spacer spacer spacer

Submarine patent torpedoed …

June 26th, 2012 by p1, Filed under: Commentary, Culture, Law, malware, OT, Virus

For some years I have been peripherally involved (hired to research prior art, etc.) in some of the submarine patent/patent troll cases in the AV world.

I’ve got plenty of prior art.  Programs demonstrating and using technologies that were granted patents years after those programs were available.  Email discussions showing that concepts were obvious and well-known years before patent applications were filed.

Of course, as the “expert” I’m not privy to the legal strategy.  Bt I can figure it out.  US patent office issues patent that never should have been granted.  Troll sues Big Firm for $100M.  BF’s lawyers go to IP law firm.  IP lawyers find me.  IP lawyers ask me for the weirdest (and generally weakest) evidence.  IP lawyers go back to BF’s lawyers.  BF’s lawyers go back to BF.  (At this point I’m not privy to the discussions, so I’m guessing.  But I suspect that …)  IP and BF lawyers advise that evidence available, but patent fight expensive.  BF offers troll $100K to go away.  Troll happy with $100K, which is all he wanted anyway.  BF lawyers happy with large (and now more secure) salaries.  IP lawyers happy with $1M fees.  BF happy to have “saved” $99M.  The only person not happy is me.

Well, Kaspersky got sued.  Kaspersky fought.  Kaspersky won.

So, today I’m happy.  (I just wish I’d been part of *this* fight …)

(By the way, patent trolls cost money …)

spacer
Using Skype Manager? no? Expect incoming fraud
  • spacer







  • Categories


spacer Subscribe

  • spacer More Securiteam

    • RealNetworks RealPlayer RV30 Uninitialized Index Value Code Execution Vulnerability
    • RealNetworks RealPlayer RV10 Sample Height Parsing Code Execution Vulnerability
    • RealNetworks RealPlayer IVR MLTI Chunk Length Parsing Code Execution Vulnerability
    • RealNetworks RealPlayer Invalid Codec Name Code Execution Vulnerability
    • RealNetwork RealPlayer MPG Width Integer Underflow Code Execution Vulnerability
    • ProFTPD Response Pool Use-After-Free Code Execution Vulnerability
    • Novell Zenworks Software Packaging LaunchHelp.dll Code Execution Vulnerability
    • Novell ZENWorks Software Packaging Antique ActiveX Control Code Execution Vulnerability
    • Microsoft Internet Explorer swapNode Handling Code Execution Vulnerability
    • Microsoft Internet Explorer Select Element Insufficient Type Checking Code Execution Vulnerability
  • New

    • Submarine patent torpedoed …
    • Using Skype Manager? no? Expect incoming fraud
    • Apple and “identity pollution”
    • Linded-Indiots in the stock market
    • Transit of venus safety tip
  • Comments

    • Guest on Using Skype Manager? no? Expect incoming fraud
    • Abhinav Srivastava on File upload security recommendations
    • Vcak on Linded-Indiots in the stock market
    • Eagle II on Google: we will share your name with anyone who asks us for it
    • Gigantt on LinkeDin!
  • Admin

    Login
  • gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.