Feeds

Dell claims 'fraud' on Psion's netbook claim

Netbook convert files for dismissal

High performance access to file storage

Dell is playing hardball with Psion Teklogix, asking the US authorities throw out its claim over the "netbook" name.

The PC-giant-turned-netbook-convert filed legal documents Tuesday that asked the US Patent and Trademark Office to cancel Psion's trademark. It accused Psion of making a fraudulent claim when if filed for continued use of the trademark in November 2006, which it's now seeking to enforce.

Dell's action will sink any hope Psion had for a rapid and pain-free conclusion to the case. It had given OEMs and retailers until March 31 to stop using the name "netbook" in reference to non-Psion machines.

Dell's action, though, means the USPTO's lengthy trial and appeals process has been kicked started, a process that should roll until May 2010.

According to Dell's filing, here (PDF), Psion senior product management's Herb Tuner said Psion was using the trademark "in commerce on or in connection with all goods" listed in the identified trademark registration. Also, Turner claimed Psion had been using the trademark for five consecutive years since the date of - what appears to be - another re-registration in November 2000.

"Upon information and belief, such statements were false at the time that they were being made," Dell's said. "Registrant was not using the Netbook trademark in commerce on laptop computers.

"The US Patent and Trademark Office relied upon Registrant's material false statements and false statement in allowing continued registration of the Nebook name," Dell said.

Dell's filing also asks that the trademark be thrown out because Psion had abandoned the "netbook" name by not shipping laptops and because the phrase "netbook" has become generic.

Dell listed itself along with Hewlett-Packard, Lenovo, Acer, Asus, Sony, Samsung, and others as making netbooks. Dell currently offers three netbook machines: the Inspiron Mini 9, Mini 10, and Mini 12. Also, according to Dell, the phrase is being widely used by retailers and in the media to refer to a particular subset of small and inexpensive notebook.

Ironically, Dell's own attempt to trademark another phrase - "cloud computing" - was rejected by the USPTO last year for being a generic term. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.