Nintendo of America Inc., and Nintendo Co., Ltd. sell the Nintendo Entertainment System (NES). Two of Nintendo’s competitors, Atari Games Corporation and its wholly-owned subsidiary, Tengen, Inc., sued Nintendo for, among other things, unfair competition, Sherman Act violations, and patent infringement. Nintendo sued Atari for, among other things, unfair competition, patent infringement, copyright infringement, and trade secret violations. The United States District Court for the Northern District of California consolidated the two cases and preliminarily enjoined Atari from exploiting Nintendo’s copyrighted computer program. Because Nintendo has shown a likelihood of success on its copyright infringement claims, this court affirms.
BACKGROUND
Nintendo’s home video game system— the NES — includes a monitor, console, and controls. The console is a base unit into which a user inserts game cartridges. These cartridges contain the various game programs for the NES. As dictated by the program on the cartridge, the console controls an image on a video monitor, often a television set. In response to this video display, the user interacts with the system by manipulating the controls. Thus, by operating the controls in response to the video image, an individual plays the game on the cartridge in the NES console.
For instance, the game program may control a maze or set of obstacles on the video display. The user then manipulates the controls to guide an object through the maze or set of obstacles. The game pro *836 gram then awards the user points for proficiently passing through the maze or obstacles.
Nintendo designed a program — the IONES — to prevent the NES from accepting unauthorized game cartridges. Both the NES console and authorized game cartridges contain microprocessors or chips programed with the IONES. The console contains a “master chip” or “lock.” Authorized game cartridges contain a “slave chip” or “key.” When a user inserts an authorized cartridge into a console, the slave chip in effect unlocks the console; the console detects a coded message and accepts the game cartridge. When a user-inserts an unauthorized cartridge, the console detects no unlocking message and refuses to operate the cartridge. Nintendo’s IONES program thus controls access to the NES.
Atari first attempted to analyze and replicate the NES security system in 1986. Atari could not break the IONES program code by monitoring the communication between the master and slave chips. Atari next tried to break the code by analyzing the chips themselves. Atari analysts chemically peeled layers from the NES chips to allow microscopic examination of the object code. 1 Nonetheless, Atari still could not decipher the code sufficiently to replicate the NES security system.
In December 1987, Atari became a Nintendo licensee. Atari paid Nintendo to gain access to the NES for its video games. The license terms, however, strictly controlled Atari’s access to Nintendo's technology, including the IONES program. Under the license, Nintendo would take Atari’s games, place them in cartridges containing the IONES program, and resell them to Atari. Atari could then market the games to NES owners. Nintendo limited all licensees, including Atari, to five new NES games per year. The Nintendo license also prohibited Atari from licensing NES games to other home video game systems for two years from Atari’s first sale of the game.
In early 1988, Atari’s attorney applied to the Copyright Office for a reproduction of the IONES program. The application stated that Atari was a defendant in an infringement action and needed a copy of the program for that litigation. Atari falsely alleged that it was a present defendant in a case in the Northern District of California. Atari assured the “Library of Congress that the requested copy [would] be used only in connection with the specified litigation.” In fact, no suit existed between the parties until December 1988, when Atari sued Nintendo for antitrust violations and unfair competition. Nintendo filed no infringement action against Atari until November 1989.
After obtaining the IONES source code from the Copyright Office, Atari again tried to read the object code from peeled chips. Through microscopic examination, Atari’s analysts transcribed the IONES object code into a handwritten representation of zeros and ones. Atari used the information from the Copyright Office to correct errors in this transcription. The Copyright Office copy facilitated Atari’s replication of the IONES object code.
After deciphering the IONES program, Atari developed its own program — the Rabbit program — to unlock the NES. Atari’s Rabbit program generates signals indistinguishable from the IONES program. The Rabbit uses a different microprocessor. The Rabbit chip, for instance, operates faster. Thus, to generate signals recognizable by the IONES master chip, the Rabbit program must include pauses. Atari also programmed the Rabbit in a different language. Because Atari chose a different microprocessor and programming language, the line-by-line instructions of the IONES and Rabbit programs vary. Nonetheless, as the district court found, the *837 Rabbit program generates signals functionally indistinguishable from the IONES program. The Rabbit gave Atari access to NES owners without Nintendo’s strict license conditions.
