This document discusses patenting inventions and algorithms. It provides an overview of the history of patents, what can and cannot be patented, and how KSU's Intellectual Property Program and IT department can help with the patent process. Specifically, the author filed patents for a "Noisy Password" algorithm and a "Code Based Hashing for Message Authentication Codes" algorithm with assistance from these university resources.
1. Patenting your ideaDr. HananMahmoud Reference: Derwent World Patents Index, http://science.thomsonreuters.com/support/patents/patinf/
2. The History of Patents The word patent comes from the Latin 'litteraepatentes', meaning an open letter. Such letters were used by medieval monarchs to confer rights and privileges. With a royal seal, the letters served as proof of those rights, for all to see.
3. first system for patenting inventions First informal system was developed in Renaissance Italy. This system was introduced into the rest of Europe by émigré Venetian glass-blowers to protect their skills against those of local workers.
4. The first recorded patent of invention Granted to John of Utynam In 1449, he was awarded a 20-year monopoly for a glass-making process
5. What is a Patentable Invention? Most inventions are new machines, products or industrial processes, and these generally can be patented. However , scientific discoveries without specified application, cannot be patented. Things that exist in nature, which are discovered and not invented Scientific theories or mathematical methods cannot be patented.
6. What about Us “Computer science” The patent law has been updated in Europe to reflect advances in the fast moving areas of biotechnology and computer software. Computer program products could be patentable if they resulted in additional technical effects which went beyond the "normal" physical interaction between software and hardware associated with running the program.
7. Copyright In the USA, one can patent a computer program, an animal and a variety of plant. This is not so in other countries, although alternative protection may be obtained in some cases through Registered Designs or the laws of Copyright.
8. In general a patent will be granted for an invention as long as it : is new or "novel": the invention must never have been made in public in any way, anywhere, before the date on which the application for a patent is filed ( one year in public for USA). involves an inventive or "unobvious" step: this step must not be obvious to others with good knowledge and experience of the subject of the invention. is capable of industrial/useful application: an invention must be capable of being made or used in some kind of industry
9. Patent My Algorithm? I came up with an algorithm that does something fundamental that no one has thought of yet (see next paragraph). I believe this algorithm would be useful to companies such as Microsoft, IBM, Oracle, etc... I spent a couple of months reading scientific literature and patents (via freepatentsonline.com) and from my research it appears I do in fact have a unique algorithm.
10. Should I attempt to patent the thing? Well, I can't patent an Algorithm as such because Algorithms are considered to be mathematics and mathematics can't be patented. Apparently software patents have to be specified in such a way that a physical machine is performing the operations. That's why software patents seem kind of hokey when you read them. No problem, I can do that; describe the algorithm as the steps a machine goes thru to perform a task. But then the question is cost??? (use KSU IP unit)
11. How KSU helps? Intellectual Property Program http://ipr.ksu.edu.sa/ http://ksu.edu.sa/administration/rectordeputies/udb/programs/ipp/Pages/default.aspx innovation@KSU.EDU.SA Phone 4670447 Information Manager : Dr. Khalid Al-Saleh
12. How IT department helps? The Research unit in the department established a subunit called: PC “Patent Care” We will give: Advise Consultation Help Paper work Email: hmahmoud@ksu.edu.sa
13. What did I patent? We filed for two patents (the third is under the way) 1. Noisy Password 2. Code Based Hashing for Message Authentication Codes