Language Selection

English French German Italian Portuguese Spanish

M$ & Intel Scarfing Up more Patents

Filed under

Patents issued this week to Microsoft Corp. and Intel Corp. highlight the intellectual-property imperative that's driving technology powerhouses to aggressively build up their patent portfolios.

Microsoft received U.S. patent 6,886,132 for its method of creating an MHTML file, which is used to attach Web pages to an e-mail message.

Over at Intel, the semiconductor giant was awarded U.S. patent 6,886,180. The invention takes the functions of a standalone, broadband cable-modem and implements them on a personal computer.

The two patents provide just a small snapshot of the innovations the two companies have shepherded through the process at the U.S Patent and Trademark Office. Intel this week received 28 patents, ranging from a novel heatsink assembly to a method for making a photolithography mirror.

Microsoft's week saw it snare 13 patents, encompassing inventions from an MPEG sub-sample decoder to a keyboard with an improved numeric section.

For those keeping a scorecard, such activity translates into hefty growth in the respective companies' annual portfolios. Microsoft received 520 patents in 2003 and 659 in 2004. So far this year, it has garnered 176, which puts it on a pace to slightly exceed its total of two years ago.

While software patents have been on the increase, the numbers from hardware-centric Intel dwarf those from Microsoft. Intel earned 1,602 patents in 2003; 1,607 in 2004; and 482 during the first three months of 2005.

Yet the flip-side of such individual successes is an overall patent system that's swamped by too many filings and too little funding. Indeed, Congress is poised to enact legislation to reform the 215-year-old patent process. Both Intel and Microsoft support the reforms, which they say are needed to minimize the potential for abuse of the patent system.

Full Story.

More in Tux Machines

Security Leftovers

  • Friday's security updates
  • Researchers poke hole in custom crypto built for Amazon Web Services
    Underscoring just how hard it is to design secure cryptographic software, academic researchers recently uncovered a potentially serious weakness in an early version of the code library protecting Amazon Web Services. Ironically, s2n, as Amazon's transport layer security implementation is called, was intended to be a simpler, more secure way to encrypt and authenticate Web sessions. Where the OpenSSL library requires more than 70,000 lines of code to execute the highly complex TLS standard, s2n—short for signal to noise—has just 6,000 lines. Amazon hailed the brevity as a key security feature when unveiling s2n in June. What's more, Amazon said the new code had already passed three external security evaluations and penetration tests.
  • Social engineering: hacker tricks that make recipients click
    Social engineering is one of the most powerful tools in the hacker's arsenal and it generally plays a part in most of the major security breaches we hear about today. However, there is a common misconception around the role social engineering plays in attacks.
  • Judge Gives Preliminary Approval to $8 Million Settlement Over Sony Hack
    Sony agreed to reimburse employees up to $10,000 apiece for identity-theft losses
  • Cyber Monday: it's the most wonderful time of year for cyber-attackers
    Malicious attacks on shoppers increased 40% on Cyber Monday in 2013 and 2014, according to, an anti-malware and spyware company, compared to the average number of attacks on days during the month prior. Other cybersecurity software providers have identified the December holiday shopping season as the most dangerous time of year to make online purchases. “The attackers know that there are more people online, so there will be more attacks,” said Christopher Budd, Trend Micro’s global threat communications manager. “Cyber Monday is not a one-day thing, it’s the beginning of a sustained focus on attacks that go after people in the holiday shopping season.”

Openwashing (Fake FOSS)

Android Leftovers

Slackware Live Edition – Beta 2

  • Slackware Live Edition – Beta 2
    Thanks for all the valuable feedback on the first public beta of my Slackware Live Edition. It allowed me to fix quite a few bugs in the Live scripts (thanks again!), add new functionality (requested by you or from my own TODO) and I took the opportunity to fix the packages in my Plasma 5 repository so that its Live Edition should actually work now.
  • Updated multilib packages for -current
  • (Hopefully) final recompilations for KDE 5_15.11
    There was still some work to do about my Plasma 5 package repository. The recent updates in slackware-current broke several packages that were still linking to older (and no longer present) libraries which were part of the icu4c and udev packages.