Feeds

Intel won't play by China's Wi-Fi rules

Joins Broadcom in WAPI snub

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Intel will stop selling its 802.11 WLAN products in the People's Republic of China because it refuses to comply with the country's home-grown proprietary encryption technology.

Beijing has mandated that from June, equipment must conform to its own WAPI, or WLAN Authentication and Privacy Infrastructure standard, GB15629.11-2003. The move has been variously interpreted as a measure to protect China's own emerging technology manufacturers and as a national security ploy. It might not cost the US chip giant very much - sober estimates reckon the Chinese WLAN market is worth just $24m right now - but it is the latest installment in which the upcoming superpower is setting the terms of engagement.

WLAN compliance has divided US exporters. Texas Instruments, Cisco's Linksys and Atheros say they're willing to comply with WAPI, while Broadcom, and now Intel, would rather withdraw from the market.

China ensures that foreign capital stays in the country and demands joint ventures, with technology investors, in which the latter are encouraged to share their IP. With a long engineering tradition and a high investment in education, the PRC has little reason to believe that it needs to be dependent on expensive foreign technology. China is developing its own third generation mobile phone technology, TD-SCDMA, its own DSPs and its own PC microprocessor, Godson, and intends to deploy Linux widely.

Spooks' concerns have bedevilled wireless trade between the two countries before. Beijing was wary of adopting Qualcomm's CDMA technology which would have left its mobile phone infrastructure at the mercy of the US Department of Defense. CDMA uses the DOD-controlled satellite network to synchronize its base stations. Neither W-CDMA nor China's home grown TD-SCDMA have this disadvantage. ®

Related stories

Occidents will happen: China rips up the 3G rulebook
China doubles DIY 3G bounty
China's 64-bit chip gains ground

The essential guide to IT transformation

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
Tech city types developing 'Google Glass for the blind' app
An app and service where other people 'see' for you
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
UK mobile coverage is BETTER than EVER, networks tell Ofcom
Regulator swallows this line and parrots it back out at us. What are they playing at?
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.