decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
algorithm | 1347 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
...definitely useful? Useful, is not one of the criteria.
Authored by: Anonymous on Monday, June 11 2012 @ 12:18 AM EDT
Patents are about non-obvious methods and concepts with no
prior art. Oh, it has to be an invention, not an idea.

And it can not be math.

Useful, is not one of the criteria.

Software is code, the code is the story. Without the story
the software does not work. The mechanics of software, what
actually makes it work, is all about switches, on or off,
that is what it is, what it will always be. Math.

Software is protected by copyright. Not by patent. Those
who want to argue otherwise, simply are not using the
Socratic Method (maybe because they are paid NOT TO go there
and are trained to stay with their story no matter how wrong
that they are).

Truth is Truth.




[ Reply to This | Parent | # ]

algorithm
Authored by: Anonymous on Monday, June 11 2012 @ 12:50 AM EDT
algorithm is math.

And, historically the method or concept of such is not
anything that should ever be protected.

For ages, the armies of the world used these math
communications related ways to pass secret messages. And,
those that found the messages, used the same methods and
concepts to break the codes. Just because a computer now
can do it quicker with less human effort, does not mean
anything has changed. Old, lots of prior are, and it's
math.

[ Reply to This | Parent | # ]

Software vs math, an interesting question...
Authored by: jonathon on Monday, June 11 2012 @ 02:59 PM EDT
>Question: should the "prefix attack" on the MD5 algorithm be
patentable, given its obvious and specific utility? Yes, it's very mathematical,
but it is also quite concrete, clearly novel, and definitely useful.

The "prefix attack" is pure math, and as such, should not be
patentable.

I haven't look at either the source for Flame, nor any of the math around it.
However:

"Novel" is an ambiguous concept.

This specific attack was previously unknown, when used against MD5. That does
not mean that the attack is unknown when used against other algorithms that
offer similar functionality to MD5. Nor does it mean that the attack is unknown
when used against encryption algorithms, or enciphering algorithms.

Come to think of it, I think that Bruce Schneier described at least one prefix
attack back in the 1990s.

Once a method to attack one type of algorithm is known, then it is simply a
matter of time, to learn how to use that method against other, similar
algorithms. The time required might be ten microseconds, or it might be ten
kalpas.

Is it "novel" if it takes one kalpa to learn how to apply and apply
this specific prefix attack on MD5, to say, RIPEMD-320?


"Useful", is equally ambiguous.

If the point is to damage something, then bombs are useful things to detonate.
If the point is to construct something, then detonating bombs on it is not a
useful practice. (Ignoring for now demolishing a building, to construct a new
building in the same space.)

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )