Risk
5/14/2013
01:05 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

AirTight Networks' Patent Upheld Over Aerohive Networks' Re-Exam Challenge

USPTO examiner determined that Aerohive did not raise a substantial new question of patentability

Mountain View, CA -- May 14, 2013 -- AirTight Networks announces that the United States Patent and Trademark Office ("USPTO") denied Aerohive Networks' request to re-examine AirTight's Marker Packet&trade patent (U.S. Patent No. 7,339,914). The USPTO examiner determined that Aerohive did not raise a substantial new question of patentability, thus reaffirming the validity of the AirTight patent over Aerohive's contention.

Aerohive filed its re-examination request to delay AirTight Networks' patent infringement suit against Aerohive, which AirTight filed only after AirTight's sincere efforts to settle this matter amicably failed. After AirTight filed the patent infringement suit to address Aerohive's past and ongoing infringement, Aerohive filed a request with the USPTO to re-examine AirTight's patent on February 15, 2013 (Application No. 90/012,797.) In the decision issued on May 9, 2013, the USPTO summarily rejected Aerohive's contentions and upheld AirTight's patent in its entirety. (Decision dated 05/09/2013 in re: application No. 90/012,797)

Patent re-examination is typically the step that an accused infringer attempts in order to see if the patent can be invalidated and to escape liabilities for infringement. AirTight is confident that any such attempts, now or in future, will be proven futile and eventually Aerohive will be required to compensate AirTight for damages to its business suffered as a result of this patent infringement.

AirTight continues to pursue a leadership strategy in the intellectual property and patent arena and invests enormous resources in R&D to invent and build its unique products. AirTight's innovations are implemented in AirTight Wi-Fi Access and Wireless Intrusion Prevention products for the benefit of its customers. Patents are AirTight's way of ensuring that the technologies that AirTight develops are not copied by others and sold to their customers.

In 2009, Aerohive and AirTight entered into a partnership agreement that was intended to give Aerohive's customers access to AirTight's patented and highly acclaimed wireless intrusion prevention system (WIPS). However, AirTight alleges that Aerohive instead mis-appropriated AirTight's patented technology and incorporated it into its own products, including Hive AP's.

About AirTight Networks

AirTight Networks is a global provider of secure Wi-Fi solutions that combine its patented and industry-leading wireless intrusion prevention system (WIPS) technology with the next generation cloud-managed, controller-less Wi-Fi architecture. This unified approach allows enterprises for the first time to benefit from Wi-Fi access while concurrently protecting their networks 24/7 from wireless threats at no additional cost. AirTight's customers include global enterprises across virtually all industries and range from those who overlay AirTight WIPS&trade on top of other WLAN solutions, to those who leverage the AirTight Cloud Services&trade to rollout and manage AirTight Wi-Fi&trade, WIPS, and regulatory compliance (e.g., PCI) across tens of thousands of locations from a single console. AirTight owns the seminal patents for wireless intrusion prevention technology with 29 U.S. and international patents granted, and more than 20 additional patents pending. For more information, please visit: www.airtightnetworks.com. Follow on Twitter @Airtight.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.