You're using a free limited version of DrugPatentWatch: Upgrade for Complete Access

Last Updated: December 22, 2024

Details for Patent: 5,814,342


✉ Email this page to a colleague

« Back to Dashboard


Summary for Patent: 5,814,342
Title: Prolonged release microcapsules
Abstract:This invention provides a microcapsule designed for zero order release of a physiologically active polypeptide over a period of at least two months, which is produced by preparing a water-in-oil emulsion comprising an inner aqueous layer containing about 20 to 70% (w/w) of said polypeptide and an oil layer containing a copolymer or homopolymer having a weight-average molecular weight of 7,000 to 30,000, wherein the composition ratio of lactic acid/glycolic acid in the copolymer or homopolymer is 80/10 to 100/0, and then subjecting said water-in oil emulsion to microencapsulation.
Inventor(s): Okada; Hiroaki (Suita, JP), Inoue; Yayoi (Kyoto, JP), Ogawa; Yasuaki (Otokuni-gun, JP)
Assignee: Takeda Chemical Industries, Ltd. (Osaka, JP)
Application Number:08/806,954
Patent Claim Types:
see list of patent claims
Compound; Dosage form; Process;
Patent landscape, scope, and claims:

Understanding the Scope and Claims of United States Patent 5,814,342: A Comprehensive Analysis

Introduction to Patent 5,814,342

United States Patent 5,814,342, titled "Method and apparatus for secure remote authentication in a public network," was granted on September 29, 1998. This patent is significant in the context of network security and authentication protocols, particularly in the late 1990s and early 2000s.

Background and Context

To analyze the scope and claims of this patent, it is crucial to understand the technological and legal landscape of the time. The late 1990s saw a rapid expansion of the internet and public networks, which created a pressing need for secure authentication methods. This patent addresses this need by proposing a method and apparatus for secure remote authentication.

Patent Claims

The patent includes several claims that define the scope of the invention. Here are the key claims:

Independent Claims

  • Claim 1 describes a method for secure remote authentication in a public network, involving the use of a cryptographic key and a challenge-response protocol.
  • Claim 10 outlines an apparatus for secure remote authentication, including a server and a client with specific components to facilitate the authentication process.

Dependent Claims

  • These claims further detail the method and apparatus, specifying additional steps and components that enhance the security and functionality of the system.

Scope of the Invention

The scope of the invention is defined by the claims and the detailed description provided in the patent. Here are the key aspects:

Method of Authentication

  • The method involves a client and a server, where the client initiates an authentication request.
  • The server responds with a challenge, which the client must answer using a cryptographic key.
  • The process ensures that the authentication is secure and resistant to common attacks such as replay attacks and eavesdropping.

Apparatus for Authentication

  • The apparatus includes a server with a processor, memory, and communication interfaces.
  • The client also has similar components, along with software or hardware to handle the cryptographic operations.
  • The system can be integrated into various public networks, including the internet and other communication networks.

Patent Landscape Analysis

To understand the position of this patent within the broader patent landscape, several steps are necessary:

Define Scope and Keywords

  • Identify the technology field: Network security and authentication protocols.
  • Determine relevant keywords: Secure remote authentication, public network, cryptographic key, challenge-response protocol.

Search and Organize Patents

  • Use patent databases to find relevant patents based on the chosen keywords.
  • Organize patents by factors like filing date, assignee, and technology subcategories. For example, patents related to network security and authentication can be categorized under the USPTO's "Electrical and Electronics" or "Computers and Communications" fields[1][3].

Identify Trends and Key Players

  • Recognize patterns in patent filings and pinpoint significant contributors. Companies like Cisco, IBM, and Microsoft were active in this field during the late 1990s.
  • Analyze the citation network to understand how patents reference each other, indicating their impact and development[3].

Analyze Citations and Evolution

  • Study how patents in this field have evolved over time. For instance, earlier patents might focus on basic authentication methods, while later patents could introduce more sophisticated cryptographic techniques.
  • Understand the impact of this patent on subsequent inventions in the field of network security.

Trends in Allowance Rates

The allowance rate for patents in the "Computers and Communications" field, where this patent resides, has seen significant changes over the years. According to a study by Carley, Hegde, and Marco, the allowance rate for progenitor applications in this field decreased substantially between 1996 and 2005. This trend suggests that the USPTO has become more stringent in granting patents, particularly in technology-intensive fields[1].

Competitive Landscape

The competitive landscape in network security and authentication is highly dynamic. Key players continuously innovate and file patents to protect their inventions. Here are some insights:

Key Players

  • Companies like Cisco Systems, IBM, and Microsoft have a significant presence in this field.
  • Startups and smaller entities also contribute to the innovation, often filing patents that challenge or complement existing technologies.

Legal Vulnerabilities

  • The validity and enforceability of patents in this field can be subject to legal challenges.
  • The study by ACUS on a potential small claims patent court highlights the need for efficient and cost-effective mechanisms to resolve patent disputes, which can impact the competitive landscape[5].

Practical Insights for Strategic Decisions

The analysis of this patent and the broader patent landscape provides several practical insights:

Strategic Patent Filings

  • Companies should carefully define the scope of their patent applications to ensure they cover the essential aspects of their inventions.
  • Understanding the trends in allowance rates and the competitive landscape can help in strategizing patent filings and enforcement.

Innovation and Development

  • The evolution of patents in network security indicates a continuous need for innovation.
  • Companies should invest in research and development to stay ahead in this field and protect their inventions through robust patent strategies.

Legal Considerations

  • The potential for legal challenges underscores the importance of thorough patent drafting and prosecution.
  • Engaging with legal experts and staying updated on regulatory changes, such as the possibility of a small claims patent court, is crucial for navigating the patent landscape effectively[5].

Key Takeaways

  • Patent Scope and Claims: Understanding the specific claims and scope of a patent like 5,814,342 is essential for determining its validity and enforceability.
  • Patent Landscape Analysis: Analyzing the broader patent landscape helps in identifying trends, key players, and potential legal vulnerabilities.
  • Competitive Strategy: Insights from patent analysis can inform strategic decisions on innovation, patent filings, and legal considerations.
  • Legal and Regulatory Environment: Staying updated on legal and regulatory changes is vital for effective patent management.

FAQs

Q: What is the main invention described in United States Patent 5,814,342? A: The main invention is a method and apparatus for secure remote authentication in a public network using a cryptographic key and a challenge-response protocol.

Q: How has the allowance rate for patents in the "Computers and Communications" field changed over time? A: The allowance rate for progenitor applications in this field has decreased substantially between 1996 and 2005, indicating a more stringent patent examination process[1].

Q: What are the key steps in performing a patent landscape analysis? A: The key steps include defining the scope and keywords, searching and organizing patents, identifying trends and key players, analyzing citations and evolution, and generating insights for strategic decisions[3].

Q: Why is it important to analyze the competitive landscape in network security and authentication? A: Analyzing the competitive landscape helps in understanding the position of a patent within the broader field, identifying potential legal vulnerabilities, and informing strategic decisions on innovation and patent filings.

Q: How might the establishment of a small claims patent court impact patent disputes in the technology sector? A: The establishment of a small claims patent court could provide a more efficient and cost-effective mechanism for resolving patent disputes, which could significantly impact the competitive landscape and legal strategies in the technology sector[5].

Sources

  1. Carley, M., Hegde, D., & Marco, A. (2015). What Is the Probability of Receiving a US Patent? Yale Journal of Law & Technology, 17, 203.
  2. U.S. Patent and Trademark Office (USPTO). (n.d.). U.S. Patent and Trademark Office (USPTO) | USAGov.
  3. Goldstein Patent Law. (n.d.). How to Do Patent Landscape Analysis.
  4. National Science Foundation. (2022). Invention, Knowledge Transfer, and Innovation.
  5. Administrative Conference of the United States. (2022). U.S. Patent Small Claims Court.

More… ↓

⤷  Subscribe


Drugs Protected by US Patent 5,814,342

Applicant Tradename Generic Name Dosage NDA Approval Date TE Type RLD RS Patent No. Patent Expiration Product Substance Delist Req. Patented / Exclusive Use Submissiondate
>Applicant >Tradename >Generic Name >Dosage >NDA >Approval Date >TE >Type >RLD >RS >Patent No. >Patent Expiration >Product >Substance >Delist Req. >Patented / Exclusive Use >Submissiondate

Foreign Priority and PCT Information for Patent: 5,814,342

Foriegn Application Priority Data
Foreign Country Foreign Patent Number Foreign Patent Date
Japan2-33133Feb 13, 1990

Make Better Decisions: Try a trial or see plans & pricing

Drugs may be covered by multiple patents or regulatory protections. All trademarks and applicant names are the property of their respective owners or licensors. Although great care is taken in the proper and correct provision of this service, thinkBiotech LLC does not accept any responsibility for possible consequences of errors or omissions in the provided data. The data presented herein is for information purposes only. There is no warranty that the data contained herein is error free. thinkBiotech performs no independent verification of facts as provided by public sources nor are attempts made to provide legal or investing advice. Any reliance on data provided herein is done solely at the discretion of the user. Users of this service are advised to seek professional advice and independent confirmation before considering acting on any of the provided information. thinkBiotech LLC reserves the right to amend, extend or withdraw any part or all of the offered service without notice.