How to keep your patent portfolio safe from theft
If you want to keep a patent portfolio secure, you need to use a number of different techniques to keep them safe.
The techniques are outlined in a new paper published in Science.
It is one of the first papers to analyse the security of a patent’s underlying technology and assess how well it can be defended.
The paper looks at several aspects of the technology and how it can have a negative impact on patent portfolios.
The authors found that the overall security of the patent portfolio is low, with the largest threat being in areas of the underlying technology that are not being protected by a patent.
“Patent portfolio security is not the main concern of patent holders, it’s just a side effect,” says Professor Matthew Hays, who is the lead author of the paper.
Professor Hays and his team were able to quantify this by using an automated process that would compare a patent against a set of competing patents. “
The only area that we can really quantify is the impact of patents in relation to patentability and patent validity.”
Professor Hays and his team were able to quantify this by using an automated process that would compare a patent against a set of competing patents.
“This process uses the best available data and uses machine learning to identify potential vulnerabilities in the underlying system, and then we use that to develop a patent pool of the most likely candidates to be used in the analysis,” he says.
“It was incredibly challenging and really interesting to analyse and it really illustrates the impact that patents can have on patent pools.”
The paper used a proprietary tool that scans patents for vulnerabilities and then used machine learning algorithms to identify the most promising candidates.
The researchers were able, in a very short time, to identify more than 10,000 vulnerabilities in about 300 patent portfolios across a wide range of patents.
There were more than 500 vulnerabilities in some of the more popular ones, including patents for the ability to perform simple mathematical operations, and more than 100 in the ability for users to send text messages, and some of those were very similar to the ones that could be exploited by hackers.
“In our research, we were able identify vulnerabilities in more than 5,000 patent portfolios over several years,” Professor Hains says.
In the process, the researchers were also able to find vulnerabilities that would normally be undetected and not cause any damage, but which could have a significant impact.
“So the more vulnerabilities we identified, the better we were at detecting them,” he explains.
“That means we were actually able to detect more than five times as many of these vulnerabilities as we would have without using this tool.”
“We were also very surprised by the fact that we were successful in detecting more than 90% of the vulnerabilities in all of the portfolios that we identified.”
The researchers then looked at the security risk posed by the vulnerabilities.
“When we looked at portfolio vulnerabilities that were not discovered by the researchers, we only detected four vulnerabilities, and these vulnerabilities were not even close to the amount of vulnerabilities that we would expect. “
Even in the portfolios we identified that were potentially vulnerable, the vulnerability rate was much lower than the rate that we expected,” he points out.
“As such, we think that it is unlikely that our findings will have any lasting impact on the market for the foreseeable future.””
As such, we think that it is unlikely that our findings will have any lasting impact on the market for the foreseeable future.”