Feeds

Cingular emoticon grab not so serious :-) say experts

Keys and palettes

Providing a secure and efficient Helpdesk

Letters Cingular's attempt to patent emoticons isn't as bad as it sounds, expert readers. European patent attorney John Cooper writes:

The exclusive rights that a patent application seeks to secure are defined by the "Claims" of the application. These are usually amended during examination of the application so as that the terms of the claims in the finally granted patent are "novel" and "non-obvious" (or "inventive") over the prior art (i.e. whatever relevant information was in the public domain before the application was filed).

In this case the claims are all directed to the use of a dedicated key on, e.g., a mobile phone, to access a selection of predefined emoticons.

I can't say offhand whether that is novel or inventive, but it's a far cry from patenting the use of emoticons per se.

There are enough genuine software patent horror stories around without inventing spurious ones.

Adds reader Anne:

The patent application is over a one-key way of accessing emoticons ... not requesting a patent over emoticons themselves! I appreciate that doesn't make quite such good copy, though :)

We consider ourselves corrected.

But as Deborah Swinney points out, this is hardly grounds for claming an invention.

This is rather like claiming a patent for putting an 'A' on a keyboard. The letter was there, the device needed it. Where's the invention?

Indeed, and Cingular's patent application is much broader than a simple emoticon key. The application makes claims for providing the mobile user with a palatte of emoticons from which to choose. Chris O'Shea adds that such smiley helpers already exist, such as on his Sony Ericsson P910i:

While composing a text message, I have a bar of icons displayed, one of which is a smiley and clicking on it presents a range of different emoticons to be inserted in my text message. That seems to match one or more of their claims

He asks if this was on predecessors of the phone, and we believe the answer's yes.

And about a zillion of you pointed out Despair.com's attempt to patent the frowny, which you can read about here and here.

http://www.lovedungeon.net/humor/dave/emoticons.html

Related link

Dave Barry's Emoticons (thanks to Stefan).

Security for virtualized datacentres

More from The Register

next story
Are you a fat boy? Get to university NOW, you PENNILESS SLACKER
Rotund types paid nearly 20% less than people who didn't eat all the pies
Emma Watson should SHUT UP, all this abuse is HER OWN FAULT
... said an anon coward who we really wish hadn't posted on our website
Japan develops robot CHEERLEADERS which RIDE on BALLS
'Will put smiles on faces worldwide', predicts corporate PR chief
Bruges Booze tubes to pump LOVELY BEER underneath city
Belgian booze pumped from underground
Oz carrier Tiger Air takes terror alerts to new heights
Don't doodle, it might cost you your flight
Amazon: Wish in one hand, Twit in the other – see which one fills first
#AmazonWishList A year's supply of Arran scotch, ta
Let it go, Steve: Ballmer bans iPads from his LA Clippers b-ball team
Can you imagine the scene? 'Hey guys, it's your new owner – WTF is that on your desk?'
Oi, London thief. We KNOW what you're doing - our PRECRIME system warned us
Aye, shipmate, it be just like that Minority Report
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.