Isolating the Value of Patented Intrusion Detection Heuristics in Enterprise Security Software
Network Security Patent Litigation | Technical Apportionment Analysis
%201.png)
Key Facts
Background & Challenge
Our client held three patents covering novel heuristic-based behavioral anomaly detection algorithms — a breakthrough methodology that analyzed packet metadata and traffic patterns to identify zero-day threats without reliance on signature databases. The accused product, a widely deployed enterprise network security platform, had incorporated these detection heuristics alongside a broader suite of firewall management, VPN administration, policy orchestration, and threat intelligence feed capabilities.
The central challenge for the damages calculation was precise apportionment: of the hundreds of product features comprising the accused platform, only a subset were alleged to infringe. The defense argued aggressively that the patented functionality contributed negligible value to the overall product and that customers purchased the platform for unrelated features. Secure Anchor was retained to conduct a rigorous technical apportionment analysis to establish the proportionate value of the accused heuristic engine within the whole.
Methodology
Secure Anchor's technical team applied a multi-layered apportionment framework developed through years of litigation support engagements:
• Performed comprehensive feature decomposition of the accused platform, cataloguing 47 discrete functional modules through source code review, product documentation analysis, and controlled technical testing
• Applied a modified Smallest Salable Patent-Practicing Unit (SSPPU) analysis, isolating the behavioral detection engine as the primary infringing component and establishing its standalone technical boundaries
• Conducted structured technical interviews with the defendant's own marketing and engineering documentation to identify customer-facing value propositions attributed to the heuristic module
• Developed a weighted contribution matrix mapping product features to customer purchasing drivers, using survey data, competitive product comparisons, and customer testimonials obtained through discovery
• Performed comparative source code analysis to quantify lines of code, algorithmic complexity, and performance contribution of accused heuristics versus non-accused modules —establishing a technically defensible numeric baseline
• Collaborated with the economic damages expert to translate technical apportionment percentages into royalty base calculations, ensuring alignment between technical findings and financial methodology
Technical apportionment is not arithmetic — it demands a forensic understanding of architecture, customer value drivers, andt he precise boundaries of what was invented. Our methodology ensures every percentage we assign can be defended line by line.
Findings & Results
Secure Anchor determined that the patented heuristic detection functionality was attributable to 34% of the technical value of the accused security module — and that the security module itself represented 61% of the platform's overall customer value proposition, based on documented feature attribution and customer purchasing analysis.
This two-tier apportionment analysis provided the economic expert with a robust technical foundation tocalculate a properly apportioned royalty base. The analysis withstood a vigorous Daubert challenge motion in which the defense argued the methodology was unreliable — the court denied the motion, affirming that Secure Anchor's structured, documented approach met the standards of scientific reliability required for expert testimony.
Key Takeaways
Secure Anchor determined that the patented heuristic detection functionality was attributable to 34% of the technical value of the accused security module — and that the security module itself represented 61% of the platform's overall customer value proposition, based on documented feature attribution and customer purchasing analysis.
This two-tier apportionment analysis provided the economic expert with a robust technical foundation tocalculate a properly apportioned royalty base. The analysis withstood a vigorous Daubert challenge motion in which the defense argued the methodology was unreliable — the court denied the motion, affirming that Secure Anchor's structured, documented approach met the standards of scientific reliability required for expert testimony.