Feeds

Google nabs patents from defunct mini-phone maker

Pays $4.9 million for Modu shell

Top 5 reasons to deploy VMware with Tegile

Google has paid $4.9 million to acquire the patents of defunct Israeli phone maker Modu, according to a report from an Israeli newspaper.

Calcalist reports (Google Translate) that the web giant will purchase "dozens" of patents from the shell of Modu after a deal was approved by an Israeli court.

When we asked Google to confirm the purchase, it was non-committal. "Like many tech companies, at times we'll acquire patents that are relevant to our business." The purchase is presumably part of Google's effort to better defend Android against legal attack. Last month, Nortel announced that Google had bid $900m to acquire its patent portfolio, and Google has said it hopes to use the Nortel portfolio to protect not only Google but also partners and open source developers working on projects such as Android and Chrome.

Google's bid will serve as a starting point when Nortel auctions off its patent portfolio. Nortel filed for bankruptcy two years ago, and the company's creditors hope to raise over a billion dollars from the sale of the portfolio.

"As things stand today, one of a company’s best defenses against this kind of litigation is (ironically) to have a formidable patent portfolio, as this helps maintain your freedom to develop new products and services," Google said in a blog post. "Google is a relatively young company, and although we have a growing number of patents, many of our competitors have larger portfolios given their longer histories."

According to patent watcher Florian Muller, Google's Android mobile operating system is the subject of 37 separate lawsuits. Muller and others say that one of the reasons Android has been attacked so often is that Google's patent portfolio is relatively weak.

Founded in 2007 by Israeli Dov Moran, Modu sold a tiny, lightweight phone that could slide in and out of different "jackets" that provided additional tools. The primary device had footprint about the size of a credit card and weighted 1.5 grams. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
Ofcom tackles complaint over Premier League footie TV rights
Virgin Media: UK fans pay the most for the fewest matches
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.