Webinar: Two-factor authentication for those who use ISA/EP

Do you use ISA/EP?  Do you use an EPO mailbox to receive ISR/WOs from ISA/EP?  Do you use an EPO smart card to log in at the mailbox?  Then you need to migrate from a smart card to a time-based one-time password form of two-factor authentication.  And you need to do it before the end of 2024.  One way to learn how to do this is by attending an EPO webinar that will take place soon.  Continue reading “Webinar: Two-factor authentication for those who use ISA/EP”

When did the ¼-inch quick-release hex shank begin? Who thought of the ¼-inch quick-release hex shank?

(Update:  thanks to a comment below from alert reader Bernie Greenspan, I eventually located ANSI standard B107.4 which standardized the ¼-inch quick-release hex shank in 1982.)

Many people who try to do projects and repairs around the house or around the office would, I think, report that they experienced two events involving power tools that changed things a lot.   One’s life divides into “how it was before I got an oscillating tool and how it was after” and “how it was before I got an impact driver and how it was after”.  As will be discussed below, the impact driver uses driver bits and drill bits having a “¼-inch quick-release hex shank”.  The main point of this blog article is to raise two seemingly unanswerable questions:

Two Patent Center service failures in the past 24 hours

click to enlarge

Patent Center has had two service failures in the past 24 hours. The USPTO had promised its users that this would not happen — there are supposedly two servers called “Blue” and “Green”, and if one of them crashes the other is supposed to come into service automatically. The user should not even notice the switchover from one server to the other, we were promised. Despite these promises, there was a first Patent Center service failure yesterday afternoon, and a second Patent Center service failure this morning.  Continue reading “Two Patent Center service failures in the past 24 hours”

Three years later, USPTO developers repeat a coding mistake

It is astonishing to see the USPTO developers repeating a mistake now in 2023 that they made in 2020.  Back in 2020, it took the developers more than six months to fix it.  One wonders how long it will take this time.  The mistake was to assume (incorrectly) that “patent offices” are the same thing as “places that you can send mail to”.  I am not making this up!

Continue reading “Three years later, USPTO developers repeat a coding mistake”

Why the protective PDF does not protect you from DOCX risks

The USPTO is sticking with its plans to start imposing its $400 penalty for failing to file one’s US patent application in Microsoft Word format.  The penalty will start on January 17, or will start on January 18, depending on which sentence of the USPTO’s most recent announcements you choose to trust (blog article).  Another way to describe this is that a filer who (a) wishes to avoid at least some of the malpractice risks of filing in Microsoft Word format (the USPTO’s flavor of DOCX), and (b) wishes to avoid having to pay the $400 penalty … will need to include a trusted PDF copy of the application in the e-filing package.

Which means that starting on Thursday, January 18, or maybe starting on  Wednesday, January 17,  the filer will need to go to some trouble to make sure that a trusted PDF file forms part of the e-filing package.

But it is important to realize that the trusted PDF file does not fully protect the filer.

click to enlarge

One reason that the trusted PDF file does not fully protect the filer is that the USPTO’s e-filing system tampers with the trusted PDF.

As shown in the figure, the first thing that the USPTO does with your trusted PDF is dismember it into TIF images, one per PDF page. And then the USPTO carries out halftoning and resizing. This is the native storage format in IFW. Later if you click to see your trusted PDF, you will find that what IFW gives back to you as a PDF is not bit-for-bit the same as the PDF that you uploaded. The PDF that the IFW gives back to you will, among other things, have a non-identical message digest (hash).

click to enlarge

Here is a real-life example from a real filing of a trusted PDF in a US patent application.  At right you can see what I actually uploaded in the PDF.

click to enlarge

And at right you can see what you would actually get back if you were to download the supposedly same PDF file.   As you can see, the image is blurred almost beyond recognition.

It seems to me that the filer who wants to avoid the harm caused by the halftoning and resizing would definitely want to index the trusted PDF as “non-black-and-white drawings”. That way the trusted PDF is preserved bit-for-bit.