CENTRIPETAL NETWORKS, INC., v. KEYSIGHT TECHNOLOGIES, INC., et al > Summary
Court Case Number 2:17-cv-00383
Filing Date Jul 20, 2017
Termination Date Oct 12, 2018
Court Virginia Eastern District Court
Status Dismissed - Settled
Plaintiff
Plaintiff Attorneys
18Centripetal Networks Inc.
Attorney Name: Adam R. Alper
Kirkland & Ellis
Centripetal Networks Inc.
Attorney Name: Paul J. Andre
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Michael W. De Vries
Kirkland & Ellis
Centripetal Networks Inc.
Attorney Name: Akshay S. Deoras
Kirkland & Ellis
Centripetal Networks Inc.
Attorney Name: James R. Hannah
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Lisa Kobialka
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Hannah Y. Lee
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Mike H. Lee
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: David Lien
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Cristina L. Martinez
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Stephen E. Noona
Kaufman & Canoles, P.C.
Centripetal Networks Inc.
Attorney Name: Gregory C. Proctor
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Craig Crandall Reilly
Law Office Of Craig C. Reilly
Centripetal Networks Inc.
Attorney Name: Melissa Theresa Giorgi Brenner
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Shannon H. Hedvat
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Kristopher B. Kastens
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Phong D. Nguyen
Kramer Levin Naftalis & Frankel
Centripetal Networks Inc.
Attorney Name: Linda Linjun Xu
Kramer Levin Naftalis & Frankel
Defendant Attorneys
30Ixia
Attorney Name: John P. Bovich
Reed Smith
Keysight Technologies
Attorney Name: John P. Bovich
Reed Smith
Ixia
Attorney Name: James Aaron Daire
Reed Smith
Keysight Technologies
Attorney Name: James Aaron Daire
Reed Smith
Ixia
Attorney Name: Doyle B. Johnson
Reed Smith
Keysight Technologies
Attorney Name: Doyle B. Johnson
Reed Smith
Ixia
Attorney Name: Jonah D. Mitchell
Reed Smith
Keysight Technologies
Attorney Name: Jonah D. Mitchell
Reed Smith
Ixia
Attorney Name: Christine M. Morgan
Reed Smith
Keysight Technologies
Attorney Name: Christine M. Morgan
Reed Smith
Ixia
Attorney Name: Mohammed Osman
Reed Smith
Keysight Technologies
Attorney Name: Mohammed Osman
Reed Smith
Ixia
Attorney Name: William R. Poynter
Kaleo Legal
Keysight Technologies
Attorney Name: William R. Poynter
Kaleo Legal
Ixia
Attorney Name: Christopher John Pulido
Reed Smith
Keysight Technologies
Attorney Name: Christopher John Pulido
Reed Smith
Ixia
Attorney Name: Seth B. Herring
Reed Smith
Keysight Technologies
Attorney Name: Seth B. Herring
Reed Smith
Ixia
Attorney Name: Adaline J. Hilgard
Reed Smith
Keysight Technologies
Attorney Name: Adaline J. Hilgard
Reed Smith
Keysight Technologies
Attorney Name: Peter J. Chassman
Reed Smith
Keysight Technologies
Attorney Name: William Penn Dickinson III
Kaleo Legal
Keysight Technologies
Attorney Name: Gerard M. Donovan
Reed Smith
Keysight Technologies
Attorney Name: Michael J. Forbes
Reed Smith
Keysight Technologies
Attorney Name: Keyonn L. Pope
Reed Smith
Ixia
Attorney Name: Peter J. Chassman
Reed Smith
Ixia
Attorney Name: William Penn Dickinson III
Kaleo Legal
Ixia
Attorney Name: Gerard M. Donovan
Reed Smith
Ixia
Attorney Name: Michael J. Forbes
Reed Smith
Ixia
Attorney Name: Keyonn L. Pope
Reed Smith
Cause
35:271 Patent Infringement
Related Patents
Doc No | Title | Issue date |
---|---|---|
09917856 | Rule-based network-threat detection for encrypted communications | Mar 13, 2018 |
09565213 | Methods and systems for protecting a secured network | Feb 7, 2017 |
09560077 | Methods and systems for protecting a secured network | Jan 31, 2017 |
09413722 | Rule-based network-threat detection | Aug 9, 2016 |
09264370 | Correlating packets in communications networks | Feb 16, 2016 |
09137205 | Methods and systems for protecting a secured network | Sep 15, 2015 |