TW201019248A - IP insurance-adjusting risk assessment management system and method - Google Patents

IP insurance-adjusting risk assessment management system and method Download PDF

Info

Publication number
TW201019248A
TW201019248A TW97142349A TW97142349A TW201019248A TW 201019248 A TW201019248 A TW 201019248A TW 97142349 A TW97142349 A TW 97142349A TW 97142349 A TW97142349 A TW 97142349A TW 201019248 A TW201019248 A TW 201019248A
Authority
TW
Taiwan
Prior art keywords
risk
management
product
manager
insurance
Prior art date
Application number
TW97142349A
Other languages
Chinese (zh)
Inventor
Dave Wang
Angela Lu
Christine Wang
John Wang
Original Assignee
Grandot Tech Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Grandot Tech Inc filed Critical Grandot Tech Inc
Priority to TW97142349A priority Critical patent/TW201019248A/en
Publication of TW201019248A publication Critical patent/TW201019248A/en

Links

Abstract

The invention relates to an IP insurance-adjusting risk assessment management system and a method thereof, the system comprising: an application module providing the managed people to apply and use the system; a risk factor management module for managing the risk factors resulting in user risk; a risk management execution module adapted to calculate the risk values of the aforementioned risk factors; and an interactive research risk management system which, during product research and development process of the managed people, allows managers to establish encrypted historic research risk management information in accordance with the research record process of the managed people. The invention also provides an interactive research and development risk management system and a method thereof, and product upper and down streams insurance premium apportion calculation system and method for intellectual property.

Description

201019248 九、發明說明: 【發明所屬之技術領域】 本發明是關於一種智財保險調整型風險評估管理系統及方法· 該系統包含:一申請模組’係用以提供被管理者申請使用此系·’ -風險因子管理模組,用以管理會造成使用者風險的風險因’ 一風管執行模組,係用以計算前述風險因子所造成的風險值; 一互動式研發風險管理系統,係在被管理者的產品研發過程 管理者針龍管理者的研發記錄過輯立職歷史性研發風 理資料。 本發明亦提供一種互動式研發風險管理系統及方法; ❹ 該系統包含:管理者一或複數個電腦或事務機設備;被管理者一 或複數個電腦或事務機設備;一或複數個網際網路或網路設 無線寬頻,係用以連接前述管理者及被管理者的主機;一被管理 者研發風險管理資料模組,係用以管理及儲存研發風險管理 於被管理者所指定的資料伺服器中;一研發風險管理資料傳遞 組,係將被管理者的研發風險管理資料中雙方所約定的資料, 研發過程中傳遞給管理者;一管理者資料接收模組,用以接收被 管理者的研發風險管理資料;一鎖密保管模組,將該研發風險 理資料經過鎖密作業程序,分別儲存於被管理者所指定的資料伺 服器中,以及儲存於管理者的鎖密資料庫伺服器中成為鎖密歷史 性研發風險管理資料,且均不可作任何增加、修改及刪除動作。 本發明進一步提供一種產品上下游智財保險費用分攤計算系統 及方法’該系統包含:一風險因子管理模組,用以管理會造成投 保者風險的風險因子;一風管執行模組,用以計算前述風險因 子所造成的風險值;一單一零組件比重計算模組,係根據比重 。十算參考值,來計算該產品零組件在該產品所佔的比重;一產品 上下游智財保險費用分攤計算模組,係以前述風險值及比重 為計算基礎’計算出產品零組件的分攤比例或分攤保費。 201019248 【先前技術】 為專輔助智財相關保險商品 (例如專利執行險,乃 於潛在專概權險;或是專機權責錄,乃為對 效執行的顺評製造者,_者,制者的保險)有 ❹ ❿ 意承執行?對於做公司來說,自然是不願 系統專業,因此如果有專業的風險管理 或營運收益上險:無論是在企業風險 成逆辦=承=對201019248 IX. Description of the Invention: [Technical Field of the Invention] The present invention relates to a smart insurance adjustment type risk assessment management system and method. The system includes: an application module is used to provide an application for use by the manager. · '- risk factor management module to manage the risk of causing user risk because 'a wind pipe execution module is used to calculate the risk value caused by the aforementioned risk factors; an interactive R&D risk management system In the R&D process of the manager's product development process manager, the needle-dragon manager's R&D record has been used to create historical R&D information. The invention also provides an interactive R&D risk management system and method; ❹ The system comprises: one or more computer or transaction machine devices; one or more computer or transaction machine devices; one or more internet devices A wireless broadband is used to connect the administrator and the host of the manager; a manager manages the risk management data module to manage and store the R&D risk management information specified by the manager. In the server; a R&D risk management data transfer group, which is to be communicated to the manager by the management's R&D risk management data, and the manager's data receiving module is used to receive the managed The research and development risk management data; a lock-and-storage module, the R&D risk data is stored in the data server designated by the administrator and stored in the manager's lock database. The server has become a secret research and development risk management data, and no addition, modification or deletion can be made. The present invention further provides a product upstream and downstream intellectual property insurance cost sharing calculation system and method. The system comprises: a risk factor management module for managing risk factors that may cause insured risk; and a duct execution module for Calculate the risk value caused by the aforementioned risk factors; a single component-specific calculation module is based on the specific gravity. The reference value is calculated to calculate the proportion of the product components in the product; the upstream and downstream intellectual property insurance cost sharing calculation module is based on the aforementioned risk value and proportion as the calculation basis to calculate the distribution of product components. Proportion or share premium. 201019248 [Prior Art] In order to assist intellectual property-related insurance products (such as patent enforcement insurance, it is a potential special liability insurance; or a special machine rights record, it is a follow-up maker of effective performance, _, producer Insurance)) ❹ ❿ Intentional implementation? For a company, it is naturally unwilling to be a system professional, so if there is a professional risk management or operational income risk: whether it is in the enterprise risk

下嚣商口 S 公司“ iSSiSS,式,僅是藉著風險管理 在許多產業依賴的美國市場上生存,其風險代償是非常高昂 除了訴訟費用之外,其損害賠償關決更是高得令人啤舌, 更何況如果被判「故意侵權」,其賠償還可能是原來判決的2_3倍, ,於產業來說無疑是雪上加霜;因此,產業必須要未雨綢缪,進 行風險管理,以防遭受致命的打擊,以下是台灣在2002〜2008年 6月之間’專利權人根據美國關稅法337條的規定向美國貿易委員 會(itc)提出專利侵權的訴訟案件,以在海關即予以阻撞貨物入 境,總共183件中’有38件來自台灣。而自2002年至2008年6 月亞洲國家被提交ITC進行侵權控訴的案件,大陸為72件,日本 為29件,韓國為24件,香港為20件。由1975至2001年間,最 後以侵權判決的佔了 37%,沒有侵權佔13%,而最終以合解撤回的 案件則有50%。 8 201019248 國ΐ市場競ί激烈的情況下,專利權成為企業生存和競爭 的重要工具,現今高科技產業競相申請專利, 專利訴訟,作為打擊競爭對手,收取賠償金的 運;略,藉異議、舉發之名企圖使對手= =專==新=財碰制時勝企_必須更 因此,本發明希望藉由一適當的風險評估制度,讓 設計製造及銷售時,可藉域保關度及其#理方法獲得保、 ❹ 產品研發時要善盡防止產品侵權的研:風 袭世i *俾使絲*會目缺·題崎絲域險阻絕其 產業的競爭力,並進而以產品創新、智財建立為研發的主 創新發明得以適當娜的飾下,人類生活才麟續進步改善。 藉由本發明合理的風險評估、風險管控及保險制度,可讓產 業免於其產品無意中侵害他人權利的恐懼,而智財權所 以有效執行其權利。 於侍 【發明内容】 本發明之目的在於提供一種智財保險調整型風險評估管理系 統及方法,用以進行智財保險的風險評估暨管理。 本發明之目的在於提供一種互動式研發風險管理系統及方法, 用以儲存、管理被管理者所傳入的研發風險管理資料,使成為 捃歷史性研發風險管理資料,禁止任何增加、修改及刪除動作, 以達研發風險監控管理的目的,同時一旦有訴訟事件發生時,提 出此部份鎖密歷史性研發風險管理資料,與被管理者其他内部資 料比對整合後,藉以證明被管理者已盡管理之責,甚至可 故意侵權」的證據。 本發明之目的在於提供一種互動式研發風險管理系統及方法, 藉由該互動式研發風險管理系統所發出的研發風險控管參數 (R) ’達到風險值降低的目的,使得投保者在核保及保費計算 較有利的條件。 201019248 η 之目的在於提供一種產品上下游智財保險費用分攤計 异糸統及方法,係以風險值及比重為計算基礎,計算出 件的分攤保費,藉以加強產品上下游風險控管,進費 用以降低產業負擔。 樹買 本發明提供一種智財保險調整型風險評估管理系統,包含: 一風險因子管理模組,用以管理會造成使用者風險的風險因子; 一風管執行模組,係用以計算前述風險因子所造成的風險值; 一互動式研發風險管理系統,係在被管理者的產品研發過程中, 管理^針對被管理者的研發記錄過程建立鎖密歷史性研發風險管Xiakou Shangkou S Company "iSSiSS, the only way to survive in the US market relying on risk management in many industries, its risk compensation is very high, in addition to litigation costs, its damage compensation is even higher Beer tongue, not to mention if it is sentenced to "intentional infringement", its compensation may be 2_3 times that of the original judgment, which is undoubtedly worse in the industry; therefore, the industry must plan ahead and conduct risk management to prevent suffering. A fatal blow, the following is a lawsuit filed by the patentee from 2002 to June 2008 to the US Trade Commission (itc) under the provisions of Section 337 of the US Tariff Act to block cargo at customs. Inbound, a total of 183 of the '38' are from Taiwan. From 2002 to June 2008, Asian countries were submitted to ITC for infringement complaints, 72 in the mainland, 29 in Japan, 24 in South Korea and 20 in Hong Kong. Between 1975 and 2001, the final infringement judgment accounted for 37%, the infringement accounted for 13%, and the final withdrawal was 50%. 8 201019248 In the fierce situation of the international market, patents have become an important tool for enterprises to survive and compete. Today's high-tech industries compete to apply for patents and patent litigations. As a blow to competitors, they receive compensation. The name of the slogan is to make the opponent ==Special == New = 财 胜 胜 胜 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The #理方法 method is guaranteed, 要 product research and development should be done to prevent product infringement research: the wind attacked the world * * 俾 丝 会 会 · · · 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题 题The main innovations that Zhicai established for research and development have been properly decorated, and human life has continued to improve. By virtue of the reasonable risk assessment, risk management and insurance system of the present invention, the industry can be exempted from the fear of inadvertently infringing on the rights of others, and the intellectual property rights can effectively enforce their rights. [Abstract] The object of the present invention is to provide a smart insurance adjustment risk assessment management system and method for conducting risk assessment and management of intellectual property insurance. The object of the present invention is to provide an interactive R&D risk management system and method for storing and managing R&D risk management data transmitted by a manager, so as to become a historical R&D risk management material, prohibiting any addition, modification and deletion. Action, to achieve the purpose of R&D risk monitoring and management, and at the same time, when a litigation event occurs, this part of the secret research and development risk management information is proposed, and compared with other internal data of the manager to prove that the manager has Evidence of deliberate infringement despite the responsibility of the matter. The object of the present invention is to provide an interactive R&D risk management system and method, by which the R&D risk control parameter (R) issued by the interactive R&D risk management system achieves the purpose of reducing the risk value, so that the insured is underwriting And the premium calculation is more favorable. The purpose of 201019248 η is to provide a product-based upstream and downstream intellectual property insurance cost-sharing calculation method and method. Based on the risk value and specific gravity, the calculated premiums are calculated to enhance the upstream and downstream risk control of the products. To reduce the burden on the industry. Tree Buying The present invention provides a smart insurance adjusted risk assessment management system comprising: a risk factor management module for managing risk factors that cause user risks; a wind pipe execution module for calculating the aforementioned risks The risk value caused by the factor; an interactive R&D risk management system is in the process of product development by the manager, and the management of the R&D record process for the manager is established.

上述之智財保險調整型風險評估管理系統,其中風險因子管理模 組係以問卷呈現所有可能的風險因子,而由系統使用者輸入答^ 並儲存,再進一步由風管執行模組依該風險因子的權重值計算, 以求得其風險值》 上述之智財保險調整型風險評估管理系統,進一步包含一申請模 組,係用以提供系統使用者申請使用此系統。 上述之智財保險調整型風險評估管系統,其中該互動式研發風險 管理系統包含: 管理者一或複數個電腦或事務機設備; 被管理者一或複數個電腦或事務機設備; 一或複數個網際網路或網路設備或無線寬頻,係用以連接前述管 理者及被管理者的主機; 一被管理者研發風險管理資料模組’係用以管理及儲存研發風險 管理資料於被管理者所指定的資料伺服器中; 一研發風險管理資料傳遞模組,係將被管理者的研發風險管理資 料中雙方所約定的資料,在研發過程中傳遞給管理者; 一管理者資料接收模組’用以接收被管理者的研發風險管理資料; 一鎖密保管模組,將該研發風險管理資料經過鎖密作業程序,分 201019248 別儲存於被管理者所指定的資料伺服器中,以及儲存於管理者的 鎖密資料庫伺服器中成為鎖密歷史性研發風險管理資料,由於沒 有迴路程式設計,顯示介面無編輯的功能,故不可作任何增加、 修改及刪除動作。 ^述之智財保險調整型風險評估管理系統,其中該鎖密保管模組 沒有增加、修改或刪除的迴路程式設計。 _ 上述之智財保險調整型風險評估管理系統,其中該被管理者和管 理卞所儲存該研發風險管理資料的時間為一致,乃為一即時系統。 上述之智財保險調整型風險評估管理系統,其中該研發風險管理 資料或鎖密歷史性研發風險管理資料至少包含: 鎖密代碼、鎖密序號、產品編號、資料輸入曰期或時間、先 =檢索日期、先前專繼索數量、先前專财效性分析、產品不 ,權分析日期、產品不侵權分析結果、產品迴避設計記錄、產品 2展示日期、產品銷售日期、產品鎖售數量,或是相關之圖片、 f片、影音、簡報、實驗、測試、模擬等資料,或其它足以 在研發過程中不可能被塗改之資料記錄。 亡,之智聰險調整型風險評估管理系統,其中該鎖密 ^:鎖賊碼、鎖密序號、日期、時間均是藉由軟艘自動產生。 巍ΐϊΐ智ί做調整型風險評估管理系統,其中該被管理者研發 粵風險管理資料模組進一步包含: 研赞 =動模組赵新研發财’或之前研發案的衍生性新 記ί模組記錄’且在使用者操作完成鍵時,即時 發風險管理資料於被管理者所指定的資料伺服器令,由於 路程式設計,顯示介面無編輯的功能,故不可作任何辦加/、 及刪除動作;同時自動將管理者所需的研發風險管理士 ▲ -研發風險管理資料傳遞模組,即時傳送至管理 接收,並儲存於管理者的鎖密資料庫伺服器成為 # 能,故不可作任何增加、修改及刪除動作。 面…編輯的功 11 201019248 上述之智財保險調整型風險評估管理系統,其中該互動式研路 險管理系統進一步包含: 風 一研發風險控管參數’該參數顯示投保者是否經過互動式研發風 險管理系統的控管,以及該控管結果,作為前述第1項風管執行 模組計算風險值的參考值。 上述之智財保險調整型風險評估管理系統,其中該研發風險控管 參數乃依管理系統的該案管理年資計算,管理年資愈多則參數愈 大’而風險值愈小β 上述之智財保險調整型風險評估管理系統,其中該互動式研發風 ❹險管理系統進一步包含: 一被管理者提出申請鎖密歷史性研發風險管理資料模組,以及 ,密保管模組;該被管理者提出申請鎖密歷史性研發風險管理資 料模組用以供被管理者提出該鎖密歷史性研發風險管理資料的申 請’該解密保管模組則用於執行解密作業。 上述之智財保險調整型風險評估管理系統,其中該風險因子包含: 實質風險、經營風險; · 前述實質風險係指: 藝產品及其零崎是否有專娜、產品及其零__案專利檢索 分析數量、產品及其零組件的侵權訴訟次數、產品及其零組件侵 權訴訟時勝訴或者敗訴及其次數、產品及其零組件的實際銷售次 數、產品及其零組件的實際銷售數量、產品及其零組件的實際銷 售期間; 所擁有智_數量、智咖容或柄湖要求範壯或窄(依智財 檢索或分析結果)、該產品或零組件的專利是否確實存在該產品 或零組件的專利是否專屬授權於他人、該產品或零組件的專利是 否有抵押或設質; 前述經營風險係指: 12 201019248 者的絲面評估,如聽者㈣本額、鄕者賴務狀況、 的營業_長、投保者在-定_崎遭受的侵權訴訟或 =警告信_次數、聽者-定_内遭受侵權訴訟時勝訴或 者敗訴及其:欠數、投絲遭受侵權指她的理賠金額投保者是 否有防止產品侵害他人智財權的警戒措施與實施辦法。 之智財保險調整賴險評估管理系統,其風險值的計算公式 實質風險權重值+經營風險權重值=風險值總計The above-mentioned intelligent insurance-adjusted risk assessment management system, in which the risk factor management module presents all possible risk factors by questionnaire, and the system user inputs and saves, and further executes the module according to the risk. The weight value of the factor is calculated to obtain the risk value. The above-mentioned intellectual property insurance adjusted risk assessment management system further includes an application module for providing system users to apply for the system. The above-mentioned intelligent insurance-adjusted risk assessment management system, wherein the interactive R&D risk management system comprises: one or more computer or transaction machine devices; one or more computer or transaction machine devices; one or plural An internet or network device or wireless broadband is used to connect the aforementioned administrators and managed hosts; a manager's risk management data module is used to manage and store R&D risk management data to be managed. In the data server specified by the person; a R&D risk management data transfer module, which is to be communicated to the manager in the R&D process by the information agreed by both parties in the R&D risk management data of the manager; The group 'is used to receive the R&D risk management data of the manager; a lock-and-storage module, and the R&D risk management data is stored in the data server designated by the administrator according to the lock operation procedure, and 201019248, and Stored in the administrator's lock database server to become a secret research and development risk management data, because there is no loop Design, display interface no editing function, it can not make any addition, modification and deletion. ^The intellectual property insurance adjusted risk assessment management system, in which the lock storage module has no loop programming for addition, modification or deletion. _ The above-mentioned intellectual property insurance adjusted risk assessment management system, in which the time for the management and risk management information stored by the manager and the management is the same, is an immediate system. The above-mentioned intellectual property insurance adjusted risk assessment management system, wherein the research and development risk management data or the lock-hiking historical R&D risk management data at least includes: a lock code, a lock key number, a product number, a data input period or time, first = Search date, previous number of specializations, previous special financial efficiency analysis, product no, right analysis date, product non-infringement analysis result, product avoidance design record, product 2 display date, product sales date, product lock sales quantity, or Related pictures, f-slices, videos, presentations, experiments, tests, simulations, etc., or other data records that are not likely to be altered during the development process. Death, Zhizhi Congzhi adjustment risk assessment management system, in which the lock secret ^: lock thief code, lock secret serial number, date, time are automatically generated by the soft ship.巍ΐϊΐ智ί is an adjustment risk assessment management system, in which the manager's research and development of the Guangdong risk management data module further includes: 研赞=Moving module Zhao Xin R&D' or the previous research and development case derivative new ί module Recording 'when the user completes the operation key, the risk management data is immediately sent to the data server command specified by the administrator. Due to the distance design, the display interface has no editing function, so it is not allowed to add/and delete. At the same time, the R&D risk management staff required by the manager ▲ - R & D risk management data transfer module is automatically transmitted to the management receiving and stored in the manager's lock database server becomes #能, so can not be made any Add, modify, and delete actions. Face...Editing Work 11 201019248 The above-mentioned intelligent insurance-adjusted risk assessment management system, wherein the interactive research road insurance management system further includes: Wind-I R&D risk control parameter 'This parameter shows whether the insured has undergone interactive R&D risk The control of the management system and the result of the control are used as reference values for calculating the risk value of the first air duct execution module. The above-mentioned intellectual property insurance adjusted risk assessment management system, wherein the R&D risk control parameter is calculated according to the management system's management year, the more the management year is, the larger the parameter is, and the smaller the risk value is. The risk assessment management system, wherein the interactive R&D risk management system further comprises: a manager applying for a lock-up historical R&D risk management data module, and a confidential storage module; the manager is applying for a lock The secret historical R&D risk management data module is used for the administrator to submit the application for the secret research and development risk management data. The decryption storage module is used to perform the decryption operation. The above-mentioned intellectual property insurance adjusted risk assessment management system, wherein the risk factor includes: substantial risk, operational risk; · The aforementioned substantial risk refers to: whether the art product and its zero-saki have a special, product and zero patent Retrieve the number of infringement litigations, the number of infringement litigations for products and their components, the number of successful or lost claims against products and their component infringement litigation, the actual number of sales of products and their components, the actual sales quantities of products and their components, and products The actual sales period of the components and their components; whether the possession of the wisdom, the quantity, the wisdom, or the handle of the lake requires a strong or narrow (based on the intellectual search or analysis results), whether the product or component patent does exist in the product or component Whether the patents are exclusive to others, the products or components of the patents are mortgaged or quality; the aforementioned business risks refer to: 12 201019248 The silk surface assessment, such as the listener (four) the amount, the status of the deceased, Business _ long, the insured person wins or loses in the infringement lawsuit or the number of the infringement lawsuits : The number of infringements and the infringement of the wire is the insured amount of the insured person's warning measures and implementation measures to prevent the product from infringing the intellectual property rights of others. The intellectual property insurance adjustment risk assessment management system, the calculation formula of the risk value, the actual risk weight value + the business risk weight value = the total risk value

上述之智財保險調整型風險評估管理系統,其風險值的計算公式 1-研發風險控管參數=研發風險控管總值 前述如未經過互動式研發風險管理系統管理,其研發風險控管參The above-mentioned intellectual property insurance adjusted risk assessment management system, its risk value calculation formula 1 - R & D risk control parameters = R & D risk control total value The above, if not managed by the interactive R & D risk management system, its R & D risk control

上述之智財保險調整型風險評估管理系統,其中該風險因子管理 模組進一步用以管理投保者所提供的調整增刪資料,如有新增 料,必須經過風管執行模組的進一步風險管理,未調整的資^ 可重複利用。 J 上述之智財保險調整型風險評估管理系統,進一步包含: 投保者風險評估資料傳送模組,係用以將風險評估資料傳送终 險公司進行核保暨保險金額/費用計算。 、σ乐 上述之智財保險調整型風險評估管理系統,進一步包含: 保險公司核保資料暨核保結果輸入儲存系統,係用以儲存投保 風險評估資料傳送模組所傳送的風險評估資料,以及 輸入核保結果。 上述之智財保險調整型風險評估管理系統,其中該保險公司核 資料暨核保結果輸入儲存系統接收來自投保者所供給的補充資 料。 上述之智財保險調整型風險評估管理系統,進一步包含: 核保結果/保險金額/保費之接收儲存模組,係接收储存來自保 13 201019248 險公司的核保結果/保險金額/保費。 上述之智財保險調整型風險評估管理系統,進一步包含: 一保險單管理模組,係用以管理購買保險單的投保者資料。 上述之智財保險調整型風險評估管理系統,進一步包含: 產品上下游智財保險費用分攤計算系統,用於計算產品零組件在 保險費用上的分攤比例或分攤費用。 上述之智財保險調整型風險評估管理系統,其中該產品上下游智 財保險費用分攤計算系統包含: 一風險因子管理模組,用以管理會造成投保者風險的風險因子; ❹ 一風管執行模組,用以計算前述風險因子所造成的風險值; 一單一零組件比重計算模組,係根據比重計算參考值,來計 算該產品零組件在該產品所佔的比重; 一產品上下游智財保險費用分攤計算模組,係以前述風險 值及比重為計算基礎,計算出產品零組件的分攞比例或分攤保費。 上述之智財保險調整型風險評估管理系統,其比重值的計算公 如下: 》 E總數量比重值% X F所得值總計=g比重總值The above-mentioned intelligent insurance-adjusted risk assessment management system, wherein the risk factor management module is further configured to manage the adjustment and deletion information provided by the insured, and if there is new material, it must undergo further risk management of the air traffic control module. Unadjusted assets can be reused. J The above-mentioned intellectual property insurance adjusted risk assessment management system further includes: an insured risk assessment data transmission module, which is used to transfer risk assessment data to the insurance company for underwriting and insurance amount/cost calculation. The above-mentioned intellectual property insurance adjusted risk assessment management system further includes: an insurance company underwriting information and a sub-insurance result input storage system for storing risk assessment data transmitted by the insured risk assessment data transmission module, and Enter the underwriting result. The above-mentioned intelligent insurance-adjusted risk assessment management system, wherein the insurance company's nuclear data and underwriting result input storage system receives supplementary information supplied by the insured. The above-mentioned intelligent insurance-adjusted risk assessment management system further includes: the underwriting result/insurance amount/premium receiving storage module, which receives and stores the underwriting result/insurance amount/premium from the insurance company 201019248. The above-mentioned intelligent insurance-adjusted risk assessment management system further includes: an insurance policy management module for managing the insured information of the insurance policy. The above-mentioned intelligent insurance-adjusted risk assessment management system further includes: a product upstream and downstream intellectual property insurance cost sharing calculation system for calculating the proportion of the product components in the insurance expenses or the sharing of expenses. The above-mentioned intellectual property insurance adjusted risk assessment management system, wherein the upstream and downstream intellectual property insurance cost sharing calculation system of the product comprises: a risk factor management module for managing risk factors that may cause the insured risk; The module is used to calculate the risk value caused by the risk factor; a single component specific gravity calculation module calculates the reference value of the product according to the specific gravity to calculate the proportion of the product component in the product; The intellectual property insurance cost sharing calculation module calculates the distribution ratio or the assessed premium of the product components based on the aforementioned risk value and proportion. The above-mentioned intellectual property insurance adjusted risk assessment management system, the calculation of the specific gravity value is as follows: 》 E total quantity specific value % X F total value obtained = g specific gravity value

上述之智財保險調整型風險評估管理系統,其保費分攤計算八 φ 式如下: A 產品智財保險費X研發風險控管總值x(風險值總計+比重總 =單一零組件的分攤費用 ' 上述之智財保險調整型風險評估管理系統,其中該產品零組件比 重計算模組計算時的參考值至少包括: 、 -產品零組件的價格在該產品巾所佔成本比重、—產品零 可替代性、-產品零組件在該產品中的功能性、一產品零組件的 一種智財保險調整型風險評估管理方法,包含以下步驟: 201019248 根據管理者預先儲存的問卷及其輸入問卷的答案呈現投保者可能 的風險因子; 根據該風險因子的權重值計算以求得該投保者的風險值; 連結一可藉由管理降低投保者風險值的方法,該方法如下: 投保者將其研發風險管理資料傳送給管理者; 管理者令該研發風險管理資料經過鎖密作業程序,成為鎖密歷史 性研發風險管理資料,且禁止任何增加、修改及刪除動作; 產生一研發風險控管參數,以降低投保者的風險值。 •上述之智財保險調整型風險評估管理方法,進一步包含以下步驟: - 根據投保者在前項方法中被管理的年資,計算出研發風險控管春 ❹數; 令該年資愈多,所得參數愈大,所得風險值愈小。 上述之智財保險調整型風險評估管理方法,進一步包含以下步驟: 令投保者風險評估資料傳入保險公司進行核保及保險金額/保費 評估計算。 ~ 上述之智財保險調整型風險評估管理方法,進一步包含以下步驟: 根據該核保結果及核定的保險金額/保費,進行產品上下游智 保險費用分嫌計算; 以產品零組件的風險值及比重為計算基礎,計算出產品零組件的 m 分攤比例或分攤保費。 一種互動式研發風險管理系統,包含: 管理者一或複數個電腦或事務機設備; 被管理者一或複數個電膘或事務機設備; -或複數侧_路或晴設備或無線錢,侧 理者及被f理麵域; -被管理者研發風險管理資韻組m理 管理資料職管理麵缺的龍舰μ ; 風險 15 201019248 组,係_理者的研魏_資 - ί密收模組,用以接收被管理者的研發風險管理資料; 別儲存於=者=====序老分 :成性研發風== 修改及刪H 編輯的功能,故不可作任何增加、 e ❹ 理資料或鎖 鎖密代碼、鎖密序號、產品編號、資料輸入曰期 利檢索日期、先前專利檢索數量、先前專 么開展不日期、產品銷售日期、產品销售數 二H时 r其申中請該=第序 間均是藉由軟艘自動產生。 ㈣曰期時 管理祕,射雜管理者研發風險管理 一啟動模組,用以產生新研發檔案,或之前研 經由研發嫌馳記錄,且在㈣相攸時, 發風險管理資料^被管理者所指定的資料舰財,由於沒 路程式設計’顯示介面無編輯的功能,故不可作任何增加、修改 16 201019248 及=動作;肖時自動將管財所需的研發風时理資料,藉由 發風險管理資料傳遞模組’即時傳送至管理者資料接收模組 ίϋ普於管理者的鎖密資料庫伺服器成為鎖密歷史性研發 ί ,也由於沒有迴路程式設計,顯示介面無編輯的功 月匕’故不可作任何增加、修改及删除動作。 =之^動式研發風險管理系統,其中該互動式研發風險管理系 統進一步包含: 2發f險好纽’該參贿示娜者H㈣絲式研發風 險S理祕的控管,以及該控管結果,作為 模組計算風險值的參考值。 乐項風官執灯 發驗管理祕,其巾該研發風驗管參數乃依 該案管理年資計算,管理年錄多則參數愈大,而風 險值愈W、。 理純’其巾該絲柄魏險管理系 提μ請鎖密歷史性研發風險管理資料模組,以及 解在保管歡,該被管理者提出申請翁歷史性研發風險管 料模組用賴理者提㈣鎖密歷史性研發驗管理資料 請’該解密保管模組則用於執行解密作業。 上述之互動摘發麟管理祕,其巾贿躲管氣 刪除解密歷3½研發風險管理資料,即在業^^ 密資料之後,自_除該解密資料。祕密作業並交付解 一種互動式研發風險管理方法,包含以下步驟. 被管理者新研發檔案或之前研發案的触性檔 * 將管理者及被管理錢方所約定的研發風險管理資料^ 令該研發驗管理麟以㈣者倾庫時,自動職鎖密新播 17 201019248 並產生鎖密代碼’並自動產生鎖密序號、日期、時間; 令該^料自_存至雜資料庫舰器巾鎖_存,禁止任何增 加、修改及刪除動作。 上述之互動式研發風險管理方法, 進一步包含以下步驟:The above-mentioned intellectual property insurance adjusted risk assessment management system has the following formula for the premium allocation calculation: A product intellectual insurance premium X research and development risk control total value x (risk value total + proportion total = single component contribution cost) The above-mentioned intellectual property insurance adjusted risk assessment management system, wherein the reference value of the product component calculation module at least includes: - the price of the product component in the cost of the product towel, - the product zero Alternative, - the functionality of the product component in the product, a smart insurance-adjusted risk assessment management method for a product component, comprising the following steps: 201019248 According to the pre-stored questionnaire of the manager and the answer to the input questionnaire The risk factor of the insured; the risk value of the risk factor is calculated to obtain the risk value of the insured; the link is a method for reducing the risk value of the insured by management, the method is as follows: the insured manages the risk management of the insured The data is transmitted to the manager; the manager makes the R&D risk management data go through the lock operation procedure and become the secret history. Develop risk management information and prohibit any addition, modification and deletion actions; generate a R&D risk control parameter to reduce the risk value of the insured. • The above-mentioned intelligent insurance adjustment risk assessment management method further includes the following steps: According to the seniority managed by the insured in the preceding method, the number of R&D risk control is calculated; the more the annual income, the larger the obtained parameters, the smaller the risk value obtained. The above-mentioned intelligent insurance adjustment risk assessment management method Further, the following steps are included: The insured risk assessment data is transmitted to the insurance company for underwriting and insurance amount/premium evaluation calculation. ~ The above-mentioned intellectual property insurance adjusted risk assessment management method further includes the following steps: According to the underwriting result And the approved insurance amount/premium, the suspected calculation of the upstream and downstream intellectual insurance expenses of the product; calculating the m-share ratio or the assessed premium of the product components based on the risk value and proportion of the product components. Management system, including: Manager one or multiple computers or transaction machines Prepared by the manager one or a plurality of electric or business equipment; - or plural side _ road or sunny equipment or wireless money, the side and the domain of the domain; - the risk management group of the risk management group m The management of the information management is lacking in the Dragon Ship μ; Risk 15 201019248 Group, the researcher's research Wei _ _ _ 密 密 收 module, to receive the manager's R & D risk management information; Do not store in = ===== Preface old score: Sexual R&D wind == Modify and delete the function of H editing, so you can't make any addition, e-processing data or lock lock code, lock key serial number, product number, data input period The date of the search, the number of previous patent searches, the previous special issue, the date of the product, the date of sale of the product, the number of products sold, the number of products sold, and the number of products sold by the company are automatically generated by the soft ship. Secret, the shooting manager develops a risk management-initiation module to generate new research and development files, or to research the R&D records through the R&D, and in the case of (4), the risk management information is the data ship designated by the manager. Finance, because there is no way to design 'display interface no The function of the series is not allowed to be added or modified. 16 201019248 and = action; Xiao Shi automatically manages the wind and development time data required for financial management, and transmits the risk management data transfer module to the manager data receiving module. ϋ ϋ 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于 于= The dynamic R&D risk management system, in which the interactive R&D risk management system further includes: 2 F-failed good New Zealand's participation in the bribery Shina H (four) silk-type R&D risk S secret control, and the control As a result, the reference value of the risk value is calculated as a module. The music official is responsible for the management of the light. The parameters of the research and development of the wind pipe are calculated according to the management of the case. The larger the management annual record, the higher the risk value. Li Chun's towel, the silk handle, and the management department of Wei, please lock the historical R&D risk management data module, and solve the problem in the custody, which is proposed by the manager to apply for the historical R&D risk management module. (4) Lock the historical research and development management information, please use the decryption storage module to perform the decryption operation. The above-mentioned interactions are extracted from the management secrets of the Linlin, and the secrets of the secrets are deleted. The identification and management of the risk management information is deleted, that is, after the confidential information is obtained, the decrypted data is deleted. Secret operation and delivery of an interactive R&D risk management method, including the following steps. The manager's new R&D file or the previous R&D case's touch file* will be managed by the manager and the managed R&D risk management information. R & D inspection management Lin (4) when the dumping, automatic job lock secret new broadcast 17 201019248 and generate lock code 'and automatically generate the lock secret number, date, time; Lock_Save, prohibit any addition, modification and deletion actions. The above interactive R&D risk management method further includes the following steps:

‘被管理者開啟新研發槽案或之前研發案的衍生性槽,當操作 “完成鍵”即將研發風險管理資料經過鎖密保管模組進行鎖密作 業程序之後即進人被管理者所指㈣資料庫舰器中儲存,且禁 止任何增加、修改及刪除動作。 上述之互動式研發風險管理方法, 進一步包含以下步驟:產生一研發風險控管參數。 上述之互動式研發風險管理方法, 進一步包含以下步驟: 被管理者輸入密碼,向管理者申請鎖密歷史性研發風險管理資料。 上述之互動式研發風險管理方法,進一步包含以下步称: 管理者進行解密資料作業,並在完成資料交付給被管理者之後, 即自動刪除解密資料。 一種產品上下游智財保險費用分攤計算系統,包含: 一風險因子管理模組’用以管理會造成投保者風險的風險因子; 一風管執行模組,用以計算前述風險因子所造成的風險值; 一單一零組件比重計算模組,係根據比重計算參考值,來計 算該產品零組件在該產品所佔的比重; 一產品上下游智財保險費用分攤計算模組,係以前述風險 上述之產品上下游智財保險費用分攤計算系統,其中風險因子管 理模組係以問卷呈現所有可能的風險因子,而由投保者輸入答案 並儲存,再進一步由風管執行模組依該風險因子的權重值計算, 18 201019248 以求得其風險值。 •^述之產品上下游智財保險費用分攤計算系統,其中該風險因子 2*含· 實質風險、經營風險; 前述實質風險係指: 產品及其零組件是对專_、產品及其零組制前案專利檢索 分析數量產σσ及其零組件的侵權訴訟次數、產品及其零組件侵 權訴訟時勝訴或者敗訴及其次數、產品及其零組件的實際銷售次 數、產品及其零組件的實際銷售數量、產品及其零組件的實際銷 售期間; 所擁有智_數量、智_容或專_求範圍大或窄(依智財 檢索或分析結果)、該產品或零組件的專概科實存在、該產品 或零組件的專概^專屬授權祕人、該產品或零崎的專利是 否有抵押或設質; 前述經營風險係指: 控評估,如投保者的f本額、投財_務狀況、 挪者在"^綱崎遭受_權訴訟或 ® 次數、投保者—定期間内遭受侵權訴訟_訴或 敗訴及其-人數、投保者遭受侵權指控後的理賠金額投保者是 否有防止產品侵害他人智財權的警戒措施與實施辦法。’、 •^述之產品上下游智財碰費用分攤計算系統,其 件比重計算模組計算時的參考值至少包括: π σο 組件Ϊ價格在該產品中所佔成本比重、—產品零組件的 件在該產品中的功紐、—產品零組件的 上述之產品上下游智財保險費用分攤計算系統, -研發風險控管參數,該參數顯示投保者是否經過控J包:及該 19 201019248 為前述第一項風管執行模組計算風險值的參考值。 乃依管理系統的該案管理年資計算,管理 數愈大,而風險值愈小》 T貝I歹只J爹 品上下游智財保險費用分攤計算系統,其風險值的計算 實質風險權重值+經營風險權重值=風險值 游智財微費用分攤計算系統,其風險值的計算'The manager has opened a new R&D slot case or a derivative slot of the previous R&D case. When the operation “Complete button” is used, the risk management data will be developed and locked by the lock-in custody module. The library is stored in the library and any additions, modifications, and deletions are prohibited. The above-mentioned interactive R&D risk management method further includes the following steps: generating a R&D risk control parameter. The above-mentioned interactive R&D risk management method further includes the following steps: The administrator inputs a password and applies to the manager to lock the historical R&D risk management data. The above-mentioned interactive R&D risk management method further includes the following steps: The manager performs the decryption data operation, and automatically deletes the decrypted data after the completion of the data delivery to the manager. A product upstream and downstream intellectual property insurance cost sharing calculation system, comprising: a risk factor management module 'to manage risk factors that will cause insured risk; a wind pipe execution module to calculate risks caused by the aforementioned risk factors A single component specific gravity calculation module calculates the reference value of the product based on the specific gravity to calculate the proportion of the product component in the product; The upstream and downstream intellectual property insurance cost sharing calculation system of the above-mentioned products, wherein the risk factor management module presents all possible risk factors by questionnaire, and the insured enters the answer and stores, and further the air duct execution module according to the risk factor The weight value is calculated, 18 201019248 to obtain its risk value. • The product of the upstream and downstream intellectual property insurance cost sharing calculation system, where the risk factor 2* contains · substantial risk and operational risk; the aforementioned substantial risk means: the product and its components are the special _, the product and its zero group Pre-criminal patent search analysis of the number of infringement lawsuits for the production of σσ and its components, the success or failure of the product and its component infringement litigation and its number of times, the actual number of sales of products and their components, the actual number of products and their components The actual sales period of the sales quantity, products and their components; the possession of the wisdom_quantity, intelligence_content or specialization scope is large or narrow (according to the results of intellectual property search or analysis), the specific discipline of the product or component exists , the exclusive authorization of the product or component, the exclusive authorization of the secret person, whether the product or the Kawasaki patent is collateral or quality; the aforementioned business risk refers to: control assessment, such as the insured’s principal amount, investment The situation, the mover's claim amount after the infringement lawsuit, the lawsuit or the number of times, the insured person's period of time, the infringement lawsuit, the lawsuit, the number of people, the insured person's claim Whether there are precautionary measures and implementing measures to prevent infringement of intellectual property rights in the product. ', • The product of the upstream and downstream intellectual property touch cost allocation calculation system, the reference value calculated by the component calculation module includes at least: π σο component Ϊ price in the product, the proportion of cost, - product components The function of the product in the product, the above-mentioned products of the product components, the upstream and downstream intellectual property insurance cost sharing calculation system, the R&D risk control parameter, which indicates whether the insured has passed the control J package: and the 19 201019248 is The first air duct execution module described above calculates a reference value of the risk value. According to the management system, the management of the case is calculated. The larger the management number is, the smaller the risk value is. The T-I I only use the upstream and downstream intellectual property insurance cost sharing calculation system, and the risk value is calculated as the actual risk weight value + operation. Risk weight value = risk value travel wisdom micro-cost allocation calculation system, its risk value calculation

1-研發風險控管參數=研發風險控管總值 動式研發風險管理_理,其研發風險控管參 上述之產品上下游智財保險費用分雜計算系統,其比重值的計算 公式如下: E總數量比重值% x f所得值總計=g比重總值 上述之產品上下游智財保險費用分攤計算系統,其保费分攤計 算公式如下: 產品智財保險費X研發風險控管總值X (風險值總計+比重總值) =單一零組件的分攤費用 【實施方式】 請參考第一圖,係顯示本發明之智財保險調整型風險評估 管理系統架構8〇〇。 在此實施例中顯示本發明智財保險調整型風險評估管理系 統系統及方法中的非會員1〇〇1,凡是未向智財保險調整型風險評 估管理系統1000 (亦可簡稱本管理運作系統)提出合法申請程序 進而取得會員1033資格者,皆稱為非會員;會員1033,在一般的 習知認定上通常是指欲參與者認同、充分了解與同意本管理運作 20 201019248 系統之内容、精神、意義、權利與義務等資訊,且透過本管理 作系統之-定申請作餘序完錢,並且經管理者聰核 =資格僅可在本管理運作系統之某種使用 權限範圍内運作,而本管理運作系統内之被管理者随、 1010、保險公司8G6、再保公司804、客服專貞8〇2等,皆先^ 得會員1033資格,然後再依其不同之身份、條件與需求, 者1013另提出資格認定、審查等之一定申請作業程序經管理 1013審查通過及核准射能具有其财之倾與制權限及 圍,被管理者1011為具有會員1033資格,也是為委請管理者1〇13 β代為趙管理研發記錄㈣、建立歷史性研發記錄資料、提供 發記錄資料管理服務、保險經紀、產品上下游風險管理、產品上 下游保險費用分攤計算、專利申請、代理、檢索/分析管^、 交易及訴訟等,或與智權業務有關業務之客戶;投保者咖具有 會員1033資格,有可能同時亦是被管理者1〇11,也是為委請管理 者1013代為處理追蹤管理研發記錄資料、建立歷史性研發記錄資 料、提供研發記錄資料管理服務、保險經紀、產品上下游風險管 理、產品上下游保險費用分攤計算、訴訟、認證、信託、融資、 φ貸款等,或與智權業務有關業務之客戶;被管理者1011不一定是 投保者1010’投保者1010也不一定是本系統互動式研發風險管理 系統1012的被管理者ι〇π。 客服專員802 ’是指專為被管理者ion、投保者或管 ,者1013等人,為其服務與智權或智財保險業務有關業務之人 ^,再保公司804 ’是指一合法取得經營保險或再保業務之公司, 為與其合作之保險公司806或與其它之再保公司8〇4,採單獨或 =合承保性質的方式,接績承做其原先已被承保之保險業務,以 益攤原保險公司806或再保公司804所承做保險之風險、責任與 義務;保險公司806 ’是指一合法取得經營保險業務之公司,可專 21 201019248 $險市場需求而設計之保險商品,並由其來承辦各種不同或與 智權相關之餘,以服務或滿足娜者咖之保險需求;管 ,者1013 ’根據被管理者10H、投保者丨⑽、保險公司8〇6、再 =公司804等的需求’或與前述密切往來之其它相關業務、行業 的相對需求,而設計-套便於控管、操作、運用、計算、缴費、 方便使用、正確及可信度高的資料管理_存(或鎖密)等的管 理運作系統’其巾至少應包含管理、操作、運用贿等模式、 系統流程或互誠連結方式,以達#效管理與娜客戶之權益為 目的。 罾 電腦或事務機設備860,是將管理者1013所設計之管理運 作系統,透過使用者(非會員麵或會員)之登入認證裝置 870及登入管制裝置880,然後再經由際網路1〇〇2 多 的資料傳遞、複製、列印、儲存、溝通、管理或顯示出1^之多需方 求’並可滿足他方之需求的人機介面設備;登入認證裝i 87〇,本 裝置是與電腦或事務機設備860搭g己使用,通常是使用者(非會 員1001或會員1033)進入本管理運作系統之某種的通關門鎖 (Key),其設計方式可為軟體程式、密碼、授權碼、條碼、磁條、 磁卡、晶片、電子感應裝置、其它具有辨識身份能力或功效(如 ’指紋、眼角膜、聲控、影像、呼吸、生化)等之設備或裝置,可 各別單獨或採混合搭配等方式使用,其目的是要有效證明使用者 之身份及具有何種資格與可取得—些基本資料,然後再依其不同 之身伤、使用資格、範圍等進入管理運作系統之區域内運作;登 入管制裝置88G ’本裝置是與防火/防毒騰85()及系統主機84〇 等連結搭配使用,其目的為可經由管理者1〇13,依使用者違反規 約程度輕重而來管制非會員1GG1或會員1G33,或具有不良記錄或 已被取消使用資格者之使肖者進人管料作祕,如未繳會費 者、已失去會員1033資格者、因故被停權、停止或縮小使用範圍 22 201019248 之使用者,其對象如被管理者1〇11、投保者1〇1〇、保險公司8〇6、 再保公司804、客服專員8〇2、管理者1〇13内部人員等,一旦前 項被管制之事證已消失’且經管理者1G13重新審理無誤之後,再 將被管制者註銷其管敝錄後,即可賊正常之使錄態;網際 網路1GG2 ’通常為連繫兩端或多端之電滕或事務機設備86〇之使 用者’經有線或無線(寬頻)網路之應用相互連結的關係而達資 訊互傳、共享、分享等之目的,為_種應用廣泛之電腦連結的習 知技術。 • 智財保險調整型風險評估管理系統1000,係管理者1013 專為被管理者1G1卜投保者麵、保險公司8()6、再保公司8〇4 等之需求’或與前述密切往來之其它相關業務、行業的相對需求, 套管理及運作系統;系統主機84G,為一電腦硬體之主機 =備及^蝴之硬艘配件或設備裝置,可放置智財保險調整型風 ^評估管理纽麵之__、仙端祕駐要之軟艘作業 以ί足前述不同使用者之需求,其—端則透過防火/防毒 ίϋϊ設及連結與和網際網路1G_連,然後再與客戶端或 ’而讓客戶或使用者得以應用或滿足其所需。另 ❹與i統舰器820相連結,以便做其它不同之功能用途; P方範J媒Π ’其主要的目的為透過本裝置之過濾與攔截,以 之外的網路骇客或病毒侵入、雜疾、破壞或 險八ΐ: t 13'被管理者1Q1卜投保者_、保 的保么司8G4等之權益;系統伺服器82G,其主要目 份做一適當之分配、切割、流程管控、參數設定、檔 ^徑資料型態等之程序設定,以適合電滕之高效率的使用狀 態與使用環境;·程式舰_,其應用程式軟體^藉由外部 23 201019248 之輸入,以供下載、更新、增刪、設定、儲存,或在本裝置上放 置二些與本系崎需之應用軟體⑼程式,讓軟體作業系統更有 效率,網頁伺服器830 ’存放網站規劃、設計、控管、網頁、資料 與網路系統之程式及作業系統,以供不同的網路使用端使用;會 員資訊區1034,僅提供給不具有其它身份之會員腦資格者使 用’故其僅能在本區範圍内運作或潮覽一些與智權或其它相關的 網路資訊,或可藉由本晴連結至其它的細綱;龍庫伺服 器1040,其主要的目的為儲存各種不同之資料檔案與型態,以方 便不同的網路使用端之資料檢索、輸人、儲存、更新 ®護等使用。 “ 研發風險管理資料2010’其意是指被管理者1〇11的原研發 s己錄模組3800之資料,再經鎖密保管模組2〇3〇處理過後將被儲 存在被管理者1011職定之資辦舰肖麵㈣加控管,且 沒有迴路程式2G11設計’顯示介面無編輯的功能,再此處不做任 何之增^刪/修改2〇12、資料編輯等的動作,有關其它未說明之 70件、連結、操作、功能等,請參考本單元之後說明及第三圖。 鎖密資料庫伺服器1080係管理者1〇13用於鎖密儲存管理 ❹來自被管理者1011的研發風險管理資料細,當各種不同型態的 權案或資料進入資料庫伺服器1〇4〇内後,將會自動檢查是否有鎖 密代碼,若有則自動輸入本裝置鎖密資料庫伺服器誦内加以嚴 密控管,因沒有迴路程式2〇η設計,故無法去做任何增/刪/修 改2012動作’只可做新增檔案或資料或查詢麗,以確保原始播 案或資料之完整性與乾淨’若無騎人㈣賴㈣誦内採一 般檔案或資料方式控管,有雛它未·之元件、連結、操作、 功能等,敬請參考本單元之後說狂@ ;鎖密歷史性研發風 險管,資料23〇2’為一儲存被管理者1〇π之原雑研發記錄的基 本資料’其至少應包含:鎖密傾、鎖密序號、產品編號、資料 24 201019248 輸入曰期或時間、先前專利檢索曰期、先前專利檢索數量、先前 專利有效性分析、產品不侵權分析日期、產品不侵權分析結果、 產品公開展示日期、產品銷售日期、產品銷售數量等,或是相關 之圖片、照片、影音、簡報、實驗、測試、模擬等資料,或其它 足=證明在研發過程中不可能被塗改之資料記錄,都將被儲存在 鎖推資料庫伺服器1〇80内嚴加控管,非有某種層級之解密者將無 法使用本資料。 、 •在此實施例中顯示本發明智財保險調整型風險評估管理系 統系統及方法中的非會員1001、會員1033、被管理者1011、投保 者1010、客服專員802、再保公司804、保險公司806、管理者1〇13 均藉電腦或事務機設備860及登入認證裝置87〇之認證把關通過 後,再經由網際網路1002進行資料傳遞或溝通或提出彼此需求 由他方滿足其需求;管理者刪财騎聽險調㈣風險評^ 管理系統1000的系統主機840和網際網路1002之間架設防火/ 防毒牆850及搭配登入管制裝置880的管制作業,以杜絕來自外 界的非法入侵或破壞》 智財保險調整型風險評估管理系統1000的系統主機84〇與 參不同用途的伺服器連接,例如:網頁伺服器830 (會員資訊區 1034)、系統伺服器820、應用程式伺服器81〇、資料庫伺服器 1040 ;其中以資料庫伺服器1040中的鎖密資料庫伺服器麵 存鎖密歷史性研發風險管理資料2302,以達有效資料管理。 請參看第二圖,在此實施例中係顯示本發明之智財保險 調整型風險評估管理系統1000的主鱧結構,其中至少包 登入認證裝置870、登入管制裝置880、非會員_、網際網路 1002、投保者1〇1〇、被管理者ion、管理者wig、會員logs、 會員資訊區1034等之元件、操作、連結、功效,均在第一圖中敘 25 201019248 述過,故在此不再贅述,僅就尚未·之元件 效在此做-敘述。 嘴私功 仕答此實施例中係顯示本發明之智財保險調整型風險評 估管理系統1000 (亦可簡稱本管理運作系統)至少包含一申請 =10G3,本模組可為非會員丽經—定之申請流程程序與設 f後,而成為本管理運作祕之會員簡、被管理者1(m、投保 2 1010、客服專員8G2、再保公司謝、保險公物6或為管理者 ❹ 者會貞確認敝画,在本管料作系統中經 者輸人某些文數字或資料’以兹辨別其是^為會員1033 =會員臟:新會員·,#使用者為非會員_,且欲參加 作時’可以在此提出新會員之中請,而成為 本e理運作系統之基本會員翻,若已是會員者,則無法進 j申請區内運作;會員基本資料麵,當新會員娜使用者向 本管理運作系統提出申請為一新會員時,本管理運作系統 ^員人某些基本資料、聯絡方式、蚊密褐或使用同意 f等讀理者順辦審定與絲通過後,將會發函通知新 員1005繳交會費;繳交會費鑛’為-繳費通知函件,當新、舊 之後,應在—定之舰内繳交會費,到期若未繳, 則將會被取縣已齡之會貞刪細資格,如欲再繼續參加, 新會員1005則需重新再提出申請,而舊會員腦則需待其 繳完會費後,才能恢復其原會Μ 1()33之資格,若在未繳費期間^ 會員1033使用權益受損,則本管理運作系統不負任何責任;已繳 費1008 ’當新、舊會員收到繳費通知函件之後,請依繳費函 容之規物理,待管理者咖奴城讀手,將會發 知已繳費者,或另寄送收據、發票(依該®或當地政府之法令規 章辦理)、給已繳費者,以兹為憑,若是新會員祕者則發放 入認證裝置870 ’以作為新會員聰日後在使用本管理運作系統 26 201019248 時之某種的通關門鎖(Key);結束1009,此處是指針對非會員 1〇〇1,或未按期繳交會費之會員1033,做一強迫式的停止其在本 管理運作系統内’繼績在不屬於其授權範圍内之活動。 互動式研發風險管理系統1012,乃為一研發風險管理記錄 的長期性監控管理系統’係由被管理者1011在研發階段每每進行 研發時,就會將該研發階段的研發風險管理資料中的部份資料自 動傳送給管理者1013,而直接進入管理者1013的鎖密資料庫伺服 器1080中鎖密儲存,禁止有任何增加、修改及刪除等的程式迴路 設計動作,只能經由管理者1〇13内部之少數授權者才能查閱,或 需經嚴謹的特殊作業程序才能列印,以達有效監控研發風險管理 的目的,該被管理者和管理者所儲存該研發風險管理資料的時間 為一致,因此稱之為即時作業;一旦有訴訟事件發生時,即可提 出此部份之鎖密歷史性研發風險管理資料23〇2,與被管理者l〇ii 其内部之原始研發記錄資料比對後,藉以證明被管理者ΙΟ。確實 ,事先已盡檢索、分析與管理之責,甚至可做為「雜意侵權」 的證據。同時,若被管理者蘭成為投保者ΐθ1θ時則可藉由 ^動式研發風險管理系統! θΐ2所發出的研發風險控管參數 • J:而達到風險值降低的目的,使得投保者1_在核保及保費 22較有_條件;研發風險控管參數1G14,其中該研發風 案管代ΐ二風險管理系統1012的該 將會愈小。 平資愈多參數愈大,而相對的其風險值 鎖密歷史性研發風險管理資料2302至少包 S利、r料輸入曰期或時間、先前專利檢索曰期 產品公開展示曰期、產品鎖售曰期、產品 銷售數量等,或疋相關之圖片、照片、影音、簡報、實 27 201019248 模擬等資料,或其它足以_在研發過程林可鎌塗改之資料 記錄,都將被儲存在鎖密資料庫飼服器麵⑽加控管 種層級之解密者將無法使用本資料β 、 一風險,子管理触1015,是一自動審理及判別投保者誦 尚、中、低等不同等級的風險因子_。投保者1〇1〇就其誠實所 認知及/巧人或獅基本湖域合錄齡,經審理後 將會產生H、低等不同等級之風賴子獅以兹做為是 否受理保險、保費計算、理賠條件等之重要參考資料,就有如現 今的產險業或壽險業,在投保前事先保險公司一定要投保者圆 誠實填寫-些保險評估資料,以供其參考或受理—樣;輸入/儲 存問卷1G16 ’其做法為可料將前述評估保險的基本保險要因及 /或可供麟問題等的資料做成_題庫,並將其贿起來然後 再根據投保者1010之產業別,而會自動或以人工作業方式產生一 連串足供贿的問卷題,再交由投保者1Q1Q經由紙上或電滕來作 答’即可呈現出所有可能的風險因子3〇39,同時也將其儲存起來, 以供保險公司806、再保公司別4等做為是否受理、計費或理賠之 參考。 風管執行模組1017其中至少包含實質風險3〇33、經營風險 3034及風險值計算1〇18。在實質風險3〇33及經營風險3〇34内之 風險因子3039經與%值3037、權重值3038的計算各求得其風險 值1018,再經風險值計算1018的運作而求得一風險值總計昶昶; 風險值計算1018至少包含一風險值計算公式3〇6〇,此計算公式為 實質風險3033所得加上經營風險3034所得等於風險值總計 3036 ;如被管理者1〇11亦成為投保者1〇1〇,則可藉由該互動式研 發風險管理系統1012所發出的,達到風險值降低的目的。 研發風險控管總值1060其研發風險控管總值以T為代表, 係被管理者1011在研發風險過程中,有無經過嚴密控管的過程是 28 201019248 導致投保者1010在投保時可呈現出風險上的高低’其計算公式為 1-R (研發風險控管參數1014) =T。 有關風險因子管理模組1015、風管執行模組ίου、風險值 計算1018、研發風險控管總值1〇6〇等元件、操作、連結、功效, 若要詳解請參考本單元後段及第四圖。 投保者風險評估資料傳送模組1019,此處是指將前述之有 關風險因子管理模組1015、風管執行模組1〇17、風險值計算 1018、研發風險控管總值1〇6〇等資料,透過網際網路1〇〇2傳送 至保險公司核保資暨核保結果輸入儲存系統1020内,提供給保險 公司806、再保公司804等做為是否受理、計費或理賠之參考。 ❹ 保險公司核保資暨核保結果輸入儲存系統1020,本系統除 了接收投保者風險評估資料傳送模組1〇19所傳過來的資料外投 ,者1010亦可經由外部系統聰,將一些補充資料聽給保險 么司806、再保公司804,讓這些資料有助於獲得更多且更有利於 =保者1G1G的條條件,並將上述這些倾贿在魏或做一妥 善之保存;保險公司核保結果通知模組騰,保險公司8〇6、再 保二1 804對投保者1〇1〇的保險條件進行核保,並做出判斷是否 =承保,若不符承保條件即進行退保通知作業,如符合承保條 n進行保險金額/锻評新算;概資料·,其意是指 亦可經由外部系統1032,將-些補充資料1023給保 於;U上6、再保公司8〇4,讓這些資料有助於獲得更多且更有利 ^呆者1010的保險條件;核保觀,即保險公司8〇6、再保公 ^04判斷是否願意承保’並將結果透過網際網路聰對外 1009若通知管理者1〇13,再通知投保即告結束 果!職核保結果、保險金額、保費傳入核保結 /伴:費之接收儲存模組1025 ;核保結果/保險金額 保費之接_槪㈣25,是專⑽杜被娜聰通過投保 29 201019248 者1010之核保結果、保險金額、保費傳入核保結果/保險金額/ 保費等資料,並將此資料儲存於資料庫伺服器1〇4〇内,同時會將 此訊息通知管理者1013被查與投保者1〇1〇,另一方面則等待投保 者1010做出是否要買保險1026之決定;買保險1026,投保者1〇1〇 經審慎評估後如果要購買保險則準備與管理者1〇13、保險公司 806、再保公司804等單位簽訂保險契約書1〇27,若不想購買保險 則即告結束1009。 簽訂保險契約書1027,投保者1〇1〇與管理者1〇13、保險 公司806、再保公司⑼4等單位共同簽訂保險契約書,以規範雙方 之權利、義務與需遵守之事項;保險單管理模組1〇28,投保者1〇1〇 經簽訂保險契約書1027後就納入保險單管理之機制中,由管理者 1013負起管理之責。 分攤計算產品上下游保險費用1029,投保者1〇1〇購買保險 之後’可以透過本管理運作系統選擇是否要選用本裝置,以便將 保險費透過本裝置之分析與計算’可以將保險費與上中下游廉商 共同分擔,以減輕保險費用的龐大負擔,若不想要即告結束1〇〇9, 若想要則至產品上下游智財保險費用分攤計算系統1〇3〇 ;產品上 φ 下游智財保險費用分播計算系統1030,其主要的目的就是可以讓 投保者1010透過本系統之分析與計算後,可以將投保產品之保險 費與上中下游廠商共同來分擔,以減輕保險費用的龐大負擔,經 分攤完成後,將其資料儲存在資料伺服器1040内。本系統至少包 含風管執行模組1017、單一零組件比重計算模組31〇〇、產品上下 游智財保險費用分攤計算模組3600、單一零組件智財保險費用分 攤計算3610、保費分攤計算公式362〇等元件、操作、連結、功效, 若要詳解請參考本單元後段及第四圖。 請參看第二圖’係顯示本發明之智財保險調整型風險評 30 201019248 估管理系統1000,其中包含二個系統:互動式研發風險管 理系統1012用以儲存、管理被管理者1011所傳入的鎖密歷 研發風險管理資料2302,以及 產品上下游智財保險費用分攤計算系統1〇3〇;申請模組 1003及會員確認模組1〇〇4係管理者1013用以提供被管理者 1011及投保者1010申請使用此系統、會員資訊區丨〇34是由管理 者1〇13所提供給會員、被管理者1011、投保者1〇1〇等使用的 活動範圍、風險因子管理模組1〇15用以管理會造成投保者風 險的風險因子3039、風管執行模組1017係用以計算前述風險 ❹因子3039所造成的風險值、投保者風險評估資料傳送模組 1019、核保結果/保險金額/保費接收儲存模組1〇25、保 險單管理模組1028等。 ' 前述系統及模組的實施步驟如下: 步驟非會員1001藉由網際網路1002進入申請模組1003,再 進入會員確認模1004以確認是否為會員1〇33 (是會員1〇33且需 經繳交會費1007後才能取得使用本發明智財保險調整型風險 評估管理系統),若為非會員1001也不想成為新會員1005時, φ 就會讓其結束10〇9,回到本系統網站上之首頁,而無法繼績在本 系統上做任何的活動。若是因使用互動式研發風險管理系統 1012,而成為被管理者1011的會員1033時,則因是研發風險 管理資料管理系統的使用人,故亦可稱為被管理者1011 ;若判斷 是會員且是被管理者1011 ’則可進入互動式研發風險管理系統 1012 ;如不欲使用互動式研發風險管理系統1012,則可成為投保 者1010,而直接進入風險因子管理模組1015,進行智財保險的風 險評估和相關核保、保險金額/費用的評估計算。 如判斷是非會員1001而欲成為新會員1005時,可填入會員 基本資料1006 ’繳交會費1007後’再選擇成為被管理者1011進 31 201019248 入互動式研發風險管理系統1012,或是成為投保者ι〇ι〇直接進入 風險因子管理模組1015進行投保者風險評估。 該互動式研發風險管理系統1〇12,乃為一研發風險管理記錄 的長雛監控管理系統,係由被管理者1〇11在研發階段每進行研 發,,即時將該研發風險管理資料2〇10中的部份與管理者所相互 約定的資料自動傳遞(如網際網路1002)給管理者1〇13,而直接 進入管理者1013的鎖密資料庫伺服器1080中鎖密儲存,孥止有 任何之增/刪/修改2012動作的程式迴路設計,只能經由管理者 1013内部之少數授權者才能查詢2〇14,或需經嚴謹的特殊作業程 序才能做資料列印22G8,以達有效建立鎖密歷史,_:發風險管理 資料2302,並監控研發風險管理的目的:該被管理者和管理者所 儲存該研發風險管理資料的時間為一致,因此稱之為 一旦有訴訟事件發生時,即可提出此部份之鎖密歷史性研發^險 管理資料2302,與被管理者iou其内部之原始研發記錄資料比對 後,藉以證明被管理者1011確實在事先已盡檢索、分析與管理之 責,甚至可做為「非故意侵權」的證據。同時,若被管理者ΙΟ。 成為投保者1G1G時,料藉由該互動式研發風險管理系統1〇12 ❹所發出的研發風險控管參數1014,而達到風險值降低的目的,使 得投保者1G1G在娜及保f計算上居财糊條件,其中該研發 風險控管參數1014乃是依互動式研發風險管理系統1012的該案 管理年資計算’管理年資愈多數愈大,_制其風險值將 會愈小。 鎖密歷史性研發風險管理資料2302至少包含: &鎖密代碼、鎖密序號、產品編號、資料輸入日期或時間、 先則專利檢索日期、先前專利檢索數量、先前專利有效性分析、 產品不侵權分析日期、產品不侵權分析結果、產品公開展示日期、 產品銷售曰期、產品銷售數量等,或是相關之圖片照片影音、 32 201019248 簡報、實驗”職、槪等雜,或其它足崎 =!Ξ:級===服麵 ===理,則』 卿舰__齡結束麵。若經判 將研發風_參數igi卜併進一步帶入 ===,5内,並將做輸人/儲存問卷咖,該問卷 ❹ 鲁 係^夯儲在邮預^儲存的題庫問卷;該風險因子管理模組ι〇15 、預先儲存的題庫問卷,而由投保者麵 ίο ilf+算財得其顺值igi8,如被管理者而亦成 則可藉由該互動式研發風險管理系統⑻2所發出 因管參數1014 ’而達到驗值降低的目的;前述風險 實質風險3033、經營風險3034 ; 前述實質風險3033係指: f if其零組件是砂專卿、產品及其零組件的前案專利檢索 二量、產品及其零組件的侵權訴訟次數、產品及其零組件侵 $訴訟時勝訴或者麟及其次數、產品及其零組件的實際銷售次 f、產品及其零組制實雜錄量、產品及其零崎的實際銷 吞期fa]; ^擁有智_數量、智財峰或專利翻要求範圍大或窄(依智財 檢索或分析結果)、該產品或零組件的專利是否確實存在、該產品 或零組件的專利是否專屬授權於他人、該產品或零組件的專利是 否有抵押或設質; 前述經營風險3034係指: 33 201019248 由投保者的經營面坪估,如投保者的資本額、投保者的財務狀況、 ,保者的營業成長消減、投保者在—定_内所遭受的侵權訴訟 j到警告信函的次數、投保者—定期肋遭受侵權訴訟時勝訴 ,者敗訴及其次數、投保者遭受侵權指控後的理賠金額、投保者 疋否有卩方止產品侵害他人智財權的警戒措施與實施辦法。 前述依該風險因子3039的權重值3038計算,以求得其風險 ^的實施例請參考||四@ ’ _風管執行模組㈣用輯算前述風 險因子3039所造成的風險值;一風險因子管理模組1〇15,用以管 ^造成投保者風險的風險因子_ ;風險因子管理模組1〇15 ❿Ϊ含:實質風險(%)3033 ’及經營風險(%)3034,該風險因子3039 j以問卷方式呈現,其答案由投保人叫卷方式填獅,且該實 質風險(%)3033、經營風險(%)3〇34、(%)百分比值3〇37及權重 ^ 3038均是變數;其中該研發風險控管參數1〇14等於零時表 不該投保者並未經過互動式研發風險管理系統1〇12的管 ,;該互動式研發風險管理系統1〇12所發出 =’可達到風險值降低的目的,使得投保者 ^算上有較有利的條件,其中該研發風險控管參數1〇14乃依互 ίϊί風險管理系統1012的該案管理年資計算,管理年資愈多則 參數愈大,而風險值愈小。 * 〇 其風險值的計算公式如下: ίίΐ ίΐ質ί險權重值+ Β、經營風險權重值=C風險值總計 ⑵1·- R研發風險控管參數1014 =τ研發風險控管總值麵 ※前述(2)如未經過互動式研發風險管理系統1〇12 研發風險控管參數R的參數值為零^ 、 風管執行模組1017將投保者風險評估資料1〇19,藉 =險評估資料1019傳送模組麵傳入外部的保險公司核保資料 暨核保結錄人儲存纟統丨㈣’齡統集結纟外部純咖 保者110所轉交的補充資料1023,交由保險公司8〇6進 保險金額/保費評估計算,再經保險公㈣4核保結果通知模組 341-R&D risk control parameters = R&D risk control total value Dynamic R&D risk management _ rationale, its R&D risk control refers to the above-mentioned products upstream and downstream intellectual property insurance cost miscellaneous calculation system, the calculation formula of the specific gravity value is as follows: E total quantity weight value % xf total value = g specific gravity value The above-mentioned product upstream and downstream intellectual property insurance cost sharing calculation system, the formula for calculating the premium allocation is as follows: Product intellectual property insurance premium X research and development risk control total value X (risk Value total + specific gravity value) = Sharing cost of a single component [Embodiment] Please refer to the first figure, which shows the architecture of the intelligent risk-adjusted risk assessment management system of the present invention. In this embodiment, the non-members 1〇〇1 in the system and method of the smart insurance-adjusted risk assessment management system of the present invention are displayed, and the risk assessment management system 1000 (also referred to as the management operation system) The person who proposes the legal application procedure and then obtains the 1033 qualification of the member is called a non-member; the member 1033 generally refers to the content of the general understanding of the participant, and fully understands and agrees with the management operation. 20 201019248 System content and spirit Information such as meaning, rights and obligations, and through the management system, the application is completed in the order, and the manager can only operate within a certain scope of use of the management system. The manager of the management system, 1010, insurance company 8G6, reinsurance company 804, customer service specialist 8〇2, etc., first qualify for membership 1033, and then according to their different identities, conditions and needs, 1013 also proposes that certain application procedures for qualification, review, etc. are managed and approved by the management 1013, and the approval of the energy has its financial authority and authority. 1011 is qualified for membership 1033, and is also for the management of the manager 1〇13 β generation for Zhao management research and development records (four), the establishment of historical research and development records, providing records management services, insurance brokers, product upstream and downstream risk management, products Downstream insurance cost sharing calculation, patent application, agency, search/analysis management, transactions and litigation, etc., or customers related to intellectual property business; insured person who has 1033 qualifications, may also be a manager 11, also for the management of the 1013 generation to handle tracking management R & D record data, establish historical R & D record data, provide R & D record data management services, insurance brokers, product upstream and downstream risk management, product upstream and downstream insurance cost sharing calculation, litigation, Certification, trust, financing, φ loan, etc., or customers related to intellectual property business; manager 1011 is not necessarily insured 1010' Insured 1010 is not necessarily managed by the system's interactive R&D risk management system 1012 Ι〇π. Customer Service Specialist 802 ' refers to a person who is specifically responsible for the business related to the intellectual or intellectual insurance business by the manager, the insured or the manager, 1013, etc., and the reinsurance company 804 ' refers to a legal acquisition. The company that operates the insurance or reinsurance business, in the form of a separate or = insurable nature for the insurance company 806 or other reinsurance companies that cooperate with it, accepts the insurance business that was originally underwritten. Risks, liabilities and obligations of insurance for the original insurance company 806 or reinsurance company 804; insurance company 806 'refers to a company that legally obtains insurance business, can be designed for 21 201019248 $ insurance market demand insurance Commodities, and they undertake various or related intellectual rights to serve or meet the insurance needs of Na's coffee; management, 1013 'based on the manager 10H, the insured 丨 (10), the insurance company 8.6, Then = the needs of the company 804, etc. or the relative needs of other related businesses and industries that are closely related to the above, and the design-set is convenient for control, operation, operation, calculation, payment, convenient use, correct and credible Data Management _ deposit (or lock-tight) like the management into the operating system 'which towel should contain at least the management, operation, use bribery other mode, the system processes or mutual Cheng linked manner, in order to achieve the interests # efficiency management and Na customers for the purpose. The computer or transaction machine 860 is a management operation system designed by the administrator 1013, through the user (non-member or member) login authentication device 870 and the login control device 880, and then through the Internet 1 More than 2 data transmission, copying, printing, storage, communication, management or display of the human interface device that can meet the needs of other parties; login authentication device i 87〇, this device is The computer or the transaction machine device 860 is used by itself, usually a user (non-member 1001 or member 1033) enters a certain type of door lock (Key) of the management operation system, and can be designed as a software program, a password, and an authorization. Codes, barcodes, magnetic strips, magnetic cards, wafers, electronic sensing devices, other devices or devices with identification capabilities or functions (such as 'fingerprint, cornea, voice control, imaging, breathing, biochemistry, etc.), individually or Mixed use and other methods, the purpose is to effectively prove the identity of the user and what qualifications and available basic information, and then according to their different injuries, qualifications, Operation in the area of the management operation system; login control device 88G 'This device is used in conjunction with the fire/anti-virus tamper 85 () and the system host 84 ,, and the purpose is to be used by the administrator 1〇13. Those who violate the statute degree to control non-member 1GG1 or member 1G33, or those who have a bad record or have been disqualified will be secreted into the management, such as those who have not paid the membership, those who have lost the membership of 1033, For those who have been suspended, stopped or reduced in the scope of use 22 201019248, the object of the user is 1被11, the insured 1〇1, the insurance company 8〇6, the reinsurance company 804, the customer service specialist 8〇2 , the manager 1〇13 internal personnel, etc., once the pre-existing controlled evidence has disappeared' and after the manager 1G13 re-examined the error, and then the controlled person canceled his management record, the thief can make a normal record. The Internet 1GG2 'is usually used to connect and share information between users of wired or wireless (broadband) networks through the connection of two or more end-of-the-way or multi-terminal devices. Sharing, etc. The purpose for _ kind of widespread use of computers linked to conventional techniques. • Intellectual Property Insurance Adjustable Risk Assessment Management System 1000, Manager 1013 is designed to be in contact with the Manager 1G1, Insurance Company 8 () 6, Reinsurance Company 8〇4, etc. Other related business, industry relative demand, set management and operation system; system host 84G, is a computer hardware host = spare and ^ butterfly hard ship accessories or equipment, can be placed intelligent insurance adjustment wind ^ evaluation management The y_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ End or 'and let the customer or user apply or meet their needs. In addition, it is connected with the i-ship 820 for other different functional purposes; P-Fan J media Π 'The main purpose is to infiltrate and intercept the network through the device, or the virus hacker , miscellaneous, devastating or dangerous gossip: t 13' is insured by the manager 1Q1 Bu insurance _, Bao Baobao 8G4, etc.; system server 82G, its main purpose is to make an appropriate allocation, cutting, process Program control, parameter setting, file type and other program settings, suitable for the efficient use of the electric state and the use environment; · program ship _, its application software ^ by external 23 201019248 input for Download, update, add, delete, set, save, or place two applications on the device with the system software (9) to make the software operating system more efficient. Web server 830 'stores website planning, design, and control , web, data and network system programs and operating systems for different network users; member information area 1034, only available to members who do not have other identities, so it can only be used in this area Fan Operate or browse some of the information related to intellectual rights or other related information, or link to other details through this clear; Longku server 1040, whose main purpose is to store various data files and patterns. It is convenient for different network users to search, input, store, update, etc. "Research and development risk management information 2010" means that the data of the original R&D s recording module 3800 of the manager 1〇11 will be stored in the manager 1011 after being processed by the lock storage module 2〇3〇. The staff of the office is equipped with Xiaobian (4) plus control, and there is no loop program 2G11 design 'display interface without editing function, then do not do any increase here / delete / modify 2〇12, data editing, etc., related to other For the 70 items, links, operations, functions, etc., please refer to the description of this unit and the third figure. The lock database server 1080 system manager 1〇13 is used for lock storage management. From the manager 1011 R & D risk management data, when various types of rights or materials enter the database server 1〇4〇, will automatically check whether there is a lock code, if any, automatically enter the device lock database server The device is tightly controlled. Because there is no loop program 2〇η design, it is impossible to add any deletion/deletion/modification 2012 action. 'You can only add new files or materials or query Li to ensure the original broadcast or data. Integrity and cleanness The rider (4) Lai (4) picks up the general file or data mode control, and has the components, links, operations, functions, etc., please refer to this unit and say mad@; 23〇2' is a basic data for the development of the records of the originals of the manager 1〇π', which shall at least contain: lock-in, lock-in number, product number, data 24 201019248 input period or time, prior patent search Period, previous patent search quantity, prior patent validity analysis, product non-infringement analysis date, product non-infringement analysis result, product public display date, product sales date, product sales quantity, etc., or related pictures, photos, audio and video, Briefings, experiments, tests, simulations, etc., or other data records that prove impossible to be altered during the development process, will be stored in the lock database server 1〇80, strictly controlled, not a certain The hierarchical decryptor will not be able to use this information. • In this embodiment, the non-will be used in the system and method of the intelligent risk-adjusted risk assessment management system of the present invention is shown. 1001, member 1033, manager 1011, insured 1010, customer service specialist 802, reinsurance company 804, insurance company 806, manager 1〇13 are all authenticated by computer or transaction machine device 860 and login authentication device 87. Then, through the Internet 1002 for data transmission or communication or to raise the need for each other to meet their needs; the manager deletes the financial risk (4) risk assessment ^ management system 1000 between the system host 840 and the Internet 1002 The fire prevention/anti-virus wall 850 and the control operation of the login control device 880 are used to prevent illegal intrusion or destruction from the outside. The system host 84 of the smart insurance-adjusted risk assessment management system 1000 is connected to a server for different purposes, for example : web server 830 (member information area 1034), system server 820, application server 81, database server 1040; wherein the secret database server in the database server 1040 stores the lock history Sexual R&D risk management information 2302 for effective data management. Referring to the second figure, in this embodiment, the main structure of the smart insurance adjustment type risk assessment management system 1000 of the present invention is shown, wherein at least the package login authentication device 870, the login control device 880, the non-member _, the Internet The components, operations, connections, and functions of the road 1002, the insured 1〇1, the manager ion, the manager wig, the member logs, and the member information area 1034 are all described in the first figure, 25 201019248, so This is not to be described again, only the component effects that have not yet been done are described here. In this embodiment, the smart insurance adjustment risk assessment management system 1000 (also referred to as the management operation system) of the present invention includes at least one application=10G3, and the module can be a non-member craze- After the application process procedure and setting f, it becomes the member of the management operation secret, the manager 1 (m, insurance 2 1010, customer service specialist 8G2, reinsurance company thank, insurance public property 6 or manager) Confirm the painting, in the pipe system, the person enters some text numbers or data 'to distinguish it is ^ for member 1033 = member dirty: new member, # user is non-member _, and want to participate When you make a new member, you can become a basic member of the e-operation system. If you are already a member, you cannot enter the J application area. The basic information of the member is used by the new member. When applying to the management operation system as a new member, some basic information, contact information, mosquito-stained brown or use consent f will be used by the management system to pass the examination and approval. Send a letter to inform the new member to pay 1005 Dues; payment of the membership fee 'for the payment notice letter, after the new and old, should pay the membership fee in the fixed ship, if it is not paid, it will be admitted to the county's age-old meeting. If you want to continue to participate, the new member 1005 will need to apply again, and the old member's brain will have to wait for the payment of the membership fee before resuming the qualification of the original meeting ( 1 () 33, if during the unpaid period ^ member 1033 If the use of rights is impaired, the management operation system will not be responsible for any responsibility; the fee has been paid 1008 'When the new and old members receive the payment notification letter, please follow the regulations of the payment fee and wait for the manager to read the business. Will send out the payment, or send a receipt, invoice (according to the ® or local government laws and regulations), to the paid, for the sake of, if it is a new member secret, put the certification device 870 ' As a new member, Cong Cong will use some kind of customs clearance (Key) when using this management operation system 26 201019248; end 1009, here is the pointer to non-members 1〇〇1, or members who fail to pay their dues 1033, Do a forced stop to manage it in this management In the system, the succession of the company is not within its scope of authorization. The interactive R&D risk management system 1012 is a long-term monitoring and management system for the development of risk management records, which is developed by the manager 1011 during the research and development phase. At this time, part of the data in the R&D risk management data of the R&D stage is automatically transmitted to the manager 1013, and directly enters the lock database server 1080 of the manager 1013 to be locked and stored, and any addition or modification is prohibited. The program loop design actions such as deletion and deletion can only be checked by a small number of authorized persons inside the manager 1〇13, or can be printed through rigorous special operation procedures, so as to effectively monitor the risk management risk management, which is managed The time for storing the R&D risk management information is the same as that of the manager, so it is called real-time operation; once a litigation event occurs, this part of the lock-down historical R&D risk management information can be submitted 23, 2 After being checked by the manager's original R&D record data, it is proved by the manager. Indeed, the responsibility of searching, analyzing and managing has been done beforehand, and it can even be used as evidence of "poisonous infringement". At the same time, if the manager Lan becomes the insured ΐθ1θ, then the risk management system can be developed by the action! R & D risk control parameters issued by θΐ2 • J: The purpose of reducing the risk value is to make the insured 1_ in the underwriting and premium 22 more _ conditions; R & D risk control parameters 1G14, of which the research and development of the wind case The smaller the risk management system 1012 will be. The more the regular capital, the larger the parameters, and the relative risk value locks the historical R&D risk management data 2302 at least the S profit, the r material input period or time, the previous patent search period product public display period, the product lock sale The period of time, the number of products sold, etc., or related pictures, photos, videos, newsletters, real 27 201019248 simulations, etc., or other data records that are sufficient to be altered during the development process, will be stored in the lock data The decryption of the library feeding machine surface (10) plus control tube level will not be able to use this data β, a risk, sub-management touch 1015, is an automatic trial and discriminate the risk factors of different levels of the insured, squat, medium and low _ . The insured person 1〇1〇 is known for his honesty and/or the skill of the person or the basic lake area of the lion. After the trial, it will produce H, low and other different grades of the wind lions as the acceptance of insurance, premium calculation Important reference materials such as claims conditions, such as the current insurance industry or life insurance industry, before the insurance, the insurer must ensure that the insured person fills in some insurance assessment information for reference or acceptance; input / Save the questionnaire 1G16 'The practice is to make the basic insurance factor of the above assessment insurance and / or the information for the Lin problem, etc., and make a bribe and then according to the insured 1010 industry, but automatically Or manually generate a series of questions for bribery, and then submit it to the insured 1Q1Q via paper or electric ton to answer all possible risk factors 3〇39, and also store them for Insurance company 806, reinsurance company 4, etc. as a reference for acceptance, billing or claims. The air duct execution module 1017 includes at least a substantial risk 3〇33, an operational risk 3034, and a risk value calculation 1〇18. The risk factor 3039 in the real risk 3〇33 and the operating risk 3〇34 is calculated by the calculation of the % value 3037 and the weight value 3038, and the risk value is 1018, and then the risk value is calculated by the operation of the risk value 1018. Total 昶昶; risk value calculation 1018 contains at least one risk value calculation formula 3〇6〇, this calculation formula is the real risk 3033 income plus the business risk 3034 income equals the risk value total 3036; if the manager 1〇11 also becomes insured If the user is 1〇1〇, the risk value reduction can be achieved by the interactive R&D risk management system 1012. The total value of R&D risk control is 1060. The total value of R&D risk control is represented by T. It is the process of R&D risk by the manager 1011. The process of strict control is 28 201019248. The insured 1010 can be presented when insured. The risk level is calculated as 1-R (R&D risk control parameter 1014) = T. For the risk factor management module 1015, the air duct execution module ίου, the risk value calculation 1018, the R&D risk control total value 1〇6〇 and other components, operations, connections, and functions, please refer to the back and fourth of this unit for details. Figure. Insured risk assessment data transmission module 1019, here refers to the aforementioned risk factor management module 1015, air duct execution module 1〇17, risk value calculation 1018, R&D risk control total value 1〇6〇, etc. The data is transmitted to the insurance company's nuclear insurance and underwriting result input storage system 1020 through the Internet 1〇〇2, and is provided to the insurance company 806, the reinsurance company 804, etc. as a reference for acceptance, billing or claims.保险 Insurance company nuclear insurance and underwriting results input storage system 1020, in addition to receiving data from the insured risk assessment data transmission module 1〇19, the system 1010 can also be supplemented by external system Cong The information is given to the insurance company 806, reinsurance company 804, so that the information helps to obtain more and more favorable conditions for the protector 1G1G, and the above-mentioned bribery in Wei or a proper preservation; insurance The company's underwriting results are notified to the module, the insurance company 8〇6, and the reinsurance 2 1 804 underwriting the insurance conditions of the insured's 1〇1〇, and making a judgment whether it is underwriting or not. If it does not meet the underwriting conditions, it will be surrendered. If the operation is notified, if the insurance coverage is met, the insurance amount/forging evaluation is calculated; the summary information means that the supplementary information 1023 can also be provided via the external system 1032; U.6, reinsurance company 8 〇 4, let this information help to obtain more and more favorable ^ 1010 insurance conditions; nuclear protection concept, that is, insurance company 8 〇 6, re-guarantee ^ 04 judge whether willing to underwrite 'and the results through the Internet Lu Cong outside the 1009 if the manager is notified 1 〇 13, then notify the end of the insurance policy! The results of the insurance policy, the amount of insurance, the premium into the nuclear insurance / companion: the fee receiving storage module 1025; the results of the underwriting / insurance premiums _ 槪 (four) 25, is Special (10) Du Nai Cong passed the insurance 29 201019248 1010's underwriting results, insurance amount, premiums into the underwriting results / insurance amount / premiums and other information, and this information is stored in the database server 1〇4〇, At the same time, this message will be notified to the manager 1013 that the insured is inspected and the insured is on the other hand. On the other hand, the insured person 1010 is asked to make a decision on whether to purchase the insurance 1026; the insurance is to be paid 1026, and the insured is 1〇1 after careful evaluation. If you want to buy insurance, you are required to sign an insurance contract with the manager 1, 13, insurance company 806, reinsurance company 804 and other units. If you do not want to buy insurance, you will end 1009. Signing the insurance contract 1027, the insured person 1〇1〇 and the manager 1〇13, the insurance company 806, the reinsurance company (9)4 and other units jointly signed an insurance contract to regulate the rights and obligations of both parties and the matters to be observed; The management module 1〇28, the insured person 1〇1 is included in the insurance policy management mechanism after signing the insurance contract 1027, and the manager 1013 assumes the responsibility of management. Apportioning the upstream and downstream insurance costs of the product is 1029, and the insured will purchase the insurance after the purchase of insurance. 'You can choose whether to use this device through the management operation system, so that the insurance premium can be analyzed and calculated through the device'. The middle and lower reaches of the low-cost merchants share the burden to reduce the huge burden of insurance costs. If you don't want it, you will end the 1〇〇9. If you want, you can go to the upstream and downstream intellectual property insurance cost sharing calculation system 1〇3〇; The intellectual insurance insurance cost distribution calculation system 1030, whose main purpose is to enable the insured 1010 to share the insurance premiums of the insured products with the upstream, downstream and downstream manufacturers through the analysis and calculation of the system, so as to reduce the insurance costs. After the burden is completed, the data is stored in the data server 1040. The system includes at least a duct execution module 1017, a single component specific gravity calculation module 31, a product upstream and downstream intellectual insurance cost sharing calculation module 3600, a single component intellectual insurance insurance cost sharing calculation 3610, and a premium allocation. Calculate the components, operations, connections, and functions of Equation 362. For details, please refer to the rear section of this unit and the fourth diagram. Please refer to the second figure, which shows the smart insurance adjustment risk assessment 30 of the present invention. 201019248 The evaluation management system 1000 includes two systems: an interactive research and development risk management system 1012 for storing and managing the incoming by the manager 1011. The lock secret research and development risk management data 2302, and the product upstream and downstream intellectual property insurance cost sharing calculation system 1〇3〇; the application module 1003 and the member confirmation module 1〇〇4 system manager 1013 are used to provide the manager 1011 The insured person 1010 applies for the use of the system, and the member information area 34 is provided by the manager 1〇13 to the member, the manager 1011, the insured person 1〇1〇, and the like, and the risk factor management module 1 〇15 is used to manage the risk factor 3039 which will cause the risk of the insured, and the air duct execution module 1017 is used to calculate the risk value caused by the aforementioned risk factor 3039, the insured risk assessment data transmission module 1019, and the underwriting result/ Insurance amount/premium receiving storage module 1〇25, insurance policy management module 1028, and the like. The implementation steps of the foregoing system and module are as follows: Step Non-member 1001 enters the application module 1003 through the Internet 1002, and then enters the member confirmation mode 1004 to confirm whether it is a member 1〇33 (is a member of the group 33 and requires After paying the membership fee of 1007, you can obtain the intelligent risk assessment management system using the invention. If you are not a member 1001 and do not want to become a new member 1005, φ will let it end 10〇9 and return to the system website. The home page, and cannot be able to perform any activities on this system. If it is the member 1033 of the manager 1011 due to the use of the interactive R&D risk management system 1012, it may be called the manager 1011 because it is the user of the risk management data management system; If you are not using the interactive R&D risk management system 1012, you can become the insured 1010 and go directly to the risk factor management module 1015 for intellectual property insurance. Risk assessment and related underwriting, insurance amount/cost evaluation calculation. If you want to become a non-member 1001 and want to become a new member 1005, you can fill in the basic information of the member 1006 'After paying the membership fee 1007' and then choose to become the manager 1011 into 31 201019248 into the interactive R&D risk management system 1012, or become insured The ι〇ι〇 directly enters the risk factor management module 1015 for risk assessment of the insured. The interactive R&D risk management system1〇12 is a long-term monitoring and management system for R&D risk management records. It is developed by the manager 1〇11 in the R&D stage, and the R&D risk management information is immediately The information that is mutually agreed between the part of 10 and the manager is automatically transmitted (such as the Internet 1002) to the administrator 1〇13, and directly enters the lock database server 1080 of the manager 1013 to lock and store the file. Any program loop design that adds/deletes/modifies 2012 actions can only be queried by a small number of licensors within the manager 1013, or can be printed with 22G8 through rigorous special operating procedures. Establish a lock history, _: issue risk management information 2302, and monitor the purpose of R&D risk management: the time that the manager and the manager store the R&D risk management data is the same, so it is called once a litigation event occurs. , you can submit this part of the lock-hiking historical R&D management information 2302, which is compared with the original R&D record data of the manager iou. Done in advance retrieval, analysis and management of responsibility, and even can be used as evidence of "unintentional infringement" of. At the same time, if you are jealous of the manager When becoming the insured 1G1G, it is expected that the risk value reduction will be achieved by the R&D risk control parameter 1014 issued by the interactive R&D risk management system1〇12❹, so that the insured 1G1G will be calculated in the calculation of Na and Baof. The financing condition, in which the R&D risk control parameter 1014 is calculated according to the management year of the interactive R&D risk management system 1012, the more the management year is, the smaller the risk value will be. The lock history historical R&D risk management data 2302 includes at least: & lock code, lock code serial number, product number, data input date or time, prior patent search date, previous patent search quantity, prior patent validity analysis, product not Infringement analysis date, product non-infringement analysis result, product public display date, product sales period, product sales quantity, etc., or related pictures, photo and audio, 32 201019248 newsletter, experiment, job, 槪, etc., or other ashizaki =! Ξ:Level===服服===理,则』 Qing Ship __The end of the age. If judged, the research and development wind _ parameter igi will be further brought into ===, 5, and will be input / The questionnaire is stored in the questionnaire, and the questionnaire is stored in the question bank questionnaire stored in the postal pre-stored; the risk factor management module ι〇15, the pre-stored question bank questionnaire, and the insured person’s face ίο ilf+ Igi8, if it is managed by the manager, can achieve the purpose of lowering the verification value by the interactive research and development risk management system (8) 2 due to the management parameter 1014 '; the aforementioned risk real risk 3033, business risk 3034; Quality risk 3033 means: f if its components are sand patents, products and their components, the number of patent searches, the number of infringement lawsuits for products and their components, the product and its components in the case of lawsuits or Lin and its frequency, the actual sales of products and their components f, the product and its zero-volume real-time recordings, the actual sales of the products and their zero-yield fa]; ^ have wisdom _ quantity, wisdom peak or Whether the scope of patent reversal is large or narrow (according to the results of intellectual property search or analysis), whether the patent for the product or component does exist, whether the patent for the product or component is exclusively authorized to others, whether the patent for the product or component is collateralized Or the quality of the business; the aforementioned business risk 3034 refers to: 33 201019248 The life of the insured is estimated, such as the capital of the insured, the financial status of the insured, the business growth of the insured, and the insured The number of infringement lawsuits that have been suffered, the number of warning letters, the insured's success in winning infringement lawsuits on a regular basis, the number of cases lost, the number of claims, the amount of claims after the insured has been infringed, and whether the insured has any The warning measures and implementation measures for the product to infringe upon the intellectual property rights of others. The above calculation method based on the weight value 3038 of the risk factor 3039 to obtain the risk ^ please refer to || four@ ' _ air duct executive module (four) Calculate the risk value caused by the aforementioned risk factor 3039; a risk factor management module 1〇15 is used to manage the risk factor that causes the insured's risk _; risk factor management module 1〇15 ❿Ϊ: substantial risk (%) 3033 'and business risk (%) 3034, the risk factor 3039 j is presented in a questionnaire, the answer is filled by the insured person, and the actual risk (%) 3033, business risk (%) 3〇34, ( %) The percentage value 3〇37 and the weight ^ 3038 are variables; wherein the R&D risk control parameter 1〇14 is equal to zero, indicating that the insured does not pass the interactive R&D risk management system 1〇12; The R&D risk management system 1〇12 issued = 'can achieve the purpose of reducing the risk value, so that the insured person ^ has more favorable conditions, wherein the R&D risk control parameter 1〇14 is based on the risk management system 1012 The case management year Count, the more the parameter management seniority larger the value, the smaller the risk. * The formula for calculating the risk value is as follows: ίίΐ ί ί Quality risk weight value + Β, business risk weight value = C risk value total (2) 1·- R R&D risk control parameter 1014 = τ R&D risk control total value face ※ (2) If the interactive R&D risk management system is not used, the parameter value of the R&D risk control parameter R is zero^, and the air duct execution module 1017 will insure the insurer risk assessment data 1〇19, borrowing the risk assessment data 1019 The transfer module is introduced to the external insurance company underwriting information and the underwriters are stored in the system. (4) The supplementary information 1023 transferred by the external pure coffee holder 110 is sent to the insurance company 8〇6 Insurance amount/premium evaluation calculation, and then the insurance company (4) 4 underwriting result notification module 34

201019248 ^片斷疋否核保麵若不核们024則通知管理者1013,再 觸娜職,娜核傭果、保 清不要胃触,縣束刪麟統運作,若 模、28並儲存該保單資料至資料庫伺服器忉4〇;下 二步驟為判斷是否要分攤計算產品上下游保險費用,若否,則進 仃則結束,若要進行舰人產品上下游智財傭f用分攤計算系 統1030 ’進行智財保險費用分攤計算。 為了使得一產品上下游廠商共同承擔智財侵權相關保險的保 險費用,本系統設立-產品上下游智財保險費用分攤計算系統 1030 ’供有意整合其產品上下游共同分雜保險費用的投保者1〇1〇 參考,但是該產品上下游智財保險費用分攤計算系統1〇3〇的計算 結果,並不會納入本發明智財保險調整型風險評估管理系統 1000中使用,僅供作投保者1010參考,而藉此自行整合使用。 請參看第三圖,在此實施例中係顯示本發明之互動式研 發風險管理系統1012的主體結構,其中至少包含網際網路 1002、結束1009、被管理者1〇1卜管理者1〇13、會員1〇33、研 發風險控管參數1014、資料庫伺服器1〇4〇、鎖密資料庫伺服器 1080等之元件、操作、連結、功效,均在第一圖及第二圖中敘述 過,故在此不再贅述,僅就尚未說明之元件、操作、連結、功效 在此做一敎述。 在此實施例中係顯示本發明之互動式研發風險管理系統 1012 (亦可簡稱本互動式管理運作系統),為一可以讓被管理者 1011與管理者1013之間採行互動的運作模式,管理者1〇13提供 一研發風險管理與監督的模式與環境讓被管理者1011使用,當被 管理者1011如遇被控侵權之法律訴訟時,可以向管理者1013提 35 201019248 出申請函,請管理者1013提供相關的“鎖密歷史性研發風險管理 資料供被管理者1011當做”非故意侵權,,之證據資料,其主體 結構至少包含一被管理者研發風險管理資料模組2002,其意是 指由管理者1013提供一研發風險管理資料之作業模式給被管理者 1011使用,其目的就是代為有效控管與監督被管理者1011之研發 過程與記錄;啟動模組2004 ’當被管理者1〇11需要展開新的研發 產品、專利案或前述之新衍生性新案時,就可以啟動本互動式管 .理運作系統運作,以便即時納入監督與管理機制中;研發記錄模 組3800,本模組是管理者1〇13提供一研發風險管理與監督的模式 ❿與環境讓被管理者1011使用,在此處具有迴路程式2〇11設計, 故可以讓被管理者1011做任何資料之輪入處理,如增/刪/修改 2012、查詢2014、資料列印2208 (儲存2016、讀取2018等則是 經電腦軟體程式設計而自動產生的動作)或下载網路相關資訊、 貼圖、影音等與研發有關之資料,至少包含使用者、研發檔案(總 序號、檔名、檔號、衍生性之檔案)、日斯、時間、研發標的、摘 要、内容說明,或產品編號、產品標的、產品内容、資料輸入日 期或時間,或專利日期、時間、專利標的、專利說明、專利内容、 專利權項、備註事項、專利參與者、先前專利檢索日期、先 利檢索工具、檢索關鍵字(Key Word)、檢索範圍、先前專利你 數量、檢索者、先前專利有效性分析、產品不侵權分^^期说索 品不侵權分析結果、產品公開展示日期、產品銷售日期、產品 售數量等,或其他尚未被列舉之所需相關資料,或是相關之片、 照片、影音、簡報、實驗、測試、模擬等資料,都需經鎖密保敦 模組2030處理過後將被儲存在被管理者1011所指定之資料庫 服器1040内嚴加控管,且沒有迴路程式2〇11設計,顯示介面二 編輯的功能,故無法去做任何之增/刪/修改2〇12動作,^非'右 某種層級之解密者才能使用查詢2014、或資料列印2208的動有 36 201019248 否則其它使用者都將無法使用本資料。 參 ❹ 完成鍵2006,本按鍵之主要目的為結束前述研發記錄模組 3800之作業,在此之後本互動式管理運作系統即沒有任何之增/ 刪/修改2012的迴路程式2011設計,故為讓使用者慎重起見, 避免誤按此鍵,所以本鍵之設計是需要至少按兩次以上之作業流 程才為有效,當被管理者顧树定使岐研發記賴組38〇1 之後,在第一次按下本鍵時為確保是否屬於非故意按錯鍵,故會 顯示是否是要結束研發記錄模組3800之作業而繼續下一步驟(會 顯ΐ警語果選擇,,不是’則再回到研發記錄模組3800内, 若是選擇是”則繼續下一步之再次按鍵確認,本裝置會再次顯 不是否仍要繼續(會再次顯示警語),如果選擇,,不是”則再回到 研發記錄模組3800内,若是選擇”是,,則繼續下一步之作業使 用者經再次確認後應該㈣了往下之作紐程,也知其所輸入之 資料無誤後則可按此鍵,當按過此鍵之後則所有已輸入之資料即 全部被封鎖或鎖密,也沒有任何的迴路程式2G11設計,所以任何 人皆無法再做任何之增/刪/修改觀的動作,只能在有權限範 圍之内的被管理者顧或管理者咖可峨—些查詢觀 資料列印2208的動作,儲存細、讀取麵等則是經程式設計 而自動產生的動作。若被管理者1011在使用本互動式管理運作系 ㈣’ 3^__模組_内之程式輯具有迴路程式2〇ιι 設!1二按下本鍵之前,均可以在其已輸入之資料中做 任何的=刪/修改觀、查詢2G14、資料列印等的動作。 ^保管模組2030,本模組是一資料鎖密裝置,就是將已 完錄模㈣〇〇内的資料,在其原資料之前端加上特殊 的鎖;符,或代碼’以便和其它未鎖密之資料在檢索與讀取時做 一有ΐίίϊ ’其經鎖密後之資料可以裝置在被管理者所在 使用,、統伺服器内,或是由被管理者1011所指定的其它電 37 201019248 腦祠服器内存放、保管與管理,而管理者刪不負責這一端之任 何資料儲存、解密、保管等的管理;研發風險管理資料2⑽其 意是指原研發記錄模組3800之資料’再經鎖密保管模组腦處 理過後將被儲存在被管理者1011所指定之資料庫飼服器1〇4〇内 嚴加控管,且沒有迴路程式2011設計,故紐去做任何之增/刪 /修改2012動作;迴路程式·,為電腦軟艘程式設計的一種方 式,其主要的目的就是讓電腦軟體程式設計的流程,具有回轉或 跳開的流程設計,讓其所輸入之資料可以達到增/刪〆修改 2012、查詢2014、儲存2016、讀取2018、資料列印謂等的資 ❹料維護目的,或是以跳躍的流程設計方式,而強制避開某一 研發風險管理資料傳遞歡2008,林組之主要功能是將 被管理者1011之鎖密保管模組2〇3〇内的研發風險管理資料2〇1〇 (此處是馳管理者圆及管理者聰雙方_由管理者聰 管理的資料)’經鎖密處理後,透過本模組經由網際網路傳 遞給管理者1G13 ’以建立鎖密歷史性研發風險管理資料23〇2,一201019248 ^If the piece does not check the nucleus, if you do not check the 024, then notify the manager 1013, then touch the Na, Na Na nuclear commission, Bao Qing do not stomach touch, the county bundle deletes the operation, if the model, 28 and save the policy The data is sent to the database server 〇4〇; the next two steps are to determine whether to calculate the upstream and downstream insurance costs of the product, and if not, the import and the end will end, if the shipman product upstream and downstream intellectual property commissions are used for the allocation calculation system 1030 'For the calculation of the cost of intellectual property insurance. In order to enable the upstream and downstream manufacturers of a product to jointly bear the insurance premiums for the insurance related to intellectual property infringement, the system is set up - the product upstream and downstream intellectual property insurance cost sharing calculation system 1030 'for the insured who intends to integrate the upstream and downstream common miscellaneous insurance costs of their products 1 〇1〇 reference, but the calculation result of the upstream and downstream intellectual property insurance cost sharing calculation system of the product is not included in the intellectual property insurance adjustment risk assessment management system 1000 of the present invention, and is only for the insured 1010 Reference, and use this to integrate itself. Referring to the third figure, in this embodiment, the main structure of the interactive R&D risk management system 1012 of the present invention is shown, which includes at least the Internet 1002, the end 1009, and the manager 1〇1 manager 1〇13. The components, operations, connections, and functions of the member 1〇33, R&D risk control parameter 1014, database server 1〇4〇, lock database server 1080, etc. are all described in the first figure and the second figure. However, it is not repeated here, and only the components, operations, connections, and functions that have not been described are described here. In this embodiment, the interactive R&D risk management system 1012 (also referred to as the interactive management operation system) of the present invention is shown, which is an operation mode that allows the interaction between the manager 1011 and the manager 1013. The manager 1〇13 provides a model and environment for R&D risk management and supervision to be used by the manager 1011. When the manager 1011 encounters a lawsuit for alleged infringement, he may submit an application letter to the manager 1013. The manager 1013 is required to provide relevant "hidden historical R&D risk management information for the manager 1011 to do" unintentional infringement, and the evidence structure has at least one manager's R&D risk management data module 2002. It means that the operation mode of providing R&D risk management data by the manager 1013 is used by the manager 1011, and the purpose is to effectively control and supervise the R&D process and records of the manager 1011; the startup module 2004 is managed. If you need to start a new R&D product, patent case or the new derivative new case mentioned above, you can start this interactive management system. Operation, so as to be immediately incorporated into the supervision and management mechanism; R&D record module 3800, this module is the manager 1〇13 provides a model for R&D risk management and supervision, and the environment is used by the manager 1011, which has a loop here. Program 2〇11 design, so that the manager 1011 can do any data round-robin processing, such as add/delete/modify 2012, query 2014, data print 2208 (storage 2016, read 2018, etc. is a computer software program Designed and automatically generated actions) or downloading network related information, textures, audio and video and other research and development related materials, including at least users, research and development files (total serial number, file name, file number, derivative file), Ris, Time, R&D target, abstract, content description, or product number, product target, product content, date or time of data entry, or patent date, time, patent subject, patent description, patent content, patent rights, remarks, patent participation , previous patent search date, pre-search tool, search key (Key Word), search scope, number of prior patents, searcher Previous patent validity analysis, product non-infringement, ^^ period, product non-infringement analysis results, product public display date, product sales date, product sales quantity, etc., or other relevant information not yet listed, or related Films, photos, audio and video, presentations, experiments, tests, simulations, etc., will be stored in the database server 1040 designated by the administrator 1011 after being processed by the lock security module 2030. There is no loop program 2〇11 design, display interface 2 editing function, so can not do any increase/deletion/modification 2〇12 action, ^ non-right right level of decryption can use query 2014, or data column Print 2208 has 36 201019248 or other users will not be able to use this information. After completing the key 2006, the main purpose of this button is to end the operation of the aforementioned R&D recording module 3800. After that, the interactive management operation system does not have any increase/deletion/modification of the 2012 circuit program 2011 design, so The user should be careful to avoid accidentally pressing this button, so the design of this button is required to be valid at least twice or more. When the manager Gu Shuding makes the R&D record group 38〇1, at the first When the button is pressed twice, to ensure whether it is unintentionally pressing the wrong button, it will display whether it is necessary to end the operation of the R&D recording module 3800 and continue to the next step (there will be a warning word selection, not ' then back Go to the R&D record module 3800. If the selection is yes, then continue to confirm the next button again, the device will display whether it still needs to continue (the warning will be displayed again). If it is selected, it is not “return to R&D. In the recording module 3800, if the selection is "Yes," the user who continues the next step of the operation should re-confirm (4) the next step, and know that the information entered is correct. Key, when this button is pressed, all the entered data will be blocked or locked, and there is no loop program 2G11 design, so no one can do any addition/deletion/modification view, only Can be managed by the administrator or the administrator within the scope of the permission - some query view data prints 2208 actions, storage details, read faces, etc. are automatically generated by programming. If managed 1011 in the use of this interactive management operation system (4) '3 ^ _ _ module _ program has a loop program 2 〇 ι ι! 1 2 before pressing this button, you can do anything in the data you have entered = delete / modify view, query 2G14, data printing, etc. ^ Custody module 2030, this module is a data lock device, is the data that has been recorded (4), in its original data Add a special lock; or the code ' at the front end to make a ΐ ϊ ϊ 和 其它 其它 ϊ ϊ 其它 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索 检索Within the server, or as specified by the administrator 1011 The other power 37 201019248 cerebral palsy storage, storage and management, and the manager is not responsible for the management of any data storage, decryption, storage, etc. at this end; R & D risk management information 2 (10) means the original research and development record module The data of 3800's will be stored in the data storage device designated by the manager 1011 after the brain treatment, and there is no loop program 2011 design, so the new one goes. Do any additions/deletions/modifications of 2012 actions; loop programs·, a way of designing computer soft-boat programs, the main purpose of which is to make the process of computer software programming, with a process of turning or jumping, letting it The input data can be upgraded/deleted, modified 2012, queried 2014, stored 2016, read 2018, data printed, etc., or used in a jump process design, and forced to avoid a certain research and development. Risk management data transmission Huan 2008, the main function of the forest group is to be the developer's risk management information within 2〇3〇 of the manager's 1011 lock-in custody module 2〇1〇(here is the manager circle and tube Both the manager and the manager of the company are managed by the manager. After the lock is handled, the module is transmitted to the manager 1G13 via the Internet to establish a secret research and development risk management information. 23, 2

旦Ιΐίί被管理者1011需要時,可由管理者1013提供此資料 以作為舉證之用,藉由管理者1013第三者的保存與管理形成一 較客觀、公平、公正、正確完整的管理模式;管理者1013藉由管 理者資料触做麵經由如峨醜職⑽遞,接收到被 管理者1011所傳過來的研發風險管理資料2〇1〇。 該鎖密歷史性研發風險管理資料2302,即為鎖密代碼、鎖 密序號、日期、時間+研發風險管理資料2036經加密作業模組 2038處理過後所產生出的新檔案型態資料,並將其儲存麵、在 理者1013的鎖密資料庫舰器1G8㈣之鎖密歷史性研發風 理資料2302裏保存;鎖密代碼雙,軟趙程极計者為容易辨別 資料之種類或鶴或性#或用賴—種常用設定方式,可以利用 38 201019248 電腦鍵盤上之符號(如®、*、#、$、%、&等,或其他之特殊 符號或自設之特別符號)、文字(如中、英文或其他國語文)、數 字,它可以單獨使用亦可混合使用,而形成一特殊且具代表性的 辨識方法,用以管制資料之進出或資料維護或使用者;鎖密序號、 曰期、時間2034,此處為一自動編排各種不同類型、客戶、產品 等資料總序號、日期、時間之軟體程式自動產生器,鎖密序號是 為一電腦軟體所自動產生之連續性的號碼,它可以依所接收到的 鎖密代碼2032資料之類別、型態或性質自動產生不同的文數字混 合編組之總序號,然後再依每筆傳入相同性質之資料,自動往下 ❹編排具有連續性質之號碼,同時也將會產生一日期、時間等的即 時性資料;鎖密代碼、鎖密序號、曰期、時間+研發風險管理資 料2036 ’此處之功能是將前述之資料(如鎖密代碼2〇32+鎖密序 號.、日期、時間2034+研發風險管理資料2〇1〇)組合成一筆特殊 性質的資料,以便本互動式管理運作系統管控;加密作業模組 2038,此處透過一特殊的加密作業軟體之設定,而可將一鎖密代 碼、鎖密序號、日期、時間+研發風險管理資料2Q36之資料重新 編輯轉換成一特殊之文數碼的一新組成檔案型態模式,因為此一 新的檔案型態模式無法運用現行的文書處理軟體來使用,故進而 可達到保密與控管的目的,若要讀取此筆資料時,則必需要使用 同一版本之解密作業軟體,經其解密後才能還原成其原本之檔案 型態模式,如此就可以運用現行的文書處理軟鱧來使用;鎖密歷 史性研發風險管理資料傳遞模組2040,本模組之主要目的與功效 是將鎖密歷史性研發風險管理資料2302,透過本模之傳遞至管理 者1013的鎖密資料庫伺服器1〇8〇内儲存,以茲保存其具有連帶 相關原始之歷史性研發記錄資料,一旦日後如果被管理者1〇11需 要時,並可由管理者1013提供此資料以做為舉證對照之用,如此 可藉由管理者1013 (第三者)這一方之保存與管理,而形成一較 39 201019248 客觀、公平、公正、資料正確與完整的管理模式 Φ ❹ 被管理者提出申請鎖密歷史性研發風險管理資料模組 2060,這是一個被管理者1011與管理者1013間互動機制模式的 開始,當被管理者1011如遇被他人控告侵權或欲告他人侵權時, 可向管理者1013提出申請鎖密歷史性研發風險管理資料23〇2的 程序作業,藉由管理者1013代管的他方資料,來做為舉證之重要 標的物;輸入使用權限密碼2064 ,即管理者1〇13授權給被管理者 1011使用階層、活動範圍、使用功能等之權限密碼;輸入隨機授 權碼2066,此即使用者在使用之前,由電腦隨機產生器所產生每 次均不騎授權關碼(可由文、數字或魏等混合編幻,如果 使用者輸入錯誤,則無法繼績執行其它的流程或程序作業,如果 輸广正確則可通關,並自動記錄此碼,此兹做為日後核對憑證; 確認2068,當輸入完使用權限密碼2〇64及隨機授權碼2〇66後按 下此鍵,讓電腦自動去比對,要完全正確後才可通關,以兹證明 使用者為是經過核定難使用的人;帛三:欠誦域重與保全 起見’在關過程上,通常都會要求使用者,必須給予連續二次 =上之機會輸人密碼或_碼,嚴防非制者之誤誠巧取過 ’填選欲提出申請的研發檔案2〇82,被管理者1〇11可自行逕自 ㈣戰歧管理者刪不負責任何 路戈保管責)内選取其預點選的檔案,經其自行解密後 2_传士Γ發風險管理資料2010内容;載明用途/案號、序號 案^檔在提出中請書上必須載明清楚其用途/播案 趋床j案序號等細⑽,以便讓管理者1013 了解或辦理提出 接Ψ“向管理者發出申請函2088,為了簡化被管理者1011 計此一制,所以本互動式管理運作系統特別設 飞的提出申凊模組格式,只要被管理者1011照前述之 201019248 n 〜·^選定其檔案之後,只要按下申請鍵,本互動式管理運 體、動將被管理者1011之需求透過傳遞(網際網路 β心的Ϊ式?它轉至f理者刪所對觸祕中;管理者確認 去ιηι、ϋ申請函2100,當管理者1013所對應的部門收到被管理 你3理者發出申請函2088之後,經再次確認及審查通過 2106之^^管理者1〇11發出同意其向被管理發出准許申請函 咨姑”理者_被管理者提出中請“鎖密歷史性研發風險管理Once the administrator 1011 needs it, the administrator 1013 can provide this information for the purpose of proof. By the preservation and management of the third party of the manager 1013, a more objective, fair, just, correct and complete management mode is formed; The 1013 receives the R&D risk management information transmitted by the manager 1011 via the manager's profile. The lock-hidden historical R&D risk management data 2302 is a new file type data generated after the encryption code, the lock date number, the date, the time + the R&D risk management data 2036 is processed by the encrypted operation module 2038, and The storage surface is stored in the historical secret research and development data 2302 of the locker database 1G8 (4) of the controller 1013; the lock code is double, and the soft camera is easy to distinguish the type of data or crane or sex. #或用赖- A common setting method, you can use 38 201019248 computer keyboard symbols (such as ®, *, #, $, %, & etc., or other special symbols or special symbols), text ( For example, Chinese, English or other national languages and numbers, it can be used alone or in combination to form a special and representative identification method for controlling the entry and exit of data or data maintenance or users;曰期,时间2034, here is a software program automatic generator that automatically arranges various serial numbers, dates, and time of various types, customers, products, etc. The lock key serial number is a computer software Dynamically generated serial number, which can automatically generate different serial numbers of different mixed numbers according to the type, type or nature of the received secret code 2032, and then pass the same property according to each Automatically arranging the serial number with continuous nature, and will also generate real-time data such as date, time, etc.; lock code, lock number, period, time + R&D risk management data 2036 'function here The above information (such as lock code 2〇32+lock key serial number, date, time 2034+R&D risk management data 2〇1〇) is combined into a special nature data for the control of the interactive management operation system; The encryption operation module 2038, here through a special encryption operation software setting, can re-edit a lock code, lock secret number, date, time + research and development risk management data 2Q36 into a special text digital A new file type mode, because this new file type mode can not be used with the current document processing software, so it can achieve confidentiality and For the purpose of the tube, if you want to read this data, you must use the same version of the decryption software, after decrypting it can be restored to its original file type mode, so you can use the current paper processing soft 鳢Use; lock the secret R & D risk management data transfer module 2040, the main purpose and function of this module is to transfer the secret research and development risk management data 2302, through the model to the manager 1013's lock database server servo The device is stored in 1〇8〇, in order to save the original historical R&D record data associated with it, and if it is needed by the manager 1〇11 in the future, the information can be provided by the manager 1013 for comparison purposes. Thus, through the preservation and management of the manager 1013 (third party), a more than 39 201019248 objective, fair, just, and correct and complete management model Φ ❹ The R&D risk management data module 2060, which is the beginning of the interaction mechanism mode between the manager 1011 and the manager 1013, when encountered by the manager 1011 When another person accuses an infringement or wants to infringe someone else's infringement, he may file a procedure for applying to the manager 1013 to apply for the secret research and development risk management information 23〇2, and use the other data managed by the manager 1013 as an important subject of the evidence. Enter the usage permission password 2064, that is, the administrator 1〇13 authorizes the authority password used by the manager 1011 to use the hierarchy, the activity range, the usage function, etc.; enter the random authorization code 2066, which is randomly selected by the computer before the user uses the user. The generator generates no authorization code for each time (can be edited by text, number or Wei. If the user inputs incorrectly, it cannot perform other processes or program operations. If the transmission is correct, it can be cleared. And automatically record this code, this is used as a verification certificate in the future; confirm 2068, when inputting the permission password 2〇64 and random authorization code 2〇66, press this button, let the computer automatically compare, after completely correct Only then can you pass the customs clearance to prove that the user is a person who has been approved for difficult use; 帛3: owing to the domain and the preservation of the 'in the process of closing, usually require users, Must give a continuous second = the opportunity to enter the password or _ code, to prevent the non-manufacturer's mistakes and ingenuity to pass the 'research and development of the application of the R & D file 2〇82, by the manager 1〇11 can go from the (four) The manager is not responsible for any of the custodian responsibilities. The files selected in the pre-selection are selected. After the self-decryption, 2_the sergeant issues the risk management information 2010; the purpose/case number and serial number are in the file. In the request, the book must contain the details of the use/casting case number, etc. (10), so that the manager 1013 can understand or handle the proposal. “Apply to the manager 2088, in order to simplify the account 1011 One system, so this interactive management operation system is specially set up to apply for the application module format. As long as the manager 1011 selects the file according to the aforementioned 201019248 n~·^, just press the application button, the interactive management body, Will be transmitted by the manager's 1011 demand (Internet β 心 ? ? 它 它 它 它 它 它 它 它 它 它 它 它 它 ; ; ; ; ; ; ; ; ; ; 管理者 管理者 管理者 管理者 管理者 管理者 管理者 管理者 管理者 管理者 管理者 管理者 管理者 管理者 ι ι ι ι The department received is managed by you 3 After the application letter 2088 is issued, it is reconfirmed and reviewed by the 2106 manager of the 2106, and the consent is sent to the management. Risk Management

imi ^函件2102 ’當管理者1013所對應的部門收到被管理者 J理者發出申請函2088之後,將會儘速進行確認、查證、 檔案一詢2014等的前置性流程作業,再此處不做任何之增/刪/ 修改2012、資料編輯等的動作;選取被查尋檔案21〇4,管理者1〇13 將根據被管理者贿峨$之槽案至管理者順之鎖密資料庫 飼服器1080 0進行資料查詢2Q14作業,在進行資料查詢2014作 業之同時’本互動式管理運作系統也會自動對管理者1013、被管 理者1011的龍窗π,㈣査詢絲雜通知函删,其内容將 載明所査詢2014之資料檔案内的相關資訊,以盡管理者1〇13應 告知事實之義務;查詢鎖密資料通知函獅,此處之主要目的為 防止管理者1013或他人在未經被管理者1〇11之同意,而揸自任 意去查s旬2014或資料列印2208某一被管理者1〇11之檔案資料, 而易導致被管理者1011之資料外线或被盜取,所設立的特別控管 模式。如果管理者1013或被管理者ion,得函後發現與事實不符 之情況時,應盡速通知雙方之主管會同査證辦理,以免損及雙方 之權益;向被管理發出准許申請函21〇6,當管理者1〇13經查證癌 涊2068無誤之後,會將此准許申請函透過傳遞(網際網路1〇〇2) 的模式將它轉至被管理者1011所對應單位的相關人員辦理;被管 理者收到管理者發出之准許申請函2108,當被管理者1〇1丨收到向 201019248 被管理發出准許申請函2106之後,被管理者1〇11則可依據其流 程辦理’然後再將已完成之准許函寄給管理者相關單位2112辦 理;將准許函填製、列印、簽章2110,在被管理者收到管理者發 出之准許申請函2108後,其內有一制式化的准許函填製表單,請 被管理者1011列印後,請依實填寫,並在准許申請函上簽名及Z 蓋章;將已完成之准許函寄給管理者相關單位2Π2,將已填寫完 成及簽名及加蓋章之准許申請函’寄給管理者1013之相關單^立處 理;管理者收到被管理者所寄來之准許函,經確認無誤德逢杆醢 密資料作業2114,當管理者1013收到被管理者101i寄來之准許 β 申請函後’相關部門之人員檢核該函件是否已符合條件及完備, 若不符合條件及完備則請被管理者1011備妥後再繼績受理,若已 確認無誤之後,則管理者1013即將開始準備解密作業之執行動 作;解密保管模組2200,本模組主要的功能就是將已鎖密之資料 分階段進行解密的作業,及解密完成後即刻刪除解密歷史性研發 風險管理資料2220 ;執行解密作業2202,由管理者ι〇13相關的 人員透過選取被查尋檔案2104之作業模式進行搜尋的動作,當找 尋到該筆檔案後隨即自動進行解除加密及鎖密的作業,讓鎖密資 料庫伺服器1080内之鎖密歷史性研發風險管理資料23〇2,依績解 除;鎖密歷史性研發風險管理資料解除2204,讓其原本已鎖密之 資料’還原成其原本之播案型態模式,如此就可以運用現行的文 書處理軟體來使用;儲存解密歷史性研發風險管理資料22〇6,將 已解除之鎖密歷史性研發風險管理資料2302暫時儲存2〇16;資料 列印2208,本互動式管理運作系統會自動將該筆存放在暫時儲存 2016的記憶體内讀取2018該資料,並依續列印完成,並寄給被管 理者1011 ;製作電子檔2210,本互動式管理運作系統會自動將該 筆存放在暫時儲存2016的記憶體内讀取2018該資料,並依續製 作完成一電子格式信函或資料之電子檔’並寄給被管理者1〇11 ; 42 201019248Imi ^Letter 2102 'When the department corresponding to the manager 1013 receives the application letter 2088 from the manager, it will promptly perform the pre-requisite process such as confirmation, verification, file inquiry 2014, etc. Do not add any changes/deletions/modifications to 2012, data editing, etc.; select the file to be searched 21〇4, the manager 1〇13 will be based on the manager’s bribes to the manager’s case The library feeding machine 1080 0 carries out data inquiry 2Q14 operation, and at the same time as the data inquiry 2014 operation, the interactive management operation system will automatically check the manager's 1013, the manager's 1011's dragon window π, (4) Deleted, the content of which will contain the relevant information in the data file of the 2014 inquiries, in order to fulfill the obligation of the manager to inform the facts; to inform the lion of the confidential information, the main purpose here is to prevent the manager 1013 or Others have not been approved by the administrator, and they have arbitrarily checked the file data of the manager 1〇11 or the data of 2208, which may lead to the outside of the data of the manager 1011. Stolen, set up special Pipe mode. If the manager 1013 or the manager is aware of the situation and finds that it is inconsistent with the facts, he should notify the supervisors of both parties as soon as possible to verify the case, so as not to damage the rights of both parties; After the manager 1〇13 has verified that the cancer 涊2068 is correct, the permission application letter will be transferred to the relevant personnel of the corresponding unit of the manager 1011 through the mode of transmission (Internet 1〇〇2); The manager receives the permission application letter 2108 issued by the manager. After being received by the manager 1〇1丨, the manager is issued a permit application letter 2106, and the manager 1〇11 can proceed according to the process. The completed permit letter shall be sent to the relevant unit 2112 of the manager for processing; the permit letter shall be filled, printed and signed 2110, and after being received by the manager, the permit application letter 2108 issued by the manager shall have a standardization The permission letter is to be filled out. Please print it out by the administrator 1011. Please fill in the form and sign the Z and the Z seal. The completed permit letter will be sent to the relevant unit of the manager. 2Π2 will be completed. And sign And the stamped permission application letter 'send to the manager 1013 related to the individual processing; the manager receives the permission letter sent by the manager, after confirming the correctness of the information, 2114, when the manager 1013 After receiving the permission β application letter sent by the manager 101i, the staff of the relevant department will check whether the letter has met the requirements and is complete. If the conditions are not met and the requirements are complete, please be prepared by the manager 1011. If the confirmation is correct, the manager 1013 is about to start the execution of the decryption job; the decryption and storage module 2200, the main function of the module is to decrypt the locked data in stages, and after the decryption is completed. Immediately delete the decrypted historical R&D risk management data 2220; execute the decryption operation 2202, and the relevant person of the manager ι〇13 searches for the search mode of the searched file 2104, and then automatically finds the file immediately after finding the file. Encryption and lock-up operations, the lock-in database server 1080 locks the historical R&D risk management data 23〇2, the performance is released; the lock history The R&D risk management data is released 2204, so that the originally locked data is 'reverted to its original broadcast mode mode, so that the current document processing software can be used; the storage and decryption historical R&D risk management data 22〇6 , the unlocked historical research and development risk management information 2302 is temporarily stored 2〇16; the data is printed 2208, the interactive management operation system will automatically store the pen in the memory of the temporary storage 2016 to read 2018 the data. And continue to print and send it to the manager 1011; the electronic file 2210, the interactive management system will automatically store the pen in the memory of the temporary storage 2016 to read the data 2018, and continue Produce an electronic file of an electronic format letter or material' and send it to the manager 1〇11; 42 201019248

迴路程式2011、鎖密保管模組2Q3〇、 理資料2010、鎖密序號、曰期、時間 “四** ’ 贫犯輝模組兆Ui)、迴路鉬忐9nn、Circuit program 2011, lock-and-storage module 2Q3〇, data 2010, lock key number, flood season, time “four**” poverty-deficient module mega Ui), loop molybdenum 忐9nn,

研發風險管理雜傳遞模組_、管理者資觸㈣⑽2〇、加 密作業模組2038、鎖密歷史性研發風險管理資料23〇2、 庫伺服器1080、被管理者提出申請鎖密歷紐研發風險管理 模組2060、解密保管模組2200等》 被管理者1011進入被管理者研發風險管理資料模組2〇〇2中 的啟動模組2004,以產生新研發檔案或之前研發案的衍生性檔 案,待輸入研發風險管理資料2010完成後,經由研發記錄模組 春3800記錄,且在使用者按下一完成鍵2006時,即將管理者1〇13 所需的研發風險管理資料2010,藉由一研發風險管理資料傳遞模 組2008,傳送至管理者資料接收模組2〇2〇 ;同時,被管理者1〇11 開啟新研發檔案或之前研發案的衍生性檔,當按下完成鍵2〇〇6, 即將自己欲保留的研發風險管理資料2〇1〇,傳至自己的鎖密保管 模組2030中進行鎖密作業程序,然後在傳遞至其資料庫伺服器 1040内儲蓄自行保管。 即藉由研發風險管理資料傳遞模組2〇〇8將研發風險管理資料 2010經網際網路2010傳至管理者1013的管理者資料接收模組 2020 ;下一步驟即是研發風險管理資料2〇1〇進入鎖密保管模組 43 201019248 $ =30=鎖密新播即產生鎖密代喝戰如*、#、·丨⑬ 期、時間,’是由軟體自動產生鎖密序號、曰 研發風險管理資=36是代碼、鎖密序號、日期、時間+ 咨f史性研發風險管理資料2302,且該資料自動儲 計,而遠庫飼服器1080中鎖密儲存,沒有迴路程式2011設 ^瞢理& ’禁止任何之W修改2012動作,以達研發風險監 控I理的目的’同時—旦有訴訟事件發生時,被管理者随向營 ^者提出申請鎖密歷史性研發職管理#料2302,再與^管 料比對整合後,可藉以證明被管理者已盡管理之管 責,甚至可為「非故意侵權」的證據。 若是該被管理者10Π欲成為投保者1010,參與智 ==管理系統麵的智財保險風險評估,藉 風險管理祕1G12膽㈣研發風陳f參數觀,可達到風險 Ξ得祕者麵在祕絲#計算上有較有利的 條件’其中該研發風險控管參數1014乃依互動式研發風險管理系 =12 _案管理年f計算,管理年餘㈣參數愈大,而風險 響 值愈小。 當被管理者1011欲申請鎖密歷史性研發風險管理資料讀 時’可進入被管理者1011提出申請鎖密歷史性研發風險管理資料 模組2060輸入使用權限密碼2064,再輪入電膘之隨機授權碼 2066,經確認2068至第三次2080後,填選欲提出申請的研發檔 案2082,並载明用途/案號、序號2084,向管理者發出申請函 (E-mail/Fax)2088 ; 當管理者1013收到被管理者1011提出申請“鎖密歷史性研發風 險管理資料2302”之函件(E-mail/Fax)後,管理者1〇13之被授 權者則輸入使用權限密碼2064,再輸入電腦之隨機授權碼2〇66, 201019248 經確認至衫次2_後,到鎖密資料庫伺服器麵内查尋, 以選取被查尋檔案2104,經確認2〇68後,向被管理 ^ ; w称中,當選取被查尋播案^ 及被管 行查閱被管理者1011之資料。 ,、有人私下逼 气被管理者1011收到管理者1013發出之 /恤麵後,被管理者1G11 g卩可絲許函填製、=(E = 2110’並將已完成之准許函寄給管理者相關單位2ii2,管理者 收到被管理者所絲之轉函,經顧姻後進 H理者1〇13輸入使用權限密碼2(364, 觀’ _t___查尋,選取被查尋 下-步驟將歷找研發驗f理雜22G4練 ,並___ = 聚作電子播2210作業,再交給被管理者1Q11 ;—旦 後’則本系統將會自動刪除解密歷史性研發風險管理資料。 請參考第四圖(並參閲第二圖),係顯示本發明 ,財保險費用分攤計算系統麵,該系統產 2模組窗、單一零組件比重計算模組3刚、產品= β財保險費用分攤計算模組36〇〇。 游 請繼續參考第四圖,係顯示本發明之產品上下 費用分雜計算系統1Q3Q,由於在本圖所顯示 元、 件、連結、操作、功能等,均在第一圖、第二 =述過’故在此不再贅述,僅就尚未朗之 圖 操作、功能等做-敘述,該系統尚至少包含:連結、 45 201019248 問卷方式填寫3035,是指由管理者1013事先準備好一題庫 問卷資料,經電腦辨別出不同的投保者麵之業別類型後,它將 會自動產出適合此-類型之投保者丨㈣做_問卷資料填選; 風險因子3039,是實質風險⑻麵問卷内容的棚位名稱, 也是一問卷題目; %值3037 ’疋實質風險(%)3〇33問卷内容的攔位名稱,通常 疋指此題是佔該風險因子問題總題數之百分比多少(卜1〇) ?; ,權重值3038,是實質風險(%)3033問卷内容的糊位名稱, 通常是指此題所佔的風險因子權重比例值為多少(丨_5) ?; 小计3630,是指不同攔位的數值,將其經過加法計算 得的總計值; A,實質風險權重值,是指實質風險(%)3〇33經投保者1〇1〇 實際做完問卷之後所得的小計3630值; B,經營風險權重值,是指經營風險(%)3034經投保者1〇1〇 實際做完問卷之後所得的小計3630值; C,風險值總計,是指△實質風險權重值+B經營風險權重 值之後所得的總計值; D,是指產品零組件總數量; E,總數量比重值%,是指單一零組件所佔總數量之百分比 值; F,所得值總計,是指各項之單一零組件所累計而後所 小計3630值; G,比重總值,是指單一零組件比重之總值; 產品及其零組件是否有專利權3039-1,問卷題目; 前案專利檢索分析數量(例如2〇〇〜^、附〜丨咖屬卜丨聊❾卜别⑽、 2000以上)3039-2,問卷題目; 產品及其零組件的侵權訴訟次數(例如uwmo) 3039-3, 46 201019248 問卷題目; 侵權訴訟時勝訴或者敗訴及其:欠數⑽刪:、4~6、7~1〇 ; 敗訴:卜3、4〜6、7~10) 3039—4,問卷題目; ^際銷售次數(例如卜3、4〜6、㈣)期_5,問卷題目; 際銷售數量 〇!如 2GGG〜5GGG、5GG1 ~ 1GGGG、1GGG 卜 15GGG、15GG 卜20000、 2〇000以上)3039-6,問卷題目; ,品或零組件的專利是否確實存在誦_7,問卷題目; 專利是否專>1授權於他人__8,問卷題目;R & D risk management miscellaneous transfer module _, manager resources touch (four) (10) 2 〇, encryption operation module 2038, lock secret historical research and development risk management data 23 〇 2, library server 1080, the application of the lock application The management module 2060, the decryption and storage module 2200, etc. are entered into the startup module 2004 of the manager's risk management data module 2〇〇2 by the administrator 1011 to generate a new development file or a derivative file of the previous research and development case. After the completion of the R&D risk management data 2010, the R&D record module will be recorded in the spring of 3800, and when the user presses a completion button 2006, the R&D risk management information 2010 required by the manager 1〇13 will be The R&D risk management data transfer module 2008 is transmitted to the manager data receiving module 2〇2〇; at the same time, the manager 1〇11 opens the new R&D file or the derivative file of the previous R&D case, when the completion button is pressed 2〇 〇6, the R&D risk management data that you want to keep is 2〇1〇, transferred to your own lock storage module 2030 for the lock operation program, and then passed to its database server 1040 Savings charge himself. That is, the R&D risk management data 2010 is transmitted to the manager data receiving module 2020 of the manager 1013 via the Internet 2010 by the R&D risk management data transfer module 2〇〇8; the next step is to develop the risk management data. 1〇Enter the lock-and-storage module 43 201019248 $=30=Lock-up new broadcast will generate the lock-down drink, such as *, #,·丨13, time, 'is automatically generated by the software lock serial number, 曰 R & D risk Management resources = 36 is the code, lock secret serial number, date, time + Consultation f historical R & D risk management information 2302, and the data is automatically stored, and the remote library feeding machine 1080 locked storage, no loop program 2011 set ^瞢理 & 'Forbid any W to modify the 2012 action, in order to achieve the purpose of R&D risk monitoring I's at the same time - when there is a litigation event, the manager will apply for the lock to the historic R&D management. Material 2302, after integration with the tube material, can be used to prove that the management has been managed by the manager, and may even be evidence of "unintentional infringement". If it is the manager who wants to become the insured 1010, participate in the intelligence== management system, the risk insurance risk assessment, by the risk management secret 1G12 gallbladder (four) research and development style, the parameter can be achieved, the risk is obtained. There are favorable conditions in the calculation of silk #. The research and development risk control parameter 1014 is calculated according to the interactive R&D risk management system=12 _ case management year f, and the larger the management year (four) parameter, the smaller the risk value. When the manager 1011 wants to apply for the lock history historical R&D risk management data read, 'can enter the account 1011 to apply for the lock history historical R&D risk management data module 2060 to input the use permission password 2064, and then enter the electricity random authorization. Code 2066, after confirming from 2068 to the third time 2080, fill in the research and development file 2082 to be applied for, and indicate the use/case number, serial number 2084, and send an application letter (E-mail/Fax) 2088 to the manager; After the manager 1013 receives the letter (E-mail/Fax) submitted by the manager 1011 to apply for "locking the historical R&D risk management information 2302", the authorized person of the manager 1〇13 inputs the usage authority password 2064, and then Enter the random authorization code of the computer 2〇66, 201019248 After confirming to the shirt number 2_, search to the server of the lock database to select the file 2104 to be searched, and after confirming 2〇68, it is managed ^; In the w, when the selected broadcast case ^ and the managed line are selected, the information of the manager 1011 is checked. , someone privately forced by the manager 1011 after receiving the manager 1013 issued / shirt, was filled by the manager 1G11 g 卩 silk silk, = (E = 2110 ' and sent the completed permission letter to Manager related unit 2ii2, the manager receives the transfer letter from the manager, after entering the marriage, enter the use of the password 2 (364, view ' _t___ search, select the next step - the step will be The system is looking for R&D inspections for 22G4 training, and ___ = gathering for electronic broadcasting 2210 operations, and then handing them over to the manager 1Q11; after that, the system will automatically delete and decrypt historical R&D risk management data. The fourth figure (see also the second figure) shows the invention, the financial insurance cost sharing calculation system, the system produces 2 module windows, the single component specific gravity calculation module 3, the product = β financial insurance fee The calculation module 36〇〇 is distributed. Please continue to refer to the fourth figure, which shows the product cost calculation system 1Q3Q of the present invention. Since the elements, parts, connections, operations, functions, etc. shown in the figure are in the first A picture, a second = a description, so it will not be repeated here, only Long map operation, function, etc. - Narrative, the system still contains at least: link, 45 201019248 Questionnaire method fills in 3035, which means that the manager 1013 prepares a question bank questionnaire in advance, and identifies different insured persons by computer. After the type of the industry, it will automatically produce the insured person suitable for this type. (4) Do the questionnaire data for the questionnaire; the risk factor is 3039, which is the name of the booth of the actual risk (8) questionnaire, and is also a questionnaire title; 3037 '疋Physical risk (%)3〇33 The name of the blocker in the questionnaire, usually refers to the percentage of the total number of questions in the risk factor question (Bu 1〇) ?;, the weight value is 3038, which is the real risk (%) 3033 The name of the paste position of the questionnaire, usually refers to the value of the risk factor weight of the question (丨_5) ?; Subtotal 3630, refers to the value of different blocks, which is added The total value obtained; A, the actual risk weight value refers to the actual risk (%) 3〇33 after the insured person 1〇1〇 actually completed the questionnaire after the subtotal 3630 value; B, the operational risk weight value refers to the operation Risk (%) 3034 by insured 1 〇1〇 Subtotal 3630 value obtained after actually completing the questionnaire; C, total risk value refers to the total value obtained after △ substantial risk weight value + B business risk weight value; D, refers to the total number of product components; The total quantity specific value % refers to the percentage value of the total number of single components; F, the total value obtained refers to the total of the individual components and the subtotal of 3630; G, the total weight, Refers to the total value of the proportion of a single component; whether the product and its components have patent rights 3039-1, the title of the questionnaire; the number of patent searches in the previous case (for example, 2〇〇~^,附~丨咖属卜丨聊❾ Bubie (10), 2000 or above) 3039-2, Questionnaire title; Number of infringement lawsuits for products and their components (eg uwmo) 3039-3, 46 201019248 Questionnaire title; Winning or losing in infringement lawsuit and its number: Owe (10) Delete: 4~6, 7~1〇; Lost: Bu 3, 4~6, 7~10) 3039-4, Questionnaire title; Inter-sales number (eg Bu 3, 4~6, (4)) Period _5, Questionnaire Title; Inter-sales quantity 〇! Such as 2GGG~5GGG, 5GG1 ~ 1GGGG, 1GGG Bu 15GGG, 15GG Bu 20000 2〇000 above) 3039-6, subject questionnaire;, whether chemical or components do exist patents recite _7, subject questionnaire; specifically whether Patent > 1 __8 authorization of others, the subject questionnaire;

❹ 專利是否有抵押或設質3039_9,問卷題目; 投保者的資本額(例如咖〇〇侧〇、麵卜⑽_、2〇〇_以 上)3039-10,問卷題目; 問卷題Γ刺業成長消減(例如三年内的營業消長比率)勝1卜 -定期_遭受的侵與訟級到警告信函的次數(例如 卜3、4〜6、7〜10) 3039-12’問卷題目; -定期間内遭受侵權訴訟時勝訴或者敗訴及其次數(例如 1~3、4〜6、7~1〇) 3039-13,問卷題目; 投保者遭受侵織的鶴麵(_2_㈣_、 $5〇〇〇〇1~1〇〇〇〇〇〇、2〇〇〇〇〇〇 以上)3039-14,問卷題目· 是否有防止產品侵害他人智財權的警戒措施與實施辦 3039-15,問卷題目; 投保者的財務狀況(例如三年内財務分析結果)3〇39_16,問卷題 S, 智財内容或專利權利要求範圍大或窄(依智財檢索或分析結 斷)3039-17,問卷題目; 產品及其零組件的實際銷售期間(例如卜3、4~6、71〇年) 3039-18,問卷題目; 47 201019248 風險值計算公式3060,是為計算風險值的一計算式裝置; 單一零組件比重計算模組3100,是為計算單一零組件比重 的一計算式模組; ' 單一零組件佔總數量(%) 3110,是為計算單一零組件佔總 數量的一百分比計算式; ' 總數量比重值計算公式3120,是為計算總數量比重值的一 百分比計算式裝置; ’ 單一零組件所佔比重值(%) 3130,是為計算單一零.棹 佔比重值的一百分比計算式; ’ 項目名ί重項目名稱3131’是為單一零組件所佔比重值内棚位的 的項目^稱比重值(%) 3132,是為單一零組件所佔比重值内攔位 所得值3133 ’是為單-零組件所佔比重值内攔位 名 比重參考值1 3134-卜是為單-零組件所佔 重項目名稱3131的項目名稱; 值内之比 參 舌描參考值2 3134-2,是為單—零組件所佔比重值内之比 重項目名稱3131的項目名稱; 内之比 =重參考值3腿-3,是為單—零組件雜 重項目名稱3131的項目名稱; 值円之比 會n a ^參考值4 3134-4 ’是為單-零崎所佩重值内之比 重項目名稱3131的項目名稱; 里值内之比 «目^參考值5疆―5,是為單—零組件所佔比重值内之比 重項目名稱3131的項目名稱; 里值之比 _的=°:是為單一零轉所佔比重值内之單-比 重值(%) 48 201019248 一比重值(%) 中3134-20,是為單一零組件所佔比重值内之單 3132的項目名稱; 低3134-30 ’是為單一零組件所佔比重值内之單一比重值(%) 3132的項目名稱; 單一零組件比重總值3200,是為計算單一零組件比 的一計算式模組; 〜 單一零組件比重總值計算公式3220,是為計算單一件 比重總值的一計算式裝置; 、 ❹ 產品上下游智財保險費用分攤計算模組3600,是為計算產 品上下游智財保險費用分攤的一計算式模組; 單一零組件智財保險費用分攤計算361〇,是為計算單一零 組件智財保險費用分攤的一計算式裝置; 保費分攤計算公式3620,是為計算保費分攤的一計算式; 產品智財保險費3622,是投保者1〇1〇所缴保險費之總額; 單一零組件的分攤費用3624,是經單一零組件智財保險費 用分攤計算3610内之保費分攞計算公式3620計算後,所產生出 之單一零組件的分攤費用; 投保者1010進入風險因子管理模組1015,並將答案輸入/儲 存問卷1016 ’該問卷為管理者1〇13預先儲存的問卷題/庫;該風險 因子管理模組1015内之問卷題目,係纟問卷題庫内依投保者1〇1〇 之行業別而自動組合所產生,然後再由投保者1〇1〇輸入答案來呈 現所有可能__子·,再進-步減管輪池丽健 風險值計算1018之方式,從風險因子3039的%值3037及權重值 3038中以求得其A實質風險權重值,如被管理者1〇11亦成為投 保者1〇1〇 ’則可藉由該互動式研發風險管理系統1〇12所發出的研 發風險控管參數1014,達到風險值降低的目的;風險因子3039 包含: 49 201019248 ^3033 .^3034; 刖述實質風險3033係指: ===&_、咖織__檢索 權訴訟時勝訴或訟次數' |品及其零组件侵 數、產品及其零_^其〜數、產品及其零_的實際鎖售次 售期間·,的實際銷售數量、產品及其零組件的實際銷 娜㈣窄(細 或零组养的直4,丨JL 或零組件的專利是否確實存在、該產品 否有抵押錢質雜觀他人、該產品4零組件的專利是 前述經營風險3034係指: 由投保者_營面評估,如投保者的資本額、投保 ^、投保者在—定期間内所遭受的侵權^訟 投保者一定期間内遭受侵權訴訟時勝訴 "=其次數、投保者遭受侵權指控後的理賠金額、投保者 是否有防止產品侵$他人智財權的警紐雌實施辦法。 前述依該風險因子3039的權重值3038計算,以求得其風險 值的實施例請參考第四圖,—風管執行模組1G17用以計算前述風 險因子3039所造成的風險值;一風險因子管理模組1〇15(實質風 險3033、經營風險3034) ’用以管理會造成投保者風險的風險因 子3039 ;風險因子管理模組1〇15包含:實質風險(%)3〇33,及經 營風險(%)3034,該風險因子3039均以問卷方式呈現,其答案由 投保者1010以問卷方式填3035,且該實質風險(%)3〇33、經營風 險(%)3034、(%)百分比值3037及權重值3038均是變數;其中 該研發風險控管參數1014等於零時,表示該投保者並未經過互動 式研發風險管理系統1012的管理;該互動式研發風險管理系 統1012所發出的研發風險控管參數1014,可達到風險值降低的目 50 201019248 的’使得投保者1010在核保及保費計算上有較有利的條件,其中 該研發風險控管參數1014,乃依互動式研發風險管理系統1012 的該案管理年資計算’管理年資愈多則參數愈大,而風險值愈小。 其風險值的計算公式如下: (1) A實質風險權重值+ B經營風險權重值=c風險值總計 (2) 1-R研發風險控管參數1014 = τ研發風險控管總值1060 ※前述(2)如未經過互動式研發風險管理系統1〇丨2管理,其 研發風險控管參數R的參數值為零。 產品零組件比重的計算,係以單一零組件比重計算模組 ❹31〇〇掌管,先算出單一零組件佔總數量(%)百分比31ι〇, 繼以總數量比重值計算公式3120算出E:總數量比重值% ; E總數量比重值%,是指單一零組件所佔總數量之百分比值; F所件值總計,是指各項之單一零組件累計總值; G比重總值,是指單一零組件比重之總值。 總數量比重值計算公式3120如下: D(產品零組件總數量)/1〇〇 = E(總數量比重值%) 單一零組件所佔比重值(%)313〇為比重參考值至 3134-5)的總計,而每一項比重參考值至3134_5)=單一 比重值(%)3132,再依其每項單—比重值的權重高3134_1〇或中 3134-20祕腿-30計算&各項的觸值3133,進祕每項所❹ Whether the patent has a mortgage or quality 3039_9, the title of the questionnaire; the amount of capital of the insured (such as curry side, face (10) _, 2 〇〇 _ above) 3039-10, questionnaire topic; Questionnaire title (for example, the business growth ratio within three years) wins 1 b - regular _ the number of violations and the number of warning letters (for example, Bu 3, 4 to 6, 7 to 10) 3039-12 'questionnaire title; Winning or losing the case in the case of infringement lawsuits and the number of times (for example, 1~3, 4~6, 7~1〇) 3039-13, Questionnaire title; Hebi face insured by the insured (_2_(4)_, $5〇〇〇〇1~ 1〇〇〇〇〇〇, 2〇〇〇〇〇〇 or more) 3039-14, Questionnaire Question · Is there any warning measure and implementation office 3039-15 to prevent products from infringing on the intellectual property rights of others? Questionnaire title; Financial status of the insured (For example, financial analysis results within three years) 3〇39_16, Questionnaire S, Intellectual property content or patent claims range is large or narrow (according to intellectual property search or analysis and conclusion) 3039-17, Questionnaire title; Actual of products and their components During the sales period (for example, Bu 3, 4-6, 71 years) 3039-18, Questionnaire title; 47 201019248 The risk value calculation formula 3060 is a calculation type device for calculating the risk value; the single component specific gravity calculation module 3100 is a calculation module for calculating the specific component weight; 'a single component accounts for the total number The quantity (%) 3110 is a calculation formula for calculating the total number of single components; 'the total quantity specific gravity value calculation formula 3120 is a percentage calculation device for calculating the total quantity specific gravity value; 'a single component The proportion of the proportion (%) 3130 is calculated as a percentage of the value of the single zero. 棹 比重 ; ; ; ; ; ; ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' The item ^ is called the specific gravity value (%) 3132, which is the value obtained by blocking the specific value of the single component. 3133 'is the ratio of the specific value of the single-zero component. The reference value of the block name is 1 3134-b is The item name of the heavy item name 3131 occupied by the single-component; the ratio within the value is 2 3134-2, which is the item name of the specific item name 3131 within the specific value of the single-component; Ratio = heavy reference value 3 legs -3, is a single - The project name of the component miscellaneous item name 3131; the ratio of the value 会 will be na ^ reference value 4 3134-4 'is the project name of the specific project name 3131 within the value of the single-zero saki; the ratio within the ri value « The reference value of 5^5 is the project name of the specific project name 3131 in the specific value of the single-component; the ratio of the value of the _ = °: is the value of the single zero turn Single-specific gravity value (%) 48 201019248 A specific gravity value (%) is 3134-20, which is the project name of the single 3132 within the specific value of the single component; the low 3134-30' is for the single component The project name of the single specific gravity value (%) 3132 in the specific gravity value; the total value of the single component specific gravity 3200 is a calculation module for calculating the ratio of the single component; ~ The calculation formula of the total value of the single component 3220 is a computing device for calculating the total value of a single piece of gravity; ❹ a product upstream and downstream intellectual property insurance cost sharing calculation module 3600, which is a calculation module for calculating the cost of upstream and downstream intellectual property insurance products; The zero component smart insurance cost sharing calculation is 361〇, which is to calculate a single zero. A calculation device for apportioning the component intellectual insurance costs; the premium sharing calculation formula 3620 is a calculation formula for calculating premiums; the product intellectual insurance premium 3622 is the total amount of premiums paid by the insured 1〇1〇; The cost of sharing a component of 3,624 is the cost of the single component generated after the calculation of the premium distribution calculation formula 3620 in the single component intellectual property insurance cost calculation 3610; the insured 1010 enters the risk factor The management module 1015 inputs and stores the answer 1016 '. The questionnaire is a pre-stored questionnaire question/library of the administrator 1〇13; the questionnaire question in the risk factor management module 1015 is based on the insured in the questionnaire question bank. The industry of 1〇1〇 is automatically combined, and then the insured person enters the answer by 1〇1〇 to present all possible __子·, and then enters the step-by-step reduction method to calculate the risk value of 1018. From the % value 3037 of the risk factor 3039 and the weight value 3038 to obtain the A real risk weight value, if the manager 1〇11 also becomes the insured 1〇1〇', the interactive R&D risk management system can be obtained. 1 12 R&D risk control parameters 1014 are issued to achieve the purpose of reducing the risk value; risk factor 3039 includes: 49 201019248 ^3033 .^3034; narration of the real risk 3033 means: ===&_, café __ The number of successful cases or claims in the right of litigation 'products and their component infringement, the product and its zero_^ its number, the product and its zero _ the actual sales period of the sale, the actual sales quantity, the product and its The actual sales of the components (4) is narrow (small or zero group of straight 4, 丨 JL or component patents do exist, the product has a mortgage money and others, the product 4 component patent is the aforementioned operation Risk 3034 means: by the insured _ camp assessment, such as the capital amount of the insured, the insurance ^, the infringement suffered by the insured during the period of the insured, the litigant wins the case in the infringement lawsuit within a certain period of time "= its The number of claims, the amount of claims after the insured has been accused of infringement, and whether the insured has a way to prevent the product from invading the right of others. For the foregoing embodiment of calculating the risk value of the risk factor 3039 to obtain the risk value, please refer to the fourth figure, the air duct execution module 1G17 is used to calculate the risk value caused by the risk factor 3039; a risk factor Management module 1〇15 (substantive risk 3033, business risk 3034) 'to manage the risk factor 3039 which will cause the insured risk; risk factor management module 1〇15 includes: substantial risk (%)3〇33, and management Risk (%) 3034, the risk factor 3039 is presented in a questionnaire, the answer is filled by the insured 1010 by questionnaire 3035, and the real risk (%) 3〇33, operating risk (%) 3034, (%) percentage The value 3037 and the weight value 3038 are variables; wherein the R&D risk control parameter 1014 is equal to zero, indicating that the insured is not managed by the interactive R&D risk management system 1012; the R&D risk management system 1012 issues R&D The risk control parameter 1014, which can achieve the risk value reduction of 50 201019248, makes the insured 1010 have favorable conditions in the calculation of underwriting and premiums, wherein the R&D risk control parameter 101 4. According to the interactive management R&D risk management system 1012, the management of the case is calculated. The more the management year, the larger the parameter, and the smaller the risk value. The calculation formula of the risk value is as follows: (1) A substantial risk weight value + B business risk weight value = c risk value total (2) 1-R R&D risk control parameter 1014 = τ R&D risk control total value 1060 ※ (2) If the management of the R&D risk management system is not managed by the interactive R&D risk management system, the parameter value of the R&D risk control parameter R is zero. The calculation of the proportion of the product components is calculated by the single component weight calculation module ,31〇〇, first calculate the percentage of the total number of components (%) 31ι〇, and then calculate the formula by the total number of specific gravity values 3120: The total quantity weight value %; E total quantity weight value % refers to the percentage value of the total number of single components; the total value of F refers to the total value of the individual components of each item; Is the total value of the weight of a single component. The total number of specific gravity value calculation formula 3120 is as follows: D (total number of product components) / 1 〇〇 = E (total quantity specific gravity value %) The specific component value of the single component (%) 313 〇 is the specific gravity reference value to 3314- 5) Total, and each specific gravity reference value to 3134_5) = single specific gravity value (%) 3132, and then according to the weight of each single-specific gravity value is 3134_1〇 or 3134-20 secret leg -30 calculation & The value of each item is 3133, and each item is secreted.

單一零組件比重值計算公式322〇如下: E總數蚤fch番檑% y F张理枯祕^ .The formula for calculating the specific gravity value of a single component is as follows: E total 蚤fch 檑 檑% y F Zhang ruin ^.

-產品零組件的價格在該產③中所域本比重、 可替代性…產品零組件在該產品中的功能性、一 可替代性、 一產品零組件的 一產品零組件的 51 201019248 風險管理能力。 請繼續參看第四圖,在產品上下游智財保險費用 算模組3600中,進行單一零組件智財保險費用 3610 ’其保費分雜計算公式3620如下: 產品智財保險費3622 X T研發風險控管總值1〇6〇 χ (c 計3036+G比重總值)=單一零組件的分攤費用3624 值骣 ❹ 該單-零組件的智財保險費分攤費用’可為投保者細 要求其上中下游零組件合作廠商’以其產品或智財的風險f 比重分攤產品侵權責任保險的費用,共同合作在產品 好未雨綢繆的準備。 凡本說明書内「鎖密」二字乃指資料鎖住,不可作任何增加、 修改及刪除動作。 曰 本專利說明書内容中所述「智財保險」乃包括專利權執行險、 專利侵權責任險(第二責任險)、商標險、營業秘密、著作權險等。 在詳細說明本發明的較佳實施例之後,熟悉該項技術人士可 清楚的瞭解,在不脫離下述申請專利範圍與精神下可進行各種變 化與改變’亦不受限於說明書之實施例的實施方式。 【圖式簡單說明】 第一圖係顯示本發明之電腦裝置之方塊圖。 第二圖係顯示本發明之智財保險調整型風險評估管理系統 第三圖係顯示本發明之互動式研發風險管理系統 第四圖係顯示本發明之產品上下游智財保險費用分雜計算系統 【主要元件符號說明】 800---智財保險調整型風險評估管理系統架構 802—_客服專員 52 201019248- The price of the product components in the product 3, the proportion, the substitutability... The functionality of the product components in the product, an alternative, a product component of a product component 51 201019248 Risk management ability. Please continue to refer to the fourth figure. In the upstream and downstream intellectual property insurance cost calculation module 3600, the single component intellectual property insurance cost 3610 is used. The premium calculation formula 3620 is as follows: Product intellectual insurance premium 3622 XT R&D risk The total value of the control is 1〇6〇χ (c is the total value of 3036+G gravity)=the cost of the single component is 3,624. The value of the single-component intelligent insurance premium is 'in the case of the insured's fine requirements. Its mid-stream and downstream component partners' share the cost of product tort liability insurance with the risk of their products or intellectual property, and work together to prepare for the product in a proactive manner. The words "locking secret" in this manual refer to the information being locked, and no additions, modifications or deletions can be made. “ “Intellectual property insurance” as described in the contents of this patent specification includes patent enforcement insurance, patent infringement liability insurance (second liability insurance), trademark insurance, business secrets, copyright insurance, etc. Having described the preferred embodiments of the present invention, it will be understood by those skilled in the art that various modifications and changes can be made without departing from the scope and spirit of the invention. Implementation. BRIEF DESCRIPTION OF THE DRAWINGS The first figure shows a block diagram of a computer device of the present invention. The second figure shows the third diagram of the intelligent insurance adjustment risk assessment management system of the present invention. The fourth diagram of the interactive research and development risk management system of the present invention shows the upstream and downstream intellectual property insurance cost calculation system of the present invention. [Main component symbol description] 800---Intelligent Insurance Adjustable Risk Assessment Management System Architecture 802--Customer Service Specialist 52 201019248

804— 再保公司 806— 保險公司 810— 應用程式伺服器 820— 系統伺服器 830— 網頁伺服器 840— 系統主機 850--- 防火/防毒牆 860— 電腦或事務機設備 870— 登入認證裝置 880— 登入管制裝置 1000--- 智財保險調整型風險評估管理系統 1001--- 非會員 1002--- 網際網路 1003--- 申請模組 1004— 會員確認模組 1005--- 新會員 1006--- 會員基本資料 1007--- 繳交會費 1008— 已繳費 1009— 結束 1010--- 投保者 1011--- 被管理者 1012--- 互動式研發風險管理系統 1013--- 管理者 1014--- 研發風險控管參數 1015--- 風險因子管理模組 1016--- 輸入/儲存問卷 53 201019248 1017— 風管執行模組 1018— 風險值計算 1019— --投保者風險評估資料傳送模組 1020— 保險公司核保資暨核保結果輸入儲存系統 1021— 保險公司核保結果通知模組 1023— 補充資料 1024- --核保 1025- --核保結果/保險金額/保費之接收儲存模組 1026— 買保險 Ο 1027---簽訂保險契約書 1028- 保險單管理模組 1029- --分攤計算產品上下游保險費用 1030- --產品上下游智財保險費用分攤計算系統 1031- --被管理 1032- --外部系統 1033- --會員 1034- 會員資訊區 1040---資料伺服器 ® 1060---研發風險控管總值 1080---鎖密資料庫伺服器 2002---被管理者研發風險管理資料模組 2004—啟動模組 2006—完成鍵 2008---研發風險管理資料傳遞模組 2010- --研發風險管理資料 2011- 迴路程式 2012- --增/刪/修改 54 201019248 2014---查詢 2016—儲存 2018---讀取 2020---管理者資料接收模組 2030—鎖密保管模組 2032—鎖密代碼 2034---鎖密序號、日期、時間 2036---鎖密代碼、鎖密序號、日期、時間+研發風險管 理資料804 - Reinsurance Company 806 - Insurance Company 810 - Application Server 820 - System Server 830 - Web Server 840 - System Host 850 - Fire/Resist Wall 860 - Computer or Transaction Equipment 870 - Login Authentication Device 880 — Login Control Device 1000--- Smart Insurance Adjusted Risk Assessment Management System 1001--- Non-Member 1002--- Internet 1003--- Application Module 1004 - Member Confirmation Module 1005--- New Member 1006 --- Member basic information 1007--- Payment of membership fee 1008 - Payment of 1009 - End of 1010--- Insured 1011--- Manager 1012--- Interactive R&D risk management system 1013--- Manager 1014 --- R&D risk control parameters 1015--- Risk factor management module 1016--- Input/storage questionnaire 53 201019248 1017 - Duct execution module 1018 - Risk value calculation 1019 - Insured risk assessment data transfer module Group 1020 - Insurance company nuclear insurance and underwriting results input storage system 1021 - Insurance company underwriting results notification module 1023 - Supplementary information 1024 - - Underwriting 1025 - - Underwriting results / insurance amount / premium Receiving storage module 1026 - Buying insurance Ο 1027---Signing insurance contract 1028 - Insurance policy management module 1029- -- Amortization calculation product upstream and downstream insurance costs 1030 - -- Product upstream and downstream intellectual property insurance cost sharing calculation system 1031- --Managed 1032- --External System 1033- --Member 1034- Member Information Area 1040---Data Server® 1060---R&D Risk Control Total 1080---Locked Database Server 2002---Management Risk Management Data Module 2004-Startup Module 2006-Complete Key 2008---R&D Risk Management Data Transfer Module 2010--R&D Risk Management Information 2011- Loop Program 2012-- / Delete / Modify 54 201019248 2014---Enquiry 2016-Storage 2018---Read 2020---Manager Data Receiving Module 2030-Locking Security Module 2032-Locking Code 2034---Locking Serial Number, Date, time 2036---lock code, lock number, date, time + R&D risk management information

2038—加密作業模組 2040---鎖密歷史性研發風險管理資料傳遞模組 2060---被管理者提出申請鎖密歷史性研發風險管理資料 模組 2064---輸入使用權限密碼 2066—輸入隨機授權碼 2068—確認 2080---第三次 2082---填選欲提出申請的研發檔案 2088---向管理者發出申請函 2090---載明用途/案號、序號 2100---管理者確認及發送正式申請函 2102---管理者收到被管理者提出申請“鎖密歷史性研發 風險管理資料”之函件 2104---選取被查尋檔案 2106---向被管理發出准許申請函 2108---被管理者收到管理者發出之准許申請函 2110---將准許函填製、列印、簽章 55 201019248 2112---將已完成之准許函寄給管理者相關單位 2114---管理者收到被管理者所寄來之准許函,經確認無 誤後進行解密資料作業 2200---解密保管模組 2202---執行解密作業 2204---鎖密歷史性研發風險管理資料解除 2206---儲存解密歷史性研發風險管理資料 2208---資料列印 2210---製作電子檔 _ 2220---刪除解密歷史性研發風險管理資料 2302---鎖密歷史性研發風險管理資料 3033- --實質風險(%) 3034- --經營風險(%) 3035- 問卷方式填寫 3037— -- %值 3038— 權重值 A---實質風險權重值 B---經營風險權重值 ® C —風險值總計 D—產品零組件總數量 E—總數量比重值% F—所得值總計 G—比重總值 3039— 風險因子 3039-1---產品及其零組件是否有專利權 3039-2---前案專利檢索分析數量(例如200〜500、50卜1000、 00M500、1501 〜2000、2000 以上) 56 201019248 3 -產品及其零組件的侵權訴訟次數(例如卜3、467 1〇) 3〇39~4—侵權訴訟時勝訴或者敗訴及其次數(例如勝訴小3、 4〜6、7〜10 ;敗訴:1 〜3、4~6、7〜10) 3039一5一實際銷售次數(例如1〜3、4〜6、7~10) 39 6 實際銷售數量(例如 2〇〇〇〜5〇〇〇、5〇〇卜10000、10001~15000、 15001~20000、20000 以上) 3039-7-—產品或零組件的專利是否確實存在 3039-8-—專利是否專屬授權於他人 3039-9-—專利是否有抵押或設質 3039 10 —投保者的資本額(例如$2_〇~5〇_、 $500〇〇1~1〇〇〇〇〇〇、2000000 以上) Ξ一U…投保者的營業成長消減(例如三年内的營業消長比率) -12 定期間内遭受的侵權訴訟或收到警告信函的 次數(例如1〜3、4〜6、7~10) 3039-13 定期間内遭受侵權訴訟時勝訴或者敗訴及其 次數(例如卜3、4~6、7~1(〇 3039-14—投保者遭受侵權指控後的理賠金額(例如 $200000^500000 > $500001-1000000,2〇〇〇〇〇〇 ίλ±) 3039-15—是付防止產品料他人智_的警戒措施與 實施辦法 3039-16—投保者的財務狀況(例如三年内財務分析結果) 3039-17-—智財内容或專利權利要求範圍大或窄(依智財檢索 或分析結果判斷) 3039-18--產品及其零組件的實際鎖售期間(.卜3、料、 7〜10年) 3060—風險值計算公式 3100 —單一零組件比重計算模組 57 201019248 3110---單一零組件佔總數量(%) 3120—總數量比重值計算公式 3130- --單一零組件所佔比重值(%) 3131- 比重項目名稱 3132- --單一比重值(%) 3133- 所得值 3134- 1---比重參考值1 3134-2—比重參考值2 3134-3 —比重參考值3 Φ 3134-4---比重參考值4 3134-5 —比重參考值5 3134-10—高 3134-20---中 3134-30—低 3200---單一零組件比重總值 3220---單一零組件比重總值計算公式 3600---產品上下游智財保險費用分攤計算模組 3610---單一零組件智財保險費用分攤計算 ® 3620---保費分攤計算公式 3622---產品智財保險費 3624---單一零組件的分攤費用 3630—小計 3650---查詢鎖密資料通知函 3800—研發記錄模組 582038—Encryption Operation Module 2040---Locked Historic R&D Risk Management Data Transfer Module 2060---Approved by the Manager to apply for a secret historical R&D risk management data module 2064---Enter the usage permission password 2066- Enter the random authorization code 2068—confirm 2080---the third time 2082---fill out the R&D file to apply for 2088---issue the application letter to the manager 2090---use the purpose/case number, serial number 2100- -- The manager confirms and sends the formal application letter 2102---The manager receives the letter 21-4 from the manager's application for "locking the secret historical R&D risk management information"---Select the searched file 2106---to be managed Issuing permission application letter 2108---Received by the manager to obtain the permission application letter issued by the manager 2110---filling, printing and signing the permission letter 55 201019248 2112---Send the completed permission letter to management The relevant unit 2114---the manager receives the permission letter sent by the manager, and after performing the confirmation, the decryption data operation 2200---decryption storage module 2202---executing the decryption operation 2204---locking Historical R&D risk management data release 2206---Storage and decryption history Risk Management Information 2208---Data Print 2210---Production Electronic File _ 2220---Delete Decrypted Historical R&D Risk Management Data 2302---Locked Historic R&D Risk Management Information 3033--Substantial Risk ( %) 3034- -- Business risk (%) 3035 - Questionnaire method fill in 3037 - % value 3038 - Weight value A - - Essential risk weight value B - Business risk weight value ® C - Risk value total D - Total number of product components E - total quantity specific gravity value % F - total value obtained G - specific gravity value 3039 - risk factor 3039-1---whether the product and its components have patent rights 3039-2---pre-patent patent Number of search and analysis (for example, 200~500, 50b, 1000, 00M500, 1501~2000, 2000 or above) 56 201019248 3 - Number of infringement lawsuits for products and their components (eg Bu 3, 467 1〇) 3〇39~4— Winning or losing the infringement lawsuit and its number of times (for example, winning 3, 4~6, 7~10; losing: 1~3, 4~6, 7~10) 3039-5th actual sales times (for example, 1~3, 4~6, 7~10) 39 6 Actual sales quantity (for example, 2〇〇〇~5〇〇〇, 5〇〇卜10000, 10001~15000, 15001~20000 , 20000 or more) 3039-7--The patent for products or components does exist 3039-8--Is the patent exclusive to others 3039-9--whether the patent is mortgaged or the quality is 3039 10 - the capital of the insured ( For example, $2_〇~5〇_, $500〇〇1~1〇〇〇〇〇〇, 2000000 or more) Ξ一U... The business growth of the insured is reduced (for example, the business growth ratio within three years) -12 Number of times of infringement lawsuit or receipt of a warning letter (eg 1~3, 4~6, 7~10) 3039-13 Winning or losing the case and the number of times infringement proceedings during the specified period (eg Bu 3, 4~6, 7 ~1(〇3039-14—The amount of claims after the insured has been accused of infringement (eg $200000^500000 > $500001-1000000, 2〇〇〇〇〇〇ίλ±) 3039-15—is to prevent the product from being materially _ Vigilance measures and implementation measures 3039-16—Financial status of the insured (for example, financial analysis results within three years) 3039-17--The scope of intellectual property or patent claims is large or narrow (based on the results of intellectual property search or analysis) 3039- 18--The actual lock period of the product and its components (. Bu 3, material, 7 ~ 10 years) 3060—risk value calculation formula 3100—single component weight calculation module 57 201019248 3110---single component accounted for the total quantity (%) 3120—total quantity specific gravity value calculation formula 3130- -- single zero Component specific gravity value (%) 3131- Specific gravity project name 3132 -- Single specific gravity value (%) 3133 - Value obtained 3134 - 1--- Specific gravity reference value 1 3134-2 - Specific gravity reference value 2 3134-3 - Specific gravity Reference value 3 Φ 3134-4---specific gravity reference value 4 3134-5 - specific gravity reference value 5 3134-10 - high 3134-20--- medium 3134-30 - low 3200 - total single component gravity 3220---The calculation formula of the total value of the single component gravity ratio 3600---Product upstream and downstream intellectual property insurance cost sharing calculation module 3610---single component intelligent insurance insurance cost sharing calculation 3620---the premium allocation calculation Formula 3622---product intellectual insurance premium 3362---share cost of single component 3630-subtotal 3650---inquiry lock data notification letter 3800-research and development record module 58

Claims (1)

201019248 十、申請專利範園: 1· 一種智財保險調整型風險評估管理系統,包含: -風險因子管理模組’用以管理會造成使用者風_風險因子; -風管執行敝’ 計算前述驗目子所造賴風險值; 二互,式研發風險管理系統’係在被管理者的產品研發過程中, ίϊί針對被管理者的研發記錄過程建立鎖密歷史性研發風險管 理貝茫f" ° 第1項所述之智財保險調整型風險評估管 ❹ 子’、由L使用者現所有可能的風險因 依該風域料行模組 物触触贱險評估管 用此系統。^賴組,係敎提供线使用者申請使 =申第1項所述之智財保險調整型風險評估管 匕其中該互動式研發風險管理系統包含: 官 μ 一或複數個電腦或事務機設備; :理者一或複數個電腦或事務機設備; 備或無線寬频,細以連接前述管 管'用•及错存研發風險 料中雙方賴定的龍遞ϊ組’翁被管理者的研發風險管理資 一管理者資料接收模1用在:過程中傳遞給管理者; 一鎖密保管模組,將兮;6^接收被管理者的研發風險管理資料; 別儲存於被管理者所發風險管理資料經過鎖密作業程序,分 鎖密資料庫伺服器中的資料伺服器中,以及儲存於管理者的 馬鎖密歷史性研發風險管理資料,由於沒 59 201019248 ^迴路程式設計,騎介面無編輯的魏,故不可作任 修改及刪除動作。 了曰加 ^申請專利範圍f 4項所述之智財保險調整型風險評估 讯j統,其中該鎖密保管模組沒有增加、修改或刪除的迴路程式 ^申請專利範圍帛4項所述之智財保險調整型風險坪姑替 統管理者雜 e ❹ 範中4項所述之智財保險調整型風險評 理包ί 管理資料或鎖密歷史性研發風險管 鎖密代碼、鎖密序號、產品編號、資料輸入曰期或時 =索日期、先前專利檢索數量、先前專利有效性分析 侵權分析日期、產品不侵權分析結果、產品迴避設計:σ 公開展示日期、產品銷售日期、產品銷售數量,或是相 ^片、影音、簡報、實驗、測試、模擬等資料,或其它足以明 在研發過程中不可能被塗改之資料記錄。 月 之智財保險調整觀險評估管 理系統,其中該鎖密作業程序包含:鎖密代碼、鎖密 耳 時間均是藉由軟體自動產生。 聚;日期、 i所述岔智財保險調整型風險評估管 理系統,其中該被管理者研發風險管理資料模組進一步勺耳 -啟動模組,用以產生新研發檔案,或之前研發案:新 經由研發記錄模組記錄,且在使用者操作完成鍵時, 發風險管理資料於被管理者所指定的資料伺服器中,研 路程式設計,顯示介面無編輯的功能,故不可作任何掸w迴 及刪除動作;同時自動將管理者所需的研發風險管理二 一研發風險管理資料傳遞模組,即時傳送至管理者丄 接收,並餘存於管理者的鎖密資料庫飼服器成為鎖 60 201019248 ϊ險也由於沒有迴路程式設計’顯示介面無編輯的功 月b故不可作任何增加、修改及刪除動作。 請專利範圍第1或4項所述之智財保險調整型風險評 估督理系統,其中該互動式研發風險管理系統進-步包含: =發風險控管纽,該參數顯*娜者是否崎互動式研發風 統的控管,以及該控管結果,作為前述第1項風管執行 模組计算風險值的參考值。201019248 X. Application for Patent Park: 1. A smart insurance-adjusted risk assessment management system, including: - risk factor management module 'used to manage the user's wind _ risk factor; - duct execution 敝' calculation The value of the risk of the inspection of the subject; the two-in-one R&D risk management system is in the process of product development by the manager, ϊ 建立 建立 建立 针对 针对 针对 针对 针对 针对 针对 针对 针对 针对 针对 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史° The intelligent risk-adjusted risk assessment of the first item mentioned in the first item, and all possible risks by the L user are used in this system according to the touch panel risk assessment of the wind farm. ^ Lai group, the system provides the line user to apply for the intelligent risk assessment risk management system described in item 1. The interactive R&D risk management system includes: an official μ or a plurality of computer or transaction equipment ; : One or a plurality of computer or computer equipment; or wireless broadband, fine to connect the above-mentioned pipe tube 'use and misunderstanding R & D risk material in the two sides of the dragon-dragon group' R&D risk management fund 1 manager data receiving module 1 is used in: the process is passed to the manager; a lock-and-storage module is used; 6^ receives the manager's R&D risk management data; The risk management data is stored in the data server in the confidential database server and the historical research and development risk management data stored in the manager's horse lock. Because there is no 59 201019248 ^ circuit programming, the riding interface is not available. Edited Wei, it is not allowed to modify and delete actions. The application of the patent protection scope f 4 of the intellectual property insurance adjustment type risk assessment information, wherein the lock storage module has no loop program added, modified or deleted Intellectual Property Insurance Adjusted Risk Pinggu Rutong Manager Miscellaneous e ❹ Fan Zhong 4 of the intellectual property insurance adjusted risk assessment package ί Management data or lock secret research and development risk management lock code, lock secret serial number, product Number, data input period or time = date, previous patent search quantity, prior patent validity analysis infringement analysis date, product non-infringement analysis result, product avoidance design: σ public display date, product sales date, product sales quantity, or It is a piece of film, video, presentation, experiment, test, simulation, etc., or other data records that are sufficient to be impossible to be altered during the development process. The monthly intellectual property insurance adjustment risk assessment management system, wherein the lock operation program includes: the lock code and the lock ear time are automatically generated by the software. The date, i said the intellectual property insurance adjusted risk assessment management system, wherein the manager develops a risk management data module to further develop a new research and development file, or a previous research and development case: new Recorded by the R&D record module, and when the user completes the operation key, the risk management data is sent to the data server designated by the manager, and the interface design is performed, and the display interface has no editing function, so no 掸w can be made. Back and delete actions; at the same time, automatically manage the R&D risk management required by the manager. The R&D risk management data transfer module is immediately transmitted to the administrator, and the remaining information is stored in the manager's lock database. 60 201019248 The danger is also due to the lack of loop programming, the display interface has no editing power, so no additions, modifications and deletions can be made. Please refer to the intellectual property insurance adjusted risk assessment supervision system described in item 1 or 4 of the patent scope, wherein the interactive R&D risk management system further includes: = risk control control, which indicates whether the Na Na is The control of the interactive R&D system and the result of the control are used as reference values for calculating the risk value of the first air duct executive module. =·如申請專利範圍第10項所述之智財保險調整型風險評估 管理系統’其中該研發風險控管參數乃依管理纽的該案管理年 資計算’管理年資愈多則參數愈大,而風險值愈小。 申請專利範圍S 1或4項所述之智財保險調整型風險評 估管理系統,其中該互動式研發風險管理系統進—步包含·· 一被管理者提出申請鎖密歷史性研發風險管理資料模組,以及 解密保管模組;該被管理者提出申請鎖密歷史性研發風險管理資 料模組用以供被管理者提出該鎖密歷史性研發風險管理資料的申 請,該解密保管模組則用於執行解密作業。 13.如申請專利範圍第1項所述之智財保險調整型風險評估 理系統’其中該風險因子包含: 實質風險、經營風險; 前述實質風險係指: 產品及其零組件是否有專利權、產品及其零組件的前案專利檢索 刀析數量、產品及其零組件的侵權訴訟次數、產品及其零組件侵 權訴訟時勝訴或者敗訴及其次數、產品及其零組件的實際銷售次 數、產品及其零組件的實際銷售數量、產品及其零組件的實際銷 售期間; ' 所擁有智財的數量、智財内容或專利權利要求範圍大或窄(依智財 檢索或分析結果)、該產品或零組件的專利是否讀實存在、該產品 61 201019248 狀齡就、鮮品或雜㈣專利是 前述經營風險係指: ° ,評估管理系統,其風險 智財保險調整型 ii風由險ί ϊ值+經營風險權重值=風險值總計 風險評4=,=^ 1-研發風險控管參數=研發風險& ===树猶峨㈣,⑽驗管參 =申請其專中^^^ 的調整增刪資料,如有新增資料所提供 步風險管理,未調整的資料過風管斯模組的進一 Ϊ·系如統申㈡包範含圍第1項所述之智財保險調整型風險評估管 係:將風險評估資料傳送給保 ΐ系1 整型風險評姑管 輸入核保結果。 貝竹Μ及 62 201019248 請專利範園第18項所述之智財保險調整型風險評估 2管0理im:第1項所述之智財保險調整型風險評估 險金額/料之接_存漁,係接㈣存來自保 險公司的核保結果/保險金額/保費。 ^如統申第1項所述之智財保險調整型風險評估管 β 2=1 險組’係用以管理購買保險單的投保者資料。 理系統第1項所述之智財保險調整型風險評估管 財保險f用分攤計算纽,用於計算產品零組件在 保險費用上的分攤比例或分雜費用。 m請ίϋ範圍第22項所述之智財保險調整型風險評估 產品上下游智財保險費用分攤計算系統包含: 管理模組,㈣管理會造成娜者風_風險因子; 一盟一 #行模紐’用以計算前述風險因子所造成的風險值; ❹篡二口n件比重計算模組’係根據比重計算參考值,來計 算二產^零組件在該產品所佔的比重; 財保險f用分攤計#馳,係以前述風險 24如申礎’計算出產品零組件的分攤比例或分雜保費。 管理糸铋8 i :彡圍第23項所述之智財保險調整型風險評估 管理系統,其比重值的計算公式如下: _值總計=G比重總值 管,統,其保費::二智財保險調整型風險評估 產时智財保險費χ研發風險控管總值χ(風險值總計+比重總值) 63 201019248 =單一零組件的分攤費用 26. 如申請專利範圍第23項所述之智財保險調整型風險評估 管理系統,其中該產品零組件比重計算模組計算時的參考值至少 包括: 一產品零組件的價格在該產品中所佔成本比重、一產品零組件的 可替代性、一產品零組件在該產品中的功能性、一產品零組件的 風險管理能力。 27. —種智財保險調整型風險評估管理方法,包含以下步称: 根據管理者預先儲存的問卷及其輸入問卷的答案呈現投保者可能 參的風險因子; 根據該風險因子的權重值計算以求得該投保者的風險值; 連結一可藉由管理降低投保者風險值的方法,該方法如下: 投保者將其研發風險管理資料傳送給管理者; 管理者令該研發風險管理資料經過鎖密作業程序,成為鎖密歷史 性研發風險管理資料,且禁止任何增加、修改及刪除動作; 產生一研發風險控管參數,以降低投保者的風險值。 28. 如申請專利範圍第27項所述之智財保險調整型風險評估 管理方法,進一步包含以下步驟: φ根據投保者在前項方法中被管理的年資,計算出研發風險控管參 數; 令該年資愈多,所得參數愈大,所得風險值愈小。 29. 如申請專利範圍第27項所述之智財保險調整型風險評估 管理方法,進一步包含以下步驟: 令投保者風險評估資料傳入保險公司進行核保及保險金額/保費 評估計算。 30. 如申請專利範圍第27項及29項所述之智財保險調整型風 險評估管理方法,進一步包含以下步驟: 根據該核保結果及核定的保險金額/保費,進行產品上下游智財 64 201019248 保險費用分攤計算; =品零組件的踰值及比重為計算基礎,計算出產品零組件的 分攤比例或分攤保費。 31. —種互動式研發風險管理系统包含: 管理者一或複數個電腦或事務機設備; 被管理者-或概㈣職事顧設備; 或絲寬頻,翻以連接前述管 理者及被管理者的主機; e ❹ 典者研發風險管理資料模組,係用以管理及儲存研發風險 B資料於被管理者所指定的資料伺服器中; 風險管理將觸H係將被管理者的研發風險管理資 二雙方所約定的資料,在研發過程中傳遞給管理者; -ί ^ΐ料接收模組’用以接收被管理者的研發風險管理資料; 璧=模組,將該研發風險管理資料經過鎖密作業程序,分 禮农ίϊΐ管理者所缺的資料舰器巾,以及齡於管理者的 古、ϊί料庫舰器中成為鎖密歷史性研發風險管理資料,由於沒 程式設計,顯示介面無編輯的功能,故不可作任何增加、 修改及刪除動作。 請專利範圍第31項所述之互動式研發風險管理系 3’ίί該鎖密保管模、組沒有增加、修改或刪除的迴路程式設計。 絲*,甘t請專利範圍第31項所述之互動式研發風險管理系 ,其中該被管理者和管理者所儲存該研發風險管理資料的 馮一致,乃為一即時系統。 請專㈣圍第31項所述之互動式研發風險管理系 ϊ包$該研發驗管理龍或鎖密社性研發風險管理資料至 期鎖產品編號、雜輸人日期或時間、先前專 、期先前專利檢索數量、先前專利有效性分析、產品不 65 201019248 t織果、產品迴避設計記錄、產品 日期:產品銷售數量,或是相關之圓片、 在研發過^賴·等师或其它足以證明 3统5.,如其申圍l項所述之互動式研發風險管理系 包含:鎖叫鎖密序號、曰期、時 產i新研碰*,或之前研發*的衍生性新案 管,料於被管理者所指定的資料伺服器_,由於沒; 程式設計,顯示介面無編輯的功能,故不可任^ 3=理組者==:;= 月b故不可作任何增加、修改及刪除動作。 _ 37.如申請專圍第31項所述之互動式研發風險管 統,其中該互動式研發風險管理系統進一步包含: 、 二發風險㈣纽,齡錢#娜妓倾過互動式研發風 2理祕的姆,錢該控管結果,料前 模、组計算驗值的參考值。 賴官衡 i 專利範圍第37項所述之互動式研發風險管理系 =,其中該研發驗控管參數乃依管理系統的該案管理 算,管理年資愈多則參數愈大,而風險值愈小。 專f範圍第31項所述之互動式研發風險管理系 既,其中該互動式研發風險管理系統進一步包含: 66 201019248 一被管理者提出申請鎖密歷史性研發風險管理資料模組,以及 解密保管模組,該被管理者提出申請鎖密歷史性研發風險管理資 料模組用以供被管理者提出該鎖密歷史性研發風險管理資料的申 請,該解密保管模組則用於執行解密作業。 40·如申請專利範圍第39項所述之互動式研發風險管理系 統,其中該解密保管模組包含: 刪除解密歷史性研發風險管理資料,即在完成解密作業並交付解 密資料之後,自動刪除該解密資料。 41· 一種互動式研發風險管理方法,包含以下步驟: 〇被管理者開啟新研發檔案或之前研發案的衍生性播,當操作“完 成鍵”即將管理者及被管理者雙方所約定的研發風險管理資料傳 至管理者; 令該研發風險管理資料進入管理者資料庫時,自動開啟鎖密新檔 並產生鎖密代碼,並自動產生鎖密序號、日期、時間; 令該資料自動儲存至鎖密資料庫伺服器中鎖密儲存,禁止任何增 加、修改及刪除動作。 42·如申請專利範圍第41項所述之互動式研發風險管理方法, 進一步包含以下步碌: 藝《被管理者開啟新研發檔案或之前研發案的衍生性檔,當操作 完成鍵即將研發風險管理資料經過鎖密保管模組進行鎖密作 業程序之後即進入被管理者所指定的資料庫伺服器中儲存,且禁 止任何增加、修改及删除動作。 43·如申請專利範圍第41項所述之互動式研發風險管理方法, 進一步包含以下步驟:產生一研發風險控管參數。 44.如申請專利範圍第41項所述之互動式研發風險管理方法, 進一步包含以下步驟: 被管理者輸入密碣,向管理者申請鎖密歷史性研發風險管理資料。 67 201019248 45·如申請專利範圍第41項所述之互動式研發風險管理方 法’進一步包含以下步驟: 管理者進行解密資料作業,並在完成資料交付給被管理者之後, 即自動刪除解密資料。 46. —種產品上下游智財保險費用分攤計算系統,包含: 一風險因子管理模組,用以管理會造成投保者風險的風險因子; 一風管執行模組,用以計算前述風險因子所造成的風險值; 一單一零組件比重計算模組,係根據比重計算參考值,來計 算該產品零組件在該產品所佔的比重; ❹一產品上下游智財保險費用分攤計算模組,係以前述風險 值及比重為計算基礎,計算出產品零組件的分攤比峨分雜保費。 47. 如申請專利範圍第項所述之產品上下游智財保險費用 分攤計算祕’其巾風賴?管理模組係叫卷呈麟有可能的 風險因子,而由投保者輸入答案並儲存,再進一步由風管執行模 組依該風險因子的權重值計算,以求得其風險值。 48. 如申請專利範圍第46項所述之產品上下游智財保險費用 分攤計算系統,其中該風險因子包含: 實質風險、經營風險; ❹前述實質風險係指: 產品及其零組件是否有專利權、產品及其零組件的前案專利檢索 分析數量、產品及其零組件的侵權訴訟次數、產品及其零組件侵 權訴訟時勝訴或者敗訴及其次數、產品及其零組件的實際鎖售次 數、產及其零組件的實際銷售數量、產品及其零組件的 售期間; ” 所擁有智財的數量、智財内容或專利權利要求範圍大或窄(依智財 檢索或分析結果)、該產品或零組件的專利是否確實存在、該產品 或零組件的專利是否專屬授權於他人、該產品或零組件的專利是 68 201019248 否有抵押或設質; 前述經營風險係指: 由投保者的經營面評估,如投保者 投保者的營業額肖長、投保去力一 額投保者的財務狀況、 收到警告信函的次=二=内·所遭受的侵權訴訟或 老㈣;5 ,投保者期間内遭受侵權訴訟時勝訴或 否有防止產;金,对受侵權指控後的理賠金額、投保者是 m 智財權的警戒措施與實施辦法。 分攤nn圍第46項所述之產品上下游智財保險費用 產品零組件比重計算模組計算時的參考值 -產品零組件的價格在該產品中所佔成本比重、 風險控管參數,該參數顯示聽者是碰管以及該 ^管,作為前述第—項風管執行模組計算風險值#參考值。 她專利^圍帛5〇項所述之產品上下游智財鎌費用 〜研發風險控管參數乃依管理系統的該案管 理年資什算,管理年資愈多則參數愈大,而風險值 mm第46項所述之產品上下游智財微費用 刀攤计算系統,其風險值的計算公式如下: 實質風險權重值+經營風險權重值=風險值總計 53.如申請專利範圍第46項所述之產品下5 分攤計算纽,其風險_計算公式進-步如》7智財保險費用 研發風險控管參數=研發風險控管總值 f述如未經過互動式研發風險管理系統管理,其研發風險控管參 數的參數值為零。 69 201019248 54. 如申請專利範圍第46項所述之產品上下游智財保險費用 分攤計算系統,其比重值的計算公式如下: E總數量比重值% X F所得值總計=G比重總值 55. 如申請專利範圍第46項所述之產品上下游智財保險費用 分攤計算系統,其保費分攤計算公式如下: 產品智財保險費X研發風險控管總值X (風險值總計+比重總值) =單一零組件的分攤費用=· As for the intellectual property insurance adjusted risk assessment management system described in item 10 of the patent application scope, the R&D risk control management parameter is calculated according to the management year of the management of the case. The more the management year, the larger the parameter, and the risk The smaller the value. Applying for the intellectual property insurance-adjusted risk assessment management system described in S1 or 4 of the patent scope, wherein the interactive R&D risk management system further includes a historical management R&D risk management document model a group, and a decryption and storage module; the manager proposes to apply for a lock-up historical R&D risk management data module for the administrator to submit the application for the secret research and development risk management data, and the decryption and storage module is used Perform a decryption job. 13. The intellectual property insurance adjusted risk assessment system described in item 1 of the scope of patent application, wherein the risk factor includes: substantial risk, business risk; the aforementioned substantial risk means: whether the product and its components have patent rights, The number of patent infringement lawsuits for products and their components, the number of infringement lawsuits for products and their components, the success or failure of the product and its component infringement litigation, the number of times, the actual number of sales of products and their components, products The actual sales quantity of its components, the actual sales period of the product and its components; 'The amount of intellectual property owned, intellectual property or patent claims is large or narrow (based on intellectual property search or analysis results), the product or Whether the patent for the component is read or not, the product 61 201019248 is the age of the product, the fresh product or the miscellaneous (four) patent is the aforementioned business risk means: °, the evaluation management system, its risk intellectual property insurance adjustment type ii wind risk ί ϊ +Operation risk weight value=Risk value Total risk assessment 4=,=^ 1-R&D risk control parameters=R&D risk&===Tree still (4), (10) ==Apply for the adjustment and deletion of the information in the special ^^^, if there is new information provided by the step risk management, the unadjusted data over the wind pipe module is a glimpse of the system, such as Tong Shen (2) Bao Fanweiwei 1 The intelligent risk-adjusted risk assessment management system described in the item: The risk assessment data is transmitted to the insurance system. Beizhuyu and 62 201019248 Please adjust the intellectual property insurance adjustment risk assessment mentioned in the 18th item of the patent Fanyuan 2 management 0: The intellectual property insurance adjustment risk assessment risk mentioned in the first item/materials Fishing, connection (4) Deposit insurance results / insurance amount / premium from the insurance company. ^ The intellectual property insurance adjusted risk assessment tube described in item 1 of the unified application is used to manage the information of the insured who purchased the insurance policy. The intellectual property insurance adjusted risk assessment management insurance described in item 1 of the system is used to calculate the proportion of the product components in the insurance expenses or the miscellaneous expenses. m Please refer to the intellectual property insurance adjusted risk assessment product mentioned in item 22 of the scope. The upstream and downstream intellectual property insurance cost sharing calculation system includes: management module, (4) management will cause the genre wind _ risk factor; New' is used to calculate the risk value caused by the aforementioned risk factors; the second-part n-ratio calculation module 'calculates the reference value of the specific gravity to calculate the proportion of the second-generation component in the product; With the apportionment meter #, the risk ratio of the product components or the miscellaneous premiums is calculated based on the aforementioned risk 24 such as the basis. Management 糸铋8 i : The intelligent risk-adjusted risk assessment management system described in item 23 of the stipulations, the calculation formula of the specific gravity value is as follows: _value total = G proportion of total value, system, its premium:: two wisdom Financial insurance adjusted risk assessment, time-of-day intellectual property insurance premium, R&D risk control total value χ (total value of risk + total weight) 63 201019248 = cost of sharing a single component 26. As described in item 23 of the patent application The intellectual property insurance adjusted risk assessment management system, wherein the reference value of the product component calculation module at least includes: the cost of a product component in the product, and the replacement of a product component Sex, the functionality of a product component in the product, and the risk management capabilities of a product component. 27. A method for managing risk-adjusted risk assessment, comprising the following steps: presenting a risk factor that the insured may participate according to the questionnaire pre-stored by the manager and the answer to the input questionnaire; calculating according to the weight value of the risk factor The risk value of the insured is obtained; the method of reducing the risk value of the insured by management is as follows: the insured passes the R&D risk management data to the manager; the manager causes the R&D risk management data to be locked The secret operating procedures become the secret research and development risk management materials, and any addition, modification and deletion actions are prohibited. A R&D risk control parameter is generated to reduce the risk value of the insured. 28. The method for managing risk-adjusted risk assessment according to claim 27 of the patent application scope further includes the following steps: φ calculating a risk control parameter for research and development according to the seniority managed by the insured in the preceding method; The more the annual income, the larger the obtained parameters, and the smaller the risk value obtained. 29. The intellectual property insurance adjusted risk assessment management method described in claim 27 of the patent application further includes the following steps: The insured risk assessment information is transmitted to the insurance company for underwriting and insurance amount/premium evaluation calculation. 30. The method for managing risk-adjusted risk assessment according to claims 27 and 29 of the patent application further includes the following steps: According to the underwriting result and the approved insurance amount/premium, the upstream and downstream intellectual property of the product is 64. 201019248 Insurance cost allocation calculation; = The value and proportion of the product components are calculated based on the calculation, the calculation of the product components or the distribution of premiums. 31. An interactive R&D risk management system consists of: one or more computer or transaction equipment; one manager- or (four) service provider; or a broadband broadband connection that connects the aforementioned managers and managers The host computer; e ❹ Dian R & D risk management data module, is used to manage and store R & D risk B data in the data server designated by the manager; risk management will touch the H system will be managed by the manager's R & D risk The information agreed by both parties is passed to the manager during the R&D process; - ί ^ 接收 receiving module ' is used to receive the R&D risk management data of the manager; 璧 = module, the R&D risk management data is passed The lock-in operation program, the information ship towel that is lacking by the administrator, and the ancient and 料 料 料 龄 龄 管理者 管理者 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史 历史There is no editing function, so you cannot make any additions, modifications or deletions. Please refer to the interactive R&D risk management system described in item 31 of the patent scope. 3' ί 该 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 锁 。 Silk*, Gant invites the interactive R&D risk management system described in item 31 of the patent scope, in which the manager and the manager store the R&D risk management information, which is an instant system. Please use the interactive R&D risk management system described in item 31 (4). The R&D inspection management dragon or lock-in social R&D risk management information to the lock product number, miscellaneous input date or time, previous special period Previous patent search quantity, prior patent validity analysis, product not 65 201019248 t-woven fruit, product avoidance design record, product date: product sales quantity, or related wafers, in research and development, etc. 3, 5. If the interactive R&D risk management system described in item 1 of the application includes: lock lock key serial number, flood season, time production i new research touch*, or derivative new case management of previous research and development*, it is expected The data server _ specified by the administrator, because there is no; programming, display interface without editing function, it is not allowed to ^ 3 = group ==:; = month b can not make any additions, modifications and deletes . _ 37. If you apply for the interactive R&D risk management system mentioned in Item 31, the interactive R&D risk management system further includes: , Second Risk (4) New Zealand, Age Money #娜妓倾的互动研究风2 The secret of the money, the money to control the results, the reference value of the front model, the group calculation test value. Lai Guanheng i The interactive R&D risk management system mentioned in Item 37 of the patent scope =, wherein the R&D inspection and control pipe parameters are managed according to the management system. The more the management years, the larger the parameters and the smaller the risk value. The interactive R&D risk management system described in item 31 of the special f scope, wherein the interactive R&D risk management system further includes: 66 201019248 A manager proposes to apply for a secret R&D risk management data module, and decrypts the custody The module, which is requested by the manager to apply for the lock-in historical R&D risk management data module, is used for the administrator to submit the application for the secret research and development risk management data, and the decryption and storage module is used to perform the decryption operation. 40. The interactive R&D risk management system as described in claim 39, wherein the decryption and storage module comprises: deleting and decrypting historical R&D risk management data, that is, automatically deleting the decrypted operation and delivering the decrypted data Decrypt the data. 41. An interactive R&D risk management method, which includes the following steps: 〇 The manager initiates a new R&D file or a derivative of the previous R&D case. When the “Complete Key” is operated, the R&D risk agreed by both the manager and the manager is The management data is transmitted to the manager; when the R&D risk management data is entered into the manager database, the new lock file is automatically opened and the lock code is generated, and the lock key number, date and time are automatically generated; the data is automatically stored to the lock The secret database server stores locks and stores any additions, modifications, and deletions. 42. The interactive R&D risk management method described in item 41 of the patent application scope further includes the following steps: “The derivative file of the new R&D file or the previous R&D case opened by the manager, when the operation completion key is about to develop the risk After the management data is locked and stored by the lock and confidentiality module, it enters the database server designated by the administrator and is prohibited from any addition, modification and deletion. 43. The interactive R&D risk management method described in claim 41 of the patent application scope further includes the following steps: generating a R&D risk control parameter. 44. The interactive R&D risk management method described in claim 41 of the patent application further includes the following steps: The administrator inputs the password and applies to the manager for the secret research and development risk management data. 67 201019248 45. The interactive R&D risk management method as described in claim 41 further includes the following steps: The manager performs the decryption data operation and automatically deletes the decrypted data after the completion of the delivery of the data to the manager. 46. A product upstream and downstream intellectual property insurance cost sharing calculation system, comprising: a risk factor management module for managing risk factors that may cause insured risk; a wind pipe execution module for calculating the aforementioned risk factor The risk value caused by a single component weight calculation module is based on the specific gravity calculation reference value to calculate the proportion of the product components in the product; Based on the aforementioned risk value and proportion, the calculation of the product components and the miscellaneous premiums are calculated. 47. If the application of the above-mentioned patent scope, the upstream and downstream intellectual property insurance costs are allocated, the secret is calculated. The management module is called the risk factor of the volume, and the insured enters the answer and stores it, and further calculates the weight value of the risk factor by the wind turbine execution module to obtain the risk value. 48. The upstream and downstream intellectual property insurance cost sharing calculation system of claim 46, wherein the risk factor includes: substantial risk, operational risk; ❹ the aforementioned substantial risk means: whether the product and its components have patents The number of patent searches for the rights, products and their components, the number of infringement lawsuits for products and their components, the success or failure of the product and its component infringement litigation, the number of times, the actual number of locks of products and their components , the actual sales quantity of the product and its components, the period of sale of the product and its components; ” The amount of intellectual property owned, intellectual property or patent claims are large or narrow (based on intellectual property search or analysis results), the product Whether the patent for the component or component is actually present, whether the patent for the product or component is exclusively authorized to others, the patent for the product or component is 68 201019248 No mortgage or quality; The aforementioned business risk refers to: The operation of the insured Face-to-face assessment, such as the insured’s insured’s turnover, the insured’s financial position, and the insured’s financial situation. To the warning letter of the second = two = within the infringement lawsuit or the old (four); 5, the insured during the period of the infringement lawsuit to win or not to prevent production; gold, the amount of claims after the alleged infringement, the insured is m The vigilance measures and implementation measures of the intellectual property rights. The reference value of the calculation of the component calculation module of the upstream and downstream intellectual property insurance products of the product mentioned in Item 46 of the nn circumference is divided into - the price of the product components is occupied by the product. Cost specific gravity, risk control parameters, this parameter shows that the listener is the tube and the tube, as the first item of the air duct executive module to calculate the risk value # reference value. Her patent ^ 帛 5帛 product Upstream and downstream intellectual property expenses ~ R&D risk control parameters are calculated according to the management system's management of the case. The more the management years, the larger the parameters, and the risk value mm, the product mentioned in item 46, the upstream and downstream intellectual property micro-cost knife The calculation formula of the risk value is as follows: Substantial risk weight value + business risk weight value = total risk value 53. If the product mentioned in item 46 of the patent application scope is calculated, the risk is _ Calculate the formula into the step such as "7 intellectual insurance insurance costs research and development risk control parameters = R & D risk control total value f said that if the interactive R & D risk management system management, its R & D risk control parameters of the parameter value is zero. 201019248 54. If the upstream and downstream intellectual property insurance cost sharing calculation system described in item 46 of the patent application scope is calculated, the formula for calculating the specific gravity value is as follows: E total quantity specific value % XF total value = G specific gravity value 55. For the upstream and downstream intellectual property insurance cost sharing calculation system described in item 46 of the patent application scope, the formula for calculating the premium allocation is as follows: Product intellectual property insurance premium X R&D risk control total value X (total value of risk + total weight value) = Cost sharing of a single component 十一、圓式:Eleven, round:
TW97142349A 2008-11-03 2008-11-03 IP insurance-adjusting risk assessment management system and method TW201019248A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97142349A TW201019248A (en) 2008-11-03 2008-11-03 IP insurance-adjusting risk assessment management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97142349A TW201019248A (en) 2008-11-03 2008-11-03 IP insurance-adjusting risk assessment management system and method

Publications (1)

Publication Number Publication Date
TW201019248A true TW201019248A (en) 2010-05-16

Family

ID=44831670

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97142349A TW201019248A (en) 2008-11-03 2008-11-03 IP insurance-adjusting risk assessment management system and method

Country Status (1)

Country Link
TW (1) TW201019248A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI471818B (en) * 2011-12-26 2015-02-01 Chailease Finance Co Ltd Small enterprise financing risk assessment method
TWI602133B (en) * 2016-11-18 2017-10-11 財團法人商業發展研究院 Method for evaluating strength of goal
CN109522400A (en) * 2018-05-28 2019-03-26 平安医疗健康管理股份有限公司 Core protects method, apparatus, computer equipment and storage medium
TWI725527B (en) * 2018-11-27 2021-04-21 開曼群島商創新先進技術有限公司 Insurance transaction processing method and device
US11188985B1 (en) * 2019-05-31 2021-11-30 Aon Risk Services, Inc. Of Maryland Entity prioritization and analysis systems

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI471818B (en) * 2011-12-26 2015-02-01 Chailease Finance Co Ltd Small enterprise financing risk assessment method
TWI602133B (en) * 2016-11-18 2017-10-11 財團法人商業發展研究院 Method for evaluating strength of goal
CN109522400A (en) * 2018-05-28 2019-03-26 平安医疗健康管理股份有限公司 Core protects method, apparatus, computer equipment and storage medium
CN109522400B (en) * 2018-05-28 2023-07-07 深圳平安医疗健康科技服务有限公司 Nuclear protection method, device, computer equipment and storage medium
TWI725527B (en) * 2018-11-27 2021-04-21 開曼群島商創新先進技術有限公司 Insurance transaction processing method and device
US11188985B1 (en) * 2019-05-31 2021-11-30 Aon Risk Services, Inc. Of Maryland Entity prioritization and analysis systems

Similar Documents

Publication Publication Date Title
Chang et al. Exploring blockchain technology in international trade: Business process re-engineering for letter of credit
CN101785012B (en) Transaction security on network
Wittie et al. Electronic Records and Signatures under the Federal E-SIGN Legislation and the UETA
WO2022155733A1 (en) System and method for protecting, managing and monetizing creative works using blockchain
MacCarthy Information security policy in the US retail payments industry
TW201019248A (en) IP insurance-adjusting risk assessment management system and method
CN115605893A (en) System, apparatus and method for tracking certified clean energy using blockchains
Daza Jaller et al. The regulation of Digital Trade: Key policies and international trends
Chargo You've been hacked: How to better incentivize corporations to protect consumers' data
JP2009140057A (en) Medical care record management system, medical care record management program and medical care record management method
Dessent Digital Handshakes in Cyberspace under E-Sign: There's a New Sheriff in Town
Ivascanu Legal issues in electronic commerce in the western hemisphere
Reed Legally binding electronic documents: digital signatures and authentication
Gao The e-commerce legal environment in china: status quo and issues
JP7357974B2 (en) Information processing device and program
Ramadhani et al. The Existence of Financial Services Authority in Protecting Personal Data Users of Peer-to-Peer Lending Financial Technology
Ziwa The Effectiveness of Legal Framework On Personal Data Protection in E-Commerce in Kenya
Ogundele Developing Legal Framework for Electronic Commerce in Nigeria: Some Lessons from UK and Singapore
Wear et al. Recent Developments in Cybersecurity and Data Privacy
Magnin The Telebanking Contract In Swiss law
Jaller et al. The regulation of Digital Trade
Sang Internet court on solving online consumer contract disputes: Case of China
Seo et al. Information security activities model per e-government service promotion stage
Chougale et al. IPFS-Blockchain Based Technology for Lease Agreement and Rental System in Real Estate
CN114297724A (en) Electronic contract verification method, electronic contract, document verification system and storage medium