On 30 July 2021, the Federal Court of Australia decided that AI systems can be inventors. In a word-first determination of Thaler v Commissioner of Patents,{[2021] FCA 879, (‘Thaler’)}, the Honourable Justice Beach found that AI systems can be the inventors on a patent application under Australian patent law.
The decision has been appealed to the Full Bench of the Federal Court, which may decide to overrule it. For now, however, the decision is binding in Australia. Read on to find out what a patent is and an overview of the decision. We also chat with Ryan Abbott, one of the patent attorneys behind the Artificial Inventor Project, to discuss ‘Where to From Here?’.
What is a Patent?
Before we get into the Thaler case, let’s discuss what a patent is and what is used for. A patent is a ‘legally enforceable right for a device, substance, method or process’. For an application to be successful, the invention must be ‘new, useful and inventive or innovative’.{IP Australia}
The key benefit of a patent is an exclusive commercial right to the invention. This gives the patent owner the right to stop others from exploiting their invention without their permission. Patents encourage innovation, research and development in Australia.
Find out more about patents here.
Mots-clés : cybersécurité, sécurité informatique, protection des données, menaces cybernétiques, veille cyber, analyse de vulnérabilités, sécurité des réseaux, cyberattaques, conformité RGPD, NIS2, DORA, PCIDSS, DEVSECOPS, eSANTE, intelligence artificielle, IA en cybersécurité, apprentissage automatique, deep learning, algorithmes de sécurité, détection des anomalies, systèmes intelligents, automatisation de la sécurité, IA pour la prévention des cyberattaques.
Bots et IA biaisées : une menace silencieuse pour la cybersécurité des entreprises Introduction Les…
Cloudflare en Panne : Causes Officielles, Impacts et Risques pour les Entreprises Le 5 décembre…
Introduction La cybersécurité est aujourd’hui une priorité mondiale. Récemment, la CISA (Cybersecurity and Infrastructure Security…
La transformation numérique face aux nouvelles menaces Le cloud computing s’impose aujourd’hui comme un…
Les attaques par déni de service distribué (DDoS) continuent d'évoluer en sophistication et en ampleur,…
Face à l'adoption croissante des technologies d'IA dans les PME, une nouvelle menace cybersécuritaire émerge…
This website uses cookies.