...DOCTRINE OF EQUIVALENTS SUPREME COURT JUDGMENT NO. 6572/2550 (Excerpt) The Supreme Court upheld the decision of the Central IP & IT court as followed; The question before this court is whether the defendants’ poultry feeder infringes the plaintiff’s patented poultry feeder according to the patent number 9634 or not. The Supreme Court considers Section 36 bis which states that the scope of the rights of the patentee under Section 36 in respect of a patented invention shall be determined by the claims. In determining the scope of the claimed invention, the characteristics of the invention as indicated in the description and the drawings shall be taken into account. From this provision, the defendant’s poultry feeder will infringe the plaintiff’s patented poultry feeder number 9634 if the defendant’s poultry feeder has the scope of the invention like those indicated in the patent claims. The scope of the claimed invention shall take into account the description and the drawings. The scope of protection for a patented invention shall extend to the characteristics of the invention which, although not specifically stated in the claims, in the view of a person of ordinary skill in the pertinent art, have substantially the same properties, functions and effects as those stated in the claims. In this case, the poultry feeder patented number 9634 has 11 claims. When comparing the defendant’s poultry feeder which is patented in the USA, it can be considered that the defendant’s...
Words: 322 - Pages: 2
...Okay, let’s dive in! Let’s talk about patent infringement. Because the absolute best way to understand a patent…your rights with a patent…your competitors’ rights with a patent…the strength of a patent. The best way to understand a patent is to understand how a patent is infringed. So, we know the power of the patent is in the claims. This is where the inventor defines his or her patent rights; his or her ENFORCEMENT rights. So, let’s try to infringe some claims. We’ll use a simple example. Let’s imagine we can get a patent on anything. Let’s get a patent on a basic chair. Imagine a world without chairs…pretty scary…all we can do is sit on rocks. Not comfortable. Hard to move around. So, we invent the first chair. And we know we’re on to something. Everyone will want to buy this. So, we go to a patent lawyer and get a patent. Here is the claim. (Visually display the elements) • An apparatus for sitting comprised of • a seat, • a back, and • four legs. All of these elements make up one independent claim. And this would be a great claim. It would come at the end of a patent document which could be a few or even dozens of pages of text and drawings describing how to make it and how to use it. (Patent visual running through page after page of drawings then text…then narrow in on a claim). What can we do with this patent… with this claim? Well, first, in our scenario, let’s pick a country. We need to do that because each patent is only...
Words: 1539 - Pages: 7
...Importance of Radiation Safety in Computed Tomography Advances in computed tomography (CT) technology have continued to open new clinical applications, including several procedures for evaluating heart disease. The speed with which CT technology is changing is somewhat unparalleled in medical imaging. The equipment is becoming faster and faster. In the 1990s, a patient had to remain in a CT gantry for a period of approximately 10 minutes for a chest CT, whereas now it takes a few seconds to scan the entire chest. This may give the impression that radiation dose in CT is small, which is not the case. To give an example, a typical chest CT can impart a radiation dose equivalent to hundreds of chest radiographs. The offshoot of higher speed is that shoulder to pelvic scans or even head to pelvic scans are becoming more common, and this is raising questions of justification. Repeat scans on the same patients are also not uncommon. It is becoming clear that many CT examinations (typically one third) are unjustified and can be avoided through appropriate clinical judgment. There is no doubt that newer technology has increased the usefulness of CT examinations in areas where earlier there was little justification of CT. It has been documented that radiation dose to the patient can be reduced significantly through optimization actions. However, repeated examination on the same patient, or examination on a child or pregnant woman, requires a higher level of attention to radiation...
Words: 479 - Pages: 2
...On the 24th August 2012, Apple won more than US $1 billion in a massive US court victory over Samsung, one of the biggest patent cases in decades – a verdict that could have huge market repercussions. A jury in San Jose, California awarded US $1.049 billion to the US tech giant, according to court documents. But analysts said the damages could be tripled because jurors found Samsung “willfully” infringed on patents. The decision was appeared to be an overwhelming victory for Apple but it was not immediately clear whether it would halt sales of Samsung devices or affect newer models released since the case was filed. Apple, the world’s most valuable company now gets richer. On one hand, I believe in the rule of law and Samsung was violating some Apple design patents. They should pay. On the other hand, I can’t help but feel something is wrong with the system. Samsung was trying to take a good design and duplicate or improve upon it. That is what competition is all about. Innovation today is the process of finding a way around a patent or beat it with an even better design. Who knows whether Samsung knew they were copy or not. In any case, they got caught. And the outcome has to be higher phone prices for everyone. Luckily, the hot new Galaxy SIII smart phone was not affected by the ruling. Nowadays, designing a smart phone is difficult. They all look alike, essentially work alike. All have big screens, touch control, icons for the functions and apps. How do the designers...
Words: 761 - Pages: 4
...Check point TJX Company IT/205 MAY 24, 2012 Check point TJX Company Information security means protecting information systems from unauthorized access. To my understanding TJX failed to properly encrypt data on many of the employee computers that were using the wireless network, and did not have an effective firewall installed. In the reading it indicated that TJX was still using the old Wired Equivalent Privacy (WEP) encryption system, which is relatively easy for hackers to crack. The Wi-Fi equivalent privacy (WEP) was considered old, weak and ineffective, therefore I could say the security breach that TJX had experience was a resulted by using a cheap and inexpensive wireless Wi-Fi network like the Wired Equivalent Privacy (WEP) encryption system, which make it easy for hackers to navigate. This is why it is important that TJX should have invested in using the wireless Wi-Fi Protective access 2 (WPA2) The Wi-Fi Protected Access 2 (WPA2) standard in conjunction with a sophisticated encryption system could have been used to replace the WEP. In that situation an effective firewall would have prevent unauthorized users from accessing private networks, meaning firewall acts like a gatekeeper who examines each user’s credentials before access is granted to a network. An effective Firewall could have reduced the ability for hackers to gain access to sensitive information. A data security breach could result a variety of issues some of them could be loosing of confidence...
Words: 436 - Pages: 2
...Get Rich or Die Tryin Albert Gonzalez was a cunning career cybercriminal who once worked on both sides of the law. At one point in his criminal career he actually worked with secret service agents to help take down another hacking ring of several hackers. But Gonzales soon returned to his criminal roots soon after the sting where he would begin to hack into major corporation’s networks in order to steal credit card information. One of these corporations just happened to be TJX. The TJX network was not secure enough from the start. The company was using inadequate wireless security protocols. They used WEP security (wired equivalent privacy) which is easy to crack and a good hacker could break into this type of network security really fast. A hacker with a laptop could simply sit outside the store and break into the network in less than a minute. TJX should have been using the much stronger wireless security protocol WPA (WI-FI Protected Access Protocol). TJX also stored card data improperly. They stored credit card information such as pin codes and cvc codes which are on the back of most credit cards. PCI Data security standards states that sensitive data such as the PIN and CVC codes should not be stored. So the company broke protocol by storing this information. Even though a network breach occurred, this vital card information may have not been exposed if it wasn’t stored on the company network. Finally, the stored data was not encrypted. Another PDI protocol was broken by...
Words: 396 - Pages: 2
...attacking in this manner it is an ethical hack. Black box testing is when the attack has no knowledge of the internal workings of the system. This type of testing would be done in a penetration test. A gray test the attacker has some knowledge of the system they are trying to access. White box testing is when attacker has full knowledge of the system they are trying to gain access to. White box testing would be more of a vulnerability test. With both types of test being performed it will increase your chances of keeping your network safe. One type of testing would be ok but you would leave yourself open for either a long term or short term problem depending on which method is chosen. (Berkeley, 2014) Question 7-2 WEP stands for Wired Equivalent Privacy. This is a security protocol that is specified in the IEEE Wireless Fidelity standard. It adds security to a wireless local area network that is similar to the security a...
Words: 999 - Pages: 4
...transmit data throughout the stores main computers and for credit card approval. The wireless data is in the air and leaks out beyond the store’s walls. TJX used an encryption code that was developed just as retailers began going wireless. Wired Equivalent Privacy or WEP is a wireless encryption code developed in 1999 that retailers began to implement. Within a couple of years hackers broke the encryption code and rendered WEP obsolete. Many retailers In January of 2007 the parent company of TJMaxx and Marshalls known as TJX reported an IT security breach. The intrusion involved the portion of its network that handles credit card, debit card, check, and merchandise return functions. Facts slowly began to emerge that roughly 94 million customers’ credit card numbers were stolen from TJMaxx and Marshalls throughout 2006. It was believed that hackers sat in the parking lots and infiltrated TJX using their wireless network. Most retailers use wireless networks to transmit data throughout the stores main computers and for credit card approval. The wireless data is in the air and leaks out beyond the store’s walls. TJX used an encryption code that was developed just as retailers began going wireless. Wired Equivalent Privacy or WEP is a wireless encryption code developed in 1999 that retailers began to implement. Within a couple...
Words: 314 - Pages: 2
...Term Paper Christopher Talbott American Public University System Wireless Networks and their Security Risks This purpose of this paper is to discuss the current state of Wireless networks. Their different security features and known issues with wireless technology. As well as how business implement Wireless networks, the different hacking methods used against Wireless networks and its future technological uses. There are many different wireless standards ranging from 802.11b to the new 802.11ac standard. Many manufactures exist with their own unique features for both home and business use. Each Wireless network standard was set forth an agreed upon by the IEEE or Institute of Electrical and Electronics Engineers. “IEEE is the world's largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through IEEE's highly cited publications, conferences, technology standards, and professional and educational activities, ("About IEEE," 2014)”. The IEEE sets forth the standards for each 802.11 standard, starting with 802.11b, which is a “Wireless radio-frequency local area network. 802.11b, adopted Sept. 1999, operates at 11 Mbps in 2.4GHz band. By end of 2000, IEEE to approve backward-compatible 22 Mbps version of 802.11b HR, to be dubbed 802.11b HRb, (Palenchar, J. (2000)”. 802.11b was the first widely adopted Wireless network for home use. Routers and wireless cards...
Words: 1929 - Pages: 8
...in the model answer scheme. 2) The model answer and the answer written by candidate may vary but the examiner may try to assess the understanding level of the candidate. 3) The language errors such as grammatical, spelling errors should not be given more Importance (Not applicable for subject English and Communication Skills). 4) While assessing figures, examiner may give credit for principal components indicated in the figure. The figures drawn by candidate and model answer may vary. The examiner may give credit for any equivalent figure drawn. 5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values may vary and there may be some difference in the candidate’s answers and model answer. 6) In case of some questions credit may be given by judgement on part of examiner of relevant answer based on candidate’s understanding. 7) For programming language papers, credit may be given to any other program based on equivalent concept. MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION (Autonomous) (ISO/IEC - 27001 - 2005 Certified) __________________________________________________________________________________________________ Subject Code: 0815 SUMMER – 13 EXAMINATION Model Answer Page No: 2/ 25 Q.No.1 Answer any eight( 2marks each) a) Define commerce (1 mark) It is the part of business activity which are related to distribution & selling of the goods or exchange of commodities. OR it constitutes sum total of those...
Words: 6703 - Pages: 27
...secure transmission protocols to prevent a catastrophic breach of security. Secure transmissions are put in place to prevent attacks such as ARP spoofing and general data loss. Software and hardware implementations which attempt to detect and prevent the unauthorized transmission of information from the computer systems to an organization on the outside may be referred to as Information Leak Detection and Prevention (ILDP), Information Leak Prevention (ILP), Content Monitoring and Filtering (CMF) or Extrusion Prevention systems and are used in connection with other methods to ensure secure transmission of data. ------------------------------------------------- [edit]Secure transmission over wireless infrastructure Main article: Wired Equivalent Privacy WEP is a deprecated algorithm to secure IEEE 802.11 wireless networks. Wireless networks broadcast messages using radio, so are more susceptible to eavesdropping than wired networks. When introduced in 1999, WEP was intended to provide confidentiality comparable to that of a traditional wired network. A later system, called Wi-Fi Protected Access (WPA) has since been developed to provide stronger security. ------------------------------------------------- [edit]Web-based secure transmission Main article: secure socket layer Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e-mail, Internet...
Words: 586 - Pages: 3
...Checkpoint - TJX Companies IT/205 March 1, 2013 Checkpoint - TJX Companies This week’s checkpoint deals with the credit card data theft at TJX companies which occurred in July of 2005. According to the book Essentials of MIS, the thieves used a vulnerable wireless network from one of the department stores on the TJX network to gain access. (Laudon & Laudon, 2011, p. 243) After the thieves had access to the network the installed a sniffer program on one of the main computers of the network. They then were able to download any information that they needed to. The TJX Company was still using outdated weak wireless security encryption called WEP, (Wired Equivalent Privacy), instead of upgrading to a more secure version of wireless security, WPA, (Wi-Fi Protected Access). They also did not have any firewalls or data encryption in place. (Laudon & Laudon, 2011, p. 243). The tools that was needed to be in place to help stop this from happening was, the stronger wireless security of Wi-Fi Protected Access (WPA) standard with more complex encryption, they also needed to install strong firewalls, data encryption on computers, and to transmit credit card data to banks with encryption. This breach had some lasting effects on the TJX Company. One of the first effects was that the company had to strengthen the company’s information system security. They also had to agree to have a third-party auditor review their security measures every two years for the next twenty years...
Words: 388 - Pages: 2
...Get Rich or Die Tryin’ ITT Technical Institute Michael Sheldon 10-30-13 Get Rich or Die Tryin’ The IT security breach, caused by one Albert Gonzalez and his accomplices, is one of the most expensive lessons in corporate data security policies. For TJX this is more so as it is not only just that, it’s a black spot on the companies security record and has earned quite the problem as people no longer trust the company due to just how many security issues came to light with Albert’s breach. The TJX stores were foolishly using the relatively weak Wired Equivalent Privacy (WEP) protocol instead of updating to the stronger Wi-Fi Protected Access (WAP) protocol, making it much easier for the breaches to occur. However, the real damage came from the fact that the intruders were able to access the TJX internal systems, being able to move around freely for almost two years. The breaches occurred from the middle of the year 2005 and ran through December 2006, while an estimated 47.5 million records were stolen during that time period. TJX’s other security problem was because they allowed the hackers free roam for pretty much 18 months, showing the company didn’t keep proper traffic logs for their system, the company being unable to find them due to the need to look through all of their systems to try and determine just who it was that took what data, from where, where it was sent, and so on. Because of this, the investigation into the matter took...
Words: 625 - Pages: 3
...NGN 110 – Recitation 11- Group 04 COE Lab Report Ammar Mahmoud b00059988 Dona Praveena g00060450 Lamis Kayyaal g00060188 Majd Alkhatib b00059274 Shakil Khan b00058548 Mr. Naveed Nawaz Monday, November 10, 2014 Table of Contents Introduction………………………………………………………… 03 Question responses …………………………………………………04 Conclusions………………………………………………………… 06 Introduction Computer Engineering (COE) is the practice of designing, developing and building computers. It incorporates ideas from its own field and several other engineering fields to construct fast compact and efficient computer systems. COE's main concentrations include cyber security, artificial intelligence and networking. In the COE lab, three applications of COE were demonstrated: The first one was a video showing the control of electric train collision, where an FPGA (Field Programmable Gate Array) system was used to avoid collision between two trains that had a common track. Switches controlled by sensors (which detect the position of the trains on the tracks) were used to stop a train while the other train moved through the common track. In the second demonstration, an FPGA based camera module was used to stream live video. A camera was used to capture data which the FPGA then converted into RGB (Red, Green and Blue) format for viewing on an LCD monitor via a VGA port. In the third demonstration, an EA Series Router was configured to its basic settings using a PC after which the...
Words: 929 - Pages: 4
...Backtrack 5 : step by step WEP hack 1) first open terminal dan type airmon-ng 2) airmon-ng start (interface) e.g : airmon-ng start wlan0 ============================================ Found 5 processes that could cause trouble. If airodump-ng, aireplay-ng or airtun-ng stops working after a short period of time, you may want to kill (some of) them! PID Name 1438 dhclient3 1507 dhclient3 1616 wpa_supplicant 1625 dhclient 1644 dhclient Process with PID 1507 (dhclient3) is running on interface wlan0 Process with PID 1616 (wpa_supplicant) is running on interface wlan0 Process with PID 1644 (dhclient) is running on interface wlan0 Interface Chipset Driver wlan0 Broadcom b43 - [phy0] (monitor mode enabled on mon0) ================================== 3) airodump-ng (monitor mode) e.g: airodump-ng mon0 ======================================== CH 1 ][ Elapsed: 0 s ][ 2012-07-29 01:26 BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID 34:08:04:FD:7A:F3 -71 26 171 64 1 54 WEP WEP Nenas BSSID STATION PWR Rate Lost Frames Probe 34:08:04:FD:7A:F3 00:1A:73:27:37:CD 0 0 - 1 0 2 Nenas 34:08:04:FD:7A:F3 D0F:9A:84:E3:94 -70 0 -54 0 8 34:08:04:FD:7A:F3 00:1E:65:A2:A5:4A -71 0 -36 0 163 ======================================== 4)press ctrl+c (to stop the process) type= airodump-ng -c (channel CH) -w ( your file name) --bssid (bssid) (monitor mode) e.g: airodump-ng -c 1 -w ayam --bssid 34:08:04:FD:7A:F3 mon0 =============================================== ...
Words: 663 - Pages: 3