Skip to main content

Intellectual Property Protection

  • Chapter
  • First Online:
Concurrent Engineering in the 21st Century

Abstract

With the growth of the knowledge-based economy, intellectual property right (IPR) is recognized as a key factor to develop and protect strategic competitiveness and innovation of an enterprise. The increasing degree of collaboration in global relationships, ubiquitous digital communication techniques as well as tough competition has lead to an increasing importance of intellectual property protection (IPP) for enterprises. Since the law as well as ethical principles are not always adhered to, there are increasingly activities outside legal understanding. This situation is exacerbated in the context of rising crime through the misuse of modern ICT technologies (“Cyber Crime”) and now employs extensively state authorities. Piracy, counterfeits and unwanted know-how drain pose a significant problem for each market leader. Intellectual property is stored in product data too. Especially modern parametric and feature-based 3D-CAD systems have been enhanced towards acquiring, representing, processing and distributing knowledge to support knowledge-based engineering (KBE) within virtual product creation. However, it is very easy to exchange huge amounts of product data within a virtual enterprise that comprises an enterprise with its supplier network. There is an enormous threat that intellectual property could fall into the wrong hands and badly jeopardize the existence of the related company. This chapter contains an analysis of this conflict area, a picture of the legal framework, a discussion on the need for action in supply chain networks and attempts by research and development as well as best practices in industry for various aspects of IPP in the context of concurrent engineering (CE).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Liese H, Rulhoff S, Stjepandić J (2013) Enhancing product innovation by implementing intellectual property protection into the virtual product creation. In: Stjepandić J, Rock G, Bil C (eds) Concurrent engineering approaches for sustainable product development in a multi-disciplinary environment. Proceedings of the 19th ISPE international conference on concurrent engineering. Springer, London, pp 267–278

    Chapter  Google Scholar 

  2. Dyer JA (2014) The contest of the century: the new era of competition with China—and how America can win. Alfred A. Knopf, New York

    Google Scholar 

  3. Herman BD (2013) The fight over digital rights: the politics of copyright and technology. Cambridge University Press, New York

    Book  Google Scholar 

  4. Atkinson B, Fitzgerald B (2014) A Short history of copyright. Springer International Publishing, Switzerland

    Book  Google Scholar 

  5. Azevedo ML, Silva ST, Afonso O (2012) Intellectual property rights and endogenous economic growth—uncovering the main gaps in the research agenda. In: Teixeira AAC (ed) Technological change. InTech, Rijeka, pp 45–64

    Google Scholar 

  6. Stuiber P (2006) Doppelmayrs wundersame Seilbahnvermehrung in China, Die Welt, 17 Feb 2006. http://www.welt.de/print-welt/article198743/Doppelmayrs_wundersame_Seilbahnvermehrung_in_China.html. Accessed 22 March 2014

  7. NN (2014) Apple Inc. v. Samsung Electronics Co., Ltd. Wikipedia. http://en.wikipedia.org/wiki/Apple_Inc._v._Samsung_Electronics_Co.,_Ltd. Accessed 15 March 2014

  8. NN (2013) USA wollen stärker gegen Industriespionage aus China vorgehen, Portal financial.de, 21 Feb 2013. http://www.financial.de/news/agenturmeldungen/roundup-usa-wollen-starker-gegen-industriespionage-aus-china-vorgehen/. Accessed 23 March 2014

  9. Neukirch R et al (2013) Das chinesische Problem. Der Spiegel 9, 25 Feb 2013. pp 20–22. http://www.spiegel.de/spiegel/print/d-91203384.html. Accessed 23 March 2014

  10. NN (2013) Cyber Security Report 2013. Ergebnisse einer repräsentativen Befragung von Abgeordneten sowie Führungskräften in mittleren und großen Unternehmen. Deutsche Telekom/T-Systems. http://www.cybersecuritysummit.de/assets/downloads/131106_Cyber_Sicherheitsreport_2013_final.pdf. Accessed 15 March 2014

  11. Richter R, Streb J (2009) Catching-up and falling behind knowledge spillover from American to German machine tool makers. Discussion Paper 09-2009, University of Hohenheim. https://fzid.uni-hohenheim.de/71978.html. Accessed 15 March 2014

  12. Gragido W, Pirc J (2011) Cybercrime and espionage: an analysis of subversive multivector threats. Elsevier, Burlington

    Google Scholar 

  13. Philpott J, Jolly A (2004) A handbook of intellectual property management: protecting, developing and exploiting your IP assets. Kogan Page, London

