Feeds

Judah 'Visual Voicemail' Klausner sues Google, Verizon, Citrix...

Rent due again?

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Suing communication providers over alleged patent infringements has worked pretty well for Judah Klausner.

The inventor, who owns the company Klausner Technologies, has already reached lucrative settlements and subsequent licensing deals with AOL, AT&T, eBay, Comcast, and others.

This round Klausner is gunning for six more firms to pay up for infringing its patent for providing a visual representation of voice messages. The companies listed in the latest volley include Google, Verizon, LG Electronics, and Citrix.

Klausner Technologies filed the complaint Tuesday in US District Court in Tyler, Texas.

Verizon's spider sense was clearly already tingling when it launched its own visual voice mail service, and preemptively filed a request to kill Klausner's patent claims in US District Court in New York.

"We anticipated Klausner's actions," a Verizon spokesman said in an e-mailed statement. "We are seeking a declaration that Klausner's visual voicemail patent is invalid and that Verizon's system does not infringe the patent in any event."

Klausner's visual voice mail patent is described as letting the user "access messages in a selective manner based on the identity of the caller. The need to listen to the actual voice messages to determine the caller's identity and the need to listen to the messages sequentially or chronologically is obviated, saving both time and effort."

He recently sought $360m for damages from Apple, claiming the iPhone's touted visual voice mail feature was in violation of his intellectual property.

Klausner Technologies has about 25 mobile telephony patents. While the firm doesn't appear to make any products based on these patents, it specializes in sniffing out companies it claims are infringing, suing, settling and then demanding licensing deals. ®

The essential guide to IT transformation

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
This'll end well: US govt says car-to-car jibber-jabber will SAVE lives
Department of Transportation starts cogs turning for another wireless comms standard
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.