SlideShare a Scribd company logo
1 of 8
Download to read offline
www.iam-magazine.com82 Intellectual Asset Management January/February 2015
xxx
As China pursues innovation-driven
development, IP issues are under
growing scrutiny. Multinationals
would be well advised to protect
their software by following best
practice when it comes to applying
for patents
By Li Xiang
Patenting software in
China
A multinational corporation needs a strong
and stable patent portfolio in China in
order to protect any software that it owns.
To acquire such rights, in-house counsel
should have comprehensive knowledge
of patent examination regulations for
computer program-related inventions,
along with a deep understanding of the
relevant rules and regulations. This
article provides a thorough analysis on
how to patent computer programs –
especially the subject matter – in China,
including specific patent examination
procedure and detailed explanations of
the related requirements, in order to
help users to understand and respond to
office actions from the State Intellectual
Property Office (SIPO) and draw a clear
line between patentable subject matter
and non-patentable subject matter. It also
sets out suggestions for drafting patent
applications for computer program-related
inventions in order to avoid rejection
and to help achieve a successful patent
portfolio in China.
Intellectual property in China
China’s market has been growing ever
since the country began to reform and
open up, particularly in fields such as
information technology, automobiles,
biotechnology, automation and green
energy. For multinational corporations,
China’s market is a key battlefield for
global success. And in recent years
the key to increasing market share or
competitiveness for multinationals in
China has been not only cost performance,
but also intellectual property.
Intellectual property, which has made
the United States a powerful and prosperous
nation, is now blazing a remarkable trail in
mainland China. According to SIPO’s latest
statistics, it received 825,000 invention
patent applications in 2013, up by 26.3%.
The annual number of applications for
invention patents in China – which
correspond to utility patents in the United
States – is now the highest in the world.
As China’s IP enforcement continues
to improve, more and more cases reveal the
true value and importance of intellectual
property in the Chinese market. Both
domestic and foreign companies have
noticed this and are sparing no effort to
create powerful patent portfolios in China.
The United States and Japan are the biggest
participants – according to the 2011 Annual
Report of Chinese Patents in Force, they
account for more than 35% of all valid
invention patents in China.
Running a comprehensive IP system in
a country means transforming competitive
mechanisms from product sales to IP
rights-product sales (as shown in Figure
1). This means that a company’s market
share depends not only on its product (or
cost performance), but also on the quantity
and quality of its IP rights. In other words,
commercial interests come from IP rights as
well as from products. HTC v Apple starkly
demonstrates the vital importance of strong
IP rights.
In order to ensure the early acquisition
of strong and stable IP rights, a company’s IP
Intellectual Asset Management January/February 2015 83www.iam-magazine.com
xxx
Copyright is automatically granted
and trade secret protection takes effect
after three related conditions are met.
However, a patent will not be granted until
an application has been filed with SIPO
and passes first a preliminary and then a
substantive examination, a process which
lasts 22 months on average and costs about
$600. In 2012 Microsoft raised eyebrows
when it filed over 785 patent applications
(including applications for invention
patents, utility model patents and design
patents) with SIPO. Multinationals should
make a considered decision before filing
multiple applications in this way.
Then, why patent for software?
Computer programs written in
computer programming language are a kind
of human logic, which is relatively easy to
disseminate from one skilled in the art to
another. Different computer programs can
be implemented to achieve the same target
and result, which tends to make copyright
protection virtually useless. For computer
software there is no such thing as know-
how, in the way that there is for chemistry
or biotechnology, which tends to make trade
secret protection useless. Patents, which
makes design-around difficult, are therefore
a reasonable protection choice for computer
programs, despite the cost.
Patent examination for computer
programs
For multinationals in computer-related
fields, how to acquire strong and stable
patent rights in China is not a new question,
but it remains a complicated one. The Patent
Law is revised or substantially amended
every eight years. It first entered into force
on April 1 1985, having been adopted at the
Fourth Meeting of the Standing Committee
of the Sixth National People’s Congress
on March 12 1984, and was amended in
1992, 2000 and 2008 respectively. Every
amendment has seen the law become
more mainstream, while maintaining its
own idiosyncrasies when it comes to the
examination of computer program-related
inventions. To see the whole picture, we first
need to discuss the substantive examination
of computer programs.
Examination procedure
As shown in Figure 2, a computer program-
related invention is first examined to
identify the eligibility of its claimed subject
matter, including “rules and methods
for intellectual activities” (Article 25.1.2
of the Patent Law); and to ensure that
the invention provides “new technical
solutions proposed for a product, a process
counsel should develop a deep understanding
of various IP laws in the company’s target
markets and develop a strategy for protecting
its products in different markets. For
instance, the IP counsel for a company
operating in the fields of computing,
computer software, computer hardware,
telecommunication, data processing or
automation (eg, IBM, Intel, Honeywell or
Microsoft) needs first and foremost to
understand the difference between Chinese
patent law and US patent law.
Protection for computer programs
Computer programs can be protected by
copyright according to Article 3 of the
Copyright Law, and can be registered under
the Registration of Computer Software
Copyright Procedures. Computer programs
can also be protected as trade secrets under
the Contract Law or by patents, as is the case
in the United States and the European Union.
Product 1
Product 1
Application
Product 1
Product 1
Product 2
Product 2
USPTO/SIPO IP rights
Product 3
Product 3
Consumer
Consumer
Sales
Sales
Figure 1. Transforming competitive mechanisms from product sales to IP rights-
product sales
www.iam-magazine.com84 Intellectual Asset Management January/February 2015
xxx
by a process or method steps and is to be
interpreted by an examiner as including all
different implementations of processors
which can achieve or perform those steps.
However, embodiments of processors in the
specification contain only descriptions of
computer programs (ie, software), but no
specific hardware, such as semiconductor
elements to compose the processor.
Moreover, people who are ordinarily skilled
in the art are incapable of determining other
equivalent technical solutions (eg, hardware
solutions that are not mentioned in the
specification) without a creative effort. This
can therefore constitute a reason for the
examiner to apply Article 26.4 to reject the
independent claim, as the “written claim
is not based on the written description” or
“support issue”.
In fact, this results in the rejection
of many computer program-related
inventions. It also illustrates the reason
for the emergence of virtual-device claims,
as described in Part II, Chapter 9 of the
2010 Guidelines for Patent Examination.
Virtual-device claims are found only in
China. So far, there has been no case law
involving such claims to provide guidance
on how to enforce or litigate them. If
an applicant can provide only computer
program embodiments in the description
and yet still wishes to draft a product claim,
a virtual-device claim is an easy option to
follow. Chapter 9 describes how to draft
such claims. However, how an examiner
conducts an examination under Article 26.4
deserves in-depth analysis.
Figure 3 illustrates the examination
procedure set out in Article 26.4. Procedure
P10, which is designed to examine whether
the invention described in the specification
and claims is based solely on computer
program flow, includes the following steps:
or the improvement thereof” (Article 2.2).
Article 25.1.2 sets out similar criteria to
the ‘abstract idea’ of US patent law, under
which a claimed subject matter is applied
not to the real world, but to human logic
per se (eg, a new way to play poker). A
claimed subject matter describing the
mechanisms of designing levels, balance of
weapons or races and game play in StarCraft
would be rejected by SIPO under Article
25.1.2. Article 2.2’s definition of ‘invention
patent’ is similar to the assessment of
‘technical character’ found in the European
Patent Convention. Under this, a solution
composed of computer program steps to
solve a management or a business problem
may not be a technical solution, as required
by Article 2.2.
Following the examination for claimed
subject matter, the computer program-
related invention is examined to ensure
that the “written claim shall, based on the
written description, contain a clear and
concise definition of the proposed scope of
patent protection” (Article 26.4) – which is
a different step from that taken by either the
US Patent and Trademark Office (USPTO) or
the European Patent Office (EPO).
Finally, computer program-related
inventions are examined under Articles
22.2 and 22.3 to check for novelty and
inventiveness (identical to the EPO’s
‘inventive step’) of the subject matter in the
written claims. Article 22.3 uses a three-
step analysis (from the EPO) to determine
the non-obviousness (from the USPTO)
of the subject matter in written claims, in
which the criterion of inventiveness lies
somewhere between that set out by the EPO
and the USPTO.
Of these three stages of examination,
those which that confuse foreign applicants
are the eligibility articles and Article 26.4.
Applying Article 26.4 to computer
program-related inventions
To illustrate Article 26.4 with a real
case, we have chosen Patent Cooperation
Treaty application WO2007092945,
which contains the following independent
claim: “An apparatus comprising: at least
one processor configured to perform
spectral shaping on modulation symbols to
obtain spectrally shaped symbols, and to
generate a single-carrier frequency division
multiplexing (SC-FDM) signal based on the
spectrally shaped symbols; and a memory
coupled to the at least one processor.”
The subject matter requires protection
for an apparatus which includes at least one
processor and a memory, which makes it a
product claim. The processor is described
Computer program –
related invention
A25.1.2
Eligibility Novelty and
inventiveness
Examination
procedure
A26.4 A22.2
A22.3A2.2
Figure 2. Computer program-related invention examination procedure
Intellectual Asset Management January/February 2015 85www.iam-magazine.com
xxx
matter of the claimed invention must be
patent eligible.
For example, in the case of an invention
involving management throw client/server
or browser/server software, technical
disclosures from colleagues in the R&D
department may include detailed business
logic of the software, which is not eligible
subject matter according to Article 5.1.2
because it lacks any technical features.
There is no definition of ‘technical
feature’ from SIPO or the People’s Supreme
Court, but normally scientific or technical
features (eg, hardware-related features and
data manipulation features) can help to
ensure that a technical feature is present.
When combined with technical features,
business logic is now embodied in functions
and interfaces. However, technical features
are not necessarily technical means, which
is crucial when it comes to composing
technical solutions. In order to qualify
as ‘technical means’, technical features
must perform or operate in accordance
with natural laws instead of social laws or
manmade rules.
For example, there is a function to
rearrange graphical user interface (GUI)
information and show GUI based on the
size and shape of a client screen, which
shows more readable GUI to users as in
201010108837.X. These technical features
operate in accordance with natural laws
that each client screen has a configuration
accessible through application program
interfaces, and that a full-sized GUI on a
client is more operable or readable than a
half-sized GUI.
Technical means in a solution also
require technical results, as well as
technical purpose (Article 2.2). In other
words, a technical means which is applied
to manipulate non-technical information
for a non-technical purpose only does not
fall within the definition of a ‘technical
solution’. Normally, technical solutions come
from features and advantages of computer
programs instead of operation manuals.
To be eligible, a solution based on
a computer program must demonstrate
features which operate in accordance with
natural laws or perform operations or
calculations on natural objects – including
matter, energy and information – which
changes the attributes of these objects or
generates new objects in order to reflect
man’s ability to change the natural world.
As for Article 26.4, a technical solution
based solely on computer-program flow
cannot yield a product claim.
The first way to make this support
a product claim is to include a detailed
•	 S11 to review various implementation
methods of invented technical solutions,
especially the relations between
computer programs and computer
hardware of invented technical solutions
disclosed in the specification.
•	 S12 to determine whether the
improvement of invented technical
solutions involves hardware structure
compared with the prior art.
•	 S13 to determine whether the
improvement of invented technical
solutions involves direct control from
computer programs to computer
hardware.
•	 S14 is based on the analysis of S11,
S12 and S13 to determine whether the
invention described in the specification
and claims is solely based on computer
program flow – if it is, then go to S15;
otherwise go to S16.
•	 S15 states that written claims can be
method or virtual-device claims, but
not product claims, which means that
Article 26.4 is ready to be used on such
applications.
•	 S16 states that written claims can be
method claims (ie, process claims) and
product types.
Patenting computer program-related
inventions
To patent a computer program-related
invention, there are at least five barriers
to cross – eligibility (Articles 2, 5 and 25),
clarity (Article 26.4), support (Article 26.4),
novelty (Article 22.2) and inventiveness
(Article 22.3) – as shown in Figure 2. While
there are tools that examiners can use to
reject and object to applications, there are
ways to prepare a patent application for a
computer program-related invention that
avoids obvious traps.
Overcoming barriers step by step
To draft a patent application for computer
program-related inventions, the subject
There is no definition of ‘technical
feature’ from SIPO or the People’s Supreme
Court, but normally scientific or technical
features (eg, hardware-related features and
data manipulation features) can help to
ensure that a technical feature is present
www.iam-magazine.com86 Intellectual Asset Management January/February 2015
xxx
performing a XXX-Algorism decryption
on the data block of the multimedia file
according to XXX-information from the
header” for reading method.
When it comes to monitoring data in
data-centred solutions, a method to solve
the ratio of the circumference of a circle
to its diameter using a computer program
is described in Part II, Chapter 9 of the
Guidelines for Patent Examination, with a
written claim such as the following:
A method to solve the ratio of the
circumference of a circle to its diameter
using computer programs, characterised in
that it includes the following steps:
•	 calculate the number of dots in a
square;
•	 calculate the number of dots in the
inner circle of the side square; and
•	 solve the ratio of the circumference of a
circle to its diameter using formula:
Σ count value of the dots in the circle
Σ count value of the dots in the square
×4
The guidelines offer the following
analysis of this method: “this solution
merely relates to a pure mathematical
computing method or rule executed by
computer programs, and is essentially an
abstract human thinking method, therefore,
this invention application belongs to
rules and methods for mental activities
as provided for in Article 25.1(2) and is
not patentable subject matter.” However,
there is no concrete analysis or detailed
explanation why Article 25.1.2 applies to
disclosure within the specification on the
level of circuits or well-known integrated
circuits in the art (e.g., 200810128132.7,
which claimed the priority of JP2007-
1768632007/7/5).
Another way would be to include a
detailed disclosure within both claims and
specification showing the creative software-
hardware interactions or software-caused
changes in hardware (eg, Patent Application
200710147817.1, which claimed the priority
of JP 2006-260598, and Patent Application
200910036855.9).
Tools for reviewers
If you are not responsible for drafting patent
applications, but merely review the work of
a patent agent, you have no opportunity to
implement these steps. A tool is needed to
adjust improper applications or claims and
identify claims with eligibility issues.
Patent mining in a computer-related
field is designed not only to generate
technical disclosures, but also to transform
non-technical solutions into technical
solutions. Before filing an application with
SIPO, it is advisable to conduct a quick
check to ensure that all legal barriers have
been overcome, especially with regard to
eligibility issues.
For computer program-related
applications, a quick self-check and
adjustment method emerges by rearranging
solutions in written claims from new
perspectives. This includes transforming a
user-oriented solution to a device-oriented
solution and transforming an effect-
centred solution to a data-centred solution
if necessary.
In practice, a device-oriented solution
is more acceptable than a user-oriented
one and a data-centred solution is more
acceptable than an effect-centred one.
For example, a user-oriented solution
may be drafted as: “inputting a username
and a password to log in client system.” Its
corresponding device-oriented solution
may be rearranged as follows: “receiving
and verifying a username/password pair
from the user.” An effect-centred solution
may be drafted as: “performing multimedia
data encryption and decryption, which
improves the security level of software
and ensures the enforcement of digital
copyrights.” Its corresponding data-centred
solution could be rearranged as: “acquiring
the header of a multimedia file, and
performing a XXX-Algorism encryption
on the data block of the multimedia file
according to XXX-information from the
header” for writing method and “acquiring
the header of a multimedia file, and
A26.4
Implementation in
embodiments
Changes of hardware?
Controls of hardware?
S14
S15
Method claims and
virtual-device claims
Method claims and
product claims
S16
y n
Only
disclose computer
programs
S12
S11
S12
P10
Figure 3. Examination procedure set out in Article 26.4. Procedure P10
Intellectual Asset Management January/February 2015 87www.iam-magazine.com
xxx
confer the technical character of a solution
as required for an eligible computing
algorithm.
For example, a method of automatically
computing the co-efficient of kinetic
friction using computer programs is
described in Part II, Chapter 9 of the
guidelines, with a written claim that
might include: “A method of automatically
computing the coefficient of kinetic friction
μ using computer programs, characterised
in that it includes the following steps:
(1) calculating the ratio of the position
variables, S1 and S2, of the friction plate;
(2) calculating the logarithm, logS2/S1, of
the ratio S2/S1; (3) solving the ratio of the
logarithm logS2/S1 to e.”
Although the kinetic friction in this
claim is a physical quantity, there is no
industrial target to show the technical
effect in the real world. One possible
way to upgrade this claim is to apply
this computing algorithm to a specific
engineering field like so: “A method of
controlling a product pipeline using
computer programs, comprising: (1)
receiving position variables S1 and S2
respectively from a first sensor and a
second sensor at a friction plate of the
product pipeline; (2) computing coefficient
of kinetic friction μ by μ= (log S2 – log S1)
/e; and (3) if μ is equal to or greater than
XXX, switch a XXX-type electric motor to
a ZZZ-type electric motor on the product
pipeline to keep normal operation of the
product pipeline.”
This example – which is an imaginary
scenario and assumes that there is no
similar prior art – is not intended to
act as a broad claim, but only to show
how a computing algorithm can be made
eligible for patentability with the right
presentation.
Automation
Almost all technical fields have enterprise
resource planning software to help
manage business logic and facilitate
communications, especially in automation
where computer software and hardware are
directly used to control mechanical and
electrical equipment.
For computer program-related
inventions in automation, one way to draft
claims is to construct a solution realising
external technical data processing through
the execution of a computer program. This
is a technical solution and thus patentable
subject matter. For example, there is a
method of removing image noise based on
the 3θ principle in probability statistical
theory described in Part II, Chapter 9
such a claim.
From the perspective of the technical
character of the data within the solution,
data processed in this solution includes
the dots in the square, the dots in the inner
circle and the ratio of the circumference
of the circle to its diameter. All of these
are conceptual entities or abstract
mathematical definitions and show no
connection to any real entity in the physical
world. Therefore, the data’s technical
character is not conferred, thus making the
data flow in the solution which processes
this data subject to Article 25.1.2.
Proper ways for specific technical field
Computer programs have different forms
in different technical fields, including
application and system software,
computing algorithms, computer networks,
telecommunication and automation. There
are proper ways to draft applications and,
especially, claims in each field.
According to Wikipedia, an algorithm
in mathematics and computer science
is a step-by-step procedure which is
used for calculation, data processing and
automated reasoning. For most engineers,
algorithms are abstract solutions for
abstract problems, often shown as pure
logic steps accompanying abstract concepts.
Computing algorithms are usually the key
points of inventions in various software
products and even hardware products.
Many examples in the Guidelines to
Patent Examination show which kinds of
computing algorithm are patentable and
which are not, but there are unlikely to be
any positive instructions on eligible subject
matter from SIPO. National patent offices
are in a position to offer guidance on such
issues, since detailed instructions change as
society develops and productivity improves.
For example, in the 1990s patents were not
used to protect computer programs in the
way that they are now.
More recently patents have had to fulfil
industrial targets – including functional
advantages, performance improvement, cost
saving or reduced complexity – in order to
A solution
Technical
feature
A25.1.2
Natural
laws
Technical
means
Technical
results
Technical
purpose
A2.2
Technical
solutions
Inventiveness
Novelty
A26.4
A22
Clarity and
support
A technical
solution
Allowable
solution
✔
✔ ✔
✔
Figure 4. The process for patenting
computer program-related inventions
For computer program-related
inventions in automation, one way to draft
claims is to construct a solution realising
external technical data processing through
the execution of a computer program
www.iam-magazine.com88 Intellectual Asset Management January/February 2015
xxx
possible to manufacture a potentially
allowable solution in the claims as well as
in the specification of a patent application
before filing this with SIPO, which saves
time and also prosecution costs.
Future trends
After SIPO granted a patent for
an electronic-monetary system
(ZL92113147.X) in 2002 to Citibank,
attention has been drawn to business
method patents in China, including
whether such methods are patentable,
how to determine their inventiveness and
the examination procedure for a business
method patent application.
According to the current internal patent
examination guidelines, a business method
patent may be examined and rejected if:
•	 the problem solved in the claimed
solution is determined to be non-
technical according to the background
information provided by the applicant or
common knowledge in the art (Article
2.2 – non-patentable subject matter);
•	 the alleged problem of the claimed
solution is a technical problem, but it
has been solved in the prior art in the
same way as with the claimed solution,
in which case the real or objective
problem solved in the claimed solution
can be determined as a non-technical
problem leading to a rejection based on
Article 2.2; or
•	 an examiner directly performs
an examination for novelty and
inventiveness before drilling into the
subject matter of the claimed solution
and rejects the claimed solution with
prior art or prior art on the basis of
Articles 22.2 and 22.3.
of the guidelines, with a written claim
such as: “A method for removing image
noises characterised in that it includes the
following steps: obtaining every pixel data
of the image to be processed in a computer;
computing the grey mean value and the
grey variance of the said image from the
grey values of all the image pixels; reading
the grey value of all the image pixels, and
determining whether the grey value of
every pixel is within three times variance
above or below the mean value, if yes, then
not modifying the said pixel grey value,
otherwise, regarding the pixel as a noise and
removing it by modifying its grey value.”
For computer program-related
inventions in automation, another way
to draft claims is to construct a solution
realising a measurement or testing
process control through the execution of
a computer program. For example, a liquid
viscosity measuring method controlled
by computer programs is described in
Part II, Chapter 9 of the guidelines, with
a written claim such as: “A method of
measuring liquid viscosity using computer
programs characterised in that it includes
the following steps: determining suitable
rotating speed for sensor rotor through
pre-set parameter signal processing
program in terms of liquid type; starting
the sensor rotor and making it shear rotate
in the liquid at the said rotating speed
by the sensor rotor control program, and
converting liquid sticky resistance value
detected by the sensor rotor into circuit
signal; calculating the liquid viscosity
basing on the said circuit signal by sensor
rotor signal processing program, and
sending the calculated viscosity value
to the LCD for display, or sending it to
the production control centre through
communication ports.”
In conclusion, patenting computer
program-related inventions can follow the
process illustrated in Figure 4. It is often
As China pursues innovation-driven
development, IP issues are under growing
scrutiny. As a result, multinationals would
be well advised to protect their market
share through IP rights by following best
practice in China, which includes the
following:
•	 A solution in a claim must comprise a
technical feature, according to Article
25.1.2.
•	 If it applies natural laws to become a
technical solution, it must meet the
criteria set out in Article 2.2.
•	 The technical solution must be clear
and supported by description in order
to meet Article 26.4.
•	 The technical solution must be novel
and non-obvious compared to prior
art to become an allowable solution,
according to Article 22.
Action plan
Li Xiang is former IP counsel at Zhong Tian
An Tai Information Technology, Beijing
lixiang_email@126.com
IAM69-china-software_v3

More Related Content

What's hot

Noordwijk Ip Presentation
Noordwijk Ip PresentationNoordwijk Ip Presentation
Noordwijk Ip Presentationwnhulsey
 
IPR & Cyber Laws (October - 2017) [CBSGS - Paper Solution]
IPR & Cyber Laws (October - 2017) [CBSGS - Paper Solution]IPR & Cyber Laws (October - 2017) [CBSGS - Paper Solution]
IPR & Cyber Laws (October - 2017) [CBSGS - Paper Solution]Mumbai B.Sc.IT Study
 
The fourth industrial power point presentation monday (003)
The fourth industrial power point presentation monday (003)The fourth industrial power point presentation monday (003)
The fourth industrial power point presentation monday (003)University of Johannesburg
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsKaanael S. Mbise
 
The Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola AbiloyeThe Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola AbiloyeAcas Media
 
Deep Learning & Patents - Challenges for Research & Analysis
Deep Learning & Patents - Challenges for Research & AnalysisDeep Learning & Patents - Challenges for Research & Analysis
Deep Learning & Patents - Challenges for Research & AnalysisIntellectPeritus Services
 
Npe antitrust challenges - writing sample
Npe   antitrust challenges - writing sampleNpe   antitrust challenges - writing sample
Npe antitrust challenges - writing sampleBinQiang Liu
 

What's hot (15)

Noordwijk Ip Presentation
Noordwijk Ip PresentationNoordwijk Ip Presentation
Noordwijk Ip Presentation
 
IPR & Cyber Laws (October - 2017) [CBSGS - Paper Solution]
IPR & Cyber Laws (October - 2017) [CBSGS - Paper Solution]IPR & Cyber Laws (October - 2017) [CBSGS - Paper Solution]
IPR & Cyber Laws (October - 2017) [CBSGS - Paper Solution]
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
New developments of copy right law
New developments of copy right law New developments of copy right law
New developments of copy right law
 
The fourth industrial power point presentation monday (003)
The fourth industrial power point presentation monday (003)The fourth industrial power point presentation monday (003)
The fourth industrial power point presentation monday (003)
 
Chapter 7_dp-pertemuan_11
 Chapter 7_dp-pertemuan_11 Chapter 7_dp-pertemuan_11
Chapter 7_dp-pertemuan_11
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Blockchain Innovation Superpower Infographic
Blockchain Innovation Superpower InfographicBlockchain Innovation Superpower Infographic
Blockchain Innovation Superpower Infographic
 
The Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola AbiloyeThe Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola Abiloye
 
Deep Learning & Patents - Challenges for Research & Analysis
Deep Learning & Patents - Challenges for Research & AnalysisDeep Learning & Patents - Challenges for Research & Analysis
Deep Learning & Patents - Challenges for Research & Analysis
 
IoT Innovation Superpower Infographic
IoT Innovation Superpower InfographicIoT Innovation Superpower Infographic
IoT Innovation Superpower Infographic
 
Npe antitrust challenges - writing sample
Npe   antitrust challenges - writing sampleNpe   antitrust challenges - writing sample
Npe antitrust challenges - writing sample
 
Chapter 8_dp-pertemuan_12-13
 Chapter 8_dp-pertemuan_12-13 Chapter 8_dp-pertemuan_12-13
Chapter 8_dp-pertemuan_12-13
 
AI Innovation Superpower Infographic
AI Innovation Superpower InfographicAI Innovation Superpower Infographic
AI Innovation Superpower Infographic
 
IIPTA BROCHURE
IIPTA BROCHUREIIPTA BROCHURE
IIPTA BROCHURE
 

Similar to IAM69-china-software_v3

120208-NYLJ-Kass-and-Reese[2]
120208-NYLJ-Kass-and-Reese[2]120208-NYLJ-Kass-and-Reese[2]
120208-NYLJ-Kass-and-Reese[2]Lawrence Kass
 
Internet of Things (IoT) Strategic Patent Development 4Q 2015
Internet of Things (IoT) Strategic Patent Development 4Q 2015Internet of Things (IoT) Strategic Patent Development 4Q 2015
Internet of Things (IoT) Strategic Patent Development 4Q 2015Alex G. Lee, Ph.D. Esq. CLP
 
IPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdf
IPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdfIPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdf
IPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdfEssentiality Check
 
Thecopyrightprotectionsoftware
ThecopyrightprotectionsoftwareThecopyrightprotectionsoftware
Thecopyrightprotectionsoftwarekikanovais
 
Comparative & International Software Patent Issues
Comparative & International Software Patent IssuesComparative & International Software Patent Issues
Comparative & International Software Patent IssuesPatterson Thuente IP
 
Substantive patent law treaty
Substantive patent law treatySubstantive patent law treaty
Substantive patent law treatyRonak Karanpuria
 
international laws and reverse engineering
international laws and reverse engineeringinternational laws and reverse engineering
international laws and reverse engineeringwelcometofacebook
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxjameshagwen
 
On Software Patenting
On Software PatentingOn Software Patenting
On Software PatentingDong Calmada
 
Intellectual Property Rights (IPR) of Computer Software
Intellectual Property Rights (IPR) of Computer SoftwareIntellectual Property Rights (IPR) of Computer Software
Intellectual Property Rights (IPR) of Computer SoftwareManjulaSandirigama
 
Copyright Protection
Copyright ProtectionCopyright Protection
Copyright ProtectionGrittyCC
 
Unpacking the Royalty Stack
Unpacking the Royalty StackUnpacking the Royalty Stack
Unpacking the Royalty StackErik Oliver
 
Software patentability
Software patentabilitySoftware patentability
Software patentabilityIshan Gupta
 
Software Patents in India - How to File a Patent Application
Software Patents in India - How to File a Patent ApplicationSoftware Patents in India - How to File a Patent Application
Software Patents in India - How to File a Patent ApplicationRahul Dev
 
Internet of Things (IoT) Strategic Patent Development Best Practice
Internet of Things (IoT) Strategic Patent Development Best PracticeInternet of Things (IoT) Strategic Patent Development Best Practice
Internet of Things (IoT) Strategic Patent Development Best PracticeAlex G. Lee, Ph.D. Esq. CLP
 
Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...
Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...
Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...Knobbe Martens - Intellectual Property Law
 
Software & Patenting: IP Outside Your Comfort Zone
Software & Patenting: IP Outside Your Comfort ZoneSoftware & Patenting: IP Outside Your Comfort Zone
Software & Patenting: IP Outside Your Comfort ZoneBen Hoyle
 

Similar to IAM69-china-software_v3 (20)

120208-NYLJ-Kass-and-Reese[2]
120208-NYLJ-Kass-and-Reese[2]120208-NYLJ-Kass-and-Reese[2]
120208-NYLJ-Kass-and-Reese[2]
 
Internet of Things (IoT) Strategic Patent Development 4Q 2015
Internet of Things (IoT) Strategic Patent Development 4Q 2015Internet of Things (IoT) Strategic Patent Development 4Q 2015
Internet of Things (IoT) Strategic Patent Development 4Q 2015
 
IPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdf
IPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdfIPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdf
IPCG-"AI in IP Webinar No. 4 - Dennis J Duncan.pdf
 
Thecopyrightprotectionsoftware
ThecopyrightprotectionsoftwareThecopyrightprotectionsoftware
Thecopyrightprotectionsoftware
 
Comparative & International Software Patent Issues
Comparative & International Software Patent IssuesComparative & International Software Patent Issues
Comparative & International Software Patent Issues
 
Software patents
Software patents Software patents
Software patents
 
Substantive patent law treaty
Substantive patent law treatySubstantive patent law treaty
Substantive patent law treaty
 
IPR in software
IPR in software IPR in software
IPR in software
 
international laws and reverse engineering
international laws and reverse engineeringinternational laws and reverse engineering
international laws and reverse engineering
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 
On Software Patenting
On Software PatentingOn Software Patenting
On Software Patenting
 
Intellectual Property Rights (IPR) of Computer Software
Intellectual Property Rights (IPR) of Computer SoftwareIntellectual Property Rights (IPR) of Computer Software
Intellectual Property Rights (IPR) of Computer Software
 
Business Method Patents
Business Method PatentsBusiness Method Patents
Business Method Patents
 
Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
 
Unpacking the Royalty Stack
Unpacking the Royalty StackUnpacking the Royalty Stack
Unpacking the Royalty Stack
 
Software patentability
Software patentabilitySoftware patentability
Software patentability
 
Software Patents in India - How to File a Patent Application
Software Patents in India - How to File a Patent ApplicationSoftware Patents in India - How to File a Patent Application
Software Patents in India - How to File a Patent Application
 
Internet of Things (IoT) Strategic Patent Development Best Practice
Internet of Things (IoT) Strategic Patent Development Best PracticeInternet of Things (IoT) Strategic Patent Development Best Practice
Internet of Things (IoT) Strategic Patent Development Best Practice
 
Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...
Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...
Protecting Your Intellectual Property: Cost-Saving Techniques, Legal Updates ...
 
Software & Patenting: IP Outside Your Comfort Zone
Software & Patenting: IP Outside Your Comfort ZoneSoftware & Patenting: IP Outside Your Comfort Zone
Software & Patenting: IP Outside Your Comfort Zone
 

IAM69-china-software_v3

  • 1. www.iam-magazine.com82 Intellectual Asset Management January/February 2015 xxx As China pursues innovation-driven development, IP issues are under growing scrutiny. Multinationals would be well advised to protect their software by following best practice when it comes to applying for patents By Li Xiang Patenting software in China A multinational corporation needs a strong and stable patent portfolio in China in order to protect any software that it owns. To acquire such rights, in-house counsel should have comprehensive knowledge of patent examination regulations for computer program-related inventions, along with a deep understanding of the relevant rules and regulations. This article provides a thorough analysis on how to patent computer programs – especially the subject matter – in China, including specific patent examination procedure and detailed explanations of the related requirements, in order to help users to understand and respond to office actions from the State Intellectual Property Office (SIPO) and draw a clear line between patentable subject matter and non-patentable subject matter. It also sets out suggestions for drafting patent applications for computer program-related inventions in order to avoid rejection and to help achieve a successful patent portfolio in China. Intellectual property in China China’s market has been growing ever since the country began to reform and open up, particularly in fields such as information technology, automobiles, biotechnology, automation and green energy. For multinational corporations, China’s market is a key battlefield for global success. And in recent years the key to increasing market share or competitiveness for multinationals in China has been not only cost performance, but also intellectual property. Intellectual property, which has made the United States a powerful and prosperous nation, is now blazing a remarkable trail in mainland China. According to SIPO’s latest statistics, it received 825,000 invention patent applications in 2013, up by 26.3%. The annual number of applications for invention patents in China – which correspond to utility patents in the United States – is now the highest in the world. As China’s IP enforcement continues to improve, more and more cases reveal the true value and importance of intellectual property in the Chinese market. Both domestic and foreign companies have noticed this and are sparing no effort to create powerful patent portfolios in China. The United States and Japan are the biggest participants – according to the 2011 Annual Report of Chinese Patents in Force, they account for more than 35% of all valid invention patents in China. Running a comprehensive IP system in a country means transforming competitive mechanisms from product sales to IP rights-product sales (as shown in Figure 1). This means that a company’s market share depends not only on its product (or cost performance), but also on the quantity and quality of its IP rights. In other words, commercial interests come from IP rights as well as from products. HTC v Apple starkly demonstrates the vital importance of strong IP rights. In order to ensure the early acquisition of strong and stable IP rights, a company’s IP
  • 2. Intellectual Asset Management January/February 2015 83www.iam-magazine.com xxx Copyright is automatically granted and trade secret protection takes effect after three related conditions are met. However, a patent will not be granted until an application has been filed with SIPO and passes first a preliminary and then a substantive examination, a process which lasts 22 months on average and costs about $600. In 2012 Microsoft raised eyebrows when it filed over 785 patent applications (including applications for invention patents, utility model patents and design patents) with SIPO. Multinationals should make a considered decision before filing multiple applications in this way. Then, why patent for software? Computer programs written in computer programming language are a kind of human logic, which is relatively easy to disseminate from one skilled in the art to another. Different computer programs can be implemented to achieve the same target and result, which tends to make copyright protection virtually useless. For computer software there is no such thing as know- how, in the way that there is for chemistry or biotechnology, which tends to make trade secret protection useless. Patents, which makes design-around difficult, are therefore a reasonable protection choice for computer programs, despite the cost. Patent examination for computer programs For multinationals in computer-related fields, how to acquire strong and stable patent rights in China is not a new question, but it remains a complicated one. The Patent Law is revised or substantially amended every eight years. It first entered into force on April 1 1985, having been adopted at the Fourth Meeting of the Standing Committee of the Sixth National People’s Congress on March 12 1984, and was amended in 1992, 2000 and 2008 respectively. Every amendment has seen the law become more mainstream, while maintaining its own idiosyncrasies when it comes to the examination of computer program-related inventions. To see the whole picture, we first need to discuss the substantive examination of computer programs. Examination procedure As shown in Figure 2, a computer program- related invention is first examined to identify the eligibility of its claimed subject matter, including “rules and methods for intellectual activities” (Article 25.1.2 of the Patent Law); and to ensure that the invention provides “new technical solutions proposed for a product, a process counsel should develop a deep understanding of various IP laws in the company’s target markets and develop a strategy for protecting its products in different markets. For instance, the IP counsel for a company operating in the fields of computing, computer software, computer hardware, telecommunication, data processing or automation (eg, IBM, Intel, Honeywell or Microsoft) needs first and foremost to understand the difference between Chinese patent law and US patent law. Protection for computer programs Computer programs can be protected by copyright according to Article 3 of the Copyright Law, and can be registered under the Registration of Computer Software Copyright Procedures. Computer programs can also be protected as trade secrets under the Contract Law or by patents, as is the case in the United States and the European Union. Product 1 Product 1 Application Product 1 Product 1 Product 2 Product 2 USPTO/SIPO IP rights Product 3 Product 3 Consumer Consumer Sales Sales Figure 1. Transforming competitive mechanisms from product sales to IP rights- product sales
  • 3. www.iam-magazine.com84 Intellectual Asset Management January/February 2015 xxx by a process or method steps and is to be interpreted by an examiner as including all different implementations of processors which can achieve or perform those steps. However, embodiments of processors in the specification contain only descriptions of computer programs (ie, software), but no specific hardware, such as semiconductor elements to compose the processor. Moreover, people who are ordinarily skilled in the art are incapable of determining other equivalent technical solutions (eg, hardware solutions that are not mentioned in the specification) without a creative effort. This can therefore constitute a reason for the examiner to apply Article 26.4 to reject the independent claim, as the “written claim is not based on the written description” or “support issue”. In fact, this results in the rejection of many computer program-related inventions. It also illustrates the reason for the emergence of virtual-device claims, as described in Part II, Chapter 9 of the 2010 Guidelines for Patent Examination. Virtual-device claims are found only in China. So far, there has been no case law involving such claims to provide guidance on how to enforce or litigate them. If an applicant can provide only computer program embodiments in the description and yet still wishes to draft a product claim, a virtual-device claim is an easy option to follow. Chapter 9 describes how to draft such claims. However, how an examiner conducts an examination under Article 26.4 deserves in-depth analysis. Figure 3 illustrates the examination procedure set out in Article 26.4. Procedure P10, which is designed to examine whether the invention described in the specification and claims is based solely on computer program flow, includes the following steps: or the improvement thereof” (Article 2.2). Article 25.1.2 sets out similar criteria to the ‘abstract idea’ of US patent law, under which a claimed subject matter is applied not to the real world, but to human logic per se (eg, a new way to play poker). A claimed subject matter describing the mechanisms of designing levels, balance of weapons or races and game play in StarCraft would be rejected by SIPO under Article 25.1.2. Article 2.2’s definition of ‘invention patent’ is similar to the assessment of ‘technical character’ found in the European Patent Convention. Under this, a solution composed of computer program steps to solve a management or a business problem may not be a technical solution, as required by Article 2.2. Following the examination for claimed subject matter, the computer program- related invention is examined to ensure that the “written claim shall, based on the written description, contain a clear and concise definition of the proposed scope of patent protection” (Article 26.4) – which is a different step from that taken by either the US Patent and Trademark Office (USPTO) or the European Patent Office (EPO). Finally, computer program-related inventions are examined under Articles 22.2 and 22.3 to check for novelty and inventiveness (identical to the EPO’s ‘inventive step’) of the subject matter in the written claims. Article 22.3 uses a three- step analysis (from the EPO) to determine the non-obviousness (from the USPTO) of the subject matter in written claims, in which the criterion of inventiveness lies somewhere between that set out by the EPO and the USPTO. Of these three stages of examination, those which that confuse foreign applicants are the eligibility articles and Article 26.4. Applying Article 26.4 to computer program-related inventions To illustrate Article 26.4 with a real case, we have chosen Patent Cooperation Treaty application WO2007092945, which contains the following independent claim: “An apparatus comprising: at least one processor configured to perform spectral shaping on modulation symbols to obtain spectrally shaped symbols, and to generate a single-carrier frequency division multiplexing (SC-FDM) signal based on the spectrally shaped symbols; and a memory coupled to the at least one processor.” The subject matter requires protection for an apparatus which includes at least one processor and a memory, which makes it a product claim. The processor is described Computer program – related invention A25.1.2 Eligibility Novelty and inventiveness Examination procedure A26.4 A22.2 A22.3A2.2 Figure 2. Computer program-related invention examination procedure
  • 4. Intellectual Asset Management January/February 2015 85www.iam-magazine.com xxx matter of the claimed invention must be patent eligible. For example, in the case of an invention involving management throw client/server or browser/server software, technical disclosures from colleagues in the R&D department may include detailed business logic of the software, which is not eligible subject matter according to Article 5.1.2 because it lacks any technical features. There is no definition of ‘technical feature’ from SIPO or the People’s Supreme Court, but normally scientific or technical features (eg, hardware-related features and data manipulation features) can help to ensure that a technical feature is present. When combined with technical features, business logic is now embodied in functions and interfaces. However, technical features are not necessarily technical means, which is crucial when it comes to composing technical solutions. In order to qualify as ‘technical means’, technical features must perform or operate in accordance with natural laws instead of social laws or manmade rules. For example, there is a function to rearrange graphical user interface (GUI) information and show GUI based on the size and shape of a client screen, which shows more readable GUI to users as in 201010108837.X. These technical features operate in accordance with natural laws that each client screen has a configuration accessible through application program interfaces, and that a full-sized GUI on a client is more operable or readable than a half-sized GUI. Technical means in a solution also require technical results, as well as technical purpose (Article 2.2). In other words, a technical means which is applied to manipulate non-technical information for a non-technical purpose only does not fall within the definition of a ‘technical solution’. Normally, technical solutions come from features and advantages of computer programs instead of operation manuals. To be eligible, a solution based on a computer program must demonstrate features which operate in accordance with natural laws or perform operations or calculations on natural objects – including matter, energy and information – which changes the attributes of these objects or generates new objects in order to reflect man’s ability to change the natural world. As for Article 26.4, a technical solution based solely on computer-program flow cannot yield a product claim. The first way to make this support a product claim is to include a detailed • S11 to review various implementation methods of invented technical solutions, especially the relations between computer programs and computer hardware of invented technical solutions disclosed in the specification. • S12 to determine whether the improvement of invented technical solutions involves hardware structure compared with the prior art. • S13 to determine whether the improvement of invented technical solutions involves direct control from computer programs to computer hardware. • S14 is based on the analysis of S11, S12 and S13 to determine whether the invention described in the specification and claims is solely based on computer program flow – if it is, then go to S15; otherwise go to S16. • S15 states that written claims can be method or virtual-device claims, but not product claims, which means that Article 26.4 is ready to be used on such applications. • S16 states that written claims can be method claims (ie, process claims) and product types. Patenting computer program-related inventions To patent a computer program-related invention, there are at least five barriers to cross – eligibility (Articles 2, 5 and 25), clarity (Article 26.4), support (Article 26.4), novelty (Article 22.2) and inventiveness (Article 22.3) – as shown in Figure 2. While there are tools that examiners can use to reject and object to applications, there are ways to prepare a patent application for a computer program-related invention that avoids obvious traps. Overcoming barriers step by step To draft a patent application for computer program-related inventions, the subject There is no definition of ‘technical feature’ from SIPO or the People’s Supreme Court, but normally scientific or technical features (eg, hardware-related features and data manipulation features) can help to ensure that a technical feature is present
  • 5. www.iam-magazine.com86 Intellectual Asset Management January/February 2015 xxx performing a XXX-Algorism decryption on the data block of the multimedia file according to XXX-information from the header” for reading method. When it comes to monitoring data in data-centred solutions, a method to solve the ratio of the circumference of a circle to its diameter using a computer program is described in Part II, Chapter 9 of the Guidelines for Patent Examination, with a written claim such as the following: A method to solve the ratio of the circumference of a circle to its diameter using computer programs, characterised in that it includes the following steps: • calculate the number of dots in a square; • calculate the number of dots in the inner circle of the side square; and • solve the ratio of the circumference of a circle to its diameter using formula: Σ count value of the dots in the circle Σ count value of the dots in the square ×4 The guidelines offer the following analysis of this method: “this solution merely relates to a pure mathematical computing method or rule executed by computer programs, and is essentially an abstract human thinking method, therefore, this invention application belongs to rules and methods for mental activities as provided for in Article 25.1(2) and is not patentable subject matter.” However, there is no concrete analysis or detailed explanation why Article 25.1.2 applies to disclosure within the specification on the level of circuits or well-known integrated circuits in the art (e.g., 200810128132.7, which claimed the priority of JP2007- 1768632007/7/5). Another way would be to include a detailed disclosure within both claims and specification showing the creative software- hardware interactions or software-caused changes in hardware (eg, Patent Application 200710147817.1, which claimed the priority of JP 2006-260598, and Patent Application 200910036855.9). Tools for reviewers If you are not responsible for drafting patent applications, but merely review the work of a patent agent, you have no opportunity to implement these steps. A tool is needed to adjust improper applications or claims and identify claims with eligibility issues. Patent mining in a computer-related field is designed not only to generate technical disclosures, but also to transform non-technical solutions into technical solutions. Before filing an application with SIPO, it is advisable to conduct a quick check to ensure that all legal barriers have been overcome, especially with regard to eligibility issues. For computer program-related applications, a quick self-check and adjustment method emerges by rearranging solutions in written claims from new perspectives. This includes transforming a user-oriented solution to a device-oriented solution and transforming an effect- centred solution to a data-centred solution if necessary. In practice, a device-oriented solution is more acceptable than a user-oriented one and a data-centred solution is more acceptable than an effect-centred one. For example, a user-oriented solution may be drafted as: “inputting a username and a password to log in client system.” Its corresponding device-oriented solution may be rearranged as follows: “receiving and verifying a username/password pair from the user.” An effect-centred solution may be drafted as: “performing multimedia data encryption and decryption, which improves the security level of software and ensures the enforcement of digital copyrights.” Its corresponding data-centred solution could be rearranged as: “acquiring the header of a multimedia file, and performing a XXX-Algorism encryption on the data block of the multimedia file according to XXX-information from the header” for writing method and “acquiring the header of a multimedia file, and A26.4 Implementation in embodiments Changes of hardware? Controls of hardware? S14 S15 Method claims and virtual-device claims Method claims and product claims S16 y n Only disclose computer programs S12 S11 S12 P10 Figure 3. Examination procedure set out in Article 26.4. Procedure P10
  • 6. Intellectual Asset Management January/February 2015 87www.iam-magazine.com xxx confer the technical character of a solution as required for an eligible computing algorithm. For example, a method of automatically computing the co-efficient of kinetic friction using computer programs is described in Part II, Chapter 9 of the guidelines, with a written claim that might include: “A method of automatically computing the coefficient of kinetic friction μ using computer programs, characterised in that it includes the following steps: (1) calculating the ratio of the position variables, S1 and S2, of the friction plate; (2) calculating the logarithm, logS2/S1, of the ratio S2/S1; (3) solving the ratio of the logarithm logS2/S1 to e.” Although the kinetic friction in this claim is a physical quantity, there is no industrial target to show the technical effect in the real world. One possible way to upgrade this claim is to apply this computing algorithm to a specific engineering field like so: “A method of controlling a product pipeline using computer programs, comprising: (1) receiving position variables S1 and S2 respectively from a first sensor and a second sensor at a friction plate of the product pipeline; (2) computing coefficient of kinetic friction μ by μ= (log S2 – log S1) /e; and (3) if μ is equal to or greater than XXX, switch a XXX-type electric motor to a ZZZ-type electric motor on the product pipeline to keep normal operation of the product pipeline.” This example – which is an imaginary scenario and assumes that there is no similar prior art – is not intended to act as a broad claim, but only to show how a computing algorithm can be made eligible for patentability with the right presentation. Automation Almost all technical fields have enterprise resource planning software to help manage business logic and facilitate communications, especially in automation where computer software and hardware are directly used to control mechanical and electrical equipment. For computer program-related inventions in automation, one way to draft claims is to construct a solution realising external technical data processing through the execution of a computer program. This is a technical solution and thus patentable subject matter. For example, there is a method of removing image noise based on the 3θ principle in probability statistical theory described in Part II, Chapter 9 such a claim. From the perspective of the technical character of the data within the solution, data processed in this solution includes the dots in the square, the dots in the inner circle and the ratio of the circumference of the circle to its diameter. All of these are conceptual entities or abstract mathematical definitions and show no connection to any real entity in the physical world. Therefore, the data’s technical character is not conferred, thus making the data flow in the solution which processes this data subject to Article 25.1.2. Proper ways for specific technical field Computer programs have different forms in different technical fields, including application and system software, computing algorithms, computer networks, telecommunication and automation. There are proper ways to draft applications and, especially, claims in each field. According to Wikipedia, an algorithm in mathematics and computer science is a step-by-step procedure which is used for calculation, data processing and automated reasoning. For most engineers, algorithms are abstract solutions for abstract problems, often shown as pure logic steps accompanying abstract concepts. Computing algorithms are usually the key points of inventions in various software products and even hardware products. Many examples in the Guidelines to Patent Examination show which kinds of computing algorithm are patentable and which are not, but there are unlikely to be any positive instructions on eligible subject matter from SIPO. National patent offices are in a position to offer guidance on such issues, since detailed instructions change as society develops and productivity improves. For example, in the 1990s patents were not used to protect computer programs in the way that they are now. More recently patents have had to fulfil industrial targets – including functional advantages, performance improvement, cost saving or reduced complexity – in order to A solution Technical feature A25.1.2 Natural laws Technical means Technical results Technical purpose A2.2 Technical solutions Inventiveness Novelty A26.4 A22 Clarity and support A technical solution Allowable solution ✔ ✔ ✔ ✔ Figure 4. The process for patenting computer program-related inventions For computer program-related inventions in automation, one way to draft claims is to construct a solution realising external technical data processing through the execution of a computer program
  • 7. www.iam-magazine.com88 Intellectual Asset Management January/February 2015 xxx possible to manufacture a potentially allowable solution in the claims as well as in the specification of a patent application before filing this with SIPO, which saves time and also prosecution costs. Future trends After SIPO granted a patent for an electronic-monetary system (ZL92113147.X) in 2002 to Citibank, attention has been drawn to business method patents in China, including whether such methods are patentable, how to determine their inventiveness and the examination procedure for a business method patent application. According to the current internal patent examination guidelines, a business method patent may be examined and rejected if: • the problem solved in the claimed solution is determined to be non- technical according to the background information provided by the applicant or common knowledge in the art (Article 2.2 – non-patentable subject matter); • the alleged problem of the claimed solution is a technical problem, but it has been solved in the prior art in the same way as with the claimed solution, in which case the real or objective problem solved in the claimed solution can be determined as a non-technical problem leading to a rejection based on Article 2.2; or • an examiner directly performs an examination for novelty and inventiveness before drilling into the subject matter of the claimed solution and rejects the claimed solution with prior art or prior art on the basis of Articles 22.2 and 22.3. of the guidelines, with a written claim such as: “A method for removing image noises characterised in that it includes the following steps: obtaining every pixel data of the image to be processed in a computer; computing the grey mean value and the grey variance of the said image from the grey values of all the image pixels; reading the grey value of all the image pixels, and determining whether the grey value of every pixel is within three times variance above or below the mean value, if yes, then not modifying the said pixel grey value, otherwise, regarding the pixel as a noise and removing it by modifying its grey value.” For computer program-related inventions in automation, another way to draft claims is to construct a solution realising a measurement or testing process control through the execution of a computer program. For example, a liquid viscosity measuring method controlled by computer programs is described in Part II, Chapter 9 of the guidelines, with a written claim such as: “A method of measuring liquid viscosity using computer programs characterised in that it includes the following steps: determining suitable rotating speed for sensor rotor through pre-set parameter signal processing program in terms of liquid type; starting the sensor rotor and making it shear rotate in the liquid at the said rotating speed by the sensor rotor control program, and converting liquid sticky resistance value detected by the sensor rotor into circuit signal; calculating the liquid viscosity basing on the said circuit signal by sensor rotor signal processing program, and sending the calculated viscosity value to the LCD for display, or sending it to the production control centre through communication ports.” In conclusion, patenting computer program-related inventions can follow the process illustrated in Figure 4. It is often As China pursues innovation-driven development, IP issues are under growing scrutiny. As a result, multinationals would be well advised to protect their market share through IP rights by following best practice in China, which includes the following: • A solution in a claim must comprise a technical feature, according to Article 25.1.2. • If it applies natural laws to become a technical solution, it must meet the criteria set out in Article 2.2. • The technical solution must be clear and supported by description in order to meet Article 26.4. • The technical solution must be novel and non-obvious compared to prior art to become an allowable solution, according to Article 22. Action plan Li Xiang is former IP counsel at Zhong Tian An Tai Information Technology, Beijing lixiang_email@126.com