Risk
5/14/2013
01:05 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

AirTight Networks' Patent Upheld Over Aerohive Networks' Re-Exam Challenge

USPTO examiner determined that Aerohive did not raise a substantial new question of patentability

Mountain View, CA -- May 14, 2013 -- AirTight Networks announces that the United States Patent and Trademark Office ("USPTO") denied Aerohive Networks' request to re-examine AirTight's Marker Packet&trade patent (U.S. Patent No. 7,339,914). The USPTO examiner determined that Aerohive did not raise a substantial new question of patentability, thus reaffirming the validity of the AirTight patent over Aerohive's contention.

Aerohive filed its re-examination request to delay AirTight Networks' patent infringement suit against Aerohive, which AirTight filed only after AirTight's sincere efforts to settle this matter amicably failed. After AirTight filed the patent infringement suit to address Aerohive's past and ongoing infringement, Aerohive filed a request with the USPTO to re-examine AirTight's patent on February 15, 2013 (Application No. 90/012,797.) In the decision issued on May 9, 2013, the USPTO summarily rejected Aerohive's contentions and upheld AirTight's patent in its entirety. (Decision dated 05/09/2013 in re: application No. 90/012,797)

Patent re-examination is typically the step that an accused infringer attempts in order to see if the patent can be invalidated and to escape liabilities for infringement. AirTight is confident that any such attempts, now or in future, will be proven futile and eventually Aerohive will be required to compensate AirTight for damages to its business suffered as a result of this patent infringement.

AirTight continues to pursue a leadership strategy in the intellectual property and patent arena and invests enormous resources in R&D to invent and build its unique products. AirTight's innovations are implemented in AirTight Wi-Fi Access and Wireless Intrusion Prevention products for the benefit of its customers. Patents are AirTight's way of ensuring that the technologies that AirTight develops are not copied by others and sold to their customers.

In 2009, Aerohive and AirTight entered into a partnership agreement that was intended to give Aerohive's customers access to AirTight's patented and highly acclaimed wireless intrusion prevention system (WIPS). However, AirTight alleges that Aerohive instead mis-appropriated AirTight's patented technology and incorporated it into its own products, including Hive AP's.

About AirTight Networks

AirTight Networks is a global provider of secure Wi-Fi solutions that combine its patented and industry-leading wireless intrusion prevention system (WIPS) technology with the next generation cloud-managed, controller-less Wi-Fi architecture. This unified approach allows enterprises for the first time to benefit from Wi-Fi access while concurrently protecting their networks 24/7 from wireless threats at no additional cost. AirTight's customers include global enterprises across virtually all industries and range from those who overlay AirTight WIPS&trade on top of other WLAN solutions, to those who leverage the AirTight Cloud Services&trade to rollout and manage AirTight Wi-Fi&trade, WIPS, and regulatory compliance (e.g., PCI) across tens of thousands of locations from a single console. AirTight owns the seminal patents for wireless intrusion prevention technology with 29 U.S. and international patents granted, and more than 20 additional patents pending. For more information, please visit: www.airtightnetworks.com. Follow on Twitter @Airtight.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3154
Published: 2014-04-17
DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file conte...

CVE-2013-2143
Published: 2014-04-17
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

CVE-2014-0036
Published: 2014-04-17
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.

CVE-2014-0054
Published: 2014-04-17
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External ...

CVE-2014-0071
Published: 2014-04-17
PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

Best of the Web