-
Tse v. Google Inc., et al. DC CAFC
- 3:13-cv-00194
- N.D. Cal.
- Judge: Susan Y. Illston
- Filed: 01/15/2013
- Closed: 12/11/2013
- Latest Docket Entry: 09/29/2014
- PACER
- Docket updated daily
1
Plaintiff
4
Defendants
1
Accused
Product
1
Patent-in-Suit
561
Days in
Litigation
-
Tse v. Google Inc., et al. DC CAFC
- 3:13-cv-00194
- N.D. Cal.
- Judge: Susan Y. Illston
- Filed: 01/15/2013
- Closed: 12/11/2013
- Latest Docket Entry: 09/29/2014
- PACER
- Docket updated daily
Market Sector
E-commerce and Software
Assigned Judge
Outcome Summary
- Patent Information
-
Validity & Enforceability
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A method for protecting publicly distributed software from unauthorised use, comprising the steps of:</claim-text> determining if identity information, is existing in a processing apparatus; using a positive result of said determination as a
view more
|
Invalid
Entry 51 |
2 |
A method for protecting software from unauthorised use, as claimed in claim 1, wherein further comprising the steps of:</claim-text> authenticating said identity information; determining said identity information as existing, if said identity
view more
|
Invalid
Entry 51 |
3 |
A method for protecting software from unauthorised use, as claimed in claim 1, wherein said operation being operation related to making payment from an account of said rightful user(s), for obtaining a service/product.
|
Invalid
Entry 51 |
4 |
A method for protecting software from unauthorised use, as claimed in claim 1, wherein said software desired to be protected comprises a plurality of protected programs; each of said protected programs having validity information in a first
view more
|
Invalid
Entry 51 |
5 |
A method for protecting software from unauthorised use, as claimed in claim 4, wherein further comprising the steps of:</claim-text> storing an encrypted identity of a user in said processing apparatus; and if all of said protected programs stored in
view more
|
Invalid
Entry 51 |
13 |
A method for protecting software from unauthorised use, as claimed in claim 11, wherein said software desired to be protected being first software used on said processing apparatus for determining third information related to hardware and/or software
view more
|
Invalid
Entry 51 |
16 |
A method for protecting software from unauthorised use, comprising the steps of:</claim-text> (a) obtaining by protection software running on a processing apparatus, say, first processing apparatus, first information from the user thereof; (b)
view more
|
Invalid
Entry 51 |
17 |
A method for protecting software from unauthorised use, as claimed by claim 12, wherein said software desired to be protected being purchased commercial software.
|
Invalid
Entry 51 |
20 |
A method for protecting software, for use by a user, from unauthorised use; comprising a sub-method;</claim-text> wherein said sub-method a protection software being used and “the presence of identity information in a processing apparatus” is being
view more
|
Invalid
Entry 51 |