EDOCD Inventory Management System

1 INTRODUCTION

1.1 PURPOSE

Being better at tracking the stuff you have is a great way to make more money.

When you track your products, you can predict how much you’ll sell in the future, find them faster for your customers, and reorder before you run out of product. How novel!

One of the best ways to do all that tracking, predicting, and reordering is to use an Inventory Management System.

Inventory Management System software is used for tracking inventory levels, orders, sales and deliveries. Companies can use inventory management software to avoid product overstock and outages. It is a tool for organizing inventory data that before was generally stored in hard-copy form or in spreadsheets.

1.2 WHAT IS AN INVENTORY MANAGEMENT SYSTEM?

Inventory management systems track goods through the entire supply chain or the portion of it a business operates in. That covers everything from production to retail, warehousing to shipping, and all the movements of stock and parts between.

Practically, it means a business can see all the small moving parts of its operations, allowing it to make better decisions and investments. Different inventory managers focus on different parts of the supply chain—though small businesses are usually more interested in the ordering and sales end of the chain.

1.3 ADVANTAGES OF ERP INVENTORY MANAGEMENT SOFTWARE

There are several advantages to using inventory management software in a business setting.

Cost savings
A company’s inventory represents one of its largest investments, along with its workforce and locations. Inventory management software helps companies cut expenses by minimizing the amount of unnecessary parts and products in storage. It also helps companies keep lost sales to a minimum by having enough stock on hand to meet demand.

Warehouse organization
As businesses move away from pen and paper processes to automated solutions, visibility becomes a key factor in inventory management.

Inventory management software can help distributors, wholesalers, manufacturers and retailers optimize their warehouses. If certain products are often sold together or are more popular than others, those products can be grouped together or placed near the delivery area to speed up the process of picking.

By 2018, 66% of warehouses “are poised to undergo a seismic shift, moving from still prevalent pen and paper processes to automated and mechanized inventory solutions. With these new automated processes, cycle counts will be performed more often and with less effort, increasing inventory visibility, and leading to more accurate fulfillment, fewer out of stock situations and fewer lost sales. More confidence in inventory accuracy will lead to a new focus on optimizing mix, expanding a selection and accelerating inventory turns.”

Updated data
Up-to-date, real-time data on inventory conditions and levels is another advantage inventory management software gives companies. Company executives can usually access the software through a mobile device, laptop or PC to check current inventory numbers. This automatic updating of inventory records allows businesses to make informed decisions.

Data security
With the aid of restricted user rights, company managers can allow many employees to assist in inventory management. They can grant employees enough information access to receive products, make orders, transfer products and do other tasks without compromising company security. This can speed up the inventory management process and save managers’ time.

Insight into trends
Tracking where products are stocked, which suppliers they come from, and the length of time they are stored is made possible with inventory management software. By analysing such data, companies can control inventory levels and maximize the use of warehouse space. Furthermore, firms are more prepared for the demands and supplies of the market, especially during special circumstances such as a peak season on a particular month. Through the reports generated by the inventory management software, firms are also able to gather important data that may be put in a model for it to be analyzed.

2 PARTS OF INVENTORY MANAGEMENT SYSTEM

2.1 LOGGING ON AND LOGGING OFF

2.2 MANAGING USERS

2.3 MANAGING INVENTORY

2.4 MANAGING ACCOUNTS

2.5 MANAGING MATERIAL RECEIPT ENTRY

 

2.6 MANAGING MATERIAL ISSUE TO UNIT

2.7 MANAGING ITEM LEDGER

What is SSL and why you need it now?

Data transferred in plain-text form or in non-encrypted format can be intercepted, eavesdropped, compromised and stolen. Transactions performed online may involve submitting personal information such as credit card information, social security numbers, usernames and passwords. Cybercriminals who intercept unencrypted communications will gain full access to this data and can use it for fraudulent purchases and activities.

Trust and security are what make individuals sufficiently certain to give private, sensitive data on the web. SSL authentications are what make a site trusted. SSL stands for Secure Sockets Layer, the protocol which provides encrypted communications between a website and an internet browser. SSL Certificates are small data files that digitally bind a cryptographic key to an organization’s details and are typically installed on pages which ensure that any data transferred between users and sites, or between two systems remain impossible to read. It safeguards sensitive data being sent between two systems like credit card details or passwords, exchanged during each visit, which is called a session, from being intercepted from non-authorized parties. The two systems can be a server and a client (for example, a shopping website and browser) or server to server (for example, an application with personal identifiable information or with payroll information).

HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL certificate. The details of the certificate, including the issuing authority and the corporate name of the website owner, can be viewed by clicking on the lock symbol on the browser bar.

How it works:

The Secure Socket Layer protocol was originally created by Netscape. The protocol uses a third party, a Certificate Authority (CA), to identify one end or both end of the transactions. Let see how it works:

  • A browser requests a secure page (usually https://).
  • The web server sends its public key with its certificate.
  • The browser verifies that the certificate was issued by a trusted party (more often a trusted root CA), that the certificate is as yet legitimate and that the certificate is identified with the site reached.
  • The browser at that point utilizes public key, to scramble a random symmetric encryption key and sends it to the server with the encoded URL required and additionally other encoded http data.
  • The web server decodes the symmetric encryption key utilizing its private key and uses the symmetric key to unscramble the URL and http data.
  • The web server sends back the asked for html archive and http information scrambled with the symmetric key.
  • The program decodes the http information and html report utilizing the symmetric key and shows the data.

Thus the encryption using a private key/public key pair ensures that the data can be encrypted by one key but can only be decrypted by the other key pair. The keys are comparative in nature and can be utilized on the other hand: what one key encode, the other key pair can decode. The key pair depends on prime numbers and their length as far as bits guarantees the trouble of having the capacity to unscramble the message without the key sets. The trick in a key pair is to keep one key mystery (the private key) and to circulate the other key (the public key) to everyone. Anyone can send you a scrambled message, that lone you will have the capacity to decode.

Type of Certificates:

There are three basic sorts of certificates. Picking the correct one will be based on the level of security your site needs, for example domain-validated (low in security), organization-validated (medium), extended validation (high); property types you wish to protect (domain, sub-domain) and number of properties for which you need protection (wildcard or multiple domain).

  • Standard SSL & Extended Validation (EV) SSL – Standard SSL and EV SSL are both single-domain SSL (Secure Sockets Layer) certificate but the later ensures highest degree of authentication and requires more evaluation and documentation checks for applicant websites than the other.
  • Multi-Domain SSL – It offers the highest degree of authentication and protection using one certificate for many domains and sub domains.
  • Wildcard SSL – a Subject Alternative Names (SANs) secured Wildcard is a top choice for organizations managing multiple sites hosted across numerous sub domains.

Google’s disciplinary measures for non SSL websites:

For a considerable length of time, Google has been actively looking for approaches to urge site proprietors to actualize SSL certificates. Earlier Google follows a reward scheme in which it began ranking websites higher in search results if they had an SSL Certificate installed. At that time, SSL certificate was mandatory for web based business sites that acknowledged online buys and took users credit card details.

Recently, Google has moved from a reward system to a punitive one. Few months back, Google was blacklisting non-HTTPS websites that allowed password fields and credit card forms to be filled. From October, 2017 onwards Google Chrome browser began showing a “not secure” message on all websites that were running without an SSL certificate. In any case, with site security more essential than any time in recent memory, Google has chosen to “drive” all website owners to include this additional level of security, or pay the cost.

We’re here to help

If you’d like to talk further about your website’s security and how this might impact your business, we’re always available to help. Contact our office and speak to one of our friendly consultants should you have any questions.

References:

  1. http://www.tldp.org/HOWTO/SSL-Certificates-HOWTO/x64.html
  2. https://www.instantssl.com/ssl-certificate.html

 

 

Ease of building Patent Search Platform now with Google Patents Public Datasets

Now patent data got cheaper with the launch of new Patents Public Datasets by Google based on the company’s owned enterprise data warehouse BigQuery, which gathers openly available, associated database tables for exact investigation of the worldwide patent framework.

Enterprises often keep up accumulations of private information about patents, for example internal tagging system that compares to particular product offerings, and they need to associate that data with other patent datasets to create reports and examine speculation zones. Now organizations can consolidate their private information with open and paid datasets to ask “what are my active patents and pending patent applications?”, “which of my patents in what technological areas are lapsing soon?” or “what are the best organizations that refer to the patents I’ve labeled with [widget #57]?”.

Patent data availability is basis for analyzing new patents, illuminating open approach choices, overseeing corporate interest in protected innovation, and advancing future logical advancement. The developing number of accessible patent information sources implies specialists frequently invest more energy downloading, parsing, stacking, matching up and overseeing nearby databases than leading examination. With these new datasets, specialists and organizations can get to the information they require from different sources in a single place, in this way investing more energy in examination than data preparation.

3

Table ID patents-public-data:patents.publications
Table Size 780 GB
Number of Rows 90,740,599
Creation Time Oct 27, 2017, 6:22:47 PM
Last Modified Oct 27, 2017, 6:22:47 PM
Data Location US
Labels NoneEdit

 

Table Details: publications

Refresh Query Table Copy Table Export Table Delete Table

publication_number STRING NULLABLE Patent publication number (DOCDB compatible), eg: ‘US-7650331-B1’
application_number STRING NULLABLE Patent application number (DOCDB compatible), eg: ‘US-87124404-A’. This may not always be set.
country_code STRING NULLABLE Country code, eg: ‘US’, ‘EP’, etc
kind_code STRING NULLABLE Kind code, indicating application, grant, search report, correction, etc. These are different for each country.
application_kind STRING NULLABLE High-level kind of the application: A=patent; U=utility; P=provision; W= PCT; F=design; T=translation.
application_number_formatted STRING NULLABLE Application number, formatted to the patent office format where possible.
pct_number STRING NULLABLE PCT number for this application if it was part of a PCT filing, eg: ‘PCT/EP2008/062623’.
family_id STRING NULLABLE Family ID (simple family). Grouping on family ID will return all publications associated with a simple patent family (all publications share the same priority claims).
title_localized RECORD REPEATED The publication titles in different languages
title_localized.text STRING NULLABLE Localized text
title_localized.language STRING NULLABLE Two-letter language code for this text
abstract_localized RECORD REPEATED The publication abstracts in different languages
abstract_localized.text STRING NULLABLE Localized text
abstract_localized.language STRING NULLABLE Two-letter language code for this text
claims_localized RECORD REPEATED For US publications only, the claims
claims_localized.text STRING NULLABLE Localized text
claims_localized.language STRING NULLABLE Two-letter language code for this text
description_localized RECORD REPEATED For US publications only, the description, limited to the first 9 megabytes
description_localized.text STRING NULLABLE Localized text
description_localized.language STRING NULLABLE Two-letter language code for this text
publication_date INTEGER NULLABLE The publication date.
filing_date INTEGER NULLABLE The filing date.
grant_date INTEGER NULLABLE The grant date, or 0 if not granted.
priority_date INTEGER NULLABLE The earliest priority date from the priority claims, or the filing date.
priority_claim RECORD REPEATED The application numbers of the priority claims of this publication.
priority_claim.publication_number STRING NULLABLE Same as [publication_number]
priority_claim.application_number STRING NULLABLE Same as [application_number]
priority_claim.npl_text STRING NULLABLE Free-text citation (non-patent literature, etc).
priority_claim.type STRING NULLABLE The type of reference (see parent field for values).
priority_claim.category STRING NULLABLE The category of reference (see parent field for values).
priority_claim.filing_date INTEGER NULLABLE The filing date.
inventor STRING REPEATED The inventors.
inventor_harmonized RECORD REPEATED The harmonized inventors and their countries.
inventor_harmonized.name STRING NULLABLE Name
inventor_harmonized.country_code STRING NULLABLE The two-letter country code
assignee STRING REPEATED The assignees/applicants.
assignee_harmonized RECORD REPEATED The harmonized assignees and their countries.
assignee_harmonized.name STRING NULLABLE Name
assignee_harmonized.country_code STRING NULLABLE The two-letter country code
examiner RECORD REPEATED The examiner of this publication and their countries.
examiner.name STRING NULLABLE Name
examiner.department STRING NULLABLE The examiner’s department
examiner.level STRING NULLABLE The examiner’s level
uspc RECORD REPEATED The US Patent Classification (USPC) codes.
uspc.code STRING NULLABLE Classification code
uspc.inventive BOOLEAN NULLABLE Is this classification inventive/main?
uspc.first BOOLEAN NULLABLE Is this classification the first/primary?
uspc.tree STRING REPEATED The full classification tree from the root to this code
ipc RECORD REPEATED The International Patent Classification (IPC) codes.
ipc.code STRING NULLABLE Classification code
ipc.inventive BOOLEAN NULLABLE Is this classification inventive/main?
ipc.first BOOLEAN NULLABLE Is this classification the first/primary?
ipc.tree STRING REPEATED The full classification tree from the root to this code
cpc RECORD REPEATED The Cooperative Patent Classification (CPC) codes.
cpc.code STRING NULLABLE Classification code
cpc.inventive BOOLEAN NULLABLE Is this classification inventive/main?
cpc.first BOOLEAN NULLABLE Is this classification the first/primary?
cpc.tree STRING REPEATED The full classification tree from the root to this code
fi RECORD REPEATED The FI classification codes.
fi.code STRING NULLABLE Classification code
fi.inventive BOOLEAN NULLABLE Is this classification inventive/main?
fi.first BOOLEAN NULLABLE Is this classification the first/primary?
fi.tree STRING REPEATED The full classification tree from the root to this code
fterm RECORD REPEATED The F-term classification codes.
fterm.code STRING NULLABLE Classification code
fterm.inventive BOOLEAN NULLABLE Is this classification inventive/main?
fterm.first BOOLEAN NULLABLE Is this classification the first/primary?
fterm.tree STRING REPEATED The full classification tree from the root to this code
citation RECORD REPEATED The citations of this publication. Category is one of {CH2 = Chapter 2; SUP = Supplementary search report ; ISR = International search report ; SEA = Search report; APP = Applicant; EXA = Examiner; OPP = Opposition; 115 = article 115; PRS = Pre-grant pre-search; APL = Appealed; FOP = Filed opposition}, Type is one of {A = technological background; D = document cited in application; E = earlier patent document; 1 = document cited for other reasons; O = Non-written disclosure; P = Intermediate document; T = theory or principle; X = relevant if taken alone; Y = relevant if combined with other documents}
citation.publication_number STRING NULLABLE Same as [publication_number]
citation.application_number STRING NULLABLE Same as [application_number]
citation.npl_text STRING NULLABLE Free-text citation (non-patent literature, etc).
citation.type STRING NULLABLE The type of reference (see parent field for values).
citation.category STRING NULLABLE The category of reference (see parent field for values).
citation.filing_date INTEGER NULLABLE The filing date.
entity_status STRING NULLABLE The USPTO entity status (large, small).
art_unit STRING NULLABLE The USPTO art unit performing the examination (2159, etc).

