Hosting and conducting a source code review can be expensive in terms of time, cost and security. Attorneys necessarily have to manage a balancing act to ensure not only that the producing party's source code remains secure but also that the source code review is done diligently and efficiently. 

Copperpod's source code experts navigate through the source code quickly to identify:

  • Implementation of the patented technology with detailed excerpts

  • Missing source code

  • Missing documentation referenced in the source code

  • Most appropriate witnesses for testifying on source code

  • Relevant development and release dates

  • Source code from third parties

  • Source Code governed by open-source licenses

We use highly specialized tools and software that make the source code review process as efficient as possible - while ensuring that no relevant evidence is overlooked.


Building upon the source code evidence, our consulting experts work closely with expert witnesses and litigators to supplement patent infringement contentions, prepare exhibits for expert reports and refine technical arguments for depositions and trial.

We have leveraged our source code review capabilities to help clients achieve success in several high-tech cases covering:

  • Enterprise Software

  • IEEE 802.11a/b/g/n/ac/ad WLAN

  • IEEE 802.15 Bluetooth

  • 2G/3G/4G Telecommunications

  • Android/iOS/Symbian Mobile Operating Systems

  • UNIX/Linux/Windows/MacOS Operating Systems

  • Embedded Systems

  • Power Management

  • Web Browsers and Applications

  • Cryptography

  • Data Compression

  • Content Management Systems

  • Video Surveillance Systems

  • Image Processing

  • Semiconductor Memory Management

Source Code Review for Patent Infringement

Our source code experts are proficient in all modern programming languages and platforms - and continuously update their skills as technology and methodologies continue to evolve.


Source Code Review: Best Practices

Hosting and conducting a source code review can be expensive on more than one dimensions: time, cost and security. For a number of modern corporations such as Google, Uber and Facebook their real business value lies in their source code. Any theft that lands the crucial algorithms in the hands of competition can become an existential threat.

Software applications comprise source code files that are compiled to convert them into binary executable code. If this binary executable code is converted back into source code files using a decompiler then this will be termed as reverse engineering of source code. Source code review is a labor-intensive process that requires an expert to be physically present at the producing party’s or their opposing counsel’s offices – which creates a challenge.

Reverse Engineering Source Code

E-Discovery and The Federal Rules of Civil Procedure

Litigation involves discovery, the process of obtaining and exchanging evidence, or information that might potentially become evidence. Parties are bound to the legal procedure of information and evidence exchange with one another in state and federal courts. While it is primarily described in the context of litigation, the discovery process is essential to many other areas of investigations, arbitrations, and other forms of dispute resolution.

IP Becomes Even More Integral To M&A Due Diligence

Mergers and acquisitions (M&A) are transactions in which the ownership of companies, other business organizations, or their operating units are transferred or consolidated with other entities. As an aspect of strategic management, M&A can allow enterprises to grow or downsize, and change the nature of their business or competitive position.

Defensive Code Review: Fight Fire With Fire

The pendulum against covered business methods and software continues to swing backward or forward depending on whom you ask. Patent litigation statistics from 2014 and 2015 show that patent litigation on the whole decreased by over 13% - while NPEs in general increased their share of filings in the last year. America Invents Act and Alice-related decisions failed to rein in the number of case filings, contrary to knee-jerk public opinion.

Understanding Source Code Quality and Design Quality During Technology M&A

With thousands of transactions and billions of dollars spent on technology mergers and acquisitions (M&A) every year, buyers must protect their investments by conducting due diligence. M&A due diligence allows acquirers to do three important things - Confirm the premises of the deal, Gather information to plan the integration, Identify unknown risks