Friday, September 12, 2025

De Facto Standard Patent Strategies and the Pitfalls of ‘Royalty-Free’: Lessons from Tesla, Qualcomm, and Google

 

That ‘Royalty-Free’ Gift… Can You Really Trust It? From Bluetooth to EV charging standards, we're diving into the complex world of patents and the calculated corporate strategies hidden behind the sweet promise of “free.” This article will give you a sharper eye for seeing what’s really going on in tech.

Hey there! In the world of tech, the term ‘Royalty-Free’ sounds pretty appealing, right? It feels like a free gift, and since it’s used in everyday things like Bluetooth, USB, and WebRTC, you might think you can use it without a second thought.

But is that really the case? Today, we’re going to dig into the complex issues lurking behind that attractive ‘royalty-free’ sign—namely, intellectual property (IP) problems and, sometimes, intentional strategic traps. The goal of this article is to help you see beyond the “Oh, it’s free!” mindset and understand the true nature of these technologies. So, where does the misunderstanding about ‘royalty-free’ begin?

 

๐Ÿค” “A Prefab House with a Free Frame?” The Real Face of Royalty-Free

The belief that ‘free means safe’ is actually the starting point for the biggest misconception. Royalty-free never means ‘zero risk.’ In reality, it’s just ‘a promise of a license with a very limited scope,’ not a complete hall pass from all patent issues.

To put it simply, it’s like a ‘prefab house where only the frame is free.’ The frame might not cost you anything, but you still have to pay for or figure out the crucial parts like walls, the roof, and plumbing on your own.

Bluetooth: ‘Enabling Technologies’ Are Not Covered

This becomes clear if you take a close look at Bluetooth’s Patent/Copyright License Agreement (PCLA). The royalty-free benefit is strictly limited to the ‘Compliant Portion’ of a certified product and only for ‘Necessary Claims’—patents that are technically essential to implement the standard and cannot be avoided.

More importantly, so-called ‘Enabling Technologies’ like semiconductor processes or operating systems are explicitly excluded from the license scope. The Bluetooth communication module itself might be covered, but the peripheral technologies needed to run it, like power management chips and audio codecs, can still be subject to separate patent disputes. In fact, more than 20 lawsuits were recently filed over Bluetooth’s frequency-hopping technology patents.

WebRTC: Google’s Umbrella Only Covers Google’s Code

The situation is similar with Google-led WebRTC. The royalty-free license Google provides generally applies only to ‘patents owned by Google’ and only when using the ‘original source code distributed by Google’ as-is. If a company modifies this code or adds new features to suit its service, the added parts are no longer under Google’s protective umbrella. This means they could be exposed to unexpected patent infringement lawsuits from third parties.

 

๐Ÿ“Š Stories from the Players in the Game

So, what have actual companies experienced in this complex game? Let’s look at a few key examples to see the risks firsthand.

Case 1: The AV1 Codec – “Attacked by Wolves from Outside the Fence”

In response to the expensive royalties of the HEVC codec, tech giants like Google and Netflix formed the Alliance for Open Media (AOMedia) and created a royalty-free codec called ‘AV1.’ They even included a strong defensive clause preventing member companies from suing each other over patents, creating a solid “patent-safe zone.”

However, this fence only protected them from the patents of member companies. A patent pool operator named Sisvel appeared from outside the fence, claiming that AV1 was a “Copycat Codec” that infringed on their patents. They began demanding license fees from users (€0.24 per device). This case showed the limits of a consortium’s “permeable shield”—it couldn’t block attacks from the outside.

Case 2: Tesla’s NACS – “‘Our Friends’ Get In Free”

In 2014, Tesla pledged to let others use its patents, as long as they were “acting in Good Faith.” However, the term ‘Good Faith’ was essentially a promise “not to attack us in any way.” When a capacitor manufacturer sued a company that Tesla had acquired, Tesla countersued, claiming the lawsuit itself was a violation of good faith.

This strategy proved brilliant when the U.S. government’s 2021 Infrastructure Act offered subsidies only for the competing CCS1 standard. Facing a crisis, Tesla declared NACS an open standard, not only qualifying for government subsidies but also pulling competitors into its ecosystem under the condition that they wouldn’t attack Tesla. It was a smart move to solidify market dominance through ‘free and open’ access.

Case 3: Qualcomm – The Two Sides of Geopolitical Risk

Qualcomm’s “No License, No Chips” policy illustrates another dimension of the problem. Qualcomm tied its patent licensing agreements to the total price of a smartphone to maximize profits, a practice that led to a fine of over 1 trillion won from the Korea Fair Trade Commission, a decision upheld by the Supreme Court. Interestingly, however, a U.S. court ruled that the same business model did not violate antitrust laws. This case starkly shows the ‘geopolitical risk’—how the same action can lead to completely different legal outcomes depending on a country’s industrial policy and national interests.

 

๐Ÿ’ก “The Razor and the Blade”: The Real Goal Behind Opening Up Tech

When companies open up their technology for free, there’s almost always a calculated reason behind it. Their goals can be summarized into three main categories.

Strategic Goal Explanation (Analogy) Key Example
Ecosystem Dominance & Customer Lock-in “The razor is free, the blades are not.” Attract users with a free tool to lock them into your platform or service. Microsoft (.NET → Azure)
Cost Avoidance & Reshaping Competition “Group buying to avoid a pricey toll road.” Form a consortium to evade expensive royalties from a competitor’s tech and weaken its influence. AOMedia (AV1 → HEVC)
Profit Maximization & Business Model Design “Charging the buffet based on the customer’s weight, not the food’s.” Designing royalty calculations to maximize revenue. Qualcomm (Chipset → Total Phone Price)

 

๐Ÿ›ก️ Avoiding the “Patent Minefield”: The Importance of FTO Analysis

So, how can companies protect themselves amidst these potential risks? The most fundamental and crucial tool is Freedom to Operate (FTO) analysis.

Many people mistakenly believe, ‘I patented this technology, so I can use it freely.’ But that’s not how it works. For example, let’s say a competitor holds a patent for technology ‘A.’ Even if you patent an improvement, ‘A+B,’ by adding feature ‘B,’ you could still be infringing on their ‘A’ patent the moment you manufacture your product. Your patent gives you rights to ‘B,’ but it doesn’t grant you the right to use ‘A.’

FTO analysis is the process of drawing a map to see if your product might step on someone else’s ‘patent mine.’ It’s an essential step to identify loopholes in royalty-free licenses and uncover unexpected risks in advance. When you consider that a lawsuit can cost millions, the expense of an FTO analysis is a very affordable ‘insurance policy.’

 

๐Ÿ“œ 5 Key Strategic Principles for Your Company

Based on the cases we’ve examined, here are five principles to remember when dealing with royalty-free technology.

  1. Principle 1: Always Get the Legal Basis in Writing. You need a formal agreement that specifies the license’s scope, terms, limitations, and termination clauses, not vague promises like “good faith.” The freer the tech, the more carefully you need to read the contract.
  2. Principle 2: Understand the Provider’s Real Revenue Model. You need to map out how they ultimately monetize their value. Evaluate it from a long-term Total Cost of Ownership (TCO) perspective, considering platform lock-in, data usage, and more.
  3. Principle 3: Analyze Beyond the Consortium’s “Defensive Shield.” It is essential to conduct an FTO analysis for patents held by non-members, especially Non-Practicing Entities (NPEs), and budget for potential royalty payments.
  4. Principle 4: Assess the “Geopolitical Risk” of IP Enforcement. Review IP regulations and legal precedents in key markets and be flexible enough to adapt your strategy to local conditions.
  5. Principle 5: If You Open Your Tech, Define Your Company’s “Azure.” When you open up a technology, you must set a clear ‘backend revenue model’ and Key Performance Indicators (KPIs) for the high-profit business you ultimately want to drive users toward.
๐Ÿ’ก

Must-Read! 5 Strategic Principles for Using “Free” Tech

1. Get It in Writing: Secure a formal contract, not vague promises like ‘good faith.’
2. Find the Real Revenue Model: Analyze the provider’s hidden motives, such as platform lock-in.
3. Look Beyond the Fence:
Always check for patent risks (FTO) from non-consortium members, especially NPEs.
4. Assess Geopolitical Risk: The same business model can face different legal judgments by country.
5. Define Your ‘Azure’: If you open your tech, have a clear backend revenue model to link it to.

Frequently Asked Questions ❓

Q: Are ‘royalty-free’ and ‘open source’ the same thing?
A: They’re different. ‘Open source’ mainly refers to a ‘copyright’ license for using, modifying, and distributing source code. In contrast, ‘royalty-free’ is closer in meaning to being free from ‘patent’ usage fees. Even open-source software can require separate patents to implement its technology, so it isn’t free from the risk of patent infringement.
Q: Isn’t FTO analysis too expensive and difficult?
A: The cost varies depending on the technology’s scope, but compared to patent litigation costs that can run into the millions, an FTO analysis is a very economical ‘insurance policy.’ It’s much smarter to find ‘patent mines’ in advance to alter a design or secure necessary licenses.
Q: What exactly is the FRAND principle?
A: FRAND stands for ‘Fair, Reasonable, and Non-Discriminatory.’ For patents essential to implementing a ‘standard technology’ used by multiple companies (like in telecommunications), the patent holder is obligated to offer licenses to anyone under these FRAND terms. This was a key issue in the Qualcomm case.
Q: We’re a small startup. Where should we start?
A: The very first step is to list which royalty-free or open-source technologies are core to your business. Then, carefully read their license agreements. If anything is unclear, seeking advice from an external IP expert is the best way to protect your company in the long run.

After today’s discussion, I hope you have a better sense of the weight behind the term ‘royalty-free.’ It reminds me of the old saying, “There’s no such thing as a free lunch.” When you encounter a new technology, the right question isn’t, “What can I save?” but rather, “What are the hidden costs? Who is the player gaining the most from this ecosystem?” Now is the time for that kind of wisdom. If you have any more questions, feel free to ask in the comments! ๐Ÿ˜‰

ํ…Œ์Šฌ๋ผ, ํ€„์ปด, ๊ตฌ๊ธ€ ์‚ฌ๋ก€๋กœ ๋ณธ '์‚ฌ์‹ค์ƒ ํ‘œ์ค€' ํŠนํ—ˆ ์ „๋žต๊ณผ ๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ์˜ ํ•จ์ •

 

‘๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ’๋ผ๋Š” ๊ณต์งœ ์„ ๋ฌผ, ๊ณผ์—ฐ ๋ฏฟ์–ด๋„ ๋ ๊นŒ์š”? ๋ธ”๋ฃจํˆฌ์Šค๋ถ€ํ„ฐ ์ „๊ธฐ์ฐจ ์ถฉ์ „ ํ‘œ์ค€๊นŒ์ง€, ‘๋ฌด๋ฃŒ’๋ผ๋Š” ๋‹ฌ์ฝคํ•œ ๊ฐ„ํŒ ๋’ค์— ์ˆจ๊ฒจ์ง„ ๋ณต์žกํ•œ ํŠนํ—ˆ์˜ ์„ธ๊ณ„์™€ ๊ธฐ์—…๋“ค์˜ ์น˜๋ฐ€ํ•œ ์ „๋žต์  ํ•จ์ •์„ ํŒŒํ—ค์ณ ๋ด…๋‹ˆ๋‹ค. ์ด ๊ธ€์€ ์—ฌ๋Ÿฌ๋ถ„์ด ๊ธฐ์ˆ ์˜ ๋ณธ์งˆ์„ ๊ฟฐ๋šซ์–ด ๋ณผ ์ˆ˜ ์žˆ๋Š” ๋‚ ์นด๋กœ์šด ์‹œ๊ฐ์„ ๊ฐ–๊ฒŒ ํ•ด๋“œ๋ฆด ๊ฒƒ์ž…๋‹ˆ๋‹ค.

์•ˆ๋…•ํ•˜์„ธ์š”! ๊ธฐ์ˆ ์˜ ์„ธ๊ณ„์—์„œ ‘๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ(Royalty-Free)’๋ผ๋Š” ๋ง, ์ฐธ ๋งค๋ ฅ์ ์œผ๋กœ ๋“ค๋ฆฌ์ฃ ? ๋ญ”๊ฐ€ ๊ณต์งœ ์„ ๋ฌผ ๊ฐ™๊ธฐ๋„ ํ•˜๊ณ , ๋ธ”๋ฃจํˆฌ์Šค, USB, WebRTC์ฒ˜๋Ÿผ ์šฐ๋ฆฌ ์ฃผ๋ณ€์—์„œ ๋„ˆ๋ฌด๋‚˜ ํ”ํ•˜๊ฒŒ ์“ฐ์ด๋‹ˆ๊นŒ ์™ ์ง€ ์•„๋ฌด ๊ฑฑ์ • ์—†์ด ๋ง‰ ์จ๋„ ๋  ๊ฒƒ ๊ฐ™์€ ๋А๋‚Œ์ด ๋“ญ๋‹ˆ๋‹ค.

ํ•˜์ง€๋งŒ ๊ณผ์—ฐ ๊ทธ๋Ÿด๊นŒ์š”? ์˜ค๋Š˜ ์ €ํฌ๋Š” ๋ฐ”๋กœ ์ด ‘๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ’๋ผ๋Š” ๋งค๋ ฅ์ ์ธ ๊ฐ„ํŒ ๋’ค์— ์ˆจ์–ด ์žˆ๋Š” ๋ณต์žกํ•œ ๋ฌธ์ œ๋“ค, ์ฆ‰ ์ง€์‹์žฌ์‚ฐ๊ถŒ(IP) ๋ฌธ์ œ์™€ ๋•Œ๋กœ๋Š” ์˜๋„๋œ ์ „๋žต์  ํ•จ์ •๊นŒ์ง€ ํ•œ๋ฒˆ ํŒŒํ—ค์ณ ๋ณด๋ ค๊ณ  ํ•ฉ๋‹ˆ๋‹ค. ์ด ๊ธ€์˜ ๋ชฉํ‘œ๋Š” ์—ฌ๋Ÿฌ๋ถ„๊ป˜์„œ ์ด๋Ÿฐ ๊ธฐ์ˆ ์„ ์“ฐ์‹ค ๋•Œ ‘์•„, ๊ณต์งœ๋‹ค!’์—์„œ ๊ทธ์น˜๋Š” ๊ฒŒ ์•„๋‹ˆ๋ผ, ๊ทธ ๋„ˆ๋จธ์˜ ์ง„์งœ ๋ณธ์งˆ์„ ๋ณด์‹ค ์ˆ˜ ์žˆ๊ฒŒ ๋˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. ์ž, ๊ทธ๋Ÿผ ์ด ‘๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ’์— ๋Œ€ํ•œ ์˜คํ•ด๋Š” ์–ด๋””์„œ๋ถ€ํ„ฐ ์‹œ์ž‘๋˜๋Š” ๊ฑธ๊นŒ์š”?

 

๐Ÿค” “๋ผˆ๋Œ€๋งŒ ๋ฌด๋ฃŒ์ธ ์กฐ๋ฆฝ์‹ ์ฃผํƒ?” ๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ์˜ ์ง„์งœ ์–ผ๊ตด

‘๋ฌด๋ฃŒ๋‹ˆ๊นŒ ์•ˆ์ „ํ•˜๋‹ค’๋Š” ์ธ์‹์ด ์‚ฌ์‹ค ๊ฐ€์žฅ ํฐ ์˜คํ•ด์˜ ์‹œ์ž‘์ ์ž…๋‹ˆ๋‹ค. ๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ๋Š” ๊ฒฐ์ฝ” ‘๋ฆฌ์Šคํฌ ์ œ๋กœ’๋ฅผ ์˜๋ฏธํ•˜๋Š” ๊ฒŒ ์•„๋‹ˆ๊ฑฐ๋“ ์š”. ์‹ค์ œ๋กœ๋Š” ‘์•„์ฃผ ์ œํ•œ๋œ ๋ฒ”์œ„์˜ ๋ผ์ด์„ ์Šค ์•ฝ์†’์ผ ๋ฟ, ๋ชจ๋“  ํŠนํ—ˆ ๋ฌธ์ œ๋กœ๋ถ€ํ„ฐ ์™„์ „ํžˆ ์ž์œ ๋กญ๋‹ค๋Š” ๋œป์€ ์ „ํ˜€ ์•„๋‹™๋‹ˆ๋‹ค.

์ด ๋ง์„ ์‰ฝ๊ฒŒ ๋น„์œ ํ•˜์ž๋ฉด, ๋งˆ์น˜ ‘๋ผˆ๋Œ€๋งŒ ๋ฌด๋ฃŒ๋กœ ์ฃผ๋Š” ์กฐ๋ฆฝ์‹ ์ฃผํƒ’๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค. ๋ผˆ๋Œ€๋Š” ๊ณต์งœ์ง€๋งŒ, ๋ฒฝ์ฒด, ์ง€๋ถ•, ๋ฐฐ๊ด€ ๊ฐ™์€ ์ง„์งœ ์ค‘์š”ํ•œ ๋ถ€๋ถ„์€ ๋”ฐ๋กœ ๋ˆ์„ ๋‚ด๊ฑฐ๋‚˜ ์ง์ ‘ ํ•ด๊ฒฐํ•ด์•ผ ํ•˜๋Š” ์ƒํ™ฉ์ด์ฃ .

๋ธ”๋ฃจํˆฌ์Šค: ‘์ง€์› ๊ธฐ์ˆ ’์€ ๋ณดํ˜ธ ๋Œ€์ƒ์ด ์•„๋‹™๋‹ˆ๋‹ค

๋ธ”๋ฃจํˆฌ์Šค์˜ ํŠนํ—ˆ ๋ผ์ด์„ ์Šค ๊ณ„์•ฝ(PCLA)์„ ์ž์„ธํžˆ ๋“ค์—ฌ๋‹ค๋ณด๋ฉด ์ด ์ ์ด ๋ช…ํ™•ํ•ด์ง‘๋‹ˆ๋‹ค. ๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ ํ˜œํƒ์€ ์˜ค์ง ํ‘œ์ค€ ๊ทœ๊ฒฉ์„ ๊ตฌํ˜„ํ•˜๋Š” ๋ฐ ๊ธฐ์ˆ ์ ์œผ๋กœ ๊ผญ ํ•„์š”ํ•œ, ์ฆ‰ ์นจํ•ด๋ฅผ ํ”ผํ•  ์ˆ˜ ์—†๋Š” ‘ํ•„์ˆ˜ ์ฒญ๊ตฌํ•ญ(Necessary Claims)’์—๋งŒ, ๊ทธ๊ฒƒ๋„ ๊ณต์‹ ์ธ์ฆ์„ ํ†ต๊ณผํ•œ ์ œํ’ˆ์˜ ‘ํ‘œ์ค€ ์ค€์ˆ˜ ๋ถ€๋ถ„(Compliant Portion)’์—๋งŒ ํ•œ์ •๋ฉ๋‹ˆ๋‹ค.

๋” ์ค‘์š”ํ•œ ๊ฒƒ์€, ๋ฐ˜๋„์ฒด ๊ณต์ • ๊ธฐ์ˆ ์ด๋‚˜ ์šด์˜์ฒด์ œ(OS) ๊ฐ™์€ ์†Œ์œ„ ‘์ง€์› ๊ธฐ์ˆ (Enabling Technologies)’์€ ๋ผ์ด์„ ์Šค ๋ฒ”์œ„์—์„œ ๋ช…์‹œ์ ์œผ๋กœ ์ œ์™ธ๋œ๋‹ค๋Š” ์ ์ž…๋‹ˆ๋‹ค. ๋ธ”๋ฃจํˆฌ์Šค ํ†ต์‹  ๋ชจ๋“ˆ ์ž์ฒด๋Š” ๋ฌด๋ฃŒ ํ˜œํƒ์„ ๋ฐ›์ง€๋งŒ, ๊ทธ ๋ชจ๋“ˆ์„ ๋Œ๋ฆฌ๊ธฐ ์œ„ํ•œ ์ „๋ ฅ ๊ด€๋ฆฌ ์นฉ, ์˜ค๋””์˜ค ์ฝ”๋ฑ ๊ฐ™์€ ์ฃผ๋ณ€ ๊ธฐ์ˆ ๋“ค์€ ๋ณ„๋„์˜ ํŠนํ—ˆ ๋ถ„์Ÿ ์†Œ์ง€๊ฐ€ ์—ฌ์ „ํžˆ ๋‚จ์•„์žˆ๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. ์‹ค์ œ๋กœ ์ตœ๊ทผ์—๋„ ๋ธ”๋ฃจํˆฌ์Šค์˜ ์ฃผํŒŒ์ˆ˜ ๋„์•ฝ(Frequency Hopping) ๊ธฐ์ˆ  ํŠนํ—ˆ๋กœ 20๊ฑด ์ด์ƒ์˜ ์†Œ์†ก์ด ์ œ๊ธฐ๋˜๊ธฐ๋„ ํ–ˆ์Šต๋‹ˆ๋‹ค.

WebRTC: ๊ตฌ๊ธ€์˜ ์šฐ์‚ฐ์€ ๊ตฌ๊ธ€ ์ฝ”๋“œ์—๋งŒ

๊ตฌ๊ธ€์ด ์ฃผ๋„ํ•˜๋Š” WebRTC์˜ ๊ฒฝ์šฐ๋„ ๋น„์Šทํ•ฉ๋‹ˆ๋‹ค. ๊ตฌ๊ธ€์ด ์ œ๊ณตํ•˜๋Š” ๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ ๋ผ์ด์„ ์Šค๋Š” ๊ธฐ๋ณธ์ ์œผ๋กœ ‘๊ตฌ๊ธ€์ด ์†Œ์œ ํ•œ ํŠนํ—ˆ’์— ๋Œ€ํ•ด์„œ๋งŒ, ๊ทธ๋ฆฌ๊ณ  ‘๊ตฌ๊ธ€์ด ๋ฐฐํฌํ•œ ์›๋ณธ ์†Œ์Šค ์ฝ”๋“œ’๋ฅผ ๊ทธ๋Œ€๋กœ ์“ธ ๋•Œ๋งŒ ์ ์šฉ๋ฉ๋‹ˆ๋‹ค. ๋งŒ์•ฝ ์–ด๋–ค ๊ธฐ์—…์ด ์ž๊ธฐ ์„œ๋น„์Šค์— ๋งž๊ฒŒ ์ด ์ฝ”๋“œ๋ฅผ ์ˆ˜์ •ํ•˜๊ฑฐ๋‚˜ ์ƒˆ๋กœ์šด ๊ธฐ๋Šฅ์„ ๋ง๋ถ™์ธ๋‹ค๋ฉด, ๊ทธ ์ถ”๊ฐ€๋œ ๋ถ€๋ถ„์€ ๋” ์ด์ƒ ๊ตฌ๊ธ€์˜ ๋ณดํ˜ธ ์šฐ์‚ฐ ์•„๋ž˜์— ์žˆ์ง€ ์•Š๊ฒŒ ๋ฉ๋‹ˆ๋‹ค. ์ด๋Š” ๊ณง ์˜ˆ์ƒ์น˜ ๋ชปํ•œ ์ œ3์ž์˜ ํŠนํ—ˆ ์นจํ•ด ์†Œ์†ก ์œ„ํ—˜์— ๋…ธ์ถœ๋  ์ˆ˜ ์žˆ์Œ์„ ์˜๋ฏธํ•ฉ๋‹ˆ๋‹ค.

 

๐Ÿ“Š ์‹ค์ œ ๊ฒŒ์ž„์— ๋›ฐ์–ด๋“  ํ”Œ๋ ˆ์ด์–ด๋“ค์˜ ์ด์•ผ๊ธฐ

๊ทธ๋Ÿผ ์‹ค์ œ ๊ธฐ์—…๋“ค์€ ์ด ๋ณต์žกํ•œ ๊ฒŒ์ž„์—์„œ ์–ด๋–ค ์ผ๋“ค์„ ๊ฒช์—ˆ์„๊นŒ์š”? ๋ช‡ ๊ฐ€์ง€ ๋Œ€ํ‘œ์ ์ธ ์‚ฌ๋ก€๋ฅผ ํ†ตํ•ด ๊ทธ ์œ„ํ—˜์„ฑ์„ ์ฒด๊ฐํ•ด ๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.

์‚ฌ๋ก€ 1: AV1 ์ฝ”๋ฑ - “์šธํƒ€๋ฆฌ ๋ฐ– ๋Š‘๋Œ€์˜ ์Šต๊ฒฉ”

๊ตฌ๊ธ€, ๋„ทํ”Œ๋ฆญ์Šค ๋“ฑ ๊ฑฐ๋Œ€ ๊ธฐ์—…๋“ค์ด ๋ชจ์ธ AOMedia๋Š” ๋น„์‹ผ ๋กœ์—ดํ‹ฐ๋ฅผ ์š”๊ตฌํ•˜๋˜ HEVC ์ฝ”๋ฑ์— ๋Œ€ํ•œ ๋ฐ˜๋ฐœ๋กœ ‘AV1’์ด๋ผ๋Š” ๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ ์ฝ”๋ฑ์„ ๋งŒ๋“ค์—ˆ์Šต๋‹ˆ๋‹ค. ํšŒ์›์‚ฌ๋ผ๋ฆฌ๋Š” ์„œ๋กœ ํŠนํ—ˆ ์†Œ์†ก์„ ๊ฑธ์ง€ ์•Š๋Š” ๊ฐ•๋ ฅํ•œ ๋ฐฉ์–ด ์กฐํ•ญ๊นŒ์ง€ ๋งŒ๋“ค๋ฉฐ ‘ํŠนํ—ˆ ์ฒญ์ • ์ง€๋Œ€’๋ผ๋Š” ํŠผํŠผํ•œ ์šธํƒ€๋ฆฌ๋ฅผ ์ณค์ฃ .

ํ•˜์ง€๋งŒ ์ด ์šธํƒ€๋ฆฌ๋Š” ํšŒ์›์‚ฌ๋“ค์˜ ํŠนํ—ˆ๋กœ๋ถ€ํ„ฐ๋งŒ ๋ณดํ˜ธํ•ด ์ค„ ๋ฟ์ด์—ˆ์Šต๋‹ˆ๋‹ค. ํŠนํ—ˆํ’€ ์šด์˜์‚ฌ Sisvel์ด ์šธํƒ€๋ฆฌ ๋ฐ–์—์„œ ๋‚˜ํƒ€๋‚˜ “AV1์€ ๊ธฐ์กด ๊ธฐ์ˆ ๋“ค์„ ๋ฒ ๋‚€ ‘๋ชจ๋ฐฉ ์ฝ”๋ฑ(Copy Cat Codec)’์ด๋ฉฐ, ์šฐ๋ฆฌ ํŠนํ—ˆ๋ฅผ ์นจํ•ดํ–ˆ๋‹ค”๊ณ  ์ฃผ์žฅํ•˜๋ฉฐ ์‚ฌ์šฉ์ž๋“ค์—๊ฒŒ ๋ผ์ด์„ ์Šค ๋น„์šฉ(๊ธฐ๊ธฐ๋‹น 0.24์œ ๋กœ)์„ ์š”๊ตฌํ•˜๊ธฐ ์‹œ์ž‘ํ–ˆ์Šต๋‹ˆ๋‹ค. ์ปจ์†Œ์‹œ์—„์ด๋ผ๋Š” ์šธํƒ€๋ฆฌ๊ฐ€ ์™ธ๋ถ€์˜ ๊ณต๊ฒฉ๊นŒ์ง€ ๋ง‰์•„์ฃผ์ง€๋Š” ๋ชปํ•œ๋‹ค๋Š” ‘ํˆฌ๊ณผ์„ฑ ๋ฐฉ์–ด๋ง‰’์˜ ํ•œ๊ณ„๋ฅผ ๋ณด์—ฌ์ค€ ์‚ฌ๋ก€์ž…๋‹ˆ๋‹ค.

์‚ฌ๋ก€ 2: ํ…Œ์Šฌ๋ผ NACS - “‘์šฐ๋ฆฌ ํŽธ’์—๊ฒŒ๋งŒ ์—ด๋ฆฌ๋Š” ๋ฌธ”

2014๋…„, ํ…Œ์Šฌ๋ผ๋Š” “์„ ์˜(Good Faith)๋กœ ํ–‰๋™ํ•˜๋Š” ํ•œ” ์ž์‚ฌ ํŠนํ—ˆ๋ฅผ ์“ฐ๊ฒŒ ํ•ด์ฃผ๊ฒ ๋‹ค๋Š” ์„ ์–ธ์„ ํ•ฉ๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ด ‘์„ ์˜’๋ผ๋Š” ๋ง์€ “์–ด๋–ค ํ˜•ํƒœ๋กœ๋“  ์šฐ๋ฆฌ๋ฅผ ๊ณต๊ฒฉํ•˜์ง€ ์•Š๊ฒ ๋‹ค”๋Š” ์•ฝ์†๊ณผ๋„ ๊ฐ™์•˜์Šต๋‹ˆ๋‹ค. ์‹ค์ œ๋กœ ํ•œ ์ถ•์ „๊ธฐ ์ œ์กฐ์‚ฌ๊ฐ€ ํ…Œ์Šฌ๋ผ๊ฐ€ ์ธ์ˆ˜ํ•œ ํšŒ์‚ฌ์— ํŠนํ—ˆ ์†Œ์†ก์„ ๊ฑธ์ž, ํ…Œ์Šฌ๋ผ๋Š” “๊ทธ ์†Œ์†ก ์ž์ฒด๊ฐ€ ์„ ์˜ ์œ„๋ฐ˜”์ด๋ผ๋ฉฐ ๋งž์†Œ์†ก ์นด๋“œ๋ฅผ ๊บผ๋‚ด ๋“ค์—ˆ์ฃ .

์ด ์ „๋žต์€ ๋ฏธ๊ตญ ์ •๋ถ€๊ฐ€ 2021๋…„ ์ธํ”„๋ผ๋ฒ•์„ ํ†ตํ•ด ๊ฒฝ์Ÿ ๊ทœ๊ฒฉ์ธ CCS1์—๋งŒ ๋ณด์กฐ๊ธˆ์„ ์ฃผ๋ ค ํ•˜์ž ๋”์šฑ ๋น›์„ ๋ฐœํ–ˆ์Šต๋‹ˆ๋‹ค. ์œ„๊ธฐ์— ์ฒ˜ํ•œ ํ…Œ์Šฌ๋ผ๋Š” NACS๋ฅผ ๊ฐœ๋ฐฉํ˜• ํ‘œ์ค€์œผ๋กœ ์„ ์–ธํ•˜๋ฉฐ ์ •๋ถ€์˜ ๋ณด์กฐ๊ธˆ ์ง€์› ์ž๊ฒฉ์„ ์–ป์–ด๋‚ด๋Š” ๋™์‹œ์—, ๊ฒฝ์Ÿ์‚ฌ๋“ค์„ ‘์šฐ๋ฆฌ๋ฅผ ๊ณต๊ฒฉํ•˜์ง€ ์•Š๋Š”๋‹ค’๋Š” ์กฐ๊ฑด์˜ ํ…Œ์Šฌ๋ผ ์ƒํƒœ๊ณ„ ์•ˆ์œผ๋กœ ๋Œ์–ด๋“ค์˜€์Šต๋‹ˆ๋‹ค. ‘๋ฌด๋ฃŒ ๊ฐœ๋ฐฉ’์„ ํ†ตํ•ด ์‹œ์žฅ ์ง€๋ฐฐ๋ ฅ์„ ๊ณต๊ณ ํžˆ ํ•œ ์˜๋ฆฌํ•œ ์ „๋žต์ด์—ˆ์Šต๋‹ˆ๋‹ค.

์‚ฌ๋ก€ 3: ํ€„์ปด - ์ง€์ •ํ•™์  ๋ฆฌ์Šคํฌ์˜ ๋ช…๊ณผ ์•”

ํ€„์ปด์˜ “๋ผ์ด์„ ์Šค ์—†์ด๋Š” ์นฉ๋„ ์—†๋‹ค(No License, No Chips)” ์ •์ฑ…์€ ๋˜ ๋‹ค๋ฅธ ์ฐจ์›์˜ ๋ฌธ์ œ๋ฅผ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค. ํ€„์ปด์€ ํŠนํ—ˆ ๋ผ์ด์„ ์Šค ๊ณ„์•ฝ์„ ์Šค๋งˆํŠธํฐ ์ „์ฒด ๊ฐ€๊ฒฉ์— ์—ฐ๋™์‹œ์ผœ ์ˆ˜์ต์„ ๊ทน๋Œ€ํ™”ํ•˜๋ ค ํ–ˆ๊ณ , ์ด๋Š” ๊ฒฐ๊ตญ ํ•œ๊ตญ ๊ณต์ •์œ„๋กœ๋ถ€ํ„ฐ 1์กฐ ์›์ด ๋„˜๋Š” ๊ณผ์ง•๊ธˆ์„ ๋ถ€๊ณผ๋ฐ›๊ณ  ๋Œ€๋ฒ•์›์—์„œ ํ™•์ •๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ํฅ๋ฏธ๋กญ๊ฒŒ๋„ ๋ฏธ๊ตญ ๋ฒ•์›์€ ๋™์ผํ•œ ์‚ฌ์—… ๋ชจ๋ธ์— ๋Œ€ํ•ด ๋ฐ˜๋…์ ๋ฒ• ์œ„๋ฐ˜์ด ์•„๋‹ˆ๋ผ๊ณ  ํŒ๊ฒฐํ–ˆ์Šต๋‹ˆ๋‹ค. ๋™์ผํ•œ ํ–‰์œ„๋ผ๋„ ๊ตญ๊ฐ€์˜ ์‚ฐ์—… ์ •์ฑ…๊ณผ ์ดํ•ด๊ด€๊ณ„์— ๋”ฐ๋ผ ๋ฒ•์  ํŒ๋‹จ์ด 180๋„ ๋‹ฌ๋ผ์งˆ ์ˆ˜ ์žˆ๋‹ค๋Š” ‘์ง€์ •ํ•™์  ๋ฆฌ์Šคํฌ’๋ฅผ ๊ทน๋ช…ํ•˜๊ฒŒ ๋ณด์—ฌ์ฃผ๋Š” ์‚ฌ๋ก€์ž…๋‹ˆ๋‹ค.

 

๐Ÿ’ก “๋ฉด๋„๊ธฐ์™€ ๋ฉด๋„๋‚ ”: ๊ธฐ์ˆ  ๊ฐœ๋ฐฉ ๋’ค์˜ ์ง„์งœ ๋ชฉํ‘œ

๊ธฐ์—…๋“ค์ด ๊ธฐ์ˆ ์„ ๋ฌด๋ฃŒ๋กœ ๊ฐœ๋ฐฉํ•˜๋Š” ๋ฐ๋Š” ๋Œ€๋ถ€๋ถ„ ์น˜๋ฐ€ํ•œ ๊ณ„์‚ฐ์ด ๊น”๋ ค์žˆ์Šต๋‹ˆ๋‹ค. ๊ทธ ๋ชฉํ‘œ๋Š” ํฌ๊ฒŒ ์„ธ ๊ฐ€์ง€๋กœ ์š”์•ฝํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ „๋žต์  ๋ชฉํ‘œ ์„ค๋ช… (๋น„์œ ) ๋Œ€ํ‘œ ์‚ฌ๋ก€
์ƒํƒœ๊ณ„ ์žฅ์•… ๋ฐ ๊ณ ๊ฐ ์ข…์†(Lock-in) “๋ฉด๋„๊ธฐ๋Š” ๊ณต์งœ, ๋ฉด๋„๋‚ ์€ ์œ ๋ฃŒ” ๋ชจ๋ธ. ๋ฌด๋ฃŒ ๋„๊ตฌ๋กœ ์‚ฌ์šฉ์ž๋ฅผ ์œ ์ธํ•ด ์ž์‚ฌ ํ”Œ๋žซํผ์ด๋‚˜ ์„œ๋น„์Šค์— ๋ฌถ์–ด๋‘๋Š” ์ „๋žต. ๋งˆ์ดํฌ๋กœ์†Œํ”„ํŠธ (.NET → Azure)
๋น„์šฉ ํšŒํ”ผ ๋ฐ ๊ฒฝ์Ÿ ํ™˜๊ฒฝ ์žฌํŽธ “๊ณต๋™ ๊ตฌ๋งค๋กœ ๋น„์‹ผ ํ†ตํ–‰๋ฃŒ ํ”ผํ•˜๊ธฐ”. ์ปจ์†Œ์‹œ์—„์„ ๊ตฌ์„ฑํ•ด ๋น„์‹ผ ๊ฒฝ์Ÿ ๊ธฐ์ˆ ์˜ ๋กœ์—ดํ‹ฐ๋ฅผ ํšŒํ”ผํ•˜๊ณ  ์˜ํ–ฅ๋ ฅ์„ ์•ฝํ™”. AOMedia (AV1 → HEVC)
์ˆ˜์ต ๊ทน๋Œ€ํ™” ๋ฐ ์‚ฌ์—… ๊ตฌ์กฐ ์„ค๊ณ„ “๋ท”ํŽ˜ ์ž…์žฅ๋ฃŒ๋ฅผ ์Œ์‹ ๋ฌด๊ฒŒ๊ฐ€ ์•„๋‹Œ ์†๋‹˜ ๋ชธ๋ฌด๊ฒŒ๋กœ ๊ณ„์‚ฐ”. ๋กœ์—ดํ‹ฐ ์‚ฐ์ • ๊ธฐ์ค€์„ ์œ ๋ฆฌํ•˜๊ฒŒ ์„ค๊ณ„ํ•ด ์ˆ˜์ต์„ ๊ทน๋Œ€ํ™”. ํ€„์ปด (์นฉ์…‹ → ์Šค๋งˆํŠธํฐ ์ „์ฒด ๊ฐ€๊ฒฉ)

 

๐Ÿ›ก️ “ํŠนํ—ˆ ์ง€๋ขฐ๋ฐญ” ํ”ผํ•˜๊ธฐ: FTO ๋ถ„์„์˜ ์ค‘์š”์„ฑ

๊ทธ๋ ‡๋‹ค๋ฉด ์ด๋Ÿฐ ์ž ์žฌ์  ์œ„ํ—˜ ์†์—์„œ ๊ธฐ์—…๋“ค์€ ์–ด๋–ป๊ฒŒ ์Šค์Šค๋กœ๋ฅผ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ์„๊นŒ์š”? ๊ฐ€์žฅ ๊ธฐ๋ณธ์ ์ด๋ฉด์„œ๋„ ์ค‘์š”ํ•œ ๋„๊ตฌ๊ฐ€ ๋ฐ”๋กœ FTO(Freedom to Operate) ๋ถ„์„์ž…๋‹ˆ๋‹ค.

๋งŽ์€ ๋ถ„๋“ค์ด ‘๋‚ด๊ฐ€ ํŠนํ—ˆ๋ฅผ ๋ฐ›์€ ๊ธฐ์ˆ ์ด๋‹ˆ ๋งˆ์Œ๋Œ€๋กœ ์จ๋„ ๋˜๊ฒ ์ง€’๋ผ๊ณ  ์˜คํ•ดํ•ฉ๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ด๋Š” ๋‹ค๋ฆ…๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด ๋ณด์ฃ . ๊ฒฝ์Ÿ์‚ฌ๊ฐ€ ‘A’๋ผ๋Š” ๊ธฐ์ˆ  ํŠนํ—ˆ๋ฅผ ๊ฐ–๊ณ  ์žˆ๋Š”๋ฐ, ์šฐ๋ฆฌ๊ฐ€ ์—ฌ๊ธฐ์— ‘B’๋ผ๋Š” ๊ธฐ๋Šฅ์„ ๋”ํ•œ ‘A+B’ ๊ธฐ์ˆ ๋กœ ํŠนํ—ˆ๋ฅผ ๋ฐ›์•˜๋‹ค๊ณ  ํ•ด๋„, ์šฐ๋ฆฌ ์ œํ’ˆ์„ ๋งŒ๋“œ๋Š” ์ˆœ๊ฐ„ ๊ฒฝ์Ÿ์‚ฌ์˜ ‘A’ ํŠนํ—ˆ๋ฅผ ์นจํ•ดํ•˜๊ฒŒ ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์šฐ๋ฆฌ ํŠนํ—ˆ๋Š” ‘B’์— ๋Œ€ํ•œ ๊ถŒ๋ฆฌ์ด์ง€, ‘A’๋ฅผ ์‚ฌ์šฉํ•  ๊ถŒ๋ฆฌ๊นŒ์ง€ ๋ณด์žฅํ•ด์ฃผ์ง€๋Š” ์•Š๊ธฐ ๋•Œ๋ฌธ์ž…๋‹ˆ๋‹ค.

FTO ๋ถ„์„์€ ๋ฐ”๋กœ ์šฐ๋ฆฌ๊ฐ€ ๋งŒ๋“ค ์ œํ’ˆ์ด ๋‹ค๋ฅธ ์‚ฌ๋žŒ์˜ ‘ํŠนํ—ˆ ์ง€๋ขฐ’๋ฅผ ๋ฐŸ์ง€๋Š” ์•Š๋Š”์ง€ ๋ฏธ๋ฆฌ ์ง€๋„๋ฅผ ๊ทธ๋ ค๋ณด๋Š” ๊ณผ์ •์ž…๋‹ˆ๋‹ค. ๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ ๋ผ์ด์„ ์Šค์˜ ๋นˆํ‹ˆ์ด๋‚˜ ์˜ˆ์ƒ์น˜ ๋ชปํ•œ ๋ฆฌ์Šคํฌ๋ฅผ ์‚ฌ์ „์— ํŒŒ์•…ํ•˜๊ธฐ ์œ„ํ•ด ๋ฐ˜๋“œ์‹œ ํ•„์š”ํ•œ ๊ณผ์ •์ด์ฃ . ์ˆ˜์‹ญ์–ต ์›์˜ ์†Œ์†ก ๋น„์šฉ์„ ์ƒ๊ฐํ•˜๋ฉด, FTO ๋ถ„์„์— ๋“œ๋Š” ๋น„์šฉ์€ ๋งค์šฐ ๊ฒฝ์ œ์ ์ธ ‘๋ณดํ—˜’์ž…๋‹ˆ๋‹ค.

 

๐Ÿ“œ ์šฐ๋ฆฌ ํšŒ์‚ฌ๋ฅผ ์œ„ํ•œ 5๊ฐ€์ง€ ํ•ต์‹ฌ ์ „๋žต ์›์น™

์˜ค๋Š˜ ์‚ดํŽด๋ณธ ์‚ฌ๋ก€๋“ค์„ ๋ฐ”ํƒ•์œผ๋กœ, ๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ ๊ธฐ์ˆ ์„ ๋‹ค๋ฃฐ ๋•Œ ๋ฐ˜๋“œ์‹œ ๊ธฐ์–ตํ•ด์•ผ ํ•  5๊ฐ€์ง€ ์›์น™์„ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค.

  1. ์›์น™ 1: ๋ฒ•์  ๊ทผ๊ฑฐ๋Š” ๋ฐ˜๋“œ์‹œ ์„œ๋ฉด์œผ๋กœ ๋ช…ํ™•ํžˆ ํ•˜๋ผ. “์„ ์˜” ๊ฐ™์€ ๋ชจํ˜ธํ•œ ์•ฝ์†์ด ์•„๋‹Œ, ๋ผ์ด์„ ์Šค์˜ ๋ฒ”์œ„, ์กฐ๊ฑด, ์ œ์•ฝ, ์ข…๋ฃŒ ์‚ฌ์œ ๊ฐ€ ๋ช…์‹œ๋œ ๊ณต์‹ ๊ณ„์•ฝ์„œ๋ฅผ ํ™•๋ณดํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ๊ณต์งœ์ผ์ˆ˜๋ก ๊ณ„์•ฝ์„œ๋Š” ๋” ๊ผผ๊ผผํžˆ ๋ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.
  2. ์›์น™ 2: ๊ธฐ์ˆ  ์ œ๊ณต์ž์˜ ‘์ง„์งœ ์ˆ˜์ต ๋ชจ๋ธ’์„ ํŒŒ์•…ํ•˜๋ผ. ๊ทธ๋“ค์ด ๊ถ๊ทน์ ์œผ๋กœ ์–ด๋–ค ๋ฐฉ์‹์œผ๋กœ ๊ฐ€์น˜๋ฅผ ํšŒ์ˆ˜ํ•˜๋Š”์ง€ ‘์ˆ˜์ตํ™” ์ง€๋„’๋ฅผ ๊ทธ๋ ค๋ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ํ”Œ๋žซํผ ์ข…์†์„ฑ, ๋ฐ์ดํ„ฐ ํ™œ์šฉ ๋“ฑ ์žฅ๊ธฐ์ ์ธ ์ด์†Œ์œ ๋น„์šฉ(TCO) ๊ด€์ ์—์„œ ํ‰๊ฐ€ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.
  3. ์›์น™ 3: ์ปจ์†Œ์‹œ์—„์˜ ‘๋ฐฉ์–ด๋ง‰ ๋„ˆ๋จธ’๋ฅผ ๋ฐ˜๋“œ์‹œ ๋ถ„์„ํ•˜๋ผ. ํšŒ์›์‚ฌ ํŠนํ—ˆ ์™ธ์— ๋น„ํšŒ์›์‚ฌ, ํŠนํžˆ ํŠนํ—ˆ๊ด€๋ฆฌ์ „๋ฌธํšŒ์‚ฌ(NPE)๊ฐ€ ๋ณด์œ ํ•œ ํŠนํ—ˆ์— ๋Œ€ํ•œ FTO ๋ถ„์„์„ ํ•„์ˆ˜๋กœ ์ˆ˜ํ–‰ํ•˜๊ณ , ์ž ์žฌ์  ๋กœ์—ดํ‹ฐ ์ง€๊ธ‰ ๊ฐ€๋Šฅ์„ฑ๊นŒ์ง€ ์˜ˆ์‚ฐ์— ๋ฐ˜์˜ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.
  4. ์›์น™ 4: IP ์ง‘ํ–‰์˜ ‘์ง€์ •ํ•™์  ๋ฆฌ์Šคํฌ’๋ฅผ ํ‰๊ฐ€ํ•˜๋ผ. ํ•ต์‹ฌ ์‹œ์žฅ๋ณ„๋กœ IP ๊ด€๋ จ ๊ทœ์ œ ๋™ํ–ฅ๊ณผ ํŒ๋ก€๋ฅผ ๊ฒ€ํ† ํ•˜๊ณ , ํ˜„์ง€ ์ƒํ™ฉ์— ๋งž๊ฒŒ ์ „๋žต์„ ์ˆ˜์ •ํ•˜๋Š” ์œ ์—ฐ์„ฑ์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.
  5. ์›์น™ 5: ๊ธฐ์ˆ ์„ ๊ฐœ๋ฐฉํ•œ๋‹ค๋ฉด, ์šฐ๋ฆฌ ํšŒ์‚ฌ์˜ ‘Azure’๊ฐ€ ๋ฌด์—‡์ธ์ง€ ์ •์˜ํ•˜๋ผ. ๊ธฐ์ˆ  ๊ฐœ๋ฐฉ์„ ํ†ตํ•ด ๊ถ๊ทน์ ์œผ๋กœ ์–ด๋–ค ๊ณ ์ˆ˜์ต ์‚ฌ์—…์œผ๋กœ ์—ฐ๊ฒฐํ•  ๊ฒƒ์ธ์ง€ ๋ช…ํ™•ํ•œ ‘ํ›„๋ฐฉ ์ˆ˜์ต ๋ชจ๋ธ’๊ณผ ํ•ต์‹ฌ ์„ฑ๊ณผ ์ง€ํ‘œ(KPI)๋ฅผ ์„ค์ •ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.
๐Ÿ’ก

