Feeds

Apple pounds e-wallet firm in trademark tiff

Pod botherers

Designing a Defense for Mobile Applications

Apple has been accused of applying double standards to trademark disputes by a UK security developer.

The launch of Apple's much-anticipated iPhone device last week kicked off a trade-mark dispute between the firm and Cisco, which secured trademark in 2000 when it bought Infogear, the original maker of iPhone-branded products. In response, Apple has said that the word iPhone should be considered generic, by which reckoning both Apple and Cisco should be able to use the name without confusion.

Over recent months Apple has been sending cease and desist letters to firms applying for trade mark registration with names containing the phrases "pod"and "ipod" in their monikers, such as Watford-based security developer Securipod. The UK firm, which is developing products designed to frustrate identity theft and credit card fraud, accuses Apple of applying different standards in its wrangle with Cisco than its lawyers have argued in its disputes with smaller firms.

Securipod said it is "bemused" about how the biometric wallets it's developing might be confused with an iPodMP3 player but an Apple iPhone mobile device could not be confused with Cisco's iPhone. Apple's conduct amounts to bullying tactics in laying claim to the name Securipod, the UK security product developer alleges.

The firm said the wrangle is diverting management resources at Securipod away from plans to release its first product this summer, a biometric wallet designed to help combat ID theft and credit card fraud called 'biouno'. Securipod's design and marketing manager Mark Watson described Apple's behaviour as an attempt "write its own rules for trademarks".

We asked Apple to address Securipod's criticism of its trademark practices but the consumer electronics giant said it would rather not comment on pending litigation. ®

Boost IT visibility and business value

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.