tag:blogger.com,1999:blog-11863232682895111302024-03-13T04:53:50.102-07:00IP TargetDestroying IP of patent trolls one patent at a time.US Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.comBlogger27125tag:blogger.com,1999:blog-1186323268289511130.post-80079412869249901252011-06-16T15:43:00.000-07:002011-06-16T15:43:06.544-07:00More potential prior art for Lodsys patents<u><b>Patents</b></u><br />
Note - I really like this first reference, but have not had the time to compare it to the claim charts.<u><b><br />
</b></u><br />
<b><a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=3,878,371.PN.&OS=PN/3,878,371&RS=PN/3,878,371">3,878,371</a></b><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=3,823,388.PN.&OS=PN/3,823,388&RS=PN/3,823,388">3,823,388</a><br />
<b></b><br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=3,878,371.PN.&OS=PN/3,878,371&RS=PN/3,878,371"></a><br />
<b><br />
</b><br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=4,258,430.PN.&OS=PN/4,258,430&RS=PN/4,258,430">4,258,430</a><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2Fsearch-adv.htm&r=18&f=G&l=50&d=PALL&S1=3823388.UREF.&OS=ref/3823388&RS=REF/3823388">4,975,896</a><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2Fsearch-adv.htm&r=24&f=G&l=50&d=PALL&S1=3823388.UREF.&OS=ref/3823388&RS=REF/3823388">4,817,127</a><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2Fsearch-adv.htm&r=29&f=G&l=50&d=PALL&S1=3823388.UREF.&OS=ref/3823388&RS=REF/3823388">4,654,818</a><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2Fsearch-adv.htm&r=30&f=G&l=50&d=PALL&S1=3823388.UREF.&OS=ref/3823388&RS=REF/3823388">4,387,296</a><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2Fsearch-adv.htm&r=32&f=G&l=50&d=PALL&S1=3823388.UREF.&OS=ref/3823388&RS=REF/3823388">4,352,164</a><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2Fsearch-adv.htm&r=34&f=G&l=50&d=PALL&S1=3823388.UREF.&OS=ref/3823388&RS=REF/3823388">4,214,310</a><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2Fsearch-adv.htm&r=37&f=G&l=50&d=PALL&S1=3823388.UREF.&OS=ref/3823388&RS=REF/3823388">4,143,417</a><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2Fsearch-adv.htm&r=39&f=G&l=50&d=PALL&S1=3823388.UREF.&OS=ref/3823388&RS=REF/3823388">4,090,247</a><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2Fsearch-adv.htm&r=42&f=G&l=50&d=PALL&S1=3823388.UREF.&OS=ref/3823388&RS=REF/3823388">4,019,174</a><br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2Fsearch-adv.htm&r=43&f=G&l=50&d=PALL&S1=3823388.UREF.&OS=ref/3823388&RS=REF/3823388">3,956,740</a><br />
<br />
<u><b> </b></u><br />
<u><b>Non-Patent Literature</b></u> (I currently have not found these references, but would like to see them.)<br />
<br />
"Tiny Computer," Popular Science, Feb. 1977, p. 75<br />
"Infopac I1/2 Data Terminal," Azur Data Literature, Mar. 1976<br />
<br />
Thank you to <a href="http://iptarget.blogspot.com/2011/05/preliminary-invalidity-analysis-for.html?showComment=1308180880474#c5097049924363624697">Richard Pitt in the comments</a> to pointing my search in a specific direction.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com5tag:blogger.com,1999:blog-1186323268289511130.post-67206638261416069342011-06-16T13:44:00.000-07:002011-06-16T13:48:22.590-07:00Financially Viable Patent Defense Strategy for Application DevelopersSome commentators believe low-income application developers have no ability ($$$) to defend themselves against absurd patent claims like Lodsys is pursuing. Such commentators fail to think outside the box and are stuck in sort of an old world way of thinking that does not actually provide real solutions to application developers.<br />
<br />
Various commentators, including myself, have mentioned that application developers (or other companies) could join in a joint defense agreement. The costs of a winning strategy against Lodsys could cost a minimum of $50,000 - $100,000, so even if the couple dozen threatened developers get together, they might still have to pitch in at least $10,000 each. This may not be feasible or a good business decision for some application developers.<br />
<br />
<b>However, there is another option available to application developers and I believe this has to come from the developer community itself.</b> While this could be tough to implement quickly to deal with Lodsys and Macrosolve, this may help deal with future threats.<br />
<br />
<b>The application developer community as a whole, not just those developers that are directly threatened, could start a App Dev Patent Defense Organization. This could be implemented in may ways and I am sure people will have contributions to this that I have not thought of, but here are the basics:</b><br />
<b><br />
</b><br />
<b>1) Application developers join and contribute a yearly fee ($500?) to an organization that is solely created to defend members against patent infringement claims. </b><br />
<br />
<b>2) If massive participation could occur (I've seen the <a href="http://148apps.biz/app-store-metrics/">number of publishers near 90,000</a>, but I have no idea if that is true) If 10,000 developers join, then the fund would have $5 MILLION dollars PER YEAR to defend against the likes of Lodsys and Macrosolve!</b><br />
<br />
That is a sizable amount of cash to defend against any patent threat, as most patent infringement accusations are disposed of for a lot lower amount than that. There would be a lot of organizational details and structure to work out. I would suggest to have some type of Troll test so as not to defend against actually valid claim assertions, though that might be too limiting; an alternative may be to limit the fund for paying for defense costs but not paying for judgments of actual infringement. The fund should not provide coverage for actual infringers of valid patents.<br />
<br />
If one of the OS makers (Apple, Google, Microsoft, etc.) included contributing to the fund as a requirement to use their app store, then massive participation could occur. However, the App Dev Patent Defense Organization should be independent of any OS maker and owe a fiduciary duty to the app developer members, not any OS maker or other distributor. (though conflicts between members would have to be addresses also)<br />
<br />
What do people think? Let me know your thoughts.<br />
<br />
Just my thought for the day, if you need legal advice, go hire an attorney.<br />
-USPA<b><br />
</b><br />
<b><br />
</b>US Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-13770234082626108282011-06-14T13:02:00.000-07:002011-06-14T13:02:10.375-07:00To Kill a Patent Troll<a href="http://news.cnet.com/8301-1023_3-20070941-93/lodsys-sued-by-antivirus-software-maker/">Multiple lawsuits</a> for declaratory judgment against Lodsys have been filed by <a href="http://www.docstoc.com/docs/81270125/foresee-lodsys">Foresee</a>, <a href="http://www.scribd.com/doc/57776735/ESET-Declaratory-Judgment-Complaint-Against-Lodsys">ESET</a>, <a href="http://www.scribd.com/doc/57808498/Opinion-Lab-Complaint-Against-Lodsys">OpinionLab</a>, and <a href="http://www.scribd.com/doc/57808415/NYT-Complaint-Against-Lodsys">The New York Times</a>. <br />
<br />
I previously discussed a <a href="http://iptarget.blogspot.com/2011/05/troll-blasting-strategy.html">strategy to kill a patent troll</a>. While what is happening is not my actual strategy being implemented, I believe this is an important development that might encourage more companies threatened by Lodsys to file declaratory judgment actions. Hopefully facing many DJ actions will deter future patent trolls from such aggressive tactics like Lodsys is using, thought I think ultimately we need some <a href="http://iptarget.blogspot.com/2011/05/trolls-under-bridge-patent-reform.html">reform concerning what is required to file an infringement suit</a>.<br />
<br />
I would still like to see many, many more DJ actions filed in many other jurisdictions. I hope Lodsys sees its legal bills skyrocket. Though, <a href="http://www.scribd.com/doc/57574948/Lodsys-Complaint-Against-Adidas-BestBuy-Et-Al">Lodsys's response so</a> far has been like a wounded animal, lashing out at everything that moves... before it eventually dies off, hopefully. (In the corporate sense only, I do NOT wish literal death on any person, for the most part.)<br />
<br />
Here's to hoping more companies pile onto the DJ actions! I also would love to see the invalidity arguments... oh the anticipation of a good legal smackdown... (legal geek at heart) I hope that the DJ suits are not settled before disclosing the invalidity arguments.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-74782118801850701322011-06-13T11:11:00.000-07:002011-06-13T11:13:47.037-07:00Issues Raised By Apple's LicenseApple is asserting license (contract) rights and patent law doctrines of exhaustion and first sale while trying to intervene in the Lodsys v. small app devs lawsuit. This is a strategic move on Apple's part for likely many reasons, most of which we can and have guessed at, but will likely never fully know because we would need knowledge of Apple's licenses and relationship with IV.<b> </b><br />
<br />
<b>Apple's assertion of license rights will revolve around the critical question of who could be an infringer of the Lodsys patents. </b>If Apple is the direct infringer or caused contributory infringement, then per Apple's assertions, they are licensed for that.<b> This is the crux of Apple's defense, that Apple and only Apple could be an infringer of the Lodsys patents and Apple has a license which permits that.</b><br />
<br />
However,<b> if Lodsys can somehow establish that the application developers could infringe the patents exclusive of Apple, then Apple's license likely does not apply</b>. (I personally do not consider this very likely to happen; see my <a href="http://iptarget.blogspot.com/2011/05/fundamental-flaws-in-lodsys-patent.html">discussion of Divided Infringement</a>.) I would guess that we will see the application developers respond and assert claims of non-infringement because in essence, that is Apple's argument also, though Apple is being careful not to speak for the application developers.<br />
<br />
<br />
<b>Thus, if Apple is allowed to intervene and assert it's license rights, the lawsuit will still be decided on the question of infringement (direct, induced, contributory) and non-infringement.</b> And the <a href="http://iptarget.blogspot.com/2011/05/fundamental-flaws-in-lodsys-patent.html">issues surrounding Divided Infringement </a>will be heavily analyzed and argued if the lawsuit gets that far. Thus, Apple's attempted intervention does not necessarily short circuit the lawsuit by itself. I hoped it would induce Lodsys to back off, but recent news shows that they have an aggressive campaign against many companies.<br />
<br />
<b>I have no idea how Lodsys will respond to Apple's assertions because I have a hard time trying to formulate legal strategies that are completely divorced from facts of the case and the law.</b> Lodsys's <a href="http://www.applepatent.com/2011/06/lodsys-anatomy-of-bullshit-claim-chart.html">claim charts are a joke</a> and no decent patent attorney would ever sign their name to a lawsuit asserting them. As I have stated a few times earlier, I think Lodsys's patents are likely not infringed by anyone and highly likely to be invalid.<br />
<br />
Just my thoughts, retain your own attorney if you need actual legal advice.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-30820961149920216402011-06-13T10:26:00.000-07:002011-06-13T10:26:29.362-07:00Thoughts on Apple's Intervention in Lodsys LawsuitIf you have not heard, Apple has filed a motion to intervene in the Lodsys patent suit against application developers. See <a href="http://www.bloomberg.com/news/2011-06-13/apple-sanofi-teva-nordstrom-sinohub-intellectual-property.html">here</a>, <a href="http://www.macworld.com/article/160462/2011/06/apple_files_intervene_lodsys_lawsuit.html">here</a>, or for additional analysis see <a href="http://www.applepatent.com/2011/06/lodsys-apple-motions-to-interveve.html">here</a>. <br />
<br />
I like Apple's move, as it puts pressure on Lodsys and tries to bring themselves in as a defendant with enough resources to fight Lodsys properly. <b>However, everyone should understand that Apple is not providing ALL application developers full indemnification. Apple explicitly states this in the motion to intervene.</b> (I'll add the citation later) (It is not known if Apple has made individual agreements with the application developers already sued.) This is a smart business move by Apple because it is in their best interests to make sure <b>Apple does not have an implied obligation to provide indemnity anytime an application developer is sued or threatened</b>. In some situations, an application developer may get sued, and unlike the Lodsys patents, if the patents could be infringed solely by the application, Apple will probably not want to provide indemnification or get involved. (Note: These possible situations are typically addressed in a standard indemnification agreement.)<br />
<br />
In other suits, Foresee Results has filed a declaratory judgment action against Lodsys, asking for a finding of non-infringement and invalidity of Lodsys's patents. See <a href="http://allthingsd.com/20110609/84632/">here</a>.<br />
<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-48867785531067452222011-06-07T08:24:00.000-07:002011-06-07T08:24:05.862-07:00Why Macrosolve is substantially different from LodsysMacrosolve has been busy lately filing lots of lawsuits. While Macrosolve seems to be a Troll like Lodsys, there are substantial differences that will affect application developers for their legal strategies and risk analysis.<br />
<br />
A huge difference from the Lodsys analysis is that the claims in the Macrosolve patent (<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/PTO/srchnum.htm&r=1&f=G&l=50&s1=7,822,816.PN.&OS=PN/7,822,816&RS=PN/7,822,816">7,822,816</a>) (from a quick review) do not necessarily require another party (such as the operating system or hardware) to be infringed, whereas I believe the Lodsys '078 patent does. <b>That is, in plain english, a software company or application developer could possibly infringe the claims of the Macrosolve patent due to just their products.</b><br />
<b><br />
</b><br />
<b>What this</b><b> mean</b><b>s from a practical effect is that there may be no hardware company or OS company (such as Apple or Google) coming to the rescue to defend the application developers or offer indemnification.</b><br />
<b><br />
</b><br />
At this time, I have no opinion as to whether any applications do or do not infringe the Macrosolve '816 patent or whether there are any non-infringement or invalidity arguments with respect to the Macrosolve '816 patent. From an initial reading of the patent, much detail will need to be analyzed to determine the scope of the claims and how they could apply to each application, which analysis may be different for each application. Thus, a customized legal analysis for each application developer sued by Macrosolve might be needed.<br />
<br />
(I have to run this will likely be updated later)<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com1tag:blogger.com,1999:blog-1186323268289511130.post-38723427428265382662011-06-06T13:27:00.000-07:002011-06-06T13:27:22.213-07:00Leverage If You Are Threatened with Patent Infringement (and why you should ignore FOSSpatents)<b>Gene Quinn over at IP Watchdog has some good information on "<a href="http://ipwatchdog.com/2011/06/02/what-to-do-sued-for-patent-infringement/id=17538/">What To Do If You Are Sued for Patent Infringement</a>". Go read <a href="http://ipwatchdog.com/2011/06/02/what-to-do-sued-for-patent-infringement/id=17538/">the entire article</a>.</b> Whatever you do, please ignore the advice of non-attorney commentators (such as Florian Muller @ fosspatents) because they can be shortsighted and are not qualified to provide the complex legal analysis and advice you will need. (e.g. from one of Florian's latest posts about the Lodsys patents, any patent attorney should be able to recognize that Florian does not understand the law regarding patent infringement and numerous other issues.)<br />
<br />
For example, some commentators (including Florian Muller @ fosspatents) are advising targets of patent trolls to roll over and pay the license fee; Florian is even advising you that the license agreement that has not been made public is acceptable for you to sign. I very much question the soundness of this advice, especially considering the above article at IP Watchdog. <b>Contrary to the bad advice and legal analysis put forth by Florian, there are options available to companies threatened by patent trolls and even if the outcome is a license agreement, Florian's legal analysis and advice is not solid</b>. (I could write a white paper explaining why Florian's analysis is messed up, but I don't have the time right now. If anyone requests me to provide more detailed analysis, I will put it on my to-do list.)<br />
<br />
<br />
<span style="line-height: 160%;"> </span>For starters, in my opinion, <b>Lodsys probably LOVES Florian's analysis and opinions.</b> (I have no connection or contact with anyone at Lodsys, Apple, and no longer any contact with Florian). <b>He seems to be making all the arguments that support the troll's business plan</b> - you can't afford to fight, don't even try, the trolls arguments are decent, just give in and sign the license. Florian dismisses prior art searching, dismisses non-infringement arguments when he clearly does not understand the law, ignores invalidity arguments, misinterprets the claims to determine that Lodsys has a case that is possibly good enough to go to trial (remember, he is not an attorney), and makes statements such as "app devs will lose" unless they have blanket coverage from someone else. (note - of course, Florian includes CYA language in his posts so that he can have wiggle room out of his responsiblity for misleading people.)<br />
<br />
<b>Generally, this is why Florian is wrong: "<span style="line-height: 170%;"><span style="font-size: 10.5pt;">In order to be a party at the peace talk table, however, you need to have leverage of some kind, otherwise you are not a party to talks as much as you are having terms dictated.</span></span>" See <a href="http://ipwatchdog.com/2011/06/02/what-to-do-sued-for-patent-infringement/id=17538/">Gene Quinn's article</a>.</b> Gene does not provide a list of what that leverage might be, but he alludes to invalidity or reexam arguments.<br />
<br />
<b>To expand on that article, here are potential strategies that could add leverage during negotiations for a company threatened by a patent troll:</b><br />
<b> - have a non-infringement opinion</b><br />
<b>- have an invalidity opinion</b><br />
<b>- have a reexam prepared to file or filed</b><br />
<b>- file a motion for summary judgment</b><br />
<b>- file a declaratory judgment action</b><br />
<b>- consider counter claims (tortious interference, antitrust, etc...)</b><br />
<b>- have IP insurance provisions</b><br />
<b>- help fund a joint defense agreement</b><br />
<b>- hold off settling until a Markman opinion</b><br />
<br />
Many of these strategies can be implemented by a small company. Some companies may even implement more than one of these strategies at the same time. <b>As I have said before and Gene notes: "<span style="line-height: 170%;"><span style="font-size: 10.5pt;">The advice you need, and will get if you hire an attorney, will be tailored to your unique circumstances.</span></span>" </b>There are many variations of these strategies and others that can be implemented that will NOT cost one million dollars. You need to determine the right strategy for your company based on your circumstances.<br />
<br />
<b>Any good negotiator (which IMO excludes Florian) will tell you that you do not negotiate with yourself</b>. Thus, I have no idea why Florian claims to be supporting application developers when he writes analysis that attempts to shred their potential leverage arguments and advises them to pay what Lodsys is asking. If someone was truly supporting the application developers, they would be trying to bolster the application developers leverage arguments (as I have been trying to provide on this blog).<br />
<br />
<br />
Another issue I have with Florian is he seems not to recognize the value of a non-infringement or invalidity opinion, which can reduce a significant amount of risk for a comparatively small cost. Just another fail in his analysis. (I think his excuse for will be that none of the accused application developers have the resources available for any strategy other than pay the fee. Again, I think this shows why Florian is not qualified to advise anyone on strategy or risk concerning patent litigation.)<br />
<br />
On a personal note, Florian accused me of being an "anonymous smearer". While I am doing this anonymously, my response still stands: "FYI rebutting factually inaccurate statements does not make me a "smearer", it makes you uninformed".<br />
<br />
<b>If you are threatened, whatever you do, hire an attorney to advise you for your particular circumstances. There are many options and strategies available to you whether you fight or negotiate.</b><br />
<br />
Just my opinion, go hire your own attorney for legal advice.<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com7tag:blogger.com,1999:blog-1186323268289511130.post-5499440245114819312011-06-04T06:55:00.000-07:002011-06-04T06:55:56.308-07:00Hint of help for app devs? Just speculation...Yesterday, @chockenberry (Craig Hockenberry creator of Twitterrific) posted on Twitter: "Do the developers affected by Lodsys a favor next week: don't ask questions about what's going on. We can't talk about it. #wwdctips"<br />
<br />
Please listen to his request, as I am sure there is a good reason. While I wish he could talk about it, please respect that there are reasons why he can not. <br />
<br />
Though, I am in a mood to speculate this morning, so I asked myself "Why can't they talk about it?" and here are some possible reasons:<br />
<br />
1. Maybe the app devs are in confidential negotiations with Lodsys and agreed not to talk about it publicly.<br />
<br />
2. Maybe Apple's legal team is talking to the app devs and they agreed to confidentiality with Apple.<br />
<br />
3. Maybe the app devs are in a joint defense arrangement with other app devs and they agreed to confidentiality in the joint defense agreement.<br />
<br />
4. Maybe their legal counsel advised them not to talk about it.<br />
<br />
5. Maybe the app devs are just sick of all the bullshit surrounding the issue and don't want to talk about it.<br />
<br />
I personally hope that this tweet is an indication that option 2 or 3 might happen, but I have absolutely no inside information and this is pure speculation. What I do know is that litigation is stressful for most parties involved, especially a small company that may be inexperienced as a defendant in a patent litigation.<br />
<br />
Whatever the application developers do, I hope they have retained their own counsel (even if option 2 or option 3 is occurring) to look out for their interests first.<br />
<br />
If anyone thinks of anymore reasons (hey, I think I do a good job, but I am not infallible) to add to the list, let me know.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-57833370863624087802011-06-03T09:18:00.000-07:002011-06-05T08:24:12.042-07:00More analysis and claims charts of Lodsys patentAnother firm, M-Cam, which is not associated with me in any way, has also done a good analysis, prior art search, and claim charts concerning the Lodsys '078 Patent. <a href="http://www.m-cam.com/patently-obvious/can-apple-day-keep-trolls-bay-intellectual-property-analysis-macrosolve-inc-and-lod">See here.</a><br />
<br />
The prior art focused on for the '078 Patent are:<br />
<br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=4,634,845.PN.&OS=PN/4,634,845&RS=PN/4,634,845">US 4,634,845</a> - Portable personal terminal for use in a system for handling transactions<br />
<br />
<a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=5,535,407.PN.&OS=PN/5,535,407&RS=PN/5,535,407">US 5,535,407</a> - Data processing system for locally updating customer data distributed by a host computer to a remote facility and for returning the updated customer data to the host computer<br />
<br />
<br />
Their report is detailed and includes even more prior art for people to consider.<br />
<br />
UPDATE (6/5): I have spent a little more time reviewing the M-Cam document. While I am glad to see other organizations out there trying to help invalidate Lodsys's patents, their analysis, in my opinion, ignores some basic issues:<br />
<br />
<br />
1) They state "Apple maintains that developers are legally covered under their license, citing the legal doctrines of patent exhaustion and first sale". While I acknowledge that many non-attorney commentators are making similar statements, that is not exactly accurate from a legal standpoint of what Apple's letter stated. Any good patent attorney should be able to dissect the Apple letter to really get at the heart of what they were saying. For example:<br />
<blockquote> "Sewell recognizes that it is Apple, not the developer, that provides most of the claim elements in any reasonable mapping of the claim, and asserts that Apple is licensed to practice the inventions. He says developers are protected by Apple's license, not that developers are fully licensed." <a href="http://www.applepatent.com/2011/05/lodsys-1000-offer.html">See igoeIP Apple Patent Blog.</a></blockquote><br />
In essence, this is all about divided infringement and non-infringement by the application developers. The rest of Apple's letter is smoke and mirrors and any good patent attorney can tease out the true legal arguments. Also see <a href="http://ipwatchdog.com/2011/05/23/apple-to-patent-troll-back-off-apple-app-developers/id=17419/">IP Watchdog</a>. I expect someone trying to produce a document such as M-Cam should understand and explain these legal distinctions.<br />
<br />
2) Seems like they used "M∙CAM DOORS™ analytic platform", which I would guess is some sort of automated claim analyzer. While such systems can be powerful and useful to point a prior art search in the right direction, analysis of claims need to be done by an attorney, which they do not say has occurred.<br />
<br />
3) They compare claims of the '078 patent to claims of the prior art references. This seems very odd to me, because an invalidity argument is not based on the claims of the prior art, but what the prior art teaches as a whole. Thus, a patent attorney would not likely make such a chart for an invalidity argument using just the claims of a prior art system, they would include analysis from the rest of the reference.<br />
<br />
4) They completely ignore one of the major issues of the claims, what a "user perception of the commodity" is and whether their prior art addresses such. A patent attorney should never write such a document while omitting any analysis of such an important claim element.<br />
<br />
My conclusion: the art M-Cam cited is relevant, but they are far from having a high quality invalidity claim chart. To be clear, M-Cam never asserted or labeled their claim chart as an invalidity claim chart, they label it as "similarities in innovation in this technology space", though I am not sure what the point is other than trying to establish invalidity.<br />
<br />
I have not had a chance to review their long list of other references, if anyone else does, please let me know.<br />
<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-8075509471021882582011-06-03T08:51:00.000-07:002011-06-03T08:51:07.394-07:00Shortsighted to call App Devs a "mastermind"Ugh, non-attorney commentators... give lots of bad legal advice. Even if some conclusions and advice might be similar to that of an attorney, a lot of the analysis I have seen is not correct. (and it is easy to get some things right, when you post a ton of crap, the percentages are in your favor). Any person or company involved in highly complex legal issues, like patent infringement, need to receive advice and proper analysis from a qualified attorney.<br />
<br />
One particular issue I read just this morning:<br />
At least one non-attorney commentator I have read believes that the application developers could be a "mastermind" when considering divided infringement and thus, the divided infringement theory is skeptical (I refuse to link to his site because he is clearly giving legal advice and he is NOT an attorney).<br />
<br />
Of course to come this conclusions, such commentator glosses over many issues and seems to ignore the facts of the case, the elements of the claims, and the law on the matter.<br />
<br />
For example, if an attorney had done a similar "mastermind" or "control" analysis, they probably would have discussed this case, <a href="http://www.cafc.uscourts.gov/images/stories/opinions-orders/10-1110%20-1131.pdf"><strong>Centillion Data Systems, LLC v. Qwest Communications International, Inc.</strong> (Fed. Cir. 2011</a>):<br />
<br />
<blockquote><span style="font-family: "Tahoma","sans-serif"; font-size: 10pt;">The only way that Centillion can establish "use" by Qwest is if Qwest is vicariously liable for the actions of its customers such that "use" by the customers may be attributed to Qwest. Our precedents on vicarious liability, <b>BMC, Muniauction, Inc. v. Thomson Corp., 532 F.3d 1318, 1328-29 (Fed. Cir. 2008)</b>, <b>Akamai Technologies, Inc. v. Limelight Networks, Inc., 2009-1372, 2009-1380, 2009-1416, 629 F.3d 1311, 2010 U.S. App. LEXIS 25825, 2009-1417, 2010 WL 5151337 (Fed. Cir. Dec. 20, 2010)</b>, and<b> Cross Medical</b>, analyze the circumstances in which the actions of one party ought to be attributed to a second party for purposes of direct infringement — vicarious liability. In <i>BMC</i>, we noted that "[f]or process patent or method patent claims, infringement occurs when a party performs all of the steps of the process." <b>498 F.3d at 1378-79</b>. However, we noted that in some instances, one party could be liable for infringement of a method claim even if it did not perform all of the steps. This vicarious liability arises when one party controls or directs the actions of another to perform one or more steps of the method. <b>Id. at 1379</b>. We confirmed this approach for method claims in <b>Muniauction, 532 F.3d at 1328-29</b> [*19] and recently explained in <i>Akamai Technologies</i> that for infringement to be found when more than one party performs the steps of a method claim, an agency relationship or other contractual obligation to perform the steps must exist. <i>See </i><b>Akamai Techs., 2010 U.S. App. LEXIS 25825, 2010 WL 5151337, at *6</b>. In <i>Cross Medical</i>, we considered the issue of vicarious liability for making a claimed apparatus or system under <b>§ 271(a)</b>. The claim related to a medical device and, as properly construed, required contact between the device and human bone. <b>424 F.3d at 1310-11</b>. In the particular facts of that case, the accused manufacturer created the accused product, but did not perform surgeries to bring the device into contact with bone. We held that the manufacturer did not "make" the claimed apparatus. We held that if anyone made the claimed apparatus, it was the surgeon who implanted the accused device, possibly bringing it into contact with bone. <b>Id. at 1311</b>. We noted that the manufacturer would not be liable for the surgeon's direct infringement unless the surgeon acted as an agent of the manufacturer. <i>Id</i>.<br />
<br />
Following our vicarious liability precedents, we conclude, as a matter of law, that Qwest is not vicariously liable for [*20] the actions of its customers. Qwest in no way directs its customers to perform nor do its customers act as its agents. While Qwest provides software and technical assistance, it is entirely the decision of the customer whether to install and operate this software on its personal computer data processing means."</span></blockquote>With this in mind, I find it very hard for an application developer to be considered the "mastermind" or in "control".<br />
<br />
These are very complex legal issues that need a great deal of legal analysis and advice from a QUALIFIED ATTORNEY.<br />
<br />
If you are threatened, do not take your advice from non-attorney bloggers. Hire a qualified attorney to advise your options and legal strategy.<br />
<br />
Just my opinion, go hire your own attorney for legal advice.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-56399193959078564542011-06-03T08:16:00.000-07:002011-06-03T08:16:24.829-07:00Will Apple support the developers by filing a reexam?In the past, when dealing with patent trolls, <a href="http://patentlawcenter.pli.edu/tag/affinity-labs-v-nike-et-al/">Apple has taken an aggressive stance in filing reexams</a>. Will Apple file reexams on the Lodsys patents to support the application developers that were sued?<br />
<br />
As detailed with my posts earlier (<a href="http://iptarget.blogspot.com/2011/05/preliminary-invalidity-analysis-for.html">here</a>, <a href="http://iptarget.blogspot.com/2011/05/great-software-references-for.html">here</a>, and <a href="http://iptarget.blogspot.com/2011/05/first-group-of-patents-for-discussion.html">here</a>), there is plenty of prior art out there to put together a high-quality reexam, especially if a company like Apple throws their resources behind the prior art searching. The prior art I posted is the results of myself and a friend searching for only a few hours each; Apple could easily fund a much more comprehensive search and possibly find even better prior art. Most of the <a href="http://iptarget.blogspot.com/2011/05/larger-companies-are-also-targeted.html">large companies sued by Lodsys</a> have likely done prior art searches for invalidity opinions; I wish we could see the prior art they found, but I have not received any responses to such requests yet.<br />
<br />
There are a lot of considerations that Apple is likely weighing to determine the amount of support or involvement to provide the sued application developers. For instance, there are issues concerning whether Apple can directly challenge an IV patent (see <a href="http://iptarget.blogspot.com/2011/05/apples-interests-may-conflict-with-app.html">here</a>), which I do not know the answer to because it depends on the contracts between Apple and IV.<br />
<br />
Hopefully Apple jumps in to support the application developers at least with reexam support.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-70933001223975856612011-06-01T18:46:00.000-07:002011-06-01T18:49:27.724-07:00Lodsys files suit to bully small app developersUnfortunately for application developers, <a href="http://www.wired.com/gadgetlab/2011/06/lodsys-patents-android/">Lodsys has decided not to leave them alone</a>. This is not a surprise considering Lodsys's whole business model is based upon a mound of smelly bullshit. Their patent <a href="http://iptarget.blogspot.com/2011/05/fundamental-flaws-in-lodsys-patent.html">infringement assertions are laughable</a> and their patents are <a href="http://iptarget.blogspot.com/2011/05/preliminary-invalidity-analysis-for.html">questionably valid</a>. <b> They are in essence highway robbers that hope the threatened will pay them to let them pass unharmed rather than risk the expense of fighting.</b><br />
<br />
<b>Each application developer that is threatened or sued needs to hire an experienced patent attorney ASAP to <a href="http://iptarget.blogspot.com/2011/05/in-light-of-apples-letter.html">consider which options will be most suitable for their business</a>.</b><br />
<br />
One option that should be given consideration is filing a motion for summary judgment of non-infringement. <a href="http://iptarget.blogspot.com/2011/05/fundamental-flaws-in-lodsys-patent.html">See my arguments earlier considering non-infringement</a> (these arguments will similarly apply to the '565 Patent that has been asserted). This may be able to be done and allow the app developers to win the fight without sacrificing their whole company. Though, each app developer still needs to determine if they wish to fight or pay the highway robbers. I hope the application developers are also considering a joint defense arrangement to help with the costs.<br />
<br />
This is a great learning moment for small business and other app developers not yet sued. It might also be a good time to look into IP infringement insurance if you are in a tech industry.<br />
<br />
ALSO SEE: <a href="http://www.applepatent.com/2011/05/lodsys-1000-offer.html">igoeIP deconstructs the highway robbers bullshit offer of $1,000</a>. I planned to do another post on this exact thought, but igoeIP explained it all. <br />
<br />
Best of luck to the application developers.<br />
<br />
- USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-82124962232588096062011-05-27T07:03:00.000-07:002011-06-16T13:14:25.845-07:00Trolls under the Bridge - Patent Reform Proposal[UPDATE] Patent trolls are not a software patent problem, they can affect any industry and commonly do. I have spent over 10 years fighting patent trolls, mostly for the computer hardware industry (microprocessors, data storage devices, etc.). <br />
<br />
While dealing with patent trolls, I have come to the following conclusions:<br />
<br />
1) Patent trolls suck and usually need to misconstrue the claims of the patent to have an infringement argument;<br />
2) It is hard to write a patent reform law to get rid of trolls (trust me, I have tried) because you will inevitably include some people who are not trolls who have a good claim against an infringer; <br />
3) Patent trolls exploit loopholes in the patent system to maximum benefit (will explain below);<br />
4) rarely are the claims nearly as broad as the patent troll is trying to assert. (thus, I do not believe a wholesale change to our patent granting system is needed to address this.)<br />
<br />
One of the biggest loopholes of the U.S. patent system that patent trolls exploit, and which allows patent trolls to have a good deal of leverage over small business, is the lack of specificity and disclosure in the pleadings required by a plaintiff to file a patent infringement claim. Here is a great short summary:<br />
<blockquote>"<span style="line-height: 170%;"><span style="font-size: 10.5pt;">According to the Federal Rules of Civil Procedure all a patent owner has to do is assert the number and title of the patent and then vaguely say that one or more claims are believed to be infringed." <a href="http://ipwatchdog.com/2011/05/24/extortion-patent-style-small-business-in-the-troll-crosshairs/id=17425/">See IP Watchdog</a> to read their whole article regarding patent trolls.</span></span></blockquote>I believe patent trolls would lose a lot of their undue leverage in threatening a patent infringement lawsuit if they were required to include much more specificity at the time of filing. For instance, I would like to see the following required to be shown at the time of filing in order for a plaintiff to file a patent infringement lawsuit:<br />
<br />
<blockquote><b>1) Specific claims that are infringed must be asserted;</b></blockquote><blockquote><b>2) Claim charts mapping the specific claims asserted to the accused infringing product;</b></blockquote><blockquote><b>3) Claim interpretation arguments must be supplied explaining the support for such and how the claims apply to the product (i.e. Markman briefs must be submitted at the time of filing). </b></blockquote>My theory is that the leverage of the trolls exploiting these loopholes in the patent system will be reduced greatly if they have to show all the details of their theory of their case from the start, while parties with very legitimate claims for infringement will not have as many reservations about putting forth this specificity. Also, I believe this serves the public interest by having a greater disclosure of information.<br />
<br />
Further, another change in the law that would help would be:<br />
<blockquote><b>4) The claim interpretations and arguments put forth by the patent owner will have estoppel attach immediately, whether or not the claims have been fully and finally litigated. That is, the patent owner will be limited to the claim interpretations put forth during the pleading of the infringement claims and will be limited by such in future lawsuits regarding the same claims.</b></blockquote><br />
I have seen some discussion about these issues before at CLEs and in some articles, (I only found these articles with a quick search: <a href="https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&crawlid=1&doctype=cite&docid=18+Tex.+Intell.+Prop.+L.J.+451&srctype=smi&srcid=3B15&key=8cd11c001ecbee225616dafa363338d4">here</a> and <a href="https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&crawlid=1&doctype=cite&docid=3+Minn.+Intell.+Prop.+Rev.+297&srctype=smi&srcid=3B15&key=02616cd91874c4b6278a239402d18c77">here</a>, paid content though-sorry).<br />
<br />
Let me know your thoughts on this.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com2tag:blogger.com,1999:blog-1186323268289511130.post-43512801244616422372011-05-27T06:18:00.000-07:002011-05-27T06:18:21.862-07:00Android developer threatened by Lodsys?Lodsys has not gone away yet, for Apple or Android developers. According to at least <a href="http://www.macrumors.com/2011/05/27/lodsys-also-targeting-android-developers-with-patent-infringement-claims/">one report</a>, Lodsys has threatened to sue an Android application developer also, which makes sense. If Lodsys claims (completely bullshit claim though, see earlier posts) that Apple's app developers infringe, then by the same totally misconstrued claim interpretations, then the Android developers would also likely infringe. (But, if facts matter at all, they don't.) The analysis and discussion of the '078 patent I have already posted also applies to Android applications and the results and options are likely the same. <a href="http://iptarget.blogspot.com/2011/05/in-light-of-apples-letter.html">See here </a>for developer options.<br />
<br />
For a good summary of where things stand for Apple's application developers now, see <a href="http://www.gamerlaw.co.uk/2011/05/more-on-lodsys-apps-and-software.html">here</a>.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com1tag:blogger.com,1999:blog-1186323268289511130.post-17941459112656576642011-05-26T07:00:00.000-07:002011-05-26T07:00:40.383-07:00Preliminary Invalidity Analysis for Lodsys's '078 Patent<u><b>Background Info</b></u> <br />
Patents are presumed valid once they issue, however, a party may challenge the presumption of validity in a reexamination request, as a defense to a patent infringement suit, or in a declaratory judgment action. There are multiple reasons why a party can argue a patent may be invalid, but I will only address the two reasons based on prior art: Anticipation under 35 U.S.C. 102 ("102") and obviousness under 35 U.S.C. 103 ("103").<br />
<br />
under 102: For a piece of prior art to anticipate a patent claim and make it invalid, each and every limitation of the claim must be found either expressly or inherently in a single piece of prior art. <br />
<br />
under 103: For a combination of pieces of prior art to make a patent claim obvious and make it invalid, the decider (a court or the USPTO) must ask whether "[t]he combination of familiar elements according to known methods is likely to be obvious when it does no more than yield predictable results." This is a very quick overview of obviousness and does not explain all the intricacies, which is not the goal here. If you need more thoughts and detail about 103 see other articles (for example, <a href="http://www.patentlyo.com/patent/obviousness/">here </a>or <a href="http://www.patentbaristas.com/archives/2010/09/24/examination-guidelines-update-obviousness-examples-from-federal-circuit-cases/">here </a>).<br />
<br />
Thus, the ultimate goal of any invalidity search is to find a single piece of prior art that includes all of the elements of the claim that is trying to be invalidated.<br />
<br />
<b>In my search, I have found a reference that MIGHT provide a decent 102 argument or could be a good 103 argument.</b> Whether it would be considered 102 or 103 art will depend on the interpretation of the elements in the claim, which can be affected by interpretations of the patent's specification, statements made by Lodsys during prosecution of the patent (or possibly another related patent), statements Lodsys makes during litigation, and other factors. The interpretation of a claim is typically not determined by a court until a <a href="http://en.wikipedia.org/wiki/Markman_v._Westview_Instruments,_Inc.">Markman opinion </a>is issued during the patent litigation.<br />
<br />
As with my previously posted search results (<a href="http://iptarget.blogspot.com/2011/05/great-software-references-for.html">here </a>and <a href="http://iptarget.blogspot.com/2011/05/first-group-of-patents-for-discussion.html">here</a>), I am assuming the earliest possible priority date that Lodsys could claim based on the continuations and CIP filed dating all the way back to 1992. Sorry, but I have not had the time to read through all the documents to determine which claims should get what priority date; just trying to beat the earliest listed date is the shortcut at this point.<br />
<br />
<u><b>Analysis</b></u><br />
Here is my preliminary invalidity chart:<br />
<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" style="border-collapse: collapse; border: medium none;"><tbody>
<tr> <td style="border: 1pt solid windowtext; padding: 0in 5.4pt; width: 153.9pt;" valign="top" width="205"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=7222078.PN.&OS=PN/7222078&RS=PN/7222078"><b>US Patent 7,222,078</b></a></div></td> <td style="border-color: windowtext windowtext windowtext -moz-use-text-color; border-style: solid solid solid none; border-width: 1pt 1pt 1pt medium; padding: 0in 5.4pt; width: 2.5in;" valign="top" width="240"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><b>Possible Claim Interpretation (note: needs more direct analysis from specification and file histories)</b></div></td> <td style="border-color: windowtext windowtext windowtext -moz-use-text-color; border-style: solid solid solid none; border-width: 1pt 1pt 1pt medium; padding: 0in 5.4pt; width: 247.5pt;" valign="top" width="330"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><b><a href="http://books.google.com/books?id=Drkr6LylgP4C&pg=PA243&dq=electronic+survey+user+computer&hl=en&ei=1jrUTbvrO4WztwfA2MivCg&sa=X&oi=book_result&ct=result&resnum=7&ved=0CG0Q6AEwBg#v=onepage&q=electronic%20survey%20user%20computer&f=false">Practice management: new perspectives for the construction professional</a></b></div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span class="MsoHyperlink"><a href="http://books.google.com/books?id=Drkr6LylgP4C&pg=PA243&dq=electronic+survey+user+computer&hl=en&ei=1jrUTbvrO4WztwfA2MivCg&sa=X&oi=book_result&ct=result&resnum=7&ved=0CG0Q6AEwBg#v=onepage&q=electronic%20survey%20user%20computer&f=false"> By Peter Barrett, Roderick Males, © 1991</a></span></div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 153.9pt;" valign="top" width="205"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">1. A system comprising: </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 2.5in;" valign="top" width="240"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 247.5pt;" valign="top" width="330"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Hand-held computer system (p.243)</div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 153.9pt;" valign="top" width="205"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">units of a commodity that can be used by respective users in different locations, </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 2.5in;" valign="top" width="240"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Multiple computer hardware products with a user interface</div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 247.5pt;" valign="top" width="330"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Hand-held computer systems (p.243) are commodities that can be used by respective users in different locations, as that is inherent in their design.</div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 153.9pt;" valign="top" width="205"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">a user interface, which is part of each of the units of the commodity, configured to provide a medium for two-way local interaction between one of the users and the corresponding unit of the commodity, and </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 2.5in;" valign="top" width="240"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Each of the multiple computer hardware products has a user interface</div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 247.5pt;" valign="top" width="330"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Computer screen can show menus and scrolling lists on the hand-held computer, keyboard allows two-way interaction. (P. 243) Also, the Psion included a keyboard and screen. <a href="http://archive.psion2.org/org2/psion1/manual3.htm">http://archive.psion2.org/org2/psion1/manual3.htm</a></div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 153.9pt;" valign="top" width="205"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">further configured to elicit, from a user, information about the user's perception of the commodity, </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 2.5in;" valign="top" width="240"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% yellow;">The user interface can be configured to ask the user a question about the product. </span></div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% yellow;">Or, the user interface can receive feedback from a user about the product</span></div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 247.5pt;" valign="top" width="330"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% yellow;">A survey can be programmed. Surveys may include questions about conditions or attributes. (P. 244) </span></div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% yellow;">USPA comments: Inherently, a survey could ask any type of question, including a question about the hand-held computer itself. Thus, receiving user feedback about a product being used to conduct the survey is merely a simple design choice of the survey.</span></div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Also see <a href="http://www.jstor.org/pss/2631354">http://www.jstor.org/pss/2631354</a> to establish it was well known to receive user feedback about a specific product.</div></td> </tr>
