DCT
2:22-cv-00305
Lionra Tech Ltd v. Cisco Systems Inc
Key Events
Complaint
Table of Contents
complaint Intelligence
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Lionra Technologies Limited (Ireland)
- Defendant: Cisco Systems, Inc. (California)
- Plaintiff's Counsel: Russ August & Kabat
- Case Identification: 2:22-cv-00305, E.D. Tex., 08/08/2022
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Defendant maintains regular and established places of business in the district, including an office in Richardson, Texas.
- Core Dispute: Plaintiff alleges that certain of Defendant's computer networking and security products infringe five U.S. patents related to network monitoring, secure hardware interfaces, reconfigurable network infrastructure, and computer security policy enforcement.
- Technical Context: The patents relate to fundamental technologies in high-performance networking and security hardware, addressing issues of network reliability, secure data processing architecture, and access control.
- Key Procedural History: No significant procedural events are mentioned in the complaint.
Case Timeline
| Date | Event |
|---|---|
| 2003-10-02 | Priority Date for '612 and '436 Patents |
| 2004-03-11 | Priority Date for '708 Patent |
| 2004-05-11 | Priority Date for '323 Patent |
| 2004-09-16 | Priority Date for '630 Patent |
| 2007-11-27 | Issue Date for U.S. Patent No. 7,302,708 |
| 2010-03-23 | Issue Date for U.S. Patent No. 7,685,436 |
| 2011-03-29 | Issue Date for U.S. Patent No. 7,916,630 |
| 2011-04-05 | Issue Date for U.S. Patent No. 7,921,323 |
| 2013-10-02 | Issue Date for U.S. Patent No. 8,566,612 |
| 2022-08-08 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,916,630 - "Monitoring Condition of Network with Distributed Components" (issued March 29, 2011)
The Invention Explained
- Problem Addressed: The patent's background section describes the inefficiency of traditional network monitoring in distributed systems, where every component must check the status of every other component, generating a high volume of messages (O(n²)) that can limit system performance and scalability '630 Patent, col. 1:46-56 An alternative approach using a central coordinator is described as difficult to implement robustly '630 Patent, col. 2:26-33
- The Patented Solution: The invention proposes organizing network components into a "logical ring structure" where each component is only responsible for monitoring its immediate neighbor (a predecessor or successor) in the ring '630 Patent, abstract '630 Patent, col. 2:37-44 If a component detects that its neighbor has entered a "predefinable condition" (such as a failure), it then broadcasts this information to all other components in the system, thereby efficiently propagating critical status updates without constant all-to-all monitoring '630 Patent, abstract '630 Patent, col. 2:45-50
- Technical Importance: This approach aimed to reduce network overhead and improve the scalability of fault detection in distributed systems by localizing routine monitoring while ensuring global notification of critical events.
Key Claims at a Glance
- The complaint asserts independent claim 1 '630 Patent, col. 6:27-41 Compl. ¶17
- Claim 1 Elements:
- A method for monitoring a network with distributed components organized in a logical ring structure.
- Each component monitors only a single neighboring component (predecessor or successor) to determine its current condition.
- When a component's condition corresponds to a predefined condition, that component informs all other components of the system about that condition.
- The complaint does not explicitly reserve the right to assert dependent claims.
U.S. Patent No. 8,566,612 - "System and Method for a Secure I/O Interface" (issued October 2, 2013)
The Invention Explained
- Problem Addressed: The patent addresses performance bottlenecks and security vulnerabilities that arise when security functions (like VPN and firewall processing) are handled by different systems, requiring data to be repeatedly transferred across a host computer's backplane bus '436 Patent, col. 1:53-65 These multiple transfers create opportunities for unauthorized access and slow down communication '436 Patent, col. 2:1-12
- The Patented Solution: The invention describes a consolidated "security processor" architecture designed to perform security and network processing on a single chip or card '436 Patent, col. 4:4-27 The architecture comprises a "switching system" for receiving and sending packets, one or more "packet engines" for classification processing, and a "cryptographic core" for encryption/decryption '436 Patent, abstract A key aspect is that the packet engine is "interposed between the switching system and the cryptographic core," ensuring an integrated and secure data path that minimizes reliance on the host system's bus '436 Patent, abstract '436 Patent, col. 10:60-64
- Technical Importance: This integrated architecture was aimed at enabling high-speed, secure network interfaces (like NICs) capable of offloading complex security tasks from the host processor, thereby improving both performance and security.
