Checkpoint Systems, Inc. v. Check Point Software Technologies, Inc.

104 F. Supp. 2d 427, 2000 U.S. Dist. LEXIS 9690, 2000 WL 959768
CourtDistrict Court, D. New Jersey
DecidedJuly 12, 2000
DocketCIV.A.96-3153(JBS)
StatusPublished
Cited by16 cases

This text of 104 F. Supp. 2d 427 (Checkpoint Systems, Inc. v. Check Point Software Technologies, Inc.) is published on Counsel Stack Legal Research, covering District Court, D. New Jersey primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Checkpoint Systems, Inc. v. Check Point Software Technologies, Inc., 104 F. Supp. 2d 427, 2000 U.S. Dist. LEXIS 9690, 2000 WL 959768 (D.N.J. 2000).

Opinion

Findings of Fact and Conclusions of Law

SIMANDLE, District Judge:

Table of Contents

I. INTRODUCTION.430

II. PROCEDURAL HISTORY....431

III. FINDINGS OF FACT. t-H co

A. Plaintiff and its business.

1. History and founding of company..

2. Products sold.

a. EAS (Electronic Article Surveillance) Systems.

b. EAC (Electronic Access Control) Systems .

e. CCTV (Closed Circuit Television) Systems.

d. RFID (Radio Frequency Identification Device) .

e. Use of the Checkpoint mark on these products.

3. Percent of revenues.

4. Major competitors and relative market shares.

5. Marketing techniques, advertising and trades shows.

6. Sophistication of purchasers, ■sales modes, time cycles, and end-user interaction. CO 00

B. Defendant and its business . 00 CO

1. History and founding of company. 00 CO ^

2. Products sold. o ^ ^

a. Products which perform network security functions: firewalls and VPNs. >£* o

b. Products which do not perform network security functions . £»• l-4

3. Percent of revenues. 4^ 4^. to

4. Major competitors and relative market shares. 4^ to

5. Marketing techniques, advertising, and trade shows. 4^ to

6. Sophistication of purchasers, sales modes, time cycles, and end-user interaction. CO

C. Though they are major participants in different submarkets of corporate security, the parties are not competitors. 4^ cr

D. Instances of actual confusion. 4^--3

E. The corporate security environment. 4s»-CR ©

1. Evidence of convergence of physical and information security markets . 4^-CR O

2. Evidence of divergence and specialization. 4^ CR tO

3. Lack of generality regarding purchasers. 4^ CR 4^

4. Specialization of skills. 4*. CR 4^

5. Tendency of physical security toward protection of information, . including network security. 4^ CR CR

*430 IV. CONCLUSIONS OF LAW. 456

A. Liability for Infringement and Unfair Competition. CO LO

1. Similarity of Overall Commercial Impressions of the Marks. E-»

2. Strength of Plaintiffs Mark. 00 lO

3. Price of Goods, Sophistication of Purchasers, Care and Attention Expected of Reasonable Consumers. o CO

4. Length of Time Parties Have Used Their Marks Without Evidence of Actual Confusion, and the Evidence of Actual Consumer Confusion . CO

5. Intent of Defendant in Adopting the Mark. co

6. Parties’ Channels of Trade, Markets, Target Customers, and Likelihood of Expansion . CO CO

B. Ultimate Conclusion of Law: No Likelihood of Confusion 467

I. INTRODUCTION

In this action alleging trademark infringement and unfair competition in violation of the Lanham Act, 15 U.S.C. §§ 1114 & 1125(a;, plaintiff Checkpoint Systems, Inc. (“Checkpoint”) alleges that the defendant, Check Point Software Technologies, Inc. (“CPS”) has used the marks “CHECKPOINT,” “Checkpoint,” and “Check Point” in violation of plaintiffs registered trademark for “Checkpoint.” Plaintiff Checkpoint is a leading company in the field of retail security, manufacturing and distributing products under the Checkpoint mark designed to help retailers prevent losses caused by theft of merchandise and also to help manage the inventory and supply chain of products or merchandise. Defendant CPS is a leading company in the Internet-related field of protecting the electronic data flow in computer networks from electronic intrusion and monitoring the flow of data between the Internet and private intranets of its customers. Defendant markets its network security products as “Check Point Software Technologies” and has also used the names “Check Point” and “CheckPoint.” The companies are not competitors.

Plaintiff seeks to enjoin defendant from any further use of the Checkpoint name, including any of its similar variations, and this Court, having conducted a non-jury trial, must decide whether plaintiff has proved entitlement to such relief. Plaintiffs request for monetary damages is no longer before the court, having been denied by summary judgment, there having been no evidence of financial loss or willful infringement.

The principal issue to be decided is whether defendant’s use of the mark (Checkpoint, Checkpoint, or Check Point) to identify its goods and services is likely to create confusion. Although the similarity in corporate names is clear, and such similarity is an important factor in determining whether consumers are likely to be confused about the origin of these noncompeting products, this similarity is only the first factor in the analysis required by cases such as Scott Paper Co. v. Scott’s Liquid Gold, Inc., 589 F.2d 1225, 1229-81 (3d Cir.1978) and Fisons Horticulture, Inc. v. Vigoro Industries, Inc., 30 F.3d 466, 473 (3d Cir.1994). These Scott/Fisons factors are the considerations regarding the context in which the mark is used in the marketplace which must be weighed to answer the central question of whether plaintiff has proved, by a preponderance of the evidence, that consumers viewing the mark would probably assume that the product or service it represents is associated with the source of a different product or service identified by a similar mark. This Court will examine the evidence, and lack of evidence, regarding likelihood of confusion with respect to likelihood that a consumer viewing defendant’s mark would probably assume that it is associated with plaintiff, and also the “reverse confusion” issue of whether a consumer viewing plain *431 tiffs mark would probably assume that it is associated with the defendant.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

UHS of Delaware, Inc. v. United Health Services, Inc.
227 F. Supp. 3d 381 (M.D. Pennsylvania, 2016)
Alpha Pro Tech, Inc. v. VWR International LLC
984 F. Supp. 2d 425 (E.D. Pennsylvania, 2013)
Kinbook, LLC v. Microsoft Corp.
866 F. Supp. 2d 453 (E.D. Pennsylvania, 2012)
Fancaster, Inc. v. Comcast Corp.
832 F. Supp. 2d 380 (D. New Jersey, 2011)
Days Inn Worldwide, Inc. v. BFC Management, Inc.
544 F. Supp. 2d 401 (D. New Jersey, 2008)
Chase Manhattan Bank, USA, N.A. v. Freedom Card, Inc.
333 F. Supp. 2d 239 (D. Delaware, 2004)
J & J Snack Foods, Corp. v. Earthgrains Co.
220 F. Supp. 2d 358 (D. New Jersey, 2002)
Video Pipeline, Inc. v. Buena Vista Home Entertainment, Inc.
210 F. Supp. 2d 552 (D. New Jersey, 2002)
Strick Corp. v. Strickland
162 F. Supp. 2d 372 (E.D. Pennsylvania, 2001)
A & H Sportswear Co. v. Victoria's Secret Stores, Inc.
167 F. Supp. 2d 770 (E.D. Pennsylvania, 2001)
Chatam International, Inc. v. Bodum, Inc.
157 F. Supp. 2d 549 (E.D. Pennsylvania, 2001)
Sunquest Information Systems, Inc. v. Park City Solutions, Inc.
130 F. Supp. 2d 680 (W.D. Pennsylvania, 2000)

Cite This Page — Counsel Stack

Bluebook (online)
104 F. Supp. 2d 427, 2000 U.S. Dist. LEXIS 9690, 2000 WL 959768, Counsel Stack Legal Research, https://law.counselstack.com/opinion/checkpoint-systems-inc-v-check-point-software-technologies-inc-njd-2000.