Legal Articles, Patent
Patent Infringement
A short article discussing the fundamentals of patent infringement, the different kinds, and how to best deal with it.
What is Patent Law?
A short article discussing the fundamentals of patent law, which details the rules and regulations of the patent application process.
How to File a Patent Application
A short article on how to file a patent application, including the USPTO filing process, international application filing process, post-filing procedures, and new matter.
What Is a Patent?
A short article that provides a detailed explanation of patents, including the three types of patents, patentability criteria, the patent application process, and the importance of patents.
What Is a Patent Attorney?
A short article explaining what a patent attorney is and how that is different than other intellectual property lawyers.
What is trade dress infringement?
The core concepts of trademark protection are that consumers not be confused, misled, or deceived as to whose product they are buying, that sellers’ goodwill--or investment in their reputation for quality--be protected, and that competition thereby be enhanced.
What is the test for infringement of a federally registered trademark pursuant to 15 U.S.C. § 1114?
A registered trademark is infringed when a person uses it or a phrase similar to it in a manner likely to cause confusion, mistake, or deception among ordinarily prudent buyers or prospective buyers as to the source of the product.
Naming your Business - More than just choosing a cool name
Technology has a big impact on choosing a name for your business, including a greater risk of violating a trademark
Protecting Jewelry Design by Copyright or Patent?
Patents and copyrights are all enacted to provide protections over intellectual properties, including jewelry design, but from different aspects and on different parts of the intellectual property. The protections offered by these laws are not mutually exclusive.
Protection of Your Mobile App – Multifaceted Protection Approach
The vulnerability of a mobile app includes not only the source codes, but also in other aspects, such as the user interface, the screen display, the app’s name, and the business model behind the app. What protection can the law provide?