InfoExpress vs. Cisco: Network Access Control Patent Dispute Stayed for IPR
When a smaller cybersecurity innovator takes on one of the world’s largest networking companies, the procedural chess match can be as decisive as any jury verdict. In InfoExpress, Inc. v. Cisco Systems, Inc. (Case No. 4:23-cv-02698), filed in the U.S. District Court for the Northern District of California, the litigation over six network access control patents has been administratively closed — not dismissed — while inter partes review (IPR) proceedings play out before the USPTO’s Patent Trial and Appeal Board (PTAB).
Filed on May 31, 2023, and closed for statistical purposes on May 27, 2025, after 727 days, this case centers on Cisco’s Identity Services Engine (ISE) platform and a range of hardware products including Secure Network Servers, 9000-series routers, and Catalyst wireless access points. For patent attorneys, IP professionals, and R&D teams operating in the network security space, the strategic implications of this stay — and what follows — deserve careful attention.
📋 Case Summary
| Case Name | InfoExpress, Inc. v. Cisco Systems, Inc. |
| Case Number | 4:23-cv-02698 |
| Court | U.S. District Court for the Northern District of California |
| Duration | May 2023 – May 2025 2 years |
| Outcome | Case Stayed for IPR |
| Patents at Issue | |
| Accused Products | Cisco Secure Network Servers, Cisco 9000-Series Routers, Cisco Wireless Access Points |
Case Overview
The Parties
⚖️ Plaintiff
A cybersecurity company specializing in network access control (NAC) solutions with a patent portfolio covering core NAC architecture and policy enforcement technologies.
🛡️ Defendant
A global leader in networking and cybersecurity infrastructure, with its Identity Services Engine (ISE) as one of the most widely deployed NAC platforms in enterprise environments worldwide.
The Patents at Issue
Six U.S. patents are asserted in this action, all directed to network access control technologies:
- • US8347350B2 (App. No. 13/371,381)
- • US8578444B2 (App. No. 13/523,854)
- • US8117645B2 (App. No. 13/157,309)
- • US7523484B2 (App. No. 10/949,179)
- • US8677450B2 (App. No. 13/523,858)
- • US8051460B2 (App. No. 12/273,037)
These patents collectively cover methods and systems for controlling network access based on endpoint compliance, device identity, and policy enforcement — technologies at the operational core of Cisco’s ISE platform.
The Accused Products
InfoExpress targeted three categories of Cisco products:
- • Cisco Secure Network Servers (SNS): Models SNS 3615, 3655, and 3695 — the appliance hardware running ISE
- • Cisco 9000-Series Routers: Implementing ISE-based access control functions
- • Cisco Wireless Access Points: Including Catalyst 9100-series (models 9136, 9196, 9164, 9162, 9130, 9120, 9115, 9105i, 9105w) and Meraki cloud-controlled access points
The breadth of accused products signals InfoExpress’s strategy to capture Cisco’s entire ISE ecosystem rather than isolating a single product line.
Legal Representation
Plaintiff (InfoExpress): Bunsow DeMory LLP and Saul Ewing LLP, with attorneys Andrew F. Schwerin, Brenda Helen Entzminger, Brian Raymond Michalek, Casey T. Grabenstein, Joseph M. Kuo, and Michael E. Flynn-O’Brien.
Defendant (Cisco): Winston & Strawn LLP and Sperling Kenny Nachwalter LLC, with attorneys David Lesht, David P. Enzminger, Eamon Padraic Kelly, Krishnan Padmanabhan, Patrick D. Clark, Scott M. Border, and William Mitchell Logan.
Both sides fielded experienced patent litigation teams with deep IP credentials, signaling neither party treated this as a routine dispute.
Developing NAC Solutions?
Check if your network access control design might infringe these or related patents.
Litigation Timeline & Procedural History
| Milestone | Date |
| Complaint Filed | May 31, 2023 |
| Case Closed (Statistical) | May 27, 2025 |
| Total Duration | 727 days |
The case was filed in the Northern District of California — a venue with substantial experience in complex technology patent disputes and home to Cisco’s headquarters, which may have influenced venue strategy from both sides.
The most consequential procedural development was Cisco’s initiation of inter partes review (IPR) proceedings before the PTAB, challenging the validity of one or more of the six asserted patents. The district court responded by administratively closing the case under a statistical stay, a well-established mechanism used when parallel USPTO proceedings make continued district court litigation premature.
The court’s order expressly preserved all parties’ rights, confirming the action is neither dismissed nor adjudicated on the merits. Within 30 days of IPR resolution, the parties must file a status report — setting the stage for potential resumption of district court proceedings depending on PTAB outcomes.
The Verdict & Legal Analysis
Outcome
This case has not reached a verdict on the merits. The Northern District of California issued an administrative closure order, staying the litigation for statistical purposes while IPR proceedings before the PTAB are resolved. No damages have been awarded, and no injunctive relief has been granted or denied. The substantive infringement and validity questions remain open.
Procedural Analysis: The Strategic IPR Stay
The court’s order reflects a broadly adopted approach in patent litigation: when PTAB proceedings directly challenge the validity of asserted patents, district courts frequently pause proceedings to avoid duplicative effort and potentially contradictory outcomes. This serves judicial economy while giving the USPTO an opportunity to re-examine patent validity with its specialized expertise.
For Cisco, the IPR filing represents a classic dual-track defense strategy: challenge validity at the PTAB while simultaneously defending against infringement claims in district court. If PTAB cancels or narrows the asserted patent claims, Cisco can substantially reduce or eliminate its exposure in the district court litigation — without ever needing to litigate claim construction or infringement on the original claims.
For InfoExpress, the IPR stay introduces uncertainty and delay. A successful IPR defense — surviving PTAB review with claims intact — would return the case to district court with significantly strengthened presumptions of validity and renewed litigation momentum.
Legal Significance
Claim scope is central. The asserted patents cover NAC methods and systems that were filed across application numbers spanning 2004 through 2012, meaning claim construction will likely involve reconciling relatively early-stage network security language with modern ISE architecture. How broadly or narrowly the PTAB and, eventually, the district court construe these claims will determine whether Cisco’s ISE implementation falls within their scope.
IPR estoppel implications are also significant. If Cisco raises prior art grounds at the PTAB and the IPR proceeds to final written decision, Cisco may be estopped from raising those same grounds in district court under 35 U.S.C. § 315(e)(2). This limits Cisco’s invalidity arguments in any subsequent district court litigation — a factor InfoExpress may leverage strategically.
Strategic Takeaways
For patent holders: The InfoExpress approach — asserting a portfolio of six related patents against an entire product ecosystem — maximizes litigation leverage but also invites PTAB challenges on multiple fronts. Patent holders should evaluate IPR vulnerability during pre-suit due diligence and prioritize patents with strong prosecution histories.
For accused infringers: Cisco’s IPR strategy exemplifies best practices for large-scale infringement defendants. Early PTAB petitions can shift case momentum, trigger stays, and create pathways to eliminate liability without district court exposure. Timing the IPR petition to maximize stay probability is a critical tactical decision.
For R&D teams: Cisco’s ISE platform and access point portfolio are now subject to active patent scrutiny. Engineers developing NAC solutions, endpoint compliance systems, or policy-based access control architectures should conduct formal freedom-to-operate (FTO) analysis against InfoExpress’s patent family, particularly patents US7523484B2 and US8051460B2, which carry earlier priority dates.
Considering patenting NAC tech?
Learn from this case. Use AI to draft stronger claims that can withstand litigation.
Power Your Patent Strategy with PatSnap Eureka IP
From novelty searches to patent drafting, PatSnap Eureka’s AI-powered tools help you navigate the patent landscape with confidence.
⚠️ Freedom to Operate (FTO) Analysis
This case highlights critical IP risks in network access control and endpoint security. Choose your next step:
📋 Understand This Case’s Impact
Learn about the specific risks and implications from this litigation in the NAC space.
- View all related patents in this technology space
- See which companies are most active in NAC patents
- Understand claim construction patterns
🔍 Check My Product’s Risk
Run a comprehensive FTO analysis for your own NAC technology or product.
- Input your product description or technical features
- AI identifies potentially blocking patents
- Get actionable risk assessment report
High Risk Area
Endpoint compliance & policy enforcement
6 Asserted Patents
In network access control
Design-Around Options
Available for many NAC architectures
Industry & Competitive Implications
The network access control market — encompassing endpoint verification, zero-trust architecture, and policy enforcement — has become a focal point for patent assertion activity as enterprise security spending accelerates. InfoExpress’s assertion against Cisco’s ISE ecosystem reflects a broader pattern: foundational NAC patent holders are actively monetizing portfolios as the technology reaches mainstream enterprise adoption.
For Cisco, the reputational and financial stakes extend beyond this single case. ISE is deeply embedded in enterprise network architectures globally, and an adverse outcome — whether at PTAB or district court — could affect product roadmap decisions, licensing exposure across the customer base, and competitive positioning against rivals such as Aruba Networks and Forescout.
For the broader cybersecurity industry, this case signals that NAC and zero-trust infrastructure patents from the 2004–2012 era remain viable assertion vehicles. Companies building or acquiring NAC capabilities should audit their technology stacks against these patent families.
Licensing trends in this space suggest that even if PTAB narrows some claims, InfoExpress may pursue a negotiated licensing resolution rather than full trial — particularly if surviving claims are sufficient to establish infringement in principle.
✅ Key Takeaways
For Patent Attorneys & Litigators
Administrative closure pending IPR is not a dismissal — litigation rights are fully preserved and the case may resume within 30 days of PTAB resolution.
Search related case law →IPR estoppel risk under § 315(e)(2) constrains Cisco’s future invalidity defenses if IPR reaches final written decision.
Explore precedents →Six-patent portfolio assertion strategy increases complexity but also diversifies risk across multiple PTAB proceedings.
For IP Professionals
Monitor PTAB dockets for IPR petitions against US7523484B2, US8051460B2, and related InfoExpress patents.
Track PTAB activity →This case exemplifies the dual-track (PTAB + district court) defense model now standard in high-stakes patent litigation.
Portfolio valuation in NAC and zero-trust sectors must account for active assertion risk from foundational patent holders.
For R&D Teams
Conduct FTO analysis on NAC, ISE, and endpoint policy enforcement architectures against the InfoExpress patent family.
Start FTO analysis for my product →Design-around opportunities should be evaluated now, before district court litigation resumes with potentially narrowed but surviving claims.
Explore design-around options →Future Outlook: The 30-day post-IPR status report deadline will be the critical next milestone. Watch for PTAB institution decisions and final written decisions in the parallel proceedings.
FAQ
What patents were involved in InfoExpress v. Cisco?
Six U.S. patents were asserted: US8347350B2, US8578444B2, US8117645B2, US7523484B2, US8677450B2, and US8051460B2 — all directed to network access control technologies.
Why was the case closed without a verdict?
The court administratively closed the case for statistical purposes only while parallel inter partes review (IPR) proceedings before the USPTO PTAB are resolved. No dismissal or merits adjudication has occurred.
How might this case affect network access control patent litigation?
It reinforces that early-generation NAC patents remain viable assertion tools against modern ISE and zero-trust platforms, and that dual-track IPR defense strategies can delay — and potentially reshape — district court litigation outcomes.
Resources
Ready to Strengthen Your Patent Strategy?
Join thousands of IP professionals using PatSnap Eureka to conduct prior art searches, draft patents, and analyze competitive landscapes.
📑 Table of Contents
🚀 PatSnap Eureka IP Tools
🔍Novelty Search
Find prior art instantly
Patent Drafting
AI-assisted claim writing
FTO Analysis
Assess infringement risk
Concerned About Your NAC Product?
Don’t wait for litigation. Check your network access control product’s freedom to operate now.
Run FTO for My NAC Product⚡ Accelerate Your IP Strategy
Join 15,000+ IP professionals using PatSnap Eureka for patent research and analysis.