Android faces new lawsuit, this time from Gemalto
IDG News Service - Google's Dalvik virtual machine, which runs Java applications in Android phones, is under fire again, this time in a lawsuit filed by Gemalto.
Gemalto, which makes smart cards and SIM card security technologies, sued Google, Motorola, HTC and Samsung in the U.S. District Court for the Eastern District of Texas on Friday. Gemalto alleges that Dalvik uses Gemalto's Java Card technology, which lets Java applications run on smart cards.
Gemalto also says Google offers applications that use its Java Card Technology to device makers. Such applications include Google Talk, Google Maps, Google Voice, Google Calendar, Gmail, Google Finance, Google Contacts and Google Shopper.
Motorola, HTC and Samsung are named in the suit for selling phones that run the Android operating system and Android applications that allegedly infringe on patented technologies in Gemalto's Java Card Technology.
Gemalto, which seeks a jury trial, cites three patents that it alleges the companies infringe, including one that was challenged by Sun Microsystems but upheld by the U.S. Patent and Trademark Office.
Motorola and Samsung did not immediately reply to requests for comment about the suit. Google said it hadn't received the complaint so it didn't have any comment. HTC couldn't be reached.
It's the latest in a string of legal actions aimed at the fast-growing Android mobile platform. Microsoft has sued Motorola and Apple has sued HTC over their Android phones. Oracle has sued Google over the way that Android handles Java in the Dalvik virtual machine.
The suits highlight the threat that Android poses. In the second quarter it overtook both Research In Motion and Apple to become the number-one smartphone operating system in the U.S., according to Gartner. It became the third-most-popular smartphone OS worldwide, behind number-one Symbian and RIM, Gartner said.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Legal White Papers | Webcasts