Feeds

Nokia and Kyocera resolve patent dispute

They kept that one quiet

Choosing a cloud hosting partner with confidence

Nokia and Kyocera have settled their differences over which of them owns what mobile phone intellectual property, thus resolving all pending litigation between them.

The pair today said they had agreed to license each other their respective patents. Crucially, Kyocera will pay Nokia a royalty covering technology used in its CDMA, PHS and PDC handsets and systems. Nokia also gains access to Kyocera's "essential patents", as well as supplemental intellectual property "relating to all standards and covering all Nokia mobile phone, module and infrastructure products" the mobile-phone giant today confirmed.

How much each company is paying to the other for all this wasn't made public.

Nokia and Kyocera began their dispute in February 2004, the two companies admitted. The story didn't break until the following October, when Kyocera claimed that 36 Nokia handsets were infringing three of its patents. The companies themselves have kept remarkably quiet about the matter - until now. ®

Internet Security Threat Report 2014

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.