ECONOMIC ANALYSIS of NETWORK EFFECTS and INTELLECTUAL PROPERTY Peter S

Total Page:16

File Type:pdf, Size:1020Kb

ECONOMIC ANALYSIS of NETWORK EFFECTS and INTELLECTUAL PROPERTY Peter S ECONOMIC ANALYSIS OF NETWORK EFFECTS AND INTELLECTUAL PROPERTY Peter S. Menell† ABSTRACT The information revolution has brought demand-side effects to the fore of economic activity, business strategy, and intellectual property jurisprudence and policy. Intellectual property doctrines play a central role in harnessing network effects, promoting innovation to overcome excess inertia, and balancing consumer welfare, competition, and innovation. This Article surveys and integrates the economic, business strategy, and legal literatures relating to network effects and intellectual property. Part I introduces the topic of network effects and provides an overview of the Article. Part II describes the functioning of network markets. Part III examines the interplay of business strategy, contract, standard setting organizations, intellectual property, and competition policy. Part IV presents three principles for tailoring intellectual property regimes and competition policy to network technologies. Part V traces the evolution of intellectual property protection for network features of systems and platforms. Part VI discusses the interplay of intellectual property protection and competition policy. Part VII assesses the extent to which intellectual property protection and competition policy align with the normative design principles. Part VIII identifies promising areas for future research. DOI: https://doi.org/10.15779/Z381V5BD7T © 2019 Peter S. Menell. † Koret Professor of Law and Director, Berkeley Center for Law & Technology, University of California at Berkeley School of Law. Thanks to participants at the 2015 Economics of Intellectual Property Research Handbook Conference, the 2017 Intellectual Property Scholars Conference, and especially Michael Carrier for their comments on this project. I am grateful to Alex Barata, Concord Cheung, Louise Decoppet, Amit Elazari, Andrea Hall, Megan McKnelly, Reid Whitaker, and Samantha Vega for research assistance. 220 BERKELEY TECHNOLOGY LAW JOURNAL [Vol. 34:219 TABLE OF CONTENTS I. INTRODUCTION ............................................................................... 222 II. FUNCTIONING OF NETWORK MARKETS ................................... 225 III. INTERPLAY OF BUSINESS STRATEGY, CONTRACT, STANDARD SETTING, INTELLECTUAL PROPERTY, AND COMPETITION POLICY ......................................................... 230 IV. RAMIFICATIONS FOR INTELLECTUAL PROPERTY AND COMPETITION POLICY ................................................................... 236 A. PARSIMONY PRINCIPLE: NO INTELLECTUAL PROPERTY PROTECTION FOR FUNCTIONAL ATTRIBUTES ABSENT SIGNIFICANT TECHNOLOGICAL ADVANCE ................................................. 238 B. PROPORTIONALITY PRINCIPLE: OVERCOMING EXCESS INERTIA WITHOUT UNDUE PROTECTION ................................................................... 239 C. DETERRENCE PRINCIPLE: DISCOURAGING OVERREACH WITH BALANCED REMEDIES ..................................................................................... 241 V. INTELLECTUAL PROPERTY PROTECTION FOR NETWORK FEATURES ..................................................................... 243 A. TRADE SECRET PROTECTION ......................................................................... 244 B. COPYRIGHT PROTECTION ............................................................................... 245 1. Software Copyright Legislation: The Copyright Act of 1976, the CONTU Report, and the 1980 Amendments ............................................. 246 2. Software Copyright Jurisprudence: The First Wave ........................................ 248 a) Unprotectability of Functional and Network Features ............. 249 b) Permissibility of Reverse Engineering ......................................... 259 3. Software Licensing ........................................................................................ 260 a) The Free Software Movement (General Public License) ......... 261 b) The Open Software Movement (Permissive Licenses) ............. 263 c) Dedication to the Public Domain ................................................ 264 d) Federal Preemption of Contractual Restrictions ....................... 264 4. Interoperability Exception to the DMCA’s Anti-Circumvention Prohibition .................................................................................................... 265 a) GPL 3.0 - DRM Provision ............................................................ 268 5. Software Copyright Jurisprudence: The Oracle v. Google Litigation ................ 268 6. Standards and Codes .................................................................................... 273 C. TRADEMARK PROTECTION, UNFAIR COMPETITION LAW, AND FALSE ADVERTISING PROTECTION .............................................................. 275 D. PATENT PROTECTION ...................................................................................... 279 1. Patentability Requirements ............................................................................281 a) Subject Matter Eligibility ............................................................... 281 b) Nonobviousness ............................................................................. 284 2. Scope ............................................................................................................ 285 2019] ECONOMIC ANALYSIS OF NETWORK EFFECTS 221 3. Licensing ...................................................................................................... 286 a) Standard-Setting and FRAND Commitments ........................... 286 b) Insurance Pools and License on Transfer (LOT) Commitments .................................................................................. 287 c) GPL 3.0 ............................................................................................ 287 4. Remedies ....................................................................................................... 289 a) Injunctive Relief .............................................................................. 289 b) Monetary Relief ............................................................................... 291 5. Design Patents .............................................................................................. 293 VI. INTERPLAY OF INTELLECTUAL PROPERTY PROTECTION AND COMPETITION POLICY IN NETWORK INDUSTRIES .................................................................. 295 A. PRIVATE ENFORCEMENT ................................................................................ 297 1. Misuse Doctrines .......................................................................................... 297 2. The Principle of Exhaustion ......................................................................... 299 3. Ambush of Standard-Setting Processes .......................................................... 300 4. Breach of Contract for Failure to License SEPs on FRAND Terms ............ 302 5. Private Antitrust Liability ............................................................................ 304 a) Refusals to License Patented Technologies and Copyright-Protected Works .......................................................... 304 b) Patent Thickets ................................................................................ 306 c) Improper Leveraging of Market Power ...................................... 307 B. PUBLIC ENFORCEMENT ................................................................................... 308 1. Intellectual Property Licensing Guidelines ...................................................... 309 2. Significant Network Market Enforcement Actions ....................................... 312 VII. ASSESSMENT OF INTELLECTUAL PROPERTY PROTECTION AND COMPETITION POLICY FOR NETWORK TECHNOLOGIES .......................................................... 314 A. INSTITUTIONAL CONSIDERATIONS ............................................................... 314 B. MEASURING PROGRESS BASED ON THE NORMATIVE PRINCIPLES ........ 315 1. Parsimony Principle ...................................................................................... 316 2. Proportionality Principle ................................................................................ 319 3. Deterrence Principle ...................................................................................... 321 VIII. FUTURE RESEARCH DIRECTIONS ............................................. 322 222 BERKELEY TECHNOLOGY LAW JOURNAL [Vol. 34:219 I. INTRODUCTION The economics of intellectual property begins with the classic appropriability problem: In a competitive economy, imitators can enter markets for information goods after inventors and authors have incurred research and development (R&D) costs and sell the innovative or creative product at the cost of reproduction. Without means for appropriating an adequate return on investment in R&D, the market will under-produce technological advances and creative expression.1 The provision of intellectual property protection for technological advances and creative expression affords inventors and authors a mechanism to recoup their investments, although not without imposing the deadweight loss of monopoly exploitation and potentially interfering with cumulative creativity.2 Conventional analysis of intellectual property seeks to optimize the duration and scope of intellectual property rights in order to balance these tradeoffs.3 This framework applies to goods and services for which consumer demand is independent—i.e., where one consumer’s
Recommended publications
  • Augmenting Your IP Portfolio Is Virtually the Only Way to Compete in AR/VR
    The GLOBAL REACH, LOCAL KNOWLEDGE www.patentlawyermagazine.com May / June 2021 Augmenting your IP portfolio is virtually the only way to compete in AR/VR TH AM U ER O I S C A Law firm RANKINGS Finnegan, Henderson, Farabow, Garrett & Dunner, LLP experts Christopher Howes, Zachery Olah, Forrest Jones, and Karthik Kumar, discuss the developments in the augmented and virtual reality sphere with advice for protecting innovation. Ismat Levin, Automated Inde niteness Synamedia patent analysis Page 60 Page 12 Page 24 Front cover_TPL54_v3.indd 1 22/06/2021 16:22 EDITOR’S WELCOME The May / June 2021 GLOBAL REACH, LOCAL KNOWLEDGE www.patentlawyermagazine.com Augmenting your IP portfolio is virtually the only way to compete in AR/VR Editor’s H AM UT ER O IC S A Law firm RANKINGS welcome Finnegan, Henderson, Farabow, Garrett & Dunner, LLP experts Christopher Howes, Zachery Olah, Forrest Jones, and Karthik Kumar, discuss the developments in the augmented and virtual reality sphere with advice for protecting innovation. IndeĀ niteness Automated Page 60 Ismat Levin, patent analysis Synamedia Page 24 ith the global circumstances of the past year limiting our Page 12 activities, it is no surprise that virtual realty has become a 22/06/2021 16:22 greater focus than ever. As consumers, we have technology d 1 W at our fingertips that was mere science fiction only a few decades ago. THE PATENT LAWYER So, what can we expect of the future of augmented and virtual reality, Issue 54 and how can that innovation be protected? Finnegan, Jederson, Farabow, Garrett & Dunner, LLP discuss in our cover story this issue.
    [Show full text]
  • THE DEFENSIVE PATENT PLAYBOOK James M
    THE DEFENSIVE PATENT PLAYBOOK James M. Rice† Billionaire entrepreneur Naveen Jain wrote that “[s]uccess doesn’t necessarily come from breakthrough innovation but from flawless execution. A great strategy alone won’t win a game or a battle; the win comes from basic blocking and tackling.”1 Companies with innovative ideas must execute patent strategies effectively to navigate the current patent landscape. But in order to develop a defensive strategy, practitioners must appreciate the development of the defensive patent playbook. Article 1, Section 8, Clause 8 of the U.S. Constitution grants Congress the power to “promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.”2 Congress attempts to promote technological progress by granting patent rights to inventors. Under the utilitarian theory of patent law, patent rights create economic incentives for inventors by providing exclusivity in exchange for public disclosure of technology.3 The exclusive right to make, use, import, and sell a technology incentivizes innovation by enabling inventors to recoup the costs of development and secure profits in the market.4 Despite the conventional theory, in the 1980s and early 1990s, numerous technology companies viewed patents as unnecessary and chose not to file for patents.5 In 1990, Microsoft had seven utility patents.6 Cisco © 2015 James M. Rice. † J.D. Candidate, 2016, University of California, Berkeley, School of Law. 1. Naveen Jain, 10 Secrets of Becoming a Successful Entrepreneur, INC. (Aug. 13, 2012), http://www.inc.com/naveen-jain/10-secrets-of-becoming-a-successful- entrepreneur.html.
    [Show full text]
  • From Safe Harbor to Choppy Waters: Youtube, the Digital Millennium Copyright Act,And a Much Needed Change of Course
    Vanderbilt Journal of Entertainment & Technology Law Volume 10 Issue 1 Issue 1 - Fall 2007 Article 3 2007 From Safe Harbor to Choppy Waters: YouTube, the Digital Millennium Copyright Act,and a Much Needed Change of Course Lauren B. Patten Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Intellectual Property Law Commons, and the Internet Law Commons Recommended Citation Lauren B. Patten, From Safe Harbor to Choppy Waters: YouTube, the Digital Millennium Copyright Act,and a Much Needed Change of Course, 10 Vanderbilt Journal of Entertainment and Technology Law 179 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol10/iss1/3 This Note is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. From Safe Harbor to Choppy Waters: YouTube, the Digital Millennium Copyright Act, and a Much Needed Change of Course ABSTRACT YouTube.com, named Time magazine's "Invention of the Year" for 2006 and widely recognized as the most-visited video site on the Internet, has changed the face of online entertainment. With the site's acquisition by Google in October 2006, the possibilities for YouTube's growth became truly endless. However, there is a darker side to the story of the Internet sensation, one that is grounded in its potential liability for copyright infringement. The issue is that many of the most-viewed and most-popular videos on the site are copyrighted.
    [Show full text]
  • Cip Forum 2016 Göteborg 25 - 27 Sept Convergence Cip Forum 2016 | Program
    CIP FORUM 2016 GÖTEBORG 25 - 27 SEPT CONVERGENCE CIP FORUM 2016 | PROGRAM All text material in the CIP FORUM 2016 Program brochure, is provided under a Creative Commons Attribution 3.0 License. Quotes and images may be subjected to copyright held by third parties and are not included under this license. LAYOUT & PRODUCTION PRINTING Anna Holmberg University of Gothenburg Linn Holmström Natalie Lorin CIP FORUM 2016 | PROGRAM CONTENTS WELCOME TO CIP FORUM 2016 7 CIP FORUM – WE’RE BACK 8 COLLABORATION PARTNERS 10 CIP.... AND THEN THERE WERE THREE 11 STUDENT PARTICIPATION 12 SPEAKERS 13 PROGRAM OVERVIEW 23 SESSION OVERVIEW 24 CONFERENCE VENUES 33 PRACTICAL INFORMATION 34 NOTE PAGES 35 CALL CENTER INFORMATION AND TRANSPORTATION +46 76 - 618 26 14 CIP FORUM 2016 | PROGRAM CONVERGENCE We are in the midst of a convergent world where the storms of disruptive change are brewing. Industries, universities, and nations alike will need to take heed. Some actors will define the future and others will have the future define them. Which one will you be? CIP FORUM 2016 | PROGRAM CIP FORUM 2016 WELCOME TO GÖTEBORG for the seventh addition of CIP FORUM. For those first- time participants, we are happy to welcome you not only to our city and event, but to our CIP community of academics, executives, policy-makers, professionals, students, and alumni gathered around the common goal of transforming knowledge into wealth and welfare. For those past-participants, we hope to reward your patience since the last event with another impressive program whose theme of convergence promises to deliver a new set of opportunities and challenges on the winding road to economic growth and prosperity in the knowledge economy.
    [Show full text]
  • Tulane Journal of Technology and Intellectual Property
    TULANE JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY VOLUME 10 FALL 2007 Increasing Access to Knowledge Through Fair Use—Analyzing the Google Litigation To Unleash Developing Countries Douglas L. Rogers* I. ACCESS TO KNOWLEDGE ...................................................................... 3 II. IN SPITE OF THE COPYING OF COMPLETE WORKS, THE PROVISION OF LIMITED INFORMATION FROM THE GOOGLE DATABASE MAKES THE LIBRARY PROJECT A FAIR USE ........................ 7 A. The Google Library Litigation ................................................... 7 B. Fair Use Is a Crucial Element of the Copyright Balance ........ 11 C. Increasing Access Favors Fair Use ........................................... 21 1. Sony: Time-Shifting Is a Fair Use ................................... 21 2. Campbell: Increasing Access Through Transformative Works Favors Fair Use ........................... 27 3. Summary .......................................................................... 30 D. It Is the End Result that Counts in Determining Fair Use ............................................................................................. 31 1. Fair Use Seeks a Balanced Result ................................... 31 2. Interim Scanning of a Picture and Then Modifying It ...................................................................... 33 a. Kelly v. Arriba Soft Corp. ....................................... 33 b. Bill Graham Archives v. Dorling Kindersley Ltd. ............................................................................ 35 * © 2007
    [Show full text]
  • Parker V. Yahoo!, Inc
    IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA GORDON ROY PARKER : CIVIL ACTION : v. : : YAHOO!, INC., et al. : NO. 07-2757 MEMORANDUM AND ORDER McLaughlin, J. September 25, 2008 Plaintiff Gordon Roy Parker (“Parker”), pro se, brings this action against Defendants Yahoo!, Inc. (“Yahoo”) and Microsoft Corporation (“Microsoft”), alleging copyright infringement, breach of contract, and negligence. Before the Court are the defendants’ motions to dismiss. The Court will grant in part and deny in part these motions. I. The Complaint Parker is the author of several registered works including Outfoxing the Foxes and Why Hotties Choose Losers , both which are published online and are freely available from Parker’s website. Defendants Yahoo and Microsoft own and operate widely used internet search engines. Parker alleges that these search engines create and republish unauthorized “cached” copies of his works. That is, when an internet user runs a search on either of the defendants’ search engines, the search results include hyperlinks to archived, or “cached,” copies of the web pages that are responsive to the user’s inquiry. A user may view these search results either by following a hyperlink to the original website or, alternatively, by viewing the “cached” copy that is hosted on the defendants’ computers. Parker concedes in his complaint that the defendants each provide opt-out mechanisms that would prevent his websites from being cached, but that Parker has not made use of them. Parker claims that by making cached copies of his websites available to their users, both Yahoo and Microsoft republish his works in their entirety without his permission.
    [Show full text]
  • Copyright, Safe Harbors, and International Law
    \\server05\productn\N\NDL\84-1\NDL106.txt unknown Seq: 1 10-DEC-08 7:42 OPTING OUT OF THE INTERNET IN THE UNITED STATES AND THE EUROPEAN UNION: COPYRIGHT, SAFE HARBORS, AND INTERNATIONAL LAW Hannibal Travis* INTRODUCTION .................................................. 332 R I. THE DEVELOPMENT OF “WEB 2.0” ......................... 336 R II. COPYRIGHT LAW IN THE UNITED STATES AND THE EUROPEAN UNION ................................................... 339 R A. Exclusive Rights ....................................... 339 R B. Fair Use .............................................. 341 R C. Other Exceptions to Copyright ........................... 342 R III. OPTING OUT OF THE INTERNET IN THE UNITED STATES ..... 343 R A. The Early Cases: Threats of “Unreasonable” Liability....... 343 R B. The “Safe Harbors” of the Digital Millennium Copyright Act 347 R C. An Emerging Consensus That Copyright Holders Must Opt In to the Internet? ..................................... 350 R D. The Shift Toward an Opt-Out Copyright System in the Napster Case ......................................... 354 R E. The Internet Matures: Courts Move to an Opt-Out Copyright System ................................................ 358 R 2008 Hannibal Travis. Individuals and nonprofit institutions may reproduce and distribute copies of this Article in any format, at or below cost, for educational purposes, so long as each copy identifies the author, provides a citation to the Notre Dame Law Review, and includes this provision and copyright notice. * Visiting Associate Professor
    [Show full text]
  • Cloud Computing in the Education Setting
    A P R I L 2 0 1 4 CLOUD COMPUTING IN THE EDUCATION SETTING BRIEF TECHNOLOGY POLICY During the 2014 Regular Session, the Senate Committee on Education and Health referred SB 599 to the Joint Commission on Technology and Science for study.1 SB 599 requires each cloud computing service provider that enters into a contract with a local school board to provide services to only process and monitor student data according to the terms of its contract with the local school board. The bill prohibits the providers from using cloud computing services for any secondary purpose, such as developing online behavioral advertising, creating or correcting an individual household profile, selling student data for any commercial purpose, or other similar for-profit activities. Relevant to the issues addressed in SB 599 is a currently-pending federal case in Northern California involving cloud computing privacy standards. The plaintiffs in that case, styled In Re: Google Inc. Gmail Litigation, challenge Google’s operation of its advertising-supported electronic messaging service (Gmail) under state and federal anti-wiretapping laws and seek damages and injunctive relief related to Google’s interception and data-mining of email over a period of several years. This case directly relates to SB 599 because two of the plaintiffs, college students Rob- ert Fread and Rafael Carrillo, used Google Apps for Education cloud productivity tools suite. Google Apps for Education is a tool that Google touts as “[f]ree Web- based email, calendar & documents for collaborative study anytime, anywhere.”2 According to Google, as of October 2012, over 20 million students were relying on Apps for Education for email, calendaring, cloud-based storage, and document cre- ation.
    [Show full text]
  • Judge Rejects Google Book Settlement
    Editor: Henry Reichman, California State University, East Bay Founding Editor: Judith F. Krug (1940–2009) Publisher: Barbara Jones Office for Intellectual Freedom, American Library Association ISSN 0028-9485 May 2011 Vol. LX No. 3 www.ala.org/nif Google’s ambition to create the world’s largest digital library and bookstore has run into the reality of a 300-year-old legal concept: copyright. The company’s plan to digitize every book ever published and make them widely available was derailed March 22 when a federal judge in New York rejected a sweeping $125 million legal settlement the company had worked out with groups representing authors and publishers. The decision threw into legal limbo one of the most ambitious undertakings in Google’s history, and brought into sharp focus concerns about the company’s growing power over information. While the profit potential of the book project is not clear, the effort is one of the pet projects of Larry Page, the Google co-founder who became its chief executive judge rejects in April. The project has wide support inside the company, whose corporate mission is to organize all of the world’s information. Google book “It was very much consistent with Larry’s idealism that all of the world’s information should be made available freely,” said Ken Auletta, the author of Googled: The End of the World as We Know It. settlement Citing copyright, antitrust and other concerns, Judge Denny Chin said that the settle- ment went too far. He said it would have granted Google a “de facto monopoly” and the right to profit from books without the permission of copyright owners.
    [Show full text]
  • Entertainment, Arts and Sports Law Journal a Publication of the Entertainment, Arts and Sports Law Section of the New York State Bar Association
    NYSBA FALL/WINTER 2012 | VOL. 23 | NO. 3 Entertainment, Arts and Sports Law Journal A publication of the Entertainment, Arts and Sports Law Section of the New York State Bar Association IINSIDE:NSIDE: SSOCIALOCIAL MMEDIAEDIA AANDND MMOREORE WWW.NYSBA.ORG/EASL From the NYSBA Book Store Section Members get 20% discount* with coupon code PUB1621N Entertainment Litigation Entertainment Litigation is a thorough exposition of the basics that manages to address in a simple, accessible way the pitfalls and the complexities of the fi eld, so that artists, armed with that knowledge, and their representatives can best minimize the risk of litigation and avoid the courtroom. Written by experts in the fi eld, Entertainment Litigation is the manual for anyone practicing in this fast-paced, ever-changing area of law. Contents 1. Contracts Without 8. The Safe Harbor Provisions of the an Obligation Digital Millennium Copyright Act and “X.”com EDITORS 2. Artist-Manager Conflicts 9. Trademarks for Artists Peter Herbert, Esq. 3. Artist-Dealer Relations: and Entertainers Hinckley, Allen & Snyder LLP Representing the Boston, MA Visual Artist 10. Internet: A Business Owner’s Checklist for Avoiding Web Site Elissa D. Hecker 4. Intellectual Property Overview: Pitfalls Law Offi ce of Elissa D. Hecker Right of Privacy / Publicity Irvington, NY and the Lanham Act 11. Internet Legal Issues PRODUCT INFO AND PRICES 5. Anatomy of a Copyright 12. Litigating Domain 2007 / 232 pp., softbound Infringement Claim Name Disputes PN: 4087 6. Digitalization of 13. Alternative Dispute Resolution Libraries / Google Litigation NYSBA Members $35 Appendices 7. Accrual of Copyright Non-members $55 Infringement Claims $5.95 shipping and handling within the continental U.S.
    [Show full text]
  • Redacted Saurabh Dutta System Design and Management Program, MIT May 10, 2017
    Striking a balance between usability and cyber-security in loT Devices by Saurabh Dutta M.S. Architecture and Design, 2009 Mississippi State University Submitted to the System Design and Management Program in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management at the Massachusetts Institute of Technology June 2017 @ 2017 Saurabh Dutta. All rights reserved The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author: Signature redacted Saurabh Dutta System Design and Management Program, MIT May 10, 2017 Certified by: /Signature redacted Thesis Supervisor: Professor Stuart Madnick John Norris Maguire Professor of Information Technologies, MIT Sloan School of Management Professor of Engineering Systems, MIT School of Engineering Signature redacted Accepted by: 1' Joan S Rubin Executive Director, System Design & Management Program, MIT MASSCF1JETS INSTITUTE OF TEQHNOLOGY JUN 2 7017 LIBRARIES (This page left intentionally blank) 2 Striking a balance between usability and cyber-security in loT Devices By Saurabh Dutta Submitted to the System Design and Management Program on May 12, 2017 in Partial fulfillment of the requirements for the Degree of Master of Science in Engineering and Management. ABSTRACT Today more and more physical objects are being connected to internet. The Internet of Things, or loT, is dramatically changing the way of living and the way we interact with things and each other. Home doors can be opened remotely with a watch, cars' performance can be upgraded remotely, devices monitor health and send updates to physicians remotely.
    [Show full text]
  • Out of the Blocks – Mitigating Patent Risk Over Distributed Ledgers
    Summer 2020 94 Market focus | New tech www.IAM-media.com Out of the blocks – mitigating patent risk over distributed ledgers This rapidly developing technology is set to be hugely disruptive across a range of sectors. Companies should act fast to ensure they are aware of the IP risks By Mehdi Ansari, Jay Thornton, Raffaele DeMarco and Rudy Kleysteuber ew recent digital innovations have captured existence of such patent rights, which apply to various the business community’s imagination more components of distributed ledger technology, suggests Fthan blockchain and other distributed ledger that many of the companies building, acquiring or technologies. These technologies not only enable bitcoin, otherwise deploying distributed ledgers (or those that Ether and other cryptocurrencies or crypto-assets, some plan to do so in the future) may be at risk of patent innovators have devised diverse new commercial uses liability and litigation down the road. for them – from global supply-chain tracking, energy This article first describes and discusses the growing distribution and trading to secure digital identity volume of these patents and patent applications – along management and tamper-proof voting and elections. with the resulting risks and opportunities that arise for Some commentators predict that these systems will various players – and second proposes some potential become the new fabric of commercial exchange and will mitigation strategies to address such risks. generate hundreds of billions of dollars of economic value-add in the coming decades. While only time will tell whether distributed ledgers are a truly paradigm- shifting innovation, current figures suggest that companies are already spending several billion dollars a year to build or deploy such systems, with these amounts forecast to rise even further.
    [Show full text]