For IP teams in need of a testifying expert, Crimson Vista is the consulting home of Dr. Seth James Nielson. Dr. Nielson has consulted on a wide range of cases including networking, firewalls, cryptographic protocols, authentication, antivirus, and many others. He has testified at trial and been deposed numerous times. Dr. Nielson is also proficient at source code reviews and analyzing technology, including legacy tech.
When it comes to source code review, Crimson Vista believes it is a form of reverse engineering. When reviewing code, an expert must have strong engineering foundations to understand which paradigms are implemented, what goals the software has, what methods are used to reach those goals, and what nuances are present, such as best-practice software development lifecycle, etc. The highest quality source code reviews will come from experts with strong foundations, who are able to reverse engineer a mental model of how the software works, and provide in-depth analysis from there.
No matter how large the portfolio, if it's within our areas of expertise, we can evaluate intellectual property and provide insightful analysis. Our experience as leaders in high-tech, combined without our experience supporting legal teams, enable us to rank references based on the clarity of the specification, the novelty of the invention, and the impact of the claims. Whether our clients are evaluating IP for purchase, negotiating portfolio cross-licensing, or investigating potential infringement, our research can enable better outcomes and more intelligent strategy.
Looking for a deep prior art search beyond the basic terms analysis? Our people have been in the trenches both technically and legally, and it shows in the quality of results we find. We offer three tiers of fixed-price prior art searching.
Our unique approach to analyzing cybersecurity maturity is rooted in context-based, security engineering foundations. As professionals in the industry, we understand navigating business priorities and implementing complex systems. Security engineering incorporates a range of disciplines, which we believe to be the only way to gain a factual picture of cybersecurity maturity.