Record of BTC MIIT
It can be seen from the figure:
1. From the distribution box to the lamp, there are three lnpe
2. An N-In line, when the switch appears, the number of poles will be increased. For example, when the lamp reaches the secondary switch, there are three lines between the lamp and the switch. That is, one incoming line, two outgoing lines, a total of three
There are three wires from one switch to another4. Among the same group of lamps controlled by the same switch, there are three lnpe
5. Between different groups of lamps controlled by the same switch, l n plus the number of groups of lamps behind the line. If there are other switches connected below, add another L line that does not pass through the switch
extended data
the basic return route of common control lines is composed of the following parts
1. Power supply circuit: the power supply of power supply circuit includes AC380V and 220V
2. Protection circuit: the working power supply of protection (auxiliary) circuit includes single-phase 220, 36V or DC 220, 24V, etc., which can protect electrical equipment and lines from short circuit, overload and voltage loss, and is composed of fuse, thermal relay, voltage loss coil, rectifier component and voltage stabilizing component
Signal circuit: the circuit that can timely reflect or display the normal and abnormal working state information of equipment and circuit, such as signal lamps with different colors, sound equipment with different sounds, etc Automatic and manual circuit: in order to improve the work efficiency, electrical equipment is generally equipped with automatic link, but in the installation, debugging and emergency treatment, the control circuit also needs to be set with manual link, through the combination switch or transfer switch to realize the automatic and manual mode conversion Braking and parking circuit: the control link of cutting off the power supply of the circuit and taking some braking measures to make the motor stop quickly, such as energy consumption braking, power supply reverse connection braking, reverse pull reverse connection braking and regenerative power generation braking, etcthe patent law stipulates that the scope of protection of a patent right for invention or utility model shall be subject to the content of the claim, and the description and drawings can be used to explain the content of the claim
the interpretation of the Supreme People's Court on Several Issues concerning the application of law in the trial of patent infringement disputes stipulates that the people's court shall examine all the technical features recorded in the claims claimed by the obligee when deciding whether the infringed technical solution falls within the scope of patent protection, The people's court shall determine that it falls within the scope of patent protection; If, compared with all the technical features recorded in the claims, the technical features of the sued infringing technical scheme lack more than one of the technical features recorded in the claims, or more than one of the technical features are not the same or the same, the people's court shall determine that it does not fall into the scope of protection of the patent right
it can be seen from the above provisions that if a proct is identified as infringement in the patent document, it must cover all the technical features recorded in the claim. Therefore, in order to obtain a larger scope of protection, the less content in the claim, the better, that is, do not add unnecessary content
the innovation of blockchain is usually associated with multiple executors, which is a systematic scheme that needs the cooperation of all parties. For example, if the data publishing node, blockchain network, authorization node, etc. are combined in a claim, it will be found that when the patentee wants to sue an executor for infringement, the party does not cover all the contents of the claim (at least not other executors), which leads to that although the party uses the innovative idea of the patent, it does not infringe. Therefore, in a claim, it is better to write the scope of protection around an executor< According to the patent law, except as otherwise provided in this law, no entity or indivial may exploit its patent without the permission of the patentee, that is, it may not manufacture, use, promise to sell, sell or import its patented procts, or use its patented methods, or use, sell or import its patented procts for proction and business purposes Promise to sell, sell and import the procts directly obtained according to the patented method
here we should pay attention to "for the purpose of proction and operation", that is to say, not for the purpose of implementation, no infringement. Therefore, when writing the claims, we should also consider who the potential infringement objects are, and the content of the patent right should limit them as far as possible, instead of including unnecessary objects (such as the devices used by the end consumers).
time: 2015 place: Beijing
recently, in the name of "financial mutual assistance", many places in China promise high income and lure the public to invest money; Mmm mutual financial community, Morgan currency, Baichuan currency and so on are more frequent. The China Banking Regulatory Commission (CBRC), together with the Ministry of instry and information technology, the central bank and the State Administration for Instry and commerce, issued a risk warning that this kind of operation mode violates the law of value, and the fund operation is difficult to maintain for a long time. The public should invest rationally and prudently.
bitcoin is illegal, but it is not a pyramid scheme
bitcoin does not rely on specific monetary institutions. It is generated by a large number of calculations based on specific algorithms. Bitcoin economy uses the distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of money circulation
the decentralized feature and algorithm of P2P can ensure that it is impossible to artificially control the value of bitcoin by mass manufacturing. The design based on cryptography can make bitcoin only be transferred or paid by the real owner. This also ensures the anonymity of money ownership and circulation transactions. The biggest difference between bitcoin and other virtual currencies is that the total amount of bitcoin is very limited and it has a strong scarcity
extended information:
in view of the recent phenomenon that some domestic businesses began to accept bitcoin shopping, and the people's crazy speculation on bitcoin, the central bank, the Ministry of instry and information technology, the CBRC, the China Securities Regulatory Commission and the China Insurance Regulatory Commission jointly issued the notice that bitcoin is a so-called currency calculated through specific computer programs, It is not issued by the monetary authority, has no legal compensation and mandatory monetary attributes, and is not a real currency
in nature, bitcoin is a specific virtual commodity, which does not have the same legal status as currency and cannot and should not be used as currency in the market. However, the five ministries and commissions also said in the notice that bitcoin trading, as a commodity trading behavior on the Internet, ordinary people have the freedom to participate in it at their own risk
