throbber
UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEX AS
`MARSHALL DIVISION
`
`LIONRA TECHNOLOGIES LIMITED,
`
`Plaintiff,
`
`Case No. 2:22-cv-305
`
`v.
`
`CISCO SYSTEMS, INC.,
`
`Defendant.
`
`JURY TRIAL DEMANDED
`
`COMPLAINT FOR PATENT INFRINGEMENT
`
`Plaintiff Lionra Technologies Limited (“Lionra”) files this complaint against Cisco Systems,
`
`Inc. (“Cisco” or “Defendant”), alleging infringement of U.S. Patent Nos. 7,916,630, 8,566,612,
`
`7,921,323, 7,302,708, and 7,685,436 (“Patents-in-Suit”). The Accused Products are computer
`
`networking and security products made, used, offered for sale, sold, imported by Defendant in the
`
`United States and supplied by Defendant to its customers and integrated into electronic devices
`
`sold in the United States.
`
`Plaintiff Lionra and th e Patents-in-Suit
`
`1.
`
`Plaintiff Lionra is a technology licensing company organized under the laws of Ireland,
`
`with its headquarters at The Hyde Building, Suite 23, The Park, Carrickmines, Dublin 18, Ireland.
`
`2.
`
`Lionra is the owner of U.S. Patent No. 7,916,630, entitled “Monitoring Condition of
`
`Network with Distributed Components,” which issued March 29, 2011 (the “’630 patent”). A copy
`
`of the ’630 patent is attached to this complaint as Exhibit 1.
`
`1
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 1 of 26
`
`

`

`3.
`
`Lionra is the owner of U.S. Patent No. 8,566,612, entitled “System and Method for a Secure
`
`I/O Interface,” which issued October 2, 2013 (the “’612 patent”). A copy of the ’612 patent is
`
`attached to this complaint as Exhibit 2.
`
`4.
`
`Lionra
`
`is
`
`the owner of U.S. Patent No. 7,921,323, entitled “Reconfigurable
`
`Communications Infrastructure for ASIC Networks,” which issued November 16, 2006 (the “’323
`
`patent”). A copy of the ’323 patent is attached to this complaint as Exhibit 3.
`
`5.
`
`Lionra is the owner of U.S. Patent No. 7,302,708, entitled “Enforcing Computer Security
`
`Utilizing an Adaptive Lattice Mechanism,” which issued November 27, 2007 (the “’708 patent”).
`
`A copy of the ’708 patent is attached to this complaint as Exhibit 4.
`
`6.
`
`Lionra is the owner of U.S. Patent No. 7,685,436, entitled “System and Method for a Secure
`
`I/O Interface,” which issued March 23, 2010 (the “’436 patent”). A copy of the ’436 patent is
`
`attached to this complaint as Exhibit 5.
`
`Defendant and the A ccused Products
`
`7.
`
`On information and belief, Defendant Cisco is a California corporation with its principal
`
`place of business at 170 West Tasman Drive, San Jose, California 95134. Cisco can be served
`
`through its registered agent, Prentice Hall Corporation System, 211 E. 7th Street, Suite 620,
`
`Austin, TX 78701.
`
`8.
`
`The Accused Products include firewall products such as the Cisco Firepower 4100 and the
`
`Cisco Secure Web Application Firewall, aggregation router products such as the Cisco ASR 901,
`
`wireless access points such as the Cisco Catalyst 9100, network switch products such as the Cisco
`
`Catalyst 9500.
`
`2
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 2 of 26
`
`

