ProdigyThe Promuda MouthpieceIssue 1, July 2002 |
Back to Table of Contents |
Is
E-commerce Business Model Software Patentable in Shutting
out the competition with a Government-granted monopoly By Arvindran
Kandiah
The
intense competitive pressures faced by Internet companies do not allow
them to provide generic services; each has to offer or endeavour to offer
something unique and value added to attract customers. One such method is
to develop or acquire proprietary technology and business models that
enhance the user experience, the idea being that the owner of the
technology that proves to be the biggest hit with users, wins. But
how does one protect proprietary technology once it is developed? What can
stop the competitor next door from deploying the same technology or
business model? This is where Intellectual Property Rights (IPR)
come in. Even so, acquiring the proper type
of IPR is crucial to leverage off the right granted. Usually,
and as most people assume, software is protected by copyright. This is
true for most forms of software, for example your spreadsheets, word
processors, accounting packages, e-mail clients etc. However, there are
limits to the extent of the protection that copyright provides. These
limits are what could be the turning point in establishing an effective
monopoly in the technology concerned. First of all, if a competitor
somehow independently develops the same or similar software technology, he
has a valid defence against a claim of copyright infringement. Further,
trade secrets law cannot protect against technology that is lawfully
appropriated through reverse engineering. Patents
on the other hand, although a more expensive form of protection when
compared to copyright and trade secrets, provide a much stronger legal
monopoly to the rights holder. Independent development and reverse
engineering cannot be a defence against a patent infringement suit. Also,
copyright protection awarded to features such as computer program user
interfaces has waned over the years. Most importantly in this age however
is that patents protect the functions per se performed by the software
itself, while copyright does not. Once
the patent owner holds the rights to the functions
performed by the software, he might be having a very lucrative monopoly in
his hands, other things considered. This means that if a competitor were
to develop a similar variant of the software technology which nevertheless
performes the same functions as the patented version, then that is
possible infringement. What functions are we talking about here? Let us take the example of the business method software patent held by Priceline.com. This business method involves a service which allows customers to offer a price for an airline ticket, say from destination A to destination B, at the same time giving their credit card number. Priceline automatically charges the credit card if an airline accepts the offer. Now,
if a competitor were to develop a different type of software that performs
the same functions that are claimed in the patent, i.e. matching the
customer’s needs with a willing airline and simultaneously obtaining
payment via charging the credit card, then this too might be possible
infringement. As it is quite obvious, this could be a very powerful
monopoly, for it totally bars the competition from providing the same
service. As
is usual in this field, the In Malaysia, although the ‘method of doing business’ itself is not patentable, the product used in such a method is. The question here is: Is the software programme used in a business model on the Internet a ‘product used in the method’? If
the answer is yes, then the business method model incorporating the
product is patentable. It is analogous to patenting a badminton racquet
as opposed to seeking a patent for a novel method of playing badminton or
method of service of the shuttlecock. The former is allowed to be patented
while the latter is not. The
US PTO has granted patents in a wide range of areas in this field. Below
are a few examples of those that have been granted in recent years. 1.
Title: “Method of
Transmitting a Desired Digital Video or Audio Signal”
Issued on This
patent covers a general method for transmitting digital content, for
example audio and video, on demand. Money is then transferred by a
telecommunications line to a first party who controls the content by a
second party who desires the content. The content is then stored on the
second party’s computer and can be selected for playback in any
combination. 2. Title: “System and Method for
Conducting Cashless Transactions on a Computer Network”
Issued on The
patent covers a method and system for conducting cashless transactions
through the Internet using an electronic purse built into a customer’s
computer. A financial service provider who manages the cashless
transaction service supplies a cashless transaction software to the
customer. The customer identifies to the financial service provider which
banks he is registered with. The financial service provider then loads an
amount into the purse and later settles the amount with the customer’s
bank. The bank in turn bills the customer for the amount. The customer
further has the option to reload the purse or have it done automatically
if the amount in the purse falls below a certain amount. 3.
Title:
“Secure Method and System for Communicating a List of Credit
Card Numbers Over a Non-Secure Network”
Issued on This
covers a method and system for securely reporting to a customer over a
non-secure network the credit card number the merchant has on file for the
customer. The number is retrieved from the merchant’s database, but only
a portion of the numbers is sent to the customer over the non-secure
network. The customer then confirms that he wants that particular credit
card to be charged. Since only a portion of the full credit card number is
transmitted, any third party cannot discover the complete credit card
number of the customer. Dot-com
companies that have developed novel and inventive business model software
should seriously consider seeking patent protection in Patent
protection is far superior than relying on copyright protection in
respect of the software. Copyright law only protects the expression of the
model/idea and not the concept or the interrelationship of the various
elements in the business model. Copyright law only protects the expression
of the idea and not the idea itself. Patents allow the holder to exclude others from making, using, selling or offering to sell the patented invention. Therefore the patent can be used as a ‘sword’ to stop others and thus cornering the market for the invention for oneself. Conversely, it could also be used as a shield in a patent infringement suit launched by a competitor over his own patents. An advantage can be derived by asserting one’s own patents against a plaintiff. Alternatively,
these patents can be used for cross licensing for mutual advantage
and therefore avoiding a dispute in the first place. Plus, there is also
the public relations advantage of having a patent. Company brochures that
mention that a product is patented plants in the customer’s mind the
much sought after perception that the product is indeed cutting
edge and original compared to a competing product. Inventors
should carefully work with their patent attorneys to obtain a patent that
can stand a serious invalidity challenge in the courts, for a patent that
can easily be invalidated has very limited value. A precisely crafted
patent that provides reliable coverage for the key
solution provided by the invention can sometimes give the greatest
competitive advantage. It has to be remembered that we are discussing the limits of what can be patented. Nevertheless, potential Internet patentees should not avoid seeking patent protection for their inventions. It is better to have an invalid patent that might or might not be challenged in court than to have no patent at all. The
author is an Intellectual Property executive with Kandiah & Associates
Sdn. Bhd. and can be contacted at arvin@kandiah.com.my |
Copyright(c)2002.All Rights Reserved.Promuda