Taasera Licensing LLC v. CrowdStrike, Inc. et al > Summary
Court Case Number 2:22-cv-00468
Filing Date Dec 8, 2022
Termination Date Dec 6, 2023
Court Texas Eastern District Court
Status Dismissed - Settled
JudgesRodney Gilstrap
Plaintiff
Defendant
Plaintiff Attorneys
8Taasera Licensing LLC
Attorney Name: Alfred R. Fabricant
Fabricant LLP
Taasera Licensing LLC
Attorney Name: Jennifer Truelove
McKool Smith
Taasera Licensing LLC
Attorney Name: Joseph Mercadante
Fabricant LLP
Taasera Licensing LLC
Attorney Name: Julian G. Pymento
Fabricant LLP
Taasera Licensing LLC
Attorney Name: Peter Lambrianakos
Fabricant LLP
Taasera Licensing LLC
Attorney Name: Samuel F. Baxter
McKool Smith
Taasera Licensing LLC
Attorney Name: Vincent J. Rubino III
Fabricant LLP
Taasera Licensing LLC
Attorney Name: Raymond W. Mort III
The Mort Law Firm, PLLC
Defendant Attorneys
10Crowdstrike Holdings Inc
Attorney Name: Michael J. Bettinger
Sidley Austin
Crowdstrike Holdings Inc
Attorney Name: Amir Freund
Sidley Austin
Crowdstrike Holdings Inc
Attorney Name: Andrew T. Langford
Sidley Austin
Crowdstrike Holdings Inc
Attorney Name: Erik B. Fountain
Sidley Austin
Crowdstrike Holdings Inc
Attorney Name: Blake Thompson
Mann Tindel & Thompson
Crowdstrike Holdings Inc
Attorney Name: Irene I. Yang
Sidley Austin
Crowdstrike Holdings Inc
Attorney Name: Stephen Ravel
Kelly Hart & Hallman
Crowdstrike Holdings Inc
Attorney Name: Mark Mann
Mann Tindel & Thompson
Crowdstrike Holdings Inc
Attorney Name: Kelly Ransom
Kelly Hart & Hallman
Crowdstrike Holdings Inc
Attorney Name: Sharon Lee
Sidley Austin
Related Patents
Doc No | Title | Issue date |
---|---|---|
09923918 | Methods and systems for controlling access to computing resources based on known security vulnerabilities | Mar 20, 2018 |
09608997 | Methods and systems for controlling access to computing resources based on known security vulnerabilities | Mar 28, 2017 |
09092616 | Systems and methods for threat identification and remediation | Jul 28, 2015 |
08990948 | Systems and methods for orchestrating runtime operational integrity | Mar 24, 2015 |
08955038 | Methods and systems for controlling access to computing resources based on known security vulnerabilities | Feb 10, 2015 |
08850517 | Runtime risk detection based on user, application, and system action sequence correlation | Sep 30, 2014 |
08327441 | System and method for application attestation | Dec 4, 2012 |
07673137 | System and method for the managed security control of processes on a computer system | Mar 2, 2010 |