Trademarks, Patents, and Trade Secrets
Trademarks, Patents, and Trade Secrets
Trademarks,
Copyrights,
Patents, and Trade
14-1
Secrets
CHAPTER OBJECTIVES
1 OF 2
Criteria 1 Criteria 2
14-5
Patents Trademarks
14-7
A patent does not give its owner the right to make, use, or sell an invention;
rather, the right granted is only to exclude others from doing so.
As a result, if an inventor obtains a patent for a new kind of computer chip,
and the chip would infringe on a prior patent owned by Intel, the inventor has
no right to make, use, or sell the chip.
To do so, the inventor would need to obtain permission from Intel. Intel may
refuse permission, or ask that a licensing fee be paid for the rights to infringe
on its patent.
While this system may seem odd, it is really the only way the system could
work. Many inventions are improvements on existing inventions, and the
system allows the improvements to be (patented) and sold, but only with the
permission of the original inventors, who usually benefit by obtaining
14-9
licensing income in exchange for their consent.
Copyright ©2012 Pearson Education
GROWTH IN PATENT APPLICATIONS IN THE
UNITED STATES
14-10
14-11
20 years from
Any new varieties of plants that can be
Plant the date of the
reproduced asexually.
original
application.12-12
Copyright ©2012 Pearson Education
BUSINESS METHOD PATENTS
(SPECIAL UTILITY PATENT)
12-13
12-14
12-15
Item Example(s)
Item Example
Item Example
Immoral or Profane words
scandalous matter
Labeling oranges “Fresh Florida
Deceptive matter Oranges” that aren’t grown in Florida
12-22
12-23
expression dichotomy.
An idea is not copyrightable, but the specific expression of an
Copyright Infringement
Copyright infringement occurs when one work derives from
another or is an exact copy or shows substantial similarity to
the original work.
To prove infringement, a copyright owner is required to
show that the alleged infringer had prior access to the
copyrighted work and that the work is substantially similar
to the owner’s.
12-27
12-28
12-30
12-31
Password protecting
Maintaining logbooks
confidential computer
for visitors
files
12-34
12-37
12-38
12-39