
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 06 Apr 2026 09:20:18 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Changing the industry with CISA’s Secure by Design principles]]></title>
            <link>https://blog.cloudflare.com/secure-by-design-principles/</link>
            <pubDate>Mon, 04 Mar 2024 14:00:56 GMT</pubDate>
            <description><![CDATA[ Security considerations should be an integral part of software’s design, not an afterthought. Explore how Cloudflare adheres to CISA’s Secure by Design principles to shift the industry ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69sko7A68LpSgodcAbWNKk/84a79ab3e02de76023c119ca4d14c132/Cloudflare-Aligns-with-CISA-Secure-by-Design-Principles--Helps-Drive-the-Shift-of-Security-Responsibilities-from-User-to-Sof.png" />
            
            </figure><p>The United States Cybersecurity and Infrastructure Agency (CISA) and seventeen international partners are helping shape best practices for the technology industry with their ‘<a href="https://www.cisa.gov/sites/default/files/2023-10/SecureByDesign_1025_508c.pdf">Secure by Design</a>’ principles. The aim is to encourage software manufacturers to not only make security an integral part of their products’ development, but to also design products with strong security capabilities that are configured by default.</p><p>As a cybersecurity company, Cloudflare considers product security an integral part of its DNA. We strongly believe in CISA’s principles and will continue to uphold them in the work we do. We’re excited to share stories about how Cloudflare has baked secure by design principles into the products we build and into the services we make available to all of our customers.</p>
    <div>
      <h2>What do “secure by design” and “secure by default” mean?</h2>
      <a href="#what-do-secure-by-design-and-secure-by-default-mean">
        
      </a>
    </div>
    <p>Secure by design describes a product where the security is ‘baked in’ rather than ‘bolted on’. Rather than manufacturers addressing security measures reactively, they take actions to mitigate any risk beforehand by building products in a way that reasonably protects against attackers successfully gaining access to them.</p><p>Secure by default means products are built to have the necessary security configurations come as a default, without additional charges.</p><p>CISA outlines the following three software product security principles:</p><ul><li><p>Take ownership of customer security outcomes</p></li><li><p>Embrace radical transparency and accountability</p></li><li><p>Lead from the top</p></li></ul><p>In its <a href="https://www.cisa.gov/sites/default/files/2023-10/SecureByDesign_1025_508c.pdf">documentation</a>, CISA provides comprehensive guidance on how to achieve its principles and what security measures a manufacturer should follow. Adhering to these guidelines not only enhances security benefits to customers and boosts the developer’s brand reputation, it also reduces long term maintenance and patching costs for manufacturers.</p>
    <div>
      <h2>Why does it matter?</h2>
      <a href="#why-does-it-matter">
        
      </a>
    </div>
    <p>Technology undeniably plays a significant role in our lives, automating numerous everyday tasks. The world’s dependence on technology and Internet-connected devices has significantly increased in the last few years, in large part <a href="https://datareportal.com/reports/digital-2022-time-spent-with-connected-tech">due to Covid-19</a>. During the outbreak, individuals and companies moved online as they complied with the public health measures that limited physical interactions.</p><p>While Internet connectivity makes our lives easier, bringing opportunities for online learning and remote work, it also creates an opportunity for attackers to benefit from such activities. Without proper safeguards, sensitive data such as user information, financial records, and login credentials can all be compromised and used for malicious activities.</p><p>Systems vulnerabilities can also impact entire industries and economies. In 2023, hackers from North Korea were suspected of being <a href="https://finance.yahoo.com/news/north-korea-linked-lazarus-group-130000746.html?cf_history_state=%7B%22guid%22%3A%22C255D9FF78CD46CDA4F76812EA68C350%22%2C%22historyId%22%3A13%2C%22targetId%22%3A%222168179FD2D36545B7494CB31CA686CB%22%7D&amp;_guc_consent_skip=1708084501">responsible for over 20% of crypto losses</a>, exploiting software vulnerabilities and stealing more than $300 million from individuals and companies around the world.</p><p>Despite the potentially devastating consequences of insecure software, too many vendors place the onus of security on their customers — a fact that CISA underscores in their guidelines. While a level of care from customers is expected, the majority of risks should be handled by manufacturers and their products. Only then can we have more secure and trusting online interactions. The ‘Secure by Design’ principles are essential to bridge that gap and change the industry.</p>
    <div>
      <h2>How does Cloudflare support secure by design principles?</h2>
      <a href="#how-does-cloudflare-support-secure-by-design-principles">
        
      </a>
    </div>
    
    <div>
      <h3>Taking ownership of customer security outcomes</h3>
      <a href="#taking-ownership-of-customer-security-outcomes">
        
      </a>
    </div>
    <p>CISA explains that in order to take ownership of customer security outcomes, software manufacturers should invest in product security efforts that include application hardening, application features, and application default settings. At Cloudflare, we always have these product security efforts top of mind and a few examples are shared below.</p>
    <div>
      <h4>Application hardening</h4>
      <a href="#application-hardening">
        
      </a>
    </div>
    <p>At Cloudflare, our developers follow a defined software development life cycle (SDLC) management process with checkpoints from our security team. We proactively address known vulnerabilities before they can be exploited and fix any exploited vulnerabilities for <i>all</i> of our customers. For example, we are committed to memory safe programming languages and use them where possible. Back in 2021, Cloudflare rewrote the <a href="/new-cloudflare-waf/">Cloudflare WAF</a> from Lua into the memory safe Rust. More recently, Cloudflare introduced a <a href="/how-we-built-pingora-the-proxy-that-connects-cloudflare-to-the-internet">new in-house built HTTP proxy named Pingora</a>, that moved us from memory unsafe C to memory safe Rust as well. Both of these projects were extra large undertakings that would not have been possible without executive support from our technical leadership team.</p>
    <div>
      <h4>Zero Trust Security</h4>
      <a href="#zero-trust-security">
        
      </a>
    </div>
    <p>By default, we align with CISA’s <a href="https://www.cisa.gov/zero-trust-maturity-model">Zero Trust Maturity Model</a> through the use of Cloudflare’s <a href="https://www.cloudflare.com/en-gb/learning/security/glossary/what-is-zero-trust/">Zero Trust Security suite of services</a>, to prevent unauthorized access to Cloudflare data, development resources, and other services. We minimize trust assumptions and require strict identity verification for every person and device trying to access any Cloudflare resources, whether self-hosted or in the cloud.</p><p>At Cloudflare, we believe that Zero Trust Security is a must-have security architecture in today’s environment, where cyber security attacks are rampant and hybrid work environments are the new normal. To help protect small businesses today, we have a <a href="https://www.cloudflare.com/plans/zero-trust-services/">Zero Trust plan</a> that provides the essential security controls needed to keep employees and apps protected online available free of charge for up to 50 users.</p>
    <div>
      <h4>Application features</h4>
      <a href="#application-features">
        
      </a>
    </div>
    <p>We not only provide users with many essential security tools for free, but we have helped push the entire industry to provide better security features by default since our early days.</p><p>Back in 2014, during Cloudflare's birthday week, we announced that we were making encryption free for all our customers by introducing <a href="/introducing-universal-ssl">Universal SSL</a>. Then in 2015, we went one step further and provided <a href="/universal-ssl-encryption-all-the-way-to-the-origin-for-free">full encryption</a> of all data from the browser to the origin, for free. Now, the rest of the industry has followed our lead and encryption by default has become the standard for Internet applications.</p><p>During Cloudflare’s seventh Birthday Week in 2017, we were incredibly proud to announce <a href="/unmetered-mitigation">unmetered DDoS mitigation</a>. The service absorbs and mitigates large-scale DDoS attacks without charging customers for the excess bandwidth consumed during an attack. With such announcement we eliminated the industry standard of ‘surge pricing’ for DDoS attacks</p><p>In 2021, we announced a protocol called <a href="/privacy-preserving-compromised-credential-checking/">MIGP</a> ("Might I Get Pwned") that allows users to check whether their credentials have been compromised without exposing any unnecessary information in the process. Aside from a bucket ID derived from a prefix of the hash of your email, your credentials stay on your device and are never sent (even encrypted) over the Internet. Before that, using credential checking services could turn out to be a vulnerability in itself, leaking sensitive information while you are checking whether or not your credentials have been compromised.</p><p>A year later, in 2022, Cloudflare again disrupted the industry when we announced <a href="/waf-for-everyone/">WAF (Web Application Firewall) Managed Rulesets free of charge for all Cloudflare plans</a>. <a href="https://developers.cloudflare.com/waf/glossary/">WAF</a> is a service responsible for protecting web applications from malicious attacks. Such attacks have a major impact across the Internet regardless of the size of an organization. By making WAF free, we are making the Internet safe for everyone.</p><p>Finally, at the end of 2023, we were excited to help lead the industry by making <a href="/post-quantum-to-origins">post-quantum cryptography</a> available free of charge to all of our customers irrespective of plan levels.</p>
    <div>
      <h4>Application default settings</h4>
      <a href="#application-default-settings">
        
      </a>
    </div>
    <p>To further protect our customers, we ensure our default settings provide a robust security posture right from the start. Once users are comfortable, they can change and configure any settings the way they prefer. For example, Cloudflare automatically deploys the <a href="/waf-for-everyone/">Free Cloudflare Managed Ruleset</a> to any new Cloudflare zone. The managed ruleset includes Log4j rules, Shellshock rules, rules matching very common WordPress exploits, and others. Customers are able to disable the ruleset, if necessary, or configure the traffic filter or individual rules. To provide an even more secure-by-default system, we also created the <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">ML-computed WAF Attack Score</a> that uses AI to detect bypasses of existing managed rules and can detect software exploits before they are made public.</p><p>As another example, all Cloudflare accounts come with unmetered DDoS mitigation services to protect applications from many of the Internet's most common and hard to handle attacks, by default.</p><p>As yet another example, when customers use our <a href="https://www.cloudflare.com/en-gb/developer-platform/r2/">R2 storage</a>, all the stored objects are encrypted at rest. Both encryption and decryption is automatic, does not require user configuration to enable, and does not impact the performance of R2.</p><p>Cloudflare also provides all of our customers with robust audit logs. <a href="https://developers.cloudflare.com/fundamentals/setup/account/account-security/review-audit-logs/">Audit logs</a> summarize the history of changes made within your Cloudflare account. Audit logs include account level actions like login, as well as zone configuration changes. Audit Logs are available on all plan types and are captured for both individual users and for multi-user organizations. Our audit logs are available across all plan levels for 18 months.</p>
    <div>
      <h3>Embracing radical transparency and accountability</h3>
      <a href="#embracing-radical-transparency-and-accountability">
        
      </a>
    </div>
    <p>To embrace radical transparency and accountability means taking pride in delivering safe and secure products. Transparency and sharing information are crucial for improving and evolving the security industry, fostering an environment where companies learn from each other and make the online world safer. Cloudflare shows transparency in multiple ways, as outlined below.</p>
    <div>
      <h4>The Cloudflare blog</h4>
      <a href="#the-cloudflare-blog">
        
      </a>
    </div>
    <p>On the <a href="/">Cloudflare blog</a>, you can find the latest information about our features and improvements, but also about zero-day attacks that are relevant to the entire industry, like the historic <a href="/technical-breakdown-http2-rapid-reset-ddos-attack">HTTP/2 Rapid Reset attacks</a> detected last year. We are transparent and write about important security incidents, such as the <a href="/thanksgiving-2023-security-incident/">Thanksgiving 2023 security incident</a>, where we go in detail about what happened, why it happened, and the steps we took to resolve it. We have also made a conscious effort to embrace radical transparency from Cloudflare’s inception about incidents impacting our services, and continue to embrace this important principle as one of our core <a href="https://www.cloudflare.com/careers/">values</a>. We hope that the information we share can assist others in enhancing their software practices.</p>
    <div>
      <h4>Cloudflare System Status</h4>
      <a href="#cloudflare-system-status">
        
      </a>
    </div>
    <p><a href="https://www.cloudflarestatus.com/">Cloudflare System Status</a> is a page to inform website owners about the status of Cloudflare services. It provides information about the current status of services and whether they are operating as expected. If there are any ongoing incidents, the status page notes which services were affected, as well as details about the issue. Users can also find information about scheduled maintenance that may affect the availability of some services.</p>
    <div>
      <h4>Technical transparency for code integrity</h4>
      <a href="#technical-transparency-for-code-integrity">
        
      </a>
    </div>
    <p>We believe in the importance of using cryptography as a technical means for transparently verifying identity and data integrity. For example, in 2022, we <a href="/cloudflare-verifies-code-whatsapp-web-serves-users/">partnered with WhatsApp</a> to provide a system for WhatsApp that assures users they are running the correct, untampered code when visiting the web version of the service by enabling the <a href="https://chrome.google.com/webstore/detail/code-verify/llohflklppcaghdpehpbklhlfebooeog/?cf_history_state=%7B%22guid%22:%22C255D9FF78CD46CDA4F76812EA68C350%22,%22historyId%22:14,%22targetId%22:%22135202E37AE255A706ECF9E58DB17616%22%7D">code verify extension</a> to confirm hash integrity automatically. It’s this process, and the fact that is automated on behalf of the user, that helps provide transparency in a scalable way. If users had to manually fetch, compute, and compare the hashes themselves, detecting tampering would likely only be done by a small fraction of technical users.</p>
    <div>
      <h4>Transparency report and warrant canaries</h4>
      <a href="#transparency-report-and-warrant-canaries">
        
      </a>
    </div>
    <p>We also believe that an essential part of earning and maintaining the trust of our customers is being transparent about the requests we receive from law enforcement and other governmental entities. To this end, Cloudflare publishes semi-annual updates to our <a href="https://cf-assets.www.cloudflare.com/slt3lc6tev37/Q1INAiyBubYSlfGdUhthU/8cc0e3de0f160e2765af4f514991ef6c/Transparency-Report-H2-2022.pdf?_gl=1*1y467q5*_ga*MTEyMzg0OTg5MC4xNjc3Nzg2MDk2*_ga_SQCRB0TXZW*MTcwOTA2NTM5OS4yNDIuMS4xNzA5MDY2NjYyLjAuMC4w">Transparency Report</a> on the requests we have received to disclose information about our customers.</p><p>An important part of Cloudflare’s transparency report is our warrant canaries. Warrant canaries are a method to implicitly inform users that we have not taken certain actions or received certain requests from government or law enforcement authorities, such as turning over our encryption or authentication keys or our customers' encryption or authentication keys to anyone. Through these means we are able to let our users know just how private and secure their data is while adhering to orders from law enforcement that prohibit disclosing some of their requests. You can read Cloudflare’s warrant canaries <a href="https://www.cloudflare.com/transparency/">here</a>.</p><p>While transparency reports and warrant canaries are not explicitly mentioned in CISA’s secure by design principles, we think they are an important aspect in a technology company being transparent about their practices.</p>
    <div>
      <h4>Public bug bounties</h4>
      <a href="#public-bug-bounties">
        
      </a>
    </div>
    <p>We invite you to contribute to our security efforts by participating in our <a href="https://hackerone.com/cloudflare?view_policy=true">public bug bounty</a> hosted by HackerOne, where you can report Cloudflare vulnerabilities and receive financial compensation in return for your help.</p>
    <div>
      <h3>Leading from the top</h3>
      <a href="#leading-from-the-top">
        
      </a>
    </div>
    <p>With this principle, security is deeply rooted inside Cloudflare’s business goals. Because of the tight relationship of security and quality, by improving a product's default security, the quality of the overall product also improves.</p><p>At Cloudflare, our dedication to security is reflected in the company’s structure. Our Chief Security Officer reports directly to our CEO, and presents at every board meeting. That allows for board members well-informed about the current cybersecurity landscape and emphasizes the importance of the company's initiatives to improve security.</p><p>Additionally, our security engineers are a part of the main R&amp;D organization, with their work being as integral to our products as that of our system engineers. This means that our security engineers can bake security into the SDLC instead of bolting it on as an afterthought.</p>
    <div>
      <h2>How can you help?</h2>
      <a href="#how-can-you-help">
        
      </a>
    </div>
    <p>If you are a software manufacturer, we encourage you to familiarize yourself with CISA’s ‘Secure by Design’ principles and create a plan to implement them in your company.</p><p>As an individual, we encourage you to participate in bug bounty programs (such as <a href="https://hackerone.com/cloudflare?type=team&amp;view_policy=true">Cloudflare’s HackerOne</a> public bounty) and promote cybersecurity awareness in your community.</p><p>Let’s help build a better Internet together.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Reliability]]></category>
            <guid isPermaLink="false">S9si8dmzOmPd8vlxjvLNl</guid>
            <dc:creator>Kristina Galicova</dc:creator>
            <dc:creator>Edo Royker</dc:creator>
        </item>
        <item>
            <title><![CDATA[Keeping your GDPR Resolutions]]></title>
            <link>https://blog.cloudflare.com/keeping-your-gdpr-resolutions/</link>
            <pubDate>Fri, 05 Jan 2018 20:04:05 GMT</pubDate>
            <description><![CDATA[ For many of us, a New Year brings a renewed commitment to eat better, exercise regularly, and read more (especially the Cloudflare blog). But as we enter 2018, there is a unique and significant new commitment approaching. ]]></description>
            <content:encoded><![CDATA[ <p>For many of us, a New Year brings a renewed commitment to eat better, exercise regularly, and read more (especially the Cloudflare blog). But as we enter 2018, there is a unique and significant new commitment approaching -- protecting personal data and complying with the European Union’s (EU) General Data Protection Regulation (GDPR).</p><p>As many of you know by now, the GDPR is a sweeping new EU law that comes into effect on May 25, 2018. The GDPR harmonizes data privacy laws across the EU and mandates how companies collect, store, delete, modify and otherwise process personal data of EU citizens.</p><p>Since our founding, Cloudflare has believed that the protection of our customers’ and their end users’ data is essential to our mission to help build a better internet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6MrpL303n7UEGuWhnGTaXv/dbcd4dcd1fd7e6b9369b84ed4827e189/europe-1395916_1920.jpg" />
            
            </figure><p><a href="https://pixabay.com/p-1395916/?no_redirect">Image</a> by <a href="https://pixabay.com/en/users/GregMontani-1014946/">GregMontani</a> via <a href="https://commons.wikimedia.org/wiki/File:European_flag_in_Karlskrona_2011.jpg">Wikimedia Commons</a></p>
    <div>
      <h3>Need a Data Processing Agreement?</h3>
      <a href="#need-a-data-processing-agreement">
        
      </a>
    </div>
    <p>As we explained in a <a href="/advancing-privacy-protection-with-the-gdpr/">previous blog post</a> last August, Cloudflare has been working hard to achieve GDPR compliance in advance of the effective date, and is committed to help our customers and their partners prepare for GDPR compliance on their side. We understand that compliance with a new set of privacy laws can be challenging, and we are here to help with your GDPR compliance requirements.</p><p>First, we are committed to making sure Cloudflare’s services are GDPR compliant and will continue to monitor new guidance on best practices even after the May 25th, 2018 effective date. We have taken these new requirements to heart and made changes to our products, contracts and policies.</p><p>And second, we have made it easy for you to comply with your own obligations. If you are a Cloudflare customer and have determined that you qualify as a data controller under the GDPR, you may need a data processing addendum (DPA) in place with Cloudflare as a qualifying vendor. We’ve made that part of the process easy for you.</p>
    <div>
      <h4>This is all you need to do:</h4>
      <a href="#this-is-all-you-need-to-do">
        
      </a>
    </div>
    <ul><li><p>Instructions for completing our our GDPR-compliant DPA can be found <a href="https://www.cloudflare.com/trust-hub/gdpr/">here</a>.</p></li><li><p>To complete the DPA, you should fill in the “Customer” information and sign on pages 6, 13, 15, and 19.</p></li><li><p>Send an electronic copy of the fully executed DPA to Cloudflare at <a>eu.dpa@cloudflare.com</a>.</p></li></ul><p>That’s it. Now you’re one step closer to GDPR compliance.</p><p>We can’t help you with the diet, exercise, and reading stuff. But if you need more information about GDPR and more resources, you can go to <a href="https://www.cloudflare.com/gdpr/introduction/">Cloudflare’s GDPR page</a>.</p> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Europe]]></category>
            <category><![CDATA[GDPR]]></category>
            <category><![CDATA[Politics]]></category>
            <guid isPermaLink="false">4crbAEYhnTIx5JOzMLeRew</guid>
            <dc:creator>Edo Royker</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Supreme Court Wanders into the Patent Troll Fight]]></title>
            <link>https://blog.cloudflare.com/supreme-court-wanders-into-patent-troll-fight/</link>
            <pubDate>Mon, 20 Nov 2017 18:18:00 GMT</pubDate>
            <description><![CDATA[ Next Monday, the US Supreme Court will hear oral arguments in Oil States Energy Services, LLC vs. Greene’s Energy Group, LLC, which is a case to determine whether the Inter Partes Review (IPR) administrative process at the US Patent and Trademark Office. ]]></description>
            <content:encoded><![CDATA[ <p>Next Monday, the US Supreme Court will hear oral arguments in <i>Oil States Energy Services, LLC vs. Greene’s Energy Group, LLC</i>, which is a case to determine whether the Inter Partes Review (IPR) administrative process at the US Patent and Trademark Office (USPTO) used to determine the validity of patents is constitutional.</p><p>The constitutionality of the IPR process is one of the biggest legal issues facing innovative technology companies, as the availability of this process has greatly reduced the anticipated costs, and thereby lessened the threat, of patent troll litigation. As we discuss in this blog post, it is ironic that the outcome of a case that is of such great importance to the technology community today may hinge on what courts in Britain were and were not doing more than 200 years ago.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6n9jPj4SkK5KP20qIK34zy/0f0e54ec1632dc453e13250ff9c1ca38/Thomas_Rowlandson_-_The_Privy_Council_of_a_King_-_Google_Art_Project.jpg" />
            
            </figure><p>Thomas Rowlandson [Public domain], via <a href="https://commons.wikimedia.org/wiki/File%3AThomas_Rowlandson_-_The_Privy_Council_of_a_King_-_Google_Art_Project.jpg">Wikimedia Commons</a></p><p>As we have discussed in prior <a href="/project-jengo-challenges/">blog posts</a>, the stakes are high: if the Supreme Court finds IPR unconstitutional, then the entire system of administrative review by the USPTO — including IPR and ex parte processes — will be shuttered. This would be a mistake, as administrative recourse at the USPTO is one of the few ways to avoid the considerable costs and delays of federal court litigation, which can take years and run into the millions of dollars. Those heavy costs are often leveraged by patent trolls when they threaten litigation in the effort to procure easy and lucrative settlements from their targets.</p>
    <div>
      <h3>Cloudflare is Pursuing Our Fight Against Patent Trolls All the Way to the Steps of the Supreme Court</h3>
      <a href="#cloudflare-is-pursuing-our-fight-against-patent-trolls-all-the-way-to-the-steps-of-the-supreme-court">
        
      </a>
    </div>
    <p>Cloudflare joined Dell, Facebook, and a number of other companies, all practicing entities with large patent portfolios, in a <i>brief amici curiae</i> (or ‘friend of the court’ brief) in support of the IPR process, because it has a substantial positive impact on technological innovation in the United States. Amicus briefs allow parties who are interested in the outcome of a case, but are not parties to the immediate dispute before the court, to have input into the court’s deliberations.</p><p>As many of you are aware, we were sued by Blackbird Technologies, a notorious patent troll, earlier this year for patent infringement, and initiated <a href="/project-jengo/">Project Jengo</a> to crowd source prior art searches and invalidate Blackbird’s patents. One of our strategies for quickly and efficiently invalidating Blackbird’s patents is to take advantage of the IPR process at the USPTO, which can be completed in about half the time and at one tenth of the cost of a federal court case, and to initiate ex parte proceedings against Blackbird’s other patents that are overly broad and invalid.</p><p>A full copy of the Amicus Brief we joined in the Oil States case is <a href="http://www.scotusblog.com/wp-content/uploads/2017/11/16-712-bsac-Dell.pdf">available here</a>, and a summary of the argument follows.</p>
    <div>
      <h3>Oil States Makes its Case</h3>
      <a href="#oil-states-makes-its-case">
        
      </a>
    </div>
    <p>Oil States is an oilfield services and drilling equipment manufacturing company. The USPTO invalidated one of its patents related to oil drilling technology in an IPR proceeding while Oil States had a lawsuit pending against one of its competitors claiming infringement of its patent. After it lost the IPR, Oil States lost an appeal in a lower federal court based on the findings of the IPR proceeding. The Supreme Court agreed to hear the case to determine whether once the USPTO issues a patent, an inventor has a constitutionally protected property right that — under <a href="http://www.heritage.org/constitution/#!/articles/3">Article III</a> of the U.S. Constitution (which outlines the powers of the judicial branch of the government), and the <a href="https://constitutioncenter.org/interactive-constitution/amendments/amendment-vii">7th Amendment</a> (which addresses the right to a jury trial in certain types of cases) — cannot be revoked without intervention by the court system.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7z8W4ddP5TNd6vuTDuq7Pa/da4fb8ee9e1d4f7c3eb52495a58ad6ff/2770193028_68edc662a9_b.jpg" />
            
            </figure><p><a href="https://www.flickr.com/photos/paul_lowry/2770193028">Image</a> by <a href="https://creativecommons.org/licenses/by/2.0/">Paul Lowry</a></p><p>As the patent owner, Oil States argues that the IPR process violates the relevant provisions of the constitution by allowing an administrative body, the Patent Trial and Appeal Board (PTAB)--a non-judicial forum, to decide a matter which was historically handled by the judiciary. This argument rests upon the premise that there was a historical analogue to cancellation of patent claims available in the judiciary. Since cancellation of patent claims was historically available in the judiciary, the cancellation of patent claims today must be consistent with that history and done exclusively by courts.</p><p>This argument is flawed on multiple counts, which are set forth in the “friend of the court” brief we joined.</p>
    <div>
      <h4>First Flaw: An Administrative Process Even an Originalist Can Love</h4>
      <a href="#first-flaw-an-administrative-process-even-an-originalist-can-love">
        
      </a>
    </div>
    <p>As the amicus brief we joined points out, patent revocation did not historically rest within the <i>exclusive</i> province of the common law and chancery courts, the historical equivalents in Britain to the judiciary in the United States. Rather, prior to the Founding of the United States, patent revocation rested entirely with the Crown of England’s Privy Council, a non-judicial body comprising of advisors to the king or queen of England. It wasn’t until later that the Privy Council granted the chancery court (the judiciary branch) concurrent authority to revoke patents. Because a non-judicial body had the authority to revoke patents when the US Constitution was framed, the general principles of separation of powers and the right to trial in the Constitution do not require that patentability challenges be decided solely by courts.</p>
    <div>
      <h4>Second Flaw: The Judicial Role was Limited</h4>
      <a href="#second-flaw-the-judicial-role-was-limited">
        
      </a>
    </div>
    <p>Not only did British courts share the power to address patent rights historically, the part shared by the the courts was significantly limited. Historically, the common-law and chancery courts only received a partial delegation of the Privy Council’s authority to invalidate patents. Courts only had the authority to invalidate patents for issues related to things like inequitable conduct (e.g., making false statements in the original patent application). The limited authority delegated to the England Courts did not include the authority to seek claim <i>cancellation</i> based on elements intrinsic to the patent or patent application, like lack of novelty or obviousness as done under an IPR proceeding. Rather, such authority remained with the Privy Council, a non-court authority, which decided questions like whether the invention was really new. Thus, like the PTAB, the Privy Council was a non-judicial body charged with responsibility to assess patent validity based on criteria that included the novelty of the invention.</p><p>We think these arguments are compelling and provide very strong reasons why the Supreme Court should resist the request that such matters be resolved exclusively in federal courts. We hope that’s the position they do take because the real world implications are significant.</p>
    <div>
      <h3>Don’t Mess with a Good Thing</h3>
      <a href="#dont-mess-with-a-good-thing">
        
      </a>
    </div>
    <p>The IPR process is not only consistent with the US Constitution, but it also advances the Patent Clause’s objective of promoting the progress of science and useful arts. That is, the “quid pro quo of the patent system; the public must receive meaningful disclosure in exchange for being excluded from practicing the invention for a limited period of time” by patent rights. (<a href="http://caselaw.findlaw.com/us-federal-circuit/1330083.html">Enzo Biochem, Inc. v. Gen-probe Inc.</a>) Congress created the IPR process in the America Invents Act in 2011 to use administrative review to weed out poor-quality patents that did not satisfy this quid pro quo because they had not actually disclosed very much. Congress sought to provide quick and cost effective administrative procedures for challenging the validity of patent claims that did not disclose novel inventions, or that claimed to disclose substantially more innovation than they actually did, to improve patent quality and restore confidence in the presumption of validity. In other words, Congress created a system to specifically permit the efficient challenge of the zealous assertion of vague and overly broad patents.</p><p>As a recent study by the Congressional Research Service found, non-practicing entity (i.e., patent troll) patent litigation “activity cost defendants and licensees $29 billion in 2011, a 400 percent increase over $7 billion in 2005” and “the losses are mostly deadweight, with less than 25 percent flowing to innovation and at least that much going towards legal fees.” (<i>see</i> <a href="https://fas.org/sgp/crs/misc/R42668.pdf">Brian T. Yeh, Cong. Research sERV., R42668</a>) The IPR process enables innovative companies to navigate patent troll activity in an efficient manner and devote a greater proportion of their resources to research and development, rather than litigation or cost-of-litigation settlement fees for invalid patents.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Z16vK3gaEXUJzxOBryzmQ/1f95b6132fadedc994bfa0f783f05b83/Troll-slip.jpg" />
            
            </figure><p>By EFF-Graphics (<a href="http://creativecommons.org/licenses/by/3.0/us/deed.en">Own work</a>), via <a href="https://commons.wikimedia.org/wiki/File%3ATroll-slip.jpg">Wikimedia Commons</a></p><p>Additionally, the IPR process reduces the total number and associated costs of patent disputes in a number of ways.</p><ul><li><p>Patent owners, especially patent trolls, are less likely to threaten litigation or file an infringement suit based on patent claims that they know or suspect to be invalid. In fact, patent owners who threaten or file suit merely to seek cost-of-litigation settlements have become far less prevalent because of the availability of the IPR process to reduce the cost of litigation.</p></li><li><p>Patent owners are less likely to initiate litigation out of concerns that the IPR proceedings may culminate in PTAB’s cancellation of all patent claims asserted in the infringement suit.</p></li><li><p>Where the PTAB does not cancel all asserted claims, statutory estoppel and the PTAB’s claim construction may serve to narrow the infringement issues to be resolved by the district court.</p></li></ul><p>Our hope is that the US Supreme Court justices take into full consideration the larger community of innovative companies that are helped by the IPR system in battling patent trolls, and do not limit their consideration to the implications on the parties to <i>Oil States</i> (neither of which is a non-practicing entity). As we have explained, not only does the IPR process enable innovative companies to focus their resources on technological innovation, instead of legal fees, but allowing the USPTO to administer IPR and ex parte proceedings is entirely consistent with the US Constitution.</p><p>While we await a decision in <i>Oil States</i>, expect to see Cloudflare initiate IPR and ex parte proceedings against Blackbird Technologies patents in the coming months.</p><p>We will make sure to keep you updated.</p> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Jengo]]></category>
            <category><![CDATA[Patents]]></category>
            <guid isPermaLink="false">XZZEiX1w7tVTM646NnvRo</guid>
            <dc:creator>Edo Royker</dc:creator>
        </item>
    </channel>
</rss>