Feeds

Sniff, sniff, what's that burning smell? Oh, it's Google's patent-filing office working flat out

Nearly 2,000 patents granted to the ad giant in 2013

High performance access to file storage

Google, perhaps as sick as we are of the ongoing patent wars, spent last year furiously filling its technology war chest – with new designs rubber-stamped by the US patent office, according to research published by The Financial Times.

The study, syndicated by The Australian Financial Review here, was created by patent tracker IFI. It claims Google was in 21st place in 2012 in terms of patents issued in the US, and didn't even make the top 50 in 2011.

But then in 2013, the IFI says, Google banked 1,920 patents, enough to place it in the US top 10 when compared to the 2012 list, here. The Chocolate Factory would still have to double its output to get close to top-of-the-table patent recipients IBM (6,478 in 2012) and Samsung (5,081).

Forgive us for suggesting that Google hopes to emerge victorious from the smartphone patent omnishambles by defensively protecting its technology, and at a rate not seen before from the company.

And that's probably because the greater Android's success, the more reason Apple and Microsoft have to continue their lawsuits. Indeed, scanning even the first 50 search results at the US Patent Office shows reasonable activity in the mobile space.

That fifty also includes what look to the untrained eye like “troll” filings: e-commerce enabled advertising, email conversation management, advertising with audio content and so on. To be fair, however, there are also "core business" patents there, covering search and cloud computing operations.

The FT notes that as well as bolstering its “weak” position in the smartphone patent market, Google's awarded patents also reflect its enthusiasm for the wearable business.

Google's chief patent lawyer Allen Lo also nominated robotics patents as a priority in discussion with the FT, saying the company had learned from the smartphone litigation and wanted to “avoid a war” in its new markets. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.