Feeds

Apple adds Galaxy S 4 to Samsung patent suit

Might as well kick Korean mobe-maker where it'll hurt most

Reducing the cost and complexity of web vulnerability management

Apple has ratcheted-up its patent-infringment attack on Samsung, asking the US District Court of California to add Sammy's new smartphone flagship, the Galaxy S 4, to the list of products that Apple alleges violate its patents.

That handset was launched with hella hoopla this March (and reviewed by The Reg this Monday), and is the subject of an advertising blitz by the Korean electronics giant in an effort to knock the iPhone down a peg. Or two.

If you're having trouble following the myriad machinations in the Samsung-Apple patent war, you're not alone. Here's a brief overview – a full recounting would require many pages, and you do have more important things to do than read a rehash of the entire sordid story, eh?

Last August, a jury trial awarded Apple $1.05bn in damages, a figure that Apple asked to be tripled but was refused by the same judge who later trimmed those damages to under $600m.

In that case, Samsung had asked for a new trial, claiming that the foreman of the jury was tainted by desire for revenge against the Korean mobe-maker. The judge didn't buy that argument, but did hand Samsung a victory by denying Apple's request to ban the sale of some Samsung kit in the US.

That case is still under appeal, but it's a separate case from the one to which Apple has petitioned the court to add the Galaxy S 4.

The Galaxy S 4 is being added to Apple's second patent suit against Samsung – the one to which Cupertino added the Galaxy S III and the Galaxy Note last September, and which is scheduled to go to trial next Spring, after the appeals process for that first trial has been completed.

The judge in the second case – in which Samsung has countersued – told both parties to narrow the number of devices named in their complaints. Accordingly, in Apple's motion to add the Galaxy S 4 to the suit, their legal team wrote, "Upon the grant of such motion, Apple will eliminate (without prejudice) one of the Accused Products named herein, so that it will continue to accuse only 22 products of infringement at this stage of the litigation."

Even Apple, it appears, can sense when it's trying the patience of the court. ®

Security and trust: The backbone of doing business over the internet

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.