Sie sind auf Seite 1von 96

PROTECTING AND ENFORCING

SOFTWARE INNOVATION:
Understanding the Evolving
Software-Intellectual
Property Landscape
Authors
Jennifer A. Albert Steven R. Argentieri Dan Burns Shaun P. deLacy
202.346.4322 617.570.1063 650.752.3100 212.459.7123
jalbert@goodwinlaw.com sargentieri@goodwinlaw.com dburns@goodwinlaw.com sdelacy@goodwinlaw.com

Douglas C. Doskocil Nicholas Drew Daniel M. Forman Robert Frederickson III


617.570.1215 617.570.8291 617.570.1793 617.570.1947
ddoskocil@goodwinlaw.com ndrew@goodwinlaw.com dforman@goodwinlaw.com rfrederickson@goodwinlaw.com

Genevie Gold Joel E. Lehrer Todd Marabella Brigid Morris


617.570.1837 617.570.1057 617.570.1174 212.459.7127
ggold@goodwinlaw.com jlehrer@goodwinlaw.com tmarabella@goodwinlaw.com bmorris@goodwinlaw.com

Samuel Sherry Rachel M. Walsh


617.570.8246 415.733.6128
ssherry@goodwinlaw.com rwalsh@goodwinlaw.com
Page

Software Patent Eligibility ............................................................................................... 7


Software Patent Eligibility in the 1970s and 1980s....................................... 10
The 1990s and The Growth of Software Patents .......................................... 10
Bilski..... 12
Mayo and Alice ................................................................................................... 12
PTO Guidance Since Alice ............................................................................... 13
Effect of Alice on Allowance of Software Patents ......................................... 14
Federal Circuit Cases Since Mayo and Alice ................................................ 18
Trends by Software Type .................................................................................. 24
Computer Implementation of Business Methods and Financial
Transactions................................................................................ 24
Non-Business Applications ................................................................... 26
Internal Computer Operations .............................................................. 28
Industrial Inventions ............................................................................... 28
Claim Drafting Issues for Software Patents:
Functional Claiming/Means-Plus-Function Limitations ................................ 29
Claim Drafting Issues for Software Patents:
Divided and Indirect Infringement .................................................................... 32
Divided Infringement .......................................................................................... 33
Indirect Infringement .......................................................................................... 36
What is a Design Patent? ............................................................................................. 39
Can Design Patents Protect Software? ...................................................................... 40
Should You Seek a Design Patent on Elements of Your Software?...................... 41
How Do I Assert My Design Patent? ........................................................................... 43
Scope of Protection The Basics ............................................................................... 45
Practical Issues............................................................................................................... 46
Ownership ........................................................................................................... 46
Registration ......................................................................................................... 47
Copyright Protection for User Interfaces .................................................................... 48

i
Copyright Protection for Application Program Interfaces ......................................... 50
Opinion of the Northern District of California ................................................. 51
Opinion of the Federal Circuit........................................................................... 51
Implications ......................................................................................................... 52
The Scope of Trade Secret Protection ....................................................................... 54
What Is a Trade Secret? ............................................................................................... 54
Derives Economic Value From It Being Generally Unknown ................... 54
Reasonable Efforts to Maintain Its Secrecy ................................................ 55
Barriers to Trade Secrecy? Cloud Computing, Software as
a Service (SaaS) and Open Source Software ............................................... 56
Enforcing Trade Secret Rights ..................................................................................... 57
Remedies for Misappropriation .................................................................................... 57
General Considerations ................................................................................................ 59
Traditional On Premises Software Licenses ........................................................... 59
Software as a Service.................................................................................................... 60
Scope of License ................................................................................................ 60
Dual Licensing .................................................................................................... 60
Service Quality.................................................................................................... 61
Data Management and Security ...................................................................... 61
Comparison of Key Provisions in Traditional and SaaS Licenses ......................... 63
Forum and Venue Considerations............................................................................... 64
Forum .................................................................................................................. 64
Venue ...64
Current Standards .................................................................................. 64
Pending Legislation................................................................................ 65
Filing Statistics .................................................................................................... 66
Factors That Influence Filing ............................................................................ 66
Damages Statistics ................................................................................ 67
Likelihood of Litigating on Two Fronts ................................................ 67
Litigants Seeking Declaratory Judgment ............................................ 68
Moving for a Change of Venue ........................................................................ 69
Filing a PTAB Challenge ............................................................................................... 70

ii
Choosing the Appropriate Proceeding ............................................................ 70
PTAB Statistics ................................................................................................... 73
Pleading Standards........................................................................................................ 74
Damages ......................................................................................................................... 77
Summary of Damages Law .............................................................................. 77
Reasonable Royalty & Apportionment ............................................................ 77
Assessing the Royalty Rate.............................................................................. 79
Strategic Implications......................................................................................... 80
The Marking Requirement ............................................................................................ 81
Drafting Considerations: Applicability of the Marking Requirement ........... 81
The America Invents Act & the Costs of Marking ......................................... 81
Playing it Safe: Marking Software Patents ..................................................... 82
Mixed Claim Software Patents ............................................................. 82
Method Claim Software Patents .......................................................... 82
The Marking Requirement & Licensor-Licensee Relationships .................. 83

iii
The United States is in the midst of a when protection is available to software,
decades-long shift from an economy that protection is available through an
centered on industry and manufacturing to amalgam of copyrights, trade secrets and
an economy based on technology and patents. Notwithstanding the confusing
services. This shift is due, in large part, to intellectual property (IP) landscape for
the increasingly critical role software plays software, during recent decades, companies
in every aspect of the economy. Software have increasingly sought to protect software
is, of course, a large, thriving industry unto as intellectual property. With this
itself. Indeed, for many years the proliferation, a host of thorny business and
commerce department reported that legal questions have arisen for software
software was the fastest growing service developers, software users, technology
industry in the United States. But there is a companies, and other businesses.
much greater impact of software on industry
and the economy. In all firms, in all Because all technology companies and
industries, software is used extensively in almost all non-technology companies are
nearly every area of operations, from reliant on software, understanding whether
finance, to manufacturing, to supply chain software is subject to intellectual property
management, to human resources, to protection and, if so, the limits of that
customer service. Furthermore, nearly protection, is critical. Whether software is at
everything that is made, bought and sold the heart of a companys identity or instead
has software in it today. And almost all a tool that a company uses to ensure that
companies, such as financial institutions, operations run efficiently, companies do not
automobile manufacturers and healthcare succeed without considerable investment in
organizations, are heavily reliant on and reliance on software systems. The
software to keep their businesses active, scope of the intellectual property rights
efficient and innovative. afforded to such software systems can be a
boon or oftentimes an obstacle to
The importance of software to the U.S. generating revenue and keeping costs
economy is a modern phenomenon. But down. Businesses should keep abreast of
the protections afforded to creators of recent developments in the law to
software stem from a single sentence in the understand how best to leverage intellectual
Constitution, now known as the Copyright property laws to protect the software they
Clause, adopted by the Constitutional have developed or acquired. And in the
Convention on September 17, 1787. The past few years there have been several
Copyright Clause empowers Congress to critically important developments that affect
promote the progress of science and useful the availability and scope of protection for
arts, by securing for limited times to authors software. Among other things:
and inventors the exclusive right to their
respective writings and discoveries. the Supreme Court dramatically
Especially in recent years, the appropriate scaled back patent eligibility for
application of this archaic clause to the software inventions;
protection of software has been the subject
of intense, heated debate.

As an initial matter, it is often unclear


whether software can or should be
protected as intellectual property. And even

1
the scope of software that can be one, the calculus for deciding to protect
protected by copyright expanded; software through trade secrets, patents or
copyrights has changed. For example, as
the smartphone patent wars noted above, a recent Supreme Court
revealed the importance of securing decision has, perhaps unintentionally,
design patent protection for certain weakened patent protection for software,
software features; encouraging many software innovators to
protect software through trade secrets or
a new higher bar for pleading patent copyright instead of patent.
infringement in litigation involving
software inventions became In this publication, we survey the current
effective; and state of intellectual property law in the U.S.
as it relates to protection available for
the availability of new administrative software. This publication is meant as a
proceedings to challenge the validity tool for companies to understand the
of software patents made these options for protecting software, to decide
patents much more susceptible to which intellectual property protection
being invalidated. scheme fits best, to consider which software
technologies to share, with whom and on
All of these new developments are explored what terms, and to learn how to assert or
in depth in this publication. defend software intellectual property rights
in U.S. courts. Protecting and Enforcing
The U.S. intellectual property system Software Innovation: Understanding The
encourages disclosure and provides a Evolving Software-Intellectual Property
flexible mechanism for companies to decide Landscape is divided into the following
which software innovations to share, with sections:
whom, and on what terms. This balancing
act derives from the Constitutional mandate Forms of Software IP Protection In
to secur[e] for limited times to inventors this section, we provide an overview
the exclusive right to their discoveries in of the various options for protecting
exchange for disclosure to the public of software and explore the benefits
those discoveries. Thus, for example, and drawbacks of protecting
inventors may secure a limited monopoly software through copyright, trade
over a specific novel software innovation in secret, and/or utility or design
exchange for disclosing in a patent the patents.
exact nature of that innovation.
Utility Patents In this section, we
While the intellectual property laws in the focus on the eligibility of software for
U.S. are anchored in the centuries-old patent protection under the Supreme
Copyright Clause, these laws are dynamic Courts recent cases and new legal
and in flux. Over the past few years in developments that underscore the
particular, there have been important importance of carefully drafting
changes in the different options available for
protecting software-based innovation. For

2
patent claims to protect software Software is, in many ways, the lifeblood of
inventions. nearly every company and, in a larger
sense, a key driving force of the U.S.
Design Patents In this section, we economy. Understanding how IP can
describe the use of design patents to encourage or stifle software innovation and
protect user interfaces. technological change is important for
businesses. We hope this publication will
Copyright and Trademark In these be a useful tool for executives, management
sections, we discuss issues and in-house counsel at companies who
concerning the use of these forms of want to understand how to best leverage IP
protection in the context of software. to protect, exploit and if necessary defend,
the software that their companies develop,
Software Licensing In this section, sell and use.
we discuss emerging issues
concerning licensing of software.

Software Patent Litigation In this


section, we cover a host of issues
that arise when litigating, either as a
plaintiff or defendant, software-
related intellectual property rights.

3
There are four different forms of intellectual two drawings from the design patent
property that can be used to protect showing a first state (FIG. 1) and a second
intellectual property rights in software: (1)
utility patents, (2) design patents, (3)
copyrights and (4) trade secrets.

Utility patents protect an invention as a


functional concept, and if the invention is
patentable, the patent covers all
implementations of the concept, regardless
of whether it was independently developed,
and regardless of whether the inventor
actually implemented it. If someone,
subsequent to issuance of the patent,
implements the patented function with
different code from the code used by the
inventor, the patent is still infringed.
Furthermore, patent infringement is a strict state (FIG. 2).
liability tort. That is, the infringers
knowledge of the patent and intent are not Copyrights protect the expression of ideas,
relevant to direct infringement (knowledge but not the ideas themselves, and prohibit
is, however, relevant to whether one can be the copying of the authors expression.
held liable for inducing another to infringe or Copyright does not, however, prohibit truly
contributing to the infringement by another). independent development of the same
Copying the functionality, either from a expression. So, as an overly-simplistic
patent, a publication or the inventors own example, if two authors independently write
implementation, is not a required element of substantially the same code to perform an
patent infringement, although it may be encryption algorithm, the author who first
relevant to whether the infringement was wrote the code has no right to prohibit the
willful. second author from using the
independently-developed version.
Design patents can protect the ornamental Copyrights can be used to protect against
appearance (but not utilitarian features) of unauthorized copying of the source and
an article of manufacture. Classically, object code of a software program, and in
design patents have been used to protect some cases, can be used to protect the
the ornamental designs of manufactured design of a user interface and perhaps an
articles such as bottles, eating implements, application program interface (API). They
lamps and computer cases. Relatively can also be used to protect against creating
recently, design patents have become derived works or variations that are
available to protect the appearance of user insubstantially different (non-literal copying).
interfaces. If the software presents a As discussed below, the analysis of non-
graphical user interface (GUI) on a screen literal copying necessarily involves the
or device, it might be possible to protect the analysis of high-level descriptions of what
appearance of the GUI using design patents falls within the expression and may begin
as well as copyright. i For example, Apple to blur the lines between patent protection
Inc. received a design patent (U.S. Patent of ideas and copyright protection of
No. D670713) directed to page turn
animation for electronic books. Below are

4
expressions. There may be advantages to It should be noted that, unlike patent and
asserting infringement of a design patent copyright protection, trade secret protection
over copyright infringement due to is governed by state law, and what is
differences in the difficulty of proving protectable and how to protect it varies from
copyright infringement. ii In copyright, the state to state. Furthermore, trade secret
test for infringement can be largely law may complement contractual non-
unpredictable, and is often up to experts, competition agreements, and its use in that
judges, and juries to filter out unprotected regard is particularly state-specific.
elements, determine whether an allegedly
infringing design is substantially similar to The four types of intellectual property
those elements individually or as a protection for software are not mutually
compilationand what impact such copying exclusive, and different forms of protection
has on the market for the original work. The may be used to protect different aspects of
test for design patent infringement, software innovations. The process for
however, is whether an ordinary observer, obtaining each form of each protection and
not an expert, finds the allegedly infringing the lifespan of that protection is different, as
design and the design patent design is the analysis of damages for infringement
substantially the same. iii or misappropriation. Importantly, obtaining
patent protection can be an expensive and
Trade secret protection guards against the lengthy process as compared to maintaining
unauthorized misappropriation of ideas or trade secrets or copyrights.
expressions. Trade secrets do not,
however, prevent someone from
independently developing the technology or
obtaining the technology from a public
domain source. In the context of software,
trade secret laws are generally used to
protect application source code (and
sometimes the ideas and algorithms
embodied within software), provided it is not
publicly disseminated and adequate
measures are taken to protect its secrecy.

5
The table below summarizes the average well as the duration of the protection and
time and cost it takes to obtain each form of types of damages that are available.
intellectual property protection patent as

vii
Avg. Time to Avg. Cost to Obtain Duration Types of
iv vvi
Obtain and Maintain Damages
viii ix
Utility Patent 2.2 years $47,760 20 years from date Reasonable
x
of filing royalties, lost
xi
profits
xii
Design Patent 1.6 years $20,620 15 years from date Reasonable
xiii
of grant royalties and lost
profits or total
xiv
profits

Copyright None Minimal Life of the author + Statutory + actual


75 years lost profits

Trade Secret None Depends on Indefinite (although Lost profits, unjust


measures required expires once enrichment or
to maintain secrecy secrecy is lost) reasonable
royalty; treble or
additional
damages for willful
misappropriation

6
Contrary to popular belief, there is no statute, patentable subject matter is
specific definition or statutory classification described as any new and useful process,
of software patents. Although the machine, manufacture, or composition of
discourse over patent reform has frequently matter, or any new and useful improvement
included debates about overbroad, thereof. xv
improvidently-granted software patents, the
U.S. Patent and Trademark Office (PTO) Until relatively recently, this categorical
does not recognize any such distinct limitation was not viewed as a substantial
category, and does not keep statistics impediment to the patenting of software
concerning software patent applications. inventions. General purpose computers
One reason it is difficult to specifically programmed to carry out a function met the
identify software patents is that the literal statutory language of a machine and
innovative ideas disclosed in patents are methods implemented by software on a
often described with enough generality that computer met the literal statutory language
the patent can cover both hardware and of a process.
software implementations of the technology.
For example, software inventions are often A number of developments over the past
claimed as a system, a method, and a several years, including the proliferation of
tangible magnetic storage medium so-called patent troll litigation, have
containing a computer program (or similar prompted the courts to look again at Section
language) in one application. When the 101. Beginning in the early 1990s, the PTO
invention is claimed as a system or began issuing computer-implemented
method, the claim language may refer to a business method patents. These patents
processor programmed to carry out a have been viewed with suspicion by many
function or refer more generally to modules and contributed to the perception that the
that carry out those functions. Claims of PTO was allowing overbroad and vague
such patents may be interpreted to cover patents on obvious ideas.
hardware as well as software
implementations. To help guide patent applicants and the
PTO, courts have set forth certain judicially-
SOFTWARE PATENT ELIGIBILITY created exceptions to the statutory
categories of patentable subject matter, and
Like all patents, patents on software recently the courts have turned to these
inventions must be novel and non-obvious; exceptions in an attempt to solve the
however, in the United States the threshold perceived proliferation of overbroad, vague
question of patent eligibility has become an patents.
overriding issue for both obtaining and
litigating software patents. In what is often
referred to as the patentable subject
matter section (Section 101) of the patent

7
There are three judicially-created At the same time, the America Invents Act
exceptions to statutory patentable subject of 2011 introduced a new administrative
matter: laws of nature, natural phenomena, procedure, the Covered Business Method
and abstract ideas. xvi The concern Review (CBM), allowing patents directed
animating these judicial exceptions is that at certain subjects to be challenged on
these exceptions are the basic tools of subject matter eligibility grounds. As the
scientific and technical work, and should table below shows, the number of CBM
not be pre-empted for all purposes, even by challenges to patent eligibility has exploded,
the original discoverer of the law, and as discussed below, once a petition for
phenomenon or idea. xvii The abstract idea CBM is granted on eligibility grounds, it is
exception has had the most relevance to the highly likely that the patent will be
patentability of software inventions. invalidated.

The courts have struggled with the


application of the abstract idea exception
to software inventions for more than 40
years. Initially, experts debated whether
software inventions should be patentable at
all. Following cases in the early 1990s,
patents were routinely granted for software
innovations and few questioned whether the
scope and validity of these patents differed
from those in other technical fields. While
various cases chipped away at these
seemingly invincible patents, this period
came to an abrupt end following a critical
decision by the Supreme Court in 2014 in
Alice Corp. v. CLS Bank Intl. xviii As the
table below shows, the number of
challenges to patent eligibility in district
court actions (for all types of patents) has
increased dramatically since the holding in
Alice, and the success rate for those
challenges has risen to between 60 and
70% (red means motion denied and green
means partially or completely granted). xix

8
Although the charts on this page provide
some sense of eligibility challenges across CBM Decisions (Number)
all types of software in the aggregate, the
picture varies somewhat for different types 90
of patents. In short, business method and 80
e-commerce patents are faring very poorly, 70
while more technical software patents
(e.g., patents aimed at encryption or data 60
Valid
compression, and patents that include some 50
Invalid
form of machine learning) tend to stand a 40
better chance of surviving a challenge.
30
The rest of this section discusses how the 20
courts are approaching eligibility for different 10
types of software inventions. It begins with
a review of the development of the software 0
2013 2014 2015

9
eligibility jurisprudence because that history In Diamond v. Diehr, the Supreme Court
may provide some sense of how the courts upheld the patentability of methods for
have arrived at the current law and how the curing rubber using a computer to
law may evolve from here. constantly measure the actual temperature
inside a mold and repeatedly recalculate the
Software Patent Eligibility in the 1970s cure time using a known mathematical
and 1980s formula. xxiv The method was a patent-
eligible process because it transformed an
The Supreme Court first addressed the article into a different state or thing and
patentability of software inventions in a trio incorporated a more efficient solution of the
of cases that invalidated two patents, known mathematical equation. xxv The Court
upheld the validity of a third, and left behind rejected the approach of dissecting a claim,
a confused jurisprudence. and held that the novelty of any element or
step in a process is irrelevant to determining
In 1978, in Gottschalk v. Benson, the Court whether the subject matter is patentable. xxvi
held that method claims to specific
algorithms for converting numbers in Binary In the end, the notion that the patentability
Coded Data representation to binary of software would have to wait for
representation claimed unpatentable ideas. Congressional action fell by the wayside,
The algorithms had no use except in and the relatively easily satisfied machine-
connection with digital computers and the or-transformation test in Diehr seemed to
practical effect of the claims was to preempt trump the restrictive dissection and
the underlying mathematical formula and conventional, post-solution steps inquiry
grant a patent on the algorithm itself. xx The under Flook.
Court denied that it was precluding patents
on software altogether, but then suggested The 1990s and The Growth of Software
that Congressional action would be needed Patents
[i]f these programs are to be patentable. xxi
In 1994, the Federal Circuit in In re Alappat
In 1982, the Court invalidated claims in appeared to provide a broad endorsement
Parker v. Flook to a method for updating of software-implemented inventions. The
alarm limits in a hydrocarbon conversion claims in Alappat were directed to a
process that used a new and improved rasterizer that uses an anti-aliasing
formula for calculating those limits. The algorithm to produce pixel illumination data
improved formula was not patent-eligible, that generates an improved display of a
and conventional, post-solution waveform on an oscilloscope. xxvii The Board
applications of such a formula did not make of Patent Appeals rejected the claims as
the claim patent-eligible. xxii Although the non-statutory matter, noting that they
Court said it was not dissecting the claim covered nothing more than a mathematical
into statutory and non-statutory components algorithm. xxviii The Federal Circuit reversed,
to evaluate the novelty of the statutory holding that the proper inquiry is whether
components, that appears to be exactly the claimed subject matter as a whole is a
what the Court did. xxiii disembodied mathematical concept, . . .

10
which in essence represents nothing more Then, in 1998, the Federal Circuit in State
than a law of nature, natural Street Bank v. Signature Financial Group
phenomenon, or abstract idea. xxix The rejected the business method exception to
court further held that a general purpose statutory subject matter, agreeing with the
computer programmed to carry out the PTO that [c]laims should not be
claimed algorithm was not nonstatutory categorized as methods of doing business
subject matter because the programming and should be treated like any other
creates a new machine, and in effect process claims. xxxi Of significance for
becomes a special purpose computer once software patents was the courts
it is programmed to perform particular interpretation of Diehr as limiting Benson,
functions . . . . xxx such that the mere presence of an algorithm
is no longer a sufficient indicium of
nonstatutory subject matter. xxxii The
Federal Circuit held that the test for
patentable subject matter is whether the
process produces a useful, concrete and
tangible result. xxxiii

11
The result of these two Federal Circuit useful, concrete and tangible result test
decisions was a vast growth in business and replaced it with the machine-or-
oriented software patents. The following transformation test as the sole test for
chart shows the growth in issued patents in deciding patent eligibility. xxxvii The Supreme
software-intensive Cooperative Patent Court affirmed the result, but held that that
Classification (CPC) subclasses after the machine-or-transformation test is a
Alappat in 1994 and State Street Bank in useful and important tool, but not the sole
1998. xxxiv test for deciding whether an invention is
patent-eligible. xxxviii The Court agreed that

Issued Patents: CPC Classes G06F & G06Q


(1976-2009)

25000

20000

15000

10000

5000

Bilski the claimed methods failed the machine-or-


transformation test, but then considered
After an absence of nearly 30 years, the whether the claims might still be a process
Supreme Court returned to the debate over under section 101. xxxix The Court decided
subject matter patentability in Bilski v. that the claims were not patentable
Kappos in 2010. xxxv The Bilski patent processes because they were attempts to
claimed methods for hedging risks patent an abstract idea and would either
associated with price changes in energy preempt the use of that idea in all fields,
commodities markets. xxxvi The Federal limit the use of the idea to a single field, or
Circuit had held the claims unpatentable, add only token post-solution components. xl
but in doing so overruled the State Street The Court, however, made it clear that it did

12
not hold that business method patents were intermediary. xlv A unanimous Supreme
prohibited. Court held that all the claims were directed
to the abstract idea of intermediated
Mayo and Alice settlement. xlvi The Supreme Court also
decided that the mere recitation of a
Two years after Bilski, the Supreme Court generic computer cannot transform a
looked at the issue again and arguably patent-ineligible abstract idea into a patent-
abolished, or at least marginalized, the eligible invention. xlvii The method claims
machine-or-transformation test, which it amounted to nothing significantly more than
had previously described as a useful and an instruction to apply the abstract idea
important tool. In Mayo Collaborative using a generic computer, and the system
Servs. v. Prometheus Labs, Inc., the Court claims likewise recited generic hardware.
applied a two-step analysis in reviewing a Accordingly, both the method and system
claim to a medical diagnostic test. First, a claims were patent ineligible.
determination is made as to whether a claim
is directed to a patent-ineligible concept, PTO Guidance Since Alice
such as a law of nature, natural phenomena
or abstract idea. xli If it is, one looks for an Immediately after Alice, the PTO issued a
inventive concept, sufficient to ensure that memorandum to the patent examining corps
the patent in practice amounts to providing preliminary instructions relating to
significantly more than a patent upon the subject matter eligibility of claims involving
[ineligible concept] itself. xlii The Federal abstract ideas, particularly computer-
Circuit had upheld the patent eligibility of the implemented abstract ideas. xlviii The PTO
claims under the machine-or- followed up in December 2014 with its
transformation test; however, the Supreme Interim Eligibility Guidance for use by
Court held that the machine-or- USPTO personnel in determining subject
transformation test does not trump the law matter eligibility. xlix Under the PTOs 2014
of nature exclusion. xliii The Mayo two-step Instructions and Guidance, for Part 1 of the
analysis applies, regardless of whether the Mayo analysis, examiners were to consider
machine-or-transformation test is satisfied. whether claims include abstract ideas,
As such, the two-step analysis set forth in such as:
Mayo appears to be the sole test to
determine if a claim is directed to patentable Fundamental economic practices;
subject matter. Certain methods of organizing
human activities;
Finally, in 2014, the Supreme Court applied An idea of itself; and
Mayo to the abstract idea category of Mathematical relationships/formulas.
excluded subject matter in Alice Corp. v.
CLS Bank Intl. xliv These patents involved a For Part 2 of the analysis, the Instructions
computerized process for mitigating and Guidance identified categories of
settlement risk by facilitating the exchange limitations that may be enough to qualify as
of financial obligations through a computer significantly more when recited in a claim
system acting as a third-party with an abstract idea:

13
Improvements to another technology understood, routine and
or technical field; conventional activities previously
Improvements to the functioning of known to the industry;
the computer itself; Adding insignificant extra-solution
Meaningful limitations beyond activity to the judicial exception, e.g.,
generally linking the use of an mere data gathering in conjunction
abstract idea to a particular with a law of nature or abstract idea
technological environment; (citing Mayo); and
Applying the judicial exception with, Generally linking the use of the
or by use of, a particular machine judicial exception to a particular
(citing Bilski); technological environment or field of
Effecting a transformation or use (citing Mayo).
reduction of a particular article to a
different state or thing (citing Diehr); The PTO, responding to comments solicited
and from the public, issued a July 2015 Update:
Adding a specific limitation other Subject Matter Eligibility. The July 2015
than what is well-understood, routine Update provided additional guidance on
and conventional in the field, or identifying abstract ideas. Examples of
adding unconventional steps that abstract ideas in each of the four categories
confine the claim to a particular identified in the 2014 Preliminary
useful application (citing Mayo). Instructions are provided in the following
graphic from the July 2015 Update Quick
The PTO also listed limitations that are not Reference Sheet: The PTO web page for
enough to qualify as significantly more: the 2014 Interim Guidance and July 2015
Update can be found at
Adding the words apply it (or an http://www.uspto.gov/patent/laws-and-
equivalent) with an abstract idea, or regulations/examination-policy/2014-interim-
mere instructions to implement an guidance-subject-matter-eligibility-0. This
abstract idea on a computer; page links to examples and training
Requiring no more than a generic materials that show how examiners are
computer to perform generic supposed to apply Mayo and Alice.
computer functions that are well-

14
15
Effect of Alice on Allowance of Software The following graph shows the growth of
Patents issued software patents leading up to
Bilski in 2010 and Mayo in 2012, and the
The PTOs response to Alice has had a mild drop off after Alice in 2014.
significant impact on the number of software
patents that issued in 2015. That impact is Clearly, a substantial number of software
not, however, uniform across all types of patents are still being issued the PTO, even
software patents. Business process-related after Alice.
patents have been affected to a significant
degree, but software patents directed to Most patents that could be described as
more technical inventions have been patents related to financial products or
affected to a much lesser degree, and services are generally classified in CPC
continue to issue in significant numbers. As subclass G06Q. l The following chart shows
noted above, there is no definitive way of the drop in issued patents with this
distinguishing software patents from other classification after Mayo in 2012 and Alice
patents. Similarly, there is no easy way of in 2014.
distinguishing software inventions for
technical applications from inventions for The trend over 2014 and 2015 for the
business applications. Accordingly, we groups within G06Q follows the overall
use two of the CPC classification codes as temporal trend for G06Q; however, some of
proxies that likely produce data that the groups have suffered a larger
approximates the trends of interest. percentage decline pre- and post-Alice than
others.

Issued Patents: G06F & G06Q Issued Patents: CPC G06Q


(2005-2015) (2005-2015)

14000
60000
12000
50000
10000
40000 8000
30000 6000

20000 4000

10000 2000

0
0
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015

16
1800 10
1600 20
1400 30
40
1200
50
1000
800
600
400
200
0
2014Q1 2014Q2 2014Q3 2014Q4 2015Q1 2015Q2 2015Q3 2015Q4

Specifically, Group 40, Finance; Insurance; In summary, Mayo and Alice have had the
Tax strategies; Processing of corporate or most dramatic impact on the prosecution of
income taxes, shows the largest patent applications that are focused entirely
percentage decline, pre- and post-Alice on business or e-commerce concepts. It
(64%). Group 20, Payment architectures, appears that software patent applications
schemes or protocols, was next with a that are directed to more technical concepts
decline of 30%, followed by Group 30, are being allowed in about the same
Commerce, e.g. shopping or e-commerce, numbers as before, and even business-
with a decline of 28%. related applications that were classified with
other more technical CPC subclasses
The chart shows that nearly the entire drop stand about the same chance of allowance
in granted patents in subclass G06Q can be as before Alice.
attributed to the drop in granted patents that
were not also assigned a technical
subclass.

17
Federal Circuit Cases Since Mayo and at issue. li Twelve of those cases were
Alice appeals from district court judgments and
one was from a PTAB Covered Business
During the two years between Mayo and Method determination. In all but one of
Alice, the Federal Circuit issued four written those cases, the patents had been held
decisions involving patent eligibility of invalid under section 101. lii The Federal
software inventions, in each case affirming Circuit affirmed the decisions below in all
a district court decision invalidating the twelve cases.
claims at issue as patent-ineligible.
The chart below is a summary of the sixteen
Since the Alice decision, through February written decisions on patent eligibility of
2016, the Federal Circuit has issued thirteen software inventions that the Federal Circuit
written opinions in cases in which the has issued since Mayo.
patent-eligibility of software inventions was
Case Patent(s) Subject Matter/
Type of Claims

Bancorp Services v. 5,926,792 System for managing a Abstract idea:


Sun Life, 687 F.3d 7,249,037 stable value protected - managing a stable value protected life
1266, 1278 (Fed. Cir. investment plan insurance policy
2012). - Methods and Computer Step 2:
Readable Media - no technical advance in computer technology
- computer merely used to accelerate ineligible
mental process

Accenture Global 7,013,284 Component based Abstract idea:


Services, GmbH v. interface to handle tasks - generating tasks, based on rules, to be
Guidewire Software, during claim processing completed upon the occurrence of an event
728 F.3d 1336 (Fed. - Methods and Systems Step 2:
Cir. 2013). - limiting to computer implementation and to
insurance industry insufficient
SmartGene, Inc. v 6,081,786 Systems, methods and Abstract idea:
Advanced Biological 6,188,988 computer program - comparing new and stored information and
Labs., 555 Fed. Appx. products for guiding the using rules to identify medical options [not
950 (Fed. Cir. 2014). selection of therapeutic explicitly stated in decision]
treatment regimens Step 2:
- Methods, Systems, - no advance in physical implementations of
Computer Program routine mental information-comparison and
Products rule-application processes

Cyberfone Systems, 8,019,060 Telephone/transaction Abstract idea:


LLC v. CNN entry device and system - collecting information in classified form, then
Interactive Group, for entering transaction separating and transmitting that information
Inc., 558 Fed. Appx. data into database according to its classification
988 (Fed. Cir. 2014). - Methods and Systems Step 2 (applying machine-or-transformation
test):
- requirement of a telephone, which could be a
range of different machines, does not tie claim
to a specific machine and adds nothing of
significance to the claimed abstract idea
- mere collection and organization of data is
insufficient to meet the transformation prong

18
Case Patent(s) Subject Matter/
Type of Claims

Mortgage Grader, Inc. 7,366,694 Financial transactions Abstract idea:


v. First Choice Loan 7,680,728 including a method for a - anonymous loan shopping
Services Inc., ___ borrower to evaluate Step 2:
F.3d. ___, 2016 WL and/or obtain financing, - generic components such as an interface,
362415 (Fed. Cir. e.g., a loan or a credit network, and database do not satisfy the
Jan. 20, 2016) card inventive concept requirement
- Methods and systems

Vehicle Intelligence 7,394,392 Screening and testing Abstract idea:


and Safety LLC v. equipment operators for - testing operators of any kind of moving
Mercedes-Benz USA, impairment and equipment for any kind of physical or mental
___ Fed. Appx. ___ controlling the equipment impairment
(Fed. Cir. 2015) if impairment is detected Step 2:
(nonprecedential) - Methods and systems - patent not explain how claimed methods can
be embedded in the recited specialized
hardware
- post-Alice, being tied to a particular machine
is not sufficient to confer eligibility
- supposedly inventive concepts are not
described with specificity
Digitech Image 6,128,415 Device profiles for use in Abstract idea:
Techs., LLC v a digital image - process of gathering and combining data that
Electronics for processing system does not require input from a physical device
Imaging, Inc., 758 - Device profile and Step 2:
F.3d 1344 (Fed. Cir. methods - method is not tied to an image processor and
2014). does not claim image processors use of the
device profile to capture, transform or render a
digital image
Note: claim directed to the device profile itself
was not even statutory subject matter.

Planet Bingo, LLC v 6,398,646 Storing preselected Abstract idea:


VKGS LLC, 576 Fed. 6,656,045 numbers for use in - managing a game of Bingo, and solving a
Appx. 1005 (Fed. Cir. games of bingo tampering problem and also minimizing other
2014). - Methods and systems security risks during bingo ticket purchase
Step 2:
- claims recite generic computer
implementation of the abstract idea using
generic functions of storing, retrieving and
verifying a chose set of bingo numbers
buySAFE, Inc. v. 7,644,019 Safe Transaction Abstract idea:
Google, Inc., 765 Guaranty - creating a transaction performance guaranty
F.3d 1350 (Fed. Cir. - Methods and computer Step 2:
2014). readable media - the computer functionality is generic; receiving
a request for a guarantee and transmitting an
offer of guarantee

19
Case Patent(s) Subject Matter/
Type of Claims

Ultramercial, Inc. v. 7,346,545 Payment of intellectual Abstract idea:


Hulu, LLC, 772 F.3d property royalties by - showing an advertisement before delivering
709 (Fed. Cir. 2014). interposed sponsor over free content; using advertising as an exchange
a telecommunications or currency
network Step 2:
- Methods - routine steps of updating an activity log,
requiring a request from a consumer to view an
ad, restrictions on public access, and use of the
Internet comprise only conventional steps
- claims are not tied to any particular novel
machine or apparatus, only a general purpose
computer
- claims fail transformation prong because they
do not transform physical objects or
substances, or anything representative of
physical objects or substances
DDR Holdings, LLC v. 7,818,399 Expanding commercial Abstract idea:
Hotels.com, L.P., 773 opportunities for internet - Federal Circuit had difficult characterizing the
F.3d 1245 (Fed. Cir. websites abstract idea
2014). - Methods and system - Defendant characterized it as increasing
sales by making two web pages look the same
Step 2:
- claimed solution is necessarily rooted in
computer technology to overcome a problem
specifically arising in the realm of computer
networks
- claims do not preempt every application of the
idea; rather they recite a specific way to
automate the creation of a composite web page

Content Extraction 5,768,416 Scanning and Abstract idea:


and Transmission 5,258,855 Information Processing - 1) collecting data, 2) recognizing certain data
LLC v. Wells Fargo 5,369,508 Methodology within the collected data set, and 3) storing that
Bank, N.A., 776 F.3d 5,625,465 - Methods and machines recognized data in a memory
1343 (Fed. Cir. 2014). (interface/system) Step 2:
- merely recited use of existing scanning and
processing technology to recognize and store
data from specific data fields such as amounts,
addresses and dates

20
Case Patent(s) Subject Matter/
Type of Claims

OIP Technologies, 7,970,713 Automatic pricing in Abstract idea:


Inc. v. Amazon.com, electronic commerce - offer-based price optimization
Inc., 788 F.3d 1359 - Methods and computer Step 2:
(Fed. Cir. 2015). readable media - steps of sending a first set of electronic
messages over a network to devices, the
devices being programmed to communicate,
storing test results in a machine-readable
medium, and using a computerized system ...
to automatically determine an estimated
outcome and setting a price, are well-
understood, routine conventional activities
- presenting offers to potential customers and
gather statistics about how customers
responded does not provide a meaningful
limitation
Internet Patents Corp. 7,707,505 Dynamic tabs for a Abstract idea:
v. Active Network, graphical user interface - retaining information in the navigation of
Inc., 790 F.3d 1343 - Methods, systems, online form
(Fed. Cir. 2015). computer readable Step 2:
media - browser Back and Forward button functionality
is conventional, well-known and common
- mechanism for maintaining the state is not
described, although it is stated to be essential
Intellectual Ventures I 8,083,137 Administration of 137 Patent
LLC v. Capital One 7,603,382 financial accounts, and Abstract idea:
Bank (USA), 792 F.3d advanced internet - tracking financial transactions to determine
1363 (Fed. Cir. 2015). interface providing user whether they exceed a pre-set spending limit
display access of (i.e., budgeting)
customized webpages Step 2:
- Methods and Systems - a database, user profile and communication
medium are all generic computer elements

382 Patent
Abstract idea:
- customizing information based on (1)
information known about the user and (2)
navigation data
Step 2:
- delivering customized advertising more
quickly than could be done with non-
computerized advertising does not confer
patentability
- interactive interfaces are generic computer
elements
- the claims to no address problems unique to
the internet

21
Case Patent(s) Subject Matter/
Type of Claims

Versata Development 6,553,350 Pricing products in multi- Abstract idea:


Group, Inc. v. SAP level product and - determining a price, using organizational and
America, Inc., No. organizational groups product group hierarchies
2014-1194, - F.3d - Methods, system, and Step 2:
(Fed. Cir. July 9, computer readable - arranging a hierarchy of organizational and
2015). media product groups, storing, retrieving and sorting
price information, eliminating less restrictive
pricing information and determining a price are
well-understood, routine, conventional activities
previously known in the industry

The court has also issued 14 Rule 36 sentence, quite often on grounds of patent
summary affirmances of determinations of ineligibility. The Federal Circuit has only
patent ineligibility. Notably, nearly all of the written one decision involving a CBM review
recent Federal Circuit software eligibility determination that a patent was ineligible.
appeals have been disposed of with Rule 36
summary affirmances. While it is possible that the Federal Circuit
will articulate clear reasoning for reversals
Even though patent owners have lost in as more CBM decisions arrive on its docket,
nearly all of the published appellate it may be content to avoid challenging the
decisions on this topic, the full impact of PTAB on this issue.
Alice is still uncertain, as the Federal Circuit
has issued only one written opinion in Nonetheless, there are some general
DDR Holdings, LLC v. Hotels.com, LP themes that may be gleaned from the
where a decision in favor of patentability Federal Circuits approach to determining
was being appealed. liii It is unclear whether patent eligibility challenges in the wake of
that decision, in which the court found the Alice and Mayo.
patent valid, was an outlier. The zero-
percent reversal rate on determinations of First, it is unclear whether the statutory
ineligibility is obviously much lower than presumption of validity applies to the issue
the Federal Circuits reversal rate on other of patent eligibility, and accordingly the
issues. That raises the question whether courts have not yet conclusively decided
the low reversal rate reflects a hesitation to whether the clear and convincing evidence
confront the Supreme Court (or Congress) burden applies to a party challenging
by upholding the eligibility of software patent eligibility. The only Federal Circuit
patents. opinions that discuss the presumption of
validity are concurrences by Judge Mayer in
It is also unclear how the Federal Circuit will which he at least suggests that patent
view the high rate of PTO determinations of claims on methods of doing business are
ineligibility under the Covered Business presumptively patent ineligible, liv and in
Method review process. Institution of CBM which he asserts that no presumption of
review of a software patent is a virtual death eligibility attends the section 101 inquiry. lv

22
In both cases, his assertions went storing pricing information in a
unchallenged in the opinion of the court. lvi data source, wherein the pricing
information is associated, with (i)
Second, consistent with the way Alice was a pricing type, (ii) the
decided by the Supreme Court, the Federal organizational groups, and (iii)
Circuit does not require analysis of any the product groups;
actual prior art references when conducting
the second step of the Alice analysis, i.e., as storing pricing information. lix
whether the claims include an inventive
concept. This second step of the Alice It then determined that storing pricing
analysis is intended to determine whether information was a well-understood,
the additional features of the claim (beyond routine, conventional activity previously
the abstract idea) recite more than well- known to the industry. lx
understood, routine, conventional activity. lvii
Although Judge Newman in Internet Patents In Internet Patents, the claim language
observed that the inventive concept inquiry required:
favors inquiries analogous to those
undertaken for determination of patentable furnishing a plurality of icons on
invention, and is facilitated by a web page displayed to a user
considerations analogous to those of 102 of a web browser, wherein each
and 103, not a single Federal Circuit of said icons is a hyperlink to a
decision has examined even a single prior dynamically generated online
art reference to determine whether there application form set, and wherein
was an inventive concept. In every case said web browser comprises
where it affirmed patent ineligibility, the Back and Forward navigation
court merely asserted, without reference to functionalities;
any specific prior art reference, that the
claim limitations were conventional and and
well-known, and therefore failed to
transform the abstract idea into patent- maintaining said state upon the
eligible subject matter. activation of another of said
icons, wherein said maintaining
Third, although the court has consistently allows use of said Back and
recognized the Supreme Courts directive Forward navigation
that the inventive concept inquiry must functionalities without loss of
consider the elements of each claim both said state.
individually and as an ordered
combination, lviii that is not clearly what the The Federal Circuit determined that these
Federal Circuit does in practice. When steps were well-known and conventional
considering the claim elements because browser Back and Forward button
individually, the court tends to re- functionality was well-known and
characterize the original claim language in conventional, and because the claim did not
more general terms before determining specify a particular mechanism for
whether claim elements were conventional maintaining said state. lxi The dependent
and well-known. For example, in Versata, claims required specific steps for forming
the court re-characterized the limitation: and displaying the dynamically generated

23
online application form set; however, the a claims as eligible for patent protection.
Federal Circuit re-characterized these steps Similarly, the industrial and process control
as merely generic data collection steps or applications category encompasses the
siting the ineligible concept in a particular PTOs guidance that improvements to
technological environment. lxii another technology or technical field may
be sufficient.
Similarly, the Federal Circuit does not
conduct a prior-art based inquiry into The following sections include observations
whether the particular sequence of about the trends and current status of
conventional steps set forth in a claim was inventions in each category.
conventional, well-known or routine. For
example, in Versata, after finding that the Computer Implementation of Business
individual claim elements were well-known, Methods and Financial Transactions
routine, and conventional, the court merely
asserted that the ordered combination of This category of patents has fared the worst
steps adds nothing more than a generic of all types of software inventions. Federal
computer implementation. The Court did Circuit appeals in this category include
not attempt to conduct the kind of analysis buySAFE (transaction performance
that an examiner or court would conduct guaranties), Ultramercial (showing
when deciding novelty or non-obviousness. advertisement as a condition for viewing
web content), OIP Technologies (automatic
Trends by Software Type pricing in e-commerce), Intellectual
Ventures (administration of financial
Each of the software patent-eligibility district accounts and delivering customized
court decisions since 2010 can be generally advertising), and Versata (pricing products).
categorized into one of four categories:
Some of the judges appear to recognize
1) Computer implementation of that it may be possible to obtain a patent on
business methods and a business method and therefore
financial transactions; presumably a software implementation of a
2) Non-business applications; business method. Judge Taranto, writing in
3) Internal computer operations buySAFE Inc. v. Google, Inc., and joined by
(including enhancements to Judge Hughes, observed that Bilski had
internet and web page rejected a general business method
processing); or exception to patentability, implying that
4) Industrial and process control Alice does not categorically exclude
applications. business methods. lxiii According to Judge
Taranto, [i]f enough extra is included in a
The dividing lines among these categories claim, it passes muster under section 101
are not always clear; they do, however, even if it amounts to a business
provide a useful way of thinking about method. lxiv The buySAFE case does not,
software inventions. For example, the however, provide any useful hints as to
internal computer operations category what would be enough extraJudge
encompasses the PTOs guidance that Taranto wrote that the claims to a computer-
improvements to the functioning of the implemented method for guaranteeing a
computer itself may be sufficient to render partys performance of its online

24
transaction do not push or even test the
boundaries of the Supreme Court DCT DECISIONS (%)
precedents under section 101. lxv
100%
Judge Mayer, on the other hand, believes 90%
that Alice forecloses any possibility of a 80%
claim covering a software implementation of 70% Valid
a business method. According to Judge 60%
Mayer, Alice set out a technological arts Invalid
50%
test for patent eligibility when it invalidated 40%
the claims at issue because they did not 30%
improve the functioning of the computer 20%
itself or effect an improvement in any other 10%
technology or technical field. lxvi According 0%
to Judge Mayer, a rule holding that claims 2010 2011 2012 2013 2014 2015
are impermissibly abstract if they are
directed to an entrepreneurial objective,
such as methods for increasing revenue,
Apparently, the Bilski decisions in 2010 had
minimizing economic risk, or structuring
relatively little effect on the number of patent
commercial transactions, rather than a
eligibility decisions, and it wasnt until Alice
technological one, would comport with the
was decided in 2014 that large numbers of
guidance provided in both Alice and
successful dispositive motions were filed.
Bilski. lxvii
The following charts show the trend in
The following charts show district court
Covered Business Method decisions on
trends over the past five years regarding
patent eligibility grounds:
motions seeking a finding of patent
ineligibility:

CBM DECISIONS (NUMBER)


DCT DECISIONS (NUMBER)
90
80 Valid 80
70 Invalid 70
60 60
Valid
50 50
Invalid
40 40
30 30
20
20
10
10
0
0 2013 2014 2015
2010 2011 2012 2013 2014 2015

25
CBM DECISIONS (%) DCT DECISIONS (NUMBER)
9
100%
8
90% 7
80% 6 Valid
70% 5
Invalid
60% 4
Valid 3
50%
2
40% Invalid
1
30%
0
20% 2011 2012 2013 2014 2015
10%
0% There was no discernable pattern in the
2013 2014 2015 decisions in this category. There were three
cases involving computer-aided design or
computer-aided drafting inventions, and
These charts demonstrate the extremely these cases illustrate the difficulty of
high rate at which software patents are reaching a consistent understanding of how
being invalidated in CBM reviews. Mayo and Alice will be applied in particular
cases. The invention in Philippi-Hagenbuch
Non-Business Applications et al. v. Western Tech. Services Int'l, Inc. lxviii
was patent eligible while the inventions in
This category of patents includes a wide East Coast Sheet Metal Fabricating Corp. v.
variety of software inventions, including for Autodesk, Inc. lxix and Synopsys Inc. v.
example the patent at issue in Content Mentor Graphics Corp. lxx were ineligible.
Extraction, a patent concerning scanning
and processing information. The dividing The method at issue in Philippi-Hagenbuch
line between business and non-business (U.S. Patent No. 7,369,978) was for
applications is not always clear, for designing a custom dump truck body based
example, the Federal Circuits Planet Bingo on characteristics of the load to be carried
decision concerning a patent covering and a specific field operating environment.
storing preselected numbers for use in The independent claim was very general,
games of bingo could be in either category. requiring the steps of determining a center
There are fewer cases in this category than of gravity and capacity, developing a three-
in the business method and financial dimensional model of the load to be carried
transactions category, and to the extent a (without specifying how the model is to be
comparison is possible with this sample developed), adjusting unspecified design
size, it appears that this category fared parameters in unspecified ways until the
better, as expected based on the hostility to center of gravity and volume approximates
business method inventions. the desired quantities, and producing the
body. The courts rejected an overly-rigid
interpretation of the machine or
transformation test, and refused to over

26
generalize the claim to remove concrete various algorithms for determining
limitations, as urged by the defendant. components and layout that can be
performed mentally. The court further held
In East Coast Sheet Metal, the exemplary that the claims preempt a building block of
claim discussed by the court (U.S. Patent human ingenuity (i.e., a mental process)
No. 7,917,340) was directed to a CAD/CAM even though the process is not found in the
system for designing a ventilation system prior art and that the specific process
using a visual representation of components claimed was different from the mental
of the system, mapping the components to process used by humans to design circuits.
standard fittings, and generating a Finally, the court rejected the patent owners
manufacturing blueprint. The patent owner machine or transformation argument
conceded that the claim was directed to the because the claimed methods do not
abstract concept of mapping, and failed to transform the user-supplied description into
convince the court that the claims included another form, but instead use that
an inventive concept. The court found the description as a starting point for inferring a
level of detail in the claim lacking. But just physical layout of a chip.
as significantly, the court was guided by the
principle that an inventive concept is one There was nothing dramatically different
that creates a better result and not merely about the specifications or claims in these
one that creates the same result more three cases, yet the courts reached different
quickly than humanly possible. The claimed results using differing rationales. One
invention failed to solve a recognized possible explanation for the result in
problem with CAD/CAM software, and Philippi-Hagenbuch is that it was decided
therefore lacked an inventive concept. after Mayo but before Alice. Although the
test for eligibility did not change after Alice,
The methods at issue in Synopsis (U.S. the view of software patents did.
Patent Nos. 5,748,488, 5,530,841 and
5,680,318) relate to the use of a computer
tool to interpret a designers description of
operations of an integrated circuit and then
generate the circuit components that
perform those operations. The invention
allows designers to describe the signals to
be produced without specifying the needed
hardware components. The court held that
the claims were directed to an abstract idea
because they do not entail anything
physical, but instead merely describe

27
Internal Computer Operations LLC v. Symantec Corp. lxxi held two patents
directed to detecting SPAM e-mail ineligible,
This category includes inventions like that at but found a third patent directed to detecting
issue in Benson. Federal Circuit appeals computer viruses eligible because viruses
involving this type of software include DDR are a problem specifically arising in the
Holdings (manipulation of web pages) and realm of computers and the human mind
Internet Patents Corp. (dynamic tabs for cannot screen for computer viruses. Claims
graphical user interface). There have been directed to the e-mail SPAM patents related
a modest number of district court decisions to identifying characteristics of e-mails,
involving this type of software, the outcomes filtering e-mails, providing a service on the
of which are shown below. Internet, an e-mail post office on a computer
network, a process for controlling the
delivery of e-mail messages in a business,
DCT DECISIONS (NUMBER)
and the like. The court was convinced that
10
these claims were directed to abstract ideas
because the claimed processes, viewed at a
9
sufficiently-high level of abstraction, could
8
be carried out by a human being in a non-
7 computerized context. Claims in the patent
6 directed to screening for computer viruses
5 in data transmissions, however, were
4 determined not to be directed to an abstract
3 idea because the claims were not directed
Valid to screening generic data or information,
2
1
Invalid and because the human mind cannot
perform the steps described in the
0
2010 2012 2013 2014 2015 specification for screening for viruses in a
telephone network. As in DDR Holdings,
the upheld claim is Internet-centric
It is difficult to discern any particular pattern because the key idea of the patent is that
from this small set of cases. We would virus detection can take place remotely
expect that this category would fare between two entities in a telephone
relatively better than the non-business network. This saves resources by
applications category because these performing virus detection at a central
inventions are directed to improving the location, thereby improving computer
operation of computers. There is no clear technology itself. The distinction between
explanation for the relatively larger number examining the contents of e-mail files for
of cases finding invalidity in 2013, prior to SPAM using mathematical algorithms and
Alice, compared to the more even split in examining other files for viruses, however,
2015 after Alice. is certainly not clear at a technical level.
It seems possible that the courts are simply Industrial Inventions
confused about how to apply Mayo and
Alice to more technical inventions, resulting This category is intended to capture
in a greater degree of inconsistency. For inventions like those at issue in the Flook
example, the court in Intellectual Ventures I and Diehr cases, where the claimed

28
inventions controlled manufacturing an Uber method claim might be drafted in
processes. Other types of inventions that system form as follows:
would fit in this category include inventions
for diagnostic, process control and A system for connecting a passenger
embedded software. There have been no and a driver, the system comprising:
Federal Circuit appeals of inventions in this
category and likely only one district court a memory for storing
case. In Oleksy v. General Electric Co., CA computer-executable
No. 1:06cv1245 (N.D. Ill.), the court held instructions; and
that claims directed to machine-controlled
methods of manufacturing turbine blades a processor for executing the
was not invalid under section 101. instructions stored on the
memory, wherein execution of
CLAIM DRAFTING ISSUES FOR the instructions by the
SOFTWARE PATENTS: FUNCTIONAL processor results in a plurality
CLAIMING/MEANS-PLUS-FUNCTION of modules comprising:
LIMITATIONS
a passenger communication
The backlash against software patents was module for receiving a request
fed, in part, by the perception that the PTO for transportation from a
had become too lax in allowing vague, passenger via a passenger
overly-general claims that laid claim to mobile software application
broad swaths of functionality without and for providing information
describing a technical invention. Even associated with an accepting
before the Alice decision, the Federal Circuit driver to the passenger;
had tightened up the rules concerning
functional claiming, and that trend a location module for
continued in 2015. identifying one or more drivers
in proximity to a user making
Functional claims define an invention by the request; and
what it does (i.e., the function of the
invention), rather than by structural a driver communication module
elements. Functional claiming is fairly for transmitting the request to
common in claims directed to software- the identified drivers and for
based inventions because, by its nature, receiving an acceptance from
software has no physical structure and is one of the identified drivers via
purely functional. Software can, of course, a driver mobile software
exist on a physical medium, such as a hard application.
drive or DVD, and can also be part of a
system that include physical hardware In the above claim, some physical structure
necessary for the software to execute (e.g., (i.e., processor and memory) is recited.
a processor and memory). However, claims However, it is difficult to imagine what other
directed to such systems and physical physical structure could be recited to
media tend to resemble those drafted in adequately capture the remainder of the
method form, which recite the functions ride-sharing invention. Therefore, the claim
performed by the software. For example, includes software-based structure in the

29
form of modules (i.e., passenger the specification, but also includes
communication module, location module, equivalents thereof. Thus, the specification
and driver communication module) that are may state that the fastening means can
defined by the particular function(s) each include a nail or screw, but a rivet or bolt,
module performs. Note that the claimed even if not specifically described, might be
functions correspond to the steps performed considered to serve as an equivalent
in the method claim, though this need not fastening mechanism.
always be the case.
The means-plus-function issue becomes
Claims must be adequately supported by particularly interesting when applied to
the written description portion of a patent in software-based claims. For example, what
order to be valid. The set of requirements corresponding structure might need to be
to meet the necessary disclosure standards described in the patent in order to support
is codified in 35 U.S.C. 112. The basic a means for playing a streaming video or
requirements of this section of patent law a module for evaluating a customer
are that the specification must include (a) a recommendation? A failure to describe the
written description of the invention showing necessary structure may result in a finding
that the inventor had possession of the that the claim is invalid for indefiniteness.
claimed invention at the time of filing, (b)
sufficient description to enable any person In 2008, the Federal Circuit addressed the
skilled in the art to make and use the requirements for the disclosure of a section
invention without undue experimentation, 112(f) corresponding structure, arguably
and (c) the best mode of practicing the requiring greater specificity and providing
invention. lxxii Further, the claims must be defendants with new weapons to challenge
definite, i.e., they must particularly point[] functional claim elements as being
out and distinctly claim[] the subject matter indefinite. lxxiv In Aristocrat Technologies v.
of the invention. lxxiii International Game Technology, the
defendant challenged the following means-
35 U.S.C. 112(f) (formerly 112, plus-function claim element as indefinite:
paragraph 6, prior to the implementation of
the America Invents Act) sets out a special game control means being arranged to
case for what are known as means-plus- pay a prize when a predetermined
function limitations in a claim. Section combination of symbols is displayed in a
112(f) states: An element in a claim for a predetermined arrangement of symbol
combination may be expressed as a means positions selected by a player, playing a
or step for performing a specified function game, including one and only one
without the recital of structure, material, or symbol position in each column of the
acts in support thereof, and such claim shall array. lxxv
be construed to cover the corresponding
structure, material, or acts described in the The court held that the disclosure of a
specification and equivalents thereof. A general purpose computer or
common example of this is seen in microprocessor is not sufficient to satisfy the
apparatus-type claims in which two requirements of section 112(f), and that a
elements are joined together by a fastening specific algorithm that transforms the
means. The fastening means is a general purpose computer into a special
structural element which must be defined in purpose computer must be disclosed. lxxvi

30
The specification gave examples that As for the presumption that 112(f) does
illustrated the function of the game control not apply in the absence of the word
means but provided no algorithm at all. lxxvii means, the Federal Circuit explained in
The claim was, therefore, indefinite. lxxviii Lighting World, Inc. v. Birchwood Lighting,
Inc., the presumption flowing from the
Another 2008 Federal Circuit case, Finisar absence of the term means is a strong one
v. DirecTV Group, produced the same that is not readily overcome. lxxxv This
result. lxxix The claim limitation in that case heightened bar was favorable to patent
was database editing means . . . for owners because it made it easier to avoid
generating a hierarchically arranged set of implicating 112(f), and the accompanying
indices . . . and for embedding said indices disclosure requirements. However, in
in said information database. lxxx The Williamson v. Citrix Online, the court found
specification provides nothing more than a this high bar to be unjustified, and
restatement of the function. lxxxi The court emphasized that the correct standard is
did not require any particular form for the whether the words of the claim are
disclosure of corresponding structure, understood by persons of ordinary skill in
allowing the patentee to express that the art to have a sufficiently definite
algorithm in any understandable terms meaning as the name for structure. lxxxvi In
including as a mathematical formula, in other words, if a claim element does not
prose, or as a flow chart, or in any other include means, the claim may still invoke
manner that provides sufficient 112(f) if a person of ordinary skill in the
structure. lxxxii field would not interpret the words of the
claim as defining structure.
Before the requirement to disclose an
algorithm applies, the language of a claim In Williamson, the patent at issue contained
must first be analyzed to determine the system claim element: a distributed
whether section 112(f) is even applicable. learning control module for receiving
The long-recognized threshold question is communications transmitted between the
whether the claim element includes or does presenter and the audience member
not include the word means (e.g., as in computer systems and for relaying the
means for [doing something]). lxxxiii communications to an intended receiving
Specifically, the use of the word means computer system and for coordinating the
creates a rebuttable presumption that operation of the streaming data
112(f) applies, whereas failure to use the module. lxxxvii The court found this element
term creates a rebuttable presumption that to be in a format consistent with means-
112(f) does not apply. lxxxiv For instance, plus-function limitations, with the word
even if a claim uses the word means, the module being operable to substitute for the
presumption might be rebutted by showing word means in context of 112(f). lxxxviii As
that the claim includes sufficient structural the phrase distributing learning control did
language so that that the specification does not define the type of structure associated
not have be relied on for the corresponding with the module (as would be understood by
structure. With respect to the fastening a person of ordinary skill in the art), the
means example, if the claim were to court determined that the claim did indeed
instead recite a riveting means, this might invoke 112(f) and, therefore, the
be sufficient structure such that 112(f) specification would need to disclose
would not apply. sufficient structure to correspond to the

31
claimed function. lxxxix Williamsons patent known computer functions, and generally
described various functions of the only require the description of a general
distributed learning control module, but purpose computer capable of performing
failed to actually describe how such the non-specialized functions.
functions would be performed. Thus, one of
ordinary skill in the art would be unable to Bearing all this in mind, when drafting a
determine, based on the disclosure in the software patent application, the drafter
patent, what structure (i.e., algorithm) was should ensure that the specification
necessary to implement the claimed describes sufficient algorithmic structure for
functions. xc any claimed function whose implementation
is not already well known to avoid a
Thus, even though an applicant can attempt rejection of the claims as indefinite during
to draft claims in a way that avoids invoking prosecution, as well as to reduce the
112(f), there are various ways to possibility that the claims may later be found
nonetheless invoke 112(f) without using invalid for indefiniteness after issuance of
means or means for. Indeed, the PTO the application.
provides examiners with various training
materials regarding recognizing claim CLAIM DRAFTING ISSUES FOR
language in a 112(f) format, including SOFTWARE PATENTS: DIVIDED AND
materials that suggest that terms such as INDIRECT INFRINGEMENT
mechanism and module can be
substitutes for means. xci Provided that a A U.S. patent grants the right to exclude
means-type claim does not recite structure others from making, using, selling, offering
that performs the claimed function, the to sell, and importing the invention covered
examiner may read the claim to invoke by the patent in the U.S. xcii It follows, then,
112(f) regardless of the particular that the infringement of a patent arises from
terminology used. the unauthorized performance of any of the
foregoing rights. Patents can be infringed
The PTO also provides 112(f) guidelines directly or indirectly (i.e., contributory or
to its examiners specifically with respect to induced infringement); xciii however, under
software and programmed computer current law, an important part of determining
functions. These software guidelines define whether infringement has occurred is
two types of computer-implemented identifying a single, direct infringer of the
functions: specialized (i.e., functions patented system, method, or other claimed
requiring a special purpose computer, as subject matter.
described in Williamson), and non-
specialized (functions known to those of Generally, for a court to find that patent
ordinary skill in the art). Specialized infringement has occurred there must be
functions, as noted above, require a direct infringement, meaning that each
description of the corresponding algorithmic element of the claim at issue, whether a
structure, while non-specialized functions, step in a claimed method, making a
being known to those of ordinary skill, need component of a claimed system, or
not be described in detail. Such non- otherwise, is attributable to a single
specialized functions include, for example, entity. xciv This raises an interesting
well-known means of data transmission and problem: what if multiple parties structure
storage, as well as other basic or well- their activity so that no single one of them

32
performs every claim element? Worse still A method of connecting a
for a patent owner, what if the claims of the passenger and a driver, the
patent are drafted in such a manner that method comprising:
they essentially require multiple parties to
fulfill all the claimed elements? Such creating, by a passenger, a
instances are referred to as divided request for transportation using
infringement, and can seriously limit or a passenger mobile software
even negate a patent owners ability to application;
enforce its patent.
identifying one or more drivers
Divided Infringement in proximity to a user making
the request;
The issue of divided infringement can arise
across nearly any type of technology, but is transmitting the request to the
a particular concern when drafting and identified drivers;
enforcing claims directed to software-based
systems and methods. Consider, for accepting, by one of the
example, this very simplified representation identified drivers, the request
of Ubers system architecture, below. using a driver mobile software
application; and

providing information
associated with the accepting
driver to the passenger.

The problem with this claim is that in


practice, no single person or entity would
perform every step of the method. Assume,
for example, that Lyft owns a backend
server analogous to that in the above Uber
claim. Then, following the steps of the
claim, a passenger creates the request,
For example, a user can request a ride with Lyfts server performs the identifying and
the Uber user app on his smartphone. The transmitting steps, a driver accepts the
request is transmitted to Ubers backend request, and the backend server provides
server, which forwards the request to the driver information to the passenger.
drivers in the users area. Once a driver Unless all of the acts can be attributed to a
has accepted the users request with the single entity, the passenger, the driver, and
Uber driver app on his device, the driver Lyft will not be held liable as joint infringers
app notifies the backend server of the for each performing a portion of the claim.
acceptance, which then provides the There is no single, direct infringing party.
drivers information to the user. Such a claim is virtually unenforceable, and
puts the patent owner in a very undesirable
Now, consider a fictitious claim for a method position.
directed to this concept:

33
This outcome can be fairly easily avoided by Returning now to the Uber method claim,
careful claim drafting. For the most part, the one way to redraft it is as follows:
language of a claim should be constructed
so that each element is performed, A method of connecting a
constructed, operated, or otherwise, from passenger and a driver, the
the perspective of a single party when method comprising:
possible. For example, in the case of a
client-server architecture, it may be receiving a request for
preferable to draft the claims either from the transportation from a
perspective of the server or from the passenger via a passenger
perspective of the client (or have multiple mobile software application;
claim sets, each from the perspective of a
different party). identifying one or more drivers
in proximity to a user making
Before jumping back to recast the Uber the request;
claim from a single-party perspective, it is
worth putting thought into which party or transmitting the request to the
parties should be the focus of a particular identified drivers;
claim. The primary question to consider is,
If the patent would need to be enforced, receiving an acceptance from
who would be the ideal party to enforce the one of the identified drivers via
patent against? a driver mobile software
application; and
A number of considerations go into
answering this question. For example, it providing information
may be preferable to draft a method claim associated with the accepting
such that the steps would necessarily be driver to the passenger.
performed by a company or other entity
(e.g., Lyft) rather than that companys In this version of the claim, the creating
customers (e.g., passengers and drivers). step formerly performed by the passenger
As a result, were the claims to be infringed, and the accepting step formerly performed
the patent owner would only need to sue a by the driver are reworded so that they are
single party rather than file multiple lawsuits both implemented from the perspective of
against a large number of individual the backend server (i.e., they are now
infringers. Further, if a company with receiving steps). As such, a single entity
substantial assets were determined to is now much more likely to perform each
infringe the patent, the patent owner is more step of, and thereby directly infringe, the
likely to recover damages in a lawsuit new claim.
against that company than in a handful of
lawsuits against individuals. Finally, it is Now, consider a newcomer to the ride-
also worth considering the reputation factor; sharing industry, Lufter, learns of the
that is, Uber v. Lyft is less likely to draw the above claim in a patent issued to Uber.
ire of the general public than Uber v. Lyfts Assuming Lufter uses a backend server that
customers. performs all of the steps of the claim, can
Lufter structure its activity so that there is
no single entity directly infringing the claim?

34
For example, if Lufter were to outsource the did not decide whether Limelight was a
identifying step to a third party that direct infringer, leaving that issue for the
provides GPS-tracking and mapping Court of Appeals for the Federal Circuit on
functionality, would it be able to avoid remand.
liability for infringement? In this instance,
given the continuously evolving law in this Given the above discussion of divided
area, the answer is probably not. This is, infringement, it might seem at first
however, an interesting area to explore counterintuitive that it is possible for a court
given such recent cases as Akamai to identify a single, direct infringer when
Technologies, Inc. v. Limelight multiple, different parties are performing the
Networks, Inc. steps of a method claim. The Federal
Circuit, however, made precisely that finding
The Akamai line of cases is noteworthy for in August of 2015 in an en banc decision,
addressing the issues of divided vacating its finding of no direct infringement
infringement as well as induced by Limelight just three months earlier.
infringement. Briefly, Akamai is the
exclusive licensee of a patent (U.S. Patent As noted above, direct infringement of a
No. 6,108,703) which claims a method of method claim under 35 U.S.C. 271(a)
delivering electronic data using a content occurs when all of the steps of the method
delivery network (CDN). The 703 patent are performed by or attributable to a single
claims methods including the step of entity. xcvii When there is more than one
tagging certain components of a content actor involved in practicing the steps, there
providers website, thereby designating the are two sets of circumstances in which a
components for storage on Akamais CDN single entity will be held responsible for
servers. Limelight also operates a CDN and direct infringement: (1) where that entity
carries out several of the steps claimed in directs or controls others performance, and
the 703 patent but, instead of tagging those (2) where the actors form a joint
components of its customers websites that enterprise. xcviii For example, a single actor
it intends to store on its servers, Limelight will be liable for direct infringement if it acts
requires its customers to do their own through an agent (applying traditional
tagging. agency principles) or contracts with another
to perform one or more steps of a claimed
The Supreme Court took up the case in method. xcix
2014, limiting its decision to the issue of
whether a defendant may be liable for Considering the general principles of
inducing infringement of a patent under 35 vicarious liability, the Federal Circuit
U.S.C. 271(b) when no direct infringement concluded that liability under 35 U.S.C.
exists under 35 U.S.C. 271(a) or any other 271(a) can also be found when an
statutory provision. xcv The court found that alleged infringer conditions participation in
direct infringement is indeed required for a an activity or receipt of a benefit upon
finding of induced infringement. xcvi In other performance of a step or steps of a
words, if all the steps in a 703 patent patented method and establishes the
method claim are not attributable to a single manner or timing of that performance. c
entity, there can be neither direct Applying this principle to the facts of the
infringement nor induced infringement. case, the court determined that a jury could
However, it should be noted that the court find that Limelight directly infringed the 703

35
patent. ci Specifically, the court found that which the acts of multiple actors will be
Akamai presented substantial evidence attributed to a single entity, any party that
demonstrating that Limelight conditions its relies solely upon the divided infringement
customers use of its CDN upon its argument in working around a patent claim
customers performance of the tagging and (e.g., by structuring its activities) may be in
serving steps (i.e., Limelights customers for an unwelcome surprise should the issue
must sign a standard contract, which be adjudicated.
delineates the steps customers must
perform if using the service, including Indirect Infringement
tagging and serving content), and that
Limelight establishes the manner or timing Having discussed direct infringement,
of its customers performance (i.e., Limelight above, it should be understood that liability
provides to its customers a welcome letter for patent infringement can extend as well to
and step-by-step instructions on how to use indirect infringers or those who aid or abet
the service and Limelight engineers direct infringement by others. From a
continuously monitor customers statutory standpoint, 35 U.S.C. 271(a)
activities). cii Thus, Limelight, exerting enumerates the activities that can result in
direction and control over its customers direct infringement; i.e., whoever without
activities, was found to be a direct infringer. authority makes, uses, offers to sell, or sells
The Court left open the possibility that other any patented invention, within the United
future scenarios may arise that warrant States or imports into the United States any
attributing others performance of method patented invention during the term of the
steps to a single actor. ciii patent therefor, infringes the patent.
Section 271(b) imposes liability on those
Putting this all together, it is critical that who induce or encourage infringement of a
claims be drafted from the perspective of a patent, and 271(c) defines who is liable for
single infringer whenever possible. The contributing to infringement. cv
infringement issue arising in Akamai would
likely have been much more easily resolved As one example, with reference to the
had the tagging step been worded so as revised Uber method claim, consider the
not to be performed by the customer. civ situation in which Lufter does not perform
Relying on a court or jury to find the the steps itself, and does not direct or
existence of a direct infringer by attributing control the activity of another such that it
all of the elements of a claim to a single could be considered a direct infringer but,
actor should be considered at best a instead, makes and sells a ride-sharing
fallback position. Furthermore, Limelight system to third parties who would perform
has appealed to the Supreme Court, so the the steps in operating the system.
expanded scope of divided infringement Depending on Lufters involvement with the
under the Federal Circuits en banc decision third party purchasers and its activities
is still unsettled. From the perspective of relating to the sale and use of the system,
the accused infringer, divided infringement Lufter could nonetheless be held liable for
will not necessarily be a perfect defense to indirectly infringing the Uber claim.
a poorly drafted claim. Given the
willingness of the Federal Circuit to explore Direct infringement is a necessary, but not
the bounds of vicarious liability and sufficient, condition for indirect infringement.
formulate broadened circumstances in Indeed, one notable distinction between

36
direct and indirect infringement is the that the appropriate standard for evaluating
requirement of knowledge or intent on knowledge is the willful blindness
behalf of an accused infringer. Whereas doctrine. cx In essence, a willfully blind
direct infringement follows in essence a defendant is one who takes deliberate
strict liability standard such that knowledge actions to avoid confirming a high
and intent are irrelevant to a finding of probability of wrongdoing and who can
liability, the same cannot be said for indirect almost be said to have actually known the
infringement. cvi Specifically, liability for critical facts. cxi This standard sets a higher
inducing infringement arises only if the bar than mere negligence (i.e., the
accused infringer knows of the particular defendant should have known that the
patent at issue and knows that the induced induced acts were infringing) or
acts constitute patent infringement. cvii recklessness (i.e., the defendant knows of a
Likewise, contributory infringement requires substantial and unjustified risk of the
knowledge of both the patent and the patent wrongdoing). cxii In Global-Tech, the Court
infringement. cviii Thus, any finding that found that the willful blindness standard was
Lufter indirectly infringes the Uber claim met by the infringers activities, which
would necessarily require a determination included copying all but the cosmetic
that Lufter had knowledge of the patent features of the patent product and engaging
containing the Uber claim, as well as an attorney to provide a freedom-to-operate
knowledge that the activities at issue (i.e., opinion without informing the attorney of the
the steps of the method performed by the copying. With respect to this last point, the
third party purchasers) constituted Court noted that it could not fathom the
infringement of the patent. motive for withholding that information from
the attorney other than to manufacture a
For these reasons, it is worth reiterating the claim of plausible deniability in the event
importance of including well-drafted system that [the] company was later accused of
claims in a patent application. For example, patent infringement. cxiii
if the patent containing the Uber claim also
included a corresponding system claim, More recently, the Supreme Court
then Lufter might be held liable for directly addressed induced infringement in Commil
infringing the system claim by making and USA, LLC v. Cisco Systems, Inc. cxiv
selling the ride-sharing system. In this Commil had originally brought suit against
manner, a patent owner might avoid having Cisco, alleging that Cisco directly infringed
to rely solely on a claim of indirect Commils patent relating to short-range
infringement, and thereby avoid having to wireless networks by making and using
satisfy the burden of proving the networking equipment and, further, that
defendants knowledge. Cisco induced infringement of Commils
patent by selling the infringing equipment for
The Supreme Court addressed the use by its customers. cxv As a defense to the
knowledge issue not long ago in Global- inducement claim, Cisco argued that it had
Tech Appliances, Inc. v. SEB S.A., and a good-faith belief that Commils patent was
found, as noted above, that a party who invalid. cxvi Stating that infringement and
actively induces infringement of a patent validity are separate issues, the Court found
must know that the induced acts constitute that such a belief is not a defense to a claim
patent infringement. cix The Court then of induced infringement. cxvii
looked to criminal law principles and found

37
Nevertheless, in its decision, the Court also Ideally, then, a party accused of infringing a
confirmed the soundness of the rationale in patent should timely obtain a
Global-Tech, which found that induced noninfringement opinion from counsel in
infringement requires proof that the order to memorialize its good-faith belief
defendant had knowledge that the induced that its activities, induced or otherwise, do
acts were infringing a patent. cxviii Thus, not infringe. Note, however, that the failure
although a reasonable belief of patent to obtain the advice of counsel cannot be
invalidity will not serve as a defense, the used to prove that an accused infringer
inducers reasonable reading of the claims willfully infringed or intended to induce
as not covering the induced acts may infringement of a patent. cxxi
reduce the likelihood that the knowledge
requirement for finding indirect infringement
is not met. cxix

The decision in Commil is, in some ways,


favorable to patentees, including non-
practicing entities, who often send notice
letters broadly alleging patent infringement.
The Court recognized this issue, but noted
that other avenues for challenging the
validity of a patent are available, including
declaratory judgment actions, inter partes
review at the Patent Trial and Appeal Board,
and ex parte reexamination at the Patent
and Trademark Office, and further reiterated
that sanctions are appropriate in frivolous
cases. cxx On the other hand, in supporting
the holding in Global-Tech, a good faith
belief by an accused infringer of
noninfringement remains a viable defense
to induced, and assumedly contributory,
infringement.

38
WHAT IS A DESIGN PATENT?

A design patent is a form of patent


protection for the aesthetic features of an
article of manufacture. cxxii A design patent
has a 15-year term that begins once the
design patent application is granted by the
PTO. A design patent consists of a brief
description of the nature and intended use
of the article that embodies the design, a
description of the ornamental features of the
article and a drawing or drawings that
clearly depict the claimed design.

In contrast to a utility patent that protects


the functional aspects of an article of
manufacture, a design patent protects only Design patent for a graphical website interface. Note
the look of such an article. The look or that the Google logo and some text is
ornamental design of the article can be shown in dashed lines. These indicate that those
embodied in its shape, or the designs and portions of the drawing are not claimed.
appearance of its surface. A design patent
is only valid if, on the whole, it is primarily Design patents, like utility patents, protect
ornamental and not primarily functional or the patent owner from infringement of the
merely a by-product of functional aspects claimed design during the term of the
of the article of manufacture. cxxiii Examples patent. Design patent infringement is
of designs that can be patented include the evaluated based on the design as a whole
shape of a particular cell phone, the tread that is, the overall aesthetic of the article of
pattern of a tire, and a computer icon. manufacture that embodies the design. An
accused design is found infringing if it is
substantially the same as the patented
design. This determination is made through
the eyes of an ordinary observer who uses
pre-existing designs of a similar type as
context to highlight the differences between
the patented design and accused design.
Generally, the range of designs that infringe
a patented design is significantly narrower
where the court determines that the
patented design has functional aspects and
is not merely aesthetic. cxxiv

Design patent application publication


for a well-known computer icon.

39
The Federal Circuit clarified the breadth of
protection offered to software by design
patents in the blockbuster case, Apple v.
Samsung. cxxv In that case, the Federal
Circuit upheld a district court decision
finding that Samsung infringed numerous
Apple patents relating to the iPhone. cxxvi Of
particular note is a design patent, D604,305,
which covers the appearance of the iOS
home screen interface.

The patented design of the Vortex football (above)


was found to be partly functional because the fins
improved the aerodynamics of the football. As a
result, the design of a similar and competing finned
football (below) was found non-infringing.

CAN DESIGN PATENTS PROTECT


SOFTWARE?

Design patents can protect generated


images among other things, digital
images on a screen. These generated
image design patents are classified in
subclasses 485-495 of design patent class The iOS interface claimed by the D305 patent. The
D305 patent includes both a color and black-and-
D14. These subclasses are the white drawing of the home screen shown above,
counterparts of utility patent classes 345 claiming both the layout and colorful appearance of
and 715 which cover various forms of the interface.
software including graphics display systems
and user interfaces.

Generated image designs can cover icons,


digital images, the appearance of a menu or
a toolbar, or even the look of an entire user
interface like the Google browser. Recently,
the PTO began accepting sequential series
of images as designs, which allows an
applicant to cover animations frame-by-
frame.
40
Despite the apparent functionality of the Samsung has appealed the Federal
array layout of the iOS interface, which Circuits ruling to the Supreme Court,
facilitates easy use, the Federal Circuit did challenging both the scope of design patent
not narrow the scope of the D305 patents protection and the measure of damages.
claims. The Federal Circuit found that a Noting the length of time since the Supreme
particular graphical software element is Court has addressed design patents,
deemed ornamental unless its appearance Samsung urges that [t]he law of the
is dictated by its function. Generally, smartphone cannot follow reflexively from
appearance is not dictated by function when the law of the spoon. On March 21, 2016,
multiple different designs can be employed the Supreme Court granted Samsungs
without compromising functionality. Unlike petition challenging the $400 million
in earlier cases involving physical articles, awarded to Apple for Samsungs
the district court and Federal Circuit found infringement of Apples design patents.
no cause to read functional limitations on
the scope into Apples D305 patent. This
holding indicates it is likely that the
arrangement of screen elements for a
graphical user interface is a protectable
design, even where the arrangement serves
a functional purpose, provided there are
alternative layouts (even inferior ones) for
accomplishing the same purpose.

41
SHOULD YOU SEEK A DESIGN PATENT protection offered by a utility patent.
ON ELEMENTS OF YOUR SOFTWARE? Whereas a utility patent lays claim to the
function of a particular piece of software and
Design patents on software elements have its operation, a design patent allows the
become increasingly common. Over the applicant to protect the visual appearance of
past few years especially, design patents a particular piece of software, which can be
have represented a growing proportion of equally important. Furthermore, as
the total number of all kinds of patents on evidenced in Apple v. Samsung, software
software. While design patents do not offer design patents can be drafted such that
the same scope of protection as their utility they offer protection on the functions of a
patent counterparts, it is clear that design piece of software that are inherently tied to
patents are being viewed as a viable its appearance. This is especially true for
measure of protection for software elements graphical user interface elements and

16000

14000

12000

10000

8000

6000

4000

2000

Design Class D14 - Generated Image Subclasses 485-495

Utility Class 345 Computer Graphics Processing and Selective Visual Display Systems

Utility Class 715 Data Processing: Presentation Processing of Document, Operator Interface
Processing, and Screen Saver Display Processing

Trends in software patent grants, both for utility and animated elements.
design patents. Data from USPTO.gov.

Design patents offer complementary


protection for software in addition to the
42
Design patents are relatively inexpensive to
prosecute and are typically not difficult to
obtain compared to utility patents. Because
design patent terms run from the date the
patent is granted, not the date the
application is filed, in many ways design
patents can be file and forget IP
protection. This is especially true given the
lower bar for allowance generally an
applicant need only submit clear, complete
and detailed drawings of the design cxxvii for
the PTO to grant a design patent, unlike the
typically lengthy negotiations that take place
between the PTO and a utility patent
applicant before issuance. Finally, design
patents require no maintenance fees after
granting. cxxviii As a result, it is advisable to
seek a design patent on the appearance of
graphical software elements to supplement
other IP protection.
A utility patent claiming a futuristic automatic shoe
lacing system (left) and a complimentary design
patent application claiming a futuristic shoe design
(right) intended for a shoe incorporating the lacing
system.

HOW DO I ASSERT MY DESIGN


PATENT?

As mentioned above, design patent


infringement claims proceed in much the
same way as utility patent infringement
claims, although infringement is ultimately
evaluated differently by the court. Design
patent infringement claims are raised in
federal district court and asserted against
the design of an allegedly infringing article
of manufacture. Emphasizing the
complimentary nature of design patent
protection, a design patent covering the
design of a particular article of manufacture
can be asserted in the same case as a
utility patent covering the article of
manufacture itself.

One key difference between utility and


design patent infringement is the measure
of damages. Utility patent damages often
come in the form of a reasonable royalty

43
that embodies the value of the patented it is clear that graphical software elements
technology in a commercial product the can be protected with design patents, many
cost of the license to the patent. cxxix Design other considerations, such as the actions of
patent infringement entitles the patent the parties and the greater context of the
owner to these same remedies or to the litigation, will factor in to the outcome of any
entire profits derived by the alleged infringer given case.
from sale of the infringing design. cxxx Thus,
design patent holders may be entitled to In sum, design patents offer complimentary
significant damages over and above what protection of the aesthetic aspects of a
they may receive for infringement of a particular software element that can be
related utility patent. cxxxi asserted along with utility patent rights or
other forms of IP protection to provide
It should be noted that evaluation of design robust, comprehensive coverage of
patent infringement claims is often a highly technology.
contextual proposition. As a result, it can be
difficult to consistently predict the outcome
in many such litigations or how any one
court decision, such as the Federal Circuits
decision in Apple v. Samsung, will impact
the IP landscape moving forward. Although

44
SCOPE OF PROTECTION THE BASICS of the code that are dictated by the
algorithm might not be protected, even if
Copyrights protect an authors expression actual copying is proven.
and provide a remedy for the copyright
holder if the authors expression is copied or So what happens if source code is used to
if derivative works based on that expression create a new version of the program? Is
are created. To show infringement of a that a copy? What happens if the source
copyright covering source code, the code is modified by changing all the variable
copyright owner must prove that the and function names? Is that still the
infringer had access to the work and copied authors protected expression? What
it, and that there was substantial happens if the source code is used to create
misappropriation of protectable expression. a new program that performs similar
In the simplest scenario, an employee who functions?
walks away with source code cannot do
anything with that source code, including Some of these situations are relatively easy
loading it onto another computer, without to deal with and can be analogized to more
infringing the copyright. Note that copyright traditional copyrighted works such as
protection has an advantage over trade literary works. Changing variable and
secret protection in this scenario because function names should be analogous to
the owner does not have to prove that changing the names of characters in a book
reasonable measures were taken to protect without changing its plot. Other situations
the secrecy of the source code. In fact, the raise more difficult questions, and may blur
source code does not have to be secret at the line between protecting expression and
all. protecting ideas.

Nonetheless, source code is often still kept The protection of non-literal aspects of a
as a secret because copyright protection computer program is usually analyzed using
does not protect the underlying ideas the three-step process called the
contained within the source code. The Abstraction-Filtration-Comparison test set
copyright statute specifically sets forth a list forth in 1992 in Computer Associates
of what cannot be protected by a copyright: International, Inc. v. Altai, Inc. (Altai). cxxxii
The Abstraction step involves characterizing
In no case does copyright protection for the program with increasing levels of
an original work of authorship extend to abstraction:
any idea, procedure, process, system,
method of operation, concept, principle, Initially, in a manner that resembles
or discovery, regardless of the form in reverse engineering on a theoretical
which it is described, explained, plane, a court should dissect the
illustrated, or embodied in such work. allegedly copied programs structure
(17 U.S.C. 102(b).) and isolate each level of abstraction
contained within it. This process begins
To use a very simple example, the source with the code and ends with an
code and resulting object code for a binary articulation of the programs ultimate
search function might be protected by function. cxxxiii
copyright; however, the copyright does not
protect the binary search algorithm itself. The Filtration step separates out, for each
We say might be protected because, to level of abstraction, the protectable
the extent there are relatively few ways to
code a binary search algorithm, the aspects
45
expression from non-protectable material. abstraction, the court found there was some
This process entails examining the similarity for only a few parameter lists and
structural components at each level of macros, but that the number of instances of
abstraction to determine whether their similarity was not sufficient to warrant a
particular inclusion at that level was idea finding of infringement given their relative
or was dictated by considerations of contribution to the overall program. cxxxvi At
efficiency, so as to be necessarily incidental a higher level of abstraction, the court
to that idea; required by factors external to considered the overlap between the list of
the program itself; or taken from the public operating system services provided;
domain and hence is nonprotectable however, that aspect of the program's
expression. cxxxiv structure was dictated by the nature of other
programs with which it was designed to
Finally, the Comparison step determines interact and, thus, is not protected by
whether there has been sufficient copying of copyright. cxxxvii At the highest level of
protectable material to constitute abstraction, CA argued that there were
infringement: similarities in the programs organizational
charts; however, the court held that the so-
Once a court has sifted out all elements called organization was not protectable
of the allegedly infringed program which because it was simple and obvious, and
are ideas or are dictated by efficiency followed naturally from the purpose of the
or external factors, or taken from the programs. cxxxviii
public domain, there may remain a core
of protectable expression. . . . At this PRACTICAL ISSUES
point, the courts substantial similarity
inquiry focuses on whether the Ownership
defendant copied any aspect of this
protected expression, as well as an A threshold question for protecting software
assessment of the copied portions under copyright is who owns the intellectual
relative importance with respect to the property rights to the software? Generally,
plaintiffs overall program. cxxxv the author of the software initially owns the
copyright, but there is an exception to this
In Altai, a Computer Associates (CA) rule for works made for hire. cxxxix Under
employee took the source code to a the work made for hire doctrine, an
component called ADAPTOR and used it to employer is considered the author of, and
create a similarly-functioning component for maintains ownership of the copyright in,
an Altai product. The function of ADAPTOR works created by its employees within the
was to isolate specific interfaces to different scope of their employment. 17 U.S.C.
operating systems so that CAs 101, 201. Ownership of the copyright in
SCHEDULER program could run on three software created by employees should be
different operating systems. Approximately straightforward unless there is a question of
30% of the source code for Altais product whether creating the software is within the
was copied from ADAPTOR. After CA scope of a given employees employment.
discovered Altais literal copying and filed Any residual uncertainty in that regard can
suit, Altai assigned several developers who be addressed by including a present
had never seen the ADAPTOR code to assignment of rights in an employment
rewrite those portions of the Altai product. agreement and not relying entirely on the
The court determined that the new Altai statutory work made for hire provision.
product did not include any source code
from ADAPTOR. Moving up a layer of
46
The application of the works made for hire the extent it does not qualify as a work for
provision of the Copyright Act is hire, is presently assigned. Note, however,
considerably less straightforward in the that California Labor Code section 3351.5(c)
case of independent contractors and third and California Unemployment Insurance
party software development companies. Code section 686 and 621(d) deem an
The Copyright Act sets forth the following agreement that provides for work made for
definition of a work made for hire by a non- hire to create an employer/employee
employee: relationship, and implicates an obligation to
maintain workers compensation and
a work specially ordered or unemployment insurance. Companies
commissioned for use as a contracting with independent software
contribution to a collective work, developers in California may, therefore,
as a part of a motion picture or wish to dispense with the work made for
other audiovisual work, as a hire provision and rely entirely on
translation, as a supplementary assignment provisions.
work, as a compilation, as an
instructional text, as a test, as Registration
answer material for a test, or as
an atlas, if the parties expressly Registration is not a prerequisite to the
agree in a written instrument creation or ownership of a copyright.
signed by them that the work Authors own the copyright in their works
shall be considered a work made regardless of whether the copyright is
for hire. registered. Registration is, however, a
prerequisite to bringing a claim of
17 U.S.C. 101(b). Even assuming the infringement against another party who has
work is specially ordered, and there is a unlawfully copied the software. The
written agreement reciting work for hire, copyright can be registered after the
the work still must fit within one of the misappropriation has occurred; however,
identified categories of work. Generally, the timing of registration affects the type of
these categories might not cover software damages that are available. Registering
source code in any given situation. For within three months of publication or before
example, even if a computer program infringement makes statutory damages and
developed by a contractor could attorneys fees available.
theoretically be a contribution to a
collective work if combined with software Registering a copyright can be
written by others (and this proposition is not accomplished online on the US Copyright
without doubt), a computer program might Office website at
not fall within this category if a contractor http://www.copyright.gov/eco/. The process
writes the entire program. involves completing the application, making
the required payment, and depositing the
Therefore, the best practice when dealing registered work. The Copyright Offices
with independent contractors or third party Circular No. 61, available at
software development companies is to http://copyright.gov/circs/, describes special
obtain a present assignment of all rights to considerations for registering computer
the developed software. cxl There may still programs, three of which bear mention
be some advantage to obtaining the here.
author status conferred by work made for
hire, and the agreement can do both:
assert that the work is made for hire and, to
47
First, separate versions of a computer particularly with respect to aspects of the
program are registered separately. user interface with which the users actually
Registering the first version is not sufficient interact. That is because user interfaces
to gain the benefit of registration for are inherently functional, and 17 U.S.C.
subsequent versions. So if you want to sue 102(b) excludes procedures, processes and
for infringement of version 2.0, you must methods of operation from copyright
register (and deposit) version 2.0. protection.
Furthermore, the registration of a
subsequent version covers only material Two early cases that involved the scope of
added to that version. It may be necessary protection for user interfaces resulted in a
to deposit numerous versions to obtain very narrow scope of protection, bordering
coverage for all of the material that was on almost no protection at all.
copied.
In Apple Computer, Inc. v. Microsoft
Second, the deposit requirements vary Corp., cxlii Apple claimed that Windows 2.03
depending on whether the programs contain and 3.0 infringed Apples copyright on the
trade secrets. The Copyright Office offers graphical user interface (GUI) in its Lisa and
options for blocking out portions of the Macintosh computers. Apple had licensed
deposited source code where the source Microsoft to use the visual displays in
code includes trade secrets. The blocked Windows 1.0, which Microsoft conceded
out portions must, however, be less than the were derivative works of Apples GUI, but
remaining visible material and the visible complained that Microsoft exceeded the
material must represent an appreciable scope of its license by making Windows
amount of original code. cxli 2.03 and 3.0 look even more Apple-like, cxliii
Apple also argued that the total concept
Finally, the Copyright Office allows the and feel of its GUI was protected,
registration of a program and its screen substantially similar to, and infringed by,
displays with a single registration. Notably, the new versions of Windows. cxliv The Court
html or other formatting code does not of Appeals for the Ninth Circuit rejected
automatically cover the display, and images Apples interpretation of the license and
or printouts of screen displays should be held that the total concept and feel of the
included in the deposited material. Circular GUI was not protectable, and that only
No. 66 discusses registration of Online those specific elements of Apples GUI that
Works in further detail. were virtually identical to elements of the
Windows GUIs could be infringed.
COPYRIGHT PROTECTION FOR USER
INTERFACES The courts copyright analysis used a four-
step test in which (1) the plaintiff identifies
As discussed above, the Copyright Office the sources of alleged similarity, (2) the
makes an explicit provision for registration court determines whether any of the
of at least one aspect of user interfaces, allegedly similar features are protected (the
screen displays, separately from the court referred to this as analytic
underlying code that implements them. dissection), (3) the court determines scope
Circular 61 also recognizes video games as of protection (broad or thin), and (4) the
containing user interface components that finder of fact (in this case the judge)
can be registered. The ability to register performs a subjective comparison to
user interface components does not, determine infringement. cxlv The court
however, resolve the issue of the extent of
copyright protection for the user interface,
48
described its analytic dissection process (e.g., indispensable or standard expressions
as the same as the analysis in Altai. cxlvi of an idea or dictated by external factors,
such as hardware performance constraints),
Apple identified the overall concept of a or not original. cxlix Finally, the Ninth Circuit
desktop metaphor, as well as a list of agreed with the district court that
particular features of its GUI, that were infringement could only occur if the works
similar to features found in Windows. In the as a whole were virtually identical, because
second step, the district court rejected the almost all the similarities spring from either
desktop metaphor as an unprotectable idea, the licensed visual displays or from basic
and grouped Apples other identified ideas and their obvious expression. cl Apple
features into the following categories of had chosen not to assert that the GUIs
standardized features or ideas: were virtually identical, and there was,
therefore, no infringement.
(1) use of windows to display multiple
images on a computer screen and The second case was Lotus Development
facilitate interaction with the Corp. v. Borland International, Inc., in which
information contained in the the Court of Appeals for the First Circuit
windows; held that the menu command hierarchy of
Lotus 1-2-3 was not entitled to copyright
(2) use of icons to represent familiar protection. cli Borlands Quattro and Quattro
objects from the office environment Pro version 1.0 programs contained a
and facilitate organization of virtually identical copy of the entire 1-2-3
information stored in the computers menu tree. clii Borland sought to gain
memory; acceptance for its product from users of
Lotus 1-2-3 who had memorized the Lotus
(3) manipulation of icons to convey menu commands and their short-cuts, and
instructions and to control operation who had created macros that used the
of the computer; Lotus menu commands. cliii

(4) use of menus to store information or The district courts analysis followed an
functions of the computers in a place approach that was similar to the abstraction-
that is convenient to reach, but filtration-comparison test. cliv The court
saves screen space for other considered different levels of abstraction,
images; and and concluded that the correct way to view
the idea Lotus 1-2-3 interface was that:
(5) opening and closing of objects as a
means of retrieving, transferring or its user interface involves a system of
storing information. cxlvii menus, each menu consisting of less
than a dozen commands, arranged
The Ninth Circuit agreed with the district hierarchically, forming a tree in which
court that these were unprotectable the main menu is the root/trunk of the
ideas. cxlviii The Ninth Circuit also agreed tree and submenus branch off from
that more specific features, such as the use higher menus, each submenu being
of overlapping windows (as opposed to tiled linked to a higher menu by operation of
windows), a document icon shaped like a a command, so that all the specific
page, and the way of depicting a moving spreadsheet operations available in
window (using just the outline of the Lotus 123 are accessible through the
window) were either merged with a more
general idea, excluded as scenes a faire

49
paths of the menu command user interface had been licensed to
hierarchy. clv Microsoft. And the First Circuits categorical
method of operation rule in Lotus has not
The court then determined that the Lotus-1- been universally accepted by other circuits.
2-3 interface included protectable In 2014, the Federal Circuit in Oracle
expression that was not dictated by the America, Inc. v. Google, Inc., interpreting
functional considerations of the idea Ninth Circuit law, rejected the method of
because there were at least hundreds of operation rule, and noted that the Tenth
ways of arranging a satisfactory menu and Third Circuits have done likewise. clxii It
tree. clvi appears, therefore, that there is a good
argument to be made that copying of user
The First Circuit rejected the district courts interfaces should be treated like copying of
analysis and reversed its judgment of any other aspect of programs and subject to
infringement. The court considered the Altai the same analysis. We note that the
abstraction-filtration-comparison test to be currently-pending litigation between Cisco
irrelevant because it provides a framework and Arista involves Ciscos claim that Arista
for addressing nonliteral copying of literally copied Ciscos command line
computer code, and the issue in Lotus was interface to its switches. This argument,
literal copying of a menu command which might not have fared well under
hierarchy. clvii In fact, the court considered Lotus, now has support in the Ninth Circuit
the Altai test to be misleading because it under Oracle v. Google.
seems to encourage [courts] to find a base
level that includes copyrightable subject COPYRIGHT PROTECTION FOR
matter. clviii APPLICATION PROGRAM INTERFACES

For the First Circuit, the determining issue The Oracle v. Google case mentioned
was whether the menu command hierarchy above is about the scope of copyright
was a method of operation, and therefore protection for application program
excluded from protection by 17 U.S.C. interfaces. The degree of protection
102(b). The court concluded that it was a accorded APIs arguably raises more
method of operation because it provides difficult issues than the issues raised by
the means by which users control and user interfaces because there are no visual
operate Lotus 1-2-3. clix It was analogous to elements involved. APIs are a literal
the buttons on a VCR, and the court expression, and the expression has a
reasoned that the labels on those buttons functional purpose. Accordingly, they raise
were not protectable expression because difficult questions about the idea/expression
they are the method of operating the VCR. clx dichotomy.
The fact that the Lotus 1-2-3 command
hierarchy was one of many the developers In Oracle v. Google, the district court and
could have chosen was immaterial to Federal Circuit came to opposite
whether it was a method of operation and conclusions regarding these issues.
therefore unprotectable. clxi Oracles Java Platform includes the Java
Class Library, which at the relevant time
Apple and Lotus, taken together, appear to included 166 packages, containing more
limit protection for user interfaces to virtually than 600 classes with over 6,000
identical copying of purely ornamental methods. clxiii Google wished to use Java in
aspects of user interfaces. Apple, however, its Android operating system, and also
can be viewed as limited to its facts, in
which a significant portion of the disputed
50
wished to use 37 of the packages in the The district court then rejected the
Java Class Library. Google believed Java protectability of the structure, sequence and
application programmers would want to find organization of the 6,000 methods into 600
the same 37 sets of functionalities in the classes and 37 packages. Although the
new Android system callable by the same grouping of methods, classes and packages
names as used in Java. clxiv After licensing resembled a taxonomy, which is protectable
discussions failed, Google created its own under Seventh Circuit precedent, the overall
version of the 37 packages by copying scheme is also a command structure for a
verbatim the class and method declarations system or method of operation of the [API],
from the Java Class Library packages, and and was therefore excluded from protection
then independently writing the code to by 102(b). clxxi The interoperability
implement the functionality of the considerations that motivated Google to
methods. clxv The district court found that the copy Javas package structure served to
class and method declarations, and their confirm the functional nature of the
organization within the 37 packages, were structure, sequence and organization. clxxii
not protectable. clxvi The Federal Circuit
reversed, holding that they were Oracle v. Google: Opinion of the Federal
protectable, and remanded for trial on Circuit
Googles fair use defense.
The Federal Circuit rejected both of the
Oracle v. Google: Opinion of the district courts reasons for finding the
Northern District of California individual method declarations
unprotectable. The court held that there
The district court first rejected the was no merger of the ideas of the methods
protectability of the individual class and and the declarations of the methods
method specifications based on the premise because (1) there were unlimited options as
that [t]he method specification is the to the selection and arrangement of the
idea. clxvii The courts premise was based 7,000 lines Google copied (e.g., Oracles
on its belief that it would be impossible to developers could have called the
implement the function of a Java method Java.lang.Math.max method
without using an identical method Math.maximum or Arith.larger); and (2)
specification. clxviii Of course that might be the district court focused its merger analysis
true for simple methods (the court used on options available to Google at the time of
java.lang.Math.max, which has two identical copying instead of the options available to
inputs, as an example), but the court made Oracle at the time the packages were
no attempt to show how that might be true created. clxxiii Neither of these points,
for more complex methods with more however, addressed the district courts
complex, and dissimilar, parameters. The finding that the method declaration is the
court made the same incorrect assumption idea, and that it would be impossible to
with respect to class declarationsthat the implement the function of a given method
class declaration for a given functionality without using an identical declaration. The
must always read the same. clxix By selection and arrangement of the 7,000
assuming that the method specification lines of declarations seems irrelevant to
[declaration] is the idea, the court whether any individual declaration is
predetermined the outcome of the analysis.
The court also held that the names of the
packages, classes and methods were not
protectable, because names and short
phrases cannot be copyrighted. clxx
51
protectable. As for the copying of class, uncertainty as to whether Oracles approach
method and parameter names, the Federal and result will stand the test of time. Until
that uncertainty is resolved, the circuit split
Circuit held that those names should not may drive forum shopping and may also
have been considered individually, rather drive tactical considerations as to whether
the issue was whether the selection and related patent and copyright claims should
arrangement of the names as they were be brought in the same action for fear (or
strung together throughout the 7,000 lines hope) of triggering Federal Circuit
of declarations exhibited creativity. clxxiv The jurisdiction.
court found that they did and that the words
and short phrases doctrine did not apply. clxxv Although there has been much
handwringing in the press about the
The Federal Circuit also rejected the district implications of Oracle, there remain
courts analysis of the structure, sequence questions about the potential impact of the
and organization of the packages. The decision. First, while it is likely to act as a
court rejected the hard and fast method of chilling agent on the use of non-open
operation rule in Lotus, and held that the source APIs in open source applications,
proper analysis under Ninth Circuit law was the majority of APIs used in open source
the Altai abstraction-filtration-comparison applications are themselves governed by
test. clxxvi It reasoned that a categorical open source permissive licenses such as
method of operation rule would preclude the GPL. There has also been the
protection for all computer programs and argument made that Oracle will slow the
would be inconsistent with Congresss culture of repurposing old APIs for new
express intent. Section 102(b) does not, as uses. The EFF, for example, has listed
Google seems to suggest, automatically examples of API recycling that led to major
deny copyright protection to elements of a software advancements, including perhaps
computer program that are functional. clxxvii most famously the repurposing of AT&Ts
The Federal Circuit also rejected the district Unix API into the myriad Linux operating
courts reliance on interoperability system permutations, one of which serves
considerations, holding that interoperability as the core for Googles Android. The
could only be considered when deciding concern is, therefore, that developers may
whether Oracles choices of expression be more inclined to spend copious hours
were limited when they created the reinventing the architecture of known APIs,
packages, not whether Googles choices increasing costs and potentially decreasing
were limited when it copied the interoperability. The Federal Circuits
packages. clxxviii Finally, the Federal Circuit Oracle decision has not, however, affected
held that under Ninth Circuit law, a the outcome of any copyright cases since it
copyrighted work does not lose protection was decided in May 2014 and does not
when it becomes an industry standard. clxxix appear to have resulted in a deluge of
copyright infringement lawsuits asserting
Implications broad copyright coverage for user interfaces
or APIs.
The Supreme Court refused to grant
Googles petition for certiorari, The only case to consider the analysis in
notwithstanding the apparent circuit split Oracle found that the facts of the two cases
regarding the scope of protection for were not analogous. In SAS Inst. Inc. v.
software structure, sequence and World Programming Ltd., SAS Institute
organization, and the proper interpretation
of 102(b). clxxx Thus, there remains
52
alleged that the defendant infringed its Oracle does not, however, stand for the
copyright by creating and selling a proposition that the syntax and semantics of
compatible replacement for its SAS a programming language cannot receive
protection under the abstraction-filtration-
Language compiler and interpreter. clxxxi It comparison test. It is far from clear,
was undisputed that the defendant therefore, whether Oracle would have
implemented its compiler/interpreter influenced the SAS Institute court to reach a
independently in a different programming different conclusion had the plaintiff made a
language. clxxxii Still, SAS Institute argued more explicit abstraction-filtration-
that by recognizing elements of the SAS comparison argument and introduced more
Language, such as names of functions, evidence of copying of the specification of
macros, options, etc., the plaintiff infringed the SAS Language.
in the same way that Google did when it
copied the names of Java classes and
methods. clxxxiii The court rejected SAS
Institutes analogy, finding that the
elements of the SAS Language are more
analogous to words of the English
language, and that SAS Institute was
seeking to copyright the SAS Language
itself. clxxxiv

53
Trade secrets are an additional way of Derives Economic Value from it Being
protecting software intellectual property Generally Unknown
aside from patent and copyright protection.
Though trade secrets lack formal A key element in trade secret protection is
procedures to establish protection, they that the informations value comes from not
depend on keeping protected information being known to the public at large.
secret from the public. This leads to a However, because a trade secret must
number of unique issues relating to the derive economic value from generally not
scope of protection, the steps necessary to being known, courts have distinguished
maintain protection, and the remedies for between those portions of software that are
misappropriation. visible, such as the look and feel of a
product, or its functionality, and the
THE SCOPE OF TRADE SECRET underlying code itself, which is not visible.
PROTECTION The functionality, look and feel of software
is generally not protectable as a trade
Trade secret protection differs from other secret as it is readily ascertainable by
kinds of IP protection in several ways that proper means. That is, while source code
are important to software. First, trade and process flows that are hidden from a
secrets require no formal procedures to user are protectable as trade secrets, the
obtain protection they must merely be visible features of a program are not eligible
kept secret, as described below. In turn, for trade secret protection generally. In
there is no requirement to disclose the some circumstances, however, the form
subject of a trade secret to the public, as and function of software can be eligible for
with patent protection. Second, trade secret trade secret protection provided sufficient
protection can be, in theory, perpetual, steps are taken to maintain their
lasting as long as the material is kept secrecy. clxxxvi
secret. But this means that trade secret
protection is also in some sense fragile, Trade secret protection may also be
because as soon as it is disclosed to the available for processes that are purely
public, the trade secret is no longer internal to software, such as algorithms and
protectable. Third, trade secrets do not give process flows. Examples of this might
protection against independent include the algorithm that a search engine
development or reverse engineering by uses to find and rank results. As an
others. Individuals that do so without algorithm or a process flow is more
misappropriation are free to use and profit portable than source code (that is,
from the purported trade secret. potentially simpler to disclose), special care
needs to be taken to protect such
WHAT IS A TRADE SECRET? information as a trade secret.

At its most basic, a trade secret is:


information, which derives economic
value from being generally unknown and
is subject to reasonable efforts to
maintain secrecy. clxxxv While software
technology is capable of being a trade
secret, to maintain trade secret protection,
owners must ensure that information related
to software technology is handled
appropriately.
54
The flow chart below summarizes when using barriers both physical and electronic.
trade secret protection is available: Physical barriers include old-fashioned
doors and locks to restrict physical access
to trade secret information. Electronic
barriers include password protection, copy
protection, encryption, and secured
electronic source code repositories.

Where potential trade secret information


must leave the company, confidentiality
agreements are critical in protecting trade
secrets. Here, there are several classes of
people to whom trade secret protectable
information may need to be made available
to achieve business objectives, and each
poses different risks. These include the
public-at-large, business partners,
consumers, and employees.

Public: For the public-at-large, best


practices come down to limiting disclosure
to only that which is necessary.

Business Partners: For disclosure to


business partners, companies should use
non-compete agreements and
confidentiality agreements to protect their
Reasonable Efforts to Maintain Its information internally (vis--vis employees)
Secrecy and externally (such as when working with
business partners). clxxxvii
Secrecy is essential to trade secret
protection, and in the context of software Consumers: For companies that advertise
technology, this can pose particular to potential customers by showing previews
obstacles. A company looking to protect its or samples, confidentiality provisions should
software technology must be mindful to also be used, and limiting how long the
maintain secrecy with a view to not only the customer has access to the information is
public at large, but also its own employees, important. clxxxviii Similarly, companies whose
business partners, as well as actual and products give customers sensitive
potential consumers. Each of these information should make use of license
categories of people poses risks of agreements to protect their proprietary
disclosure. information. clxxxix
General Precautions: In general, one best Employees: Employees pose a unique risk
practice for trade secret protection is to with regard to trade secret protection. While
restrict access to trade secret information by employed, employees may require access

55
to sensitive information to do their jobs, but California law recognizes exceptions to its
there is a risk that they might retain that prohibition on non-compete agreements for
information after their employment ends. the protection of trade secrets but the scope
For many companies, having strong internal of this exception, and how it will be
policies to protect proprietary information is enforced, is uncertain and depends on
key. For companies that need to ensure that circumstances.
information shared internally is duly
protected, employee education on how to Incoming employees can also pose a risk of
handle company information appropriately is liability for trade secret misappropriation.
important. Further, companies can use Just as they may retain information from
human resources protocols such as their current employer, so too can they
entrance and exit interviews as a means to retain information from their prior employer.
maintain secrecy. This can include trade secret protected
information which, if disclosed to and used
Companies should also consider technical by a current employer, can give rise to
measures to improve security. For liability. Again, human resources policies
example, if there is no need for different and protocols can provide a defense against
product groups to have unrestricted access potential claims. For incoming engineers
to each others source code, consideration and employees involved in product
should be given to restricting source code development, it may be necessary to
access to just those employees who work institute so-called clean room procedures
on the respective products. The same for product development. This involves
consideration might apply to particularly segregating employees who pose a
sensitive subsets of source code within a potential disclosure risk from those working
product. Policies prohibiting most on a particular product or service.
employees from exporting source code to
removable media may be appropriate. BARRIERS TO TRADE SECRECY?
Consideration should also be given to CLOUD COMPUTING, SOFTWARE AS A
logging and auditing access, copying and SERVICE AND OPEN SOURCE
exporting of source code. SOFTWARE

After employment, non-disclosure and non- Software companies face pressure today
compete agreements can provide additional from the market to use open-source
protection for trade secrets, though they are software, and are increasingly delivering
generally limited in time and scope. For their products through the use of Software
example, a non-compete agreement can as a Service (SaaS) platforms. Both of
prevent a former employee from obtaining these tools, however, are in tension with the
employment in the same field for a period of limitation on trade secret protection to
time. A non-disclosure agreement can proprietary information that is kept private
similarly prevent an employee from and confidential. Using open source
disclosing information about their software will likely prohibit a company from
employment for a period of time. It is worth obtaining trade secret protection, as many
noting, however, that non-compete open-source licenses require disclosure of
agreements are essentially unenforceable the portions of open-source code used, and
under California law. cxc Under statute, the code itself is known. However, to the

56
extent that some components of software claim must show that the trade secret was
do not use open source, those portions of actually used, not merely taken. In the area
the software may be protectable as trade of software, this causes unique issues of
secrets. proof for example, if the trade secret is
source code, this may require comparison
SaaS platforms pose different challenges, of the trade secret source code to the
as they may require the owner of the accused infringers source code. For
software to provide additional disclosure, or algorithms and internal processes, this may
increased visibility into code and the inner involve showing that the accused infringer
workings of software, to the services that did not independently develop the trade
host the software. With respect to secret.
customers, however, SaaS platforms may
decrease the risk of disclosure because the Some jurisdictions, California in particular,
code itself does not have to be distributed to require trade secret plaintiffs to identify with
customers, since they use the software in reasonable particularity the trade secrets
the cloud. Customers may have less that were allegedly misappropriated before
visibility into the code and may be less likely proceeding with discovery on their trade
to be able to reverse engineer or compile secret claim. cxci This sets up a potential
the code. Using SaaS platform or cloud double-bind for the trade secret plaintiff;
computing, however, requires companies to disclose too broadly, and courts will likely
think about secrecy measures with respect deny the plaintiff the opportunity to get the
to their cloud carrier; and make sure to information it needs to prove its trade secret
negotiate confidentiality provisions with their claims. If the plaintiff discloses too
cloud carrier; companies should consider narrowly, the plaintiff may later discover that
negotiating confidentiality provisions with additional trade secret materials were taken
their cloud carrier. customers. beyond the scope of the disclosure. Care
must be taken properly to identify the scope
ENFORCING TRADE SECRET RIGHTS of trade secrets that were taken as soon as
possible in a trade secret litigation.
Trade secret law provides a number of
potential claims and remedies if trade REMEDIES FOR MISAPPROPRIATION
secrets are misappropriated (used without
authorization), including civil and criminal In the event a companys trade secret is
claims and remedies. Unlike patent and misappropriated by another, there are a
copyright claims, trade secret claims number of potential remedies available
generally arise under state law and (when against a misappropriating partyincluding
litigated without patent or copyright claims), both civil and criminal remedies.
are generally filed in state courts.
States Uniform Trade Secrets Act. Forty-
A claim for trade secret misappropriation eight states have adopted the Uniform
generally requires showing that another Trade Secrets Act, which provides lost
party obtained the trade secret information profits, unjust enrichment or a reasonable
by improper means, and used, or disclosed royalty as remedies for individual or
it. In a number of jurisdictions, including corporate victims of trade secret
California, a plaintiff pursuing a trade secret misappropriation. Courts may award

57
compensatory damages, punitive damages Computer Fraud and Abuse Act. cxcviii The
and issue injunctive relief for findings of Computer Fraud and Abuse Act (CFAA)
misappropriation. Injunctive relief is useful, allows parties to protect proprietary
as it can prevent the misappropriating party information by offering a remedy for
from using or disclosing the trade secret. damage to a computer system or network.
Recently, the Tenth Circuit affirmed a jury The CFFA is particularly useful for
award of $2.92 million under the Utah employers who seek remedies for abuse by
Uniform Trade Secrets Act for trade secret a former employee. cxcix
appropriation where the defendant did not
use the information for its own commercial Pending Legislation: Defend Trade
benefit, but instead shared the source code Secrets Act of 2015. (H.R. 3356) In the
with a rival company. cxcii In another case, summer of 2015, both the House and
the Fifth Circuit affirmed a jurys award of Senate introduced the Defend Trade
$4.8 million for trade secret Secrets Act of 2015 in an effort to
misappropriation of a few lines of [] source harmonize state trade secret laws by
code. cxciii Further, some states also have providing a federal cause of action for trade
criminal remedies for trade secret secret misappropriation. In addition to
misappropriation. cxciv providing a federal remedy, the bill would
also create an ex parte seizure application,
Economic Espionage Act. cxcv The which would allow parties to seize property
Economic Espionage Act (EEA), first in order to prevent the dissemination of
enacted in 1996, allows the federal trade secrets. As of this writing, the bill has
government to combat the misappropriation left committee and has gone through a
of trade secrets for use abroad. The goal of number of amendments, but has not yet
the EEA is not to prosecute trade secret been passed.
theft generally, but instead to target high-
level offenders. In recent years the EEA has
risen in prominence as the Administration
has taken aggressive efforts to combat
cyber espionage and address the multiple
vectors of attack for persons and
governments seeking to steal trade
secrets. cxcvi For instance, in May 2015 the
Obama Administration announced the
indictment of a professor and five other
Chinese citizens under the EEA. cxcvii

58
GENERAL CONSIDERATIONS alone), or (as an extreme alternative) (4)
framing the agreement as a joint venture
A central consideration in any software with risk/reward sharing, rather than as a
licensing agreement is the scope of subject license.
matter covered. Drafters should consider
what version of a product or service will be The level of effort and quality a software
licensed: only the versions in existence vendor must provide is another important
when the agreement was executed? Any consideration that is sometimes overlooked.
version created during the lifetime of the As discussed below, different software
agreement? Or only versions enumerated delivery models raise different concerns for
on a schedule? Customized software addressing vendor efforts and quality. For
deliverables may be defined with reference any delivery model, however, the lack of an
to functional specifications in a statement of express provision likely will not excuse poor
work or other preliminary document. vendor performance. For exclusive
licenses, courts may find that common law
Similarly, drafters should clearly specify any implies a duty of best or reasonable efforts.
intellectual property rights at issue. For Courts are less likely to find such terms
licenses that implicate patent rights, drafters implied in nonexclusive licenses, but even
should consider which patent family for nonexclusive licenses courts may find
members should be included or excluded. that an implied covenant of good faith and
Courts may presume that continuations and fair dealing provides a minimum standard of
reissues of issued patents explicitly conduct for vendor.
enumerated are also impliedly covered
unless expressly excluded. TRADITIONAL ON PREMISES
SOFTWARE LICENSES
Importantly, any agreement that involves
patent rights should clearly distinguish Historically, software was provided via
between patent-based royalties and any physical media, or, more recently,
royalties that will be paid after each patent downloaded from servers into the users
expires (based on any unexpired patents or environment. Such software is often
on non-patent IP). In Kimble v. Marvel referred to as on premises or on-prem
Enterprises, the Supreme Court held that a software. However, the rapid adoption of
license agreement that encompassed cloud-based software development and
inseparable patent and non-patent rights deployment and the web-based hosting
with a single royalty rate could not be services platforms such as Amazons AWS,
enforced beyond the expiration date of the Microsofts Azure, and Googles Cloud
patent. Workarounds to this ruling may Platform have had an enormous impact on
include (1) framing any post-expiration the methods of software delivery and use.
payments as payments deferred based on As a result, many conventional mechanisms
pre-expiration use, (2) setting royalties in used to protect the intellectual property
multi-patent agreements to run until the rights of the licensor and to allocate risks
latest-running patent covered in the between the licensor and licensee have
agreement expires, (3) creating a step down evolved to address this new paradigm.
to enable post-expiration royalties based on
non-patent rights (e.g. 5% for patents plus Traditional methods of licensing software
trade secrets, then 4% for trade secrets relied on some form of master license

59
agreement (for large scale implementations) Licensor hereby grants
or end user agreement (for single use) to Licensee the right to install and
grant rights to download, copy, perform and use the Software on a single
use software. For large scale licenses, central processing unit of a
additional services such as custom single computer solely for the
development, implementation, training, and User's personal use or internal
maintenance and support were heavily business or professional
negotiated. Moreover, because the purposes consistent with the
software was operated within the licensees terms of this Agreement.
environment, risks of infringement claims Licensee may make limited
loomed over its use, and provisions copies of the Software solely for
regarding warranties, indemnification and the purpose of backup and
limitations of liability became critical aspects recovery
of these agreements. In some
circumstances, the ability of licensees to can now be replaced with:
modify or incorporate the licensed software
into their own systems also raised the issue Provider hereby provides User a
of rights in derivative works. For mission non-exclusive right to access
critical applications, licensees often insisted and receive the Services via the
on source code escrow and other business public Internet solely for the
continuity terms. Release of source code Users personal use or internal
would typically be triggered by bankruptcy business purposes
of the software provider or a breach of its
service obligations. Dual Licensing

SOFTWARE AS A SERVICE In instances in which multiple access


methods are used, dual licensing models
Scope of License may be appropriate. For example, a
provider of a SaaS-based application may
With the shift to hosted web services, or also offer a mobile application to allow for
SaaS usage, the applicability and scope of remote use via a smartphone. In such
these elements have changed dramatically. cases, a separate end user agreement
For example, the traditional copyright rights governs the use of the mobile application.
needed to download, host, operate and use This type of agreement may be referred to
software within an organization are no as a EULA or Terms of Use and often
longer needed, as SaaS-based applications includes terms and conditions imposed by
are hosted remotely and available via an the entity providing the application, such as
Internet connection and conventional Apple (for apps downloaded from the Apple
browser the user is not copying AppStore) or Google (for apps downloaded
displaying or distributing the software. from Google Play). These agreements take
Instead, users only need to receive the a more conventional form, and generally are
service provided by the SaaS provider. presented to the users in a click-through
format. However, when used in conjunction
Specifically, a license grant that historically with a more robust SaaS platform, the terms
included statutory copyright rights, similar to governing use of the app may include
the following: restrictions or obligations in the primary

60
SaaS Agreement. For example, users may a third party service provider on behalf of
be required to maintain a subscription to the the vendor. Even with the benefits of a
primary service in order to login using the single, centralized application, some
mobile app. customers (especially those in the financial
services or healthcare fields) may insist on
Service Quality a dedicated copy of the application, often
justifying this need by citing statutes and
Another significant difference between rules related to data security and privacy
traditional software license agreements and obligations.
hosted services agreements is the need for
maintenance and support. In a traditional Such requests can often be addressed
maintenance provision, the software vendor through dedicated database instances,
agrees to fix bugs and provide periodic whereby a particular clients data is held
upgrades. However, in a SaaS-based separate from others, so that the application
model, the vendor need only maintain one can remain multi-tenant, and the vendor
copy of the software, which is accessed and can continue to maintain only one version of
used by each of its customers. The very the application code. cc Even then, some
nature of the vendors provision of the users may request the development of
services involves maintaining its operational custom features or functionality, thus
status, else all customers will lose the introducing potential IP ownership issues.
benefit of the software. Upgrades and
updates become less burdensome, as there Customers may also request that their data
is no need for patches to be distributed to be maintained on servers physically located
and installed at each customer location. in a certain country, or that the data security
and privacy policies governing the use and
Of course, a SaaS-based deployment storage of the data comply with a particular
model does not completely eliminate the states data security statutes. One common
vendors obligation to meet certain levels of approach used by many SaaS vendors who
application quality and uptime. Many SaaS use third party hosting services is to include
agreements contemplate detailed service provisions governing such services that
level obligations, which may include credits refer to particular certifications and
for extended downtime and incident programs (e.g., ISO 27001, U.S. Safe
escalation protocols. Note, however, that Harbor Program Privacy Principles), and
vendors should be careful to carve out may include other geographic and technical
liability for any incidents or obligations restrictions.
related to connectivity issues caused by the
customers network infrastructure or those A benefit to a vendor who employs a SaaS-
resulting from general Internet traffic and based model is that it has immediate and
ISP bottlenecks. continuous access to all the data being
entered into and generated by each and
Data Management and Security every user. While in some instances there
may be no significant value to the data, in
Data management and security play a more other cases the data can be mined and
important role in SaaS implementations that manipulated and may become a source of
in traditional on-premises systems because revenue itself. If such a use is
the customers sensitive data is either on contemplated, it is recommended that the
the vendors servers, or being managed by vendor include a data use provision that

61
permits the vendor to exploit the data in the Services and related systems
manner(s) contemplated. In most and technologies (including,
instances, such use will be subject to without limitation, Customer Data
confidentiality obligations, including and data derived therefrom), and
restrictions that the data be aggregated Provider will be free (during and
and anonymous and not be used to identify after the term hereof) to (i) use
any particular individual or transaction. such information and data to
improve and enhance the
An exemplary set of data ownership and Services and for other
use provisions may look something like the development, diagnostic and
following: corrective purposes in
connection with the Services and
Customer shall own all right, other Provider offerings, and (ii)
title and interest in and to the disclose such data solely in
Customer Data. Provider shall aggregate or other de-identified
own and retain all right, title and form in connection with its
interest in and to (a) the Services business. No rights or licenses
and Software, all improvements, are granted except as expressly
enhancements or modifications set forth herein.
thereto, (b) any software,
applications, inventions or other
technology developed in
connection with Professional
Services or support, and (c) all
intellectual property rights
related to any of the foregoing.
Notwithstanding anything to the
contrary, Provider shall have the
right to anonymize, collect and
analyze data and other
information relating to the
provision, use and performance
of various aspects of the

62
COMPARISON OF KEY PROVISIONS IN of the differences between provisions in
TRADITIONAL AND SOFTWARE AS A traditional and SaaS software licenses is set
SERVICE LICENSES out below.

The rise of SaaS licenses has transformed


the structure and content of key provisions
in traditional software licenses. A summary

Issue Traditional Software Licenses SaaS Licenses

License Form Master license agreement or end Multiple access methods may
user agreement require dual licensing models

Licensee Actions Downloading, copying, Accessing and receiving


performing, using, creating
derivative works

Maintenance and Support Vendor obligated to fix bugs and Vendor may be obligated to
provide periodic upgrades provide service level obligations

Infringement Provisions Key provisions include No longer essential because


warranties, indemnification, software not operated in
limitations on liability licensees environment

Source Code Issues Source code escrow and other Business continuity terms may
business continuity terms suffice

Responsibility for Data Licensee primarily responsible Vendor primarily responsible


Management and Security and may be required to maintain
dedicated database instances,
host data in a particular location,
and/or comply with particular
data security certifications and
programs.

Vendor exploitation of user data


addressed through data use
provision subject to anonymity
and confidentiality restrictions.

63
FORUM AND VENUE CONSIDERATIONS jurisdiction. Id. General jurisdiction exists
when it can be shown that the defendant
Both patent owners and alleged infringers has had continuous and systematic
face a number of threshold choices when contacts with the forum state. ccvi This is
determining where to litigate software patent typically the case when the defendant is a
infringement cases. Patent holders need to resident of the forum state orin the case
decide where to sue. In some cases, of corporationshas its principal place of
alleged infringers will also face that question business or is incorporated in the forum
if they are deciding whether to file a state. ccvii Specific jurisdiction, on the other
preemptive declaratory judgment action hand, exists when the courts jurisdiction
against patent holders. In addition, alleged arises out of or relates to the cause of
infringers will need to determine whether to actioneven if those contacts are isolated
pursue invalidity challenges before the and sporadic. ccviii Each states long-arm
Patent Trial and Appeal Board (PTAB). statute will uniquely identify what minimum
That does not end the inquiry, however. contacts are required for specific jurisdiction
Alleged infringers must determine which to exist. ccix Importantly, specific jurisdiction
PTAB challenge to file: either a petition for is broad for software patents and usually will
inter partes review (IPR), a petition for attach wherever an allegedly infringing
covered business method review (CBM), or product is sold. ccx
post grant review (PGR). This section
evaluates some of these key Venue
considerations, with an emphasis on patent
infringement cases for software. Current Standards

Forum Once it is established that a court has


personal jurisdiction over a defendant (i.e.,
Before courts can hear a case, they that the defendant has sufficient contacts
generally follow a two-step inquiry to with the forum state), it must next be shown
determine whether personal jurisdiction that the particular trial court is the proper
exists over the defendant. cci ccii First, courts venue within the forum state. In other
will examine whether personal jurisdiction words, it is not enough for a court to have
exists under the law of the state in which personal jurisdiction over a defendant;
they sit (typically known as the state long- instead, venue limitations further protect
arm statute). cciii If statutory jurisdiction is defendants from the inconvenience of
established, courts will then examine having to defend an action in a trial court
whether such jurisdiction is consistent with that is either remote from the defendants
the Due Process Clause of the U.S. residence or from the place where the acts
Constitution. cciv However, some states underlying the controversy occurred. ccxi
define the reach of their long-arm statutes
as coextensive with the Due Process Patent infringement cases are governed by
Clausecausing the two inquiries to a unique venue statute codified at 28 U.S.C.
effectively collapse into one combined 1400(b), which reads: Any civil action for
analysis. ccv patent infringement may be brought in the

In any event, personal jurisdiction can be


satisfied by establishing the existence of
either (1) general jurisdiction or (2) specific

64
judicial district where the defendant resides, fact that an overwhelming majority of
or where the defendant has committed acts patent infringement cases [are] filed and
of infringement and has a regular and decided in the Eastern District of Texas,
established place of business. despite the fact that there is little or no
Furthermore, it has been held that venue in manufacturing, research or development in
a patent action against a corporate East Texas. ccxvi Critics of the Bill, on the
defendant exists wherever there is personal other hand, argue that the measure would
jurisdiction. ccxii Thus, no separate venue unfairly limit access to courts offering
inquiry is needed for corporate defendants. expedited, efficient proceedings, and would
disproportionately benefit large firms at the
Pending Legislation expense of smaller firms. ccxvii

Litigants should be cognizant of legislation


pending in the U.S. House of
Representatives, whichif enactedwould
dramatically change the patent litigation
landscape by introducing strict venue
provisions for patent litigation. ccxiii
Specifically, House Bill 9 (the Bill) seeks
to ensure that patent infringement suits are
only brought in judicial districts that have
some reasonable connection to the
dispute. ccxiv The hotly contested changes
are designed to target growing concerns
over improper venue shopping. ccxv For
example, venue-shopping critics point to the

65
Filing Statistics Factors that Influence Filing

As mentioned above, because specific As the below graph suggests, software


jurisdiction is easily satisfied for software patent holders prefer certain jurisdictions
patents, and because there is no separate over others. Some factors that these
venue inquiry for corporate defendants, the litigants preferand which influence their
requirements of personal jurisdiction and filing decisionsinclude: quick-to-trial
proper venue have not meaningfully jurisdictions, jurisdictions that are reluctant
restricted where software patent cases are to grant summary judgment, ccxix jurisdictions
filed and litigated. Given this freedom, that are generally considered plaintiff
forum and venue can become important friendly, and jurisdictions that are
strategic decisions for software patent associated with large damages awards.
litigants. The following chart illustrates how
the majority of software patent cases are
concentrated in a small number of
jurisdictions. ccxviii

Percentage of All Software Patent Cases Filed ( 2008 - August 2015 )

50.00%
45.00%
40.00%
35.00%
30.00%
25.00%
20.00%
15.00%
10.00%
5.00%
0.00%

66
Damages Statistics As a result, litigants should be aware of
which jurisdictions are more or less likely to
The following chart presents data on the stay litigation. The following graph presents
average damages awards per software motion to stay statistics for software patent
patent for the 10 jurisdictions that had at cases in the most active jurisdictions from
least 4 damages awards from 2010 to 2010 to 2015.
August 2015.

Average Damages Award for Software Patent Cases


Western District of Pennsylvania ccxx $258,631,564
Northern District of California ccxxi $76,010,842
Middle District of Florida ccxxii $26,415,870
Southern District of Texas $45,277,050
Western District of Wisconsin $42,254,051 ccxxiii
Eastern District of Texas $38,803,622
Eastern District of Vermont $12,416,865
District of Delaware $4,156,789
District of Minnesota $1,918,756
District of Utah $414,000

Likelihood of Litigating on Two Fronts

After plaintiffs initiate patent infringement


claims against defendants in a trial court,
defendants frequently seek to challenge the
validity of the patent through a proceeding
with the PTAB. ccxxiv Some courts,
depending on the circumstances, will stay
litigation pending the results of the PTAB
proceeding. Other courts, however, decline
to do soforcing parties to litigate two
simultaneous proceedings. ccxxv

67
Percentage of Motions to Stay Granted (2008 - 2015)

80% 75%
69%
70% 67%
61% 60% 60%
60%
50%
50% 47%
40% 40%
40%

30%

20%
13%
10%

0%

*does not include motions granted-in-part, denied-in-part

Litigants Seeking Declaratory Judgment the added benefit of avoiding litigating in


patentee-friendly jurisdictions. The chart
Declaratory judgment plaintiffs ccxxvi typically below lends support for these observations,
prefer to file in their home jurisdiction for a illustrating that the most active jurisdictions
number of reasonsone of which is the for software patent cases become
simple matter of convenience. In addition, statistically less significant when specifically
it may be more advantageous for some analyzing filings for declaratory judgment
litigants to file in their home jurisdiction. software patent cases.
Large financial institutions, for example,
may particularly benefit from a home court
advantage. Litigating at home also provides

68
Number of Software Patent Declaratory Judgment Actions (2008 - 2015)

180
166
160

140

120 112
100

80 68
60
40
40 27
17 17 17 16
20 10
3
0

Moving for a Change of Venue The following chart presents statistics for
the success rates of motions to transfer
Plaintiffs choice of forum is afforded weight venue and motions to dismiss for improper
in a venue analysis, but it is not venue filed in software patent cases among
dispositive. ccxxvii Defendants looking to the most active patent jurisdictions from
move to a more favorable venue can do so January 2010 to December 2015.
when it promotes the convenience of the
parties and witnesses. ccxxviii See, e.g., 28
U.S.C. 1404(a).

69
Motion to Transfer Success Rate in Software Patent Cases (2010 - 2015)

90%

80%

70%

60%

50%

40%

30%

20%

10%

0%

FILING A PTAB CHALLENGE Choosing the Appropriate Proceeding

Litigants who consider filing a PTAB There are benefits and drawbacks to each
challenge can choose between three types kind of PTAB proceeding. Litigants should
of review: (1) PGR, (2) IPR, or (3) CBM. be cognizant of the differences among
these proceedings in order to ensure that
the proper review is selected.

70
Such differences include varying standards Below are informational tables published by
of review, eligibility requirements, and bases PTO designed to illustrate these differences
upon which patents can be challenged. ccxxix and allow for easy comparison

Major Differences between IPR, PGR, and CBM


Inter Petitioner Estoppel Standard Basis
Partes
Review
(IPR)

Post Person who is not the Raised or reasonably More likely than not 101, 102, 103,
Grant patent owner and has not could have raised OR 112, double
Review previously filed a civil action Novel or unsettled patenting but
(PGR) challenging the validity of a Applied to subsequent legal question not best mode
claim of the patent USPTO/district court/ITC important to other
action patents/
Must identify all real parties applications
in interest

Inter Person who is not the Raised or reasonably Reasonable 102 and 103
Partes patent owner, has not could have raised likelihood based on
Review previously filed a civil action patents and
(IPR) challenging the validity of a Applied to subsequent printed
claim of the patent, and has PTO/district court/ITC publications
not been served with a action
complaint alleging
infringement of the patent
more than 1 year prior
(exception for joinder)

Must identify all real parties


in interest

Covered Must be sued or charged Officeraised or Same as PGR Same as PGR


Business with infringement reasonably could have (some 102
Method Financial product or service raised differences)
(CBM)
Excludes technological Court-raised
inventions

Must identify all real parties


in interest

71
Major Differences between IPR, PGR, and CBM
Proceeding Available Applicable Timing

Post Grant From patent grant to 9 months Patent issued under Must be completed within
Review (PGR) after patent grant or reissue first-inventor-to-file 12 months from institution,
with 6 months good cause
exception possible

Inter Partes For first-inventor-to-file, from Patent issued under Must be completed within
Review (IPR) the later of: (i) 9 months after first-to-invent or 12 months from institution,
patent grant or reissue; or (ii) first-inventor-to-file with 6 months good cause
the date of termination of any exception possible
post grant review of the patent.
For first-to-invent, available
after grant or reissue (technical
amendment)

Covered Available 9/16/12 (for first- Patents issued under first- Must be completed within
Business inventor-to-file only after PGR to-invent and first- 12 months from institution,
Method (CBM) not available or completed) inventor-to-file with 6 months good cause
exception possible

72
PTAB Statistics

The following pie charts illustrate the instituted against software patents to date
relative number of PGR, IPR, and CBM have been IPR challenges, which have also
proceedings filed against software patent invalidated the largest percentage of
ownersas well as the percent of software software patents to date.
patents that have been invalidated under
each proceeding. As can be seen below,
the vast majority of PTAB proceedings

Percent of Proceedings Filed Against Software


Patents
0%

19%
IPR
CBM
PGR

81%

Percentage of Proceedings Where Software


Patents Found Unpatentable or Cancelled
0%

23% IPR
CBM
PGR

77%

73
PLEADING STANDARDS with a brief statement describing the patent
and its owner, and alleging that a defendant
The Supreme Courts decisions in Bell is infringing the patent. Before the adoption
Atlantic v. Twombly in 2007 and Ashcroft v. of the new FRCP, federal courts usually
Iqbal in 2009 heightened the required upheld Form 18 as an adequate form of
pleading standards in federal courts. These pleading, despite the standards described in
decisions, along with recent amendments to Twiqbal. ccxxxii
the Federal Rules of Civil Procedure (the
FRCP), have implications for pleading Although courts permitted plaintiffs to rely
practices in IP cases involving software. on Form 18 to plead direct infringement,
courts required a patent plaintiff to plead
Twiqbal, as the two Supreme Court cases indirect infringement under the heightened
are colloquially known, require a party to standards expressed in Twiqbal. ccxxxiii When
plead a claim that is plausible rather than pleading induced infringement, the plaintiff
merely conceivable. The Court has was required to plead facts plausibly
described the heightened pleading standard showing that [the alleged infringer]
as requiring more than labels and specifically intended [a third party] to
conclusions, and a formulaic recitation of a infringe [the patent-in-suit] and knew that
cause of actions elements. ccxxx Instead, the [third partys] acts constituted
the allegations must be sufficient to raise a infringement. ccxxxiv Similarly, for
right to relief above the speculative contributory infringement, the plaintiff was
level. ccxxxi Although this new standard required to plausibly allege that the
appeared to apply across the board for defendant offers to sell or sells within the
parties pleading claims in federal courts, the United States or imports into the United
FRCP seemed to provide an exception for States the product or component at
some forms of pleading, including patent issue. ccxxxv Courts have also applied the
infringement. Recent changes to the FRCP, Twiqbal standards to cases where the
however, have likely put an end to that plaintiff is pleading willful infringement. ccxxxvi
exception, and parties pleading infringement
will now be subject to the same heightened Since the new FRCP amendments have
pleading standards as those pleading other become effective, Rule 84 no longer exists,
federal claims. and neither does Form 18. It is likely that
this amendment spells the end of federal
On April 29, 2015, the Supreme Court courts allowing a more lenient pleading
adopted amendments to the FRCP, which standard for direct patent infringement, and
became effective on December 1, 2015. will instead bring all infringement pleading
One of the amendments is the abrogation of into the realm of Twiqbal. The heightened
Rule 84 and its corresponding forms. In the pleading standard may present unique
pre-December 2015 FRCP, Rule 84 stated difficulties for plaintiffs alleging infringement
that the forms provided in the appendix of software patents. Being able to
suffice under these rules and illustrate the sufficiently allege infringement of software
simplicity and brevity that these rules code, for example, would be much easier if
contemplate. Form 18, provided in the a plaintiff could identify the parts of a
appendix to the FRCP, was a very simple, defendants code that infringe on the code
bare-bones form complaint for patent at issue. This is problematic, however,
infringement. A patent plaintiff could plead when the plaintiff may not be able to even
patent infringement pursuant to this form

74
review defendants source code until well because they were drawn to an abstract
into the discovery phase. Under the idea, a decision that has implications for the
Twiqbal standard requiring plaintiffs to plead patentability of software. Defendants are
a plausible case supported by sufficient now able to obtain dismissals for failure to
factual allegations, courts may reject state a claim upon which relief can be
complaints before plaintiffs have the granted (a 12(b)(6) dismissal) on the
opportunity to truly discover the potential grounds that the patents are ineligible for
infringement that is occurring. protection under Alice. Two recent Federal
Circuit cases, for example, affirmed the
Courts may be sensitive to the unique lower courts dismissals of two software
challenges of pleading infringement in patent infringement lawsuits on the basis
software cases. In Miller v. Facebook, Inc., that the patents-in-suit did not claim
the Northern District of California upheld the patentable material. In OIP Technologies v.
software developers copyright infringement Amazon.com, Inc., the suit involved
claim, stating that [o]ne reason for [the] infringement of a patent claiming computer-
finding is because a plaintiff can rarely implemented pricing methods. ccxxxviii The
examine the source code of an accused defendant filed a 12(b)(6) motion, arguing
infringing software program without that the claims were ineligible for patent
resorting to discovery. ccxxxvii It remains to protection. The Federal Circuit agreed with
be seen whether most courts will take this the defendant and, citing the Alice tfound
difficulty into consideration when assessing the subject matter to be ineligible for patent
the sufficiency of claims under the new protection, thus affirming the dismissal for
heightened pleading standards of the failure to state a claim. The concurring
FRCP. opinion specifically addressed the issue of
challenges to patent eligibility at the
In addition to the Twiqbal decisions and pleading stage, with Judge Mayer stating
changes to the FRCP, Congress has that this is the sort of basic deficiency that
proposed new legislation, H.R. 9 - should be determined at the pleading stage.
Innovation Act, which contains heightened Judge Mayer cited the Supreme Courts
pleading requirements for parties filing opinion in Bilski v. Kappos, where the Court
patent infringement claims. The proposed referred to patentability as a threshold
legislation, reintroduced in February 2015, issue. ccxxxix Two weeks later, the Federal
includes a requirement that the filing party Circuit reached a similar result in Internet
identify with specificity all of the limitations Patents Corp. v. Active Network, Inc., a
of the asserted claims and patents that are case involving patents related to web page
found in the accused product. Again, such functionality. ccxl Again, citing Alice, the court
heightened pleading requirements may found the claimed idea to be abstract and
prove problematic in cases dealing with affirmed the motion to dismiss for failure to
computer software implemented inventions, state a claimest,
for the reasons discussed above.

The Supreme Courts decision in Alice Corp


v. CLS Bank Intl in 2014 may also have an
impact on the way courts view pleading
standards in software cases. In Alice the
Court ruled that the claims at issue were not
patent eligible under 35 U.S.C. 101,

75
While the Federal Circuit is comfortable This likely results in fewer Alice motions
applying the Alice test at the pleading stage, being filed at the pleading stage in the
the district courts vary in their approach. Eastern District of Texas. Furthermore, the
Most significantly, Judge Rodney Gilstrap of likelihood of getting a case dismissed at the
the Eastern District of Texas, who has a pleading stage when an Alice motion is
busy patent docket, has implemented new brought in the Eastern District of Texas is
procedures in the wake of the increasing significantly lower than in other districts.
number of Alice motions. Under a Standing The chart below shows that Eastern District
Order issued by Judge Gilstrap on of Texas judges are far more likely to defer
November 10, 2015, if an accused infringer ruling on the merits of an Alice motion.
wishes to bring an Alice motion before claim
construction, the accused infringer may do
so only after engaging in a meet and

Success Rate of Section 101 Motions on the Pleadings: Nationwide vs.


E.D. Texas

100%

90%

80%
Motion Denied Without
70% Prejudice

60% Motion Denied

50% Motion Granted


40%

30%

20%

10%

0%
Nationwide E.D. Texas

confer process to determine whether the Some have speculated that the relative
patent plaintiff agrees or disagrees that prior difficulty of prevailing on an early Alice
claim construction is needed to inform the motion in the Eastern District of Texas has
Courts analysis as to patentability. The resulted in a greater-than-ever percentage
party who seeks to file a pre-claim of patent cases being brought in that district.
construction Alice motion must then submit
a certificate of compliance indicating the
parties respective positions on this issue.

76
DAMAGES sale of a product. The royalty base is the
unit or total product value to which the
Software has been at the epicenter of royalty rate is applied to determine the
recent developments in patent damages law actual royalty amount. While there are
as courts have struggled to evaluate how multiple ways to prove the amount of a
much of a complex integrated products reasonable royalty, generally courts and
success should be attributed to the damages experts use the market approach,
component of that product covered by an where the reasonable royalty is found by
infringed patent. Because accused looking at the data available on the market
software products often contain many to ascertain the royalty which would be
features, assessing damages can require a agreed upon in a hypothetical negotiation
complex blend of technical, economic and between the patentee and the infringer. ccxliv
survey analysis. This section offers an
overview of the law of damages generally, a Regardless of the method used, the law of
description of how patent damages law damages demands that awards only
applies specifically to software patents, and represent the profit associated with the
a snapshot into the damages awards courts infringing patent. Therefore, unless the
have ordered in software patent cases. The infringing patent is coextensive with the
law of damages is particularly important for entire product, there must be an allocation,
potential patentees, as courts have ordered or apportionment, of profits between
very large patent damages awards to patented and non-patented features. ccxlv
successful litigants.
Reasonable Royalty & Apportionment
Summary of Damages Law
[T]he basic methodological rule
Courts primarily use two metrics to evaluate for expert analysis remains the
damages: lost profits and the reasonably
same: calculate the value of those
royalty. ccxli Lost profits are an estimate of
the total amount a patent owner has lost on features that infringe, and cut out
account of the infringement. To assert lost the value of all the rest.
profits, a patent owner must prove that he
would have made the sale but-for the
infringement, and that he has presented Discerning the appropriate reasonable
proper evidence to calculate the amount of royalty can be done by apportioning the
lost profits. ccxlii royalty base, i.e. separating the overall
value of the patented features from the non-
More widely used, the reasonable royalty is patented features. Courts have permitted a
understood as the product of the royalty handful of different methods to determine
base times the royalty rate. ccxliii Loosely, the how to apportion a royalty base in software
royalty rate is the margin of profit a potential cases.
infringement victim would receive from the

77
TECHNIQUES ALLOWED TO APPORTION ROYALTY BASE

Consumer Percentage of Source Frequency Adjusting the


Surveys ccxlvi Code ccxlvii of Use ccxlviii Royalty Rate ccxlix

Consumer Surveys Courts have allowed Percentage of Source Code Additionally,


the use of consumer surveys to determine at least one court allowed an expert to use
the value of a particular patented feature in the percentage of source code attributable
a larger product. In one case, Microsoft v. to the infringing patents-in-suit to determine
Motorola, Microsoft challenged the use of a the apportioned royalty base. The plaintiff
damages experts conjoint analysis objected to the experts use of the
survey. The customer survey had percentage of source code on multiple
attempted to isolate the value to the grounds, including that the amount of
customer of one particular feature (in this source code used could be the product of
case the patent at issue involved Wi-Fi an inefficient programmer, or alternatively
capabilities in the Xbox 360). ccl The court that the source code attributed to the
allowed the survey analysis, characterizing patented features did not actually account
Microsofts objections (that the sample was for all of the relevant code. The court
non-representative and that the rejected the plaintiffs objections, finding that
questionnaire was unclear), as going to the the objections went to the correctness of
weight of the evidence, rather than its facts underlying ones expert testimony, an
admissibility. ccli issue better left for a determination by a
jury. ccliv
Frequency of Use Analysis Courts have
permitted damages experts to rely on Apportioning the Royalty Rate Courts
measurements that determine how often an have also allowed litigants to prove
accused feature is used as relevant cclii to apportionment through the royalty rate, i.e.
the extent to which the infringer has made by assigning an extremely low profit margin
use of the invention; and any evidence to reflect the portion of profits that the
probative of the value of that use. ccliii patented features represent. However, in

78
Ericsson v. D-Link Systems, the court unit. cclx Previously, parties had used the
cautioned that this method of apportionment smallest salable unit as a means to
may inappropriately mislead juries through apportion the royalty base for products with
the presentation of a larger royalty base. cclv multiple components. Defendant Apple,
however, argued that allowing the jury to
While courts have allowed a variety of use the smallest salable unit was
methodological approaches to determine inappropriate. The court sided with Apple
the appropriate manner to apportion a and rejected the jury instructions, explaining
royalty base, not all evidence will be taken that in the case where the smallest salable
into account. Notably, one court rejected a unit is, in fact, a multi-component product
defendants experts attempt to use the [that] contains several non-infringing
plaintiffs patent portfolio to show how to featuresthe patentee must do more to
properly apportion the royalty rate. cclvi The estimate what portion of the value is
court found that the patent portfolio as used attributable to the patented technology. cclxi
by the expert contained patents that were
asserted after the dates that a hypothetical As patent litigants have attempted to apply
negotiation would have taken place the apportionment principle to 21st century
between the two parties, and thus were not technology, courts have provided guidance
relevant to discerning the reasonably about what evidence will be admissible to
royalty. cclvii Additionally, while admitted in show apportionment. Courts have deferred
Microsoft v. Motorola, the use of consumer to the fact-finder (i.e. the jury) to determine
surveys to show the value of a particular whether an apportionment theory is correct,
patent has also been rejected by some allowing a variety of apportionment theories.
courts. For instance, in Rembrandt v. However, whether a particular theory of
Facebook, the court rejected the use of apportionment is admissible will not depend
customer surveys to help apportion the just on the type of evidence or damages
royalty base when it found the expert theory used, but also on the partys ability to
correlated the consumers use of a feature show a connection to the patent at issue.
to the advertising revenue received by
Facebook without adequately proving the Assessing the Royalty Rate
link between data usage and revenue. cclviii
Courts have rejected rules of thumbs or
In applying apportionment to discern that theoretical baselines when determining the
value of the product that should constitute royalty rate, and have instead looked for
the royalty base, courts have pressed for applicants to support their royalty rates with
rigorous apportionment. In VirnetX v. Cisco market data.
Systems, the court considered infringement
based on various patents related to The Federal Circuit has repeatedly rejected
technology for providing security across the use of a theoretical baseline to
networks. cclix The jury instructions on determine the royalty rate. In VirnetX, the
damages allowed the jury to apply the full court considered the partys reliance on the
value of the product in determining Nash Equilibrium, a mathematical theorem
damages if they found that either: 1) the where one assumes that the parties would
patented feature drove consumer demand
(the entire market value rule) or 2) the
product constituted the smallest salable

79
begin with a 50/50 profit split, and then of analyzing damages is accepted by
modify that split by looking at the relative multiple district courts, that method can
bargaining positions of each party. cclxii The become widespread even when the Federal
court rejected the experts reliance on the Circuit is silent on its merits. cclxx Until a few
theorem, explaining that the theorem years ago, many district courts had allowed
arrives at a result that follow from a certain damages experts to gloss over the
set of premises but asserts nothing about importance of the specific patented feature
what situation in the real world fit those to the accused product and neglected to
premises. cclxiii impose rigorous apportionment standards
for calculating reasonable royalty damages.
Similarly, in Uniloc v. Microsoft, the court The recent decisions from the Federal
rejected a $388 million damages award and Circuit described above have put an end to
put to rest the use of the 25% rule, where this practice.
the patentee would receive a quarter of the
infringers profits. cclxiv Uniloc involved The evolution of patent damages has had a
patents related to the product activation significant impact on litigation strategy.
feature for Microsofts software programs. Software patent plaintiffs must contend with
At trial, plaintiff Unilocs expert testified that the fact that any significant damages award
damages should be $564,946,803 after will be subject to an appeal several years
applying the 25% rule rule. cclxv The court after the plaintiffs damages expert prepared
rejected the 25% rule as an approximation a report. Since allowable damages theories
of the royalty rate and explained that it failed can shift significantly over that time,
to take into consideration the unique plaintiffs counsel are well advised to
relationship between the patent and the present multiple damages theories in
accused product and the parties, finding the parallel to guard against the possibility that
rule essentially arbitrary. cclxvi a previously accepted method will be
rejected by the Federal Circuit. Likewise,
Strategic Implications defendants are well advised to present their
own apportionment theories while
Changes in patent damages law have been aggressively pursuing motion practice to
driven primarily by a series of recent strike plaintiffs damages theories. Plaintiffs
decisions by the Federal Circuit striking without a viable damages theory can prevail
down damages verdicts not based on on infringement and yet fail to recover
substantial, reliable evidence. cclxvii Although anything. cclxxi
courts have long had a duty to exclude
expert testimony that is not based on valid
methods, cclxviii historically courts had been
hesitant to exclude testimony from patent
damages experts. cclxix Because district
courts look to each other for consistency,
and because all patent cases are appealed
to the Federal Circuit, once a new method

80
THE MARKING REQUIREMENT method claim was not subject to the
Marking Requirement. cclxxvi
Patents bestow a wide range of rights upon
patentees seeking to safeguard their On the other hand, the Federal Circuit has
intellectual property. In exchange for these held that where patents contain both
protections, however, the law also imposes process and apparatus claims (mixed claim
a number of obligations upon patentees. patents), patentees will be subject to the
One such obligation is known as the Marking Requirement to the extent that
Marking Requirement, codified at 35 there is a tangible item to mark. cclxxvii The
U.S.C. 287(a). cclxxii Section 287(a) limits Federal Circuit has also held, however, that
patentees recoverable damages to those the Marking Requirement will not apply in
incurred after notice of infringement has such cases to the extent that patentees
occurred (e.g., by filing an action for choose to enforce solely their process
infringement)unless patentees provide the claims. cclxxviii
public with advance notice by marking
their patented articles. cclxxiii In other words, The America Invents Act & the Costs of
patentees who do not satisfy the Marking Marking
Requirement risk forfeiting potentially
significant damages. In contrast, patentees The primary reason patentees may seek to
who do mark will be able to recover avoid marking is that complying with the
potentially significant pre-filing damages. Marking Requirement will inevitably require
some degree of financial expenditure.
According to the Federal Circuit, the Indeed, the burden of complying with the
Marking Requirement serves three Marking Requirement has traditionally been
purposes: (1) helping to avoid innocent viewed as both cost prohibitive and
infringement, (2) encouraging patentees to cumbersome for many patent holders who
give notice to the public that the article is faced the necessity of regularly updating
patented, and (3) aiding the public to products with new patent numbers and
identify whether an article is patented. cclxxiv recalling products marked with an expired
The question for software patentees whose patent number. cclxxix
intellectual property may never yield a
tangible article is whether they too must Nevertheless, there are a number of
comply with the Marking Requirement, and reasons such costs may not be particularly
if so, how best to do so. onerous for software patentees today. First,
the costs of maintaining compliance with the
Drafting Considerations: Applicability of Marking Requirement would unlikely be as
the Marking Requirement high for patentees of intangible objects, who
do not face the traditional burdens
Software patentees may be able to necessarily borne by patentees of tangible
altogether avoid the Marking Requirement objects, such as the cost of manufacturing
through careful claim drafting. For example, molds and tooling to reflect new patent
it is well settled that patents consisting numbers and the costs associated with
solely of method or process claims are not
subject to the Marking Requirement (the
Method Exception). cclxxv In fact, the
Federal Circuit has affirmatively held that a
software patent comprised exclusively of a

81
coordinating recalls of physical example, the Federal Circuit did so for
products. cclxxx In addition, the 2011 America purposes of calculating patent infringement
Invents Act (AIA) has made marking both damages, noting: This court cannot
easier and less costly through the advent of construct a principled reason for treating
virtual marking. cclxxxi Under the AIA, patent process inventions different than structural
holders can simply mark their products with products and software and hardware . . .
the word patent and provide a URL are practically interchangeable in the field of
addressallowing any necessary changes computer technology. ccxci
and updates to marked products to occur
much more cheaply by simply updating the Method Claim Software Patents
relevant web page. cclxxxii
In addition to mixed claim software
Playing it Safe: Marking Software patentees, method claim software patentees
Patents too should consider complying with the
Marking Requirement because the policies
Mixed Claim Software Patents supporting marking are no less applicable to
software patents. ccxcii For example, as
Although mixed claim patents are ostensibly mentioned, one purpose of the Marking
only subject to the Marking Requirement to Requirement is to encourage the patentee
the extent that there is a tangible item to to give notice to the public of the
mark, cclxxxiii prudent mixed claim software patent. ccxciii Providing the public with notice
patentees should endeavor to comply with of software patents is at least equally as
the Marking Requirement because, for important as providing notice of other kinds
purposes of patent law, courts have treated of patents.
some conventionally intangible objects as
tangibleincluding software. cclxxxiv In addition, the policies underlying the
Method Exception arguably do not support
For example, consider the Eastern District extending this exception to software
of Texas case Soverain Software LLC v. patents. The Method Exception exists
Amazon.com, Inc. cclxxxv cclxxxvi At issue in because ordinarily, where the patent claims
Soverain was whether the Marking are directed to only a method or process
Requirement would limit damages owed by there is nothing to mark. ccxciv Yet marking
the defendant, who was alleged to have arguably can occur with regard to software
infringed upon three mixed-claim patents patents. For example, the Soverain court
covering a software product. cclxxxvii The held that marking could occur on company
plaintiff argued that the Marking websites. ccxcv In addition, software
Requirement did not apply because the companies can provide notice by marking
websites on which the underlying patented the splash screens that appear when
software technology ran were software is launchedas Adobe already
intangible. cclxxxviii The court disagreed with does. ccxcvi
the plaintiff, and found instead that because
the websites could be marked, the websites Taking these policy considerations into
were tangible and the Marking Requirement account, in the future, it would be
applied. cclxxxix unsurprising if the Federal Circuit chose to
tie the Method Exception to whether an
The Federal Circuit has also treated object can be marked, as opposed to the
software like a tangible object. ccxc In Eolas classification of a patents claims.
Technologies Inc. v. Microsoft Corp., for

82
The Marking Requirement & Licensor- Although the Marking Requirement may not
Licensee Relationships apply to software patentees under certain
circumstances, prudent software patentees
Software patentees should also be wary of should endeavor to comply with the
the Marking Requirement with regard to requirement. While it is true that the
licensees of their patents. Importantly, the Marking Requirement will only apply to
Federal Circuit has held that a patentee has mixed claim patents to the extent that there
the burden to ensure that its licensees is a tangible item to mark, courts have
comply with the Marking Requirement. ccxcvii treated some conventionally intangible
In other words, licensing patents to others objects as tangible for purposes of patent
does not abdicate software patentees of lawincluding software. In addition,
their responsibility to ensure that the patent although method claim software patentees
licensees comply with the Marking currently benefit from the Method Exception
Requirement. This was explicitly expressed to the Marking Requirement, policy
in Soverain, where although the plaintiff considerations suggest that this could
attempted to comply with the Marking feasibly change in the future. Finally, the
Requirement itself, its damages were costs of complying with the Marking
nevertheless limited because it failed to Requirement are unlikely to be overly
ensure that its licensees also complied with burdensome for software patentees,
the Marking Requirement. ccxcviii particularly considering the advent of virtual
marking under the AIA, whereas the
benefits of complying with the Marking
Requirement could be considerable if a
software patentee chooses to enforce its
patents.

83
ENDNOTES xxxi
149 F.3d 1368, 1377 (1998).
xxxii
Id. at 1374.
xxxiii
Id. at 1374-75.
xxxiv
i The PTO does not classify or otherwise identify software
MPEP 1504.1(a) (9th ed., March 2014).
ii patents as such. Many of what are thought of as software
Rachel Stigler, Ooey GUI: The Messy Protection of
patents are likely to have Cooperative Patent Classification
Graphical User Interfaces, 12 NW. J. TECH. & IP 3, 32
subclasses of G06F and G06Q. CPC subclass G06F is
(2014).
iii titled Electric Digital Data Processing and CPC subclass
Id.
iv G06Q is titled Data Processing Systems Or Methods,
Average pendency measured as the number of months
Specially Adapted For Administrative, Commercial,
from the patent application filing date to the date the
Financial, Managerial, Supervisory Or Forecasting
application has issued.
v Purposes; Systems Or Methods Specially Adapted For
Note that the cost of obtaining and maintaining a patent in
Administrative, Commercial, Financial, Managerial,
other countries can typically be 2-3 times the cost of a
Supervisory Or Forecasting Purposes, Not Otherwise
corresponding U.S. application.
vi Provided For.
Includes PTO filing, issuance, and maintenance fees for xxxv
561 U.S. 593, 606 (2010).
large entities. xxxvi
vii Id. at 599.
Measured from the earliest priority date. xxxvii
viii In re Bilski, 545 F.3d 943, 954-56, 95960, and n. 19
Average pendency measured as the number of months
(Fed. Cir. 2008).
from the patent application filing date to the date the xxxviii
Id. at 604.
application has issued as a patent as reported by the PTO in xxxix
Id. at 609.
August of 2015 (see xl
Id. at 611-12.
http://www.uspto.gov/dashboards/patents/main.dashxml.) xli
ix 132 S. Ct. 1289, 1294 (2012).
Assumes patent drafting cost of $12,000, four Office action xlii
Id. at 1294.
responses drafted at a cost of $4,000 each and three xliii
Id. at 1303.
Requests for Continuations. xliv
x 134 S. Ct. 2347 (2014).
See 35 U.S.C. 154. xlv
xi Id. at 2352.
See 35 U.S.C. 284. xlvi
xii Id.
Assumes patent drafting cost of $25,000, two Office action xlvii
Id. at 1358.
responses drafted at a cost of $15,000 each and one xlviii
http://www.uspto.gov/sites/default/files/patents
Request for Continuation.
xiii /announce/alice_pec_25jun2014.pdf.
See 35 U.S.C. 173. xlix
xiv 79 FR 74618 (Dec. 16, 2014).
See 35 U.S.C. 173, 35 U.S.C. 289. A design and l
CPC subclass G06Q is titled Data Processing Systems Or
utility patent that cover the same product can both be
Methods, Specially Adapted For Administrative, Commercial,
asserted in litigation. The damages available for
Financial, Managerial, Supervisory Or Forecasting
infringement of a utility or design patent claim are governed
Purposes; Systems or Methods Specially Adapted for
by 35 U.S.C. 284. Reasonable royalty damages
Administrative, Commercial, Financial, Managerial,
represents the floor that the patent owner may receive in
Supervisory or Forecasting Purposes, Not Otherwise
compensation for infringement of its patent and are usually
Provided For.
calculated based on a hypothetical negotiation between the li
In one other case, I/P Engine, Inc. v. AOL Inc., 576 Fed.
patent holder and the infringer. The patent owner may also
Appx. 982 (Aug. 15, 2014), Judge Mayer wrote a concurring
seek lost profits. A design patent offers the additional
opinion in which he argued that the claims at issue failed the
remedy of recovery of the infringers total profits from the
Alice test, and that the issue of patent eligibility should be
sale of the infringing article.
xv addressed as a threshold issue before considering
35 U.S.C. 101
xvi subordinate invalidity issues. Id. at 992-997. (Judge
Diamond v. Diehr, 450 U.S. 175, 185 (1981).
xvii Mayer made this same point in concurrence in Ultramercial,
Parker v. Flook, 437 U.S. 584, 589 (1978).
xviii Inc. v. Hulu, LLC, 772 F.3d 709 (Fed. Cir. 2014)). The
134 S. Ct. 2347 (2014).
xix district court did not, however, rule on the issue of patent
Source: Docket Navigator
xx eligibility, and that issue was not raised by either party on
409 U.S. 63, 71-72 (1972).
xxi appeal.
Id. at 72. lii
xxii In one of those twelve cases, Developments US, LLC v.
437 U.S. 584-85, 594 (1978).
xxiii Microsoft Corp., 2015 WL 2445055 (Fed. Cir. May 22, 2015),
See id at 594-95 (analyzing claim by assuming new and
the court held that a claim for a universal speech-recognition
presumably better method was known and finding all other
interface did not claim any of the statutory classes of subject
components of the claim well known); see also id. at 600
matter because an interface is not a physical, tangible
(Stewart, J., dissenting) (arguing that Court improperly
article. It did not, therefore, have to perform the two-step
imported concepts of novelty and obviousness into inquiry
Mayo/Alice analysis.
under section 101). liii
xxiv DDR Holdings, LLC v. Hotels.com, LP, 773 F.3d 1245
450 U.S. 175, 178-79 (1982).
xxv (Fed. Cir. 2014).
Id. at 184, 188. liv
xxvi I/P Engine, 576 Fed. Appx. at 996 (Mayer, J., concurring).
Id. at 188-89. lv
xxvii Ultramercial Inc. v. Hulu LLC, 772 F.3d 709, 717 (Fed. Cir.
33 F.3d 1526, 1537 (1994).
xxviii 2014) (Mayer, J., concurring).
Id. at 1539-40. lvi
xxix As recently as June 2013, the Federal Circuit expressly
Id. at 1544.
xxx held that the statutory presumption of validity and the
Id. at 1545.
associated clear and convincing evidence burden apply to

84
xcvi
challenges to the eligibility of patent subject matter. Id.
xcvii
Ultramercial Inc. v. Hulu LLC, 722 F.3d 1335, 1338 (Fed. Cir. Akamai, 797 F.3d at 1022 (citing BMC Res., Inc. v.
2013); however, that MAY no longer be the law. Paymentech, L.P., 498 F.3d 1373, 137981 (Fed. Cir.
lvii
Mayo, 132 S. Ct. at 1298. 2007)).
lviii xcviii
See, e.g., Versata, 793 F.3d at 1332; Internet Patents, Id.
xcix
790 F.3d at 1346; OIP Technologies, 788 F.3d at 1362; Id. at 1023 (citing BMC, 498 F.3d at 1379).
c
Content Extraction, 776 F.3d at 1347; Ultramercial, 772 F.3d Id.
ci
at 715; buySAFE, 765 F.3d at 1353; Id. at 1025.
lix cii
Versata, 793 F.3d at 1334. Id. at 1024-25.
lx ciii
Id. Compare, however, the CAFCs conclusion in Akamai with
lxi
Internet Patents, 790 F.3d at 1348. the result in Voter Verified, Inc. v. Premier Election
lxii
Id.at 1349. Solutions, Inc. (Fed. Cir. 2012). In the Voter Verified case, a
lxiii
765 F.3d 1350, 1354 (Fed. Cir. 2014). claim for an automated voting system included a step to be
lxiv
Id. performed by a voter. The court stated, Notwithstanding
lxv
Id. at 1354-55. Voter Verifieds conclusory arguments that the Defendants
lxvi
Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 717 (Fed. necessarily control[] all of the voters actions, the record
Cir. 2014) (Mayer, J., concurring). shows, at most, that the Defendants provide instructions on
lxvii
Id. how to use their systems. But the fact that an accused
lxviii
Civ. Action No. 1:12cv1099 (C.D. Ill. July 30, 2013). infringer controls access to its system and instructs [others]
lxix
Civ. Action No. 1:12cv0517 (D.N.H. Jan. 15, 2015). on its use is not sufficient to incur liability for direct
lxx
Civ. Action No. 3:12cv6467 (N.D. Cal. Jan 20, 2015). infringement. BMC Resources Inc. v. Paymentech, L.P.,
lxxi
Civ. Action No. 10-1067-LPS, 2015 WL 1843528 (D. Del. 498 F.3d 1373, 1330 (Fed. Cir. 2007). Might the
Apr. 22, 2015). circumstances in Voter Verified satisfy the CAFCs new
lxxii
See 35 U.S.C. 112(a) (formerly 35 U.S.C. 112, 1, criteria for finding a direct infringer?
civ
prior to the America Invents Act). It is also advisable to include corresponding system claims
lxxiii
35 U.S.C. 112(b) (formerly 35 U.S.C. 112, 2, prior for any method claims when drafting a patent application.
to the America Invents Act). The use of a claimed system under 35 U.S.C. 271(a) is
lxxiv
See Aristocrat Techs. Austl. Pty Ltd v. Intl Game Tech., the place at which the system as a whole is put into service,
521 F.3d 1328 (Fed. Cir. 2008). i.e., the place where control of the system is exercised and
lxxv
Id. at 1331. beneficial use of the system obtained. NTP, Inc. v.
lxxvi
Id. at 1333, 1338. Research in Motion, Ltd., 418 F.3d 1282, 1317 (Fed. Cir.
lxxvii
Id. at 1337. 2005). In NTP, the court found that Blackberry users did not
lxxviii
Id. at 1338. infringe NTPs method claims because certain steps were
lxxix
Finisar Corp. v. DirecTV Grp., Inc., 523 F.3d 1323, 1340- performed outside the U.S. However, the court found
41 (Fed. Cir. 2008) infringement of the system claims because the location of
lxxx
Id. at 1340. the use of the communication system as a whole occurs in
lxxxi
Id. the United States. Id. at 1318. Accordingly, there is an
lxxxii
Id. avenue to potentially finding direct infringement by the use of
lxxxiii
See Williamson v. Citrix Online, LLC, et al., 792 F.3d a claimed system, even if a corresponding method claim
1339, 1348 (Fed. Cir. 2015). would result in a divided infringement situation.
lxxxiv cv
Id. (citing Personalized Media Communications, LLC v. A contributory infringer, under 35 U.S.C. 271(c), is
International Trade Commission, 161 F.3d 696, 703-04 (Fed. defined as [w]hoever offers to sell or sells within the United
Cir. 1998)). States or imports into the United States a component of a
lxxxv
382 F.3d 1354, 1358 (Fed.Cir.2004). patented machine, manufacture, combination or
lxxxvi
Id.at 1349. composition, or a material or apparatus for use in practicing
lxxxvii
Id. at 1344. a patented process, constituting a material part of the
lxxxviii
Id. at 1350. Other generic terms that can substitute for invention, knowing the same to be especially made or
the word means include mechanism, element, device, especially adapted for use in an infringement of such patent,
and other nonce words that are mere verbal constructs that and not a staple article or commodity of commerce suitable
do not define sufficient structure. Id. for substantial noninfringing use . . . .
lxxxix cvi
See id.at 1350-51. Commil USA, LLC v. Cisco Systems, Inc., 135 S. Ct.
xc
Id. at 1354. 1920, 1926 (2015).
xci cvii
http://www.uspto.gov/patent/laws-and- Id. at 1925 (citing Global-Tech Appliances, Inc. v. SEB
regulations/examination-policy/examination-guidance-and- S.A., 131 S. Ct. 2060, 2068-69 (2011)).
cviii
training-materials. Id. at 1926 (citing Aro Mfg. Co. v. Convertible Top
xcii
See 35 U.S.C. 154(a). Replacement Co., 377 U.S. 476, 488 (1964)).
xciii cix
See 35 U.S.C. 271. 131 S. Ct. at 2068-69.
xciv cx
See Akamai Technologies, Inc. v. Limelight Networks, Id. at 2068-69. The standard presumably applies to the
Inc., 797 F.3d 1020, 1022 (Fed. Cir. 2015) (en banc). The knowledge requirement for contributory infringement as well.
cxi
acts of another may also be attributable to a single entity Id. at 2070-71.
cxii
and, thus, direct infringement may be found, where the entity See id.
cxiii
directs or controls anothers performance or where the Id. at 2071.
cxiv
actors form a joint enterprise. Id. 135 S. Ct. 1920 (2015).
xcv cxv
Akamai Technologies, Inc. v. Limelight Networks, Inc., Id. at 1924.
cxvi
134 S. Ct. 2111, 2115 (2014). Id.

85
cxvii cxlvi
Id. at 1928. Id. at 1445.
cxviii cxlvii
Id. at 1927-28. Apple Computer, Inc. v. Microsoft Corp., 799 F. Supp.
cxix
See id. at 1928. 1006, 1026 (N.D. Cal. 1992).
cxx cxlviii
See id.at 1929. Apple v. Microsoft, 35 F.3d at 1443-44.
cxxi cxlix
35 U.S.C. 298. Id. at 1444-45.
cxxii cl
35 U.S.C. 171. Id. at 1447.
cxxiii cli
Manual of Patent Examining Procedure 1504.01(c); 49 F.3d 807, (1st Cir. 1995).
clii
Blisscraft v. United Plastic Co., 189 F. Supp. 333, 337 Id. at 810.
cliii
(S.D.N.Y. 1960); L.A. Gear Inc. v. Thom McAn Shoe Co., Id. at 809-10.
cliv
988 F.3d 1117, 1123 (Fed. Cir. 1993). Lotus v. Borland, 799 F. Supp. 203, 211-12 (D. Mass.
cxxiv
This principle is well-illustrated in the case OddzOn 1992).
clv
Products, Inc. v. Just Toys, Inc., 122 F.3d 1396 (Fed. Cir. Id. at 216-17.
clvi
1997). In that case, which dealt with the popular Vortex Id. at 218.
clvii
football toy, the court found that fins claimed by the Vortex Lotus, 49 F.3d at 815.
clviii
design served a functional purpose to stabilize the ball Id.
clix
during flight, allowing the likes of Joe Montana and Peyton Id.
clx
Manning to throw the ball more than 100 yards in a Id. at 817.
clxi
ubiquitous series of mid-90s commercials. As a result of the Id. at 816.
clxii
functionality of the fin design, the court viewed the design 750 F.3d 1339, 1365-66 (2014).
clxiii
claims very narrowly and found a similar finned football 750 F. 3d 1339, 1347 (Fed. Cir. 2014). Packages can
design non-infringing of OddzOns design patent. be thought of as files containing functionally-related classes.
cxxv
786 F.3d 983 (Fed. Cir. 2015). The classes contain methods, referred to as subroutines or
cxxvi
On March 21, 2016, the Supreme Court granted functions in other programming environments, which
Samsungs petition for writ of certiorari challenging the $400 include executable statements that carry out the function of
million awarded to Apple for Samsungs infringement of the method.
clxiv
Apples design patents. Id. at 1350.
cxxvii clxv
See Manual of Patent Examining Procedure 1503.02. Id. at 1351.
cxxviii clxvi
Manual of Patent Examining Procedure 1502.01. Id. at 1352.
cxxix clxvii
35 U.S.C. 284. Oracle America, Inc. v. Google Inc., 872 F. Supp. 2d
cxxx
35 U.S.C. 289. 974, 998 (N.D. Cal. 2012).
cxxxi clxviii
Note, however, that the Supreme Court may cut back the Id.
clxix
amount of damages available to a design patent holder. The Id.
clxx
Court, in granting Samsungs petition for writ of certiorari, Id. at 983-84, 998.
clxxi
agreed to address the following question: Id. at 999.
clxxii
Where a design patent is applied to only a Id. at 1000.
clxxiii
component of a product, should an award of Oracle, 750 F.3d at 1361.
clxxiv
infringers profits be limited to those profits Id. at 1362-63.
clxxv
attributable to the component? Id.
clxxvi
Samsung Electronics Co. v. Apple Inc., No. 15-777, Granting Id. at 1366.
clxxvii
Cert. Petition (March 21, 2016). Id. at 1367.
cxxxii clxxviii
Computer Associates International, Inc. v. Altai, Inc., 982 Id. at 1371. The Federal Circuits analysis seems to
F.2d 693 (2d Cir. 1992) miss the point of the district courts discussion of
cxxxiii
Id. at 707. interoperability, which was merely that Googles desire for
cxxxiv
Id.. interoperability with the Java API tends to confirm that the
cxxxv
Id. at 710. API is functional.
cxxxvi clxxix
Id. at 714-15. Id. at 1372 (citing Practice Mgmt. Info. Corp. v. Am. Med.
cxxxvii
Id. at 715. Assn, 121 F.3d 516 520 n.8 (9th Cir. 1997)).
cxxxviii clxxx
Id.. Google, Inc. v. Oracle Am., Inc., 135 S. Ct. 2887 (2015).
cxxxix clxxxi
Ownership issues for employers and employees exist 64 F. Supp. 3d 755, 763-64, 776 (E.D.N.C. 2014).
clxxxii
for all forms of intellectual property including patents, trade Id. at 776.
clxxxiii
secrets, trademark, etc. The work made for hire doctrine is Id. at 777.
clxxxiv
specific to copyrights. Id. at 776-77.
cxl clxxxv
In addition to a present assignment, the employment The law on trade secrets is generally state law, although
contract should include provisions requiring the developer to many states follow the Uniform Trade Secrets Act.
support the company and cooperate with the filing of Additionally, trade secrets may also be protected under the
documents to protect intellectual property rights in the works. Economic Espionage Act of 1996, and the Computer Fraud
cxli
Circular No. 61 mentions additional deposit requirements. and Abuse Act.
clxxxvi
If user manuals or other printed documentation accompanies See AirWatch, LLC v. Mobile Iron, Inc., No. 1:12-cv-
the program, the documentation must be deposited. Also, if 3571, 2013 WL 4757491 (N.D. Ga. Sept. 4, 2013)
clxxxvii
the program is normally distributed on CD-ROM, the entire Even California courts, which generally do not enforce
CD-ROM should ordinarily be provided. non-compete agreements, have used non-compete
cxlii
35 F.3d 1435 (9th Cir. 1994). agreements in determining whether a company has taken
cxliii
Id. at 1440. reasonable measures to maintain the secrecy of its trade
cxliv
Id. at 1442. secrets. Farmers Ins. Exch. v. Steele Ins. Agency, E., No.
cxlv
Id. at 1443. 2:13-CV-00784-MCE, 2013 WL 3872950, at *13 (E.D. Cal.

86
ccv
July 25, 2013) (At times, courts have applied this principle Trintec, 395 F.3d at 1279.
ccvi
to create a trade secret exception to section 16600, In re Cashman Equip. Co., 584 F. App'x 930, 931 (Fed.
pursuant to which a non-compete or non-solicitation clause Cir. 2014).
ccvii
may be valid under section 16600 if it is necessary to protect See Daimler AG v. Bauman, 134 S. Ct. 746, 761 (2014).
ccviii
a trade secret.). Trintec Indus., 395 F.3d at 1279 (internal quotation
clxxxviii
Airwatch LLC v. Mobile Iron, Inc., 2013 U.S. Dist. marks omitted).
ccix
LEXIS 125817, at *13, (N.D. Ga. Sept. 4, 2013). For example, the Massachusetts long-arm statute
clxxxix
Electro-Craft Corp. v. Controlled Motion, Inc., 332 provides courts with personal jurisdiction over a person as to
N.W.2d 890, 902 (Minn. 1983). a cause of action arising from, inter alia, the persons
cxc
See Cal. Bus. & Prof. Code, 16600; Edwards v. Arthur transacting any business in [the] commonwealth,
Andersen LLP, 44 Cal. 4th 937 (2008). contracting to supply services or things in [the]
cxci
See Cal. Civ. Proc. Code 2019.210; see also Perlan commonwealth, and causing tortious injury by an act or
Therapeutics, Inc. v. Superior Court, 178 Cal. App. 4th 1333, omission in [the] commonwealth. Mass. Gen. Laws Ch.
1350 (2009); Jobscience v. CVPartners, 2014 WL 852477, 223A, 3(a)-(c).
ccx
at *4 (N.D. Cal. Feb. 22, 2014). See, e.g., Nuance Commc'ns, Inc. v. Abbyy Software
cxcii
Storagecraft Tech. Corp. v. Kirby, 744 F.3d 1183 (10th House, 626 F.3d 1222, 1234 (Fed. Cir. 2010) (holding that
Cir. 2014) no more [was] required for specific jurisdiction where it was
cxciii
Aspen Tech, Inc. v. M3 Tech., Inc. 569 Fed. Appx. 259 shown that the defendant purposefully ship[ped] the
(5th Cir. May 29, 2014). accused software product into [the state] through an
cxciv
See, e.g. 499c of the California Penal Code, which established distribution channel, with the expectation that
authorizes imprisonment in a county jail not exceeding one copies of those products [would] be sold [there]).
ccxi
year, or [] imprisonment pursuant to subdivision (h) of VE Holding Corp. v. Johnson Gas Appliance Co., 917
Section 1170, or by a fine not exceeding five thousand F.2d 1574, 1576 (Fed. Cir. 1990).
ccxii
dollars ($5,000), or by both that fine and imprisonment.). Trintec Indus., 395 F.3d at 1280.
cxcv ccxiii
18 U.S.C. 1831-39. Gene Quinn & Steve Brachmann, Strict Venue
cxcvi
Administration Strategy on Mitigating the Theft of U.S. Provisions for Patent Litigation Added to Innovation Act,
Trade Secrets, February 2013, available at: IPWATCHDOG (June 11, 2015),
https://www.whitehouse.gov/sites/default/files/omb/IPEC/ad http://www.ipwatchdog.com/2015/06/11/strict-venue-
min_strategy_on_mitigating_the_theft_of_u.s._trade_secrets provisions-for-patent-litigation-added-to-innovation-
.pdf. act/id=58625/; see Innovation Act, H.R. 9, 114th Cong.
cxcvii
David Sanger an Nicole Perlroth, 6 Chinese Men (2015).
ccxiv
Indicted in Theft of Code from U.S. Tech Companies, NY Id. (internal quotation marks omitted); see H.R. 9 sec.
Times, May 19, 2015, available at: 3(g)(1), 1400(b)(1)-(7). Some of these proposed
http://www.nytimes.com/2015/05/20/technology/6-chinese- connections include requiring defendants to have a principal
men-indicted-in-theft-of-code-from-us-tech-companies.html place of business in the venue, requiring the defendant to
cxcviii
10 U.S.C. 1030 have committed the infringing act in the venuewhile having
cxcix
See e.g., Farmers Ins. Exch. v. Steele Ins. Agency, Inc., a regular and established physical facility in the venueor
No. 2:13-CV-00784-MCE, 2013 WL 3872950, at *13 (E.D. requiring the invention to have been conceived or actually
Cal. July 25, 2013) reduced to practice in the venue. H.R. 9 sec. 3(g)(1),
cc
Products and services that involve sandboxing may 1400(b)(1)-(2), (4).
ccxv
implicate provisions in licenses for third party programs Quinn & Brachmann, supra.
ccxvi
(such as Microsoft Word) that prohibit the creation of Id.
ccxvii
virtualized copies of programs without permission. Id.
cci ccxviii
The Supreme Court recently narrowed the scope of These twelve jurisdictions are illustrated as they
personal jurisdiction over corporations. Specifically, in represent the jurisdictions with the highest concentration of
Daimler AG v. Bauman, the Supreme Court clarified that software patent cases filed. For this reason, these
general jurisdiction over corporations will only arise in certain jurisdictions were used throughout this section to discuss
exceptional circumstances; namely, when contacts have other metrics related to software patent cases, including but
been so continuous and systematic the corporation can be not limited to the data regarding jurisdictional likelihood of
considered at home. See Bernadette Bollas Genetin, The granting a stay, etc. The one exception to this is with regard
Supreme Courts New Approach to Personal Jurisdiction, 68 to the damages data, infra, where the jurisdictions with at
SMU L. REV. 107, 141 (2015); see also Daimler AG v. least 4 damages awards between 2010 to August 2015 were
Bauman, 134 S. Ct. 746, 760-61 (2014). utilized.
ccii ccxix
Trintec Indus., Inc. v. Pedre Promotional Products, Inc. As the name hints, summary judgment is a procedural
cciii
395 F.3d 1275, 1279 (Fed. Cir. 2005). device that allows parties to seek an early disposition of their
cciv
The Due Process Clause requires non-resident case and completely avoid going to trial. BLACK'S LAW
defendants to have engaged in certain purposeful minimum DICTIONARY 1664 (10th ed. 2014).
ccxx
contacts with the forum state before personal jurisdiction will Includes an outlier damages award of $1,169,140,271.00.
attach to ensure that there is fair warning that they may be Without this award, the average is $76,529,823.20.
ccxxi
subject to litigation within the forum. See Beverly Hills Fan Includes outlier damages awards of $929,780,039.00
Co. v. Royal Sovereign Corp., 21 F.3d 1558, 1565 (Fed. Cir. and $548,176,477. Without these awards, the average is
1994) (holding in a patent infringement case that $20,763,557.
ccxxii
purposefully shipping a product into a state through an Includes an outlier damages award of $172,704,600.
established distribution channel was sufficient to establish Without this award, the average is $2,034,415.
specific jurisdiction).

87
ccxxiii
Includes an outlier damages award of $234,277,669. Retrieval Corp. v. Sirius Satellite Radio, Inc., 2006 WL
Without this award, the average is $10,250,114. 1582091, at *2 (C.D. Cal. June 6, 2006).
ccxxiv ccxxix
The PTAB is comprised of a set of Administrative Patent In IPR reviews, for example, litigants may not raise a 35
Judges whose responsibilities include rendering decisions U.S.C. 112 indefiniteness challenge. Thus, this may have
on: appeals from adverse examiner decisions, post-issuance the perverse result of causing an IPR prior art challenge to
challenges to patents, and interferences. About PTAB, U.S. be denied where the claims are indefinite such that the
PAT. & TRADEMARK OFFICE, http://www.uspto.gov/patents- PTAB is unable to meaningfully compare the prior art to the
application-process/patent-trial-and-appeal- asserted claims.
ccxxx
board/resources/about-ptab (last modified May 13, 2015, Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 545
1:28 PM); see 35 U.S.C. 6(a)-(b). (2007).
ccxxv ccxxxi
Although parties may request a stay pending PTAB Id.
ccxxxii
proceedings, district courts are not obligated to grant the See, e.g., In re Bill of Lading Transmission and
stay; instead, Congress has identified four factors that Processing System Patent Litigation, 681 F.3d 1323, 1333-
judges consider when evaluating whether a stay should be 35 (Fed. Cir. 2012) (to the extent the parties argue that
granted pending CBM review: Twombly and its progeny conflict with the Forms and create
differing pleading requirements, the Forms control).
ccxxxiii
(A) whether a stay, or the denial See id.; Core Wireless Licensing S.A.R.L. v. Apple
thereof, will simplify the issues Inc., Civil Action No. 6:14-CV-752-JRG-JDL, 2015 WL
in question and streamline the 4910427 (E.D. Tex. August 13, 2015).
ccxxxiv
trial; M2M Solutions LLC v. Telit Communications PLC,
(B) whether discovery is complete Civ. A. No. 14-1103-RGA, 2015 WL 4640400 (D. Del.
and whether a trial date has August 5, 2015).
ccxxxv
been set; See id.
ccxxxvi
(C) whether a stay, or the denial See e.g., Cap Co., Ltd. v. Symantec Corp., Case Nos.
thereof, would unduly 14-cv-05068-JD and No. 14-cv-05071-JD, 2015 WL
prejudice the nonmoving party 3945875 (N.D. Cal June 26, 2015); Paone v. Broadcom
or present a clear tactical Corp., Nos. 15 Civ. 0596 (BMC)(GRB), 15 Civ. 0608
advantage for the moving (BMC)(GRB), 15 Civ. 0610 (BMC)(GRB), 15 Civ. 0639
party; and (BMC)(GRB), 15 Civ. 0647 (BMC)(GRB), 2015 WL 4988270
(D) whether a stay, or the denial (E.D.N.Y Aug. 19, 2015).
ccxxxvii
thereof, will reduce the burden Miller v. Facebook, Inc., No. C 10-00264 WHA, 2010
of litigation on the parties and WL 2198204 at *6 (N.D. Cal. May 28, 2010).
ccxxxviii
on the court. 788 F.3d 1359 (Fed. Cir. 2015).
ccxxxix
Id. at 1364.
ccxl
Leahy-Smith America Invents Act, Pub. L. No. 112-29, 790 F.3d 1343 (Fed. Cir. 2015).
ccxli
18(b)(1), 125 Stat. 284, 331 (2011). For example, in Lucent Technologies, Inc. v. Gateway, 580 F.3d 1301,
Smartflash LLC v. Apple Inc., the Federal Circuit affirmed the 1324 (Fed. Cir. 2009).
ccxlii
trial courts denial of Apples motion to stay after holding that Versata Software Inc. v. SAP Am., Inc., 2011 U.S. Dist.
each of the AIA factors weighed against staying the LEXIS 102339, *9 (E.D. Tex. Sept. 9, 2011).
ccxliii
litigationwhich had already progressed past the point of Whitserve, LLC v. Computer Packages, Inc., 694 F.3d
trial. See No. 2015-1701, 2015 WL 4603820, at *3-9 (Fed. 10, 27 (Fed. Cir. 2012)
ccxliv
Cir. July 30, 2015). Stays pending IPR review, on the other Two other approaches that can be used include the
hand, typically take into account the impact of inter partes income approach, which looks to the revenues brought in by
review, to include whether a stay would simplify the issues in a company relative to other products or alternative products,
question and streamline the trial; how far the litigation has or the cost approach, which bases damages on the cost of
progressed, taking into account whether discovery is research and development needed to create an alternative
complete and a trial date has been set; and whether a stay to the intellectual property at issue.
ccxlv
would unduly prejudice or present a clear tactical One exception to the apportionment principle is the
disadvantage to the non-moving party. See, e.g., CANVS entire market value rule. According to the entire market
Corp. v. United States, 118 Fed. Cl. 587, 592 (2014). value rule, apportionment is not necessary when a patent
ccxxvi
Note that declaratory judgment plaintiffs are typically owner can prove that the patented feature drives the
would-be defendants in an impending patent infringement demand for the entire product as a whole. Good Tech. Corp.
suit. Such parties frequently seek declaratory judgment v. Mobileiron, Inc., No. 5:12-CV-05826-PSG, 2015 WL
regarding invalidity and noninfringement to get ahead of a 4090431, at *1 (N.D. Cal. July 5, 2015). Despite the entire
lawsuit, securing the advantage of choosing the jurisdiction. market value rule exception, software patent holders are
ccxxvii
See Piper Aircraft Co. v. Reyno, 454 U.S. 235, 241 generally tasked with applying the apportionment principle
(1981). and face unique challenges in proving what damages are
ccxxviii
Such factors may include (1) the plaintiffs' choice of owedor not owedfor patents that exist in multilevel
forum; (2) the respective parties contacts with the forum; (3) systems within multifunctional products.
ccxlvi
the contacts relating to the plaintiffs' claims for relief in the Microsoft v. Motorola, Inc., 904 F. Supp. 2d 1109 (W.D.
chosen forum; (4) the ease of access to sources of proof; (5) Wash. 2012).
ccxlvii
the familiarity of each forum with applicable law; and (6) the Finjan Inc., v. Blue Coast Systems, Inc., 2015 WL
availability of compulsory process to compel attendance of 4272870 (N.D. Cal. July 15, 2015).
ccxlviii
unwilling non-party witnesses. See, e.g., Broad. Data Id.

88
ccxlix cclxxii
Ericsson, Inc. v. D-Link Sys., Inc., 773 F.3d 1201 (Fed. Although 287(a) indicates that marking is technically
Cir. 2014) non-obligatory, in light of the consequences for failure to
ccl
Microsoft v. Motorola, Inc., 904 F. Supp. 2d 1109 (W.D. [mark] it is usually described as a duty. Stephen Lindholm,
Wash. 2012). Marking the Software Patent Beast, 10 STAN. J.L. BUS. & FIN.
ccli
Id. at 1120. 82, 113 n.419 (2005).
cclii cclxxiii
Finjan Inc., v. Blue Coast Systems, Inc., 2015 WL Section 287 provides patentees with detailed
4272870, *4 (N.D. Cal. July 15, 2015) (permitting the use of instructions regarding what constitutes adequate marking:
WebPulse categorization data to show that software for Patentees . . . may give notice to the
categorizing potentially malicious webpages only implicated public . . . either by fixing thereon the
the patent-in-suit for a small number of the numerous word patent or the abbreviation pat.,
features available using the accused software); Lucent together with the number of the patent,
Tech., 580 F.3d at 1333. or by fixing thereon the word patent or
ccliii
Georgia-Pacific Corp. v. United States Plywood Corp., the abbreviation pat. together with an
318 F. Supp. 1116, 1120 (S.D.N.Y. 1970) (Georgia-Pacific address of a posting on the Internet,
Factor 11). accessible to the public without charge
ccliv
Id. for accessing the address, that
cclv
Ericsson, Inc. v. D-Link Sys., Inc., 773 F.3d 1201, 1227 associates the patented article with the
(Fed. Cir. 2014) (It is not that an appropriately apportioned number of the patent, or when, from the
royalty award could never be fashioned by starting with the character of the article, this can not be
entire market value of a multi-component productby, for done, by fixing to it, or to the package
instance, dramatically reducing the royalty rate to be applied wherein one or more of them is
in those casesit is that reliance on the entire market value contained, a label containing a like
might mislead the jury, who may be less equipped to notice.
understand the extent to which the royalty rate would need
to do the work in such instances.). 35 U.S.C. 287(a).
cclvi
Id. at 7.
cclvii
Id. cclxxiv
cclviii
Rembrandt Soc. Media, LP v. Facebook, Inc., 561 Fed. Nike, Inc. v. Wal-Mart Stores, Inc., 138 F.3d 1437, 1443
Appx. 909 (Fed. Cir. 2014) (Fed. Cir. 1998).
cclxxv
cclix
VirnetX v. Cisco Systems, Inc. 767 F.3d 1308 (Fed. Cir. See, e.g., Am. Med. Sys., Inc. v. Med. Eng'g Corp., 6
2014). F.3d 1523, 1538 (Fed. Cir. 1993).
cclxxvi
cclx
Id. at 1328. Fujitsu Ltd. v. Netgear Inc., 620 F.3d 1321, 1332 (Fed.
cclxi
Id.(emphasis added). Cir. 2010).
cclxxvii
cclxii
Virnetx, Inc. v. Cisco Sys., Inc., 767 F.3d 1308, 1325 Am. Med., 6 F.3d at 153839.
cclxxviii
(Fed. Cir. 2014) Hanson v. Alpine Valley Ski Area, Inc., 718 F.2d 1075,
cclxiii
Id. at 1333. 1083 (Fed. Cir. 1983).
cclxxix
cclxiv
Uniloc v. Microsoft, 632 F.3d 1292 (2011). See Alana M. Fuierer, Your Client has a Patent; It Also
cclxv
Id. at 1311. has a Website, THE DAILY RECORD, July 16, 2013,
cclxvi
Id. at 1313-14. http://nydailyrecord.com/blog/2013/07/16/ip-frontiers-your-
cclxvii
See, e.g., Lucent Technologies Inc. v. Gateway, 580 client-has-a-patent-it-also-has-a-website/.
cclxxx
F.3d 1301, 1324 (Fed. Cir. 2009); Ericsson, Inc. v. D-Link See id.
cclxxxi
Sys., Inc., 773 F.3d 1201 (Fed. Cir. 2014); Virnetx, Inc. v. See id.
cclxxxii
Cisco Sys., Inc., 767 F.3d 1308, 1331 (Fed. Cir. 2014); See id.
cclxxxiii
LaserDynamics, Inc. v. Quanta Computer, Inc., 694 F.3d 51 Am. Med., 6 F.3d at 153839 (emphasis added)
cclxxxiv
(Fed. Cir. 2012); Uniloc USA, Inc. v. Microsoft Corp., 632 See John LaBarre & Xavier Gmez-Velasco, Ready,
F.3d 1292 (Fed.Cir.2011). Set, Mark Your Patented Software!, 12 RICH. J.L. & TECH. 3,
cclxviii
Daubert v. Merrell Dow Pharmaceuticals, 509 U.S. 579 3839 (2005).
cclxxxv
(1993), Kumho Tire Co. v. Carmichael, Because nearly 38% of all software patent cases filed
526 U.S. 137 (1999). from 2008 through August of 2015 were filed in the Eastern
cclxix
E.g. Aspex Eyewear, Inc. v. E'Lite Optik, Inc., No. CIV.A. District of Texas, decisions from that court have particular
398CV2996D, 2002 WL 1751381, at *37 (N.D. Tex. Apr. 4, bearing on software patent cases.
cclxxxvi
2002); see also Daralyn J. Durie and Mark A. Lemley, A 383 F. Supp. 2d 904 (E.D. Tex. 2005)
cclxxxvii
Structured Approach to Calculating Reasonable Royalties, Id. at 90609.
cclxxxviii
14 LEWIS & CLARK L. REV. 627, 648, available at Id. at 909.
cclxxxix
http://ssrn.com/abstract=1567019 (offering a review of Id.
ccxc
Federal Circuit cases between 1993 and 2009 that showed See LaBarre & Gmez-Velasco, supra, at 3839.
ccxci
only 10 challenges to orders on motions to exclude expert 399 F.3d 1325, 1339 (Fed. Cir. 2005); see also Minton v.
testimony on patent damages). Nat'l Ass'n of Sec. Dealers, Inc., 336 F.3d 1373, 1378 (Fed.
cclxx
See Uniloc v. Microsoft, 632 F.3d 1292, 1314 (2011) Cir. 2003) (treating software like a tangible object for
(Lower courts have invariably admitted purposes of the on-sale bar codified at 35 U.S.C. 102(b)).
ccxcii
evidence based on the 25% rule, largely in reliance on its See Tim Hsieh, The Adequacy of the Mark: Raising the
widespread acceptance or because its admissibility was Standard Under 35 U.S.C. S 287(a) for Patented Online
uncontested.). Software Methods, 48 IDEA 69, 118 (2007) (illustrating the
cclxxi
E.g., Toshiba v. Imation, No. 09-CV-305-SL (W.D. WI ). import of marking for online software methods, which
cannot actually be seen or felt by consumers).

89
ccxciii
Am. Med., 6 F.3d at 1538.
ccxciv
Am. Med., 6 F.3d at 1538.
ccxcv
383 F. Supp. 2d at 909.
ccxcvi
Hsieh, supra, at 96 n.166.
ccxcvii
Maxwell v. J. Baker, Inc., 86 F.3d 1098, 1111 (Fed. Cir.
1996).
ccxcviii
See 383 F. Supp. 2d at 90809.

90
FOR MORE
INFORMATION

About Goodwins Intellectual Property Practice


Goodwins Intellectual Property Litigation Practice, named by Law360 as one of its Practice Groups of the
Year for two consecutive years, has worked with clients to secure preliminary injunctions, declaratory and
summary judgments, favorable results in Markman proceedings, advantageous settlements, victories at trial
and appellate relief. Goodwin attorneys routinely work with clients to take cases from pre-suit investigations
through discovery and trials. In addition, Goodwin successfully represents both patent owners and petitioners
at the Patent Trial and Appeal Board.

Additional Resources

NPE Litigation: A Tactical Guide for Practitioners


http://www.goodwinlaw.com/NPE_Litigation

PTAB Post Grant Proceedings: A Tactical Guide for Practitioners


www.goodwinlaw.com/PTAB_Guide

If you have questions about the content of this publication please contact:

Jennifer A. Albert
Partner
202.346.4322
jalbert@goodwinlaw.com

Das könnte Ihnen auch gefallen