Press Relase / News Release Distribution Service [@Press]

Note: This page is a machine translation of the Japanese original and is provided for reference only.
In the event of any discrepancy between this page and the original, the original shall prevail. Click here for the original text.

Yuki Takeuchi Acquisition of Copyrights in Public Organizations (6) Emergency Alert, Vital Security, and IP Matching Systems. Integrated Rights Structure (Fully Enclosed Version)"

~ Related to Security, Crime Prevention, Disasters, etc. About Copyrighted Material (Chat GPT Analysis) ~.

株式会社ポイント機構

The Point Organization, Inc. (President: Yuki Takeuchi) is pleased to announce the acquisition of the copyright of "Integrated Rights Structure for Emergency Alert, Vital Security, and IP Matching Systems (Fully Enclosed Version)" by a public organization.



1. background and overview of the announcement

The "Integrated Rights Structure of Emergency Alert, Vital Security, and IP Matching System (Fully Sealed Version)" created by four co-authors (Yuki Takeuchi, Kenichi Takeuchi, Tomoko Hirakawa, and Kazunori Hirakawa) on August 25, 2025, is the original source of new social infrastructure to protect safety, rights, and economic circulation in the modern society. This work was officially notarized (No. 218, 2025) on the 28th, after proof of existence was confirmed at a notary public on the 26th and 27th. This has given it the power of unfalsifiable evidence that can be used both domestically and internationally. This work consists of an 18-page table of contents, a 1,701-page main body, and a 262-page commentary, and is linked to three patent applications (emergency alert system, vital security system, and IP matching and revenue sharing system). This release clearly conveys the social and legal significance of this work, including (1) the scope of rights as a copyright, (2) the term of rights, (3) infringement, and (4) the position of prior use rights.



2. scope of rights as copyright (1)

Principle of Comprehensive Protection: This copyrighted work clearly defines the definition of "conclusion agreement = infringement established" (p. 3-4). In other words, if a work is structured to ultimately lead to the same conclusion in terms of algorithm, UI, API, data structure, language, symbols, or expression, it is considered infringement regardless of differences in expression or means.


Specifically...

Algorithm : Acoustic analysis, speech analysis, location matching

            (Chapter 1, p.25-297)

UI/UX : Emergency call application, dashboard, back-up call mode

            (Chapter 1, p.110-133)

Data format : Report log CSV, evidence storage hash structure

            (p.186-200)

Contract and revenue distribution logic: compare → block → contract → revenue

            (Chapter 3, p.553-938)

Composite system: triple safety network (Chapter 4, p.939-1216)

Prohibited acts: imitation, equality, similarity, derivation, transcription, paraphrase

            (Chapters 5-7, p.1219-1479)

Furthermore, even a one-line match is infringement (p.73-77), and copyright infringement is recognized if even a single UI button, function, or symbol is matched.


3. term of copyright (2)

The term of copyright protection is based on international standards (Berne Convention and Article 51 of the Japanese Copyright Law) and lasts until 70 years after the author's death. Since this work is a joint work, the term of protection is 70 years from the year following the year of the last surviving author's death. In other words, this work is not merely a temporary protection, but an intellectual foundation that will ensure the survival of the rights until the beginning of the 22nd century. Furthermore, since the notarization by a notary public guarantees the evidentiary value of the work, there is no room for falsification or repudiation even at a later date, and the successor to the rights can use, license, or sue for damages.



4. copyright infringement (3)

The structure of this copyrighted work is dedicated to "blocking escape routes," and all of the following acts constitute infringement

Imitation :Copying of the same algorithm or UI

Equivalence :When replacing the means leads to the same result

        (FFT to Wavelet also constitutes infringement)

Similarity: When the conclusion is the same even if the color, notation, or symbol is changed.

Derivation: Adaptation, modification, and use for educational purposes are also prohibited.

Transcription and writing: Imitation by whiteboard or screenshot is also infringement

Reverse order/replacement of process: Changing "report → save" to "save → report" also constitutes infringement

One-line match: A single line of source code or a single UI icon constitutes infringement.


Example pages

p.30: Scope of rights (integrated algorithm of sound + speech + location)

p.73-77: Provisions prohibiting one-line matching, equality, similarity, and derivation

p.1219 - 1270: Legal framework for blockade of imitation, equality, similarity, and derivation

p.1431-1479: Final declaration of "infringement is established at the moment of touch

These establish the strength of **"the world's first fully encapsulated work that permits neither imitation nor adaptation.



Explanation of Prior User's Right (4)

The term "prior user right" in intellectual property law refers to the right to continue to use a certain work, invention, or trademark only to the extent that it has been used independently before it was registered.

However, since the existence of this work has been officially established at the earliest date, with proof of existence by a notary public (August 26 and 27, 2025), acquisition of a notarial deed (August 28, 2025), and three patent applications, there is very limited room for others to claim "prior use" of the work. Furthermore, the object of copyright protection is not "expression" but "constructive agreement" (p.3-4), and even if the expression is changed, infringement is considered to have occurred at the conclusion of the agreement, making a defense based on the right of prior use practically impossible to establish.



6. social and industrial impact

Education: School bag security (p.1504-1505)

Nursing and medical care : Prevention of falls and solitary death (P.28-29, P.300-306)

Finance: ATM fraud prevention/intellectual property collateral valuation (P.301, P.861-903)

Administration: Contract automation and compensation system coordination (P.942-944, P.1012-1030)

International development: ISO/IEC standardization and TRIPS Agreement harmonization (p.1541-1564)



7. joint authors and declaration of rights

This work is a joint work by the following four authors (p.1701): Yuki Takeuchi/Kenichi Takeuchi/Tomoko Hirakawa/Kazunori Hirakawa

Declaration of Rights: "Regardless of differences in expressions, numerical values, or symbols, agreement on conclusion = infringement" (p.1701)



List of prohibited acts common to all industries (with examples and explanations)

1. prohibited acts in technical fields

<Reproduction

Description: Copying of source code, algorithms, UI

Example: Pasting the "detectSound()" function of an emergency call system onto another company's application

Explanation: Duplication is prohibited even if it is only a part of the source code. Even a "one-line match" constitutes infringement.


<Copying

Description: Imitate and implement the entire mechanism

Example: Selling an application that automatically alerts the user with "sound + location" under an alias.

Explanation: Infringement occurs if the resulting structure is identical, even if the UI and name are different.


<Equivalence Theory Substitution

Description: Replace with a means that has the same effect.

Example: Same SOS judgment even if FFT is changed to Wavelet analysis

Explanation: If the result is the same even if the technical means is changed, it is infringement.


<Similarity

Content: Change of color, symbol, UI arrangement

Example: Red SOS button → Yellow SOS button

Explanation: Design differences cannot be avoided. The standard is "congruence of conclusion.


<Derivative

Content: Adaptation, modification, secondary use

Example: Educational materials include a simplified version of the algorithm

Explanation: Derivative works infringe "research" and "educational purposes


<Transcription

Content: Transcribing and saving scans

Example: Transcription of dashboard UI on whiteboard

Explanation: Transcription on paper or screen is prohibited


<Filling in and writing

Content: Diversion to paper or training materials

Example: Diversion of CSV format to internal documents

Explanation: Writing itself is a derivative work and infringes


<Imitation of logs

Content: Copying CSV and audit log format

Example: Use the same structure of timestamp, lat, lon...

Explanation: If the column name and structure are the same, it is infringement.


<API Imitation

Description: Reuse of /alerts, /contract, etc. API

Example: Use of /alerts API with only name change

Explanation: Even if the name is changed, if the structure is the same, it is infringement.


<UI/UX imitation

Description: SOS button, Silent UI, distribution dashboard

Example: Financial application with backdoor reporting button

Explanation: "Experience structure" of UI itself is protected


<Data Structure Imitation

Content: DB schema, JSON format

Example: Use of JSON key "alert_id" and "hash" in the same form

Explanation: Data design is also subject to copyright


Prohibited acts in the service/business field

<Business model implementation

Description: Business development using the same mechanism

Example: Use of a school bag security model for nursing care

Explanation: Infringement by matching the composition even if the subject matter is different


<Imitation of services

Description: Crime prevention application, contract automation service, etc.

Example: In-house development of ATM fraud prevention system

Explanation: Infringement even if the service industry is changed


<Adaptation of contractual wording

Description: Replacing the wording of the contract with revenue sharing or contractual language.

Example: "royalties" → "royalties

Explanation: All rewording of contractual language is blocked.


<Materials

Content: Diversion for education and training

Example: Distribution of specifications in university classes

Explanation: Derivation prohibited regardless of commercial or non-commercial use


<Research use

Content: Verification, partial use in papers

Example: Algorithm comparison for research

Explanation: Prohibited to use for testing as derivation


<Partial introduction

Content: Partial use of functions

Example: Use only reporting and remove saving

Explanation: Infringement is allowed even if the function is divided


3. prohibited acts related to expressions and languages

<Language translation

Content: Multilingual translation

Example: "Help"→"Help"/"life-saving

Explanation: Same conclusion of infringement even if translated


<Iconic symbols / color change

Content: Icon/Color Change

Example: 🚨→⚠️, red→blue

Explanation: Symbols and colors are also subject to copyright


<Log Expression Difference

Content: JSON -> YAML format

Example: Converting CSV to JSON

Explanation: Even if the output format is different, it is infringed by matching the composition


<Rewritten expression

Content: Rephrasing of wording

Example: "SOS received" → "Emergency signal confirmation

Explanation: Infringement is established by blocking the difference in expression


4. reverse pattern (blocking of escape route)

<Reversal of order

Example: Change the order from "save" to "report

Explanation: Even if the process is reversed, the "conclusion is the same" and infringement is established.


<Partial match

Example: Only one line of code matched

Explanation: Infringement is established even if only one line of "notify()" is copied


<Omission of process

Example: Implementation of only notification

Explanation: Infringement is established even if the structure is deleted


<Translation of synonyms

Example: "contract" → "agreement

Explanation: Rephrasing is also infringement


<Subject substitution

Example: "child" → "elderly", "ATM" → "vehicle

Explanation: Conclusion is the same even if the subject is changed


<Conversion of purpose of use

Example: Commercial use → Educational use

Explanation: Non-profit purposes are also prohibited as derivatives


5. general summary

Basic prohibited acts: 23 types

Reverse pattern: 6 types

Total: 29 types


This establishes a complete blockade-type copyright prohibition list applicable to all industries and business categories, including education, nursing care, finance, public administration, manufacturing, and distribution.


<Explanation of case examples (specific images by field)

Education: School bags equipped with an emergency alert system → Child crime prevention

     → Imitation of a similar system is an infringement

Nursing care field: Fall detection for elderly people living alone → Voice + location determination

     → Imitating this combination is an infringement

Financial field: Detect abnormal heartbeat when operating ATM → Fraud prevention

     → Similar Vital+ reporting algorithm infringes

Government: Automatic generation of contracts and profit sharing → Infringement even if the contract wording is adapted

International expansion: Introduction of systems translated into English or Chinese → Infringement by unanimous conclusion even in translation


Based on the above, there are 29 types of prohibited acts applicable to all industries and sectors, and a "complete blockade" is established, including cases and reverse patterns.



Scope of copyright rights for Pattern A (A-configuration alone: A)

1. positioning of A-composition

A = Emergency call system by sound, speech, and location information / Corresponds to Chapter 1 (p.25-297) of this work.

<Features

A system in which "the voice itself becomes a security buzzer" (integrating sound, language, and location information)

Automatic notification, evidence storage, and multi-step notification (family → security → police)

Infringement is established even with a single line match (including algorithms, UI, logs, and APIs)


2. scope of copyrights for A-configuration alone (with corresponding pages)

<Algorithm

Scope of rights: Acoustic analysis (FFT), speech analysis (dangerous word detection), GPS location matching, integrated risk assessment

Relevant pages: p.26, p.40-43

Explanation: "Abnormality Determination" by integrating three elements is copyrighted as a whole.


<Program/Code

Scope of rights: Functions and pseudo-codes such as detectSound(), parseSpeech(), gpsCheck(), notify(), etc.

Applicable pages: p.31, p.80-83

Explanation: If even one line of source code matches, an infringement has occurred.


<UI/UX

Scope of rights: Emergency SOS button, Silent UI, report log screen, evidence replay UI

Applicable pages: p.32, p.59-60, p.211-219

Explanation: Any change in button shape or color scheme is infringing as long as it is "emergency call UI".


<Data Structure

Scope of rights: Report log (time, sound, location, hash) CSV, evidence storage format

Relevant pages: p.32, p.186-200

Explanation: Infringement by matching CSV column name or structure.


<API

Scope of rights :REST API design for /alerts, /evidence, /logs, etc.

Applicable pages: p.176-178

Explanation: Infringement by identical endpoint name or structure.


<Expression, language, symbols

Scope of rights :List of dangerous words such as "help" and "stop",

      🚨 icon, red SOS indication

Applicable pages: p.220-224

Explanation :Infringement by matching the conclusion even if the translation or color is different. 3.


3. specific examples (explanation that anyone can understand)

Example 1: Child Crime Prevention (School Bag Reporting)

While leaving school, "Help! while leaving school

System: Speech analysis → GPS matching → report / immediate notification to guardians, school, and police

If other companies implement a similar "shout + location matching → report" system, it will be an infringement.


Example 2: Watching over the elderly (fall detection)

Elderly person living alone falls over at night, and only a "thump" sound is heard.

System: Acoustic analysis → determination of abnormal sound → notification to care center

Infringement if a competitor implements "fall sound + notification".


Case 3: Vehicle theft prevention

Car window is broken in the middle of the night

System: Breakage sound detected → Owner's smartphone + security company notified

Infringement if the result is the same even if the sound type (glass breaking sound) is changed.


Case 4: Disaster relief

Help!" from under a collapsed house due to earthquake

System: Speech detection → GPS transmission → Notification to rescue team

If the same conclusion is reached in the disaster field, it is infringement. 4.


Explanation (key points)

1. "Agreement of configuration = infringement

Even if the means (FFT or Wavelet) or expressions (red -> blue button) are changed, if the conclusion is the same (automatic notification + evidence storage), it is infringement. 2.


2. "even a single line match is infringement"

If score > threshold: alert(), etc., even a single line is infringement. 3.


3. "Infringement even if the industry is changed

Education, crime prevention, nursing care, finance, disaster prevention, etc.: If the structure is the same even if the applicable field is changed, it is infringement. 4.


4. "Blocking escape routes

Reversing the order of processes (save -> report), translation (help -> help), and derivative use (educational material) are all prohibited. 5.


5. illustration (conceptual diagram)

System structure diagram (conceptual)

Acoustic Input → [Acoustic Analysis] ──┐

├─→ [Integrated judgment] → [Report processing] → Family/security/police

Speech input → [speech analysis] ──┘

Location input → [GPS matching] ───┘

└→ [evidence storage (recording/logging/encryption)



Summary

**Pattern A (A configuration alone: A)** is "an emergency call system using sound + speech + location information.

The scope of copyright right encompasses algorithm, code, UI/UX, data structure, API, and expression/symbol.

As shown in **Case Studies (Child Crime Prevention, Elderly Falling Over, Vehicle Theft, Disaster Relief)**, even if the field of application is changed, the conclusion is unanimous: infringement.

The structure is designed to allow intuitive understanding of infringement determinations through illustrations and flowcharts.


The content of this article is a partial scope content of rights as copyrights of works. The documents will be attached separately.



Comment by inventor/copyright holder/inventor (Yuki Takeuchi)

Copyright infringement is a clear criminal act. We are committed to protecting intellectual property rights holders and eradicating infringement of intellectual property rights."

Mr. Yuki Takeuchi is currently developing the "A-GEL Gift Point" and "A-GEL Gift Card" services that utilize intellectual property rights such as patent rights and copyrights at Point Organization Co. We are also planning to offer "A-GEL Point" service.


Point Organization Co.

2-7-9 Sendagaya, Shibuya-ku, Tokyo

Representative Director Yuki Takeuchi

Date of creation: August 25, 2025

Existence fact confirmed : August 26 and 27, 2025

Notarized (No. 218 of 2025): August 28, 2025

Logo Image