Patent Application Information Retrieval

Last updated

Patent Application Information Retrieval (PAIR) is an online service provided by the United States Patent and Trademark Office to allow users to see the prosecution histories of United States patents and patent applications and obtain copies of documents filed therein. There are two services: Public PAIR, which allows the general public to access information regarding patents and published applications; and Private PAIR, which allows authorized persons to access information regarding applications regardless of publication status. [1]

Contents

Displayed tabs

When a patent application is accessed through PAIR, the following tabs are displayed:

Public PAIR

Anyone may use Public PAIR to access the prosecution histories of patents and of those applications that have been published. Unpublished applications are unavailable through Public PAIR. To access Public PAIR, one must verify through a reCAPTCHA process that one is not a robot. [2] Non-patent literature cited in a patent application is not available for viewing or downloading through Public PAIR because of concerns over copyright infringement. [3] [4]

Private PAIR

Users may use Private PAIR to access the prosecution histories of patents, published applications, and those unpublished applications that they are authorized to see. Private PAIR is accessible to registered patent attorneys and agents (and those working under their supervision) who have customer numbers. [1] In 2019, the authentication changed from the use of PKI certificates to the use of two-factor authentication. [5] For an unpublished application, the customer number must match that associated with the requested data. [3]

Retirement

Public Pair was retired after July 31, 2022, in favor of the USPTO Patent Center. [6] Private PAIR will be retired after November 8, 2023, also in favor of Patent Center. [7]

See also

Related Research Articles

The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.

<span class="mw-page-title-main">Authorization</span> Function of specifying access rights and privileges to resources

Authorization or authorisation is the function of specifying access rights/privileges to resources, which is related to general information security and computer security, and to access control in particular. More formally, "to authorize" is to define an access policy. For example, human resources staff are normally authorized to access employee records and this policy is often formalized as access control rules in a computer system. During operation, the system uses the access control rules to decide whether access requests from (authenticated) consumers shall be approved (granted) or disapproved (rejected). Resources include individual files or an item's data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer software and other hardware on the computer.

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service. RADIUS was developed by Livingston Enterprises in 1991 as an access server authentication and accounting protocol. It was later brought into IEEE 802 and IETF standards.

<span class="mw-page-title-main">United States Patent and Trademark Office</span> United States national patent bureau

The United States Patent and Trademark Office (USPTO) is an agency in the U.S. Department of Commerce that serves as the national patent office and trademark registration authority for the United States. The USPTO's headquarters are in Alexandria, Virginia, after a 2005 move from the Crystal City area of neighboring Arlington, Virginia.

Prior art is a concept in patent law used to determine the patentability of an invention, in particular whether an invention meets the novelty and the inventive step or non-obviousness criteria for patentability. In most systems of patent law, prior art is generally defined as anything that is made available, or disclosed, to the public that might be relevant to a patent's claim before the effective filing date of a patent application for an invention. However, notable differences exist in how prior art is specifically defined under different national, regional, and international patent systems.

The Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer.

Under United States patent law, a continuing patent application is a patent application that follows, and claims priority to, an earlier-filed patent application. A continuing patent application may be one of three types: a continuation, divisional, or continuation-in-part. Although continuation and continuation-in-part applications are generally available in the U.S. only, divisional patent applications are also available in other countries, as such availability is required under Article 4G of the Paris Convention.

The Electronic Filing System is the Singapore Judiciary's electronic platform for filing and service of documents within the litigation process. In addition, it provides the registries of the Supreme Court and the Subordinate Courts with an electronic registry and workflow system; and an electronic case file. Recent enhancements have added a module which facilitates the conduct of hearing using documents that have been electronically filed.

A patent application is a request pending at a patent office for the grant of a patent for an invention described in the patent specification and a set of one or more claims stated in a formal document, including necessary official forms and related correspondence. It is the combination of the document and its processing within the administrative and legal framework of the patent office.

Data Protection Application Programming Interface (DPAPI) is a simple cryptographic application programming interface available as a built-in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory, the Data Protection API can enable symmetric encryption of any kind of data; in practice, its primary use in the Windows operating system is to perform symmetric encryption of asymmetric private keys, using a user or system secret as a significant contribution of entropy. A detailed analysis of DPAPI inner-workings was published in 2011 by Bursztein et al.

There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.

An information disclosure statement refers to a submission of relevant background art or information to the United States Patent and Trademark Office (USPTO) by an applicant for a patent during the patent prosecution process. There is a duty on all patent applicants to disclose relevant art or background information that the applicant is aware of and that may be relevant to the patentability of the applicant's invention, as established by the United States Code title 35 and related sections of 37 CFR and the Manual of Patent Examining Procedure (MPEP). If a patent applicant, with deceptive intent for art known to the applicant, fails to submit material prior art to the USPTO, then any patent that later issues from the patent application may be declared unenforceable because of inequitable conduct. Furthermore, the duty to submit such relevant information to the USPTO lies not only on the applicant or inventor, but also on any patent attorney or other legal staff employed by the applicant.

The involvement of the public in patent examination is used in some forms to help identifying relevant prior art and, more generally, to help assessing whether patent applications and inventions meet the requirements of patent law, such as novelty, inventive step or non-obviousness, and sufficiency of disclosure.

The copyright status of the content of patent applications and patents may vary from one legal system to another. Whether scientific literature can be freely copied for the purpose of patent prosecution is also a matter for discussion.

<span class="mw-page-title-main">Multi-factor authentication</span> Method of computer access control

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.

The Electronic Filing System of the United States Patent and Trademark Office (USPTO), also referred to as EFS-Web or simply EFS, is a web-based system for submitting patent applications and related documents electronically.

ssh-keygen is a standard component of the Secure Shell (SSH) protocol suite found on Unix, Unix-like and Microsoft Windows computer systems used to establish secure shell sessions between remote computers over insecure networks, through the use of various cryptographic techniques. The ssh-keygen utility is used to generate, manage, and convert authentication keys.

<span class="mw-page-title-main">Retroshare</span> Free software

Retroshare is a free and open-source peer-to-peer communication and file sharing app based on a friend-to-friend network built by GNU Privacy Guard (GPG). Optionally, peers may exchange certificates and IP addresses to their friends and vice versa.

IBM API Management is an API Management platform for use in the API Economy. IBM API Connect enables users to create, assemble, manage, secure and socialize web application programming interfaces (APIs).

The Web Cryptography API is the World Wide Web Consortium’s (W3C) recommendation for a low-level interface that would increase the security of web applications by allowing them to perform cryptographic functions without having to access raw keying material. This agnostic API would perform basic cryptographic operations, such as hashing, signature generation and verification and encryption as well as decryption from within a web application.

References