Tag Archive for: partners

Narrowing the Disclaimer Doctrine: Federal Circuit Cabins the Reach of Disclaimers in the IPR Context | Haug Partners LLP


OVERVIEW

The United States Court of Appeals for the Federal Circuit recently affirmed three Inter Partes Review (IPR) final written decisions of the U.S. Patent Trial and Appeal Board (“the Board”) where the Board concluded that petitioner, Trend Micro. Inc. (“Trend”), had shown the challenged patent claims in patentee, Cupp Computing AS’s (“Cupp”), U.S. Patents Nos. 8,631,488 (“’488 patent”), 9,106,683 (“’683 patent”), and 9,843,595 (“’595 patent”), unpatentable as obvious over two prior art references.1 Setting a new precedent with respect to claim construction, the Federal Circuit held that although a patentee’s clear and unmistakable disavowals of claim scope during an IPR proceeding can narrow the scope of the claims, such a statement serves to narrow the claims only in subsequent proceedings—not in the IPR proceeding during which the statement is made.2

Cupp contended that the PTAB erred when it rejected Cupp’s disclaimers in the IPR.3 The Board did not find this argument persuasive and concluded that it could ignore the patentee’s disavowal in construing the claims.4 The Federal Circuit agreed with the Board.5

I. Introduction

Each of the three patents at issue share a common name and priority date and address the problem of malicious attacks aimed at mobile devices.6 The patents concern methods for waking a mobile device from a power-saving mode and then performing security operations on the device, “such as scanning a storage medium for malware, or updating security applications.”7

The issue on appeal to the Board’s determination related to the precedential decision is one of claim construction.8 Specifically, each independent claim in the three patents includes the limitation “the mobile device having a mobile device processor different than the mobile security system processor.”9

II. Background

In March 2019 Trend petitioned the Board for an IPR of several claims in each of the ’488, ’683, and ’595 patents arguing that the claims were unpatentable as obvious.10 Trend presented two pieces of prior art contending that either could be individually relied upon to show the challenged claims would have been…

Source…

Job: IT Security Analyst at GVA Partners


An exciting opportunity exists for a highly skilled IT security engineer to join a dynamic project team. The resource shall be responsible for the following

  • Carry out procedural system maintenance on all IT systems.
  • Ensure all networks including but not limited to LAN, MAN, WAN, GAN meets the demand of the company.
  • Troubleshoot system and network problems, diagnosing and solving hardware or software faults and replace parts as required.
  • Maintain all IT system work flows.
  • Maintain and update all IT Networks.
  • Maintain and contribute to the development of IT Network.
  • Participate actively in developing, planning and implementing advance IT systems.

Other duties as assigned.

 Functions:

  • Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
  • Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
  • Lead the implementation of Information Security projects
  • Drive internal and external vulnerability assessment, penetration tests engagements and manage results to remediation.
  • Respond to escalated security events and drive security incident response processes to ensure timely resolution with minimal disruption.
  • Design, document, and deploy secure infrastructure solutions to enhance and evolve the security posture of the business to ensure integrity, availability and confidentiality of all critical enterprise data.
  • Provide expertise on security tools, including but not limited to firewalls, Web Application firewalls, IDS/IDP, anti-malware software
  • Liaise with stakeholders in respect of operational implementation of security policies and best practices
  • Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementations are managed to minimize risks and adverse impact to servers, workstations and user productivity.
  • Implement the infrastructure, configurations and processes to monitor security related events
  • Prevent data loss and service interruptions by researching new technologies that will effectively protect the enterprise network.

Supervisory/Managerial Responsibilities:

  • Ensure conformance to Cybersecurity…

Source…

Most people say they could guess their partner’s passwords


It may be time to change your passwords after reading this new poll.

OnePoll and Prove teamed up to survey 2,000 people about their password habits and found that the average sneaky person thinks they can get into their significant other’s phone in just five attempts.

Respondents themselves said they have four go-to passwords, with 31% admitting that those security codes are actually just different variations of the same thing, but with additional punctuation or numbers.

Even then, 79% have six or fewer go-to passwords.

Although participants may have the patience to sit down and try to crack their significant other’s password, they don’t have the same patience for their own accounts. The average person will give up on trying to log into their own accounts after just three failed password attempts.

The average respondent has six online accounts they’ve never even used because they didn’t need to use them again (46%), they lost interest in the service (43%) or they forgot their password (39%).

Survey respondents said they have four go-to passwords, with 31% admitting that those security codes are actually just different variations of the same thing, but with additional punctuation or numbers.
Survey respondents said they have four go-to passwords, with 31% admitting that those security codes are actually just different variations of the same thing, but with additional punctuation or numbers.
NurPhoto via Getty Images

On average, respondents believe it should take about 33 seconds to create a new account online, but almost half — 45% — will cap it at 30 seconds or less.

“The internet wasn’t built with security in mind and so as consumers, we all experience how tedious passwords and two-factor security can be. Screw up your password entry a few times, and now you are locked out and spending 20 minutes with a call center agent to fix things. It’s just a broken model held together with duct tape,” said Rodger Desai, CEO & Founder of Prove.

“Businesses that modernize their digital channels by removing the friction caused by antiquated security will take all the market share. Consumers flock to businesses that respect their time and keep them secure without hassle. In our view, the winners in the digital economy will be those that kill the password,” he continued.

Source…

Virginia Tech, international partners debut first-of-its kind test bed for resiliency, security in space-based internet networks | VTx


The soaring goal of Elon Musk’s Starlink and other satellite internet projects is to provide high-speed, low-latency broadband internet across the globe. But there are still some big questions that need to be answered — including how to build a resilient, secure network in space.

To examine such questions, Commonwealth Cyber Initiative (CCI) researchers at Virginia Tech have partnered with the University of Surrey in the United Kingdom to build the world’s first hardware-in-the-loop test bed that emulates the changing connectivity of a mega satellite constellation at scale. The researchers introduced the test bed at an intercontinental workshop July 12-13.

“We wanted to establish a shared community vision and brainstorm about what would be possible and what would be most useful in a space networking infrastructure,” said CCI researcher Jonathan Black, professor of aerospace engineering.

Besides uniting researchers and funding agencies on both sides of the Atlantic, the interdisciplinary workshop involved members of the satellite and aerospace community as well as the computer networking and communication communities, including researchers from Wireless@VT in the Bradley Department of Electrical and Computer Engineering and the Center for Space Science and Engineering Research (Space@VT).

Workshop speakers included representatives from NASA Goddard Space Flight Center and the National Science Foundation as well as Ella Atkins, Fred D. Durham Chair and incoming department head for the Kevin T. Crofton Department of Aerospace and Ocean Engineering.

“In order to repair, upgrade, and refuel in space, we need to build for efficiency and disruption,” said Atkins, who called into the workshop from her rural home via Starlink. “By grounding communications and networking in long-term space robotics, our researchers are building the future of space engineering.”

According to Atkins and Black, the future of space engineering requires effective communication — and the next step is connecting satellite networks.

Breaking out of space siloes

On the ground, network internet service providers are interconnected. A Verizon network user can talk with someone on an AT&T network,…

Source…