© Copyright 2018 International IP Commercialization Council All Rights Reserved

Help & FAQ

A more technically and legally oriented FAQ

Authentication and Identification
Chain of Existence
Authentication and Identification

No. The IKR provides Proof of Existence (PoE) - that a person was in possession of an electronic document as of the time/date when the IKR Record is created. This in turn can be compelling evidence of authorship and/or inventorship. The IKR may provide a strong rebuttable presumption of authorship/creation (i.e., in the lack of evidence to the contrary, that a person holding an IKR is the author/creator).

However, the IKR does not provide proof that a specific person is the author/creator of a piece of content because the IKR does not capture personal data, nor does it capture information about the originator/author/creator of the content for which an IKR is being generated.

Privacy is the reason that the IKR is designed to provide PoE and not authorship/inventorship.

Authorship/inventorship may be proven, subject to the laws of your jurisdiction, if your machine(s) have strong biometric capability and you follow a strict procedure when using your computer(s).

With a chain of existence. If you use the IKR from the start of a new creation and use it for each subsequent interation of the content, then you can create a chain of evidence to show that you are the original author/creator. For example if you have an idea for a book and:

1. Write down the idea and draft outline – and generate IKRs for these
2. If you write the first draft – and generate an IKR for this
3. Then write subsequent drafts and generate a IKR for each of them, etc.

While document version control is your responsibility, we recommend that for each new draft, you save the draft under a different name (e.g. save the first draft as ‘Draft 1 June 25 2018, the next as ‘Draft 2 June 25 2018, etc.) and get IKRs for each new document.

You will be able to present a strong chain of evidence, in for example, a court of law or an ADR proceeding, showing that you were the originator/creator. This in turn may be be hard for the opponent to refute.  

No. IIPCC does not authenticate the identity of users of the IKR.

The non-enterprise (version) license is designed to comply to Privacy Regulations.

Such authentication of identity to insure the party who generates IKRs for content is the responsibility of the individual user or organization (for the Enterprise version).

Such authentication can be a process by which an individual or organization establishes the appropriate level of identity authentication assurance, or confidence in the identity of the person or system generating the IKR. This assurance is established through employing “authentication factors,” individually or in concert, to raise the level of confidence that the party being granted access is the registered person or entity.

Requirements for specific authentication factors or their combination may vary depending on the authentication technologies and organizational procedures employed (e.g. passwords, smart cards, multi-factor authentication systems, biometrics) as well as governmental regulations. The ability to prove authorship of content for which IKR records were generated may also depend on procedures to, for example, safeguard digital records or prevent outside tampering (cybersecurity) that are in place, court requirements, etc.

Document content and tampering

Yes. The generated IKR fingerprints for two documents11111  with identical content will be identical though the date/time stamps may be different and the IP addresses in the diferent IKRs will be different if different devices were used. 

Yes. The generated IKR fingerprints for a document22222  whose content has changed, even, for example by adding a period or a space, will be different.  

Creating IKRs at different times, with different systems

The generated IKR fingerprints will be identical though the date/time stamps may be different and the IP addresses in the diferent IKRs may be different if, for example, different devices were used. 

The generated IKR fingerprints will be identical though the date/time stamps will be different and the IP addresses in the diferent IKRs will be different if, for example, different devices were used.   

The generated IKR fingerprints will be identical though the date/time stamps may be different and the IP addresses in the diferent IKRs may be different if, for example, different devices were used. 

The generated IKR fingerprints will be identical; however the date/time stamps and the IP addresses associated with the different IKRs will likely be different.

Creating IKRs for the same document under different scenarios

The generated IKR fingerprints will be identical though the date/time stamps may be different and the IP addresses in the diferent IKRs may be different if different devices were used.     

The generated IKR fingerprints will be identical though the date/time stamps may be different and the IP addresses in the diferent IKRs may be different if, for example, different devices were used. 

The generated IKR fingerprints will be identical though the date/time stamps may be different and the IP addresses in the diferent IKRs may be different if, for example, different devices were used. 

The generated IKR fingerprints will be different even if the change is as minor as adding a period or a space.

Creating the same content in different locations

If two persons create the exact same document and generate IKRs, whether the IKR fingerprints for the documents will be identical or not will depend on the software application used.  

The generated IKR fingerprints will be identical although the date/time stamps may be different and the IP addresses in the different IKRs may be different if, for example, different devices were used.

The generated IKR fingerprints will be different. Additionally, the date/time stamps may be different and the IP addresses in the diferent IKRs will likely be different if, for example, different devices were used. 

Personal Data

IIPCC respects your concerns about your individual data and how it is used and shared. IIPCC appreciates your trust in us to protect your data carefully and sensibly. IIPCC only collect the personal information that you provided to us during the IKR registration process. For individuals, this collection is limited to your first and last name, email and phone number. Use of all personal data is governed by the IIPCC Privacy Policy Statement

No, the IKR does not contain any data that could identify an individual. The use of the IKR is also goverened by IIPCC's Privacy Policy

Footnotes:

1. Tested with Microsoft Word

2. Ibid

3. Ibid

4. Ibid

5. Ibid

6. Ibid

7. Ibid

8. Ibid

9. Ibid

10. Ibid


Trademark Notices:

Microsoft Word, Microsoft Excel, Microsoft PowerPoint, the Microsoft logo, the Microsoft Office interfaces are trademarks or registered trademarks of Microsoft, Inc.

© Copyright 2018 International IP Commercialization Council All Rights Reserved