A jury found Blue Coat Systems, Inc. ("Blue Coat") liable for infringement of four patents owned by Finjan, Inc. ("Finjan") and awarded approximately $39.5 million in reasonable royalty damages. After trial, the district court concluded that the '844 patent was patent-eligible under 35 U.S.C. § 101 and denied Blue Coat's post-trial motions for judgment as a matter of law ("JMOL") and a new trial. Blue Coat appeals.
We find no error in the district court's subject matter eligibility determination as to the '844 patent and agree that substantial evidence supports the jury's finding of infringement of the '844 and '731 patents. However, we conclude that Blue Coat was entitled to JMOL of non-infringement for the '968 patent because the accused products do not perform the claimed "policy index" limitation. On appeal, Blue Coat does not challenge the verdict of infringement for the '633 patent.
With respect to damages, we affirm the award with respect to the '731 and '633 patents. We vacate the damages award for the '968 patent, as there was no infringement. With respect to the '844 patent, we agree with Blue Coat that Finjan failed to apportion damages to the infringing functionality and that the $8-per-user royalty rate was unsupported by substantial evidence.
We therefore affirm-in-part, reverse-in-part, and remand to the district court for further consideration of the damages issue as to the '844 patent.
BACKGROUND
On August 28, 2013, Finjan brought suit against Blue Coat in the Northern District of California for infringement of patents owned by Finjan and directed to identifying and protecting against malware. Four of those patents are at issue on appeal. Claims 1, 7, 11, 14, and 41 of U.S. Patent No. 6,154,844 ("the '844 patent") recite a system and method for providing computer security by attaching a security profile to a downloadable. Claims 1 and 17 of U.S. Patent No. 7,418,731 ("the '731 patent") recite a system and method for providing computer security at a network gateway by comparing security profiles associated with requested files to the security policies of requesting users. Claim 1 of U.S. Patent No. 6,965,968 ("the '968 patent") recites a "policy-based cache manager" that indicates the allowability of cached files under a plurality of user security policies. Claim 14 of U.S Patent No. 7,647,633 ("the '633 patent") relates to a system and method for using "mobile code runtime monitoring" to protect against malicious downloadables.
After a trial, the jury found that Blue Coat infringed these four patents and awarded Finjan approximately $39.5 million for Blue Coat's infringement: $24 million for the '844 patent, $6 million for the '731 patent, $7.75 million for the '968 patent, and $1,666,700 for the '633 patent. After a bench trial, the district court concluded that the '844 patent is directed to patent-eligible subject matter under 35 U.S.C. § 101.
Thereafter, the district court denied Blue Coat's motions for judgment as a matter of law and a new trial, concluding that Finjan had provided substantial evidence to support each finding of infringement and the damages award. Blue Coat appeals the district court's rulings on subject matter eligibility of the '844 patent; infringement of the '844, '731, and '968 patents; and damages for the '844, '731,- '968, and '633 patents. We have jurisdiction pursuant to 28 U.S.C. § 1295(a)(1).
DISCUSSION
I. Subject Matter Eligibility of the '844 Patent
We first address subject matter eligibility with respect to the '844 patent. We review the district court's decision de novo. McRO, Inc. v. Bandai Namco Games Am. Inc., 837 F.3d 1299, 1311 (Fed. Cir. 2016).
Section 101 provides that a patent may be obtained for "any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof." 35 U.S.C. § 101. The Supreme Court has long recognized, however, that § 101 implicitly excludes "laws of nature, natural phenomena, and abstract ideas" from the realm of patent-eligible subject matter, as monopolization of these "basic tools of scientific and technological work" would stifle the very innovation that the patent system aims to promote. Alice Corp. v. CLS Bank Int'l, ___ U.S. ___, 134 S.Ct. 2347, 2354, 189 L.Ed.2d 296 (2014) (quoting Ass'n for Molecular Pathology v. Myriad Genetics, Inc., 569 U.S. 576, 133 S.Ct. 2107, 2116, 186 L.Ed.2d 124 (2013)); see also Mayo Collaborative Servs. v. Prometheus Labs., Inc., 566 U.S. 66, 132 S.Ct. 1289, 1294-97, 182 L.Ed.2d 321 (2012); Diamond v. Diehr, 450 U.S. 175, 185, 101 S.Ct. 1048, 67 L.Ed.2d 155 (1981).
