Feeds

Samsung demands iPhone 4S source code in Aussie row

Yes, but what has France to say?

Secure remote control for conventional and virtual desktops

Samsung is demanding the source code of the iPhone 4S firmware, while Apple wants copies of Samsung's contract with Qualcomm and both companies are looking to France in their Australian case.

France is important, as that's where the European Telecommunications Standards Institute (ETSI) is based and where Samsung agreed to license critical 3G patents on a Fair, Reasonable And Non-Discriminatory (FRAND) basis. But, as Australian business title iTnews reports, Samsung reckons Apple is breaching three of its patents, while Apple reckons the Qualcomm chips it uses come with patent rights, so wants to see the contract Samsung has with Qualcomm.

Samsung is seeking an injunction on the iPhone 4S in Australia, though the only patents it can apply are fundamental to the W-CDMA (3G) standard and thus fall into the ETSI-mandated FRAND policy. Apple reckons it is free to use those patents having bought chips from Qualcomm, and Qualcomm has a licence from Samsung which Apple has seen, but only in a form so redacted as to be useless to its case.

Apple has previously argued that its licence to the Lodsys (mobile payments) patents should also cover users of its services (mobile developers taking payments through iTunes), so Cupertino obviously believes patent rights should be transferable, but that will depend on the contract Samsung has with Qualcomm, which is why Apple wants to see it.

Samsung, meanwhile, wants to see the iPhone 4S firmware so it can establish that Apple really is breaching its patents, something Apple still denies.

Samsung has tried to get injunctions against the 4S in America, France and Italy, where cases continue, with only the Dutch courts ruling in Apple's favour. Samsung is also pursuing a separate case though the Australian courts, involving the same three patents, and four others, in the increasingly impenetrable battle between the two companies.

In this instance the judge reckons all these demands for documents mean the case isn't going to fit into the four-day schedule, and will start considering which of the various document requests should be sustained when the case continues on Friday. ®

Beginner's guide to SSL certificates

More from The Register

next story
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.