Trend Micro Inc v. Taasera Licensing LLC > Summary
Court Case Number 3:22-cv-00518
Filing Date Mar 4, 2022
Termination Date Aug 5, 2022
Court Texas Northern District Court
Status Transfer/Remand - MDL Transfer
JudgesDavid C. Godbey
Plaintiff
Defendant
Plaintiff Attorneys
15Trend Micro Incorporated
Attorney Name: Daryl S. Bartow
Duane Morris LLP
Trend Micro Incorporated
Attorney Name: Scott W. Breedlove
Carter Arnett Bennett & Perez PLLC
Trend Micro Incorporated
Attorney Name: Leon Carter
Carter Arnett Bennett & Perez PLLC
Trend Micro Incorporated
Attorney Name: Yar R. Chaikovsky
Paul Hastings
Trend Micro Incorporated
Attorney Name: Nathan I. Cox
Carter Arnett Bennett & Perez PLLC
Trend Micro Incorporated
Attorney Name: Holly Engelmann
Duane Morris LLP
Trend Micro Incorporated
Attorney Name: Gilbert A. Greene
Duane Morris LLP
Trend Micro Incorporated
Attorney Name: Alexander Hyung-Joon Lee
Paul Hastings
Trend Micro Incorporated
Attorney Name: William A. Liddell
Duane Morris LLP
Trend Micro Incorporated
Attorney Name: Joshua B. Long
Duane Morris LLP
Trend Micro Incorporated
Attorney Name: Philip Ou
Paul Hastings
Trend Micro Incorporated
Attorney Name: Brianna M. Vinci
Duane Morris LLP
Trend Micro Incorporated
Attorney Name: Bruce Shei Yen
Paul Hastings
Trend Micro Incorporated
Attorney Name: Daryl S. Bartow
Paul Hastings
Trend Micro Incorporated
Attorney Name: Gilbert A. Greene
DLA Piper
Defendant Attorneys
5Taasera Licensing LLC
Attorney Name: Samuel F. Baxter
McKool Smith
Taasera Licensing LLC
Attorney Name: Joseph Mercadante
Fabricant LLP
Taasera Licensing LLC
Attorney Name: Daniel Shea
Fabricant LLP
Taasera Licensing LLC
Attorney Name: Jennifer Leigh Truelove
McKool Smith
Taasera Licensing LLC
Attorney Name: Alfred R. Fabricant
Fabricant LLP
Cause
28:1338 Patent Infringement
Related Patents
Doc No | Title | Issue date |
---|---|---|
09923918 | Methods and systems for controlling access to computing resources based on known security vulnerabilities | Mar 20, 2018 |
09608997 | Methods and systems for controlling access to computing resources based on known security vulnerabilities | Mar 28, 2017 |
09092616 | Systems and methods for threat identification and remediation | Jul 28, 2015 |
08990948 | Systems and methods for orchestrating runtime operational integrity | Mar 24, 2015 |
08955038 | Methods and systems for controlling access to computing resources based on known security vulnerabilities | Feb 10, 2015 |
08850517 | Runtime risk detection based on user, application, and system action sequence correlation | Sep 30, 2014 |
08327441 | System and method for application attestation | Dec 4, 2012 |
07673137 | System and method for the managed security control of processes on a computer system | Mar 2, 2010 |
06842796 | Information extraction from documents with regular expression matching | Jan 11, 2005 |