Copyright on the tracks

The origins of the free software movement can be traced back to to the hackers of MIT's Tech Model Railroad Club, but more recently model railways have played a significant part in validating copyright law.

Consequently Jacobsen wrote a letter to Katzer in November 2004 asking that the decoderpro.com registration be transferred to the JMRI project, and offered reimbursement of Katzer's costs in effecting a resolution.

There was no response from Kam until March 2005, when Jacobsen received a letter from Kam's lawyers claiming that JMRI had infringed a patent 6,530,329 B2 that had been registered with the USPTO by Kam.

Jacobsen, not unreasonably, asked for clarification, and was answered with an invoice for $203,000 (128,000), approximately $29 for each of the 7000 or so users who had downloaded the software.

Jacobsen was also surprised to learn that KAM had approached his employers at University of California at Berkeley, where he teaches physics, under the Freedom of Information Act, "requesting copies of all his email and other correspondence."

Seen here before

The defence in a patent infringement case is that the patent describes prior art and therefore fails to fulfill the basic requirement for a valid patent. Researching prior art costs time and money, but by January 2006 and with the help of many volunteers across the internet Jacobsen was able to write to Kam's layers and point out that "multiple examples of relevant prior art [...] are available, some dating back decades. Additional prior art is available for other claims of the patent. JMRI itself is prior art, in that the implementation you now complain of was available to the public before your patent application was filed. This includes its detailed source code. Further, an examination of that code would have shown the actual performance of the method in [the claim] was not done by code I or another JMRI author wrote, but by long-existing Java RMI software from Sun Microsystems."

The patent which applied well known computing concepts such as multiplexing, asynchronous and synchronous communications and real time control to model railways was seen as yet another illustration of the flimsy evidence required to win patents.

Not only was the patent spurious, but Katzer had previously filed patent infringement suits against other products, Juergen Freiwald's TrainController and Hans-Rudi Tanner's WinLok. Freiwald and Tanner had both written to Katzer citing prior art, and the suits had been dropped, suggesting Kam's threat against JMRI should never have been issued. Furthermore, the JMRI developers claim that Katzer was aware of prior art before lodging the original patent claim.

Not unreasonably, Jacobsen began to view Kam's campaign against his project as something akin to harassment, and filed a Declaratory Judgment action in Federal Court, listing "acts of unfair competition, libel, patent fraud and misrepresentation, etc," and asking that the Court issued injunctions to prevent further infringements. On evidence from Katzer upon which the JMRI developers cast considerable doubt this complaint was dismissed.

Copyright wronged

In the meantime, Katzer compounded the injury further by not only reproducing the name and functionality of JMRI software by releasing a Decoder Commander product, but by taking "JMRI copyrighted code, stripping out the authors' names and copyright notices, converting to his own use and then distributing it as his own."

As in many such cases, it is difficult to interpret the motives for Katzer's actions, but it seems to have been assumed that a small free software project could not, and would not, offer resistance. This is, and was, a wrong assumption. Free software lives and dies by the integrity of its licenses.

Featured Resources

Shaping the workplaces of the future

Rise to the challenge

Download now

Enabling a hybrid future

A guide to setting up new working practices

Download now

Seven steps to successful digital innovation and transformation

What to invest in and what to avoid when pursuing digital transformation

Watch now

Defend your organisation from evolving ransomware attacks

Learn what it takes to reduce risk and strengthen operational resiliency

Download now

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
Crypto-mining hackers hit Kubernetes clusters
cryptocurrencies

Crypto-mining hackers hit Kubernetes clusters

10 Jun 2021
China-linked hacking group targeted New York MTA
cyber security

China-linked hacking group targeted New York MTA

4 Jun 2021

Most Popular

Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
GitHub to prohibit code that’s used in active attacks
cyber security

GitHub to prohibit code that’s used in active attacks

7 Jun 2021
WWDC 2021: Apple unveils iOS 15, macOS Monterey and more
iOS

WWDC 2021: Apple unveils iOS 15, macOS Monterey and more

8 Jun 2021