FPF Position Statement regarding the RIM Mobile E-Mail Patent Assertion

2002-10-10 Thread Mohsen Banan-Public

[ Please distribute this article as widely as possible, wherever appropriate. ]

The Free Protocols Foundation article 

  Position Statement regarding the 
   RIM Mobile E-Mail Patent Assertion

is provided as an attachment in Plain Text format.

The article states the position of the Free Protocols Foundation
regarding the RIM mobile e-mail patent. The article is 
also available in PDF and HTML formats at
http://www.freeprotocols.org/position-rim-6219694

This position statement has the endorsement of
the Free Software Foundation and the personal
endorsement of Richard M. Stallman.


 --- document in text form follows ---

Position Statement
  regarding the
RIM Mobile E-Mail Patent Assertion


   Free Protocols Foundation



  Version 2.4
   September 12, 2002



Copyright and Permission


Copyright (c)2001, 2002 Free Protocols Foundation.


Permission is granted to make and distribute verbatim 
copies of this document provided the copyright notice 
and this permission notice are preserved on all copies.


1   Introduction


The Free Protocols Foundation (FPF) is a non-profit
organization and independent public forum dedicated
to the support of patent-free protocols and
software.  The FPF views software and protocol
patents as being detrimental to the industry and
the consumer, and part of the FPF mandate is to
oppose exceptionally harmful patents when they
appear. For more information see the FPF website at
http://www.freeprotocols.org.

In May 2001 Research in Motion (RIM) made a patent
assertion which we regard as an egregious example
of patent law abuse, and exceedingly harmful in its
potential effects.  The following is a statement of
the FPF position regarding this patent, the actions
we have undertaken to oppose it, and the remedial
action we are now demanding of RIM.

2   Research in Motion (RIM) and BlackBerry
===

Research in Motion (RIM) is a Canadian wireless
technology company based in Waterloo, Ontario,
Canada.

Among other things RIM manufactures and licenses
BlackBerry, a popular wireless handheld e-mail
device.  BlackBerry is a closed, single-vendor
e-mail system, based on a set of proprietary
protocols. For details see the BlackBerry website
at http://www.blackberry.net.  3 RIM's Patent
Assertion


In April 2001 RIM was granted U.S. Patent #
6,219,694, entitled System and method for pushing
information from a host system to a mobile data
communication device having a shared electronic
address.  The complete text of the patent is
available in PDF format on the FPF website at:
http://www.freeprotocols.org/usPatents/06219694.pdf.

The patent describes a method of directing e-mail
to wireless devices, while maintaining mailbox
synchronization with a desktop e-mail system. The
described method is a basic element of the
functioning of various existing mobile e-mail
systems, including the BlackBerry system.

RIM was quick to take advantage of this
patent. Less than a month after the patent was
granted, RIM announced a lawsuit against Glenayre
Electronics, Inc.  for infringement against the
patent. To view an article describing this patent
assertion, visit
http://www.totaltele.com/view.asp?ArticleID=40057pub=ttcategoryid=625.
The same article is also available on the FPF
website at
http://www.freeprotocols.org/rimBBPatentProblem/extNews2.html.

In order to understand the eventual disposition of
RIM's lawsuit, it is important to know that when it
comes to patents Glenayre is no angel either; and
in particular, had previously filed its own patent
infringment suit against RIM. An article describing
the Glenayre patent assertion is available at
http://www.garywill.com/waterloo/ctt9908.htm; the
same article is also available on the FPF website
at
http://www.freeprotocols.org/rimBBPatentProblem/extNews1.html.

Thus with the initation of RIM's lawsuit against
Glenayre, both companies now had patent lawsuits
pending against each other.

4   FPF Position on the RIM Patent Assertion


The Free Protocols Foundation views the RIM patent
assertion as an extreme example of patent-law
abuse.  This is because:


* The patent is based on methods and processes
  which were previously known and implemented,
  and there is ample prior art to demonstrate
  this. RIM's claim that these processes are
  novel is false.

* The patent covers an aspect of mobile e-mail
  that is so fundamental that if it goes
  unchallenged, it will have the effect of
  hobbling the wireless and mobile e-mail
  industry.


The patent is particularly noxious because of the
very large scope of its claims.  Note that mobile
e-mail is not merely another generic product or
service - it is an extremely large-scale
interconnected system, whose functioning is of
profound importance to business and society.  

IETF

2002-10-10 Thread Bill Cunningham

Linus,
I curious as to whether or not you're a member of the IETF or any
Internet Society groups. There's a new open protocols movement that Richard
Stallman supports. Are you active in furthering the Internet as well as open
source?




Re: www.freeprotcols.org

2002-10-10 Thread Bill Cunningham



 Bill Cunningham should be added to the list of trolls (just below Mr.  
 Fleming).
 
 -- 
 Pekka Savola Tell me of difficulties surmounted,
 Netcore Oy   not those you stumble over and fall
 Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords


!#@?
 




Re: www.freeprotcols.org

2002-10-10 Thread Pekka Savola

On Thu, 10 Oct 2002, Bill Cunningham wrote:
  Bill Cunningham should be added to the list of trolls (just below Mr.  
  Fleming).
 
 !#@?

Check out RFC3005.  I believe your postings often infringe items 2) or 3)
of the inappropriate postings list.

-- 
Pekka Savola Tell me of difficulties surmounted,
Netcore Oy   not those you stumble over and fall
Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords





Re: www.freeprotcols.org

2002-10-10 Thread alok

cut the spam guys

- Original Message -
From: Bill Cunningham [EMAIL PROTECTED]
To: Pekka Savola [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, October 10, 2002 6:44 PM
Subject: Re: www.freeprotcols.org




 Bill Cunningham should be added to the list of trolls (just below Mr.
 Fleming).

 --
 Pekka Savola Tell me of difficulties surmounted,
 Netcore Oy   not those you stumble over and fall
 Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords


!#@?







Re: www.freeprotcols.org

2002-10-10 Thread Bill Cunningham


- Original Message -
From: Pekka Savola [EMAIL PROTECTED]
To: Bill Cunningham [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, October 10, 2002 9:30 AM
Subject: Re: www.freeprotcols.org


 On Thu, 10 Oct 2002, Bill Cunningham wrote:
   Bill Cunningham should be added to the list of trolls (just below Mr.
   Fleming).
 
  !#@?

 Check out RFC3005.  I believe your postings often infringe items 2) or 3)
 of the inappropriate postings list.

 --
 Pekka Savola Tell me of difficulties surmounted,
 Netcore Oy   not those you stumble over and fall
 Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords

I'll take a look.





Bill Cunningham

2002-10-10 Thread TOMSON ERIC

Bill,

It's not the first time I notice that your messages on the IETF discussion list are 
either not relevant for everybody, or not interesting for everybody, or not related to 
IETF topics (I've just reviewed all your messages from the first one, dated 17 Oct 
2001).

I mean, asking *basic* questions while you could find answers with simple web 
searches, and while a [more than] basic knowledge is (should be?) a pre-requisite to 
be part of an INTERNET ENGINEERING Task Force discussion, and so exposing your lack of 
some basic knowledge, is not - IMHO - a respectful attitude vis-à-vis all other 
contributors.

I also mean, starting strange debates (like about OSI), exchanging private mails 
through this public list, giving your personal feeling and interpretation about some 
topics, talking about proprietary products, etc. is not only off-topic : it's simply 
sterile. Once again, while the majority of people here work (more or less) on the 
technical improvement of IETF-related stuff - or simply exchange and confront ideas - 
this sounds like a lack of respect for the other contributors.

I finally mean, this is neither an FAQ distribution list where people can ask any 
possible basic question to some IETF guru's who like spending (wasting?) their time 
repeating the same answers to the same questions, nor a newsgroup where anybody can 
expose his own private opinions about any possible matter more or less related to the 
Internet or data communication in general.

Of course, this is only my personal opinion (though I know it's similar to others') 
and therefore I have to apologize. I must admit that I am close to consider you as a 
simple abusing consumer whose contributions on this list do not bring any added value. 
Basically, a troll.

I would be very pleased to notice in your next contributions that I am completely 
wrong.

E.T.

P.S.: I still believe that THE INTERNET IS FOR EVERYONE.




Re: Bill Cunningham

2002-10-10 Thread Bill Cunningham


- Original Message -
From: TOMSON ERIC [EMAIL PROTECTED]
To: 'Bill Cunningham' [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, October 10, 2002 9:37 AM
Subject: Bill Cunningham


 Bill,

 It's not the first time I notice that your messages on the IETF discussion
list are either not relevant for everybody, or not interesting for
everybody, or not related to IETF topics (I've just reviewed all your
messages from the first one, dated 17 Oct 2001).

 I mean, asking *basic* questions while you could find answers with simple
web searches, and while a [more than] basic knowledge is (should be?) a
pre-requisite to be part of an INTERNET ENGINEERING Task Force discussion,
and so exposing your lack of some basic knowledge, is not - IMHO - a
respectful attitude vis-à-vis all other contributors.

 I also mean, starting strange debates (like about OSI), exchanging private
mails through this public list, giving your personal feeling and
interpretation about some topics, talking about proprietary products, etc.
is not only off-topic : it's simply sterile. Once again, while the majority
of people here work (more or less) on the technical improvement of
IETF-related stuff - or simply exchange and confront ideas - this sounds
like a lack of respect for the other contributors.

 I finally mean, this is neither an FAQ distribution list where people can
ask any possible basic question to some IETF guru's who like spending
(wasting?) their time repeating the same answers to the same questions, nor
a newsgroup where anybody can expose his own private opinions about any
possible matter more or less related to the Internet or data communication
in general.

 Of course, this is only my personal opinion (though I know it's similar to
others') and therefore I have to apologize. I must admit that I am close to
consider you as a simple abusing consumer whose contributions on this list
do not bring any added value. Basically, a troll.

 I would be very pleased to notice in your next contributions that I am
completely wrong.

 E.T.

 P.S.: I still believe that THE INTERNET IS FOR EVERYONE.

I was unaware of RFC 3005. I'm glad it was pointed out to me.


 Inappropriate postings include:

- Unsolicited bulk e-mail
- Discussion of subjects unrelated to IETF policy, meetings,
  activities, or technical concerns
- Unprofessional commentary, regardless of the general subject
- Announcements of conferences, events, or activities that are not
  sponsored or endorsed by the Internet Society or IETF.



Is this the part of RFC 3005 I need to follow?




RE: www.freeprotcols.org

2002-10-10 Thread Don McMorris

I'm afraid that wont help Bill [replying with a small grouping of symbols].

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Bill
Cunningham
Sent: Thursday, October 10, 2002 9:14 AM
To: Pekka Savola
Cc: [EMAIL PROTECTED]
Subject: Re: www.freeprotcols.org


 Bill Cunningham should be added to the list of trolls (just below Mr.
 Fleming).

 --
 Pekka Savola Tell me of difficulties surmounted,
 Netcore Oy   not those you stumble over and fall
 Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords


!#@?





Re: Last Call: Using XML-RPC in BEEP to Proposed Standard

2002-10-10 Thread Timur Shemsedinov

 http://www.ietf.org/internet-drafts/draft-harold-beep-xmlrpc-00.txt
There are some questions concerning xmlrpc and some,
most probably, even beep.

1. How it can work in local networks if IANA is not accessible and
profiles can be received neither from the client nor from the server
of such network? Or they are placed locally, if so why URL refers to
iana.org ? I believe that it works, but how? It is not clearly
documented by BEEP specification and is not considered in
mentioned draft.

  C: start number='1' serverName='stateserver.example.com'
  C: profile uri='http://iana.org/beep/transient/xmlrpc'
  C: ![CDATA[bootmsg resource='/NumberToName' /]]
  C: /profile
  C: /start

2. Few examples are given in the document, it is difficult to
get complete understanding of the complex structured
parameters representation.

3. Looking on the following example, any person can have idea,
whether it is impossible to represent a call briefly and
gracefully even using XML?

I: MSG 1 1 . 0 364
I: Content-Type: application/xml
I:
I: ?xml version=1.0?
I:   methodCall
I: methodNameexamples.getStateName/methodName
I: params
I:   param
I: valuei441/i4/value
I:   /param
I: /params
I:   /methodCall
I: END

L: RPY 1 1 . 201 100
L: Content-type: application/xml
L:
L: ?xml version=1.0?
L:   methodResponse
L: params
L:   param
L: valuestringSouth Dakota/string/value
L:   /param
L: /params
L:   /methodRespose
L: END

-- 
Best regards,
 Timurmailto:[EMAIL PROTECTED]





IPv6 and child pornographers

2002-10-10 Thread Joe Baptista


The subject line says it all - IPv6 is a great protocol for free speech
and other sorted activities.

-- Forwarded message --

   http://www.circleid.com/articles/2543.asp

   IPv6: In Search Of Internet Security
   October 9, 2002 By Joe Baptista

   My recent articles on IPv6 published this past September 12 and
   25 have left many users with the impression that IPv6 (Internet
   Protocol version 6) is secure. This is a false assumption. Internet
   security is more an act of faith in a complex science draped in a
   religious mystery - in other words non-existent. In my opinion,
   Internet security has never existed. Any protocol can be violated.
   IPv6 has the power to make users' communication more secure during
   transmission. It also can be a security nightmare. So be warned, users
   of IPv6 - it will bypass your firewall settings but it will give your
   users enhanced privacy. But the experts are working on it.

   To understand Internet security it's always a good idea to go back in
   history. The Internet was a military sponsored communication project
   developed under DARPA (The Defense Advanced Research Projects Agency).
   The idea at the time was to distribute computer resources by
   decentralizing control and increasing redundancy on United States
   military and government networks. The goal was to prevent a first
   strike from taking out computational and communication facilities
   essential to operations. If the red menace (Soviet Union) bombed a
   computer facility in Kansas the network would route around the damage
   and survive.

   DARPA planners unfortunately were short sighted and did not
   anticipate the technology would become an international standard for
   communications. The community of users and networks connected to DARPA
   were small and trusted so security concerns were a low priority. The
   end result was the deployment of insecure protocols that have kept
   many security experts gainfully employed. Even secure protocols are
   hacked. Today there are millions of compromised computer systems busy
   trying to hack other computers. And many of those busy hacking
   computers may no longer be under the control of the original script
   kiddy hacker who launched them. In fact I suspect many such computers
   are operating independently of a human operator.

   IPv6 does fix a lot of the privacy issues and has some added security
   features that make it a better transport. Keith Moore, a researcher
   with the computer science department at the University of Tennessee,
   points out that security is not an IPv6 issue any more than it is an
   IPv4 issue - probably slightly less. Moore, a former applications
   area director to the Internet Engineering Steering Group, points out
   that users of IPv6 will have an added advantage over IPv4. IPv6
   transports traffic using the IPsec security protocol.

   IPv4 connections move traffic around in the clear (plain text). It is
   up to the user to ensure traffic is encrypted. Sniffer programs at
   various Internet exchange points can easily intercept most user web
   and email traffic. Cable users sometimes install sniffer programs to
   monitor and record IPv4 transmissions. In most cases they don't have
   the means to decrypt security protocols and they do it mostly for the
   fun and entertainment value. So don't panic, your credit card is still
   confidential provided you used it over a secure web session. However
   don't expect to send your credit card data to Uncle Steve via email.
   If you have however emailed confidential information to someone
   chances are your message was transported as plain text and can be
   subject to interception.

   The industry would agree that IPv4 is a brain dead protocol and those
   predicting it's death have good reasons for their position. Government
   programs like carnivore depended on IPv4 vulnerabilities to be
   successful. Carnivore is a tool that has revitalized worldwide respect
   for the FBI in the intelligence community. The program intercepts and
   analyzes Internet traffic and is classified by the FBI as a diagnostic
   tool. Carnivore is also a motivating factor in the transition to IPv6
   by American, European and Japanese governments.

   Governments understand their vulnerabilities under IPv4; their
   intelligence departments have diagnostic tools too. IPsec makes IPv6
   less prone to man in the middle interception or attacks. User data
   under IPv6 is encrypted across the transmission end points. Sure the
   intelligence establishment has the means to break encrypted protocols
   but that's an expensive affair. Carnivore has not been effective in
   catching terrorists who communicate using encrypted channels. But it's
   been very effective in catching child pornographers that have yet to
   discover the privacy features available to them under IPv6. It is easy
   to envision that Carnivore will become a useless 

Re: Last Call: Using XML-RPC in BEEP to Proposed Standard

2002-10-10 Thread John Stracke

Timur Shemsedinov wrote:

1. How it can work in local networks if IANA is not accessible and
profiles can be received neither from the client nor from the server
of such network? Or they are placed locally, if so why URL refers to
iana.org ?

It's not used as a URL; it's used as a URI.  You don't resolve it; you 
just use it as an identifier.  This is a common tactic in XML.

-- 
/===\
|John Stracke  |[EMAIL PROTECTED]  |
|Principal Engineer|http://www.centivinc.com|
|Centiv|My opinions are my own. |
|===|
|If you're going to walk on thin ice, you might as well *dance*!|
\===/





RE: www.freeprotcols.org

2002-10-10 Thread Haren Visavadia

Don McMorris wrote:
 Bill Cunningham should be added to the list of trolls (just below Mr. 
 Fleming).


Bill Cunningham is NOT a troll. Mr Fleming is far more worst.





Re: IETF

2002-10-10 Thread Scott W Brim

On Thu, Oct 10, 2002 08:00:37AM -0400, Bill Cunningham allegedly wrote:
 Linus,
 I curious as to whether or not you're a member of the IETF or any
 Internet Society groups. There's a new open protocols movement that Richard
 Stallman supports. Are you active in furthering the Internet as well as open
 source?

(1) You sent this exact message before.  (2) There is no reason in the
world why the IETF list should have to see it.  If you have a question
for an individual, send it to the individual.  

A couple more like this and you'll be banned from the IETF list.




Re: Last Call: Using XML-RPC in BEEP to Proposed Standard

2002-10-10 Thread Ward Harold





Timur, my responses to your questions follow:

1. The uri attribute associated with a start message's profile
element is equivalent to an XML namespace name. It is a URI that uniquely
identifies a BEEP profile; it is just an identifier and does not
necessarily point to anything on the Web.

2. The methodCall, methodResponse, and associated parameter encodings are
all defined by the XML-RPC specification: http://www.xmlrpc.com/spec. The
draft explains how to use BEEP to transfer XML-RPC encoded messages between
peers not how to actually do the encoding.

3. Grace and beauty are in the eye of the beholder; regarding brevity it is
no doubt possible to define a more compact encoding, even using XML, but in
this case the XML-RPC authors defined what they defined.

... WkH




  Timur Shemsedinov
  [EMAIL PROTECTED]To:   Ward Harold/Austin/IBM@IBMUS
  pi.kiev.ua   cc:   [EMAIL PROTECTED]
Subject:  Re: Last Call: Using XML-RPC 
in BEEP to Proposed Standard
  10/10/2002 12:08
  PM
  Please respond to
  Timur Shemsedinov






 http://www.ietf.org/internet-drafts/draft-harold-beep-xmlrpc-00.txt
There are some questions concerning xmlrpc and some,
most probably, even beep.

1. How it can work in local networks if IANA is not accessible and
profiles can be received neither from the client nor from the server
of such network? Or they are placed locally, if so why URL refers to
iana.org ? I believe that it works, but how? It is not clearly
documented by BEEP specification and is not considered in
mentioned draft.

  C: start number='1' serverName='stateserver.example.com'
  C: profile uri='http://iana.org/beep/transient/xmlrpc'
  C: ![CDATA[bootmsg resource='/NumberToName' /]]
  C: /profile
  C: /start

2. Few examples are given in the document, it is difficult to
get complete understanding of the complex structured
parameters representation.

3. Looking on the following example, any person can have idea,
whether it is impossible to represent a call briefly and
gracefully even using XML?

I: MSG 1 1 . 0 364
I: Content-Type: application/xml
I:
I: ?xml version=1.0?
I:   methodCall
I: methodNameexamples.getStateName/methodName
I: params
I:   param
I: valuei441/i4/value
I:   /param
I: /params
I:   /methodCall
I: END

L: RPY 1 1 . 201 100
L: Content-type: application/xml
L:
L: ?xml version=1.0?
L:   methodResponse
L: params
L:   param
L: valuestringSouth Dakota/string/value
L:   /param
L: /params
L:   /methodRespose
L: END

--
Best regards,
 Timurmailto:[EMAIL PROTECTED]







Re: www.freeprotcols.org

2002-10-10 Thread Valdis . Kletnieks

On Thu, 10 Oct 2002 07:57:12 EDT, Bill Cunningham [EMAIL PROTECTED]  said:
 Richard Stallman and Linus Torvalds should become involved in IETF.

On the other hand, looking at /usr/src/linux/MAINTAINERS reveals a lot of
familiar names.  Meanwhile, Richard is quite busy enough pursuing his political
agendas with the FSF, and Linus is quite busy enough trying to keep all the
people listed in MAINTAINERS pointing in the same direction.

I have to admit, this is the message that pushed me over the edge from
labelling Mr Cunningham clueless and into the troll category - if you know
enough about either of the names dropped to consider dropping them, you'd
know why neither of them *should* participate...

-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg09121/pgp0.pgp
Description: PGP signature


Re: www.freeprotcols.org

2002-10-10 Thread Scott W Brim

On Thu, Oct 10, 2002 07:57:12AM -0400, Bill Cunningham allegedly wrote:
 Richard Stallman and Linus Torvalds should become involved in IETF.

Why are you telling this list?  No, don't answer that, just stop.