Feeds

Nintendo sued over alleged Wii Remote patent violation

Point and click

The Power of One Brief: Top reasons to choose HP BladeSystem

Nintendo has found itself on the receiving end of a lawsuit alleging the company ripped off a US patent that California-based plaintiff Interlink Electronics was granted back in February 2005 as a result of a September 1997 application.

Interlink's patent, 6,850,221, details a "trigger-operated electronic device", which is only one aspect of Nintendo's Wii Remote, which Interlink claims contains its technology. Another is the Wii's pointer functionality, which Interlink maintains is covered by its patent too.

nintendo wii remote and nunchuk

Interlink's device also has a suitable sensor to determine where on the screen the controller is pointing and to detect trigger presses. Interestingly, Interlink saw the gadget more as a mouse alternative than a videogames console controller.

Trigger-fitted devices go back well beyond Interlink's filing. As Kotaku, which broke lawsuit story, notes, the Nintendo 64 has a trigger on its controller released in September 1996, a year before Interlink filed to have its idea protected as a patent.

However, the pointer element may be harder to defend.

Whatever, Interlink wants a jury trial, it said in documents filed with the US District Court of Delaware on 4 December. It's after damages and a ban on Nintendo's allegedly infringing products. ®

Read Reg Hardware's review of the Nintendo Wii here

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.