SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
The Defensive Patent License
JENNIFER M. URBAN
JASON M. SCHULTZ
BERKELEY LAW
2013 O’Reilly Open Source Conference
Portland, Oregon
July 24, 2013
PROBLEM
Innovation in the shadow of software patents*
Especially for Open Innovation Communities
FOSS
Open Hardware
Mixed- or Sole-Strategy Companies
Also a problem for non-OIC tech companies
*Overbreadth and other quality problems with software patents
POSSIBLE SOLUTION:
DEFENSIVE PATENTING
“If you can’t beat ‘em…”
(Or, “If we’re getting patents anyway…”)
Seek patents to deter offensive lawsuits, not for
licensing or exclusion purposes
In theory, only asserted in response to litigation
In patent-heavy industries with well-resourced competitors,
often leads to cross-licensing détente
Requires some level of overlapping technology
Dealing with software patents, specifically: “your broad,
vague patents can be matched by mine”
THREE POTENTIAL USES
FOR DEFENSIVE
PATENTING
Patent threats between competitors
Patent threats from bullies
Patent threats from trolls
COMPETITOR
THREATS
Patent threats between competitors can prove costly
High information costs to avoid inadvertent infringement
•  Too many patents, too many claims, valuation problems
•  Fear of willfulness discourages patent mapping
High damages
High costs of injunctive relief
•  Less after eBay v. MercExchange
High cost of litigating
HOW DP HELPS
Defensive patenting ! cross-licensed portfolios
•  Addresses information costs
•  Limits threats of injunctive relief
•  Limits litigation costs
Creates greater certainty and predictability for innovation
cycles, market segmentation, and risk profiling which leads
to greater investment, R&D, and increased consumer welfare
WHAT ABOUT
BULLIES?
Patent threats by Patent Bullies (Goliath v. David)
•  Verzion, AT&T and Sprint v. Vonage (VOIP)
•  Apple v. HTC (smartphone touch screen)
•  Microsoft v. Linux (operating system features)
•  Blackboard v. Desire2Learn (educational CMS)
Defensive patenting could help reduce threats and costs but
for several reasons has been underutilized
WHY DON’T OSS PROJECTS
PATENT DEFENSIVELY?
You all know best: more reasons, please! But these are a few
from our work with a variety of open innovators:
Current model requires concentrated costs and benefits
•  Legal, information/search, transaction costs to build portfolio and
fight back against threats
•  Start-ups and F/OSS projects generally lack these resources; but
see OIN (Oracle, IBM, NEC, Novell, Philips, Red Hat, and Sony)
(Understandable) Cultural and political opposition to software
patents
•  Used by bad actors: anti-competitive, bullying, trolling
•  Inappropriate SM: patenting math, laws of nature
•  Recent lawsuits not building confidence in the patent system…
(Understandable) Mistrust of “defensive” commitments and
longevity
THE DPL
Distributed network of defensive patents
Distributed license structure similar to FOSS/CC
Licensor offers [entire] patent portfolio under DPL
•  Automatic NE, RF, perpetual, worldwide licenses to all comers
who also commit to offering their portfolios under the DPL
•  Irrevocable unless (1) licensee sues DPL user non-defensively or
(2) stops offering own patents under DPL
DPL users may continue to license or litigate against parties
outside the network (those not using the DPL)
DPL users may stop offering DPL with appropriate notice
•  We are currently considering six months as appropriate
•  Previously issued licenses to other DPL users remain in effect after
a party leaves
•  But see Hayes/Schulman “sticky”/”non-sticky” idea
•  Leaving users’ DPLs may be revoked at each licensor’s discretion
DPL obligations “travel with the patent”
HOW IT WORKS:
EXAMPLE OF THE DPL OVER TIME
DPL OVER TIME
DPL OVER TIME
DPL OVER TIME
DPL OVER TIME
DPL OVER TIME
HOW THE DPL COULD HELP
Distributes both costs and benefits
via network effects
•  Costs of patenting are distributed to those
who can afford them or already need to
patent; possible pro bono help
•  All users benefit from each commitment to
defense
•  Eliminates info, injunction, litigation costs w/
in network
•  Costs of cross-licensing are low, as with
FOSS and CC licenses
Uses high legal, information, and
transaction costs of patent strategy to
encourage growth of network
•  High info costs & risks vs. commitment to
defense and associated certainty may
incent new firms to join network, increasing
its value
Provides legally binding commitment
to defense: multi-lateral disarmament
•  Licensees can stop worrying about
particular patents coming back to haunt
them, even if ownership changes
Promotes “Safer Patenting”
Supports Open Innovation
Community cultural and political
norms
•  IP used to promote freedom to innovate,
access to knowledge, and protection from
legal constraint
•  Like instrumentalist approaches of FOSS
and CC in using copyright
Technology Neutral
Can be done , entirely through
private choice
•  No changes in examination, PSM,
claiming needed
•  But can work along with these solutions
Co-exists peacefully with other
solutions
WHAT ABOUT
TROLLS?
Defensive patenting generally ineffective because trolls do
not make, use, sell, or offer for sale, so you can’t assert a
patent against them
But a true, permanently defensive patent has little value to
trolls: safer patenting!
http://www.flickr.com/
photos/thomwatson/
The Fremont Troll
WHAT ABOUT PATENT
QUALITY?
Patents are the best prior art: DPL can help build it out
DPL users should also support other ideas for increasing patent
quality and clarity (Menell, Lemley, Chin, others)
Encouraging networked defensive patenting is indeed a second-
best solution
Can absolutely work in connection with other ideas for
reconsidering PSM, tweaking examination, etc
WHAT ABOUT PATENTABLE
SUBJECT MATTER AND
CLAIMING?
CONCERNS
Need overall patent system reform
Patentable subject matter
Patent overbreadth and vagueness
Technical and Practical Concerns: Most Addressed; Some a Matter of
Strategic Choice
•  Network has to hit a size threshold for some benefits to kick in
•  Weak incentives to patent and/or join
•  Adds to patent thicket
•  No requirement of mutual defense
•  Too much to ask for whole portfolio [could be by standard or
technology
•  Too hard to leave
•  Too easy to leave
•  Antitrust concerns, especially in EU
•  Gaming the system/free riding/bankruptcy
NEXT STEPS
Presently really “kicking the tires”
Terms
Language
Gathering adopters
•  Presently discussing terms and language with interested OS
projects, start-ups, medium-portfolio companies
Launch planned for end of 2013
THANKS!
Jennifer: jurban@law.berkeley.edu
Jason** SchultzJ@exchange.law.nyu.edu
**contact for comments and sign-on discussions
--------------------------------------------------------------------------------
GitHub:
https://github.com/defensivepatent/model-defensive-patent
Paper:
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2040945
Op-ed:
http://www.wired.com/opinion/2013/02/nuclear-deterrence-for-patents-
lets-create-a-network-of-defensive-patents/
David Hayes and Eric Schulman response:
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2054314