</tbody></table><br />
<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" style="border-collapse: collapse; border: medium none;"><tbody>
<tr><td style="border: 1pt solid windowtext; padding: 0in 5.4pt; width: 153.9pt;" valign="top" width="205"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">a memory within each of the units of the commodity capable of storing results of the two-way local interaction, </div></td> <td style="border-color: windowtext windowtext windowtext -moz-use-text-color; border-style: solid solid solid none; border-width: 1pt 1pt 1pt medium; padding: 0in 5.4pt; width: 175.5pt;" valign="top" width="234"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Memory in the product</div></td> <td style="border-color: windowtext windowtext windowtext -moz-use-text-color; border-style: solid solid solid none; border-width: 1pt 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Data can be collected during a survey and stored in a memory to allow the transfer of data to a PC. </div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">“… the hand held computer, should prove to be the optimum solution. The data collected during the survey … the transfer of data to the main computer is controlled by programs on the PC and hand held computer…” (P. 243)</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Also, the Psion Organiser included memory, ROM, RAM, EPROM, and data packs. (P. 243) Also see </div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><a href="http://archive.psion2.org/org2/psion1/manual3.htm">http://archive.psion2.org/org2/psion1/manual3.htm</a></div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 153.9pt;" valign="top" width="205"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">the results including elicited information about user perception of the commodity, </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 175.5pt;" valign="top" width="234"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Configured to store answers to the question<span style="background: none repeat scroll 0% 0% yellow;"></span></div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Answers can be stored in the hand held computer . “… the hand held computer, should prove to be the optimum solution. The data collected during the survey … the transfer of data to the main computer is controlled by programs on the PC and hand held computer…” (P. 243) </div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 153.9pt;" valign="top" width="205"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">a communication element associated with each of the units of the commodity capable of carrying results of the two-way local interaction from each of the units of the commodity to a central location, and </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 175.5pt;" valign="top" width="234"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">An interface for transmitting data to a computer</div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">There is an interface or device to allow the data from a survey to be transferred to a PC. (P. 243) “it is assumed that a database will be set up on a PC to handle the storage and sorting of the collected data for all systems.” (P.242) </div><div align="center" class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt; text-align: center;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">“The transfer of data to the main computer is controlled by programs on the PC and hand held computer…” (P. 243)</div></td> </tr>
</tbody></table><br />
<br />
<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" style="border-collapse: collapse; border: medium none;"><tbody>
<tr> <td style="border: 1pt solid windowtext; padding: 0in 5.4pt; width: 153.9pt;" valign="top" width="205"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">a component capable of managing the interactions of the users in different locations and collecting the results of the interactions at the central location.</div></td> <td style="border-color: windowtext windowtext windowtext -moz-use-text-color; border-style: solid solid solid none; border-width: 1pt 1pt 1pt medium; padding: 0in 5.4pt; width: 2.5in;" valign="top" width="240"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Software at the computer to manage the questions and store the results.</div></td> <td style="border-color: windowtext windowtext windowtext -moz-use-text-color; border-style: solid solid solid none; border-width: 1pt 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">The hand-held computer can be programmed using survey design software. A database at a PC can collect the results of the survey from multiple hand held systems.</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">“As with all computers, the Psion needs to be programmed to enable a survey to be carried out. There are commercial packages available which enable the non computer literate user to generate a survey…” (P.243)</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">“The capital costs for the hand held system should also allow for the survey design software…” (P. 243)</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><br />
</div><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">“it is assumed that a database will be set up on a PC to handle the storage and sorting of the collected data for all systems.” (P.242)</div></td> </tr>
</tbody></table><span style="font-size: small;"> </span><br />
<div class="MsoNormal"><span style="font-size: small;">Also see the following to establish that it was quite well known to elicit user feedback for a product:</span></div><div class="MsoNormal"><span style="font-size: small;"><a href="http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6WGS-4T6NPWK-1&_user=10&_coverDate=12%2F31%2F1988&_rdoc=1&_fmt=high&_orig=gateway&_origin=gateway&_sort=d&_docanchor=&view=c&_searchStrId=1758934077&_rerunOrigin=scholar.google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=c4642c33b6df8d310f76ca4feb3bce19&searchtype=a">A survey of formal tools and models for developing user interfaces</a></span></div><div class="MsoNormal"><span style="font-size: small;"><br />
</span></div><div class="MsoNormal"><h1 class="mediumb-text" style="font-weight: normal; margin-bottom: 0px; margin-top: 0px;"><span style="font-size: small;"><a href="http://portal.acm.org/citation.cfm?id=86227.86238">Applications of computer-aided software engineering tools: survey of current and prospective users</a></span></h1></div><div class="MsoNormal"><span style="font-size: small;"></span></div><div class="MsoNormal"><h1 class="gb-volume-title" dir="ltr" style="font-weight: normal;"><a href="http://books.google.com/books?id=R3H_PV7maGQC&pg=PA429&dq=user+feedback+through+a+product&hl=en&ei=xdzWTcnOJIq3tgeu6eGIBw&sa=X&oi=book_result&ct=result&resnum=9&ved=0CGEQ6AEwCA#v=onepage&q=user%20feedback%20through%20a%20product&f=false"><span style="font-size: small;">GroupWare '92 By David Coleman</span></a></h1></div><div class="MsoNormal">(note on last link: scroll down to "User Feedback" section, p. 429) </div><div class="MsoNormal"><br />
</div>I have highlighted above what I believe will be the critical issue in any litigation if Lodsys keeps pursuing its patent litigation on the '078 patent. Also see <a href="http://www.applepatent.com/2011/05/lodsys-about-user-perception-of.html">igoeIP for analysis</a> about interpretation of "user's perception". Whether the art I cited invalidates the '078 patent or even Claim 1 will depend almost entirely on the claim interpretation provided to the highlighted element.<br />
<br />
For anyone not familiar with interpreting patents, it may seem like the claim chart above is not really addressing what the '078 Patent discusses in its figures and specification. That is because the legal breadth of a patent is defined by its claims and, generally, it is the elements of the claim that need to be shown in the prior art to invalidate the claim. For this analysis, I have assigned what I believe to be a reasonable interpretation of the claim, but I recommend anyone who might use this for an invalidity argument do a much more extensive investigation of claim interpretation.<br />
<br />
<u><b>Conclusion</b></u><br />
Based on the above analysis, there is a good argument that Lodsys's patent might be invalid, at least the broadest (independent) claims. I cannot guarantee to anyone that a judge or patent examiner will agree, but that is my opinion. If Lodsys keeps pursuing this, we will keep looking for even better prior art and posting it for everyone to have access to it. If you are aware of any prior art that we can document, please contact me.<br />
<br />
These are just my thoughts for discussion, I would love to hear feedback. <br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com4tag:blogger.com,1999:blog-1186323268289511130.post-34994764901608612772011-05-24T06:42:00.000-07:002011-05-24T08:00:05.126-07:00Troll Blasting StrategyHere is a strategy that a community of developers could implement to try to kill a troll. It has risk, but the benefits are huge. <br />
<br />
Generally, trolls know exactly what they are doing when they set the license price for small application developers very low. They probably chose this to give the application developers a huge incentive NOT to go to court. Most trolls business plan is predicated on the idea that a certain percentage of companies will pay to avoid legal costs because <b>the troll also wants to avoid legal costs</b>. (note: A troll, such as Lodsys, that wants a percentage of revenue does not guarantee that agreeing to the license will be the cheapest resolution to the problem.)<br />
<br />
Below is a strategy that I would love to see implemented in response to a troll, though it carries with it a certain amount of risk. But, it basically lets the application developer community slap the Troll down in a huge first round. It would also make an amazing statement to other Trolls that might attack application developers.<br />
<br />
<b>The Troll Blasting Strategy:</b><br />
<b>1. Prepare a declaratory judgment action to be filed based on non-infringement. For Lodsys '078, the details <a href="http://iptarget.blogspot.com/2011/05/fundamental-flaws-in-lodsys-patent.html">found here</a> and the details in <a href="http://www.macworld.com/article/160031/2011/05/apple_legal_lodsys_letter_text.html">Apple's letter to Lodsys</a> lay out the non-infringement argument against Lodsys's '078 Patent. Thus, the cost of preparing a detailed argument hopefully could be $10,000 or under.</b><br />
<b><br />
</b><br />
<b>2. Find developers across the nation, hopefully in 100+ different jurisdictions, willing to file the declaratory judgment action.</b><br />
<b><br />
</b><br />
<b>3. Each developer files the declaratory judgment action ON THE SAME DAY. That way, the troll would be required, at least initially, to respond to them all at the same time. Each developer may have to retain a local counsel to do this, but hopefully the costs for that are low (<$2,000 each? though we would need more specific quotes on this).</b><br />
<br />
<b>Goals of the Troll Blasting Strategy are 1) cause the troll to spend so much money defending against the claims that they will never recoup more than that from the app developer who filed the action; 2) bankrupt the troll; 3) show other trolls that the application developers will not be pushed around without a costly fight; 4) win the fight in a final battle.</b><br />
<br />
Even if the developers are found not to have standing to sue (possibly due to no direct threats, though we can argue otherwise) or their actions are consolidated, the Troll will be required to at least respond in each jurisdiction. The goals of the Troll Blasting Strategy could be accomplished.<br />
<br />
This strategy does start litigation, so it definitely has risk. Though, in the case of Lodsys '078 the likelihood of winning the declaratory judgment action is definitely in the application developers favor.<br />
<br />
Requirement for this strategy really to work is 1) funding to write the declaratory judgment action (ideally, I would love to see one of the application developers who has made a ton of money step up to fund this part); 2) a commitment from many other developers to file the action on the same day.<br />
<br />
As with any strategy, businesses need to consult their own patent attorney to receive feedback and determine if this minimizes their risk. That risk needs to include what the app developer will do about the next troll that comes along if Lodsys is successful in getting some good money.<br />
<br />
These are just my thoughts for discussion, I would love to here feedback. <br />
<br />
- USPA<br />
<br />
<br />
(FYI - my definition of a troll is any party that intentionally misconstrues the claims of their patent to assert it against another. They don't have to be NPEs, all that is required is an intentional misconstruing of the claims. Lodsys has clearly done this.)US Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com2tag:blogger.com,1999:blog-1186323268289511130.post-8985270159579902832011-05-23T13:25:00.000-07:002011-05-23T18:15:13.259-07:00In light of Apple's letter...(Note - The first draft of this post was done prior to Apple releasing their <a href="http://www.macworld.com/article/160031/2011/05/apple_legal_lodsys_letter_text.html">letter to Lodsys</a>. I have updated it based on that significant development.) <br />
<br />
I think some of the non-attorney advice givers should admit to their followers that they are not qualified to give legal advice when they do not fully understand the underlying legal issues. I think the <a href="http://www.macworld.com/article/160031/2011/05/apple_legal_lodsys_letter_text.html">Apple letter to Lodsys</a> this morning has undermined some of the more widely distributed non-attorney advisers and, in my opinion, shows that their advice might be wrong.<br />
<br />
I am particularly referring to those who basically said "pay Lodsys what they want or go bankrupt". At least one such commentator, who in my opinion has such a large ego that he believes his non-attorney legal advice is better than good patent attorneys, has also questioned the abilities of patent lawyers to provide real solutions to problems. Sadly, this person seems somewhat mis-informed and not qualified to comment on legal matters. A little knowledge is a dangerous thing...<br />
<br />
<b>Problems with the comments I have seen is that the authors clearly do not understand that all business decisions with legal risks have to be based on a close examination of the underlying legal risks. Thus, BE WARY OF NON-LAWYERS GIVING LEGAL ADVICE. Just because someone knows a little bit about business does not make them a qualified patent lawyer</b>.<br />
<br />
About the non-lawyer articles giving advice, they all seem to make major assumptions that are in many cases just plain wrong. For example, some state that the risk to application developers by Lodsys is independent from how meritorious Lodsys's assertion is. This is completely wrong; the amount of risk is completely dependent on the underlying claim by Lodsys, as was clearly shown in <a href="http://www.macworld.com/article/160031/2011/05/apple_legal_lodsys_letter_text.html">Apple's letter to Lodsys</a> that was released this morning. <br />
<br />
I've tried to explain to such commentators that understanding the underlying legal risk is necessary to gauging the risk to an application developer; thereby allowing the developer to be able to make a well-informed business decision. They also claim that no application developer can afford to fight Lodsys; this is also wrong (though I agree it may not be the cheapest solution). Other dubious claims are that signing the license will make everything okay and be the cheapest course of action; again, this is not necessarily true and I highly question whether anyone making such statements has ever done any actual licensing in a settlement negotiation setting. <b>There are a lot of variables that each business has to understand and evaluate to make the best decision for their business. </b>Advice based on generalizations can lead to very bad outcomes.<br />
<br />
While I have tried to explain this theory of making informed business decisions to such commentators, they dismiss this so that they can send out their headline grabbing statements that basically say sign the license or DIE! While such commentators may truly be attempting to help the application developers, they are actually doing the developers a disservice by pretending to give knowledgeable advice when it is really short-sighted and may discourage application developers from hiring an attorney to properly advise them of their legal risks. <br />
<br />
<b>Every application developer that is threatened should hire a patent attorney experienced in litigation and licensing, at least to advise them of their options and risks. A job of an attorney is to advise each client about the options and legal risks associated with taking different courses of action. Attorneys do not make the decisions, they just try to minimize risk for the client. The client makes the decisions, and the best decisions are based on a full understanding of the underlying LEGAL risks, not just someone's assumptions about business; in the Lodsys mess, the risks would include the legal analysis of infringement of the patent and costs associated with different actions. </b><br />
<br />
<br />
In rebuttal to the SIGN OR DIE options put forth by non-attorneys, there are the other options available to the application developers, each with different inherent risks that need to be explained to the threatened application developers by their LAWYER:<br />
<br />
1. Do nothing. Basically you would be calling Lodsys's bluff. In light of Apple's letter, this might not be a bad strategy. Though, nothing in the letter prevents Lodsys from suing or offers indemnity to the application developers. As you are aware if you have read my other posts, their patent is shit. Will Lodsys go all in by filing suit or not?<br />
<br />
2. Send Lodsys a letter telling them that you do not infringe and that any further threats by them may result in you filing a declaratory judgment action against them. Maybe even threaten filing a suit based on patent misuse or violation of antitrust laws.<br />
<br />
3. File a reexamination. This costs some money, but I will be posting more info on an invalidity analysis that could help defer such costs.<br />
<br />
4. File a declaratory judgment action.<br />
<br />
5. Enter into a joint defense arrangement with other application developers or Apple.<br />
<br />
6. Agree to License the patents from Lodsys. Though, this is also not a guaranteed cheap option depending on the license terms and amount of negotiation needed.<br />
<br />
7. (added to differentiate from just taking the license they offered) Negotiate a Settlement and License with Lodsys. If an application developer has done their due diligence (some of which is provided on this site), they would have very good leverage to negotiate with Lodsys, considering that most application developers would not infringe their patent and their patent may be invalid.<br />
<br />
Whichever option you go with, there will be different costs and risks, application developers should hire a patent attorney with licensing and litigation experience to advise them on each of these. Please do not take your legal advise from non-attorney commentators that are not qualified patent attorneys. A threatened party needs to do their due diligence to make an informed decision.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com1tag:blogger.com,1999:blog-1186323268289511130.post-24739936559789654132011-05-23T12:24:00.000-07:002011-05-23T12:34:25.369-07:002 Major Issues with Apple's Letter: Analysis of Apple's letter to LodsysWhile the <a href="http://www.macworld.com/article/160031/2011/05/apple_legal_lodsys_letter_text.html">letter Apple sent to Lodsys</a>, and released publicly, is very encouraging in that Apple is trying to assert some pressure on Lodsys, there are some glaring holes that Apple did not address.<br />
<br />
1) Apple's letter does not prevent Lodsys from suing an application developer. (And to be clear, Apple likely can NOT prevent Lodsys from doing whatever Lodsys wants to.) All Apple's letter does is basically argue that the actual infringement is done by Apple, and since Apple is already licensed, Lodsys should go away. (The letter's analysis is basically the same as outlined in <a href="http://iptarget.blogspot.com/2011/05/fundamental-flaws-in-lodsys-patent.html">my divided infringement analysis earlier</a>.)<br />
<br />
2) Apple did not publicly tell all application developers that they would indemnify the developers. This is what everyone needs, not just a well-written letter. Hopefully, Apple has made a private commitment to indemnify the threatened developers; although I personally have no knowledge of this.<br />
<br />
Without the promise to fully indemnify application developers, the application developers still need to determine what might be their best course of action, as the threat of a lawsuit is still there. While some support from Apple is nice to see, their letter does not completely negate the legal consequences and risks posed by Lodsys to application developers. Hopefully, Lodsys chooses to take Apple's advice and tells the application developers that they are no longer threatened.<br />
<br />
I have a detailed post about options and advice for developers in the works that I will be posting later today.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-82688980311288913512011-05-21T09:42:00.000-07:002011-06-03T09:25:37.075-07:00Apple's Interests May Conflict with App DevsAs I was discussing my post about the <a href="http://iptarget.blogspot.com/2011/05/fundamental-flaws-in-lodsys-patent.html">Fundamental Flaws in the Lodsys Patent</a> with a friend, I started thinking about what possible issues Apple may have that are different than the Application Developers. Here are some hypotheticals and questions that I do not know the answers to, but I would like to see someone press Apple for an answer to these.<br />
<br />
1) Does Apple have any contractual obligations due to their license with Lodsys (or Intellectual Vetnrues "IV" or whomever) not to interfere in the assertion of previously owned IV patents? There are a lot of huge business issues here at stake if Apple were to help invalidate or defend against an IV owned patent. If Apple were to step in and defend against an IV patent, what would be the business consequences? As a contributing member/partner/licensee/whatever of IV, would that cause a conflict of interest with regards to IV? <br />
<br />
2) Could Apple be sued for contributory patent infringement for being the "mastermind" behind any infringement? <a href="http://iptarget.blogspot.com/2011/05/fundamental-flaws-in-lodsys-patent.html">From my analysis earlier, </a>Apple may be the only entity that practices and controls all of the elements of the Claims of the '078 Patent. It is possible their license to the Lodsys patents does not give them the right to cause contributory infringement. Thus, if Apple steps in to help the App Developers, might they be identifying themselves as a defendant and possibly admitting that they are an infringer and not the App Developers? (to be clear, I am not asserting that Apple infringes - I personally do not believe any applications likely infringe the '078 due to non-infringement and invalidity.) [UPDATE: Apple, in its letter to Lodsys, pretty much says that they would be the only direct infringer and, since they are licensed, their is no basis for claims against application developers.]<br />
<br />
While from the viewpoint of the App Developers this is a straightforward issue of Apple needing to step up, this is likely a very difficult issue for Apple to deal with. These are some of the issues I thought of that could prevent Apple from taking a position to help the Application Developers. I do not have any internal information from Apple nor do I have any connection to Apple. I hope Apple does help out, but I am just putting these questions out there for a realistic business discussion, rather than just demanding that Apple step up.<br />
<br />
If anyone has any links or information that could answer any of these questions, let me know.<br />
<br />
- USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-13754684682809116322011-05-21T08:16:00.000-07:002011-05-21T08:52:31.937-07:00Fundamental Flaws in Lodsys Patent<div class="MsoNormal">In my opinion, there are fundamental flaws in Lodsys’s ‘078 Patent due to Divided Infringement, especially in a typical situation of an independent application developer. </div><div class="MsoNormal"><br />
</div><div class="MsoNormal">Divided Infringement means the limitations of a claim require actions by more than one party (company) to infringe the claim. In a divided infringement claim, the owner of the patent would typically have to assert that the actions (or products) of all of the parties together constitute joint infringement.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">However, when actions of more than one party are necessary to infringe a patent claim, U.S. patent law has very strict requirements for the patent owner to establish infringement of the divided claim. I will start with an explanation of the three general types of patent infringement allowed by <a href="http://www.uspto.gov/web/offices/pac/mpep/documents/appxl_35_U_S_C_271.htm">U.S. law – direct infringement, induced infringement, and contributory infringement</a>.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b>Direct Infringement</b> occurs when a single party makes, uses, offers to sell, sells, within the U.S. or imports into the U.S. any patented invention during the term of the patent, without the authority of the patent owner. For a method claim, <span style="color: black;">there must be a single party performing ALL of the steps of the method.</span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b>Induced Infringement</b> occurs when a second party actively induces (encourages, teaches,) a first party to commit Direct Infringement.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b>Contributory Infringement</b> occurs when the participation and combined action(s) of more than one person or entity cause a patent claim to be infringed. The patent owner can establish infringement <b>only</b> if the other </div><div class="MsoNormal">parties operated under the control or direction of the accused infringer (the mastermind). <a href="http://www.cafc.uscourts.gov/images/stories/opinions-orders/06-1503.pdf">See BMC Resources v. Paymentech, L.P.</a> The Court of Appeals for the Federal Circuit (CAFC) stated “This court acknowledges that the standard requiring control or direction for a finding of joint infringement may in some circumstances allow parties to enter into arms-length agreements to avoid infringement.”</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">Now, we look at the claims to see what party or parties might infringe the claims. I will address the four independent claims because if those are not infringed, then there is no reason to evaluate any of the dependent claims because those will also not be infringed. I am not yet diving into a discussion of what “user perception” means, because I think we can arrive at some initial thoughts on infringement without that. However, <a href="http://www.applepatent.com/">igoeIP has some good analysis</a> of some of those issues already posted.</div><div class="MsoNormal"><br />
</div><table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" style="border-collapse: collapse; border: medium none; width: 679px;"><tbody>
<tr> <td style="border: 1pt solid windowtext; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><b>US Patent 7,222,078</b></div></td> <td style="border-color: windowtext windowtext windowtext -moz-use-text-color; border-style: solid solid solid none; border-width: 1pt 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><b>What might be used to do the claim element?</b></div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">1. A system comprising: </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">N/A</div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">units of a commodity that can be used by respective users in different locations, </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% lime;">Computer or mobile device (which is a computer as discussed herein) </span>Note – I believe the next element requires this to be hardware and not software, thought this assumption will not change my conclusions<span style="background: none repeat scroll 0% 0% lime;"></span></div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">a user interface, which is part of each of the units of the commodity, configured to provide a medium for two-way local interaction between one of the users and the corresponding unit of the commodity, and </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% lime;">Computer with a user interface</span></div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">further configured to elicit, from a user, information about the user's perception of the commodity, </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Software on the computer</div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">a memory within each of the units of the commodity capable of storing results of the two-way local interaction, the results including elicited information about user perception of the commodity,</div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% lime;">Computer hardware</span></div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">a communication element associated with each of the units of the commodity capable of carrying results of the two-way local interaction from each of the units of the commodity to a central location, and </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% lime;">Computer hardware</span></div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">a component capable of managing the interactions of the users in different locations and collecting the results of the interactions at the central location.</div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% lime;">A server</span></div></td> </tr>
</tbody></table><div class="MsoNormal"><br />
</div><div class="MsoNormal">Generally, Claim 1 requires a party to make, use, or sell the computer hardware listed in the claim. To be clear, “use” requires use of the invention (i.e. a party performs all of the claim elements or steps in a method).</div><div class="MsoNormal">Therefore, for direct infringement of Claim 1, a party needs to make, use, or sell the computer, the software, <b>AND</b> the server. A typical independent application developer does not make, use, or sell the computer and possibly does not even make or use the server. </div><div class="MsoNormal"><br />
</div><div class="MsoNormal">For contributory infringement of Claim 1, a party would need to control or direct the accused infringer. In the recent situation of the application developers, they are the accused infringer but they do not control the device hardware or the servers. Therefore, a contributory infringement claim against them for Claim 1 would likely be unsuccessful.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">The only party with control might be a computer or mobile device manufacturer, such as Apple because they produce the hardware, likely control the app store servers, and seem to have controlled the use of the in-app purchase technology; however, from the reports out there and Lodsys’s own statements, Apple already has a license, so they probably cannot be an accused infringer.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">Thus, I do not see how Lodsys could win an assertion that any independent application developer could infringe Claim 1.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b>As for Claim 54</b>, a similar analysis applies, but the claim requires a direct infringer to make, use, or sell facsimile equipment. For contributory infringement, a party would have to control or direct the vendor of the facsimile equipment in addition to the other elements. I do not see how an independent application developer would infringe this claim either.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b>As for Claim 60</b>, again a similar analysis applies, a party needs to make, use, or sell a computer, the software, and the server for direct infringement to occur. For contributory infringement, a party would have to control or direct all of those elements. Again, I do not see how an independent application developer would infringe this claim either.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><b>Moving onto Claim 69</b>.</div><div class="MsoNormal">Claim 69 is a little harder to determine. However, with a method claim, the party executing the method would typically be the infringer. Therefore, the method claim may be only assertable against an end-user of a computer if such user executes a method (software, process, etc.) that infringes the claims. As stated above, “use” requires use of the invention (i.e. a party performs all of the claim elements or steps in a method).</div><div class="MsoNormal"><br />
</div><table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" style="border-collapse: collapse; border: medium none; width: 679px;"><tbody>
<tr> <td style="border: 1pt solid windowtext; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><b>US Patent 7,222,078</b></div></td> <td style="border-color: windowtext windowtext windowtext -moz-use-text-color; border-style: solid solid solid none; border-width: 1pt 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><b>What party might do the claim element?</b></div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">69. A method for gathering information from units of a commodity in different locations, each unit of the commodity being coupled to a remote database on a network, the method comprising: </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">N/A – for sake of argument, I am assuming the preamble may be non-limiting.</div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">eliciting user perceptions of respective units of the commodity through interactions at a user-interface of the respective unit; </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Software in a commodity with a user interface.</div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">generating perception information based on inputs of the users at the respective user-interfaces; </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">The software of the commodity.</div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">transmitting the perception information to the remote database; </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;">Transmitter hardware or software of the commodity.</div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">receiving the transmitted perception information from different units of the commodity; and </div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% lime;">A server connected to a network.</span></div></td> </tr>
<tr> <td style="border-color: -moz-use-text-color windowtext windowtext; border-style: none solid solid; border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 257.4pt;" valign="top" width="343"><div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0.0001pt 0.25in; text-indent: -0.25in;">collecting and storing the received information at the remote database.</div></td> <td style="border-color: -moz-use-text-color windowtext windowtext -moz-use-text-color; border-style: none solid solid none; border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 3.5in;" valign="top" width="336"><div class="MsoNormal" style="line-height: normal; margin-bottom: 0.0001pt;"><span style="background: none repeat scroll 0% 0% lime;">The server and software at the server.</span></div></td> </tr>
</tbody></table><div class="MsoNormal"><br />
</div><div class="MsoNormal">Even if an end-user executes software to elicit perceptions, etc., a party would also have to perform the steps at the server to infringe Claim 69. If an independent application developer does not perform the server steps, then there cannot be direct infringement. From my understanding, for at least the in-app upgrades and purchases, <a href="http://blog.mugunthkumar.com/coding/iphone-tutorial-%E2%80%93-in-app-purchases/">Apple’s servers for their app store manage that</a>. (someone please correct me if I am wrong about this.) </div><div class="MsoNormal"><br />
</div><div class="MsoNormal">For an assertion of contributory infringement, I doubt if any of the developers have control or direction over how Apple manages their app store servers.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">If Lodsys tries to assert a theory of induced infringement for Claim 69, they will likely run into the problem of not having a single party that they can point to for direct infringement. Especially considering the last step is probably completely done by and under the control of whomever owns the purchasing servers (Apple?) and not an application developer.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"></div><b><u>Conclusion </u></b> <br />
<div class="MsoNormal">In conclusion, I believe Lodsys has a very weak patent - I haven’t even gotten to the “user perception” issues (see <a href="http://www.applepatent.com/">igoe IP</a> for a start) or the invalidity arguments that could ALSO be made. Further, I believe the ‘078 Patent is a badly drafted patent that will make it very difficult for Lodsys to assert and win a patent infringement claim against an independent application developer. Although, even if my analysis is correct, there is no guarantee that Lodsys will not sue an application developer, but there is a good likelihood that anyone who fights Lodsys may win.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">Patent Drafting Note - </div><div class="MsoNormal">I consider the divided infringement claims to be an error on the prosecuting patent attorney’s part. I’ve been writing claims for my clients to address these issues since at least 2005 and I believe any patent attorney that does not take BMC into account while drafting claims is not doing a good job for their clients. See <a href="http://www.patentlyo.com/patent/2007/03/divided_infring.html">Lemley</a> for claim drafting suggestions, however the legal analysis cited there regarding joint infringement is not correct due to more recent case law. If you have paid for a patent to be drafted, you should expect better work than this.</div><div class="MsoNormal"></div><div class="MsoNormal"></div><div class="MsoNormal"><br />
</div><div class="MsoNormal">These are just my thoughts on the patent mess that is Lodsys.</div><div class="MsoNormal">- USPA </div>US Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com3tag:blogger.com,1999:blog-1186323268289511130.post-16261134083870107022011-05-20T10:56:00.000-07:002011-05-20T10:56:02.750-07:00For some good claim analysis see...<a href="http://www.applepatent.com/2011/05/lodsys-about-user-perception-of.html"> igoeIP has some great analysis of possible claim interpretations.</a><br />
<br />
Although I have not posted my review yet, I agree with the questions and issues raised by Mr. Igoe. I have reviewed the application and claims. But, I still have yet to review the file history or any other litigation documents that might be relevant from Lodsys's other litigation. Those are the fun-fun readings for this weekend. <br />
<br />
In my preliminary findings, I find it hard to see how Lodsys's patents cover in-app purchases. I just don't see how an in-app upgrade or an in-app purchase could be a "user perception" as used in the patents.<br />
<br />
-USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-20257148116220936912011-05-20T10:00:00.000-07:002011-05-20T11:54:41.093-07:00Great software references for invalidity discussionHere are a few non-patent references. I placed them in order of a quick scan I did for importanc<span style="font-size: small;">e. Let me know your thoughts or if something stands out.</span><br />
<br />
<div style="color: black;"><span style="font-size: small;"><a href="http://www.blogger.com/goog_1003314495"></a></span></div><h1 class="gb-volume-title" dir="ltr" style="font-weight: normal;"><a href="http://books.google.com/books?id=Drkr6LylgP4C&pg=PA243&dq=electronic+survey+user+computer&hl=en&ei=1jrUTbvrO4WztwfA2MivCg&sa=X&oi=book_result&ct=result&resnum=7&ved=0CG0Q6AEwBg#v=onepage&q=electronic%20survey%20user%20computer&f=false"><span style="font-size: small;">Practice management: new perspectives for the construction professional By Peter Barrett, Roderick Males</span><span style="font-size: small;"> - 1991</span></a></h1><span style="font-size: small;"><span class="addmd"></span></span><br />
<h1 class="gb-volume-title" dir="ltr" style="font-weight: normal;"><span style="font-size: small;"><a href="http://books.google.com/books?id=gjNiaLLWu0EC&pg=PA44&dq=user+survey+electronic&hl=en&ei=pzfUTY32K4Gk-gaU0pHOCg&sa=X&oi=book_result&ct=result&resnum=10&ved=0CG0Q6AEwCQ#v=onepage&q=user%20survey%20electronic&f=false">Coordinating user interfaces for consistency By Jakob Nielsen - 1989</a></span></h1><span style="font-size: small;"><span class="addmd"></span></span><br />
<h1 class="gb-volume-title" dir="ltr" style="font-weight: normal;"><span style="font-size: small;"><a href="http://books.google.com/books?id=77tvKWBSdVAC&pg=PA174&dq=electronic+survey&hl=en&ei=lTrUTerSCNGltwfcqpWcCg&sa=X&oi=book_result&ct=result&resnum=3&ved=0CEQQ6AEwAg#v=onepage&q=electronic%20survey&f=false">Public opinion polls and survey research: a selective annotated bibliography ... By Graham R. Walden - 1990</a></span></h1><span style="font-size: small;"><span class="addmd"></span></span><br />
<h1 class="gb-volume-title" dir="ltr" style="font-weight: normal;"><span style="font-size: small;"><a href="http://books.google.com/books?id=CjwEAAAAMBAJ&lpg=PA13&dq=software%20remote%20update&pg=PA13#v=onepage&q=software%20remote%20update&f=false">InfoWorld <span dir="ltr">Aug 20, 1990</span></a></span></h1><h1 class="gb-volume-title" dir="ltr" style="font-weight: normal;"><span style="font-size: small;"><a href="http://books.google.com/books?id=zjwEAAAAMBAJ&lpg=PA65&dq=user%20input%20remote&pg=PA63#v=onepage&q=user%20input%20remote&f=false">InfoWorld <span dir="ltr">May 11, 1987</span></a></span></h1><h1 class="gb-volume-title" dir="ltr" style="font-weight: normal;"><span style="font-size: small;"><a href="http://books.google.com/books?id=OhEEAAAAMBAJ&pg=PA23&dq=user+survey+electronic&hl=en&ei=pzfUTY32K4Gk-gaU0pHOCg&sa=X&oi=book_result&ct=result&resnum=3&ved=0CEoQ6AEwAg#v=onepage&q=user%20survey%20electronic&f=false">Network World <span dir="ltr">May 25, 1992</span></a></span></h1><h1 class="gb-volume-title" dir="ltr" style="color: black; font-weight: normal;"><span style="font-size: small;"><a href="http://books.google.com/books?id=KzsEAAAAMBAJ&pg=PA39&dq=button+download&hl=en&ei=pyLUTbLdNoSatweTyOmkCg&sa=X&oi=book_result&ct=result&resnum=2&ved=0CDEQ6AEwATgo#v=onepage&q=button%20download&f=false">InfoWorld <span dir="ltr">Mar 5, 1990</span></a></span></h1><h1 class="gb-volume-title" dir="ltr" style="color: black; font-weight: normal;"><span style="font-size: small;"><span dir="ltr">- USPA</span></span></h1><div style="color: black;"><span style="font-size: small;"><br />
</span></div>US Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com1tag:blogger.com,1999:blog-1186323268289511130.post-23169552266493297242011-05-19T12:34:00.000-07:002011-05-19T13:12:39.533-07:00Re-exam option is getting some discussionGreat information from Macworld, go read the <a href="http://www.macworld.com/article/159947/2011/05/lodsys_dispute_analysis.html">entire article</a>:<br />
<blockquote> "A further option available to developers would be to have Lodsys’s patents declared invalid, a process that requires filing a petition with the U.S. Patent and Trademark Office. ... developers could “mutually fund a reexamination request. This has the advantage of a much lower, predictable cost of between $20,000-30,000 for a good one. The requests can also be done is a pseudo-anonymous manner without necessarily identifying any single developer.”</blockquote>The attempts here to identify and distribute pertinent prior art can support this effort.US Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-68722534842168120722011-05-19T12:17:00.001-07:002011-05-19T13:13:05.678-07:00Larger companies are also targetedIf you are not already aware, Lodsys has also sued <a href="http://www.action-intell.com/2011/02/16/lodsys-launches-patent-infringement-suit-against-brother-canon-hp-samsung-and-others/">Brother, Canon, HP, Hulu, Lenovo, Lexmark, Motorola, Novell, Samsung, and Trend Micro</a> over the '078 patent plus a few others.<br />
<br />
In my wildest dreams, maybe we could get some feedback (such as any great pieces of prior art they have identified) from the lawyers representing these companies. I put out some feelers to see if I could get a response from the contacts I have and I will update if I receive any information. I assure you that most of these large companies are paying patent attorneys to do invalidity or non-infringement opinions right now.<br />
<br />
While some of the companies will likely sell out to the highway robber troll and sign a license agreement, understanding the strengths and weaknesses of the patent(s) (i.e. identifying risk) can greatly affect the business analysis, leverage in negotiations, and the general decision making that will need to be made when considering how to deal with trolls like Lodsys. Unfortunately, small developers typically do not have the cash or resources to hire attorneys to do a proper investigation, response, and rebuttal to trolls like Lodsys. Thus, one of my goals here is to make an attempt to distribute information that may help assess the risk presented by these trolls.US Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0tag:blogger.com,1999:blog-1186323268289511130.post-63235080412305692602011-05-18T09:03:00.000-07:002011-05-18T09:14:04.413-07:00First group of patents for discussionI performed a prior art search based on the Lodsys '078 Patent. I have not yet taken the time to determine if they should be granted the priority dates of all the continuations and CIP they filed, dating all the way back to Aug 6, 1992. If someone wants to help with that analysis, please have at it.<br />
<br />
Thus, I performed a search of patents that were filed prior to Aug. 6, 1992, as it seems to be the earliest claim to priority for the '078 patent. Here is my first set of results and short summary of their subject area.<br />
<br />
<a href="http://www.google.com/patents/about?id=WMMzAAAAEBAJ&dq=4,658,093">4,658,093</a> - software authorized for limited use<br />
<a href="http://www.google.com/patents/about?id=GIMDAAAAEBAJ&dq=4,740,890">4,740,890</a> - software predetermined trial period<br />
<a href="http://www.google.com/patents/about?id=wfMWAAAAEBAJ&dq=5,019,963">5,019,963</a> - software remote version updating<br />
<a href="http://www.google.com/patents/about?id=wt8fAAAAEBAJ&dq=5,023,907">5,023,907</a> - network license server<br />
<a href="http://www.google.com/patents/about?id=If8dAAAAEBAJ&dq=5,101,267">5,101,267</a> - audience polling system<br />
<a href="http://www.google.com/patents/about?id=nwchAAAAEBAJ&dq=5,103,476">5,103,476</a> - remote activation of software<br />
<a href="http://www.google.com/patents/about?id=3_8DAAAAEBAJ&dq=5,138,712">5,138,712</a> - software license management<br />
<a href="http://www.google.com/patents/about?id=K3QXAAAAEBAJ&dq=5,155,847">5,155,847</a> - remote update during use of software<br />
<a href="http://www.google.com/patents/about?id=ur4kAAAAEBAJ&dq=5,204,897">5,204,897</a> - software license management<br />
<a href="http://www.google.com/patents/about?id=hqUjAAAAEBAJ&dq=5,247,683">5,247,683</a> - software install over network<br />
<a href="http://www.google.com/patents/about?id=v7V8AAAAEBAJ&dq=5,319,562">5,319,562</a> - software remote purchasing system and info collection<br />
<a href="http://www.google.com/patents/about?id=BOoeAAAAEBAJ&dq=5,334,821">5,334,821</a> - portable POS terminal<br />
<a href="http://www.google.com/patents/about?id=q-EgAAAAEBAJ&dq=5,577,244">5,577,244</a> - software update program<br />
<a href="http://www.google.com/patents/about?id=2qQhAAAAEBAJ&dq=5,663,757">5,663,757</a> - interactive TV<br />
<a href="http://www.google.com/patents/about?id=bkwZAAAAEBAJ&dq=5,956,505">5,956,505</a> - software with optional features<br />
<br />
- USPAUS Patent Attorneyhttp://www.blogger.com/profile/08432347367406817874noreply@blogger.com0