From: hughes@ah.com (Eric Hughes)
 To: cypherpunks@toad.com
 Message Hash: 86329aaa0d5bcebea4a2ebe4fd8e3ab53cd1604d035e26b8b46b0bb9ac7a62fd
 Message ID: <9405251728.AA19322@ah.com>
 Reply To: <m0q6AwJ-0003pXC@jpplap>
 UTC Datetime: 1994-05-25 17:23:35 UTC
 Raw Date: Wed, 25 May 94 10:23:35 PDT
From: hughes@ah.com (Eric Hughes)
Date: Wed, 25 May 94 10:23:35 PDT
To: cypherpunks@toad.com
Subject: Graph isomorphism based PK cryptosystems?
In-Reply-To: <m0q6AwJ-0003pXC@jpplap>
Message-ID: <9405251728.AA19322@ah.com>
MIME-Version: 1.0
Content-Type: text/plain
   I only worry that if I publish, it could be patented.  And I don't
   want the algorithm to end up in the hands of the software patent
   folks.  Especially if they will be making money off it, and I wont.
If you publish, only you can patent.  One must be the 'true inventor'
(or some similar term of art) in order to file a patent on an
invention.  As someone pointed out, a system can be re-invented; then
that person is also a true inventor and can patent.
Publication is protection against patenting.  This is one of the main
reasons behind such publications as the IBM Technical Journal--the
publication of results not worth patenting themselves, but definitely
worth preventing others from patenting.  Publication of a result
precludes this.
Eric
Return to May 1994
Return to “Rick Busdiecker <rfb@lehman.com>”