Nokia & IPCOM

The claimant, Nokia Corporation, seeks revocation of European Patent (UK) No. 1 841 268 (“the patent” or “268”) which belongs to the defendant IPCom. This action is yet another stage in the litigation which is pending in a number of jurisdictions in relation to the mobile telephony patent portfolio which IPCom purchased from Robert Bosch GmbH. Earlier this year, the company lost an appeal over another patent claim. The company was seeking to claim EUR12 billion (US$16 billion) from Nokia based on the calculation of 5 percent of Nokia’s mobile phone sales in countries covered by the patents, or EUR 600 million (US$840 million) a year over 20 years.

Nokia had been seeking the revocation of European Patent (UK) No. 1 841 268 (‘268 Patent) belonging to IPCom. In addition, by counterclaim, IPCom alleges infringement of 268 in respect of a number of mobile phones sold by Nokia. Nokia denies infringement. The ‘268 patent is itself a patent which was divided out of European Patent No. 1 186 189 (“the parent patent”). Like the parent patent, ‘268 is concerned with managing the problem of contention on a random access radio channel uplink between mobile phones and a network base station.

Regarding the validity of the patent, Judge held that “It is of course always necessary, in the end, to take a step back and ask whether the claim embodies an inventive step, both in the case of the attacks based on specific publications and in the case of the common general knowledge. Nokia submitted that the invention achieved nothing in terms of functionality as compared with, say, IS-95. That is correct as far as it goes, but it does not follow that IPCom’s approach to achieving that functionality is obvious. It is entirely possible that invention lies in achieving the same functionality in a different way. In the end, I was not satisfied that any of Nokia’s four starting points rendered IPCom’s solution obvious. It follows that I reject all the attacks on the 268 patent based on obviousness”


There are a Product and Process Description for each of the 14 types of Nokia devices. The High Court held that the ‘268 Patent was infringed by two Nokia devices: “the A1″and “the A2″, but Nokia were granted a declaration of non-infringement in respect of Nokia’s devices, labeled B1, B2, C1, C2, D1, D2, E1, E2, F1, F2, G1, and G2.

The high court clearly analyzed the infringement by mapping the features of devices A1 and A2 of Nokia with the Independent claim 1 of ‘268. Independent claim1 of ‘268 patent is broken as follows:

[A] Mobile station for operation in a UMTS mobile radio network

[B] in which multiple user classes are distinguished

characterized in that the mobile station is arranged

[C] to read a user class from a SIM card

[D] to receive access threshold value bits and access class information over a broadcast control channel

[E] to determine an access threshold value from the access threshold value bits

[F] to use the access class information relevant for the user class to determine whether

[G] the mobile station is permitted to access a random access channel, for example, RACH, independent of the received access threshold value bits

[H] or whether the access permission for the random access channel, for example, RACH, is determined on the basis of an evaluation of the access threshold value.


  • The Nokia device described as A1 operates as follows. The mobile is designed to receive two parameters of relevance. These are the dynamic persistence level, N, and the AC to ASC mapping information.
  • Any device operating in accordance with the A1 method must be a member of at least one Access Class (AC). There are 10 normal ACs, numbered from 0-9. Every device must be a member of one of those normal ACs and the number of the particular AC to which the device belongs is stored on its SIM card. There are another 5 special Access Classes (11-15) designated for use by special groups of users such as emergency services and network staff. All-access classes may be barred at any time by the network.
  • The next thing which it is necessary to understand is how the A1 selects an Access Service Class (“ASC”) which it will use for its access attempt. These ASCs are different from the AC stored on the SIM. The transmitted data includes an element entitled “AC-to-ASC mapping”. This allocates each AC to an ASC. There are 8 ASCs numbered from 0-7. The mapping is carried out by the device reading the information element (IE) in the System Information Block appropriate to its AC. The way this is done is set out in Table 2 taken from the A1 Product and Process Description. ACS 0-9 looks at the first IE in the block, 10 the second, 11 the third, and so on.

mapping of access classes to access service classes

  • Depending on which ASC has been allocated by the mapping process, the device works out a “persistence value” known as P(i), (not the same as the dynamic persistence level, N, sent by the network). The way this is done is set out in Table 1 taken from the A1 Product and Process Description.

derivation of persistence levels Pi

  • It can be seen that there is a difference between ASC 0 and the other ASCs. If a device is in ASC 0 the device automatically sets its persistence value, P(i), to 1. This conclusion is arrived at directly from the AC to ASC mapping and not from the other parameter of importance, the dynamic persistence level, N.
  • On the other hand, if a device is in one of the other ASCs (1-7), it has to carry out a calculation using the dynamic persistence level, N, sent by the network.
  • So P(N) is a function of (i.e. mathematically dependent on) the transmitted dynamic persistence level.
  • Devices that are mapped to ASC 0 by the network will automatically pass the persistence test because the random number can never exceed 1. Those devices which are mapped to ASC 1 or higher may or may not pass the persistence test. Whether they pass the persistence test depends on the value N sent by the network.

The judge held that a Nokia device A1, in summary, held that:

i) the bits used to transmit the dynamic persistence level, N, constitute the access threshold value bits;

ii) the AC to ASC mapping information constitute access class information;

iii) P(N) is an access threshold value which is determined from the access threshold value bits;

iv) the AC to ASC mapping information is used to determine whether the device is in:

a) ASC 0, in which case it is permitted to access the RACH independent of the received access threshold value bits because it has a P(i) value of 1 which is not a function of the persistence level N which is being broadcast by the network; or

b) an ASC other than 0 in which case it must determine access permission on the basis of an evaluation of P(N) which comprises a comparison of P(N) with a randomly generated number.

In the A1device the random number comparison gives a win/lose determination on permission, whereas in the A2 it determines the extent to which permission will be delayed. However, the judge held that in both cases access permission is determined on the basis of an evaluation of the access threshold value and thus infringing ‘268 patent.

About the Author: Mr. Veera Raghavan, Patent Specialist at IIPRD and can be reached at

Leave a Reply

Your email address will not be published.

one × four =


  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • September 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010