Virtual Communities, Features, Types, Demerits

Virtual Communities are online platforms where individuals with shared interests, goals, or experiences interact, communicate, and collaborate through the internet. Unlike physical communities, members connect digitally via forums, social media groups, chat rooms, or specialized websites, transcending geographical boundaries. These communities enable knowledge sharing, social interaction, and support among participants. Businesses often use virtual communities for marketing, feedback, and customer engagement, while individuals benefit from networking, learning, and social belonging. Features like discussion threads, messaging, polls, and content sharing enhance interaction and participation. Virtual communities foster a sense of identity and loyalty among members, making them vital for collaboration, social networking, and engagement in today’s digital ecosystem.

Features of Virtual Communities:

  • Shared Interests

Virtual communities are formed around common interests, goals, or experiences. Members join to discuss, learn, or collaborate on topics that matter to them. These shared interests create a sense of belonging and purpose, encouraging active participation. Whether focused on hobbies, professional development, or support networks, common interests drive engagement and sustain the community. Businesses and individuals can use these communities to gather feedback, promote ideas, and build relationships. The focus on shared interests ensures meaningful interaction and strengthens bonds among participants.

  • Digital Interaction

Virtual communities rely on digital platforms for communication, enabling members to connect across distances. Interaction occurs via forums, social media, chat rooms, emails, or specialized websites. This feature allows real-time discussion, content sharing, and collaborative problem-solving without physical presence. Digital interaction supports multimedia content, including text, images, videos, and polls, enhancing engagement. It also enables asynchronous communication, allowing participants to contribute at convenient times. By leveraging technology, virtual communities transcend geographical barriers and time constraints, making collaboration and networking more flexible and accessible than traditional communities.

  • Membership and Participation

Membership in virtual communities is often voluntary and based on interest alignment. Participants contribute by posting content, commenting, sharing knowledge, or offering support. Levels of participation vary from active contributors to passive readers, called “lurkers.” Active engagement strengthens relationships, builds trust, and enhances the community’s value. Membership may be open to anyone or restricted through invitations or approvals. Participation fosters a sense of identity and belonging, encourages collaboration, and sustains the community. This feature ensures that the community remains dynamic, interactive, and valuable for all members involved.

  • Communication and Collaboration

Virtual communities emphasize communication and collaboration among members. Tools like discussion boards, messaging systems, video conferencing, and collaborative documents enable sharing of ideas, feedback, and resources. Collaboration helps solve problems, develop projects, or support shared goals. This interactive environment fosters collective learning, creativity, and teamwork. Participants can exchange knowledge globally, enhancing innovation and efficiency. Effective communication strengthens relationships and trust, while collaborative opportunities increase the community’s utility and appeal. This feature distinguishes virtual communities from mere information repositories, creating an active, participatory network that benefits all members.

  • Sense of Belonging

Virtual communities provide a psychological sense of belonging, giving members identity, support, and recognition. Shared experiences, values, or interests create emotional bonds, fostering loyalty and continued participation. Members feel connected to a larger network, reducing isolation and encouraging active engagement. Recognition through likes, badges, or leadership roles further strengthens commitment. This sense of belonging motivates contributions, collaboration, and trust-building. It also enhances user satisfaction and retention, making communities resilient and self-sustaining. Emotional connection is a core feature, making members feel valued and part of a meaningful social or professional network.

  • Accessibility and Convenience

Virtual communities are easily accessible from anywhere via internet-enabled devices like computers, tablets, or smartphones. This convenience allows members to participate at their own pace and schedule, transcending geographical and time constraints. Communities remain active 24/7, supporting asynchronous interaction and global participation. Accessibility encourages wider membership, diversity, and continuous engagement. It also facilitates knowledge sharing and networking without physical limitations. By providing flexible access, virtual communities maximize participation, learning, and collaboration opportunities, making them an indispensable tool for personal, social, and professional interaction in the digital age.

Types of Virtual Communities:

  • Interest-Based Communities

Interest-based virtual communities connect individuals around shared hobbies, passions, or topics, such as photography, gaming, or book clubs. Members exchange ideas, resources, and experiences related to their interest. Forums, social media groups, and specialized websites facilitate discussions, tutorials, and event planning. These communities promote learning, collaboration, and engagement among like-minded participants. Businesses often monitor such communities for insights into consumer behavior and preferences. Interest-based communities foster strong relationships and a sense of belonging, encouraging active participation and knowledge sharing, making them valuable platforms for both social interaction and skill development in specific domains.

  • Professional Communities

Professional virtual communities bring together individuals with common careers, industries, or expertise. Platforms like LinkedIn groups, online professional forums, and industry-specific networks enable knowledge sharing, networking, and career development. Members exchange insights, job opportunities, trends, and best practices. These communities support mentorship, collaboration on projects, and professional growth. Companies use professional communities to engage employees, recruit talent, and gather feedback. Participation enhances reputation, skill development, and career advancement. Professional communities provide members with access to expertise, resources, and networking opportunities that might not be available locally, fostering both individual and organizational growth.

  • Support Communities

Support virtual communities are designed to help individuals facing similar challenges or life situations, such as health conditions, parenting, or mental wellness. Members provide advice, emotional support, and practical solutions through forums, chat groups, or social platforms. These communities reduce isolation, increase knowledge, and offer coping strategies. Professionals or experienced members may moderate discussions to ensure reliability and safety. Businesses and organizations can use these communities for outreach, education, or product guidance. Support communities foster trust, empathy, and solidarity, creating safe spaces where individuals can share experiences, seek guidance, and find encouragement from those who understand their circumstances.

  • Social Communities

Social virtual communities focus on building relationships and connecting people for friendship, networking, or shared social interaction. Platforms like Facebook, Instagram, and online clubs allow members to communicate, share content, and participate in group activities. These communities support casual engagement, entertainment, and event planning. Members can maintain social connections across geographic boundaries and time zones. Social communities enhance engagement through likes, comments, and shared content, fostering a sense of belonging. They provide opportunities for networking, collaboration, and cultural exchange, making them a primary avenue for personal interaction and socialization in the digital age.

  • Learning Communities

Learning virtual communities aim to facilitate education, knowledge sharing, and skill development among participants. They include online courses, discussion forums, study groups, and professional training networks. Members collaborate on projects, ask questions, and share resources to enhance learning outcomes. Educators and learners interact to clarify concepts, provide feedback, and encourage continuous improvement. These communities support asynchronous or real-time learning and connect participants globally. Learning communities foster engagement, motivation, and peer-to-peer support, making education more interactive and accessible. They also help individuals gain expertise, credentials, and practical experience in a collaborative digital environment.

  • Gaming Communities

Gaming virtual communities bring together players with common interests in video games or online gaming platforms. Participants communicate via forums, chat rooms, and in-game interactions to share strategies, tips, and achievements. These communities organize tournaments, competitions, and collaborative gameplay. Members exchange technical knowledge, review games, and provide feedback to developers. Gaming communities enhance social interaction, teamwork, and problem-solving skills among participants. Businesses and developers use these communities for marketing, beta testing, and user engagement. They provide a dynamic, interactive, and entertaining platform where players connect, compete, and collaborate worldwide, fostering loyalty and a sense of belonging.

Demerits of Virtual Communities:

  • Privacy Concerns

Virtual communities often require sharing personal information, raising privacy and security risks. Sensitive data, such as names, contact details, and online activity, may be exposed or misused by malicious actors. Cyberattacks, phishing, and identity theft are potential threats. Members may feel vulnerable or reluctant to participate fully, limiting engagement. Ensuring robust security measures, encryption, and privacy policies is critical. Despite precautions, the digital nature of virtual communities makes complete privacy difficult to guarantee, posing a significant challenge for both users and community administrators.

  • Misinformation

Virtual communities can become sources of misinformation, as unverified or false information spreads quickly among members. Discussions and shared content may include rumors, biased opinions, or inaccurate data. This can lead to poor decision-making, confusion, or harm, especially in support or learning communities. Moderation, fact-checking, and credible sources are necessary to mitigate misinformation. However, controlling content in large or global communities is challenging. Misinformation can damage the community’s credibility, reduce trust, and discourage participation, making it a significant limitation of virtual communities.

  • Overdependence on Technology

Virtual communities rely entirely on internet connectivity and digital devices. Technical issues such as server downtime, software glitches, or slow connections can disrupt communication and participation. Members without access to reliable technology or sufficient digital literacy may be excluded, limiting inclusivity. Overdependence on technology also increases vulnerability to cyber threats and system failures. While digital platforms enable global connectivity, technical dependency can hinder accessibility, engagement, and continuity of interactions. Ensuring reliable infrastructure and support is essential, but the reliance on technology remains an inherent challenge for virtual communities.

  • Reduced Personal Interaction

Virtual communities lack face-to-face interaction, which can limit the depth of relationships and emotional connection. Non-verbal cues, physical presence, and personal engagement are absent, sometimes leading to misunderstandings or weaker social bonds. Members may feel isolated despite active participation. Building trust and loyalty can be harder compared to physical communities. While online tools allow communication, the lack of personal touch affects collaboration, conflict resolution, and engagement quality. This limitation is especially significant in communities requiring emotional support, mentorship, or team cohesion.

  • Information Overload

Virtual communities generate a large volume of content, which can overwhelm members. Continuous posts, messages, notifications, and discussions may lead to difficulty in filtering relevant information. Important content can be missed, reducing efficiency and participation. Excessive information may also cause stress, distraction, or disengagement. Managing content through moderation, categorization, and search tools is necessary but cannot fully eliminate the challenge. Information overload can hinder learning, collaboration, and meaningful interaction, making it a key limitation of virtual communities, particularly in large or highly active groups.

