How to fill out INPI data in a . NET project

Asked

Viewed 77 times

0

My question is somewhat conceptual.

My company registered the software in the INPI and received protocol data, etc.

How to fill this data in my system?

I noticed that in the file AssemblyInfo.cs i have fields that allow me to fill in. Doubt is how to fill in.

[assembly: AssemblyTitle("CBIP.Business.UI.Web")]
[assembly: AssemblyDescription("")]
[assembly: AssemblyConfiguration("")]
[assembly: AssemblyCompany("")]
[assembly: AssemblyProduct("CBIP.Business.UI.Web")]
[assembly: AssemblyCopyright("Copyright ©  2015")]
[assembly: AssemblyTrademark("")]
[assembly: AssemblyCulture("")]

What is the correct way to fill in this information?

  • What is the question, specifically? If the fields are there is not only put the values?

  • In fact the INPI gives a set of information. Protocol, Order Number, Program Type, Application Field. The only thing I found in the protocol that matches these fields is the name of the company. The rest I’m lost. There is, for example, a date of entry of the protection request, but there is no effective date, to put in the Copyright, for example.

  • But these data are purely descriptive, just make a screen of about and life that follows.

  • Is it dup? https://answall.com/q/156167/101

1 answer

0


There is no correct form because these attributes are purely descriptive and you can put the way you want, one or the other has some semantics that if followed can be used by some specific tool.

Some people will put in Copyright, another in the Trademark, and still some create their own attribute to put this.

But I’m sorry to tell you it’ll be information misleading almost instantaneously, because despite the file Assembly be based on sources you have registered, it will soon be no more. As soon as you start fiddling with fonts after registration, either you re-register or that is no longer the registered object.

Of course it has some advantage, but I’ve seen who registered being stolen and can’t do anything because the stolen source was no longer the registered one, with few changes the person escapes from having done something wrong from the legal point of view.

  • Very informative. Thank you @Bigown.

Browser other questions tagged

You are not signed in. Login or sign up in order to post.