Weitere ähnliche Inhalte

Was ist angesagt?

Licensing Linked Data
Licensing Linked DataLicensing Linked Data
Licensing Linked Datapellegrinit
 
Running A TT Office – Best Practices
Running A TT Office – Best PracticesRunning A TT Office – Best Practices
Running A TT Office – Best PracticesMarcel Mongeon
 
RSP/SUETr Copyright & IPR Workshop, Northampton 2008
RSP/SUETr Copyright & IPR Workshop, Northampton 2008RSP/SUETr Copyright & IPR Workshop, Northampton 2008
RSP/SUETr Copyright & IPR Workshop, Northampton 2008Stephanie Taylor
 
Patent Database Mining and Patent Information Management
Patent Database Mining and Patent Information Management Patent Database Mining and Patent Information Management
Patent Database Mining and Patent Information Management spkowalski
 
RSP Copyright for Repository Managers 2008
RSP Copyright for Repository Managers 2008RSP Copyright for Repository Managers 2008
RSP Copyright for Repository Managers 2008Stephanie Taylor
 
Duke One Day Startup Presentation
Duke One Day Startup PresentationDuke One Day Startup Presentation
Duke One Day Startup Presentationglencaplan
 
Licensing, Citation and Sustainability.
Licensing, Citation and Sustainability.Licensing, Citation and Sustainability.
Licensing, Citation and Sustainability.FAIRDOM
 
How To Protect Your Company's Intellectual Property
How To Protect Your Company's Intellectual PropertyHow To Protect Your Company's Intellectual Property
How To Protect Your Company's Intellectual PropertySecureDocs
 
Inventor boot camp 2010
Inventor boot camp 2010Inventor boot camp 2010
Inventor boot camp 2010dr2tom
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
IT:AM Semina Series - Managing your secrets, protecting your assets - LeedsIT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
IT:AM Semina Series - Managing your secrets, protecting your assets - LeedsEversheds Sutherland
 
Kevin De Vorsey - Preservation isn't pretty (but you need it)
Kevin De Vorsey - Preservation isn't pretty (but you need it)Kevin De Vorsey - Preservation isn't pretty (but you need it)
Kevin De Vorsey - Preservation isn't pretty (but you need it)National Digital Forum
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsHimanshu Pathak
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterIT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterEversheds Sutherland
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual PropertyJason Mellen
 

Was ist angesagt? (19)

Licensing Linked Data
Licensing Linked DataLicensing Linked Data
Licensing Linked Data
 
Running A TT Office – Best Practices
Running A TT Office – Best PracticesRunning A TT Office – Best Practices
Running A TT Office – Best Practices
 
RSP/SUETr Copyright & IPR Workshop, Northampton 2008
RSP/SUETr Copyright & IPR Workshop, Northampton 2008RSP/SUETr Copyright & IPR Workshop, Northampton 2008
RSP/SUETr Copyright & IPR Workshop, Northampton 2008
 
Patent Database Mining and Patent Information Management
Patent Database Mining and Patent Information Management Patent Database Mining and Patent Information Management
Patent Database Mining and Patent Information Management
 
RSP Copyright for Repository Managers 2008
RSP Copyright for Repository Managers 2008RSP Copyright for Repository Managers 2008
RSP Copyright for Repository Managers 2008
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
Duke One Day Startup Presentation
Duke One Day Startup PresentationDuke One Day Startup Presentation
Duke One Day Startup Presentation
 
Licensing, Citation and Sustainability.
Licensing, Citation and Sustainability.Licensing, Citation and Sustainability.
Licensing, Citation and Sustainability.
 
How To Protect Your Company's Intellectual Property
How To Protect Your Company's Intellectual PropertyHow To Protect Your Company's Intellectual Property
How To Protect Your Company's Intellectual Property
 
Inventor boot camp 2010
Inventor boot camp 2010Inventor boot camp 2010
Inventor boot camp 2010
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
IT:AM Semina Series - Managing your secrets, protecting your assets - LeedsIT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
IT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 
Info 442 chapt 5
Info 442 chapt 5Info 442 chapt 5
Info 442 chapt 5
 
Software sustainability - Patrick Aerts
Software sustainability - Patrick AertsSoftware sustainability - Patrick Aerts
Software sustainability - Patrick Aerts
 
Ai lock
Ai lockAi lock
Ai lock
 
Kevin De Vorsey - Preservation isn't pretty (but you need it)
Kevin De Vorsey - Preservation isn't pretty (but you need it)Kevin De Vorsey - Preservation isn't pretty (but you need it)
Kevin De Vorsey - Preservation isn't pretty (but you need it)
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterIT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 

Ähnlich wie Protecting Open Innovation with the Defensive Patent License

Managing IP -- New Tlds
Managing IP -- New TldsManaging IP -- New Tlds
Managing IP -- New Tldsmxrodenbaugh
 
FLOSS vs proprietary software - what is best for business?
FLOSS vs proprietary software - what is best for business?FLOSS vs proprietary software - what is best for business?
FLOSS vs proprietary software - what is best for business?Kaido Kikkas
 
Technology management
Technology managementTechnology management
Technology managementUfuk Kılıç
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 
Chp 8 lect 8 - software issues (shared)
Chp 8   lect 8 - software issues (shared)Chp 8   lect 8 - software issues (shared)
Chp 8 lect 8 - software issues (shared)YUSRA FERNANDO
 
Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...
Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...
Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...EconMsu
 
Protecting innovation
Protecting innovation Protecting innovation
Protecting innovation wahyu0916
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.pptKISHOYIANKISH
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For EntrepreneurersJason Haislmaier
 
negotiating issues_Negotiating licenses [compatibility mode]
negotiating issues_Negotiating licenses [compatibility mode]negotiating issues_Negotiating licenses [compatibility mode]
negotiating issues_Negotiating licenses [compatibility mode]imec.archive
 
