From my work experience, one of the key challenges that IP strategies are facing is the issue of IP protection arising from high workforce mobility. This challenge also reflects an emerging trend in contemporary IP strategy adjustments - the increasing importance of trade secrets. Within enterprises, R&D Directors and Sales Directors usually can get high salaries, mainly because they have a knowledge of a company’s technical secrets and business secrets. How to protect these trade secrets has consequently become a critical issue.Japan's traditional lifetime employment system offers an instructive model for trade secret protection. This system establishes stable legal contractual relationships through long-term employment, creating career-long rights and obligations between enterprises and employees from recruitment to retirement. There is nothing more effective in protecting Toyota's trade secrets than having an engineer who, upon graduating from the University of Tokyo, joins Toyota's R&D department and stays there till retirement, without ever transitioning to any Toyota's competitors.From an IP protection perspective, this system demonstrates three legal advantages: Firstly, employee loyalty will be high, and the risk of information leakage will be low. Employees who have served the same enterprise for a long time are more likely to develop a sense of belonging and responsibility. They also have a stronger awareness of protecting the company's confidential information, thus reducing the risk of deliberate leakage of secrets or taking technologies when changing jobs. Secondly, the spread of knowledge will be controlled, and the confidentiality chain will be more stable. Compared with an environment where employees change jobs frequently, lifetime employment reduces the frequent dissemination of core technology and business information within industries, preserving R&D achievements and strategic layouts of the company. Thirdly, the company will be more willing to invest in training and place trust. Since employees are not likely to leave the company, the company can confidently impart core technologies and management experience to them. This not only strengthens the team's capabilities but also establishes a closer relationship of trust, reducing the losses caused by information leakage from an institutional perspective.This lifetime employment system can effectively reduce the risk of trade secret leakage caused by high employee turnover, which is one of the primary contributing factors. While such lifetime employment system may not fully align with domestic contexts, it provides a conceptual framework for reducing trade secret leakage risks and serves as a valuable reference for enhancing intellectual property protection.
Q:企業未來幾年成功應對挑戰的關鍵要素是什么?
What do you see as the key factors for enterprises to successfully meet the challenges in the coming years?
Mastering core technologies is crucial for enterprises to maintain vitality. When it comes to acquiring technologies, people usually first think of independent research and development, which I metaphorically call "self-built house". However, besides "self-built house", there are alternative approaches like "purchasing", "renting", or even "co-building", "co-purchasing", and "co-renting". Each approach has its pros and cons.Self-built enables maximum alignment between technology and needs with good returns, but requires starting from laying foundations brick by brick, resulting in long cycles and low efficiency. In contrast, the "rental model" offers high efficiency for quick technology access, but cannot guarantee lease duration - the "landlord" might terminate the agreement at any time. The "purchase model" allows rapid technology acquisition without repossession concerns, but carries risks of technological depreciation. Collaborative approaches like co-development, joint procurement, and shared leasing can improve efficiency and reduce costs, though partners may introduce risks.Notably, universities and research institutions often possess substantial technological resources. Collaborating with them or "renting/buying" technologies from them will also be a good choice. The Law on Promoting the Transformation of Scientific and Technological Achievements amended in 2015 has effectively facilitated such collaborations. While some worry about potential "last mile" issues in academic technological achievements, enterprises should enhance their discernment capabilities when selecting partners, and seek professional evaluations when necessary.
Q:在此新背景下,我們是否需要重新定義對知識產權及其保護的理解?還是既有原則依然適用?
Do we need to re-think our understanding of IP and IP protection in this new context or do the same principles apply?
Under the new landscape where emerging technologies like AI pose novel intellectual property challenges, we should maintain an open mindset. As we recognize, legal frameworks inherently lag behind technological advancements. When confronting AI-related issues, existing IP laws struggle to provide comprehensive solutions, we mainly use various interpretive methods to adapt to these issues based on the existing laws. However, it's evident that current legislation cannot fully address every challenge posed by AI, nor can we entirely predict its future trajectory and associated complications.The landmark 2023 Beijing Internet Court ruling on AI-generated text-to-image works sparked significant controversy. In this case, the court recognized AI-generated images as copyrightable works, acknowledging the human creator's originality in the generation process. Nevertheless, critical questions persist: Where should we draw the line for originality in works created through keyword inputs to AI systems? Does originality emerge from inputting ten keywords versus twenty? How many iterative adjustments constitute sufficient creative input? These thresholds remain ambiguous. Regarding this matter, the Intellectual Property Strategy Headquarters of Japan stipulated in its official report: When AI users either input selected images into pre-trained AI models or curate multiple AI-generated outputs from extensive results for public release, their participatory actions may be recognized as constituting creative contributions if their selection or compositional arrangements demonstrate intentional creative input. However, mere parameter configuration would not qualify as creative authorship.Therefore, perhaps we need not rush to establish restrictive new legislation for AI technologies. Instead, we might "let the bullet fly for a while," allowing space to observe their natural evolution. Historically, the internet's emergence created new copyright dimensions beyond traditional print media, ultimately leading to the recognition of information network dissemination rights. Similarly, as we deepen our understanding of AI's capabilities and implications, we may develop more nuanced legal protections tailored to these technologies' unique characteristics. This adaptive approach enables legal frameworks to mature alongside technological progress rather than prematurely constraining innovation.
Q:面對全球創新活動布局中的相互依賴性與潛在風險,本土創新的合理邊界應如何界定?
In light of the global interdependencies and associated vulnerabilities in considering where to locate innovation activities, what is the right level of indigenous innovation?
Amid the current international landscape of Sino-US decoupling, where global technological innovation faces increasing American technical restrictions, the optimal approach for indigenous innovation lies in intensifying independent R&D efforts and encouraging self-developed technologies. We must exhaust all efforts to achieve brand autonomy and technological self-sufficiency. A compelling example is the evolution of China's civil aviation sector – transitioning from purchasing Airbus and Boeing aircraft to developing the C919 with a 60% localization rate, where core components now demonstrate independent R&D capabilities. This progression powerfully validates that autonomous innovation constitutes the optimal choice under current geopolitical dynamics.
Q:除專利申請外,企業在跨國/國內高風險研發過程中可采取哪些策略工具?
Besides filing for patents, what are the tools businesses can use to navigate the risky R&D processes, both within and across countries?
We may also opt for trade secret protection in intellectual property management. To certain extent, trade secrets play a more critical role than patents in technological competition - the invention patents held by patent shell companies hold little value, whereas the trade secrets mastered by technical personnel constitute the real competitive advantage. Some corporations strategically acquire R&D leadership and their teams under the guise of mergers and acquisitions, thereby obtaining the target company's complete technical know-how and operational intelligence. Through notarized product acquisition followed by reverse engineering analysis, one can effectively determine whether technical secret infringement has occurred.The Shanghai Technology Exchange has now operationalized trade secret verification services. Essentially, this initiative enables enterprises and research institutions to register non-disclosable technological achievements—those unsuitable for patent applications—through confidential filing mechanisms. Such registration serves as legally-recognized ownership evidence during technology transfers, financing activities, or legal disputes. Particularly for emerging technologies like AI where patent protection remains challenging, trade secret mechanisms present viable alternatives. Critical AI components including model parameters, training datasets, and core algorithms can be registered as protected trade secrets, provided they maintain commercial value, remain undisclosed, and implement proper confidentiality protocols.A pivotal technological enabler in this process is hash value application. Functioning as a "digital fingerprint", hash algorithms generate unique cryptographic identifiers for AI models or generated content. This technological implementation not only enhances verification efficiency and credibility but also provides robust technical support throughout subsequent transactions, secure data sharing, and rights enforcement processes.