KTG has worked on diverse Technology and Intellectual Property problems involving computers for leading global technology giants, government organizations, courts, and law offices. The following are a few representative KTG engagements. For more information, please contact us at info@KellyTechnologyGroup.com.
Client Name Confidential
Wireless Chipset Research
KTG was engaged by a leader in the computer industry to analyze the behavior of their mobile computer wireless chipset in a noisy wireless environment. KTG designed and conducted targeted experiments in their test lab to characterize certain behaviors of the chipset in order to answer specific queries posed by the client. The success of this project led to multiple repeat engagements with the client in computer application areas relating to cell phone microprocessors, battery chargers, cell phone cameras, etc.
Client Name Confidential
A billion dollar leader in the Electronic Design Automation market looking to buy a smaller company under the cloud of patent litigation turned to KTG for help. KTG investigated the patents and the software technology and advised the client against the acquisition because the technology was likely infringed. KTG's client heeded the advice, and saved a significant sum, for the smaller company was indeed subsequently found to infringe. The client then engaged KTG again for another acquisition. KTG interviewed the management of the company and conducted a detailed analysis of the company's intellectual property and development processes. KTG advised the client of the findings, and the company was ultimately acquired for over 90 million dollars.
Cisco Storage Routers
After acquiring a startup company developing iSCSI products for $450 Million, Cisco was sued by a SAN equipment manufacturer that claimed ownership of the idea for the iSCSI devices. Cisco looked to KTG experts for help. After a careful analysis of the software, hardware, and development documents, KTG experts determined that there was no misappropriation of intellectual property. The plaintiff was unable to rebut KTG's analysis, and consequently the suit was dismissed. This led to a further engagement with Cisco when a defunct network equipment startup later claimed ownership of the idea for the same iSCSI devices. Just as before, KTG's analysis revealed no misappropriation of intellectual property. The case went to trial, and the Court agreed with KTG's analysis. Cisco won the case.
Software Clean Room for a DB2 SQL parser
A competitor of CA had developed a software product contaminated with CA's intellectual property. CA's competitor attempted to develop a "clean" product in a software clean room environment. CA sought KTG's help in evaluating the software clean room and the product that had been developed. KTG analyzed the protocols and procedures that had supposedly been established as well as the product that had been developed. During the course of the engagement, KTG reviewed over a hundred thousand pages of documents to develop a comprehensive picture of the practices that had been followed. KTG concluded that there were numerous flaws in the software clean room implementation. Based on KTG's analysis, CA successfully obtained a preliminary injunction on the competitor's use of the still-contaminated product developed in the flawed software clean room.
Nintendo's Wii Balance Board - an accessory for the popular Wii game console - was accused of infringing a patent for an isometric exercise system including a sensor and computer processor. KTG analyzed strain data as it flowed through the Wii Balance Board hardware (by capturing data transferred over the I2C bus from the strain sensor to the microcontroller and data transferred over the Bluetooth channel from the Wii Balance Board to the console) and software for processing the data on the console. Based on this analysis, it was KTG's expert opinion that the Wii Balance Board did not infringe the asserted patent. Ultimately, the District Court found, on summary judgment, that Nintendo did not infringe the patent.
Over the course of KTG's numerous engagements, KTG has performed in-depth analyses of a wide range of computer-related technology products. KTG's analyses have included reviews of millions of lines of software and hadware design source code, reviewing design documents and standards specifications, reverse engineering executables, forensic analysis of computers and mobile devices, designing and implementing experiment test-beds, and many other approaches to solve complex computer-related technology problems. Some of the technologies and products that KTG has analyzed include:
- Airlines passenger information intelligence systems and standards
- Alcatel Eye-box
- AMD processors
- Audio compression technologies
- Automotive software
- BIOS implemntations including ACPI
- Business Objects Data Integrator
- Call center infrastructure (including Interactive Voice Response systems, PBX/ACDs, computer telephony equipment, etc. from various vendors such as Avaya, Intervoice, etc.) of more than 20 US corporations.
- Casino management software
- Cell phones and other wireless devices
- Circuit design and modeling software
- Consumer set-top boxes
- Cryptographic algorithms
- Desktop Virtualization
- Equity research and technical analysis software used by financial companies
- Firmware and software for computer peripherals such as CD/DVD drives
- Firmware and software for wireless devices such as smartphones and tablets
- Forensic images of computers and mobile devices including smartphones and iPads
- Genotyping software
- Hardware components such as SuperIO controllers, graphics cards, network interface cards, etc. from various vendors
- Hundreds of versions of CD and DVD drives
- IBM mainframe and eServer (including AS/400) applications
- IBM ETL tools including DataStage
- Informatica PowerMart
- Intel processors
- Internet browser software including Microsoft Internet Explorer, Firefox and Chrome.
- iPhone apps
- Limelight Networks' content delivery network architecture
- Linux operating system (various flavors)
- Lucent AnyPath Messaging system
- Lucent NavisAccess
- Macintosh computers from different eras including Motorola 68000, PowerPC and Intel processors
- McAfee Host Intrusion Prevention
- McAfee IntruShield appliances
- McAfee Total Protection for Small Business
- Microsoft Windows Operating Systems (most versions)
- Mobile operating systems including iOS and Android
- Network firewalls
- Network security, including SSL and TLS
- Networking protocols and the OSI stack
- Norton Ghost
- Operating systems and applications including Mac Systems 6-9, Mac OS X, Hypercard, etc.
- Phoenix BIOS
- PowerQuest DeployCenter
- PowerQuest DriveImage
- PowerQuest ServerMagic
- Printer software
- Scores of versions of Trigem & ASUS PC motherboards used in desktops sold by HP, Gateway, etc.
- Software used for speciality applications such as orthodontics, bio-statistical analysis, etc.
- Storage routers by various vendors
- Sun's NEWS
- Video compression implementations including H.264
- Video encoding software for cameras and camcorders
- Virtual private networks
- VMWare Virtual Operating Systems
- Wireless medical devices
- X-Window system implementations