SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
STRATEGIES TO REAP THE BENEFITS OF
SOFTWARE PATENTS IN AN OPEN
SOURCE SOFTWARE ENVIRONMENT
November 8, 2017
Mary Lou Wakimura
Giovanna Fessenden
2
The opinions expressed herein are solely those of Mary Lou
Wakimura and Giovanna H. Fessenden, do not necessarily
represent those of Hamilton Brook Smith Reynolds, or any client or
organization, and are not to be considered legal advice.
STRATEGIES TO REAP THE BENEFITS OF
SOFTWARE PATENTS IN AN OPEN SOURCE
SOFTWARE ENVIRONMENT
2
Offices
Boston
Seaport Innovation District
Concord
Route 128 Technology Corridor
By the Numbers
1980
Year Founded
22
Technology Specialties
Bioinformatics
Biotechnology & Life Sciences
Biologics & Immunotherapeutics
Chemical Engineering
Pharmaceuticals
Chemistry
Material Sciences
Clean Technology
Medical Devices
Medical Imaging
Mechanical Engineering
Electrical Engineering
Semiconductors
Optics
Robotics
Mobile
Internet of Things
Network Infrastructure
Telecommunications
Computer Hardware
Computer Software
Business Methods
38
Attorneys,
Patents Agents,
Technology Specialists
20
Firm accolades since
2010, including:
3
4
Mary Lou
Wakimura
Principal
 Background in computer-
related technologies
 30 years of IP law
experience
 Technical expertise in
imaging, video
applications, medical
systems, business or
transactional methods,
bio/chemical analysis,
alternative energy, social
networks, and electro-
mechanical devices
Recent Publications and Speaking
Engagements
 "Innovating Outside the Patent: Copyrights,
Trademarks and Software" Association of University
Technology Managers’ (AUTM) Eastern Region
Meeting, Boston, MA, October 3, 2017
 “Smart Cyber Security, Patent and Trade Secret
Protection for Startups,” MIT Enterprise Forum of
Cambridge/Hamilton Brook Smith Reynolds Lecture,
Cambridge, MA, November 17, 2016
 Open Source Software Solutions (Part 3): Educating
your Employees about Open Source Software Issues,
Hamilton Brook Smith Reynolds, 2016
 Open Source Software Solutions (Part 2):
Understanding Open Source Software License Trigger
Points and Resulting Obligations, Hamilton Brook
Smith Reynolds, 2016
 Open Source Software Solutions (Part 1): Getting to
Know the Open Source Software in Your Products,
Hamilton Brook Smith Reynolds, 2016
 “Strategies for Commercial Software Developers
Using Open Source Code in Proprietary Software,”
Hamilton Brook Smith Reynolds Webcast, 2016
5
Giovanna
Fessenden
Of Counsel
Focus Areas
 block chain technology
 search engines / ad serving systems
 video compression / codecs
 trusted computing and encryption
 cryptocurrency wallet
 analytics
 video on demand (VOD) systems
 VoIP and video conferencing systems
 social media software
 database and storage systems
 recommendation systems
 integrated development
environments (IDEs), compilers and
interpreters
 iPhone™, Android™ and tablet
applications
 CT imaging technologies
 wearable computing technologies
 semi-conductor manufacturing
systems
Recent Publications and Speaking
Engagements
 “Law for ICOs and Blockchain,” Meetup at Alley,
Cambridge, October 2017
 Open Source Software Solutions (Part 3): Educating
your Employees about Open Source Software
Issues, Hamilton Brook Smith Reynolds, 2016
 Open Source Software Solutions (Part 2):
Understanding Open Source Software License
Trigger Points and Resulting Obligations, Hamilton
Brook Smith Reynolds, 2016
 Open Source Software Solutions (Part 1): Getting to
Know the Open Source Software in Your Products,
Hamilton Brook Smith Reynolds, 2016
 “Strategies for Commercial Software Developers
Using Open Source Code in Proprietary Software,”
Hamilton Brook Smith Reynolds Webcast, 2016
 “Block Chain Revolution,” TEDx Berkshires,
Stockbridge, MA, 2016
 "Block Chain Innovations are Changing the Digital
World," Hamilton Brook Smith Reynolds Webcast,
2016
 TEDx Berkshires, Stockbridge, MA, November 2015
 “Strategies for Maximizing Value of Intellectual
Property,” 1Berkshire Entrepreneurial Meetup,
Stockbridge, MA, 2015
 "Strategies for Managing Open Source Software,"
Hamilton Brook Smith Reynolds Lecture,
Cambridge, MA, 2015
Key Goals of Commercial Software
Vendors Who Use OSS
6
G
 Maintain ability to deliver
 Protect IP from devaluation
 Mitigate security vulnerabilities
 Control contributions to OSS community
 Avoid exposure to Copyright Trolls
 Use OSS to increase market share and
interoperability through dual licensing
Trends In American Innovations
Agriculture
7
Medicine
Trends In American Innovations
Transportation
8
Electronics and Communications
Patents 25%
Trademarks
25%
Trade
Secrets,
25%
Copyrights
25%
Business Models – Portfolio Trends
9
Patents
Trademarks
Trade
Secrets
Copyrights
Patents
Trademarks
Copyrights
Proprietary
Licensing
OSS
Licensing
Trade
Secrets
Traditional New
Licensing
Trends In IP Enforcement
10
1960's-1980's 1990's-2000's 2010 +
Patents
Copyrights
OSS Licensing
Example OSS Licenses
More
Restrictive
(Copyleft)
More
Permissive
(Copyright)
GNU
GPL
Mozilla Apache
MIT
variant
Copyleft Software Distributed Outside
the Company Must be Compliant
 Comply with all applicable licenses and obligations
 Provide OSS education and training
 Conduct due diligence to identify, track, and manage
Copyleft code
 Check that each seller in your supply chain ensures
compliance of its entire supply chain
 Make clearing an integral part of the software
development process
 Utilize your in-house clearing resources
 Consider scanning software code for Copyleft code
13
OSS/Proprietary Licensing
and Patent Rights
Open Source Software (OSS) License:
 Licensing mechanism in which an owner surrenders
some IP rights, e.g. right to access, use, and modify
distributed “source code” without obtaining explicit
permission from the owner.
Proprietary License:
 Retains intellectual property rights—usually copyright
of the source code, and patent rights.
Patent Rights:
 A patent gives its owner right to exclude others from
making, using, and selling the claimed invention.
OSS Dual Licensing
 Dual licensing enables distribution of software to
licensees under a proprietary model as well as an
open source model, allowing the licensor to
simultaneously leverage the advantages of both types
of licenses.
 One well known example of dual licensing is Oracle’s
MySQL database management system.
14
OSS Dual Licensing Example
15
Linux/OSS Community
End Users
OEM/Customer
Integrated
Circuit
Firmware
Software
OSS
Proprietary
Patent
Application
Proprietary/OSS Dual Licensing
Artifex v. Hancom Case Study
 Artifex is owner of “Ghostscript”, which is dual
GPLv2/Proprietary licensed
 Artifex sued Hancom alleging:
 Hancom incorporated GPLv2 version of Ghostscript into
Hancom’s commercial software, and was not GPLv2
compliant
 GPLv2 requires Hancom to distribute the source of (i)
Ghostscript and (ii) Hancom's commercial product;
 Hancom’s failure to distribute this source code breached
Hancom’s GPLv2 license, triggering a termination of the
license.
16
17
Patents and OSS
 Copyleft OSS not a bar to patent protection
 If distributed source code implements a patented
invention, then the “recipient” of distributed source
code may automatically receive a limited license to
the patented invention
 Patent conveyances via distributed OSS are severely
curtailed
Patent Rights and
Open Source Licensing
18
Patent Grants: Breadth Cont. Examples
 Broad Grant - GPLv3 requires distributors of modified
versions to grant an explicit patent license for the
whole program.
 Narrower Grant - Apache License 2.0 requires a
patent license for the changes made by a distributor.
If distributed source code implements a patented
invention, then the “recipient” of distributed source
code may automatically receive a limited license to
the patented invention.
Evaluating Patent Clauses
in OSS Licenses
19
 Apache 2.0:
“… each Contributor hereby grants to You a perpetual, worldwide, non-
exclusive, no-charge, royalty-free, irrevocable (except as stated in this
section) patent license to make, have made, use, offer to sell, sell, import,
and otherwise transfer the Work, where such license applies only to those
patent claims licensable by such Contributor that are necessarily infringed by
their Contribution(s) alone or by combination of their Contribution(s) with
the Work to which such Contribution(s) was submitted.”
 GPLv3 states:
“... When you distribute a covered work, you grant a patent license to the
recipient, and to anyone that receives any version of the work, permitting,
for any and all versions of the covered work…This patent license…covers all
patent claims you control or have the right to sublicense, at the time you
distribute the covered work or in the future, that would be infringed or
violated by the covered work or any reasonably contemplated use of the
covered work….”
Example
OSS Patent Grants
20
Retaliation clauses retract the granted rights from anyone who initiates litigation.
This allows the distributor to use their patents to defend against aggression.
 Example GPLv3 Retaliation Clause:
If You institute patent litigation against any entity (including a cross-claim or
counterclaim in a lawsuit) alleging that the Work or a Contribution
incorporated within the Work constitutes direct or contributory patent
infringement, then any patent licenses granted to You under this License for
that Work shall terminate as of the date such litigation is filed.
 Example Apache 2.0 Retaliation Clause:
…you may not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that any patent
claim is infringed by making, using, selling, offering for sale, or importing the
Program or any portion of it.
Evaluating Patent Clauses
in OSS Licenses
21
Permission to use/redistribute the software arguably
implies copyright/patent grants
 GPLv2 arguably includes a patent grant in stating
that patent rights can be necessary for
use/distribution and that distributors must pass on
permission to use/modify/redistribute, thus
forming an implicit patent grant that is quite clear
 BSD arguably contains implicit patent grant:
Redistribution and use in source and binary forms,
with or without modification, are permitted (...)
OSS Implied Patent Grants
Examples of Patenting OSS Technologies
Blockchain Patent Applications
 At least 390 applications related to
blockchain technology filed in 2017
OSS Blockchains
 Ethereum - OSS
 Hyperledger – Apache 2.0 (patent grant)
 Bitcoin – MIT/OSS
22
23
 Potential Reasons to Patent:
 Secure competitive edge
 License the patent to others to produce a revenue
stream
 Assert patent rights against redistributors who are
non-compliant with copyleft terms
 Enforce patent rights as an offensive or defensive
Dual license (proprietary and copyleft)
 Position your company for acquisition
Why Patent An Invention That Is Going
To Be Distributed Under An OSS License?
Essential Guidance for
Releasing Software
Before distributing your software product:
 Inventory your code/software in the product
for clearance purposes
 Protect IP
 Devise licensing strategy
 Modify code to conform to licensing strategy
 Contact IP counsel to assist
24
Questions
25
Mary Lou Wakimura
MaryLou.Wakimura@hbsr.com
978.341.0036 X3214
Giovanna Fessenden
Giovanna.Fessenden@hbsr.com
978.341.0036 X3466

Mais conteúdo relacionado

Mais procurados

Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 

Mais procurados (20)

Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source Management
 
What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network Communication
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
The Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityThe Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and Cybersecurity
 

Semelhante a Strategies to Reap the Benefits of Software Patents in an Open Source Software Environment

Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
Rowan Wilson
 
Implementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseImplementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash Course
FINOS
 
Open source initiative osi mozilla public license
Open source initiative osi   mozilla public licenseOpen source initiative osi   mozilla public license
Open source initiative osi mozilla public license
cbartowski
 
Business models of open hardware
Business models of open hardwareBusiness models of open hardware
Business models of open hardware
Robert Viseur
 

Semelhante a Strategies to Reap the Benefits of Software Patents in an Open Source Software Environment (20)

Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
 
Exploring Open Source Licensing
Exploring Open Source LicensingExploring Open Source Licensing
Exploring Open Source Licensing
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source Licensing
 
Legal and Practical Concerns with Software Development
Legal and Practical Concerns with Software DevelopmentLegal and Practical Concerns with Software Development
Legal and Practical Concerns with Software Development
 
Copyright or Copy left by manoranjan, glc, tvpm
Copyright or Copy left by manoranjan, glc, tvpmCopyright or Copy left by manoranjan, glc, tvpm
Copyright or Copy left by manoranjan, glc, tvpm
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
 
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...
 
10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...
 
Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the details
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open Source
 
Implementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseImplementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash Course
 
Implementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseImplementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash Course
 
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
 
Osborne Clarke - OpenChain - FOSSmatrix
Osborne Clarke - OpenChain - FOSSmatrixOsborne Clarke - OpenChain - FOSSmatrix
Osborne Clarke - OpenChain - FOSSmatrix
 
Open Source And the Internet Of Things
Open Source And the Internet Of ThingsOpen Source And the Internet Of Things
Open Source And the Internet Of Things
 
Open source initiative osi mozilla public license
Open source initiative osi   mozilla public licenseOpen source initiative osi   mozilla public license
Open source initiative osi mozilla public license
 
Business models of open hardware
Business models of open hardwareBusiness models of open hardware
Business models of open hardware
 

Mais de Black Duck by Synopsys

Mais de Black Duck by Synopsys (20)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsOpen Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOps
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Strategies to Reap the Benefits of Software Patents in an Open Source Software Environment

  • 1. STRATEGIES TO REAP THE BENEFITS OF SOFTWARE PATENTS IN AN OPEN SOURCE SOFTWARE ENVIRONMENT November 8, 2017 Mary Lou Wakimura Giovanna Fessenden
  • 2. 2 The opinions expressed herein are solely those of Mary Lou Wakimura and Giovanna H. Fessenden, do not necessarily represent those of Hamilton Brook Smith Reynolds, or any client or organization, and are not to be considered legal advice. STRATEGIES TO REAP THE BENEFITS OF SOFTWARE PATENTS IN AN OPEN SOURCE SOFTWARE ENVIRONMENT
  • 3. 2 Offices Boston Seaport Innovation District Concord Route 128 Technology Corridor By the Numbers 1980 Year Founded 22 Technology Specialties Bioinformatics Biotechnology & Life Sciences Biologics & Immunotherapeutics Chemical Engineering Pharmaceuticals Chemistry Material Sciences Clean Technology Medical Devices Medical Imaging Mechanical Engineering Electrical Engineering Semiconductors Optics Robotics Mobile Internet of Things Network Infrastructure Telecommunications Computer Hardware Computer Software Business Methods 38 Attorneys, Patents Agents, Technology Specialists 20 Firm accolades since 2010, including: 3
  • 4. 4 Mary Lou Wakimura Principal  Background in computer- related technologies  30 years of IP law experience  Technical expertise in imaging, video applications, medical systems, business or transactional methods, bio/chemical analysis, alternative energy, social networks, and electro- mechanical devices Recent Publications and Speaking Engagements  "Innovating Outside the Patent: Copyrights, Trademarks and Software" Association of University Technology Managers’ (AUTM) Eastern Region Meeting, Boston, MA, October 3, 2017  “Smart Cyber Security, Patent and Trade Secret Protection for Startups,” MIT Enterprise Forum of Cambridge/Hamilton Brook Smith Reynolds Lecture, Cambridge, MA, November 17, 2016  Open Source Software Solutions (Part 3): Educating your Employees about Open Source Software Issues, Hamilton Brook Smith Reynolds, 2016  Open Source Software Solutions (Part 2): Understanding Open Source Software License Trigger Points and Resulting Obligations, Hamilton Brook Smith Reynolds, 2016  Open Source Software Solutions (Part 1): Getting to Know the Open Source Software in Your Products, Hamilton Brook Smith Reynolds, 2016  “Strategies for Commercial Software Developers Using Open Source Code in Proprietary Software,” Hamilton Brook Smith Reynolds Webcast, 2016
  • 5. 5 Giovanna Fessenden Of Counsel Focus Areas  block chain technology  search engines / ad serving systems  video compression / codecs  trusted computing and encryption  cryptocurrency wallet  analytics  video on demand (VOD) systems  VoIP and video conferencing systems  social media software  database and storage systems  recommendation systems  integrated development environments (IDEs), compilers and interpreters  iPhone™, Android™ and tablet applications  CT imaging technologies  wearable computing technologies  semi-conductor manufacturing systems Recent Publications and Speaking Engagements  “Law for ICOs and Blockchain,” Meetup at Alley, Cambridge, October 2017  Open Source Software Solutions (Part 3): Educating your Employees about Open Source Software Issues, Hamilton Brook Smith Reynolds, 2016  Open Source Software Solutions (Part 2): Understanding Open Source Software License Trigger Points and Resulting Obligations, Hamilton Brook Smith Reynolds, 2016  Open Source Software Solutions (Part 1): Getting to Know the Open Source Software in Your Products, Hamilton Brook Smith Reynolds, 2016  “Strategies for Commercial Software Developers Using Open Source Code in Proprietary Software,” Hamilton Brook Smith Reynolds Webcast, 2016  “Block Chain Revolution,” TEDx Berkshires, Stockbridge, MA, 2016  "Block Chain Innovations are Changing the Digital World," Hamilton Brook Smith Reynolds Webcast, 2016  TEDx Berkshires, Stockbridge, MA, November 2015  “Strategies for Maximizing Value of Intellectual Property,” 1Berkshire Entrepreneurial Meetup, Stockbridge, MA, 2015  "Strategies for Managing Open Source Software," Hamilton Brook Smith Reynolds Lecture, Cambridge, MA, 2015
  • 6. Key Goals of Commercial Software Vendors Who Use OSS 6 G  Maintain ability to deliver  Protect IP from devaluation  Mitigate security vulnerabilities  Control contributions to OSS community  Avoid exposure to Copyright Trolls  Use OSS to increase market share and interoperability through dual licensing
  • 7. Trends In American Innovations Agriculture 7 Medicine
  • 8. Trends In American Innovations Transportation 8 Electronics and Communications
  • 9. Patents 25% Trademarks 25% Trade Secrets, 25% Copyrights 25% Business Models – Portfolio Trends 9 Patents Trademarks Trade Secrets Copyrights Patents Trademarks Copyrights Proprietary Licensing OSS Licensing Trade Secrets Traditional New Licensing
  • 10. Trends In IP Enforcement 10 1960's-1980's 1990's-2000's 2010 + Patents Copyrights OSS Licensing
  • 12. Copyleft Software Distributed Outside the Company Must be Compliant  Comply with all applicable licenses and obligations  Provide OSS education and training  Conduct due diligence to identify, track, and manage Copyleft code  Check that each seller in your supply chain ensures compliance of its entire supply chain  Make clearing an integral part of the software development process  Utilize your in-house clearing resources  Consider scanning software code for Copyleft code
  • 13. 13 OSS/Proprietary Licensing and Patent Rights Open Source Software (OSS) License:  Licensing mechanism in which an owner surrenders some IP rights, e.g. right to access, use, and modify distributed “source code” without obtaining explicit permission from the owner. Proprietary License:  Retains intellectual property rights—usually copyright of the source code, and patent rights. Patent Rights:  A patent gives its owner right to exclude others from making, using, and selling the claimed invention.
  • 14. OSS Dual Licensing  Dual licensing enables distribution of software to licensees under a proprietary model as well as an open source model, allowing the licensor to simultaneously leverage the advantages of both types of licenses.  One well known example of dual licensing is Oracle’s MySQL database management system. 14
  • 15. OSS Dual Licensing Example 15 Linux/OSS Community End Users OEM/Customer Integrated Circuit Firmware Software OSS Proprietary Patent Application
  • 16. Proprietary/OSS Dual Licensing Artifex v. Hancom Case Study  Artifex is owner of “Ghostscript”, which is dual GPLv2/Proprietary licensed  Artifex sued Hancom alleging:  Hancom incorporated GPLv2 version of Ghostscript into Hancom’s commercial software, and was not GPLv2 compliant  GPLv2 requires Hancom to distribute the source of (i) Ghostscript and (ii) Hancom's commercial product;  Hancom’s failure to distribute this source code breached Hancom’s GPLv2 license, triggering a termination of the license. 16
  • 17. 17 Patents and OSS  Copyleft OSS not a bar to patent protection  If distributed source code implements a patented invention, then the “recipient” of distributed source code may automatically receive a limited license to the patented invention  Patent conveyances via distributed OSS are severely curtailed Patent Rights and Open Source Licensing
  • 18. 18 Patent Grants: Breadth Cont. Examples  Broad Grant - GPLv3 requires distributors of modified versions to grant an explicit patent license for the whole program.  Narrower Grant - Apache License 2.0 requires a patent license for the changes made by a distributor. If distributed source code implements a patented invention, then the “recipient” of distributed source code may automatically receive a limited license to the patented invention. Evaluating Patent Clauses in OSS Licenses
  • 19. 19  Apache 2.0: “… each Contributor hereby grants to You a perpetual, worldwide, non- exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted.”  GPLv3 states: “... When you distribute a covered work, you grant a patent license to the recipient, and to anyone that receives any version of the work, permitting, for any and all versions of the covered work…This patent license…covers all patent claims you control or have the right to sublicense, at the time you distribute the covered work or in the future, that would be infringed or violated by the covered work or any reasonably contemplated use of the covered work….” Example OSS Patent Grants
  • 20. 20 Retaliation clauses retract the granted rights from anyone who initiates litigation. This allows the distributor to use their patents to defend against aggression.  Example GPLv3 Retaliation Clause: If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.  Example Apache 2.0 Retaliation Clause: …you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. Evaluating Patent Clauses in OSS Licenses
  • 21. 21 Permission to use/redistribute the software arguably implies copyright/patent grants  GPLv2 arguably includes a patent grant in stating that patent rights can be necessary for use/distribution and that distributors must pass on permission to use/modify/redistribute, thus forming an implicit patent grant that is quite clear  BSD arguably contains implicit patent grant: Redistribution and use in source and binary forms, with or without modification, are permitted (...) OSS Implied Patent Grants
  • 22. Examples of Patenting OSS Technologies Blockchain Patent Applications  At least 390 applications related to blockchain technology filed in 2017 OSS Blockchains  Ethereum - OSS  Hyperledger – Apache 2.0 (patent grant)  Bitcoin – MIT/OSS 22
  • 23. 23  Potential Reasons to Patent:  Secure competitive edge  License the patent to others to produce a revenue stream  Assert patent rights against redistributors who are non-compliant with copyleft terms  Enforce patent rights as an offensive or defensive Dual license (proprietary and copyleft)  Position your company for acquisition Why Patent An Invention That Is Going To Be Distributed Under An OSS License?
  • 24. Essential Guidance for Releasing Software Before distributing your software product:  Inventory your code/software in the product for clearance purposes  Protect IP  Devise licensing strategy  Modify code to conform to licensing strategy  Contact IP counsel to assist 24
  • 25. Questions 25 Mary Lou Wakimura MaryLou.Wakimura@hbsr.com 978.341.0036 X3214 Giovanna Fessenden Giovanna.Fessenden@hbsr.com 978.341.0036 X3466