Feeds

Can BlackBerry stop RedBerry in China?

Market awaits RIM's move

Securing Web Applications Made Simple and Scalable

If Orange launched a push email service called OrangeBerry in the UK, BlackBerry's maker could shut it down. But China Unicom is launching RedBerry this month, and there may be little Research In Motion (RIM) can do.

"China Unicom's RedBerry brand not only incorporates people's familiarity with the BlackBerry brand name, but it also fully embodies the symbolic meanings of China Unicom's new red logo," the company said. It acknowledged that RIM's BlackBerry is the most successful application of push email technology.

Peter Bullock, a partner with the Hong Kong office of Pinsent Masons and a specialist in intellectual property matters, said the Canadian company's options are limited.

To have an obvious redress under Chinese trademark laws, Bullock explained that RIM would have to show that Chinese consumers are being duped into believing that the RedBerry is associated with RIM's BlackBerry.

"Onerous hurdles to RIM's entry to the Chinese market mean their notoriety is very low at present, which again hinders trademark enforcement," he said.

In the absence of trademark infringement, RIM would need to fall back on the less potent Anti-Unfair Competition Law. "This provides a catch-all to allow a measure of redress in the event of unfair marketing, sales or promotion. Unfortunately, it is a law distinctly lacking in teeth."

It is not known if RIM wants to attempt to block sales of the RedBerry device or simply compete with it on the market. It plans to start selling its BlackBerry service in China through China Mobile (Hong Kong), the world's larges mobile phone operator by the end of May.

David Wolf makes an interesting point on The China Stock Blog about keyboards. The BlackBerry accommodates a full QWERTY keyboard, but with an enormous range of characters in Chinese scripts, pen-based input devices have dominated the Chinese PDA market to date. A QWERTY keyboard can be used for Chinese character input – but that becomes much more difficult when limited to using only one's thumbs.

See: The China Stock Blog

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Application security programs and practises

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.