Feeds

Kodak strikes at Apple in iPhone, Mac patent dispute

RIM targeted too

Designing a Defense for Mobile Applications

Eastman Kodak has issued lawsuits against both Apple and Blackberry maker Research in Motion, claiming neither of them has licensed its patents despite using the technology described therein and having been warned about it by Kodak.

The photography pioneer said the alleged infringement centred on intellectual property protecting a method for previewing colour images and the processing of images of different resolutions. It filed complaints against both Apple and RIM with the US District Court for Western New York.

A second lawsuit, filed with the same court, claims Apple's array of Macs and other devices infringe a separate Kodak patent detailing a method by which one application can call upon other apps to help it complete a task.

Kodak also raised these matters with the US International Trade Commission, asking the body to block the importation into the States of the allegedly infringing products. This is a common tactic in patent spats.

Equally common are out-of-court settlements. Kodak sued Sun Microsystems over use of the same 'helper apps' technology and, despite winning a jury trial in 2004, ultimately settled for a $92m payment from the server company in return for a licence for the patent.

Kodak also sued Samsung and LG for allegedly infringing the preview patent. Kodak settled with LG in early December 2009, then scored an initial victory against Samsung the same month when a District Court judge ruled the South Korean giant was guilty. Earlier this week, Kodak and Samsung announced a patent cross-licensing deal of the kind agreed with LG.

It's hard to see such an outcome not concluding both the Apple and the RIM fights.

Kodak said it already had licensing agreements in place with phone makers Nokia, Sony Ericsson and Motorola. ®

Application security programs and practises

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.