The World Sustainability Standards Organization(WSSO)was established in October 2023.This organization aims to unify various standards in the fields of sustainable development such as energy,carbon sinks,green finance...The World Sustainability Standards Organization(WSSO)was established in October 2023.This organization aims to unify various standards in the fields of sustainable development such as energy,carbon sinks,green finance,ecological environment industries,energy conservation and environmental protection,carbon neutrality-related technologies,and ESG.WSSO supports the implementation of projects stipulated in the Paris Agreement such as the carbon market,and enhance the global coordination efforts in areas such as the digital currency of central banks and the carbon payment settlement system by connecting the digital currencies of various countries.展开更多
The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both t...The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both the 3GPP and the 3GPP2 have launched research programs on the study and standardization of the emerging 3G evolution technologies. The Long Term Evolution (LTE) program of 3GPP has made progress in key technical indexes of air interface, wireless network architecture and high-level protocols. At the same time, the Air Interface Evolution (AIE) program of 3GPP2 has made study achievements in the formulation of air interface standards for Layer 2 and upper layers, as well as for the physical layer.展开更多
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq...Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.展开更多
In March 2025,prominent Chinese automaker NIO(Shanghai,China),the global leader in electric vehicle(EV)battery swapping,and Contemporary Amperex Technology Co.,Ltd.(CATL)(Nindge,China),the world’s biggest manufacture...In March 2025,prominent Chinese automaker NIO(Shanghai,China),the global leader in electric vehicle(EV)battery swapping,and Contemporary Amperex Technology Co.,Ltd.(CATL)(Nindge,China),the world’s biggest manufacturer of EV batteries,announced a strategic partnership to build the world’s largest battery swapping network,while also promoting unified standards and technologies[1].Just weeks later,CATL announced another partnership,this one with Chinese state-owned oil giant Sinopec(Beijing,China)to build 10000 new battery swapping stations in China,at least 500 in 2025[2].展开更多
Due to their resource constraints,Internet of Things(IoT)devices require authentication mechanisms that are both secure and efficient.Elliptic curve cryptography(ECC)meets these needs by providing strong security with...Due to their resource constraints,Internet of Things(IoT)devices require authentication mechanisms that are both secure and efficient.Elliptic curve cryptography(ECC)meets these needs by providing strong security with shorter key lengths,which significantly reduces the computational overhead required for authentication algorithms.This paper introduces a novel ECC-based IoT authentication system utilizing our previously proposed efficient mapping and reverse mapping operations on elliptic curves over prime fields.By reducing reliance on costly point multiplication,the proposed algorithm significantly improves execution time,storage requirements,and communication cost across varying security levels.The proposed authentication protocol demonstrates superior performance when benchmarked against relevant ECC-based schemes,achieving reductions of up to 35.83%in communication overhead,62.51%in device-side storage consumption,and 71.96%in computational cost.The security robustness of the scheme is substantiated through formal analysis using the Automated Validation of Internet Security Protocols and Applications(AVISPA)tool and Burrows-Abadir-Needham(BAN)logic,complemented by a comprehensive informal analysis that confirms its resilience against various attack models,including impersonation,replay,and man-in-the-middle attacks.Empirical evaluation under simulated conditions demonstrates notable gains in efficiency and security.While these results indicate the protocol’s strong potential for scalable IoT deployments,further validation on real-world embedded platforms is required to confirm its applicability and robustness at scale.展开更多
2025 International Workshop on Bionic Engineering(IWBE 2025)will be jointly held with the 15th Plenary Meeting of ISO/TC 266 Biomimetics on September 23-27 in Vienna,Austria.The workshop is hosted by ISBE together wit...2025 International Workshop on Bionic Engineering(IWBE 2025)will be jointly held with the 15th Plenary Meeting of ISO/TC 266 Biomimetics on September 23-27 in Vienna,Austria.The workshop is hosted by ISBE together with ISO/TC 266 Biomimetics and organized by Vienna University of Technology(TU Wien),Jilin University and Beijing Research Institute of Automation for Machinery Industry Co.,Ltd.This joint event will focuses on bionic technology innovation and standardization.展开更多
Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countrie...Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countries. However, during the process of forming the technology standard alliance, it is a focus for members in the alliance to take control over others. How to construct a scientific and reasonable decision model of control over technology standard alliance is closely related to each enterprise member's interest. Under the condition that the risk is neutral, the paper explored necessary and sufficient conditions of knowledge sharing and the most endeavor among enterprise members through constructing a decision model of control over technology standard alliance, and put forward that the joint control model was the best decision model for constructing the technology standard alliance.展开更多