The Supreme Court has instructed us to use a two-step framework to "distinguish[ ] patents that claim laws of nature, natural phenomena, and abstract ideas from those that claim patent-eligible applications of those concepts." Alice, 134 S.Ct. at 2355. At the first step, we determine whether the claims at issue are "directed to" a patent-ineligible concept. Id. If they are, we then "consider the elements of each claim both individually and `as an ordered combination' to determine whether the additional elements `transform the nature of the claim' into a patent-eligible application." Id. (quoting Mayo, 132 S.Ct. at 1298). This is the search for an "inventive concept" — something sufficient to ensure that the claim amounts to "significantly more" than the abstract idea itself. Id. (quoting Mayo, 132 S.Ct. at 1294).
Starting at step one, we must first examine the '844 patent's "claimed advance" to determine whether the claims are directed to an abstract idea. Affinity Labs of Tex., LLC v. DIRECTV, LLC, 838 F.3d 1253, 1257 (Fed. Cir. 2016). In cases involving software innovations, this inquiry often turns on whether the claims focus on "the specific asserted improvement in computer capabilities ... or, instead, on a process that qualifies as an `abstract idea' for which computers are invoked merely as a tool." Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1335-36 (Fed. Cir. 2016).
The '844 patent is directed to a method of providing computer security by scanning a downloadable and attaching the results of that scan to the downloadable itself in the form of a "security profile." Claim 1 of the '844 patent, which the district court found representative for § 101 purposes, reads:
'844 patent, col. 11 ll. 11-21. At claim construction, the parties agreed that "Downloadable" should be construed to mean "an executable application program, which is downloaded from a source computer and run on the destination computer."
We determined in Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307, 1319 (Fed. Cir. 2016), that "[b]y itself, virus screening is well-known and constitutes an abstract idea." We also found that performing the virus scan on an intermediary computer — so as to ensure that files are scanned before they can reach a user's computer — is a "perfectly conventional" approach and is also abstract. Id. at 1321. Here the claimed method does a good deal more.
Claim 1 of the '844 patent scans a downloadable and attaches the virus scan results to the downloadable in the form of a newly generated file: a "security profile that identifies suspicious code in the received Downloadable." The district court's claim construction decision emphasizes that this "identif[y] suspicious code" limitation can only be satisfied if the security profile includes "details about the suspicious code in the received downloadable, such as ... `all potentially hostile or suspicious code operations that may be attempted by the Downloadable.'" Finjan, Inc. v. Blue Coat Sys., Inc., No. 13-CV-03999-BLF, 2014 WL 5361976, at *9 (N.D. Cal. Oct. 20, 2014). The security profile must include the information about potentially hostile operations produced by a "behavior-based" virus scan. This operation is distinguished from traditional, "code-matching" virus scans that are limited to recognizing the presence of previously-identified viruses, typically by comparing the code in a downloadable to a database of known suspicious code. The question, then, is whether this behavior-based virus scan in the '844 patent constitutes an improvement in computer functionality. We think it does.
The "behavior-based" approach to virus scanning was pioneered by Finjan and is disclosed in the '844 patent's specification. In contrast to traditional "code-matching" systems, which simply look for the presence of known viruses, "behavior-based" scans can analyze a downloadable's code and determine whether it performs potentially dangerous or unwanted operations — such as renaming or deleting files. Because security profiles communicate the granular information about potentially suspicious code made available by behavior-based scans, they can be used to protect against previously unknown viruses as well as "obfuscated code" — known viruses that have been cosmetically modified to avoid detection by code-matching virus scans.
The security profile approach also enables more flexible and nuanced virus filtering. After an inspector generates a security profile for a downloadable, a user's computer can determine whether to access that downloadable by reviewing its security profile according to the rules in whatever "security policy" is associated with the user. Administrators can easily tailor access by applying different security policies to different users or types of users. And having the security profile include information about particular potential threats enables administrators to craft security policies with highly granular rules and to alter those security policies in response to evolving threats.
Our cases confirm that software-based innovations can make "non-abstract improvements to computer technology" and be deemed patent-eligible subject matter at step 1. Enfish, 822 F.3d at 1335-36. In Enfish, for instance, the court determined that claims related to a database architecture that used a new, self-referential logical
Similarly, the method of claim 1 employs a new kind of file that enables a computer security system to do things it could not do before. The security profile approach allows access to be tailored for different users and ensures that threats are identified before a file reaches a user's computer. The fact that the security profile "identifies suspicious code" allows the system to accumulate and utilize newly available, behavior-based information about potential threats. The asserted claims are therefore directed to a non-abstract improvement in computer functionality, rather than the abstract idea of computer security writ large.
Even accepting that the claims are directed to a new idea, Blue Coat argues that they remain abstract because they do not sufficiently describe how to implement that idea. To support this argument, Blue Coat points to Apple, Inc. v. Ameranth, Inc., where we invalidated claims related to a computer system that can generate a second menu from a first menu based on a selection of items on the first menu. 842 F.3d 1229, 1240-41 (Fed. Cir. 2016). In that case, we held that the patents were directed to an abstract idea because they "d[id] not claim a particular way of programming or designing the software ... but instead merely claim the resulting systems." Id. at 1241. Blue Coat also relies on Affinity Labs, where we held that a claim related to wirelessly communicating regional broadcast content to an out-of-region recipient was abstract and patent ineligible because there was nothing in the claim "directed to how to implement [the idea]. Rather, the claim is drawn to the idea itself." 838 F.3d at 1258. And Blue Coat also notes that, in Intellectual Ventures, we found claims directed to email filtering to be abstract and patent ineligible when there is "no restriction on how the result is accomplished ... [and] [t]he mechanism ... is not described." 838 F.3d 1307, 1316 (Fed. Cir. 2016) (quoting Internet Patents Corp. v. Active Network, Inc., 790 F.3d 1343, 1348 (Fed. Cir. 2015)).
Apple, Affinity Labs, and other similar cases hearken back to a foundational patent law principle: that a result, even an innovative result, is not itself patentable. See Corning v. Burden, 56 U.S. 15 How. 252, 268, 14 S.Ct. 683 (1853) (explaining that patents are granted "for the discovery or invention of some practicable method or means of producing a beneficial result or effect ... and not for the result or effect itself"); O'Reilly v. Morse, 56 U.S. 15 How. 62, 112-113, 14 S.Ct. 601 (1853) (invalidating a claim that purported to cover all uses of electromagnetism for which "the result is the making or printing intelligible characters, signs, or letters at a distance" as "too broad, and not warranted by law").
Here, the claims recite more than a mere result. Instead, they recite specific steps — generating a security profile that identifies suspicious code and linking it to a downloadable — that accomplish the desired result. Moreover, there is no contention that the only thing disclosed is the
II. Infringement
At trial, the jury found that Blue Coat's products infringed the '844, '731, and '968 patents. The district court denied Blue Coat's post-trial motions for judgment as a matter of law and a new trial, finding that Finjan had provided substantial evidence to support each finding of infringement and that the jury verdict was not against the weight of the evidence. We review denials of motions for JMOL de novo and motions for new trial for abuse of discretion. Revolution Eyewear, Inc. v. Aspex Eyewear, Inc., 563 F.3d 1358, 1370-71 (Fed. Cir. 2009).
A. '844 Patent
Blue Coat first argues that the district court should have granted JMOL of non-infringement as to the asserted claims in the '844 patent because substantial evidence did not support the jury verdict. Specifically, Blue Coat contends that the asserted claims, requiring linking a security profile to a downloadable "before a web server makes the Downloadable available to web clients," can only be infringed by a server-side product that evaluates content before it is published to the Internet in the first place. Blue Coat's product, WebPulse, is a cloud-based service that provides information about downloadables to a customer's network gateway in order to help the network gateway determine whether a particular downloadable can be accessed by a specific end user. Because WebPulse only evaluates downloadables that are already publicly available on the Internet, Blue Coat argues that it does not infringe.
Blue Coat made no request for a claim construction that would require linking the security profile to the downloadable before the downloadable is placed on the Internet. Blue Coat cannot raise the claim construction issue for the first time in post-trial motions: "it is too late at the JMOL stage to argue for or adopt a new and more detailed interpretation of the claim language and test the jury verdict by that new and more detailed interpretation." Hewlett-Packard Co. v. Mustek Sys., Inc., 340 F.3d 1314, 1321 (Fed. Cir. 2003). Under such circumstances, "the question for the trial court is limited to whether substantial evidence supports the jury's verdict under the issued construction." Wi-Lan, Inc. v. Apple, Inc., 811 F.3d 455, 465 (Fed. Cir. 2016). Here, the claim, as construed by the district court, requires "linking by the inspector the first Downloadable security profile to the Downloadable before [a/the] non-network gateway web server make[s] the Downloadable available to web clients." '844 patent, col. 11 ll. 18-20; J.A. 25. The jury was instructed to apply this construction.
It was reasonable for the jury to interpret "web clients" in this context to refer to the specific web clients protected by the claimed system. Likewise, the limitation requiring that linking occur before a downloadable is "ma[de] ... available to web clients" could reasonably be understood to require that linking occur at some point before users are permitted to access that downloadable — but not necessarily before the downloadable is made available on the Internet. Blue Coat concedes that, at the time a security profile is linked, the "particular web client cannot yet
B. '731 Patent
We next consider Blue Coat's claim that it was entitled to JMOL of non-infringement as to the asserted claims of the '731 patent. The '731 patent is directed to a computer gateway that protects a private intranet from malicious software embedded in webpages on the public Internet.
Blue Coat argues that the '731 patent was not infringed as a matter of law because the "security profiles" created by the accused product do not contain the requisite "list of computer commands." Because Blue Coat did not request a construction of the "list of commands" term, we apply the ordinary meaning. We find that substantial evidence supports the jury's finding of infringement.
At trial, Finjan presented evidence demonstrating that the accused product creates a new file called "cookie2" each time it scans an incoming file for potential malware. Cookie2 comprises a set of fields, each field representing various characteristics about the downloadable file. Fields 78-80 of Cookie2 represent certain commands and show whether those commands — such as eval(), unescape(), and document.write() — appear in the incoming file. In fields 78-80, an integer represents the number of times each command appears. Finjan's expert, Dr. Mitzenmacher, testified that the data contained in fields 78-80 "is clearly a list of computer commands." J.A. 40383.
Blue Coat argues that this is not enough and that the "list of commands" limitation cannot be satisfied by "an
C. '968 Patent
Blue Coat also argues that it was entitled to JMOL of non-infringement with respect to the '968 patent because Finjan failed to introduce substantial evidence that the accused products implement the claimed "policy index." We agree.
The '968 patent is directed to a "policy-based" cache manager that can efficiently manage cached content according to a plurality of security policies. The patentee agrees that a "policy" is a rule or set of rules that determines whether a piece of content can be accessed by a user. Different policies can apply to different users, and the decision of whether to let a user access content is made by comparing the content's security profile with the policy governing the user's access. Thus, the policy based cache manager in the '968 patent is a data structure that keeps track of whether content is permitted under various policies. Claim 1, the sole asserted claim, is reproduced below, with key language underlined:
'968 patent col. 9 ll. 47-62. At claim construction, the parties stipulated that "policy index" means "a data structure indicating allowability of cached content relative to a plurality of policies." The jury was instructed to apply this construction. Once again, we test the jury's infringement verdict based on this claim language and claim construction. Hewlett-Packard Co., 340 F.3d at 1320-21.
Trial testimony demonstrated that the accused product, Proxy SG, is a gateway between an intranet of computers and the Internet at large. Every time a user requests a file, Proxy SG will analyze that file and determine whether access is permitted under the user's security policy. As Proxy SG evaluates a file, it can cache the results of individual rules within a policy and use that information to speed up the process of making an ultimate policy decision. Early in its analysis, for instance, Proxy SG can check the "category" of the file and then determine whether the user's policy has any rules related to the "category" field. Proxy SG can then store "the evaluations of the parts of the rules that deal with this category field.... So you don't have to reevaluate those conditions again." J.A. 40327-28. As Finjan's expert expressly acknowledged, however, Proxy
At summary judgment, the district court agreed that this claim language requires the policy index to store final allowability determinations and noted that "Defendant's argument would likely prevail if all policies consist of multiple rules or conditions." Finjan, Inc. v. Blue Coat Sys., Inc., No. 13-CV-03999-BLF, 2015 WL 3630000, at *9 (N.D. Cal. June 2, 2015). The court nevertheless declined to grant summary judgement because "the '968 patent specifically provides that a policy can be just one rule." Id. If Proxy SG saved the results of applying each rule that makes up a one-rule policy, it would be saving final allowability determinations for a plurality of policies and thus infringing. The district court therefore gave Finjan the opportunity to prove at trial that "the Proxy SG policy cache contains a number of condition evaluations, each of which is determinative of whether a file is allowable relative to one of a plurality of single condition policies." Id.
At trial, Finjan made no such showing. There was no evidence indicating that the condition determinations stored by Proxy SG are final allowability decisions for users governed by single-rule policies. Indeed, Finjan's expert acknowledged that Proxy SG never saves final allowability determinations and must instead re-evaluate the allowability of content each time it is requested. It is therefore clear that the jury's infringement verdict was not supported by substantial evidence.
Because Finjan failed to present evidence that the accused product ever stores final allowability determinations, Blue Coat was entitled to JMOL of non-infringement.
III. Damages
We now turn to Blue Coat's damages arguments with respect to the '844, '731, and '633 patents. The starting point is 35 U.S.C. § 284, which limits damages to those "adequate to compensate for the infringement." Two categories of compensation for infringement are the patentee's lost profits and the "reasonable royalty he would have received through arms-length bargaining." Lucent Techs., Inc. v. Gateway, Inc., 580 F.3d 1301, 1324 (Fed. Cir. 2009).
The only measure of damages at issue in this case is a reasonable royalty, which "seeks to compensate the patentee ... for its lost opportunity to obtain a reasonable royalty that the infringer would have been willing to pay if it had been barred from infringing." AstraZeneca AB v. Apotex Corp., 782 F.3d 1324, 1334 (Fed. Cir. 2015) (citing Lucent Techs., 580 F.3d at 1325).
A. '844 Patent
Blue Coat first argues that, in calculating a royalty base, Finjan failed to apportion damages to the infringing functionality. We agree.
When the accused technology does not make up the whole of the accused product, apportionment is required. "[T]he ultimate combination of royalty base and royalty rate must reflect the value attributable to the infringing features of the product, and no more." Ericsson, Inc. v. D-Link Sys., Inc., 773 F.3d 1201, 1226 (Fed. Cir. 2014); see also Mentor Graphics v. EVE-USA, 870 F.3d 1298, 1299 (Fed.
WebPulse, the infringing product, is a cloud-based system that associates URLs with over eighty different categories, including pornography, gambling, shopping, social networking, and "suspicious" — which is a category meant to identify potential malware. WebPulse is not sold by itself. Rather, other Blue Coat products, like Proxy SG, use WebPulse's category information to make allowability determinations about URLs that end users are trying to access.
DRTR, which stands for "dynamic real-time rating engine," is the part of WebPulse responsible for analyzing URLs that have not already been categorized. DRTR performs both infringing and non-infringing functions. When a user requests access to a URL that is not already in the WebPulse database — a brand new website, for instance — DRTR will analyze the content, assign a category or categories, and collect metadata about the site for further use. As part of that analysis, DRTR will examine the URL for malicious or suspicious code, create a kind of "security profile" highlighting that information, and then "attach" the security profile to the given URL. This infringes the '844 patent. But the DRTR analysis also evaluates whether the URL fits into categories ranging from pornography to news. These additional categories are unrelated to DRTR's malware identification function but are still valuable for companies trying to, say, prevent employees from using social media while on the job. DRTR also collects metadata about the URL for Blue Coat's later use. In other words, all of the infringing functionality occurs in DRTR, but some DRTR functions infringe and some do not.
At trial, Finjan attempted to tie the royalty base to the incremental value of the infringement by multiplying WebPulse's total number of users by the percentage of web traffic that passes through DRTR, the WebPulse component that performs the infringing method. DRTR processes roughly 4% of WebPulse's total web requests, so Finjan established a royalty base by multiplying the 75 million worldwide WebPulse users by 4%. Although DRTR also performs the non-infringing functions described above, Finjan did not perform any further apportionment on the royalty base.
Finjan argues that apportionment to DRTR is adequate because DRTR is the "smallest, identifiable technical component" tied to the footprint of the invention. Appellee Br. 49-50. This argument, which draws from this court's precedent regarding apportionment to the "smallest salable patent-practicing unit" of an infringing product, does not help Finjan. The smallest salable unit principle directs that "in any case involving multi-component products, patentees may not calculate damages based on sales of the entire product, as opposed to the smallest salable patent-practicing unit, without showing that the
Finjan further defends its apportionment methodology by asserting that it demonstrated that "many of these other categories were unimportant." Appellee Br. 51. But the claimed unimportance of particular categories (e.g. "Macy's and shopping") does not speak to the overall importance of identifying categories unrelated to malware. Malware detection is undoubtedly an important driver of DRTR's (and WebPulse's) value. At trial, for instance, Dr. Layne-Farrar pointed to an internal Blue Coat email stating that "[t]oday the main value of [WebFilter and WebPulse] centers around zero-day malware protection." J.A. 40571. She also referenced a 2012 public-facing document entitled "Five reasons to choose Blue Coat," which gave "negative-day defense: stop malware at the source" as reason number two. J.A. 40572-73. But it is evident that Blue Coat's customers also value WebPulse's ability to identify and filter other categories of content. A Blue Coat whitepaper discussed at trial prominently advertises the fact that WebPulse provides "the granular category control that businesses need to implement acceptable Internet use policies." J.A. 53136. And Finjan's expert used an example about a company that wanted to bar access to certain sites categorized as "gambling." "Whether `viewed as valuable, important, or even essential,' the patented feature must be separated." VirnetX, 767 F.3d at 1329 (quoting LaserDynamics, 694 F.3d at 68).
Because DRTR is itself a multi-component software engine that includes non-infringing features, the percentage of web traffic handled by DRTR is not a proxy for the incremental value of the patented technology to WebPulse as a whole. Further apportionment was required to reflect the value of the patented technology compared to the value of the unpatented elements.
Blue Coat also identifies a second error in Finjan's reasonable royalty calculation. To arrive at a lump sum reasonable royalty payment for infringement of the '844 patent, Finjan simply multiplied the royalty base by an $8-per-user royalty rate. Blue Coat contends that there is no basis for the $8-per-user rate.
We agree with Blue Coat that the $8-per-user royalty rate employed in Finjan's analysis was unsupported by substantial evidence. There is no evidence that Finjan ever actually used or proposed an $8-per-user fee in any comparable license or negotiation. Rather, the $8-per-user fee is based on testimony from Finjan's Vice President of IP Licensing, Ivan Chaperot, that the current "starting point" in licensing negotiations is an "8 to 16 percent royalty rate or something that is consistent with that ... like $8 per user fee." J.A. 40409. Mr. Chaperot further testified that the 8-16% figure was based on a 2008
While any reasonable royalty analysis "necessarily involves an element of approximation and uncertainty, a trier of fact must have some factual basis for a determination of a reasonable royalty." Unisplay, S.A. v. Am. Elec. Sign Co., 69 F.3d 512, 517 (Fed. Cir. 1995). Mr. Chaperot's testimony that an $8-per-user fee is "consistent with" the 8-16% royalty rate established in Secure Computing is insufficient. There is no evidence to support Mr. Chaperot's conclusory statement that an 8-16% royalty rate would correspond to an $8-per-user fee, and Finjan fails to adequately tie the facts of Secure Computing to the facts in this case. See LaserDynamics, 694 F.3d at 79 ("[A]lleging a loose or vague comparability between different technologies or licenses does not suffice.").
Secure Computing did not involve the '844 patent, and there is no evidence showing that the patents that were at issue are economically or technologically comparable. Finjan's evidence on this point is limited to the fact that that the infringing products in Secure Computing were also in the computer security field and that Secure Computing was a competitor of Blue Coat in 2008. This surface similarity is far too general to be the basis for a reasonable royalty calculation. In any case, Mr. Chaperot's testimony that an 8-16% royalty rate would be the current starting point in licensing negotiations says little about what the parties would have proposed or agreed to in a hypothetical arm's length negotiation in 2008. And Finjan's evidence of a $14-34 software user fee is not indicative of how much the parties would have paid to license a patent. See Uniloc USA, Inc. v. Microsoft Corp., 632 F.3d 1292, 1317 (Fed. Cir. 2011) ("[T]here must be a basis in fact to associate the royalty rates used in prior licenses to the particular hypothetical negotiation at issue in the case."). In short, the $8-per-user fee appears to have been plucked from thin air and, as such, cannot be the basis for a reasonable royalty calculation.
While it is clear that Finjan failed to present a damages case that can support the jury's verdict, reversal of JMOL could result in a situation in which Finjan receives no compensation for Blue Coat's infringement of the '844 patent. Ordinarily, "the district court must award damages in an amount no less than a reasonable royalty" when infringement is found, Dow Chem. Co. v. Mee Indus., Inc., 341 F.3d 1370, 1381 (Fed. Cir. 2003); see Riles v. Shell Expl. & Prod. Co., 298 F.3d 1302, 1313 (Fed. Cir. 2002), unless the patent holder has waived the right to damages based on alternate theories, Promega Corp. v. Life Tech. Corp., No. 2013-1011, slip op. at 15, 875 F.3d 651 (Fed. Cir. 2017). We therefore remand to the district court to determine whether Finjan has waived the right to establish reasonable royalty damages under a new theory and whether to order a new trial on damages.
B. '731 and '633 Patents
For the '731 and '633 patents, Finjan's expert did apportion the revenues comprising the royalty base between infringing and non-infringing functionality of Proxy SG. Blue Coat argues that the apportionment was insufficient. We disagree.
Finjan's expert, Dr. Layne-Farrar, based her apportionment analysis for the '731 and '633 patents on an architectural diagram prepared by Blue Coat. The diagram is entitled "Secure Web Gateway: Functions" and shows twenty-four boxes representing different parts of the Secure
Blue Coat argues that there was no evidence to support Dr. Layne-Farrar's assumption that each box represents a "function" and that each function should be treated as equally valuable. But at trial, Dr. Layne-Farrar testified that her assumption was based on Blue Coat's own diagram, which is entitled "Secure Web Gateway: Functions", as well as her discussions with Mr. Medovic, a Finjan technical expert who explained the use of architectural diagrams and identified certain components within the diagram that did and did not infringe. Dr. Layne-Farrar also testified that she relied on the deposition of a Blue Coat engineer, in which the engineer stated that the diagram in question represents the full scope of Secure Web Gateway functionality. Based on this evidence, Dr. Layne-Farrar based her analysis on the twenty-four "functions" identified in the Blue Coat diagram and considered each function equally valuable.
Blue Coat notes that Dr. Layne-Farrar's conclusions conflict with testimony from Mr. Shoenfeld, Blue Coat's Senior VP of Products, stating that each box in the diagram can "have many, many things behind [it] ... so there's no equal weighing of these [boxes]...." See J.A. 40756. But the existence of conflicting testimony does not mean the damages award is unsupported by substantial evidence. The jury was entitled to believe the patentee's expert. The jury's damages awards for infringement of the '731 and '633 patents were based on substantial evidence.
CONCLUSION
For the foregoing reasons, we reverse the denial of JMOL of non-infringement with respect to the '968 patent and remand to the district court to determine the issue of damages with respect to the '844 patent. We affirm in all other respects.
COSTS
Each party shall bear its own costs.
FootNotes
'731 patent, col. 11 ll. 35-55.
Comment
User Comments