Patent Protection

In patent and design infringement, Hubstream helps you consolidate data from multiple sources, offering insights to establish viable cases, detect infringement trends, and uncover the true intentions of infringers.

Use Cases in Patent / Design Infringements

img

Design Copycat

If a company manufactures a product that closely resembles another company's patented design, it could be considered design infringement. Yet establishing liability can be challenging.

In the prominent patent enablement case, 'Amgen vs. Sanofi' in 2023, Amgen lost the lawsuit because its disclosure was too board and lacked the specificity required for Sanofi to conduct thorough experimentation in determining what worked previously in Amgen.

img

Patented Feature

Using a patented feature without proper licensing can lead to patent infringement. In a notable case, Apple accused Samsung of design infringement, with the jury finding that certain Samsung products, including features like the "bounce back" effect, infringed upon Apple's patents.

img

Sale of Infringed Products

Selling a product using patented technology without permission from the patent holder can also be considered patent infringement. For instance, selling smartphones that incorporate patented software algorithms without a license.

img

Reverse Engineering

Reverse engineering a patented product to replicate its functionality without authorization can also lead to patent infringement. This occurs when someone studies a product to understand how it works and then produces a similar product without permission from the patent holder.

What Hubstream can do for you?

Image

Discover & Prioritize

Hubstream aggregates piracy data from multiple sources and prioritizes high-value targets or repeat offenders for you automatically.

Image

Protect

Hubstream ensures evidence integrity with top-tier security measures, which is trusted by government agencies for successful legal proceedings.

Image

Predict & Prevent

Hubstream lets you gain deep insights, make logical assumptions, and prevent piracy activities.