Skip to comments.Patent troll sues just about the whole tech biz over 4 years
Posted on 11/09/2012 10:19:23 AM PST by Ernest_at_the_Beach
A patent holding firm has made it its business to sue just about every tech firm anyone has heard of in its quest to make money from an encryption patent, it has emerged.
In the last four years, TQP Development has kept its lawyers busy with complaints against hundreds of companies, including big boys of tech like Google, Intel, Samsung and Apple.
The prodigious litigator, spotted by the CipherLaw Blog, has made Intel, Wind River and Hertz its latest opponents citing its patent for using a shared seed value to generate pseudo-random key values at transmitter and receiver.
TQP has specifically referenced Secure Sockets Layer (SSL) and Transport Layer Security (TSL) protocols combined with the RC4 encryption algorithm in some of the cases, all filed in East Texas.
So far, none of the cases have gone to trial, a situation TQP is probably quite happy with...
(Excerpt) Read more at theregister.co.uk ...
WTF!? Seriously. -- That technique's been in use since the beginning of digital computing, probably before if you consider the history of cyphering.
These people need to be tarred and feathered, laughed out of town, and if they return, shot.
The subtleties of what can be patented will ensure for much intrigue, as there are competing philosophies. But in general, in order to have something patentable, one has to have an apparatus doing it. If apparatus has already been doing this prior to the alleged patent, then that ought to invalidate the patent. It would also sound like something our libertarian friends, the Electronic Freedom Foundation, would want to attack head on given sufficient resources.
That is, prior to the alleged invention being patented...
Ars Technica does not allow any posting.
A modem suitable for transmitting encrypted data over voice-grade telephone line. The modem is implemented by the combination of integrated circuit components including a microprocessor, a serial communications controller which communicates with connected data terminal equipment, and a modulator/demodulator for translating between voice band tone signals and digital data. Pseudo random number generators are employed at both the transmitting and receiving stations to supply identical sequences of encryption keys to a transmitting encoder and a receiving decoder. An initial random number seed value is made available to both stations. The random number generators are advanced at times determined by predetermined characteristics of the data being transmitted so that, after transmission has taken place, the common encryption key can be known only to the transmitting and receiving stations.
I've been working with computing since 1979 (deep across and into the entire computing stack, including the logic circuit level). Encryption has always been available, borrowing from technologies dating back before the Enigma machine.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.