Key Claims at a Glance
- The complaint asserts independent claim 1 '612 Patent, col. 24:9-40 Compl. ¶26
- Claim 1 Elements:
- A security processor comprising a switching system, a packet engine, a cryptographic core, a signature database, and an intrusion detection system.
- The packet engine is one of a plurality of packet engines, and substantially all packets transit one of these engines.
- The packet engine is coupled to the switching system to handle classification processing.
- The cryptographic core is coupled to the packet engine for encryption/decryption, with the packet engine being "interposed between" the switching system and the core.
- An intrusion detection system is coupled between the core and the packet engine and is responsive to a signature database.
- The complaint does not explicitly reserve the right to assert dependent claims.
U.S. Patent No. 7,921,323 - "Reconfigurable Communications Infrastructure for ASIC Networks" (issued April 5, 2011)
- Technology Synopsis: The patent addresses the complexity and high pin counts required to interconnect multiple Application-Specific Integrated Circuit (ASIC) devices, like FPGAs, on a circuit board '323 Patent, col. 1:19-30 The proposed solution is a reconfigurable communications infrastructure using high-speed serial links to connect packet routers within each ASIC, creating a high-bandwidth network with reduced physical wiring and greater flexibility '323 Patent, col. 2:40-56
- Asserted Claims: At least claim 27 is asserted Compl. ¶37
- Accused Features: The complaint accuses the Cisco Catalyst 9500 Series switches, alleging that their use of Cisco StackWise Virtual technology to link multiple switches and their internal ASIC interconnects practice the claimed invention Compl. ¶¶38-40 The complaint includes a block diagram of the accused product's UADP 3.0 ASIC to support its allegations Compl. p. 12
U.S. Patent No. 7,302,708 - "Enforcing Computer Security Utilizing an Adaptive Lattice Mechanism" (issued November 27, 2007)
- Technology Synopsis: The patent describes a method for enforcing computer security that goes beyond simple access control lists '708 Patent, col. 1:24-31 The invention uses an "adaptive lattice mechanism" where access rights are based not only on a user's authorization level but also on their pattern of behavior. The system determines if a request completes a "prohibited temporal access pattern" and can dynamically update the required access level for certain data if a user's actions suggest they are aggregating sensitive information '708 Patent, abstract '708 Patent, col. 2:55-62
- Asserted Claims: At least claim 1 is asserted Compl. ¶46
- Accused Features: The complaint accuses the Cisco Secure Web Application Firewall (WAF), alleging it performs a method for secure access that involves analyzing behavioral patterns to distinguish between legitimate users and malicious bots, thereby detecting prohibited access patterns Compl. ¶¶47-49
U.S. Patent No. 7,685,436 - "System and Method for a Secure I/O Interface" (issued March 23, 2010)
- Technology Synopsis: This patent, the parent of the '612 patent, also describes a consolidated security processor architecture. The technology focuses on integrating a switching system, packet engine, and cryptographic core to offload security processing from a host system, thereby reducing backplane bus traffic and enhancing security. This patent's claims include specific details about using a "tag" applied upon ingress to a packet engine to determine the packet's egress path after processing '436 Patent, claim 1
- Asserted Claims: At least claim 1 is asserted Compl. ¶58
- Accused Features: The complaint again accuses the Cisco Firepower 4100 series. The infringement theory for this patent focuses on the product's alleged use of tags, such as VLAN tags, to determine the egress path for packets within the security processor Compl. ¶61
III. The Accused Instrumentality
- Product Identification: The complaint identifies several categories of Cisco products, with specific infringement allegations directed at the Cisco ASR 901 Router, the Cisco Firepower 4100 Series, the Cisco Catalyst 9500 Series, and the Cisco Secure Web Application Firewall Compl. ¶8 Compl. ¶17 Compl. ¶26 Compl. ¶37 Compl. ¶46
- Functionality and Market Context:
- Cisco ASR 901 Router: Accused of infringing the '630 patent. The complaint alleges this router implements the ITU-T G.8032 Ethernet Ring Protection (ERP) protocol, which is designed to provide protection against link failures in Ethernet ring topologies Compl. ¶18 The complaint provides a diagram illustrating a generic G.8032 ring topology Compl. p. 5
- Cisco Firepower 4100 Series: Accused of infringing the '612 and '436 patents. The complaint describes these as firewall products containing a security processor architecture that includes a switching system, a plurality of packet engines for handling classification and inspection, a cryptographic core for SSL/TLS decryption, and an intrusion detection system that uses a signature database (Compl. ¶27; Compl. ¶28; Compl. ¶29; Compl. ¶30; Compl. ¶31). The complaint includes a diagram from Cisco's documentation illustrating the product's access control policy flow Compl. p. 10
- Cisco Catalyst 9500 Series: Accused of infringing the '323 patent. These are described as network switches that can be linked using Cisco StackWise Virtual technology, which the complaint alleges creates a communications infrastructure between separate signal processing circuits Compl. ¶38 The complaint further alleges that each switch includes multiple ASIC devices containing packet routers that are coupled via high-speed serial links Compl. ¶¶39-40
- Cisco Secure Web Application Firewall: Accused of infringing the '708 patent. This product is alleged to perform a method of secure access by defending websites and APIs from malicious bots and other attacks Compl. ¶47 The complaint alleges the product uses "Intent-based Deep Behavior Analysis" to analyze temporal user patterns, such as mouse/keystroke interactions and URL traversals, to distinguish between legitimate users and malicious bots Compl. ¶48 Compl. ¶49
IV. Analysis of Infringement Allegations
'630 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| each component in the system monitoring only a single respective neighboring component... to determine a current condition of the respective neighboring component | The Cisco ASR 901 router, when using the G.8032 protocol, allegedly has each component (node) in the ring monitor only its neighboring component to detect link failures. | ¶19 | col. 2:45-48 |
| each component in the system informing all other components of the system about the current condition of the respective neighboring component when the current condition corresponds to at least one predefined condition | Upon a link failure (a predefined condition), the nodes adjacent to the failed link allegedly send Ring Automatic Protection Switching (R-APS) messages that cause all other nodes in the ring to unblock ports to restore connectivity. | ¶20 | col. 2:48-50 |
- Identified Points of Contention:
- Scope Questions: A central question may be whether the standardized G.8032 protocol's mechanism for propagating failure notifications constitutes "informing all other components of the system" as required by the claim. The analysis may focus on whether the R-APS messages directly inform all nodes, or if they trigger a cascading series of local actions that results in a system-wide state change.
- Technical Questions: The complaint alleges that R-APS messages "cause all other nodes... to unblock" ports Compl. ¶20 The case may require evidence detailing the precise mechanism and propagation of these messages within the G.8032 protocol as implemented by Cisco to determine if it meets the claim limitation.
'612 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| a switching system to send the outgoing packets and receive the incoming packets | The Cisco Firepower 4100 is alleged to include a security processor with a switching system for packet ingress and egress. | ¶27 | col. 8:10-14 |
| a packet engine, coupled to the switching system, to handle classification processing... wherein the packet engine is one of a plurality of packet engines | The Firepower 4100 is alleged to include multiple packet engines to handle classification, with throughputs scaling across different models, and that substantially all packets transit one of these engines. | ¶28 | col. 9:36-39 |
| a cryptographic core, coupled to the packet engine... wherein the packet engine is interposed between the switching system and the cryptographic core | The product is alleged to include a cryptographic core for decryption and to have an architecture where the packet engine is interposed between the switching system and the core. The complaint cites a Cisco diagram showing encrypted connections are first sent to an SSL policy for decryption before further processing (Compl. p. 8). | ¶29 | col. 10:60-64 |
| a signature database | The product allegedly uses a signature database from the "Cisco Talos Group" for threat intelligence and intrusion prevention. | ¶30 | col. 17:42-45 |
| an intrusion detection system coupled between the cryptographic core and the packet engine and responsive to at least one packet matching a signature | The product allegedly includes an intrusion detection system (IDS) that passively monitors and analyzes network traffic for potential intrusions based on signatures from the database. | ¶31 | col. 17:38-42 |
- Identified Points of Contention:
- Scope Questions: The construction of the term "interposed between" will likely be a key issue. The dispute may center on whether this requires a strict serial data path (switching system -> packet engine -> cryptographic core) or if it can read on other architectures where the components are merely coupled on a common data path.
- Technical Questions: The complaint alleges a specific architectural layout and data flow. A factual question will be whether the actual hardware and software architecture of the Firepower 4100 series aligns with the specific couplings and data paths required by the claim, particularly the position of the intrusion detection system "between the cryptographic core and the packet engine."
V. Key Claim Terms for Construction
For the '630 Patent
- The Term: "informing all other components of the system"
- Context and Importance: This term is critical because the infringement allegation hinges on the way failure notifications are propagated in the accused G.8032 protocol. Whether the protocol's R-APS messages constitute "informing all other components" directly, as opposed to initiating a series of local updates, will be central to the infringement analysis.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent does not specify the mechanism of "informing," which may support an interpretation that any method resulting in all components becoming aware of the condition, directly or indirectly, would suffice. The summary states that the component "propagates corresponding information to all the components" '630 Patent, col. 2:22-24, a term that could encompass indirect propagation.
- Evidence for a Narrower Interpretation: The description of the "Inform All" method, which includes an acknowledgment process from each other component, could suggest a more direct, broadcast-like communication is required '630 Patent, col. 4:1-6
For the '612 Patent
- The Term: "the packet engine is interposed between the switching system and the cryptographic core"
- Context and Importance: This term defines the core architectural relationship of the claimed security processor. Practitioners may focus on this term because infringement depends on a precise structural mapping. If the accused product's architecture differs, for example by having the packet engine and cryptographic core in parallel, the claim may not be met.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The term "interposed" is not explicitly defined, which could allow for an interpretation that the packet engine is simply located somewhere along the data path between the switching system and the cryptographic core, without requiring a strict serial arrangement.
- Evidence for a Narrower Interpretation: Figure 2 of the parent '436 patent, which is central to the detailed description, depicts a clear serial data flow from the switching system (208) to the packet engine (228) and then to the cryptographic core (232). This figure may support a narrower construction requiring the packet engine to be an obligatory gateway between the other two components '436 Patent, Fig. 2 '436 Patent, col. 10:60-64
VI. Other Allegations
- Indirect Infringement: For each asserted patent, the complaint alleges induced infringement Compl. ¶17 Compl. ¶26 Compl. ¶37 Compl. ¶46 Compl. ¶58 The basis for these allegations is that Defendant provides products and accompanying documentation (e.g., configuration guides, datasheets) that allegedly instruct customers and end-users on how to configure and use the products in an infringing manner Compl. ¶18 Compl. ¶27
- Willful Infringement: The complaint does not contain specific allegations of willful infringement or make any factual assertions regarding pre-suit knowledge of the patents-in-suit by the Defendant.
VII. Analyst's Conclusion: Key Questions for the Case
- A core issue will be one of functional correspondence: Does the standardized G.8032 Ethernet Ring Protection protocol, as implemented in the Cisco ASR 901, perform the step of "informing all other components" in the specific manner required by the '630 patent, or is there a material difference in the notification mechanism?
- A second core issue will be architectural mapping: Can the specific hardware and data-flow architecture of the Cisco Firepower 4100 be shown to meet the "interposed" structural limitation of the '612 and '436 patents, where the packet engine is claimed to be positioned between the switching system and the cryptographic core?
- A third key question will be one of definitional scope: For the '708 patent, can the "Intent-based Deep Behavior Analysis" used in the accused firewall to detect malicious bots be construed as a method that determines if an access request "completes a prohibited temporal access pattern" as that term is used in the context of the patent's adaptive security lattice?
Analysis metadata