These datasets incorporates Google Patents Public Data table containing worldwide bibliographic information on more than 90 million patent publications from 17 countries and US full text, provided by IFI CLAIMS Patent Services. Along with this Google is also providing a Google Patents Research Data table containing English machine translations for all titles and abstracts from Google Translate, similarity vectors, extracted top terms, and more. Common research datasets from patents, chemistry, and litigation have also been uploaded. Users can get to data gathered by different analysts and patent information suppliers in a similar database, and blend them with private information to create reports or research queries with the full opportunity of SQL, without setting up their very own database.

1

Commercial Data providers are also making their patent data available for purchase in BigQuery, starting with IFI CLAIMS Patent Data Enrichments including legal status information and standardized assignee names. Accessing these datasets through BigQuery gives users an up-to-date database managed by data providers, so users get the flexibility of a database without the engineering cost of maintaining one. Getting to these datasets through BigQuery surrenders clients a to-date database oversaw by information suppliers, so clients get the adaptability of a database without the designing expense of looking after one.

2

Several third party tools such as Tableau and Looker that can access BigQuery can also be employed which provide much easier interface for accessing database than SQL. For corporate having classified data that cannot leave their network, some of these tools can be used to fetch from the BigQuery and process that in conjunction to sensitive data.

BigQuery for Data Providers

For data providers, BigQuery is an extraordinary approach to pitch information in a right away helpful configuration to clients. The commonplace choices for information dissemination are either in bulk format through CSV/XML downloads, or through a web interface, yet both have drawbacks. Bulk format permit adaptability to the detriment of the client programming and keeping up their own databases, while web interfaces are anything but difficult to get to, however can’t undoubtedly be reached out with new paid or private wellsprings of information, and have a settled arrangement of conceivable approaches to question and show the information. Presently clients can get a similar adaptability of a database with the simple access of a web interface to associate private information and show it in dashboards and other visualization tools.

Source : https://cloud.google.com/blog/big-data/2017/10/google-patents-public-datasets-connecting-public-paid-and-private-patent-data

WIPO और IFPMA कि नई पहल : Pat-INFORMED

आज, WIPO के महानिदेशक, Francis Gurry और इंटरनेशनल फेडरेशन ऑफ फार्मास्युटिकल मैन्युफैक्चरर्स एंड एसोसिएशन (IFPMA) के महानिदेशक Thomas Cueni ने दवाओं के पेटेंट सूचना पहल (Pat-INFORMED) की स्थापना के लिए इस सप्ताह चल रही WIPO कि सदस्य राज्यों की आम सभा के दौरान हस्ताक्षर किए जिसका उद्देश्य दवाइयों की खरीद का काम करने वाली स्वास्थ्य एजेंसियों के लिए पेटेंट जानकारी की पहुंच को बढ़ावा देना है ।

WIPO और IFPMA इस पहल के सह-प्रायोजक हैं और इस पहल का प्रयोजन दवाओं के पेटेंट की जानकारी में स्पष्टता लाना है । यह दुनिया भर से पेटेंट डेटा के आयोजन में WIPO की विशेषज्ञता के साथ इस क्षेत्र से जुड़े उध्योगों का एक संगठित प्रयास है ।

Pat-INFORMED कथित तौर पर एक नए ऑनलाइन वैश्विक Gateway में पंजीकृत दवाइयां को सार्वजनिक पेटेंट की जानकारी से लिंक करेगा, जिससे स्वास्थ्य पेशेवरों को अपने नागरिकों के लाभ के लिए दवा-खरीद करने के लिए दवाओ को खोजने में मदद मिलेगी। यह दवा पेटेंट की जानकारी के लिए एक वैश्विक प्रवेश द्वार के रूप में कार्य करेगा। यह प्रापण निकायों के रोग-प्रबंधन रणनीतियों या अन्य सार्वजनिक स्वास्थ्य की जरूरतों के लिए मंगाए गए उत्पादों से संबंधित पेटेंट के अस्तित्व का निर्धारण करने के लिए नए विकल्प और संसाधनों का सुझाव प्रदान करेगा ।

पेटेंट के बारे में दी गई जानकारी और कई मामलों में पेटेंट आवेदन जो पहले से ही सार्वजनिक हैं लेकिन Data और संसाधन जो सीधे बाज़ार में बिक रहीं पेटेंट दवाओं से जोड़ते हैं वे सामान्य तौर पर केवल चयनित देशों में या निजी Third Party Database के माध्यम से सार्वजनिक तौर पर उपलब्ध होते हैं। कुछ कंपनियां पेटेंट की जानकारी के लिए इस तरह के लिंक प्रकाशित करती हैं, लेकिन कोई सुसंगत दृष्टिकोण नहीं है | 20 प्रमुख वैश्विक शोध-आधारित बायोफर्मासिटिकल कंपनियां पहले से ही पैट-इनफार्म द्वारा स्थापित होने वाले डेटाबेस के माध्यम से जानकारी उपलब्ध कराने के लिए प्रतिबद्ध हैं, और बाकि संगठनो के इसमें शामिल होने की भी उम्मीद की जा रही है ।

2018 के मध्य तक इस ऑनलाइन पहल की शुरुआत होने की उम्मीद की जा रही है | यह पहल कई चरणों में कार्यान्वित की जाएगी | पहले चरण में यह कर्करोग विज्ञान के भीतर आने वाले छोटे अणु उत्पादों ; हेपेटाइटिस सी, हृदय, एचआईवी, मधुमेह, और श्वसन चिकित्सा क्षेत्रों; और WHO की आवश्यक दवाओं की सूची पर कोई भी उत्पाद जो इन चिकित्सा क्षेत्रों में नहीं हैं , के लिए पेटेंट जानकारी प्रदान करेगा । दूसरे चरण में, इसे सभी चिकित्सीय क्षेत्रों में विस्तारित किया जाएगा और जटिल चिकित्साविधानो को शामिल करने का पता लगाया जाएगा।

Thomas Cueni के अनुसार “ Pat-INFORMED के साथ हम राष्ट्रीय और अंतर्राष्ट्रीय दवा खरीद एजेंसियों के लिए पेटेंट की मूल संरचना का उपयोग करना आसान बनाना चाहते हैं। इससे वास्तविक प्रवर्तक कंपनियों के संमुख उठने वाले सवालो पर भी अंकुष पाया जा सकेगा और यह सुविधा दवा पेटेंट मूल्यांकन प्रक्रिया कि अनिश्चितता को भी हटा देगी । साथ ही , यह सरकार के फैसले में सहायता कर सकती है और सरकारी संसाधनों को मुक्त कर सकती है। निश्चित ही इस सामान्य प्लेटफॉर्म को स्थापित करना सादृश्यता सुनिश्चित करेगा, जिससे उपयोगकर्ता की जरूरतों को सर्वोत्तम तरीके से पूरा किया जा सकेगा |

भारत में पेटेंट पर शोध एवं सलाह प्रदाता कंपनी Siddhast IP Innovation के COO श्री रोषन अग्रवाल जी के अनुसार “ WIPO का यह कदम सराहनीय है लेकिन इससे उन कंपनियों का व्यवसाय चुनौती पूर्ण हो जाएगा जो इस तरह का Database अन्य कंपनियों को प्रदान करती हैं | ऐसे में इन कंपनियों को चाहिए की वे अपनी सेवाओ में नवाचार लायें एवं बाज़ार में अपनी पकड़ बनाये रखने के लिए और बेहतर सेवाए मुहिया कराए |“

लेखक : श्री अर्पित अग्रवाल Siddhast IP Innovation में कार्रयत हैं और बौद्धिक सम्पदा के अधिकार के विषय पर शोध एवं प्रकाशन का कार्य करते हैं | श्री अग्रवाल कि रुचि का विषय नए पेटेंट कानून एवं अंतर्राष्ट्रीय पटल पर पेटेंट कानूनों का सद-उपयोग एवं दुर-उपयोग है |

अस्वीकरण : इस लेख में व्यक्त विचार और राय लेखक के हैं और यह कंपनी की आधिकारिक नीति या स्थिति को नहीं दर्शाते हैं । इस लेख में किए गए विश्लेषण केवल उदाहरण हैं |

How to Register IPR in India

According to the World Intellectual Property Organisation (WIPO), intellectual belongings refers to creations of thoughts: innovations; literary and creative works; and symbols, names and pictures used in commerce. It can be bifurcated into two categories :

1. Industrial assets which incorporates patents for innovations, commercial designs, logos, and geographical indications.

2. Copyrights which covers literary works (e.g. novels, poems and many others.), films, music and/or every other creative work.

As an inventor, proprietor or writer of such intellectual assets you have got rights, similar to in case of every other physical property. It prevents every person or entity to apply it without your permission in conjunction with giving due credit or even financial compensation.

To legally put in force such rights, you need to register your invention with the office of controller General of Patents, Designs & Trade Marks under Ministry of Commerce & Industry, Government of India.

File in your application as quickly as possible, as first-to-report rule is of great importance for registration of intellectual property. If two or more applications are identical or comparable only the the foremost application will be given importance for registration.

Patent implies a brand new product or procedure capable of industrial application. The product or procedure need to be a new invention that has not been used earlier than within the public domain. Time period for registered patents in India is 20 years.

Application for registration has to be filed inside the patents office of applicable territorial jurisdiction via the inventor either by self or through assigned legal representative. An important thing to understand is that those rights are territorial in nature and do no extend beyond the jurisdiction for which it is granted. If you want to reserve the IPR in different international boundries, then either you can file the patent application separately in countries of your preference or you can file Patent Cooperation Treaty (PCT) application simultaneously with application in Form-1.

In addition to Form 1 you need to fill Form 2 in which you need to mention the specification of your invention in detail and Form 3 and Form 5 in which you need to mention the details of any foreign filings for the same and a bonafide affirming that the product/process is your invention respectively.

Industrial Design

In accordance to WIPO, an industrial design refers to the ornamental or aesthetic aspects of an article. A design may comprise of 3-D features, such as the shape or surface of an article, or 2-D features such as patterns, lines or color. Industrial designs are applied to wide variety of industrial products containing distinctive features and handicraft items.

There is a separate Design Wing in the patent office under Government of India which oversees the registration process. The process is now online.You need to create an account,fill in the application, digitally sign the form (Form 5 and 44 ) and make the payment.

After the thorough examination, the copyright is granted, and the details of the same are entered into Register of Designs , maintained in the Patent Office. It contains parameters such as Name and address of the Proprieter , Design number, class number , date of filing, etc.

Any person can inspect the register after payment of prescribed fees.

Trademarks

A Trademark mark is a recognizable sign, design, or expression which identifies products or services belongs to or provided by certain individual or some legal entity.

A trademark identifies the brand owner of a particular product or service. Trademarks can also be licensed to others in order to earn revenue or brand proliferation. The unauthorized usage of trademarks by producing and trading counterfeit consumer goods is known as brand piracy. Regulation of Trademarks in India is governed under Trademarks Act, 1999. This Act is in compliance with World Trade Organization recommendations and Trade-Related Aspects of Intellectual Property Rights (TRIPS) Agreement.

You can obtain Trademark from Registrar of Trademark under the Office of Controller General of Patents, Designs & Trade Marks ,Government of India.The validity of Trademark is 10 years and you can again renew that for another 10 years.The Process of registration is now online.

To register follow the link ,create an account,fill in the application ,digitally sign the Form TM-1 and make the payment.

Like registration of Industrial Design, Trademark registration is also limited to certain territorial boundries. The Application is inspected for the uniqueness of the relevant mark ,whether is it enough to distinguish and differentiate an applicant’s good or service and whether it is prohibited for registration under any other law or is identical or similar to any existing marks. On successful grant ,the trademark is included in the Register of Trademark.

In case somebody wants to contest the grant of trademark, same should be intimated to the Office within 4 months from the date of publication in the official gazette.

Some important links:
(1)For e-Filling Patent,Design,GI etc.
(2)For Form and Fees.

Who claims the software, I simply paid to have developed? Who Owns What?

A typical copyright misinterpretation is that if a enterprise pays to have software built up, the software is a work made for hire and is naturally owned by an enterprise. In any case, that is not always true.

Hinging on this confusion can bring about a enterprise not owning software it paid to have developed.

The general rule is that the creator of a copyrightable work is naturally its proprietor. One essential exemption happens if software is created by an employee. In this case, the enterprise — and not the employee — will claim the copyright. Notwithstanding, if the work is developed by a contractor, proprietorship consequently vests in the hands of the same and not the enterprise that paid to have it developed.

logo

For what reason should a enterprise think about copyright possession? The copyright proprietor has boundless opportunity to market and change the work and to keep others from utilizing it. Truant ownership, leads to constrained rights to utilize the product by the enterprise, that was developed for it.

On the off chance if there is no drafted covenant, the copyright remains with the contractor, and the enterprise gets a nonexclusive license to utilize the product according to the understanding of the parties.

There are two critical words here. First, the enterprise entitlement to use the product is nonexclusive, which implies that the contractor can resell the software without paying anything to the enterprise.

Second, the product must be utilized by the enterprise in the way the parties concurred it would be used when the product was developed. For instance, if the product were developed for the interior utilization of the enterprise, pitching it to others would be outside of the extent of the license.

So what are a few things a enterprise ought to consider while hiring a software developer?

Intellectual Property Rights in the software by default belongs to the contractor. On the off chance if the IPR transfer agreement/development agreement do not mention the copyright proprietorship then the IPR belongs to contractor.

Jot down all things in an agreement. Copyrights must be exchanged by particular dialect in a document. Just a normal handshake deal or a verbal comprehension won’t transfer the copyright. Web based software development agreement should incorporate arrangements identified with possession.

Talk about possession right on time in the arrangement procedure. That may influence the cost of the task since the designer might plan to reuse all or part of that product in another venture.

Incorporate confidentiality provisions in the agreement. Custom developed software can contain privileged insights of an enterprise. Negotiate to keep those techniques secret and out of the hands of business competitors after the venture is done.

On the off chance that proprietorship can’t be negotiated, consider acquiring the privilege to utilize the product like a proprietor. Sometimes possession can’t be gotten on the grounds that the product incorporates routines that the contractor reuses in each task. Exchanging possession would mean the contractor would never again have the capacity to utilize those routines itself. Rather, consider consulting for the privilege to utilize and alter the product without constraint.

Ownership of the contractor developed software is crucial and often ignored aspect of the software development/innovator patent agreement. Being aware of the principles of copyright possession can spare the enterprise from numerous conceivable issues that may get apparent long after the product is delivered.

Also see : http://siddhast.com/innovators-patent-agreement

Written By : Arpit Agarwal