So-net無料ブログ作成
  • ブログをはじめる
  • ログイン
明細書研究 ブログトップ

クレーム中の選択的表現に関する問題 [明細書研究]

[問題]

下記の【イ号製品(侵害被疑製品)】、【対象特許の請求項1の記載】、および【対象特許の実施例の記載】を読み、下記のイ号製品(侵害被疑製品)は、下記の対象特許の請求項1を侵害するか考察せよ。


【イ号製品(侵害被疑製品)】

A手段と、
α機能を実現するB手段と、
C手段とを備えた、情報処理装置。


【対象特許の請求項1の記載】

A手段と、
α機能、β機能、またはγ機能を実現することが可能なB手段と、
C手段とを備えた、情報処理装置。


【対象特許の実施例の記載】

・・・
本実施の形態にかかる情報処理装置は、A処理を行うAユニットと、B処理を行うBユニットと、C処理を行うCユニットとを備える。

Bユニットは、α機能、β機能、およびγ機能を実現することが可能である。ユーザがキーボードを用いてα機能を呼び出したときに、α機能が実現される。ユーザがキーボードを用いてβ機能を呼び出したときに、β機能が実現される。ユーザがキーボードを用いてγ機能を呼び出したときに、γ機能が実現される。
・・・

 (注:α機能のみを実現することができ、β機能およびγ機能を実現することができないBユニットに関する記載は実施例にはされていない。)


椿特許事務所
弁理士TY

米国明細書研究 No.3(4/4) [明細書研究]

米国明細書研究
USP 7,346,929
Method and apparatus for auditing network security
「DETAILED DESCRIPTION OF THE INVENTION」

【特徴】

(1)書き出しの第一パラグラフ。"invention"と"a embodiment"との差は意識して明細書を書くこと(禁反言など注意する)。

(2)'the meaning of "the" includes plural references, the meaning of "in" includes "in" and "on."'の記載。英文契約書・英文明細書などの英語。

(3)"global computer network" includes the Internet.
クレームなどに記載された用語の上位概念・下位概念の関係を説明。

(以下、USP7,346,929より)


DETAILED DESCRIPTION OF THE INVENTION

A preferred embodiment of the invention is now described in detail. Referring to the drawings, like numbers indicate like parts throughout the views. As used in the description herein and throughout the claims, the following terms take the meanings explicitly associated herein, unless the context clearly dictates otherwise: the meaning of "the" includes plural references, the meaning of "in" includes "in" and "on." Also, as used herein, "global computer network" includes the Internet. A "secure application server" could include any digital machine that controls a computer communication and includes security features that inhibit unauthorized access.


[TY]

米国明細書研究 No.2(4/3) [明細書研究]

米国明細書研究
USP 7,346,929
Method and apparatus for auditing network security
「SUMMARY OF THE INVENTION 」

【特徴】

(1)日本実務でよくあるように、全てのクレームをコピーして記載する必要はない。出願時点で、主観的に発明と思うところを記載すればよい。SUMMARYを充実させるよりは、むしろ実施例を充実させるべき。(prosecutionの段階でクレームが補正されると、米国の実務では、claimされた発明とsummaryは必然的にずれてゆく)
(2)日本出願で、実施例ではなく「summary(手段)」の欄に様々な重要事項を記載する、というやり方がある。クレームサポートを明確にするなどの観点からは意義があるが、外国出願を行なうときにその記載をどう処理するか考える必要がある。手続きのストリームライン化(効率化)の観点からは、「日本国内専用の明細書」を作成するよりは、世界標準として使える明細書を考慮して日本出願を行なった方がよい。
(3)発明の1つの局面は、「aspect」で表現(他にも幾つか表現方法はある)。
in one aspect,
In another aspect,
In yet another aspect, …と展開。
(4)書き出しを、The disadvantages of the prior art are overcome by the present invention which, in one aspect, is an apparatus for...などとしており、前段からうまく繋がっている。
(5)"These and other aspects of the invention will become apparent from the following description of the preferred embodiments taken in conjunction with the following drawings. As would be obvious to one skilled in the art, many variations and modifications of the invention may be effected without departing from the spirit and scope of the novel concepts of the disclosure."の文章に類するものは、各事務所で定型文として保持されている。(ただし、この文がないからと言って不利な取り扱いは受けないものと思う。)
(6)"one skilled in the art"=当業者

(以下、USP7,346,929より)

SUMMARY OF THE INVENTION

The disadvantages of the prior art are overcome by the present invention which, in one aspect, is an apparatus for auditing security of a computer system. At least one secure application server is in communication with a global computer network. The secure application server is programmed to receive selectively security audit instruction data from the remote computer system via the global computer network. A plurality of scanning machines each are in communication with the global computer network and are programmed to execute selectively a security audit scan of the remote computer system via the global computer network. A central computer, having a memory, is configured as a database server and as a scheduler. The central computer is in communication with the secure application server and the scanning machine. The central computer is programmed to perform the following operations: evaluate a database to determine if a security audit scan is currently scheduled to be run for a user; determine which of the plurality of scanning machines is available to perform a security audit scan; copy scan-related information into a scanning machine determined to be available and instruct the scanning machine to begin scan; and record the results of the scan in the memory.

In another aspect, the invention is a method of auditing security of a computer system in which an instruction to perform a security audit scan on a computer system is received from a user via a global computer network. A scanning machine is instructed to access the remote computer system via the global computer network and thereby perform a security audit scan of the remote computer system. At least one result of the security audit scan is reported to the user once the security audit scan is complete.

In yet another aspect, the invention is a method of auditing computer system security in which a database is accessed to determine when a security audit scan of a computer system is to be executed. Upon determining that a security audit scan of the remote computer system is to be executed, security audit scan data is copied into a scanning system, the scanning system is caused to establish communication with the remote computer system via a global computer network and to execute a security audit scan of the remote computer system via the global computer network. A result of the security audit scan of the global computer network is stored and a message is transmitted to a user of the remote computer system that indicates the result of the security audit scan.

These and other aspects of the invention will become apparent from the following description of the preferred embodiments taken in conjunction with the following drawings. As would be obvious to one skilled in the art, many variations and modifications of the invention may be effected without departing from the spirit and scope of the novel concepts of the disclosure.

[TY]

米国明細書研究 No.1(3/31) [明細書研究]

米国明細書研究
USP 7,346,929
Method and apparatus for auditing network security
「Description of the Prior Art」

【特徴】

先行技術は、短く簡潔に記載する(admitted prior artによる拒絶を防ぐ観点、PL法の観点などを考慮すること)。
特に、米国法で"prior art"に当たらないものを、"prior art"として記載しないこと。
客観的な事実を記載すること。

becomes more prevalent:より一般的になっている
vulnerability:脆弱性
a dedicated machine:専用のマシン
on command:命令により
there is a need for ...:...のニーズがあった。


(以下、USP7,346,929より)

2. Description of the Prior Art

As use of large computer networks becomes more prevalent, computer security increases in importance. To reduce networked computer vulnerability, many organizations run periodic security audit scans of their computer systems. Such scans typically involve a dedicated scanning machine that attempts to gain unauthorized access to a computer system via a computer network through a variety of methods. The scanning machine will make numerous attempts to gain access and maintain a record of any security breaches that it detects.

Conventional scanning systems perform scans on command and are frequently dedicated to only a single user. Thus, scans are not performed periodically unless the user remembers to activate the scanning machines. Furthermore, many scanning machines are idle for large periods of time.

Therefore, there is a need for a scanning system that periodically schedules security scans of several users.

[TY]
明細書研究 ブログトップ