The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices...The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices is N well-P+ junction.P+ area is the wedge-shaped structure,which is embedded in N well.The leaf-type silicon LED device is a combination of the three wedge-shaped LED devices.The main difference between the two devices is their different electrode distribution,which is mainly in order to analyze the application of electric field confinement(EFC).The devices' micrographs were measured with the Olympus IC test microscope.The forward and reverse bias electrical characteristics of the devices were tested.Light measurements of the devices show that the electrode layout is very important when the electric field confinement is applied.展开更多
As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends ...As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends and features. Based on latest progresses in standardization promoted by ITU-T, TISPAN and 3GPP, new technologies concerned with resource control are introduced. Considering the problems faced in standardization deployment, relevant resource control functions are also analyzed in this article.展开更多
This article focuses on the current situation in technical research and development (R&D) and proprietary intellectual property rights (IPRs) in China. Based on the situation of Far East Cable Company, it analyze...This article focuses on the current situation in technical research and development (R&D) and proprietary intellectual property rights (IPRs) in China. Based on the situation of Far East Cable Company, it analyzes the significance of strengthening the protection of proprietary IPRs and implementing a strategy for technology standards and then discusses the actual work and future arrangement of proprietary IPRs and technology standard strategies. It points out that the enhancement of proprietary IPRs protection and implementation of technology standard strategies is the only way for enterprises to remain competitive.展开更多
Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chua...Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chuanqing, Party Secretary of the GeneralAdministration of Quality Supervision, Inspection and Quarantine, called for the vigorousimplementation of technological standard- ization strategies to substantially elevate the overalllevel of Chinese standards.展开更多
Standard is the technical foundation of national economic and social development, and it is the basic rule of establishing social regulation. Researching and constituting the standard system of urban domestic water sa...Standard is the technical foundation of national economic and social development, and it is the basic rule of establishing social regulation. Researching and constituting the standard system of urban domestic water saving technology is to offer important science basis for revising standard plan and standardize research plan. This paper introduces the present situation of our urban domestic water saving technical standard system, problem and the development direction in the future, as well as project planning of constructing urban domestic water saving technical standard system.展开更多
Unmanned aerial vehicle has low cost, good flexibility, low risk and high efficiency. When it is applied in maritime supervision, such as maritime patrol, sea cruise, investigation and emergency response, maritime sea...Unmanned aerial vehicle has low cost, good flexibility, low risk and high efficiency. When it is applied in maritime supervision, such as maritime patrol, sea cruise, investigation and emergency response, maritime search and rescue, navigation channel measurement, monitoring and inspection of the oil and sewage spills from ships at sea, it can effectively expand the uses of monitoring sea areas, reduce the phenomenon of illegal use of sea, which can improve modernization construction in maritime supervision. According to the UAV (unmanned aerial vehicle) development and application, this paper explores the advantages of the UAV application in maritime adminstration, as well as the characteristics of maritime adminstration, put forward some countermeasures and suggestions of UAV applied in maritime adminstration.展开更多
This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology)Statistical Test Suite.Thr...This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology)Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program.展开更多
In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technolog...In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technology engines and carried out the interoperability test. From the perspective of fixed Internet, the World Wide Web Consortium (W3C) developed the technology standard based on basic Web applications, laying the foundation for Web-based mobile Internet applications. There are a number of important technology engines supporting mobile Internet services, including the engine for Internet access and download, the engine for providing status of mobile users and mobile terminals, the engine for community/group administration, the engine for mobile search, and the engine for classification-based content filtering.展开更多
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd...This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
It is wen-known that patented technology licensing is closely related to technology standards, and whether a technology standard contains a specific patented technology solution or not, there is always a patented tech...It is wen-known that patented technology licensing is closely related to technology standards, and whether a technology standard contains a specific patented technology solution or not, there is always a patented technology hcensing imphed, for patented technology hcensing is a prerequisite for the existence and development of technology standards. Therefore, technology standards create a good many potential chances for hcensing patented technologies concerning them. Superficially speaking, patent holders achieve huge profits mainly by means of hcensing patented technologies through a standard mainly in the form of a patent pool; however, in fact, it is know-how licensing behind the patented technology involved in the standard that really helps patent holders make huge profits.展开更多
A survey conducted by China’s General Administration of Quality Supervision,Inspection,and Quarantine finds that technical trade bar-riers from overseas cost Chinese exporters 57.
文摘The World Sustainability Standards Organization(WSSO)was established in October 2023.This organization aims to unify various standards in the fields of sustainable development such as energy,carbon sinks,green finance,ecological environment industries,energy conservation and environmental protection,carbon neutrality-related technologies,and ESG.WSSO supports the implementation of projects stipulated in the Paris Agreement such as the carbon market,and enhance the global coordination efforts in areas such as the digital currency of central banks and the carbon payment settlement system by connecting the digital currencies of various countries.
基金National "863"Program of China (No. 2005AA123410)
文摘The challenges brought by broadband wireless access technologies to cellular mobile communication technologies speed up the study and standardization of 3G evolution technologies that support higher data rates. Both the 3GPP and the 3GPP2 have launched research programs on the study and standardization of the emerging 3G evolution technologies. The Long Term Evolution (LTE) program of 3GPP has made progress in key technical indexes of air interface, wireless network architecture and high-level protocols. At the same time, the Air Interface Evolution (AIE) program of 3GPP2 has made study achievements in the formulation of air interface standards for Layer 2 and upper layers, as well as for the physical layer.
文摘Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.
文摘In March 2025,prominent Chinese automaker NIO(Shanghai,China),the global leader in electric vehicle(EV)battery swapping,and Contemporary Amperex Technology Co.,Ltd.(CATL)(Nindge,China),the world’s biggest manufacturer of EV batteries,announced a strategic partnership to build the world’s largest battery swapping network,while also promoting unified standards and technologies[1].Just weeks later,CATL announced another partnership,this one with Chinese state-owned oil giant Sinopec(Beijing,China)to build 10000 new battery swapping stations in China,at least 500 in 2025[2].
文摘Due to their resource constraints,Internet of Things(IoT)devices require authentication mechanisms that are both secure and efficient.Elliptic curve cryptography(ECC)meets these needs by providing strong security with shorter key lengths,which significantly reduces the computational overhead required for authentication algorithms.This paper introduces a novel ECC-based IoT authentication system utilizing our previously proposed efficient mapping and reverse mapping operations on elliptic curves over prime fields.By reducing reliance on costly point multiplication,the proposed algorithm significantly improves execution time,storage requirements,and communication cost across varying security levels.The proposed authentication protocol demonstrates superior performance when benchmarked against relevant ECC-based schemes,achieving reductions of up to 35.83%in communication overhead,62.51%in device-side storage consumption,and 71.96%in computational cost.The security robustness of the scheme is substantiated through formal analysis using the Automated Validation of Internet Security Protocols and Applications(AVISPA)tool and Burrows-Abadir-Needham(BAN)logic,complemented by a comprehensive informal analysis that confirms its resilience against various attack models,including impersonation,replay,and man-in-the-middle attacks.Empirical evaluation under simulated conditions demonstrates notable gains in efficiency and security.While these results indicate the protocol’s strong potential for scalable IoT deployments,further validation on real-world embedded platforms is required to confirm its applicability and robustness at scale.
文摘2025 International Workshop on Bionic Engineering(IWBE 2025)will be jointly held with the 15th Plenary Meeting of ISO/TC 266 Biomimetics on September 23-27 in Vienna,Austria.The workshop is hosted by ISBE together with ISO/TC 266 Biomimetics and organized by Vienna University of Technology(TU Wien),Jilin University and Beijing Research Institute of Automation for Machinery Industry Co.,Ltd.This joint event will focuses on bionic technology innovation and standardization.
文摘Technology standard alliance, as vectors of research, development and circulation for technology standard, has already become an important transformation form from laboratory standard to fact standard for all countries. However, during the process of forming the technology standard alliance, it is a focus for members in the alliance to take control over others. How to construct a scientific and reasonable decision model of control over technology standard alliance is closely related to each enterprise member's interest. Under the condition that the risk is neutral, the paper explored necessary and sufficient conditions of knowledge sharing and the most endeavor among enterprise members through constructing a decision model of control over technology standard alliance, and put forward that the joint control model was the best decision model for constructing the technology standard alliance.
基金National Natural Science Foundation Subject(60536030,60676038)Tianjin Key Basic Research Project(06YFJZJC00200)
文摘The wedge-shaped and leaf-type silicon light-emitting devices(LED)are designed and fabricated with the Singapore Chartered Semi Inc.'s dual-gate standard 0.35μm CMOS process.The basic structure of the two devices is N well-P+ junction.P+ area is the wedge-shaped structure,which is embedded in N well.The leaf-type silicon LED device is a combination of the three wedge-shaped LED devices.The main difference between the two devices is their different electrode distribution,which is mainly in order to analyze the application of electric field confinement(EFC).The devices' micrographs were measured with the Olympus IC test microscope.The forward and reverse bias electrical characteristics of the devices were tested.Light measurements of the devices show that the electrode layout is very important when the electric field confinement is applied.
文摘As a hot spot of next generation network, research over resource control has been carried out for years both in China and abroad. With a gradual progress in standardization, this field presents new development trends and features. Based on latest progresses in standardization promoted by ITU-T, TISPAN and 3GPP, new technologies concerned with resource control are introduced. Considering the problems faced in standardization deployment, relevant resource control functions are also analyzed in this article.
文摘This article focuses on the current situation in technical research and development (R&D) and proprietary intellectual property rights (IPRs) in China. Based on the situation of Far East Cable Company, it analyzes the significance of strengthening the protection of proprietary IPRs and implementing a strategy for technology standards and then discusses the actual work and future arrangement of proprietary IPRs and technology standard strategies. It points out that the enhancement of proprietary IPRs protection and implementation of technology standard strategies is the only way for enterprises to remain competitive.
文摘Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chuanqing, Party Secretary of the GeneralAdministration of Quality Supervision, Inspection and Quarantine, called for the vigorousimplementation of technological standard- ization strategies to substantially elevate the overalllevel of Chinese standards.
基金The national basic platform project of science and technology.This paper is a part of standard system of water resource used continuously in China.(2004DEA70920-04)
文摘Standard is the technical foundation of national economic and social development, and it is the basic rule of establishing social regulation. Researching and constituting the standard system of urban domestic water saving technology is to offer important science basis for revising standard plan and standardize research plan. This paper introduces the present situation of our urban domestic water saving technical standard system, problem and the development direction in the future, as well as project planning of constructing urban domestic water saving technical standard system.
文摘Unmanned aerial vehicle has low cost, good flexibility, low risk and high efficiency. When it is applied in maritime supervision, such as maritime patrol, sea cruise, investigation and emergency response, maritime search and rescue, navigation channel measurement, monitoring and inspection of the oil and sewage spills from ships at sea, it can effectively expand the uses of monitoring sea areas, reduce the phenomenon of illegal use of sea, which can improve modernization construction in maritime supervision. According to the UAV (unmanned aerial vehicle) development and application, this paper explores the advantages of the UAV application in maritime adminstration, as well as the characteristics of maritime adminstration, put forward some countermeasures and suggestions of UAV applied in maritime adminstration.
基金Supported by the National High Technology Research and Development Program of China (863 Program) ( 2007AA01Z411)the National Natural Science Foundation of China ( 60673071, 60970115 )
文摘This paper presents a fast pseudorandom generation algorithm,which is based on the BLAKE hash function and can pass the random test of the NIST(National Institute of Standards and Technology)Statistical Test Suite.Through theoretical analysis and experimental imitation,our new algorithm is proven to be more secure and efficient than G-SHA1.Simultaneously,we introduce and discuss the BLAKE in detail.Its security shows that can be utilized to generate pseudorandom bit sequences,which the experimental results show the BLAKE hash function has excellent pseudorandomness.Therefore,we believe the BLAKE is one of the most potential candidate algorithms of SHA-3 program.
文摘In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technology engines and carried out the interoperability test. From the perspective of fixed Internet, the World Wide Web Consortium (W3C) developed the technology standard based on basic Web applications, laying the foundation for Web-based mobile Internet applications. There are a number of important technology engines supporting mobile Internet services, including the engine for Internet access and download, the engine for providing status of mobile users and mobile terminals, the engine for community/group administration, the engine for mobile search, and the engine for classification-based content filtering.
文摘This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
文摘It is wen-known that patented technology licensing is closely related to technology standards, and whether a technology standard contains a specific patented technology solution or not, there is always a patented technology hcensing imphed, for patented technology hcensing is a prerequisite for the existence and development of technology standards. Therefore, technology standards create a good many potential chances for hcensing patented technologies concerning them. Superficially speaking, patent holders achieve huge profits mainly by means of hcensing patented technologies through a standard mainly in the form of a patent pool; however, in fact, it is know-how licensing behind the patented technology involved in the standard that really helps patent holders make huge profits.
文摘A survey conducted by China’s General Administration of Quality Supervision,Inspection,and Quarantine finds that technical trade bar-riers from overseas cost Chinese exporters 57.