Major software companies sued for patent infringement

Twenty-two major software companies are being sued for alleged patent infringement by a little-known entity now controlling the two patents in question.

Twenty-two major software and security companies are being sued for alleged patent infringement by a little-known entity now controlling the two patents in question.

Information Protection and Authentication of Texas (IPAT) filed suit on Dec. 30 against companies such as Microsoft, Symantec and CA, alleging infringement of U.S. patents No. 5,311,591 and No. 5,412,717.

Patent 5,311,591 is called "Computer System Security Method and Apparatus for Creating and Using Program Authorization Information Data Structures" and was granted in May 1994. The inventor is credited as Addison M. Fischer of Naples, Florida. The innovation is intended to allow a computer user to control how an application behaves in order to thwart other malicious software.

The second one, No. 5,412,717, is also credited to Fischer and was granted in May 1995. The invention deals with using hashes -- unique numerical identifiers -- to ensure an application has not been tampered with.

IPAT is asking for a jury trial in U.S. District Court for the Eastern District of Texas, where many companies choose to file patent disputes. IPAT seeks an injunction against the companies using the technologies and damages.

Also named in the suit are companies AVG, Check Point Software, Comodo, ESET, F-Secure, Iolo technologies, Kaspersky Lab, McAfee, MicroWorld Technologies, NetVeda, Norman Data Defense Systems, Novell, PC Tools, PWI, Sophos, Sunbelt Software, Trend Micro, Velocity Micro and Webroot Software.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags patentspatent infringement

More about AMPAVG Technologies AUCA TechnologiesCheck Point Software TechnologiesCheck Point Software TechnologiesComodoF-SecureIolo TechnologiesKasperskyKasperskyMcAfee AustraliaMicrosoftMicroworldNormanNorman Data Defense SystemsNovellPC ToolsSophosSunbeltSunbelt SoftwareSymantecTrend Micro AustraliaUSPTOWebrootWebroot Software

Show Comments
[]