Nintendo asked the district court to enjoin Atari’s alleged infringement of its IONES copyright. Atari sought in a separate motion to enjoin Nintendo’s alleged antitrust violations and alleged misuse of its property rights. Nintendo prevailed on both motions. Atari appealed both rulings but subsequently moved to dismiss its appeal from the denial of its motion for a preliminary injunction. This court granted that motion. Atari asserts copyright misuse as a defense to copyright infringement.
ANALYSIS
Because this action includes patent infringement claims, this court has jurisdiction over this appeal. 28 U.S.C. §§ 1292, 1295, 1338 (1988). To resolve issues of copyright law, this court applies the law as interpreted by the regional circuits, in this case, the United States Court of Appeals for the Ninth Circuit.
Atari Games v. Nintendo of Am.,
The Ninth Circuit sustains preliminary injunctions if the movant shows “either a likelihood of success on the merits and the possibility of irreparable injury, or that serious questions going to the merits were raised and the balance of hardships tips sharply in its favor.”
Johnson Controls v. Phoenix Control Sys.,
The Ninth Circuit vacates a preliminary injunction “only if the district court abused its discretion, or based its decision on an erroneous legal standard or clearly erroneous findings of fact.”
Id.; accord Ocean Garden,
Thus, following Ninth Circuit case-law, this court must determine whether Nintendo has shown a likelihood of success on its prima facie case of copyright infringement and a likelihood that it will overcome Atari’s copyright misuse defense.
See H.H. Robertson, Co. v. United Steel Deck,
Copyright Infringement
To prevail on its copyright infringement claim, Nintendo must show ownership of the IONES program copyright and copying by Atari of protectable expression from the IONES program.
Feist Publications v. Rural Tel. Serv. Co.,
— U.S. -,
Nintendo can show copying by proving that Atari made literal copies of the IONES program. Alternatively, Nintendo can show copying by proving that Atari had access to the IONES program and that Atari’s work — the Rabbit program — is sub
*838
stantially similar to Nintendo’s work in ideas and the expression of those ideas.
Johnson Controls,
Copyright Overview
Article I, § 8, cl. 8, of the Constitution gives Congress power “[T]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” The Constitution thus gives Congress the authority to set the parameters of authors’ exclusive rights.
Sony Corp. of Am. v. Universal City Studios,
The statutory definition of “literary works” embraces computer programs:
“Literary works” are works, other than audiovisual works, expressed in words, numbers, or other verbal or numerical symbols or indicia, regardless of the nature of the material objects, such as books, periodicals, manuscripts, pho-norecords, film, tapes, disks, or cards, in which they are embodied.
17 U.S.C. § 101 (1980). As works “expressed in words, numbers, or other verbal or numerical symbols or indicia,” computer programs fall within the terms of the 1976 Act. The House Report for the 1976 Act explicitly includes computer programs within “literary works”:
The term “literary works” does not connote any criterion of literary merit or qualitative value: it includes ... computer data bases, and computer programs to the extent that they incorporate authorship in the programmer’s expression of original ideas, as distinguished from the ideas themselves.
H.R.Rep. No. 1476, 94th Cong., 2d Sess. 54 (1976),
reprinted in
1976 U.S.C.C.A.N. 5659, 5667. As literary works, copyright protection extends to computer programs,
see, e.g., Johnson Controls,
The 1976 Act, however, sets limits on the scope of copyright protection. In the words of the Supreme Court, “[t]he mere fact that a work is copyrighted does not mean that every element of the work may be protected.”
Feist,
— U.S. at-,
In no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.
17 U.S.C. § 102(b). The 1976 House Report on section 102(b) applies this limitation directly to computer programs.
Some concern has been expressed lest copyright in computer programs should extend protection to the methodology or processes adopted by the programmer, rather than merely to the “writing” ex *839 pressing his ideas. Section 102(b) is intended, among other things, to make clear that the expression adopted by the programmer is the copyrightable element in a computer program, and that the actual processes or methods embodied in the program are not within the scope of the copyright law.
H.R.Rep. No. 1476, 94th Cong., 2d Sess. 57 (1976), reprinted, in 1976 U.S.C.C.A.N. 5659, 5670.
Protectable Expression
This overview of copyright law explains the trial court’s initial task is separating protectable expression in the IONES program from unprotectable ideas, facts, processes, and methods of operation. The Copyright Act, however, contains no explicit standards for separating a computer program’s expression from its idea. Rather this court must examine tests used for other literary works to distinguish expression from idea.
Judge Learned Hand devised an abstraction test to separate the idea from expression in written or dramatic works:
Upon any work ... a great number of patterns of increasing generality will fit equally well, as more and more of the incident is left out.... [T]here is a point in this series of abstractions where they are no longer protected, since otherwise the playwright could prevent the use of his “ideas,” to which, apart from their expression, his property is never extended.
