Feeds

Apple vs Nokia not as wrapped up as it appears

ITC staff advice only applies to handful of patents

  • alert
  • submit to reddit

Remote control for virtualized desktops

Yesterday staff at the ITC said that Nokia wasn't infringing on some Apple's patents, but the war is far from over as the important ones had already been transferred out.

The staff at the International Trade Commission were only expressing an opinion, a judge will still need to rule, but regardless of that the case only relates to four of the nine patents Apple reckons Nokia is infringing. The other five have already been thrown into Apple's ongoing spat with HTC, as FOSS rep Florian Mueller explains in his blog.

Apple originally accused Nokia of infringing nine patents, and took a separate case against HTC for infringing 14 patents it owns. Five patents were common to both cases. Nokia and HTC asked to have the cases combined, but the ITC decided that the five common patents should be removed from the Nokia case and Nokia should be added as a defendant in the Apple vs HTC case. That left only the four weakest patents in the Apple vs Nokia case. It was on the issue of these patents that the staff expressed their opinion. Critically those patents don't include the touch-screen stuff, which is where the real disputes lie.

These are all ITC cases. Despite its name the ITC is an American body that has the power to ban the import, to the USA, of patent-infringing kit. So these cases are separate from, although parallel to, the various court cases which are going on. The court cases will take a lot longer, which is why everyone goes running to the ITC these days - a ban on US imports focuses the mind wonderfully.

Anyone having trouble keeping up might find the diagram from Design Language News useful - it's a little out of date, being a month old, but most of the important stuff is there.

It's going to get worse too. Historical players have huge patent portfolios to wield, and aren't taking kindly to having their technologies ripped off, while new players want to protect their innovations as that's all they've got. It will be decades before the dust settles and we can find out who the winners are, aside from the patent lawyers of course. ®

Remote control for virtualized desktops

More from The Register

next story
You! AT&T! The only thing 'unlimited' about you is your CHEEK, growl feds
Man, we did everything but knock on their doors - carrier
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Watch out, Samsung and Apple: Xiaomi's No 3 in smartphones now
From obscurity to selling 19 million mobes a quarter
Brazil greenlights $200m internet cable to Europe in bid to outfox NSA
Only one problem: it won't make the slightest difference. And they know it
Wanna hop carriers with your iPad's Apple SIM? AVOID AT&T
Unless you want your network-swapping tech disabled for good, that is
Knocking Knox: Samsung DENIES vuln claims, says mysterious blogger is a JOKER
But YES, system does store encryption key on the device
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.