首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 406 毫秒
1.
技术产品具有非排他性和非竞争性.完全由私人提供新技术,其供给将显著不足.为激励技术创新,有两种途径:给私人分配产权或者由政府提供公共产品.前者以专利制度为代表,后者以奖励制度为代表.对两种制度进行比较,在批判专利制度基础上形成的各种奖励制度并不优于专利制度.专利制度通过自我调适,可以有效克服其在运行中带来的问题,更好的实现专利制度的社会功能.  相似文献   

2.
钱琨  潘雄锋 《知识产权》2007,17(5):37-42
专利制度作为知识产权制度的重要组成部分,是维护市场经济公平有序竞争,推动和保护技术创新的有力法律制度和有效机制。本文首先从理论上对专利制度促进经济增长的作用机理进行了论述,在此基础上以我国1986年~2006年统计数据为基础,运用计量经济学中回归分析法对我国专利制度促进经济增长的作用机制进行了实证研究。  相似文献   

3.
专利制度是促进技术进步、发展国家经济的利器,同时,专利制度也因其建构的特征而成为知识产权学者追问的对象,而在一切问题中,首先应该解读的是专利制度的缘起.本文从专利制度产生的经济背景、政治背景、思想基础以及立法技术的储备等角度分析1474年<威尼斯专利法>和1623年英国<垄断法>的产生与存在方式,并着重阐明了早期专利制度的对价与衡平机制,认为因对价而衡平的构建是专利权乃至知识产权取得正当性的条件.  相似文献   

4.
国际生物技术保护与中国专利法修改思考   总被引:5,自引:0,他引:5  
生物技术发展对专利制度形成冲击,促使各国不断调整国内专利策略,以保障经济的持续发展与满足新兴产业之需要;比较欧美国家,我国对生物技术的专利保护略显迟滞.本文在论述发达国家对生物技术知识产权保护方式及国际趋势的基础上,对我国专利制度中的转基因生物技术保护问题作出分析,提出修改意见.  相似文献   

5.
专利制度是通过确认和保持发明人对其发明享有专有权及促进技术发明的专项制度。它是市场经济的产物,是推动和保护技术创新的有效的法律机制。专利制度自从我国实施市场经济之后,对于保护我国的知识产权发挥了巨大的作用,但是现行专利制度在实施过程仍然存在着不少问题。本文主要提出了我国现行的专利制度存在的问题,并分析其原因,提出了完善我国专利制度的几点建议。  相似文献   

6.
塞尔登和怀特兄弟两位发明人的专利旧案表明,由于专利制度成本的存在,任何专利理论都必须澄清专利制度究竟带来了何种社会收益。以成本/收益的权衡模式为基础,最经典的激励理论和对价理论对专利制度的论说都不符合发明的本质,也难以解释专利法实践。不同专利理论的政策共识是激励创新,但它们均忽视了创新实践及其范式变迁。依创新范式理论,专利制度在发明、发明商业化和技术扩散等创新过程中均发挥重要的作用,而加速技术扩散不仅是社会从专利制度中获得的收益,更是为开放式创新、用户创新和累积性创新范式所必须。技术扩散在本质上是信息的传播,它的载体是专利文献。对于发展中国家而言,应该强化专利公开充分性条件,以促进技术创新的扩散。  相似文献   

7.
从比较UPOV公约和专利制度着手,系统阐述美国植物新品种保护体系的发展历程,对其深层的政治经济原因进行探讨,同时结合我国目前植物新品种权保护发展现状进行分析,为完善我国植物新品种保护体系提供借鉴.  相似文献   

8.
保护发明创造和利用发明创造是专利制度的两大支柱,而保护发明创造的目的还是为了能有更多更好的发明创造被利用。所以,实行专利制度的根本目的是要充分利用发明创造,使专利技术在生产上得到实施,从而转化为生产力,促进经济建设的发展。要是没有专利的实施,专利技术不能转化为生产力,专利制度就没有存在的必要。可见。专利的实施是专利制度的生机和活力所在。我国实行专利制度以来,专利的实施已越来越为人们所重视。大量的专利技术已进入并正逐步占领我国技术市场,专利技术的许可证贸易已成为整个技术市场的重要组成部分。专利的实施已取得了初步成效。这主要  相似文献   

9.
《现代法学》2019,(2):91-103
我国专利制度中的捐献原则排除了对在说明书中描述但没有记载在权利要求书中的技术方案的保护。这一原则的优点是维护了专利的公示性,让法官适用法律比较明确,但不足是对专利权人过于严苛。为克服这一原则的弊端,美国在司法实践中形成了扩大型再颁专利制度,并在立法中予以承认。扩大型再颁专利可以克服原初专利的瑕疵和捐献原则的僵硬,达致专利的公示性与排他利益之间的动态平衡。我国专利法没有为专利权人设置增加权利要求的救济措施,对那些因疏忽而无法把某些技术方案纳入保护范围的专利权人有失公平,因此建议我国专利法吸收扩大型再颁专利制度。  相似文献   

10.
一、国际化是专利制度发展的必然趋势(一)经济技术的发展决定了专利制度的国际化世界上专利制度的产生和发展从一开始就和经济技术的发展及生产力的发展紧密相连,萌芽状态的专利制度产生于封建社会的末期。随着商品经济的发展,技术在工商业的发展中起着愈来愈重要的作用,从而产生了保护技术发明的必要  相似文献   