  • Cyberbullying and Misuse

Virtual communities are vulnerable to cyberbullying, harassment, and inappropriate behavior. Anonymity can encourage offensive comments, trolling, or abusive interactions. Misuse of the platform by malicious users affects community trust, participation, and mental well-being of members. Admins must enforce strict rules, monitoring, and moderation to maintain safety. However, complete prevention is challenging. Cyberbullying can discourage participation, damage reputations, and reduce the overall value of the community. This risk remains a major disadvantage of virtual communities, requiring ongoing vigilance and effective governance to ensure a safe and supportive environment.

Web auctions (Online Auctions), Features, Types, Challenges

Web Auctions are online platforms where goods and services are sold to the highest bidder over the internet. They provide a virtual marketplace where buyers compete in real-time by placing bids within a specified time frame. Common types include English auctions (ascending bids), Dutch auctions (descending bids), sealed-bid auctions, and reverse auctions where sellers compete to offer the lowest price. Web auctions increase market transparency, expand the customer base, and enable competitive pricing. They are used by businesses, individuals, and government agencies for procurement, surplus sales, or collectibles. Efficient payment systems and secure online platforms ensure trust and convenience, making web auctions a dynamic and widely used e-commerce tool.

Features of Web Auctions:

  • Real-Time Bidding

Web auctions enable real-time bidding, where participants place bids instantly during the auction period. This feature allows buyers to compete actively, driving prices up or down depending on the auction type. Real-time updates display current highest bids, ensuring transparency and fairness. It creates urgency among bidders, encouraging prompt decisions. Businesses and individual sellers can maximize revenue by leveraging competitive bidding. Real-time bidding also allows dynamic interaction among participants globally, increasing market reach. By simulating a live auction digitally, this feature enhances engagement, efficiency, and excitement in online transactions, making web auctions highly interactive and competitive.

  • Global Participation

Web auctions allow global participation, connecting buyers and sellers worldwide. Geography is no longer a barrier, enabling access to a larger audience. International bidders can join easily using online platforms, expanding competition and potential revenue. Sellers benefit from a broader market for products, including rare or niche items. Global participation also fosters cultural exchange and diversity in demand, influencing pricing and strategy. Payment gateways, language options, and shipping solutions support cross-border transactions. This feature enhances market transparency and liquidity, making web auctions an efficient tool for global trade, offering both buyers and sellers opportunities that traditional local auctions cannot provide.

  • Transparency

Web auctions offer high transparency, as all bids are visible to participants in real-time. Buyers can see the current highest bid, bid history, and auction rules, ensuring a fair competitive environment. Transparency reduces the risk of favoritism, fraud, or price manipulation. Sellers can track engagement and adjust strategies if necessary. Transparent processes build trust among participants, encouraging active participation. It also enables buyers to make informed decisions based on the auction’s progression. By clearly displaying rules, timings, and current bids, web auctions create a reliable and accountable system, enhancing credibility for both buyers and sellers in the online marketplace.

  • Time-Bound

Web auctions are time-bound, with a fixed start and end time for bidding. This feature creates urgency, motivating participants to place bids promptly. Limited-time auctions prevent indefinite negotiation, ensuring efficient completion of transactions. Sellers can plan inventory and schedule multiple auctions without delay. Time constraints also increase competitive behavior among bidders, often driving higher prices in ascending auctions or lower prices in reverse auctions. Notifications and countdown timers keep participants informed. By imposing a strict time limit, web auctions combine efficiency, excitement, and strategy, ensuring that both buyers and sellers operate within a structured and predictable schedule for successful transactions.

  • Multiple Auction Types

Web auctions support multiple auction types, such as English (ascending bids), Dutch (descending bids), sealed-bid, and reverse auctions. This flexibility allows sellers to choose a format best suited to their objectives, whether maximizing price, speeding up sales, or minimizing costs. Buyers can participate in different formats depending on preference or strategy. Each type encourages specific competitive behaviors, affecting bidding patterns and outcomes. Platforms often provide customization for duration, starting price, and bid increments. By offering multiple auction types, web auctions accommodate diverse markets and products, making them adaptable, efficient, and effective tools for online commerce across various industries.

  • Secure Transactions

Security is a critical feature of web auctions, ensuring safe and trustworthy transactions. Platforms use encryption, secure payment gateways, and authentication protocols to protect sensitive data, including payment details and personal information. Fraud prevention mechanisms, such as verification of participants and anti-bidding bots, maintain integrity. Secure transactions foster confidence among buyers and sellers, encouraging active participation. Dispute resolution systems, secure contracts, and refund policies further enhance trust. By prioritizing safety, web auctions minimize risks associated with online commerce, protect financial and personal information, and ensure that both parties can conduct transactions confidently and efficiently.

Types of Web Auctions:

  • English Auction (Ascending Bid Auction)

The English auction is the most common type of web auction, where bidding starts at a minimum price and participants place progressively higher bids. The auction continues until no higher bids are offered, and the highest bidder wins. This type encourages competitive bidding, often increasing the final price. It is widely used for art, collectibles, electronics, and rare items. Transparency is key, as all participants can see the current highest bid and bid history. English auctions stimulate active participation, urgency, and engagement. Sellers benefit from potentially higher revenues, while buyers enjoy real-time competition. The format is intuitive and suitable for both individuals and businesses.

  • Dutch Auction (Descending Bid Auction)

In a Dutch auction, the auctioneer starts with a high asking price, which gradually decreases until a participant accepts the current price. The first bidder to agree wins the item. This method is efficient for quickly selling goods, especially perishable or high-volume products. Dutch auctions reduce lengthy bidding wars and encourage strategic decision-making, as participants must decide the optimal moment to bid. It is commonly used in wholesale markets, commodities, and financial instruments. Buyers benefit from potentially lower prices if they time their bids well, while sellers can liquidate inventory efficiently. The descending format emphasizes speed, strategy, and efficiency in web auctions.

  • Sealed-Bid Auction

Sealed-bid auction requires participants to submit confidential bids without knowing competitors’ offers. After the submission deadline, the highest bid wins (in traditional auctions) or the lowest bid wins (in reverse auctions). This format ensures privacy and prevents bid manipulation or collusion. Sealed-bid auctions are often used for government contracts, real estate, or procurement processes. Buyers submit their best offer without feedback during the auction, while sellers evaluate bids objectively. This type encourages strategic thinking and fair competition, particularly in high-stakes transactions. It reduces influence from other bidders’ behavior, making it ideal for transactions requiring confidentiality, transparency, and structured evaluation.

  • Reverse Auction

In a reverse auction, the roles are reversed: sellers compete to offer the lowest price to a buyer who needs a product or service. Common in procurement, B2B transactions, and government tenders, reverse auctions help buyers minimize costs while ensuring competitive pricing. Sellers submit decreasing bids, and the auction ends when the lowest bid is accepted. This format encourages efficiency, cost savings, and transparency. Buyers benefit from competitive offers, while sellers gain access to targeted procurement opportunities. Digital platforms facilitate real-time bidding, secure transactions, and visibility. Reverse auctions are particularly useful for bulk orders, services, and contracts where price optimization is critical.

  • Penny Auction

Penny auction requires participants to pay a small fee to place each bid, typically increasing the price by a minimal amount (like one cent). The auction ends after a set time without new bids, and the highest bidder wins. Penny auctions are popular for electronics, gift cards, and collectibles. They combine gambling-like excitement with bidding, as multiple participants increase the auction revenue for the seller while competing for a low purchase price. While attractive for buyers seeking deals, the cost of multiple bids can add up. This type of auction emphasizes strategy, timing, and risk, appealing to users seeking thrill and savings.

  • Japanese Auction

Japanese auction is a variation where the price gradually rises, and participants indicate if they wish to continue at each price increment. Those who withdraw early forfeit the chance to win, leaving the last remaining participant as the winner. This method ensures a clear and progressive bidding process. It is often used for high-value or rare items, where transparency and fair competition are essential. Buyers must carefully assess their willingness to pay at each stage, while sellers benefit from predictable price progression. Japanese auctions encourage disciplined bidding, reduce last-minute bidding sniping, and maintain fairness in web auction environments.

Challenges of Web Auctions:

  • Security and Fraud

Web auctions face significant security risks, including hacking, phishing, and fraudulent bidding. Unscrupulous participants may use fake accounts or automated bots to manipulate bids, inflating prices or preventing fair competition. Sensitive data such as credit card information and personal details may be compromised if platforms lack encryption or secure payment gateways. Sellers risk financial loss and reputational damage, while buyers may face overpayment or fraud. Maintaining robust cybersecurity, user verification, and fraud detection systems is essential. Despite safeguards, security concerns remain a key challenge that can affect trust, participation rates, and the overall credibility of web auction platforms.

  • Lack of Physical Inspection

One major challenge in web auctions is the inability to physically inspect products before bidding. Buyers rely solely on images, descriptions, and reviews, which may not accurately represent the item’s condition or quality. This increases the risk of receiving damaged, counterfeit, or misrepresented goods. Sellers must provide detailed, accurate information and trustworthy visuals to maintain credibility. Disputes over product quality can result in returns, refunds, and loss of trust. The absence of tactile verification makes web auctions less suitable for certain items, like antiques, clothing, or fragile goods, where physical inspection is crucial to ensure buyer confidence.

  • Payment and Transaction Issues

Web auctions depend heavily on digital payments and online transactions, which can pose challenges. Payment failures, delayed processing, or incompatible payment systems may hinder smooth operations. Fraudulent payment methods, chargebacks, or disputes can create financial and administrative burdens. Buyers may hesitate to participate due to concerns over secure payment, while sellers risk non-payment or delayed receipt of funds. Integrating multiple secure payment gateways and ensuring timely, reliable processing is essential. Transaction issues can disrupt trust, reduce participation, and impact revenue. Efficient, transparent payment systems are critical to maintaining credibility and ensuring seamless completion of web auction transactions.

  • Technical Glitches

Web auctions face challenges from technical problems, including server crashes, website downtime, slow loading, or software errors. These issues can interrupt auctions, prevent bid submissions, or cause data loss, frustrating participants. High traffic during peak bidding periods may overload platforms if not properly managed. Technical glitches affect fairness, transparency, and trust, leading to decreased user engagement. Maintaining reliable infrastructure, continuous monitoring, and backup systems is crucial. Even minor glitches can influence auction outcomes and participant satisfaction. Ensuring smooth functionality requires investment in robust technology, scalable servers, and responsive technical support to handle issues promptly.

  • Legal and Regulatory Challenges

Web auctions must navigate legal and regulatory issues that vary across regions and countries. These include taxation, consumer protection, intellectual property rights, and compliance with online commerce laws. Failure to adhere to regulations may result in fines, legal disputes, or platform shutdowns. Cross-border auctions add complexity, as sellers and buyers must follow multiple jurisdictions’ rules. Platforms must implement clear terms, secure contracts, and transparent policies to protect all parties. Understanding and complying with evolving regulations is essential for sustainability. Legal uncertainty and non-compliance can hinder operations, reduce participation, and pose significant challenges to maintaining trust in web auction environments.

  • Intense Competition

Web auctions operate in a highly competitive environment, with numerous platforms and sellers offering similar products. Buyers can easily compare options and switch to competitors, reducing loyalty and margin for sellers. Price wars and aggressive bidding may lead to reduced profits or dissatisfied participants. Platforms must continuously innovate, provide reliable service, and offer unique value to attract users. Intense competition also pressures sellers to optimize inventory, marketing, and pricing strategies. Without differentiation, both buyers and sellers may abandon the platform. Maintaining competitiveness while ensuring fairness, trust, and engagement is a constant challenge for web auction operators.

Meaning and Concept of Fund, Funding, Reasons, Types

A fund is a pool of money set aside for a specific purpose, often managed by individuals, institutions, or governments. Funds are used to finance projects, investments, or operations, such as retirement funds, mutual funds, or emergency funds. In business, funds can be internally generated from profits or externally raised through investors. Funds are typically tracked and managed carefully to ensure they serve their intended purpose. Whether for personal savings, charitable causes, or business ventures, a fund provides structured financial resources to support ongoing or future needs, helping ensure stability, planning, and financial control.

Funding

Funding refers to the act of providing financial resources to support a business, project, or cause. It can come from various sources such as personal savings, loans, investors, crowdfunding, or government grants. In startups and entrepreneurship, funding is crucial for product development, marketing, hiring, and scaling operations. There are different stages of funding like seed, venture capital, and series funding. The type and amount of funding depend on business needs and growth objectives. Effective funding ensures a project’s financial health, enabling innovation and expansion while often involving ownership or repayment agreements with fund providers.

Reasons of Funding:

  • Startup Capital

Funding launches a business by covering initial costs like product development, licenses, and early hires. Without capital, ideas remain unrealized. Investors (angels, VCs) provide this runway in exchange for equity or future returns.

  • Scaling Operations

Expanding to new markets, hiring talent, or boosting production requires significant capital. Funding fuels growth beyond bootstrapping limits, helping businesses capture market share before competitors.

  • Research & Development (R&D)

Innovation demands investment in tech, prototypes, and testing. Funding accelerates R&D cycles, enabling breakthroughs (e.g., AI tools, pharmaceuticals) that secure a competitive edge.

  • Marketing and Customer Acquisition

Brand awareness and lead generation require budgets for ads, SEO, and sales teams. Funding ensures campaigns reach critical mass to drive sustainable revenue.

  • Survival in Crisis

Economic downturns, cash flow gaps, or unexpected setbacks (e.g., pandemic disruptions) threaten survival. Emergency funding (loans, grants) stabilizes operations.

  • Debt Refinancing

Businesses secure funding to repay high-interest loans, reducing financial strain and improving credit health for future growth.

  • Strategic Acquisitions

Funding enables purchasing competitors, patents, or complementary businesses to consolidate market power and diversify offerings.

Types of Funding:

  • Bootstrapping (Self-Funding)

Bootstrapping means funding a business using personal savings or revenue generated by the company. It’s common in the early stages when external investors are not yet involved. Entrepreneurs retain full ownership and control, avoiding debt or equity dilution. Though it limits initial capital, bootstrapping encourages careful spending and lean operations. It’s ideal for startups with low overhead and scalable models. However, the risk is high as the founder bears all financial burdens. Success depends on disciplined budgeting and reinvesting profits to grow steadily without relying on outside help.

  • Crowdfunding

Crowdfunding involves raising small amounts of money from a large number of people, typically via online platforms like Kickstarter or Indiegogo. Entrepreneurs present their idea to the public, who fund it in exchange for rewards, early access, or equity. This method validates market demand while generating capital. It suits creative products or innovative startups looking to build a community. However, success depends on marketing appeal and transparency. Failure to meet targets or fulfill promises may damage reputation. Crowdfunding also requires detailed planning, engaging presentations, and often, a pre-existing audience to attract contributions.

  • Angel Investment

Angel investors are wealthy individuals who provide capital to early-stage startups in exchange for equity or convertible debt. They often bring mentorship, industry experience, and networking opportunities. Angel funding typically bridges the gap between self-funding and venture capital, offering both financial support and strategic guidance. It’s beneficial for startups with growth potential but limited access to institutional funding. However, it involves giving up a portion of ownership and may lead to differences in vision. Angel investors are more risk-tolerant than banks and usually invest in ideas they believe in personally or professionally.

  • Venture Capital

Venture Capital (VC) funding is provided by investment firms to high-potential startups in exchange for equity. VCs usually invest during the growth stage, expecting significant returns as the business scales. They offer large capital, mentorship, and market connections. However, startups must demonstrate scalability and a strong business model. VC funding comes in multiple rounds (Series A, B, C, etc.), and founders often give up substantial control. The goal of VC firms is eventual exit through IPO or acquisition. While risky, it is one of the most aggressive and fast-paced funding methods.

  • Bank Loans

Bank loans are a traditional funding method where businesses borrow money from financial institutions and repay it with interest over time. It’s a non-dilutive source, meaning owners retain full equity. Banks evaluate credit history, collateral, and business plans before approval. Bank loans are suitable for stable businesses with predictable cash flow and assets to secure the loan. However, they come with rigid repayment schedules and interest obligations. Startups may find it difficult to qualify without strong financial records. Nonetheless, loans offer a structured and regulated financing option for businesses seeking long-term capital.

WTO Patent Rules

The Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) is an international legal agreement between all the member nations of the World Trade Organization (WTO). It sets down minimum standards for the regulation by national governments of many forms of intellectual property (IP) as applied to nationals of other WTO member nations. TRIPS was negotiated at the end of the Uruguay Round of the General Agreement on Tariffs and Trade (GATT) between 1989 and 1990 and is administered by the WTO.

The TRIPS agreement introduced intellectual property law into the multilateral trading system for the first time and remains the most comprehensive multilateral agreement on intellectual property to date. In 2001, developing countries, concerned that developed countries were insisting on an overly narrow reading of TRIPS, initiated a round of talks that resulted in the Doha Declaration. The Doha declaration is a WTO statement that clarifies the scope of TRIPS, stating for example that TRIPS can and should be interpreted in light of the goal “to promote access to medicines for all.”

Specifically, TRIPS requires WTO members to provide copyright rights, covering authors and other copyright holders, as well as holders of related rights, namely performers, sound recording producers and broadcasting organisations; geographical indications; industrial designs; integrated circuit layout-designs; patents; new plant varieties; trademarks; trade names and undisclosed or confidential information. TRIPS also specifies enforcement procedures, remedies, and dispute resolution procedures. Protection and enforcement of all intellectual property rights shall meet the objectives to contribute to the promotion of technological innovation and to the transfer and dissemination of technology, to the mutual advantage of producers and users of technological knowledge and in a manner conducive to social and economic welfare, and to a balance of rights and obligations.

Requirements

TRIPS requires member states to provide strong protection for intellectual property rights. For example, under TRIPS:

  • Copyright terms must extend at least 50 years, unless based on the life of the author. (Art. 12 and 14)
  • Copyright must be granted automatically, and not based upon any “formality”, such as registrations, as specified in the Berne Convention. (Art. 9)
  • Computer programs must be regarded as “literary works” under copyright law and receive the same terms of protection.
  • National exceptions to copyright (such as “fair use” in the United States) are constrained by the Berne three-step test
  • Patents must be granted for “inventions” in all “fields of technology” provided they meet all other patentability requirements (although exceptions for certain public interests are allowed (Art. 27.2 and 27.3) and must be enforceable for at least 20 years (Art 33).
  • Exceptions to exclusive rights must be limited, provided that a normal exploitation of the work (Art. 13) and normal exploitation of the patent (Art 30) is not in conflict.
  • No unreasonable prejudice to the legitimate interests of the right holders of computer programs and patents is allowed.
  • Legitimate interests of third parties have to be taken into account by patent rights (Art 30).
  • In each state, intellectual property laws may not offer any benefits to local citizens which are not available to citizens of other TRIPS signatories under the principle of national treatment (with certain limited exceptions, Art. 3 and 5). TRIPS also has a most favored nation clause.
  • The TRIPS Agreement incorporates by reference the provisions on copyright from the Berne Convention for the Protection of Literary and Artistic Works (Art 9), with the exception of moral rights. It also incorporated by reference the substantive provisions of the Paris Convention for the Protection of Industrial Property (Art 2.1). The TRIPS Agreement specifically mentions that software and databases are protected by copyright, subject to originality requirement (Art 10).

Article 10 of the Agreement stipulates: “1. Computer programs, whether in source or object code, shall be protected as literary works under the Berne Convention (1971). 2. Compilations of data or other material, whether in machine readable or other form, which by reason of the selection or arrangement of their contents constitute intellectual creations shall be protected as such. Such protection, which shall not extend to the data or material itself, shall be without prejudice to any copyright subsisting in the data or material itself.”

Post-TRIPS expansion

In addition to the baseline intellectual property standards created by the TRIPS agreement, many nations have engaged in bilateral agreements to adopt a higher standard of protection. These collection of standards, known as TRIPS+ or TRIPS-Plus, can take many forms. General objectives of these agreements include:

  • The creation of anti-circumvention laws to protect Digital Rights Management systems. This was achieved through the 1996 World Intellectual Property Organization Copyright Treaty (WIPO Treaty) and the WIPO Performances and Phonograms Treaty.
  • More stringent restrictions on compulsory licenses for patents.
  • More aggressive patent enforcement. This effort has been observed more broadly in proposals for WIPO and European Union rules on intellectual property enforcement. The 2001 EU Copyright Directive was to implement the 1996 WIPO Copyright Treaty.
  • The campaign for the creation of a WIPO Broadcasting Treaty that would give broadcasters (and possibly webcasters) exclusive rights over the copies of works they have distributed.

Restoration and surrender of lapsed patent

The Patents Act provides certain safeguards for restoring a lapsed patent. Accordingly a patent that is ceased to have effect because of failure to pay the prescribed fees within the prescribed period under Section 53 of the Act or within such period, allowed under Section 142 of the Act.

The patentee of his legal representative, may, make an application in the prescribed manner for the restoration of the lapsed patent. In the case where the patent was held by two or more persons jointly then with the leave of the Controller one or more of them without joining others may submit the application for restoration within eighteen months from the date on which the patent is ceased to have effect. Though the renewal fees can be paid by any person, the application for the restoration of a lapsed patent, the application has to be made by the patentee or his legal representative.

If the patentee fails to pay the renewal fee within the prescribed period and also within the extendable period of six months by requesting extension of time, the patent ceases to have effect or lapses from the date of expiration. Patent lapsed, due to non-payment of renewal/maintenance fee can be restored within eighteen months from the date of lapse.

Within one year of an application for restoration of patent that lapsed should be made. If an overdue annuity is not paid within the extension period, the one year period for seeking restoration commences from the date of recordal.

Section 60 Indian Patent Act:

(1) Where a patent has ceased to have effect by reason of failure to pay any renewal fee within the prescribed period or within that period as extended under sub-section (3) of section 53, the patentee or his legal representative, and where the patent was held by two or more persons jointly, then, with the leave of the Controller, one or more of them without joining the others, may, within eighteen months from the date on which the patent ceased to have effect, make an application for the restoration of the patent.

(2) An application under this section shall contain a statement, verified in the prescribed manner, fully setting out the circumstances which led to the failure to pay the prescribed fee, and the Controller may require from the applicant such further evidence as he may think necessary

The Essential Requirements to Restore a Patent:

  1. Under Section 60 of the Patents Act 1970, an application for restoration of lapsed patent should be made by patentee or his legal representative.
  2. Prescribed fee on Form 15
  3. Proof to support that failure of the renewal/ maintenance was unintentional.

Although there is no additional fee for Patent of addition, but the patent holder or the patentee has to submit each form individually for each additional patent with that of the parent restoration application.

Effect of non-payment of renewal fees

To keep the patent in force for its prescribed term, an annual renewal fee is paid to the patent Office. If the same is not paid in the stipulated period then it lapses (ceased to have effect) and becomes a public property. The Act provides certain Safeguards for restoring a lapsed patent.

Accordingly, a patent which is to have effect by reason of Failure to pay the prescribed renewal fees within the prescribed period under Section 53 of the Act, the patentee or his legal representative may make an application in the prescribed manner, for the restoration of the lapsed patent. In case where the patent was held by two or more persons jointly, then, with the leave of the Controller, one or more of them, without joining others, may submit the application for restoration within eighteen months from the date on which the patent ceased to have effect ( Section 60(1)).

Procedure for Disposal of Application for Restoration

a) When the Controller is prima facie satisfied that the failure to pay renewal fee was unintentional and there had been no undue delay, the application for restoration will be published in the official journal.

b) If the Controller is satisfied that a prima facie case for restoration has not been made, the Controller may issue a notice to the applicant to that effect. Within one month from the date of notice, if the applicant makes a request to be heard on the matter, a hearing shall be given and the restoration application may be disposed. If no request for hearing is received within one month from the date of notice by the Controller, the application for restoration is refused. In case of rejection of the application for restoration, a speaking order shall be issued.

c) Any person interested may give Notice of Opposition, in the prescribed manner, to the application within two months of the date of Publication in the official journal on the grounds that the failure to pay the renewal fee was not unintentional or that there has been undue delay in the making of the application.

d) The Notice of Opposition shall include a statement setting out the nature of the opponent’s interest, the grounds of opposition, and the facts relied upon. The notice of opposition shall be sent to the applicant expeditiously by the Controller.

e) The procedure specified in rules 57 to 63 for post grant opposition for filing of written statement, reply statement; reply evidence, hearing and cost shall apply in this case.

f) When no opposition is received within a period of two months from the date of publication of the application for restoration, or opposition, if any, is disposed of in favour of the Patentee, the Controller shall issue an order allowing the application for restoration. The unpaid renewal fee and the additional fee, as mentioned in the first schedule, shall be paid within one month from the date of order of the Controller.

g) The fact that a patent has been restored shall be published in the official journal.

h) To protect the persons who have begun to use the applicant’s invention between the date when the Patent ceased to have effect and the date of Publication of the Application for restoration, every order for restoration includes the provisions and other conditions, as the Controller may impose, for protection and compensation of the above-mentioned persons. No suit or other proceeding shall be commenced or prosecuted in respect of an infringement of a Patent committed between the date on which the Patent ceased to have effect and the date of the Publication of the Application for restoration of the patent.

Opposition to the Restoration af a Lapsed Patent

  • If after hearing the applicant in cases where the applicant so desires or the Controller thinks fit, the controller is prima facie satisfied that the failure to pay the renewal fee was unintentional and that there has been no undue delay in the making of the application he shall publish the application in the prescribed manner and within the prescribed period any person interested may give notice for opposition for the restoration of the patent on either or both of the following grounds:-

a) That the failure to pay the renewal was not unintentional; or

b) That there has been undue delay in the making of the application for restoration (Section 61(1)).

  • No other Grounds are prescribed for filing such notice o opposition for the restoration of a lapsed patent. Only person interested can file the notice of opposition for the restoration of the lapsed patent.
  • The time period for filing the notice of opposition is two months from the date of publication and the same is filed on Form 14 with its prescribed fee. Indian Patent Act and the rules do not provide any extension beyond the period of two months for filing the opposition. However, a petition under Rule 138 of Patent Rules can be filled seeking extension of time beyond the two months period with its prescribed fees. It should be noted that the petition for extension to be filed within the period of two months only. Since the grant of the extension under rule 138 is the discretionary power of the Controller, the grant of extension cannot be taken for granted.

Rights of Patentee of Lapsed Patent which have been Restored SECTION 62

  • On the restoration of a patent, the rights of the patentee shall be subject to such provision as may be prescribed by the Controller in his order and to such other provisions as he thinks fit to impose for the protection of compensation of persons who might have began to avail them of. Or the patented invention between the date when the patent ceased to have effect and the date of publication of the application for the restoration of patent Section 62(1),
  • On the lapsing of the patent due to Nonpayment of the renewal fees, the patentee loses his right in the patent and the invention becomes public property. The provision contained in section 62 of The Act is to safeguard the interests of those persons who after ascertain from the Register of Patents that the patent has lapsed due to Nonpayment of the renewal fees and become public property had started commercially using the invention

Surrender of patents

(1) A patentee may, at any time by giving notice in the prescribed manner to the Controller, offer to surrender his patent.

(2) Where such an offer is made, the Controller shall advertise the offer in the prescribed manner, and also notify every person other than the patentee whose name appears in the register as having an interest in the patent.

(3) Any person interested may, within the prescribed period after such advertisement, give notice to the Controller of opposition to the surrender, and where any such notice is given the Controller shall notify the patentee.

(4) If the Controller is satisfied after hearing the patentee and any opponent, if desirous of being heard, that the patent may properly be surrendered, he may accept the offer and, by order, revoke the patent.

Invention and non-invention in Patent Act

Invention under the Patent Act

The Act under Section 2(1)(j) defines “invention” as a new product or process involving an inventive step capable of industrial application.

The term “industrial application” refers to capable of industrial application in relation to an invention means that the invention is capable of being made or used in an industry. One of the pre-requisite of invention is that it should be new i.e. the invention proposed to be patented has not been in the public domain or that it does not form part of the state of the art.

Under the Patent Act, both processes and products are entitled to qualify as inventions if they are new, involve an inventive step and are capable of industrial application.

Requirements to Qualify as Invention

  1. The Invention must be new;
  2. Invention must involve an inventive step;
  • The invention must be capable of industrial application or utility;
  1. The invention shouldn’t come under the inventions which are not patentable under Section 3 and 4 of the Patent Act, 1970;

Non-patentable inventions are enumerated under Section 3 and 4 of the Patent Act. Such inventions are delineated below:

  • Any Invention which is frivolous or which claims anything obviously contrary to well established natural laws is not patentable.
  • Inventions which are contrary to public order or morality is not patentable.
  • An idea or discovery cannot be a subject matter of a patent application.
  • Inventions pertaining to known substances and known processes are not patentable i.e. mere discovery of a new form of a known substance which does not enhance the known efficacy of that substance is not patentable.
  • An invention obtained through a mere admixture or arrangement is not patentable.
  • A method of agriculture or horticulture cannot be subject matter of patent.
  • A process involving medical treatment of human and animals or to increase their economic value cannot be subject matter of a patent.
  • Plants and animals in whole or in part are not patentable.
  • A mathematical or business method or a computer program per se or algorithms is excluded from patent protection.
  • Matters that are subject matter of copyright protection like literary, dramatic, musical or artistic work is not patentable.
  • Any scheme or rule.
  • Presentation of information
  • Topography of integrated circuits.
  • Traditional knowledge.
  • Inventions relating to atomic energy
  • As defined in Section 2 (j)the term “invention means a new product or process involving an inventive step and capable of application”. The invention should be of absolute novelty as neither it has been used nor published in any part of the world.