Patent Trollls gonna kill VRM?
Patent Trollls gonna kill VRM?Patent Trollls gonna kill VRM?
Patent Trollls gonna kill VRM?clive boulton
 
Playing The Patent Game
Playing The Patent GamePlaying The Patent Game
Playing The Patent GameAndrew Wong
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxKRITARTHBANSAL1
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
Defensive Aggregators
Defensive AggregatorsDefensive Aggregators
Defensive AggregatorsErik Oliver
 
HBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataHBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataBrian Kahin
 

Ähnlich wie Protecting Open Innovation with the Defensive Patent License (20)

Software Licensing Simplified
Software Licensing SimplifiedSoftware Licensing Simplified
Software Licensing Simplified
 
Managing IP -- New Tlds
Managing IP -- New TldsManaging IP -- New Tlds
Managing IP -- New Tlds
 
FLOSS vs proprietary software - what is best for business?
FLOSS vs proprietary software - what is best for business?FLOSS vs proprietary software - what is best for business?
FLOSS vs proprietary software - what is best for business?
 
Technology management
Technology managementTechnology management
Technology management
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Chp 8 lect 8 - software issues (shared)
Chp 8   lect 8 - software issues (shared)Chp 8   lect 8 - software issues (shared)
Chp 8 lect 8 - software issues (shared)
 
Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...
Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...
Сергей Уляхин "Аспекты коммерциализации интеллектуальной собственности" (S.Ul...
 
Protecting innovation
Protecting innovation Protecting innovation
Protecting innovation
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
2011 Silicon Flatirons IP (Crash Course) For Entrepreneurers
 
negotiating issues_Negotiating licenses [compatibility mode]
negotiating issues_Negotiating licenses [compatibility mode]negotiating issues_Negotiating licenses [compatibility mode]
negotiating issues_Negotiating licenses [compatibility mode]
 
Patent Trollls gonna kill VRM?
Patent Trollls gonna kill VRM?Patent Trollls gonna kill VRM?
Patent Trollls gonna kill VRM?
 
Playing The Patent Game
Playing The Patent GamePlaying The Patent Game
Playing The Patent Game
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
Technology-protection
Technology-protectionTechnology-protection
Technology-protection
 
Ip 101 for Startups
Ip 101 for StartupsIp 101 for Startups
Ip 101 for Startups
 
Defensive Aggregators
Defensive AggregatorsDefensive Aggregators
Defensive Aggregators
 
HBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataHBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
HBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
 

Mehr von OSCON Byrum

OSCON 2013 - Planning an OpenStack Cloud - Tom Fifield
OSCON 2013 - Planning an OpenStack Cloud - Tom FifieldOSCON 2013 - Planning an OpenStack Cloud - Tom Fifield
OSCON 2013 - Planning an OpenStack Cloud - Tom FifieldOSCON Byrum
 
Using Cascalog to build an app with City of Palo Alto Open Data
Using Cascalog to build an app with City of Palo Alto Open DataUsing Cascalog to build an app with City of Palo Alto Open Data
Using Cascalog to build an app with City of Palo Alto Open DataOSCON Byrum
 
Finite State Machines - Why the fear?
Finite State Machines - Why the fear?Finite State Machines - Why the fear?
Finite State Machines - Why the fear?OSCON Byrum
 
Open Source Automotive Development
Open Source Automotive DevelopmentOpen Source Automotive Development
Open Source Automotive DevelopmentOSCON Byrum
 
How we built our community using Github - Uri Cohen
How we built our community using Github - Uri CohenHow we built our community using Github - Uri Cohen
How we built our community using Github - Uri CohenOSCON Byrum
 
The Vanishing Pattern: from iterators to generators in Python
The Vanishing Pattern: from iterators to generators in PythonThe Vanishing Pattern: from iterators to generators in Python
The Vanishing Pattern: from iterators to generators in PythonOSCON Byrum
 
Distributed Coordination with Python
Distributed Coordination with PythonDistributed Coordination with Python
Distributed Coordination with PythonOSCON Byrum
 
An overview of open source in East Asia (China, Japan, Korea)
An overview of open source in East Asia (China, Japan, Korea)An overview of open source in East Asia (China, Japan, Korea)
An overview of open source in East Asia (China, Japan, Korea)OSCON Byrum
 
Oscon 2013 Jesse Anderson
Oscon 2013 Jesse AndersonOscon 2013 Jesse Anderson
Oscon 2013 Jesse AndersonOSCON Byrum
 
US Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David MertzUS Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David MertzOSCON Byrum
 
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON Byrum
 
Big Data for each one of us
Big Data for each one of usBig Data for each one of us
Big Data for each one of usOSCON Byrum
 
BodyTrack: Open Source Tools for Health Empowerment through Self-Tracking
BodyTrack: Open Source Tools for Health Empowerment through Self-Tracking BodyTrack: Open Source Tools for Health Empowerment through Self-Tracking
BodyTrack: Open Source Tools for Health Empowerment through Self-Tracking OSCON Byrum
 
Declarative web data visualization using ClojureScript
Declarative web data visualization using ClojureScriptDeclarative web data visualization using ClojureScript
Declarative web data visualization using ClojureScriptOSCON Byrum
 
Using and Building Open Source in Google Corporate Engineering - Justin McWil...
Using and Building Open Source in Google Corporate Engineering - Justin McWil...Using and Building Open Source in Google Corporate Engineering - Justin McWil...
Using and Building Open Source in Google Corporate Engineering - Justin McWil...OSCON Byrum
 
A Look at the Network: Searching for Truth in Distributed Applications
A Look at the Network: Searching for Truth in Distributed ApplicationsA Look at the Network: Searching for Truth in Distributed Applications
A Look at the Network: Searching for Truth in Distributed ApplicationsOSCON Byrum
 
Life After Sharding: Monitoring and Management of a Complex Data Cloud
Life After Sharding: Monitoring and Management of a Complex Data CloudLife After Sharding: Monitoring and Management of a Complex Data Cloud
Life After Sharding: Monitoring and Management of a Complex Data CloudOSCON Byrum
 
Faster! Faster! Accelerate your business with blazing prototypes
Faster! Faster! Accelerate your business with blazing prototypesFaster! Faster! Accelerate your business with blazing prototypes
Faster! Faster! Accelerate your business with blazing prototypesOSCON Byrum
 
Comparing open source private cloud platforms
Comparing open source private cloud platformsComparing open source private cloud platforms
Comparing open source private cloud platformsOSCON Byrum
 
State of the Art Web Mapping with Open Source
State of the Art Web Mapping with Open SourceState of the Art Web Mapping with Open Source
State of the Art Web Mapping with Open SourceOSCON Byrum
 

Mehr von OSCON Byrum (20)

OSCON 2013 - Planning an OpenStack Cloud - Tom Fifield
OSCON 2013 - Planning an OpenStack Cloud - Tom FifieldOSCON 2013 - Planning an OpenStack Cloud - Tom Fifield
OSCON 2013 - Planning an OpenStack Cloud - Tom Fifield
 
Using Cascalog to build an app with City of Palo Alto Open Data
Using Cascalog to build an app with City of Palo Alto Open DataUsing Cascalog to build an app with City of Palo Alto Open Data
Using Cascalog to build an app with City of Palo Alto Open Data
 
Finite State Machines - Why the fear?
Finite State Machines - Why the fear?Finite State Machines - Why the fear?
Finite State Machines - Why the fear?
 
Open Source Automotive Development
Open Source Automotive DevelopmentOpen Source Automotive Development
Open Source Automotive Development
 
How we built our community using Github - Uri Cohen
How we built our community using Github - Uri CohenHow we built our community using Github - Uri Cohen
How we built our community using Github - Uri Cohen
 
The Vanishing Pattern: from iterators to generators in Python
The Vanishing Pattern: from iterators to generators in PythonThe Vanishing Pattern: from iterators to generators in Python
The Vanishing Pattern: from iterators to generators in Python
 
Distributed Coordination with Python
Distributed Coordination with PythonDistributed Coordination with Python
Distributed Coordination with Python
 
An overview of open source in East Asia (China, Japan, Korea)
An overview of open source in East Asia (China, Japan, Korea)An overview of open source in East Asia (China, Japan, Korea)
An overview of open source in East Asia (China, Japan, Korea)
 
Oscon 2013 Jesse Anderson
Oscon 2013 Jesse AndersonOscon 2013 Jesse Anderson
Oscon 2013 Jesse Anderson
 
US Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David MertzUS Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David Mertz
 
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
 
Big Data for each one of us
Big Data for each one of usBig Data for each one of us
Big Data for each one of us
 
BodyTrack: Open Source Tools for Health Empowerment through Self-Tracking
BodyTrack: Open Source Tools for Health Empowerment through Self-Tracking BodyTrack: Open Source Tools for Health Empowerment through Self-Tracking
BodyTrack: Open Source Tools for Health Empowerment through Self-Tracking
 
Declarative web data visualization using ClojureScript
Declarative web data visualization using ClojureScriptDeclarative web data visualization using ClojureScript
Declarative web data visualization using ClojureScript
 
Using and Building Open Source in Google Corporate Engineering - Justin McWil...
Using and Building Open Source in Google Corporate Engineering - Justin McWil...Using and Building Open Source in Google Corporate Engineering - Justin McWil...
Using and Building Open Source in Google Corporate Engineering - Justin McWil...
 
A Look at the Network: Searching for Truth in Distributed Applications
A Look at the Network: Searching for Truth in Distributed ApplicationsA Look at the Network: Searching for Truth in Distributed Applications
A Look at the Network: Searching for Truth in Distributed Applications
 
Life After Sharding: Monitoring and Management of a Complex Data Cloud
Life After Sharding: Monitoring and Management of a Complex Data CloudLife After Sharding: Monitoring and Management of a Complex Data Cloud
Life After Sharding: Monitoring and Management of a Complex Data Cloud
 
Faster! Faster! Accelerate your business with blazing prototypes
Faster! Faster! Accelerate your business with blazing prototypesFaster! Faster! Accelerate your business with blazing prototypes
Faster! Faster! Accelerate your business with blazing prototypes
 
Comparing open source private cloud platforms
Comparing open source private cloud platformsComparing open source private cloud platforms
Comparing open source private cloud platforms
 
State of the Art Web Mapping with Open Source
State of the Art Web Mapping with Open SourceState of the Art Web Mapping with Open Source
State of the Art Web Mapping with Open Source
 

Kürzlich hochgeladen

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Protecting Open Innovation with the Defensive Patent License

  • 1. The Defensive Patent License JENNIFER M. URBAN JASON M. SCHULTZ BERKELEY LAW 2013 O’Reilly Open Source Conference Portland, Oregon July 24, 2013
  • 2. PROBLEM Innovation in the shadow of software patents* Especially for Open Innovation Communities FOSS Open Hardware Mixed- or Sole-Strategy Companies Also a problem for non-OIC tech companies *Overbreadth and other quality problems with software patents
  • 3. POSSIBLE SOLUTION: DEFENSIVE PATENTING “If you can’t beat ‘em…” (Or, “If we’re getting patents anyway…”) Seek patents to deter offensive lawsuits, not for licensing or exclusion purposes In theory, only asserted in response to litigation In patent-heavy industries with well-resourced competitors, often leads to cross-licensing détente Requires some level of overlapping technology Dealing with software patents, specifically: “your broad, vague patents can be matched by mine”
  • 4. THREE POTENTIAL USES FOR DEFENSIVE PATENTING Patent threats between competitors Patent threats from bullies Patent threats from trolls
  • 5. COMPETITOR THREATS Patent threats between competitors can prove costly High information costs to avoid inadvertent infringement •  Too many patents, too many claims, valuation problems •  Fear of willfulness discourages patent mapping High damages High costs of injunctive relief •  Less after eBay v. MercExchange High cost of litigating
  • 6. HOW DP HELPS Defensive patenting ! cross-licensed portfolios •  Addresses information costs •  Limits threats of injunctive relief •  Limits litigation costs Creates greater certainty and predictability for innovation cycles, market segmentation, and risk profiling which leads to greater investment, R&D, and increased consumer welfare
  • 7. WHAT ABOUT BULLIES? Patent threats by Patent Bullies (Goliath v. David) •  Verzion, AT&T and Sprint v. Vonage (VOIP) •  Apple v. HTC (smartphone touch screen) •  Microsoft v. Linux (operating system features) •  Blackboard v. Desire2Learn (educational CMS) Defensive patenting could help reduce threats and costs but for several reasons has been underutilized
  • 8. WHY DON’T OSS PROJECTS PATENT DEFENSIVELY? You all know best: more reasons, please! But these are a few from our work with a variety of open innovators: Current model requires concentrated costs and benefits •  Legal, information/search, transaction costs to build portfolio and fight back against threats •  Start-ups and F/OSS projects generally lack these resources; but see OIN (Oracle, IBM, NEC, Novell, Philips, Red Hat, and Sony) (Understandable) Cultural and political opposition to software patents •  Used by bad actors: anti-competitive, bullying, trolling •  Inappropriate SM: patenting math, laws of nature •  Recent lawsuits not building confidence in the patent system… (Understandable) Mistrust of “defensive” commitments and longevity
  • 9. THE DPL Distributed network of defensive patents Distributed license structure similar to FOSS/CC Licensor offers [entire] patent portfolio under DPL •  Automatic NE, RF, perpetual, worldwide licenses to all comers who also commit to offering their portfolios under the DPL •  Irrevocable unless (1) licensee sues DPL user non-defensively or (2) stops offering own patents under DPL DPL users may continue to license or litigate against parties outside the network (those not using the DPL) DPL users may stop offering DPL with appropriate notice •  We are currently considering six months as appropriate •  Previously issued licenses to other DPL users remain in effect after a party leaves •  But see Hayes/Schulman “sticky”/”non-sticky” idea •  Leaving users’ DPLs may be revoked at each licensor’s discretion DPL obligations “travel with the patent”
  • 10. HOW IT WORKS: EXAMPLE OF THE DPL OVER TIME
  • 16. HOW THE DPL COULD HELP Distributes both costs and benefits via network effects •  Costs of patenting are distributed to those who can afford them or already need to patent; possible pro bono help •  All users benefit from each commitment to defense •  Eliminates info, injunction, litigation costs w/ in network •  Costs of cross-licensing are low, as with FOSS and CC licenses Uses high legal, information, and transaction costs of patent strategy to encourage growth of network •  High info costs & risks vs. commitment to defense and associated certainty may incent new firms to join network, increasing its value Provides legally binding commitment to defense: multi-lateral disarmament •  Licensees can stop worrying about particular patents coming back to haunt them, even if ownership changes Promotes “Safer Patenting” Supports Open Innovation Community cultural and political norms •  IP used to promote freedom to innovate, access to knowledge, and protection from legal constraint •  Like instrumentalist approaches of FOSS and CC in using copyright Technology Neutral Can be done , entirely through private choice •  No changes in examination, PSM, claiming needed •  But can work along with these solutions Co-exists peacefully with other solutions
  • 17. WHAT ABOUT TROLLS? Defensive patenting generally ineffective because trolls do not make, use, sell, or offer for sale, so you can’t assert a patent against them But a true, permanently defensive patent has little value to trolls: safer patenting! http://www.flickr.com/ photos/thomwatson/ The Fremont Troll
  • 18. WHAT ABOUT PATENT QUALITY? Patents are the best prior art: DPL can help build it out DPL users should also support other ideas for increasing patent quality and clarity (Menell, Lemley, Chin, others) Encouraging networked defensive patenting is indeed a second- best solution Can absolutely work in connection with other ideas for reconsidering PSM, tweaking examination, etc WHAT ABOUT PATENTABLE SUBJECT MATTER AND CLAIMING?
  • 19. CONCERNS Need overall patent system reform Patentable subject matter Patent overbreadth and vagueness Technical and Practical Concerns: Most Addressed; Some a Matter of Strategic Choice •  Network has to hit a size threshold for some benefits to kick in •  Weak incentives to patent and/or join •  Adds to patent thicket •  No requirement of mutual defense •  Too much to ask for whole portfolio [could be by standard or technology •  Too hard to leave •  Too easy to leave •  Antitrust concerns, especially in EU •  Gaming the system/free riding/bankruptcy
  • 20. NEXT STEPS Presently really “kicking the tires” Terms Language Gathering adopters •  Presently discussing terms and language with interested OS projects, start-ups, medium-portfolio companies Launch planned for end of 2013
  • 21. THANKS! Jennifer: jurban@law.berkeley.edu Jason** SchultzJ@exchange.law.nyu.edu **contact for comments and sign-on discussions -------------------------------------------------------------------------------- GitHub: https://github.com/defensivepatent/model-defensive-patent Paper: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2040945 Op-ed: http://www.wired.com/opinion/2013/02/nuclear-deterrence-for-patents- lets-create-a-network-of-defensive-patents/ David Hayes and Eric Schulman response: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2054314