IIPRD LANDSCAPE ANALYSIS - BRING YOUR OWN DEVICE
P a g e 2 PATENT LANDSCAPE ANALYSIS ON BYOD- BRING YOUR OWN DEVICE Contents Executive Summary... 3 Introduction... 4 Benefits of bring your own device (BYOD)... 6 Risks of bring your own device (BYOD)... 7 BYOD Adoption Strategy... 8 Concerns with BYOD... 9 SWOT Analysis... 10 Patent Landscape Analysis... 12 Conclusion... 29
P a g e 3 Executive Summary BYOD (Bring your own device) allows employees to use their own device, application and network for business or work purpose, with an objective of increasing productivity, decreasing IT costs, and simplifying enterprise infrastructure. This report gives a detail study of BYOD, its benefits and drawbacks. The study also gives a detailed analysis of United States granted patents and publications that are relevant to BYOD, the current trend in filing patents pertaining to different BYOD policies/technologies, top assignees, etc. A SWOT analysis of BYOD is also included which gives a brief overview of benefits and drawbacks of BYOD technology. Also, a study of an adaptation strategy is given which shows a comprehensive overview of different needs of IT industry and their different level of security over their data and system while implementing BYOD. Being an exemplary exercise, only United States granted patents and publications are considered for this BYOD patent landscape analysis.
P a g e 4 Introduction BYOD is a new trend that is being chosen by a growing number of IT firms for decreasing costs and increasing productivity. Not too far back, many IT companies raised a red flag for implementing BYOD technology, primarily due to one or more security concerns. However, in recent years, IT industry seems to have come to norms with the necessity of BYOD technology and is preparing itself for implementing BYOD policies or technologies. At the end, it is all about end users being able to use computing and/or communication devices of their preference to increase productivity and mobility. What is BYOD technology? Bring your own device (BYOD) is a new trend or plan in which end users (employee or individual) can user their own device(s) or application(s) or network(s) for business/work purpose. In typical IT environments, huge funds are invested during initial setup of IT infrastructures, which include computers, laptops, telephones, networks, Wi-Fi, etc. In contrast, if an enterprise employee brings his/her own device to work, the infrastructure cost of the enterprise is significantly reduced, and at the same time also making the employee feel more comfortable and convenient when using their own devices and/or computer applications, thereby enhancing productivity. For instance, consider an enterprise using a standard application for image editing, i.e. Microsoft Paint. An employee of the same enterprise may use different image editing application tools for his own purpose. Now, when the employee understands that the standard application used in the enterprise is less efficient and costly, the employee compares with his own image editing application, and may approach the enterprise for letting him use his own image editing tool for business purpose, which can then be accepted by the enterprise, thereby allowing the employee to use his own imaging editing tool for business purpose after implementing proper security measures. This is commonly referred to as BYOA (Bring Your Own Application). If one or more employee(s) bring their own application(s) to enterprises for different business purposes, costs of the enterprise are significantly reduced, and quality/performance of enterprise is increased.
P a g e 5 Specifically, BYOA (Bring Your Own Application) is one of the best strategies to bring out better business tool for enterprises from one or more employee(s). Fig 1: No. of PC and Non-PC Sales, 2011 (millions) Source: Deloitte, 2011 The above Fig. 1 shows the number of PC and Non-PC sales in year 2011. Last year, persistence of endusers demanding to leverage their own tablet computers and smart phones to extend their productivity even if they had to purchase the devices themselves, has led many IT departments to adopt less restrictive policies, allowing employees basic connectivity or, increasingly, full access to the IT network and corporate applications. This trend is likely irreversible and every IT organization will need to quickly adapt to the consumer device phenomenon.
P a g e 6 Benefits of bring your own device (BYOD) Increased productivity: BYOD allows employees to use their own devices or download application(s) for business purpose. Therefore, an employee is familiar with the device and their applications, and, with most personal devices being cutting-edge, the enterprise also benefits from the latest features. Also users upgrade to the latest hardware more frequently and take better care of their own infrastructure. Enhanced employee convenience and morale: Every time an employee joins a new enterprise, the employee will require considerable amount of time to adapt to the new environment. For instance, 15 to 30 days is generally required to adapt to the new enterprise computer/laptop. If the employee can use his/her own device, the time required for adaptation is significantly reduced. Reduced IT infrastructure cost: If each employee of an enterprise use his/her own device, it can heavily reduce total IT infrastructure cost. Moreover, enterprises need not worry about setting up infrastructure for a long run. Flexible Working Culture: If the enterprise allows an employee to use his/her own latest device(s) / application(s), the employees can be given a flexible environment to work in giving rise to an attractive working culture.
P a g e 7 Risks of bring your own device (BYOD) Support of many different devices: Though there are many benefits of allowing BYOD, there are several risks that concern the IT industry. First of all, since it is not one standard device that everyone is using, IT department of an enterprise will need to support many different types of devices and operating systems, making it very difficult to mitigate an issue with a device when the user needs assistance. Threat to information or data security: While implementing BYOD policy/technology, there is a possibility of data theft within enterprises, increasing the risk of having a security breach. When an employee leaves the company, they do not have to give back the device, and therefore company applications and other data may still be present on their device, leading to the confidential content being unsecure. Malware attacks: When executing a new application other than enterprise standard application, there are possibilities for spreading malware attacks within the enterprise network. Data, device and network management: Managing and connecting different type of devices/applications to enterprise network is complex. Device stolen: If an employee s device is stolen this was previously used for storing enterprises data. There is a question on security of enterprises data in the stolen device.
P a g e 8 BYOD Adoption Strategy There is a tremendous need for integrated tools that can be used for managing or connecting seamlessly different types of end user owned devices or employee own application(s) or employee own network(s) with sync to enterprise networks. Managing different types of end users or employee owned devices, or employee own application(s) or employee own network(s) require different levels of authentication and access level. Fig 2: BYOD adoption Scenario Source: Cisco Bring Your Own Device, Cisco Systems Different businesses will approach BYOD with different expectations across a spectrum of adoption scenarios shown in above Fig.2. Every business needs a BYOD strategy, even if the intention is to deny all devices except IT approved and managed devices. Infrastructural Issues Different types of devices operate at different speeds and with different operating systems. This can be difficult for an IT department to set up and maintain infrastructure to support different device needs.
P a g e 9 Concerns with BYOD As per the survey conducted by a major company where 500 IT professionals were surveyed at organizations of various sizes, and these key findings were disclosed. As with most BYOD researches, security, managing network users and devices, operating platform are the top concerns the among organizations. Fig 3: Top concerns with BYOD Source: Connected, Official Blog of PC Connection, Inc. As per Fig. 3, top concerns with BYOD include security of company data due to its high priority, due to which most organizations are restricting what applications and company data BYOD devices can access. Almost every organization with a policy in place allows personal devices to access email. However, applications with more sensitive information such as ordering and inventory platforms are only allowed to be accessed by personal devices in about 1 in 10 organizations. As regards the managing network and devices issues, there is a strong need for integrated enterprise tools, which can be used for managing or seamlessly connecting different types of end user owned devices, or employee owned application(s), or employee owned network(s) with sync to enterprise networks. Managing different types of end users, or employee owned devices, or employee owned application(s), or employee owned network(s) require different levels of authentication and access level.
P a g e 10 SWOT Analysis Strengths: 1) Increased Productivity 2) Increased Employee Morale and satisfaction 3) Flexible Working Culture 4) Reduced IT cost of company 5) Simplified IT Infrastructure 6) Employee convenience 7) Use of efficient business tools/applications/devices Weakness: 1) Compatibility issue 2) Security Breach 3) Affects organization and client relationship when valuable employee exits from the organization with their own device(s) 4) Connecting and managing different types of application(s)/ network connectivity / operating systems/devices with enterprise network is complex Opportunity: 1) Gain business intelligence for new ideas 2) Growth in middleware and mobile device management technology 3) Growth in software development for BYOD devices mobile / smart phone / laptop 4) Huge demand for memory management, anti-virus and anti-spyware software development technology 5) Huge demand for unified collaborative tool for managing different type of application(s)/ network connectivity / operating system with enterprise system(s) as well as employee device(s) Threat: 1) Data stolen 2) Device stolen 3) Habitual attitude affect productivity 4) Work life balance can be affected
P a g e 11 STRENGTH WEAKNESS Increase Productivity Compatibility issue Increase Employee Morale and satisfaction Security Breach Flexible Working Culture Affect organization and client relationship Reduce IT cost of company when valuable employee exist from Simplified IT Infrastructure organization with their own device(s) Employee feel convenient while using their Connecting and managing and different own devices type of application(s)/ network Bring out better efficient business tool connectivity / operating system with enterprise network is complex OPPORTUNITY THREAT Gain business intelligence for new ideas Data stolen Growth in middleware and mobile device Device stolen management technology Habitual attitude affects productivity Growth in software development for BYOD Work life balance can be affected devices mobile/smart phone/ laptop Security Breech on Enterprise data Huge demand for memory management, anti-virus and anti-spyware software development technology Huge demand for unified collaborative tool for managing different type of application(s)/network connectivity/opera ting system with enterprise system(s) as well as employee device(s)
P a g e 12 Patent Landscape Analysis The present Patent Landscape study focuses on various granted and pending US Patent Applications in the domain of BYOD/Allied terminologies (solutions). Two exemplary strings that were used for conducting the initial analysis are mentioned below: a. ("Bring your own device" OR "bring your own technology" OR "bring your own phone" OR "bring your own PC" OR "bring your own mobile" OR "bring your own application" OR "Bring your own network" OR BYOD OR BYOT OR BYOP OR BYOPC OR BYOM OR BYOA OR BYOC OR BYON OR "bring your own computer" OR "Employee owned computer device" OR "employee owned device" OR "employee owned computer"), which resulted into 513 US granted Patents and 187 US Publications. b. CCL/726$ AND ACLM/("bring your own" or ("home" and ("office" or corporate or enterprise or organization or organization or employee or work))) and (mobile or laptop or computer or pda or "computing device"), which resulted into 48 US granted Patents and 76 US patent Publications. In total, 31 granted patents were found to be directly relevant from 561 patents based on analysis with respect to multiple attributes and factors pertaining to the IT industry. Similarly, out of 263 patent publications, 85 patent publications were found to be relevant. The list of these patents and the techniques used for analysis of relevant patents was performed based on internal strategies devised by IIPRD and can only be shared on explicit requests.
P a g e 13 Based on above data, different types of analysis were performed and corresponding results are as follows: 1) Filling trend Analysis (Number of BYOD related US patent publications over the time period) 2) US classification distribution versus BYOD related granted patents 3) US classification distribution versus BYOD related patent publications 4) International classification distribution versus BYOD related granted patents 5) International classification distribution versus BYOD related patent publications 6) Technology trend (Device, Security, Software and Network) 7) Top Ten Assignees 8) Trend in BYOD related US Publication for Software Applications 9) Trend in BYOD related US granted patents for Software Applications 10) Trend in BYOD related US Publication for Network based Applications 11) Trend in BYOD related US Granted Patents for Network based Applications 12) Trend in BYOD related US Publications for Security based Applications 13) Trend in BYOD related US Granted Patents for Security based Applications 14) Trend in BYOD related US Publications for Device based Applications 15) Trend in BYOD related US granted patents for Device based Applications
P a g e 14 Filling trend Analysis Number of BYOD related US patent publications over the time period The above graph shows the filing trend of US publication over the year. BYOD era travels from year 1998 to 2005 in slow pace, but then from the year 2006 onwards, the number of filings have significantly increased. Particularly, In the year 2008, 4 applications were published, wherein the number In the year 2009 increased to 10, in 2010 to 13, in 2011 it decreased to 12, and In year 2012 it increased to 37 (combination of year 2009, 2010, 2011) and upto mid year 2013 it is 18.
P a g e 15 US classification distribution Vs BYOD related granted patents The above graph shows relation between BYOD granted patents distribution versus US classification. Most BYOD granted patents were filed under US classification code 726, 709,455, 370 and 713. Especially, US classification code 726 for Information security, 709 for Electrical computers and digital processing systems: multicomputer data transferring, 455 for Telecommunications, which occupy most of the filing space. Particularly, most BYOD granted patents are filled under Information security Classification 726 of sub classification ACCESS CONTROL OR AUTHENTICATION (2) NETWORK (3) AUTHORIZATION (4) PREVENTION OF UNAUTHORIZED USE OF DATA INCLUDING PREVENTION OF PIRACY, PRIVACY VIOLATIONS, OR UNAUTHORIZED DATA MODIFICATION (26) and ACCESS CONTROL (27).
P a g e 16 Distribution of US classification Vs BYOD related patent publications The above graph represents distribution of BYOD US publications versus US classification. Most BYOD publications were filed under US classification code 726, 709,711, 455 and 705. Especially, US classification code 726 for Information security, 709 for 'Electrical computers and digital processing systems: multicomputer data transferring', 711 for 'Electrical computers and digital processing systems: memory', which occupy most of the filing space. Particularly, BYOD publications are mostly filled under Information security Classification 726 of sub classification Access control or authentication (2), Network (3), Authorization (4), Vulnerability assessment (25), Monitoring or scanning of software or data including attack prevention (22) and virus detection (24).
P a g e 17 Distribution of International classification versus granted BYOD related patents The above graph represents relation between BYOD patents distributed versus International classification. Most BYOD patents were filed under International classification code G06F15, G06F11, H04L12, and G06F21. In particular, International classification code G06F15/00 - Digital computers in general; Data processing equipment in general, G06F11 - Error detection; Error correction; Monitoring, H04L12 - Data switching networks and G06F21 -Security arrangements for protecting computers, components thereof, programs or data against unauthorized activity, occupy most of the filing space.
P a g e 18 Distribution of International classification versus BYOD related patent publications The above graph shows relation between BYOD patent Publications and different international classification. Most patent Publications distributed under International classification G06F21, H04W12, G06F12, G06F15, H04L12 and H04H20. Especially International classification code G06F21 -Security arrangements for protecting computers, components thereof, programs or data against unauthorized activity, H04W12 -Services or facilities specially adapted for wireless communication networks Messaging, e.g. SMS, G06F12 -Accessing, addressing or allocating within memory systems or architectures, G06F15 -Digital computers in general; Data processing equipment in general, H04L12 - Data switching networks and H04H20 -Arrangements for broadcast or for distribution combined with broadcast, which occupy most of the filing space.
P a g e 19 Technology Trend The above graph represents the trend in technology which is mostly distributed under BYOD (Bring Your Own Device), BYON (Bring Your Own Network), BYOA (Bring Your Own Application), BYOP (Bring Your Own Portal/Phone), BYOPC (Bring Your Own PC) and BYOT (Bring Your Own Technology). This graph shows the kind of technology being used in the industry. According to the graph, under BYOD (Bring Your Own Device), BYON (Bring Your Own Network), BYOA (Bring Your Own Application) mostly occupy the patent filing space.
P a g e 20 Top Ten Assignees The above graph represents the top ten assignees. Leading the list with the highest number of patents filed (25%) is California (US) based 1) Vmware Inc. It mostly works on desktop virtualization. Followed closely by another 2) California (US) Juniper Networks Inc., 3) President and founder of Teleshuttle Corporation Richard Reisman, 4) Mitel Networks Corporation, 5) Eagle Harbour Holdings LLC, 6)Srinivas Kumar, 7) Microsoft Corp., 8)Acquis Technology, 9) Acquis LLC and 10)Ibahn General Holdings. It clearly shows that most of the top assignees have their base in USA.
P a g e 21 Trend in BYOD related US Publication related to Software Applications The above graph represents the trend in publication of patent applications pertaining to software applications for BYOD based technologies. From the graph, it can be seen that there is an increasing trend in the publication of patent applications from 2009 up till 2012. However, there has been a rapid decrease in the publications in 2013 due to growing interest in cyber security based applications from around the cyber security based companies.
P a g e 22 Trend in BYOD related US granted patents for Software Applications The above graph represents the trend in grant of patents pertaining to software applications for BYOD based technologies. From the graph, it can be seen that there is an increasing trend in grant of patents from 2008 up till 2012.
P a g e 23 Trend in BYOD US related Publications for Network based Applications The above graph represents the trend in publication of patent applications pertaining to network based applications for BYOD based technologies. From the graph, it can be seen that there is an increasing trend in the publication of patent applications from 2009 up till 2012. However, there has been a rapid decrease in the publications in 2013 due to growing interest in cyber security based applications from around the cyber security based companies.
P a g e 24 Trend in BYOD related US Granted Patents for Network based Applications The above graph represents the trend in grant of patents pertaining to network based applications for BYOD based technologies. From the graph, it can be seen that there is an increasing trend in grant of patents from 2010 up till 2012.
P a g e 25 Trend in BYOD related US Publications for Security based Applications The above graph represents the trend in publication of patent applications pertaining to security based applications for BYOD based technologies. From the graph, it can be seen that there is an rapid increasing trend in the publication of patent applications from 2010 up till 2013.
P a g e 26 Trend in BYOD related US Granted Patents for Security based Applications The above graph represents the trend in grant of patents pertaining to security based applications for BYOD based technologies. From the graph, it can be seen that few patents have been granted till 2012.
P a g e 27 Trend in BYOD related US Publications for Device based Applications The above graph represents the trend in publication of patent applications pertaining to device based applications for BYOD based technologies. From the graph, it can be seen that there is a rapid increasing trend in the publication of patent applications from 2010 up till 2012. However, there has been a rapid decrease in the publications in 2013 due to growing interest in cyber security based applications from around the cyber security based companies.
P a g e 28 Trend in BYOD related US granted Patents for Device based Applications The above graph represents the trend in grant of patents pertaining to device based applications for BYOD based technologies. From the graph, it can be seen that three patents have been granted in 2009 and since then it has been a steady flow of 2 patents granted in 2010, 2011 and 2012.
P a g e 29 Conclusion From the overall study, we can assimilate that there is a huge scope for BYOD technology in enterprise level as well as end user level. In future, most of the major IT firms may start implementing BYOD policies or technologies not only because it reduces cost but also brings it enables use of the best business tools over the industry and gives desired efficiency in the work environment. Considering these factors, most IT industries may show keen interest to implement the above mentioned patentpending/patented technologies in their Enterprises. Even though, there are many information security concerns perceived while implementing BYOD, comparing the benefits of BYOD, the risks are relatively calculated and can be controlled and managed. Today, there exists a need for collaborative tools in enterprises that can manage and adapt different types of new end user devices/operating system(s)/ network system(s) / software application(s) with different types/ levels of secure authentication/ access control over different types/ roles of end user(s). Once IT industries starts implementing these collaborative tools, there would be assured long term growth for BYOD technology in IT Industry.
P a g e 30 DISCLAIMER The information provided in this sample report is exemplary and based on database and information sources that are believed to be reliable by IIPRD/Khurana & Khurana, Advocates and IP Attorneys (K&K). A complete list of patent documents retrieved is not disclosed herein. IIPRD disclaims all warranties as to the accuracy, completeness or adequacy of such information. The above sample report is prepared based on the search conducted on the keywords and other information extracted from the invention disclosure and subjectivity of the researcher and analyst. Neither IIPRD nor its affiliates nor any of its proprietors, employees (together, "personnel") are intending to provide legal advice in this matter.