11.
罗晓霞 《行政与法》2012,(6):113-116
由于技术秘密权利边界的模糊性和内容的广泛性,现实中有人随意地将一些不属于技术秘密的技术信息纳入技术秘密的范畴请求保护。由此,法院在审理技术秘密的案件中,有必要分清受保护的技术秘密和不受保护的公知技术,将技术秘密留给权利人,将公知技术留给社会公众。在这种平衡过程中,合理确定技术秘密的范围是审理的关键。  相似文献   

12.
李明 《时代法学》2013,11(1):59-66
在新刑事诉讼法中规定技术侦查措施有重要意义。其进步之处是体现了重罪原则、人权保护原则、程序法定原则和必要性原则。其不足的地方是概念不清,条件范围不明确,适用程序模糊,缺乏明确的监督救济程序,对隐藏身份及控制下交付的秘密侦查规定过于原则和抽象,有关技术侦查措施所获得证据庭外核实的规定不足。要坚持合目的性、手段节制原则、程序法定原则。同时,要通过司法解释明确适用程序、救济程序和监督程序。  相似文献   

13.
英国陪审团评议秘密规则   总被引:1,自引:1,他引:0  
陈龙环 《河北法学》2006,24(9):111-116
在英国,陪审团审判不仅是审判手段和宪法的支柱之一,它还显示着自由的存在.陪审团评议秘密规则是英国古老的普通法规则,至今仍然得到判例的认可.该规则的研究可以揭示出丰富的内容.  相似文献   

14.
隐性采访的合法界限   总被引:1,自引:0,他引:1  
李华  蒙晓阳 《河北法学》2006,24(2):72-75
中国的隐性采访虽是新生事物,却越来越普遍.在驳斥"隐性采访否定论"的基础上论证了新闻媒体有权进行隐性采访,前提是没有超出法定界限,没有侵害社会公共利益或他人的合法权益;在驳斥"采访权优先论"的基础上论证了采访权与其他各种权利是平等的,没有优于其他权利的特殊地位;最后从采访的场所、采访内容、采访方式及采访材料的处理等四个方面给出了记者进行隐性采访时自我约束的参照条件,使其始终在法律许可的范围内进行.  相似文献   

15.
This paper explains the variation in technical efficiency across firms due to transitional reforms. A translog stochastic frontier production method incorporating regional heterogeneity and technical change is applied to a panel data set of coal enterprises in China between 2000 and 2005. The results provide evidence that the privatisation, consolidation, decentralisation and participation of the unemployment insurance system have contributed to improving technical efficiency. The study also shows that neither favourable geological conditions nor an advanced regional economic development level can explain differences in technical efficiency.  相似文献   

16.
Since 1997, the European legislator has aimed to protect consumers concluding a distance contract amongst others by entitling them to withdraw from the contract. First, this paper analyses the right of withdrawal as it is incorporated in the 2011 Consumer Rights Directive (CRD). This paper illustrates that, compared to the 1997 Distance Selling Directive, the CRD, contains more detailed rules, offering some useful clarifications. Further, this paper shows that the CRD slightly increases consumer protection, for example by determining that the mere beginning of performance under a services contract does not lead to the loss of the right to withdraw from the contract. However, consumers are also at risk where, without any explicit warning, they are held liable for the diminished value of the goods used during the withdrawal period. In a second part of the article, it is argued that the full harmonization approach should have been limited to the technical aspects of the withdrawal right, in order to avoid a reduction of consumer protection in some Member States. Finally, this paper shows that the CRD not always sufficiently takes into account the objectives pursued with the right of withdrawal as a tool to protect consumers concluding a distance contract.  相似文献   

17.
This paper presents two different estimates of the output loss resulting from allocative inefficiency in the Soviet Union and the United States. Surprisingly, the evidence from our examination of nine industrial sectors during the period 1960–1984 shows only small differences in measured allocative inefficiency between the United States and Soviet economies. Instead of immediately rejecting this result as the product of unreliable data and insurmountable methodological difficulties, we present a plausible explanation for the unexpectedly strong performance of Soviet-type economies in the allocation of labor and capital across sectors. If true, the finding of relatively low levels of resource misallocation implies that the source of poor economic performance in Soviet-type economies must be due to technical inefficiency, slow technological change, and/or production of the wrong mix of outputs.  相似文献   

18.
论医疗事故鉴定体制的改革   总被引:1,自引:0,他引:1  
医疗事故技术鉴定制度和司法鉴定制度均存在诸多弊端,两种制度并行的状况更引发了一系列的问题。为此,应取消医疗事故技术鉴定,在司法鉴定体制基础上进行改革,通过建立全国统一的医学专家库,设立“首席”鉴定人,完善鉴定人员准人机制,改革鉴定人出庭接受质询及专家辅助人制度,以此达到构建统一的新型医疗鉴定制度的目的。  相似文献   

19.
This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices.  相似文献   

20.
Techniques of 2D–3D superimposition are widely used in cases of personal identification from video surveillance systems. However, the progressive improvement of 3D image acquisition technology will enable operators to perform also 3D–3D facial superimposition. This study aims at analyzing the possible applications of 3D–3D superimposition to personal identification, although from a theoretical point of view. Twenty subjects underwent a facial 3D scan by stereophotogrammetry twice at different time periods. Scans were superimposed two by two according to nine landmarks, and root‐mean‐square (RMS) value of point‐to‐point distances was calculated. When the two superimposed models belonged to the same individual, RMS value was 2.10 mm, while it was 4.47 mm in mismatches with a statistically significant difference (p < 0.0001). This experiment shows the potential of 3D–3D superimposition: Further studies are needed to ascertain technical limits which may occur in practice and to improve methods useful in the forensic practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号