Paper 3: Software Patents

Due: Friday, May 2          Comp 417, Dordal



Topic option 1: Are software patents a special case?

Paul Graham wrote

There's nothing special about physical [machines] that should make them patentable, and the software equivalent not.

Are there features of software patents that make them a special case in terms of patentability? The purpose of patents in general is to encourage innovation and investment in innovation, for social progress. Does this actually work for software patents?

This position is compatible with both the idea that software should be patentable, and also with the idea that nothing should be patentable; the latter argument is made in Michele Boldrin and David Levine's The Case Against Patents, and their longer work Against Intellectual Monopoly. Argue your position, and come to some sort of conclusion.

You can argue based on general principles, or on the utility of patents to specific industries.

One facet of the question is whether software patents, on the whole, are of benefit to society; if they are not, and other patents are, then you have established a distinction. Do software patents foster innovation, leading to more software ideas for everyone? For the purposes of patent law, should software be included?

Here are a few justifications that have been advanced for considering software patents to be fundamentally different:
Others have argued that the only specialness of software patents is that the patent office allegedly has difficulty conducting patent examinations for software. Still others argue that it is the existence of open source that makes software patents unique.

In the I4I v Microsoft case, an obscure patent about a data structure for holding XML tags became very expensive for Microsoft, once the data structure in question was interpreted so broadly as to cover any method of manipulating XML structure separately from data. Does this represent a fundamental problem with the use of abstraction (ie in describing data structures) in computer science? Or was this just a quirk of the judicial system?

Yet another way to address the two questions above is that, yes, Graham was right, but that software should be subject to different patent rules. If this is what you feel, propose different rules and argue for them. If your main argument is that software is indeed a special case, you may either make the case that it is so different that patents should not apply, or make the weaker argument that special patent rules should apply. If you are arguing that software is not a special case, you do not necessarily have to argue that all the rules should be the same.

Discuss both sides, and come to a conclusion. Your conclusion should either support one side or the other (perhaps with qualifications), or else it should outline some sort of "compromise" position.

If you are arguing against patents generally, please make that clear (in that case, you are probably not arguing that software is different, though you might argue that the case against software patents is stronger). If you argue against all patents, you should be sure you understand your argument's implications for, say, the pharmaceuticals industry.

Here are a few more points to think about if you need suggestions. You don't have to address them all (you don't have to address any of them):



Topic option 2: Is Weev a Crook?

Weev here is Andrew "Weev" Auernheimer, who is currently in prison for hacking under the Computer Fraud and Abuse Act. But some (not just his defense team) have questioned whether he deserves to be there. ("Crook" here is being used broadly as a synonym for any criminal.)

What Auernheimer did was to discover that if you went to the AT&T iPad login site, it automatically showed the owner information (name and email address) already filled in. With a little digging, Auernheimer discovered that the iPad was sending AT&T its serial number, and AT&T was looking that up in its records and filling in the form from the server side. Most browser form-filling is done at the client side, by filling in values that were previously entered by the client and were in fact stored on the client. Server-side form-filling is almost never done until after an authenticated login, but AT&T did server-side form-filling before authentication.

Auernheimer then wrote a simple script to send millions of randomly chosen potential serial numbers to AT&T. When the random number matched a real serial number, back would come a real user name and that user's email address. Auernheimer was thus able to collect a large number of email addresses.

Was Auernheimer's action a criminal act? Was it "unauthorized access" according to the Computer Fraud and Abuse Act? The trial judge said yes to the latter question, and so Auernheimer is in prison, but his case is on appeal.

There are two separate questions, actually; you may address either or both. The first is whether this kind of thing is a criminal act; the second is whether it qualifies as "unauthorized access". The CFAA has often been criticized for criminalizing rather ordinary forms of unauthorized access, such as creating multiple Facebook accounts or using Google search as a minor prior to March 1, 2012 (when the Google terms of service required all users to agree they were over 18).

Here is another way to look at the question: is a law against "unauthorized access" a good idea, or must there be some other standard as well, and, if so, what? Some possibilities are

Another way to summarize this question is simply "Is the CFAA too broad? If not, why? If so, how might it be fixed?"

Finally, you can also approach this from the ethical perspective: did Weev do something wrong? (For that matter, did Aaron Swartz?) It seems clear that Weev did what he did to embarrass AT&T. Should he have done more to protect the users involved? If he had done nothing, note that awareness of the breach might never have been exposed.



Your paper (either topic) will be graded primarily on organization (that is, how you lay out your sequence of paragraphs), focus (that is, whether you stick to the topic), and the nature and completeness of your arguments.

It is essential that all material from other sources be enclosed in quotation marks (or set off as a block quote), and preferably with a citation to the original source as well.

Expected length: 3-5 pages (800+ words)