decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Will you lot stop that! | 238 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
What do you know? BouncyCastle
Authored by: lwoggardner on Thursday, April 26 2012 @ 10:05 AM EDT
Hmmm, and I wonder where that comment about CipherInputStream came from...

[ Reply to This | Parent | # ]

From google's motion - OMG
Authored by: PriceChilde on Thursday, April 26 2012 @ 10:20 AM EDT
Android in bold... to be fair, the sentence structure and shared words are exceedingly similar.

  • A CipherInputStream is composed of an InputStream and a Cipher
  • This class wraps an InputStream and a cipher

  • so that read() methods return data that are read
  • so that read() methods return data that are read

  • in
  • from the underlying InputStream
  • from the underlying InputStream

  • but have been additionally
  • and

  • processed by the Cipher. The Cipher must be
  • processed by the cipher. The cipher must be

  • fully
  • initialized
  • initialized

  • for the requested operation

  • before being used by a CipherInputStream.
  • before being used by a CipherInputStream.

    Yeah, I think its a punch of balloney too and I think its perfectly acceptable that it may have been the only sensible way to descibe the method without intentionally looking at Sun's and writing something different to it.

    [ Reply to This | Parent | # ]

  • From google's motion - OMG
    Authored by: Anonymous on Thursday, April 26 2012 @ 10:40 AM EDT
    This example also makes very clear that there is no way you can sensibly do a "cleanroom" recreation of an API description. It needs to obey the same restraints, and verifying those restraints needs a side-by-side comparison as they have to be functionally identical.

    I remember copyright violation cases for telephone directories where the contents of the directories were typed off in China. The defendant lost his case because they did a "cross-check" with machine-readable (and copyrighted) CD-ROMs, and as a consequence of this "cross-check" reinserted bogus entries only in the machine-readable copy.

    For an API, there are no bogus entries. It needs to have the same content, verifiably. The code implementing the API can be created in a cleanroom setting, but the API is the information required for establishing what needs to be done in the cleanroom.

    There is very little leeway regarding the literary freedoms in API-writing, though you could work on different qualities of presentation and crossreferencing, and copyright that. But the naked content/text is functional. You can't "reinvent" it, or the result would just not work because of being incompatible.

    [ Reply to This | Parent | # ]

    From google's motion - OMG
    Authored by: scav on Thursday, April 26 2012 @ 10:45 AM EDT
    Another good bit:
    The only reasonable conclusion that a jury can draw from this series of responses is that Professor Mitchell is basing his conclusion of substantial similarity on the fact that both descriptions express the same idea. That, however, is not infringement. See 17 U.S.C. § 102. Professor Mitchell’s opinion about alleged substantial similarity between the Android and J2SE specifications must therefore be disregarded entirely.
    See, if you hire a fake expert it's only a matter of time before they accidentally shred your case. I almost hope Oracle call "patent expert" Florian Mueller in the second phase of the trial.

    ---
    The emperor, undaunted by overwhelming evidence that he had no clothes, redoubled his siege of Antarctica to extort tribute from the penguins.

    [ Reply to This | Parent | # ]

    Will you lot stop that!
    Authored by: Ian Al on Thursday, April 26 2012 @ 10:51 AM EDT
    There is a vast amount of creative expression in there quite apart from the
    merger of idea and expression. And scenes a faire because facts are facts.
    And... but that's not important, now.

    My worry is that Oracle copied the creative expression from Bouncy Castle. I
    hope they did not just run javadoc on the Bouncy Castle code and obfuscate the
    creative expression.

    Is there any way to get them off the hook?

    ---
    Regards
    Ian Al
    Software Patents: It's the disclosed functions in the patent, stupid!

    [ Reply to This | Parent | # ]

    Groklaw © Copyright 2003-2013 Pamela Jones.
    All trademarks and copyrights on this page are owned by their respective owners.
    Comments are owned by the individual posters.

    PJ's articles are licensed under a Creative Commons License. ( Details )