Table Of ContentPatent Law for Computer Scientists
Daniel Closa Alex Gardiner Falk Giemsa
l l
Jo¨rg Machek
Patent Law for
Computer Scientists
Steps to Protect
Computer-Implemented Inventions
DanielClosa
AlexGardiner
FalkGiemsa
Jo¨rgMachek
EuropeanPatentOffice,Munich
patent.law.computer.scientists@gmail.com
ACMComputingClassification(1998):K.5.1,K.4.1,J.1
ISBN:9783642050770 eISBN:9783642050787
DOI10.1007/9783642050787
SpringerHeidelbergDordrechtLondonNewYork
LibraryofCongressControlNumber:2009940399
#SpringerVerlagBerlinHeidelberg2010
Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis
concerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation,broadcasting,
reproductiononmicrofilmorinanyotherway,andstorageindatabanks.Duplicationofthispublication
orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,
1965,initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violations
areliabletoprosecutionundertheGermanCopyrightLaw.
Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnot
imply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotec
tivelawsandregulationsandthereforefreeforgeneraluse.
Coverdesign:KuenkelLopkaGmbH,Heidelberg,Germany
Printedonacidfreepaper
SpringerispartofSpringerScience+BusinessMedia(www.springer.com)
Preface
WeworkattheEuropeanPatentOffice(EPO).Threeofusarepatentexaminersand
oneisthedirectorofagroupofpatentexaminers.Patentexaminersassessapplica-
tionsforpatentswhichmaybegrantedtoinventors.Apatentisalegaltitlegiving
its holder the right to prevent third parties from commercially using an invention
withoutauthorisation.Examinerscheckinparticularthattheinventionisnewand
not some mere obvious alteration to something which already exists, by carrying
outsearchesonallsortsofinformationwhichexistedandcouldhavebeenlookedat
bytheapplicantinthetimeuptothefilingoftheirfirstapplication.Suchinforma-
tioniscollectivelyknownasthe“priorart” bythoseworkinginthe patentworld.
Patent examiners work at the forefront oftechnology and deal every day with the
latestandmostchallengingtechnicalinnovations.Wewillpresentanoverviewof
themindsetoftypicalpatentexaminers.Althoughweaimtogivegeneraladvice,a
certainbiastowardstheproceduresoftheEPOisunavoidable.
The idea underlying this book first came about when two of us participated in
writinganarticle[1]inwhichwedemonstrated,bywayofoneparticularexample,
how much technical information had to be disclosed in an application in order to
describe a technical contribution which would in turn be worthy of detailed
examination of inventive step. This article was met with general enthusiasm and
numerous remarks encouraging the authors to extend the exercise. Since then we
havebeenrepeatedlyaskedtoconsiderextendingthescopetootherspecificareas
of interest. After one of us was approached by the current publishers to present a
scheme for a more extensive treatment of such topics, we started to collect
information and to discuss, with a view to “doing a proper job” of production of
amorecompletecompilation,snippetsofpresentationsweregularlygive.
As befits a European organisation, our countries of origin are spread across
Europe. We come from Scotland, Luxemburg, France/Spain and Austria. We are
thustrulyEuropean.TheEuropeanPatentOfficeanditscivilservantshavecreated
a culture of cultures both as an organisation and within the daily lives of all
employees.Thiseveninitselfisremarkable yetonlyshortlyaftertheEuropean
Patent Organisation celebrated its 30th birthday it welcomed “The Former
v
vi Preface
Yugoslav Republic of Macedonia” as its 35th member state, on 1 January 2009
(Fig.1).Thesefirstfewdecadeshavebeenspectacular.Thenumberofapplications
filed with the European Patent Office has risen steadily, confounding the humble
expectationsofitsfoundingfathers,whowouldneverhaveguessedatthecurrent
figuresevenintheirwildestdreams.Intheearlyyearsofitsexistence,theEPOwas
dealing with around 10,000 applications a year; this was already considered a
success.In2007theEPOreceivedwellover210,000applications[2].
OnebasicreasonforthesuccessoftheEuropeanpatentsystemappearstoliein
the high economic value which is attributed to patents granted under its auspices.
This is a particularly strong motivation for getting patent applications to comply
withtheEuropeanPatentConvention(EPC)rightfromthebeginning.Inourdaily
work we have to deal with a variety of applications, some of which describe
truly splendid innovations. A relatively high proportion of them, however, will
not be granted a patent because they do not show all the important features
Fig.1 ThememberstatesoftheEuropeanPatentOrganisation(EPO)
Preface vii
necessary to satisfy our patent law. In many cases this sorry situation could have
been avoided had some basic considerations been respected. This is particularly
trueforcomputerimplementedinventions.
Together,thefourofushaveatotalexperienceof70yearsinthepatentbusiness.
From our academic background we are physicists, electronic engineers and com-
puter scientists. We are happy to tap our wealth of knowledge for this book. Our
present common centre of professional interest lies within the area of Computer
ImplementedInventions(CII).Thisalsoincludesapplicationswhicharefrequently
termed “methods for doing business”, as these are typically implemented on
computers.
This book is based on our experience within the EPO and by way of some
extension,Europemoregenerally,patentlawinEuropebeingmoreorlessharmo-
nized.NationalCourtsofJustice,whendealingwithcasesthathadbeenexamined
inthelightoftheEPCandtheEPO’sBoardsofAppeal,attempttointerpretthelaw
inaccordancewiththesamevalues,andwheredifferencesdoexisttheytendtobe
relativelyminormattersofemphasesratherthanfundamentaldifferences.
This book is a guide to examiner thinking. Despite differences in respective
patent law, the basic rationale of patent examiners is globally rather similar. The
principlesdevelopedinthisbookapplythereforealsotootherpatentsystemstoa
considerabledegree,andreferencewillregularlybemadetotheUSAandJapanese
systems.
References
1. D.Closa,P.Corcoran,J.Machek,C.Neppel;epiinformation2/2007;pp65 69
2. AlisonBrimelow:AHappyAnniversaryfortheEuropeanPatentSystem,iammagazine;http://
www.iammagazine.com/issues/Article.ashx?g=5ad0be0039524ee5aefe37d0f4e66653
Contents
PartI
1 Introduction ............................................................... 3
1.1 PatentsandSoftware,Basics ......................................... 3
1.1.1 ShortHistoryofPatents ...................................... 4
1.1.2 “Software”Patents ........................................... 8
1.1.3 OtherIntellectualPropertyRights .......................... 15
1.1.4 SomeSpectacularPatentCasesintheSoftwareField ...... 17
1.2 OverviewofPatentPracticesintheUSA,JapanandEurope ...... 20
1.2.1 ComparisonofUSPatentandTrademarkOffice,
JapanesePatentOfficeandEuropeanPatentOffice ........ 22
1.3 StructureoftheBookandPresentationofCaseMethodology ..... 29
References................................................................... 30
PartII
2 BusinessMethods ........................................................ 35
2.1 Example1:MethodofSelling ...................................... 38
2.1.1 Description .................................................. 38
2.1.2 Claim1 ...................................................... 38
2.1.3 ExaminerObservations ...................................... 39
2.2 Example2:MethodofSellingviaaNetwork ...................... 40
2.2.1 Description .................................................. 40
2.2.2 Claim2 ...................................................... 41
2.2.3 ExaminerObservations ...................................... 42
2.3 Example3:AutomaticMethodofSellingviaaNetwork .......... 43
2.3.1 Description .................................................. 43
2.3.2 Claim3 ...................................................... 44
2.3.3 ExaminerObservations ...................................... 45
ix
x Contents
2.4 Example4:AutomaticMethodofSellingviaaNetworkwith
ManagementofPowerProduction .................................. 46
2.4.1 Description .................................................. 46
2.4.2 Claim4 ...................................................... 47
2.4.3 ExaminerObservations ...................................... 48
3 AdministrativeMethods ................................................. 51
3.1 Example1:MethodofDataGathering ............................. 52
3.1.1 Description .................................................. 52
3.1.2 Claim1 ...................................................... 52
3.1.3 ExaminerObservations ...................................... 53
3.2 Example2:MethodforAssimilatingAdministrative
InformationforSettingupanAgreement ........................... 54
3.2.1 Description .................................................. 54
3.2.2 Claim2 ...................................................... 55
3.2.3 ExaminerObservations ...................................... 55
3.3 Example3:DataProcessingDeviceforAssimilating
AdministrativeInformationforSettingupanAgreement .......... 57
3.3.1 Description .................................................. 57
3.3.2 Claim3 ...................................................... 58
3.3.3 ExaminerObservations ...................................... 58
3.4 Example4:MethodofArranginganAgreement
viaEncryptedCommunicationChannels ........................... 59
3.4.1 Description .................................................. 59
3.4.2 Claim4 ...................................................... 61
3.4.3 ExaminerObservations ...................................... 61
4 DigitalRightsManagement ............................................. 63
4.1 Example1:DigitalContentPromotionMethod .................... 63
4.1.1 Description .................................................. 63
4.1.2 Claim1 ...................................................... 64
4.1.3 ExaminerObservations ...................................... 65
4.2 Example2:Computer-ImplementedContentPromotion
MethodUsingEncryption ........................................... 66
4.2.1 Description .................................................. 66
4.2.2 Claim2 ...................................................... 67
4.2.3 ExaminerObservations ...................................... 68
4.3 Example3:Client ServerDRMSystem ............................ 69
4.3.1 Description .................................................. 69
4.3.2 Claim3 ...................................................... 71
4.3.3 ExaminerObservations ...................................... 72
5 DatabaseandDatabaseManagementSystem ......................... 75
5.1 Example1:SimultaneousAccesstoaDatabase .................... 77
Contents xi
5.1.1 Description .................................................. 77
5.1.2 Claim1 ...................................................... 79
5.1.3 ExaminerObservations ...................................... 79
5.2 Example2:SimultaneousDatabaseAccesswith
TimeManagement ................................................... 80
5.2.1 Description .................................................. 80
5.2.2 Claim2 ...................................................... 82
5.2.3 ExaminerObservations ...................................... 82
5.3 Example3:SimultaneousDatabaseAccesswith
AutomaticTimeManagement ...................................... 83
5.3.1 Description .................................................. 83
5.3.2 Claim3 ...................................................... 85
5.3.3 ExaminerObservations ...................................... 86
5.4 Conclusion ........................................................... 86
6 BillingandPayment ..................................................... 89
6.1 Example1:Third-PartyBasedBillingandPaymentMethod ...... 89
6.1.1 Description .................................................. 89
6.1.2 Claim1 ...................................................... 91
6.1.3 ExaminerObservations ...................................... 92
6.2 Example2:Card-LessBillingandPaymentProcess ............... 93
6.2.1 Description .................................................. 93
6.2.2 Claim2 ...................................................... 95
6.2.3 ExaminerObservations ...................................... 95
6.3 Example3:ColourMatrixBasedBillingandPayment
System ............................................................... 97
6.3.1 Description .................................................. 97
6.3.2 Claim3 ...................................................... 98
6.3.3 ExaminerObservations ...................................... 99
References.................................................................. 101
7 GraphicalUserInterfaces .............................................. 103
7.1 Example1:Spell-CheckingSystem ............................... 105
7.1.1 Description ................................................ 105
7.1.2 Claim1 .................................................... 105
7.1.3 ExaminerObservations .................................... 105
7.2 Example2:DynamicSpell-CheckingSystem .................... 106
7.2.1 Description ................................................ 106
7.2.2 Claim2 .................................................... 107
7.2.3 ExaminerObservations .................................... 107
7.3 Example3:MixedSpell-CheckingSystem ....................... 108
7.3.1 Description ................................................ 108
7.3.2 Claim3 .................................................... 110
7.3.3 ExaminerObservations .................................... 110