Section 3 And 4 Of The Indian Patent Act

Section 3 and Section 4 of the Patent Act is highly debatable and deals with the list of exclusions that are non-patentable that do not satisfy the above conditions. Following are not the “inventions” under the meaning of this act:

(a) Inventions that are frivolous and contrary to natural laws.

Inventions which are frivolous or contrary to well established natural laws.

Example– Inventions that are against the natural laws that are any machine giving 100% efficiency, or any machine giving output without an input cannot be considered as obvious and cannot be patented.

b) Inventions which go against public morality

Inventions in which the primary or intended use or commercial exploitation of which could be contrary to public order or morality (that is against the accepted norms of the society and is punishable as a crime) or which causes serious prejudice to human, animal or plant life or health or to the environment.

ExampleAs in Biotechnology, termination of the germination of a seed by inserting a gene sequence that could lead to the disappearance of butterflies, any invention leading to theft or burglary, counterfeiting of currency notes, or bioterrorism.

(c) Inventions that are a mere discovery of something that already exists in nature.

The mere discovery of a scientific principle or the formulation of an abstract theory or discovery of any living or non-living substances occurring in nature.

ExplanationMere discovery of something that is already existing freely in nature is a discovery and not an invention and hence cannot be patented unless it is used in the process of manufacturing an article or substance. For instance, the mere discovery of a micro-organism is not patentable.

Click Above

Click Here

Landmark Cases of Non-patentable Inventions

In Bilski V. Kappos,

This case deals with the Patentability of a business method. In this case, Bilski and Warsaw applied for the patent on hedging risks on commodities trading but their patent got rejected by the US Supreme Court on grounds that an abstract idea cannot be patented.

(d) The mere discovery of a form already existing in nature does not lead to enhancement of efficacy.

The mere discovery of a new form of a known substance which does not result in the enhancement of the known efficacy of that substance or the mere discovery of any new property or new use for a known substance or of the mere use of a known process, machine or apparatus unless such known process results in a new product or employs at least one new reactant.

ExplanationFor the purposes of this clause, salts, esters, ethers, polymorphs, metabolites, pure form, particle size, isomers, mixtures of isomers, complexes, combinations and other derivatives of known substance shall be considered to be the same substance, unless they are significantly different in terms of efficacy.

The mere discovery of any new property or use of a known substance is not patented unless it is of greater efficiency than the original substance hence, the mere incremental innovation does not fall under the gamut of patenting.

(d) The mere discovery of a form already existing in nature does not lead to enhancement of efficacy.

The mere discovery of a new form of a known substance which does not result in the enhancement of the known efficacy of that substance or the mere discovery of any new property or new use for a known substance or of the mere use of a known process, machine or apparatus unless such known process results in a new product or employs at least one new reactant.

ExplanationFor the purposes of this clause, salts, esters, ethers, polymorphs, metabolites, pure form, particle size, isomers, mixtures of isomers, complexes, combinations and other derivatives of known substance shall be considered to be the same substance, unless they are significantly different in terms of efficacy.

The mere discovery of any new property or use of a known substance is not patented unless it is of greater efficiency than the original substance hence, the mere incremental innovation does not fall under the gamut of patenting.

Case laws
In Glochem Industries Ltd vs Cadila Healthcare Ltd14,[2]

The Bombay High Court held that “Section 3 (d) consists of all fields including the field of pharmacology. Further, in this case, the court held that “the test to decide whether the discovery is an invention or not? It is on the patent applicant to show that the discovery has resulted in enhancement of known therapeutic efficacy of the original substance and if the discovery is nothing other than the derivative of a known substance, then, it must be shown that the properties in derivatives are significantly different in terms of efficacy. So under this sub-section, the very discovery of a new form of a known substance which does not result in the enhancement of the known efficacy of that substance will not be treated as an invention.

In Ten Xc Wireless Inc & Anr vs Mobi Antenna Technologies,

The Delhi High Court held that “a method of replacing conventional antennae with split-sector antennae; a split-sector asymmetric antenna for replacing conventional antennae – are all mere uses for the asymmetric antenna already known. Under Section 3(d) the subject matter claimed is therefore not an invention.

In Novartis Ag v. Union of India15,

The Supreme Court of India said that “mere discovery of an existing substance would not amount to the invention”. The Supreme Court of India further, in this case, held that for pharmaceutical patents apart from tests of novelty, inventive step and application, there is a new test of enhanced therapeutic efficacy for claims that cover incremental changes to existing drugs which also Novartis’s drug did not qualify”.

(e) Mere admixing of mixtures leading in the aggregation of properties are non- patentable.

A substance obtained by a mere admixing of two or more mixtures resulting only in the aggregation of the properties of the components thereof or a process for producing such substance is not considered the invention.

Explanation- mere addition of mixtures is non-patentable unless this satisfies the requirement of synergistic effect i.e., interaction of two or more substances or agents to produce a combined effect greater than the separate effect.

(f) Mere aggregation or duplication of devices working in a known way is not an invention.

The mere aggregation or re-arrangement or duplication of known devices each functioning independently of one another in a known way.

Explanation- mere improvement on something or combinations of different matters known before cannot be patentable unless this produces a new result or article.

(h) Horticulture or agricultural method is non-patentable.

A method related to agriculture or horticulture.

Explanation- a method of producing plants like cultivation of algae and mushrooms or improving the soil is not an invention and cannot be patentable.

(i) Medicinal, curative, prophylactic, diagnostic, therapeutic for treating diseases in human and animals are non-patentable.

Any process for the medicinal, surgical, curative, prophylactic, diagnostic, therapeutic or other treatment of human beings or any process for a similar treatment of animals to render them free of disease or to increase their economic value or that of their products.

Explanation: those medicinal methods administering medicines orally or injecting it, surgical methods like stitch free surgeries, curative methods as curing plaques etc does not fall under the ambit of the invention and are non- patentable.

Case law
In Mayo Collaborative Services V. Prometheus Laboratories, Inc20.

In this case, the US Supreme Court said that “diagnostic and therapeutic methods (which includes the treatment or cure of diseases) is not patentable as it claims a law of nature”.

(j) Essential biological processes for the production or propagation of animals and plants is not an invention.

Plants and animals in whole or any part thereof other than micro-organisms but including seeds, varieties and species and essentially biological processes for production or propagation of plants and animals.

(k) Simple mathematical or business or computer programs are not an invention.

A mathematical or business method or a computer program per se or algorithms;

Explanation– any mathematical calculation, any scientific truth or act of mental skills any activities related to business methods or algorithms (which are like the law of nature) cannot be patented.

(l) Aesthetic creation is not an invention.

A literary, dramatic, musical or artistic work or any other aesthetic creation whatsoever including cinematographic works and television productions.

Explanation– such activities like writings, painting, sculpting, choreographing, cinematographing all these which are related to creativity cannot be patented and fall under the gamut of Copyright Act, 1957.

(m) Mental act, rule or method is not an invention.

A mere scheme or rule or method of performing mental act or method of playing a game.

Explanation- playing a game such as chess, sudoku etc are not considered as inventions rather these are mere brain exercises and hence are not patented.

(n) Presentation of information is non-patentable.

Explanation- a mere presentation of information by tables, chars is not an invention and hence are not patentable, for example, railway timetables, calendars etc.

(o) The topography of integrated circuits is non-patentable

Such as semiconductors used in microchips are not patented.

(p) Traditional Knowledge is not an invention.

An invention which in effect, is traditional knowledge or which is an aggregation or duplication of known properties of the traditionally known component or components.

Explanation- the traditional knowledge is know-how, skills, that is passed from generations to generations of a community and is already known cannot be patented for example the antiseptic properties of turmeric.

(q) Atomic-Energy inventions are non -patentable.

Section 4 deals with inventions relating to atomic energy, that are also not patentable and that fall within sub-section (1) of section 20 of the Atomic Energy Act, 1962.

Will NCPI (Bhim) Qualify For Patents?

Unified Payments is a payments mechanism that allows bank customers to send and receive money via a smartphone in real time. These payments settlements technology has been developed by NPCI (National Payments Corporation of India) which is a Reserve Bank of India backed entity with support from Indian banks.

NPCI indicated that the proximity-based solution offered by Tone Tag(a Bangalore based tech startup) could employ a tone, a sound, a near field communication (NFC), a radio-frequency identification device (RFID) or deploy ultra-high frequency (UHF) technology or a combination of these relying upon algorithm encryption. The request for proposal of NCPI added a  clause that raises questions about whether NPCI’s RFP violates Section 3(k) of the Act, as amended in 2002, lists ‘a mathematical or business method or a computer programme per se or algorithms’ under ‘inventions not patentable.

Patentability of Artificial Intelligence

The AI applications are modern-day machine learning functions and are of significant importance, especially in the commercial AI sector. However, the question is, should AI be patentable?

Indian Patent System for AI-based inventions

In India for patenting an AI technology one needs to follow the Computer-related Inventions (CRIs) guidelines which exclude a computer programme or algorithms from being patented (under 3(k) of the Indian Patent Act). At present these guidelines are focused on computers/algorithm/software based inventions and also are used to examine AI based inventions.

To claim for patenting the inventions based on AI following are needed:

  • Describe hardware (eg computer system, server, sensors etc.) along with AI algorithms in your patent;
  • Claim working method/process of the invention which uses AI; and
  • Refrain from focussing directly on programming codes/algorithms of AI.

The word “Artificial Intelligence” can be seen in claims of the granted patents but it is to be noted that this word is used to represent part of a system that utilizes data/commands provided by AI system. However, no focus is made on the operating principle of AI.

Firewall, Components, Working, Types, Challenges

Firewall is a network security system that monitors, filters, and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between trusted internal networks and untrusted external networks, such as the internet, to prevent unauthorized access and potential cyberattacks. Firewalls can be hardware-based, software-based, or a combination of both. They examine data packets, allowing only legitimate traffic while blocking malicious or suspicious activity. By enforcing access policies, firewalls protect systems from hackers, malware, and unauthorized users, ensuring data confidentiality, integrity, and availability within networks and computer systems.

Components of Firewall:

  • Packet Filtering

Packet filtering is a fundamental firewall component that examines data packets entering or leaving the network. It analyzes packet headers, such as IP addresses, port numbers, and protocols, to determine whether to allow or block the traffic based on predefined rules. This method is fast and efficient, but it cannot inspect the actual data content, making it vulnerable to advanced threats. Packet filtering works as the first line of defense, ensuring only traffic matching the organization’s security policies is permitted. While simple, it provides essential control over basic network traffic flow.

  • Proxy Service

A proxy service acts as an intermediary between users and the internet. Instead of direct communication, the firewall’s proxy server fetches requests on behalf of the user, providing an additional security layer. It hides the internal network structure, preventing attackers from identifying devices within the system. Proxies can also perform deep packet inspection, cache frequently accessed content, and filter requests based on content or user behavior. By breaking direct connections, proxies reduce exposure to threats, enhance privacy, and enforce security policies, making them essential for controlling application-level communication.

  • Stateful Inspection

Stateful inspection, also called dynamic packet filtering, monitors the state and context of active network connections. Unlike basic packet filtering, which checks packets in isolation, stateful inspection analyzes the entire traffic session, ensuring packets are part of a legitimate, established connection. It maintains a state table to track sessions and validates whether incoming packets match expected patterns. This prevents unauthorized attempts like spoofing or session hijacking. Stateful inspection provides a balance of strong security and performance, offering a more robust solution for modern networks compared to simple filtering techniques.

  • Network Address Translation (NAT)

NAT is a firewall component that conceals internal IP addresses by translating them into a single public IP address for external communication. This masking improves security by hiding the network’s internal structure from outsiders. NAT also helps conserve limited IPv4 addresses by allowing multiple devices to share one public IP. In addition to protecting devices from direct external exposure, NAT ensures efficient traffic management. Combined with firewall rules, NAT minimizes the risk of attacks on internal systems, making it a critical function in safeguarding organizational networks from potential cyber intrusions.

  • Virtual Private Network (VPN) Support

Many firewalls include VPN support to establish secure, encrypted tunnels for remote access. VPN-enabled firewalls allow employees or authorized users to connect to the organization’s internal network safely over the internet. By encrypting traffic, VPNs ensure confidentiality, integrity, and authentication, protecting sensitive data from interception. They also enforce access control by verifying user credentials before granting entry. VPN integration in firewalls is especially important for organizations with remote workers, branch offices, or cloud-based operations, as it ensures safe communication and resource sharing while maintaining the network’s security perimeter.

  • Intrusion Detection and Prevention (IDPS)

Intrusion Detection and Prevention Systems (IDPS) in firewalls monitor network traffic for suspicious activity or policy violations. They use signature-based, anomaly-based, or behavioral techniques to identify threats like malware, denial-of-service attacks, or unauthorized access attempts. An IDS alerts administrators about suspicious events, while an IPS actively blocks or mitigates malicious traffic in real-time. Integrating IDPS with firewalls provides layered defense against both known and emerging cyber threats. This proactive security feature ensures threats are detected early, reducing damage and maintaining network integrity.

  • Logging and Monitoring

Logging and monitoring are essential firewall components that record details of all traffic and activities passing through the firewall. Logs include information such as source and destination IPs, ports, protocols, and timestamps of network events. These records help administrators analyze traffic patterns, detect anomalies, and investigate security incidents. Real-time monitoring enables quick response to attacks, while historical logs support audits and compliance requirements. By offering visibility into network behavior, logging and monitoring strengthen overall security posture, enabling organizations to improve firewall policies and anticipate potential threats more effectively.

  • Content Filtering

Content filtering in firewalls controls access to inappropriate, harmful, or non-business-related websites and online resources. By inspecting web traffic, the firewall blocks access to sites containing malware, phishing, or offensive content, ensuring employee productivity and organizational safety. Content filtering can also restrict access based on categories like social media, streaming platforms, or gaming. It often integrates with URL filtering databases or keyword-based restrictions. Beyond security, content filtering helps organizations comply with regulations, maintain bandwidth efficiency, and protect users from harmful online material.

How does a Firewall Work?

  • Traffic Monitoring and Filtering

A firewall works by continuously monitoring all incoming and outgoing network traffic. It acts as a security guard, examining data packets that travel between a private network and external sources like the internet. Each packet is inspected based on pre-set rules such as IP addresses, port numbers, and protocols. If a packet meets the allowed criteria, it is permitted to pass; otherwise, it is blocked. This packet-filtering process ensures that only safe and authorized communication enters or leaves the network, providing a first line of defense against unauthorized access.

  • Access Control

Firewalls enforce access control by defining which users, devices, or applications can interact with the network. Administrators configure policies that specify permitted services, such as web browsing or email, while restricting unwanted ones. By applying these rules, the firewall creates barriers between trusted and untrusted zones, ensuring critical systems are shielded. Access control may be based on IP addresses, domain names, or authentication credentials. This mechanism helps prevent attackers, malware, or unauthorized users from exploiting the network. Essentially, firewalls limit exposure by ensuring that only approved communication is allowed, maintaining both privacy and system integrity.

  • Stateful Inspection

Modern firewalls use stateful inspection, a method that not only checks packet headers but also tracks the state of active connections. Instead of treating each packet independently, the firewall records session details in a state table. It verifies whether a packet belongs to an established, legitimate connection or is suspicious. For example, if a packet claims to be a response to a request but no such request was sent, the firewall will block it. This deeper inspection provides more accuracy and security than simple packet filtering, helping to detect and stop sophisticated cyberattacks effectively.

  • Protection Against Threats

A firewall acts as a defense mechanism by blocking malicious traffic, viruses, worms, and hacking attempts before they reach the network. Many firewalls integrate intrusion detection, intrusion prevention, and content filtering to strengthen security. They can identify unusual patterns, such as port scanning or denial-of-service (DoS) attempts, and take immediate action. By controlling both inbound and outbound traffic, firewalls prevent sensitive data from being leaked or stolen. This multi-layered protection reduces vulnerabilities and ensures the confidentiality, integrity, and availability of network resources, making firewalls a critical safeguard in cybersecurity.

Types of Firewalls:

  • Packet-Filtering Firewall

A packet-filtering firewall is the most basic type, which examines data packets moving across a network. It checks source and destination IP addresses, port numbers, and protocols against predefined rules. If the packet matches the rules, it is allowed; otherwise, it is blocked. This firewall works at the network layer and is efficient but limited because it does not inspect the content of packets. While it provides quick filtering, it is vulnerable to sophisticated attacks that disguise malicious data. It is best suited for small networks requiring simple, cost-effective protection without complex monitoring.

  • Stateful Inspection Firewall

A stateful inspection firewall, also known as a dynamic packet filter, goes beyond simple packet filtering. It monitors active connections and keeps track of the state of network sessions using a state table. Instead of only checking packet headers, it verifies whether the packet belongs to an existing, legitimate session. This makes it more secure than basic firewalls, as it prevents malicious or unsolicited traffic. Stateful firewalls are commonly used in modern networks because they balance performance and security. They are effective in protecting against unauthorized access and attacks while still maintaining efficient traffic flow.

  • Proxy Firewall (Application-Level Gateway)

A proxy firewall acts as an intermediary between users and the internet by filtering requests at the application layer. Instead of allowing direct communication, it processes requests and forwards them to the destination on behalf of the user. This hides the internal network, offering strong anonymity and protection. Proxy firewalls can inspect data deeply, block harmful content, and prevent direct exposure to threats. However, they may slow down network performance due to heavy traffic inspection. They are useful in organizations needing strict security and monitoring, especially for web browsing, email filtering, and application-level access control.

  • Next-Generation Firewall (NGFW)

Next-Generation Firewalls combine traditional firewall features with advanced capabilities like intrusion prevention systems (IPS), deep packet inspection, and application awareness. Unlike standard firewalls, NGFWs can identify and control applications regardless of port, protocol, or encryption. They also integrate features like malware protection, URL filtering, and threat intelligence. This makes them highly effective against sophisticated cyber threats. NGFWs provide greater visibility into network traffic, enabling organizations to enforce more granular security policies. Although costlier, they are widely adopted by enterprises that require robust, multi-layered security to protect against modern attacks and evolving cyber risks.

Challenges of Firewalls:

  • Limited Protection Scope

Firewalls are effective at blocking unauthorized access, but they cannot detect or prevent all types of cyber threats. They mainly monitor incoming and outgoing traffic, which means attacks like phishing, malware hidden in encrypted traffic, or insider threats may bypass them. Additionally, firewalls do not provide full protection against social engineering or sophisticated zero-day attacks. Relying solely on a firewall without other security measures creates vulnerabilities. To overcome this limitation, organizations must use firewalls in combination with intrusion detection systems, antivirus software, and strong user awareness programs to ensure a multi-layered defense strategy.

  • Performance and Latency Issues

Firewalls, especially advanced ones like next-generation firewalls (NGFWs), can introduce latency by analyzing packets, inspecting content, and filtering applications. High traffic volumes may slow down network performance, causing delays for users and critical business applications. In environments with heavy data flow, this can impact productivity. To address this, organizations need robust hardware, proper configuration, and network optimization strategies. However, upgrading infrastructure increases costs. Balancing strong security with optimal performance remains a challenge, as overloading the firewall or misconfiguring rules may lead to bottlenecks, service disruptions, or even security gaps if traffic inspection is reduced to improve speed.

  • Complex Configuration and Management

Setting up and maintaining a firewall requires skilled administrators to configure rules, policies, and filters correctly. Misconfigured firewalls may either block legitimate traffic, causing disruptions, or allow malicious traffic, creating security holes. Large organizations with complex networks face challenges in managing multiple firewalls across different locations. Regular updates and monitoring are necessary to keep policies aligned with evolving security threats. Inadequate documentation or improper rule prioritization may result in conflicts and vulnerabilities. To overcome this, organizations must invest in trained professionals, automation tools, and consistent auditing practices to ensure firewalls function effectively without compromising usability or security.

  • Cost and Resource Requirements

While basic firewalls are affordable, advanced solutions like next-generation firewalls (NGFWs) come with high costs for acquisition, deployment, and maintenance. Additionally, they require powerful hardware, constant updates, and skilled IT staff for monitoring. Smaller organizations often struggle with these expenses, making them more vulnerable to cyberattacks. Furthermore, as threats evolve, firewalls need regular upgrades, which add to long-term costs. Cloud-based firewalls may reduce infrastructure expenses but still involve subscription fees. Balancing cost-effectiveness and strong security remains a major challenge, especially for businesses with limited budgets that cannot afford enterprise-grade firewall solutions with advanced threat protection.

Domain Name Registration

Domain Name is a unique web address that identifies a website on the internet. It serves as an online identity for businesses, organizations, or individuals looking to establish a digital presence. Registering a domain name is the first step in creating a website, and it requires careful planning to ensure it aligns with the brand, purpose, and target audience.

Steps to Register a Domain Name

1. Choose a Suitable Domain Name

Selecting the right domain name is crucial because it represents a business or personal brand online. Consider the following factors while choosing a domain name:

  • Simplicity: Keep it short, easy to spell, and memorable.
  • Relevance: The name should reflect the website’s purpose or business.
  • Keyword Usage: Including relevant keywords can improve search engine ranking.
  • Avoid Numbers & Hyphens: These can make the domain name harder to remember.

2. Select a Domain Extension

The domain extension, or Top-Level Domain (TLD), follows the domain name (e.g., .com, .org, .net). Some common extensions include:

  • .com – Most popular and widely used for businesses and general websites.
  • .org – Used mainly by non-profits and organizations.
  • .net – Suitable for technology and networking websites.
  • .edu – Reserved for educational institutions.
  • .gov – Used by government entities.

Newer extensions like .tech, .store, .blog, and .online offer more specific branding opportunities.

3. Check Domain Availability

Once a suitable name is chosen, check its availability using a domain registrar. Websites like GoDaddy, Namecheap, Google Domains, and Bluehost provide domain search tools. If the desired name is unavailable, alternative suggestions or different TLDs may be considered.

4. Choose a Domain Registrar

A domain registrar is a company accredited to sell domain names. Some popular domain registrars include:

  • GoDaddy
  • Namecheap
  • Google Domains
  • Bluehost
  • HostGator

Compare pricing, renewal costs, and additional features like domain privacy protection before selecting a registrar.

5. Purchase and Register the Domain

After selecting a domain name and registrar, proceed with the registration:

  • Add the Domain to Cart: Confirm availability and proceed to checkout.
  • Choose Registration Duration: Domains can be registered for one year or more (up to 10 years in most cases).
  • Provide Contact Information: Registrars require details like name, email, phone number, and address.

6. Enable Domain Privacy Protection (Optional)

When a domain is registered, the owner’s details become publicly available in the WHOIS database. Domain privacy protection hides this information to prevent spam and identity theft.

7. Configure Domain Settings

After registration, configure domain settings:

  • Point the Domain to a Website: If building a website, connect the domain to a hosting provider.
  • Set Up Email Accounts: Many registrars offer custom email services (e.g., yourname@yourdomain.com).
  • Renewal & Auto-Renewal: Enable auto-renewal to prevent domain expiration and loss of ownership.

E-commerce: Business Models and Concepts

E-commerce (electronic commerce) refers to the buying and selling of goods and services over the internet. With the rapid growth of technology and internet connectivity, e-commerce has transformed business operations, customer behavior, and market dynamics. There are various business models and concepts that define the structure and functioning of e-commerce.

E-commerce Business Models:

  • Business to Consumer (B2C):

B2C model is one of the most commonly known e-commerce models. It refers to transactions between businesses and individual consumers. Online retailing is the most popular form of B2C commerce. Companies such as Amazon, Alibaba, and Walmart operate in this space, where consumers purchase products or services from businesses directly via websites or mobile apps. In B2C, the transaction process involves browsing, ordering, payment, and delivery, with a focus on providing a user-friendly shopping experience.

  • Business to Business (B2B):

B2B e-commerce involves transactions between two or more businesses. These transactions often include wholesale trade, raw materials, or bulk product purchases. The buyers are typically other companies, rather than individual consumers. Platforms such as Alibaba, ThomasNet, and Indiamart serve as intermediaries for B2B transactions. This model is more complex compared to B2C due to the larger scale of transactions, longer sales cycles, and the need for more robust systems to manage relationships, orders, and logistics.

  • Consumer to Consumer (C2C):

C2C e-commerce refers to transactions between consumers, often facilitated by a third-party platform. Online marketplaces such as eBay, Craigslist, and Poshmark serve as intermediaries, allowing individuals to buy and sell goods or services to one another. The C2C model benefits from low overhead costs as it typically involves no large inventory or physical stores. It’s highly popular for second-hand goods, auctioned items, and peer-to-peer services.

  • Consumer to Business (C2B):

C2B is a less common but growing model where individual consumers offer products or services to businesses. This model has evolved with the rise of freelance work, crowdsourcing, and influencers. Websites like Fiverr, Upwork, and Shutterstock facilitate these transactions by allowing individuals to sell their skills, content, or products to businesses. This model highlights how consumers can generate value for businesses, especially in the context of creative services or product feedback.

  • Business to Government (B2G):

In this model, businesses provide goods and services to governments or government agencies. B2G transactions typically involve government contracts for procurement, consulting, and other services. E-commerce platforms that facilitate B2G exchanges often require complex bidding processes and compliance with governmental regulations. Examples of B2G platforms include government procurement websites and e-tendering portals.

  • Subscription-Based E-commerce:

The subscription model has gained immense popularity, especially in digital content and software services. Under this model, consumers pay a recurring fee for access to products or services over a specified period. Netflix, Spotify, and Amazon Prime are some of the most recognized subscription-based services. Subscription e-commerce also extends to physical goods, such as beauty boxes (e.g., Ipsy), meal kits (e.g., Blue Apron), and even pet supplies (e.g., BarkBox).

  • Marketplace Model:

In a marketplace business model, the platform owner (like Amazon, Etsy, or eBay) acts as an intermediary between sellers and buyers, facilitating transactions without directly selling products. The platform typically charges a fee or commission on each sale. The marketplace model offers businesses the opportunity to reach a larger audience while consumers benefit from a variety of choices and competitive pricing. This model emphasizes scalability, where the platform owner earns revenue without needing to maintain inventory.

Concepts in E-commerce:

  • Digital Payment Systems:

A core aspect of e-commerce is the ability to conduct secure online transactions. Payment gateways such as PayPal, Stripe, and credit card processors facilitate online payments by providing a secure method for transferring money. Digital wallets like Apple Pay and Google Pay have simplified the payment process for consumers, enabling faster transactions with minimal friction.

  • Online Security and Privacy:

With the increasing prevalence of e-commerce, ensuring the safety of consumer data is crucial. Security protocols like Secure Sockets Layer (SSL) and encryption technologies protect sensitive data during online transactions. Additionally, privacy concerns have led to stricter regulations such as the General Data Protection Regulation (GDPR) in Europe, ensuring businesses handle customer data responsibly.

  • Logistics and Supply Chain Management:

Efficient logistics and supply chain management are essential for e-commerce businesses to ensure timely delivery of products. Companies must invest in warehousing, inventory management, and shipping systems to meet consumer expectations. Technologies like dropshipping and fulfillment by Amazon (FBA) have simplified supply chain processes, allowing businesses to focus on sales and customer experience.

  • Customer Relationship Management (CRM):

Successful e-commerce businesses emphasize customer engagement and retention. CRM tools and software help companies track customer interactions, personalize marketing efforts, and improve customer service. Through customer data, businesses can better understand preferences and behavior, enabling tailored marketing campaigns and more efficient sales strategies.

  • Digital Marketing:

E-commerce businesses rely heavily on digital marketing strategies to attract and retain customers. Search Engine Optimization (SEO), Pay-Per-Click (PPC) advertising, email marketing, and social media engagement are some of the common tactics used. Social proof, such as customer reviews and influencer endorsements, plays a critical role in influencing purchasing decisions in the online marketplace.

  • Mobile Commerce (M-commerce):

Mobile commerce, or m-commerce, is another important concept in e-commerce. With the rise of smartphones and mobile apps, many consumers now shop on-the-go. Optimizing websites for mobile devices and creating user-friendly mobile apps are critical strategies for businesses to cater to mobile shoppers. Features like push notifications and location-based promotions also contribute to enhancing the mobile shopping experience.

Patent

A patent is a form of intellectual property that gives the owner the legal right to exclude others from making, using, selling and importing an invention for a limited period of years, in exchange for publishing an enabling public disclosure of the invention. In most countries patent rights fall under civil law and the patent holder needs to sue someone infringing the patent in order to enforce his or her rights. In some industries patents are an essential form of competitive advantage; in others they are irrelevant.

