SlideShare a Scribd company logo
Patents and Open Source
Known and Unknown Risks
Adam Kessel
Principal, Fish & Richardson P.C.
Roadmap
• Can patents and open source coexist?
• Open source license patent provisions
• Patent (and other) risks raised by open source
• Litigation case studies
• Best practices / playbook
Can patents and
open source coexist?
Quick Intro to Software Patents – Why Get Patents?
• Freedom of Action
• Deter attacks by operating companies
• Cross-licensing
• Out-licensing
• Counterclaims
• Deter copying by competitors
• Deter trade secret misappropriation
• Add value to business deals
• Independent profit center
• Licensing and/or sales
Quick Intro to Software Patents – Why Not Get Patents?
• Legal expense/uncertain ROI
• Engineering distraction
• Eliminates trade secret protection
• Shifting landscape may reduce value
• Bilski/Alice (2008/2014) – patentability questions, particularly for software
• eBay (2006) – injunctive relief harder to get
• KSR (2007) – easier to prove patents obvious
• PTAB proceedings under the America Invents Act (2012) – easier to challenge
validity, uneven playing field, litigation often stayed
• TC Heartland (2017) - patent owner has less control over venue
• Bad P.R. for some audiences, including open source community
Why are patents useful in open source context?
• “offensive” use
• Patent claim scope often differs from OS license scope
• Patent rights to complement copyright/license/contract/unfair competition claims to
pursue bad actors
• Dual licensing
• Against use of the invention outside the open source project (this may encourage
adoption of the open source project)
• where the invention is incorporated in open source projects but was not part
of your company’s contribution
• Inventions that are related to but not part of the contribution (or the combination of
the contribution with the work)
• Can still be sold/licensed to third parties with separate interests
Why are patents useful in open source context?
• “defensive” use
• All the same reasons as for offensive use; and
• If you are sued on the work you can often counterclaim on the same subject
matter
• If you stop using the open source code and don’t plan to use it again
• Prevent others from filing on same idea; create prior art and record of first
invention at Patent Office
• Particularly important in post-AIA “first to file” system
Can a patent owner get relief if it also practices open source?
• Royalty free cross-licensing does not preclude reasonable royalty
• Multiple networked royalty free cross-licenses, e.g., OIN, LOT, W3C, etc, that
have thrived despite the potential for similar argument in those contexts
• Injunctions are already difficult in U.S. patent litigation; any licensing, including
open-source licensing, may weigh against injunctive relief
• From a defensive perspective, where an accused infringer’s software is open
source (and thus “free”), may complicate the patent owner’s damages theory
Open source license
patent provisions
Patent clauses in open-source licenses generally fall into one of three categories:
• Patent licenses (or covenants not to sue);
• Who grants the license?
Generally, only contributors (including in some cases modifying distributors or arguably pass-through distributors) -
however read the provisions of the OS license, e.g., the copyleft license, at issue.
• Which patents does the license include?
a) The contribution alone or b) The combination of the Contribution with the Work (see e.g., Apache 2.0)
• Which activities does the license allow?
• Defensive termination
• Apache 2.0 used by Apache Project, Cloud Foundry, etc
• Facebook react.js BSD+patents (deprecated in 2017)
• Other patent provisions
• GPL v3 provision regarding entering into restrictive patent licenses
• Custom patent licenses, including field of use limitations, that supplement common OS licenses
Open Source Patent Provisions
Open Source Patent Provisions
• Pass-through
distributor (PTD)
• Modifying distributor
(MD)
Open
Source
Code
Open
Source
Code
Contributors
PTD
Distribution
Open
Source
Code
Modified
Version
Contributors
MD
Distribution
Open Source Patent Provisions
Which activities does the license allow?
• Patent licenses do not typically allow:
(a) Infringement based on downstream modification to
the contributor version
(b) Infringement based on combinations of the
contributor version with other software or hardware;
and
(c) Claims infringed by the OS software without the
contribution
• Apache
• Subject to the terms and conditions of this License, each Contributor hereby grants to You a
perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in
this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise
transfer the Work, where such license applies only to those patent claims licensable by such
Contributor that are necessarily infringed by their Contribution(s) alone or by combination of
their Contribution(s) with the Work to which such Contribution(s) was submitted.
• MIT
• Permission is hereby granted, free of charge, to any person obtaining a copy of this software
and associated documentation files (the "Software"), to deal in the Software without restriction,
including without limitation the rights to use, copy, modify, merge, publish, distribute,
sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions…
Open Source Patent Provisions – Grant of License
• GPL 2.0
• You may modify your copy or copies of the Program or any portion of
it…provided that you…cause any work that you distribute or publish…to be
licensed as a whole at no charge to all third parties under the terms of this
License.
• Each time you redistribute the Program (or any work based on the Program),
the recipient automatically receives a license from the original licensor to copy,
distribute or modify the Program subject to these terms and conditions. You
may not impose any further restrictions on the recipients' exercise of the rights
granted herein.
Open Source Patent Provisions – Grant of License
• GPL 3.0
• Each contributor grants you a non-exclusive, worldwide, royalty-free patent
license under the contributor's essential patent claims, to make, use, sell, offer
for sale, import and otherwise run, modify and propagate the contents of its
contributor version.
• A contributor's “essential patent claims” are all patent claims owned or
controlled by the contributor, whether already acquired or hereafter acquired,
that would be infringed by some manner, permitted by this License, of making,
using, or selling its contributor version, but do not include claims that would be
infringed only as a consequence of further modification of the contributor
version. For purposes of this definition, “control” includes the right to grant
patent sublicenses in a manner consistent with the requirements of this
License.
Open Source Patent Provisions – Grant of License
Defensive Termination Provisions (e.g. Apache 2.0)
• Apache provision:
• "If You institute patent litigation against any entity (including a cross-claim or counterclaim
in a lawsuit) alleging that the Work or a Contribution incorporated within the Work
constitutes direct or contributory patent infringement, then any patent licenses granted to
You under this License for that Work shall terminate as of the date such litigation is filed.“
• Which claims trigger the provision?
• Which rights are terminated?
• Can the license be restored?
Open Source Patent Provisions – Defensive Termination
GPL 2.0
• Prohibits distribution where patent royalties are required
• If, as a consequence of a court judgment or allegation of patent infringement or for any other
reason (not limited to patent issues), conditions are imposed on you (whether by court order,
agreement or otherwise) that contradict the conditions of this License, they do not excuse you
from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your
obligations under this License and any other pertinent obligations, then as a consequence you
may not distribute the Program at all. For example, if a patent license would not permit royalty-
free redistribution of the Program by all those who receive copies directly or indirectly through
you, then the only way you could satisfy both it and this License would be to refrain entirely
from distribution of the Program.
Open Source Patent Provisions – Anti-Discrimination
GPL 3.0
• Explicitly prohibits discriminatory licenses
• A patent license is “discriminatory” if it does not include within the scope of its coverage,
prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that
are specifically granted under this License. You may not convey a covered work if you are a
party to an arrangement with a third party that is in the business of distributing software, under
which you make payment to the third party based on the extent of your activity of conveying the
work, and under which the third party grants, to any of the parties who would receive the
covered work from you, a discriminatory patent license (a) in connection with copies of the
covered work conveyed by you (or copies made from those copies), or (b) primarily for and in
connection with specific products or compilations that contain the covered work, unless you
entered into that arrangement, or that patent license was granted, prior to 28 March 2007.
Open Source Patent Provisions – Anti-Discrimination
Unexpected Risks
• Loss of exclusive rights
• Intentional
• Unintentional
• Copyright
• Patent
• Trademark
• Breach of contract/copyright claim
• Exposure to damages or injunction
• Bad PR
• Lack of indemnity / warranty
• Security (monoculture)
• Reliability (varies widely)
• Uncertainty / code provenance
• Exposure to patent claims
• “Abandonware”
• Settlement complications
• Deal closing complications
Risk Laundry List
Unexpected Open Source Risks
Open Source is everywhere
• Merger & acquisition
• Venture investment
• Business deals
• Product releases
• Litigation case studies
• Surprise claims
• License enforcement
Unexpected Open Source Risks
“Unexpected” Litigation Case Studies
• Twin Peaks v. Red Hat (2012 NDCal)
• GPL counterclaim in mirror file system case
• IBM v. Asus (2008-9 ITC)
• Successful GPL license defense involving routers
• Ximpleware v. Versata (2013-5 NDCal)
• Patent and copyright claims on XML parser arising out of separate commercial litigation in
Texas
• German Enforcement
Implied License, e.g., under GPL v2 – XimpleWare?
• Implied license: The XimpleWare court noted that the direct patent infringement did not apply because the defendants had
a license under the GPLv2 for internal use: "The act of running the Program is not restricted, and the output from the
Program is covered only if its contents constitute a work based on the Program (independent of having been made by
running the Program)."
• Breach does not negate license to those downstream: the court further stated that, "Because an express license is a
defense to patent infringement, XimpleWare’s direct infringement claims against Versata’s customers turn on whether the
customers’ distribution is licensed under the GPL. The reason is that the GPL provides that even if the original licensee—
here, one of the Versata entities—breaches its license for whatever reason, third-party customers of that original license
retain the right to use XimpleWare’s software so long as the customer does not itself breach the license by 'distributing'
XimpleWare’s software without satisfying attendant conditions.”
• Rights beyond use are still largely unresolved
Open Source Patent Provisions
• Implied licenses for licenses that are silent on patent rights
• “Vertical” vs. “Horizontal” licenses
• Apache 2.0 questions
• How to determine if claims are “necessarily infringed”?
• Is claim construction necessary?
• Later-acquired patents?
• Downstream modifications of licensed contributions?
• Licensed claims limited to contributions or to other code in work that potentially infringes same claims?
• Can license be restored?
• Patent damages where there is an open-source alternative
• Patent damages where accused software is open-source
• Issues outside the USA
• Implied patent licenses may be more limited elsewhere
• Scope of Open Invention Network License
• Effect of pledges such as Open Patent Non-Assertion Pledge, License on Transfer Network
Uncertainties with respect to open source patent licensing
Best Practices /
Playbook
Patents and Open Source
Process:
Typical scenarios where Open Source is raised to patent portfolio managers
1. Invention disclosure form (IDF) submitted with indication subject matter will be part of
OS project
2. Patent team consulted on impact of requested OS participation on patent strategy
May be difficult to determine impact - might require study of code and individual claim
language
3. Third party code - considering bringing some third party code into the code base,
e.g., M&A context
Patents and Open Source
Potential Responses, e.g., for Scenario (1) - IDF at time of OS request
a) Proceed with OS contribution/do not pursue patent
b) Proceed with OS contribution and pursue patent,
c) Do not proceed with OS contribution and pursue patent.
So how does one determine when to raise IP as a consideration in a proposed
OS participation, when an OS participation is approved, whether an associated
invention should be patented?
Patents and Open Source
28
Factors for giving OK to OS request / decision whether to pursue patent
• License terms of Open Source
• Scope of contribution (and Work) now and in the future
• Potentially impacted patents
• Talk to submitter and/or review proposed submission, use keywords, tech area, business area,
institutional knowledge and/or companies of interest
• Need for patent protection in tech area
• Note: Use a peel the onion approach
• Consider whitelisting or blacklisting certain OS licenses (and perhaps certain types of patents)
• Is potentially impacted patent in litigation or a candidate for litigation?
• Is potentially impacted patent a highly rated patent or a patent that is tagged as being relevant to
a company of interest?
Patents and Open Source
29
• Perform regular source code audits to determine OSS in current use, and
confirm compliance with the applicable license provisions.
• Implement routine inbound and outbound tracking systems to limit need for
expensive/cumbersome audits once baseline level of compliance is
established.
• Maintain a whitelist of acceptable OSS licenses, a blacklist of rejected OSS
licenses, and a validation process to approve OSS licenses not on either list.
• Prior to making major software purchases, require vendors to provide OSS
audits.
General OS Takeaways
30
Questions?
31
Adam Kessel
Principal - Boston
Fish & Richardson P.C.
kessel@fr.com
617-368-2180

More Related Content

What's hot

The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source Management
Black Duck by Synopsys
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
Cigital
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Black Duck by Synopsys
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
lior mazor
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
William Tanenbaum
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity Model
Cigital
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
Dr. Ahmed Al Zaidy
 
Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
Dr. Ahmed Al Zaidy
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
Sebastien Deleersnyder
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
Network Intelligence India
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Black Duck by Synopsys
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
Dr. Ahmed Al Zaidy
 
Technical Writing for Consultants
Technical Writing for ConsultantsTechnical Writing for Consultants
Technical Writing for Consultants
Dilum Bandara
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Black Duck by Synopsys
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
Cigital
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
Synopsys Software Integrity Group
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Black Duck by Synopsys
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
Eversheds Sutherland
 
Securing Voting Infrastructure before the Mid-Term Elections
Securing Voting Infrastructure before the Mid-Term ElectionsSecuring Voting Infrastructure before the Mid-Term Elections
Securing Voting Infrastructure before the Mid-Term Elections
Denim Group
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
Eversheds Sutherland
 

What's hot (20)

The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source Management
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity Model
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
 
Technical Writing for Consultants
Technical Writing for ConsultantsTechnical Writing for Consultants
Technical Writing for Consultants
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
 
Securing Voting Infrastructure before the Mid-Term Elections
Securing Voting Infrastructure before the Mid-Term ElectionsSecuring Voting Infrastructure before the Mid-Term Elections
Securing Voting Infrastructure before the Mid-Term Elections
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
 

Similar to Flight East 2018 Presentation–Patents and Open Source Known and Unknown Risks

10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...
Kyiv National Economic University
 
Open Source Software Legal Issues and Compliance
Open Source Software Legal Issues and ComplianceOpen Source Software Legal Issues and Compliance
Open Source Software Legal Issues and Compliance
Tarun Khurana
 
Open Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and ComplianceOpen Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and Compliance
All Things Open
 
Top Ten Open Source Licenses
Top Ten Open Source LicensesTop Ten Open Source Licenses
Top Ten Open Source Licenses
Mark Radcliffe
 
Overview of basic open-source licenses
Overview of basic open-source licensesOverview of basic open-source licenses
Overview of basic open-source licenses
Irina Shubina
 
Top Open Source Licenses Explained
Top Open Source Licenses ExplainedTop Open Source Licenses Explained
Top Open Source Licenses Explained
WhiteSource
 
Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the details
Rogue Wave Software
 
Open Source—Avoiding Common Pitfalls
Open Source—Avoiding Common PitfallsOpen Source—Avoiding Common Pitfalls
Open Source—Avoiding Common Pitfalls
KRLaw
 
Open Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common PitfallsOpen Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common Pitfalls
Ansel Halliburton
 
Legal-Considerations-for-Open-Source-Software-Creative-Commons-Licenses_Sprin...
Legal-Considerations-for-Open-Source-Software-Creative-Commons-Licenses_Sprin...Legal-Considerations-for-Open-Source-Software-Creative-Commons-Licenses_Sprin...
Legal-Considerations-for-Open-Source-Software-Creative-Commons-Licenses_Sprin...
EmmaShort14
 
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open SourceOSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
FINOS
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open Source
Jody Garnett
 
opensource_powerpoint_review
opensource_powerpoint_reviewopensource_powerpoint_review
opensource_powerpoint_review
webuploader
 
Opensource Powerpoint Review.Ppt
Opensource Powerpoint Review.PptOpensource Powerpoint Review.Ppt
Opensource Powerpoint Review.Ppt
Viet NguyenHoang
 
Discuss open sourcelicensing
Discuss open sourcelicensingDiscuss open sourcelicensing
Discuss open sourcelicensing
John Carlo Catacutan
 
Opensource powerpoint-reviewppt742
Opensource powerpoint-reviewppt742Opensource powerpoint-reviewppt742
Opensource powerpoint-reviewppt742
Vibha Khanna
 
Open Source Licensing Fundamentals for Financial Services
Open Source Licensing Fundamentals for Financial ServicesOpen Source Licensing Fundamentals for Financial Services
Open Source Licensing Fundamentals for Financial Services
FINOS
 
Open Source Software: An Edge For Your Growing Business
Open Source Software: An Edge For Your Growing BusinessOpen Source Software: An Edge For Your Growing Business
Open Source Software: An Edge For Your Growing Business
Promet Source
 
OSS licenses and the Eclipse Public License
OSS licenses and the Eclipse Public LicenseOSS licenses and the Eclipse Public License
OSS licenses and the Eclipse Public License
Philippe Krief
 
Legal and practical concerns with open source software
Legal and practical concerns with open source softwareLegal and practical concerns with open source software
Legal and practical concerns with open source software
Rogue Wave Software
 

Similar to Flight East 2018 Presentation–Patents and Open Source Known and Unknown Risks (20)

10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...
 
Open Source Software Legal Issues and Compliance
Open Source Software Legal Issues and ComplianceOpen Source Software Legal Issues and Compliance
Open Source Software Legal Issues and Compliance
 
Open Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and ComplianceOpen Source Licensing: Types, Strategies and Compliance
Open Source Licensing: Types, Strategies and Compliance
 
Top Ten Open Source Licenses
Top Ten Open Source LicensesTop Ten Open Source Licenses
Top Ten Open Source Licenses
 
Overview of basic open-source licenses
Overview of basic open-source licensesOverview of basic open-source licenses
Overview of basic open-source licenses
 
Top Open Source Licenses Explained
Top Open Source Licenses ExplainedTop Open Source Licenses Explained
Top Open Source Licenses Explained
 
Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the details
 
Open Source—Avoiding Common Pitfalls
Open Source—Avoiding Common PitfallsOpen Source—Avoiding Common Pitfalls
Open Source—Avoiding Common Pitfalls
 
Open Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common PitfallsOpen Source Software - Avoiding Common Pitfalls
Open Source Software - Avoiding Common Pitfalls
 
Legal-Considerations-for-Open-Source-Software-Creative-Commons-Licenses_Sprin...
Legal-Considerations-for-Open-Source-Software-Creative-Commons-Licenses_Sprin...Legal-Considerations-for-Open-Source-Software-Creative-Commons-Licenses_Sprin...
Legal-Considerations-for-Open-Source-Software-Creative-Commons-Licenses_Sprin...
 
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open SourceOSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
OSSF 2018 - Jilayne Lovejoy - Training: Intro to Open Source
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open Source
 
opensource_powerpoint_review
opensource_powerpoint_reviewopensource_powerpoint_review
opensource_powerpoint_review
 
Opensource Powerpoint Review.Ppt
Opensource Powerpoint Review.PptOpensource Powerpoint Review.Ppt
Opensource Powerpoint Review.Ppt
 
Discuss open sourcelicensing
Discuss open sourcelicensingDiscuss open sourcelicensing
Discuss open sourcelicensing
 
Opensource powerpoint-reviewppt742
Opensource powerpoint-reviewppt742Opensource powerpoint-reviewppt742
Opensource powerpoint-reviewppt742
 
Open Source Licensing Fundamentals for Financial Services
Open Source Licensing Fundamentals for Financial ServicesOpen Source Licensing Fundamentals for Financial Services
Open Source Licensing Fundamentals for Financial Services
 
Open Source Software: An Edge For Your Growing Business
Open Source Software: An Edge For Your Growing BusinessOpen Source Software: An Edge For Your Growing Business
Open Source Software: An Edge For Your Growing Business
 
OSS licenses and the Eclipse Public License
OSS licenses and the Eclipse Public LicenseOSS licenses and the Eclipse Public License
OSS licenses and the Eclipse Public License
 
Legal and practical concerns with open source software
Legal and practical concerns with open source softwareLegal and practical concerns with open source software
Legal and practical concerns with open source software
 

More from Synopsys Software Integrity Group

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
Synopsys Software Integrity Group
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Synopsys Software Integrity Group
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
Synopsys Software Integrity Group
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
Synopsys Software Integrity Group
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
Synopsys Software Integrity Group
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
Synopsys Software Integrity Group
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
Synopsys Software Integrity Group
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Synopsys Software Integrity Group
 
Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security
Synopsys Software Integrity Group
 
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
Synopsys Software Integrity Group
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Synopsys Software Integrity Group
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
Synopsys Software Integrity Group
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Synopsys Software Integrity Group
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
Synopsys Software Integrity Group
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Synopsys Software Integrity Group
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Synopsys Software Integrity Group
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Synopsys Software Integrity Group
 
Webinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and AbuseWebinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and Abuse
Synopsys Software Integrity Group
 

More from Synopsys Software Integrity Group (20)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
 
Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security
 
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 
Webinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and AbuseWebinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and Abuse
 

Recently uploaded

The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
kalichargn70th171
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
campbellclarkson
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Vince Scalabrino
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
vaishalijagtap12
 
Building API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructureBuilding API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructure
confluent
 
TMU毕业证书精仿办理
TMU毕业证书精仿办理TMU毕业证书精仿办理
TMU毕业证书精仿办理
aeeva
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Paul Brebner
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
OnePlan Solutions
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and MoreManyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
narinav14
 
Voxxed Days Trieste 2024 - Unleashing the Power of Vector Search and Semantic...
Voxxed Days Trieste 2024 - Unleashing the Power of Vector Search and Semantic...Voxxed Days Trieste 2024 - Unleashing the Power of Vector Search and Semantic...
Voxxed Days Trieste 2024 - Unleashing the Power of Vector Search and Semantic...
Luigi Fugaro
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
 
Building API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructureBuilding API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructure
 
bgiolcb
bgiolcbbgiolcb
bgiolcb
 
TMU毕业证书精仿办理
TMU毕业证书精仿办理TMU毕业证书精仿办理
TMU毕业证书精仿办理
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and MoreManyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
 
Voxxed Days Trieste 2024 - Unleashing the Power of Vector Search and Semantic...
Voxxed Days Trieste 2024 - Unleashing the Power of Vector Search and Semantic...Voxxed Days Trieste 2024 - Unleashing the Power of Vector Search and Semantic...
Voxxed Days Trieste 2024 - Unleashing the Power of Vector Search and Semantic...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 

Flight East 2018 Presentation–Patents and Open Source Known and Unknown Risks

  • 1. Patents and Open Source Known and Unknown Risks Adam Kessel Principal, Fish & Richardson P.C.
  • 2. Roadmap • Can patents and open source coexist? • Open source license patent provisions • Patent (and other) risks raised by open source • Litigation case studies • Best practices / playbook
  • 3. Can patents and open source coexist?
  • 4. Quick Intro to Software Patents – Why Get Patents? • Freedom of Action • Deter attacks by operating companies • Cross-licensing • Out-licensing • Counterclaims • Deter copying by competitors • Deter trade secret misappropriation • Add value to business deals • Independent profit center • Licensing and/or sales
  • 5. Quick Intro to Software Patents – Why Not Get Patents? • Legal expense/uncertain ROI • Engineering distraction • Eliminates trade secret protection • Shifting landscape may reduce value • Bilski/Alice (2008/2014) – patentability questions, particularly for software • eBay (2006) – injunctive relief harder to get • KSR (2007) – easier to prove patents obvious • PTAB proceedings under the America Invents Act (2012) – easier to challenge validity, uneven playing field, litigation often stayed • TC Heartland (2017) - patent owner has less control over venue • Bad P.R. for some audiences, including open source community
  • 6. Why are patents useful in open source context? • “offensive” use • Patent claim scope often differs from OS license scope • Patent rights to complement copyright/license/contract/unfair competition claims to pursue bad actors • Dual licensing • Against use of the invention outside the open source project (this may encourage adoption of the open source project) • where the invention is incorporated in open source projects but was not part of your company’s contribution • Inventions that are related to but not part of the contribution (or the combination of the contribution with the work) • Can still be sold/licensed to third parties with separate interests
  • 7. Why are patents useful in open source context? • “defensive” use • All the same reasons as for offensive use; and • If you are sued on the work you can often counterclaim on the same subject matter • If you stop using the open source code and don’t plan to use it again • Prevent others from filing on same idea; create prior art and record of first invention at Patent Office • Particularly important in post-AIA “first to file” system
  • 8. Can a patent owner get relief if it also practices open source? • Royalty free cross-licensing does not preclude reasonable royalty • Multiple networked royalty free cross-licenses, e.g., OIN, LOT, W3C, etc, that have thrived despite the potential for similar argument in those contexts • Injunctions are already difficult in U.S. patent litigation; any licensing, including open-source licensing, may weigh against injunctive relief • From a defensive perspective, where an accused infringer’s software is open source (and thus “free”), may complicate the patent owner’s damages theory
  • 10. Patent clauses in open-source licenses generally fall into one of three categories: • Patent licenses (or covenants not to sue); • Who grants the license? Generally, only contributors (including in some cases modifying distributors or arguably pass-through distributors) - however read the provisions of the OS license, e.g., the copyleft license, at issue. • Which patents does the license include? a) The contribution alone or b) The combination of the Contribution with the Work (see e.g., Apache 2.0) • Which activities does the license allow? • Defensive termination • Apache 2.0 used by Apache Project, Cloud Foundry, etc • Facebook react.js BSD+patents (deprecated in 2017) • Other patent provisions • GPL v3 provision regarding entering into restrictive patent licenses • Custom patent licenses, including field of use limitations, that supplement common OS licenses Open Source Patent Provisions
  • 11. Open Source Patent Provisions • Pass-through distributor (PTD) • Modifying distributor (MD) Open Source Code Open Source Code Contributors PTD Distribution Open Source Code Modified Version Contributors MD Distribution
  • 12. Open Source Patent Provisions Which activities does the license allow? • Patent licenses do not typically allow: (a) Infringement based on downstream modification to the contributor version (b) Infringement based on combinations of the contributor version with other software or hardware; and (c) Claims infringed by the OS software without the contribution
  • 13. • Apache • Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. • MIT • Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions… Open Source Patent Provisions – Grant of License
  • 14. • GPL 2.0 • You may modify your copy or copies of the Program or any portion of it…provided that you…cause any work that you distribute or publish…to be licensed as a whole at no charge to all third parties under the terms of this License. • Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. Open Source Patent Provisions – Grant of License
  • 15. • GPL 3.0 • Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. • A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, “control” includes the right to grant patent sublicenses in a manner consistent with the requirements of this License. Open Source Patent Provisions – Grant of License
  • 16. Defensive Termination Provisions (e.g. Apache 2.0) • Apache provision: • "If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.“ • Which claims trigger the provision? • Which rights are terminated? • Can the license be restored? Open Source Patent Provisions – Defensive Termination
  • 17. GPL 2.0 • Prohibits distribution where patent royalties are required • If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty- free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. Open Source Patent Provisions – Anti-Discrimination
  • 18. GPL 3.0 • Explicitly prohibits discriminatory licenses • A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007. Open Source Patent Provisions – Anti-Discrimination
  • 20. • Loss of exclusive rights • Intentional • Unintentional • Copyright • Patent • Trademark • Breach of contract/copyright claim • Exposure to damages or injunction • Bad PR • Lack of indemnity / warranty • Security (monoculture) • Reliability (varies widely) • Uncertainty / code provenance • Exposure to patent claims • “Abandonware” • Settlement complications • Deal closing complications Risk Laundry List
  • 21. Unexpected Open Source Risks Open Source is everywhere
  • 22. • Merger & acquisition • Venture investment • Business deals • Product releases • Litigation case studies • Surprise claims • License enforcement Unexpected Open Source Risks
  • 23. “Unexpected” Litigation Case Studies • Twin Peaks v. Red Hat (2012 NDCal) • GPL counterclaim in mirror file system case • IBM v. Asus (2008-9 ITC) • Successful GPL license defense involving routers • Ximpleware v. Versata (2013-5 NDCal) • Patent and copyright claims on XML parser arising out of separate commercial litigation in Texas • German Enforcement
  • 24. Implied License, e.g., under GPL v2 – XimpleWare? • Implied license: The XimpleWare court noted that the direct patent infringement did not apply because the defendants had a license under the GPLv2 for internal use: "The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program)." • Breach does not negate license to those downstream: the court further stated that, "Because an express license is a defense to patent infringement, XimpleWare’s direct infringement claims against Versata’s customers turn on whether the customers’ distribution is licensed under the GPL. The reason is that the GPL provides that even if the original licensee— here, one of the Versata entities—breaches its license for whatever reason, third-party customers of that original license retain the right to use XimpleWare’s software so long as the customer does not itself breach the license by 'distributing' XimpleWare’s software without satisfying attendant conditions.” • Rights beyond use are still largely unresolved Open Source Patent Provisions
  • 25. • Implied licenses for licenses that are silent on patent rights • “Vertical” vs. “Horizontal” licenses • Apache 2.0 questions • How to determine if claims are “necessarily infringed”? • Is claim construction necessary? • Later-acquired patents? • Downstream modifications of licensed contributions? • Licensed claims limited to contributions or to other code in work that potentially infringes same claims? • Can license be restored? • Patent damages where there is an open-source alternative • Patent damages where accused software is open-source • Issues outside the USA • Implied patent licenses may be more limited elsewhere • Scope of Open Invention Network License • Effect of pledges such as Open Patent Non-Assertion Pledge, License on Transfer Network Uncertainties with respect to open source patent licensing
  • 27. Process: Typical scenarios where Open Source is raised to patent portfolio managers 1. Invention disclosure form (IDF) submitted with indication subject matter will be part of OS project 2. Patent team consulted on impact of requested OS participation on patent strategy May be difficult to determine impact - might require study of code and individual claim language 3. Third party code - considering bringing some third party code into the code base, e.g., M&A context Patents and Open Source
  • 28. Potential Responses, e.g., for Scenario (1) - IDF at time of OS request a) Proceed with OS contribution/do not pursue patent b) Proceed with OS contribution and pursue patent, c) Do not proceed with OS contribution and pursue patent. So how does one determine when to raise IP as a consideration in a proposed OS participation, when an OS participation is approved, whether an associated invention should be patented? Patents and Open Source 28
  • 29. Factors for giving OK to OS request / decision whether to pursue patent • License terms of Open Source • Scope of contribution (and Work) now and in the future • Potentially impacted patents • Talk to submitter and/or review proposed submission, use keywords, tech area, business area, institutional knowledge and/or companies of interest • Need for patent protection in tech area • Note: Use a peel the onion approach • Consider whitelisting or blacklisting certain OS licenses (and perhaps certain types of patents) • Is potentially impacted patent in litigation or a candidate for litigation? • Is potentially impacted patent a highly rated patent or a patent that is tagged as being relevant to a company of interest? Patents and Open Source 29
  • 30. • Perform regular source code audits to determine OSS in current use, and confirm compliance with the applicable license provisions. • Implement routine inbound and outbound tracking systems to limit need for expensive/cumbersome audits once baseline level of compliance is established. • Maintain a whitelist of acceptable OSS licenses, a blacklist of rejected OSS licenses, and a validation process to approve OSS licenses not on either list. • Prior to making major software purchases, require vendors to provide OSS audits. General OS Takeaways 30
  • 31. Questions? 31 Adam Kessel Principal - Boston Fish & Richardson P.C. kessel@fr.com 617-368-2180