SlideShare a Scribd company logo
Advanced Claiming Strategies
for Artificial Intelligence/Machine
Learning Inventions
AI/ML発明の高度なクレーム戦略
Knobbe Japan Practice Series
April 8, 2022
Mauricio Uribe
mauricio.urbe@knobbe.com
Kenny Masaki
kenny.masaki@knobbe.com
Machine Learning/Artificial Intelligence
• Minimal Requirements for an Algorithm to be ML
⎼ Representation (表現) – Classifiers or basic language that a computer can
understand
⎼ Evaluation (評価)– Inputting data and generating output (score)
⎼ Optimization (最適化)– Developing a strategy to get from inputs to outputs
1 Supervised Learning
教師あり学習
2Unsupervised Learning
教師なし学習
3Semi-Supervised Learning
半教師あり学習
4Reinforcement Learning
強化学習
Learning Models
© 2022 Knobbe Martens
Best Practices – Specification Drafting 明細書作成時のベストプラクティス
3
Best Practices –ベストプラクティス-
• U.S. Best Practices アメリカでのベストプラクティス
1. Include description of the technical substance underlying the AI technology. Simply relying on
black box description of “artificial intelligence” or “machine learning” will likely not be sufficient.
AI技術の基礎となる技術内容を説明を含めること。単に、“artificial intelligence” や “machine
learning” をブラックボックス的に使う事では通常十分ではない。
2. Avoid personification of “modules” or “processors”
“modules” or “processors”の擬人化を避ける。
3. Include detailed step-by-step algorithms and concrete examples of how the AI/machine
learning can be applied.
詳細なステップごとのアルゴリズムと、どのようにAI/機械学習が適用されるかの具体的な
例を含める。
4
Exemplary Algorithm Types アルゴリズムタイプの例示
5
• Association Rule Analysis
• Apriori
• Equivalence Class Transformation
• FP-Growth
• Hidden Markov Model
• Classification
• K-Nearest Neighbors
• Decision/Boosted Trees
• Logic Regression/Naive-Bayes
• Neural Networks
• Support Vector Machine (SVM)
• Clustering and Dimensionality
• K-Means
• Singular Value Decomposition
• Principle Component Analysis
• Regression
• Linear Regression
• Polynomial Regression
• Decision Trees
• Random Forests
Unsupervised Learning Algorithms Supervised Learning Algorithms
Classification
Output
Continuous
Output
© 2022 Knobbe Martens
Protecting ML/AI Related Products and Services
ML/AI関連製品及びサービスの保護
6
Protecting ML Technologies ML技術の保護
7
• Potential Patentable
Subject Matter
⎼ Collecting or Forming
Data Set
⎼ Supplementing Data
Set
• Potential Patentable
Subject Matter
⎼ Modifications/Improve
ments to Al algorithms
• Potential Patentable
Subject Matter
⎼ Post-processing
feedback
⎼ Use of ML processed
data
Data Set Generation and Inputs
データセット生成及び入力
ML Processing
MLプロセス
ML Results and Post Processing
ML結果及び後処理
© 2022 Knobbe Martens
Claim Drafting - Collecting or Forming Data Set
クレイム作成ーデータセットの収集または生成
8
Example 39 - Method for Training a Neural Network for Facial Detection
USPTOが例示する、特許適格性を有する例
1. A computer-implemented method of training a neural network for facial detection
comprising:
collecting a set of digital facial images from a database;
applying one or more transformations to each digital facial image including mirroring,
rotating, smoothing, or contrast reduction to create a modified set of digital facial images;
creating a first training set comprising the collected set of digital facial images, the modified
set of digital facial images, and a set of digital non-facial images;
training the neural network in a first stage using the first training set;
creating a second training set for a second stage of training comprising the first training set
and digital non-facial images that are incorrectly detected as facial images after the first stage
of training; and
training the neural network in a second stage using the second training set.
