EXPERT WITNESS

Isolating the Value of Patented Intrusion Detection Heuristics in Enterprise Security Software

Network Security Patent Litigation | Technical Apportionment Analysis

Key Facts

Matter Type:
Patent Infringement — Federal District Court
Technology Domain:
Network Intrusion Detection & Prevention Systems (IDPS)
Role:
Technical Expert Witness for Patent Holder (Plaintiff)
Scope of Work:
Technical Apportionment, Feature Isolation, Comparable Licensing Analysis
Outcome:
Settled favorably following Daubert challenge defense

Background & Challenge

Our client held three patents covering novel heuristic-based behavioral anomaly detection algorithms — a breakthrough methodology that analyzed packet metadata and traffic patterns to identify zero-day threats without reliance on signature databases. The accused product, a widely deployed enterprise network security platform, had incorporated these detection heuristics alongside a broader suite of firewall management, VPN administration, policy orchestration, and threat intelligence feed capabilities.

The central challenge for the damages calculation was precise apportionment: of the hundreds of product features comprising the accused platform, only a subset were alleged to infringe. The defense argued aggressively that the patented functionality contributed negligible value to the overall product and that customers purchased the platform for unrelated features. Secure Anchor was retained to conduct a rigorous technical apportionment analysis to establish the proportionate value of the accused heuristic engine within the whole.

Methodology

Secure Anchor's technical team applied a multi-layered apportionment framework developed through years of litigation support engagements:

•     Performed comprehensive feature decomposition of the accused platform, cataloguing 47 discrete functional modules through source code review, product documentation analysis, and controlled technical testing

•     Applied a modified Smallest Salable Patent-Practicing Unit (SSPPU) analysis, isolating the behavioral detection engine as the primary infringing component and establishing its standalone technical boundaries

•     Conducted structured technical interviews with the defendant's own marketing and engineering documentation to identify customer-facing value propositions attributed to the heuristic module

•     Developed a weighted contribution matrix mapping product features to customer purchasing drivers, using survey data, competitive product comparisons, and customer testimonials obtained through discovery

•     Performed comparative source code analysis to quantify lines of code, algorithmic complexity, and performance contribution of accused heuristics versus non-accused modules —establishing a technically defensible numeric baseline

•     Collaborated with the economic damages expert to translate technical apportionment percentages into royalty base calculations, ensuring alignment between technical findings and financial methodology

Technical apportionment is not arithmetic — it demands a forensic understanding of architecture, customer value drivers, andt he precise boundaries of what was invented. Our methodology ensures every percentage we assign can be defended line by line.

Findings & Results

Secure Anchor determined that the patented heuristic detection functionality was attributable to 34% of the technical value of the accused security module — and that the security module itself represented 61% of the platform's overall customer value proposition, based on documented feature attribution and customer purchasing analysis.

This two-tier apportionment analysis provided the economic expert with a robust technical foundation tocalculate a properly apportioned royalty base. The analysis withstood a vigorous Daubert challenge motion in which the defense argued the methodology was unreliable — the court denied the motion, affirming that Secure Anchor's structured, documented approach met the standards of scientific reliability required for expert testimony.

34%
Technical Apportionment
Value attributed to accused heuristic module
61%
Platform Value
Security module's contribution to overall product value
Denied
Platform Value
Court affirmed methodology's scientific reliability

Key Takeaways

Secure Anchor determined that the patented heuristic detection functionality was attributable to 34% of the technical value of the accused security module — and that the security module itself represented 61% of the platform's overall customer value proposition, based on documented feature attribution and customer purchasing analysis.

This two-tier apportionment analysis provided the economic expert with a robust technical foundation tocalculate a properly apportioned royalty base. The analysis withstood a vigorous Daubert challenge motion in which the defense argued the methodology was unreliable — the court denied the motion, affirming that Secure Anchor's structured, documented approach met the standards of scientific reliability required for expert testimony.

Want to work with Secure Anchor?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.