. Yes, I have.
` Q. What did you talk about?
` A. Internet security in general.
`Authentication. I believe I covered malware. This
`
`#
`
`$
`
`%
`
`&
`
`’
`
`(
`
`)
`
`*
`
`+
`
`#"
`
`##
`
`#$
`
`#%
`
`#&
`
`#’
`
`#(
`
`#)
`
`#*
`
`#+
`
`$"
`
`$#
`
`$$
`
`$%
`
`$&
`
`$’
`
`1?5 48<0/8 23=<?5@5<; ?3>B513?
`.,’#,&.#*%%%
`
`U[OCPVGE!GZJKDKV!3119
`\UECNGT!x/!U[OCPVGE-!KRT3128.12453
`Rcig!39!qh!346
`
`

`

`2>$ 06<>; 9/>7A? 6/7<0??<;
`6CDFCEG ’+" ’%&-
`
`’.
`
`was many years ago. Digital signatures.
` Q. So were you educating the patent office on
`technology or --
` A. Yes. I was asked to come there and speak
`about topics that they had a hard time keeping up
`with the growth and in which they had lost
`examiners.
` Q. Do you think any of your patents are
`invalid?
` A. I would not know that.
` By the way, do you, by my patents, refer to
`patents where I'm the inventor?
` Q. Right.
` A. Most of

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket