SlideShare une entreprise Scribd logo
1  sur  18
Advanced Claiming Strategies
for Artificial Intelligence/Machine
Learning Inventions
AI/ML発明の高度なクレーム戦略
Knobbe Japan Practice Series
April 8, 2022
Mauricio Uribe
mauricio.urbe@knobbe.com
Kenny Masaki
kenny.masaki@knobbe.com
Machine Learning/Artificial Intelligence
• Minimal Requirements for an Algorithm to be ML
⎼ Representation (表現) – Classifiers or basic language that a computer can
understand
⎼ Evaluation (評価)– Inputting data and generating output (score)
⎼ Optimization (最適化)– Developing a strategy to get from inputs to outputs
1 Supervised Learning
教師あり学習
2Unsupervised Learning
教師なし学習
3Semi-Supervised Learning
半教師あり学習
4Reinforcement Learning
強化学習
Learning Models
© 2022 Knobbe Martens
Best Practices – Specification Drafting 明細書作成時のベストプラクティス
3
Best Practices –ベストプラクティス-
• U.S. Best Practices アメリカでのベストプラクティス
1. Include description of the technical substance underlying the AI technology. Simply relying on
black box description of “artificial intelligence” or “machine learning” will likely not be sufficient.
AI技術の基礎となる技術内容を説明を含めること。単に、“artificial intelligence” や “machine
learning” をブラックボックス的に使う事では通常十分ではない。
2. Avoid personification of “modules” or “processors”
“modules” or “processors”の擬人化を避ける。
3. Include detailed step-by-step algorithms and concrete examples of how the AI/machine
learning can be applied.
詳細なステップごとのアルゴリズムと、どのようにAI/機械学習が適用されるかの具体的な
例を含める。
4
Exemplary Algorithm Types アルゴリズムタイプの例示
5
• Association Rule Analysis
• Apriori
• Equivalence Class Transformation
• FP-Growth
• Hidden Markov Model
• Classification
• K-Nearest Neighbors
• Decision/Boosted Trees
• Logic Regression/Naive-Bayes
• Neural Networks
• Support Vector Machine (SVM)
• Clustering and Dimensionality
• K-Means
• Singular Value Decomposition
• Principle Component Analysis
• Regression
• Linear Regression
• Polynomial Regression
• Decision Trees
• Random Forests
Unsupervised Learning Algorithms Supervised Learning Algorithms
Classification
Output
Continuous
Output
© 2022 Knobbe Martens
Protecting ML/AI Related Products and Services
ML/AI関連製品及びサービスの保護
6
Protecting ML Technologies ML技術の保護
7
• Potential Patentable
Subject Matter
⎼ Collecting or Forming
Data Set
⎼ Supplementing Data
Set
• Potential Patentable
Subject Matter
⎼ Modifications/Improve
ments to Al algorithms
• Potential Patentable
Subject Matter
⎼ Post-processing
feedback
⎼ Use of ML processed
data
Data Set Generation and Inputs
データセット生成及び入力
ML Processing
MLプロセス
ML Results and Post Processing
ML結果及び後処理
© 2022 Knobbe Martens
Claim Drafting - Collecting or Forming Data Set
クレイム作成ーデータセットの収集または生成
8
Example 39 - Method for Training a Neural Network for Facial Detection
USPTOが例示する、特許適格性を有する例
1. A computer-implemented method of training a neural network for facial detection
comprising:
collecting a set of digital facial images from a database;
applying one or more transformations to each digital facial image including mirroring,
rotating, smoothing, or contrast reduction to create a modified set of digital facial images;
creating a first training set comprising the collected set of digital facial images, the modified
set of digital facial images, and a set of digital non-facial images;
training the neural network in a first stage using the first training set;
creating a second training set for a second stage of training comprising the first training set
and digital non-facial images that are incorrectly detected as facial images after the first stage
of training; and
training the neural network in a second stage using the second training set.
Example 39 - Method for Training a Neural Network for Facial Detection
USPTOが例示する、特許適格性を有する例
1. A computer-implemented method of training a neural network machine learning algorithm
for facial detection comprising:
collecting a set of digital facial images from a database;
applying one or more transformations to each digital facial image including mirroring,
rotating, smoothing, or contrast reduction to create a modified set of digital facial images;
creating a first training set comprising the collected set of digital facial images, the modified
set of digital facial images, and a set of digital non-facial images;
training the neural network machine learning algorithm in a first stage using the first training
set;
creating a second training set for a second stage of training comprising the first training set
and digital non-facial images that are incorrectly detected as facial images after the first
stage of training; and
training the neural network machine learning algorithm in a second stage using the second
training set.
Method for Training a Neural Network for Facial Detection – Sample Dependent Claims
従属クレームの例
11
2. The computer-implemented method as recited in Claim 1, wherein the
machine learning algorithm corresponds to a supervised learning-based
machine learning algorithm.
3. The computer-implemented method as recited in Claim 1, wherein the
supervised learning-based machine learning algorithm corresponds to a
neural network.
4. The computer-implemented method as recited in Claim 1 further
comprising:
obtaining a set of target input digital facial images;
processing the set of target input digital facial images with the trained
machine learning algorithm; and
generating a processing result corresponding to the processing.
Sample Claim – Predicting Failure – Data Sources
12
Claim Figure 2
1. A failure predicting apparatus for predicting a failure timing of a
printed circuit board included in a management target device, the
failure predicting apparatus comprising:
a machine learning device that learns the failure timing of the printed
circuit board included in the management target device with respect to
an operating state of the management target device,
wherein the machine learning device includes a state observing unit
that observes, as state variables indicating a current environmental
state, operating state data indicating an operating state of the
management target device and device configuration data indicating a
device configuration of the management target device,
a label data acquiring unit that acquires, as label data, maintenance
history data indicating a maintenance history of the management
target device, and
a learning unit that, by using the state variables and the label data,
learns the failure timing of the printed circuit board included in the
management target device, the operating state data, and the device
configuration data such that the failure timing is associated with the
operating state data and the device configuration data.
Sample Claim – Predicting Failure – Data Sources
13
1. A method for management of a target device, the method comprising:
obtaining a first set of inputs corresponding to state observing unit data,
wherein the state observing unit data corresponds to state variables
indicating a current environmental state, operating state data indicating an
operating state of the target device;
obtaining device configuration data indicating a device configuration of the
management target device,
obtaining a second set of inputs corresponding to label data unit data,
wherein the label data that acquires, as label data, maintenance history data
indicating a maintenance history of the management target device, and
processing, using a machine learned algorithm, the first set of inputs and the
second set of inputs, to characterize a likelihood that the target device will
experience a failure.
© 2022 Knobbe Martens
Claim Drafting - Use of ML Processed Data
クレイム作成 – ML処理済みデータの使用
14
Sample Claim – Use of ML Processed Data ML 処理後データの使用
15
1. A system for charactering user input in network-based services, the system comprising:
one or more computing devices associated with a processor and a memory for executing
computer-executable instructions to implement an input management service, wherein the
input management service is configured to:
obtain a set of customer inputs as customer feedback related to one or more network
services hosted on behalf of network service providers;
vectorize the set of customer inputs to form a set of vectorized customer inputs using a
machine learned algorithm, wherein vectorizing the set of customer inputs includes
generating an individual numerical vector for individual customer inputs from the set of
customer inputs;
cluster the set of vectorized customer inputs, wherein clustering the set of vectorized
inputs includes aggregating semantically similar vectorized customer inputs based on
comparison of the numerical vectors; and
generate a processing result based on the prioritized, filtered clusters.
Sample Claim – Use of ML Processed Data – Sample Dependent Claims 従属クレームの例
16
2. The system as recited in Claim 1, wherein the machine learning
algorithm corresponds to a unsupervised learning-based machine learning
algorithm.
3. The system as recited in Claim 1, wherein the unsupervised learning-
based machine learning algorithm corresponds to a clustering and
dimensionality algorithm.
Sample Claim – Machine Learning System 機械学習システム
17
1. A machine-implemented method, comprising:
collecting a plurality of human-generated requests for each of a plurality of task
categories to create a training database of user requests;
extracting a training feature vector from each user request in the training database by
assigning a binary value to each different word in the user request to form a training
data set having a plurality of training feature vectors for each task category;
processing the training feature vectors in the training data set to determine a task
classifier model for each task category;
receiving an additional request from a user, the additional request being classifiable into
one of the task categories; and
comparing an extracted feature vector from the additional request to the task classifier
model to determine a predicted task category for the additional request.
Thank you!

Contenu connexe

Similaire à Advanced Claiming Strategies for Artificial Intelligence/Machine Learning Inventions - Knobbe Practice Webinar Series

Similaire à Advanced Claiming Strategies for Artificial Intelligence/Machine Learning Inventions - Knobbe Practice Webinar Series (20)

Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern Recognition
 
Comparative Study of Enchancement of Automated Student Attendance System Usin...
Comparative Study of Enchancement of Automated Student Attendance System Usin...Comparative Study of Enchancement of Automated Student Attendance System Usin...
Comparative Study of Enchancement of Automated Student Attendance System Usin...
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
Traffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNsTraffic Sign Recognition using CNNs
Traffic Sign Recognition using CNNs
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
 
Presentation on Software patenting in India
Presentation on Software patenting in IndiaPresentation on Software patenting in India
Presentation on Software patenting in India
 
ML PPT-1.pptx
ML PPT-1.pptxML PPT-1.pptx
ML PPT-1.pptx
 
Face Recognition Based on Image Processing in an Advanced Robotic System
Face Recognition Based on Image Processing in an Advanced Robotic SystemFace Recognition Based on Image Processing in an Advanced Robotic System
Face Recognition Based on Image Processing in an Advanced Robotic System
 
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET -  	  pyScout: Employee Monitoring System by using Screen Capturing Tec...IRJET -  	  pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
 
Loan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptxLoan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptx
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoT
 
IRJET - Autonomous Navigation System using Deep Learning
IRJET -  	  Autonomous Navigation System using Deep LearningIRJET -  	  Autonomous Navigation System using Deep Learning
IRJET - Autonomous Navigation System using Deep Learning
 
Protecting Artificial Intelligence/Machine Learning Inventions in the United ...
Protecting Artificial Intelligence/Machine Learning Inventions in the United ...Protecting Artificial Intelligence/Machine Learning Inventions in the United ...
Protecting Artificial Intelligence/Machine Learning Inventions in the United ...
 
Traffic Sign Recognition Model
Traffic Sign Recognition ModelTraffic Sign Recognition Model
Traffic Sign Recognition Model
 
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
 
AUTOMATING AUTOMATION: MASTER MENTORING PROCESS
AUTOMATING AUTOMATION: MASTER MENTORING PROCESSAUTOMATING AUTOMATION: MASTER MENTORING PROCESS
AUTOMATING AUTOMATION: MASTER MENTORING PROCESS
 
Synthesis and Refinement of Artificial HVAC Sensor Data Intended for Supervis...
Synthesis and Refinement of Artificial HVAC Sensor Data Intended for Supervis...Synthesis and Refinement of Artificial HVAC Sensor Data Intended for Supervis...
Synthesis and Refinement of Artificial HVAC Sensor Data Intended for Supervis...
 
IoT Applications of 3D Printing Patents
IoT Applications of 3D Printing PatentsIoT Applications of 3D Printing Patents
IoT Applications of 3D Printing Patents
 
Machine Learning_Unit 2_Full.ppt.pdf
Machine Learning_Unit 2_Full.ppt.pdfMachine Learning_Unit 2_Full.ppt.pdf
Machine Learning_Unit 2_Full.ppt.pdf
 

Plus de Knobbe Martens - Intellectual Property Law

Plus de Knobbe Martens - Intellectual Property Law (20)

Advanced Strategies for PTAB Practice: Focus on Petitioners
Advanced Strategies for PTAB Practice: Focus on PetitionersAdvanced Strategies for PTAB Practice: Focus on Petitioners
Advanced Strategies for PTAB Practice: Focus on Petitioners
 
Trademarks, the Metaverse, and NFTs, Oh My!
Trademarks, the Metaverse, and NFTs, Oh My!Trademarks, the Metaverse, and NFTs, Oh My!
Trademarks, the Metaverse, and NFTs, Oh My!
 
Intellectual Property Considerations for Designers & Artist
Intellectual Property Considerations for Designers & ArtistIntellectual Property Considerations for Designers & Artist
Intellectual Property Considerations for Designers & Artist
 
What You Should Know About Responding to IP Threats and Assertions - Knobbe M...
What You Should Know About Responding to IP Threats and Assertions - Knobbe M...What You Should Know About Responding to IP Threats and Assertions - Knobbe M...
What You Should Know About Responding to IP Threats and Assertions - Knobbe M...
 
What You Should Know About Responding to IP Threats and Assertions - Knobbe M...
What You Should Know About Responding to IP Threats and Assertions - Knobbe M...What You Should Know About Responding to IP Threats and Assertions - Knobbe M...
What You Should Know About Responding to IP Threats and Assertions - Knobbe M...
 
What You Should Know About Open-Source Software and Third-Party Vendors - Kno...
What You Should Know About Open-Source Software and Third-Party Vendors - Kno...What You Should Know About Open-Source Software and Third-Party Vendors - Kno...
What You Should Know About Open-Source Software and Third-Party Vendors - Kno...
 
Surfing the Waves of US IP Trends: Tips for Smoothly Riding the Waves in Writ...
Surfing the Waves of US IP Trends: Tips for Smoothly Riding the Waves in Writ...Surfing the Waves of US IP Trends: Tips for Smoothly Riding the Waves in Writ...
Surfing the Waves of US IP Trends: Tips for Smoothly Riding the Waves in Writ...
 
What You Should Know About Open-Source Software and Third-Party Vendors - Kno...
What You Should Know About Open-Source Software and Third-Party Vendors - Kno...What You Should Know About Open-Source Software and Third-Party Vendors - Kno...
What You Should Know About Open-Source Software and Third-Party Vendors - Kno...
 
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
 
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
 
Knobbe Practice Webinar Series: Strategic Considerations in Design Patent Fi...
 Knobbe Practice Webinar Series: Strategic Considerations in Design Patent Fi... Knobbe Practice Webinar Series: Strategic Considerations in Design Patent Fi...
Knobbe Practice Webinar Series: Strategic Considerations in Design Patent Fi...
 
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
 
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
 
Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...
Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...
Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...
 
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting –...
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting –...Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting –...
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting –...
 
Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...
Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...
Strategic Planning for Capturing and Protecting Intellectual Property - Knobb...
 
Part II - What You Should Know About Employment and Vendor Agreements – Part...
 Part II - What You Should Know About Employment and Vendor Agreements – Part... Part II - What You Should Know About Employment and Vendor Agreements – Part...
Part II - What You Should Know About Employment and Vendor Agreements – Part...
 
What You Should Know About Employment and Vendor Agreements - Knobbe Martens ...
What You Should Know About Employment and Vendor Agreements - Knobbe Martens ...What You Should Know About Employment and Vendor Agreements - Knobbe Martens ...
What You Should Know About Employment and Vendor Agreements - Knobbe Martens ...
 
Part II - What You Should Know About Non-Disclosure Agreements - Knobbe Marte...
Part II - What You Should Know About Non-Disclosure Agreements - Knobbe Marte...Part II - What You Should Know About Non-Disclosure Agreements - Knobbe Marte...
Part II - What You Should Know About Non-Disclosure Agreements - Knobbe Marte...
 
What You Should Know About Non-Disclosure Agreements - Knobbe Martens Webina...
 What You Should Know About Non-Disclosure Agreements - Knobbe Martens Webina... What You Should Know About Non-Disclosure Agreements - Knobbe Martens Webina...
What You Should Know About Non-Disclosure Agreements - Knobbe Martens Webina...
 

Dernier

6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
SS A
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
E LSS
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
SS A
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
nyabatejosphat1
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
E LSS
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 

Dernier (20)

6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Doctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddpptDoctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddppt
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 

Advanced Claiming Strategies for Artificial Intelligence/Machine Learning Inventions - Knobbe Practice Webinar Series

  • 1. Advanced Claiming Strategies for Artificial Intelligence/Machine Learning Inventions AI/ML発明の高度なクレーム戦略 Knobbe Japan Practice Series April 8, 2022 Mauricio Uribe mauricio.urbe@knobbe.com Kenny Masaki kenny.masaki@knobbe.com
  • 2. Machine Learning/Artificial Intelligence • Minimal Requirements for an Algorithm to be ML ⎼ Representation (表現) – Classifiers or basic language that a computer can understand ⎼ Evaluation (評価)– Inputting data and generating output (score) ⎼ Optimization (最適化)– Developing a strategy to get from inputs to outputs 1 Supervised Learning 教師あり学習 2Unsupervised Learning 教師なし学習 3Semi-Supervised Learning 半教師あり学習 4Reinforcement Learning 強化学習 Learning Models
  • 3. © 2022 Knobbe Martens Best Practices – Specification Drafting 明細書作成時のベストプラクティス 3
  • 4. Best Practices –ベストプラクティス- • U.S. Best Practices アメリカでのベストプラクティス 1. Include description of the technical substance underlying the AI technology. Simply relying on black box description of “artificial intelligence” or “machine learning” will likely not be sufficient. AI技術の基礎となる技術内容を説明を含めること。単に、“artificial intelligence” や “machine learning” をブラックボックス的に使う事では通常十分ではない。 2. Avoid personification of “modules” or “processors” “modules” or “processors”の擬人化を避ける。 3. Include detailed step-by-step algorithms and concrete examples of how the AI/machine learning can be applied. 詳細なステップごとのアルゴリズムと、どのようにAI/機械学習が適用されるかの具体的な 例を含める。 4
  • 5. Exemplary Algorithm Types アルゴリズムタイプの例示 5 • Association Rule Analysis • Apriori • Equivalence Class Transformation • FP-Growth • Hidden Markov Model • Classification • K-Nearest Neighbors • Decision/Boosted Trees • Logic Regression/Naive-Bayes • Neural Networks • Support Vector Machine (SVM) • Clustering and Dimensionality • K-Means • Singular Value Decomposition • Principle Component Analysis • Regression • Linear Regression • Polynomial Regression • Decision Trees • Random Forests Unsupervised Learning Algorithms Supervised Learning Algorithms Classification Output Continuous Output
  • 6. © 2022 Knobbe Martens Protecting ML/AI Related Products and Services ML/AI関連製品及びサービスの保護 6
  • 7. Protecting ML Technologies ML技術の保護 7 • Potential Patentable Subject Matter ⎼ Collecting or Forming Data Set ⎼ Supplementing Data Set • Potential Patentable Subject Matter ⎼ Modifications/Improve ments to Al algorithms • Potential Patentable Subject Matter ⎼ Post-processing feedback ⎼ Use of ML processed data Data Set Generation and Inputs データセット生成及び入力 ML Processing MLプロセス ML Results and Post Processing ML結果及び後処理
  • 8. © 2022 Knobbe Martens Claim Drafting - Collecting or Forming Data Set クレイム作成ーデータセットの収集または生成 8
  • 9. Example 39 - Method for Training a Neural Network for Facial Detection USPTOが例示する、特許適格性を有する例 1. A computer-implemented method of training a neural network for facial detection comprising: collecting a set of digital facial images from a database; applying one or more transformations to each digital facial image including mirroring, rotating, smoothing, or contrast reduction to create a modified set of digital facial images; creating a first training set comprising the collected set of digital facial images, the modified set of digital facial images, and a set of digital non-facial images; training the neural network in a first stage using the first training set; creating a second training set for a second stage of training comprising the first training set and digital non-facial images that are incorrectly detected as facial images after the first stage of training; and training the neural network in a second stage using the second training set.
  • 10. Example 39 - Method for Training a Neural Network for Facial Detection USPTOが例示する、特許適格性を有する例 1. A computer-implemented method of training a neural network machine learning algorithm for facial detection comprising: collecting a set of digital facial images from a database; applying one or more transformations to each digital facial image including mirroring, rotating, smoothing, or contrast reduction to create a modified set of digital facial images; creating a first training set comprising the collected set of digital facial images, the modified set of digital facial images, and a set of digital non-facial images; training the neural network machine learning algorithm in a first stage using the first training set; creating a second training set for a second stage of training comprising the first training set and digital non-facial images that are incorrectly detected as facial images after the first stage of training; and training the neural network machine learning algorithm in a second stage using the second training set.
  • 11. Method for Training a Neural Network for Facial Detection – Sample Dependent Claims 従属クレームの例 11 2. The computer-implemented method as recited in Claim 1, wherein the machine learning algorithm corresponds to a supervised learning-based machine learning algorithm. 3. The computer-implemented method as recited in Claim 1, wherein the supervised learning-based machine learning algorithm corresponds to a neural network. 4. The computer-implemented method as recited in Claim 1 further comprising: obtaining a set of target input digital facial images; processing the set of target input digital facial images with the trained machine learning algorithm; and generating a processing result corresponding to the processing.
  • 12. Sample Claim – Predicting Failure – Data Sources 12 Claim Figure 2 1. A failure predicting apparatus for predicting a failure timing of a printed circuit board included in a management target device, the failure predicting apparatus comprising: a machine learning device that learns the failure timing of the printed circuit board included in the management target device with respect to an operating state of the management target device, wherein the machine learning device includes a state observing unit that observes, as state variables indicating a current environmental state, operating state data indicating an operating state of the management target device and device configuration data indicating a device configuration of the management target device, a label data acquiring unit that acquires, as label data, maintenance history data indicating a maintenance history of the management target device, and a learning unit that, by using the state variables and the label data, learns the failure timing of the printed circuit board included in the management target device, the operating state data, and the device configuration data such that the failure timing is associated with the operating state data and the device configuration data.
  • 13. Sample Claim – Predicting Failure – Data Sources 13 1. A method for management of a target device, the method comprising: obtaining a first set of inputs corresponding to state observing unit data, wherein the state observing unit data corresponds to state variables indicating a current environmental state, operating state data indicating an operating state of the target device; obtaining device configuration data indicating a device configuration of the management target device, obtaining a second set of inputs corresponding to label data unit data, wherein the label data that acquires, as label data, maintenance history data indicating a maintenance history of the management target device, and processing, using a machine learned algorithm, the first set of inputs and the second set of inputs, to characterize a likelihood that the target device will experience a failure.
  • 14. © 2022 Knobbe Martens Claim Drafting - Use of ML Processed Data クレイム作成 – ML処理済みデータの使用 14
  • 15. Sample Claim – Use of ML Processed Data ML 処理後データの使用 15 1. A system for charactering user input in network-based services, the system comprising: one or more computing devices associated with a processor and a memory for executing computer-executable instructions to implement an input management service, wherein the input management service is configured to: obtain a set of customer inputs as customer feedback related to one or more network services hosted on behalf of network service providers; vectorize the set of customer inputs to form a set of vectorized customer inputs using a machine learned algorithm, wherein vectorizing the set of customer inputs includes generating an individual numerical vector for individual customer inputs from the set of customer inputs; cluster the set of vectorized customer inputs, wherein clustering the set of vectorized inputs includes aggregating semantically similar vectorized customer inputs based on comparison of the numerical vectors; and generate a processing result based on the prioritized, filtered clusters.
  • 16. Sample Claim – Use of ML Processed Data – Sample Dependent Claims 従属クレームの例 16 2. The system as recited in Claim 1, wherein the machine learning algorithm corresponds to a unsupervised learning-based machine learning algorithm. 3. The system as recited in Claim 1, wherein the unsupervised learning- based machine learning algorithm corresponds to a clustering and dimensionality algorithm.
  • 17. Sample Claim – Machine Learning System 機械学習システム 17 1. A machine-implemented method, comprising: collecting a plurality of human-generated requests for each of a plurality of task categories to create a training database of user requests; extracting a training feature vector from each user request in the training database by assigning a binary value to each different word in the user request to form a training data set having a plurality of training feature vectors for each task category; processing the training feature vectors in the training data set to determine a task classifier model for each task category; receiving an additional request from a user, the additional request being classifiable into one of the task categories; and comparing an extracted feature vector from the additional request to the task classifier model to determine a predicted task category for the additional request.