Example 39 - Method for Training a Neural Network for Facial Detection
USPTOが例示する、特許適格性を有する例
1. A computer-implemented method of training a neural network machine learning algorithm
for facial detection comprising:
collecting a set of digital facial images from a database;
applying one or more transformations to each digital facial image including mirroring,
rotating, smoothing, or contrast reduction to create a modified set of digital facial images;
creating a first training set comprising the collected set of digital facial images, the modified
set of digital facial images, and a set of digital non-facial images;
training the neural network machine learning algorithm in a first stage using the first training
set;
creating a second training set for a second stage of training comprising the first training set
and digital non-facial images that are incorrectly detected as facial images after the first
stage of training; and
training the neural network machine learning algorithm in a second stage using the second
training set.
Method for Training a Neural Network for Facial Detection – Sample Dependent Claims
従属クレームの例
11
2. The computer-implemented method as recited in Claim 1, wherein the
machine learning algorithm corresponds to a supervised learning-based
machine learning algorithm.
3. The computer-implemented method as recited in Claim 1, wherein the
supervised learning-based machine learning algorithm corresponds to a
neural network.
4. The computer-implemented method as recited in Claim 1 further
comprising:
obtaining a set of target input digital facial images;
processing the set of target input digital facial images with the trained
machine learning algorithm; and
generating a processing result corresponding to the processing.
Sample Claim – Predicting Failure – Data Sources
12
Claim Figure 2
1. A failure predicting apparatus for predicting a failure timing of a
printed circuit board included in a management target device, the
failure predicting apparatus comprising:
a machine learning device that learns the failure timing of the printed
circuit board included in the management target device with respect to
an operating state of the management target device,
wherein the machine learning device includes a state observing unit
that observes, as state variables indicating a current environmental
state, operating state data indicating an operating state of the
management target device and device configuration data indicating a
device configuration of the management target device,
a label data acquiring unit that acquires, as label data, maintenance
history data indicating a maintenance history of the management
target device, and
a learning unit that, by using the state variables and the label data,
learns the failure timing of the printed circuit board included in the
management target device, the operating state data, and the device
configuration data such that the failure timing is associated with the
operating state data and the device configuration data.
Sample Claim – Predicting Failure – Data Sources
13
1. A method for management of a target device, the method comprising:
obtaining a first set of inputs corresponding to state observing unit data,
wherein the state observing unit data corresponds to state variables
indicating a current environmental state, operating state data indicating an
operating state of the target device;
obtaining device configuration data indicating a device configuration of the
management target device,
obtaining a second set of inputs corresponding to label data unit data,
wherein the label data that acquires, as label data, maintenance history data
indicating a maintenance history of the management target device, and
processing, using a machine learned algorithm, the first set of inputs and the
second set of inputs, to characterize a likelihood that the target device will
experience a failure.
© 2022 Knobbe Martens
Claim Drafting - Use of ML Processed Data
クレイム作成 – ML処理済みデータの使用
14
Sample Claim – Use of ML Processed Data ML 処理後データの使用
15
1. A system for charactering user input in network-based services, the system comprising:
one or more computing devices associated with a processor and a memory for executing
computer-executable instructions to implement an input management service, wherein the
input management service is configured to:
obtain a set of customer inputs as customer feedback related to one or more network
services hosted on behalf of network service providers;
vectorize the set of customer inputs to form a set of vectorized customer inputs using a
machine learned algorithm, wherein vectorizing the set of customer inputs includes
generating an individual numerical vector for individual customer inputs from the set of
customer inputs;
cluster the set of vectorized customer inputs, wherein clustering the set of vectorized
inputs includes aggregating semantically similar vectorized customer inputs based on
comparison of the numerical vectors; and
generate a processing result based on the prioritized, filtered clusters.
Sample Claim – Use of ML Processed Data – Sample Dependent Claims 従属クレームの例
16
2. The system as recited in Claim 1, wherein the machine learning
algorithm corresponds to a unsupervised learning-based machine learning
algorithm.
3. The system as recited in Claim 1, wherein the unsupervised learning-
based machine learning algorithm corresponds to a clustering and
dimensionality algorithm.
Sample Claim – Machine Learning System 機械学習システム
17
1. A machine-implemented method, comprising:
collecting a plurality of human-generated requests for each of a plurality of task
categories to create a training database of user requests;
extracting a training feature vector from each user request in the training database by
assigning a binary value to each different word in the user request to form a training
data set having a plurality of training feature vectors for each task category;
processing the training feature vectors in the training data set to determine a task
classifier model for each task category;
receiving an additional request from a user, the additional request being classifiable into
one of the task categories; and
comparing an extracted feature vector from the additional request to the task classifier
model to determine a predicted task category for the additional request.
Thank you!

More Related Content

PDF
IRJET - Automated Fraud Detection Framework in Examination Halls
PDF
Efficient Small Template Iris Recognition System Using Wavelet Transform
PDF
Understanding and Protecting Artificial Intelligence Technology (Machine Lear...
PDF
Knobbe practice webinar series intellectual property strategies for artific...
PDF
Challenges for machine learning systems toward continuous improvement
PDF
Protecting Artificial Intelligence/Machine Learning Inventions in the United ...
PDF
Analysis of Neocognitron of Neural Network Method in the String Recognition
PDF
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...
IRJET - Automated Fraud Detection Framework in Examination Halls
Efficient Small Template Iris Recognition System Using Wavelet Transform
Understanding and Protecting Artificial Intelligence Technology (Machine Lear...
Knobbe practice webinar series intellectual property strategies for artific...
Challenges for machine learning systems toward continuous improvement
Protecting Artificial Intelligence/Machine Learning Inventions in the United ...
Analysis of Neocognitron of Neural Network Method in the String Recognition
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...

Similar to Advanced Claiming Strategies for Artificial Intelligence/Machine Learning Inventions - Knobbe Practice Webinar Series (8)

PDF
Knobbe Practice Webinar Series Strategic Considerations for Claim Drafting – ...
PPTX
製造業におけるインクリメンタル学習異常検知事例の紹介
PDF
機械学習応用システムの安全性の研究動向と今後の展望
PDF
Anomaly Detection and Automatic Labeling with Deep Learning
PDF
Strategic Considerations for Claim Drafting Electrical & Telecommunications ...
PPTX
Artificial intelligence
DOCX
artificial-neural-network-seminar-report.docx
Knobbe Practice Webinar Series Strategic Considerations for Claim Drafting – ...
製造業におけるインクリメンタル学習異常検知事例の紹介
機械学習応用システムの安全性の研究動向と今後の展望
Anomaly Detection and Automatic Labeling with Deep Learning
Strategic Considerations for Claim Drafting Electrical & Telecommunications ...
Artificial intelligence
artificial-neural-network-seminar-report.docx
Ad

More from Knobbe Martens - Intellectual Property Law (20)

PPTX
Trending Topics in ITC Litigation with Knobbe Martens
PPTX
Advanced Strategies for PTAB Practice: Focus on Petitioners
PDF
Trademarks, the Metaverse, and NFTs, Oh My!
PPTX
Intellectual Property Considerations for Designers & Artist
PPTX
What You Should Know About Responding to IP Threats and Assertions - Knobbe M...
PPTX
What You Should Know About Responding to IP Threats and Assertions - Knobbe M...
PDF
What You Should Know About Open-Source Software and Third-Party Vendors - Kno...
PPTX
Surfing the Waves of US IP Trends: Tips for Smoothly Riding the Waves in Writ...
PDF
What You Should Know About Open-Source Software and Third-Party Vendors - Kno...
PPTX
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
PDF
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
PPTX
Knobbe Practice Webinar Series: Strategic Considerations in Design Patent Fi...
PDF
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
PDF
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
PDF
Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...
PPTX
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting –...
PDF
Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...
PPTX
Part II - What You Should Know About Employment and Vendor Agreements – Part...
PPTX
What You Should Know About Employment and Vendor Agreements - Knobbe Martens ...
