Feeds

Microsoft FAT patent rejected - again

On a technicality

3 Big data security analytics techniques

The US Patent and Trademarks Office has thrown out two Microsoft patents on its FAT file system. The case had been raised by open source defenders who feared that Microsoft was preparing a legal offensive against Linux based on enforcement of intellectual property rights. But the Patent Office rejected the patents because of an administrative technicality - not because of prior art submitted by the F/OSS team.

In November 2003 Microsoft began to license its venerable FAT file system, written by Bill Gates himself for the original 1981 IBM PC. The file system was already in wide use in non-PC devices such as compact flash media used in digital cameras, so Microsoft was inviting vendors to pay for something that they already used for free. This alarmed open source advocates, who cannot use royalty-bearing patents with GPL software; Linux makes use of the FAT file system in the kernel. A non-profit group requested that Microsoft's claims for the patents be investigated.

The USPTO rejected one of the patents, (USPTO 5,579, 517, referred to as '517) in September 2004 in a preliminary ruling. Now it's struck down the other, on the grounds that it the six assignees names were incorrect.

"Microsoft has an opportunity to submit evidence in response to the examiner's request and remains optimistic that these issues will be resolved in its favor," said the Patent Office.

Back in March, Microsoft's chief attorney Brad Smith slammed the USPTO for lowering the quality of the patents it issued. But Microsoft had nicer things to say about the Office yesterday, commending it for upholding the patents' IP content.

The Public Patent Foundation, a non-profit, had argued that the two Microsoft patents were invalid because of three prior art patents, filed by IBM and Xerox in 1988, 1989 and 1990.

The IP issue remains a potent threat for Microsoft because of the very real difficulties that open source and free software developers have with royalty bearing patents. However, the difficulty of launching litigation means it's only really potent as a threat - like Mutually Assured Destruction, as we discussed here.

Earlier this year Microsoft's legal team advertised for patent attorneys, for which "no patent experience was necessary". ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.