Feeds

Patent shark‘s copyright claim could bite all Unix

Cook Islands entity claims rights to code present in *nix, MacOS, Windows

The smart choice: opportunity from uncertainty

April Fool A company registered in minor league tax haven the Cook Islands, but with a subsidiary in Delaware, lawyers in the patent-troll heaven of East Texas and an office in Sydney, Australia, has asserted intellectual property rights over all versions of Unix and “Unix-like derivatives” and plans to seek royalties from every company that has ever used the operating system.

The company, FourOne IP, is a non-practising entity whose registered address is a Sydney accountant, a not unusual arrangement for companies seeking to take advantage of the Cook Islands’ tax laws. Despite its humble appearance, it nonetheless appears to have sufficient backing to engage high-powered attorneys to launch their World+Dog lawsuit.

An attorney identifying himself as Ernest K Malley, who spoke to The Register on condition of anonymity, said forensic analysis of all known Unix derivatives had taken nearly three decades, but that the company recently is confident today's copyright filing will succeed.

Malley explained that a “hundreds” of lines of code the company owns appear to be copied across all *nix variants, but had only come into widespread use in recent years, as the emergence of social media sites YouTube, Facebook, Reddit, Twitter, Tumblr and GrovelR has led to a change in loads on servers. Analysis of the resulting logs has revealed that a long-neglected piece of code called the ‘nsfw daemon’ present in every *nix variant going back to Bell Labs is now pressed into use with great regularity. The daemon is especially important to the online adult entertainment industry.

Malley said FourOne IP has acquired companies that can prove ownership of the daemon and that it will now exercise its rights.

“It's clear that some far-sighted Unix pioneer created this daemon even though it has only become useful in the last few years,” he said, “That the insight is significant is obvious from the fact the code has been copied not only throughout Unix but into the Windows code stream via NT, and Apple's world via BSD. It appears to us that NSFW is also present throughout the code base of every significant Linux distribution,” he added.

Pressed on FourOne IP’s intentions, Malley offered the following warning: “If I were Cisco, I’d increase my patent litigation budget to rather more than $50m a year. We’re a well-funded outfit with a righteous cause, because the code we own is crucial to so many operations.”

Malley said even Linux companies need to watch out. “Linus Torvalds needs to start looking down the back of the sofa for some coins,” he said. “By the time we’re done, he’ll need them to buy food.” ®

Designing a Defense for Mobile Applications

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.