Posted on 05/04/2002 3:06:38 PM PDT by FoxPro
A company has a patent that essentially derives a fingerprint (hash, certificate, digital signature) from files on a client computer. It then sends the fingerprint to a server to see if they already possess the file. If they do, they just indicate in a database that this computer client has this particular file, and sets a pointer to it. If not the file is then backed up over the LAN/Internet (really the same thing).
My question is, is this patentable? And if it is, does this mean the whole process is patented, or are all of its parts also patented.
In other words, is it now illegal to get a fingerprint from a file, search for the fingerprint on a remote computer, without doing so, in an attempt to back the file up? Is it illegal to search for a file fingerprint if the fingerprint is derived using a different version of file fingerprinting software? If it is illegal to do this, then is it illegal to search for, say, a file name, or a customer number on a remote computer?
Or is just the combination of fingerprinting, sending the fingerprint, and therefore deciding whether to send the file in illegal? How is this to be decided, without a million dollars worth of litigation?
Hit this link for a description of what is patentable: http://web.mit.edu/invent/www/handbook/chapter03.html
Of course prior art often doesn't mean jack to those idiots at the USPTO.
In general you want to patent software in bite sized chunks (byte sized?). You want to subdivide your product into the main processes (much like you've done in you're opening paragraph) and patent each one (don't forget the UI, you can patent how the user uses your program). That way if one part won't stick you've still got a chance with others (also the patent office in notorious for saying "no patent" to things they can't wrap their head around, they're good people, they do good work, but they have their limits).
When in doubt get yourself a patent lawyer; patenting is a long, hard, annoying process and a lawyer can really help you navigate it.
Then you have to sue... The costs are reduced by getting as many as possible to join you in the cause.
The other way is to simply ignore the patent and proceed doing what you have always done. In the remote chance you are challenged by the patent holder you prove prior use using the same group.
Claim one is always an independent claim. But there are usually others scattered thru the claims.
The only thing protected by the patent are the items in the claims. Each claim stands on its own in the sense that you only have to infringe a single claim to infringe the patent. All of the elements of a claim must be included in the infringing software for there to be an infringement.
The specification (the part where the invention is described at length) is important for your purposes only insofar as it illuminates the meaning of the claims (gross oversimplification alert).
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.