Complaint of Ericsson Inc., Telefonaktiebolaget Lm Ericsson, and Ericsson Ab Under Section 337 of the Tariff Act of 1930, As Amended

Total Page:16

File Type:pdf, Size:1020Kb

Complaint of Ericsson Inc., Telefonaktiebolaget Lm Ericsson, and Ericsson Ab Under Section 337 of the Tariff Act of 1930, As Amended UNITED STATES INTERNATIONAL TRADE COMMISSION WASHINGTON, DC In the Matter of CERTAIN ELECTRONIC DEVICES Investigation No. 337-TA-____ WITH WIRELESS CONNECTIVITY, COMPONENTS THEREOF, AND PRODUCTS CONTAINING SAME VERIFIED COMPLAINT OF ERICSSON INC., TELEFONAKTIEBOLAGET LM ERICSSON, AND ERICSSON AB UNDER SECTION 337 OF THE TARIFF ACT OF 1930, AS AMENDED Complainants: Proposed Respondents: Ericsson Inc. Samsung Electronics, Co. Ltd. 6300 Legacy Drive 129 Samsung-Ro, Maetan-3dong, Plano, TX 75024 Yoeongtong-Gu, Suwon, Gyeonggi, 16677 Telephone: (972) 583-0000 Republic of Korea Telefonaktiebolaget LM Ericsson Samsung Electronics America, Inc. Torshamnsgatan 21 85 Challenger Road Kista, Stockholm, Sweden Ridgefield Park, NJ, 07660-2112 Telephone: 011 46 8 710 0000 Samsung Electronics Thai Nguyen Co. Ltd. Ericsson AB Yen Binh I Industrial Zone Torshammnsgartan 23 Đồng Tiến, Pho Yen District Kista, 16480 Stockholm, Sweden Thai Nguyen Province Telephone: 011 46 719 0000 Thai Nguyen 250000, Vietnam Counsel for Complainants: Samsung Electronics Vietnam Co., Ltd. 1 Industrial Park, Commune Thomas L. Jarvis Yen Trung, Yen Phong District WINSTON & STRAWN LLP Bac Ninh Province 16000, Vietnam 1901 L Street, N.W. Washington, D.C. 20036 Samsung Electronics HCMC CE Complex, Telephone: (202) 282-5000 Co., Ltd. Facsimile: (202) 282-5100 Lot I-11, D2 Road, Saigon Hi-Tech Park, Tang Nhon Phu B Ward, District 9 (additional counsel on following page) Ho Chi Minh City 700000, Vietnam Louis L. Campbell WINSTON & STRAWN LLP 275 Middlefield Road, Suite 205 Menlo Park, CA 94025 Telephone: (650) 858-6500 Facsimile: (650) 858-6550 Steven M. Anzalone Paul C. Goulet FISHERBROYLES, LLP 1200 G Street N.W., Suite 800 Washington, D.C. 20005 Telephone: (301) 968-0800 Michael M. Murray FISHERBROYLES, LLP 445 Park Avenue, Ninth Floor New York, NY 10022 Telephone: (203) 542-5711 TABLE OF CONTENTS I. INTRODUCTION .............................................................................................................. 1 II. COMPLAINANTS ............................................................................................................. 3 III. PROPOSED RESPONDENTS ........................................................................................... 4 IV. THE PRODUCTS AND TECHNOLOGY AT ISSUE ...................................................... 7 V. THE ASSERTED PATENTS AND NON-TECHNICAL DESCRIPTIONS .................. 10 A. U.S. Patent No. 7,151,430..................................................................................... 10 1. Identification and Ownership of the 7,151,430 Patent ............................. 10 2. Non-Technical Description of the 7,151,430 Patent ................................. 11 3. Foreign Counterparts ................................................................................ 11 4. Licenses..................................................................................................... 12 B. U.S. Patent No. 6,879,849..................................................................................... 13 1. Identification and Ownership of the 6,879,849 Patent ............................. 13 2. Non-Technical Description of the 6,879,849 Patent ................................. 13 3. Foreign Counterparts ................................................................................ 14 4. Licenses..................................................................................................... 14 C. U.S. Patent No. 7,286,823..................................................................................... 15 1. Identification and Ownership of the 7,286,823 Patent ............................. 15 2. Non-Technical Description of the 7,286,823 Patent ................................. 15 3. Foreign Counterparts ................................................................................ 16 4. Licenses..................................................................................................... 17 D. U.S. Patent No. 9,313,178..................................................................................... 17 1. Identification and Ownership of the 9,313,178 Patent ............................. 17 2. Non-Technical Description of the 9,313,178 Patent ................................. 18 3. Foreign Counterparts ................................................................................ 18 4. Licenses..................................................................................................... 19 VI. SPECIFIC INSTANCES OF UNFAIR IMPORTATION AND SALE ........................... 19 VII. UNLAWFUL AND UNFAIR ACTS OF PROPOSED RESPONDENT— PATENT INFRINGEMENT ............................................................................................ 22 A. Infringement of the 7,151,430 Patent ................................................................... 22 B. Infringement of the 6,879,849 Patent ................................................................... 23 C. Infringement of the 7,286,823 Patent ................................................................... 25 D. Infringement of the 9,313,178 Patent ................................................................... 26 VIII. HARMONIZED TARIFF SCHEDULE ITEM NUMBERS ............................................ 27 IX. RELATED LITIGATION ................................................................................................ 28 A. Litigation Related to the Asserted Patents ............................................................ 28 B. Pertinent Litigation Between the Parties ............................................................... 28 X. THE DOMESTIC INDUSTRY ........................................................................................ 30 A. Ericsson’s Domestic Activities ............................................................................. 30 B. The Domestic Activities of Ericsson’s Licensees ................................................. 32 C. Ericsson’s Domestic Licensing Activities ............................................................ 32 1. Licensing Activities .................................................................................. 32 2. Litigation Activities Related to Unwilling Licensees ............................... 34 XI. RELIEF REQUESTED ..................................................................................................... 35 ii TABLE OF EXHIBITS Public Exhibits Exh. 1 Certified copy of U.S. Patent No. 7,151,430 Exh. 2 Uncertified copy of U.S. Patent No. 6,879,849 Exh. 3 Certified copy of U.S. Patent No. 7,286,823 Exh. 4 Uncertified copy of U.S. Patent No. 9,313,178 Exh. 5 Certified copy of recorded assignment(s) for U.S. Patent No. 7,151,430 Exh. 6 Uncertified copy of recorded assignment(s) for U.S. Patent No. 6,879,849 Exh. 7 Certified copy of recorded assignment(s) for U.S. Patent No. 7,286,823 Exh. 8 Uncertified copy of recorded assignment(s) for U.S. Patent No. 9,313,178 Exh. 9 Infringement Claim Chart – U.S. Patent No. 7,151,430 Exh. 10 Infringement Claim Chart – U.S. Patent No. 6,879,849 Exh. 11 Infringement Claim Chart – U.S. Patent No. 7,286,823 – Samsung Galaxy S20 Exh. 12 Infringement Claim Chart – U.S. Patent No. 9,313,178 – Samsung Galaxy S20 Exh. 13 Domestic Industry Claim Chart – U.S. Patent No. 7,151,430 Exh. 14 Domestic Industry Claim Chart – U.S. Patent No 6,879,849 Exh. 15 Domestic Industry Claim Chart – U.S. Patent No. 7,286,823 – Ericsson Licensee Exh. 16 Domestic Industry Claim Chart – U.S. Patent No. 9,313,178 – Ericsson Licensee Exh. 17 Infringement Claim Chart - U.S. Patent No. 9,313,178 – Samsung Smart TV Exh. 18 Domestic Industry Claim Chart – U.S. Patent No. 7,286,823 – Ericsson Licensee Number 2 Exh. 19 Domestic Industry Claim Chart – U.S. Patent No. 9,313,178 – Ericsson Licensee Number 2 Exh. 20 Infringement Claim Chart – U.S. Patent No. 7,151,430 – Televisions with WiFi Connectivity Exh. 21 Domestic Industry Chart – LG – BCM43455 iii Exh. 22 Domestic Industry Chart – LG – BCM43596 Exh. 23 Samsung Website: Samsung Mobile Phones Exh. 24.01 Pictures Taken of Samsung Galaxy S20+ 5G SM-G986U at Ericsson Laboratory Exh. 24.02 Pictures Taken of Samsung Galaxy S20+ 5G SM-G986U by Sigma Connectivity AB Exh. 24.03 iRunway Report Exh. 24.04 X-Ray Images Taken of Samsung Galaxy S20+ 5G SM-G986U by Sigma Connectivity AB and Layered Picture Extracted by Ericsson Using Software Exh. 24.05 Picture Taken of Ericsson Radio 2203 from Ericsson Datasheet Exh. 24.06 Pictures Taken of ROA 128 5882/3 Printed Circuit Board from the Ericsson Radio 2203 Exh. 24.07 Qorvo RFFC5071A/2A Datasheet Exh. 24.08 Microscopic Images Taken of the Qorvo RFFC5071A Device Exh. 24.09 iFixit Teardown of iPhone 12 and iPhone 12 Pro with Enhanced Views Exh. 24.10 Pictures Taken of LG G6 (LC-H870) w/ BCM43455 Device Exh. 24.11 Pictures Taken of LG G6 (LC-H870) w/ BCM43596 Device Exh. 24.12 Samsung Galaxy S20 5G Website Exh. 24.13 Samsung Galaxy S20 5G Specs Exh. 24.14 Android Developers Platform Architecture Website Exh. 24.15 Android Developers Developer Guides Website Exh. 24.16 Android Developers Package Installer Website Exh. 24.17 Android Developers Application Security Website Exh. 24.18 Get Android Apps and Digital Content from the Google Play Store Website Exh. 24.19 Android Developers Runtime Website Exh. 24.20 Android Developers Location Manager Website Exh. 24.21 Android Developers Legacy Hals Website iv Exh. 24.22 Android Open Source Project Architecture Website Exh. 24.23 Coursera Overview of Layered Architectures Website Exh. 24.24 Android
Recommended publications
  • Common Criteria and FIPS-Validated Devices for the Security Conscious
    Samsung Certified Devices Common Criteria and FIPS-validated devices for the security conscious. In today’s increasingly BYOD environment, security is paramount. Samsung is on the leading edge of defense-grade security, and we design our products to meet the most stringent security standards. Two of the most demanding sets of standards are Common Criteria and FIPS 140-2, used as the basis for government security up to Top Secret through the Commercial Solutions for Classified (CSfC) program. Samsung has achieved validation with many of its devices through each of these certification programs. Samsung’s concern for security encompasses both the hardware and the software. Our mobile devices incorporate leading security features from on-device encryption and secure data connectivity to protection by Samsung Knox. Trusted by governments around the world and voted “most strong” by Gartner1, Knox delivers a holistic array of security enhancements from the hardware layer all the way to the application layer. With Samsung, you’re protected from the moment you power on your device. Contact Us: samsung.com/government Samsung Certified Devices The Samsung difference. Our intention is to have a growing portfolio of mobile devices that adhere to the most relevant security standards recognized by customers worldwide, including Common Criteria and FIPS 140-2, and to make our devices available for programs such as CSfC. To ensure Samsung Mobile devices remain the ideal choice for security-conscious customers, Samsung continually pursues validation against the most stringent certifications available. It’s important to note that certifications awarded to Samsung are based on Samsung-specific enhancements; they are not obtained based on generic Android devices.
    [Show full text]
  • Antitrust, Intellectual Property, and the Itunes Ecosystem
    533 ANTITRUST, INTELLECTU AL PROPERTY, AND THE ITUNES ECOSYSTEM: A STUDY OF THE ANTITRUST IMPLICATIONS OF APPLE’S FAIRPLAY TECHNOLOGY WITH A NOD TO THE PECULIARITIES OF • INTELLECTUAL PROPERTY WILLOW NOONAN* I. INTRODUCTION In December 2008, Apple’s iTunes online music store surpassed Wal- Mart as the largest music retailer in the world.1 In the closely related portable music player market, Apple’s iPod enjoys similar success.2 Undoubtedly, Ap- ple’s insight and innovation won much of this eminence. However, a close look at Apple’s business practices reveals some conduct that draws a suspicious eye from antitrust and intellectual property laws. The first part of this article traces the development of online music and the subsequent proliferation of copyright infringement. The next part outlines the technical details, benefits, and drawbacks of Apple’s iTunes ecosystem, a notable combination of Apple products and services. The third part undertakes a traditional antitrust analysis of Apple’s conduct and suggests the need for dee- per inquiry. The next part investigates how Apple’s conduct implicates intellec- tual property law. The fifth part reviews the doctrine of intellectual property misuse and how it might apply to Apple. The final part revisits the antitrust • 2009 IDEA Student Intellectual Property Writing Competition Winner. * Candidate for Juris Doctor, 2010, The George Washington University Law School. 1 Press Release, Apple, Inc., iTunes Store Top Music Retailer in the US (Apr. 3, 2008), http://www.apple.com/pr/library/2008/04/03itunes.html [hereinafter iTunes Store]. 2 Jessica Hodgson, Leap Year Trips Zune in Black Eye for Microsoft, WALL ST.
    [Show full text]
  • Ibwave Mobile Planner
    iBwave Mobile Planner FAST-TRACK YOUR NETWORK DESIGNS BY GETTING A HEAD START ON-SITE. For accurate network designs that are constructible the first time, start with accurate site survey information. iBwave Mobile Planner is a powerful and intuitive mobile app that significantly expedites the design of networks. Take it on-site with you to collect RF measurements, capture site aesthetics, and start a preliminary design using the automatic access point placement functionality. Save all of the information to a single file and save it to the cloud for your design team back at the office to open and finish the design in iBwave Design. KEY BENEFITS Simplify your site Design for Capacity to Design networks and Easily collaborate on Optimize your survey toolkit avoid surprises later test coverage on-site network designs via resources and costs the cloud DC AMS R iBwave Mobile Planner Simplify your site survey toolkit Install the iBwave Mobile Planner app on the existing phone or tablet you bring on-site to transform it into the ultimate iBwave site survey tool. Use it to capture and centralize customer requirements, floor plans, photos, notes, construction markup and RF measurements. ` Collect survey data for both Wi-Fi and Cellular networks using just your android device, or third-party testing tools ` Draw floor plans or create them from a picture ` Seamless data exchange with compatible network test tools ` Create geo-located pushpins with photo, video, audio and text notes ` Add construction markup & cable routes ` One-click PDF reports with annotations, output maps and BOM ` Signoff page or e-signature options to speed up the approval process Design for Capacity to avoid surprises later on Reduce the chance of errors and create workable designs the first time around.
    [Show full text]
  • OPINION Defendant-Appellee
    FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT STACIE SOMERS, On Behalf of No. 11-16896 Herself and All Others Similarly Situated, D.C. No. Plaintiff-Appellant, 5:07-cv-06507- JW v. APPLE, INC., OPINION Defendant-Appellee. Appeal from the United States District Court for the Northern District of California James Ware, District Judge, Presiding Argued and Submitted February 11, 2013—San Francisco, California Filed September 3, 2013 Before: Dorothy W. Nelson, Stephen Reinhardt, and Milan D. Smith, Jr., Circuit Judges. Opinion by Judge Milan D. Smith, Jr. 2 SOMERS V. APPLE, INC. SUMMARY* Antitrust The panel affirmed the district court’s dismissal of a putative class action against Apple, Inc., alleging antitrust violations in connection with Apple’s iPod and iTunes Music Store. The panel held that the plaintiff waived review of the district court’s order denying certification of a class of indirect purchasers of the iPod because she abandoned her underlying individual claim under § 2 of the Sherman Act based on inflated iPod prices. The panel also held that the plaintiff failed to allege sufficient facts to state antitrust claims for damages and injunctive relief. The plaintiff alleged that Apple encoded iTunes Music Store music files with its proprietary Digital Rights Management (DRM), called FairPlay, which rendered the music files and the iPod compatible only with each other. She alleged that through certain software updates, Apple excluded competitors and obtained a monopoly in the portable digital media player and music download markets, which inflated Apple’s music prices and deflated the value of the iPod.
    [Show full text]
  • Ios Hacking Guide.Pdf
    Hacking iOS Applications a detailed testing guide Prepared by: Dinesh Shetty, Sr. Manager - Information Security @Din3zh 2 Table of Contents 1. Setting Up iOS Pentest Lab ................................................................................................. 5 1.1 Get an iOS Device ................................................................................................................................ 5 1.2 Jailbreaking an iOS Device................................................................................................................... 7 1.3 Installing Required Software and Utilities ........................................................................................ 10 2. Acquiring iOS Binaries ...................................................................................................... 13 3. Generating iOS Binary (.IPA file) from Xcode Source Code: ............................................... 15 3.1 Method I – With A Valid Paid Developer Account. ........................................................................... 15 3.2 Method II - Without a Valid Paid Developer Account ....................................................................... 18 4. Installing iOS Binaries on Physical Devices ........................................................................ 23 4.1 Method I - Using iTunes .................................................................................................................... 23 4.2 Method II - Using Cydia Impactor ....................................................................................................
    [Show full text]
  • Kw-V820bt Monitor with Dvd Receiver Instruction Manual
    KW-V820BT MONITOR WITH DVD RECEIVER INSTRUCTION MANUAL © 2016 JVC KENWOOD Corporation B5A-1052-00 d (EN) CONTENTS BEFORE USE BEFORE USE............................................................ 2 BLUETOOTH ......................................................... 30 IMPORTANT INITIAL SETTINGS .................................................. 4 SETTINGS .............................................................. 41 To ensure proper use, please read through this Initial setup ......................................................................... 4 Settings for using applications of iPod/iPhone/ manual before using this product. It is especially Clock settings .................................................................... 4 Android ..............................................................................41 important that you read and observe WARNINGS BASICS .................................................................... 5 Selecting different sources for the front and rear and CAUTIONS in this manual. Please keep the Component names and functions ............................. 5 monitors—Zone Control .............................................42 manual in a safe and accessible place for future Common operations ....................................................... 6 Sound adjustment—Audio ........................................43 reference. Common screen operations ......................................... 7 Adjustment for video playback .................................48 ◊ WARNINGS: (To prevent accidents and
    [Show full text]
  • A Secure and Fair Solution to Digital License Reselling Over the Internet
    SUPPORT CONSUMERS' RIGHTS IN DRM: A SECURE AND FAIR SOLUTION TO DIGITAL LICENSE RESELLING OVER THE INTERNET A thesis submitted to the University of Manchester for the degree of Doctor of Philosophy in the Faculty of Engineering and Physical Sciences 2012 By Tarek Gaber School of Computer Science Contents Abstract 17 Declaration 19 Copyright 21 Dedication 23 Acknowledgement 25 Abbreviations 27 Definitions 29 Notaitons 31 1 Introduction 33 1.1 Introduction to Digital Rights Management (DRM) . 33 1.2 Introduction to Concurrent Signature Scheme . 34 1.3 DRM and Consumers' Rights . 36 1.4 Research Motivation and Challenges . 38 1.5 Research Aim and Objectives . 40 1.6 Research Methodology . 41 1.7 Novel Contributions and Publications . 42 1.8 Thesis Structure . 46 2 Digital Rights Management Overview 47 2.1 Chapter Introduction . 47 2.2 What is DRM . 48 2.3 DRM History . 48 3 2.3.1 First Generation DRM Systems . 49 2.3.2 Second Generation DRM Systems . 49 2.4 DRM Fundamental Principle . 50 2.5 DRM System Entities . 52 2.6 DRM System Components . 53 2.7 How a DRM System Works . 55 2.8 Existing DRM Systems . 56 2.8.1 Windows Media DRM . 56 2.8.2 FairPlay DRM . 58 2.8.3 Open Mobile Alliance (OMA) DRM . 61 2.9 Open Issues in Current DRM Systems . 65 2.9.1 Consumer Privacy . 65 2.9.2 Interoperability . 66 2.9.3 First-sale: License Reselling . 67 2.10 Chapter Summary . 68 3 A literature Survey 71 3.1 Chapter Introduction . 71 3.2 Current License Selling Solutions .
    [Show full text]
  • Audiobooks on Ipods Boost Relationships with NIST Scientists
    Audiobooks on iPods BoostBoost RelationshipsRelationships withwith NISTNIST Scientists: Scientists Keeping Them Current with Management Trends Technology Services, Information Services Division Nancy Allmang, [email protected] Who We Are The National Institute of Standards and Technology What We Learned What We Learned, cont. Our Solution, cont. We began in July of 2007 with two 5th generation video (NIST) develops and promotes measurement, About digital media players: checked out for a specified time period, tracked, and standards, and technology to enhance security and downloaded from library web sites. At this time they iPods, and 6 audiobooks on each. Over the ensuing improve the quality of life. The Information Services - Apple®* media players (iPods) have an intangible cannot be played on iPods. months as demand grew we added 6 more iPods Division provides professional, scientific/technical “coolness factor” that appeals to customers (iPod Classics). We now are circulating a total of 39 information assistance to NIST research staff. The - iPods have the largest U.S. market share of all We decided to use Audible® audiobooks because they audiobooks on 8 iPods. media players NIST Research Library holds approximately 300,000 are in the format iPods require and it is simple to We developed a Responsibility Agreement for each - iPods have video screens that permit viewing of science and engineering volumes. download and transfer them to iPods. We made our borrower to sign, instructions, and complete listings of movies choice in spite of the fact they cannot easily be audiobook titles by iPod. tracked by library circulation systems, downloaded by multiple customers , and do not “expire” after a About Audiobooks specified checkout period.
    [Show full text]
  • On the Feasibility of Large-Scale Infections of Ios Devices
    On the Feasibility of Large-Scale Infections of iOS Devices Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, and Wenke Lee School of Computer Science, College of Computing, Georgia Institute of Technology ftielei.wang, yeongjin.jang, yizheng.chen, pchung, billy, [email protected] Abstract by Apple can be installed and run on iOS devices. This While Apple iOS has gained increasing attention from significantly reduces the number of distribution channels attackers due to its rising popularity, very few large scale of iOS apps, forcing attackers to have their apps signed infections of iOS devices have been discovered because by a trusted authority. of iOS’ advanced security architecture. In this paper, Third, the Digital Rights Management (DRM) tech- we show that infecting a large number of iOS devices nology in iOS prevents users from sharing apps among through botnets is feasible. By exploiting design flaws arbitrary iOS devices, which has a side effect of limit- and weaknesses in the iTunes syncing process, the de- ing the distribution of malicious apps published on the vice provisioning process, and in file storage, we demon- App Store. Although recent studies show that malicious strate that a compromised computer can be instructed to apps can easily bypass Apple’s app vetting process and install Apple-signed malicious apps on a connected iOS appear in the Apple App Store [26, 36, 51], lacking the device, replace existing apps with attacker-signed ma- ability to self-propagate, these malicious apps can only licious apps, and steal private data (e.g., Facebook and affect a limited number of iOS users who accidentally Gmail app cookies) from an iOS device.
    [Show full text]
  • The Many Facades of DRM
    The Many Facades of DRM Author: Rod Schultz [email protected] 1. INTRODUCTION In February 2007, Apple's CEO Steve Jobs wrote an open letter to the world denouncing DRM and its use in the music industry. In this letter Jobs stated, "DRMs haven’t worked, and may never work, to halt music piracy". The world took notice of this statement, and blogs all over the Internet were devoted to interpreting his message and meaning. The debate over DRM and its value began even before that, and has raged for over a decade now. Over time more and more people have developed a mental picture of what DRM is and what it does. But what do people really know about DRM? Most people only understand that a DRM prevents them from sharing or copying music and movies. Very few understand the intricate nature of this technology, how it enables business models, how it is built, and how it can be attacked. Even fewer understand the sheer mathematical complexity needed to create a DRM, and the cost of maintaining it. In this article I will discuss the many facades of DRM, including its multiple layers, their construction, and the functionality they provide. I will expand on DRM techniques and how they can fail based on my experiences at Apple (iTunes and iPod protection) and Adobe (Flash Player RTMPe protection). 2. BUSINESS MODEL Perhaps the most interesting thing about the Steve Jobs DRM letter to the world was the timing. When it was written, I was a member of the Apple FairPlay team (the engineering group at Apple that creates its DRM) and we were already working on a software update to iTunes that would allow the purchase and playback of DRM free music.
    [Show full text]
  • PDF, Folyadék, Max
    Alaplap (INTEL processzorokhoz) nettó bruttó Processzor nettó bruttó Co-Libri Tech Kereskedelmi és Számítástechnikai Szolg. Kft. Asrock B365M PRO4 LGA1151v2, 4xDDR4, 6xUSB3.1, USB3.1 type_C, 6xSATA3 21(6Gb/s), 969 +6xUSB2.0,27 900 M.2,AMD GLAN, Ryzen HDMI, 5 2600X DVI-D, (4,2GHz/3,6GHz VGA, PS/2, 7.1 x6mag/12szál) hang processzor, AM4 53 465 67 900 Karcag, Dózsa Gy. u. 2. Tel.:59/503-280, 30/50-50-999 ASUS PRIME H310M-R LGA1151v2, 2xDDR4, 4xUSB3.0, 4xSATA3 (6Gb/s), 1xM.2,16 457+6xUSB2.0,20 900GLAN, HDMI,AMD DVI-DRyzen ,5 VGA,3500X 7.1 (4,1GHz/3,6GHz hang x6mag/6szál) processzor, AM4 59 764 75 900 ASUS PRIME H310M-K LGA1151v2, 2xDDR4, 4xUSB3.0, 4xSATA3 (6Gb/s), +6xUSB2.0,16 457 GLAN,20 900DVI-D, VGA,AMD 7.1 Ryzen hang 5 3600 (4,2GHz/3,6GHz x6mag/12szál) processzor, AM4 62 984 79 990 www.co-libri.hu mail: [email protected] ASUS PRIME H310M-A R2.0 LGA1151v2, 2xDDR4, 4xUSB3.0, 4xSATA3 (6Gb/s),23 +6xUSB2.0, 543 29 1xM.2, 900 GLAN,AMD HDMI, Ryzen DVI-D, 5 3600X VGA, (4,4GHz/3,8GHz 7.1 hang x6mag/12szál) processzor, AM4 72 047 91 500 ASUS PRIME B360M-K LGA1151v2, 2xDDR4, 2xUSB3.1, 2xUSB3.0, 4xSATA3 (6Gb/s),19 677 +6xUSB2.0,24 990 1xM.2,AMD GLAN, Ryzen DVI-D, 7 3700X VGA, (4,4GHz/3,6GHz 7.1 hang x8mag/16szál) processzor, no GPU, AM4 73 984 93 960 ÉRVÉNYES: 2021. szeptember 29-től ! ASUS PRIME B365M-K LGA1151v2, 2xDDR4, 6xUSB3.1, 6xSATA3 (6Gb/s), +2xUSB2.0,21 181 1xM.2,26 900GLAN, DVI-D,AMD RyzenVGA, 7.17 3800X hang (4,5GHz/3,9GHz x8mag/16szál) processzor, no GPU, AM4 84 882 107 800 Memória nettó bruttó ASUS PRIME B365M-A LGA1151v2, 4xDDR4, 6xUSB3.1,
    [Show full text]
  • Тотальный Trade-In (Гаджет По Обмену)» (Далее По Тексту – «Правила»)
    ПРАВИЛА Акции «Тотальный Trade-In (Гаджет по обмену)» (далее по тексту – «Правила») 1. Общие положения. 1.1. Акция – рекламное мероприятие, проводимое Организатором в соответствии с настоящими Правилами. Акция не является стимулирующим мероприятием, подпадающего под действие ст.9 ФЗ «О рекламе». 1.2. Организатор – юридическое лицо, указанное в соответствии с настоящими Правилами как Организатор Акции. 1.3. Программа Трейд-ин – постоянная услуга, которая включает процесс сдачи покупателем Бывшего в употреблении Товара с одновременным приобретением Нового Товара. 1.4. Белмонт – ООО «БЕЛМОНТ», ОГРН: 5167746493547, 115035, г. Москва, Овчинниковская набережная, д. 20, стр. 2, ком. 23, являющееся авторизованным партнером компании Apple, организующее на территории РФ Программу Трейд-ин. 1.5. Смарт-Базар - ООО «Цифровые девайсы», ОГРН: 1197746757944, 127006, г. Москва, переулок Оружейный, д.41, ЭТАЖ 6 ОФИС 6.18, организующее на территории РФ Программу Трейд-ин. 1.6. Потребитель – дееспособное физическое лицо, достигшее возраста 18-ти лет (либо не достигшее 18 лет, но приобретшее дееспособность в полном объёме в порядке, предусмотренном действующим законодательством РФ), владеющее на праве собственности Бывшим в употреблении Товаром. 1.7. Участник – Потребитель, получивший статус Участника в соответствии с настоящими Правилами. 1.8. Салоны сети Организатора – салоны связи, работающие под товарным знаком «Связной», «Связной3» и/или «Евросеть» и перечисленные на сайте Организатора. 1.9. Бывший в употреблении Товар (далее также Б/у Товар) – смартфоны и планшеты под товарными знаками Apple, Samsung, Huawei, LG и Sony, перечисленные в Приложении № 1 к настоящим Правилам, принадлежащие Потребителям на праве собственности, который Потребитель вправе сдать Белмонту или Смарт-Базару, получив за него Выкупную цену, с учётом ограничений и требований, указанных в Приложении № 2 к настоящим Правилам.
    [Show full text]