Risk

6/28/2010
02:41 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Supreme Court Patent Ruling Avoids Tough Issues

Rejecting the Bilski business method patent claim, the Supreme Court has pleased defenders of the status quo and frustrated those seeking patent reform.

Upholding an appeals court ruling in the closely watched Bilski v. Kappos case, the U.S. Supreme Court denied patent protection to a specific business method for energy trading. But the Supreme Court chose not to clarify the lines that define patentable subject matter.

The disallowed patent claim describes a series of steps for hedging against the risk of price changes in the energy commodities market. It was rejected by a patent examiner because it was an abstract formula not implemented on a specific device.

Even as it upheld prior rulings supporting the patent examiner's initial determination, the Supreme Court said the Federal Circuit Court erred in concluding that the exclusive test for determining whether a business process can be patented involves implementation on a machine or transformative action.

But the Supreme Court did not present a bright-line test that more clearly defines the kinds of business processes and ideas that can be patented. In short, it declined to rock the boat. Software and business methods continue to be eligible for patent protection, provided the claim can be justified under current legal criteria.

Scott Bain, litigation counsel of the Software & Information Industry Association, a technology industry association that filed a brief in support of maintaining the status quo, said he was pleased by the decision.

"If people were looking for a landmark decision, this was the wrong case," he said in a phone interview.

"I honestly would characterize the ruling as kind of a punt," he said. "The difficult questions still remain."

The difficult questions go beyond defining what is and isn't patentable to include: the appropriateness of granting patents for 20 years when different industries have different market cycles and innovation time-lines; the appropriateness of allowing ideas to be patented at all; defining universally appropriate patent infringement penalties and legal remedies like injunctions; assuring patent examiners understand the patent applications they review and have adequate resources; and approaches for dealing with abusive patent litigation.

These issues have been debated for years in Congress, at the behest of stakeholders and their lobbyists. But substantive change continues to be elusive.

Eben Moglen, chairman of the Software Freedom Law Center, a group that provides law services to developers of free, open-source software, also characterized the Supreme Court's decision as a vote for the status quo, though he's not enthusiastic about the ruling.

"The Supreme Court has launched us into the same miasma of uncertainty that we were in," he said in a phone interview. "This absurdly over-broad granting of monopolies on ideas is an acute difficulty in the world of information technology."

Moglen points to the success of free, open-source software and idea sharing in the tech community and argues that the success of the IT industry and open-source software over the past two decades demonstrates that there's an alternative the costly patent legal regime.

"We have shown over 20 years that the use of IT knowledge that's freely available to everyone creates a far better system that the patent system," he said.

He attributes the current patent reform impasse to differences between the tech industry and the pharmaceutical industry. The pharmaceutical industry, he said, "owns a lot of senators," making reform difficult.

"We have a system which the IT industry no longer derives any benefit from," he said. "The time has come for the IT industry to try to do everything it can to get itself out of the patent system."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Be a unicorn, not a donkey...
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.