Category Archives: Business and Transactions

Cybersecurity Patent Strategies vs. the Growing Barriers to Software Patents

More and more companies who offer blockchain and other next generation cybersecurity technologies are seeking patents to help protect their competitive position. The U.S. Patent and Trademark Office’s (USPTO’s) Technology Center 2400, which covers networking, multiplexing, cable and security technologies, includes over 200 Patent Examiners who focus on security technologies. TC 2400 issued over 33,000 patents in 2017. During this period, the USPTO’s overall allowance rate was 59.4%.

Despite this apparent boom, patent applications covering cybersecurity technologies have faced increasing scrutiny since the June 2014 U.S. Supreme Court decision in Alice Corporation Pty Ltd. v. CLS Bank Int’l. In Alice, the Court found that a software implementation of an escrow arrangement was not eligible for patenting in the U.S. because it merely involved implementing an “abstract idea” on a computer. The Court did not define the term “abstract idea” other than to describe it as a building block of human ingenuity, or a fundamental concept, including concepts that involve a “fundamental economic practice.”

Since then, the USPTO has issued several guidance documents, and lower courts have issued several opinions, describing when software is and (more often) is not eligible for patenting under Section 101 of the Patent Act. The USPTO typically denies, and courts often strike down, patent applications and patents covering methods of manipulating data, completing financial transactions, and algorithms that do not require any particular hardware other than a general-purpose computer.

Patent applications that focus on financial applications of blockchain technologies often face patent-eligibility hurdles. A search of the USPTO’s Patent Application Information Retrieval (PIR) system indicated that as of January 2018, over 90% of the published applications and issued patents having the term “blockchain” and any combination of “cryptocurrency,” “coin,” or “currency” in the claims were assigned to the USPTO’s Technology Center 3600. (TC 3600 includes the USPTO’s business methods examining unit.) Over 80% of these patents and patents applications received a Section 101 rejection on first action. In addition, the allowance rate in TC 3600 remains far below that of the USPTO’s overall statistics.

Claim Drafting Strategies Continue reading

Defensive Patent Strategies for Blockchain and Distributed Ledger Technologies

Many companies who offer next generation cybersecurity technologies are experiencing significant growth in both corporate share value and revenue. To help protect against competition, many companies are seeking patents to cover their blockchain and other distributed ledger technologies, security awareness training systems, and innovative real-time data analytics methods.

As of January 2018, United States Patent and Trademark Office (USPTO) records revealed just over fifty granted patents in which the phrase “blockchain” or “distributed ledger” appeared. Twenty-five of these patents included those terms in the title, abstract or claims. Some of the patents were awarded to cryptocurrency startups that launched or are about to launch initial currency offerings (ICOs). Others were awarded to U.S. software and business services industry titans who already have large patent portfolios. Approximately one-third of those patents were awarded to businesses that appear – at least for now – to be non-practicing entities, which could signal a risk of patent litigation on the near horizon.

A strategically developed patent portfolio can have several benefits. In addition to increasing corporate value and providing a weapon against infringement, patents can serve as a defensive mechanism against high-stakes patent litigation. A competitor who holds patents may hesitate before filing a patent infringement suit against a company that owns a strong patent portfolio that it can assert in a counterclaim. Strong patent portfolios also can provide companies with the opportunity for favorable cross-licensing arrangements, with fewer royalties being paid and potentially more royalties coming in.

Patent applicants must consider how to draft effective patent applications. Tips for doing this include:

  • Distributed ledger technologies typically require actions by multiple entities. However, it can be difficult to establish infringement of a patent claim unless all elements of the claim are used or performed by a single entity. Patent applications should draft claims with a single infringer in mind, rather than to a distributed system.
  • The U.S. and many other countries around the world take a negative view of software patents that cover mere “abstract ideas” rather than innovations in technology. A new business application of an existing blockchain technology is unlikely to be patentable. Instead, patent applications should cover innovations that provide a technical solution to a technical problem.

Patent strategies for distributed ledger technologies also need to consider the tension between the limited monopoly that a patent provides and the open source platform that a distributed ledger necessarily requires.

For the last few years, several companies have openly discussed and favored the idea of a blockchain “patent pool” in which stakeholders share access to each others’ blockchain-related patents. The Blockchain Patent Sharing Alliance (BPSA) is one such entity that is trying to gather a critical mass of stakeholders and companies. In addition, in 2016, the Linux Foundation formed the Hyperledger Project, which seeks to create an open-source framework for distributed ledger technologies.

Some stakeholders are taking matters into their own hands. In 2016 blockchain developer Blockstream publicly pledged that it will never use its blockchain patents as a weapon. Instead, Blockstream pledged that all of its blockchain software patents are available under the terms of a defensive patent license. Under that license, Blockstream will only use its patents for “defensive purposes” against a party who brings or threatens a patent infringement claim against Blockstream or against a user of Blockstream’s technologies.

Third in a four-part series. For other posts in this four-part series, see:
Intellectual Property Strategies For Next Generation Cybersecurity Technologies
Trends in Patenting Blockchain Technologies
Cybersecurity Patent Strategies vs. the Growing Barriers to Software Patents 

Trends in Patenting Blockchain Technologies

With the recent rise in values of cybercurrencies such as bitcoin, and with increasing interest in initial currency offerings (ICOs), businesses around the world are rushing to build value with new blockchain technologies and applications.

This presents many opportunities to patent innovative blockchain and other distributed ledger technologies. This is a relatively recent trend. The first recorded appearance of the word “blockchain” in any U.S. patent or published patent application was in 2012, approximately three years after the launch of bitcoin.

As of January 2018, United States Patent and Trademark Office (USPTO) records revealed:

  • 25 granted patents with the term “blockchain” or “distributed ledger” in their title, abstract or claims; and
  • at least 275 published patent applications include one or both of those terms in the title, abstract or claims.

When the data set is expanded to patents and applications that include the word “blockchain” anywhere in the text, the list grows to 56 granted patents and over 500 published applications. These include:

Patent Number Title Grant Date Assignee
US9862222 Digitally encoded seal for document verification 2018-01-09 UIPCO LLC
US9853819 Blockchain-supported, node ID-augmented digital record signature method 2017-12-26 Guardtime IP Holdings LTD.
US9836908 System and method for securely receiving and counting votes in an election 2017-12-05 Blockchain Technologies Corporation
US9824031 Efficient clearinghouse transactions with trusted and un-trusted entities 2017-11-21 International Business Machines Corporation
US9807106 Mitigating blockchain attack 2017-10-31 British Telecommunications PLC
US9785369 Multiple-link blockchain 2017-10-10 Accenture Global Solutions Limited; GSC Secrypt LLC
US9794074 Systems and methods for storing and sharing transactional data using distributed computing systems 2017-10-17 Nasdaq Technology AB
US9747586 System and method for issuance of electronic currency substantiated by a reserve of assets 2017-08-29 CPN Gold B.V.
US9749140 Systems and methods for managing digital identities 2017-08-29 Cambridge Blockchain LLC
US9722790 Identity management service using a blockchain providing certifying transactions between devices 2017-08-01 Shocard, Inc.
US9641338 Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items 2017-05-02 SkuChain, Inc.
US9338148 Secure distributed information and password management 2016-05-10 Verizon Patent and Licensing Inc.; Cellco Partnership

Most of the granted patents cover new or improved aspects of the blockchain itself. Only a small number of U.S. patents have issued to date for new applications of existing blockchain technologies. This is likely because many companies are merely using existing blockchain technologies to implement different types of transactions.

Over half of the granted patents were examined within the USPTO’s Technology Center 2400, which covers networking, multiplexing, cable and security technologies. TC 2400 includes over 200 examiners who focus on security technologies.

In each of the past three years USPTO Examiners from TC 2400 have participated in a Cybersecurity Partnership meeting, in which the USPTO has interacted with stakeholders in the cybersecurity and network security sector to share ideas, experiences, and insights. Information that the USPTO shared in these meetings includes:

  • The top 15 filers of patent applications for information security and cryptography technologies in each year during 2014-2016 included Amazon, Google, IBM, Intel, Microsoft, Qualcomm, Samsung, Symantec, and Tencent. Top filers in 2015 and 2016 also included Bank of America, Cisco, and EMC.
  • While the vast majority of U.S. patent applications for information security and cryptography technologies have been filed by U.S. companies, the USPTO has also received a significant number of filings from companies that are based in Japan, China, Korea, Germany, France and Israel, among other countries.
  • The average pendency (time between filing and either grant or abandonment) of patent applications for information security and cryptography technologies was approximately 27 months in 2016.

Globally, as of January 2018 World Intellectual Property Office (WIPO) records show 197 published Patent Cooperation (PCT) applications with the term “blockchain” or “distributed ledger” in their title, abstract or claims. However, relatively few of these PCT applications have reached the national stage. The European Patent Office database includes only 21 such patents and published applications. According to a recent report from Clarivate Analytics, in 2016 China experienced significant growth in new patent filings for blockchain technologies and is second only to the U.S. for new filings involving blockchain technologies.

This post is the second in a four-part series. For other posts in this series, see:
Intellectual Property Strategies For Next Generation Cybersecurity Technologies
Defensive Patent Strategies For Blockchain and Distributed Ledger Technologies
Cybersecurity Patent Strategies vs. the Growing Barriers to Software Patents 

Intellectual Property Strategies for Next Generation Cybersecurity Technologies

Cybersecurity technology has become one of the most important industries in the world today. With products that are critical to businesses in countless fields, including finance, healthcare, transportation, public utilities, manufacturing, defense and government, experts have predicted that the global market for cybersecurity technologies will grow by 10% per year through 2020.

Cybersecurity technologies are also one of the biggest drivers in corporate value today. 129-year-old Eastman Kodak Company recently saw the value of its stock jump by 200% after announcing a new service that will use blockchain technologies to help photographers get paid in a new cryptocurrency when others use their photos. A New York-based beverage distributor experienced a 289% share price increase after it simply renamed itself from “Long Island Iced Tea Company” to “Long Blockchain Corp.” and announced that it would start to offer blockchain technology solutions.

Next generation cybersecurity technologies include more than just blockchain-based payment systems. Distributed ledger technologies have applications in multiple fields, including document sharing, video and audio streaming, and biomedical applications. And although blockchain is all the rage at the moment, other cybersecurity technologies such as network attack simulations, network security awareness training through methods such as simulated phishing, and real-time analytics are equally important, if not more so.

With this background in mind, what intellectual property protection options are available for next generation cybersecurity technologies? Continue reading

Fox launches GDPR Check app

Fox Rothschild LLP has launched a new mobile app to help businesses catalog their data management practices and determine necessary steps to comply with the European Union’s General Data Protection Regulation (GDPR), which will take effect in May 2018.

GDPR Check maps an organization’s data management practices in 17 areas that are key to determining compliance, and it produces a report for each key area that a company can share with its attorneys and compliance team.

For more details on the GDPR Check app and a link to the free download in the Apple App and Google Play stores, vist the GDPR Check announcement on the Fox Rothschild website at this link.

Tips for non-disclosure agreements with Chinese companies

In a previous post on IP Spotlight, I provided a few tips for negotiating non-disclosure agreements. In the post, I noted that a “form” NDA should only be considered a starting point. The parties should modify it as appropriate to fit the business situation and the type of information that is being disclosed.

Here’s an additional tip if the other party to the NDA is not a U.S. company:  if the other party breaches the agreement, you may be able sue that party in the U.S. and win, but the U.S. court’s judgment may be difficult to enforce in the other country.

This is a particular issue in China. Chinese courts typically will not enforce judgments of U.S. courts, and they may not enforce an NDA written in English and subject to U.S. law.

So how can U.S. companies obtain an enforceable NDA with a Chinese company?

One way is to make it in Chinese (or bilingual, in English and Chinese, with the Chinese version controlling), and make it governed by Chinese law and subject to jurisdiction of the Chinese courts, or perhaps Hong Kong law and courts. Although this can be inconvenient for the U.S. company, the inconvenience may be a worthwhile.

Another option is to consider arbitration. While arbitration is not typically an ideal option for an NDA because only a court can grant a quick injunction to stop further disclosure of the information, foreign arbitration awards are generally enforceable in China. Most countries (including the U.S. and China) have signed the New York Convention for the Recognition and Enforcement of Arbitral Awards (http://www.newyorkconvention.org/).

So, consider a binding arbitration clause, and if the agreement will include an option for an injunction, that should be governed by Chinese law and issued by a Chinese court. Also, make it a bilingual agreement, with versions in English and Chinese.

White House urges restrictions on non-compete agreements

55276389 - businesswoman sitting with employment agreement in front of her.This week the Obama administration issued a “call to action” statement in which it urged state governments to restrict many of the non-compete agreements that employers often impose on employees. The statement calls on state legislatures to adopt certain “best practices” for regulating employee non-compete agreements, including:

  • banning non-compete clauses for certain categories of workers, such as workers under a certain wage threshold, workers in certain occupations that promote public health and safety, and workers who are unlikely to possess trade secrets;
  • refusing to enforce non-compete clauses against workers who are laid off or terminated without cause;
  • disallowing non-competes unless they are proposed before a job offer or significant promotion has been accepted;
  • requiring employers to give additional consideration (i.e., more than just continued employment) to workers who sign non-compete agreements;
  • encouraging employers to better inform workers about the law in their state and the existence of non-competes in contracts and how they work; and
  • encouraging the elimination of unenforceable provisions through the use of legal doctrines that make such provisions (or contracts containing them) void.

The statement follows the administration’s May 2016 report titled “Non-Compete Agreements: Analysis of the Usage, Potential Issues, and State Responses.” The administration stated that the May 2016 report was intended to address “issues regarding misuse of non-compete agreements and describe[] a sampling of state laws and legislation to address the potentially high costs of unnecessary non-competes to workers and the economy.”

The statement noted that the laws of three states (California, Oklahoma, and North Dakota) already contain significant restrictions on non-compete agreements signed by employees, and at least a dozen states have considered legislation in this area during the past year.  To accompany the report, the White House also published a “state-by-state explainer” of existing state non-compete laws to help interested parties understand the restrictions that are already in place across the country.

The proposal is certain to attract a significant amount of attention, both pro and con. Regardless of whether states adopt the statement’s recommendations, the statement does highlight the fact that many different standards for employee non-compete agreements exist across the country. Because of this, employers should be careful to note that a particular form agreement may be fine for employees in some states but less-than-ideal for employees in a different state.  The “explainer” document can be a helpful tool to help employers understand those differences when they hire new employees across the country.

[Image credit:  Kittisak Jirasittichai]

Will your patent assignment document satisfy new European Patent Office requirements?

19469909 - signing a document in the officeEffective November 1, 2016, new European Patent Office (EPO) Examination Guidelines governing the transfer of European patent applications will take effect. The new Guidelines make two changes that transacting parties need to know:

  1. the assignment document must include the signatures of both parties (i.e., assignor and assignee); and
  2. the assignment document must include the precise job title of each person who signs the document.

In the past, it was common for a patent holder to execute an assignment in favor of an assignee, without the assignee signing the document. Under the new Guidelines, the EPO will no longer accept an assignment document that uses the single-signature format.

In the past, some assignment documents would list the signing party as something like “authorized representative.” This EPO will no longer accept this practice, either.

The new Guidelines only affect the transfer of pending applications, not granted patents.  However, transacting parties should consider following the new Guidelines in all patent assignments, since the general contract laws of several European countries (including Great Britain and France) typically require both parties to sign a contract. The new Guidelines are also consistent with Article 72 of the European Patent Convention, which states that an assignment of a European patent application requires “the signature of the parties to the contract” (emphasis added).

(Thanks to my Fox Rothschild partner Marilou Watson for bringing this change to my attention.)

[Image credit:  Oleksandr Nebrat]

Do your employee/contractor non-disclosure agreements comply with new DTSA notice requirements?

Magnifying glassHave you updated your company’s form employee and independent contractor non-disclosure agreements lately? Do they comply with the notice requirements relating to “whistleblowers” that took effect May 11, 2016 under a new federal law? If your answer is “no” or “I don’t know”, read on.

The new Defend Trade Secrets Act helps U.S. businesses protect their trade secrets by asking federal courts to order seizure of property necessary to prevent dissemination of the trade secrets. It also permits businesses to seek injunctions and damages in federal court for trade secret misappropriation.

The DTSA also provides some immunity for whistleblowers who use trade secrets by stating that:

An individual shall not be held criminally or civilly liable under any Federal or State trade secret law for the disclosure of a trade secret that (a) is made (i) in confidence to a Federal, State, or local government official, either directly or indirectly, or to an attorney; and (ii) solely for the purpose of reporting or investigating a suspected violation of law; or (B) is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal.

and

An individual who files a lawsuit for retaliation by an employer for reporting a suspected violation of law may disclose the trade secret to the attorney of the individual and use the trade secret information in the court proceeding, if the individual (A) files any document containing the trade secret under seal; and (B) does not disclose the trade secret, except pursuant to court order.

The immunity section of the DTSA is especially important for employers because it requires employers to provide with notice of the DTSA’s immunity clauses “in any contract or agreement with an employee that governs the use of a trade secret or other confidential information.” The Act defines “employee” to include both actual employees and independent contractors. If an employer does not comply with the notice requirement, the employer’s ability to recover damages against that employee in a federal action for theft or other misappropriation of trade secrets will be limited.

Employers can comply with the notice requirement by updating their form employee and independent contractor agreements to include either the notice requirement or a cross-reference to a policy document (such as an employee handbook) that states the employer’s reporting policy for a suspected violation of law.

For additional information about the DTSA, including the law’s seizure and damages provisions, see this previous IP Spotlight post.

[Image copyright:  bacho12345]

IP3: Industry Patent Purchase Program allows patent owners to offer patents to leading global companies

A new website will give patent holders a limited-time opportunity to offer their patents for sale to some of the world’s largest companies.  According to a press release from Allied Security Trust (AST):

IP3 creates a patent marketplace that brings together a pool of significant money from [participating] companies … to purchase patents in a format that allows sellers to set their own price for their patent assets and reduces the time and complexity usually associated with patent transactions.  IP3 builds on the success of Google’s innovative 2015 Patent Purchase Promotion (PPP), and seeks to attract the submission of high quality patents from patent owners across a wide array of industries during a limited time period.

Participating companies include Google, Facebook, IBM, Microsoft, Adobe, SAP, Ford, Honda , Hyundai, Kia Motors, Verizon,  Cisco, Arris, leading cable service providers, and others. Technologies that the group is particularly interested in include enterprise software, communications, networking, semiconductors, content delivery and cloud computing.

The IP3 portal (ip3ast.com) will be open from May 25, 2016 to June 8, 2016. AST expects that all transactions will be completed by the end of September 2016.