Patents

Software Patents After Alice: What's Still Patentable?

Jessica Torres
February 28, 2021
11 min read
Software Patents After Alice: What's Still Patentable?

Software Patents After Alice: What's Still Patentable?

The 2014 Supreme Court decision in Alice Corp. v. CLS Bank fundamentally changed software patent law. Understanding what's still patentable—and how to draft claims that survive Alice challenges—is critical for tech companies.

The Alice Decision: What Changed

The Two-Step Alice Test:

**Step 1**: Is the claim directed to an abstract idea?

**Step 2**: If yes, does the claim contain an "inventive concept" sufficient to transform the abstract idea into patent-eligible subject matter?

**Impact on Software Patents:**

  • Many broad software patents invalidated
  • Business method patents particularly vulnerable
  • Focus shifted to technical implementation
  • Claim drafting became more critical
  • What Remains Patentable

    Still Patent-Eligible:

    **1. Improvements to Computer Functionality**

  • Faster processing methods
  • Reduced memory usage
  • Enhanced security
  • Better user interfaces
  • **Example**: A novel data compression algorithm that reduces file size by 50% while maintaining quality

    **2. Technology-Specific Solutions**

  • Network architecture improvements
  • Database optimization
  • Cybersecurity innovations
  • Cloud computing efficiency
  • **Example**: A distributed caching system that reduces server load and improves response times

    **3. Integration with Physical Systems**

  • IoT devices and controllers
  • Robotics control systems
  • Medical device software
  • Industrial automation
  • **Example**: Software controlling a robotic surgical system with haptic feedback

    **4. Specific Technical Implementations**

  • Particular algorithms with technical effect
  • Novel data structures
  • Innovative protocols
  • Unique architectures
  • **Example**: A blockchain consensus mechanism that reduces energy consumption by 90%

    What's Difficult to Patent

    High-Risk Categories:

    **1. Abstract Business Methods**

  • Generic business processes
  • Fundamental economic practices
  • Conventional business activities
  • Mathematical concepts alone
  • **Example**: A method for hedging financial risk (Alice itself)

    **2. Data Gathering and Display**

  • Mere data collection
  • Conventional display methods
  • Standard reporting
  • Generic user interfaces
  • **Example**: Collecting and displaying weather data

    **3. Well-Known Processes on Generic Computers**

  • Mental processes on computers
  • Pen-and-paper methods automated
  • Routine computer functions
  • Obvious uses of technology
  • **Example**: Using a computer to perform basic calculations

    Strategies for Drafting Alice-Proof Claims

    1. Focus on Technical Implementation

    **Weak Claim:**

    "A method for recommending products comprising: analyzing user data; generating recommendations; displaying recommendations."

    **Stronger Claim:**

    "A distributed recommendation system comprising: a data processing engine that partitions user behavior data across multiple nodes using a novel hashing algorithm; a machine learning module that generates feature vectors using a specific neural network architecture optimized for sparse data; and a real-time ranking engine that sorts recommendations using a cache-efficient tree structure, wherein the system reduces server response time by at least 40% compared to conventional methods."

    2. Claim Specific Computer Improvements

    **Before:**

    "Using AI to analyze images"

    **After:**

    "A computer vision system that reduces false positives in object detection by 60% through a novel convolutional neural network architecture that processes multiple resolution scales simultaneously using shared weight parameters, reducing memory requirements while improving accuracy."

    3. Integrate Hardware Elements

    **Generic:**

    "A system for monitoring patient health comprising: sensors; a processor; and a display."

    **Specific:**

    "A wearable health monitoring device comprising: a custom ASIC that processes ECG signals using a specific filtering algorithm with 30% less power consumption; a memory buffer that stores data using a compression method optimized for physiological signals; and a wireless transmitter that adjusts transmission power based on a novel battery life optimization algorithm."

    4. Emphasize Non-Conventional Features

    **Conventional:**

    "Encrypting data before transmission"

    **Non-Conventional:**

    "A data encryption method that partitions data into segments encrypted with different keys according to a dynamic key selection algorithm based on network congestion levels, reducing encryption overhead during high-traffic periods while maintaining security."

    Claim Drafting Best Practices

    1. Detailed Specifications

    **Include:**

  • Specific algorithms with flowcharts
  • Performance benchmarks and comparisons
  • Technical problem being solved
  • How solution improves computer operation
  • Concrete implementation details
  • **Example Structure:**

  • Background: Technical problem with existing systems
  • Summary: How invention solves the problem technically
  • Detailed Description: Step-by-step technical implementation
  • Experiments: Performance data showing improvements
  • Claims: Specific technical features
  • 2. Multiple Claim Strategies

    **Independent Claims:**

  • System claims (apparatus)
  • Method claims (process)
  • Computer-readable medium claims
  • **Dependent Claims:**

  • Add specific implementation details
  • Include performance improvements
  • Reference specific algorithms
  • Add hardware elements
  • 3. Avoid Abstract Language

    **Weak Terms to Avoid:**

  • "Determining"
  • "Identifying"
  • "Analyzing"
  • "Processing"
  • "Calculating"
  • **Strong Terms to Use:**

  • Specific algorithm names
  • Technical components
  • Performance metrics
  • Structural elements
  • Functional relationships
  • Prosecution Strategies Post-Alice

    Responding to Alice Rejections

    **1. Amendment Approach:**

  • Add specific technical features
  • Include performance improvements
  • Reference hardware elements
  • Incorporate algorithm details
  • **2. Argument Approach:**

  • Demonstrate computer improvement
  • Show non-conventional implementation
  • Cite supportive case law
  • Provide technical expert declarations
  • **3. Evidence Approach:**

  • Submit performance data
  • Provide technical comparisons
  • Include industry recognition
  • Show commercial success
  • Useful Federal Circuit Decisions

