Risk
5/14/2013
01:05 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

AirTight Networks' Patent Upheld Over Aerohive Networks' Re-Exam Challenge

USPTO examiner determined that Aerohive did not raise a substantial new question of patentability

Mountain View, CA -- May 14, 2013 -- AirTight Networks announces that the United States Patent and Trademark Office ("USPTO") denied Aerohive Networks' request to re-examine AirTight's Marker Packet&trade patent (U.S. Patent No. 7,339,914). The USPTO examiner determined that Aerohive did not raise a substantial new question of patentability, thus reaffirming the validity of the AirTight patent over Aerohive's contention.

Aerohive filed its re-examination request to delay AirTight Networks' patent infringement suit against Aerohive, which AirTight filed only after AirTight's sincere efforts to settle this matter amicably failed. After AirTight filed the patent infringement suit to address Aerohive's past and ongoing infringement, Aerohive filed a request with the USPTO to re-examine AirTight's patent on February 15, 2013 (Application No. 90/012,797.) In the decision issued on May 9, 2013, the USPTO summarily rejected Aerohive's contentions and upheld AirTight's patent in its entirety. (Decision dated 05/09/2013 in re: application No. 90/012,797)

Patent re-examination is typically the step that an accused infringer attempts in order to see if the patent can be invalidated and to escape liabilities for infringement. AirTight is confident that any such attempts, now or in future, will be proven futile and eventually Aerohive will be required to compensate AirTight for damages to its business suffered as a result of this patent infringement.

AirTight continues to pursue a leadership strategy in the intellectual property and patent arena and invests enormous resources in R&D to invent and build its unique products. AirTight's innovations are implemented in AirTight Wi-Fi Access and Wireless Intrusion Prevention products for the benefit of its customers. Patents are AirTight's way of ensuring that the technologies that AirTight develops are not copied by others and sold to their customers.

In 2009, Aerohive and AirTight entered into a partnership agreement that was intended to give Aerohive's customers access to AirTight's patented and highly acclaimed wireless intrusion prevention system (WIPS). However, AirTight alleges that Aerohive instead mis-appropriated AirTight's patented technology and incorporated it into its own products, including Hive AP's.

About AirTight Networks

AirTight Networks is a global provider of secure Wi-Fi solutions that combine its patented and industry-leading wireless intrusion prevention system (WIPS) technology with the next generation cloud-managed, controller-less Wi-Fi architecture. This unified approach allows enterprises for the first time to benefit from Wi-Fi access while concurrently protecting their networks 24/7 from wireless threats at no additional cost. AirTight's customers include global enterprises across virtually all industries and range from those who overlay AirTight WIPS&trade on top of other WLAN solutions, to those who leverage the AirTight Cloud Services&trade to rollout and manage AirTight Wi-Fi&trade, WIPS, and regulatory compliance (e.g., PCI) across tens of thousands of locations from a single console. AirTight owns the seminal patents for wireless intrusion prevention technology with 29 U.S. and international patents granted, and more than 20 additional patents pending. For more information, please visit: www.airtightnetworks.com. Follow on Twitter @Airtight.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3594
Published: 2014-08-22
Cross-site scripting (XSS) vulnerability in the Host Aggregates interface in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-3 allows remote administrators to inject arbitrary web script or HTML via a new host aggregate name.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.