`

`Jurisdiction and V enue
`
`9.
`
`This action arises under the patent laws of the United States, Title 35 of the United States
`
`Code. This Court has original subject matter jurisdiction pursuant to 28 U.S.C. §§ 1331 and
`
`1338(a).
`
`10.
`
`This Court has personal jurisdiction over Cisco in this action because, among other reasons,
`
`Cisco has committed acts within the Eastern District of Texas giving rise to this action and has
`
`established minimum contacts with the forum state of Texas. Cisco maintains several places of
`
`business within the State, including at 2250 East President George Bush Turnpike, Richardson,
`
`TX 75082. Cisco directly and/or through subsidiaries or intermediaries (including distributors,
`
`retailers, and others), has committed and continues to commit acts of infringement in this District
`
`by, among other things, making, using, importing, offering for sale, and/or selling products and/or
`
`services that infringe the patents-in-suit. Thus, Cisco purposefully availed itself of the benefits of
`
`doing business in the State of Texas and the exercise of jurisdiction over Cisco would not offend
`
`traditional notions of fair play and substantial justice. Cisco is registered to do business in the State
`
`of Texas, and has appointed Prentice Hall Corporation System, 211 E. 7th Street, Suite 620, Austin,
`
`TX 78701 as its agent for service of process.
`
`11.
`
`Venue is proper in this district under 28 U.S.C. §1400(b) and 28 U.S.C. §§ 1391(c).
`
`Defendants have regular and established places of business in this district as set forth above.
`
`Count 1 – Claim for infringement of the ’6 30 patent.
`
`12.
`
`Lionra incorporates by reference each of the allegations in paragraphs 1–11 above and
`
`further alleges as follows:
`
`13.
`
`On March 29, 2011, the United States Patent and Trademark Office issued U.S. Patent No.
`
`7,916,630, entitled “Monitoring Condition of Network with Distributed Components.” Ex. 1.
`
`3
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 3 of 26
`
`

`

`14.
`
`Lionra is the owner of the ’630 patent with full rights to pursue recovery of royalties for
`
`damages for infringement, including full rights to recover past and future damages.
`
`15.
`
`16.
`
`Each claim of the ’630 patent is valid, enforceable, and patent-eligible.
`
`Lionra and its predecessors in interest have satisfied the requirements of 35 U.S.C. § 287(a)
`
`with respect to the ’630 patent, and Lionra is entitled to damages for Defendant’s past
`
`infringement.
`
`17.
`
`Defendant has directly infringed (literally and equivalently) and induced others to infringe
`
`the ’630 patent by making, using, selling, offering for sale, or importing products that infringe the
`
`claims of the ’630 patent and by inducing others to infringe the claims of the ’630 patent without
`
`a license or permission from Lionra. These products include without limitation the Cisco ASR 901
`
`Router, which infringes at least claim 1 of the ’630 patent.
`
`18.
`
`On information and belief, the ASR 901 performs a method for monitoring a system
`
`condition of a network with distributed components organized in a logical ring structure:
`
`(https://www.cisco.com/c/en/us/td/docs/wireless/asr_901/Configuration/Guide/b_asr901-
`
`scg/b_asr901-scg_chapter_0111111.pdf at 1.)
`
`19.
`
`On information and belief, in the ASR 901 each component in the system monitors only a
`
`single respective neighboring component among said distributed components that is a predecessor
`
`
`
`4
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 4 of 26
`
`

`

`or successor of said each component in the logical ring structure to determine a current condition
`
`of the respective neighboring component:
`
`
`
`
`
`(https://www.cisco.com/c/en/us/td/docs/wireless/asr_901s/scg/b_scg_for_asr901s/b_scg_for_asr
`
`901s_chapter_0101011.pdf at 3, 5.)
`
`20.
`
`On information and belief, in the ASR 901 each component in the system informs all other
`
`components of the system about the current condition of the respective neighboring component
`
`when the current condition corresponds to at least one predefined condition:
`
`5
`
`
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 5 of 26
`
`

`

`(https://www.cisco.com/c/en/us/td/docs/wireless/asr_901s/scg/b_scg_for_asr901s/b_scg_for_asr
`
`901s_chapter_0101011.pdf at 6.)
`
`Count 2 – Claim for infringement of the ’ 612 patent.
`
`21.
`
`Lionra incorporates by reference each of the allegations in paragraphs 1–20 above and
`
`further alleges as follows:
`
`22.
`
`On October 2, 2013, the United States Patent and Trademark Office issued U.S. Patent No.
`
`8,566,612, entitled “System and Method for a Secure I/O Interface.” Ex. 2.
`
`23.
`
`Lionra is the owner of the ’612 patent with full rights to pursue recovery of royalties for
`
`damages for infringement, including full rights to recover past and future damages.
`
`24.
`
`25.
`
`Each claim of the ’612 patent is valid, enforceable, and patent-eligible.
`
`Lionra and its predecessors in interest have satisfied the requirements of 35 U.S.C. § 287(a)
`
`with respect to the ’612 patent, and Lionra is entitled to damages for Defendant’s past
`
`infringement.
`
`26.
`
`Defendant has directly infringed (literally and equivalently) and induced others to infringe
`
`the ’612 patent by making, using, selling, offering for sale, or importing products that infringe the
`
`claims of the ’612 patent and by inducing others to infringe the claims of the ’612 patent without
`
`a license or permission from Lionra. These products include without limitation the Cisco
`
`Firepower 4100 Series, which infringes at least claim 1 of the ’612 patent.
`
`27.
`
`On information and belief, the Cisco Firepower 4100 includes a security processor which
`
`includes a switching system to send the outgoing packets and receive the incoming packets:
`
`6
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 6 of 26
`
`

`

`
`
`
`
`(https://www.cisco.com/c/en/us/products/collateral/security/firepower-4100-series/datasheet-c78-
`
`742474.html)
`
`28.
`
`On information and belief, the Cisco Firepower 4100 includes a packet engine, coupled to
`
`the switching system, to handle classification processing for the incoming packets received by the
`
`packet engine from the switching system and the outgoing packets sent by the packet engine to the
`
`switching system, wherein the packet engine is one of a plurality of packet engines and
`
`substantially all of the incoming and outgoing packets to the security processor transit one of the
`
`plurality of packet engines:
`
`
`
`7
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 7 of 26
`
`

`

`(https://www.cisco.com/c/en/us/products/collateral/security/firepower-4100-series/datasheet-c78-
`
`742474.html)
`
`
`
`(https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-
`
`config/710/management-center-device-config-71/intrusion-overview.html)
`
`29.
`
`On information and belief, the Cisco Firepower 4100 includes a cryptographic core,
`
`coupled to the packet engine and receiving the incoming packets from the switching system via
`
`the packet engine and communicating the outgoing packets to the switching system via the packet
`
`engine, to provide encryption and decryption processing for packets received from and sent to the
`
`packet engine, wherein the packet engine is interposed between the switching system and the
`
`cryptographic core:
`
`(https://www.cisco.com/c/en/us/products/collateral/security/firepower-4100-series/datasheet-c78-
`
`742474.html)
`
`(https://www.cisco.com/c/en/us/td/docs/security/firepower/623/fdm/fptd-fdm-config-guide-
`
`623/fptd-fdm-ssl-decryption.pdf at 1.)
`
`30.
`
`On information and belief, the Cisco Firepower 4100 includes a signature database:
`
`8
`
`
`
`
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 8 of 26
`
`

`

`(https://www.cisco.com/c/en/us/products/collateral/security/firepower-4100-series/datasheet-
`
`c78-742474.html)
`
`
`
`
`
`(https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-
`
`config/710/management-center-device-config-71/intrusion-overview.html)
`
`31.
`
`On information and belief, the Cisco Firepower 4100 includes an intrusion detection
`
`system coupled between the cryptographic core and the packet engine and responsive to at least
`
`one packet matching a signature stored in the signature database:
`
`
`
`9
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 9 of 26
`
`

`

`(https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-
`
`guide-v63/overview_of_network_analysis_and_intrusion_policies.pdf at 1, 2.)
`
`
`
`
`
`(https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-
`
`config/710/management-center-device-config-71/intrusion-overview.html)
`
`Count 3 – Claim for infringement of the ’ 323 patent.
`
`32.
`
`Lionra incorporates by reference each of the allegations in paragraphs 1–31 above and
`
`further alleges as follows:
`
`33.
`
`On November 16, 2006, the United States Patent and Trademark Office issued U.S. Patent
`
`No. 7,921,323, entitled “Reconfigurable Communications Infrastructure for ASIC Networks.”
`
`Ex. 3.
`
`34.
`
`Lionra is the owner of the ’323 patent with full rights to pursue recovery of royalties for
`
`damages for infringement, including full rights to recover past and future damages.
`
`35.
`
`Each claim of the ’323 patent is valid, enforceable, and patent-eligible.
`
`10
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 10 of 26
`
`

`

`36.
`
`Lionra and its predecessors in interest have satisfied the requirements of 35 U.S.C. § 287(a)
`
`with respect to the ’323 patent, and Lionra is entitled to damages for Defendant’s past
`
`infringement.
`
`37.
`
`Defendant has directly infringed (literally and equivalently) and induced others to infringe
`
`the ’323 patent by making, using, selling, offering for sale, or importing products that infringe the
`
`claims of the ’323 patent and by inducing others to infringe the claims of the ’323 patent without
`
`a license or permission from Lionra. These products include without limitation the Cisco Catalyst
`
`9500 Series, which infringes at least claim 27 of the ’323 patent.
`
`38.
`
`On information and belief, the Cisco Catalyst 9500 is designed and intended for use in a
`
`communications infrastructure, comprising two or more separate signal processing circuits:
`
`(https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-
`
`9/configuration_guide/ha/b_169_ha_9500_cg.pdf at 14.)
`
`
`
`11
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 11 of 26
`
`

`

`39.
`
`On information and belief, each one of said two or more signal processing circuits includes
`
`multiple ASIC devices that each itself includes a packet router:
`
`(https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-9500-series-switches/white-
`
`paper-c11-741484.pdf at 11.)
`
`
`
`12
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 12 of 26
`
`

`

`
`
`(https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-9500-series-switches/white-
`
`paper-c11-741484.pdf at 22.)
`
`40.
`
`On information and belief, said packet router of each one of said ASIC devices of each
`
`given one of said respective two or more signal processing circuits being coupled through
`
`respective first and second common interfaces and an intervening high speed serial optical link to
`
`a respective packet router of each of the ASIC devices of each other of said two or more signal
`
`13
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 13 of 26
`
`

`

`processing circuits with no other processing device intervening between the high speed optical link
`
`and said ASIC devices of each of said two or more signal processing circuits:
`
`(https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-9500-series-switches/white-
`
`
`
`paper-c11-741484.pdf at 15.)
`
`14
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 14 of 26
`
`

`

`(https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-
`
`9/configuration_guide/ha/b_169_ha_9500_cg.pdf at 14.)
`
`Count 4 – Claim for infringement of the ’ 708 patent.
`
`
`
`41.
`
`Lionra incorporates by reference each of the allegations in paragraphs 1–40 above and
`
`further alleges as follows:
`
`42.
`
`On November 27, 2007, the United States Patent and Trademark Office issued U.S. Patent
`
`No. 7,302,708, entitled “Enforcing Computer Security Utilizing an Adaptive Lattice Mechanism.”
`
`Ex. 4.
`
`43.
`
`Lionra is the owner of the ’708 patent with full rights to pursue recovery of royalties for
`
`damages for infringement, including full rights to recover past and future damages.
`
`44.
`
`Each claim of the ’708 patent is valid, enforceable, and patent-eligible.
`
`15
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 15 of 26
`
`

`

`45.
`
`Lionra and its predecessors in interest have satisfied the requirements of 35 U.S.C. § 287(a)
`
`with respect to the ’708 patent, and Lionra is entitled to damages for Defendant’s past
`
`infringement.
`
`46.
`
`Defendant has directly infringed (literally and equivalently) and induced others to infringe
`
`the ’708 patent by making, using, selling, offering for sale, or importing products that infringe the
`
`claims of the ’708 patent and by inducing others to infringe the claims of the ’708 patent without
`
`a license or permission from Lionra. These products include without limitation the Cisco Secure
`
`Web Application Firewall, which infringes at least claim 1 of the ’708 patent.
`
`47.
`
`On information and belief, the Secure Web Application Firewall performs a method for
`
`secure access to a computer system:
`
`(https://www.cisco.com/c/en/us/products/collateral/security/advanced-waf-bot-aag.pdf)
`
`(https://www.cisco.com/c/dam/en/us/products/collateral/security/secure-ddos-services.pdf)
`
`16
`
`
`
`
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 16 of 26
`
`

`

`48.
`
`On information and belief, the Secure Web Application Firewall receives in the computer
`
`system a request from an entity with a predetermined access level for access to a first base node
`
`representing at least one of an information type and a computer system function:
`
`(https://www.radware.com/partners/cisco-waf-bot/)
`
`(https://www.cisco.com/c/en/us/products/collateral/security/advanced-waf-bot-aag.pdf)
`
`
`
`
`
`
`
`(https://www.cisco.com/c/en/us/products/collateral/security/advanced-waf-bot-aag.pdf)
`
`49.
`
`On information and belief, the Secure Web Application Firewall determines if the access
`
`request completes a prohibited temporal access pattern for the entity:
`
`17
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 17 of 26
`
`

`

`(https://www.cisco.com/c/en/us/products/collateral/security/advanced-waf-bot-aag.pdf)
`
`(https://www.cisco.com/c/en/us/products/collateral/security/advanced-waf-bot-aag.pdf)
`
`(https://blog.radware.com/security/2019/06/idba-a-patented-bot-detection-technology/)
`
`50.
`
`On information and belief, the Secure Web Application Firewall compares a minimum
`
`access level established for the first base node to the predetermined access level:
`
`
`
`(https://www.radware.com/partners/cisco-waf-bot/)
`
`18
`
`
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 18 of 26
`
`

`

`
`
`(https://www.cisco.com/c/en/us/products/collateral/security/advanced-waf-bot-aag.pdf)
`
`51.
`
`On information and belief, the Secure Web Application Firewall grants the access request
`
`only if it does not complete a prohibited temporal access pattern for the entity and the minimum
`
`access level for the first base node does not exceed the predetermined access level:
`
`(https://www.radware.com/partners/cisco-waf-bot/)
`
`52.
`
`On information and belief, the Secure Web Application Firewall denies the request if the
`
`access request completes a prohibited temporal access pattern for the entity:
`
`
`
`(https://www.radware.com/partners/cisco-waf-bot/)
`
`
`
`19
`
`
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 19 of 26
`
`

`

`Count 5 – Claim for infringement of the ’ 436 patent.
`
`53.
`
`Lionra incorporates by reference each of the allegations in paragraphs 1–52 above and
`
`further alleges as follows:
`
`54.
`
`On March 23, 2010, the United States Patent and Trademark Office issued U.S. Patent No.
`
`7,685,436, entitled “System and Method for a Secure I/O Interface.” Ex. 5.
`
`55.
`
`Lionra is the owner of the ’436 patent with full rights to pursue recovery of royalties for
`
`damages for infringement, including full rights to recover past and future damages.
`
`56.
`
`57.
`
`Each claim of the ’436 patent is valid, enforceable, and patent-eligible.
`
`Lionra and its predecessors in interest have satisfied the requirements of 35 U.S.C. § 287(a)
`
`with respect to the ’436 patent, and Lionra is entitled to damages for Defendant’s past
`
`infringement.
`
`58.
`
`Defendant has directly infringed (literally and equivalently) and induced others to infringe
`
`the ’436 patent by making, using, selling, offering for sale, or importing products that infringe the
`
`claims of the ’436 patent and by inducing others to infringe the claims of the ’436 patent without
`
`a license or permission from Lionra. These products include without limitation the Cisco
`
`Firepower 4100, which infringes at least claim 1 of the ’436 patent.
`
`59.
`
`On information and belief, the Cisco Firepower 4100 includes a security processor which
`
`includes a switching system to send the outgoing packets and receive the incoming packets:
`
`
`
`20
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 20 of 26
`
`

`

`
`
`(https://www.cisco.com/c/en/us/products/collateral/security/firepower-4100-series/datasheet-
`
`c78-742474.html)
`
`60.
`
`On information and belief, the Cisco Firepower 4100 includes a packet engine, coupled to
`
`the switching system, to handle classification processing for the incoming packets received by the
`
`packet engine from the switching system and the outgoing packets sent by the packet engine to the
`
`switching system, wherein the packet engine is one of a plurality of packet engines and
`
`substantially all of the incoming and outgoing packets to the security processor transit one of the
`
`plurality of packet engines:
`
`(https://www.cisco.com/c/en/us/products/collateral/security/firepower-4100-series/datasheet-
`
`c78-742474.html)
`
`
`
`21
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 21 of 26
`
`

`

`
`
`(https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-
`
`config/710/management-center-device-config-71/intrusion-overview.html)
`
`61.
`
`On information and belief, the Cisco Firepower 4100 provides the incoming packets and
`
`outgoing packets with a tag upon ingress to one of the plurality of packet engines and the tag
`
`determines an egress path within the security processor upon exit from a corresponding
`
`cryptographic core:
`
`
`
`
`
`(https://www.cisco.com/c/en/us/td/docs/security/asa/asa914/configuration/general/asa-914-
`
`general-config/interface-vlan.pdf at 1, 2.)
`
`62.
`
`On information and belief, the Cisco Firepower 4100 includes a cryptographic core,
`
`coupled to the packet engine and receiving the incoming packets from the switching system via
`
`22
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 22 of 26
`
`

`

`the packet engine and communicating the outgoing packets to the switching system via the packet
`
`engine, to provide encryption and decryption processing for packets received from and sent to the
`
`packet engine, wherein the packet engine is interposed between the switching system and the
`
`cryptographic core:
`
`(https://www.cisco.com/c/en/us/products/collateral/security/firepower-4100-series/datasheet-
`
`c78-742474.html)
`
`(https://www.cisco.com/c/en/us/td/docs/security/firepower/623/fdm/fptd-fdm-config-guide-
`
`623/fptd-fdm-ssl-decryption.pdf at 1.)
`
`63.
`
`On information and belief, the Cisco Firepower 4100 includes a signature database:
`
`(https://www.cisco.com/c/en/us/products/collateral/security/firepower-4100-series/datasheet-
`
`c78-742474.html)
`
`
`
`
`
`
`
`23
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 23 of 26
`
`

`

`
`
`(https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-
`
`config/710/management-center-device-config-71/intrusion-overview.html)
`
`64.
`
`On information and belief, the Cisco Firepower 4100 includes an intrusion detection
`
`system coupled between the cryptographic core and the packet engine and responsive to at least
`
`one packet matching a signature stored in the signature database:
`
`
`
`
`
`(https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-
`
`guide-v63/overview_of_network_analysis_and_intrusion_policies.pdf at 1, 2.)
`
`24
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 24 of 26
`
`

`

`(https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-
`
`config/710/management-center-device-config-71/intrusion-overview.html)
`
`65.
`
`Pursuant to Rule 38 of the Federal Rules of Civil Procedure, Lionra requests a trial by
`
`Jury Trial D emanded
`
`
`
`jury of any issues so triable by right.
`
`Prayer for Relief
`
`
`
`Plaintiff Lionra respectfully requests the following relief from this Court:
`
`A.
`
`A judgment in favor of Lionra that Defendant has infringed the ’630, ’612, ’323, ’708,
`
`and ’436 patents, and that the ’630, ’612, ’323, ’708, and ’436 patents are valid, enforceable, and
`
`patent-eligible;
`
`B.
`
`A judgment and order requiring Defendant to pay Lionra compensatory damages, costs,
`
`expenses, and pre- and post-judgment interest for its infringement of the asserted patents, as
`
`provided under 35 U.S.C. § 284;
`
`C.
`
`A permanent injunction prohibiting Defendant from further acts of infringement of
`
`the ’630, ’612, ’323, ’708, and ’436 patents;
`
`D.
`
`A judgment and order requiring Defendant to provide an accounting and to pay
`
`supplemental damages to Lionra, including, without limitation, pre-judgment and post-judgment
`
`interest;
`
`E.
`
`A finding that this case is exceptional under 35 U.S.C. § 285, and an award of Lionra’s
`
`reasonable attorney’s fees and costs; and
`
`F.
`
`Any and all other relief to which Lionra may be entitled.
`
`25
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 25 of 26
`
`

`

`
`
`Dated: August 8, 2022
`
`
`
` /s/ Reza Mirzaie
`Reza Mirzaie
`CA State Bar No. 246953
`Marc A. Fenster
`CA State Bar No. 181067
`Neil A. Rubin
`CA State Bar No. 250761
`RUSS AUGUST & KABAT
`12424 Wilshire Boulevard, 12th Floor
`Los Angeles, CA 90025
`Telephone: 310-826-7474
`Email: rmirzaie@raklaw.com
`Email: mfenster@raklaw.com
`Email: nrubin@raklaw.com
`
`ATTORNEYS FOR PLAINTIFF,
`LIONRA TECHNOLOGIES LIMITED
`
`26
`
`Ex. 1017
`CISCO SYSTEMS, INC. / Page 26 of 26
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket