Feeds

Huawei, ZTE hit with ITC patent probe

US authorities heed patent trolls' throaty call for action

Choosing a cloud hosting partner with confidence

Chinese mobile comms giants Huawei and ZTE are in trouble with the US authorities again, this time as part of a wider patent investigation by the ITC which could result in some of their mobile device models being banned in the States.

The investigation, which includes 11 other big name tech companies including Acer, HTC, Amazon, Samsung and LG, was based on a complaint filed by three IP-related firms: Technology Properties Limited LLC, Phoenix Digital Solutions LLC, and Patriot Scientific Corporation.

A brief ITC release said the following:

The complaint alleges violations of section 337 of the Tariff Act of 1930 in the importation into the United States and sale of certain wireless consumer electronics devices and components thereof that infringe a patent asserted by the complainants. The complainants request that the USITC issue an exclusion order and cease and desist orders.

For ZTE and Huawei it will be yet another unwelcome distraction in the US. The two are already under investigation by the US House of Representatives Intelligence Committee of allegations the Chinese government is subsidizing the price of kit they sell in America.

In addition, the FBI is investigating ZTE over allegations it illegally flogged equipment made by US tech firms to Iran and then tried to cover-up its actions.

Huawei has also found it tough going in the States. It was force to drop a proposed $2m (£3.1m) acquisition of server firm 3Leaf Systems and saw a deal for network firm 3Com scuppered thanks to government pressure.

As a result, handset sales for the two are particularly important for growth in the US market, so the ITC case would appear to be pretty high stakes already.

ZTE last week announced that although revenue grew 15.2 per cent in the first half of 2012 compared to a year ago, its profits plunged by nearly 50 per cent.

Huawei did better but still saw its profits drop 22 per cent over the same period.

“ZTE is aware of this investigation and are actively preparing to respond to the suit,” a spokesperson told The Reg. “We hope to seek reasonable solutions based on the rules of mutual respect and mutual benefits.”

Huawei could not immediately be reached for comment. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.