SlideShare a Scribd company logo
INTELLECTUAL
PROPERTY OPTIONS FOR
EMBEDDED SOFTWARE
VINITA A PALANIVELOO PHD
COMPUTER SCIENCE & ENGINEERING
EMBEDDED SOFTWARE COMPONENTS
RTOS - LINUX
• Boot Loader
• Kernel
• Driver
• Application Module
BAREMETAL
• Bootloader
• Driver
INTELLECTUAL PROPERTY
Patent Copyright Trade Secret
PATENT
• Published information to increase technological knowledge available to public
• Twenty years monopoly for time and effort to create
• Software – protect features of program
• Novel Ideas
• Systems
• Methods
• Algorithms
• Functions
• UI - Menu arrangements
• Infringement - Penalty
COPYRIGHT
• Form of expressing ideas
• Source code
• Unique UI components
• Exclusive rights to create derivative
• Automatic upon creation of original work
• Unlikely to create identical code without copying
• No protection to ideas, programs and concepts
TRADE SECRET
• Formula, Process, Tool or Mechanism – Not known or Discoverable by others
• Competitive advantage
• Features of Software (e.g,) Algorithm to detect image in Luminosity
• Not extended to elements reproducible by reverse engineering
• Cannot be subject to infringement
• Prove that trade secret is not known to the market
BOOTLOADER – IP?
• Bootloader is the image for bringing up kernel
• Vendor- proprietary image
• Can be customized
• Unless there is a patent / copyright, the customization is not IP as it is knowledge not a
trade secret
KERNEL – IP?
• Board Support Package
• File System
• Configuration options to build kernel
• Unless there is a patent / copyright, the configuration of kernel is not IP as it is knowledge
not a trade secret
DEVICE DRIVER – IP ?
Processor
P1
Processor
P2
Device
D1
Device
D3
Processor
P1
Device
D2
DR1 - Driver – C
programming
CROSS/ NATIVE
COMPILER
(Vendor)
DR1 Cannot be reused for D2
Unless the specifications for D1 & D2 are identical
DR1 Cannot be reused for P2
The Address Maps vary with vendor
CROSS/ NATIVE
COMPILER
(Vendor)
Only novel algorithms in driver can be IP,
Driver code itself is knowledge not a patent
/ copyright or trade secret
APPLICATION SOFTWARE – IP?
• Be Agile & Market fast
• Document everything to protect by copyright
• Track access permissions and code checkout and access status
• Encrypt IP of Novel algorithms and functions
• Consult IP expert
• User Interface – Layout , design
• Label source with metadata & watermarks
POPULAR MYTHS
• Code reviews make my code vulnerable to copying
• Central repository expose my code to unauthorized copying
• Requirements and bug tracking tool expose my IP
• Version control tools are not safe
METHODS OF PROTECTING SOURCE CODE
• NDA with ownership and copyright well defined – legal implications
• Metadata / Watermarks
• Encryption
• Copyright headline
• Code obfuscation
• Code splitting / APIs
• Protect novel algorithms / Functions with patent/ copyright
• Track code checkout and commits
• Build trust in the team

More Related Content

PPTX
API Design Concepts for Device Programming
PDF
Arputer overview 3413
PDF
Developer Experience & API as a Product
PDF
Huntech
PPTX
Mobile computing
PDF
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
PDF
[AIIM18] Information Management on Giga Projects: it’s Complicated… - Susan S...
PDF
Buonaiuto Mattia - Resume
API Design Concepts for Device Programming
Arputer overview 3413
Developer Experience & API as a Product
Huntech
Mobile computing
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
[AIIM18] Information Management on Giga Projects: it’s Complicated… - Susan S...
Buonaiuto Mattia - Resume

Similar to Protecting Embedded software IP (20)

PDF
Controlling the value in software companies
PPTX
Security for io t apr 29th mentor embedded hangout
PDF
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...
PDF
Como criar um mundo autônomo e conectado - Jomar Silva
PPTX
Software update for embedded systems
PDF
Pwx 90 cdc_guide_for_luw
PDF
TDC2019 Intel Software Day - Inferencia de IA em edge devices
PPTX
Over 20 years of embedded software development a third way emerges
PPTX
Workshop 16 october 2015 paris
PPTX
Embedded devices - Big opportunities in tiny packages
PPTX
Yocto Project Open Source Build System and Collaboration Initiative
PDF
Buy ebook Embedded Linux system design and development 1st Edition P. Raghava...
PPTX
Intellectual property
PDF
Intellectual Property Protection In software
PDF
Embedded Linux system design and development 1st Edition P. Raghavan
PDF
Embedded Linux system design and development 1st Edition P. Raghavan
PDF
FITT Toolbox: Software Patents
PDF
Complete Download Embedded Linux system design and development 1st Edition P....
PDF
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan (Auth.)
PPTX
VIRTUALIZATION -- Parallel Computing -- II
Controlling the value in software companies
Security for io t apr 29th mentor embedded hangout
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...
Como criar um mundo autônomo e conectado - Jomar Silva
Software update for embedded systems
Pwx 90 cdc_guide_for_luw
TDC2019 Intel Software Day - Inferencia de IA em edge devices
Over 20 years of embedded software development a third way emerges
Workshop 16 october 2015 paris
Embedded devices - Big opportunities in tiny packages
Yocto Project Open Source Build System and Collaboration Initiative
Buy ebook Embedded Linux system design and development 1st Edition P. Raghava...
Intellectual property
Intellectual Property Protection In software
Embedded Linux system design and development 1st Edition P. Raghavan
Embedded Linux system design and development 1st Edition P. Raghavan
FITT Toolbox: Software Patents
Complete Download Embedded Linux system design and development 1st Edition P....
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan (Auth.)
VIRTUALIZATION -- Parallel Computing -- II
Ad

Recently uploaded (20)

PPTX
Sustainable Sites - Green Building Construction
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
web development for engineering and engineering
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
CH1 Production IntroductoryConcepts.pptx
PPT
Project quality management in manufacturing
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
PPT on Performance Review to get promotions
PPTX
Lecture Notes Electrical Wiring System Components
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Sustainable Sites - Green Building Construction
CYBER-CRIMES AND SECURITY A guide to understanding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Internet of Things (IOT) - A guide to understanding
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
web development for engineering and engineering
Embodied AI: Ushering in the Next Era of Intelligent Systems
CH1 Production IntroductoryConcepts.pptx
Project quality management in manufacturing
Operating System & Kernel Study Guide-1 - converted.pdf
PPT on Performance Review to get promotions
Lecture Notes Electrical Wiring System Components
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Automation-in-Manufacturing-Chapter-Introduction.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Ad

Protecting Embedded software IP

  • 1. INTELLECTUAL PROPERTY OPTIONS FOR EMBEDDED SOFTWARE VINITA A PALANIVELOO PHD COMPUTER SCIENCE & ENGINEERING
  • 2. EMBEDDED SOFTWARE COMPONENTS RTOS - LINUX • Boot Loader • Kernel • Driver • Application Module BAREMETAL • Bootloader • Driver
  • 4. PATENT • Published information to increase technological knowledge available to public • Twenty years monopoly for time and effort to create • Software – protect features of program • Novel Ideas • Systems • Methods • Algorithms • Functions • UI - Menu arrangements • Infringement - Penalty
  • 5. COPYRIGHT • Form of expressing ideas • Source code • Unique UI components • Exclusive rights to create derivative • Automatic upon creation of original work • Unlikely to create identical code without copying • No protection to ideas, programs and concepts
  • 6. TRADE SECRET • Formula, Process, Tool or Mechanism – Not known or Discoverable by others • Competitive advantage • Features of Software (e.g,) Algorithm to detect image in Luminosity • Not extended to elements reproducible by reverse engineering • Cannot be subject to infringement • Prove that trade secret is not known to the market
  • 7. BOOTLOADER – IP? • Bootloader is the image for bringing up kernel • Vendor- proprietary image • Can be customized • Unless there is a patent / copyright, the customization is not IP as it is knowledge not a trade secret
  • 8. KERNEL – IP? • Board Support Package • File System • Configuration options to build kernel • Unless there is a patent / copyright, the configuration of kernel is not IP as it is knowledge not a trade secret
  • 9. DEVICE DRIVER – IP ? Processor P1 Processor P2 Device D1 Device D3 Processor P1 Device D2 DR1 - Driver – C programming CROSS/ NATIVE COMPILER (Vendor) DR1 Cannot be reused for D2 Unless the specifications for D1 & D2 are identical DR1 Cannot be reused for P2 The Address Maps vary with vendor CROSS/ NATIVE COMPILER (Vendor) Only novel algorithms in driver can be IP, Driver code itself is knowledge not a patent / copyright or trade secret
  • 10. APPLICATION SOFTWARE – IP? • Be Agile & Market fast • Document everything to protect by copyright • Track access permissions and code checkout and access status • Encrypt IP of Novel algorithms and functions • Consult IP expert • User Interface – Layout , design • Label source with metadata & watermarks
  • 11. POPULAR MYTHS • Code reviews make my code vulnerable to copying • Central repository expose my code to unauthorized copying • Requirements and bug tracking tool expose my IP • Version control tools are not safe
  • 12. METHODS OF PROTECTING SOURCE CODE • NDA with ownership and copyright well defined – legal implications • Metadata / Watermarks • Encryption • Copyright headline • Code obfuscation • Code splitting / APIs • Protect novel algorithms / Functions with patent/ copyright • Track code checkout and commits • Build trust in the team