The procedure for granting patents, requirements placed on the patentee, and the extent of the exclusive rights vary widely between countries according to national laws and international agreements. Typically, however, a patent application must include one or more claims that define the invention. A patent may include many claims, each of which defines a specific property right. These claims must meet relevant patentability requirements, such as novelty, usefulness, and non-obviousness.

Under the World Trade Organization’s (WTO) TRIPS Agreement, patents should be available in WTO member states for any invention, in all fields of technology, provided they are new, involve an inventive step, and are capable of industrial application. Nevertheless, there are variations on what is patentable subject matter from country to country, also among WTO member states. TRIPS also provides that the term of protection available should be a minimum of twenty years.

The word patent originates from the Latin patere, which means “to lay open” (i.e., to make available for public inspection). It is a shortened version of the term letters patent, which was an open document or instrument issued by a monarch or government granting exclusive rights to a person, predating the modern patent system. Similar grants included land patents, which were land grants by early state governments in the USA, and printing patents, a precursor of modern copyright.

In modern usage, the term patent usually refers to the right granted to anyone who invents something new, useful and non-obvious. Some other types of intellectual property rights are also called patents in some jurisdictions: industrial design rights are called design patents in the US, plant breeders’ rights are sometimes called plant patents, and utility models and Gebrauchsmuster are sometimes called petty patents or innovation patents.

The additional qualification utility patent is sometimes used (primarily in the US) to distinguish the primary meaning from these other types of patents. Particular species of patents for inventions include biological patents, business method patents, chemical patents and software patents.

  • Patentable

To qualify for a patent, the invention must meet three basic tests. First, it must be novel, meaning that the invention did not previously exist. Second, the invention must be non-obvious, which means that the invention must be a significant improvement to existing technology. Simple changes to previously known devices do not comprise a patentable invention. Finally, the proposed invention must be useful. Legal experts commonly interpret this to mean that no patent will be granted for inventions that can only be used for an illegal or immoral purpose.

Some types of discoveries are not patentable. No one can obtain a patent on a law of nature or a scientific principle even if he or she is the first one to discover it. For example, Isaac Newton could not have obtained a patent on the laws of gravity, and Albert Einstein could not have patented his formula for relativity, E=mc2.

Under the law of the European Patent Convention (EPC), patents are only granted for inventions which are capable of industrial application, which are new and which involve an inventive step. An invention may be defined as a proposal for the practical implementation of an idea for solving a technical problem. An invention is capable of industrial application if it can be made or used in any kind of industry, including agriculture, as distinct from purely intellectual or aesthetic activity.

An invention is said to be new if, prior to the date of filing or to the priority date accorded to the application from an earlier application for the same invention, it was not already known to the public in any form (written, oral or through use), ie it did not form part of the state of the art. An invention is said to involve an inventive step if, in the light of what is already known to the public, it is not obvious to a so-called skilled person, i.e someone with good knowledge and experience of the field.

Under the Indian patent law a patent can be obtained only for an invention which is new and useful. The invention must relate to a machine, article or substance produced by manufacture, or the process of manufacture of an article. A patent may also be obtained for an improvement of an article or of a process of manufacture. In regard to medicine or drug and certain classes of chemicals no patent is granted for the substance itself even if new, but a process of manufacturing and substance is patentable. The application for a patent must be true and the first inventor or the person who has derived title from him, the right to apply for a patent being assignable.

  • Non Patentable

Some inventions cannot be patented. Under the law of the European Patent Convention (EPC) the list of non-patentable subject-matter includes methods of medical treatment or diagnosis, and new plant or animal varieties. Further information on such fields can be obtained from a patent attorney. Nor may patents be granted for inventions whose exploitation would be contrary to public order or morality (obvious examples being land-mines or letter-bombs).The following are not regarded as inventions: discoveries; scientific theories and mathematical methods; aesthetic creations, such as works of art or literature; schemes, rules and methods for performing mental acts, playing games or doing business; presentations of information; computer software.

Under the Indian law the following are non patentable (as mentioned under section 3 and 5 of Indian Patents Act, 1970):

An invention which is frivolous or which claims anything obvious contrary to well established natural laws. An invention the primary or intended use of which would be contrary to law or morality or injurious to public heath. The mere discovery of a scientific principle or the formulation of an abstract theory.

The mere discovery of any new property or new use for a known substance or of the mere use of a known process, machine or apparatus unless such known process results in a new product or employs at least one new reactant.

A substance obtained by a mere admixture resulting only in the aggregation of the properties of the components thereof or a process for producing such substance The mere arrangement or re-arrangement or duplication of known devices each functioning independently of one another in a known way. A method or a process of testing applicable during the process of manufacture for rendering the machine, apparatus or other equipment more efficient or for the improvement or restoration of the existing machine, apparatus or other equipment or for the improvement or control of manufacture.

A method of agriculture or horticulture. Any process for the medicinal, surgical, curative, prophylactic or other treatment of human being or any process for a similar treatment of animals or plants to render them free of disease or to increase their economic value or that of their products.

No Patent shall be granted in respect of an invention relating to Atomic energy. Claiming substances intended for use, or capable of being used, as food or as medicine or drug Relating to substance prepared or produced by chemical processes (including Alloys, optical glass, semiconductor and inter-metallic compounds), no patent shall be granted in respect of claims for the substances themselves, but claims for the methods or processes of manufacture shall be patentable. The criteria under the US laws are also quite similar as above. Books, movies, and works of art cannot be patented, but protection is available for such items under the law of copyright.

  • Rights in a Patent

Patent registrations confers on the rightful owner a right capable of protection under the Act i.e. the right to exclude others from using the invention for a limited period of time. The monopoly over patented right can be exercised by the owner for a period of 20 years after which it is open to exploitation by others.

Patent confers the right to manufacture, use, offer for sale, sell or import the invention for the prescribed period.

Time Period for which Patent is granted:

Initially, the Act provided for a shorter term pf protection for medicine or drug substances. However, vide the Amendment Act of 2005 uniform period of 20 years was provided for all the Patents. Thus, once the prescribed period of 20 years is over, then any person can exploit the patented invention. Here it would be relevant to mention that similar to a trademark even the term of a patent begins from the date of application of patent.

Requirements for Grant of Patent:

  1. The application for Patent shall be made at the Indian Patent Office.
  2. Any person i.e. Indian or a Foreigner, individual, company or the Government can file a Patent Application.
  • The person applying for Patent shall be the true and first inventor of the invention proposed to be patented.
  1. The patent application can also be made jointly.
  2. The patent application shall primarily disclose the best method of performing the invention known to the applicant for which he is entitled to claim protection.
  3. The applicant shall also define the scope of invention.
  • The invention desired to be patented shall be- new, should involve an inventive step and must be capable of industrial application.
  • A patent application can be made for a single invention only.
  1. An international application made under the PCT (Patent Co-operation Treaty) designating India shall be deemed as an application made under the Patents Act with the priority date accruing from the date of the international filing date accorded under the PCT.

Invention under the Patent Act:

The Act under Section 2(1)(j) defines “invention” as a new product or process involving an inventive step capable of industrial application.

The term “industrial application” refers to capable of industrial application in relation to an invention means that the invention is capable of being made or used in an industry. One of the pre-requisite of invention is that it should be new i.e. the invention proposed to be patented has not been in the public domain or that it does not form part of the state of the art.

Under the Patent Act, both processes and products are entitled to qualify as inventions if they are new, involve an inventive step and are capable of industrial application.

Requirements to Qualify as Invention:

  1. The Invention must be new
  2. Invention must involve an inventive step
  • The invention must be capable of industrial application or utility;
  1. The invention shouldn’t come under the inventions which are not patentable under Section 3 and 4 of the Patent Act, 1970;

Non-patentable inventions are enumerated under Section 3 and 4 of the Patent Act. Such inventions are delineated below:

  • Any Invention which is frivolous or which claims anything obviously contrary to well established natural laws is not patentable.
  • Inventions which are contrary to public order or morality is not patentable.
  • An idea or discovery cannot be a subject matter of a patent application.
  • Inventions pertaining to known substances and known processes are not patentable i.e. mere discovery of a new form of a known substance which does not enhance the known efficacy of that substance is not patentable.
  • An invention obtained through a mere admixture or arrangement is not patentable.
  • A method of agriculture or horticulture cannot be subject matter of patent.
  • A process involving medical treatment of human and animals or to increase their economic value cannot be subject matter of a patent.
  • Plants and animals in whole or in part are not patentable.
  • A mathematical or business method or a computer program per se or algorithms is excluded from patent protection.
  • Matters that are subject matter of copyright protection like literary, dramatic, musical or artistic work is not patentable.
  • Any scheme or rule.
  • Presentation of information
  • Topography of integrated circuits.
  • Traditional knowledge.
  • Inventions relating to atomic energy.

Infringement of Patent:

Infringement of Patent primarily refers to intrusion or violation of the rights of a Patentee against which the Patentee has statutory rights under the Act.

The factors that are essential in determining infringement of a Patent are as under:

  1. While determining infringement it has to be assessed whether the infringing activity fell within the scope of the invention. Thus, the infringement has to be determined with regard to what has been claimed as invention under the Patent Act by applying the principles or standards of construction.
  2. To determine whether the infringing activity violated any statutory rights conferred to the Patentee under the Act. In this respect reference can be made to Section 48 of the Act which enumerates the rights of the Patentee with respect to a product patent and process patent.
  3. To determine the infringer i.e. the person liable for the infringement.
  4. To determine whether the infringing act fell within the acts which do not amount to infringement under the Patents Act i.e. excluded acts of Government use, use of patented product or process for experiment or research, import of medicine or drug by Government and patents in foreign vessels and aircrafts.
error: Content is protected !!