GEORGETOWN LAW
he Scholarly Commons
2001
Patent Scope and Innovation in the Sotware
Industry
Julie E. Cohen
Georgetown University Law Center,
[email protected]
Mark A. Lemley
University of California at Berkeley School of Law
his paper can be downloaded free of charge from:
htp://scholarship.law.georgetown.edu/facpub/343
Copyright 2001 by the California Law Review, Inc. Reprinted from California Law Review, Vol. 89,
by permission of the Regents of the University of California.
89 Cal. L. Rev. 1-57 (2001)
his open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author.
GEORGETOWN LAW
Faculty Publications
April 2010
Patent Scope and Innovation in the
Software Industry*
89 Cal. L. Rev. 1-57 (2001)
Julie E. Cohen
Mark A. Lemley
Professor of Law
Georgetown University Law Center
[email protected]
Professor of Law
University of California at Berkeley School of Law
This paper can be downloaded without charge from:
Scholarly Commons: http://scholarship.law.georgetown.edu/facpub/343/
Posted with permission of the author
* Copyright 2001 by the California Law Review, Inc. Reprinted from California Law Review, Vol. 89, by
permission of the Regents of the University of California.
California Law Review
VOL.
89
JANuARY
2001
No. 1
Copyright © 2001 by California Law Review, Inc.
Patent Scope and Innovation in the
Software Industry
Julie E. Cohent
Mark A. Lemleyj
TABLE OF CONTENTS
Introduction .........................................................
4
I. Software Patents: History, Practice, and Theory ...............................
7
A. History: The Section 101 Patentability Debate ......................... 8
B. Practice: Anything Goes? ................................ ......................... .... I1
C. Theory: Software Patents and the "Prospect" Theory of
Patent Scope ..................................................................................
14
II. Reverse Engineering Patented Software ............................................
16
A. Software-Specific Barriers to Lawful Reverse Engineering of
Patented Inventions ..................................................................
17
B. Innovation and Reverse Engineering: An Industry-Based
Analysis ....................................................................................
21
Copyright © 2001, Julie Cohen and Mark Lemley.
f
Associate Professor of Law, Georgetown University Law Center.
:
Professor of Law, University of California at Berkeley, School of Law (Boalt Hall); of
counsel, Fish & Richardson P.C. We would like to thank Fred Abbott, Erv Basinski, Dan Burk, Chris
Byrne, Tom Cotter, Alan Durham, Richard Gruner, Rose Hagan, Paul Heald, Dennis Kariala, Ronald
Mann, David McGowan, Peter Menell, Rob Merges, Mike Meurer, Tyler Ochoa, Margaret Jane Radin,
Arti Rai, Pam Samuelson, Jay Thomas, Polk Wagner, David Welkowitz, participants in the 27th
Annual Telecommunications Policy Research Conference, participants in faculty workshops at the
Boston University School of Law and Whittier Law School for their comments on earlier versions, and
Mitzi Chang and Elizabeth Monkus for research assistance. Need we mention that the ideas and
mistakes contained herein are ours alone, and are not attributable to anyone else?
Permission is hereby granted for copies of this Article to be made and distributed for educational
use, provided that: (i) copies are distributed at or below cost; (ii) the authors and the California Law
Review are identified; and (iii) proper notice of copyright is affixed.
HeinOnline -- 89 Cal. L. Rev. 1 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
1. Access to the Patented Invention .......................................
23
2. Access to Unpatented Components ...................................
25
3. The Intellectual Property Balance ......................................
26
4. Litigation-Related Uses ......................................................
28
C. Creating a Right to Reverse Engineer Patented Software ........ 29
1. Experimental Use .............................................................
29
2. First Sale, Implied License, and Exhaustion ..................... 30
3. Patent Misuse .....................................................................
35
4. New Legislation ................................................................
36
III. Designing Around Existing Software Patents .................................
37
A. Systemic Biases Toward a Broad Range of Equivalents ......
39
1. Incremental, Modular Innovation and Design for
Interoperability ..................................................................
40
2. Undocumented Prior Art ...................................................
42
45
3. The Rapid Pace of Change ................................................
4. Equivalence and Text ........................................................
47
B. Innovation and Equivalence: An Industry-Based Analysis .......... 50
C. Tailoring the Doctrine of Equivalents to the Software Industry ...53
56
Conclusion .............................................................................................
HeinOnline -- 89 Cal. L. Rev. 2 2001
2001]
PATENT SCOPEAND INNOVATION
Patent Scope and Innovation in the
Software Industry
Julie E.Cohen
Mark A. Lemley
Software patents have received a great deal of attention in the academic
literature. Unfortunately, most of that attention has been devoted to the
problem of whether software is or should be patentable subject matter.
With roughly eighty thousand software patents already issued, and the
Federal Circuit endorsingpatentability without qualification, those questions arefor the history books. The more pressing questions now concern
the scope to be accordedsoftware patents. In this Article, we examine the
implications of some traditionalpatent law doctrinesfor innovation in the
software industry. We argue that patent law needs some refinement ifit is
to promote rather than impede the growth of this new market, which is
characterizedby rapidsequential innovation, reuse and re-combination of
components, and strong network effects that privilege interoperablecomponents andproducts. In particular,we arguefor two sorts of new rules in
softwarepatent cases.
First,we advocate a limited right to reverse engineerpatented computer
programs in order to gain access to and study those programs and to duplicate their unprotected elements. Such a right is firmly established in
copyright law, and seems unexceptional as a policy matter even in patent
law. But because patent law contains no fair use or reverse engineering
exemption, patentees could use the grant of rights covering a single component of a complex program to prevent any "making" or "using" of the
program as a whole, includingthose temporary uses needed in reverse engineering. While patent law does contain doctrines of "experimental use"
and "exhaustion," it is not clear that those doctrineswill protect legitimate
reverse engineering efforts. We suggest that ifthese doctrines cannot be
read broadly enough to establish such a right, Congress should create a
limited right to reverse engineer software containingpatented components
for researchpurposes.
Second, we arguethat in light of the special nature of innovationwithin the
softivare industry, courts should apply the doctrine of equivalents narrowly
in infringement cases. The doctrine of equivalents allows a finding of
HeinOnline -- 89 Cal. L. Rev. 3 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
infringement even when the accusedproduct does not literallysatisfy each
element of the patent, ifthere is substantialequivalence as to each element.
The test of equivalence is the known interchangeabilityof claimed and
accusedelements at the time of (alleged)infringement.A number offactors
unique to software and the software industry-a culture of reuse and incremental improvement, a lack of reliance on systems offormal documentation used in otherfields, the short effective life of software innovations,
and the inherentplasticity of code-severely complicate post hoc assessments of the "known interchangeability"of software elements. A standard
for equivalence of code elements that ignores these factors risks stifling
legitimate, successful efforts to design around existing software patents. To
avoid this danger, courts should construe software claims narrowly, and
should refuse a finding of equivalence if the accused element is
"interchangeable"with prior art that should have narrowed the original
patent, or if the accused improvement is too many generations removed
from the originalinvention.
INTRODUCTION
Software patents have received a great deal of attention in the academic literature. Unfortunately, most of that attention has been devoted to
the problem of whether software is or should be patentable subject matter.
With some eighty thousand software patents already issued,' the Federal
Circuit endorsing patentability without qualification,2 and the Supreme
Court assiduously avoiding the question, software patentability is a matter
for the history books. The more pressing questions now concern the criteria
for issuance and the scope to be accorded issued software patents. And
while public attention of late has been captured by so-called Internet business method patents, the overwhelming majority of such patents are in fact
patents for software.3 Thus, determining the scope of software patents will
take us a long way towards determining what to do in practice with Internet
business method patents as well.
As Part I of this Article describes, with software patents now being
issued in large numbers, the patent system plays a newly prominent role in
1. Infra notes 33-38 and accompanying text.
2. Infra Part I.A.
3. Indeed, this was true of the prototypical business method patent, the one at issue in State
Street Bank & Trust v. SignatureFinancialGroup, Inc., 149 F.3d 1368 (Fed. Cir. 1998). In State Street,
the Federal Circuit eliminated the long-standing rule against patenting non-technological "business
methods." See id. The invention deemed patentable was a hub-and-spoke method of mutual fund
accounting implemented in software. That ruling led to a host of patents and patent applications on
various business ideas, many of which also are implemented in software and relate to the Interet and
electronic commerce. See, e.g., Robert P. Merges, As Many as Six Impossible Patents Before
Breakfast: PropertyRightsfor Business Concepts and PatentSystem Reform, 14 BERKELEY TECH. LJ.
577 (1999); Philip E. Ross, Patently Absurd: Technology and Gamesmanship Have Overwhelmed the
US. PatentOffice. How to Fix It?, FoRBEs, May 29, 2000.
HeinOnline -- 89 Cal. L. Rev. 4 2001
2001]
PA TENT SCOPEAND IA'O VA TION
5
shaping the development of the software industry. The consequences of
this shift are worth examining more closely. Institutional mechanisms for
encouraging innovation are a crucial determinant of the rate and nature of
"progress" in technical fields.4 Generally speaking, both economic theory
and practical experience suggest that the availability of patents for software
promotes innovation by supplying (additional) incentives to inventors.' Yet
it is also possible that the patent system may constrain innovation if it
draws protection too broadly.
Part I notes a convergence between the Patent and Trademark Office's
[PTO] relatively unconstrained practice of issuing software patents and a
strand of the theoretical literature which suggests that the optimal patent
scope is broad. In the balance of the Article, we consider whether that result is the right one for the software industry. In particular, we examine the
implications for software innovation of some traditional patent law doctrines affecting patent scope. We conclude that broad scope is not optimal,
and that patent law needs refinement if it is to promote rather than impede
the growth of this industry, which is characterized by rapid sequential innovation, reuse and recombination of components, and strong network
4. For examinations of the variety of institutional mechanisms available, see generally Brett
Frischmann, Innovation and Institutions: Rethinking the Economics of U.S. Science and Technology
Policy, 24 VT. L. REv. 347 (2000); Robert P. Merges, Intellectual Property Rights and Collective
Rights Organizations: InstitutionsFacilitatingTransactionsin Intellectual PropertyRights, 84 CALn'.
L. REv. 1293 (1996); Arti Kaur Rai, RegulatingScientific Research: Intellectual PropertyRights and
the Norms of Science, 94 Nw. U. L. REv. 77 (1999).
5. On the "reward theory" of patent protection, see THE SuacoMI. ON PATENTS, TRADEMARKS,
AND COPYRIGHTS OF THE SENATE COMM. ON THE JuDIcIARY, 85TH CONG., AN EcONomIc REvIEW OF
THE PATENT SYSrEm (Comm. Print 1958). The extent to which the patent system is actually necessary
to induce innovation that would not otherwise occur is an unanswered, and perhaps unanswerable,
empirical question. See generally id.; George L. Priest, What Economists Can Tell Lawyers About
Intellectual Property, 8 RES. L. & ECON. 19 (1986); cf. A. Samuel Oddi, Beyond
Obviousness: Invention Protection in the Twenty-First Century, 38 Am. U. L. REv. 1097 (1989)
(arguing that patents should be issued only for major innovations). But see Arnold Plant, The Economic
Theory Concerning Patentsfor Inventions, 1 ECONOMICA 30 (1934) (arguing that the availability of
patent protection may yield supraoptimal levels of invention, at the expense of other socially valuable
activity).
The bewildering variety of software innovations generated in the years before software was
considered patentable suggests that for software, at least, patent protection may not be as necessary as
the reward theory assumes. The question is complicated, however, by the availability of copyright
protection for software during that period, and by uncertainty over both the scope of copyright
protection and the degree of overlap between the copyright and patent models of protection. For
discussion of that overlap, see, for example, Julie E. Cohen, Reverse Engineering and the Rise of
Electronic Vigilantism: Intellectual Property Implications of "Lock-Out" Programs, 68 S. CAL. L.
REv. 1091 (1995); Dennis S. Karjala, The Relative Roles of Patentand Copyright in the Protection of
Computer Programs, 17 J. MARSHALL J. CoxpurER & INFO. L. 41 (1998); A. Samuel Oddi, An
UneasierCasefor Copyright Thanfor PatentProtection of ComputerPrograms,72 NEB. L. REv. 351
(1993); J.H. Reichman, Legal Hybrids Between the Patent and Copyright Paradigms,94 COLUNM. L.
REv. 2432 (1994); Pamela Samuelson et al., A Manifesto Concerningthe Legal Protection of Computer
Programs,94 CoLulm. L. REv. 2308 (1994).
HeinOnline -- 89 Cal. L. Rev. 5 2001
CALIFORNIA LAWREVIEW
[Vol. 89:1
effects that privilege interoperable components and products. Accordingly,
we argue for two sorts of rules in software patent cases.
In Part II, we advocate a limited right to reverse engineer patented
computer programs to permit study of those programs and duplication of
their unprotected elements.6 Such a right is firmly established in copyright
law, and seems unexceptional as a policy matter even in patent law. But
because patent law contains no fair use or reverse engineering exemption,
patentees could use the grant of rights covering a single component of a
complex program to prevent any "making" or "using" of the program as a
whole, including those temporary uses required for reverse engineering.
Indeed, the Sony v. Connectix and Sony v. Bleem cases pending in the
Ninth Circuit reflect an effort by a patent and copyright owner to do just
that.7 While patent law does contain doctrines of "experimental use" and
"exhaustion," it is not clear that those doctrines will protect legitimate reverse engineering efforts. We suggest that if these doctrines cannot be read
broadly enough to establish such a right, Congress should create a limited
right to reverse engineer software containing patented components for
research purposes.
In Part III, we argue that in light of the special nature of innovation
within the software industry, courts adjudicating software cases should use
caution to avoid applying the doctrine of equivalents too broadly. The doctrine of equivalents allows a finding of infringement even when the
accused product does not literally satisfy each element of the patent, as
long as there is substantial equivalence as to each element.' One test of
equivalence is the "known interchangeability" of the claimed and accused
elements at the time of alleged infringement. However, several factors
unique to software and the software industry complicate post hoc assessments of "known interchangeability." The software industry is characterized by a culture of reuse and incremental improvement, a lack of reliance
on systems of formal documentation used in other technical fields, the
short effective life of software innovations, and the inherent plasticity of
microcode. A standard for equivalence of code elements that ignores these
factors risks stifling legitimate efforts to design around existing software
patents. To avoid this danger, courts should beware of construing software
claims too broadly, and should refuse a finding of equivalence if the
accused element is "interchangeable" with prior art that should have
6. "Reverse engineering" refers to the process of working backwards from a finished product to
discover how it was made. For discussion of the unique technical considerations that attend the reverse
engineering of software, see infra notes 63-65 and accompanying text.
7. See infra notes 72-73 (discussing the Sony cases).
8. The scope of a patent is defined by its claims, which set out each element of the invention.
Each element of the patent claim must be present in the accused device in order to find literal
infringement. London v. Carson Pirie Scott & Co., 946 F.2d 1534, 1538-39 (Fed. Cir. 1991).
HeinOnline -- 89 Cal. L. Rev. 6 2001
2001]
PA TENT SCOPE AND INNOVATION
narrowed the original patent, or if the accused improvement is too many
generations removed from the original invention.
Parts II and III of our paper are connected by a single common
theme: a focus on the process of improvement and sequential innovation
as it actually occurs in the software industry. We begin with reverse engineering, despite its ontological status as a "defense" in intellectual property
litigation, because that is where many improvers begin. We then discuss
what improvers do with the information they obtain and how those improvements are treated in the patent infringement context. We think this
industry focus is central to a nuanced and pro-competitive application of
patent law. Too often courts and commentators have focused narrowly on
one doctrinal issue to the exclusion of others that interact with it.9
Some might object that our suggestions are "new" rules for the software industry that have no place within a patent system that is generalist by
design. This issue, however, is largely a question of semantics. Resolution
of patent disputes requires reference to the state of knowledge and the level
of ordinary skill in the particular art under consideration.10 Some industryspecific variation in the application of general legal rules is both inevitable
and, we believe, appropriate. Further, our proposals are designed to restore
parity between software patents and other sorts of patents, by giving software engineers the same sorts of rights and expectations that exist in other
industries. We do not intend to propose a sui generis law of software
patents. Rather, we think it is both possible and desirable to interpret
existing law to achieve the results we suggest.
I
SOFTWARE PATENTS: HISTORY, PRACTICE, AND THEORY1'
Software patents have a convoluted history. Within the legal system,
the past three decades have witnessed an about-face on the question of
software's eligibility for patent protection. As we recount in Part I.A, software's status as patentable subject matter was first doubted, then grudgingly admitted, and finally embraced. However, there has been
considerable divergence between the "law on the books" and the law in
action; in fact, approval of software patent applications was routine
practice even before the courts recognized it.
Part I.B argues that the patentability debate has become a costly distraction from more practical, and increasingly pressing, questions about
9. Thus, to take just one example, the long debate about whether software was or should be
patentable subject matter obscured the host of other legal issues that affect the validity and legal and
competitive effects of software patents. Infra notes 176-185 and accompanying text (discussing the
problem).
10. E.g., 35 U.S.C. §§ 102, 103 (1994) (rules dependent on the level of skill in the industry).
11. The reader familiar with the law of software patents may wish to skip directly to Part II.
HeinOnline -- 89 Cal. L. Rev. 7 2001
CALIFORNIA LAW REVIEW
[Vol. 89:1
how the patent system should treat software. In Part I.C, we describe one
strand of theoretical literature which antedates software patents, and which
concludes that broad patents are economically optimal. In the balance of
this Article, we conclude that as a result of certain characteristics of software and of research and development patterns within the software industry, issued software patents may enjoy very broad scope. The rapid rise of
software patents thus affords an opportunity to test an important theoretical
model, and to consider whether it is the right one for this industry. For a
variety of reasons discussed in Parts II and III, we contend that it is not,
and that courts should be careful to restrict the scope of software patents so
that innovation will not suffer.
A.
History: The Section 101 PatentabilityDebate
Today, it seems fairly settled that software-related inventions fall
within the class of innovations described in section 101 of the Patent Act as
eligible for patent protection. Thirty years ago, though, that conclusion was
by no means foregone. Although the statute authorizes the patenting of any
new and useful process or machine,"2 long-standing judicially developed
doctrines prohibited patent protection for mathematical formulae and
mental processes. The courts held that "processes" describing existing
natural laws (whether as basic as 2 + 2 = 4 or as complex as E = mc 2) or
reciting steps performable by the human mind do not fall within the category of "useful arts." 3 Mathematical algorithms (not just formulae) were
declared non-patentable subject matter in an early Supreme Court case,
Gottschalk v. Benson. 4 Throughout the 1970s, courts generally rejected
software patent applications on the grounds that software was really just a
concatenation of unpatentable algorithms. 5
12. 35 U.S.C. § 101 (1994) ("Whoever invents or discovers any new and useful process,
machine, manufacture, or composition of matter... may obtain a patent therefor ...").
13. E.g., Funk Bros. Seed Co. v. Kalo Inoculant Co., 333 U.S. 127, 130 (1947) ("[P]atents cannot
issue for the discovery of the phenomena of nature ....[These] are part of the storehouse of
knowledge of all men." (citation omitted)); In re Shao Wen Yuan, 188 F.2d 377, 380 (C.C.P.A. 1951);
Halliburton Oil Well Cementing Co. v. Walker, 146 F.2d 817, 821 (9th Cir. 1944), rev'd on other
grounds, 329 U.S. I(1946); Don Lee, Inc. v. Walker, 61 F.2d 58, 67 (9th Cir. 1932). See generally I
DONALD S. CHISUM, CaISUM ON PATENTS § 1.03 (2000) (discussing the scope and boundaries of the
statutory class of processes). The Patent Clause of the Constitution authorizes the grant of exclusive
rights "to promote the Progress of... useful Arts." U.S. CONST. art. I, § 8, cl.
8. The term "useful arts"
has been construed to encompass "the realm of technological and industrial improvements." Pamela
Samuelson, Benson Revisited: The Case Against Patent Protection for Algorithms and Other
Computer Program-RelatedInventions, 39 EMORY L.J. 1025, 1033 n.24 (1990); see also id. at 1112; 1
CHISUM, supra, at § 1.01. As Professor Samuelson details, however, no coherent, satisfactory
explanation or model has been offered for the exclusion of mathematical formulae and mental
processes. See Samuelson, supra,at 1036 n.34.
14. 409 U.S. 63 (1972).
15. This history is well traced in Samuelson, supranote 13.
HeinOnline -- 89 Cal. L. Rev. 8 2001
2001]
PA TENT SCOPEAND INNOVATION
With Benson apparently precluding the patenting of "pure" software,
patent applicants in the 1970s shifted their focus to patenting mechanical
devices and processes that happened to include computer programs. The
prototypical application in this category was for a "new" machine or
process in a familiar art, in which the only point of novelty was the use of a
computer program to run the machine or implement the process. Six years
after Benson, in Parkerv. Flook,16 the Court rejected an attempt to patent a
computerized method for continuously recalculating the "alarm limit"
during a chemical conversion process. The Flook Court noted that the only
novel feature of the invention was a computer program, and that the
7
program itself was not patentable subject matter.1
Three years later, however, the Court changed its view. In Diamond v.
Diehr,'8 it held that a process for continuously monitoring the temperature
inside a synthetic rubber mold, using a computer and the well-known
Arrhenius equation for measuring cure time as a function of temperature
and other variables, was patentable subject matter. Central to the Court's
decision was that the inventor did not claim all rights to future uses of the
Arrhenius equation but only to the particular application that he had invented in the context of an "otherwise statutory" industrial process.' 9 Despite this fact, and the Court's language insisting on significant
"post-solution activity" outside the computer program, 20 Diehr seems
difficult to distinguish from Flook.
The Diehr decision and its appellate progeny created what might be
termed "the doctrine of the magic words." Under this approach, software
was patentable subject matter, but only if the applicant recited the magic
words and pretended that she was patenting something else entirely. During the 1980s and early 1990s, knowledgeable patent attorneys did exactly
that, claiming software inventions as hardware devices, pizza ovens, and
other "machines." As developed by the PTO and the Federal Circuit prior
to 1994, the "otherwise statutory process or apparatus" limitation was not
much of a limit at all. 2' Nearly any physical element or step would suffice
to render statutory a claim that recited a mathematical or "mental process"
algorithm, even if the physical element or step was well known or an industry standard and the mathematical algorithm was the only novel
component of the invention.
16. 437 U.S. 584 (1978).
17. Id. at 589-9 1. The Court reasoned that if it ignored the mathematical algorithm the applicant
had developed for updating the alarm limit, the claimed invention contained nothing new or inventive.
18. 450 U.S. 175 (1981).
19. Id. at 187.
20. Id.at215.
21. Although derived from the Court's opinion in Diehr, this test became known as the FreemanWalter-Abele test after the three appellate cases that elaborated it in greater detail. In re Freeman, 573
F.2d 1237 (C.C.P.A. 1978); In re Walter, 618 F.2d 758 (C.C.P.A. 1980); In re Abele, 684 F.2d 902
(C.C.P.A. 1982).
HeinOnline -- 89 Cal. L. Rev. 9 2001
CALIFORNIA L4 WREVIEW
[Vol. 89:1
In 1994, the en banc Federal Circuit decided In re Alappat, opening a
new era in software patent protection.2 The decision established that the
"otherwise statutory process or apparatus" requirement may be satisfied by
the simple expedient of drafting claims to include a general purpose computer or standard hardware or memory element that would be necessary for
any useful application of the algorithm. The Alappat court reasoned that "a
general purpose computer in effect becomes a special purpose computer
once it is programmed to perform particular functions pursuant to
instructions from program software."23 Accordingly, the court ruled, it need
not even perform the inquiry required by the Freeman-Walter-Abeleline of
cases. After Alappat, companies that wanted to patent software no longer
needed to pretend they were patenting something else. They needed only to
define their claims in terms of a computer program implemented in a
machine.
The reasoning of Alappat, however, did not appear to encompass
claims reading on computer programs themselves, as opposed to programs
implemented in a machine or system. That obstacle to computer-related
patent claims fell in 1995, when IBM appealed the PTO's rejection of a
claim to "computer programs embodied in a tangible medium, such as
floppy diskettes" to the Federal Circuit.24 While the appeal was pending,
the PTO decided not to oppose the claim. Shortly thereafter, it issued new
examining guidelines for software patents that directed examiners to
approve such claims.2
The remaining legal barriers to patenting "pure" software dissolved
completely in 1998 when the Federal Circuit decided State Street Bank &
Trust v. Signature FinancialGroup.26 There, the court reversed a district
court's rejection of a patent for a software-implemented financial system
that automatically calculated and allocated profits from a joint stock
account. The court concluded that the Freeman-Walter-Abele test "has
little, if any, applicability to determining the presence of statutory subject
matter."2 7 Instead, it reasoned, even physical structure was unnecessary, so
long as a process or idea was useful:
22. 33 F.3d 1526 (Fed. Cir. 1994) (en banc).
23. Id. at 1545. As a philosophical matter, this approach is troubling. As the dissent explained,
"[w]hether or not subject matter is a 'new machine' within § 101 is precisely the same question as
whether or not the subject matter satisfies the § 101 analysis .... [A] player piano playing Chopin's
scales does not become a 'new machine' when it spins a roll to play Brahms' lullaby." Id. at 1566-67
(Archer, C.J., concurring in part and dissenting in part) (citations omitted). On the other hand, if the
"machine" in question consists of the hardware combined with the software, the combination is
certainly new. Cf Alan L. Durham, Useful Arts in the Information Age, 1999 B.Y.U. L. REv. 1419,
1519-20 (discussing the "new machine" approach ofAlappat).
24. In re Beauregard, 53 F.3d 1583, 1584 (Fed. Cir. 1995).
25. United States Patent and Trademark Office, Examination Guidelines for ComputerImplemented Inventions, 61 Fed. Reg. 7478, 7479-80 (Jan. 1996).
26.
149 F.3d 1368 (Fed. Cir. 1998), cert. Denied, 525 U.S. 1093 (1999).
27. Id. at 1374.
HeinOnline -- 89 Cal. L. Rev. 10 2001
2001]
PA TENT SCOPEAND INNOVATION
Today, we hold that the transformation of data, representing
discrete dollar amounts, by a machine through a series of
mathematical calculations into a final share price, constitutes a
practical application of a mathematical algorithm, formula, or
calculation, because it produces "a useful, concrete and tangible
result"--a final share price momentarily fixed for recording and
reporting purposes and even accepted and relied upon by
regulatory authorities and in subsequent trades.2 8
The Federal Circuit affirmed this reasoning in AT&T v. Excel
2 9 There, the court upheld as patentable subject matter
Communications.
claims to a method for "generating a message record for an interexchange
call" and recording to whom the call should be billed.3" The court applied
State Street's "useful, concrete and tangible result" test and concluded that
the generation of billing records was clearly useful." Noting that physical
transformation is only one of several possible ways to bring about a useful
result, the court specifically rejected the argument that a patentable
software claim must have physical structure associated with it. 2
The end result of this history (and more than a quarter century of debate) is to leave the question of patentable subject matter very much where
it would have been if Benson had come out the other way. As we will
show, however, the protracted debate has nonetheless produced significant,
though unintended, consequences for the patent system.
B.
Practice: Anything Goes?
One might suppose that as a result of the long debate over software's
eligibility for patent protection, software patents have only recently begun
to issue in large numbers. Nothing could be further from the truth.
Gradually, behind the scenes, and without the participation of the Supreme
Court or even the Federal Circuit, software inventions of all types have
been patented for some time. Close to one hundred thousand software or
software-related patents are now in force in the United States, and several
thousand more are being issued every year.33 Numerous patents issued in
28. Id. at 1373.
29. 172 F.3d 1352 (Fed. Cir. 1999). On remand, the district court held the patent invalid under
§ 102. AT&T Corp. v. Excel Communications, 52 U.S.P.Q.2d 1865 (D. Del. 1999).
30. 172 F.3d at 1354.
31. Id. at 1361.
32. Id.
33. How many software patents exist depends in part on how one defines a software patent.
Based on trends though mid-1998, Greg Aharonian projected that there would be over eighty thousand
software patents in force as of early 2000, approximately forty thousand of which were issued by the
end of 1995. Internet Patent News Service, at http://swpat.ffii.org/penmi/bmwi-20000518/
aharonian/stat-1998.txt(visited June 16, 2000). John Allison and Mark Lemley estimate that during a
two-year period in the late 1990s, the PTO issued approximately eighteen thousand software patents.
John R. Allison & Mark A. Lemley, Who's Patenting What? An Empirical Exploration of Patent
Prosecution, 53 VAXm. L. REv. (forthcoming 2000). These statistics suggest that the total number of
HeinOnline -- 89 Cal. L. Rev. 11 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
the 1980s and early 1990s cover pure data structures, 34 methods for performing calculations in a data processor,35 data compression algorithms,36
and software-based encryption algorithms, 37 despite the then-questionable
statutory nature of such claims. Now, after State Street and AT&T, patents
are being issued for software without any limitation as to tangible form,
and for "propagated signals"--in effect, "signals" claims directed to "a
manufactured transient phenomenon, such as an electrical, optical, or
acoustical signal."3 Like it or not, software patents are here to stay.
The confused judicial history of software patents has had important
consequences for the present day, however. By focusing attention on the
patentable subject matter debate, and giving at least lip service to the idea
that software per se was unpatentable well into the 1990s, the court decisions we have discussed created a climate in which the actual patenting of
software was largely ignored. As a result, the PTO only recently has begun
to grapple with the difficult problems of identifying, cataloging, and
searching for software prior art. In the meantime, tens of thousands of
software patents have passed through the system.
For a variety of reasons, it is reasonable to think that these software
patents have not been subject to the detailed examination for novelty and
nonobviousness that they require. First, because software was not thought
patentable on its own until recently, the PTO has only recently taken steps
to hire patent examiners qualified in computer software or related fields.3 9
During the 1980s and the early part of the 1990s, the flood of software patent applications was handled largely by people operating outside their area
of expertise. Abundant evidence indicates that the PTO has issued software
existing software patents is no less than fifty thousand, and probably much higher. For earlier estimates,
see Simson L. Garfinkel, Patently Absurd, WIRED, July 1994, at 104, 106 (stating that over twelve
thousand software patents had been issued by the end of 1993), and John T. Soma & B.F. Smith,
Software Trends: Who's Getting How Many of What? 1978 to 1987, 71 J. PAT. & TRADEMARK OFF.
Soc'Y 415, 419-21,428-32 (1989).
34. E.g., U.S. Patent No. 5,488,717 (issued Jan. 30, 1996); U.S. Patent No. 5,414,701 (issued
May 9, 1995).
35. E.g., U.S. Patent No. 5,386,375 (issued Jan. 31, 1995).
36. E.g., U.S. Patent No. 5,051,745 (issued Sept. 24, 1991).
37. E.g., U.S. Patent No. 5,530,752 (issued June 25, 1996); U.S. Patent No. 4,405,829 (issued
Sept. 20, 1983).
38. Jeffrey R. Keuster et al., A New Frontierin Patents: Patent Claims to PropagatedSignals,
17 J. MARSHALL J. COMP. & INFO. L. 75, 75 (1998) (discussing propagated signal claims); Gregory A.
Stobbs, PatentingPropagatedDataSignals: What Hath God Wrought?, IEEE CoMMuNICATIONS, July
2000, at 98 (same). Keith Witek offers an exhaustive guide to patenting computer programs and
algorithms in a number of different forms, along with some analysis of the advantages and
disadvantages of each, in Keith E. Witek, Developing a Comprehensive Software Claim Drafting
Strategyfor U.S. Software Patents, I1 BERKELEY TECH. LJ.363 (1996).
39. See Scott Thurm, A Flood of Web Patents Stirs Dispute Over Tactics, WALL ST. J., Oct. 9,
1998, at BI (noting that the PTO did not hire its first examiner with a degree in computer science until
1995). Indeed, until recently computer scientists were not even eligible to sit for the patent bar. See
Cohen, supranote 5, at 1176.
HeinOnline -- 89 Cal. L. Rev. 12 2001
2001]
PA TENT SCOPEAND INNOVATION
patents on a number of applications that did not meet the standard tests of
novelty and nonobviousness. 40 Second, for similar reasons, the PTO's classification system historically has not been equipped to handle software patents. As a result, software patents tended to be classified according to the
field in which the software will ultimately be used (say, pizza ovens),
rather than according to the nature of the software invention. 41 This in turn
makes it much harder for examiners to find relevant prior art. Finally, prior
art in this particular industry may simply be difficult or, in some cases, impossible to find because of the nature of the software business. Unlike inventions in more established engineering fields, most software inventions
are not described in published journals. Software innovations exist in the
source code of commercial products and services that are available to
customers. This source code is hard to catalog or search for ideas.42
Commentators similarly have tended to neglect the non-subject matter
issues associated with software patents. While there is a voluminous literature on whether software is (or should be) patentable subject matter,43
40. For anecdotes discussing some of the more extreme examples, see Garfinkel, supra note 33,
at 104; Merges, supra note 3, at 588-91.
41. See MaK A. LEMLEY ErAL., SoFnvARE AND INTER'Nr LAw 332 (2000).
42. As Julie Cohen has previously explained:
[lin the field of computers and computer programs, much that qualifies as prior art lies
outside the areas in which the PTO traditionally has looked-previously issued patents and
previous scholarly publications. Many new developments in computer programming are not
documented in scholarly publications at all. Some are simply incorporated into products and
placed on the market; others are discussed only in textbooks or user manuals that are not
available to examiners on line. In an area that relies so heavily on published, "official" prior
art, a rejection based on "common industry knowledge" that does not appear in the scholarly
literature is unlikely. Particularly where the examiner lacks a computer science background,
highly relevant prior art may simply be missed. In the case of the multimedia data retrieval
patent granted to Compton's New Media, industry criticism prompted the PTO to reexamine
the patent and ultimately to reject it because it did not represent a novel and nonobvious
advance over existing technology. However, it would be inefficient, and probably
impracticable, to reexamine every computer program-related patent, and the PTO is unlikely
to do so.
Cohen, supranote 5, at 1179 (footnotes omitted).
43. See generally, e.g., GREGORY A. STOBBS, SoFrnVARE PATENTS (1995); David S. Benyacar,
Mathematical Algorithm Patentability: Understanding the Cotfusion, 19 RUTGERS COMPUTER &
TECH. L.J. 129 (1993); Donald S. Chisum, The Patentabilityof Algorithms, 47 U. Prrr. L. Rav. 959
(1986); Irah H. Donner & J. Randall Beckers, Throwing Out Baby Benson with the Bath
Water: Proposing a New Test for Determining Statutory Subject Matter, 33 Jtmmmaacs J. 247
(1993); Lee Hollaar, Justice Douglas Was Right: The Need For CongressionalAction On Software
Patents,24 AIPLA Q.J. 283 (1996); Allen Newell, The Models Are Broken, The Models Are Broken!,
47 U. Prrr. L. REV. 1023 (1986); Oddi, supra note 5; Samuelson, supra note 13; Samuelson et al.,
supra note 5; Richard H. Stem, Tales from the Algorithm War: Benson to Iwahashi, It's D~ji Vu All
Over Again, 18 AIPLA Q.J. 371 (1991); Jur Strobos, Stalking the Elusive Patentable Software: Are
There Still Diehr or Was It Just a Flook?, 6 HaRv. J.L. & TECH. 363 (1993); John Swinson, Copyright
or Patentor Both: An AlgorithmicApproach to Computer Software Protection,5 H~av. J.L. & TECH.
145 (1991); Jonathan N. Geld, Note, General Does Not Mean Generic-Shedding Light on In re
Alappat, 4 Tax. INmTuE. PRoP. LJ. 71 (1995); Maximilian R. Peterson, Note, Now You See It, Now You
Don't: Was It a PatentableMachine or an Unpatentable "Algorithm"? On Principle and Expediency
in CurrentPatentLaw DoctrinesRelating to Computer-RelatedInventions, 64 GEO. WASH. L. REv. 90
(1995). For a more recent approach focusing on constitutionality, but still in the context of patentable
HeinOnline -- 89 Cal. L. Rev. 13 2001
CALIFORNIA LA W REVIEW[
[Vol. 89:1
there is much less discussion of other patent validity issues. Only in the
latter part of the 1990s, as the Federal Circuit began to decide obviousness,
enablement, and best mode cases involving software, did we start to see
any significant discussion of these issues.'
Even less attention has been paid to questions of patent infringement
and defenses to infringement claims. Despite what is now a large body of
case law involving infringement of software patents, there is almost no
academic treatment of the problem." Only recently have commentators
46
begun to discuss potential defenses to software patent infringement suits.
Our goal in the balance of this Article is to address these problems in an
integrated way, with an eye towards the particular characteristics of the
software industry.
C.
Theory: Software Patentsand the "Prospect"Theory of PatentScope
The rapid introduction of large numbers of software patents into the
patent system means that within a relatively short time, the background
conditions for software innovation have been substantially reconfigured.
Our analysis in Parts II and III suggests that because of the distinctive
characteristics of software, these patents also may be accorded unprecedented breadth. In economic terms, this regime for software patents would
resemble that outlined by Edmund Kitch in 1977, years before the question
of software patentability became a pressing one.47 The case of software
patents thus offers a unique opportunity to assess the utility of an
influential theoretical model.
Kitch based his "prospect" theory on an analogy to nineteenth-century
mining claims, which reserved for first-comers all rights to explore the described terrain. Under the prospect theory of patent scope, issued patents
would operate as broad reservations of rights in the technical landscape. As
a result, patentees could credibly seek to exact royalties for nearly all improvements, whether literally infringing or not. Improvers, meanwhile,
would need to think twice before refusing such demands. To a greater
subject matter, see Robert A. Kreiss, Patent Protectionfor Computer Programs and Mathematical
Algorithms: The ConstitutionalLimitations on PatentableSubject Matter,29 N.M. L. REv. 31 (1999).
44. See Cohen, supra note 5, at 1169-70; Alan P. Klein, Reinventing the Examination Processfor
PatentApplications CoveringSoftware-Related Inventions, 13 J. MARSHALL J. CoMPuTER & INFo. L.
231 (1995); Merges, supranote 3, at 588-605; Stem, supranote 43, at 395.
45. An exception is Richard H. Stem, On Defining the Concept of Infringement of Intellectual
PropertyRights in Algorithms and Other Abstract Computer-RelatedIdeas, 23 AIPLA QJ. 401 (1995).
Even this early effort ends up focusing primarily on questions of patentable subject matter, however.
46. E.g., Maureen A. O'Rourke, Towards a Fair Use Defense in Patent Law, 100 COLum. L.
REv. 1177 (2000); Robert P. Merges, Who Owns the CharlesRiver Bridge? IntellectualProperty and
Competition in the Software Industry (2000) (on file with both authors).
47. Edmund W. Kitch, The Nature and Function of the Patent System, 20 J.L. & ECON. 265
(1977).
HeinOnline -- 89 Cal. L. Rev. 14 2001
2001]
PA TENT SCOPE AND INNOVATION
degree than ever before, second-comers would need permission to develop
and market their innovations.
Kitch argued that a prospect system would produce both a more efficient allocation of resources to technical problems and greater overall progress. First, the system would prevent unnecessary decreases in social
wealth by minimizing wasted or redundant efforts by competing improvers. 48 Since patents impose costs on society, a crucial assumption
underlying this argument is that the opportunity costs generated by competing improvers exceed the deadweight losses that broad patents would
generate.49 Second, Kitch argued that a prospect system would maximize
social wealth by ensuring both optimal incentives to commercialize the
invention and the optimal allocation of licenses to develop improvements. 0
This argument is based on a set of assumptions about the rational behavior
of prospect owners and improvers. It assumes that owners can readily
identify, and would readily license, successful improvers; that the gains
from coordination would outweigh the costs of any strategic behavior by
owners and improvers; and that the initial allocation of stronger property
rights to the prospect owner would not adversely affect improvers' incentives (or that an overall increase in productivity would outweigh any such
adverse effect).
The prospect theory of optimal patent scope has both adherents and
critics. 5' We take no position here on the abstract merits of the theory, or
the question whether it might be sound as applied to some other class of
inventions. We believe, however, that a shift of this magnitude in the operation of the patent law as applied to software should not go unremarked.
Before adopting, or acceding to, a "prospect" system for software patents,
it is important to ask whether such a system represents good policy for
software innovation.
Whether a prospect approach is the right one for the software industry
depends on whether Kitch's assumptions about relative costs and incentive
effects are right, given the conditions in that industry. What are the patterns
of innovation, and who are the innovators? How do technical constraints,
such as interoperability requirements, and economic constraints, such as
network effects, affect innovative patterns and practices? Is the class of
48. Id. at 276,278.
49. A patent prevents some who would otherwise want to use the patented invention at a
competitive price from doing so. This effect is termed "deadweight loss."
50. Kitch, supranote 47, at 276-78.
51. For adherents, see Mark F. Grady & Jay I. Alexander, Patent Law and Rent Dissipation,78
VA. L. REv. 305 (1992). For critics, see Seth A. Cohen, To Innovate or Not to Innovate, That Is the
Question: The Functions, Failures, and Foibles of the Reward Function Theory of Patent Law in
Relation to Computer Software Plaforms, 5 MICH. TELECOMM. & TECH. L. RPv. (1998), at
http:llwwv.law.umich.edulmttlr/volfivelcohen.html; Mark A. Lemley, The Economics of Improvement
in Intellectual PropertyLaw, 75 TEx. L. REv. 989 (1997); Robert P. Merges & Richard R. Nelson, On
the Complex Economics ofPatentScope, 90 CoLuM. L. Rav. 839 (1990).
HeinOnline -- 89 Cal. L. Rev. 15 2001
CALIFORNIA LA WREVIEW
[Vol. 89:1
potential inventors and improvers small and homogeneous or is it large and
heterogeneous? The remainder of this Article evaluates the effects of patent
doctrine on software innovation in light of these and other considerations.
In Parts II and III, we conclude that the particular characteristics of innovation within the software industry militate against such an approach, and
that patents should be construed narrowly to avoid stifling progress.
II
REVERSE ENGINEERING PATENTED SoFrWARE
Courts and scholars have devoted an enormous amount of time and
effort to discussing the practice of reverse engineering computer software. 2 That discussion has primarily taken place under the aegis of trade
secret and copyright laws because historically it was those laws that protected computer programs. 3 As we explain in Part II.A, although reverse
52. Reverse engineering of software, also called "decompilation," involves working backwards
from object code to produce a simulacrum of the original source code. Andrew Johnson-Laird,
Software Reverse Engineeringin the Real World, 19 U. DAYTON L. REv. 843 (1994).
53. Virtually all recent court decisions have endorsed reverse engineering in some circumstances.
E.g., Sony Computer Entm't, Inc. v. Connectix Corp., 203 F.3d 596 (9th Cir. 2000); DSC
Communications Corp. v. DGI Techs., Inc., 81 F.3d 597, 601 (5th Cir. 1996); Bateman v. Mnemonics,
Inc., 79 F.3d 1532, 1539 n.18 (11th Cir. 1996); Lotus Dev. Corp. v. Borland Int'l, Inc. 49 F.3d 807,
817-18 (1st Cir. 1995) (Boudin, J., concurring); Atari Games Corp. v. Nintendo of America, Inc., 975
F.2d 832, 843-44 (Fed. Cir. 1992); Sega Enters. Ltd. v. Accolade, Inc., 977 F.2d 1510, 1527-28 (9th
Cir. 1992); Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 270 (5th Cir. 1988); DSC
Communications Corp. v. Pulse Communications, Inc., 976 F. Supp. 359 (E.D. Va. 1997); Mitel, Inc. v.
Iqtel, Inc., 896 F. Supp. 1050 (D. Colo. 1995), aff'd on other grounds, 124 F.3d 1366 (10th Cir. 1997);
cf DSC Communications Corp. v. Pulse Communications, Inc., 170 F.3d 1354 (Fed. Cir. 1999)
(acknowledging the right to reverse engineer for some purposes, but holding it unjustified in that case).
On the other hand, a few early decisions rejected compatibility as a justification for copying. E.g.,
Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240 (3d Cir. 1983); Digital
Communications Ass'n v. Sofiklone Distrib. Corp., 659 F. Supp. 449 (N.D. Ga. 1987).
As with courts, the overwhelming majority of commentators endorse a right to reverse engineer
copyrighted software, at least for certain purposes. See, e.g., JONATHAN BAND & MAsANOBU KATOH,
INTERFACES ON TRIAL: INTELLECTUAL PROPERTY AND INTEROPERABILITY IN THE GLOBAL SOFW1ARE
INDUSTRY 167-226 (1995); Cohen, supra note 5; Lawrence D. Graham & Richard 0. Zerbe, Jr.,
Economically Efficient Treatment of Computer Software: Reverse Engineering, Protection, and
Disclosure, 22 RUTGERS COMPUTER & TECH. L.J. 61 (1996); Dennis S. Karjala, Copyright Protection
of Computer Software, Reverse Engineering,and ProfessorMiller, 19 U. DAYTON L. REv. 975, 101618 (1994); Maureen A. O'Rourke, Drawingthe BoundaryBetween Copyright and Contract: Copyright
Preemption of Software License Terms, 45 DUKE L.J. 479, 534 (1995); David A. Rice, Sega and
Beyond: A Beaconfor FairUse Analysis . .. At Least as Faras It Goes, 19 U. DAYTON L. REv. 1131,
1168 (1994); Pamela Samuelson, FairUse for Computer Programsand Other Copyrightable Works in
DigitalForm: The Implications of Sony, Galoob and Sega, 1 J. INTELL. PROP. L. 49 (1993); Tyler G.
Newby, Note, What's Fair Here Is Not Fair Everyivhere: Does the American Fair Use Doctrine
Violate InternationalCopyright Law?, 51 STAN. L. REv. 1633, 1657-58 (1999); Timothy Teter, Note,
Merger and the Machines: An Analysis of the Pro-Compatibility Trend in Computer Software
Copyright Cases,45 STAN. L. REv. 1061 (1993) (arguing that the value of computer programs depends
on interoperability); see also Pamela Samuelson & Suzanne Scotchmer, The Law and Economics of
Reverse Engineering (working paper 2000) (on file with authors) (suggesting that reverse engineering
should be legal when it promotes interoperability, but not when it permits free riding).
HeinOnline -- 89 Cal. L. Rev. 16 2001
2001]
PA TENT SCOPE AND INNOVATION
engineering of most types of patented inventions does not constitute infringement, the reverse engineering of patented software may be an exception. Part l1.B discusses the reasons that the ability to reverse engineer
software are important to the overall health of the software industry. In Part
II.C, we explore the various ways in which courts or, as a last resort,
Congress, might correct this software-specific anomaly in the patent law's
54
reach.
A.
Software-Specific Barriersto Lawful Reverse Engineeringof Patented
Inventions
The intellectual property regimes that have traditionally protected
software permit reverse engineering. Under trade secret law, there is no
question that reverse engineering is legal.15 Indeed, the Supreme Court has
made it clear that the continued presence of a reverse engineering exception in trade secret law is necessary to avoid federal preemption. 6 Software
vendors who rely on trade secret law, then, must accept the possibility that
a consumer will reverse engineer their publicly-distributed object code and
discover the secrets contained in the program.
While there is no express statutory provision in the copyright laws
permitting reverse engineering, virtually every court to consider the issue
has concluded that there is a right to reverse engineer a copyrighted program for at least some purposes. The source of that right is generally considered to be the fair use doctrine,57 though reverse engineering finds some
For a contrary view, see generally Anthony L. Clapes, Confessions of an Amicus
Curiae: Technophobia, Law and Creativity in the DigitalArts, 19 U. DAYTON L. REv. 903 (1994)
(contending that there should be no right to reverse engineer software), and Arthur R. Miller, Copyright
Protectionfor Computer Programs, Databases,and Computer-Generated Works: Is Anything New
Since CONTU?, 106 HAiv. L. REv. 977 (1993) (same).
For a discussion of the history of copyright protection of software, see generally Pamela
Samuelson, CONTU Revisited: The Case Against Copyright Protectionfor Computer Programs in
Machine-ReadableForm, 1984 DuKE .J. 663 (1984).
54. There are other potential threats to the reverse engineering right, notably contract law, and
other areas in which reverse engineering is well established, notably the Semiconductor Chip Protection
Act, 17 U.S.C. § 906(a), and the Digital Millennium Copyright Act, 17 U.S.C. § 1201(t). These issues
are beyond the scope of this Article.
55. E.g., UNIF. TRADE SECRmS Acr § 1, cmt., 14 U.L.A. 438-39 (1990); Chicago Lock Co. v.
Fanberg, 676 F.2d 400 (9th Cir. 1982); RESTATEMENT OF ToRTs § 757 cmt. f (1939); RESTATEmENT
(THRn) UNFAIR CoMPETrroN § 43 (1995). The new federal criminal trade secrets statute, by contrast,
is silent on the subject of reverse engineering. 18 U.S.C.A. §§ 1831-1839 (1984 & Supp. 2000); see
also James H.A. Pooley et al., Understandingthe Economic EspionageAct of 1996, 5 TEX. INTELL.
PROP. LJ. 177, 195-97 (1997) (arguing that the EEA might be construed to prohibit reverse
engineering, but that it should not be).
56. See Bonito Boats, Inc. v. Thunder Craft Boats, Inc., 489 U.S. 141, 160 (1989); Kewanee Oil
Co. v. Bicron Corp., 416 U.S. 470 (1974) (trade secret law not preempted by patent because the reverse
engineering exception weakens trade secret law sufficiently that it does not interfere with patent
policy).
57. 17 U.S.C. § 107 (1994). For cases finding a right to reverse engineer under fair use
principles, see supranote 53.
HeinOnline -- 89 Cal. L. Rev. 17 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
support in the copyright misuse doctrine as well. 8 Courts have not determined that all reverse engineering is necessarily fair use; rather, as required
by general principles of fair use, they have engaged in a case-by-case inquiry into the purposes and effects of the defendant's conduct. Reverse
engineering has been held lawful primarily when used for laudable competitive purposes, such as producing new works that compete with the
copyrighted original, producing products for downstream markets that are
compatible with the copyrighted original, and obtaining access to uncopyrighted ideas, facts, or other material "locked up" within a copyrighted
work. 9 Because reverse engineering is costly, this legal rule does not foreclose the possibility of a licensing arrangement. But it does prevent a
potential licenser from refusing to deal at all, and it imposes a natural upper
limit-the cost of reverse engineering-on what a licensee will be willing
to pay.
60
The introduction of patent protection for computer software threatens
to change the equation, however. The patent statute includes no express
provision allowing reverse engineering, nor is there any judiciallydeveloped exception akin to copyright's fair use doctrine that might permit
it. In theory, an express provision authorizing reverse engineering would be
superfluous if the enabling disclosures required to secure a patent were sufficiently strong.6 1 However, the Federal Circuit does not require would-be
patentees of software inventions to disclose the implementing source code,
or indeed very much at all about their inventions.62 Accordingly, software
58. For a discussion of reverse engineering under principles of copyright misuse, see, for
example, Cohen, supra note 5; O'Rourke, supra note 53, at 550; James A.D. White, Misuse or Fair
Use? That Is the Software Copyright Question, 12 BERKELEY TECH. LJ. 251, 287-88 (1997). For
general background on the copyright misuse doctrine, see 2 PAUL GOLDSTEIN, CoPYIGTrr §§9:38-1 to
9:39 (2d ed. 1998); Marshall Leaffer, Engineering Competitive Policy and Copyright Misuse, 19 U.
DAYTON L. REv. 1087 (1994); and Mark A. Lemley, Beyond Preemption: The Law and Policy of
IntellectualPropertyLicensing,87 CALIF. L. REv. 111, 151-58 (1999).
59.
E.g., Sony Computer Entrn't, Inc. v. Connectix Corp., 203 F.3d 596 (9th Cir. 2000) (holding
that it was lawful to reverse engineer a video game system as an intermediate step to creating a
computer program that would allow games designed for that system to run on a PC); Bateman v.
Mnemonics, Inc., 79 F.3d 1532, 1539-40 n.18 (11th Cir. 1996) (endorsing the use of reverse
engineering to gain access to the unprotectable ideas in a program, as well as access to copyrighted
expression that might be used fairly); Sega Enters. Ltd. v. Accolade, Inc., 977 F.2d 1510 (9th Cir. 1992)
(holding that reverse engineering was lawful where necessary to make an independently created video
game work with the plaintiff's game system); Atari Games Corp. v. Nintendo of America, Inc., 975
F.2d 832, 843-44 (Fed. Cir. 1992) (same); Vault Corp. v. Quaid Software Ltd., 847 F.2d 255 (5th Cir.
1988) (holding that reverse engineering was lawful when done in order to make a product that defeated
the plaintiff's copyrighted encryption product). But see DSC Communications Corp. v. Pulse
Communications, Inc., 170 F.3d 1354 (Fed. Cir. 1999) (rejecting a reverse engineering claim on the
particular facts before it).
60. See Samuelson & Scotchmer, supranote 53.
61. 35 U.S.C. § 112 (1994) (requiring patent applicants to describe their invention in such detail
as to enable others to make and use it).
62. Infra notes 85-87 and accompanying text.
HeinOnline -- 89 Cal. L. Rev. 18 2001
2001]
PATENT SCOPEAND IAWOVATION
patents present unique obstacles to consummation of the patent law's
traditional rights-for-disclosure bargain with the public.
The specific reverse engineering techniques commonly used for software may also raise some infringement problems that are unique to software. The definition of infringement in the patent statute is extremely
broad, encompassing anyone who "makes, uses, sells, offers to sell, or
imports" a patented product.63 Reverse engineering a patented computer
program by decompiling 4 it likely fits within this broad category of prohibited conduct, at least where the program itself is claimed as an apparatus. Reverse engineering clearly constitutes a "use" of the patented
softvare, though owners of a particular copy of the program surely have
the right to use it.6 More significantly, decompilation may also constitute
"making" the patented program by generating a temporary yet functional
copy of it in RAM memory," and, in certain instances, a longer-term
(though still "intermediate") copy in more permanent memory.67 Those
copies probably constitute patent infringement, unless protected by some
defense. a
63. 35 U.S.C. § 271(a) (1994).
64. We are concerned in this Part primarily with reverse engineering by "decompilation," that is,
working backwards from the object code to construct a simulacrum of the source code. Other forms of
reverse engineering, such as "black-box" reverse engineering, which infers details about a program's
structure by testing its response to different inputs, do not involve making even temporary copies of the
program, though they certainly involve "using" it. Our subsequent references to "reverse engineering"
should be understood to refer to decompilation, not to black-box reverse engineering.
65. On the implied license and exhaustion doctrines that confer such a right, see infra Part II.C.2.
66. It seems clear that generating even temporary instantiations of a patented product "make" that
product for purposes of patent infringement. This principle is firmly established in the pharmaceutical
context, where courts have held that a patent is infringed when the patented product is generated by
metabolization of a different drug within the human body, and that chemical "intermediates"
temporarily generated in the course of making a final product infringe a patent covering those
intermediates. E.g., Hoechst-Roussel Pharm., Inc. v. Lehman, 109 F.3d 756, 759 (Fed. Cir. 1997);
Zenith Labs v. Bristol Myers Squibb, 19 F.3d 1418, 1422 (Fed. Cir. 1994); see also Keith E. Witek,
Sofvare Patent Infringement on the Internet and on Modern Computer System-Who Is Liable for
Damages?, 14 SANTA CLARA CompurER & HIGH TECH. L.J. 303 (1998) (arguing that since patent law
lacks a fixation requirement, even near-instantaneous duplication of patented software is a prohibited
"making" of the patented product).
Mahajan argues that reverse engineering for valid social purposes (compatability, competition or
study) may be necessary, and likely does not constitute patent infringement. Anthony J. Mahajan, Note,
IntellectualProperty, Contracts,and Reverse EngineeringAfter ProCD: A Proposed Compromisefor
Computer Software, 67 FoRDHArm L. REv. 3297, 3317-18 (1999). However, we think Mahajan has
confused the result the law should reach with the result a court likely would reach by applying the
statute.
67. Thus, an article of manufacture claim to a particular program "encoded on a computer hard
drive" might be infringed by a reverse engineered copy temporarily stored on a computer hard drive.
68. One possible argument that the copies are noninfringing is that most copies made during the
reverse engineering process are nonfunctional, either because they are only partial or because they are
converted to assembly language or source code form. Theoretically, a source code readout of a
computer program could be considered a description of the invention, rather than a copy of the
invention itself. Nonetheless, decompilation also involves the generation of object code "copies" of the
patented program, at least in RAM.
HeinOnline -- 89 Cal. L. Rev. 19 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
We note here that "software patents" are not a unitary phenomenon;
thus, reverse engineering will not constitute infringement in all cases where
it is employed. Parsing the question of whether reverse engineering
"makes" a copy of the invention covered by a software patent requires,
first, that we specify what we mean by a software patent. As Dennis
Karjala has observed, software patents fall into two basic types: "pure"
software patents claiming improvements in programming or inventions
embodied wholly in a program, and "computer-related" inventions in
which the claim is for a machine or process that happens to use a computer
program.69 To date, the latter have been more common, but we are seeing
more and more pure software claims. An invention that includes software
only as one component in a larger machine or process is unlikely to be
"made" if the software component is reverse engineered. However, pure
software inventions can be made in their entirety during the reverse engineering process. This is especially true of patents on inventions that are
embedded in a larger program, such as a patent on a "system" of sorting
data or dynamically linking items in a list.
Whether reverse engineering infringes a patent will further depend on
the way the claim is written. Software inventions can be claimed as a process (a series of steps for accomplishing a result), an article of manufacture
(the program itself, often embodied in a tangible item such as a floppy
disk), or an apparatus (a machine, device, or system that performs a particular function).70 Most clearly, reverse engineering a computer program
will involve the making or using of a pure software invention covered by
an article of manufacture or apparatus patent, because those patents cover
the program itself rather than some use of the program. If the patentee has
a process claim, whether reverse engineering will constitute infringement
depends on what that claim covers. A process claim that is internal to the
software, that is, one whose steps involve the internal operation of the program may be "used" automatically when the program is run or tested, or
even when it is loaded into RAM. By contrast, an "external" process claim
that requires the use of the program to perform some function in the real
world probably would not be "used" during the process of reverse engineering. Because the patent with an external claim will be written to cover
a process of generating some outcome or performing some function in the
real world, only someone who actually performs the stated function will
69. Kajala, supra note 5, at 60-63.
70. 35 U.S.C. § 101 (1994) (permitting patents for a "process, machine, manufacture, or
composition of matter"). Where part of a claim is written in "means-plus-function" format, determining
the scope of the claim will require reference to the structure actually disclosed in the patent
specification. Such claims are particularly common in software cases. See Mark D. Janis, Who's Afraid
of Functional Claims? Reforming the Patent Law's § 112, fJ 6 Jurisprudence, 15 SANTA CLARA
COMPUTER & HIGH TECH. LJ. 231, 235 (1999). For an explanation of means-plus-function claims, see
35 U.S.C. § 112 $ 6 (1994).
HeinOnline -- 89 Cal. L. Rev. 20 2001
2001]
PA TENT SCOPE AND INNOVATION
infringe the method claim. The temporary copies generated by reverse
engineers likely will not perform this function, and therefore will not
infringe.
In short, some, but not all, software patent claims will raise the issue
we discuss in this Part.71 In the remainder of Part II, we are discussing only
that subset of software patents for which the reverse engineering problem
arises. For this class of patents, probably the majority of true software patents, there is reason to believe that applying patent law to software significantly changes the rules of the game for some would-be reverse engineers.
This problem is far from hypothetical. In 1999, Sony sued Connectix for
copyright infringement based on Connectix's successful effort to reverse
engineer the Sony PlayStation and produce an emulator that would run
Sony video games on a Macintosh computer. The Ninth Circuit held that
Connectix's reverse engineering did not violate copyright law because it
constituted fair use.72 Less than a week later, Sony filed another lawsuit
charging that Connectix's reverse engineering efforts constituted patent
infiingement, precisely the argument this section addresses. In 2000, Sony
filed a similar patent lawsuit against Bleem, again after losing on its copyright infringement claims.73 Meanwhile, Microsoft has asserted patents on
a popular video file fonnat to block distribution of an open source version
developed by reverse engineering.74
B.
Innovation and Reverse Engineering: An Industry-BasedAnalysis
The wisdom of permitting reverse engineering of software has been
debated extensively in the last two decades. 75 We do not intend to rehash
all those arguments here, though we think it clear that advocates of reverse
engineering have the better part of the argument. Briefly, reverse engineering is an important means of preserving competition between different
products and of preserving compatibility between products. In markets
characterized by network effects, such as software, this latter objective is
particularly important.76
71.
Karjala argues that there is no reason to treat a software invention differently depending on
the form in which it appears, because the invention lies in the methodology. Karjala, supra note 5, at
67-68. We are inclined to agree. However, for the reasons we suggest in this Part, we fear that the law
will treat these different forms differently. Over time, moreover, this differential treatment may create
incentives to draft claims in forms that will cover reverse engineering.
72. Sony Computer Entm't, Inc. v. Connectix Corp., 203 F.3d 596, 608 (9th Cir. 2000).
73. Sony Computer Entm't Am. v. Bleem, LLC, 214 F.3d 1022 (9th Cir. 2000); Bloomberg
News, Sony Sues Another Software Firm Over PlayStation Emulator (May 18, 2000), at
http://news.cnet.comnews/0-1006-202-1896822.html.
74. Andy Tai, Microsoft PatentsASF Media File Format, Stops Reverse Engineering (June 5,
2000), at http:/Avww.advogato.org/article/101.html.
75. Supra note 53 (citing commentators).
76. Network effects exist where the value a user derives from a product is a positive function of
how many others use the same product. Thus, telephony is a network market because a user's telephone
becomes more valuable as more and more users buy telephones. On the implications of network effects,
HeinOnline -- 89 Cal. L. Rev. 21 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
The nexus among intellectual property, compatibility, and network
effects is quite strong. To the extent that intellectual property rights confer
ownership interests in a strong network standard, they may create durable
market power in network markets. Conversely, the existence of compatibility between products or standards can in certain circumstances lower
entry barriers created by network effects. The existing reverse engineering
right afforded by the copyright and trade secret laws is particularly important in such markets because it facilitates competition within a network
standard in cases in which competition between standards is either
impossible or undesirable.77
These general arguments for permitting reverse engineering are
strong, but we think the case for permitting reverse engineering of patented
software is even stronger. Four additional policies specific to the patent law
militate in favor of a limited reverse engineering right. Reverse engineering
promotes the fundamental patent policies of disclosure and enablement,
ensures that patents will not be leveraged to protect unprotectable
components of software, preserves the balance sought by the intellectual
property system as a whole, and also helps patentees enforce their rights.
see, for example, Michael L. Katz & Carl Shapiro, Network Externalities, Competition, and
Compatibility, 75 AM. ECON. REv. 424 (1985), and Mark A. Lemley & David McGowan, Legal
Implications ofNetwork Economic Effects, 86 CALEn.L. REv. 479 (1998). Software is characterized by
network effects because widespread use facilitates interaction between different programs. Id. at 49192. On the importance of compatibility in the presence of network effects, see Joseph Farrell & Michael
L. Katz, The Effects of Antitrust and Intellectual PropertyLaw on Compatibility and Innovation, 43
ANTITRUST BULL. 609 (1998).
77. Competition between potential standards may be undesirable in a strong network market
because it can delay the adoption of a network standard. If the world were divided into two
incompatible telephone networks of approximately equal size, for example, consumers would be worse
off than with a monopoly phone system, because either network would only allow them to reach half of
the population. If the network effects are strong enough, the harm from splitting or even delaying
convergence upon a single standard will outweigh the value to competition between the potential
standards on the intrinsic merits. See generally, e.g., Mark A. Lemley, Antitrust and the Internet
StandardizationProblem, 28 CONN. L. REV. 1041 (1996); Mark A. Lemley & David McGowan, Could
Java ChangeEverything? The Competitive Propriety of a ProprietaryStandard,43 ANTITRUST BULL.
715 (1998).
Doug Lichtman has recently argued that facilitating competition in goods complementary to a
network market is actually undesirable, because it results in a price that is too high given the network
effects. He proposes that the network monopolist be permitted to control the market for complementary
goods in order to coerce a lower price in that market. Douglas Lichtman, PropertyRights in Emerging
Platform Technologies, 29 J. LEGAL STUDIEs 615 (2000). If Lichtman is correct-and we are not
persuaded that any system manufacturer that has actually sought to control complementary goods has
done so in order to reduce prices-his argument would be a reason to oppose reverse engineering in
one specific class of cases: complementary goods to strong network markets. But see Jeffrey Church &
Neil Gandal, Systems Competition, Vertical Merger,and Foreclosure,9 J. EcoN. & MGMT. STRATEGY
1 (2000) (arguing that control by a hardware manufacturer over complementary software goods leads to
monopolization of the complementary goods and higher prices).
HeinOnline -- 89 Cal. L. Rev. 22 2001
20011
PA TENT SCOPEAND I"NNO VA TION
1. Access to the PatentedInvention
To an even greater extent than copyright law, patent law anticipates
and even depends on one party improving another party's invention.7 8 The
patent statute itself expressly contemplates that "improvements" to other
inventions are themselves a patentable category of invention,79 and even
invites patent claims that declare their "subservience" to a previously patented invention." More importantly, patent law has developed doctrines
that deal specifically with the circumstance in which one party's invention
infringes another's patent, and yet at the same time represents an improvement on the first patented invention. These doctrines, denominated the
"blocking patents" rule and the "reverse doctrine of equivalents," reward
improvers even though their improvement infringes on a prior patent.8
Indeed, the reverse doctrine of equivalents even excuses literal
infringement if the infringer has radically improved the invention. 2
These doctrines are premised on access by improvers to the
underlying technology they can improve. Some inventions are readily
apparent once embodied in a product; think of the paper clip, for example. 3 Improvers do not need to reverse engineer the paper clip and figure
out how it works in order to improve it; they just need to look at it.
78. See generally Lemley, supra note 51, at 1000-29. This is true for a variety of reasons, but
most importantly because the efficient creation of new works requires the new creator to have access to
and use of old works. E.g., RicHARD R. NSON & SIDNEY G.WINTER,AN EVOLUTIONARY THEORY
OF ECONOMIC CHANGE 130 (1982); Merges & Nelson, supra note 51; Nathan Rosenberg, Factors
Affecting the Diffusion of Technology, 10 EXPLORATIONS EcON. Hisr. 3 (1972); Suzanne Scotchmer,
Standing on the Shoulders of Giants: Cumulative Research and the Patent Law, 5 J. ECON.
PERSPECTIVES 29, 29-31 (1991).
79. 35 U.S.C. § 101 (1994).
80. These are so-called Jepson claims, which identify the invention they are improving in the
preamble. See, e.g., Pentec, Inc. v. Graphic Controls Corp., 776 F.2d 309 (Fed. Cir. 1985).
81. E.g., Scripps Clinic & Research Found. v. Genentech, Inc., 927 F.2d 1565, 1581 (Fed. Cir.
1991) (suggesting that a literally infringing device may nonetheless escape liability under the reverse
doctrine of equivalents because it is a radical improvement on the patented technology); United States
Steel Corp. v. Phillips Petroleum Co., 865 F.2d 1247, 1253 n.l1 (Fed. Cir. 1989) ("Dominating patents
are not uncommon."); Atlas Powder Co. v. E.I. duPont de Nemours & Co., 750 F.2d 1569 (Fed. Cir.
1984) (involving an example of the blocking patents rule, which allows an infringing invention to
receive its own improvement patent). For a more complete explication of the blocking patents and
reverse doctrine of equivalents rules, see, for example, Lemley, supra note 51, at 1007-13; Robert
Merges, Intellectual PropertyRights and BargainingBreakdown: The Case of Blocking Patents, 62
TENN.L. REv. 75 (1994) [hereinafter Merges, BargainingBreakdown]; Robert P. Merges, A BriefNote
on Blocking Patents and Reverse Equivalents: Biotechnology as an Example, 73 J. PAT. &
TPADENLAR OFF. Soc'Y 878 (1991) [hereinafter Merges, A BriefNote].
82. Scripps Clinic & Research Found., 927 F.2d at 1581 (citing Graver Tank & Mfg. Co. v.
Linde Air Prod. Co., 339 U.S. 605, 608-09 (1950)) (holding that a radically improved method of
isolating drug using recombinant DNA might be excused from infringement).
83. E.g., U.S. Patent No. 5,179,765 (issued Jan. 19, 1993) (granting patent to a "Plastic Paper
Clip").
HeinOnline -- 89 Cal. L. Rev. 23 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
Patentable inventions in software, however, generally do not have these
characteristics.84
Generally, patent law solves this access problem by requiring that patentees publish to the world a description of their invention sufficient to
enable one of ordinary skill in the art to make and use it, as well as their
"best mode" of implementing the invention." Indeed, this disclosure
"bargain" between patentees and the public is central to patent policy.86 For
software patents, however, a series of recent Federal Circuit decisions has
all but eliminated the enablement and best mode requirements.87 The result
84. Samuelson and her colleagues argue that certain features of computer programs are readily
apparent to competitors, and therefore vulnerable to copying. Samuelson et al., supra note 5, at 2333.
Their argument, however, is dependent not only on the vulnerability of programming innovations to
casual inspection, but also on the ability of competitors to reverse engineer and analyze the design
know-how lying "near the surface" of a program. Id. at 2335-37. If patent law precludes reverse
engineering, it also precludes this sort of knowledge. It is true that certain types of computer program
innovations, particularly user interfaces, are necessarily available to even the casual user, at least in
part. But we doubt that these innovations are either the most significant parts of a new computer
program or the most likely to be patented. Further, those innovations for which precise understanding is
most important (such as application program interfaces) are also those which will not be available to
casual inspection.
85. 35 U.S.C. § 112 $ 1 (1994).
86. One classic justification for having a patent system is to encourage inventors to disclose their
ideas to the public, who will benefit from this new knowledge once the patent expires. Kewanee Oil
Corp. v. Bicron Corp., 416 U.S. 470, 489 (1974) (referring to the "federal interest in disclosure"
embodied in the patent laws); see also EDITH TILTON PENROSE, TiH EcONOMICS OF THE
INTERNATIONAL PA'Tr SYSTEM 31-34 (1951).
87. In recent years, the Federal Circuit has held that software patentees need not disclose source
or object code, flowcharts, or detailed descriptions of the patented program. Rather, high-level
functional description is sufficient to satisfy both the enablement and best mode doctrines. See Fonar
Corp. v. General Electric Co., 107 F.3d 1543, 1549 (Fed. Cir. 1997); see also Graham & Zerbe, supra
note 53, at 96-97; Mahajan, supra note 66, at 3317. The Federal Circuit reasons that "the conversion of
a complete thought... into a language a machine understands is necessarily a mere clerical function to
a skilled programmer." Northern Telecom, Inc. v. Datapoint Corp., 908 F.2d 931, 941-42 (Fed. Cir.
1990) (quoting In re Sherwood, 613 F.2d 809, 817 (1980)). Indeed, the Federal Circuit has gone so far
as to hold that patentees can satisfy the best mode requirement for inventions implemented in software
even though they do not use the terms "computer" or "software" anywhere in the specification. Robotic
Vision Sys., Inc. v. View Eng'g, Inc., 42 U.S.P.Q.2d 1619 (Fed. Cir. 1997); In re Dossel, 42
U.S.P.Q.2d 1881 (Fed. Cir. 1997). To be sure, in these latter cases it would probably be obvious to one
skilled in the art that the particular feature in question should be implemented in software. Still, it is
remarkable that the Federal Circuit is willing to find the enablement requirement satisfied by a patent
specification that provides no guidance whatsoever on how the software should be written. It is simply
unrealistic to think that one of ordinary skill in the programming field can necessarily reconstruct a
computer program given no more than the purpose the program is to perform. The Federal Circuit's
peculiar direction in the software enablement cases has effectively nullified the disclosure obligation in
software cases.
A recent development in Federal Circuit jurisprudence may suggest another source for a robust
disclosure obligation, however. The court has recently reinvigorated the written description requirement
in § 112, $ 1, not only in biotechnology cases, e.g., Regents of the University of California v. Eli Lilly
& Co., 119 F.3d 1559 (Fed. Cir. 1997), but also in cases about mechanical inventions. E.g., Gentry
Gallery, Inc. v. Berklne Corp., 134 F.3d 1473 (Fed. Cir. 1998). Under those cases, a patent claim is
invalid if the specification does not expressly describe what the claim covers, even if the specification
HeinOnline -- 89 Cal. L. Rev. 24 2001
2001]
PA TENT SCOPE AND INNOVATION
is that software patentees generally do not disclose much, if any, detail
about their programs, and therefore there is no easy way to figure out what
a softvare patent owner has built except to reverse engineer the program.
There are other industries in which reverse engineering is necessary to
determine the characteristics of an invention, but reverse engineering in
those industries probably would not be patent infringement. If a competitor
buys a patented chemical from the patent owner, analyzing that chemical in
the laboratory does not trigger any of the exclusive rights listed in section
271.85 Similarly, peeling apart the layers of a semiconductor chip in order
to determine its layout, while extraordinarily difficult, 9 does not involve
copying the chip itself. But because the most effective way to reverse engineer softvare is to "decompile" it, and decompilation makes a copy of the
patented software, this form of analysis may well be held illegal under patent law. Thus, software patent owners will get a windfall if they can prevent reverse engineering: the right to preclude access to their invention
and therefore to prevent others from improving it, despite the clear intent
of the patent statute to the contrary.
2. Access to UnpatentedComponents
If access to the patented invention is a central part of patent policy, an
even more important tenet of patent policy prevents patent owners from
locking up access to unpatented ideas that are in the public domain. Indeed,
the Supreme Court has stated that it would be unconstitutional to use patent
law to withdraw works from the public domain,9" and the antitrust and patent misuse rules have gone to great lengths to prevent patentees from expanding a patent beyond its bounds.9' Still other patent doctrines, such as
the doctrines of dedication to the public domain92 and prosecution history
gave sufficient information to enable the claim. If this development proves durable, it could mean that
most software patents will be invalid for failure to describe the invention in any detail.
88. The mere use of a lawfully purchased product is not illegal. Infra notes 116-118 and
accompanying text (discussing the exhaustion doctrine).
89. Some sense of the difficulty can be gained by reading Brookiree Corp. v. Advanced Micro
Devices, 977 F.2d 1555 (Fed. Cir. 1992), detailing unsuccessful efforts to reverse engineer a chip built
in the mid-1980s, and then realizing that under Moore's law (the capacity of chips doubles every 18
months) modem chips are about one thousand times as complex as the chips at issue in that case.
90. Graham v. John Deere Co., 383 U.S. 1, 6 (1966) (concluding that it would be unconstitutional
to grant "patents whose effects are to remove existent knowledge from the public domain, or to restrict
free access to materials readily available").
91. The doctrine of patent misuse is primarily directed at preventing patentees from expanding
their patent beyond the scope of the statutory grant. See B. Braun Med., Inc. v. Abbott Labs., 124 F.3d
1419, 1426-27 (Fed. Cir. 1997). Several antitrust doctrines, including the prohibition on tying
arrangements, serve the same purpose in the patent context. See Int'l Salt Co. v. United States, 332 U.S.
392,395-96 (1947).
92. Maxwell v. J. Baker, Inc., 86 F.3d 1098 (Fed. Cir. 1996) (holding that ideas disclosed in a
patent specification, but not claimed in the patent, are dedicated to the public). The continued vitality of
the Maxwell case is in doubt, however, after the Federal Circuit's decision in YBM Magnex, Inc. v.
HeinOnline -- 89 Cal. L. Rev. 25 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
estoppel, 93 are based on the premise that the patentee must not be allowed
to expand its monopoly beyond the scope of what is claimed.
Software patents will create just such an expansion in the absence of a
reverse engineering right. While some software patents, notably those that
are really computer-related inventions, cover an entire computer program,
the majority of true software patents (and virtually all of the truly nonobvious innovations in software) cover only a single part of a computer program. The invention may relate to a component of the larger program, or a
particular algorithm or subroutine, or even a process for getting from one
stage to another, but the invention is unlikely to be coextensive with an
entire computer program. 94 In short, it is wrong to speak of a commercial
program as being "patented" in the same sense that we might say it is
"copyrighted." More properly, the software vendor has patents that cover
certain inventions contained in the program. Many parts of the program,
however, are unpatented.
For reasons discussed in the previous Part, the only way to get access
to the unpatented components of the program often will be to reverse engineer the program, and therefore to "make" a copy of the entire program
(including the patented components). This is particularly true because in
most cases it will be impossible even to tell ex ante which portions of a
program are patented. If reverse engineering is illegal, then patenting even
a small part of one computer program can give the patentee effective control over all the ideas contained in the program. Indeed, patentees have periodically taken advantage of this fact by patenting "lock-out" devices and
using the patent to try to deny access to the unpatented components of
special-purpose operating systems.96 Given the patent policy in favor of
free access to public domain works, this is of significant concern.
3.
The IntellectualPropertyBalance
A variety of doctrines historically have served to channel certain sorts
of innovation (technical) into the patent sphere and other sorts (artistic)
InternationalTrade Commission, 145 F.3d 1317 (Fed. Cir. 1998), which purported to limit Maxwell to
its facts.
93. Wamer-Jenkinson Co. v. Hilton Davis Chem. Co., 520 U.S. 17,30-34 (1997) (explaining that
patentee is estopped from asserting infringement of broader claim if patentee narrowed that claim in
response to an objection from the PTO).
94. For a discussion of patents on particular components of a computer program, see Mark A.
Lemley & David W. O'Brien, EncouragingSoftware Reuse, 49 STAN-.L. REv.255, 294-97 (1997). In
this respect, software patents are like patents in the semiconductor industry, where the patented
invention is normally only a tiny portion of a full product. By contrast, in industries such as
pharmaceuticals, the scope of a patent is normally coextensive with a commercial product.
95. For reasons explained in the prior Part, this is generally not a problem in other industries.
96. E.g., Atari Games Corp. v. Nintendo of America, Inc., 975 F.2d 832, 843-44 (Fed. Cir. 1992);
Cohen, supranote 5, at 1152-53.
HeinOnline -- 89 Cal. L. Rev. 26 2001
2001]
PA TENT SCOPEAND INNO VATION
into the copyright sphere.97 That division between art and science, never
perfect, has all but disintegrated in the software realm. 98 Patents have expanded outside the realm of technology, and copyright has expanded to
protect the functional aspects of utilitarian works.99 As patent and copyright law overlap more and more, it becomes critical that they take account
of each other. 100
Copyright and trade secret law both have strongly articulated policies
permitting reverse engineering where it is undertaken for a legitimate social purpose. For patent law to ban reverse engineering of software would
undermine the goals of both copyright and trade secret law. It is little consolation to a reverse engineer who is held liable for patent infringement
that he or she cannot also be sued for copyright infringement and misappropriation of trade secrets. Because patent, copyright, and trade secret
rights can coexist simultaneously in the same piece of software, intellectual
property policy for software must be made with the combination of rights
in mind. If the courts conclude that patent law does not permit reverse engineering, they have effectively nullified the contrary rule in copyright and
trade secret law.' 01 This potential nullification is amply demonstrated by
97. Among those doctrines are the historic prohibition on patenting business methods and printed
matter, neither of which fit within the "technological arts" to which patent law historically has
extended. For a discussion of these doctrines and their recent disavowal, see Durham, supra note 23,
and John R. Thomas, The Patenting of the Liberal Professions,40 B.C.L. Rev. 1139 (1999). For its
part, copyright has used the idea-expression dichotomy to channel certain types of creativity into the
copyright realm, and others into the patent realm. See, e.g., Baker v. Selden, 101 U.S. 99 (1879) (noting
that some parts of a copyrighted work were eligible for protection only under patent law).
98. See generally J.H. Reichman, Legal Hybrids Between the Patentand Copyright Paradigms,
94 COLUM. L. REv. 2432 (1994) (discussing the traditional division, and deviations from this "bipolar"
structure).
99. The floodgates for non-technological patents were opened by State Street Bank & Trust Co.
v. Signature Financial Group, Inc., 149 F.3d 1368 (Fed. Cir. 1998), which allowed the patenting of
pure business methods. A number of patents had already issued for such non-technological concepts as
methods of holding a golf putter, however. See, e.g., U.S. Patent No. 5,776,016 (claiming a "Golf
Putting Method"). Copyright protection for software necessarily involves protection for the functional
aspects of what are essentially utilitarian works, and copyright law has struggled in cases like Lotus
Development Corp. v. Borland International,Inc., 49 F.3d 807 (Ist Cir. 1995), to reconcile this fact
with the limiting doctrines of copyright law. As a result, copyright protection is not really centered on
the real source of value in a computer program, which is its useful behavior. See, e.g., Samuelson et al.,
supra note 5, at 2350. A number of authors have suggested that neither patent nor copyright fits
sotftvare particularly well. E.g., Peter S. Menell, TailoringLegal Protectionfor Computer Software, 39
STAN. L. Ray. 1329 (1987); Samuelson et al., supranote 5, at 2308.
100. Karijala, supranote 5, at 43-44.
101.
For a detailed discussion of the overlap between copyright and patent in this area, see
Karala, supra note 5, and Dennis S. Karijala, A Coherent Theory for the Copyright Protection of
Computer Software and Recent JudicialInterpretations, 66 U. CIN. L. REv. 53 (1997); cf Merges,
supra note 46, at 16-17 (noting this problem, but suggesting that disaggregated ownership of software
patents may result in collective rights organizations that promote interoperability, and therefore
preclude the need to reverse engineer patented programs). Merges bases his argument on the fact that
software patents protect only particular components of a program, rather than the program as a whole,
and that patentees will therefore need to trade with each other to obtain rights. While this is
undoubtedly true in certain industries, such as semiconductors, it remains to be seen whether a similar
HeinOnline -- 89 Cal. L. Rev. 27 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
Sony v. Connectix, discussed above. 2 There, Sony has engaged in an
end-run around the Ninth Circuit decision on copyright infringement by
filing a software patent infringement suit against the same act of reverse
engineering that the court held legal under copyright law.
4. Litigation-RelatedUses
Finally, a ban on reverse engineering interferes with legitimate
litigation-related investigations. Ironically, such a ban may make it difficult
or impossible to detect patent infringement. Many software inventions are
internal to the program, and their use cannot be detected without parsing
the code. A patent owner who suspects a rival of infringing such a software
patent may have no choice but to reverse engineer the rival's software in
order to gain the evidence it needs to file suit. 3 If that rival has its own
patents on a separate aspect of the program, however, reverse engineering
as part of a pre-filing investigation will itself infringe the rival's patents. At
the least, this puts a new argument in the hands of a patent defendant; at
most, it may deter meritorious patent infringement suits from ever being
filed."°
A ban on reverse engineering will also limit investigations by potential infringers into the validity of the patent. Reverse engineering a program
may be the only way to determine that a patentee failed to disclose its best
mode. Alternatively, reverse engineering may disclose that a patented invention was in fact in use before a critical statutory bar date, and that the
patent is therefore invalid.105 Because source code is not published with the
patent, reverse engineering may be the only way to investigate the
workings of a patented program.
market will develop for software patents. Cf Lemley & O'Brien, supra note 94 (noting the componentbased nature of software patents, but suggesting that the law should promote the recombination of
components by denying strong protection to the interfaces between them). Indeed, how the market
develops may depend fundamentally on how broadly software patents are construed, a subject we take
up in the next Part.
102. See supranote 72 and accompanying text.
103. While some evidence may be available in discovery once a suit is filed, the Federal Circuit
has made it quite clear that a patentee cannot file suit based on a mere suspicion of infringement, but
must have made a "reasonable inquiry" before filing suit. Indeed, to file suit without such an inquiry
violates Rule 11. E.g., View Eng'g, Inc. v. Robotic Visions Sys., 54 U.S.P.Q.2d 1179 (Fed. Cir. 2000);
Judin v. United States, 110 F.3d 780 (Fed. Cir. 1997); Refac Int'l Ltd. v. Hitachi Ltd., 19 U.S.P.Q.2d
1855, 1858-59 (C.D. Cal. 1991) (imposing sanctions against a plaintiff who did not examine every
accused device before filing suit). But see Vista Mfg., Inc. v. Trac-4, Inc., 15 U.S.P.Q.2d 1345, 134748 (N.D. Ind. 1990) (no "general rule that Rule 11 requires an infringement plaintiff to examine the
defendant's product in all instances").
104. Cf. Pamela Samuelson, Intellectual Property and the Digital Economy: Why the AntiCircumvention Regulations Need to Be Revised, 14 BERKELEY TECH. LJ.519, 543 (1999) (noting a
similar problem with the new Digital Millennium Copyright Act, which makes it illegal to circumvent
copy protections even to determine whether the protected work is infringing).
105. 35 U.S.C. § 102(b).
HeinOnline -- 89 Cal. L. Rev. 28 2001
2001]
PATENT SCOPEAND INNOVATION
C. Creatinga Right to Reverse EngineerPatentedSoftware
Given the strong policy reasons to permit reverse engineering of patented software, it is worth taking a closer look at several defenses to patent
infringement that might protect such activity. No court has yet considered
whether reverse engineering of patented software is infringing; thus, no
court has considered whether reverse engineering is protected by the experimental use, exhaustion, implied license, or misuse doctrines. It is not
clear how such a defense would be resolved. The experimental use doctrine
in particular appears to have been interpreted very narrowly, and the implied license and exhaustion rules may be too easy to undermine by contract. At the same time, we think the policy arguments in favor of
permitting reverse engineering of patented software discussed in the previous Part are overwhelming. Reverse engineering enables competitors to
develop noninfringing products, to develop new products that are compatible with existing standards, and to have access to the unprotected parts of
patented programs. A right to reverse engineer patented software is consistent with the right to use other patented inventions once lawfully purchased, and with the way the copyright and trade secret laws treat software.
Accordingly, we recommend that Congress legislate a reverse engineering
defense if the courts do not recognize one.
1. Experimental Use
The patent statute itself contains only a narrow experimental use defense, and it is limited to circumstances clearly not relevant here.1 1 6 However, there is also a non-statutory exception for experimental uses. Ever
since Justice Story's decision in Whittemore v. Cutter,117 it has been settled
law that purely experimental uses were noninfringing. The court reasoned
that "it could never have been the intention of the legislature to punish a
man, who constructed such a machine merely for philosophical
experiments, or for the purpose of ascertaining the sufficiency of the
machine to produce its described effects." ' Justice Story distinguished
inventions made "with a design to use [them] for profit," however. The
latter could not be thought "experimental" in nature." 9
106. 35 U.S.C. § 271(e)(1) (1994) (allowing only experimental activity preparatory to the filing of
a new product application before the Food and Drug Administration). The experimental use defenses to
infringement should be distinguished from the doctrine of experimental use in 35 U.S.C. § 102(b)
(1994), which excuses a delay in patenting by someone who is still experimenting with his or her
invention. On the latter doctrine, see Elizabeth v. Pavement Co., 97 U.S. 126 (1877).
107. 29 F. Cas. 1120 (C.C.D. Mass. 1813).
108. Id. at 1121.
109. Id.
HeinOnline -- 89 Cal. L. Rev. 29 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
This experimental-commercial distinction has been applied with increasing rigor over the years.110 The result is to make the experimental use
defense "truly narrow," and therefore of little use to most litigants."' In
Roche Products, Inc. v. Bolar Pharmaceutical Co., the Federal Circuit
concluded that a use was not "experimental" within the meaning of the exception if it "has definite, cognizable, and not insubstantial commercial
purposes.' ' 12 Only if an experiment has no ultimate commercial purpose at
all will it be protected under this doctrine.1 3
This is not the only possible conclusion, or even a wise one. Rebecca
Eisenberg, in particular, has articulated a compelling argument for a
broader vision of experimental use, one that encompasses scientific exploration leading to commercial but noninfringing end products." 4 If applied
in software, such a vision would surely protect reverse engineers. We think
a court probably should read the experimental use defense this way. But as
currently interpreted by the courts, the experimental use defense will not
aid reverse engineers who hope to make and sell noninfringing products.15
2. FirstSale, Implied License, and Exhaustion
It is a well-established principle of patent law that a patentee's right to
control the use of his patented goods does not extend beyond the first sale
of a patented product. That is, a consumer who buys a patented product (or
a product that necessarily uses a patented process) from the patentee has
110. For an excellent history of the research exemptions, see David L. Parker, PatentInfringement
ExemptionsforLife Science Research, 16 Hous. J. Irrr'L L. 615, 626-36 (1994).
111.
See Roche Prods., Inc. v. Bolar Pharm. Co., 733 F.2d 858, 863 (Fed. Cir. 1984). For a
discussion of the scope of the experimental use doctrine, see Lauren C. Bruzzone, The Research
Exemption: A Proposal,21 AIPLA Q.J. 52 (1993).
112. Roche Prods., 733 F.2d at 863; see also Embrex v. Service Eng. Corp., 55 U.S.P.Q.2d 1161
(Fed. Cir. 2000) (holding that commerical enterprise's use of patented process in laboratory test did not
qualify as experimental use); Pitcaim v. United States, 547 F.2d 1106, 1125-26 (Ct. Cl. 1976) (holding
that experiments "in keeping with the legitimate business" of the accused infringer are not exempt from
the patent laws).
113. Roche Prods., 733 F.2d at 862 (quoting W. ROBINSON, THE LAW OF PATENTS FOR USEFUL
INVENTIONS § 898 (1890)) ("where it is made or used as an experiment, whether for the gratification of
scientific tastes, or for curiosity, or for amusement, the interests of the patentee are not antagonized").
One court offered a slightly broader reading of the doctrine of experimental use in Giese v. Pierce
Chemical Co., 29 F. Supp. 2d 33 (D. Mass. 1998). That court noted that use of a patented process for
academic medical research might well be a protected experimental use, though it refused to decide the
question on summary judgment. Even if this new interpretation is widely accepted, however, it will do
little to help most reverse engineers in the software industry.
114. Rebecca S. Eisenberg, Patents and the Progress of Science: Exclusive Rights and
Experimental Use, 56 U. Cmn. L. REv. 1017, 1078 (1989); see John H. Barton, Reforming the Patent
System, 287 Sct. 1933 (2000). But see Jordan P. Karp, Experimental Use as PatentInfringement: The
Impropriety of a BroadException, 100 YALE LJ.2169 (1991).
115. Indeed, the judicial trend seems to be in the opposite direction. Judge Rader, concurring in
Embrex, would have abolished the doctrine outright.
HeinOnline -- 89 Cal. L. Rev. 30 2001
2001]
PA TENT SCOPEAND INNOVATION
l1 6
the right to use and resell that product without the patentee's approval
Courts have developed two parallel doctrines that support such a right: the
principles of exhaustion and implied license. These doctrines have similar
consequences, but they stem from very different sources." 7
The exhaustion doctrine finds its basis in the foundations of patent
policy, which seeks not only to grant exclusive rights to patentees but also
to limit those rights. Exhaustion represents one such limit on a patentee's
right to control her invention: that control ceases with respect to a particular product once she has sold that product. In the words of the Supreme
Court, "when the machine passes to the hands of the purchaser, it is no
longer within the limits of the monopoly. It passes outside of it, and is no
longer under the protection of the [patent laws]." ' It is not the patent right
itself that is exhausted, of course. The patentee retains the rights to prevent
anyone else, including the buyer, from making, using, or selling additional
copies of the patented item. But once the patentee has sold a particular
product, its control over that particular product ends, and the general legal
antipathy toward restraints on alienation takes over.
The doctrine of implied license impels courts to much the same conclusion: buying a product carries with it an implied right to use and resell
the product.1 9 Indeed, courts have frequently conflated the two doctrines." But while patent exhaustion stems from inherent limits on the
grant of the patent right, implied license is a doctrine of quasi-contract, and
depends on the beliefs and expectations of the parties to the sales
116. United States v. Univis Lens Co., 316 U.S. 241, 249 (1942) ("An incident to the purchase of
any article, whether patented or unpatented, is the right to use and sell it ....); Glass Equip. Dev. v.
Besten, Inc., 50 U.S.P.Q.2d 1300 (Fed. Cir. 1999) ("The first sale doctrine stands for the proposition
that, absent unusual circumstances, courts infer that a patent owner has given up the right to exclude
concerning a patented article that the owner sells."); Intel Corp. v. ULSI Sys. Tech., 27 U.S.P.Q.2d
1136 (Fed. Cir. 1993); Becton, Dickinson & Co. v. Eisele & Co., 86 F.2d 267, 270 (6th Cir. 1936)
("Once having sold patented articles, neither the patentee nor its licensee may exercise future control
over them. They pass beyond the scope of the patentee's monopoly."); 5 CHIsUtM, supra note 13, at
§ 16.03(2)(a). Similarly, when a patentee sells a product to be used in a patented process, the sale of the
product normally carries with it an implied license to use the patented process. Glass Equip. Dev., 50
U.S.P.Q.2d at 1302-03.
117. For an excellent discussion of both doctrines in historical context, see Mark D. Janis, A Tale
of the Apocryphal Axe: Repair,Reconstruction, and the Implied License in Intellectual PropertyLaw,
58 MD. L. REv.423 (1999), and CHISUtI, supra note 13, at § 16.03.
118. Bloomer v. McQuewan, 55 U.S. (14 How.) 539, 549 (1852); see also Goodyear v. Beverly
Rubber Co., 10 F. Cas. 638, 641 (C.C.D. Mass. 1859) (stating that legal control of patented property
passes to buyer after a valid sale).
119. General Elec. Co. v. United States, 572 F.2d 745, 784-85 (Ct. Cl. 1978) ("[lt can be properly
assumed that as part of the bargain the seller of a device incorporating a patented
combination.., authorizes the buyer to continue to use the device....").
120. Janis,supranote 117, at 495 (noting instances of such confusion). But cf Wang Labs., Inc. v.
Mitsubishi Elecs. Am., Inc., 103 F.3d 1571 (Fed. Cir. 1997) (cataloguing various sorts of license and
estoppel claims).
HeinOnline -- 89 Cal. L. Rev. 31 2001
CALIFORNIA LA WREVIEW
[Vol. 89:1
transaction."' It is most commonly applied in cases where the product sold
by the patentee is not itself patented, but is necessary for use in a patented
2
process.1
Both doctiines have traditionally drawn a distinction between using
and reselling a particular copy of a patented product, which is permissible,
and making a new copy of a patented product, which is not. Software patents undermine this distinction. It is impossible to use software without
"making" a copy, at least temporarily, in the memory of a computer."z If
the exhaustion and implied license doctrines do not protect the making of
such temporary copies, those doctrines will effectively be nullified in the
software context. No use of a purchased program would be permissible
without express permission from the patentee.
We think that a reasonable court should reject this interpretation.
Rather than focusing blindly on the distinction between making and using,
courts dealing with software patents should look to the underlying policies
behind the exhaustion and implied license principles. Permitting reasonable
uses of the purchased software serves those underlying policies. Reverse
engineering is such a use. It is legal under all other intellectual property
laws, and has long been a favored tool of computer programmers. Further,
reverse engineering of patented non-software products would unquestionably be lawful, for the simple reason that it would constitute only a "use"
and not an impermissible "making" of the patented product.'24
The next question is whether patentees can withdraw the protection of
the exhaustion and implied license doctrines by refusing to permit buyers
to reverse engineer their software. Here, exhaustion and implied license
give potentially different answers. An implied license is, after all, a contractual vehicle; a license that is merely implied from the transaction's circumstances ordinarily can be disclaimed by an express statement to the
121. Janis, supra note 117, at 502-505 (noting the critical role intent of the parties plays in
determining the scope of an implied license).
122. The exhaustion doctrine would not apply in such a circumstance, because there has been no
"first sale" of a patented product.
123. This has been the subject of considerable litigation in the copyright arena. Most courts now
hold that a temporary copy loaded in the RAM memory of a computer is "fixed" and therefore
constitutes a new copy for copyright purposes. E.g., MAI Sys. Corp. v. Peak Computer, Inc., 991 F.2d
511, 518 (9th Cir. 1993). While this is almost certainly the wrong conclusion, see Mark A. Lemley,
Dealing with Overlapping Copyrights on the Internet, 22 U. DAYTON L. REv. 547, 551-52 & n.25
(1997) (cataloguing the critiques of MA/), an analogous conclusion seems self-evident in patent law.
Because patent law has no fixation requirement at all, any reproduction of a patented program, no
matter how temporary, arguably constitutes a "making" within the meaning of the statute. Witek, supra
note 66, at 369-72.
124. Thus, we agree with Janis insofar as he objects to "device-oriented" results: there is no
reason for the particular nature of software to change the effective legal rights buyers possess. Janis,
supra note 117, at 492.
Of course, the exhaustion and implied license doctrines would only protect intermediate copying
done as part of reverse engineering. The reverse engineer would still be obligated to ensure that its final
product did not infringe the patent.
HeinOnline -- 89 Cal. L. Rev. 32 2001
PA TENT SCOPEAND INNOVATION
2001]
contrary121 Because the exhaustion doctrine is based in patent policy, however, and not the patentee's intent, it is harder to avoid by contract. Thus, 126
in
Hewlett-Packard Co. v. Repeat-O-Type Stencil Manufacturing Corp.,
H-P's patented printer came with various unilateral statements indicating
H-P's intent that the printer's ink cartridge be discarded when empty. The
court refused to conclude that the defendant engaged in patent infringement
by refilling empty ink cartridges. It clearly grounded the limits on the patent right not in an implied license, but in a theory of exhaustion:
The question is not whether the patentee at the time of sale
intended to limit a purchaser's right to modify the product. Rather
the purchaser's freedom to repair or modify its own property is
overridden under the patent laws only by the patentee's right to
exclude the purchaser from making a new patented entity. Each
case turns on its own particular facts, but a seller's intent, unless
embodied in an enforceable contract, does not create a limitation
on the right of a purchaser to use, sell, or modify a patented
product ....
A noncontractual intention is simply the seller's hope
27
or wish, rather than an enforceable restriction.
Although Hewlett-Packard offers a strong endorsement of the ex-
haustion principle, other recent trends threaten to render the principle a
nullity by expanding the contractual exception to swallow the rule. In particular, the court in Mallinckrodt,Inc. v. Medipart,Inc.121 raised the possibility that the exhaustion doctrine could be avoided by the simple
expedient of affixing a label to the patented product that read "single use
only." The court reasoned that the exhaustion doctrine was subject to al-
teration by contract, and that the "label license" might be just such a contract. 2 9 One can reach that result only by mutilating contract law, 3 ° and
125. E.g., Withington-Cooley Mfg. Co. v. Kinney, 68 F. 500, 506 (6th Cir. 1895) ("The duration
and scope of a license must depend upon the nature of the invention and the circumstances out of which
an implied license is presumed, and both must at last depend upon the intention of the parties."). But cf
Carborundum Co. v. Molten Metal Equip. Innovations, Inc., 72 F.3d 872, 877 (Fed. Cir. 1995)
("Whether there existed an implied license is a question of law.").
126.
123 F.3d 1445 (Fed. Cir. 1997).
127. Id. at 1453; see also Carborundum,72 F.3d at 878 ("One party's unilateral expectations as to
the scope of the implied license are irrelevant."). Janis criticizes Hewlett-Packard for ignoring the
seller's intent, Janis, supra note 117, at 502-03, but we think it is precisely the tight result. At least
absent an enforceable contract to the contrary, the exhaustion doctrine gives buyers a legal right that
sellers should not be able to defeat unilaterally.
128. 976 F.2d 700 (Fed. Cir. 1992).
129. Id. at 703-09; accord B. Braun Med., Inc. v. Abbott Labs., 124 F.3d 1419 (Fed. Cir. 1997).
130. The court suggested in a footnote that a label affixed to a product was a "form" triggering the
battle of the forms, and that it therefore became part of the contract unless the other party objected
within a reasonable time. It did not rule on the question, however. Even assuming U.C.C. Section 2-207
is the correct statute to apply to such a "form," the court simply misread the statute. First, the court's
conclusion would require treating the patentee as the accepting rather than the offering party for
Section 2-207 purposes, even though the opposite conclusion seems more logical. Second, it ignores
Section 2-207(2)(b), which provides that such a term becomes part of the contract only if it does not
HeinOnline -- 89 Cal. L. Rev. 33 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
perhaps the suggestion that unilateral labeling trumps the exhaustion right
will be ignored.'31 But if followed widely, such a policy of automatic
licensing could signal the death of the exhaustion doctrine, at least in any
case where the patentee is smart enough to unilaterally (or after the fact)
characterize the sale as a limited license instead.'32 This is a particular danger in the software context, since software vendors have taken the position
that all software is licensed rather than sold.'33 If this view were widely
accepted, nothing would remain of the exhaustion doctrine in the software
industry, since it would be so easy to condition the transaction on a
shrinkwrap or clickwrap license to which the licensee might not even have
prior access.' 34
A recent Federal Circuit decision involving the reverse engineering of
software sheds some light on this question. In DSC Communications Corp.
v. Pulse Communication, Inc.'35 the court held that negotiated agreements
between DSC and a third party treated the transfer of software as a restricted license rather than a sale. 3 6 At the same time, the court noted that
other copies of the software were purchased without restriction on the open
market, and held that these copies were sold. Thus, the court applied different legal rules to the same software depending on the contractual
"materially alter" the deal. It is hard to argue that the license term at issue here was not a material
alteration, since it vitiated the buyer's rights of reuse and resale completely. It is also worth questioning
why Medipart, a company that was not in privity in any sense with Mallinckrodt, would be bound by
the contract and therefore liable for patent infringement. Hon. Arthur J. Gajarsa et al., How Much Fuel
to Add to the Fire of Genius? Some Questions About the Repair/Reconstruction Distinctionin Patent
Law, 48 AM. U. L. REv. 1205, 1229-31 (1999).
131.
In contrast to Mallinckrodt, see Kendall Co. v. ProgressiveMedical Technologies, Inc., 85
F.3d 1570 (Fed. Cir. 1996). In Kendall, the court refused to enforce a similar "license" contained in the
literature accompanying the product, concluding that the patentee's unilateral statement that only its
replacement components could be used "did not have contractual significance." Id. at 1576; cf Glass
Equip. Dev. v. Besten, Inc., 174 F.3d 1337, 1342 (Fed. Cir. 1999) (noting that exhaustion is the normal
state of affairs, and is avoided only in "unusual circumstances"). For trenchant criticism of
Mallinckrodt, see James B. Kobak, Jr., ContractingAround Exhaustion: Some Thoughts About the
CAFC's Mallinckrodt Decision, 75 J. PAT. & TRADEMARK OFF. Soc'Y 550 (1993). Among other
defects, Kobak notes that the decision conflates implied license, exhaustion, and antitrust cases into a
single "confusing melange." Id. at 554.
132. Cf Michael J. Swope, Recent Developments in Patent Law: Implied License - An Emerging
Threat to ContributoryInfringement Protection,68 TEMP. L. Rav. 281, 305-06 (1995) (suggesting that
patentees should impose such restrictions).
It is possible that the doctrine of patent misuse would bar such contracts even if the exhaustion
doctrine did not. Cf Gajarsa et al., supra note 130, at 1226-29 (considering whether patent misuse
would do this, and arguing that Mallinckrodtleft the question open).
133. Mark A. Lemley, Beyond Preemption: The Law and Policy of Intellectual Property
Licensing, 87 CALIF. L. Rav. 111 (1999) (noting the efforts of software vendors to entrench this view
by passing a new law, the proposed "Uniform Computer Information Transactions Act").
134. See, e.g., Hill v. Gateway 2000, Inc., 105 F.3d 1147 (7th Cir. 1997) (a piece of paper
unilaterally included in a box shipped to a consumer constituted an enforceable contract).
135.
170 F.3d 1354 (Fed. Cir. 1999).
136. Id.; Lemley, supra note 133.
HeinOnline -- 89 Cal. L. Rev. 34 2001
2001]
PATENT SCOPEAND INNOVATION
circumstances surrounding its transfer.'37 While DSC involved copyright
rather than patent law, it is not implausible that the court would do the
same in a software patent case. 3 '
The most plausible reading of the law in this area, then, is that it is
sometimes possible to restrict resale or use of a patented product after first
sale, but that such circumstances are "unusual" and must be clearly
articulated in the contract.'39 At a minimum, we think the same principle
should be extended to reverse engineering, traditionally considered a "use"
of a purchased product, even if that reverse engineering requires the making of temporary copies of a computer program. Even if that is done,
though, courts will have to confront the question of whether the exhaustion
doctrine can in fact be overridden by contract. 40 One vehicle for
confronting that question is the patent misuse doctrine.
3. PatentMisuse
The patent misuse doctrine might be enlisted to protect reverse engineering for compatibility purposes, just as the copyright misuse doctrine
has been. 4 ' Patent misuse is an equitable defense to patent infringement
that precludes patentees from "'impermissibly broaden[ing] the 'physical
or temporal scope' of the patent grant with anticompetitive effect.""' 42 If a
patentee has engaged in misuse, she will be prevented from enforcing her
patent at all, at least until the misuse has been purged.'4 3 Patent misuse is
frequently, but not entirely, coextensive with conduct that violates the
antitrust laws.
Such a patent misuse argument would arise if a patent defense (such
as exhaustion) were interpreted to protect reverse engineering, but the patentee conditioned the sale or license of the patented product on an agreement not to reverse engineer the product. In this situation, the question for
misuse purposes would be whether such a condition served to
"impermissibly broaden[] the 'physical or temporal scope' of the patent
137. DSC Communication Corp., 170 F.3d at 1360-63.
138. This approach implicates the long-standing dispute over whether transactions in software are
to be characterized as sales or licenses. For more detail on this dispute, see Lemley, supra note 133.
139. Glass Equip. Dev. v. Besten, Inc., 174 F.3d 1337, 1342 n.1 (Fed. Cir. 1999). This is
consistent with the rule in the U.K. See, e.g., Roussel-Uclaf v. Hockley, [1996] R.P.C. 441; Solar
Thomson v. Barton, [1977] R-P.C. 537.
140. Gajarsa et al., supra note 130, at 1225-26 (noting this looming issue).
141. Alcatel USA, Inc. v. DGI Tech., Inc., 166 F.3d 772 (5th Cir. 1999); DSC Communications
Corp. v. DGI Tech., Inc., 81 F.3d 597, 601 (5th Cir. 1996) ("DGI may well prevail on the defense of
copyright misuse, because DSC seems to be attempting to use its copyright to obtain a patent-like
monopoly over unpatented microprocessor cards.").
142. B. Braun Med., Inc. v. Abbot Labs., 124 F.3d 1419, 1426 (Fed. Cir. 1997) (quoting
Windsurfing Int'l, Inc. v. AMF, Inc., 782 F.2d 995, 1001-02 (Fed. Cir. 1986)).
143. For general background on patent misuse, see 6 CHisu.i, supra note 13, § 19.04.
HeinOnline -- 89 Cal. L. Rev. 35 2001
CALIFORNIA LA WREVIEW
[Vol. 89:1
grant with anticompetitive effect."'" We think that is precisely the effect of
such an agreement. As noted above, preventing buyers from reverse engineering software not only prevents the noninfringing use of the patented
component, but precludes any access to or use of unpatented portions of
the same program. 145 A contract that effectively extends patent protection
from one part of the program to cover unpatented parts should be vulnerable under principles of misuse.'46 Thus, if patent law does permit reverse
engineering, as we think it should, a patentee should not necessarily be able
to change that rule by contract. Doing so would run afoul of the purpose of
the misuse doctrine, particularly where (as in the software industry) such
"contractual" changes are likely to be ubiquitous, unbargained, and
imposed unilaterally by vendors without any real notice.
4. New Legislation
In sum, there is some likelihood that existing patent defenses will be
applied to excuse reverse engineering of patented software. As currently
defined, the experimental use defense is too slim a reed to support a reverse
engineering right. We believe, though, that a court faced with the question
could easily decide that the patent exhaustion doctrine permits the buyer of
patented software to use that software in a way that makes temporary copies of the program. Indeed, that seems the only logical conclusion consistent with the history and purpose of the exhaustion doctrine. From that
conclusion, it would be only a small step to preclude contracts banning the
reverse engineering of software, just as courts have done in the copyright
and trade secret contexts. Yet the signals from the Federal Circuit
147
regarding the continued viability of the exhaustion doctrine are mixed.
144. B. Braun Med., 124 F.3d at 1426 (quoting Windsurfing Int'l, 782 F.2d at 1001-02). A
defendant also could argue that such a contract term was preempted because it effectively nullified a
right granted the buyer under federal law. Cf Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 270
(5th Cir. 1988) (preempting a no-reverse-engineering clause under copyright law). For a discussion of
such federal policy preemption, see Lemley, supra note 133.
145. See supra notes 96-102 and accompanying text.
146. The analogy to the copyright misuse cases, especially DSC Communications Corp. and
Alcatel USA, Inc., is quite strong. In these cases, the copyright owner claimed that using a copyrighted
circuit to test an interoperable but noninfringing circuit was copyright infringement, because the test
necessarily made temporary copies of the copyrighted work. DSC Communications Corp., 81 F.3d at
600; Alcatel USA, Inc., 166 F.3d at 791. That is precisely the argument a plaintiff would make against
reverse engineering in the patent context.
One difference between the copyright and patent contexts is the existence of 35 U.S.C. § 271(d).
This section is reasonably construed as granting the patentee implicit power to control "non-staple"
goods (that is, goods that have no use or value except in connection with the patent). See Dawson
Chem. Co. v. Rohm & Haas Co., 448 U.S. 176 (1980). In some cases, one might argue that the
unpatented part of a computer program was a non-staple good over which the patent should grant
effective control, particularly if the valuable parts of the program were all patented. In other cases,
however, the unpatented elements will turn out to be valuable in themselves, and therefore to be staple
items of commerce.
147. See infra notes 126-140 and accompanying text.
HeinOnline -- 89 Cal. L. Rev. 36 2001
2001]
PA TENT SCOPEAND INNOVATION
Alternatively, and as a last resort, Congress could expressly legislate
in this area. Some commentators have suggested that patent law should
include a general fair use right; 41 if it did, that right would certainly encompass the limited protections for reverse engineering we suggest here.
More likely, Congress could create a specific statutory right to reverse engineer patented software. Congress has already recognized the importance
of reverse engineering by protecting reverse engineers under both the
Semiconductor Chip Protection Act'49 and the Digital Millennium
Copyright Act.Y0 While we think that existing law, properly interpreted,
can and should protect reverse engineering for legitimate purposes,
Congress could guarantee such a right if the courts fail to do soY"
III
DESIGNING AROUND EXlSTING SoFTwARE PATENTS
The freedom to reverse engineer, although vitally important to software developers, is only half the battle. For commercial software firms, the
knowledge gained through reverse engineering is pointless unless it can be
used to develop a marketable product. To identify the product development
activities that are permissible and those that would require a license, the
firm must consider the patented invention. It must attempt to determine the
breadth of the claims and the scope that a court would give them in infringement litigation. This information will shape the firm's decisions
about which innovative pathways to pursue, or whether to attempt to innovate around the patented invention at all. Here, we argue that the same
characteristics of the software industry that require latitude for research use
of patented software also require a narrow approach to questions of patent
scope.
Once a software patent has been issued, the literal scope of its claims2
will be construed by the court as a matter of law in any infringement suit.'Y
In theory, this process of claim construction determines the scope of the
patent. In practice, however, the doctrine of equivalents is the primary tool
available to courts and litigants for fine-tuning patent scope. Under this
148. O'Rourke, supra note 46; cf. Peter S. Menell, An Analysis of the Scope of Copyright
Protectionfor Application Programs,41 STAN. L. REV. 1045 (1989) (suggesting that a program might
lose all protection once it becomes an industry standard).
149.
17 U.S.C. § 906(a) (1994).
17 U.S.C.A § 1201(f) (1996 & Supp. 2000).
150.
151. Some have suggested to us that the reverse engineering right would be unnecessary if a
patentee's disclosure obligation were sufficiently robust. While a real disclosure obligation (for
example, a requirement to disclose source code) would ease the burden on competitors who want to
know what is in a patented product, such a change in the law would not solve the problem altogether.
Competitors still would not receive information about unpatented components of a computer program,
and the only way to get access to that public domain information would be to reverse engineer the
program as a whole.
152. E.g., Markman v. Westview Instruments, Inc., 517 U.S. 370 (1996).
HeinOnline -- 89 Cal. L. Rev. 37 2001
CALIFORNIA LA W RE VIEW
[Vol. 89:1
doctrine, a court may find infringement even where the accused product or
process does not fall within the literal language of the patent claims, if it is
nonetheless "substantially" equivalent to the patented invention. In essence, the doctrine targets conduct that violates the spirit, if not the letter,
of the patent law-conduct that "should be" infringement even though,
literally, it is not.153 And since the doctrine of equivalents is no longer an
equitable vehicle within the discretion of the trial judge, but a core part of
every infringement case to be applied by the jury, 154 it is that broader
doctrine that will effectively determine the scope of most litigated patents,
regardless of how the claims are construed.'55
At the same time, a central principle of the patent system is that the
patentee is entitled to no more than she has claimed, and that the public is
entitled to notice of the claims and what they encompass. 56 It follows that
the criteria for finding equivalence are immensely important. Although
commentators differ on exactly how the doctrine should be applied, they
agree that courts interpreting the doctrine must walk a fine line between
protecting innovators and stifling competition.'57
153. E.g., Graver Tank & Mfg. Co. v. Linde Air Prods. Co., 339 U.S. 605, 608 (1950) (observing
that the doctrine exists "[to] temper unsparing logic and prevent an infringer from stealing the benefit
of the invention") (quoting Royal Typewriter Co. v. Remington Rand, 168 F.2d 691, 692 (2d Cir.
1948)).
154. Wamer-Jenkinson Co. v. Hilton Davis Chem. Co., 520 U.S. 17 (1997) (holding that the
doctrine of equivalents is not equitable in nature, but should be applied as a matter of course, and
strongly suggesting that equivalence is a question of fact rather than law).
155. Equivalents cases are particularly likely to go to the jury, since the Federal Circuit has held
that defendants must meet a "lofty standard" to obtain summary judgment of noninfringement under the
doctrine of equivalents, even where literal noninfringement is established as a matter of law. See
Overhead Door Corp. v. Chamberlain Group, Inc., 194 F.3d 1261 (Fed. Cir. 1999).
156. E.g., Sage Prods., Inc. v. Devon Indus., 126 F.3d 1420 (Fed. Cir. 1997):
[A]s between the patentee who had a clear opportunity to negotiate broader claims but did not
do so, and the public at large, it is the patentee who must bear the cost of its failure to seek
protection for this foreseeable alteration of its claimed structure .... [The alternative ruleallowing broad play for the doctrine of equivalents to encompass foreseeable variations, not
just of a claim element, but of a patent claim-also leads to higher costs. Society at large
would bear these latter costs in the form of virtual foreclosure of competitive activity within
the penumbra of each issued patent claim.
Id. at 1425; London v. Carson Pirie Scott & Co., 946 F.2d 1534, 1538 (Fed. Cir. 1991) ("[l]f the public
comes to believe (or fear) that the language of patent claims can never be relied on... then claims will
cease to serve their intended purpose. Competitors will never know whether their actions infringe a
granted patent."); Laitram Corp. v. Cambridge Wire Cloth Co., 863 F.2d 855, 856-57 (Fed. Cir. 1988);
Pennwalt Corp. v. Durand-Wayland, Inc., 833 F.2d 931, 935 (Fed. Cir. 1987). The notice principle is
codified in 35 U.S.C. § 112 (1994).
157. E.g., Merges & Nelson, supra note 51; John R. Thomas, The Question Concerning Patent
Law and Pioneer Inventions, 10 HIGH TECH. LJ. 35 (1995); Esther Steinhauer, Note, Using the
Doctrine of Equivalents to Provide Broad Protection for Pioneer Patents: Limited Protection for
Improvement Patents, 12 PACE L. REv. 491 (1992); Timothy J. Douros, Lending the FederalCircuit a
Hand: An Economic Interpretationof the Doctrine of Equivalents, 10 HIGH TECH. L.J. 321 (1995). On
the importance of clearly defining and limiting the doctrine of equivalents, see Hon. Paul R. Michel,
The Role and Responsibility of Patent Attorneys in Improving the Doctrine of Equivalents, 40 IDEA
123, 124 (2000).
HeinOnline -- 89 Cal. L. Rev. 38 2001
PA TENT SCOPEAND INNOVATION
2001]
As Part II.A explains, several characteristics of software suggest that
the doctrine of equivalents is susceptible to especially generous application
to software patents. Because software innovation typically involves considerable reuse of existing code, and because much of the innovation that
occurs is not formally documented as prior art, software patents may be
extended more broadly than patents on other inventions of comparable
technical merit. Because software patents have a short effective life, the
inclusion within a patent's scope of later-discovered equivalents, sanctioned by the Supreme Court's most recent interpretation of the doctrine,.58
will give holders of software patents control over many more generations
of improvements than patentees in other industries. Finally, because software is embodied in text, triers of fact will need to select the appropriate
level of abstraction at which to judge equivalence of function and must
guard against overgeneralization. If courts fail to consider these factors,
softvare patents, more than other types of patents, increasingly will act as
broad "prospects" that reserve to the patentee the exclusive right to control
innovation in related areas.159 In Part Il.B, we argue that this result is suboptimal given the nature of innovation within the software industry. Part
mI.C suggests doctrinal modifications, perhaps better described as interpretative canons, designed to allow courts to cabin software patent scope
within appropriate bounds.
A.
Systemic Biases Toward a BroadRange ofEquivalents
The modem test for equivalence is set forth in the Supreme Court's
opinion in Warner-Jenkinson Co. v. Hilton Davis Chemical Co.16 Under
the test, the patentee must demonstrate that the accused product or process
incorporates the substantial equivalent of each element claimed in the patent.161 It may do so by showing that the accused product or process has
elements that perform "the same work in substantially the same way, and
accomplish[es] substantially the same result" as each element in the patent
claim.'62 Alternatively, it may introduce other evidence of equivalence,
such as whether a "skilled practitioner" would have known of the interchangeability of the two elements at the time of the alleged infringement. 163
158.
Warner-Jenkinson,520 U.S. at 37.
159. Kitch, supra note 47; supra Part IC (discussing Kitch's prospect theory of optimal patent
scope).
160. 520 U.S. 17(1997).
161. Id. at 29 ("Each element contained in a patent claim is deemed material to defining the scope
of the patented invention, and thus the doctrine of equivalents must be applied to individual elements of
the claim, not to the invention as a whole.").
162. Id. at 35 (quoting Machine Co. v. Murphy, 97 U.S. 120,125 (1878)). This test, given modem
form in Graver Tank & Manufacturing Co. v. Linde Air Products Co., 339 U.S. 605 (1950), has
become known as the "triple identity" or "function-way-result" test. See Warner-Jenkinson, 520 U.S. at
39.
163.
Warner-Jenldnson,520 U.S. at 37-39.
HeinOnline -- 89 Cal. L. Rev. 39 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
In response, the defendant may offer evidence of noninterchangeability or
show that the patentee surrendered its claim to the disputed technology
during prosecution of the patent."6 In Warner-Jenkinson, the Court let
stand the Federal Circuit's determination that equivalence is a question of
fact to be decided by the jury in cases where a jury has been requested. 165
Of necessity, the Warner-Jenkinson analysis is highly fact-specific.
"Substantial" equivalence will depend on the technological particulars of
the case, as explicated by experts skilled in the relevant field. The Court
also made clear that its list of relevant factors is illustrative, not
exclusive.1 66 In principle, therefore, there is also room to consider industryspecific factors that might bear on the question of the substantial equivalence or "known interchangeability" of particular components. In particular, we suggest that the following four factors are important in the software
industry.
1.
Incremental,ModularInnovation and Designfor Interoperability
Assessments of equivalence depend, in part, on assessments of inventiveness. Both the scope of equivalence to be accorded the original invention and the latitude, if any, given the improvement depend on the degree
of innovation (nonobviousness) in each product. On the one hand, a pioneering invention will be entitled to a broader range of equivalence than a
more workmanlike one. 67 On the other, a pioneering improvement may be
excused even from literal infringement under the "reverse doctrine of
equivalents. ' 68 In between, an improvement that "designs around" an element of the patented invention will avoid infringement if the difference in
the designs is substantial.'69 The doctrine's attempt to identify the requisite
technical quantum of "designing around" reflects and promotes the patent
law's utilitarian purpose; ultimately, "designing around" yields new
technical paradigms, while simple imitation never does.
164. Id. at 35-37.
165. See Hilton Davis Chem. Co. v. Wamer-Jenkinson Co., 62 F.3d 1512, 1521-22 (Fed. Cir.
1995) (en banc), rev'd on other grounds, 520 U.S. 17 (1997). While the Court granted certiorari to
decide this issue, it concluded it was not necessary to do so. Nonetheless, the Court's reference to the
use of special verdict forms to resolve doctrine of equivalence issues strongly suggests it views the jury
as the appropriate decisionmaker in such cases.
166. Warner-Jenkinson, 520 U.S. at 39.
167. For a discussion of pioneering patents, see Steinhauer, supra note 157 and Thomas, supra
note 157.
168. E.g., Westinghouse v. Boyden Power Brake Co., 170 U.S. 537 (1898); Scripps Clinic &
Research Found. v. Genentech, Inc., 927 F.2d 1565 (Fed. Cir. 1991); Merges, BargainingBreakdown,
supra note 81; Merges, A BriefNote, supranote 81.
169. The Warner-Jenkinson Court rejected the argument that the distinction between designing
around and impermissible copying should turn on the second-corner's intent and instructed that
judgments about equivalence must be based solely on objective, technical factors. Warner-Jenkinson,
520 U.S. at 34-36.
HeinOnline -- 89 Cal. L. Rev. 40 2001
2001]
PA TENT SCOPEAND INNOVATION
The distinction between designing around and mere imitation, though
sensible on its face, is difficult to apply to software innovation because of
the high degree of reuse that is standard operating practice. It is a truism
that no patented invention is truly sui generis; each rests on what has gone
before it.170 This is particularly true of software-related inventions, however. Software innovation is by nature largely incremental.' It is rare for
programs to be rewritten entirely from scratch; instead, innovation typically proceeds via a mix of new coding, modifications to some existing
modules and subroutines, and either literal or functional reuse of others. 172
Moreover, patterns of improvements are constrained to a substantial degree
by the need to preserve interoperability between program, system, and
network components. 73
The pattern of cumulative, sequential innovation and reuse that prevails in the software industry creates the risk that software patents will cast
large shadows in infringement litigation. Specifically, we believe that because innovation is especially likely to proceed by building on existing
code in other programs, the temptation for the trier of fact to find equivalence of improvements will be correspondingly greater. Put differently,
most initial software inventions, although patentable, will not be
pioneering advances entitled to a broad range of equivalence, simply because that is not the way that software innovation works. In addition, a jury
asked to compare an accused computer program to a complex patent claim
written in means-plus-function language may well be influenced by what it
perceives as damning similarities between the two programs, even though
it is only supposed to be considering similarities between the plaintiff's
claim and the defendant's product. For both reasons, improvements that are
real and substantial when judged against the background norms of the industry-norms of considerable and customary similarity-may be
overlooked.
The analysis is similar for interoperability-related program elements.
The need for interoperability does not preclude improvement, but it constrains the range of options available to the second-comer. 74 Here again,
the temptation may simply be to find equivalence in the vast majority of
cases because of surface similarities, without close consideration of the
improvement's nature or its relation to the elements of the patented
170. On the implications of this cumulativeness for patent law generally, see Merges & Nelson,
supranote 51, and Scotchmer, supranote 78, at 29.
171. Lemley &O'Brien, supranote 94; Samuelson et al., supranote 5; Menell, supra note 148.
172. Lemley & O'Brien, supra note 94; Samuelson et al., supra note 5. Literal reuse of code
developed by other parties is, of course, prohibited by copyright law. Lemley & O'Brien, supra note
94; Samuelson et al., supra note 5. Functional reuse based on knowledge gained through reverse
engineering, however, is not. Supra Part II.A.
173. Lemley & O'Brien, supra note 94; Samuelson et al., supra note 5; Lemley & McGowan,
supranote 77.
Cf. Merges, supra note 46.
174.
HeinOnline -- 89 Cal. L. Rev. 41 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
invention. Indeed, the interchangeability test may lead to pernicious results
here, as computer programmers may prefer a particular improvement precisely because it is interchangeable with the original, even as they design
around one or more of the original's features. 75
It might seem odd to suggest that the standard for patent infringement
be relaxed to accommodate an industry culture that favors incremental improvement. After all, the patent laws do not exist to encourage conservatism in design. Assuming the rightness of the basic utilitarian insight
underlying grants of patent protection, insubstantial improvers should be
forced to seek permission from and pay licensing fees to patentees, in the
software industry, as elsewhere. We do not mean to argue that courts
should jettison this basic model. We do, however, suggest that where software is concerned, first-cut judgments as to what is an insubstantial improvement may need to be rethought. This is not because software is
special. Indeed, the same argument could be made in any industry in
which sequential innovation plays a major role. Rather, it is because an
improvement's importance can only be judged in the context of the art in
which it occurs.
2. UndocumentedPriorArt
Because the vast majority of software innovation takes place outside
traditional research institutions, many software improvements are recorded
in ways that tend to elude the formal system of technical documentation
followed in fields more closely linked to the scientific and technical establishment.'76 Innovations in biotechnology, for example, typically are
documented in peer-reviewed professional journals, conference abstracts,
and the like; software innovations, in contrast, may be documented only
via developer specifications or online FAQs. Frequently, the source code
itself is never released at all.' 77 As a result, priority searches for software
patents can be enormously difficult.
Commentators, industry insiders, and the PTO itself have recognized
that the lack of a comprehensive record of innovation in the software industry has important consequences for the patent prosecution process.'78
175. On the equivalence of later-developed substitutes, see infra note 193.
176. Notice of Public Hearing and Request for Comments on Issues Related to the Identification
of Prior Art During the Examination of a Patent Application, 64 Fed. Reg. 28,803 (May 27, 1999)
[hereinafter PriorArt HearingNotice]; Cohen, supranote 5, at 1178; Garfinkel, supranote 33, at 104.
177. Supra note 87 (discussing Federal Circuit's failure to require even software patentees to
disclose source code); 37 C.F.R. § 202.20(c) (establishing special rules that exempt source code from
Copyright Act's deposit requirements). The notable exception is the open source movement, whose
members voluntarily release their source code. On the open source movement, see generally David
McGowan, Legal Implications of Open-SourceSoftware, 2000 U. ILL. L. REv. (forthcoming 2000).
178. E.g., PriorAri HearingNotice, supra note 176; Cohen, supra note 5; Merges, supra note 5;
Allan M. Soobert, Breaking New Grounds in Administrative Revocation of U.S. Patents: A Proposition
for Opposition-andBeyond, 14 SANTA CLARA COMPUTER & HIGH TECH. L.J. 63 (1998); Nora M.
HeinOnline -- 89 Cal. L. Rev. 42 2001
2001]
PA TENT SCOPEAND INNOVATION
The patent system presumes a finite, comprehensively indexed technical
literature and relies on individual examiners to define, access, and search
the relevant subliteratures. In the last several years, the PTO has taken
measures to improve examiner access to nontraditional sources of software
documentation, but the diffuse nature of the knowledge base and the lack
of a comprehensive system for cataloguing and indexing software-related
1 79
developments defy even the most knowledgeable and diligent examiner.
It is just harder, maybe even impossible, for any one individual to find all
relevant information, even in a perfect world. And since examiners work
under incredible time constraints, particularly in the software-related units
currently flooded with applications, they simply do not have time to find
and to analyze what software prior art is scattered throughout the PTO
classification system. Congress has recently enacted other changes that
would provide for publication of pending patent applications and would
allow third parties to bring relevant prior art to the PTO's attention. These
reforms, however, were watered down so much to satisfy opponents of patent reform that they offer no meaningful solution to the problem of software prior art.110 Thus, even as the number of issued software patents
approaches twenty thousand per year, significant deficits in the PTO's
ability to examine software patent applications remain unaddressed. 1 ' As a
result, software patents are more likely than other types of patents to
receive a broader scope at the outset than some might say they deserve.
The disconnect between the traditional patent examination process
and software industry documentation practices has equally troubling
Tocups & Robert J. O'Connell, PatentProtectionfor ComputerSoftware, 14 COMPUTER LAW 18 (Nov.
1997).
179. In 1994, the PTO revised its examiner credentialing requirements and began accepting
examiner trainees with degrees in computer science. Cohen, supra note 5, at 1176. In addition, private
parties created the Software Patent Institute, an organization designed to serve as a repository for
software-related prior art, and began offering access and specialized training courses to the PTO.
Garfinkel, supranote 33; Software Patent Institute, http'/www.spi.org/ (last revised Dec. 17, 1999).
180. Patent reform was a long time in coming. See American Inventors Protection Act of 1999,
H.R. 1907, 106th Cong. §§ 301-302, 402; Omnibus Patent Act of 1997, S. 507, 105th Cong. §§ 202,
302; 21st Century Patent System Improvement Act, H.R. 400, 105th Cong. §§ 202, 302; Omnibus
Patent Act of 1996, S. 1961, 104th Cong. §§ 202, 302; Patent Reexamination Reform Act of 1995, S.
1070, 104th Cong. § 302; Patent Reexamination Reform Act of 1995, H.R. 1732, 104th Cong. § 302;
Patent Application Publication Act of 1995, H.R. 1732, 104th Cong. § 2; Patent Reexamination Reform
Act of 1994, S. 2341, 103d Cong. § 302; Patent Application Publication Act of 1994, S. 2488, 103d
Cong. § 4. The bill that finally was passed, S. 1948, 106th Cong., 1st Sess., §§ 4001-4808, while it
contains provisions for publication of pending applications and third-party participation in patent
reexamination, is riddled with loopholes and limitations. For example, patentees can avoid publication
of pending applications by promising not to file abroad. They can extend their patent beyond the 20
year term for any of a number of delays attributed to the PTO. And third-party reexamination is
unlikely to be widely used because anyone who invokes it will be precluded from making similar
arguments later in court.
181.
Wayne M. Kennard, Software Patents as a Weapon: Are You Ready to Rumble?, 547
PLI/PAT. 1123 (1999). The PTO recently issued a call for public comments on ways to address
deficiencies in the examination system. PriorArt HearingNotice, supranote 176.
HeinOnline -- 89 Cal. L. Rev. 43 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
implications for infringement litigation. To invalidate an issued patent, an
18 2
infringement defendant must overcome a strong presumption of validity.
If an infringement defendant loses a validity challenge, as most do,"8 3 the
infringement analysis leaves little room for consideration of relevant but
uncited prior art. For example, the rule of prosecution history estoppel,
under which a defendant may escape a finding of infringement by showing
that the patentee surrendered claim to the disputed material during prosecution, necessarily concerns only material of which the examiner had
notice.18 4 That art is often not the most relevant art available in litigation.8 5
This lack of consideration of uncited prior art, combined with the
mode of analysis for determining equivalence, leaves little opportunity for
courts to constrain the scope of patents under the doctrine of equivalence.
The element-by-element approach to equivalence, while properly cabining
the jury's power to expand the scope of a patent, may not help in many
software cases, where the software-related part of the invention is often
described in a single element.'86 Moreover, the "known interchangeability"
rule outlined by Warner-Jenkinson sweeps within the patent's scope any
material known to be substantially equivalent, without consideration of
whether the material, if cited during prosecution, would have required narrowing of the claims prior to issuance.'87 The Federal Circuit's Wilson
Sporting Goods opinion seemed to require such consideration, but in subsequent opinions the court has not consistently required this hypothetical
inquiry and has left the burden of proof on matters relating to uncited prior
art unclear.'88
182. 35 U.S.C. § 282 (1994). See Mark A. Lemley, Rational Ignorance at the Patent Office, 95
Nw. U. L. REv. (forthcoming 2001). Relaxing this presumption for software patents might seem an
obvious solution. But see Bausch & Lomb, Inc. v. Alcon Labs., Inc., 79 F. Supp. 2d 252 (W.D.N.Y.
2000) (excluding testimony about inefficiencies in PTO's examining system, proffered to support
argument that presumption should be relaxed); Applied Materials, Inc. v. Advanced Semiconductor
Materials Am., Inc., 32 U.S.P.Q.2d 1865 (N.D. Cal. 1995) (same).
183. John R. Allison & Mark A. Lemley, Empirical Evidence On The Validity Of Litigated
Patents, 26 AIPLA QJ. 185, 205-06 (1998) (reporting that 54% of all patents litigated are found valid).
184. Wamer-Jenkinson Co. v. Hilton Davis Chem. Co., 520 U.S. 17, 32-33 (1997).
185. Allison & Lemley, supra note 183, at 233 (noting that validity challenges are more successful
when based on art not cited by the PTO).
186. Thus, in OverheadDoor Corp. v. ChamberlainGroup, Inc., 194 F.3d 1261 (Fed. Cir. 1999),
the court held that a mechanical switch could be equivalent to an electronic switch implemented in
software. Had the switch itself been claimed in terms of its parts, it is doubtful an electronic switch
could have an equivalent to each part. But because the switch was itself only a single element in a
broader claim to a garage door opener, substituting software for a mechanical device was held
potentially equivalent.
187.
Warner-Jenkinson, 520 U.S. at 36-39.
188. Wilson Sporting Goods Co. v. David Geoffrey & Assocs., 904 F.2d 677, 684-85 (Fed. Cir.
1990):
[S]ince prior art always limits what an inventor could have claimed, it limits the range of
permissible equivalents of a claim .... [l]t -nay be helpful to... visualiz[e] a hypothetical
patent claim, sufficient in scope to literally cover the accused product. The pertinent question
HeinOnline -- 89 Cal. L. Rev. 44 2001
2001]
PA TENT SCOPEAND INNOVATION
We suspect that the doctrine of equivalents' inadequate recognition of
uncited prior art may combine with the highly incremental character of
software innovation to produce a broad "umbrella effect" for issued software patents. As discussed above, industry-specific patterns of cumulative
innovation suggest that an improvement upon patented software technology is more likely to be deemed within the patent's range of equivalents.
At the same time, industry-specific patterns of documentation increase the
likelihood that the original patent will be too broad, incorporating unsung
but vital improvements that preceded and should have narrowed it. This is
an odd result for a doctrine that is fundamentally equitable in purpose. The
Warner-Jenkinson Court stated that the doctrine is not, as a technical matter, a rule of equity, and rejected the use of some traditionally equitable
factors, such as intent, in equivalence cases. At the same time, however,
the Court also reaffirmed the doctrine's basic aim: to guard against the
excesses of literalism in claim construction, while preserving the essence
of the public's right to notice. 18 9 In short, the doctrine of equivalents is a
shield, not a sword. It exists to preserve the patentee's rights to her own
invention, not to give the patentee more than she has actually invented. 9 '
Allowing software patentees to claim a broad range of equivalents because
of industry-specific defects in the prosecution system puts the cart before
the horse.
3. The RapidPace of Change
As noted above, Warner-Jenkinsonrequires assessment of the "known
interchangeability" of an accused improvement based on a reasonably
skilled practitioner's knowledge at the time of alleged infringement. 19' In
this respect, Warner-Jenkinson arguably changes the law; although some
Federal Circuit decisions had interpreted the doctrine to cover laterdiscovered equivalents, language in earlier Supreme Court opinions suggested knowledge at the time of invention as the benchmark for equivalence determinations. 92 As commentators have recognized, this
then becomes whether that hypothetical claim could have been allowed by the PTO over the
prior art
Id. Compare Ultra-Tex Surfaces, Inc. v. Hill Bros. Chem. Co., 204 F.3d 1360 (Fed. Cir. 2000), and
Streamfeeder, LLC v. Sure-Feed Sys., Inc., 175 F.3d 974 (Fed. Cir. 1999) (both endorsing the
hypothetical claim analysis) with Nat'l Presto Indus., Inc. v. West Bend Co., 76 F.3d 1185 (Fed. Cir.
1996), and Conroy v. Reebok Int'l, Ltd., 14 F.3d 1570 (Fed. Cir. 1994) (both seeming to restrict its
use).
189. Warner-Jenkinson, 520 U.S. at 29. ("There can be no denying that the doctrine of
equivalents, when applied broadly, conflicts with the definitional and public-notice functions of the
statutory claiming requirement.").
190. Graver Tank & Mfg. Co. v. Linde Air Prods. Co., 339 U.S. 605, 608 (1950).
191.
Warner-Jenkinson,520 U.S. at 37.
192.
Compare, e.g., Hughes Aircraft Co. v. United States, 717 F.2d 1351 (Fed. Cir. 1983) with
Graver Tank & Mfg. Co., 339 U.S. at 609 ("An important factor is whether persons reasonably skilled
HeinOnline -- 89 Cal. L. Rev. 45 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
formulation of the test ensures that the scope of an issued patent will
expand to keep pace with later-discovered variations on the basic technology.19 3 However, it also allows a patent to encompass even currently
known products that are later discovered to be "interchangeable" with an
element of the patented invention.
From a theoretical standpoint, the time-of-infringement test replaces
the doctrine's former, more recognizably equitable focus on bad faith with
a broader, more pragmatic focus on the recovery of sunk costs. 19 4 Put simply, the test insures patentees against the vagaries of the after-market for
improvements. This has the virtue of eliminating the "20-20 hindsight"
problem; it is far easier for an expert to say what she thinks of an improvement today than what she would have thought of it had it been made
four or more years ago. Yet by collapsing the infringement inquiry into a
single timeframe, the test may underestimate the full extent of the secondcomer's improvement. Indeed, we suspect that the time of infringement test
systematically undervalues the significance of subsequent improvements,
for the same reason that hindsight often leads observers to label obvious in
retrospect an invention that was significant at the time it was made.
Although the time-of-infringement test ensures that the scope of any
patent will widen throughout its life, the test is likely to produce especially
strong effects for software patents. The effective life of a software innovation is normally quite short, much shorter than the nearly twenty-year term
conferred by patent law. 195 In many other fields, a patented invention will
be marketable for the full patent term; software innovations rarely demonstrate the same sort of staying power. Accordingly, ex post expansions in
patent scope may be expected to yield proportionately greater increases in
profitability for software patents than for other types of patents.'96
More important, over twenty years, a software patent expanded to
cover later-discovered improvements will exert control over many more
generations of improvements than a conventional patent with a longer effective term, at least if the patent is read under the doctrine of equivalents
to encompass more than the specific way in which it has been
in the art would have known of the interchangeability of an ingredient not contained in the patent with
one that was."), and Halliburton Oil Well Cementing Co. v. Walker, 329 U.S. 1, 13 (1946).
193. ROBERT P. MERGES ET AL., INTELLECTUAL PROPERTY IN THE NEW TECHNOLOGICAL AGE
279-82 (2d ed. 2000); James R. Farrand & Ronald R. Johnston, Expanded Doctrine of Equivalents
Extends Patents Old and New, 14 COMPUTER LAw. 1 (1997).
194. In this respect, the rule is consistent with the Court's insistence that the doctrine of
equivalents is utilitarian, rather than strictly equitable, in purpose. Warner-Jenkinson, 520 U.S. at 34-
35.
195. Samuelson et al., supranote 5,at 2431 n.134.
196. See Suzanne Scotchmer, Cumulative Innovation in Theory and Practice (U.C. Berkeley
Goldman School of Public Policy, Working Paper No. 240, Feb. 1999) (on file with Julie E. Cohen)
(identifying effective patent life as an important determinant of patent profitability).
HeinOnline -- 89 Cal. L. Rev. 46 2001
2001]
PA TENT SCOPEAND INNOVATION
implemented 97 This means that, practically speaking, the marketdistorting effect of a software patent-in economic terms, the "deadweight
loss" imposed on society-will be substantially greater than for other types
of patents.
Arguably, allowing software patentees to capture the value of improvements many generations removed from the initial invention simply
preserves incentives to innovate in the face of rapid technological change.
Within the traditional patent law framework, however, the desire to preserve incentives coexists with other doctrines, including the reverse doctrine of equivalents, designed to ensure that issued patents do not cut too
deep a generational swath.19 At a minimum, then, we should inquire
whether this approach also produces correspondingly greater social
benefits.'99
4. Equivalenceand Text
Finally, judging the equivalence of software-related innovations presents difficulties because of the medium in which these innovations are embodied. Although software in usable form exists as a series of electronic
impulses, the medium of software innovations-the medium in which the
innovative activity occurs-is text.200 Code-based innovation is, of course,
constrained to a significant degree by the formal dictates of logic. Nonetheless, software innovations have a degree of plasticity that other
innovations lack.
As at least one commentator has observed, evaluating code for
equivalence presents problems conceptually similar to those entailed in
judging originality and substantial similarity in copyright.20 ' Before the
accused program can be compared to a patent claim, two steps must occur.
First, the court must interpret the claim. This step does not require parsing
of code; software patents are not normally claimed or defined in terms of
the actual code used by the patentee. 02 Rather, the technological advance
197. Courts have actually differed on whether the doctrine of equivalents extends software patents
across generations. For a discussion of specific cases, see infra notes 229-237 and accompanying text.
198. E.g., Westinghouse v. Boyden Power Brake Co., 170 U.S. 537 (1898); Scripps Clinic &
Research Found. v. Genentech, Inc., 927 F.2d 1565 (Fed. Cir. 1991); Merges, A BriefNote, supra note
81; see also Texas Instruments, Inc. v. U.S. Int'l Trade Comm'n, 846 F.2d 1369 (Fed. Cir. 1988)
(affirming finding that means-plus-function claims were not literally infringed, despite presence in
accused device of functions corresponding to each element of the claims, because totality of
technological improvement in accused device rendered device nonequivalent).
199. For further discussion of this point, see infra Part III.B.
200. Samuelson et al., supra note 5, at 2320-26.
201.
David A. Shough, Infringement of HardwarePatents by Software-ControlledDevices: A
Study of Equivalence, 8 J. PROPRIETARY Rs. 8 (1996); cf. Peterson, supra note 43 (arguing that
evaluating code-based innovations for nonobviousness raises similar problems); Durham, supra note
23, at 1522-26 (same).
202. A possible exception is means-plus-function claim language, for which claim interpretation
must refer back to the "structure" disclosed in the patent specification. 35 U.S.C. § 112
HeinOnline -- 89 Cal. L. Rev. 47 2001
6 (1994).
CALIFORNIA LA W REVIEW
[Vol. 89:1
embodied in the code is described in the claim; interpretation proceeds according to standard canons of claim construction. Because all patents are
ultimately defined by text, this linguistic problem exists for all kinds of
patents. 0 3 A patent claim that is written at a higher conceptual level will be
interpreted differently than one written with more concrete detail. The
problem is aggravated in the case of software patents, however. Many
software patents, especially first-generation ones, give little or no information in the patent claim (or indeed in the specification) about the software
program itself." Even a later-generation software patent claim may tell the
court very little about the software program in question, leading to greater
variance in the level of abstraction selected? 5 Software is in certain respects more malleable than many other types of inventions (such as pharmaceuticals or mechanical devices). Two pieces of code may produce the
same result and may even use very similar algorithms to do so, but may
still operate differently, for example, by extracting output data from a
memory array in a different manner.2" 6
Second, the factfinder must determine the appropriate conceptual
level at which the accused device or process will be viewed for purposes of
comparison to the claim as interpreted by the court. At this stage, whether
an accused program satisfies a disputed element of the patented invention
may depend entirely on the chosen level of abstraction, for the same reason
just described." 7 Evaluation of the accused program is further complicated
Whether this "structure" includes the computer program itself, or merely the physical substrate in
which it is embodied, is a contested issue. See WMS Gaming, Inc. v. Int'l Game Tech., 184 F.3d 1339
(Fed. Cir. 1999) (holding that an algorithm is part of the structure for literal infringement, but not
necessarily under the doctrine of equivalents).
203. E.g., Autogiro Co. of Am. v. United States, 384 F.2d 391, 396 (Ct. Cl. 1967) ("The very
nature of words would make a clear and unambiguous [patent] claim a rare occurrence."); Craig Allen
Nard, Certainty,Fence Building, and the Useful Arts, 74 IND. LJ. 759, 760 (1999); John R. Thomas,
On PreparatoryTexts and ProprietaryTechnologies: The Place of Prosecution Histories in Patent
Claim Interpretation,47 UCLA L. REv. 183 (1999).
204. Often this is because patent drafters were trying to conceal the very fact that they were
patenting software, back in the days when you had to pretend you were doing something else.
205. Cf. supra note 87 (discussing Federal Circuit's virtual elimination of the enablement and best
mode requirements for software patent claims). Here again, means-plus-function claims may be an
exception. Supra note 202. These problems, of course, also complicate initial decisions about software
patent issuance. In at least some cases, the plasticity of software and lack of supporting detail required,
along with the prior art problems discussed above, see supra Part III.A.2, will lead to the allowance of
claims that are too broad, with obvious ramifications for infringement analysis. Cf. Peterson, supra note
43.
206. See Wiener v. NEC Electronics, Inc., 102 F.3d 534 (Fed. Cir. 1996); Alpex Computer Corp.
v. Nintendo Co., 102 F.3d 1214 (Fed. Cir. 1996).
207. See Shough, supra note 201, at 13-17; cf. MiTek Holdings, Inc. v. Arce Eng'g Co., 89 F.3d
1548, 1559 (1lth Cir. 1996); Bateman v. Mnemonics, Inc., 79 F.3d 1532, 1544-45 (1lth Cir. 1996);
Apple Computer, Inc., v. Microsoft Corp., 35 F.3d 1435 (9th Cir. 1994); Eng'g Dynamics, Inc. v.
Structural Software, Inc., 26 F.3d 1335, 1342-43 (5th Cir. 1994); Gates Rubber Co. v. Bando Chem.
Indus., 9 F.3d 823, 834 (10th Cir. 1993); Computer Assocs. Int'l, Inc. v. Altai, Inc., 982 F.2d 693 (2d
Cir. 1992); cf also Brown Bag Software v. Symantec Corp., 960 F.2d 1465 (9th Cir. 1992); Mark A.
Lemley, Convergence in the Law of Software Copyright?, 10 HIGH TECH. L.J. 1 (1995). Courts have,
HeinOnline -- 89 Cal. L. Rev. 48 2001
2001]
PA TENT SCOPEAND INNOVATION
by the fact that compiled code may perform steps in a different order than
the written source code might suggest, a fact that may matter depending
upon the court's interpretation of what the patent claim requires.
An example of how the level of abstraction selected at both stages can
influence the outcome of the doctrine of equivalents analysis is Overhead
Door Corp. v. ChamberlainGroup, Inc.2"' In that case, the Federal Circuit
held that a reasonable jury could find that a patent for a garage door opener
using a mechanical switch was equivalent to an accused device that used an
electronic switch implemented in software. The result follows from the
court's implicit decision to interpret the switch element at a high level of
abstraction-that is, to believe that the "way" in which it functioned was
by turning on or off. By contrast, an analysis at a lower level of abstraction,
one that inquired into how the claimed and accused switches actually
worked, would surely have found substantial differences between a physical lever and a computer program." 9 In sum, just as in copyright cases
comparison at an overly general level of abstraction will tend to yield a
finding of infringing similarity, so too with software patent cases.210
The Federal Circuit's recent decisions on equivalence claims in software cases indicate an awareness of the need to find equivalence at the
level of detailed program structure as well as function.21 1 The use of juries
rather than judges to decide questions of equivalence complicates the matter still further, however. 22 Courts in copyright cases have recognized that
upon occasion, used the "reverse doctrine of equivalents" to avoid a finding of equivalence in cases
presenting substantial technological improvement in the performance of a given function, infra notes
228-236 and accompanying text, but that doctrine is neither intended nor well tailored to address
routine errors caused by inexact and overly general analysis of the accused program, or of the patent
claim.
208. 194 F.3d 1261 (Fed. Cir. 1999).
209. This problem is not new. It has reared its head in various guises throughout the history of
patent law, most recently as courts try to determine what an "element" is for purposes of the allelements rule endorsed in Warner-Jenkinson. For milestones in this sub rosa debate, see, for example,
Hughes Aircraft Co. v. United States, 140 F.3d 1470 (Fed. Cir. 1998), and Corning Glass Works v.
Sumitomo Electric U.S.A., Inc., 868 F.2d 1251 (Fed. Cir. 1989).
210. The classic statement of the problem is Learned Hand's:
Upon any work... a great number of patterns of increasing generality will fit
equally well, as more and more of the incident is left out. The last may perhaps
be no more than the most general statement of what the play is about, and at
times may consist only of its title; but there is a point in this series of abstractions
where they are no longer protected, since otherwise the playwright could prevent
the use of his 'ideas' ....
Nichols v. Universal Pictures Corp., 45 F.2d 119, 121 (2d Cir. 1930).
211. See General Elec. Co. v. Nintendo Co., 179 F.3d 1350 (Fed. Cir. 1999) (affirming summary
judgment of noninflingement where accused device used substantially different structure to produce
equivalent result); Digital Biometrics, Inc. v. Identix, Inc., 149 F.3d 1335 (Fed. Cir. 1998) (same);
Wiener, 102 F.3d at 1023 (same); Alpex Computer Corp., 102 F.3d at 1214 (reversing judgment of
infringement based on "equivalence of functional result" where evidence showed that accused device
was substantially different in structure and operation).
212. See Wamer-Jenkinson Co. v. Hilton Davis Chem. Co., 520 U.S. 17,37-39 (1997).
HeinOnline -- 89 Cal. L. Rev. 49 2001
CALIFORNIA LA WREVIEW
[Vol. 89:1
selection of the appropriate level of abstraction may be influenced by a
variety of factors unrelated to technical considerations, including
unfamiliarity with the subject matter of the dispute and misunderstanding
of the degree to which the law allows similarity between works. Accordingly, they routinely instruct jurors on the difference between copyrightable expression and uncopyrightable ideas and methods of operation,
and have modified the traditional "lay observer" test for substantial similarity to allow consideration of expert testimony where computer software
is involved.213 Juries in patent cases, of course, already receive considerable expert guidance, but it is not ordinary practice to instruct juries in patent cases on levels of abstraction. Instead, in patent cases, it is the court's
duty to tell the jury what the claims mean. 214hti
It seems, therefore, that it also
should be the court's duty to identify the appropriate level of abstraction at
which the jury should compare the patented invention and the improvement
under the doctrine of equivalents.
B.
Innovation and Equivalence: An Industry-BasedAnalysis
The doctrine of equivalents seeks to fine tune the patent system's
ability to address its central task: ensuring sufficient rewards (and therefore sufficient incentives) to patentees while avoiding an unnecessary degree of deadweight loss to society as a whole. The conventional wisdom is
that, at least as a general matter, the deadweight losses imposed by the existence of the patent system are worth it. As Part L.A discussed, the conventional wisdom has arrived at the identical conclusion with respect to the
specific question of patent protection for software-related inventions.2" 5
This Article does not challenge either answer, but asks instead whether,
given the choice to award patents for software-related inventions, the incentive-deadweight loss tradeoff flowing from that choice is optimized by
a broad or narrow approach to patent scope.
The policy question presented can be described using the following
matrix:
213. E.g., Apple Computer, Inc. v. Microsoft Corp., 35 F.3d 1435, 1442-43, 1445 (9th Cir. 1994);
Gates Rubber Co. v. Bando Chem. Indus., 9 F.3d 823, 834 (10th Cir. 1993); Computer Assocs. Int'l,
Inc. v. Altai, Inc., 982 F.2d 693, 712-13 (2d Cir. 1992).
214. Marknan v. Westview Instruments, Inc., 517 U.S. 370 (1996).
215. E.g., State Street Bank & Trust Co. v. Signature Fin. Group, Inc., 149 F.3d 1368 (Fed. Cir.
1998); In re Alappat, 33 F.3d 1526 (Fed. Cir. 1994) (en banc); Scott M. Alter, Federal Circuit
BroadensScope for Software Patents, 15 COMPUTER LAW. 24 (Oct. 1998); Wesley L. Austin, Software
Patents, 7 TEx. INTELL. PROP. L.J. 225 (1999); Vincent Chiapetta, Patentabilityof ComputerSoftware
Instruction as an "Article of Manufacture:" Software as Such as the Right Stuff, 17 J. MARSHALL J.
COMPUTER & INFO. L. 89 (1998). But see Kreiss, supra note 43, at 31; Thomas, supranote 97.
HeinOnline -- 89 Cal. L. Rev. 50 2001
2001]
PA TENT SCOPEAND I'NOVATION
IMPROVEMENT
WrrHN ORIGINAL
PATENT SCOPE
IMPROVEMENT
OUTSIDE ORIGINAL
PATENT SCOPE
IMPROVEMENT
IMPROVEMENT NOT
PATENTABLE
PATENTABLE
A. Blocking Patents
(or reverse doctrine
of equivalents)
B. Infringement
C. Standalone Patent
(new invention
sequence)
D. Routine
Cumulative
Innovation
According initial software patents a broad scope shifts some patentable
improvements from Box C to Box A, and shifts some subpatentable improvements from Box D to Box B. Whether this is good policy depends on
the relative importance of inventions in these Boxes to patterns of innovation within the software industry as a whole. The patent literature traditionally has answered this question by focusing on the bargaining abilities of
improvers who receive "blocking patents," and arguing that the system encourages (or, with slight modifications, will encourage) inventors and improvers who hold blocking patents to bargain to mutually acceptable
results.216 It should be apparent, however, that our concern is not only or
even primarily with the occupants of Box C, for precisely that reason. The
bargaining position conferred by a blocking patent means that the occupants of Box C, if shifted to Box A, have at least some mechanisms available to protect themselves. 217 Our focus, instead, should be the occupants of
Box D, those whose improvements are not patentable in their own right,
who would be deemed simple infringers under a regime of broad equivalence, and who represent the vast majority of cases. What is to be gained
by making infringers out of these routine innovators?
One justification for the shift, perhaps, is improved cost recovery for
patentees. As Scotchmer notes, the effective term of a software patent is
216. Under the patent law, an improver may receive a patent on an infringing improvement. Such
patents are called "blocking patents" because they block the original patentee from practicing the
improvement unless licensed to do so. E.g., Lemley, supra note 51 (arguing that the blocking patents
system promotes improvement to a greater degree than the copyright system, even though it does not
afford complete insurance against bargaining breakdown); Merges, supra note 168 (arguing that the
reverse doctrine of equivalents should be strengthened to enhance the bargaining position of improvers
who hold blocking patents); Scotchmer, supranote 196.
217. For a discussion of these mechanisms, as well as their shortcomings, see the sources cited
supranote 199.
HeinOnline -- 89 Cal. L. Rev. 51 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
very short, which creates incentive problems for would-be developers of
patentable inventions.21 But all software innovations have short effective
lives, whether patentable or not. Allowing initial patents a broad scope
simply shifts costs and a great deal of risk to follow-on innovators (Box D)
who face equal time pressure.
Shifting costs and risk is, of course, part of the point of the patent
system; those who prefer certainty to risk may bargain for it.2" 9 Thus, a
second, more pragmatic justification for according initial patents a broad
scope is expansion of the patentee's licensing pool. Indeed, some commentators argue that both deadweight-loss and cost-recovery concerns
would be addressed most effectively under a collective-rights framework
involving all members of the affected industry.22 As an argument for broad
patents, however, the "bargaining pool" reasoning proves too much.
Bargains and collective agreements may be based on broad patents or on
narrower ones. The premise of collective rights systems, after all, is that
participants will wish to purchase certainty regardless of baseline legal en" ' Baseline
titlements.22
entitlements matter for a different reason: they affect both initial bargaining positions and final outcomes.222
Indeed, a focus on collective-rights solutions suggests that broadening
patent scope is the wrong approach for promoting progress within the
software industry. From the standpoint of both current and would-be participants, certainty is not the only significant feature of a collective-rights
model. It is also important that not only established patent holders but also
newcomers and small stakeholders have continued incentives to innovate.
This is particularly so in an industry with many players and a constant
218.
Scotchmer, supranote 196.
219. Seeid.
220. Robert P. Merges, Contracting Into Liability Rules: Intellectual Property Rights and
Collective Rights Organizations,84 C~A~m. L. REV. 1293 (1996); Scotchmer, supra note 196. For
similar reasons, other commentators have recommended simply excluding software from the traditional
property-rule framework of patent law and subjecting it to a regime of rights based on liability rules.
See J.H. Reichman, Solving the Green Tulips Problem: PackagingRights in SubpatentableInnovation,
53 VAND. L. REV. (forthcoming 2000); Samuelson et al., supra note 5; cf. J.H. Reichman & Pamela
Samuelson, Intellectual PropertyRights in Data?, 50 VArNo. L. REV. 51 (1997) (advocating a similar
regime for databases). Under such a regime, software developers would surrender their rights to
exclude in exchange for guaranteed fees from users and improvers. Newcomers and small-timers,
meanwhile, would simply purchase licenses, at predetermined rates, to use desired innovations.
221.
Merges has argued that granting property rights may encourage the development of collective
rights organizations that efficiently allocate rights between licensors and licensees, and that those
organizations may create their own liability rule regimes by contract. Merges, supra note 220. But in
the cases we are describing here, the question is not whether to grant property rights to inventors, but
which of two different inventors (the initial inventor or the improver) should hold a particular property
right. In that situation, Merges has noted the importance of dividing entitlements. Merges, Bargaining
Breakdown, supra note 81.
222. Merges, Bargaining Breakdown, supra note 81 (advocating a strengthened bargaining
position for improvers, for precisely this reason).
HeinOnline -- 89 Cal. L. Rev. 52 2001
2001]
PA TENT SCOPEAND INNOVATION
supply of new entrants.' The software industry has precisely these
characteristics. Indeed, because of the many generations of improvers who
would have to bargain with an initial inventor, it may be unrealistic to think
that most or even many efficient transactions will occur.
More generally, the presumption that only pioneering improvers are
worth protecting is inappropriate for an industry characterized by networked, interdependent products, and protecting only pioneering improvers
will have the effect of encouraging moves from Boxes D and B to Boxes C
and A; that is, encouraging industry participants to make larger rather than
smaller changes to existing programs. The resulting pattern of innovation
by leaps and bounds (rather than incremental innovation) may actually decrease social welfare, both by reducing interoperability among programs
(and therefore foregoing the corresponding network benefits) and by rendering the resulting untested programs less reliable. If so, treating software
patents as broad "prospects" will hinder progress.
C.
Tailoringthe Doctrine ofEquivalents to the Software Industry
In sum, there are strong policy reasons for avoiding a broad "prospect" approach to software patent scope, but there is significant likelihood
that courts (and juries) will take this approach, perhaps inadvertently. To
avoid this danger, courts should develop a set of interpretative canons for
assessing equivalence in software patent cases that takes into account the
industry-specific factors described in Part ILI.A, above.
The first and fourth factors are precautionary. They simply require
courts to consider the appropriate level of abstraction224 and factor in the
background norm of incrementalism2 25 when construing claims and instructing juries. Juries, in turn, must be given the proper frame of reference
for comparison, and for assessing the degree of variance between invention
and improvement.
The second and third factors require greater doctrinal adjustment. We
believe, however, that these adjustments can be accomplished within the
doctrine of equivalents. They do not require special treatment for software
223. Cf. ELINOR OsmoM, GOvEINNG THE COMMONS: THE EVOLUTION OF INSTITUTIONS FOR
COLLECTIVE ACTION 205-07,211 (1990) (observing that what works for small, stable communities will
not necessarily work when community membership becomes more fluid). Grossly unequal treatment of
newcomers and small stakeholders was an important factor in the U.S. government's decision to sue the
tvo major performing rights societies, ASCAP and BMI, for antitrust violations, and the resulting
consent degrees were substantially shaped by fairness concerns. United States v. Broadcast Music, Inc.,
1966 Trade Cas. (CCH) 71,941 (S.D.N.Y. 1966), as amended, 1996-1 Trade Cas. (CCH) 71,378
(S.D.N.Y. 1994); United States v. Am. Soc'y of Composers, Authors & Publishers, 1950 Trade Cas.
(CCH) 62,595 (S.D.N.Y. 1950); United States v. Am. Soc'y of Composers, Authors & Publishers,
1941 Trade Cas. (CCH) 56,104 (S.D.N.Y. 1941); JOHN RYAN, THE PRODUCTION OF CULTURE IN THE
Music INDusTRY 92-100 (1985).
224. Supra text accompanying notes 205-210.
225.
Supra text accompanying notes 171-175.
HeinOnline -- 89 Cal. L. Rev. 53 2001
CALIFORNIA LA W REVIEW
[Vol. 89:1
patents, just detailed attention to problems that occur with particular frequency in the software industry. In light of industry and institutional
barriers to comprehensive prior art searches, 2 6 it seems reasonable to suggest that the "known interchangeability" standard be modified in cases involving computer software. Specifically, when a court rejects a validity
challenge based on uncited prior art of the sort we describe here, it should
nonetheless inquire whether, if the reference had been cited to the examiner, the patent would have been narrowed in a way that would save the
accused improvement. The doctrinal basis for this adjustment can be found
in a proper application of Wilson Sporting Goods.227
The generational distortions caused by the time-of-infringement
test,228 meanwhile, can be addressed using a variant of the reverse doctrine
of equivalents. Just as that doctrine excuses literal infringement if the improvement is pioneering in its own right, so it can and should excuse
equivalent infringement if the improvement is so many generations
removed from the knowledge that produced the original invention that it
constitutes a substantial departure from the original. 9
There are some encouraging signs for our approach in the software
infringement cases recently decided by the Federal Circuit. Most of these
decisions have rejected arguments that read claim language written for one
product generation at such a high level of abstraction that it covers accused
products from a different generation. Thus, in Alpex Computer Corp. v.
Nintendo Co.,23 the Federal Circuit held that a patent claim to a video
game output display system was not infringed by a next-generation system
that worked in a different way. Alpex's claimed system included a display
RAM that stored information corresponding to each pixel of a television
screen in a discrete location. Nintendo's accused device, by contrast, used
shift registers to store one "slice" of the video display at any given time.
The Federal Circuit rejected a jury finding that the two systems were
equivalent.23' In Digital Biometrics, Inc. v. Identix, Inc.,232 the court construed narrowly a patent claim to "image arrays" storing a two-dimensional
slice of video data, and which were merged into a "composite array"
226. Supra text accompanying notes 176-181.
227. Supra note 188 and accompanying text.
228. Supra text accompanying notes 191-199.
229. For an example of such qualitative, generational improvement, see Andrew Chin,
ComputationalComplexity and the Scope of Software Patents,39 JURiMErRIcs J. 17 (1998).
230.
102 F.3d 1214 (Fed. Cir. 1996).
231.
Id. at 1222. Wiener v. NEC Electric,Inc., 102 F.3d 534 (Fed. Cir. 1996) is similar to Alpex. In
Wiener, the Federal Circuit upheld the district court's finding of noninfringement under the doctrine of
equivalents, because there were substantial differences between the patent's requirement that a
computer program "call on" columns of data one byte at a time and the defendant's product, in which
the columns alleged to be equivalent were not in the data matrix, and therefore were not called upon to
read data. The court rejected the "conclusory" declaration of plaintiff's expert that the two processes
were identical. Id. at 542.
232.
149 F.3d 1335 (Fed. Cir. 1998).
HeinOnline -- 89 Cal. L. Rev. 54 2001
20011
PA TENT SCOPEAND IAWOVATION
storing a fingerprint image. The court held that the defendant's systems,
which constructed the composite array directly rather than by using twodimensional slices, did not create "image arrays" within the meaning of the
claims. 3 Most recently, in Wang Laboratories,Inc. v. America Online, 4
the court affirmed a district court decision granting summary judgment of
noninfringement under the doctrine of equivalents. The patent claims in
that case covered "frames," defined in the specification as pages encoded
in character-based protocols. The court rejected Wang's attempt to extend
the patent to cover bit-mapped pages, crediting evidence that there were
23 5
"huge, huge differences" between the two approaches.
Other cases, however, have applied the doctrine of equivalents more
broadly. In some of those cases, the Federal Circuit has found equivalence
between two different types of software programs written in different
product generations. WMS Gaming, Inc. v. International Game
TechnologyP6 is instructive. In that case, the court held that a claim written
in means-plus-function language that relied for its corresponding structure
on a computer programmed with a particular algorithm was limited in literal scope to the particular algorithm chosen and equivalents thereof. However, the court found the defendant's algorithm infringing under the
doctrine of equivalents. This latter approach has the potential to expand the
scope of patents in the software industry dramatically? 37 More troubling,
some cases suggest that software implementations of certain ideas are
equivalent to older mechanical implementations. An example is Overhead
Door Corp. v. Chamberlain Group, Inc., 3 discussed above. 23 9 The patented system claimed a (mechanical) switch connected to a microprocessor, which could store the codes of multiple garage doors. The Federal
Circuit held that the claim was not literally infringed by an electronic
switch implemented in software. However, the court reversed a grant of
233. Id. at 1349.
234.
197 F.3d 1377 (Fed. Cir. 1999).
235. Id. at 1386. In a related context (interpreting equivalent structure in a means-plus-function
claim), in GeneralElectric Co. v. Nintendo Co., 179 F.3d 1350 (Fed. Cir. 1999), the court held that
Nintendo's video game systems did not infringe GE's television switch patents because the patents,
written in means-plus-function format, did not disclose a function for the switches identical to
Nintendo's function. On the differences between the doctrine of equivalence and equivalence under a
means-plus-function analysis, see Chiuminatta Concrete Concepts, Inc. v. Cardinal Industries, 145
F.3d 1303 (Fed. Cir. 1998).
236.
184 F.3d 1339 (Fed. Cir. 1999).
237. It also suggests, however, that software patents that merely implement a well-known
mechanical concept in software may be vulnerable to an obviousness challenge. This follows from the
Wilson Sporting Goods rule, coupled with the interrelatedness of claim construction. Cf Donald S.
Chisum, Anticipation, Enablement and Obviousness: An Eternal Golden Braid, 15 AIPLA Q.J. 57
(1987) (discussing the latter). If mechanical claim elements are properly viewed as equivalent to a
computer program that performs the same function, it may well follow that the computer program is
obvious in view of the mechanical prior art.
238.
194 F.3d 1261 (Fed. Cir. 1999).
239. Supra Part ll.A.4.
HeinOnline -- 89 Cal. L. Rev. 55 2001
CALIFORNIA LA WREVIEW
[Vol. 89:1
summary judgment to the defendants under the doctrine of equivalents,
concluding that a reasonable jury could find that the difference between
mechanical and software implementations was a mere "design choice."24
These troubling inconsistencies in the Federal Circuit's software patent decisions indicate that a more systematic approach to questions of
software patent scope is needed. We believe that the set of interpretative
canons that we have identified will produce greater consistency, and will
provide better guidance to the federal district judges who must try patent
cases and instruct juries. The result will be a body of decisional law that is
more predictable, and that more effectively promotes innovation by
software firms.
CONCLUSION
Exploration of the consequences of patent protection for innovation in
the software industry is just beginning. Here, we have tried to suggest some
of the pitfalls that existing patent doctrine may create for software
developers throughout the research and development process. Because
software must be reverse engineered to be understood, the patent law's
failure to provide a reverse engineering privilege may pose unique difficulties for software research, and thus may frustrate fundamental patent
polices favoring disclosure and competition. Because software innovations
tend to be incremental and poorly documented, and because their economic
lives tend to be much shorter than the uniform patent term, courts may apply the doctrine of equivalents too broadly in software infringement disputes, and thus may stifle efforts by second-comers to design around
existing patents. Further, these problems are linked. Robust competition by
improvers requires both that they be able to engage in reverse engineering
in order to analyze existing programs, and that they have the freedom to
design new products without undue risk of liability for patent infringement.
In short, in both of the situations we have identified, applying existing
patent doctrine to software patents threatens to create exclusionary rights
that are extraordinarily broad even by patent standards. To a substantial
degree, this would accord with the requirements of a "prospect" approach
to software patents. As we have shown, however, that result is unlikely to
promote progress in this industry. Because of the unique technical and economic characteristics of software, patent protection that is broader than
usual is much more likely to hinder innovation than to foster it.
Our proposal is essentially a conservative one: In extending the full
benefits of patent protection to software, courts must make sure that the
unique characteristics of software do not result in an unprecedented and
equally unique expansion of patent scope. To help courts or Congress
240.
OverheadDoor Corp., 194 F.3dat 1270.
HeinOnline -- 89 Cal. L. Rev. 56 2001
2001]
PA TENT SCOPEAND INNO VA TION
57
achieve this goal, we have recommended relatively minor doctrinal
adjustments designed to avoid this danger. If software is to be considered
patentable, and clearly it is, these adjustments will help to ensure that the
extension of patent protection achieves its intended effect.
HeinOnline -- 89 Cal. L. Rev. 57 2001