-
Finjan Software Ltd. v. Secure Computing Corporation et al DC
- 1:06-cv-00369
- D. Del.
- Judge: Gregory M. Sleet
- Filed: 06/05/2006
- Closed: 07/31/2012
- Latest Docket Entry: 09/16/2013
- PACER
- Docket updated daily
1
Plaintiff
3
Defendants
1
Accused
Product
3
Patents-in-Suit
2,249
Days in
Litigation
-
Finjan Software Ltd. v. Secure Computing Corporation et al DC
- 1:06-cv-00369
- D. Del.
- Judge: Gregory M. Sleet
- Filed: 06/05/2006
- Closed: 07/31/2012
- Latest Docket Entry: 09/16/2013
- PACER
- Docket updated daily
Cause of Action
Willful Patent Infringement
Market Sector
E-commerce and Software
Court
Assigned Judge
Outcome Summary
- Patent Information
-
Validity & Enforceability
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A computer-based method for generating a Downloadable ID to identify a Downloadable, comprising:</claim-text> obtaining a Downloadable that includes one or more references to software components required to be executed by the Downloadable; fetching
view more
|
Valid (102 and 103)
Entry 226 |
2 |
The method of claim 1, wherein the Downloadable includes an applet.
|
Valid (102 and 103)
Entry 226 |
3 |
The method of claim 1, wherein the Downloadable includes an active software control.
|
Valid (102 and 103)
Entry 226 |
4 |
The method of claim 1, wherein the Downloadable includes a plugin.
|
Valid (102 and 103)
Entry 226 |
5 |
The method of claim 1, wherein the Downloadable includes HTML code.
|
Valid (102 and 103)
Entry 226 |
6 |
The method of claim 1, wherein the Downloadable includes an application program.
|
Valid (102 and 103)
Entry 226 |
9 |
A system for generating a Downloadable ID to identify a Downloadable, comprising:</claim-text> a communications engine for obtaining a Downloadable that includes one or more references to software components required to be executed by the
view more
|
Valid (102 and 103)
Entry 226 |
10 |
The system of claim 9, wherein the Downloadable includes an applet.
|
Valid (102 and 103)
Entry 226 |
11 |
The system of claim 9, wherein the Downloadable includes an active software control.
|
Valid (102 and 103)
Entry 226 |
12 |
The system of claim 9, wherein the Downloadable includes a plugin.
|
Valid (102 and 103)
Entry 226 |
13 |
The system of claim 9, wherein the Downloadable includes HTML code.
|
Valid (102 and 103)
Entry 226 |
14 |
The system of claim 9, wherein the Downloadable includes an application program.
|
Valid (102 and 103)
Entry 226 |
18 |
A computer-readable storage medium storing program code for causing a computer to perform the steps of:</claim-text> obtaining a Downloadable that includes one or more references to software components required to be executed by the Downloadable;
view more
|
Valid (102 and 103)
Entry 226 |
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A computer-based method, comprising the steps of: receiving an incoming Downloadable addressed to a client, by a server that serves as a gateway to the client; comparing, by the server, Downloadable security profile data pertaining to the
view more
|
Valid (102 and 103)
Entry 226 |
2 |
The method of claim 1, further comprising the step of decomposing the Downloadable into the Downloadable security profile data.
|
Valid (102 and 103)
Entry 226 |
3 |
The method of claim 2, wherein the security policy includes an access control list and further comprising the step of comparing the Downloadable security profile data against the access control list.
|
Valid (102 and 103)
Entry 226 |
4 |
The method of claim 1, further comprising the steps of scanning for a certificate and comparing the certificate against a trusted certificate.
|
Valid (102 and 103)
Entry 226 |
5 |
The method of claim 1, further comprising the step of comparing the URL from which the Downloadable originated against a known URL.
|
Valid (102 and 103)
Entry 226 |
6 |
The method of claim 5, wherein the known URL is a trusted URL.
|
Valid (102 and 103)
Entry 226 |
7 |
The method of claim 5, wherein the known URL is an untrusted URL.
|
Valid (102 and 103)
Entry 226 |
8 |
The method of claim 1, wherein the Downloadable includes a Java.TM. applet.
|
Valid (102 and 103)
Entry 226 |
9 |
The method of claim 1, wherein the Downloadable includes an ActiveX.TM. control.
|
Valid (102 and 103)
Entry 226 |
10 |
The method of claim 1, wherein the Downloadable includes a JavaScript.TM. script.
|
Valid (102 and 103)
Entry 226 |
11 |
The method of claim 1, wherein the Downloadable includes a Visual Basic script.
|
Valid (102 and 103)
Entry 226 |
12 |
The method of claim 1, wherein the security policy includes a default security policy to be applied regardless of the client to whom the Downloadable is addressed.
|
Valid (102 and 103)
Entry 226 |
13 |
The method of claim 1, wherein the security policy includes a specific security policy corresponding to the client to whom the Downloadable is addressed.
|
Valid (102 and 103)
Entry 226 |
14 |
The method of claim 1, wherein the client belongs to a particular group; and the security policy includes a specific security policy corresponding to the particular group.
|
Valid (102 and 103)
Entry 226 |
24 |
The method of claim 1, further comprising the step of comparing the Downloadable against a known Downloadable.
|
Valid (102 and 103)
Entry 226 |
25 |
The method of claim 24, wherein the known Downloadable is hostile.
|
Valid (102 and 103)
Entry 226 |
26 |
The method of claim 24, wherein the known Downloadable is non-hostile.
|
Valid (102 and 103)
Entry 226 |
27 |
The method of claim 24, further comprising the step of including a previously received Downloadable as a known Downloadable.
|
Valid (102 and 103)
Entry 226 |
28 |
The method of claim 27, wherein the security policy identifies a Downloadable to be blocked per administrative override.
|
Valid (102 and 103)
Entry 226 |
29 |
The method of claim 28, wherein the security policy identifies a Downloadable to be allowed per administrative override.
|
Valid (102 and 103)
Entry 226 |
30 |
The method of claim 1, further comprising the step of informing a user upon detection of a security policy violation.
|
Valid (102 and 103)
Entry 226 |
32 |
A system for execution by a server that serves as a gateway to a client, the system comprising: a security policy; an interface for receiving an incoming Downloadable addressed to a client; a comparator, coupled to the interface, for comparing
view more
|
Valid (102 and 103)
Entry 226 |
33 |
The system of claim 32, wherein the Downloadable includes a Java.TM. applet.
|
Valid (102 and 103)
Entry 226 |
34 |
The system of claim 32, wherein the Downloadable includes ActiveX.TM. control.
|
Valid (102 and 103)
Entry 226 |
35 |
The system of claim 32, wherein the Downloadable includes a JavaScript.TM. script.
|
Valid (102 and 103)
Entry 226 |
36 |
The system of claim 32, wherein the Downloadable includes a Visual Basic script.
|
Valid (102 and 103)
Entry 226 |
65 |
A computer-readable storage medium storing program code for causing a server that serves as a gateway to a client to perform the steps of: receiving an incoming Downloadable addressed to a client; comparing Downloadable security profile data
view more
|
Valid (102 and 103)
Entry 226 |
Claim # | Claim Text | Outcome |
---|---|---|
4 |
A processor-based method, comprising: receiving downloadable-information; determining whether the downloadable-information includes executable code; and causing mobile protection code to be communicated to at least one information-destination of the
view more
|
Valid
Entry 226 |
6 |
The method of claim 5, wherein the sandboxed package further includes protection policies according to which the mobile protection code is operable.
|
Valid
Entry 226 |
8 |
The method of claim 6, wherein the protection policies correspond with at least one of the information-destination and a user of the information destination.
|
Valid
Entry 226 |
12 |
A processor-based system, comprising: an information monitor for receiving downloadable-information; a content inspection engine communicatively coupled to the information monitor for determining whether the downloadable-information includes
view more
|
Valid
Entry 226 |
13 |
The system of claim 12, wherein the packaging engine further comprises a policy generator communicatively coupled to the linking engine for providing protection policies according to which the MPC is operable.
|
Valid
Entry 226 |
-
Infringement
Cyberguard Corporation
- 3 Details
Accused Product | Patent # | Claim # | Outcome |
---|---|---|---|
Webwasher Secure Content Management | US 6,092,194 A |
1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 24, 25, 26, 27, 28, 29, 30, 32, 33, 34, 35, 36, 65
|
Willful infringement
Entry 242Entry 226 |
Webwasher Secure Content Management | US 6,804,780 B1 |
1, 2, 3, 4, 5, 6, 9, 10, 11, 12, 13, 14, 18
|
Willful infringement
Entry 242Entry 226 |
Webwasher Secure Content Management | US 7,058,822 B2 |
4, 6, 8, 12, 13
|
Willful infringement
Entry 226
|
Secure Computing Corporation
- 3 Details
Accused Product | Patent # | Claim # | Outcome |
---|---|---|---|
Webwasher Secure Content Management | US 6,092,194 A |
1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 24, 25, 26, 27, 28, 29, 30, 32, 33, 34, 35, 36, 65
|
Willful infringement
Entry 242Entry 226 |
Webwasher Secure Content Management | US 6,804,780 B1 |
1, 2, 3, 4, 5, 6, 9, 10, 11, 12, 13, 14, 18
|
Willful infringement
Entry 242Entry 226 |
Webwasher Secure Content Management | US 7,058,822 B2 |
4, 6, 8, 12, 13
|
Willful infringement
Entry 226
|
Webwasher AG
- 3 Details
Accused Product | Patent # | Claim # | Outcome |
---|---|---|---|
Webwasher Secure Content Management | US 6,092,194 A |
1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 24, 25, 26, 27, 28, 29, 30, 32, 33, 34, 35, 36, 65
|
Willful infringement
Entry 226
|
Webwasher Secure Content Management | US 6,804,780 B1 |
1, 2, 3, 4, 5, 6, 9, 10, 11, 12, 13, 14, 18
|
Willful infringement
Entry 226
|
Webwasher Secure Content Management | US 7,058,822 B2 |
4, 6, 8, 12, 13
|
Willful infringement
Entry 226
|
-
Damages