Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:25 PM
Dark Reading
Dark Reading
Products and Releases

Protegrity Announces An Update In Patent Infringement Lawsuit Against Voltage Security

United States Patent and Trademark Office confirms validity of one of Protegrity’s database encryption patents

STAMFORD, CONN., August 9, 2011 – Protegrity Corporation announced an update in the pending patent infringement lawsuits it previously filed against Voltage Security, Inc., Ingrian Networks (now Safenet) and nuBridges, Inc. (see press release: http://bit.ly/ouWUj9).

In three separate lawsuits, Protegrity sued Voltage, Ingrian/Safenet and nuBridges for infringing Protegrity’s U.S. Patent 6,321,201 (’201 Patent). As an attempt to invalidate the ‘201 Patent, Voltage Security requested the United States Patent and Trademark Office (USPTO) reexamine the ‘201 Patent on December 1, 2010. Voltage based its Reexamination Request on specific prior art references that Voltage claimed should have prevented issuance of the ‘201 Patent in the first place.

In the Reexamination, Protegrity voluntarily submitted to the USPTO all of the other 180 prior art references identified by Voltage, Ingrian/Safenet or nuBridges in the patent litigation as purportedly invalidating the ‘201 Patent. Protegrity argued to the USPTO that all the claims of the ‘201 Patent asserted by Protegrity in the litigation against Voltage, Ingrian/Safenet and nuBridges, as well as 36 newly submitted claims, were patentable over all of the prior art references.

On July 5, 2011, the USPTO, after carefully reviewing all of the prior art references, confirmed the patentability of the asserted patent claims as well as the 36 new claims, and on August 5, 2011 announced its intent to issue a reexamination certificate of the ‘201 Patent accordingly. These claims cover methods of protection of data in a database by use of data-sensitivity-level based protection rules stored in a data protection catalogue.

At the request of Voltage, Ingrian/Safenet and nuBridges, the Court had put the patent infringement lawsuits against them on hold to await the outcome of the Reexamination. However, now that the USPTO has determined the asserted claims of the ‘201 Patent are valid over all the prior art references, the patent infringement lawsuits against Voltage, Ingrian/Safenet and nuBridges will immediately resume.

“Protegrity’s intellectual property is the lifeblood of our organization and capacity to deliver the most innovative and effective data security solutions for staying compliant,” said Suni Munshani, CEO for Protegrity USA, Inc. “The favorable outcome of the reexamination underscores the market value of our investment in research, development and engineering, and leaves no question that our pioneering database encryption patent is even stronger than before.”

U.S. Patent 6,321,201 describes a data security system for a database having multiple protection levels applicable on a data element value level. This enables applying data sensitivity driven encryption levels for specific categories of data in a database based on data element types that are commonly arranged in columns. The patent is central to Protegrity’s Data Security Platform, a comprehensive solution for securing sensitive data across the entire enterprise while significantly lowering the total cost and time required to stay compliant.

About Protegrity

Headquartered in Stamford, Conn., Protegrity provides high performance, infinitely scalable, end-to-end data security solutions that protect sensitive information across the enterprise from the point of acquisition to deletion. The company’s award winning patented software products span a variety of data protection methods, including end-to-end encryption, tokenization, masking and monitoring and are backed by several important data protection technology patents. Currently, more than 200 enterprise customers in retail, financial services, oil & gas, insurance, travel and transportation rely on Protegrity’s comprehensive data security solutions to enable compliance for PCI-DSS, HIPAA, HITECH Act and other data security requirements while protecting their sensitive data, brand, and business reputation. For more information, please log on to http://www.protegrity.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.
PUBLISHED: 2019-11-20
Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php.
PUBLISHED: 2019-11-20
Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands.
PUBLISHED: 2019-11-20
The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as d...