Feeds

MS springs patent complaint on Taiwanese mouse vendor

Redmond whacks Primax

High performance access to file storage

Microsoft yesterday filed a patent infringement complaint against a Taiwanese computer peripherals vendor after talks on a licensing agreement for mouse technology stalled.

The software giant said that over the past few years it has made “repeated attempts” to strike a licensing deal with Primax Electronics Ltd, which according to its website manufactures imaging products, computer peripherals, office equipment and comms devices.

“Microsoft has an open intellectual property licensing policy, but in situations such as this, in which a reasonable licensing agreement cannot be reached despite our best efforts, we have no choice but to pursue legal action to protect our innovations,” said Redmond general IP and licensing counsel Horacio Gutierrez.

The company, which is usually on the receiving end of lawsuits, filed the action with the International Trade Commission (ITC) over Primax’s alleged failure to take part in Microsoft’s hardware licensing program for its U2, Tilt Wheel and Magnifier technologies.

Gutierrez said: “Primax’s practice of using our innovations without taking a patent license is unfair to the many companies that have already licensed our technology, so we are taking action to protect both our partners and our innovations.”

According to Bloomberg the complaint targets mice sold alone or with keyboards under the Dynex and Rocketfish names and available at electronics stores including those of US retail giant Best Buy.

In December, Primax reported sales of NT$16.06bn ($520m) from January to November 2007. The company was founded in 1984 and has subsidiaries in the US, Hong Kong, Japan and China. There has been no activity on the Primax website since late last year when the firm was delisted from Taiwan's stock exchange on 5 December 2007.

ITC, whose case details against "the proposed respondent" Primax can be viewed here, protects US markets from unfair trade practices. It also has the authority to block imports of products found to infringe US patents.

Primax could not be reached at time of writing. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.