PDF
Part II - What You Should Know About Non-Disclosure Agreements - Knobbe Marte...
Trending Topics in ITC Litigation with Knobbe Martens
Advanced Strategies for PTAB Practice: Focus on Petitioners
Trademarks, the Metaverse, and NFTs, Oh My!
Intellectual Property Considerations for Designers & Artist
What You Should Know About Responding to IP Threats and Assertions - Knobbe M...
What You Should Know About Responding to IP Threats and Assertions - Knobbe M...
What You Should Know About Open-Source Software and Third-Party Vendors - Kno...
Surfing the Waves of US IP Trends: Tips for Smoothly Riding the Waves in Writ...
What You Should Know About Open-Source Software and Third-Party Vendors - Kno...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
Knobbe Practice Webinar Series: Strategic Considerations in Design Patent Fi...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting –...
Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...
Part II - What You Should Know About Employment and Vendor Agreements – Part...
What You Should Know About Employment and Vendor Agreements - Knobbe Martens ...
Part II - What You Should Know About Non-Disclosure Agreements - Knobbe Marte...
Ad

Recently uploaded (20)

PPTX
Income under income Tax Act..pptx Introduction
PPTX
BL - Chapter 1 - Law and Legal Reasoning
PDF
Palghar-SGupta-ScreesnShots-12Aug25.pdf The image of the voter list with phot...
PPT
Understanding the Impact of the Cyber Act
PDF
OpenAi v. Open AI Summary Judgment Order
PPTX
4-D...Preparation of Research Design.pptx
PPTX
What Happens to Your Business If You Become Incapacitated
PPTX
Sexual Harassment Prevention training class
PPTX
Court PROCESS Notes_Law Clinic Notes.pptx
PDF
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
PDF
Constitution of India and fundamental rights pdf
PPTX
ART OF LEGAL WRITING IN THE CBD [Autosaved].pptx
PDF
NRL_Legal Regulation of Forests and Wildlife.pdf
PDF
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
PPTX
Behavioural_Approach_Public_Administration_Zambia_USA.pptx
PPT
Gender sensitivity and fair language implementation
PDF
AI in Modern Warfare and Business Ethics Ortynska Law Ventures Cafe.pdf
PPTX
POSH Awareness and policy ppt with all design covering .
PPTX
PoSH act in a nutshell by Lovely Kumari .pptx
PPTX
Law of Torts , unit I for BA.LLB integrated course
Income under income Tax Act..pptx Introduction
BL - Chapter 1 - Law and Legal Reasoning
Palghar-SGupta-ScreesnShots-12Aug25.pdf The image of the voter list with phot...
Understanding the Impact of the Cyber Act
OpenAi v. Open AI Summary Judgment Order
4-D...Preparation of Research Design.pptx
What Happens to Your Business If You Become Incapacitated
Sexual Harassment Prevention training class
Court PROCESS Notes_Law Clinic Notes.pptx
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
Constitution of India and fundamental rights pdf
ART OF LEGAL WRITING IN THE CBD [Autosaved].pptx
NRL_Legal Regulation of Forests and Wildlife.pdf
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
Behavioural_Approach_Public_Administration_Zambia_USA.pptx
Gender sensitivity and fair language implementation
AI in Modern Warfare and Business Ethics Ortynska Law Ventures Cafe.pdf
POSH Awareness and policy ppt with all design covering .
