知识产权从业者专利基础篇:INID代码(Internationally agreed Numbers for the Identification of (bibliographic) data)

知识产权从业者专利基础篇:INID代码(Internationally agreed Numbers for the Identification of (bibliographic) data)

缘起:在处理专利案件-外进内-

PCT进入中国国家阶段/巴黎公约进入中国要求优先权

需要下载PCT公开文本
{WIPO-搜索国际和国家专利收藏
https://patentscope2.wipo.int/search/en/search}
公开文本首页代码

即:这种代码由圆圈或括号所括的两位阿拉伯数字表示。

##文档下载:https://www.wipo.int/export/sites/www/standards/en/pdf/03-09-01.pdf

待更新完整版

https://www.wipo.int/export/sites/www/standards/en/pdf/03-09-01.pdf
(10)文献标志
(11)文献号
(12)文献种类文字释义
(13)根据WIPO标准ST.16制定的文献种类代码
(15)有关专利修正的信息
(19)WIPO标准ST.3制定的国家代码或公布专利文献机构的其他标识
(20)专利申请或补充保护证书数据
(21)申请号
(22)申请日期
(23)其他日期(包括临时说明书提出之后完整说明书提出日期,展览优先权日期)
(24)工业产权权利开始生效日期
(25)原始申请公布时的语种
(26)申请公布的语种
(30)遵照巴黎公约规定的优先权数据
(31)优先申请号
(32)优先申请日期
(33)优先申请国家或组织代码,对于根据PCT程序提交的国际申请,应使用代码“WO”
(34)依地区或国际协定提交的优先申请中的国家代码,至少有一个地区或国际申请提交的国家是巴黎联盟成员国
(40

  • 1
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
This Standard was prepared by the Joint Standards Australia/Standards New Zealand Committee IT-012, Information Systems, Security and Identification Technology and supersedes AS/NZS 4444.1:1999, Information security management, Part 1: Code of practice for information security management. It is identical with ISO/IEC 17799:2000, Information technology—Code of practice for information security management and differs in only very minor editorial details from AS/NZS 4444.1:1999. However the Standard number has been changed to that of the international Standard (ISO/IEC 17799) to minimize any confusion when it is used by organizations internationally. The objective of this Standard is to give recommendations for information security management for use by those who are responsible for initiating, implementing or maintaining security in their organization. It is intended to provide a common basis for developing organizational security standards and effective security management practice and to provide confidence in inter-organizational dealings. This Standard is complementary to AS/NZS 4444.2:2000, Information security management, Part 2: Specification for information security management systems (redesignated in Amendment 2 as AS/NZS 7799.2:2000) and HB 231:2000, Information security risk management guidelines. As this Standard is reproduced from an International Standard, the following applies: (a) In the source text ‘this International Standard’ should read ‘this Australian/New Zealand Standard’. (b) A full point should be substituted for a comma when referring to a decimal marker. Information is a vital asset in any organization. The protection and security of information is of prime importance to many aspects of an organization’s business. It is therefore important that an organization implements a suitable set of controls and procedures to achieve information security and manages them to retain that level of security once it is achieved. This Standard is intended for use by managers and employees who are responsible for initiating, implementing and maintaining information security within their organization and it may be considered as a basis for developing organizational security standards. A comprehensive set of controls comprising the best information security practices currently in use is provided in this Standard. This guidance is intended to be as comprehensive as possible. It is intended to serve as a single reference point for identifying the range of controls needed for most situations where information systems are used in industry and commerce and can therefore be applied by large, medium and small organizations. With increasing electronic networking between organizations there is a clear benefit in having a common reference document for information security management. It enables mutual trust to be established between networked information systems and trading partners and provides a basis for the management of these systems between users and service providers. Not all the controls described in this Standard will be relevant to every situation. It cannot take account of local environmental or technological constraints, or be present in a form that suits every potential user in an organization. Consequently this Standard might need to be supplemented by further guidance. It can be used as a basis from which, for example, a corporate policy or an inter-company trading agreement can be developed. The guidance and recommendations provided throughout this Standard should not be quoted as if they were specifications. In particular, care should be taken to ensure that claims of compliance are not misleading. It has been assumed in the drafting of this Standard that the execution of its recommendations is entrusted to suitably qualified and experienced people.

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值