Language Selection

English French German Italian Portuguese Spanish

A fix for a broken patent system?

Filed under

Rep. Lamar Smith, who heads the House of Representatives committee responsible for drafting patent law, said his proposal would improve the overall quality of patents and target some of the legal practices that have irked high-tech companies.

"The bill will eliminate legal gamesmanship from the current system that rewards lawsuit abuses over creativity," said Smith, a Texas Republican.
The Business Software Alliance was quick to praise the bill, saying in a statement that it goes a long way toward "improving patent quality, making sure U.S. law is consistent with that of other major countries and addressing disruptions caused by excessive litigation."

Probably the most sweeping change would be the creation of a process to challenge patents after they are granted by the Patent and Trademark Office. "Opposition requests" can be filed up to nine months after a patent is awarded or six months after a legal notice alleging infringement is sent out.

After an opposition request is filed, a panel of three administrative law judges will meet to review the controversy and, eventually, publish a written decision.

Another major change would be to award a patent to the first person to submit their paperwork to the Patent Office. Currently, patents are awarded to the first person who concocted the invention, a timeframe that can be difficult to prove.
Both of these alterations to federal law have been endorsed by Patent Office director Jon Dudas.

Companies such as Microsoft and Oracle have been calling for patent reform recently, saying that the current patent system is seriously flawed and must be repaired by Congress.

Microsoft has been especially critical of a legal framework that has caused it to spend $100 million a year defending itself against 35 to 40 lawsuits at any one time. Microsoft has gone on the legislative offensive after a jury awarded Eolas Technologies $565 million in damages--a decision that has been partially reversed--in a patent dispute over Internet Explorer.

Other changes the bill would make include recalculating the way damages are awarded--in a way that would make large jury awards more difficult to win--and make it more difficult to seek court injunctions.

Dennis Crouch, a patent lawyer at McDonnell Boehnen Hulbert & Berghoff in Chicago, said an earlier version of the legislation would have weakened the right to an injunction much more. "The proposed bill is a somewhat toned-down version of the draft that circulated this spring," Crouch said. "This version still has something to offend almost every interest."


More in Tux Machines

KTU exams to run on open source software

All examinations of the A.P.J. Abdul Kalam Technological University (KTU) — which run on an online platform — would switch to open source software from the second semester onwards. For the first semester examinations, the KTU would use a proprietary, Microsoft, software. In response to demands from student organisations, the KTU has pushed back its first semester examinations by two days. The first of the examinations would now begin on December 4 instead of December 2. The first of the results would be published on December 19. Read more Also: KTU goes ahead with exam outsourcing

CMS News

Security Leftovers

  • Friday's security updates
  • Researchers poke hole in custom crypto built for Amazon Web Services
    Underscoring just how hard it is to design secure cryptographic software, academic researchers recently uncovered a potentially serious weakness in an early version of the code library protecting Amazon Web Services. Ironically, s2n, as Amazon's transport layer security implementation is called, was intended to be a simpler, more secure way to encrypt and authenticate Web sessions. Where the OpenSSL library requires more than 70,000 lines of code to execute the highly complex TLS standard, s2n—short for signal to noise—has just 6,000 lines. Amazon hailed the brevity as a key security feature when unveiling s2n in June. What's more, Amazon said the new code had already passed three external security evaluations and penetration tests.
  • Social engineering: hacker tricks that make recipients click
    Social engineering is one of the most powerful tools in the hacker's arsenal and it generally plays a part in most of the major security breaches we hear about today. However, there is a common misconception around the role social engineering plays in attacks.
  • Judge Gives Preliminary Approval to $8 Million Settlement Over Sony Hack
    Sony agreed to reimburse employees up to $10,000 apiece for identity-theft losses
  • Cyber Monday: it's the most wonderful time of year for cyber-attackers
    Malicious attacks on shoppers increased 40% on Cyber Monday in 2013 and 2014, according to, an anti-malware and spyware company, compared to the average number of attacks on days during the month prior. Other cybersecurity software providers have identified the December holiday shopping season as the most dangerous time of year to make online purchases. “The attackers know that there are more people online, so there will be more attacks,” said Christopher Budd, Trend Micro’s global threat communications manager. “Cyber Monday is not a one-day thing, it’s the beginning of a sustained focus on attacks that go after people in the holiday shopping season.”

Openwashing (Fake FOSS)