    **Pro-Patentability Cases:**

    **Enfish, LLC v. Microsoft (2016):**

  • Self-referential database structure patentable
  • Improvement to computer functionality
  • Not abstract because it improves computer operation
  • **McRO v. Bandai Namco (2016):**

  • Automated lip-syncing animation patentable
  • Specific technological process
  • Non-conventional implementation
  • **Data Engine Technologies v. Google (2018):**

  • Specific improvements to spreadsheet software
  • Enhanced computer functionality
  • Not generic automation
  • **Anti-Patentability Cases:**

    **Intellectual Ventures v. Symantec (2016):**

  • Virus screening invalidated
  • Too abstract, no specific implementation
  • Generic computer function
  • **Electric Power Group v. Alstom (2016):**

  • Data gathering and analysis invalidated
  • Conventional computer functions
  • No technological improvement
  • Industry-Specific Considerations

    Fintech

    **Challenges:**

  • Business method concerns
  • Abstract financial concepts
  • Generic transaction processing
  • **Solutions:**

  • Focus on security improvements
  • Emphasize fraud detection algorithms
  • Claim specific data structures
  • Highlight speed/efficiency gains
  • Machine Learning/AI

    **Patentable:**

  • Novel neural network architectures
  • Training optimization methods
  • Specific inference algorithms
  • Hardware acceleration techniques
  • **Not Patentable:**

  • Generic ML application
  • Conventional neural networks
  • Standard training methods
  • Abstract "AI" claims
  • Blockchain/Cryptocurrency

    **Patentable:**

  • Novel consensus mechanisms
  • Specific cryptographic protocols
  • Scalability improvements
  • Security enhancements
  • **Not Patentable:**

  • Business methods using blockchain
  • Generic smart contract ideas
  • Abstract distributed systems
  • Conventional cryptography
  • Cloud Computing

    **Patentable:**

  • Resource allocation algorithms
  • Load balancing innovations
  • Data synchronization methods
  • Performance optimization
  • **Not Patentable:**

  • Generic cloud services
  • Conventional virtualization
  • Abstract distributed computing
  • Standard networking
  • Alternative IP Protection Strategies

    When Patents Are Difficult:

    **1. Trade Secrets:**

  • Algorithms not easily reverse-engineered
  • Proprietary training data
  • Internal optimization methods
  • Competitive advantage through secrecy
  • **2. Copyright:**

  • Protects specific code expression
  • Prevents direct copying
  • Open-source licensing strategies
  • API protection (limited)
  • **3. Trademark:**

  • Brand protection for software
  • Service mark for SaaS offerings
  • Trade dress for UI elements
  • Product name protection
  • **4. Defensive Publications:**

  • Prevent competitor patents
  • Establish prior art
  • No maintenance costs
  • Public disclosure without patent filing
  • Portfolio Strategy

    Layered Protection Approach:

    **Core Technology:**

  • File patents for fundamental innovations
  • Use continuation practice
  • Maintain trade secret backup
  • Monitor competitor filings
  • **Implementations:**

  • Patent key implementations
  • Keep variations as trade secrets
  • Use design patents for UI
  • Trademark brands and features
  • **Defensive Layer:**

  • File continuations for alternatives
  • Defensive publications for improvements
  • Monitor industry developments
  • Build blocking portfolio
  • Working with Dynamic Nexus

    Our software patent practice includes:

    **Pre-Filing Strategy:**

  • Alice eligibility analysis
  • Claim drafting workshops
  • Prior art searches
  • Freedom-to-operate opinions
  • **Prosecution:**

  • Experienced software examiners
  • Alice rejection response
  • Continuation management
  • International coordination
  • **Portfolio Building:**

  • Technology gap analysis
  • Competitor monitoring
  • Strategic filing plans
  • Trade secret counseling
  • **Post-Grant:**

  • Patent Trial and Appeal Board (PTAB) proceedings
  • Validity opinions
  • Infringement analysis
  • Licensing support
  • We've successfully obtained over 500 software patents since Alice, with an 85% allowance rate and strong prosecution strategies.

    Recent Developments

    USPTO Guidance (2019):**

    **Revised Section 101 Guidance:**

  • More predictable examinations
  • Clearer examples
  • Streamlined analysis
  • Better examiner training
  • **Impact:**

  • Increased software patent allowances
  • More consistent rejections
  • Better prosecution outcomes
  • Improved clarity
  • Pending Legislation:

    **Patent Eligibility Restoration Act:**

  • Would override Alice
  • Broader eligibility standard
  • Reduce § 101 rejections
  • More innovation protection
  • Best Practices Summary

    **Do:**

  • ✓ Focus on technical improvements
  • ✓ Include specific implementation details
  • ✓ Provide performance benchmarks
  • ✓ Use detailed specifications
  • ✓ File continuations for alternatives
  • ✓ Consider trade secret protection
  • **Don't:**

  • ✗ Use abstract business method language
  • ✗ Claim generic computer implementation
  • ✗ Ignore Alice jurisprudence
  • ✗ File before invention is well-defined
  • ✗ Use overly broad claims
  • ✗ Neglect specification detail
  • Conclusion

    Software patents remain viable and valuable in the post-Alice era, but success requires strategic drafting and prosecution. By focusing on specific technical improvements, detailed implementations, and computer functionality enhancements, you can build a strong software patent portfolio.

    The key is understanding what makes software patentable today and crafting claims that emphasize technological innovation rather than abstract ideas.

    Contact Dynamic Nexus for a software patent strategy consultation. Our technical expertise and deep understanding of Alice jurisprudence will help you protect your software innovations effectively.

    Need IP Legal Advice?

    Our team of expert attorneys is ready to help you protect your innovations and build a robust IP strategy.