Nichols v. Universal Pictures Corp.,
After separating the program into manageable components, the court must next filter the unprotectable components of the program from the protectable expression.
See Computer Assocs. Int’l,
23 USPQ2d at 1253. The court must filter out as unprotectable the ideas, expression necessarily incident to the idea, expression already in the public domain, expression dictated by external factors (like the computer’s mechanical specifications, compatibility with other programs, and demands of the industry served by the program), and expression not original to the programmer or author.
Id.,
23 USPQ2d at 1253, 1255, 1256;
see also Harper & Row,
In addition, copyright protection does not “extend to any ... procedure, process, system [or] method of operation.” 17 U.S.C. § 102(b). In conformance with the standards of patent law, title 35 provides protection for the process or method performed by a computer in accordance with a program.
See Arrhythmia Research Technology v. Corazonix Corp.,
This court, in applying Ninth Circuit law, must determine whether each component of the IONES program “qualifies as an expression of an idea, or an idea itself.”
Johnson Controls,
Nintendo’s IONES program contains more than an idea or expression necessarily incident to an idea. Nintendo incorporated within the IONES program creative .organization and sequencing unnecessary to the lock and key function. Nintendo chose arbitrary programming instructions and arranged them in a unique sequence to create a purely arbitrary data stream. This data stream serves as the key to unlock the NES. Nintendo may protect this creative element of the IONES under copyright.
External factors did not dictate the design of the IONES program. Nintendo may have incorporated some minimal portions of the program to accommodate the microprocessor in the NES, but no external factor dictated the bulk of the program. Nor did Nintendo take this program from the public domain. By registering the IONES with the Copyright Office, Nintendo obtained the benefit of a presumption of originality which Atari does not rebut- on this record.
Finally, Nintendo seeks to protect the creative element of its program beyond the literal expression used to effect the unlocking process. The district court defined the unprotectable IONES idea or process as the generation of a data stream to unlock a console. This court discerns no clear error in the district court’s conclusion. The unique arrangement of computer program expression which generates that data stream does not merge with the process so long as alternate expressions are available.
Formula Int’l,
At this stage in the proceedings of this case, Nintendo has made a sufficient showing that its IONES program contains pro-tectable expression. After filtering unpro-tectable elements out of the IONES program, this court finds no error in the district court’s conclusion that IONES contains protectable expression. Nintendo independently created the IONES program and exercised creativity in the selection and arrangement of its instruction lines.
See Bellsouth Advertising & Publishing v. Donnelly Info. Publishing,
Next, this court must determine whether the district court correctly determined that Nintendo has shown sufficient evidence that Atari either literally copied the IONES or had access to the IONES and produced a substantially similar copy. Nintendo argues that Atari’s unauthorized acquisition of a copy from the Copyright Office literally infringed the IONES program. Nintendo also argues that copies of the IONES program made in the reverse engineering process literally infringe the IONES copyright. Finally, Nintendo argues that Atari’s Rabbit program is substantially similar to the IONES and therefore infringes the IONES copyright. A single copy is sufficient to support a claim of copyright infringement.
See
17 U.S.C. § 106; 1 U.S.C. § 1 (1988) (“words imparting the plural include the singular”); S.Rep. No. 94-473 at 58 (1975); H.R.Rep. No. 94-1476 at 61 (1976). Even for works warranting little copyright protection, verbatim copying is infringement.
*841
See
Data East USA v. Epyx, Inc.,
Verbatim Copying
Atari acquired a copy of the IONES program from the Copyright Office and used it to replicate the IONES source code. The Copyright Act states:
Copies or reproductions of deposited articles retained under the control of the Copyright Office shall be authorized or furnished only under the conditions specified by the Copyright Office regulations.
17 U.S.C. § 706(b). In conformance with protective regulations, this provision permits access to copyrighted works. Copies obtained from the Copyright Office in violation of the regulations, however, are unauthorized reproductions.
Section 201.2(d)(2) of the Regulations of the Copyright Office (as amended through July 1, 1986), permit reproduction only if: (1) the copyright owner grants permission, (2) a court orders reproduction, or (3)
(ii) The Copyright Office receives a written request from an attorney on behalf of either the plaintiff or defendant in connection with litigation, actual or prospective, involving the copyrighted work. The following information must be included in such a request: (A) The names of all the parties involved and the nature of the controversy; (B) the name of the court in which the actual case is pending or, in the case of a prospective proceeding, a full statement of the facts of the controversy in which the copyrighted work is involved; and (C) satisfactory assurance that the requested reproduction will be used only in connection with the specified litigation.
Id. Under this regulation, Atari requested the IONES program in 1988. 3
Section 201.2(d)(2) refers to “litigation, actual or prospective.” The term “prospective litigation,” as used in the regulation, means more than a subjective expectation of litigation at some unspecified future time. Otherwise, anyone desiring a copy of a deposited work would only need to allege a speculative future dispute. Instead, the regulation repeatedly refers to and requests information about an actual controversy between parties. This language, in context, clarifies that the regulation requires an objective, reasonable apprehension of litigation. 4
In this case, Nintendo is likely to show that Atari had no reasonable apprehension of litigation in 1988. In fact, Atari was not in a position to infringe before acquiring the IONES program from the Copyright Office. Atari was Nintendo’s licensee in 1988. Atari had no product, allegedly infringing or not, to perform the function of the IONES program. Without any allegedly infringing program at all in 1988, Atari had no reason to fear a copyright infringement suit from Nintendo. Therefore, no controversy at all existed when Atari acquired the IONES program from the Copyright Office. Without an actual controversy, Atari’s acquisition of *842 the IONES source code violated Copyright Office rules. Reproduction of an unauthorized copy from the Copyright Office violates 17 U.S.C. § 106(1).
On this record, the district court did not err in determining that Nintendo is likely to show successfully that Atari infringed the IONES copyright by obtaining and copying the source code from the Copyright Office.
Reverse Engineering
Atari made copies of the IONES program in its attempts to “reverse engineer” Nintendo’s program. Atari made intermediate copies in two very different settings. Before obtaining the Copyright Office copy of IONES, Atari tried to understand the program. Atari stripped some IONES chips and copied portions of the IONES object code from the chips. 5
After obtaining the copy of the code from the Copyright Office, Atari made other intermediate copies of the program. Atari made photocopies of the Copyright Office copy, deprocessed chips, and hand-copied the IONES object code from the deprocessed chip. Atari then entered this copied IONES object code into a computer which aided in understanding the ideas in the program. The district court determined that this intermediate copying infringed Nintendo’s copyright.
The Copyright Act encourages authors to share their creative works with society. The Constitution sets forth the purpose of copyright protection as the promotion of “the Progress of Science”, not the rewarding of authors. U.S. Const, art. I, § 8, cl. 8;
Feist,
— U.S. at-,
The author does not acquire exclusive rights to a literary work in its entirety. Under the Act, society is free to exploit facts, ideas, processes, or methods of operation in a copyrighted work.
See, e.g., Feist,
— U.S. at-,
This permission appears in the fair use exception to copyright exclusivity. Section 107 of the Copyright Act states that “fair use of a copyrighted work, including such use by reproduction in copies ... for purposes such as criticism, comment, news reporting, teaching ... scholarship or re
*843
search” is not infringement. 17 U.S.C. § 107. The legislative history of section 107 suggests that courts should adapt the fair use exception to accommodate new technological innovations. H.R.Rep. No. 1476, 94th Cong., 2d Sess. 66 (1976),
reprinted in
U.S.C.C.A.N. 5659, 5679-80; 17 U.S.C. § 107;
see also Twentieth Century,
Thus, the Act exempts from copyright protection reproductions for “criticism, comment ... or research.” These activities permit public understanding and dissemination of the ideas, processes, and methods of operation in a work:
The copyright holder has a property interest in preventing others from reaping the fruits of his labor, not in preventing the authors and thinkers of the future from making use of, or building upon, his advances. The process of creation is often an incremental one, and advances building on past developments are far more common than radical new concepts. See Lewis Galoob Toys, Inc. v. Nintendo,964 F.2d 965 (9th Cir.1992). Where the infringement is small in relation to the new work created, the fair user is profiting largely from his own creative efforts rather than free-riding on another’s work. A prohibition on all copying whatsoever would stifle the free flow of ideas without serving any legitimate interest of the copyright holder.
New Kids on the Block v. News Am. Publishing,
Section 107 also requires examination of the nature of the work when determining if a reproduction is a fair use. 17 U.S.C. § 107(2). When the nature of a work requires intermediate copying to understand the ideas and processes in a copyrighted work, that nature supports a fair use for intermediate copying. Thus, reverse engineering object code to discern the unprotectable ideas in a computer program is a fair use.
See Feist,
— U.S. at -,
Fair use to discern a work’s ideas, however, does not justify extensive efforts to profit from replicating protected expression. Subparagraphs 1 and 4 of section 107 clarify that the fair use in intermediate copying does not extend to commercial exploitation of protected expression.
Sony Corp.,
In this case, the source code obtained from the Copyright Office facilitated Atari’s intermediate copying of the IONES program. To invoke the fair use exception, an individual must possess an authorized copy of a literary work.
See Harper & Row,
Reverse engineering, untainted by the purloined copy of the IONES program and necessary to understand IONES, is a fair use. An individual cannot even observe, let alone understand, the object code on Nintendo’s chip without reverse engi *844 neering. Atari retrieved this object code from NES security chips in its efforts to reverse engineer the IONES program. Atari chemically removed layers from Nintendo’s chips to reveal the IONES object code. Through microscopic examination of the “peeled” chip, Atari engineers transcribed the IONES object code into a handwritten list of ones and zeros. While these ones and zeros represent the configuration of machine readable software, the ones and zeros convey little, if any, information to the normal unaided observer. Atari then keyed this handwritten copy into a computer. The computer then “disassembled” 6 the object code or otherwise aided the observer in understanding the program’s method or functioning. This “reverse engineering” process, to the extent untainted by the IONES copy purloined from the Copyright Office, qualified as a fair use.
The district court assumed that reverse engineering (intermediate copying) was copyright infringement.
Atari Games v. Nintendo of Am.,
Nos. 88-4805, 89-0027, 89-0824, slip op. at 11-13,
Even in the absence of verbatim copying, a copyright owner may show infringement “by showing that the infringer had access to the work and that the two works are substantially similar.”
Shaw v. Lindheim,
The Ninth Circuit uses a two-step analysis to evaluate substantial similarity:
First, an “extrinsic” test is used to determine whether two ideas are substantially similar. This is an objective test which rests upon specific criteria that can be listed and analyzed. Second, an “intrinsic” test is used to compare forms of expression. This is a subjective test which depends on the response of the ordinary reasonable person.
Data East,
In applying this test, the district court correctly considered expert testimony recounting striking similarities between the Rabbit and IONES programs. Moreover, the trial court detected similarities between the programs beyond the similarities necessary to accommodate the programming environment, or similarities necessary to em *845 body the unprotectable idea, process, or method of the IONES program.
Specifically, the district court noted that the Rabbit program incorporates elements of the IONES program unnecessary for the chip’s performance. The IONES slave chip performs some functions beyond unlocking the NES console. For example, the IONES slave chip shuts down upon receipt of an erroneous message from a master chip. The Rabbit program too contains this feature. This disabling feature is unnecessary to achieve Atari’s stated purpose— unlocking the NES console.
In another example, the district court noted that Nintendo modified its IONES slave chip program in 1987. This modification deleted some instructions from the original IONES program. Nonetheless the Rabbit program contains instructions equivalent to those deleted from the original IONES program. These unnecessary instructions strongly suggest that the Rabbit program is substantially similar to the IONES program.
See, e.g., M. Kramer Mfg. Co. v. Andrews,
While Atari may freely reproduce the idea or process of Nintendo’s IONES code, copying of fully extraneous instructions unnecessary to the IONES program’s function strongly supports the district court’s imposition of an injunction on the likelihood Nintendo will show infringement. The unnecessary instructions in the Rabbit program suggest copying, not independent creation. As Judge Learned Hand said, “No plagiarist can excuse the wrong by showing how much of his work he did not pirate.”
Sheldon v. Metro Goldwyn Pictures Corp.,
In sum, Nintendo is likely to show that its IONES program contains protectable expression. Atari’s efforts to reverse engineer the IONES chip to learn the ideas in the program will not alone support a copyright infringement claim. To the extent, however, Nintendo is likely to show misappropriation and copying of the unauthorized Copyright Office copy, it is likely to succeed on the merits of its infringement claim. Alternatively, Nintendo is likely to prove substantial similarity between the Rabbit and IONES programs sufficient to support its infringement claims. This record thus justifies the trial court’s imposition of a preliminary injunction.
Copyright Misuse
As a defense to copyright infringement, Atari asserts Nintendo has misused its copyright of the lockout program. Atari alleges Nintendo has conditioned the license of its copyrighted lockout program on the acceptance of contract provisions that give it control over the games developed by independent, third-party software developers. The standard license exclusivity provision Nintendo includes in its contracts provides:
Exclusivity: LICENSEE agrees to sell the Licensed Products for use only in conjunction with the NES. For a period of two (2) years following the date of first sale by LICENSEE of any Licensed Products pertaining to any particular video game program developed by LICENSEE under this Agreement, LICENSEE will not adapt or offer such video game program or any derivatives of such video game program, for use in any: (a) other home video system; or, (b) home computer system....
*846 The district court granted Nintendo’s motion for preliminary injunction in response to which Atari asserted the copyright misuse defense. Atari contends Nintendo’s copyright misuse should prevent copyright enforcement. The district court did not discuss copyright misuse in its order granting the preliminary injunction. However, on Atari’s earlier motion for summary judgment, the court held, as a matter of law, that Nintendo did not misuse its copyright:
The record does not demonstrate, as a matter of law, that such restrictions restrain the creativity of Nintendo licensees and thereby thwart the intent of the patent and copyright laws.
Atari Games v. Nintendo of Am.,
Nos. 88-4805, 89-0027, slip op. at 5-6,
In its opinion, the district court raised questions about the origin of a copyright misuse defense. Once again, this court applies Ninth Circuit law.
Sun Studs v. Applied Theory Assoc.,
Several circuit courts, including the Ninth Circuit, have entertained defenses of copyright misuse.
Lasercomb Am. v. Reynolds,
Although it has yet to apply the copyright misuse defense, the United States Supreme Court has given at least tacit approval of the defense.
United States v. Loew’s, Inc.,
In the absence of any statutory entitlement to a copyright misuse defense, however, the defense is solely an equitable doctrine. Any party seeking equitable relief must come to the court with “clean hands.’’
Keystone Driller Co. v. General Excavator Co.,
CONCLUSION
The district court did not err by granting Nintendo’s request for a preliminary injunction. Nintendo is likely to prove that the IONES program contains protected expression. Nintendo is also likely to prove that Atari made unauthorized verbatim copies of the IONES program. On this record, the district court did not err in determining that Nintendo is likely to show successfully that Atari infringed the IONES copyright by obtaining and copying the source code from the Copyright Office. Furthermore, Nintendo is likely to prove that Atari’s Rabbit program is substantially similar to the IONES program and that the similarities relate to protected expression. Nintendo is also likely to overcome Atari’s assertion of copyright misuse as a defense. Atari presents no arguments to rebut the presumption of irreparable harm that arises upon a showing of likelihood of success on the merits.
AFFIRMED.
Notes
. Object code is machine readable, binary code, represented on paper as a series of ones and zeroes. In actuality, those ones and zeroes represent "on" and "off” states of switches on a computer chip. In the IONES chips, the object code, contained in chip memories, is implemented when the chips are operational. When operational, the chips generate a series of "ons” and "offs” in a particular sequence. That results in a pulsating signal which conveys messages to the computer.
. For a thorough historical presentation of Congress's copyright enactments,
see Lotus Develop
ment
v. Paperback Software International,
. In 1991, the Copyright Office circulated the following notice:
The Copyright Office has recently become aware that an attorney completing the previous Litigation Statement form provided by the Office could generally allege that a controversy existed when in fact no real controversy did exist. An attorney could thus receive reproductions of deposits not authorized by the regulations. The Litigation Statement form has been amended to require the applicant to give more specific information regarding prospective proceedings and to include supporting documentation.
56 Fed.Reg. 12,957 (1991).
. Patent law applies an analogous test to determine an actual controversy.
See Sony Corp. of Am. v. Universal City Studios,
. The Semiconductor Chip Protection Act of 1984 permits, in some limited circumstances, reverse engineering to reproduce a mask work. 17 U.S.C. § 906 (1988). This Act, while supporting reverse engineering to help disseminate the ideas embodied in a mask work, does not apply in this case. Atari did not reproduce or copy Nintendo’s chip or mask work. In fact, Atari used an entirely different chip. Atari instead allegedly copied the program on Nintendo's chip. Therefore, the 1984 Act does not apply.
. Computer programs are normally written in a high-level language such as C or FORTRAN. Once written, the program is translated from the high-level language to machine-readable object code. This translation process, called compiling, is performed by a computer as instructed by a compiling program. As mentioned previously, the idea or process expressed in a program is not easily discernible from object code. Object code is disassembled to facilitate understanding the idea or process expressed. Disas-sembly is basically the reverse of compilation. Object code is translated via a disassembly program to a higher, more intelligible language called assembly language.