PoSH act in a nutshell by Lovely Kumari .pptx
Law of Torts , unit I for BA.LLB integrated course

Advanced Claiming Strategies for Artificial Intelligence/Machine Learning Inventions - Knobbe Practice Webinar Series

  • 1. Advanced Claiming Strategies for Artificial Intelligence/Machine Learning Inventions AI/ML発明の高度なクレーム戦略 Knobbe Japan Practice Series April 8, 2022 Mauricio Uribe mauricio.urbe@knobbe.com Kenny Masaki kenny.masaki@knobbe.com
  • 2. Machine Learning/Artificial Intelligence • Minimal Requirements for an Algorithm to be ML ⎼ Representation (表現) – Classifiers or basic language that a computer can understand ⎼ Evaluation (評価)– Inputting data and generating output (score) ⎼ Optimization (最適化)– Developing a strategy to get from inputs to outputs 1 Supervised Learning 教師あり学習 2Unsupervised Learning 教師なし学習 3Semi-Supervised Learning 半教師あり学習 4Reinforcement Learning 強化学習 Learning Models
  • 3. © 2022 Knobbe Martens Best Practices – Specification Drafting 明細書作成時のベストプラクティス 3
  • 4. Best Practices –ベストプラクティス- • U.S. Best Practices アメリカでのベストプラクティス 1. Include description of the technical substance underlying the AI technology. Simply relying on black box description of “artificial intelligence” or “machine learning” will likely not be sufficient. AI技術の基礎となる技術内容を説明を含めること。単に、“artificial intelligence” や “machine learning” をブラックボックス的に使う事では通常十分ではない。 2. Avoid personification of “modules” or “processors” “modules” or “processors”の擬人化を避ける。 3. Include detailed step-by-step algorithms and concrete examples of how the AI/machine learning can be applied. 詳細なステップごとのアルゴリズムと、どのようにAI/機械学習が適用されるかの具体的な 例を含める。 4
  • 5. Exemplary Algorithm Types アルゴリズムタイプの例示 5 • Association Rule Analysis • Apriori • Equivalence Class Transformation • FP-Growth • Hidden Markov Model • Classification • K-Nearest Neighbors • Decision/Boosted Trees • Logic Regression/Naive-Bayes • Neural Networks • Support Vector Machine (SVM) • Clustering and Dimensionality • K-Means • Singular Value Decomposition • Principle Component Analysis • Regression • Linear Regression • Polynomial Regression • Decision Trees • Random Forests Unsupervised Learning Algorithms Supervised Learning Algorithms Classification Output Continuous Output
  • 6. © 2022 Knobbe Martens Protecting ML/AI Related Products and Services ML/AI関連製品及びサービスの保護 6
  • 7. Protecting ML Technologies ML技術の保護 7 • Potential Patentable Subject Matter ⎼ Collecting or Forming Data Set ⎼ Supplementing Data Set • Potential Patentable Subject Matter ⎼ Modifications/Improve ments to Al algorithms • Potential Patentable Subject Matter ⎼ Post-processing feedback ⎼ Use of ML processed data Data Set Generation and Inputs データセット生成及び入力 ML Processing MLプロセス ML Results and Post Processing ML結果及び後処理
  • 8. © 2022 Knobbe Martens Claim Drafting - Collecting or Forming Data Set クレイム作成ーデータセットの収集または生成 8
  • 9. Example 39 - Method for Training a Neural Network for Facial Detection USPTOが例示する、特許適格性を有する例 1. A computer-implemented method of training a neural network for facial detection comprising: collecting a set of digital facial images from a database; applying one or more transformations to each digital facial image including mirroring, rotating, smoothing, or contrast reduction to create a modified set of digital facial images; creating a first training set comprising the collected set of digital facial images, the modified set of digital facial images, and a set of digital non-facial images; training the neural network in a first stage using the first training set; creating a second training set for a second stage of training comprising the first training set and digital non-facial images that are incorrectly detected as facial images after the first stage of training; and training the neural network in a second stage using the second training set.
  • 10. Example 39 - Method for Training a Neural Network for Facial Detection USPTOが例示する、特許適格性を有する例 1. A computer-implemented method of training a neural network machine learning algorithm for facial detection comprising: collecting a set of digital facial images from a database; applying one or more transformations to each digital facial image including mirroring, rotating, smoothing, or contrast reduction to create a modified set of digital facial images; creating a first training set comprising the collected set of digital facial images, the modified set of digital facial images, and a set of digital non-facial images; training the neural network machine learning algorithm in a first stage using the first training set; creating a second training set for a second stage of training comprising the first training set and digital non-facial images that are incorrectly detected as facial images after the first stage of training; and training the neural network machine learning algorithm in a second stage using the second training set.
  • 11. Method for Training a Neural Network for Facial Detection – Sample Dependent Claims 従属クレームの例 11 2. The computer-implemented method as recited in Claim 1, wherein the machine learning algorithm corresponds to a supervised learning-based machine learning algorithm. 3. The computer-implemented method as recited in Claim 1, wherein the supervised learning-based machine learning algorithm corresponds to a neural network. 4. The computer-implemented method as recited in Claim 1 further comprising: obtaining a set of target input digital facial images; processing the set of target input digital facial images with the trained machine learning algorithm; and generating a processing result corresponding to the processing.
  • 12. Sample Claim – Predicting Failure – Data Sources 12 Claim Figure 2 1. A failure predicting apparatus for predicting a failure timing of a printed circuit board included in a management target device, the failure predicting apparatus comprising: a machine learning device that learns the failure timing of the printed circuit board included in the management target device with respect to an operating state of the management target device, wherein the machine learning device includes a state observing unit that observes, as state variables indicating a current environmental state, operating state data indicating an operating state of the management target device and device configuration data indicating a device configuration of the management target device, a label data acquiring unit that acquires, as label data, maintenance history data indicating a maintenance history of the management target device, and a learning unit that, by using the state variables and the label data, learns the failure timing of the printed circuit board included in the management target device, the operating state data, and the device configuration data such that the failure timing is associated with the operating state data and the device configuration data.
  • 13. Sample Claim – Predicting Failure – Data Sources 13 1. A method for management of a target device, the method comprising: obtaining a first set of inputs corresponding to state observing unit data, wherein the state observing unit data corresponds to state variables indicating a current environmental state, operating state data indicating an operating state of the target device; obtaining device configuration data indicating a device configuration of the management target device, obtaining a second set of inputs corresponding to label data unit data, wherein the label data that acquires, as label data, maintenance history data indicating a maintenance history of the management target device, and processing, using a machine learned algorithm, the first set of inputs and the second set of inputs, to characterize a likelihood that the target device will experience a failure.
  • 14. © 2022 Knobbe Martens Claim Drafting - Use of ML Processed Data クレイム作成 – ML処理済みデータの使用 14
  • 15. Sample Claim – Use of ML Processed Data ML 処理後データの使用 15 1. A system for charactering user input in network-based services, the system comprising: one or more computing devices associated with a processor and a memory for executing computer-executable instructions to implement an input management service, wherein the input management service is configured to: obtain a set of customer inputs as customer feedback related to one or more network services hosted on behalf of network service providers; vectorize the set of customer inputs to form a set of vectorized customer inputs using a machine learned algorithm, wherein vectorizing the set of customer inputs includes generating an individual numerical vector for individual customer inputs from the set of customer inputs; cluster the set of vectorized customer inputs, wherein clustering the set of vectorized inputs includes aggregating semantically similar vectorized customer inputs based on comparison of the numerical vectors; and generate a processing result based on the prioritized, filtered clusters.
  • 16. Sample Claim – Use of ML Processed Data – Sample Dependent Claims 従属クレームの例 16 2. The system as recited in Claim 1, wherein the machine learning algorithm corresponds to a unsupervised learning-based machine learning algorithm. 3. The system as recited in Claim 1, wherein the unsupervised learning- based machine learning algorithm corresponds to a clustering and dimensionality algorithm.
  • 17. Sample Claim – Machine Learning System 機械学習システム 17 1. A machine-implemented method, comprising: collecting a plurality of human-generated requests for each of a plurality of task categories to create a training database of user requests; extracting a training feature vector from each user request in the training database by assigning a binary value to each different word in the user request to form a training data set having a plurality of training feature vectors for each task category; processing the training feature vectors in the training data set to determine a task classifier model for each task category; receiving an additional request from a user, the additional request being classifiable into one of the task categories; and comparing an extracted feature vector from the additional request to the task classifier model to determine a predicted task category for the additional request.