Skip to main content

Oracle seeking billions from Google over Java infringement

Google Android Logo
Image used with permission by copyright holder

Last August, Oracle filed suit against Google claiming the company’s Android operating system infringed on Java patents and copyright. This week, for the first time, Oracle has started to lay out the amount of damages it is seeking in the case—and according to a court filing this week, the amount is in “the billions of dollars.”

Google’s Android operating system includes the Dalvik virtual machine, a Java-compatible system that was developed independently of Sun’s Java virtual machine—both enable computers to run Java software. Oracle acquired Sun Microsystems in 2009, and is now pursuing Google for infringement, claiming the Dalvik VM infringes on patents the company acquired along with Sun. Oracle also alleges Google was fully aware of the Sun patents, and even hired some of Sun’s Java engineers.

In a letter to the court earlier this month, Google characterizes Oracle’s damages claims as inflated and inaccurate, since Google believes they are based on legal errors. According to Reuters, Google described Oracle’s claim of billions in damages as “unreliable and results-oriented.”

In an unusual move for a company that prides itself on transparency, Google asked the court to keep particular details of Oracles’ damages claim private; however, the judge in the case has ordered Google to publicly reveal information on damages for the record today.

The amount of damages being sought in the case can be significant: if a potential judgment in the billions of dollars is hovering over the future of Android, it may dissuade developers and hardware makers from continuing to embrace the platform since, if Google is found liable, it may have little choice but to pass that cost down to others. A finding in favor of Oracle would also likely see Oracle earning a royalty on every Android device sold—a burden on Android’s “open” platform and an ongoing cost that would likely be passed along to consumers.

Neither Oracle nor Google have so far responded to a request for comment.

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
This Google Chrome feature may save you from malware
Google Chrome app on s8 screen.

There are probably hundreds of thousands of Google Chrome extensions out there, and with so many options to choose from, it can be hard to know whether the plugin you want to install is hiding malware nasties.

That could become a thing of the past, though, as Google is testing a feature that will warn you if an extension you installed has been removed from its Chrome Web Store.

Read more
Google Meet just got a massive advantage over Zoom and Teams
Google Meet's stylized background show movement glitches.

If you've ever tried Google Meet's visual effects, you already know that moving around can create glitches and gaps at the edges where the foreground object (you) meets the stylized background. The computer's confusion about which part of a webcam image belongs in the front and which goes in the back is getting a huge upgrade with the latest Google Meet update.

The issue with the old version is that many computers lack the processing power to extract depth information from a webcam. That means Google Meet might not find the edges well enough to begin with, and it is often slow to update whenever you move. It's not as noticeable when using a blur effect but can spoil the experience when you apply a stylized background. Nothing wrecks a peaceful nature background more than a pixelated hand with pieces missing when you wave.

Read more
Update Google Chrome now to protect yourself from an urgent security bug
Google Chrome app on s8 screen.

Google posted a security update for its Chrome browser that fixes what's known as a zero-day bug. The problem affects Chrome on Windows, Mac, and Android. The flaw can lead to arbitrary code execution, a serious security vulnerability, so it's best to download and install the latest version immediately. Zero-day bugs mean that this is a known weakness and, in this case, Google said that the flaw is already being exploited by hackers.

Google did not post a detailed explanation of how the exploit works, but will do so when the majority of people have updated, making the danger of further attacks less severe. The most severe bug is identified as CVE-2022-2294 and the update also patches CVE-2022-2295 and CVE-2022-2296.

Read more