Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Comments on the US standards-essential patents policy
    • YI Jiming
    • Information and Communications Technology and Policy. 2023, 49(3): 1-9. DOI:10.12267/j.issn.2096-5931.2023.03.001
    • Abstract ( 284 ) HTML( 179 )   
    • The Draft Policy Statement on Licensing Negotiations and Remedies for Standards-Essential Patents Subject to Voluntary F/RAND Commitments was released by the US Department of Justice (DOJ), the National Institute of Standards and Technology (NIST), and the U.S. Patent & Trademark Office for public comments in December 2021. Its main content consists of two parts: a good-faith licensing negotiation framework and remedies for the infringement of standards-essential patents that are subject to a RAND or F/RAND licensing commitment. Based on the 2019 policy statement, this paper lists the key points of the 2021 draft policy statement in detail and comments on the draft content.

    • References | Related Articles | Metrics
    • Design of digital management platform for intellectual property transactions in power industry
    • ZHAO Bin, LUO Junling, LIU Yijia, ZHANG Tingting
    • Information and Communications Technology and Policy. 2023, 49(3): 18-23. DOI:10.12267/j.issn.2096-5931.2023.03.003
    • Abstract ( 195 ) HTML( 104 )   
    • In recent years, great progress has been made in the development of China’s electric power industry. In particular, many world-leading advanced technologies have emerged in the fields such as ultra-high voltage transmission and new energy power generation. However, there is still a gap between China and developed countries in the transformation, application and management of intellectual property rights to new technologies. This paper takes State Grid Corporation of China as the research object. Building a management platform for intellectual property transactions can help to standardize the transaction process of intangible assets such as intellectual property, reduce risks, and strengthen supervision. Further, the reform of intellectual property management in the power industry can be promoted and a good atmosphere to encourage innovation can be created.

    • Figures/Tables | References | Related Articles | Metrics
    • Research on evidence collection and identification of copyright cases in digital economy
    • ZOU Feifei, YAN Kun, LI Wenyu
    • Information and Communications Technology and Policy. 2023, 49(3): 36-40. DOI:10.12267/j.issn.2096-5931.2023.03.006
    • Abstract ( 176 ) HTML( 99 )   
    • With the rapid development of China’s economy and the continuous progress of digital technology, the illegal acts of infringing copyright in the digital environment are gradually increasing. Copyright infringement involves various types of works, including original written works, art works, video works, and online games. In copyright infringement cases, when it is necessary to determine whether the works are identical or substantially similar, identification is one of the most important means. This paper goes through the identification of related copyright infringement cases in the past two years, analyses the types of works involved in the cases, the evidence collection of the cases, identification content, and the main identification methods of various works, and puts forward suggestions.

    • Figures/Tables | References | Related Articles | Metrics
    • The regulatory path of NPE inthe US from the perspective of judicial practice
    • QIN Le, BI Chunli
    • Information and Communications Technology and Policy. 2023, 49(3): 48-53. DOI:10.12267/j.issn.2096-5931.2023.03.008
    • Abstract ( 162 ) HTML( 88 )   
    • In recent years, the number of NPE patent litigation has increased rapidly, with more than 90% of patent litigation initiated in the United States. As the birthplace of NPEs, the United States has always fought at the forefront of regulating NPE patent operations and has important guiding significance for the construction of relevant systems in other countries. This paper analyzes the progress of relevant judicial typical cases in the United States. It clarifies that the United States regulates NPE activities from the aspects of regulating the licensing behavior of patentees and implementers, clarifying the standards for determining patent objects, reducing the choice of litigation venues, and optimizing intellectual property litigation procedures, which provides important reference for Chinese enterprises to respond to NPE intellectual property risks.

    • References | Related Articles | Metrics
    • Analysis and prospect of “gatekeeper” system in Digital Markets Act
    • YAN Chi, WANG Xiaoli
    • Information and Communications Technology and Policy. 2023, 49(3): 54-60. DOI:10.12267/j.issn.2096-5931.2023.03.009
    • Abstract ( 256 ) HTML( 174 )   
    • The “gatekeeper” system in the Digital Markets Act breaks through the restrictions of the previous EU antitrust rules, adopts the mode of ex-ante supervision, combines qualitative and quantitative standards, and sets a new path of antitrust analysis. Today’s “gatekeeper” system still has problems such as defects in quantitative standards, weak correlations between standards, and unsystematic obligation regulation. China should learn the “gatekeeper” system in the Digital Markets Act, strengthen the ex-ante supervision of platforms, combine qualitative and quantitative indexes, and update antitrust analysis rules.

    • References | Related Articles | Metrics
    • A probe into difficult issues of personal information protection compliance
    • ZHANG Xiye, WANG Sha
    • Information and Communications Technology and Policy. 2023, 49(3): 74-79. DOI:10.12267/j.issn.2096-5931.2023.03.012
    • Abstract ( 216 ) HTML( 121 )   
    • When enterprises implement obligations stipulated in the Personal Information Protection Law of the People’s Republic of China, they encounter problems such as unclear regulations, and being unable to obtain compliance confirmation. In addition, the Personal Information Protection Law is not the only source of all the compliance obligations of enterprises for the protection of personal information. There are inconsistent requirements among different laws and regulations, which puts the enterprises in a compliance dilemma. Through the investigation of the implementation of the personal information protection rules, this paper sorts out the difficult issues encountered by the enterprises in the personal information protection compliance, and then analyzes the feasible path for the construction and the continuous improvement of the compliance system.

    • References | Related Articles | Metrics
    • ICT industry development trend
    • TU Xiaojie, ZHANG Li, XIE Songyan
    • Information and Communications Technology and Policy. 2023, 49(3): 80-83. DOI:10.12267/j.issn.2096-5931.2023.03.013
    • Abstract ( 337 ) HTML( 243 )   
    • In 2022, China’s ICT industry has achieved remarkable development results, with steady growth in income scale, increasingly improved infrastructure, continued strengthening of technological industry and deepening of integration, which has become the key driving force to promote the rapid growth of the digital economy. At present, a new round of scientific and technological revolution and industrial transformation is unfolding, forming a historic convergence with the new journey of building a socialist modern country in China. The information and communication technology industry has ushered in unprecedented strategic opportunities and is expected to make new breakthroughs.

    • References | Related Articles | Metrics
    • Application research of quantum secure communication technology in electricity payment system
    • QIU Chengjie, BIAN Yuxiang, LIU Xu, FENG Bao
    • Information and Communications Technology and Policy. 2023, 49(3): 84-90. DOI:10.12267/j.issn.2096-5931.2023.03.014
    • Abstract ( 185 ) HTML( 80 )   
    • The quantum secure communication technology provides theoretical absolute security and has great development prospects in the fields of power and finance. Therefore, based on the research status of quantum secure communication technology at home and abroad, this paper introduces the basic composition of quantum secure communication network, explains the working principle of quantum key distribution, and applies the quantum secure communication technology from two aspects: quantum logic architecture and quantum physics architecture. In this paper, the quantum secure communication technology is applied to the electricity payment system of electric power companies. The test results of the electricity fee payment system find that the data flow of the payment system is an ESP quantum key encrypted message, and the electricity fee inquiry and payment functions are all normal. At the same time, the key rate of the quantum key distribution device is high, which can fully support the key amount of the electricity fee payment system. The application of quantum secure communication technology in the electricity fee payment system provides theoretically unbreakable data protection, which fully guarantees the security of power financial information.

    • Figures/Tables | References | Related Articles | Metrics
    • Research on photo homology detection technology and application in telephone real-name system
    • REN Shuang, ZHANG Min, WANG Ke, SI Peipei
    • Information and Communications Technology and Policy. 2023, 49(3): 91-96. DOI:10.12267/j.issn.2096-5931.2023.03.015
    • Abstract ( 155 ) HTML( 64 )   
    • Compared with the traditional image duplication detection technology, the photo homology detection technology can not only accurately identify the identical photo copies generated by copying, but also effectively detect the by-product files generated by intentional technical means. During the telephone real-name registration process, users’ on-site photos must be retained. There are many complex and diverse photos retained by telecom enterprises, and there are also violations of repeated use. Applying the photo homology detection technology to the telephone real-name system can provide strong evidence for telecom enterprises to investigate and deal with illegal card opening, and urge telecom enterprises to strengthen the management of telephone real-name registration, so as to reduce the occurrence of telecom fraud from the source.

    • Figures/Tables | References | Related Articles | Metrics