Systems Analysis for IP Campaigns. William Betten Medical Technology Director UBM TechInsights December 5, 2012

Similar documents
Sample Project List. Software Reverse Engineering

How to build a patent sales programme. Art Monk, TechInsights. Yearbook. Building IP value in the 21st century

Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

About Yazata Business Consulting

InvenSense MPU Axis Accelerometer Gyroscope MEMS Motion Sensor

Reverse Engineering: Printed Circuit Boards. Dr. Tarek A. Tutunji Philadelphia University, Jordan

Product Lifecycle Management. Diane Ryan Siemens PLM Software

Windows Embedded Security and Surveillance Solutions

Business Models of Innovation Closed Innovation and Open Innovation (Topic 7 (c))

Leti Introduction and Overview

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Modern Market Sensors in Smartphones: State-of-the-art How to make smartphones even more smarter? Conclusions

Opendiem Training Exercise 1 Opendiem-TRN-0001

Samsung Galaxy S6 Fingerprint Sensor New Synaptics Design

Agilent EEsof EDA.

Qualcomm QCA ac Wi-Fi 2x2 MIMO Combo SoC

The Internet of Things: Opportunities & Challenges

VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION

Software User Guide UG-461

ni.com/vision NI Vision

1 Introduction 1. 1 Introduction

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

WEB, HYBRID, NATIVE EXPLAINED CRAIG ISAKSON. June 2013 MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER

Bluetooth SMART Advertise-Only Beacon Reference Design

INTELLECTUAL PROPERTY CREDENTIALS. Services Summary Brooks Consulting s intellectual property offerings fall into three main categories:

Visual Programming of Logic, Motion, and Robotics

Adaptive Radio. Cognitive Radio

Medical Technologies. Helbling Technik Innovation, together we do it

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS

PLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING

IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

AMFitzgerald Company Overview

Normen & Standards Industrie 4.0 IEEE Standards

Ryerson Digital Media Zone Online Resources Patent Essentials

A Biologically Inspired Approach to Network Vulnerability Identification

How To Integrate Software And Systems

OWNER S GUIDE OWNER S GUIDE

A bachelor of science degree in electrical engineering with a cumulative undergraduate GPA of at least 3.0 on a 4.0 scale

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

An Open Source Software Primer for Lawyers

Cisco Unified Communications Remote Management Services

INTELLECTUAL PROPERTY LAW FOR MOBILE TECHNOLOGY DEVELOPERS


Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015

Motion Sensing with mcube igyro Delivering New Experiences for Motion Gaming and Augmented Reality for Android Mobile Devices

Security Through Transparency: An Open Source Approach to Physical Security

Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic

INFORMATION TECHNOLOGY PROGRAM

Classification of Data Center Infrastructure Management (DCIM) Tools

Security Intelligence Services. Cybersecurity training.

Evading Android Emulator

Mobile App Proposal Magazine company- @address.com. January 12, y. Direct Contact.

Ivan Zatkovich. Intellectual Property Consulting & Patent Litigation Internet Telecommunications Information Technology

STAGE 1 COMPETENCY STANDARD FOR ENGINEERING ASSOCIATE

Basic Wireless Infrastructure and Topologies

Paul Spence. CEO, Global Outsourcing. Bank of America Merrill Lynch TMT Conference 2010 London, June 9

System-on. on-chip Design Flow. Prof. Jouni Tomberg Tampere University of Technology Institute of Digital and Computer Systems.

TDMS Test & Data Management Software

PFP Technology White Paper

BIG DATA BETWEEN REVOLUTION AND CONFUSION SEBASTIAN LAND - RAPIDMINER GMBH, DORTMUND. 3/23/2015 RapidMiner 1

ESYST Residential Wiring

Usage Based Insurance

Development of a Service Robot System for a Remote Child Monitoring Platform

Information Needed for Effective Asset Management

Electrics & Electronics

1 st year / / Principles of Industrial Eng. Chapter -3 -/ Dr. May G. Kassir. Chapter Three

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions

I. Introduction. Understanding the Business Objectives

Getting Ahead of Malware

CONSULTING IMAGE PLACEHOLDER

Night Owl 8 channel DVR system with HDMI output, 960H recording and a Free Night Owl Pro App with Owl Scan (No Hard Drive Included)

MOTION NO. M Contract for Transit Scheduling Software PROPOSED ACTION

PUF Physical Unclonable Functions

Improving Service Asset and Configuration Management with CA Process Maps

ZigBee-2.4-DK 2.4 GHZ ZIGBEE DEVELOPMENT KIT USER S GUIDE. 1. Kit Contents. Figure GHz ZigBee Development Kit

Transcription:

Systems Analysis for IP Campaigns William Betten Medical Technology Director UBM TechInsights December 5, 2012

UBM TechInsights Overview Professional Services Full suite of IP Services, including Patent Portfolio and Asset Management Capabilities, Licensing, Litigation Support, Deposition, Patent Brokerage, Technology Due Diligence, Product/Device Procurement Technical Intelligence Physical analysis of competitors device/product attributes incl. Circuits, Structures, Materials Analysis, Product Teardowns, BoM, IC Costing Business Intelligence Design Trends, Business Landscapes and Profiling, Product Distribution and Sales Data, Regional Sales Assessment.. Software & System Level Analysis Source Code, Algorithm Analysis, System Level Testing State-of-the-Art Laboratories Four world class locations with 340 highly experienced and energetic employees Skilled in the Art of Technology 2 I 2012, UBM LLC

Intellectual Property Program Why? Enables achievement of strategic goals Serves as the basis for favorable business deals and enhanced competitive position Diminishes a competitor s business momentum Blocks or delays a competing product s market entry Imposes cost disadvantages on competing products 3 I 2012, UBM LLC

White Hat Reverse Engineering (RE) RE is the systematic tear down and analysis of what lies under the hood. RE supports strategy and decision making across the IP lifecycle. RE protects a company s own intellectual property. 4 I 2012, UBM LLC

Body of Knowledge: Breadth & Depth Library of Analysis, Reports & Data Subject-matter Expertise & Domain Knowledge IP Knowledge & Tools 5 I 2012, UBM LLC

Comprehensive Technical Analysis Patent Review Technology Analysis Systems Analysis Process Analysis Teardown Circuit Analysis 6 I 2012, UBM LLC

Our Methodology 1 Patent Assessment 2 Target Assessment 3 Evidence of Use Plan 4 Feasibility Exercise 5 6 Detailed Investigation Results Documentation 7 I 2012, UBM LLC

Areas of Analysis Wireless Communication Hardware Electrical Test Static & Dynamic Software Analysis 8 I 2012, UBM LLC

Analysis Techniques: The Toolbox System Analysis Techniques Interface and Parameter Extraction Custom application development Bill-of-materials analysis Software Analysis Techniques Firmware extraction, binary code Inspection Static Code Analysis, software disassembly Dynamic analysis, custom test application development Circuit Analysis Techniques Package and PCB routing analysis, component identification IC de-layering & topographic imaging, layout extraction Schematic capture, design analysis, simulation & timing analysis 9 I 2012, UBM LLC Process Analysis Techniques Materials analysis High-magnification imaging and critical dimensions extraction IC design, packaging, cost-to-manufacture estimation

Hardware Electrical Test Functional test Waveform Analysis RF & Analog Board & die-level probing Examples: Micro-probing of camera image sensors SSD controller analysis via active bus monitoring Mobile device charging circuit analysis Circuit, waveform, and material analysis on a blood glucose meter 10 I 2012, UBM LLC

Software Reverse Engineering What s involved in Software RE? US XXX EP YYY Target Extraction of Software Find Portion of interest (Re)Construction of high(er) level representation Identification of infringing elements 11 I 2012, UBM LLC

Software Reverse Engineering Complications Software is a hidden part of the product. Software has a complex branching ability. Software is reconfigurable. Software is a more independent design realm than hardware. 12 I 2012, UBM LLC

Systems & Software RE Example Project Goals: Perform a RE study on a magnetic compass app to understand role of sensor data with respect to image orientation If applicable, perform a claims mapping to the app Project Deliverables: Detailed engineering report Claims mapping 13 I 2012, UBM LLC

Project Approach Assess patent & develop test plan Acquire smartphone & magnetic field detector app Functional Test Code analysis Client Review Claims Mapping 14 I 2012, UBM LLC

Code Analysis: To understand how the application applies the sensor data to calculate orientation of the displayed image Downloaded and unpacked the app and OS framework Disassembled the apps and the rendering frameworks, analyzed the code, and decompiled the disassembled code Created high level diagram of relevant functional elements Results: Operation of the compass and other device motion sensors was determined through RE of the compass app source code & device OS. We were able to conclusively determine whether the claim elements mapped to the application. 15 I 2012, UBM LLC

Conclusions Companies that fail to employ a rigorous program to protect their IP rights run the risk of costly litigation, lost revenue, and weakened market share. An effective and proactive IP strategy demands the under-the-hood intelligence that only RE can provide. Systems RE requires a unique blend of complementary skills. 16 I 2012, UBM LLC

Questions?? For More Information: Web: www.ubmtechinsights.com/medical Email: bbetten@ubmtechinsights.com