Feeds

Apple seeks resurrection of HTC importation ban

HTC: 'We fixed it.' Apple: 'No, you didn't'

The Power of One Brief: Top reasons to choose HP BladeSystem

Again adhering to the Cupertinian creed that "the best defense is a good offense," Apple has filed its third complaint against Taiwanese smartphone-maker HTC at the US International Trade Commission (ITC), citing patent infringement and requesting a bar on a welter of HTC devices from being imported into the US.

The patent that Apple accuses HTC of infringing? Well, as the oft-quoted sage Yogi Berra would have put it, "It's déjà vu all over again." The complaint cites US Patent 5,946,647, the same patent that was one of the two the ITC ruled last December that HTC had infringed among the two dozen or so that Apple had complained about back in March 2010.

That December ruling led to HTC phones being temporarily held up at US ports last month, though they were cleared after U.S. Customs determined that the infringing feature had been removed – presumably, much to Apple's displeasure.

The feature in question – what has become known as "data-tapping" – involves techniques for parsing strings such as telephone numbers, email addresses, URLs, and the like, and then offering users a set of appropriate actions to perform based on the content, such as making a phone call, opening an email app, or launching a webpage.

Illustration from US Patent 5,946,647

US Patent 5,946,647, as illustrated in the filing, covers recognizing strings and suggesting uses for them

HTC says that it has developed a workaround in its Android-based operating system that no longer infringes on the data-tapping patent. Apple, apparently, disagrees.

According to FOSS Patents, 29 HTC devices are cited in Apple's new ITC complaint, and Apple is asking for emergency action to ban their importation.

This latest move against its Android-based competition underlines yet again that even under supposedly kindler, gentler CEO Tim Cook, one of Apple's key competitive strategies is the tactic that inspired actor and musician Jack Black to name his band "Tenacious D". ®

Note to our non-stateside readership: Mr. Black's band is named after a sporting apothegm common among American basketball aficionados which refers to the robust application of defensive methodologies.

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.