TW594507B - System and methods for analyzing and assessing patents - Google Patents

System and methods for analyzing and assessing patents Download PDF

Info

Publication number
TW594507B
TW594507B TW91120651A TW91120651A TW594507B TW 594507 B TW594507 B TW 594507B TW 91120651 A TW91120651 A TW 91120651A TW 91120651 A TW91120651 A TW 91120651A TW 594507 B TW594507 B TW 594507B
Authority
TW
Taiwan
Prior art keywords
item
patents
scope
analysis
patent application
Prior art date
Application number
TW91120651A
Other languages
Chinese (zh)
Inventor
Jen-Diann Chiou
Yung-Chiang Chen
Original Assignee
Intumit Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intumit Inc filed Critical Intumit Inc
Priority to TW91120651A priority Critical patent/TW594507B/en
Application granted granted Critical
Publication of TW594507B publication Critical patent/TW594507B/en

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This invention provides a system and methods for analyzing and assessing patents. There are several modules under this analysis system: a defense analysis module for analyzing the invalidity of the allegedly infringed patent, an offense analysis module for analyzing the possibility of each of our patents is infringed by the allegedly infringing product, and a patent portfolio analysis module for analyzing and select the excellent quality of patents from a portfolio.

Description

594507594507

發明 在專利分析的過程當中,傳統上以人工方 在分析的過程",對於-專利的有效:ί 利^對象物之間的侵權分析及專利品f的強弱,—L t :篁化的方式來表5見,亦無法以自動化的方式 :二即無法自動化’使得以人工方式做初步的; =ίίπ’Η耗大量的金錢及時間成本, ^在專利權的攻防戰爭中,誤判情勢,坐失良機,實為不 ^ 、 由於電腦技術的進步,已可將涉及人為處理的部份交 由電腦加以量化並處理,然而在專利事務的自動化過程 中,以客觀的事證及指標來取代原有人為的判斷已屬必缺 的設計方向;本發明以此方向思考’再以檢索技術為基 礎,並經屢次實作的修正與調整,發展出一套可自動化處 理的專利分析及評估流程。 發明之簡要說明 本發明之主要目的在於提供一種專利分析評估系統,In the process of patent analysis of inventions, traditionally the process of analysis by manual method is effective for-patents: analysis of infringement between objects and the strength of patents f, -L t: See Table 5 for details, but also cannot be automated. Second, it cannot be automated, so that it can be done manually; = ίπ'Η consumes a lot of money and time costs, ^ in the offensive and defensive war of patent rights, misjudge the situation, It ’s not a good opportunity to miss the opportunity. Due to the advancement of computer technology, it is possible to quantify and process the part involving human processing by the computer. However, in the process of patent affairs automation, objective evidence and indicators are used instead. The original artificial judgment is a necessary design direction; the present invention thinks in this direction, and then based on the retrieval technology, and after repeated implementation amendments and adjustments, it develops a set of patent analysis and evaluation processes that can be processed automatically. . Brief Description of the Invention The main object of the present invention is to provide a patent analysis and evaluation system,

594507 利防禦分析 :亦可將此 利有效性分 法。 到上述目的 常使用的防 效性分析、 斷處理,並 判斷之用。 利防禦分析 有的因應對 先前技術(p 執行其專利 以篩選有效 五、發明說明(2) 用以處理專 流程的系統 能分別為專 品質分析方 為了達 戰爭中,最 中的專利有 以自動化判 輔助使用者 其中專 時’我方須 對方專利為 效,故不可 殺傷力,所 更顯重要。 、專利攻擊 分析系統依 析方法、專 ’本發明特 禦策略、攻 專利侵權分 組合為一專 方面為對方 策,最根本 r i or arts ) 權,以此方 且足以對抗 分析及專利組合分析之 其功能各別使用,其功 利侵權分析方法與專利 別針對企業在專利攻防 擊策略、專利組合分析 析、專利品質分析,加 利分析評估系統,以達 指控我方侵害他專利權 且直接的方式應是證明 所指導,專利權應屬無 式減低專利權對我方的 對方專利權的先前技術 專利攻擊分析方面為我方欲指控對方侵害我專利權 時,我方應先針對對方產品做侵權分析,透過對侵權品的 拆解進一步透析其技術基礎,再與我方專利比較,判f是 否到達侵權之程度。 專利組合分析方面為觀察一群專利之組合其在各技術 指標中的表現,以事先設定的條件來據以篩選優良專利, 用以標示出核心專利。 發明詳細說明594507 Profit and defense analysis: This profit and effectiveness can also be divided. To the above purpose, it is often used for the analysis of the effectiveness of the prevention, processing, and judgment. Some of the reasons for the defense analysis are to respond to the prior technology (p. Execute its patents to screen for validity). 5. Description of the invention. (2) The systems used to process the special processes can be specialized quality analysts. In order to reach the war, most of the patents are automated. It is more important to judge the auxiliary users when it is' we need the other party ’s patent to be effective, so it is not lethal, and it is even more important. The patent attack analysis system depends on the analysis method, and the special strategy of this invention and the attack on patent infringement are combined into one. It is the policy of the other party that is the most fundamental, and the most fundamental is the right of arts. In this way, it is sufficient to resist the use of its functions separately from the analysis and patent portfolio analysis. Its utilitarian infringement analysis methods and patents are targeted at companies' patent attack and defense strategies and patent portfolios. Analyze, analyze patent quality, and analyze and evaluate the system of Gali, in order to reach the allegation that we infringe other patents, and the direct way should be the guidance of the proof. The patents should be the prior technology that can reduce patents to our opponent's patents In terms of patent attack analysis, when we want to accuse the other party of infringing our patent right, we should first target the other party's product. Infringement analysis, further dialysis its technology base through the dismantling of the infringing goods, and then compared with our patent, whether the sentence f reached the point of infringement. In the aspect of patent portfolio analysis, we observe the performance of a group of patents in various technical indicators, and use the pre-set conditions to select the best patents to mark the core patents. Detailed description of the invention

五、發明說明(3) &專利分析的領域中,傳絲 分析事務,分拚去#中傳、、先上以人工方式處理製專利 略了 $ ^ t析常以自我主觀的觀點來處理,以勒%勿 略了客觀享难沾當# ^ 从致於忽 了直#^4。的鬼集與判斷;及至電腦技術的進步,帶# :專利分析自動化的處理;因 ς帶: 利分析呼估::示、攻擊、分析等結合電腦技術成為-專 式來分析绊:ί ’纟幫助使用者以更客觀、更自動化地方 刀·"平{_專利事務,以下為本發明之詳細說明。 ^圖1所示,為本發明應用於電腦架構之其中之一 3二首先將本發明之電腦系統以程式設計成 】服器/、桌上型電腦或筆記型電腦;電腦之軟體102中玎 二=業系統、應用軟體、各式元件、資料庫及資料、檔案 或資料,本發明之電腦系統亦屬於電腦軟體之一,放置於 儲存設備103及記憶體1〇4等電腦可讀取媒體,執行期多置 於硬碟機105及記憶體106中;使用者於本機透過輪出裝置 107如鍵盤或滑鼠,進入電腦中之輸出入埠1〇8,執行本發 明電腦指令之軟體,透過主機板為介面丨〇9與其他硬體組 件間溝通,並送入送出中央單元處理器丨丨〇以運算各項機 器指令’本電腦指令之軟體經過處理後將結果送至顯示介 面卡111以顯示於螢幕Π2上。 若使用者來自區域網路(LAN) 1 13,可透過網路設備 11 4進入本機網路介面卡丨丨5,以執行本電腦指令之軟體。 若使用者來自廣域網路(WAN)116 (或是網際網路),玎透 過網路設備114進入本機網路介面卡115,或透過數據機V. Description of the invention (3) & In the field of patent analysis, pass the analysis of the silk, divide and go to # 中 传, and first process the patents by manual method. The analysis is often handled from a self-subjective point of view. , Please do not ignore objectively enjoy difficult to touch # ^ 致 致 了 了 了 直 # ^ 4. Gathering and judgment; and the advancement of computer technology, belt #: automatic analysis of patent analysis; because of belt: profit analysis call :: display, attack, analysis, etc. Combined with computer technology, it becomes a special-type analysis: ''纟 Help users with a more objective and more automated local knife " ping {_ patent affairs, the following is a detailed description of the invention. ^ As shown in FIG. 1, it is one of the applications of the present invention to a computer architecture. 32 First, the computer system of the present invention is programmed into a server / desktop computer or a notebook computer; software 102 of the computer is used. Two = industry system, application software, various components, databases and data, files or data. The computer system of the present invention also belongs to one of the computer software and is placed on computer-readable media such as storage device 103 and memory 104. The execution period is mostly placed in the hard disk drive 105 and the memory 106; the user enters the input / output port 108 of the computer through the wheel-out device 107 such as a keyboard or a mouse, and executes the software of the computer instructions of the present invention. Through the motherboard as the interface 丨 〇9 communicates with other hardware components, and sends it to the central unit processor 丨 丨 〇 to calculate various machine instructions' The software of this computer instruction is processed and the results are sent to the display interface card 111 to be displayed on the screen Π2. If the user is from a local area network (LAN) 1 13, the user can enter the local network interface card 5 through the network device 11 4 to execute the software of the computer command. If the user is from a wide area network (WAN) 116 (or the Internet), enter the local network interface card 115 through the network device 114, or through a modem

594507 五、發明說明(4) 117登入另一輸出入埠118,以執行本電腦指令之軟體。 如上所述,本發明之應用可存在於各式電腦可讀取媒體, 包括但不限於軟碟磁片、硬碟、光碟片、快閃記憶體 (Flash ROMS)、非揮發性記憶體(n〇nv〇latile R〇M)及各 種存取記憶體(RAM)中;安裝上不限於單一電腦,以數台 電腦做負荷平衡之運算亦可。 、如圖2所不,為本發明之系統若是與網路連線時之方 式之其中之一種,首先將本發明設計成電腦系統2 〇 6並安 裝於伺服端的電腦上’使用者可藉由網際網路或由内部區 域網路連線至伺服端,其中網際網路使用者2 〇工透過公眾 、、周際、’罔路(Internet )系統20 2與伺服端之網站伺服器(Web SerVer)2〇3連線,再進入飼服端網路系統2〇5 ;此網站祠 服益203為伺服端與網際網路用戶賴i之間的介面,透過 :-介面,網際網路用戶端2〇1可執行飼服端 後,與伺服端連線並H進^服端^路系統205之 2。6,當系統m於執行:執=明之專利分析評估系棘 料。 、執仃時,可存取文件資料庫207之資594507 V. Description of the invention (4) 117 Log in to another I / O port 118 to execute the software of this computer command. As mentioned above, the application of the present invention can exist in various computer-readable media, including but not limited to floppy disks, hard disks, optical disks, flash ROMs, non-volatile memory (n 〇nv〇latile R〇M) and a variety of access memory (RAM); installation is not limited to a single computer, several computers can be used for load balancing calculations. As shown in Figure 2, if the system of the present invention is one of the ways when it is connected to the network, the present invention is first designed as a computer system 206 and installed on a server-side computer. The Internet or the internal LAN is connected to the server, in which the Internet users 200 workers pass the public, weekly, 'Internet' (Internet) system 20 2 and the server-side web server (Web SerVer ) Connect to 203, and then enter the feeding-side network system 205; this site Cifuyi 203 is the interface between the server and the Internet user Lai, through:-interface, Internet client After the execution of the feeding service, the server can be connected to the server and enter the server system 205 of 2.6. When the system is implemented: the patent analysis and evaluation of the patent system is awkward. When you execute, you can access the resources of the document database 207

^ ^ ΐ ^ ^ ^301 J 以防禦他方指控我方侵犯專利權,二 先前技術;專利攻擊分舯趨& Qn〇八貝負力此為師選有效 利權展開攻擊,其實質功二:1以針對他方侵犯專 質力此為衡夏並判斷侵害專利權之程^ ^ ΐ ^ ^ ^ 301 J to defend others from accusing us of infringing patent rights, two prior technologies; patent attack analysis trends & Qn〇 Babei force this is to attack the effective interests of the teacher to select the attack. 1 Taking Heng Xia's judgment against patent infringement on other parties as a process

594507 五、發明說明(5) 度;專利組合分析模組3〇4,用以研 合其技術指標及引證關係,其實冑專利之組 核心專利。 、力月b為師選品質優良的 :圖4所示,為專利防禦分析 先,步驟401輪入專利,用以確郭 ^之/軛步驟,貫 夕擠从 „:, 心對方指控我方侵宝專利 之払的,原則上輸入一個專利,輸 口 此次指控之專利為冑,系統應自動=碼即可辨識出 且有开3 ™6Γ);步驟402判斷該專利是否 /nf Λ 行性?是則進行下一步驟4〇3,否則社束 4〇5,檢查形式上的可執行•,是檢驗 實有口 ==,::如’該專利根本不存在、該專利權^ 交互授權保護之=屬二3專f權“雙方 :庫二驟4。3計算資料庫中文件與該專利之不二 執程订度於,我資 先權曰之η ϊ是在該專利申請曰或優先權θ (若無優 則以申睛曰為準)之前就已建立之文件,文件包 Ϊ各國專利、冑文期刊、學術發表、報紙料等,而資料 件與專利間之相似程度(similarity),可以相似度運 异處理之,本發明僅以其中一種方式來說明相似度運算, 並非用以限制其使用方式,其說明如下: 進行相似度運算,必須先將文件轉換為向量,再以兩 文件向量之内積值(inner product)視為其間的相似度 值’而文件轉換為向量,其方式說明如後··在取得_群文 件資料之後’並將其所有可能出現的字組加以排列,此字594507 V. Description of the invention (5) Degree; Patent portfolio analysis module 304 is used to study its technical indicators and citation relationships. In fact, it is the core patent of the group of patents. 2. Liyue b was selected by the teacher with good quality: as shown in Figure 4, first for patent defense analysis, step 401 is used for patents, to confirm Guo ^ zhi / yoke steps, and to squeeze from „:, the other party accuses us If you infringe on a patent, enter a patent in principle, and enter the patent that is accused this time. The system should automatically recognize the code and open 3 ™ 6Γ); Step 402 determines whether the patent is / nf Λ line Sex? If yes, then proceed to the next step 403, otherwise the social bundle 405, check the executable form, is to check the actual ==, ::: such as' the patent does not exist at all, the patent right ^ interactive Authorized protection = belongs to 2 3 exclusive rights "both parties: library 2 step 4. 3 calculation of the documents in the database and the patent's exclusive execution schedule, the η 我 of our prior rights is in the patent application Or priority θ (if there is no priority, whichever is the most important), the documents have been established before. The documents include patents, obituary journals, academic publications, newspaper materials, etc., and the degree of similarity between information documents and patents ( similarity), which can be processed by similarity. The present invention only illustrates the similarity operation in one of the ways. , Is not used to limit its use, it is explained as follows: For similarity calculation, the file must be converted into a vector, and then the inner product of the two file vectors is regarded as the similarity value between them, and the file is converted to Vectors, the way of which is described as follows ... After obtaining the _group file information 'and arrange all its possible words, this word

II 第10頁 594507 五、發明說明(6) 組可為單一字,例如「專」、「商」、「著」、 「patent」、厂trademark」、厂copyright」等,或 1 才复 數個相連字,如二連字「專利」、「商標」、「著作」、 厂patent pending」、厂registered trademark」、 「copyright materials」等,亦可以是單一字及複數相 連字兩者之組合,再計算該字組中每一元素出現的次數為 文件向量;其中向量的型態舉例說明以下,例如,一群文 件其所有子組排列為(patent pending,registered trademark,copyright materials),在該篇文件中出現 「patent pending」的次數為7次、出現「registered trademark」的次數為3次、出現「COpyright materials」的次數為5次,則該篇文件之向量為(7,3, 5 j,為三維向量,以此類推將其他文件加以轉換;有些向 量型態以字組出現與否做為其分量值,例如一文件有出現 patent pending 」、無出現「registered trademark」、有出現 rc〇pyright materials」,則該篇 文件之向量為(真,偽,真),習慣上將真值視為丨,偽值 視為〇,則該篇文件之向量為(1,〇,1);亦有將真值視 1,,值視為〇的情況;不過,一群文件其向量通常為 冋、准向里(High Dimensional Vector),實際維數可台匕 高達萬維以上; 此 的相似度 1,透過 來代表 f下來再將兩文件向量做内積運算做為其間 值丄若本案標的專利為β,資料庫文件為Di,i = 1 计算專利文件β向量與其他文件Di向量之内積值II Page 10 594507 V. Description of invention (6) The group can be a single word, such as "special", "quote", "着", "patent", factory trademark ", factory copyright", etc. Words, such as the ligatures "patent", "trademark", "writing", factory patent pending, factory registered trademark "," copyright materials ", etc. It can also be a combination of single words and plural concatenated words, and then calculate The number of occurrences of each element in the block is a file vector; the type of the vector is exemplified below. For example, all subgroups of a group of files are arranged as (patent pending, registered trademark, copyright materials), and appear in the file. The number of times of "patent pending" is 7 times, the number of times of "registered trademark" is 3 times, and the number of times of "COpyright materials" is 5 times, then the vector of this document is (7, 3, 5 j, which is a three-dimensional vector , And so on to convert other files; some vector types use the presence or absence of words as their component values, such as a file pending pending, "registered trademark", rc〇pyright materials ", then the vector of this document is (true, false, true). It is customary to treat the true value as 丨 and the false value as 〇, then the vector of this document is ( 1, 〇, 1); There are also cases where the true value is regarded as 1, and the value is regarded as 0; however, the vector of a group of files is usually 冋, High Dimensional Vector, and the actual dimension can be as high as 10,000. Dimensions above; the similarity of 1, is to represent f, then the inner product of the two document vectors is calculated as the interval value. If the subject patent is β and the database file is Di, i = 1 calculate the patent document β vector and other Inner product value of file Di vector

594507 五、發明說明(7) 基準文件與其他文件之間的相似度,其内積值越大代表相 似度越大,内積值的運算,為文件間的個別對應的維度值 分別相乘,然後再加總;例如··專利文件B,其向量為= (Β1,β2,......,Bm),其他文件編號為D1〜Dn,其Di向量為 = (Dil,Di2,......,Dim),i = l〜n,m為維度數目,B與其他594507 V. Description of the invention (7) The similarity between the reference file and other files. The larger the inner product value, the greater the similarity. The inner product value is calculated by multiplying the corresponding corresponding dimension values between the files, and then Sum up; for example, · Patent file B, whose vector is = (B1, β2, ..., Bm), other file numbers are D1 to Dn, and its Di vector is = (Dil, Di2, ... ..., Dim), i = l ~ n, m is the number of dimensions, B and other

Di之相關度為其内積值=B · Di=Bl X Dil+B2 X Di2 +......+ Bin x Dim,i = l〜η,其B與Dl之相似度為其内積值 -B · Dl =B1 X Dl 1 +B2 x D1 2+......+ BmxDlm,以此類推; 、 步驟404,選擇相似度在某標準值以上之文件,並視 為有效的先前技術;如此一來,篩選有效的先前技術為相 似度與專利相當接近且其文件建立日期比專利之申請曰或 優先權日更早。 如圖5所示,為專利攻擊分析模組3 〇 3之實施步驟,首 先’步驟501,輸人一對方產口口口,用以確認本此分析的標 的物,此視為可能侵權品,對方的服務亦為產品之一 ;I 驟502,取得該產品之材料清單⑺⑽;Biu 〇f ,y ^ Si,以透㈣產品所使用之技術來源;材料清 :中:括該產品將會使用到的料、組件或原料來加以缸 i姑接地顯示該產品所應用的技術來源為何,合 早,可再行展開成更詳細之材料清單,若該產σ 清單可供參考,至少可將自 w σσ 材料 項,以便後續步驟的進行己本身視為材料清單中的- 步驟503,依據材料清單中的物件,檢索資料庫中相The correlation degree of Di is its inner product value = B · Di = Bl X Dil + B2 X Di2 + ... + Bin x Dim, i = l ~ η, and the similarity between B and Dl is its inner product value- B · Dl = B1 X Dl 1 + B2 x D1 2 + ...... + BmxDlm, and so on; 404 Step, select a file with similarity above a certain standard value, and consider it as a valid prior art; In this way, the effective prior art for screening is that the similarity is quite close to the patent and its file creation date is earlier than the patent application or priority date. As shown in Figure 5, this is the implementation steps of the patent attack analysis module 3 03. First, step 501, enter a person's mouth to confirm the subject matter of this analysis, which is regarded as a possible infringing product. The other party's service is also one of the products; I step 502, get the material list of the product; Biu 〇f, y ^ Si, through the technical source used in the product; material clear: middle: including the product will be used The materials, components, or raw materials that are obtained are added to the cylinder to show the source of the technology applied to the product. Early on, you can expand into a more detailed material list. If the product σ list is available for reference, at least w σσ material items, so that the subsequent steps are considered as in the bill of materials-step 503, according to the objects in the bill of materials, retrieve the phase in the database

第12頁 594507 五、發明說明(8) 關文件,並將相以♦ "ί77 甘4Φ Α 士用立或、*、a ϋ度超過某標準值以上的文件予以組合, 源;:ίίίίΠ上的物件來尋找與其相關的技術來 二十最高文如可定為「選取前百分之 M ^ ^ 〇iJ ia si λα ^牛」,檢索時可將各物件的名稱、關 庫來檢索相似的文:技:為檢索條#,然後到資料 篩選有效的文件q見為以-定的相似度標準來 #^504,; 上述文件組合視為資料庫來'並人視為檢索條件’將 相似产:*茸L f中文件之相似程度;步驟505,若文件之Page 12 594507 V. Description of the invention (8) Relevant documents, and the combination of documents related to ♦ " ί77 Gan 4Φ Α or 或, *, a ϋ degree exceeding a certain standard value or more, combined, source ;: ίίίΠ To find the related technology of the object, the top 20 articles can be set as "select the top percent M ^ ^ 〇iJ ia si λα ^ cattle". When searching, you can retrieve the names of the objects and close the library to search for similar Text: Techniques: search for #, and then filter the valid documents to the data, see # ^ 504 with the similarity standard set; the above file combination is regarded as a database to 'combine as search conditions' and will be similar Product: The degree of similarity of the files in the file; Step 505, if the file

視為^ it ^ iM ^準數值以上且數量達某標準數量以上,則 視為已達侵權程度。 J 先,:=。戶!二為專利組合分析模組304之實施步驟,首 挑嘴二^入一群專利,用以分析這些專利組合並 匕k、πα質良好的核心專利;步驟6〇2,計算並顯示 ΐ標:ί”技術指標,最常用的有「被引證次n .就疋一篇專利被其他專利所引證的次數,本發明 列舉α卩份技術指標說明如下: 又 指數 Μ11; GU1:rent ImPaGt IndeX):該專利 =-年來被其他專利引證次數; 他專利⑴的平均值,以求其正規化後之值;請的其 2直技广循環時間(TCT; Techn〇1〇gy Cycie τ ίΓ=:::專利中,取其公告曰期在中位數的專利 八 專利之公告日期相減,其為技術循環時It is considered that ^ it ^ iM ^ is more than a standard value and the quantity reaches a certain standard quantity or more, it is regarded as having reached the level of infringement. J First: =. The second step is the implementation steps of the patent portfolio analysis module 304. It first picks a group of patents to analyze these patent portfolios and core patents of good quality and πα quality. Step 602, calculates and displays the target: ί "technical indicators, the most commonly used is" cited times n. As for the number of times a patent has been cited by other patents, the present invention enumerates the alpha technical specifications as follows: and index M11; GU1: rent ImPaGt IndeX): This patent = -Number of times cited by other patents in the past year; The average value of his patents, in order to find its normalized value; The 2 cycle time of direct technology (TCT; Techn〇1〇gy Cycie τ ΓΓ = :: : Among the patents, the publication date of the eight patents whose publication date is in the median is subtracted, which is the time when the technology is recycled

第13頁 594507 五、發明說明(9) 間; 3· 科學論文連結(SL; Science Linkage):科學論文引證 次數;此處的科學論文期刊,當然以知名的科學論文期刊 為準,才會有一致性的標準,如電機電子工程師學會期刊 (IEEE; Institute of Electrical and Electronics Engineers); 步驟603,計算並顯示引證關係,至少應包括被引證 及引證他人專利;步驟6〇4,依預設條件挑選出核心專 利;預設條件可為以下任一: 1 ·某一或某數項技術指標皆位於各自標準值以上的專 2·某一虱杲數項技術指標皆μ π分e 其被引證次數在某標準值以上的專利, 3·被引證次數在某標準值以上的專利。 企業將自家專利區分等铋,古此s 優良的桉心直刹&人H寺、、及有二疋長期聚焦監視該些 傻良刃极〜辱利組合是否被耢 利等級之後便於擬定;:::者如權’有些則是區分專 佼使於擬疋杈權、讓與、研發、 綜合以上所述,本發明 飞圮出戒略。 .^月為一專利分析評估系統,李统~ ^ 分析、-專利攻擊分析、及—乎直充糸人·先包括-專利防紫 2 JS 4|! ^ v L 專利組合分析。 不为析,目的在於種 其實質功能為篩選有效之先:'方之專利侵權指控, 号化且口分析’目的在於針對一群Page 13 594507 V. Description of the invention (9); 3. Science linkage (SL; Science Linkage): the number of citations of scientific papers; Consistent standards, such as IEEE (Institute of Electrical and Electronics Engineers); Step 603, Calculate and display citation relationships, including at least the cited and patents of others; Step 604, according to preset conditions Select the core patent; the preset conditions can be any of the following: 1 · A certain or a number of technical indicators are above the respective standard value 2. · A certain loach of several technical indicators are μ π points e It is cited Patents with a number of times above a certain standard value, 3. Patents with a number of times of being cited above a certain standard value. The company distinguishes its own patents into bismuth, which has been well-known in the past, and has a long-term focus on monitoring these silly blade poles ~ whether the insulting combination has been awarded a profit level for easy formulation; ::: Some people have the right, and some are distinguished among those who specialize in quasi-control rights, transfer, research and development, and in combination with the above, the present invention provides a flying strategy. . ^ Month is a patent analysis and evaluation system, Li Tong ~ ^ analysis,-patent attack analysis, and-almost straight charge, first include-patent anti-purple 2 JS 4 |! ^ V L patent portfolio analysis. The purpose is not to analyze, but its substantive function is to screen the effective ones first: 'Fang's patent infringement allegations, number analysis and oral analysis' is aimed at a group of

斷侵害專利權之程度;專;二貫質功能為衡量並列 5945〇7 五、發明說明(10) 任意之專利組合進行分析,其實質功能為, 優 良的專利。 馬篩選品質 3·專利防禦分析中篩選有效之先前技術,曰、 之專利文件為基準,與預設資料庫中之文件1以對方指控 其間的相似程度,其相似度到達某一標準值=比對*,計算 則引為有效的先前技術。 上之文件, 4·專利攻擊分析中專利與對象物之間的技 過對象物的材料清單做橋接,將構成對象對’是透 或組件之技術視為對象物之技術,此種方式p材料、零件 工拆解對象物所會產生的主觀判斷問題,解決了以人 權比對中物品的技術來源。 也解決了侵 本發明可應用於電腦資訊系統,其傳 限於任何媒介,如網路、無線傳輸裝置等ί可式包括但不 本發明之技術内容及技術特點已揭 。 本項技術之人士仍可能基於本發明之教 ^,然而熟悉 不背離本發明精神之替換及修飾;因此,,、太Ϊ不而作種種 圍應不限於實施例所揭示者 2:之保護範 之替換及修飾,並為以下之申請種不背離本發明 & τ 0月寻利軏圍所涵蓋。 麵 第15頁 594507 圖式簡單說明 圖1為本發明應用於電腦之架構圖; 圖2為本發明之系統與網路連線圖; 圖3為本發明之專利分析評估系統架構圖; 圖4為系統中之專利防禦分析模組流程圖; 圖5為系統中之專利攻擊分析模組流程圖;及 圖6為系統中之專利組合分析模組流程圖。The degree of infringement of patent rights shall be determined; the function of coherence is to measure the juxtaposition of 5945507. 5. Description of the invention (10) An arbitrary patent combination is analyzed, and its essential function is a superior patent. Screening quality of horses 3. Screening of prior technologies that are effective in patent defense analysis, based on the patent documents of Japan and Japan, and the degree of similarity between the other party's allegations in document 1 in the preset database, the similarity reached a certain standard value = ratio For *, calculations are cited as valid prior art. The above documents, 4. • In the patent attack analysis, the material list between the patent and the object has been bridged, and the technology that constitutes the object pair is transparent or the component is regarded as the object technology. 2. The subjective judgment problem caused by the parts worker dismantling the object solves the technical source of comparing the items with human rights. It also solves the problem that the present invention can be applied to computer information systems, and its transmission is limited to any medium, such as the network and wireless transmission devices. The technical content and technical features of the present invention have been disclosed. Those skilled in the art may still be based on the teachings of the present invention ^, but they are familiar with the substitutions and modifications that do not depart from the spirit of the present invention; therefore, too many restrictions should not be limited to the protection scope disclosed in the embodiment 2: Substitutions and modifications are covered by the following applications without departing from the invention & Page 594507 Brief description of the drawing Figure 1 is a diagram of the architecture of the present invention applied to a computer; Figure 2 is a diagram of the system and network connection of the present invention; Figure 3 is a diagram of the patent analysis and evaluation system of the present invention; Figure 4 FIG. 5 is a flowchart of a patent defense analysis module in the system; FIG. 5 is a flowchart of a patent attack analysis module in the system; and FIG. 6 is a flowchart of a patent portfolio analysis module in the system.

第16頁Page 16

Claims (1)

別507 六、申請專利範圍 h —一直種/Λ分,評估系、统,包括以下模组: 分析步驟^分析模組’用以筛選出有效之先前技術,其 i ·輸入一專利; 則進對Λ方是否具有形式^執行性,是 將二::;㈡利之間的相似程度, 之先前技術;預先°又疋之標準值以上之文件視為有效 -專:攻擊分析模組,其分析步驟為: ;ΛΧ物品,用以確認分析之對象物; ·.取侍该物品之材料清單; i i i ·依據材料清單中的物件,檢 件,將相似度超過某_預先設定之標準文 組合; 丁千值以上的文件予以 1V.將每一欲比對之專利依次 Mm為資料庫來源,並進行相似\=^4 相似度,某-標準數值以上且數量達某旦2件之 視忒產U口已達侵害該專利權; 里上,則 一專利組合分析模組,其分析步驟為·· i.輸入一群專利; II ·計算並顯示技術指標; III ·計算並顯示引證關係; 1 v ·挑選出核心專利,其挑選方式可為以下任Be 507 6. Scope of patent application h — all kinds of seeds / Λ points, evaluation system and system, including the following modules: Analysis step ^ Analysis module 'is used to screen out valid prior technologies, i. Enter a patent; then enter Whether or not Λ party has the form ^ enforceability is to consider the degree of similarity between the two ::; the previous technology; the files above the standard value of the previous ° and 疋 are regarded as valid-special: attack analysis module, its analysis The steps are: Λ × items, used to confirm the analysis of the objects; ·. Pick up the list of materials to serve the item; iii · according to the objects in the list of materials, inspection parts, the similarity exceeds a certain standard text combination; Documents with a value of more than one thousand are given 1V. Each patent to be compared is sequentially Mm as the source of the database, and similarity is equal to \ = ^ 4 similarity, a certain-above the standard value and the number reaches 2 U-port has infringed the patent right; inside, there is a patent portfolio analysis module whose analysis steps are: i. Enter a group of patents; II. Calculate and display technical indicators; III. Calculate and display citation relationships; 1 v · Select Patent core, which may be chosen, and any of the following 第17頁 594507 六、申請專利範圍 某或某數項技術指標皆位於各自標準值 專利; 卞阻μ上的 某一或某數項技術指標皆位於各自標準 以及其被引證次數在某標準值以上的專利;或 ’ 被引證次數在某標準值以上的專利。 2·如中請專利範圍第〗項所述之系統,其中在專 御八 ,组中所指該形式上可執行性至少包含··該專利確;: 在、確為對方所有及未受雙方交互授權保護。 3·如申請專利範圍第丨項所述之系統,其中在專利八 析模組中該資料庫為該專利之申請 立的文件的集合。 催《又則所建 4·如申請專利範圍第1項所述之系統,其中在直 析模組中該材料清覃兔細成嗲物σ 〗攻擊分 5如Φ”為 σ之原料、零件或組件。 蚯握4申击印專圍第1項所述之系統,其中在專利攻整八 1模,,且中右無法取得材料清單或材料清單中空鉦一刀 將該物品視為材料清單中唯一的物件。 …、 ,則 6如申請專利範圍第丨項所述之系統,1 析模組中該技術指標為目前影響 j、f曰分 科學論文連結。 s歎技術循裱時間或 7文Λ申曰請丄利範圍第1項所述之系統’其中相似度可為兩 又件向Ϊ間的内積值。 又>1馬兩 8· —種專利有效性分析方法,其步驟為: (a) 輸入一專利; (b) 判斷該專利對我方是否具有形式上可執行性,是則Page 17 594507 VI. The scope of the patent application One or several technical indicators are located in their respective standard value patents; One or several technical indicators on the resistance μ are located in their respective standards and their number of citations is above a certain standard value Patents; or 'Patents cited above a certain standard value. 2. The system as described in item No. of the scope of patents, in which the form of enforceability referred to in the exclusive eight, the group includes at least the patent is indeed; Cross authorization protection. 3. The system as described in item 丨 of the scope of patent application, wherein in the patent analysis module, the database is a collection of documents filed for the patent. Urge "The system built by 4. The system as described in item 1 of the scope of patent application, in which the material in the direct analysis module is finely divided into 嗲 兔〗 〖Attack points 5 such as Φ" is the raw material, parts or components of σ . The system described in item 1 of the grip 4 application, in which eighteen molds were attacked in the patent, and the material list cannot be obtained at the center right or the material list is empty. This item is regarded as the only one in the material list. …,, Then 6 is the system described in item 丨 of the scope of patent application. 1 The technical index in the analysis module is the current impact on the links of scientific papers in j and f. The technical cycle time or 7 articles Said the system described in item 1 of the scope of profit, where the similarity can be the inner product value between two and one pieces. And > 1 Ma Liang 8 · A method of patent validity analysis, the steps are: (a ) Enter a patent; (b) Determine whether the patent is formally enforceable to us, if so 第18頁 594507 六、申請專利範圍 進行下一步,否則停止;及 (c)計算資料庫中的文件與該專利之間的 =達某一預先設定之梯,值以上之文件視為〜效將之相先 ^^如^申請專利範圍第8項所述之方法’其中在步驟(b)中 二』ϋ可執行性至少包含:該專利確實存在、確為對方 所有及未叉雙方交互授權保護。 =次如申請專利範圍第8項所述之方法,其中在步驟 :ί:庫為該專利之申請日或優先權日之前所建立的文件 女專利範圍第8項所述之方法,其中相似度可為 兩文件向量間的内積值。 j馮 1 2 · —種專利侵權分析方法,其步驟為: (a)輸入一產品,用以確認分析之對象物; 產品之材料清單,若無材料清單,則將該產 口口視為材料清單中唯一的物件; 座 將(=依Λ材料清單中的物件,檢索資料庫中相關文件, :相$度超過某一預先設定之標準值以上的文件予以組 (/)人將、每一欲比對之專利依次視為檢索條件,將上述文 '組合視為資料庫來源,並進行相似度檢索,若文件之相 達某一標準數值以上且數量達某標準數 該產品已達侵害該專利權。 則視 1 3 ·如申睛專利範圍第1 2項所述之方法,其中該材料清單 第19頁 594507 申請專利範圍 A組成δ亥物品之原料、零件或組件 材料ΪΠ:利範圍第12項所述之方法,丨中若無法取得 單中清單中空無一物’則將該物品視為材料清 1 5 ·如申請專利範圍第1 2項所述之方法 兩文件向量間的内積值。 1 6· 一專利組合分析方法,其步驟為: (a)輸入一群專利; 其中相似度可為 (b) 計算並顯示技術指標; (c) 计算並顯示引證關係; (d) 挑選出核心專利,其挑選方式可為以下任一: • 1 ·某一或某數項技術指標皆位於各自標準值以上的專Page 18 594507 VI. The scope of patent application is the next step, otherwise it will stop; and (c) the calculation between the documents in the database and the patent = reaching a certain preset ladder, and the documents above the value will be deemed to be effective First ^ ^ The method described in item 8 of the scope of the patent application 'wherein step (b), two') The enforceability includes at least: the patent does exist, is owned by the other party, and is mutually authorized by the unlicensed parties. . = The method as described in item 8 of the scope of patent application, wherein in the step: ί: The library is the method described in item 8 of the document of female patent scope, which is established before the patent application date or priority date, where the similarity Can be the inner product value between two file vectors. j Feng 1 2-A method of analyzing patent infringement, the steps are as follows: (a) Enter a product to confirm the object of analysis; if there is no material list of the product, the production port is regarded as the material The only object in the list; (= according to the objects in the Λ list of materials, retrieve the relevant documents in the database,: documents whose degrees exceed a certain pre-set standard value will be grouped (/) The patents to be compared are regarded as search conditions in turn. The above-mentioned combination is regarded as the source of the database, and similarity search is performed. If the documents meet a certain standard value or more and the quantity reaches a certain standard number, the product has violated the Regarding the patent right, it will be regarded as the method described in item 12 of Shenyan's patent scope, in which the material list, page 19, 594507, the scope of patent application, A, the raw materials, parts, or component materials that make up the δ11 item. In the method described in item 12, if the item in the list cannot be obtained, the item is regarded as a material. 1 · The inner product value between the two document vectors as described in item 12 of the patent application scope. 1 6 · A patent portfolio analysis method, the steps are: (a) input a group of patents; where the similarity can be (b) calculate and display technical indicators; (c) calculate and display citation relationships; (d) select core patents, select The method can be any of the following: • 1 · One or several technical indicators are above the standard 第20頁 "^--- 1 1 ·某一或某數項技術指標皆位於各自標準值以上, 以及其被引證次數在某標準值以上的專利;或 i i i ·被引證次數在某標準值以上的專利。 17·如申請專利範圍第16項所述之方法,其中該技術指標 可為目前影響指數、技術循環時間或科學論文連結。Page 20 " ^ --- 1 1 · A certain or a number of technical indicators are above their respective standard values, and the number of times their citations are above a certain standard value; or iii · The number of citations are above a certain standard value The above patents. 17. The method described in item 16 of the scope of patent application, wherein the technical indicator may be a current impact index, a technical cycle time, or a link to a scientific paper.
TW91120651A 2002-09-10 2002-09-10 System and methods for analyzing and assessing patents TW594507B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW91120651A TW594507B (en) 2002-09-10 2002-09-10 System and methods for analyzing and assessing patents

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW91120651A TW594507B (en) 2002-09-10 2002-09-10 System and methods for analyzing and assessing patents

Publications (1)

Publication Number Publication Date
TW594507B true TW594507B (en) 2004-06-21

Family

ID=34075558

Family Applications (1)

Application Number Title Priority Date Filing Date
TW91120651A TW594507B (en) 2002-09-10 2002-09-10 System and methods for analyzing and assessing patents

Country Status (1)

Country Link
TW (1) TW594507B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8712932B2 (en) 2007-12-13 2014-04-29 Chipmos Technologies Inc. Computer implemented apparatus for generating and filtering creative proposal
TWI587236B (en) * 2013-02-05 2017-06-11 廣達電腦股份有限公司 Apparatus and method for generating bill of sampling material

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8712932B2 (en) 2007-12-13 2014-04-29 Chipmos Technologies Inc. Computer implemented apparatus for generating and filtering creative proposal
TWI587236B (en) * 2013-02-05 2017-06-11 廣達電腦股份有限公司 Apparatus and method for generating bill of sampling material

Similar Documents

Publication Publication Date Title
Snyder et al. Fifteen minutes of unwanted fame: Detecting and characterizing doxing
JP5670294B2 (en) Systems, methods, interfaces, and software for automatic collection and integration of entity data into online databases and professional rosters
US20180005331A1 (en) Database sharing system
TWI532001B (en) Document classification system, document classification method and recording medium recording therein a document classification program
Habibabadi et al. Topic modelling for identification of vaccine reactions in twitter
JP5273840B2 (en) Patent power calculation device and operation method of patent power calculation device
Kleven Minimum virtual contacts: A framework for specific jurisdiction in cyberspace
WO2015118616A1 (en) Document analysis system, document analysis method, and document analysis program
TW594507B (en) System and methods for analyzing and assessing patents
JP2008140313A (en) Security damage prediction system, security damage prediction method and security damage prediction program
TW201539217A (en) A document analysis system, document analysis method and document analysis program
Jiang et al. Discovering potential effects of dietary supplements from twitter data
JP6441742B2 (en) Security level management system, security level management device, security level management method and program
CN109523394A (en) A kind of risk checking method based on data processing, device and storage medium
Noble Senate Passes Interim Coronavirus Aid Package to Fund Testing, Extend Small Business Aid.
Ingraham Federal judge in West Virginia says plea deals in drug cases undermine public safety
Cotterill Two charged over sofa cash theft from Ramaphosa ranch. South Africa.
Nicholson County lines kingpin found in possession of 500 wraps of heroin and a gun.
Byars Shambhala releases summary of investigation into handling of sex assault allegations.
Ramos My Co-op Board Is Preventing Me From Selling My Apartment.
Folker 15 people behind one of the largest drugs lines in Aylesbury sentenced to prison.
Saxena et al. IDTraffickers: An Authorship Attribution Dataset to link and connect Potential Human-Trafficking Operations on Text Escort Advertisements
Carlson Behind the Curve: Schrems II and the Need for Increased US Data Protections in a Global Economy
Connell Worcester hospital fraud gang trial date set.
Kane Minnesota man killed in no-knock warrant.

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees