Transnational BTC fraud
2, if the public security organs suspect the criminal detention, the procuratorate can not approve the arrest, they should apply for l pending trial. Bail pending trial also goes through the court
the seventy-seventh provision of the criminal procere law stipulates that the people's court, the people's Procuratorate and the public security organ shall not exceed twelve months for the suspect and defendant to be l, and the longest residence shall not exceed six months.
ring the period of l pending trial and residential surveillance, the investigation, prosecution and trial of the case shall not be interrupted. If it is found that criminal responsibility should not be investigated or the term of l pending trial or residential surveillance has expired, the l pending trial or residential surveillance shall be lifted in time. In case of cancellation of l pending trial or residential surveillance, the person who has been led pending trial or residential surveillance and the relevant units shall be informed in time.
a new form of rogue software CTB locker uses despicable means to send infected e-mail to the victim. Only when the victim opens it, the ward will invade the victim's personal computer and encrypt the victim's specific files (JPEG image is a popular target). If the victim wants to retrieve the files, he must pay a ransom in bitcoin. A user paid a ransom of three bitcoins in four days, about $700 (market value on Friday)
the email messages they send are usually hot topics, such as: what is bitcoin? Some of the victims were cheated by curiosity. At present, some users have been affected. This is part of the content intercepted on bitcoin home.
each gold coin can be exchanged for 0.0014 yuan
in gold coins × 0.0014 yuan
Recently, the prosecutor of Tampa, Florida, announced that a 17-year-old young man, Graham Ivan Clark, was suspected of masterminding the bitcoin fraud that shocked the world on July 15. Now the man who changed his name has been arrested, and prosecutors have filed more than 30 felony charges against him
bitcoin, transliterated from its English name bitcoin, is also a representative of network virtual electronic currency. Bitcoin has no physical form and is generated according to the calculation of network nodes. It is not regulated by any country or financial institution{ RRRRR} the unique charm of bitcoin is its supply and demand curve. Its supply is constant and demand rises with the rise of price, which is beyond the scope of economic understanding, and there is no reasonable price boundary. Therefore, bitcoin is a natural monopoly
the patent law stipulates that the scope of protection of a patent right for invention or utility model shall be subject to the content of the claim, and the description and drawings can be used to explain the content of the claim
the interpretation of the Supreme People's Court on Several Issues concerning the application of law in the trial of patent infringement disputes stipulates that the people's court shall examine all the technical features recorded in the claims claimed by the obligee when deciding whether the infringed technical solution falls within the scope of patent protection, The people's court shall determine that it falls within the scope of patent protection; If, compared with all the technical features recorded in the claims, the technical features of the sued infringing technical scheme lack more than one of the technical features recorded in the claims, or more than one of the technical features are not the same or the same, the people's court shall determine that it does not fall into the scope of protection of the patent right
it can be seen from the above provisions that if a proct is identified as infringement in the patent document, it must cover all the technical features recorded in the claim. Therefore, in order to obtain a larger scope of protection, the less content in the claim, the better, that is, do not add unnecessary content
the innovation of blockchain is usually associated with multiple executors, which is a systematic scheme that needs the cooperation of all parties. For example, if the data publishing node, blockchain network, authorization node, etc. are combined in a claim, it will be found that when the patentee wants to sue an executor for infringement, the party does not cover all the contents of the claim (at least not other executors), which leads to that although the party uses the innovative idea of the patent, it does not infringe. Therefore, in a claim, it is better to write the scope of protection around an executor< According to the patent law, except as otherwise provided in this law, no entity or indivial may exploit its patent without the permission of the patentee, that is, it may not manufacture, use, promise to sell, sell or import its patented procts, or use its patented methods, or use, sell or import its patented procts for proction and business purposes Promise to sell, sell and import the procts directly obtained according to the patented method
here we should pay attention to "for the purpose of proction and operation", that is to say, not for the purpose of implementation, no infringement. Therefore, when writing the claims, we should also consider who the potential infringement objects are, and the content of the patent right should limit them as far as possible, instead of including unnecessary objects (such as the devices used by the end consumers).