    Google Scholar 

  14. Wong T, Dutfield G (2010) Intellectual property and human development: current trends and future scenarios. Cambridge University Press, Cambridge

    Book  Google Scholar 

  15. Smallwood RF (2012) Safeguarding critical e-documents: implementing a program for securing confidential information assets. Wiley, Hoboken

    Google Scholar 

  16. VDMA (2013) Leitfaden zum Produkt- und Know-how-Schutz: Einführung von Schutzmaßnahmen gegen Produktpiraterie und Know-how-Abfluss. VDMA, Frankfurt

    Google Scholar 

  17. McLay A (2014) Re-reengineering the dream: agility as competitive adaptability. Int J Agile Syst Manag 7(2):101–115

    Article  MathSciNet  Google Scholar 

  18. Bondar S, Ruppert C, Stjepandić J (2014) Ensuring data quality beyond change management in virtual enterprise. Int J Agile Syst Manag 7(3/4):304–323

    Article  Google Scholar 

  19. Stevenson M (2013) The role of services in flexible supply chains: an exploratory study. Int J Agile Syst Manag 6(4):307–323

    Article  Google Scholar 

  20. Fuchs HJ et al (2006) Piraten, Fälscher und Kopierer. Gabler Verlag, Wiesbaden

    Google Scholar 

  21. Abele E, Kuske P, Lang H (2011) Schutz vor Produktpiraterie. Springer, Berlin

    Book  Google Scholar 

  22. Quandt S (2006) The insider treat benchmark report—strategies for data protection. White paper, Aberdeen Group, Jan 2006. http://www.aberdeen.com

  23. Jolly A (2010) The innovation handbook: how to profit from your ideas, intellectual property and market knowledge, 2nd edn. Kogan Page, London

    Google Scholar 

  24. McCarville MA (2012) Intellectual property, patents and innovation in aeronautics. In: Young TM, Hirst M (eds) Innovation in aeronautics. Woodhead Publishing, Cambridge, pp 263–303

    Chapter  Google Scholar 

  25. Meiwald T (2011) Konzepte zum Schutz vor Produktpiraterie und unerwünschtem Know-how-Abfluss. PhD thesis, TU Müchen

    Google Scholar 

  26. Bader MA, Gassmann O, Ziegler N (2014) Managing the intellectual property portfolio. In: Gassmann O, Schweitzer F (eds) Management of the fuzzy front end of innovation. Springer International Publishing, Switzerland

    Google Scholar 

  27. Bryer LG, Lebson JS, Asbell MD (2011) Intellectual property operations and implementation in the 21st century corporation. Wiley, Hoboken

    Google Scholar 

  28. Wu CY, Trappey AJC, Trappey C (2012) Using patent ontology engineering for intellectual property defense support system. In: Stjepandić J, Rock G, Bil C (eds) Concurrent engineering approaches for sustainable product development in a multi-disciplinary environment. Proceedings of the 19th ISPE international conference on concurrent engineering, Springer, London, pp 207–218, 2013

    Google Scholar 

  29. Hopgood AA (2011) Intelligent systems for engineers and scientists, 3rd edn. CRC Press, Boca Raton

    Google Scholar 

  30. Liese H (2004) Wissensbasierte 3D-CAD repräsentation. TU Darmstadt PhD thesis, Shaker Verlag, Aachen

    Google Scholar 

  31. Liese H, Stjepandić J (2004) Konstruktionsmethodik: Wissensbasierende 3D-CAD-Modellierung, CAD/CAM Report. Dressler Verlag, Heidelberg, 10. http://www.prostep.com/de/prostep/medien/cad-cam_kbe.htm. Accessed 15 March 2014

  32. Alguezaui S, Filieri R (2014) A knowledge-based view of the extending enterprise for enhancing a collaborative innovation advantage. Int J Agile Syst Manag 7(2):116–131

    Article  Google Scholar 

  33. Elgh F (2014) Automated engineer-to-order systems a task oriented approach to enable traceability of design rationale. Int J Agile Syst Manag 7(3/4):324–347

    Article  Google Scholar 

  34. Ong SK, Xu QL, Nee AYC (2008) Design reuse in product development modeling, analysis and optimization. World Scientific Publishing, Singapore

    Google Scholar 

  35. Trappey CV, Trappey AJC, Wu CY (2010) Clustering patents using non-exhaustive overlaps. J Syst Sci Syst Eng 19(2):162–181

    Article  Google Scholar 

  36. Han J, Kamber M (2006) Data mining: concepts and techniques, 2nd edn. Morgan Kaufmann Publisher, San Fransisco

    Google Scholar 

  37. Trappey AJC, Trappey CV, Wu CY, Lin C-W (2012) A patent quality analysis for innovative technology and product development. Adv Eng Inform 26(1):26–34

    Article  Google Scholar 

  38. Trappey AJC, Chen LWL, Chang JYC, Yeh MFM (2014) Strategic development of LTE mobile communication technology based on patent map analysis. In: Cha J et al (eds) Proceedings of 21th ISPE international conference on concurrent engineering. IOS Press, Amsterdam, pp 441–450

    Google Scholar 

  39. Yang J, Han S, Grau M, Mun D (2009) OpenPDM-based product data exchange among heterogeneous PDM systems in a distributed environment. Int J Adv Manufact Technol 40(9–10):1033–1043

    Article  Google Scholar 

  40. ProSTEP iViP Association (2008) Project Group “Enterprise Rights Management (ERM.Open)”. http://www.prostep.org/en/projects/enterprise-rights-management-ermopen.html. Accessed 15 May 2013

  41. Spitznagel P, Liese H (2008) Intellectual property protection for CAD design. In: Proceedings of ProSTEP iViP Symposium 2008

    Google Scholar 

  42. Wendenburg M (2012) Data exchange on the fast track, CAD/CAM Report Engineering. Hoppenstedt, Darmstadt, 6. http://www.prostep.com/en/mn/press/prostep-in-the-media/detailed-news/artikel/299/data-exchang.html. Accessed 15 May 2013

  43. Liese H, Rulhoff S, Stjepandić J (2010) Securing product know-how by embedding intellectual property protection into the organization. In: Proceedings of 16th international conference on concurrent enterprising, Lugano, 21–23 June 2010

    Google Scholar 

  44. Nawotki A (2001) Eine selektive Methode zur Verschlüsselung von Konstruktionsdaten mit Wavelets. PhD thesis, TU Kaiserslautern

    Google Scholar 

  45. Yu F, Lu Z, Luo H, Wang P (2010) Three-dimensional model analysis and processing. Springer, Berlin

    Book  MATH  Google Scholar 

  46. Pfalzgraf P, Pfouga A, Trautmann T (2012) Cross enterprise change and release processes based on 3D PDF. In: Stjepandić J, Rock G, Bil C (eds) Concurrent engineering approaches for sustainable product development in a multi-disciplinary environment. Proceedings of the 19th ISPE international conference on concurrent engineering, Springer, London, pp 753–763, 2013

    Google Scholar 

  47. Wang FH, Pan JS, Jain LC (2009) Innovations in digital watermarking techniques. Springer, Berlin

    Book  Google Scholar 

  48. Funk W (2008) Digital watermarking for NURBS-based 3D CAD models. TU Darmstadt PhD thesis, Logos-Verlag, Berlin

    Google Scholar 

  49. Stockenberger D (2014) Schutz vor Produktpiraterie durch Kennzeichnung und Authentifizierung von Komponenten und Ersatzteilen im Maschinen- und Anlagenbau. PhD thesis, TU München

    Google Scholar 

  50. Filipović B, Schimmer O (2012) Protecting embedded systems against product piracy. Technological background and preventive measures. Fraunhofer AIESEC, Garching

    Google Scholar 

  51. Jacobs S (2011) Engineering information security: the application of systems engineering concepts to achieve information assurance. Wiley, Hoboken

    Book  Google Scholar 

  52. Fussan CJ et al (2010) Managementmaßnahmen gegen Produktpiraterie und Industriespionage. Gabler Verlag, Wiesbaden

    Book  Google Scholar 

  53. Böhme R (ed) (2013) The economics of information security and privacy. Springer, Berlin

    Google Scholar 

  54. Martínez-Piva JM (ed) (2009) Knowledge generation and protection: intellectual property, innovation and economic development. Springer, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Josip Stjepandić .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Stjepandić, J., Liese, H., Trappey, A.J.C. (2015). Intellectual Property Protection. In: Stjepandić, J., Wognum, N., J.C. Verhagen, W. (eds) Concurrent Engineering in the 21st Century. Springer, Cham. https://doi.org/10.1007/978-3-319-13776-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13776-6_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13775-9

  • Online ISBN: 978-3-319-13776-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics