{"id":965,"date":"2012-01-15T20:54:37","date_gmt":"2012-01-15T19:54:37","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=965"},"modified":"2024-10-14T14:05:00","modified_gmt":"2024-10-14T12:05:00","slug":"software-patents-just-use-them-well","status":"publish","type":"post","link":"http:\/\/cerezo.name\/blog\/2012\/01\/15\/software-patents-just-use-them-well\/","title":{"rendered":"Software Patents: Just Use Them&nbsp;Well"},"content":{"rendered":"<p style=\"text-align: justify;\">Holding a contrarian view could carry out great benefits: there has always been a need for a procedure to protect any innovative software from reverse engineering that at the same time allows for its appropriation and exclusionary use, as well as it precludes any imitation of its functionality, implementation details aside. This procedure really exists, it\u2019s the proverbial patent: a negative right, temporal and exclusionary, to protect any novel intellectual property in exchange of publishing enough information to replicate it. In some sense, it\u2019s the only open window for the ordinary citizen to introduce its own personal legislation, a strong general purpose tool, however double-edged it may&nbsp;be.<\/p>\n<p style=\"text-align: justify;\">The frontal and so popular opposition to software patents transcends the software world: indeed it can be found in past centuries and for other technologies; for example, the most cited case, and therefore <a href=\"http:\/\/www.terry.uga.edu\/~jlturner\/WattAgainAug2009.pdf\" class=\"broken_link\">so full of hyperbole<\/a>, is the decades-long delayed adoption of the vapour machine due to the machiavellic use of the rights conferred by one of its patents.<\/p>\n<p style=\"text-align: justify;\">Regarding current practices, a <a href=\"http:\/\/www.researchoninnovation.org\/swpat.pdf\">detailed study of the descriptive statistics of the use of software patents<\/a> shows that they have been the fastest growing category for decades, though software companies have not been granted many of them because the biggest appliers are other industries similarly intensive in their use of <span class=\"caps\">IT<\/span> capital but also with a strong record of filing for strategic patents. Note also that in the absence of strong patents rights, custom and common sense have required the use of copyright protection (which also does not need to give up any source code) even if it\u2019s a far weaker protection: in fact, both of them are complimentary, but their actual use is <a href=\"http:\/\/www.nber.org\/papers\/w11168.pdf\" target=\"_blank\" rel=\"noopener\">substitutive<\/a>, because whenever one of them is weakened, the other gets used much&nbsp;more.<\/p>\n<p style=\"text-align: justify;\">From a purely economic point of view, studies show a <a href=\"http:\/\/elsa.berkeley.edu\/~bhhall\/papers\/HallMacGarvie_Dec09.pdf\" target=\"_blank\" rel=\"noopener\">statistically significant increase of the stock value<\/a> of the software patent-owning companies and they happen to be a mandatory prerequisite to enter markets in which the incumbents already own strongly interdependent patent portfolios. And contrary to general opinion and practice, their use in <a href=\"http:\/\/www.columbia.edu\/~mr2651\/Data\/57.pdf\" target=\"_blank\" rel=\"noopener\">software start-ups<\/a> is, overall, positive: they increase the number of rounds and their amount, as well as survival and valuation in case of acquisition. From a strategic point of view, software patents raise barriers to entry acting as a <a href=\"http:\/\/www.econ.kuleuven.be\/msi\/_docs\/workshops\/2009-12-10.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">deterrent mechanism to the kind of competition<\/a> that just follow profits without investing in any kind of sunk costs in the search of technological advances: in short, an increase of 10% in the number of patents entails a reduction in competition between 3 and 8 per cent. And even if their valuation is a very complex matter, the intrinsic value of software patents is <a href=\"http:\/\/emlab.berkeley.edu\/users\/bhhall\/papers\/HallThomaTorrisi07_w13426.pdf\" target=\"_blank\" rel=\"noopener\">higher than that of the rest of patents<\/a>.<\/p>\n<p style=\"text-align: justify;\">In practice, the biggest burden in their granting and defence is the search of prior art: that is, even under the assumption that the inventor is operating under the principles of good will and full co\u00f6peration, he can\u2019t get access to the full prior art because most software is developed internally for companies and never sees the public light. This gives rise to a great number of non-innovative and trivial patents, and others that ignore the prior art on purpose, a matter which sometimes can be difficult to settle (vg. <a href=\"http:\/\/news.cnet.com\/8301-30685_3-20073461-264\/apples-new-multitouch-patent-faq\/\" target=\"_blank\" rel=\"noopener\">Apple Multi-touch<\/a>, <a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN%2F5960411\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Amazon 1\u2011click<\/a>). Fortunately, malicious uses <a href=\"http:\/\/isites.harvard.edu\/fs\/docs\/icb.topic619738.files\/Paper_07_03-09_Lemley.pdf\" target=\"_blank\" rel=\"noopener\">don\u2019t fare well<\/a> in the Courts of Justice: the strategies of the so-called patent trolls aren\u2019t successfully long-term, that is, those who are operating within the letter of the law but against its spirit, and are using the patent system to extract rents from others that are using them for productive purposes, a problem that <a href=\"http:\/\/www.groklaw.net\/pdf3\/BessenJFordJMeurerM091911.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">carries a very high economic cost<\/a>. Only their fair use brings a <a href=\"http:\/\/sticerd.lse.ac.uk\/dps\/ei\/ei43.pdf\" target=\"_blank\" rel=\"noopener\">true premium to business valuations<\/a>, that is, building a good patent portfolio that does not enter into practices of dubious ethics like filing for patents that only pursue the cross licensing with competitors to avoid paying them for their intellectual property.<br>\nThe fastest way to begin to learn how to write software patents is to start with <a href=\"http:\/\/web.archive.org\/web\/20081121022815\/http:\/\/www.djstein.com\/ip\/index.html\" target=\"_blank\" rel=\"noopener\">this set of documents<\/a>. And since real learning only happens from the best sources, there are lots of noteworthy software patents, examples to follow for their high degree of inventiveness and the business volume that they backed and helped generate:<\/p>\n<ul>\n<li>The first practical algorithm to solve <a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN%2F4744026\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">linear programming problems<\/a>.<\/li>\n<li><a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN%2F5479447\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\"><span class=\"caps\">DSL<\/span><\/a>, the technology that allowed for the cheap diffusion of broadband connectivity.<\/li>\n<li><a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN%2F6285999\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Pagerank<\/a>, the famous patent that laid out the foundations of Google; it also takes into account the method to quickly compute the rankings of indexed pages.<\/li>\n<li><a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN%2F4464650\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Lempel-Ziv-Welch<\/a>, the well-known algorithm for lossless data compression.<\/li>\n<li>In the cryptography field, the <a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect1=PTO2&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=24&amp;f=G&amp;l=50&amp;co1=AND&amp;d=PTXT&amp;s1=rivest.INNM.&amp;OS=IN\/rivest&amp;RS=IN\/rivest\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\"><span class=\"caps\">RSA<\/span><\/a> and <a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect1=PTO2&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=0&amp;f=S&amp;l=50&amp;TERM1=certicom&amp;FIELD1=ASNM&amp;co1=AND&amp;TERM2=&amp;FIELD2=&amp;d=PTXT\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\"><span class=\"caps\">ECC<\/span><\/a> algorithms, at the core of public key cryptography.<\/li>\n<li>The beginnings of digital sound would not have been possible without the <a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN%2F2605361\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\"><span class=\"caps\">DPCM<\/span><\/a> method or <a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect1=PTO1&amp;Sect2=HITOFF&amp;d=PALL&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&amp;r=1&amp;f=G&amp;l=50&amp;s1=4018121.PN.&amp;OS=PN\/4018121&amp;RS=PN\/4018121\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\"><span class=\"caps\">FM<\/span> sound synthesis<\/a>, and the patents of <span class=\"caps\">MP3<\/span> compression are dispersed across <a href=\"http:\/\/mp3licensing.com\/patents\/index.html\" target=\"_blank\" rel=\"noopener\">many companies<\/a>.<\/li>\n<li>In the storage field, it\u2019s curious how <span class=\"caps\">RAID<\/span> was invented a decade <a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN%2F4092732\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">before its definition<\/a> as a standard.<\/li>\n<li>Regarding hardware, we shall not forget the patents awarded to the transistor (<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN%2F2502488\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Shockley<\/a> and <a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN%2F2524035\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Bardeen<\/a>) and modern magnetic storage enabled thanks to the <a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-Parser?Sect1=PTO1&amp;Sect2=HITOFF&amp;d=PALL&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&amp;r=1&amp;f=G&amp;l=50&amp;s1=4,949,039.PN.&amp;OS=PN\/4,949,039&amp;RS=PN\/4,949,039\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\"><span class=\"caps\">GMR<\/span> phenomenon<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Holding a contrarian view could carry out great benefits: there has always been a need for a procedure to protect any innovative software from reverse engineering that at the same time allows for its appropriation and exclusionary use, as well as it precludes any imitation of its functionality, implementation details aside. This procedure really exists,&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[14,13,5],"tags":[],"_links":{"self":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/965"}],"collection":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=965"}],"version-history":[{"count":10,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/965\/revisions"}],"predecessor-version":[{"id":1609,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/965\/revisions\/1609"}],"wp:attachment":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=965"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}