Feeds

Microsoft and Linux trade patent words in Europe

USification-of-EU play

Combat fraud and increase customer satisfaction

Microsoft has teamed with General Electric to petition European regulators on a fundamental principle that will continue to drive a wedge between the company and open source supporters.

The duo filed an amicus brief arguing that regulators should believe in the existence of patents in software and that these patents should then be enforceable in European Union courts.

The filing is important because Microsoft is arguing for a continuation of status quo: the ability to turn ambiguities in a part of existing EU law over software patents to the favor of patent holders by bringing and winning cases. Patent holders could then argue for future enforcement based on that case law.

It's a type of creeping enforcement that open-source advocates oppose and have argued will turn Europe into the kind of costly patent battle-ground that characterizes the US.

It opens the way for expensive and opportunistic legal actions and ambulance-chasing lawsuits of claimed patent violations, which typically favor those with the lawyers and money to win.

Often, the mere threat of action is sufficient to make companies settle with litigants.

Worse, patent holders can argue they should be allowed to charge others for invoking a method in a piece of software or on a system because there are similarities with their patent. Patent holders are, therefore, locking down the market stifling innovation.

Microsoft's US legal action, quickly settled, against GPS device manufacturer TomTom illustrates this: Microsoft said TomTom had violated eight of its patents, three of them for FAT - a widely implemented technology but something Microsoft has patents on. Eventually, TomTom agreed to pay royalties to Microsoft to license the three FAT patents.

This produced two responses. Linux advocates called on engineers to rip out FAT from systems. They also posted Microsoft's FAT patents to a web site for peer review by the legal community and patent experts, to help find prior art that could potentially invalidate Microsoft's claim.

Top three mobile application threats

Next page: Enlarged Board

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.