One of the changes with the R80 Management Platform was to avoid customers from modifying the default objects created by Check Point. R80 Security Management (and later versions) protect this by placing these objects in a database segment which is read-only by all users (including super-users).
In case a user has modified some of the default objects that were created by Check Point, the upgrade mechanism renames that modified object by adding an underscore. And the result is that the user will find two objects with similar properties - one is read-only, and one has an underscore and can be modified by the user.
The most noticeable example has been the services which were created by Check Point. Any modification in the advanced settings, comments etc. is identified during the upgrade to R80 or R80.10 and causes the duplication.
Hope this helps.