-
CAP Co., Ltd. v. McAfee, Inc. DC CAFC
- 3:14-cv-05068
- N.D. Cal.
- Judge: James Donato
- Filed: 11/17/2014
- Closed: 04/20/2017
- Latest Docket Entry: 11/08/2018
- PACER
- Docket updated daily
1
Plaintiff
1
Defendant
25
Accused
Products
2
Patents-in-Suit
886
Days in
Litigation
-
CAP Co., Ltd. v. McAfee, Inc. DC CAFC
- 3:14-cv-05068
- N.D. Cal.
- Judge: James Donato
- Filed: 11/17/2014
- Closed: 04/20/2017
- Latest Docket Entry: 11/08/2018
- PACER
- Docket updated daily
Causes of Action
Infringement
Willful Patent Infringement
Market Sector
E-commerce and Software
Assigned Judge
Outcome Summary
- Patent Information
-
Validity & Enforceability
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A method for blocking in real time harmful information in a file to be executed, the method comprising the steps of: (a) on a computer network through which a web server and a client system are linked to each other, the web server receiving a
view more
|
Invalid
Entry 83 |
3 |
The method of claim 1, wherein the step (c3) comprises requesting the client system user's approval for the execution of the step (c3).
|
Invalid
Entry 83 |
4 |
The method of claim 1, wherein the step (c) further comprises steps of: (c4) inspecting network packet input/output (1/0) on the client system; (c5) determining whether packets inspected in the step (c4) are harmful or not; and (c6) if any packet is
view more
|
Invalid
Entry 83 |
5 |
The method of claim 1, wherein the harmful information blocking code module executed in the step (c) checks whether current processes running on the client system are harmful or not.
|
Invalid
Entry 83 |
8 |
A method for blocking in real time harmful information in a file to be executed, the method comprising the steps of: (a) on a computer network through which a first web server, a second web server and a client system are linked to each other, the
view more
|
Invalid
Entry 83 |
10 |
A method for blocking in a real time harmful information in a file to be executed in real time, the method comprising steps of: (a) on a computer network through which a first web server and a client system are linked to each other, the first web
view more
|
Invalid
Entry 83 |
12 |
A system for blocking in real time harmful information in a file to be executed, comprising: a first web server for providing online services through a computer network; and a client computer linked with the first web server via the computer network,
view more
|
Invalid
Entry 83 |
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A network security system controlling inbound traffic by using a firewall, the firewall protecting a corresponding network connection of a computer to a network by setting restrictions on information communicated between networks, comprising: a port
view more
|
Invalid
Entry 83 |
2 |
The network security system as set forth in claim 1, wherein the information about the program includes information about at least one of a program name, an entire path of the program, and a program hash value.
|
Invalid
Entry 83 |
3 |
The network security system as set forth in claim 1, wherein the information about the server port includes information about at least one of an entire path of the program, a protocol, and a port.
|
Invalid
Entry 83 |
4 |
The network security system as set forth in claim 1, wherein the firewall flexible device allows the packet of inbound traffic to bypass the firewall if the port matches with the server port.
|
Invalid
Entry 83 |
5 |
The network security system as set forth in claim 1, wherein the firewall flexible device stores the extracted information about the server port if the server port is determined to be opened.
|
Invalid
Entry 83 |
7 |
A network security method controlling inbound traffic by using a firewall, the firewall protecting a corresponding network connection of a computer to a network by setting restrictions on information communicated between networks, comprising: storing
view more
|
Invalid
Entry 83 |
8 |
The network security method as set forth in claim 7, wherein the information about the program includes information about at least one of a program name, an entire path of the program, and a program hash value.
|
Invalid
Entry 83 |
9 |
The network security method as set forth in claim 7, wherein the information about the server port includes information about at least one of an entire path of the program, a protocol, and a port.
|
Invalid
Entry 83 |
10 |
The network security method as set forth in claim 7, further comprising: allowing the packet of inbound traffic to bypass the firewall if the port matches with the server port.
|
Invalid
Entry 83 |
11 |
The network security method as set forth in claim 7, further including: storing the extracted information about the sever port in the internal permitted port storage if the server port is determined to be opened.
|
Invalid
Entry 83 |
13 |
A computer recordable device storing a program for performing a network security method which, when executed by one or more processors, causes the one or more processors to control inbound traffic the method comprising: storing in an internal
view more
|
Invalid
Entry 83 |
14 |
The computer recordable device as set forth in claim 13, wherein the method further including: storing the extracted information about the sever port in the internal permitted port storage if the server port is determined to be opened.
|
Invalid
Entry 83 |
15 |
The computer recordable device as set forth in claim 13, wherein the method further including: deleting the extracted information about the sever port from the internal permitted port storage if the server port is determined to be closed.
|
Invalid
Entry 83 |
16 |
A network security system controlling inbound traffic by using a firewall, the firewall protecting a corresponding network connection of a computer to a network by setting restrictions on information communicated between networks, comprising: a port
view more
|
Invalid
Entry 83 |
18 |
The network security system as set forth in claim 16, wherein the information about the program includes information about at least one of a program name, an entire path of the program, and a program hash value.
|
Invalid
Entry 83 |
19 |
The network security system as set forth in claim 16, wherein the information about the server port includes information about at least one of an entire path of the program, a protocol, and a port.
|
Invalid
Entry 83 |
20 |
The firewall as set forth in claim 16, wherein the firewall flexible device allows the packet of inbound traffic to bypass the firewall if the port matches with the server port.
|
Invalid
Entry 83 |
21 |
A network security method controlling inbound traffic by using a firewall, the firewall protecting a corresponding network connection of a computer to a network by setting restrictions on information communicated between networks, comprising: storing
view more
|
Invalid
Entry 83 |
23 |
The network security method as set forth in claim 21, wherein the information about the program includes information about at least one of a program name, an entire path of the program, and a program hash value.
|
Invalid
Entry 83 |
24 |
The network security method as set forth in claim 21, wherein the information of the server port includes information about at least one of an entire path of the program, a protocol, and a port.
|
Invalid
Entry 83 |
25 |
The method as set forth in claim 21, further comprising: allowing the packet of inbound traffic to bypass the firewall if the port matches with the server port.
|
Invalid
Entry 83 |