[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: IBM patents on key distribution and authentication



I fully agree with Perry's sentiments about completely avoiding
patented technology to the greatest possible extent. But when
incredibly broad (and bogus) patents appear like the recent ones from
IBM on state machine protocols, assigning temporary IP addresses to
mobile users and now this one on challenge-authentication, what can we
do? Give up and go home?

I think we should ask if IBM (or whoever) is willing to grant free
use.  If so, the problem is solved. If not, I don't see any
alternative but to simply ignore those patents we consider bogus
(i.e., for which we have ample prior art), press on and hope we don't
get sued. The patent office does have a reexamination procedure, but
by all accounts it is a complete joke.

I keep hearing that IBM never sues you unless you sue them
first. Maybe so. I've seen many examples of companies that never sue
as long as they're successful, even with plenty of provocation. But
the moment they get into trouble because of failure to innovate, the
infringement suits start flying. And in their death throes they'll
take down as much of the industry with them as they can.

Maybe IBM isn't at that stage yet, but I wouldn't bet on it.

Phil


Follow-Ups: References: