IDG News Service - Oracle has updated its lawsuit against Google to allege that parts of its Android mobile phone software "directly copied" Oracle's Java code.
Oracle filed a surprise lawsuit against Google in August, claiming portions of Google's mobile OS platform infringe Java-related copyrights that Oracle acquired when it bought Sun Microsystems.
Oracle's original lawsuit provided few details about the alleged infringement, but in an amended complaint filed Wednesday it gets more specific, providing examples of code attached as exhibits.
The complaint says Android includes infringing class libraries and documentation, and that "approximately one third of Android's Application Programmer Interface (API) packages" are "derivative of Oracle's copyrighted Java API packages" and related documents.
"The infringed elements of Oracle America’s copyrighted work include Java method and class names, definitions, organization, and parameters; the structure, organization and content of Java class libraries; and the content and organization of Java’s documentation," Oracle says.
"In at least several instances, Android computer program code also was directly copied from copyrighted Oracle America code," Oracle alleges.
Oracle also accuses Google of infringing several Java-related patents. Those charges appear unchanged from its original lawsuit.
Google didn't immediately comment on the updated complaint. In the past it has called the charges a "baseless" attack on Google and the open source community and vowed to fight them.
Oracle is seeking an injunction to block the alleged use of its code and treble damages.
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!