InfoExpress vs. Cisco: Network Access Control Patent Case Stayed Pending IPR
What would you like to do next?
Choose your path based on your current needs:
📋 Case Summary
| Case Name | InfoExpress, Inc. v. Cisco Systems, Inc. |
| Case Number | 4:23-cv-02698 |
| Court | Northern District of California |
| Duration | May 2023 – May 2025 2 years |
| Outcome | Administrative Stay Pending IPR |
| Patents at Issue | |
| Accused Products | Cisco Identity Services Engine (ISE) platform, Secure Network Servers, 9000-series routers, and Catalyst wireless access points. |
Case Overview
The Parties
⚖️ Plaintiff
California-based cybersecurity company focused on network access control solutions, holding a portfolio of patents directed at managing and securing endpoint access to enterprise networks.
🛡️ Defendant
Dominant force in enterprise networking, with its Identity Services Engine (ISE) representing a flagship platform for network access policy management.
The Patents at Issue
InfoExpress asserted six U.S. patents, all relating to network access control architecture and endpoint security enforcement:
- • US7,523,484 B2 — foundational NAC methodology
- • US8,051,460 B2 — access control policy enforcement
- • US8,117,645 B2 — endpoint compliance verification
- • US8,347,350 B2 — network security management systems
- • US8,578,444 B2 — identity-based access control
- • US8,677,450 B2 — dynamic network access provisioning
The Accused Products
InfoExpress targeted a commercially significant cross-section of Cisco’s portfolio:
- • Cisco Secure Network Servers (SNS): Models 3615, 3655, and 3695
- • Cisco 9000-series routers implementing ISE
- • Cisco Catalyst 9100 wireless access points (nine distinct models) and Meraki cloud-controlled access points
The breadth of accused products signals a deliberate assertion strategy designed to implicate Cisco’s enterprise networking revenue at multiple hardware levels.
Developing a network security product?
Check if your NAC implementation might infringe these or related patents.
Litigation Timeline & Procedural History
The complaint was filed on May 31, 2023, in the Northern District of California — a venue favorable to technology patent disputes given its judicial familiarity with complex IP matters and proximity to Silicon Valley.
Over the subsequent 727 days, the case progressed through early-stage litigation before reaching a pivotal procedural juncture: Cisco pursued inter partes review at the USPTO, challenging the validity of the asserted patents before PTAB. This is a well-established defensive strategy in high-stakes patent litigation, particularly where the defendant believes the asserted patents are vulnerable on prior art or obviousness grounds.
On May 27, 2025, the district court entered an administrative closure order, staying the case for statistical purposes while IPR proceedings remain pending. The court expressly preserved all parties’ rights, requiring a status update within 30 days of IPR resolution to determine how the district court action should proceed. No claim construction hearing, summary judgment ruling, or trial has occurred at the district court level.
The Verdict & Legal Analysis
Outcome
This case has not reached a merits verdict. The district court’s May 27, 2025 order constitutes an administrative stay — a procedural mechanism that closes the case for court statistical reporting while substantive rights remain fully intact. Critically, the court’s order states explicitly: “Nothing contained in this order shall be construed as a dismissal or disposition of the action.”
No damages have been awarded, no injunctive relief has been granted or denied, and no claim construction rulings have issued from the district court record available.
Verdict Cause Analysis
The operative procedural driver is inter partes review, a post-grant USPTO proceeding through which Cisco is challenging the validity of InfoExpress’s asserted patents. IPR petitions can be filed by any party that has been served with a patent infringement complaint, and they are routinely deployed by well-resourced defendants like Cisco to:
- Shift validity adjudication to PTAB, where the preponderance of evidence standard (rather than clear and convincing evidence in district court) governs
- Potentially cancel or narrow patent claims before expensive district court proceedings, including discovery and expert phases
- Create estoppel leverage over future district court proceedings depending on IPR outcome
The court’s willingness to administratively close the case reflects the Northern District’s typical deference to ongoing PTAB proceedings, particularly where IPR institution is confirmed or likely to resolve threshold validity questions.
Legal Significance
This case sits at the intersection of two significant doctrinal areas: NAC technology patent scope and the parallel PTAB/district court litigation dynamic established post-America Invents Act. The six asserted patents span application filing dates ranging from pre-AIA to post-AIA frameworks, which may create nuanced prosecution history and validity arguments across the portfolio.
If PTAB cancels or narrows claims across multiple patents, InfoExpress’s district court case could be substantially weakened or mooted. Conversely, if claims survive IPR, the case returns to district court with validated patents — a significantly strengthened litigation posture.
Strategic Takeaways
For Patent Holders: A multi-patent assertion strategy targeting an integrated product platform (ISE across hardware lines) maximizes commercial leverage but also multiplies IPR exposure. Ensure prosecution history supports broad claim scope while anticipating PTAB scrutiny.
For Accused Infringers: IPR remains the most cost-effective front-line defense for large defendants. Cisco’s strategy — challenging validity at PTAB before district court proceedings intensify — is textbook for defendants with resources and a belief in prior art vulnerability.
For R&D Teams: Products like ISE that serve as platform infrastructure across multiple hardware categories create concentrated patent risk. Freedom-to-operate (FTO) analyses should account for NAC-specific patent portfolios held by specialized innovators, not just direct competitors.
Drafting a network security patent?
Learn from this case. Use AI to draft stronger claims that can withstand IPR challenges.
Power Your Patent Strategy with PatSnap Eureka IP
From novelty searches to patent drafting, PatSnap Eureka’s AI-powered tools help you navigate the patent landscape with confidence.
⚠️ Freedom to Operate (FTO) Analysis
This case highlights critical IP risks in network access control technology. Choose your next step:
📋 Understand This Case’s Impact
Learn about the specific risks and implications from this litigation.
- View all 6 related patents in this technology space
- See which companies are most active in NAC patents
- Understand claim construction patterns
🔍 Check My Product’s Risk
Run a comprehensive FTO analysis for your own technology or product.
- Input your product description or technical features
- AI identifies potentially blocking patents
- Get actionable risk assessment report
High Risk Area
Network access control implementations
6 Asserted Patents
Challenged in IPR
Design-Around Options
Potential for NAC architecture
✅ Key Takeaways
For Patent Attorneys & Litigators
Administrative closure pending IPR is not a dismissal — district court jurisdiction is fully preserved.
Search related case law →Multi-patent assertions against integrated platforms create both leverage and amplified IPR risk.
Explore PTAB strategies →PTAB’s preponderance standard remains a structurally advantageous validity forum for well-resourced defendants.
Analyze IPR success rates →For IP Professionals
Monitor IPR dockets for the asserted InfoExpress patents for outcome signals.
View PTAB dockets →NAC patent portfolios from the 2004–2013 filing window remain active enforcement assets.
Explore NAC patent trends →For R&D Risk Management
Platform-level products implementing access control policy face aggregated patent exposure across integrated hardware lines.
Start FTO analysis for my product →Zero-trust architecture implementations should include FTO review of foundational NAC patent families.
Conduct a comprehensive FTO →Ready to Strengthen Your Patent Strategy?
Join thousands of IP professionals using PatSnap Eureka to conduct prior art searches, draft patents, and analyze competitive landscapes.
📑 Table of Contents
🚀 PatSnap Eureka IP Tools
🔍Novelty Search
Find prior art instantly
Patent Drafting
AI-assisted claim writing
FTO Analysis
Assess infringement risk
Concerned About Your Network Product?
Don’t wait for litigation. Check your product’s freedom to operate now.
Run FTO for My Product⚡ Accelerate Your IP Strategy
Join 15,000+ IP professionals using PatSnap Eureka for patent research and analysis.