Earlier this fall, I had the opportunity to do a webinar conversation with Bob Stoll, former Commissioner for Patents at the USPTO and current partner at Drinker Biddle in Washington, D.C. Our wide-ranging discussion lasted for just over one hour. You can access the entire recording, free, at Patent Eligibility in a Time of Patent Turmoil.
What follows is a bit of our conversation to whet your appetite.
STOLL: As someone very interested in the patent arena and getting the standards correct, I’ve been really worrying about things. I think we are in a very confusing state at the moment. I think that the courts are actually undermining patent eligibility in many different areas. And the irony seems to be, Gene, that the Supreme Court and now this Court of Appeals for the Federal Circuit seem to be not considering the fact that the United States is leading in many of these emerging technologies and specifically thinking about software and diagnostic methods and personalized medicine and gene sequences….
Since the United States Supreme Court issued its decision in Alice v. CLS Bank, I have been arguing that the decision would have far reaching implications for software patents. Initially, many were skeptical, and surprisingly many still are, even with the Patent Office issuing Alice rejections like they are candy at Halloween, with the Federal Circuit invalidating software claims in case after case citing Alice, and with the PTAB likewise finding software patent claims of all types invalid. There is no doubt that things are different and a great many issued software patents and pending software applications will be worthless. Sure, moving forward, we have ideas about what needs to be in the disclosure, but you cannot add new matter to an application or issued patent, and software patents are now all about the technical disclosure.
Against this backdrop of disbelief and denial, I spoke with Professor Mark Lemley on August 28, 2014. Lemley shares my view, for the most part. I published our entire interview on IPWatchdog.com, The Ramifications of Alice: A Conversation with Mark Lemley. What follows are some of the highlights of our conversation.
Recently, I had the opportunity to sit down with Paul Michel, who we in the patent community know as the former Chief Judge of the United States Court of Appeals for the Federal Circuit. When Judge Michel stepped down as Chief Judge and retired several years ago, he told me that he decided to retire so he could say what needed to be said on behalf of the patent system, something he felt he couldn’t do while a member of the federal judiciary. Judge Michel has been true to his promise. He keeps an active schedule.
Judge Michel has been generous with his time over the past several years, and I have interviewed him on a number of topics. Most recently we discussed the Supreme Court’s patent decisions during the October 2013 term, spending most of our discussion on Alice v. CLS Bank.
Below are the highlights of my interview with Judge Michel. If you would like to read the entire interview, which lasted for approximately one hour and spans over 9,000 words, please see: Judge Michel says Alice Decision ‘will create total chaos’.
AT&T is seeking another patent on self-destructing e-mail messages. AT&T originally filed a patent application in January 2002 on this technology, which ripened into U.S. Patent No. 7,356,564. The latest patent application to publish in this family tree published on June 20, 2013 as U.S. Patent Application No. 20130159436. We profiled this back in August on IPWatchdog.com. See AT&T Seeks Patents on E-mail Self Destruct and 3D Media Content. Shortly thereafter, the United States Patent and Trademark Office issued a Non-Final Rejection of the application.
This application relates to e-mail, which virtually everyone reading will know is a messaging system used across the world to communicate information to other people. Indeed, so ubiquitous has e-mail become that it is hard to remember when electronic communications via e-mail did not exist. E-mail is so incredibly useful because it’s efficient and practically instantaneous. However, a sender has almost no way to protect confidential information once it has been sent across the Internet, and we have probably all sent one or more messages without thinking things through before clicking “send.” Many have also no doubt sent an e-mail by accident to someone who was not the intended recipient, which can range from a nuisance to embarrassing to completely catastrophic depending on the content.
On April 23, 2013, Apple obtained U.S. Patent No. 8429407, titled Digital Handshake between Devices.
Creating a secure connection between two devices that are in close physical proximity allows users to share a great deal of digital content. Instead of showing a webpage or document to another person by turning the screen towards them, a user could choose to send the info directly to another device, preventing people from having to crowd around a small device screen to see. The same is true of videos and pictures. Also, some applications allow users to interact with other nearby devices for money transfers or to play a game.
Apple was granted the right to protect the system of creating a secured connection between devices laid out in this patent. It would allow an iPhone to create a bar code or alphanumerical code that can be scanned by the camera of another device. Once the “digital handshake” has taken place, other phones can also scan the key that was generated by the device to connect with the other devices as well.
As Claim 1 describes, Apple has gained legal protections over:
“A method for establishing a communications path between a first device and a second device, comprising: capturing an image of the second device using the first device; extracting, from the image, a first key associated with the second device; selecting from a plurality of processes a process to be used for generating a digital handshake key; generating the digital handshake key using the selected process with the first key; and establishing a communications path with the second device using the digital handshake key.” (more…)