‘๊ณต์งœ ๊ธฐ์ˆ ’ ์‚ฌ์šฉ ์ „ ํ•„๋…! 5๋Œ€ ์ „๋žต ์›์น™

1. ์„œ๋ฉด์œผ๋กœ ๋ช…ํ™•ํžˆ ํ•˜๋ผ: ‘์„ ์˜’ ๊ฐ™์€ ๋ชจํ˜ธํ•œ ์•ฝ์†์ด ์•„๋‹Œ ๊ณต์‹ ๊ณ„์•ฝ์„œ๋ฅผ ํ™•๋ณดํ•˜์„ธ์š”.
2. ์ง„์งœ ์ˆ˜์ต ๋ชจ๋ธ์„ ํŒŒ์•…ํ•˜๋ผ: ํ”Œ๋žซํผ ์ข…์† ๋“ฑ ๊ธฐ์ˆ  ์ œ๊ณต์ž์˜ ์ˆจ์€ ์˜๋„๋ฅผ ๋ถ„์„ํ•˜์„ธ์š”.
3. ์šธํƒ€๋ฆฌ ๋„ˆ๋จธ๋ฅผ ๋ถ„์„ํ•˜๋ผ:
์ปจ์†Œ์‹œ์—„ ์™ธ๋ถ€, ํŠนํžˆ NPE์˜ ํŠนํ—ˆ ๋ฆฌ์Šคํฌ(FTO)๋ฅผ ๋ฐ˜๋“œ์‹œ ์ ๊ฒ€ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.
4. ์ง€์ •ํ•™์  ๋ฆฌ์Šคํฌ๋ฅผ ํ‰๊ฐ€ํ•˜๋ผ: ๋™์ผํ•œ ์‚ฌ์—… ๋ชจ๋ธ๋„ ๊ตญ๊ฐ€๋ณ„ ๋ฒ•์  ํŒ๋‹จ์ด ๋‹ค๋ฅผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
5. ์šฐ๋ฆฌ ํšŒ์‚ฌ์˜ ‘Azure’๋ฅผ ์ •์˜ํ•˜๋ผ: ๊ธฐ์ˆ  ๊ฐœ๋ฐฉ ์‹œ, ์—ฐ๊ฒฐ๋  ๋ช…ํ™•ํ•œ ํ›„๋ฐฉ ์ˆ˜์ต ๋ชจ๋ธ์„ ์„ค์ •ํ•˜์„ธ์š”.

์ž์ฃผ ๋ฌป๋Š” ์งˆ๋ฌธ ❓

Q: ‘๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ’์™€ ‘์˜คํ”ˆ์†Œ์Šค’๋Š” ๊ฐ™์€ ๋ง์ธ๊ฐ€์š”?
A: ๋‹ค๋ฆ…๋‹ˆ๋‹ค. ‘์˜คํ”ˆ์†Œ์Šค’๋Š” ์ฃผ๋กœ ์†Œ์Šค ์ฝ”๋“œ์˜ ์‚ฌ์šฉ, ์ˆ˜์ •, ๋ฐฐํฌ์— ๋Œ€ํ•œ ‘์ €์ž‘๊ถŒ’ ๋ผ์ด์„ ์Šค๋ฅผ ์˜๋ฏธํ•ฉ๋‹ˆ๋‹ค. ๋ฐ˜๋ฉด ‘๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ’๋Š” ‘ํŠนํ—ˆ๊ถŒ’ ์‚ฌ์šฉ๋ฃŒ๊ฐ€ ์—†๋‹ค๋Š” ์˜๋ฏธ์— ๊ฐ€๊น์Šต๋‹ˆ๋‹ค. ์˜คํ”ˆ์†Œ์Šค ์†Œํ”„ํŠธ์›จ์–ด๋ผ๋„ ๊ทธ ๊ธฐ์ˆ ์„ ๊ตฌํ˜„ํ•˜๋Š” ๋ฐ ํ•„์š”ํ•œ ํŠนํ—ˆ๊ฐ€ ๋ณ„๋„๋กœ ์กด์žฌํ•  ์ˆ˜ ์žˆ์–ด, ํŠนํ—ˆ ์นจํ•ด์˜ ์œ„ํ—˜์—์„œ ์ž์œ ๋กœ์šด ๊ฒƒ์€ ์•„๋‹™๋‹ˆ๋‹ค.
Q: FTO ๋ถ„์„์€ ๋„ˆ๋ฌด ๋น„์‹ธ๊ณ  ์–ด๋ ต์ง€ ์•Š๋‚˜์š”?
A: ๊ธฐ์ˆ  ๋ฒ”์œ„์— ๋”ฐ๋ผ ๋น„์šฉ์€ ๋‹ค์–‘ํ•˜์ง€๋งŒ, ์ˆ˜์‹ญ์–ต ์›์— ๋‹ฌํ•˜๋Š” ํŠนํ—ˆ ์†Œ์†ก ๋น„์šฉ๊ณผ ๋น„๊ตํ•˜๋ฉด FTO ๋ถ„์„์€ ๋งค์šฐ ๊ฒฝ์ œ์ ์ธ ‘๋ณดํ—˜’์ž…๋‹ˆ๋‹ค. ๋ฏธ๋ฆฌ ‘ํŠนํ—ˆ ์ง€๋ขฐ’๋ฅผ ๋ฐœ๊ฒฌํ•ด์„œ ์„ค๊ณ„๋ฅผ ๋ณ€๊ฒฝํ•˜๊ฑฐ๋‚˜ ํ•„์š”ํ•œ ๋ผ์ด์„ ์Šค๋ฅผ ํ™•๋ณดํ•˜๋Š” ๊ฒƒ์ด ํ›จ์”ฌ ํ˜„๋ช…ํ•œ ์ ‘๊ทผ์ž…๋‹ˆ๋‹ค.
Q: FRAND ์›์น™์ด ์ •ํ™•ํžˆ ๋ฌด์—‡์ธ๊ฐ€์š”?
A: FRAND๋Š” ‘๊ณต์ •ํ•˜๊ณ , ํ•ฉ๋ฆฌ์ ์ด๋ฉฐ, ๋น„์ฐจ๋ณ„์ ์ธ(Fair, Reasonable, and Non-Discriminatory)’ ์กฐ๊ฑด์˜ ์•ฝ์ž์ž…๋‹ˆ๋‹ค. ํ†ต์‹ ์ฒ˜๋Ÿผ ์—ฌ๋Ÿฌ ํšŒ์‚ฌ๊ฐ€ ์ฐธ์—ฌํ•˜๋Š” ‘ํ‘œ์ค€ ๊ธฐ์ˆ ’์— ํ•„์ˆ˜๋กœ ์‚ฌ์šฉ๋˜๋Š” ํŠนํ—ˆ(SEP)๋Š”, ํŠนํ—ˆ๊ถŒ์ž๊ฐ€ ์ด FRAND ์›์น™์— ๋”ฐ๋ผ ๋ˆ„๊ตฌ์—๊ฒŒ๋‚˜ ์ฐจ๋ณ„ ์—†์ด ํ•ฉ๋ฆฌ์ ์ธ ์กฐ๊ฑด์œผ๋กœ ๋ผ์ด์„ ์Šค๋ฅผ ์ œ๊ณตํ•  ์˜๋ฌด๊ฐ€ ์žˆ์Šต๋‹ˆ๋‹ค. ํ€„์ปด ์‚ฌ๋ก€์˜ ํ•ต์‹ฌ ์Ÿ์  ์ค‘ ํ•˜๋‚˜์˜€์Šต๋‹ˆ๋‹ค.
Q: ์ €ํฌ๋Š” ์ž‘์€ ์Šคํƒ€ํŠธ์—…์ธ๋ฐ, ์–ด๋””์„œ๋ถ€ํ„ฐ ์‹œ์ž‘ํ•ด์•ผ ํ• ๊นŒ์š”?
A: ๊ฐ€์žฅ ๋จผ์ €, ์‚ฌ์—…์˜ ํ•ต์‹ฌ์ด ๋˜๋Š” ๊ธฐ์ˆ ์— ์–ด๋–ค ๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ๋‚˜ ์˜คํ”ˆ์†Œ์Šค๊ฐ€ ์‚ฌ์šฉ๋˜์—ˆ๋Š”์ง€ ๋ชฉ๋ก์„ ๋งŒ๋“œ๋Š” ๊ฒƒ๋ถ€ํ„ฐ ์‹œ์ž‘ํ•˜์„ธ์š”. ๊ทธ๋ฆฌ๊ณ  ํ•ด๋‹น ๊ธฐ์ˆ ๋“ค์˜ ๋ผ์ด์„ ์Šค ๋ฌธ์„œ๋ฅผ ๊ผผ๊ผผํžˆ ์ฝ์–ด๋ณด์„ธ์š”. ์กฐ๊ธˆ์ด๋ผ๋„ ๋ถˆ๋ถ„๋ช…ํ•œ ์ ์ด ์žˆ๋‹ค๋ฉด, ๋ฐ˜๋“œ์‹œ ์™ธ๋ถ€ IP ์ „๋ฌธ๊ฐ€์˜ ์ž๋ฌธ์„ ๊ตฌํ•˜๋Š” ๊ฒƒ์ด ์žฅ๊ธฐ์ ์œผ๋กœ ํšŒ์‚ฌ๋ฅผ ๋ณดํ˜ธํ•˜๋Š” ๊ธธ์ž…๋‹ˆ๋‹ค.

์˜ค๋Š˜ ์ด์•ผ๊ธฐ๋ฅผ ํ†ตํ•ด ‘๋กœ์—ดํ‹ฐ ํ”„๋ฆฌ’๋ผ๋Š” ๋ง์˜ ๋ฌด๊ฒŒ๋ฅผ ์‹ค๊ฐํ•˜์…จ์œผ๋ฆฌ๋ผ ์ƒ๊ฐํ•ฉ๋‹ˆ๋‹ค. ์„ธ์ƒ์— ์กฐ๊ฑด ์—†๋Š” ๊ณต์งœ ์ ์‹ฌ์€ ์—†๋‹ค๋Š” ๋ง์ด ๋– ์˜ค๋ฅด๋„ค์š”. ๊ธฐ์ˆ ์„ ๋งˆ์ฃผํ–ˆ์„ ๋•Œ, “๋ฌด์—‡์„ ์ ˆ์•ฝํ•  ์ˆ˜ ์žˆ์„๊นŒ?”๊ฐ€ ์•„๋‹ˆ๋ผ, “๋ˆˆ์— ๋ณด์ด์ง€ ์•Š๋Š” ๋Œ€๊ฐ€๋Š” ๋ฌด์—‡์ผ๊นŒ? ์ด ์ƒํƒœ๊ณ„์—์„œ ๊ฐ€์žฅ ํฐ ์ด๋“์„ ์–ป๋Š” ํ”Œ๋ ˆ์ด์–ด๋Š” ๋ˆ„๊ตฌ์ผ๊นŒ?”๋ฅผ ์งˆ๋ฌธํ•˜๋Š” ์ง€ํ˜œ๊ฐ€ ํ•„์š”ํ•œ ๋•Œ์ž…๋‹ˆ๋‹ค. ๋” ๊ถ๊ธˆํ•œ ์ ์ด ์žˆ๋‹ค๋ฉด ์–ธ์ œ๋“  ๋Œ“๊ธ€๋กœ ๋ฌผ์–ด๋ด ์ฃผ์„ธ์š”! ๐Ÿ˜‰

※ ๋ณธ ๋ธ”๋กœ๊ทธ ํฌ์ŠคํŠธ๋Š” ์ผ๋ฐ˜์ ์ธ ์ •๋ณด ์ œ๊ณต์„ ๋ชฉ์ ์œผ๋กœ ํ•˜๋ฉฐ, ํŠน์ • ์‚ฌ์•ˆ์— ๋Œ€ํ•œ ๋ฒ•๋ฅ ์  ์ž๋ฌธ์„ ๋Œ€์ฒดํ•  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค. ๊ฐœ๋ณ„์ ์ธ ๋ฒ•๋ฅ  ๋ฌธ์ œ์— ๋Œ€ํ•ด์„œ๋Š” ๋ฐ˜๋“œ์‹œ ์ „๋ฌธ๊ฐ€์™€ ์ƒ๋‹ดํ•˜์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.

Wednesday, September 10, 2025

Is “Hunting Patent Trolls” a Thing of the Past? Corporate Survival Strategies as the USPTO Raises the IPR Bar

 

“What if your business license had to be reviewed every year?” A bold statement from the Acting Director of the USPTO heralds a major upheaval in the U.S. patent system! In this deep analysis, we examine what patent holders and companies need to know in the face of a sweeping paradigm shift brought about by Acting Director Stewart’s pro-patent policies.

 

Recently, Acting Director Coke Morgan Stewart delivered a keynote speech at the IPOA annual meeting that sounded like a seismic shift in the U.S. patent landscape. In unusually strong terms, he criticized the current IPR system, saying, “Imagine if your college degree or your home ownership were reviewed every year, endlessly, by anyone and everyone.” He argued that this kind of system undermines the constitutional rights and certainty afforded to patent holders.

Stewart asserted, “A stable patent system is essential to a stable economy,” and directly targeted the structural flaws of the current system—particularly the ease of repeatedly challenging patents under a low burden of proof. He further suggested that PTAB’s high invalidation rates may be a “statistical illusion” caused by repeated challenges, and that the Federal Circuit’s “reasonableness” standard alone cannot ensure the substantive accuracy of PTAB decisions. This speech makes it clear that the USPTO will actively promote policies that significantly strengthen patent stability. So, how should companies prepare amid this large wave of change? Let’s dive into the core issues. ๐Ÿ˜Š

 

๐Ÿ“œ What's Changed at the USPTO: Stewart’s Three Key Pro‑Patent Initiatives

Stewart has rolled out distinctly different policies under the banner of a "strong and stable" patent system. Most notably, the bar for challenging already-issued patents through IPR has been raised—making it significantly harder to invalidate patents. We can break down these major changes into three key points:

  1. Resurgence of Discretionary Denial & bifurcated proceedings: Not only has the flexibility introduced under former Director Kathi Vidal been reversed, but as of March 2025, IPR proceedings have become two-tiered—split between “discretionary denial assessment” and “merits review.” This shift is paving the way for more discretionary denials in favor of patent holders.
  2. New grounds for denial: “Settled Expectations”: This concept is critical. If a patent has been valid for a long time, protecting the social and economic reliance on that patent—i.e., ‘settled expectations’—becomes paramount. Thus, older patents are now much harder to challenge via IPR.
  3. Separate briefing process introduced: Under the USPTO’s interim procedures issued March 26, 2025, patent owners may now submit a separate brief arguing for discretionary denial—known as the Discretionary Denial Brief—and it’s capped at 14,000 words. This matching word limit ensures that patent holders have a robust opportunity to defend their rights.

 

๐Ÿค” Who Benefits More—Patent Holders or Challengers?

Clearly, these changes affect market players differently. Patent owners stand to gain, while challengers face increasing hurdles. Here's a summary in a convenient table:

Category Patent Holder Practicing Entity (Challenger)
Advantages Stronger IPR defenses, increased patent value, more leverage in licensing
Disadvantages Risk of prosecution laches (though difficult to establish in practice) Harder to invalidate patents via IPR, increased legal costs, vulnerability to NPEs
Key Strategy Leverage continuations, strengthen discretionary denial arguments File IPRs early and in compliance, utilize defensive patent communities
๐Ÿ’ก Quick Tip: What Is Prosecution Laches?
Prosecution laches refers to the doctrine preventing patent owners from intentionally delaying prosecution to target competitors later. However, courts apply this doctrine very sparingly—especially where normal continuation strategies are used. In practice, it’s very hard for a challenger to neutralize a patent by relying on prosecution laches alone.

 

๐Ÿš€ Tailored Strategies for Your Company

Given these sweeping changes, how should your company navigate the IPR landscape? We’ve outlined actionable strategies for both patent holders and challengers:

๐Ÿ‘‘ “Aggressive Value‑Maximization” Strategy for Patent Holders

Your patents are now more powerful than ever—use that to your advantage.

  • Maximize Continuations: Secure core technologies early, then build a dense patent portfolio through strategic continuations—this allows you to block competitors and set up for stronger licensing opportunities down the line.
  • Invoke the “Settled Expectations” Principle: Emphasize that your patent has been relied upon in the marketplace—especially if it’s been six years or more since issuance—to argue against IPR initiation.

๐Ÿ›ก “Strategic Workaround” & “Rapid Response” Strategy for Challengers

IPR isn’t as powerful as it used to be—but a smart, rapid approach can still make a difference.

  • Timing and compliance are critical: IPR is now a race. You must file within 9 months after patent issuance or within one year of being sued—but beware that the USPTO may also deny IPR if a patent has been around for ~6 years or if civil or ITC proceedings are well underway.
  • Target exceptions to “Settled Expectations”: Older patents can still be challenged if you uncover powerful new invalidity evidence or show the patent was never practiced or licensed—thus no settled expectations apply.
  • Use defensive networks like LOT Network & Unified Patent: If you're a small company concerned about NPE attacks, joining a collaborative defense community can offer collective patent risk mitigation.
๐Ÿ’ก Legislative Spotlight:
Beyond administrative changes, Congress is also pursuing pro-patent legislation. These bills highlight where the U.S. patent system may be headed:
  • PREVAIL Act: Aims to revamp PTAB structure and bolster patent holder protection—designed to curb challenger abuse of IPR and stabilize issued patents.
  • RESTORE Patent Rights Act: Would make it easier for patent holders to secure permanent injunctions following infringement victories—adding pressure on infringers.
  • PERA (Patent Eligibility Restoration Act): Seeks to clarify §101 patent subject-matter eligibility—especially for software and business methods—to make it easier for such inventions to obtain patents.

 

๐Ÿ’ก

Key Takeaways from USPTO’s 2025 Policy Shifts

Pro-Patent Era: Stewart’s policies significantly strengthen patent holders’ rights.
Higher IPR Bar: Fintiv and “Settled Expectations” make invalidating patents older than six years much harder.
Patent Holder Strategy: Leverage continuations and assert discretionary denial to maximize patent value.
Challenger Strategy: File timely IPRs and consider collective defenses such as LOT Network.

 

Frequently Asked Questions (FAQ)

Q: What’s the most important timing restriction when filing an IPR?
A: You must consider both statutory and discretionary limits. Statutorily, you must file within one year of being sued for infringement. Discretionarily, the USPTO is more likely to deny IPR if a patent has been issued for ~6 years or if other litigation has already advanced significantly.
Q: Does that mean older patents can never be invalidated?
A: It’s very difficult, but not impossible. If you uncover a strong “smoking gun” prior art reference, or show the patent has never been practiced or licensed, you may argue the “Settled Expectations” doctrine doesn’t apply. You can also pursue invalidity in federal court.
Q: We’re a small startup. Are these changes especially challenging for us?
A: Yes, startups face tougher conditions, as large corporations’ patent portfolios become even stronger. That’s why collective defense is key—joining groups like LOT Network (where members agree not to sue each other with patents) or Unified Patent (focused on invalidating NPE patents) can provide cost-effective protection.

Today we reviewed major changes in the U.S. patent system for 2025. It’s a pivotal moment: an opportunity for patent holders, but a serious challenge for challengers. As always, companies that read the shifts correctly and act quickly will prevail. Still, given that much of America’s innovation is driven by startups, policymakers may need to fine-tune these changes to ensure small businesses remain protected. I hope this analysis helps your business. If you have questions, feel free to ask in the comments! ๐Ÿ˜‰

*This post is for general informational purposes only and does not constitute legal advice. For specific issues, please consult with a qualified professional.

※ This blog post is intended for general informational purposes only and does not constitute legal advice on any specific matter. For individual legal issues, please consult a qualified professional.

“ํŠนํ—ˆ ๊ดด๋ฌผ ์žก์•„๋ผ”๋Š” ์˜›๋ง? IPR ๋ฌธํ„ฑ ๋†’์ธ USPTO, ๊ธฐ์—… ์ƒ์กด ์ „๋žต์€?

 

“๋‹น์‹ ์˜ ์‚ฌ์—… ๋ฉดํ—ˆ๊ฐ€ ๋งค๋…„ ์žฌ์‹ฌ์‚ฌ๋ฐ›๋Š”๋‹ค๋ฉด?” USPTO ๊ตญ์žฅ์˜ ์ž‘์‹ฌ ๋ฐœ์–ธ, ๋ฏธ๊ตญ ํŠนํ—ˆ ์ œ๋„์˜ ๋Œ€๊ฒฉ๋ณ€์„ ์˜ˆ๊ณ ํ•˜๋‹ค!

Stewart ๋Œ€ํ–‰ ๊ตญ์žฅ์˜ ์นœํŠนํ—ˆ ์ •์ฑ…์ด ๊ฐ€์ ธ์˜จ IPR ์ œ๋„์˜ ๊ฑฐ๋Œ€ํ•œ ํŒจ๋Ÿฌ๋‹ค์ž„ ์ „ํ™˜ ์†์—์„œ ํŠนํ—ˆ๊ถŒ์ž์™€ ์‹ค์‹œ๊ธฐ์—…์ด ๋ฐ˜๋“œ์‹œ ์•Œ์•„์•ผ ํ•  ์ƒ์กด ์ „๋žต์„ ์‹ฌ์ธต ๋ถ„์„ํ•ฉ๋‹ˆ๋‹ค.

 

์ตœ๊ทผ ๋ฏธ๊ตญ ํŠนํ—ˆ์ƒํ‘œ์ฒญ(USPTO)์˜ Coke Morgan Stewart ์ฒญ์žฅ ๋Œ€ํ–‰์ด ์ง€์‹์žฌ์‚ฐ๊ถŒ์žํ˜‘ํšŒ(IPOA) ์—ฐ๋ก€ํšŒ์˜์—์„œ ํ•œ ๊ธฐ์กฐ์—ฐ์„ค์€, ๊ทธ์•ผ๋ง๋กœ ๋ฏธ๊ตญ ํŠนํ—ˆ ์ œ๋„์˜ ์ง€๊ฐ ๋ณ€๋™์„ ์•Œ๋ฆฌ๋Š” ๊ฐ•๋ ฅํ•œ ์‹ ํ˜ธํƒ„์ด์—ˆ์Šต๋‹ˆ๋‹ค. ๊ทธ๋Š” ํ˜„์žฌ์˜ ํŠนํ—ˆ ๋ฌดํšจ ์‹ฌํŒ(IPR) ์ œ๋„๋ฅผ ํ–ฅํ•ด “๋งˆ์น˜ ์—ฌ๋Ÿฌ๋ถ„์˜ ๋Œ€ํ•™ ํ•™์œ„๋‚˜ ์ฃผํƒ ์†Œ์œ ๊ถŒ์ด ์•„๋ฌด๋Ÿฐ ์‹œํ•œ ์—†์ด, ๋ˆ„๊ตฌ์—๊ฒŒ๋‚˜, ๋งค๋…„ ์žฌ๊ฒ€ํ†  ๋Œ€์ƒ์ด ๋œ๋‹ค๊ณ  ์ƒ์ƒํ•ด ๋ณด์‹ญ์‹œ์˜ค.”๋ผ๋ฉฐ ์ด๋ก€์ ์œผ๋กœ ๊ฐ•ํ•œ ์–ด์กฐ๋กœ ๋น„ํŒํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ํŠนํ—ˆ๊ถŒ์ž์—๊ฒŒ ๋ถ€์—ฌ๋œ ํ—Œ๋ฒ•์  ๊ถŒ๋ฆฌ์™€ ์•ˆ์ •์„ฑ์„ ์‹ฌ๊ฐํ•˜๊ฒŒ ํ›ผ์†ํ•˜๋Š”, ๋น„์ •์ƒ์ ์ธ ์‹œ์Šคํ…œ์ด๋ผ๋Š” ๊ฒƒ์ด์ฃ .

Stewart ๊ตญ์žฅ์€ “์•ˆ์ •์ ์ธ ๊ฒฝ์ œ๋ฅผ ์œ„ํ•ด์„œ๋Š” ์•ˆ์ •์ ์ธ ํŠนํ—ˆ ์‹œ์Šคํ…œ์ด ํ•„์š”ํ•˜๋‹ค”๊ณ  ๋‹จ์–ธํ•˜๋ฉฐ, ๋‚ฎ์€ ์ฆ๋ช… ๊ธฐ์ค€์œผ๋กœ ํŠนํ—ˆ๋ฅผ ๋ฐ˜๋ณต์ ์œผ๋กœ ์žฌ์‹ฌ์‚ฌํ•˜๋Š” ํ˜„ํ–‰ ์ œ๋„์˜ ๊ตฌ์กฐ์  ๋ฌธ์ œ์ ์„ ์ •๋ฉด์œผ๋กœ ๊ฒจ๋ƒฅํ–ˆ์Šต๋‹ˆ๋‹ค. ์‹ฌ์ง€์–ด ๊ทธ๋Š” ๋†’์€ PTAB(ํŠนํ—ˆ์‹ฌํŒ์›)์˜ ํŠนํ—ˆ ์ทจ์†Œ์œจ์ด ๋ฐ˜๋ณต์ ์ธ ๋„์ „์— ์˜ํ•œ ‘ํ†ต๊ณ„์  ์ฐฉ์‹œ’์ผ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์—ฐ๋ฐฉ์ˆœํšŒ๋ฒ•์›์˜ ‘ํ•ฉ๋ฆฌ์„ฑ’ ์‹ฌ์‚ฌ ๊ธฐ์ค€๋งŒ์œผ๋กœ๋Š” PTAB ๊ฒฐ์ •์˜ ์‹ค์งˆ์  ์ •ํ™•์„ฑ์„ ๋‹ด๋ณดํ•  ์ˆ˜ ์—†๋‹ค๊ณ  ๊ผฌ์ง‘์—ˆ์Šต๋‹ˆ๋‹ค. ์ด ์—ฐ์„ค์€ USPTO๊ฐ€ ์•ž์œผ๋กœ ํŠนํ—ˆ๊ถŒ์˜ ์•ˆ์ •์„ฑ์„ ๋Œ€ํญ ๊ฐ•ํ™”ํ•˜๋Š” ๋ฐฉํ–ฅ์œผ๋กœ ์ •์ฑ…์„ ์ถ”์ง„ํ•  ๊ฒƒ์ž„์„ ๋ช…ํ™•ํžˆ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค. ๊ทธ๋ ‡๋‹ค๋ฉด ์ด๋Ÿฌํ•œ ๊ฑฐ๋Œ€ํ•œ ๋ณ€ํ™”์˜ ๋ฌผ๊ฒฐ ์†์—์„œ, ์šฐ๋ฆฌ ๊ธฐ์—…๋“ค์€ ๋ฌด์—‡์„ ์ค€๋น„ํ•ด์•ผ ํ• ๊นŒ์š”? ์ง€๊ธˆ๋ถ€ํ„ฐ ๊ทธ ํ•ต์‹ฌ์„ ์งš์–ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. ๐Ÿ˜Š

 

๐Ÿ“œ ํ™• ๋‹ฌ๋ผ์ง„ USPTO, Stewart ๊ตญ์žฅ์˜ ์นœํŠนํ—ˆ ์ •์ฑ… ํ•ต์‹ฌ 3๊ฐ€์ง€

Stewart ๊ตญ์žฅ์€ ‘๊ฐ•๋ ฅํ•˜๊ณ  ์•ˆ์ •์ ์ธ ํŠนํ—ˆ ์‹œ์Šคํ…œ’์„ ๋‚ด์„ธ์šฐ๋ฉฐ ์ด์ „๊ณผ๋Š” ํ™•์—ฐํžˆ ๋‹ค๋ฅธ ์ •์ฑ…๋“ค์„ ๋‚ด๋†“์•˜์Šต๋‹ˆ๋‹ค. ํŠนํžˆ ํŠนํ—ˆ ๋ฌดํšจ ์‹ฌํŒ์ธ IPR(Inter Partes Review) ์ œ๋„์˜ ๋ฌธํ„ฑ์„ ๋†’์ธ ๊ฒƒ์ด ๊ฐ€์žฅ ํฐ ๋ณ€ํ™”์ธ๋ฐ์š”. ์‰ฝ๊ฒŒ ๋งํ•ด, ์ด๋ฏธ ๋“ฑ๋ก๋œ ํŠนํ—ˆ์— ๋Œ€ํ•ด ๋ฌดํšจ๋ฅผ ์ฃผ์žฅํ•˜๊ธฐ๊ฐ€ ํ›จ์”ฌ ๊นŒ๋‹ค๋กœ์›Œ์กŒ๋‹ค๋Š” ๋œป์ž…๋‹ˆ๋‹ค. ํ•ต์‹ฌ์ ์ธ ๋ณ€ํ™”๋Š” ํฌ๊ฒŒ ์„ธ ๊ฐ€์ง€๋กœ ์š”์•ฝํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

  1. IPR ์žฌ๋Ÿ‰ ๊ฑฐ๋ถ€ ๊ถŒํ•œ์˜ ๋ถ€ํ™œ ๋ฐ ์ ˆ์ฐจ ์ด์›ํ™”: Kathi Vidal ์ „ ์ฒญ์žฅ์ด ์™„ํ™”ํ–ˆ๋˜ ‘Fintiv ์›์น™’์„ ๋‹ค์‹œ ๊ฐ•ํ™”ํ–ˆ์„ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ, 2025๋…„ 3์›”๋ถ€ํ„ฐ๋Š” IPR ์ ˆ์ฐจ๋ฅผ ‘์žฌ๋Ÿ‰์  ๊ฑฐ์ ˆ ํŒ๋‹จ’๊ณผ ‘์‹ค์ฒด์  ์‹ฌ๋ฆฌ’๋กœ ๋ถ„๋ฆฌํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด๋กœ ์ธํ•ด ํŠนํ—ˆ๊ถŒ์ž์—๊ฒŒ ์œ ๋ฆฌํ•œ ๋ฐฉํ–ฅ์œผ๋กœ ์žฌ๋Ÿ‰์  ๊ฑฐ์ ˆ์ด ์ฆ๊ฐ€ํ•˜๋Š” ์ถ”์„ธ์ž…๋‹ˆ๋‹ค.
  2. ์ƒˆ๋กœ์šด ๊ฑฐ๋ถ€ ์š”์ธ, ‘์ •์ฐฉ๋œ ๊ธฐ๋Œ€(Settled Expectations)’์˜ ๋“ฑ์žฅ: ์ด ๊ฐœ๋…์€ ์ •๋ง ์ค‘์š”ํ•œ๋ฐ์š”. ํŠนํ—ˆ๊ฐ€ ์˜ค๋žœ ๊ธฐ๊ฐ„ ๋™์•ˆ ์œ ํšจํ•˜๊ฒŒ ์กด์žฌํ–ˆ๋‹ค๋ฉด, ๊ทธ์— ๋Œ€ํ•œ ์‚ฌํšŒ์ , ๊ฒฝ์ œ์  ์‹ ๋ขฐ, ์ฆ‰ ‘์ •์ฐฉ๋œ ๊ธฐ๋Œ€’๋ฅผ ๋ณดํ˜ธํ•ด์•ผ ํ•œ๋‹ค๋Š” ๋…ผ๋ฆฌ์ž…๋‹ˆ๋‹ค. ๋”ฐ๋ผ์„œ ์˜ค๋ž˜๋œ ํŠนํ—ˆ์ผ์ˆ˜๋ก IPR์„ ํ†ตํ•ด ๋ฌดํšจ์‹œํ‚ค๊ธฐ๊ฐ€ ๋”์šฑ ์–ด๋ ค์›Œ์กŒ์Šต๋‹ˆ๋‹ค.
  3. ๋ณ„๋„์˜ ์„œ๋ฉด ์ œ์ถœ ์ ˆ์ฐจ ๋„์ž…: 2025๋…„ 3์›” 26์ผ์ž USPTO์˜ ์ž„์‹œ ์ ˆ์ฐจ(Interim Process Memo)์— ๋”ฐ๋ผ, IPR ๋ฐ PGR ์ ˆ์ฐจ์—์„œ ํŠนํ—ˆ๊ถŒ์ž๋Š” ‘์žฌ๋Ÿ‰์  ๊ฑฐ์ ˆ’์„ ์ฃผ์žฅํ•˜๊ธฐ ์œ„ํ•œ ๋ณ„๋„์˜ ์„œ๋ฉด์„ ์ œ์ถœํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ด ๊ฐœ์‹œ ์„œ๋ฉด(Discretionary Denial Brief)์€ ์ตœ๋Œ€ 14,000๋‹จ์–ด(word limit) ๊นŒ์ง€ ํ—ˆ์šฉ๋ฉ๋‹ˆ๋‹ค. ์ด๋Š” ๊ธฐ์กด์˜ ์ฒญ๊ตฌ ๋ฐ ์˜ˆ๋น„ ๋Œ€์‘ ์„œ๋ฉด(word limits)๊ณผ ๋™์ผํ•œ ๋ถ„๋Ÿ‰์œผ๋กœ ํŠนํ—ˆ๊ถŒ์ž์—๊ฒŒ ์ž์‹ ์˜ ๊ถŒ๋ฆฌ๋ฅผ ๋ฐฉ์–ดํ•  ์ถฉ๋ถ„ํ•œ ๊ธฐํšŒ๋ฅผ ์ œ๊ณตํ•˜๋Š” ๊ฐ•๋ ฅํ•œ ๋ฌด๊ธฐ๊ฐ€ ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

 

๐Ÿค” ํŠนํ—ˆ๊ถŒ์ž vs ๋„์ „์ž, ๋ˆ„๊ตฌ์—๊ฒŒ ์›ƒ์–ด์ค„๊นŒ?

์ด๋Ÿฌํ•œ ๋ณ€ํ™”๋Š” ๋‹น์—ฐํžˆ ์‹œ์žฅ ์ฐธ์—ฌ์ž๋“ค์—๊ฒŒ ๊ฐ๊ธฐ ๋‹ค๋ฅธ ์˜ํ–ฅ์„ ๋ฏธ์นฉ๋‹ˆ๋‹ค. ํŠนํ—ˆ๋ฅผ ๊ฐ€์ง„ ์ชฝ๊ณผ ํŠนํ—ˆ๋ฅผ ๋ฌดํšจํ™”ํ•˜๋ ค๋Š” ์ชฝ์˜ ํฌ๋น„๊ฐ€ ์—‡๊ฐˆ๋ฆด ์ˆ˜๋ฐ–์— ์—†์ฃ . ํ•œ๋ˆˆ์— ์ดํ•ดํ•˜๊ธฐ ์‰ฝ๊ฒŒ ํ‘œ๋กœ ์ •๋ฆฌํ•ด ๋ณด์•˜์Šต๋‹ˆ๋‹ค.

๊ตฌ๋ถ„ ํŠนํ—ˆ๊ถŒ์ž (๊ถŒ๋ฆฌ์ž) ์‹ค์‹œ๊ธฐ์—… (๋„์ „์ž)
์œ ๋ฆฌํ•œ ์  ๐Ÿ‘ IPR ๋ฐฉ์–ด ์šฉ์ด, ํŠนํ—ˆ ๊ฐ€์น˜ ์ƒ์Šน, ๋ผ์ด์„ ์Šค ํ˜‘์ƒ๋ ฅ ๊ฐ•ํ™” -
๋ถˆ๋ฆฌํ•œ ์  ๐Ÿ‘Ž ‘Prosecution Laches’ ์œ„ํ—˜ (๋‹จ, ์ธ์ • ์š”๊ฑด์ด ์—„๊ฒฉํ•ด ์‹คํšจ์„ฑ์€ ์ œํ•œ์ ) IPR ํ†ตํ•œ ํŠนํ—ˆ ๋ฌดํšจํ™” ์–ด๋ ค์›€, ์†Œ์†ก ๋น„์šฉ ์ฆ๊ฐ€, NPE ๊ณต๊ฒฉ ์ทจ์•ฝ
ํ•ต์‹ฌ ์ „๋žต ๐Ÿ’ก ๊ณ„์†์ถœ์›(Continuation) ํ™œ์šฉ, ์žฌ๋Ÿ‰ ๊ฑฐ๋ถ€ ์ฃผ์žฅ ๊ฐ•ํ™” IPR ์กฐ๊ธฐ ์‹ ์ฒญ ๋ฐ ์‹œ๊ธฐ ์ค€์ˆ˜, ๋ฐฉ์–ด์  ํŠนํ—ˆ ์ปค๋ฎค๋‹ˆํ‹ฐ ํ™œ์šฉ
๐Ÿ’ก ์—ฌ๊ธฐ์„œ ์ž ๊น! Prosecution Laches๋ž€?
ํŠนํ—ˆ๊ถŒ์ž๊ฐ€ ์˜๋„์ ์œผ๋กœ ํŠนํ—ˆ ์ถœ์› ์ ˆ์ฐจ๋ฅผ ์ง€์—ฐ์‹œ์ผœ ๊ฒฝ์Ÿ์‚ฌ๋“ค์ด ๊ด€๋ จ ๊ธฐ์ˆ ์„ ์ƒ์šฉํ™”ํ•œ ๋’ค์—์•ผ ํŠนํ—ˆ๋ฅผ ๋“ฑ๋กํ•˜์—ฌ ๊ณต๊ฒฉํ•˜๋Š” ๊ฒƒ์„ ๋ง‰๊ธฐ ์œ„ํ•œ ๋ฒ•๋ฆฌ์ž…๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ตœ๊ทผ ๋ฒ•์›์€ ์ด ์ฃผ์žฅ์˜ ์ธ์ • ์š”๊ฑด์„ ๋งค์šฐ ์—„๊ฒฉํ•˜๊ฒŒ ๋ณด๊ณ  ์žˆ์œผ๋ฉฐ, ํŠนํžˆ ์ •์ƒ์ ์ธ ‘๊ณ„์†์ถœ์›’ ์ „๋žต์—๋Š” ์ ์šฉํ•˜๊ธฐ ์–ด๋ ต๋‹ค๊ณ  ํŒ๋‹จํ•˜๋Š” ์ถ”์„ธ์ž…๋‹ˆ๋‹ค. ๋”ฐ๋ผ์„œ ํŠนํ—ˆ๊ถŒ์ž๋Š” ๊ณ„์†ํ•ด์„œ ํ‘œ์ ์„ ํ–ฅํ•ด ๊ถŒ๋ฆฌ ๋ฒ”์œ„๋ฅผ ์กฐ์ •ํ•ด๊ฐˆ ์ˆ˜ ์žˆ์œผ๋‚˜, ๋„์ „์ž๊ฐ€ Prosecution Laches์—๋งŒ ์˜์กดํ•˜์—ฌ ํŠนํ—ˆ์˜ ํž˜์„ ๋นผ๊ธฐ๋Š” ํ˜„์‹ค์ ์œผ๋กœ ๋งค์šฐ ์–ด๋ ต์Šต๋‹ˆ๋‹ค.

 

๐Ÿš€ ์šฐ๋ฆฌ ํšŒ์‚ฌ๋ฅผ ์œ„ํ•œ ๋งž์ถคํ˜• ๋Œ€์‘ ์ „๋žต

๊ทธ๋ ‡๋‹ค๋ฉด ์ด ๊ฑฐ๋Œ€ํ•œ ๋ณ€ํ™”์˜ ๋ฌผ๊ฒฐ ์†์—์„œ ์šฐ๋ฆฌ๋Š” ์–ด๋–ป๊ฒŒ ํ•ญํ•ดํ•ด์•ผ ํ• ๊นŒ์š”? ํŠนํ—ˆ๊ถŒ์ž์™€ ๋„์ „์ž, ๊ฐ์ž์˜ ์ž…์žฅ์—์„œ ๊ตฌ์ฒด์ ์ธ ๋Œ€์‘ ์ „๋žต์„ ์„ธ์›Œ์•ผ ํ•ฉ๋‹ˆ๋‹ค.

๐Ÿ‘‘ ํŠนํ—ˆ๊ถŒ์ž๋ฅผ ์œ„ํ•œ ‘๊ณต๊ฒฉ์  ๊ฐ€์น˜ ๊ทน๋Œ€ํ™”’ ์ „๋žต

์ด์ œ ์—ฌ๋Ÿฌ๋ถ„์˜ ํŠนํ—ˆ๋Š” ๊ทธ ์–ด๋А ๋•Œ๋ณด๋‹ค ๊ฐ•๋ ฅํ•œ ๋ฐฉํŒจ์ด์ž ์ฐฝ์ด ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ์ด ๊ธฐํšŒ๋ฅผ ์ตœ๋Œ€ํ•œ ํ™œ์šฉํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.

  • ๊ณ„์†์ถœ์›(Continuation) ์ ๊ทน ํ™œ์šฉ: ํ•ต์‹ฌ ๊ธฐ์ˆ ์— ๋Œ€ํ•œ ํŠนํ—ˆ๋ฅผ ๋จผ์ € ํ™•๋ณดํ•œ ๋’ค, ์‹œ์žฅ์˜ ๋ฐœ์ „ ๋ฐฉํ–ฅ์„ ๋ณด๋ฉด์„œ ๊ณ„์†์ถœ์›์„ ํ†ตํ•ด ํŠนํ—ˆ ํฌํŠธํด๋ฆฌ์˜ค๋ฅผ ์ด˜์ด˜ํ•˜๊ฒŒ ํ™•์žฅํ•ด ๋‚˜๊ฐ€์„ธ์š”. ์ด๋Š” ๊ฒฝ์Ÿ์‚ฌ์˜ ๊ธฐ์ˆ  ๊ฐœ๋ฐœ์„ ํšจ๊ณผ์ ์œผ๋กœ ๊ฒฌ์ œํ•˜๊ณ , ๋‚˜์ค‘์— ๋” ํฐ ๋ผ์ด์„ ์Šค ์ˆ˜์ต์„ ๊ธฐ๋Œ€ํ•  ์ˆ˜ ์žˆ๋Š” ์ „๋žต์ž…๋‹ˆ๋‹ค.
  • ‘์ •์ฐฉ๋œ ๊ธฐ๋Œ€’ ์›์น™ ํ™œ์šฉ: ์—ฌ๋Ÿฌ๋ถ„์˜ ํŠนํ—ˆ๊ฐ€ ์‹œ์žฅ์—์„œ ์˜ค๋žซ๋™์•ˆ ์‹ ๋ขฐ๋ฅผ ๋ฐ›์•„์™”๋‹ค๋Š” ์ , ํŠนํžˆ ๋Œ€์ฒด๋กœ ๋“ฑ๋ก ํ›„ 6๋…„ ์ด์ƒ ๊ฒฝ๊ณผํ–ˆ๋‹ค๋Š” ์‚ฌ์‹ค์„ ์ ๊ทน์ ์œผ๋กœ ์–ดํ•„ํ•˜์—ฌ IPR ๊ฐœ์‹œ ์ž์ฒด๋ฅผ ๋ง‰๋Š” ์ „๋žต์„ ๊ตฌ์‚ฌํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๐Ÿ›ก️ ๋„์ „์ž๋ฅผ ์œ„ํ•œ ‘์ „๋žต์  ์šฐํšŒ’ ๋ฐ ‘์‹ ์† ๋Œ€์‘’ ์ „๋žต

IPR์ด๋ผ๋Š” ๊ฐ€์žฅ ๊ฐ•๋ ฅํ–ˆ๋˜ ๋ฌด๊ธฐ๊ฐ€ ์˜ˆ์ „ ๊ฐ™์ง€ ์•Š์ง€๋งŒ, ๊ธธ์€ ์žˆ์Šต๋‹ˆ๋‹ค. ๋” ๋น ๋ฅด๊ณ , ๋” ์ „๋žต์ ์œผ๋กœ ์›€์ง์—ฌ์•ผ ํ•ฉ๋‹ˆ๋‹ค.

  • IPR, ํƒ€์ด๋ฐ๊ณผ ์กฐ๊ฑด์ด ์ƒ๋ช…: IPR์€ ์ด์ œ ํƒ€์ด๋ฐ ์‹ธ์›€์ž…๋‹ˆ๋‹ค. ๋ฒ•์ ์œผ๋กœ๋Š” ①ํŠนํ—ˆ ๋“ฑ๋ก ํ›„ 9๊ฐœ์›” ๊ฒฝ๊ณผ, ②์นจํ•ด ์†Œ์†ก ํ”ผ๊ณ  ์‹œ 1๋…„ ์ด๋‚ด ์‹ ์ฒญ์ด๋ผ๋Š” ์ ˆ๋Œ€์  ์‹œ๊ฐ„ ์ œํ•œ์ด ์žˆ์Šต๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ์—ฌ๊ธฐ์— ๋”ํ•ด, USPTO์˜ ์žฌ๋Ÿ‰์  ๊ฑฐ์ ˆ์ด๋ผ๋Š” ์ƒˆ๋กœ์šด ํ—ˆ๋“ค์ด ์ƒ๊ฒผ์Šต๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ๋“ฑ๋ก ํ›„ ์•ฝ 6๋…„์ด ์ง€๋‚œ ํŠนํ—ˆ๋Š” ‘์ •์ฐฉ๋œ ๊ธฐ๋Œ€’ ์›์น™์— ๋”ฐ๋ผ IPR ๊ฐœ์‹œ๊ฐ€ ๊ฑฐ์ ˆ๋  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, ๋ณ„๋„์˜ ๋ฏผ์‚ฌ ์†Œ์†ก์ด๋‚˜ ITC ์กฐ์‚ฌ๊ฐ€ ์ƒ๋‹นํžˆ ์ง„ํ–‰๋œ ๊ฒฝ์šฐ์—๋„ ์ž์› ๋‚ญ๋น„๋ฅผ ๋ง‰๊ธฐ ์œ„ํ•ด IPR์„ ๊ฑฐ์ ˆํ•ฉ๋‹ˆ๋‹ค.
  • ‘์ •์ฐฉ๋œ ๊ธฐ๋Œ€’์˜ ์˜ˆ์™ธ ์‚ฌ์œ  ๊ณต๋žต: ๋“ฑ๋ก๋œ ์ง€ ์˜ค๋ž˜๋œ ํŠนํ—ˆ๋ผ๋„, ์•„์ฃผ ๊ฐ•๋ ฅํ•œ ์‹ ๊ทœ ๋ฌดํšจ ์ž๋ฃŒ๋ฅผ ์ฐพ์•„๋ƒˆ๊ฑฐ๋‚˜, ํ•ด๋‹น ํŠนํ—ˆ๊ฐ€ ์‹œ์žฅ์—์„œ ์ „ํ˜€ ์‹ค์‹œ๋˜๊ฑฐ๋‚˜ ๋ผ์ด์„ ์Šค๋œ ์ ์ด ์—†๋‹ค๋Š” ์ ์„ ์ž…์ฆํ•˜๋ฉด ‘์ •์ฐฉ๋œ ๊ธฐ๋Œ€’๊ฐ€ ์—†์—ˆ๋‹ค๊ณ  ์ฃผ์žฅํ•ด๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • ์ค‘์†Œ๊ธฐ์—…/์Šคํƒ€ํŠธ์—…์˜ ๋ฐฉ์–ด ์นด๋“œ, LOT Network & Unified Patent: ํŠนํ—ˆ๊ดด๋ฌผ(NPE)์˜ ๊ณต๊ฒฉ์ด ๋‘๋ ค์šด ๊ธฐ์—…์ด๋ผ๋ฉด ๋ฐฉ์–ด์  ํŠนํ—ˆ ๊ณต์œ  ์ปค๋ฎค๋‹ˆํ‹ฐ์ธ ‘LOT Network’๋‚˜ NPE ํŠนํ—ˆ๋ฅผ ์‚ฌ์ „์— ๋ฌดํšจํ™”ํ•˜๋Š” ๋ฐ ํŠนํ™”๋œ ‘Unified Patent’ ๊ฐ€์ž…์„ ์ ๊ทน ๊ณ ๋ คํ•ด๋ณผ ๋งŒํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ๊ฐœ๋ณ„ ๊ธฐ์—…์ด ๋Œ€์‘ํ•˜๊ธฐ ์–ด๋ ค์šด ํŠนํ—ˆ ๋ฆฌ์Šคํฌ๋ฅผ ๊ณต๋™์œผ๋กœ ๋ฐฉ์–ดํ•˜๋Š” ํšจ๊ณผ์ ์ธ ์ˆ˜๋‹จ์ด ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๐Ÿ’ก ์•Œ์•„๋‘์„ธ์š”! ํ–‰์ •๋ถ€๋ฅผ ๋„˜์–ด ์˜ํšŒ๊นŒ์ง€, ‘์นœํŠนํ—ˆ’ ์ž…๋ฒ• ๋™ํ–ฅ
Stewart ๊ตญ์žฅ์˜ ํ–‰์ •์  ๋ณ€ํ™”๋ฟ๋งŒ ์•„๋‹ˆ๋ผ, ๋ฏธ๊ตญ ์˜ํšŒ์—์„œ๋„ ํŠนํ—ˆ๊ถŒ์ž ๋ณดํ˜ธ๋ฅผ ๊ฐ•ํ™”ํ•˜๋ ค๋Š” ์›€์ง์ž„์ด ํ™œ๋ฐœํ•ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฒ•์•ˆ๋“ค์€ ํ˜„์žฌ ๋ฏธ๊ตญ ํŠนํ—ˆ ์‹œ์Šคํ…œ์˜ ๋ฐฉํ–ฅ์„ฑ์„ ๋ช…ํ™•ํžˆ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค.
  • PREVAIL Act: PTAB(ํŠนํ—ˆ์‹ฌํŒ์›)์˜ ๊ตฌ์กฐ๋ฅผ ๊ฐœํŽธํ•˜๊ณ  ํŠนํ—ˆ๊ถŒ์ž ๋ณดํ˜ธ๋ฅผ ๊ฐ•ํ™”ํ•˜๋Š” ๊ฒƒ์„ ๋ชฉํ‘œ๋กœ ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ๋„์ „์ž์˜ IPR ๋‚จ์šฉ์„ ๋ง‰๊ณ , ํ•œ๋ฒˆ ๋“ฑ๋ก๋œ ํŠนํ—ˆ์˜ ์•ˆ์ •์„ฑ์„ ๋†’์ด๋ ค๋Š” ์ทจ์ง€์ž…๋‹ˆ๋‹ค.
  • RESTORE Patent Rights Act: ํŠนํ—ˆ ์นจํ•ด ์†Œ์†ก์—์„œ ์Šน์†Œํ•œ ํŠนํ—ˆ๊ถŒ์ž์—๊ฒŒ ‘์˜๊ตฌ์  ํŒ๋งค ๊ธˆ์ง€ ๋ช…๋ น’์„ ๋” ์‰ฝ๊ฒŒ ๋ฐ›์„ ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋Š” ๋ฒ•์•ˆ์ž…๋‹ˆ๋‹ค. ์ด๋Š” ์นจํ•ด์ž์—๊ฒŒ ๊ฐ•๋ ฅํ•œ ์••๋ฐ• ์ˆ˜๋‹จ์ด ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • PERA (Patent Eligibility Restoration Act): ํŠนํ—ˆ ๋Œ€์ƒ ์ ๊ฒฉ์„ฑ(§ 101)์˜ ๋ชจํ˜ธํ•œ ๊ธฐ์ค€์„ ๋ช…ํ™•ํžˆ ํ•˜์—ฌ, ํŠนํžˆ ์†Œํ”„ํŠธ์›จ์–ด๋‚˜ BM ๊ด€๋ จ ๋ฐœ๋ช…์ด ๋” ์‰ฝ๊ฒŒ ํŠนํ—ˆ๋ฅผ ๋ฐ›์„ ์ˆ˜ ์žˆ๋„๋ก ๊ธธ์„ ์—ด์–ด์ฃผ๋Š” ๊ฒƒ์„ ๋ชฉ์ ์œผ๋กœ ํ•ฉ๋‹ˆ๋‹ค.

 

๐Ÿ’ก

2025 USPTO ์ •์ฑ… ๋ณ€ํ™” ํ•ต์‹ฌ ์š”์•ฝ

์นœํŠนํ—ˆ ์‹œ๋Œ€ ๊ฐœ๋ง‰: Stewart ๊ตญ์žฅ ์ •์ฑ…์œผ๋กœ ํŠนํ—ˆ๊ถŒ์ž ๊ถŒ๋ฆฌ ๋Œ€ํญ ๊ฐ•ํ™”.
IPR ๋ฌธํ„ฑ ์ƒ์Šน: Fintiv ๋ฐ ‘์ •์ฐฉ๋œ ๊ธฐ๋Œ€’ ์›์น™์œผ๋กœ 6๋…„ ์ด์ƒ ๋œ ํŠนํ—ˆ ๋ฌดํšจํ™” ์–ด๋ ค์›Œ์ง.
ํŠนํ—ˆ๊ถŒ์ž ์ „๋žต: ๊ณ„์†์ถœ์› ๋ฐ ์žฌ๋Ÿ‰ ๊ฑฐ๋ถ€ ์ฃผ์žฅ์œผ๋กœ ํŠนํ—ˆ ๊ฐ€์น˜ ๊ทน๋Œ€ํ™” ํ•„์š”.
๋„์ „์ž ์ „๋žต: IPR ์‹œ๊ธฐ ์ค€์ˆ˜ ๋ฐ LOT Network ๋“ฑ ๊ณต๋™ ๋ฐฉ์–ด ์ „๋žต ๋ชจ์ƒ‰.

 

์ž์ฃผ ๋ฌป๋Š” ์งˆ๋ฌธ (FAQ)

Q: IPR ์‹ ์ฒญ ์‹œ ๊ฐ€์žฅ ์ฃผ์˜ํ•ด์•ผ ํ•  ์‹œ๊ธฐ ์ œํ•œ์€ ๋ฌด์—‡์ธ๊ฐ€์š”?
A: ๋ฒ•์  ์‹œํ•œ๊ณผ ์žฌ๋Ÿ‰์  ์‹œํ•œ, ๋‘ ๊ฐ€์ง€๋ฅผ ๋ชจ๋‘ ๊ณ ๋ คํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ๋ฒ•์ ์œผ๋กœ๋Š” ์†Œ์†ก ํ”ผ๊ณ  ์‹œ 1๋…„ ๋‚ด ์‹ ์ฒญํ•ด์•ผ ํ•˜๋Š” ‘๊ฐ•ํ–‰ ๊ทœ์ •’์ด ์žˆ๊ณ , ์žฌ๋Ÿ‰์ ์œผ๋กœ๋Š” ๋“ฑ๋ก ํ›„ ์•ฝ 6๋…„์ด ์ง€๋‚ฌ๊ฑฐ๋‚˜ ๋‹ค๋ฅธ ์†Œ์†ก์ด ๋งŽ์ด ์ง„ํ–‰๋œ ๊ฒฝ์šฐ USPTO๊ฐ€ ๊ฑฐ์ ˆํ•  ๊ฐ€๋Šฅ์„ฑ์ด ๋งค์šฐ ๋†’๋‹ค๋Š” ‘์‹ค์งˆ์  ์žฅ๋ฒฝ’์ด ์ƒ๊ฒผ์Šต๋‹ˆ๋‹ค.
Q: ๊ทธ๋Ÿผ ๋“ฑ๋ก๋œ ์ง€ ์˜ค๋ž˜๋œ ํŠนํ—ˆ๋Š” ์•„์˜ˆ ๋ฌดํšจ์‹œํ‚ฌ ๋ฐฉ๋ฒ•์ด ์—†๋‚˜์š”?
A: IPR์„ ํ†ตํ•˜๊ธฐ๋Š” ๋งค์šฐ ์–ด๋ ค์›Œ์กŒ์ง€๋งŒ ๋ถˆ๊ฐ€๋Šฅํ•œ ๊ฒƒ์€ ์•„๋‹™๋‹ˆ๋‹ค. ๋ˆ„๊ตฌ๋„ ์˜ˆ์ƒ์น˜ ๋ชปํ•œ ๊ฐ•๋ ฅํ•œ ๋ฌดํšจ ์ฆ๊ฑฐ(smoking gun)๋ฅผ ์ฐพ์•„๋‚ด๊ฑฐ๋‚˜, ํ•ด๋‹น ํŠนํ—ˆ๊ฐ€ ์žฅ๋กฑ ์†์—๋งŒ ์žˆ๋˜ ‘์‹ค์‹œ๋˜์ง€ ์•Š์€ ํŠนํ—ˆ’๋ผ๋Š” ์ ์„ ์ฆ๋ช…ํ•˜๋ฉด ‘์ •์ฐฉ๋œ ๊ธฐ๋Œ€’ ์›์น™์˜ ์˜ˆ์™ธ๋ฅผ ์ฃผ์žฅํ•ด๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋˜๋Š” ์—ฐ๋ฐฉ๋ฒ•์›์„ ํ†ตํ•œ ๋ฌดํšจ ์†Œ์†ก์ด๋ผ๋Š” ๋‹ค๋ฅธ ๊ธธ๋„ ์—ฌ์ „ํžˆ ์—ด๋ ค ์žˆ์Šต๋‹ˆ๋‹ค.
Q: ์ €ํฌ๋Š” ์ž‘์€ ์Šคํƒ€ํŠธ์—…์ธ๋ฐ, ์ด๋ฒˆ ๋ณ€ํ™”๊ฐ€ ํŠนํžˆ ๋” ๋ถ€๋‹ด์Šค๋Ÿฌ์›Œ์š”.
A: ์Šคํƒ€ํŠธ์—…์—๊ฒŒ๋Š” ๋ถ„๋ช… ๋„์ „์ ์ธ ์ƒํ™ฉ์ž…๋‹ˆ๋‹ค. ๊ฑฐ๋Œ€ ๊ธฐ์—…์˜ ํŠนํ—ˆ ๊ณต์„ธ์— ๋งž์„œ๊ธฐ ๋” ์–ด๋ ค์›Œ์กŒ๊ธฐ ๋•Œ๋ฌธ์ด์ฃ . ๋”ฐ๋ผ์„œ ์ด์ œ๋Š” ๊ฐœ๋ณ„ ๋Œ€์‘๋ณด๋‹ค ‘๊ณต๋™ ๋ฐฉ์–ด’ ์ „๋žต์ด ์ค‘์š”ํ•ด์กŒ์Šต๋‹ˆ๋‹ค. LOT Network์™€ ๊ฐ™์ด ํšŒ์›์‚ฌ ๊ฐ„ ํŠนํ—ˆ ๊ณต๊ฒฉ์„ ํ•˜์ง€ ์•Š๋„๋ก ์•ฝ์†ํ•˜๋Š” ์ปค๋ฎค๋‹ˆํ‹ฐ๋‚˜, Unified Patent์ฒ˜๋Ÿผ ํž˜์„ ํ•ฉ์ณ NPE ํŠนํ—ˆ๋ฅผ ๋ฌดํšจํ™”์‹œํ‚ค๋Š” ์„œ๋น„์Šค์— ๊ฐ€์ž…ํ•˜๋Š” ๊ฒƒ์ด ํ˜„์‹ค์ ์ธ ๋Œ€์•ˆ์ด ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์˜ค๋Š˜์€ 2025๋…„ ๋ฏธ๊ตญ ํŠนํ—ˆ ์ œ๋„์˜ ํฐ ๋ณ€ํ™”์— ๋Œ€ํ•ด ์•Œ์•„๋ดค๋Š”๋ฐ์š”, ์ •๋ง ์ค‘์š”ํ•œ ์‹œ์ ์ธ ๊ฒƒ ๊ฐ™์•„์š”. ํŠนํ—ˆ๊ถŒ์ž์—๊ฒŒ๋Š” ์ ˆํ˜ธ์˜ ๊ธฐํšŒ๊ฐ€, ๋ฐ˜๋Œ€๋กœ ๋„์ „์ž์—๊ฒŒ๋Š” ์œ„๊ธฐ๊ฐ€ ๋  ์ˆ˜ ์žˆ๋Š” ์ƒํ™ฉ์ž…๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ์–ธ์ œ๋‚˜ ๊ทธ๋ ‡๋“ฏ, ๋ณ€ํ™”๋ฅผ ์ •ํ™•ํžˆ ์ฝ๊ณ  ๋น ๋ฅด๊ฒŒ ๋Œ€์‘ํ•˜๋Š” ๊ธฐ์—…๋งŒ์ด ์Šน๋ฆฌํ•  ์ˆ˜ ์žˆ๊ฒ ์ฃ . ๋‹ค๋งŒ, ๋ฏธ๊ตญ์˜ ๊ธฐ์ˆ  ํ˜์‹ ์„ ์Šคํƒ€ํŠธ์—…๊ณผ ๊ฐ™์€ ์ค‘์†Œ๊ธฐ์—…์ด ์ฃผ๋„ํ•˜๊ณ  ์žˆ๋‹ค๋Š” ์ ์„ ๊ณ ๋ คํ•˜๋ฉด, ํŠนํ—ˆ์ •์ฑ…์˜ ๋ณ€ํ™”๊ฐ€ ๋‹ค๋ฅธ ์ธก๋ฉด์—์„œ ์Šคํƒ€ํŠธ์—…์˜ ์‚ฌ์—…์„ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ๋„๋ก ๋ฏธ์„ธ ์กฐ์ •์ด ํ•„์š”ํ•ด๋ณด์ž…๋‹ˆ๋‹ค. ์ด ๊ธ€์ด ์—ฌ๋Ÿฌ๋ถ„์˜ ๋น„์ฆˆ๋‹ˆ์Šค์— ์ž‘์€ ๋„์›€์ด ๋˜์—ˆ์œผ๋ฉด ์ข‹๊ฒ ์Šต๋‹ˆ๋‹ค. ๋” ๊ถ๊ธˆํ•œ ์ ์ด ์žˆ๋‹ค๋ฉด ์–ธ์ œ๋“  ๋Œ“๊ธ€๋กœ ๋ฌผ์–ด๋ด ์ฃผ์„ธ์š”! ๐Ÿ˜‰

*๋ณธ ํฌ์ŠคํŒ…์€ ์ผ๋ฐ˜์ ์ธ ์ •๋ณด ์ œ๊ณต์„ ๋ชฉ์ ์œผ๋กœ ํ•˜๋ฉฐ, ํŠน์ • ์‚ฌ์•ˆ์— ๋Œ€ํ•œ ๋ฒ•๋ฅ ์  ์ž๋ฌธ์„ ๋Œ€์ฒดํ•  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค. ๊ฐœ๋ณ„์ ์ธ ๋ฒ•๋ฅ  ๋ฌธ์ œ์— ๋Œ€ํ•ด์„œ๋Š” ๋ฐ˜๋“œ์‹œ ์ „๋ฌธ๊ฐ€์™€ ์ƒ๋‹ดํ•˜์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค.

Saturday, September 6, 2025

Patentability of LLM Prompts: Overcoming Abstract Idea Rejections

 

Can a Simple Command to an AI Be Patented? This article provides an in-depth analysis of how LLM prompt techniques can transcend mere ‘ideas’ to be recognized as concrete ‘technical inventions,’ exploring key strategies and legal standards across different countries.

It seems that almost no one around us thinks of protecting prompt techniques or prompts that instruct LLM models with patents. At first, I was also skeptical, wondering, ‘Can a simple command to a computer be patented?’ However, as I delved deeper into this topic, I came to the conclusion that it is entirely possible if certain conditions are met. This article is a summary of the thought process I went through, and please bear in mind that it may not yet be an academically established view. ๐Ÿ˜Š

 

๐Ÿค” Prompts Aren’t Patentable Because They’re Just ‘Human Thoughts,’ Right?

The first hurdle that comes to mind for many is the principle that ‘human mental processes’ are not patentable subject matter. In fact, the argument that “a prompt is fundamentally human involvement, and technology involving such human mental activity is not patentable” is one of the strongest reasons for rejection in patent examination. This standard has been particularly firm since the U.S. Supreme Court’s Alice Corp. v. CLS Bank decision. It means that merely implementing something on a computer that a person could do in their head is not enough to get a patent.

According to this logic, the act of instructing an AI through a prompt is ultimately an expression of human thought, so one could easily conclude that it cannot be patented. However, this argument is half right and half wrong. And this is precisely where our patent strategy begins.

๐Ÿ’ก Good to Know!
What patent law takes issue with as ‘human intervention’ is not the act of giving a command to a system itself. It refers to cases where the core idea of the invention remains at the level of a mental step that can be practically performed in the human mind. Therefore, the key is to prove that our prompt technology transcends this boundary.

 

๐Ÿ“Š A Shift in Perspective: From ‘Command’ to ‘Computer Control Technology’

The first step to unlocking the patentability of prompt technology is to change our perspective. We need to redefine our technology not as ‘a message sent from a human to an AI,’ but as ’a technology that controls the internal computational processes of a complex computer system (LLM) through structured data to solve a technical problem and achieve concrete performance improvements.’

If you take a close look at the algorithm of China’s DeepSeek-R1, you can see that it implements various prompt techniques as they are.

Think about it. The process of assigning a specific expert role to an LLM with billions of parameters, injecting complex library dependency information as context, and combining numerous constraints to control the generation of optimal code is clearly in a realm that ‘cannot practically be performed in the human mind.’ This is a crucial standard for recognizing patent eligibility in the guidelines and case law of the U.S. Patent and Trademark Office (USPTO).

 

๐ŸŒ A Comparative Look at Key Examination Standards of Major Patent Offices

The patentability of prompt technology is not assessed uniformly across all countries. If you are considering international filing, it is crucial to understand the subtle differences in perspective among major patent offices.

1. USPTO (United States Patent and Trademark Office) – Emphasis on the Abstract Idea Exception

The USPTO strictly applies the Alice/Mayo two-step test, which originated from Supreme Court case law. Instructions or general linguistic expressions that merely replace human thought processes can be dismissed as “abstract ideas.” However, if it can be demonstrated that the prompt is linked to a concrete technical implementation (e.g., improving model accuracy, optimizing specific hardware operations), there is a chance of it being recognized as patent-eligible subject matter.

2. EPO (European Patent Office) – Focus on Technical Effect

The EPO assesses based on “technical character” and “technical effect.” Simply presenting data input or linguistic rules is considered to lack inventive step, but if the prompt structure serves as a means to solve a technical problem (e.g., improving computational efficiency, optimizing memory usage, enhancing interaction with a specific device), it can be recognized as patent-eligible.

3. KIPO (Korean Intellectual Property Office) – Emphasis on Substantive Requirements for Software Inventions

KIPO places importance on the traditional requirement of “a creation of a technical idea utilizing the laws of nature.” Therefore, a prompt as a mere sentence or linguistic rule is not considered a technical idea, but if it is shown to be combined with a specific algorithm, hardware, or system to produce a concrete technical result, it can be recognized as an invention. In Korean practice, presenting a concrete system structure or processing flow is particularly persuasive.

Key Comparison Summary

Patent Office Key Requirement
USPTO (U.S.) Emphasis on ‘concrete technical implementation’ to avoid the abstract idea exception
EPO (Europe) Proof of ‘technical effect’ is key; simple data manipulation is insufficient
KIPO (Korea) Must be a technical idea using laws of nature + emphasis on systemic/structural implementation
⚠️ Implications for International Filing
The same “LLM prompt” technology could be at risk of being dismissed as an “abstract business method” in the United States, a “non-technical linguistic rule” in Europe, and a “mere idea” in Korea. Therefore, when considering international filing, a strategy that clearly articulates the ‘concrete system architecture’ and ‘measurable technical effects’ throughout the specification is essential as a common denominator.

 

๐Ÿงฎ A Practical Guide to Drafting Patent Claims (Detailed)

So, how should you draft patent claims to avoid the ‘human intervention’ attack and clearly establish that it is a ‘technical invention’? Let’s take a closer look at four key strategies.

1. Set the subject as the ‘computer (processor),’ not the ‘person.’

This is the most crucial step in shifting the focus of the invention from the ‘user’s mental activity’ to the ‘machine’s technical operation.’ It must be specified that all steps of the claim are performed by computer hardware (processor, memory, etc.).

  • Bad ๐Ÿ‘Ž: A method where a user specifies a persona to an LLM and generates code.
  • Good ๐Ÿ‘: A step where a processor, upon receiving a user’s input, assigns a professional persona for a specific programming language to the LLM.

2. Specify the prompt as ‘structured data.’

Instead of abstract expressions like ‘natural language prompt,’ you need to clarify that it is a concrete data structure processed by the computer. This shows that the invention is not just a simple idea.

  • Bad ๐Ÿ‘Ž: A step of providing a natural language prompt to the LLM.
  • Good ๐Ÿ‘: A step of generating and providing to the LLM a machine-readable context schema that includes library names and version constraints.

3. Claim ‘system performance improvement,’ not the result.

Instead of subjective results like ‘good code,’ you must specify objective and measurable effects that substantially improve the computer’s functionality. This is the core of ‘technical effect.’

  • Bad ๐Ÿ‘Ž: A step of generating optimized code.
  • Good ๐Ÿ‘: A step of controlling the LLM’s token generation probability through the schema to generate optimized code that reduces code compatibility errors and saves GPU memory usage.

4. Clarify the ‘automation’ process.

It should be specified that all processes after the initial input (data structuring, LLM control, result generation, etc.) are performed Automatically by the system without further human judgment, demonstrating that it is a reproducible technical process.

 

๐Ÿ“œ Reinforced Claim Example

By integrating all the strategies described above, you can construct a reinforced patent claim as follows.

[Claim] A computer-implemented method for generating optimized code, comprising:

  1. (a) parsing, by a processor, a user’s natural language input to generate a persona identifier defining an expert role for a specific programming language;
  2. (b) generating, by the processor, by referencing said input and an external code repository, structured context data including library names, version constraints, and hardware memory usage limits;
  3. (c) generating, by the processor, a control prompt including said persona identifier and structured context data and transmitting it to an LLM, thereby automatically controlling the internal token generation process of the LLM;
  4. (d) receiving, from said controlled LLM, optimized code that satisfies said constraints and has a compilation error rate below a predefined threshold and reduced GPU memory usage.

→ This example, instead of focusing on a simple result, greatly increases the chances of patent registration by clarifying system-level measurable technical effects such as ‘reduced compilation error rate’ and ‘reduced GPU memory usage.’

 

Frequently Asked Questions ❓

Q: Can a simple prompt like "write a poem about a cat" be patented?
A: No, that in itself is just an idea and would be difficult to patent. The subject of a patent would be a technical method or system that uses a prompt with a specific data structure (e.g., a schema defining poetic devices, rhyme schemes) to control an LLM to generate a poem, resulting in less computational resource usage or more accurate generation of a specific style of poetry.
Q: What are some specific ‘technical effects’ of prompt technology?
A: Typical examples include reduced compilation error rates in code generation, savings in computational resources like GPU and memory, shorter response generation times, and improved output accuracy for specific data formats (JSON, XML, etc.). The important thing is that these effects must be measurable and reproducible.
Q: Do I need to draft claims differently for each country when filing internationally?
A: Yes, while the core strategy is the same, it is advantageous to tailor the emphasis to the points that each patent office values. For example, in a U.S. (USPTO) specification, you would emphasize the ‘concrete improvement of computer functionality,’ in Europe (EPO), the ‘technical effect through solving a technical problem,’ and in Korea (KIPO), the ‘concreteness of the system configuration and processing flow.’

In conclusion, there is a clear path to protecting AI prompts with patents. However, it requires a strategic approach that goes beyond the idea of ‘what to ask’ and clearly demonstrates ‘how to technically control and improve a computer system.’ I hope this article provides a small clue to turning your innovative ideas into powerful intellectual property. If you have any more questions, feel free to ask in the comments~ ๐Ÿ˜Š

※ This blog post is intended for general informational purposes only and does not constitute legal advice on any specific matter. For individual legal issues, please consult a qualified professional.

ํŠนํ—ˆ๋ฅผ ๋ฐ”๋ผ๋ณด๋Š” ํ•œ๊ตญ ์‚ฌํšŒ์˜ ํ”„๋ ˆ์ž„์— ๋Œ€ํ•˜์—ฌ

ํ•œ๊ตญ์˜ ์–ธ๋ก ์€ ํŠนํ—ˆ ๋ถ„์Ÿ์„ ๋‹ค๋ฃฐ ๋•Œ ํ”ํžˆ ๊ฐ์ •์ ์ด๊ณ  ํ”ผํ•ด์ž ์ค‘์‹ฌ์˜ ํ”„๋ ˆ์ž„์„ ์”Œ์›Œ, ๊ธฐ์—…๋“ค์ด ๊ณต๊ฒฉ์ ์ธ ํŠนํ—ˆ ์ฃผ์žฅ์œผ๋กœ ‘๊ดด๋กญํž˜์„ ๋‹นํ•˜๋Š”’ ๊ฒƒ์ฒ˜๋Ÿผ ๋ฌ˜์‚ฌํ•˜๊ณค ํ•œ๋‹ค. ์ด๋Ÿฐ ์„œ์‚ฌ๋Š” ์ข…์ข… ํ—ค๋“œ๋ผ์ธ์—์„œ ๋”์šฑ ๊ณผ์žฅ๋˜๋ฉฐ, ์ •๋‹นํ•œ ํŠนํ—ˆ๊ถŒ ํ–‰์‚ฌ์กฐ์ฐจ ‘์‚ฅ๋œฏ๊ธฐ’์™€ ๋‹ค๋ฅผ ๋ฐ” ์—†...