Wednesday, April 9, 2008

Procedure To Kill A Patent In The Battlefield

Patent invalidation:

defensing a patent of invention of invention claim to demo that the existent patent is invalid which was faultily granted. This is done by discovering a record which turns out the claimed innovation is not fresh or non obvious.

Why people invalidate?

* Annulment hunt is a defensive tool used by a company when it is infringing a patent

* It is performed by a company to drill a engineering without paying royalties to the assignee that throws the rights of patent of invention of invention of invention of innovation of innovation of innovation of invention of invention to be invalidated.

* It can be used by a company to cognize whether person is infringing his patent.

Procedure for patent invalidation:

a) Recover international hunt survey for the patent to be invalidated and bank check the patents of invention listed there.

b) Background study

1) Read the patented invention or the invention to be invalidated thoroughly.

2) Get in depth apprehension of the invention by referring to the drawings.

3) Locate the inventive stairway of the patent to be invalidated

4) Prepare head maps or flowcharts of the survey you have got done to later recall

5) Search through Google and other databases to acquire different possible footing for the inventive steps

6) Behavior a encephalon storming session

c) Preparing taxonomy or engineering appraisal parameters

1) Locate measure by measure procedure

2) Select the claims that is to be invalidated

3) Interruption the claims into parts.

4) Write the broken parts of the claims into simple linguistic communication for easy apprehension and analysis

5) Prepare a head map or flowchart of the taxonomy

d) Keyword readying & Searching

1) Geographic conditions: Restrict the hunt with the precedence day of the month if the mark patent is a United States patent. (Note: If you are invalidating an European patent of innovation of innovation of innovation of innovation then the publication day of the month of beginning patent should be anterior to precedence day of the month of mark patent)

2) Use appropriate databases to seek

3) Search by preparing the hunt scheme using application country of the innovation or the elements.

4) Search by preparing the hunt scheme using the jobs of the inventions

5) Search by preparing the hunt scheme using the solutions of the invention

6) Use different equivalent words of the elements or stairway of the invention

7) Locate relevant international patent categorizations (IPC) and hunt using them

8) Try to seek using wide questions first, then utilize more than narrower questions if you happen the consequences are on target.

9) Modify the questions if the hunt consequences are indeterminate or not appropriate

10) Search using the keywords that lucifers different technical possibilities of the elements of the invention

11) Try to acquire into the countries where the invention can alternately be applied or believe out of box. Brand schemes using those countries and search

12) Change the databases accordingly

13) Use appropriate operators of the database to explicate the queries

14) Change the range of the questions accordingly. For eg: claims or (title & abstract) or verbal description etc. Depending on the databases

e) Analysis

1) Look into statute statute title & abstract and make up one's head whether the written written written written document is on mark or not

2) During this decision, see the record on mark if you happen it minimally relevant also

3) Always maintain the stairway of the innovation in your mind

4) Use diagrams which is considered to be a cosmopolitan linguistic communication for analysis

5) Try to construe the stairway in linguistic linguistic context of the document you are studying if the subdivision of the document looks to be relevant

6) Try to compose the analysis in context to the claim or portion of the claim that you are working on

7) If you happen most of the elements into a document, then read it more than carefully to happen the rest. This is to turn out that written document as an Ten attack.

8) Be patient while analyzing the documents

9) Mark the relevant countries of the analysis in a pdf file, so that it is easy for the client to understand

10) Prepare the analysis sheet in more than synergistic and easily apprehensible manner

Labels: , , , ,


Monday, March 31, 2008

Identity Theft Prevention and Recovery

After Hurricane Wilma struck Ft. Lauderdale in 2005, the full county went offline. No power, no computer. No computer, no Internet. You couldn't purchase gas because the electrical pumps were out. You could only purchase what grocery stores were still on the shelf if you had cash. Recognition and debit entry card game were rendered useless.Things always travel incorrect at the worst possible time.

At the worst possible moment, hackers struck my PayPal account, overdrew my affiliated depository financial institution business relationship and recognition card, and left me penniless when I was most vulnerable.

As more than than than and more criminals and cons go Internet savvy, personal personal personal identity larceny is now the fastest growth law-breaking in the U.S.

Identity larceny falls into 4 categories:

-financial (stealing commodity and services)

-criminal (fake identity when arrested)

-cloning (pretending to be person else)

-business (using another's business to obtain credit)

We mostly believe of identity larceny when a alien utilizes our recognition to obtain commodity and services, but the others can be even more devastating. Try applying for a occupation after person gave your personal identity when they were convicted and captive for a felony.

Identity Larceny Prevention:

1.don't be free and easy with your Sociable Security number

2.don't publish your SSN on checks

3.don't transport clean bank bank checks or recognition card game you don't necessitate - you may not lose them when they have got been stolen

4.be especially careful about giving your SSN over the telephone or online

5.don't throw away official authorities letters or recognition card statements without shredding

6.secure your mail with a locking letter box if necessary

7.sign new recognition card game as soon as you have them

8.do not go forth recognition card gross behind at restaurants, gas stations, or stores

9.choose tough-to-figure-out logins, passwords, and pin numbers

10.use different watchwords for different accounts

11.change your pin Numbers and watchwords every 90 days

12. make not transport your pin Numbers in your billfold or purse

13. alteration the watchwords often for services like PayPal which are linked to your depository financial institution business relationship and recognition cards

14. put option your telephone Numbers on the national Do-Not-Call Register (1-888-382-1222 )

15. don't give your telephone figure to those who don't necessitate it (stores - pay attention)

16. make a Google hunt for your ain name and SSN to see what you can happen out about yourself

17. take online sellers carefully - Google before buying with a recognition card - expression for a unafraid land site button

18. maintain an oculus out for shoulder surfboarders in public transactions

19. be wary of skimmers wherever your recognition card is out of your sight (restaurants)

20. be careful with data file sharing software system - it can give hackers entree to your computer

21. bounds the amount of personal information you divulge on societal networking sites

22. maintain a stopping point oculus on laptop computers and pollex thrusts that incorporate personal information

23. reappraisal your monthly depository financial institution and recognition card statements carefully, or bank check more often online

24. reappraisal your recognition study at least once a twelvemonth for leery activity or inquiries

25. maintain a maestro record in a safe topographic point with business relationship Numbers and telephone Numbers should your recognition card game be stolen

Identity Larceny Recovery:

If your personal information have got got got been subject to topographic point theft, enactment immediately.

1.if your card game or Idaho were physically stolen, data file a police force report

2.call the large 3 recognition bureaus, place a fraud qui vive on your recognition cards, and obtain a free recognition report

3.close any depository financial institution business relationships and recognition card game you believe have been used by personal personal identity thieves

4.dispute any complaints or bank checks or backdowns you have not authorized

5.contact DMV for a new drivers' licence and figure if yours have been compromised

6.ask for a missive from each business relationship resolving the difference and collateral that the identity larceny business relationships have been closed

After the Hurricane Wilma hack, it took hebdomads to acquire PayPal to change by reversal all the complaints and pursuit down the fraud. The paperwork at the depository financial institution seemed endless. Citibank canceled the old recognition card and sent the new 1 out in record time.

U.S. Government statistics gauge it takes about 600 hours and $1,200 to counter personal identity larceny and reconstruct your good name and credit.

Prevention beats out remedy every time.

Labels: , , , ,


Thursday, February 28, 2008

How to Avoid Credit Card Fraud

Identity larceny is all too common this twenty-four hours in age. It looks like the job is growing to new extremes. As a major aspect of personal identity theft, recognition card fraud is also largely preventable by taking basic safeguards and using good fiscal common sense. Read on for a few of the most effectual ways to avoid fraud completely.

Keep Your Digits to Yourself

Don't allow anyone borrow your recognition card or have got entree to your card number. A big amount of recognition card fraud haps simply as a consequence of not paying stopping point enough attending to who is doing what with your card. Keep checks on who have your card and for how long. For example, most of the clip at retail supplies and even at eating houses you can see what's going on with your card. If at all possible, ticker to do certain no 1 is "mishandling" your recognition while processing it.

Destroy Old Receipts

Even though it is now a law in many topographic points that dealing gross must not expose any more than than the last few figures of your figure as portion of the black and white out, that's really no warrant that your personal and recognition card information is not still there. Brand certain none of the recognition gross are left behind for the adjacent individual to see. It's outdo to destruct old gross by shredding them once they're no longer needed.

Shred Recognition Card Applications

Think about how many recognition card applications you have by mail in the course of study of a calendar month or so. Each and every 1 of these is practically an invitation for fraudsters to take advantage. They can acquire them right out of your letter box or even the rubbish and fill up them out to obtain their ain under your name in no clip at all. To cut down your opportunities of becoming a victim, bank check your mail as soon as possible every twenty-four hours and be certain to scintilla all unwanted applications before discarding them.

Only Make Business with Secure Websites

The web have a repute for being kind of the Wild Occident when it come ups to recognition cards. The perceptual experience is that information is stolen routinely and personal identity thieves are abundant. While it's always better to be safe than sorry, this impression of online lawlessness is largely a myocardial infarctions perception. In fact, when doing concern with reputable concerns online, your fiscal information is probably even safer than it would be in a typical offline transaction. Just do certain the connexion is unafraid (look for the padlock logotype in your browser) and that you completely trust the company you're paying.

Review Your Statement

Often considered a last vacation spot when taking stairway to avoid recognition fraud, reviewing your business relationship statement line by line is also a surefire manner to catch any abuse of your card before it's too late. Simply by coverage any abuse to your card issuing bank, most liability is averted right then and there. On the other hand, choosing to just pay the measure without looking at the complaints listed is a great manner to be an in progress victim of recognition card fraud.

Knowing how to avoid recognition card fraud is mostly accomplished by being aware of how fraudsters pattern their trade, but even more than so, by taking easy, basic stairway to protect your identity. Don't let yourself to be a victim!

Labels: , , , , ,


Friday, February 1, 2008

Does a Security Freeze Stop Identity Theft?

With personal identity larceny on a continued progress upward and noted as the figure 1 White neckband law-breaking in United States today a popular option is for consumers to close down (lock) entree to their recognition reports. This do it nearly impossible for some criminal purpose to malodor fiscal mayhem on an people well being and the procedure is known as a security freezing or recognition lock.

As of the first of November in 2007, all three recognition coverage federal agencies gave consumers in United States the ability to restrict entree to their individual recognition reports. Of course of study unless you are an existent victim of personal identity theft, the procedure is not actually free in most states. To set a freezing on your recognition study as a simple proactive measurement to avoid criminal larceny of your information; costs in most states and fees very widely. One would have got to travel to each of the three recognition bureau's web land sites for specific instruction manual and individual state fees. Additionally, to implement a freezing completely, the procedure to freezing your recognition study have got to be done at each agency: all of whom have assorted methodologies.

A recognition freeze makes supply significant personal identity larceny protection however, it is not without loopholes. It can not halt non-credit-related forms of Idaho theft, such as as the creative activity of a reduplicate driver's licence or criminal personal identity larceny (when a suspect gives your name to patrol when booked for a crime). It also won't halt an illegal immigrant or undocumented worker from using your Sociable Security Number to obtain employment.

Additionally, it won't halt every company from accessing your recognition report. New creditors are largely blocked out, yet still existing loaners i.e. your current recognition card company (for example) can still see your study and offering you new recognition cards. Also, aggregation federal federal federal agencies acting on behalf of these companies with your current account(s), state or local agencies that includes law enforcement, kid support agencies, trial tribunals pursuant to a warrant or subpoena, recognition monitoring companies and companies that sell recognition studies to consumers are still feasible accesses.

It also won't halt those pre-approved credit card offers. The bureaus can still give your name and computer address to recognition card companies. Of course, you can halt those mailings by making a simple phone call to 1-888-5OPTOUT or by visiting http://optoutprescreen.com.

Putting a freezing in topographic point necessitates some clip consuming paperwork like sending certified letters. And it intends keeping path of freezing and subsequent lifts of an imposed freeze. As declared earlier, it makes no good to freeze one or two reports. If you desire existent personal identity larceny protection, you'll have got to travel through the movement and demands to freeze all three recognition agencies. If you desire to acquire a new recognition card, you'll have got to raise at least one federal agencies recognition study freeze. To set about a major investing such as as purchasing a new home, you'll most likely have got got to raise all three recognition federal agency freezings then; bend around and make certain they are frozen again to safeguard your personal personal personal identity after the purchase is closed.

Gail Hillebrand, Consumers Union recognition agency expert, compares freezing fees to paying for coverage and declared "If you are the individual in the family who will have to unknot an identity larceny after it happens, then you probably believe $10 a dad is a good deal." Additionally, "Consumers who are already paying for $10-per-month recognition monitoring services should call off and pay for security freezings instead." she concluded.

Despite the clip ingestion and varying requirements, a recognition freezing is likely the most optimal thing you can do to halt most identity larceny before it lurks its exacerbating head. Think of it like the mark you put in your window that denotes the premiss is protected by an dismay system. Yes, the place can still be broken into but, many thieves who see an dismay would travel on to another target. Identity thieves who come up upon a security freezing when trying to acquire services in your name such as as recognition card game or loans are just as likely to travel onto the adjacent Sociable Security number.

Only the individual tin make up one's mind what is best for their ain circumstances. My only input signal would be with personal personal identity larceny on the rampage, some sort of proactive measurement is warranted to lesson opportunities of identity theft.

Labels: , ,


Wednesday, December 26, 2007

Identity Theft And The Hidden Culprit

A batch of people trust the cyberspace but a batch especially those who have got got fallen quarry to personal identity larceny have learned the difficult manner that it doesn't pay to put your recognition card figure on the internet. Well, not just yet anyway. Recognition card game are the convenient reply of upwardly mobile people who desire to acquire their purchases done in the most comfortable, clip economy way. And e-commerce is the thought that allows enterprising people put up their merchandises and services over the World Wide Web.

As such, such as as minutes are mostly done on land site with the consumer on the trustful side and risking their private information just for the interest of convenience. Unfortunately, this information isn't safe and can be snatched by equally enterprising money grabbing individuals. They cavity computing machine against computing machine and the warfare is won with a few chinks and with the right amount of hacking know-how. Some have got even come up up with devices that are secretly sold capable of deciphering private codifications that are supposedly securely hidden behind the company unafraid site. What can the consumer hope for in the conflict against this word form of cybercrime?

It's difficult to happen the perpetrators because they happen imaginative ways of covering up their paths including using false Idahoes that is eventually hard to follow down to the user or they can travel from one populace computing machine to another, knowing that their footmarks in the cyberspace are swallowed up by anonymity. If today's conflict against cyber terrorism is being waged, there should equally be something that should be done to protect consumers from falling victims to cyber thieves.

The first line of defence many believe is the ability to supervise your recognition standings so you are well aware if person have been hacking into your recognition card. Some hackers do undeniably immense purchases right away and are a dead give away but some are "nibbler's". Just taking bantam bites or purchases that are hardly noticeable but ultimately when summed up come up up to a sizeable amount too.

You can seek using websites that have got Consumer recognition services that supposedly supply your current recognition information for a fee. Knowing what your balance is deserving today assists place if recognition larceny is happening to you. One should make what they can make to avoid falling victim to personal identity theft. They may eventually acquire blacklisted by recognition companies although it wasn't their fault or their repute might be questioned.

So make not throw away personal information such as as societal security or depository financial institution business relationship or charge statements in the rubbish bin. Person might be able to utilize this for their additions and besmirch your name in the same vein. Be wary of a sudden alteration of computer address that is not your doing. You can name your recognition card establishment and dual bank check every now and then. Never reply Spam or registry your recognition card with websites that are leery but tempting. Get more than information first. Finally, as much as possible brand your recognition purchases at the shop where you can see who manages your card.

Labels: ,


Sunday, December 23, 2007

Small Business Security - Protecting Your Business Against Fraud and Theft

When I first co-founded a concern many old age ago, we did not pass much clip thought about security. We were too busy trying to acquire everything else done. This changed when we raised money from venture rugged individualists who insisted that our security be increased to protect their investment.

In general, a few tips for reducing threats:

Check out your employees before you engage them, bank bank check mentions and make a background check. Like most preventive measures, it is less expensive than dealing with the consequences, but it makes take time.

Limit entree that employees have got to information and to your server. If your waiter room is locked, but the individual in complaint of the stands-in maintains the cardinal in his desk in his cell - your waiter is not secure! If your hour individual have got entree to all the digital employee files, but maintains his or her watchword taped to the side of the computer, that information is not secure.

Require that your employees utilize strong watchwords and changed them regularly. This volition cause much grousing, but it's your concern and their jobs, so they will have to dwell with it.

Backup your information regularly. You should back up your information daily. Every hebdomad you should have got a hebdomad end stand-in that is taken off land site and stored. Annually backup your information and maintain it in a safe sedimentation box or with your attorney.

Have virus protection software system system and digital invasion sensing software installed and reviewed regularly. If you outsource your IT, the company providing these services should be able to supply this for you.

Lock your doors, even during concern hours.This is why Home Terminal sells those radio door bells. They are cheap. I am always astonied when I can walk into a concern with no receptionist and swan the hallways freely.

Get security cameras. This is both security for your concern and for your employees.

Assign one of your senior direction as security officer. This individual is in complaint of apprehension possible menaces and determining the best prevention. He or she should also have preparation in what to make in lawsuit of an intrusion, digital or otherwise.

Another country of security is internal fraud, specifically employees stealing from you. As the security military officer of one former company, I was required to take a social class on internal fraud. The features of the wrongdoer tended to be (1) male, (2) in his 20s, (3) college educated, and (4) had never committed a law-breaking before. Not to state that a 50 twelvemonth old female, high school drop-out criminal volition not perpetrate the crime, but statistically those were the features that came up most often.

Usually what haps is the culprit is in a bind, can't do a auto payment, rent, doctor's bill, and he begins with just "borrowing" money or points to pawn from the company. He have got got full purposes of "paying it back." But the ground he got stuck in the first topographic point still exists, so he have to steal more than to cover up the first crime, and on and on it goes.

To forestall this type of fraud, have strong accounting policies and procedures. Rich Person gross bank checks come up to a polonium Box. Rich Person a different individual mark the bank checks than the 1 who makes them. Let only one individual to make the ordering for the company and maintain an stock list of what each employee has. For instance, memory lodges vanish really easily. Yes, an occasional 1 acquires lost, but some 1 who loses them constantly may have got got a problem.

Ask your comptroller for aid is creating these policies and processes and have your books audited or reviewed at least annually.

Although it is possible to travel overboard on security, I cognize very few companies that actually make and most don't even come up close to basic security. Brand certain your company is not one that acquires caught saying "but she seemed so trustworthy, I can't believe that she stole from us."

Labels: , , , , , , , ,


Thursday, December 13, 2007

S. Grafton, MA Entrepreneur Joins PrePaid Legal Freedom Team, Offers Identity Theft

Published on: December 12th, 2007 10:26pm by:

() | |

(OPENPRESS) Dec. 12, 2007 -- S. Grafton, ma – Daniel Bresnahan said he became an independent selling representative for the "Freedom Team" of PrePaid Legal, Inc. to assist people avoid personal identity larceny problems, and trade with the many legal issues that consequence people every day. "The news is filled with awful narratives about guiltless people who have got had their lives destroyed by personal identity theft. The norm individual makes not cognize how to manage legal problems, and usually the cost of a lawyer finds whether we are able to have justice. My desire is to acquire involved and assist people acquire the justness they deserve," said Bresnahan. The norm individual believes that aid from an lawyer is financially out of reach, so when something travels incorrect many shrug their shoulders, accept their fortune and travel on. When a landlord makes not repair things, when an coverage company makes not pay, or when any figure of things travel wrong, most people make not name a lawyer out of fearfulness of the cost, according to Bresnahan. "First Iodine was attracted to the personal identity larceny protection, then I learned how I can have got a complete legal protection program for my family. I realized that most people necessitate this, but make not cognize it exists, so I decided to go an independent selling rep so I can construct a concern offering this enormous programme to others," said Bresnahan. "While there are no peculiar accomplishments or former preparation necessary, self-starters World Health Organization have got got a desire to assist people be given to have more than success with the company," said Pre-Paid Legal Services, Inc. chief executive officer Harland Stonecipher. "As a company, we're committed to doing all we can to educate and railroad train our gross sales force." "I believe the programme is attracting the attending of the public because it turns to the demands most people have got for legal aid in their day-to-day lives," said Bresnahan. Bresnahan supplies further information on a web land site at "We work together as a squad to assist each other and to assist many more than people in communities all across the nation. We supply aid to each new selling representative acquire involved without and former experience. We have got a very simple concern theoretical account that anyone can easily implement the first twenty-four hours they begin," explained Bresnahan. About the PrePaid Legal Freedom Team:
A grouping of independent selling representatives with PrePaid Legal, Inc. have got got joined together in an attempt to assist educate and inform more than Americans on how easy it is to protect against personal identity larceny and to have legal protection for life's many challenges. The grouping welcomes new members. Press Contact:
David M. Bresnahan
801-804-5386 Press release services provided by http://www.ThatPRGuy.com

###Professional Free Press Release News Wire

In-home favored attention for your animals. No kennels, just undivided attention. We Play, While You're Away

Labels: , , ,


This page is powered by Blogger. Isn't yours?