Feeds

Taiwanese firm to sue over armed raid at IFA

Barks back at Philips, patent police

Internet Security Threat Report 2014

A Taiwanese firm is taking legal action over damage to its reputation after an Italian patent troll representing Philips prompted the raid of a Berlin consumer electronics show last month.

Teco was among 69 companies targeted by some 200 armed German custom officers during the IFA trade fair in Berlin. The raid was done at the request of Sisvel, which administers MP3 and DVD technology patents on behalf of Philips. Sisvel had complained that exhibitors at IFA may be infringing on patents owned by its client.

The agents confiscated a number of products from the show floor to check for evidence of patent breaches. The loot hauled away included some 170 flatscreen TVs, 140 MP3 players, 57 DVD recorders and 22 notebook computers.

MSI security

Customs officials raid IFA

Teco said in a statement that 13 LCD TVs were seized from its IFA booth over alleged infringements of Philips' DVD player patents. Teco claims custom agents ignored their explanations that the sets didn't even have DVD functions before hauling the gear away.

"It's simply unbelievable that they seized our products in such a savage manner — without any proof of patent violations on our part," said a Teco spokeswoman to AsianPulse.

The company claims the seizure caused damage to its reputation and ruined potential business opportunities at IFA.

Teco is presently seeking indemnification from Sisvel and Philips for the damage caused by the accusations. It's also seeking for a technical examination to show that Teco products don't violate any patent holdings.

This year's IFA certainly wasn't the first police and customs raid prompted by Sisvel. In March, over fifty stands at CeBit were raided because of suspicions from Sisvel of MP3 patent violations.

SanDisk also had its booth raided at IFA last year by the accusations of Sisvel. Although the seizure of SanDisk's products at the trade show was first ruled to have been disproportionate to the powers proved by the warrant issued by the Berlin Amtsgericht Tiergarten court, it was later overruled and determined lawful by a higher court decision. ®

Internet Security Threat Report 2014

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.