The Institute investigates ITC (337-TA-1314) in certain computer network security devices

    On May 18, 2022, the ITC issued a Notice of Investigation in Certain Computer Network Security Devices and Systems, Related Software, Their Components, and Similar Contained Products (No. 337-TA-1314).

    On the basis of this, this investigation is based on the April 19, 2022 complaint filed by Centripetal Networks, Inc. of Reston, Virginia (“Centripetal”) alleging violation of section 337 of Defendant Keysight Technologies, Inc. of Santa Rosa, California (“Keysight”) in the illegal import/sale of certain computer cybersecurity systems and devices, their related software, components, and products containing the same for violation of certain statements of United States Patent No. 9,264.370 (“patent“ 370”); United States Patent No. 10,193,917 (“patent ‘917”); and United States Patent No. 10,284,526 (“patent ‘526”).

    According to the complaint, the ‘370 patent addresses improved techniques for detecting malicious endpoints and preventing malicious endpoints from damaging the network by using the processor and memory to provide The first and second device rules cause the system to record packets, identifying incoming packets. and dispatch by network device, generate log entries, correlate log entries and take certain actions in response to correlation; Patent ‘917 addresses improved techniques for combating ever-evolving threats in computer networks by using the processor and memory of a packet filtering device to receive packets, apply packet filtering rules that allow or block incoming packets, generate a packet log entry that includes a threat indicator, update packet stream entries using packet log entries, and analyze packet flows , which communicates and displays part of packet flow analysis, such that packet stream analysis data includes at least above threat identifiers, packet timing, and packet filter device data that intercepts the package or not; and patent ‘526 for improvements to computer network security, especially when dealing with encrypted network traffic, including a processor and memory to store lists of identity and behavior data. corresponding action to perform on encrypted communication streams, receive packets starting at least one encrypted communication stream, determine stream identifier data associated with encrypted packet stream start packets , compares the specified stream identifier data with a list of identifier data, decrypts the matched encrypted communication stream with the identifier data to perform an action per packet, and then -encrypts the packets believe. The alleged products are computer equipment that monitors network traffic and enforces security commonly used by commercial enterprises and data centers to monitor, detect, and react to network activities and threats, as well as their associated software components and similar products, including Keysight’s Vision One, Vision X, Vision 7300, Vision 7303, Vision Edge 1S, Trade Vision, ThreatArmor 1G, and ThreatArmor 10G. Centripetal is asking the Commission to issue a limited exclusion and cease-and-desist order against Keysight. According to the Notice of Investigation, the Office of Unfair Import Investigation will participate as a party to the investigation. Finally, ALJ Chief Clark S. Cheney made an announcement that ALJ MaryJoan McNamara would chair the investigation.

    Recent Articles


    Featured Article

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox