Yuki Takeuchi Acquisition of Copyrights in Public Organizations (6) Emergency Alert, Vital Security, and IP Matching Systems. Integrated Rights Structure (Fully Enclosed Version)"
~ Related to Security, Crime Prevention, Disasters, etc. About Copyrighted Material (Chat GPT Analysis) ~.
株式会社ポイント機構
The Point Organization, Inc. (President: Yuki Takeuchi) is pleased to announce the acquisition of the copyright of "Integrated Rights Structure for Emergency Alert, Vital Security, and IP Matching Systems (Fully Enclosed Version)" by a public organization.
1. background and overview of the announcement
The "Integrated Rights Structure of Emergency Alert, Vital Security, and IP Matching System (Fully Sealed Version)" created by four co-authors (Yuki Takeuchi, Kenichi Takeuchi, Tomoko Hirakawa, and Kazunori Hirakawa) on August 25, 2025, is the original source of new social infrastructure to protect safety, rights, and economic circulation in the modern society. This work was officially notarized (No. 218, 2025) on the 28th, after proof of existence was confirmed at a notary public on the 26th and 27th. This has given it the power of unfalsifiable evidence that can be used both domestically and internationally. This work consists of an 18-page table of contents, a 1,701-page main body, and a 262-page commentary, and is linked to three patent applications (emergency alert system, vital security system, and IP matching and revenue sharing system). This release clearly conveys the social and legal significance of this work, including (1) the scope of rights as a copyright, (2) the term of rights, (3) infringement, and (4) the position of prior use rights.
2. scope of rights as copyright (1)
Principle of Comprehensive Protection: This copyrighted work clearly defines the definition of "conclusion agreement = infringement established" (p. 3-4). In other words, if a work is structured to ultimately lead to the same conclusion in terms of algorithm, UI, API, data structure, language, symbols, or expression, it is considered infringement regardless of differences in expression or means.
Specifically...
Algorithm : Acoustic analysis, speech analysis, location matching
(Chapter 1, p.25-297)
UI/UX : Emergency call application, dashboard, back-up call mode
(Chapter 1, p.110-133)
Data format : Report log CSV, evidence storage hash structure
(p.186-200)
Contract and revenue distribution logic: compare → block → contract → revenue
(Chapter 3, p.553-938)
Composite system: triple safety network (Chapter 4, p.939-1216)
Prohibited acts: imitation, equality, similarity, derivation, transcription, paraphrase
(Chapters 5-7, p.1219-1479)
Furthermore, even a one-line match is infringement (p.73-77), and copyright infringement is recognized if even a single UI button, function, or symbol is matched.
3. term of copyright (2)
The term of copyright protection is based on international standards (Berne Convention and Article 51 of the Japanese Copyright Law) and lasts until 70 years after the author's death. Since this work is a joint work, the term of protection is 70 years from the year following the year of the last surviving author's death. In other words, this work is not merely a temporary protection, but an intellectual foundation that will ensure the survival of the rights until the beginning of the 22nd century. Furthermore, since the notarization by a notary public guarantees the evidentiary value of the work, there is no room for falsification or repudiation even at a later date, and the successor to the rights can use, license, or sue for damages.
4. copyright infringement (3)
The structure of this copyrighted work is dedicated to "blocking escape routes," and all of the following acts constitute infringement
Imitation :Copying of the same algorithm or UI
Equivalence :When replacing the means leads to the same result
(FFT to Wavelet also constitutes infringement)
Similarity: When the conclusion is the same even if the color, notation, or symbol is changed.
Derivation: Adaptation, modification, and use for educational purposes are also prohibited.
Transcription and writing: Imitation by whiteboard or screenshot is also infringement
Reverse order/replacement of process: Changing "report → save" to "save → report" also constitutes infringement
One-line match: A single line of source code or a single UI icon constitutes infringement.
Example pages
p.30: Scope of rights (integrated algorithm of sound + speech + location)
p.73-77: Provisions prohibiting one-line matching, equality, similarity, and derivation
p.1219 - 1270: Legal framework for blockade of imitation, equality, similarity, and derivation
p.1431-1479: Final declaration of "infringement is established at the moment of touch
These establish the strength of **"the world's first fully encapsulated work that permits neither imitation nor adaptation.
Explanation of Prior User's Right (4)
The term "prior user right" in intellectual property law refers to the right to continue to use a certain work, invention, or trademark only to the extent that it has been used independently before it was registered.
However, since the existence of this work has been officially established at the earliest date, with proof of existence by a notary public (August 26 and 27, 2025), acquisition of a notarial deed (August 28, 2025), and three patent applications, there is very limited room for others to claim "prior use" of the work. Furthermore, the object of copyright protection is not "expression" but "constructive agreement" (p.3-4), and even if the expression is changed, infringement is considered to have occurred at the conclusion of the agreement, making a defense based on the right of prior use practically impossible to establish.
6. social and industrial impact
Education: School bag security (p.1504-1505)
Nursing and medical care : Prevention of falls and solitary death (P.28-29, P.300-306)
Finance: ATM fraud prevention/intellectual property collateral valuation (P.301, P.861-903)
Administration: Contract automation and compensation system coordination (P.942-944, P.1012-1030)
International development: ISO/IEC standardization and TRIPS Agreement harmonization (p.1541-1564)
7. joint authors and declaration of rights
This work is a joint work by the following four authors (p.1701): Yuki Takeuchi/Kenichi Takeuchi/Tomoko Hirakawa/Kazunori Hirakawa
Declaration of Rights: "Regardless of differences in expressions, numerical values, or symbols, agreement on conclusion = infringement" (p.1701)
List of prohibited acts common to all industries (with examples and explanations)
1. prohibited acts in technical fields
<Reproduction
Description: Copying of source code, algorithms, UI
Example: Pasting the "detectSound()" function of an emergency call system onto another company's application
Explanation: Duplication is prohibited even if it is only a part of the source code. Even a "one-line match" constitutes infringement.
<Copying
Description: Imitate and implement the entire mechanism
Example: Selling an application that automatically alerts the user with "sound + location" under an alias.
Explanation: Infringement occurs if the resulting structure is identical, even if the UI and name are different.
<Equivalence Theory Substitution
Description: Replace with a means that has the same effect.
Example: Same SOS judgment even if FFT is changed to Wavelet analysis
Explanation: If the result is the same even if the technical means is changed, it is infringement.
<Similarity
Content: Change of color, symbol, UI arrangement
Example: Red SOS button → Yellow SOS button
Explanation: Design differences cannot be avoided. The standard is "congruence of conclusion.
<Derivative
Content: Adaptation, modification, secondary use
Example: Educational materials include a simplified version of the algorithm
Explanation: Derivative works infringe "research" and "educational purposes
<Transcription
Content: Transcribing and saving scans
Example: Transcription of dashboard UI on whiteboard
Explanation: Transcription on paper or screen is prohibited
<Filling in and writing
Content: Diversion to paper or training materials
Example: Diversion of CSV format to internal documents
Explanation: Writing itself is a derivative work and infringes
<Imitation of logs
Content: Copying CSV and audit log format
Example: Use the same structure of timestamp, lat, lon...
Explanation: If the column name and structure are the same, it is infringement.
<API Imitation
Description: Reuse of /alerts, /contract, etc. API
Example: Use of /alerts API with only name change
Explanation: Even if the name is changed, if the structure is the same, it is infringement.
<UI/UX imitation
Description: SOS button, Silent UI, distribution dashboard
Example: Financial application with backdoor reporting button
Explanation: "Experience structure" of UI itself is protected
<Data Structure Imitation
Content: DB schema, JSON format
Example: Use of JSON key "alert_id" and "hash" in the same form
Explanation: Data design is also subject to copyright
Prohibited acts in the service/business field
<Business model implementation
Description: Business development using the same mechanism
Example: Use of a school bag security model for nursing care
Explanation: Infringement by matching the composition even if the subject matter is different
<Imitation of services
Description: Crime prevention application, contract automation service, etc.
Example: In-house development of ATM fraud prevention system
Explanation: Infringement even if the service industry is changed
<Adaptation of contractual wording
Description: Replacing the wording of the contract with revenue sharing or contractual language.
Example: "royalties" → "royalties
Explanation: All rewording of contractual language is blocked.
<Materials
Content: Diversion for education and training
Example: Distribution of specifications in university classes
Explanation: Derivation prohibited regardless of commercial or non-commercial use
<Research use
Content: Verification, partial use in papers
Example: Algorithm comparison for research
Explanation: Prohibited to use for testing as derivation
<Partial introduction
Content: Partial use of functions
Example: Use only reporting and remove saving
Explanation: Infringement is allowed even if the function is divided
3. prohibited acts related to expressions and languages
<Language translation
Content: Multilingual translation
Example: "Help"→"Help"/"life-saving
Explanation: Same conclusion of infringement even if translated
<Iconic symbols / color change
Content: Icon/Color Change
Example: 🚨→⚠️, red→blue
Explanation: Symbols and colors are also subject to copyright
<Log Expression Difference
Content: JSON -> YAML format
Example: Converting CSV to JSON
Explanation: Even if the output format is different, it is infringed by matching the composition
<Rewritten expression
Content: Rephrasing of wording
Example: "SOS received" → "Emergency signal confirmation
Explanation: Infringement is established by blocking the difference in expression
4. reverse pattern (blocking of escape route)
<Reversal of order
Example: Change the order from "save" to "report
Explanation: Even if the process is reversed, the "conclusion is the same" and infringement is established.
<Partial match
Example: Only one line of code matched
Explanation: Infringement is established even if only one line of "notify()" is copied
<Omission of process
Example: Implementation of only notification
Explanation: Infringement is established even if the structure is deleted
<Translation of synonyms
Example: "contract" → "agreement
Explanation: Rephrasing is also infringement
<Subject substitution
Example: "child" → "elderly", "ATM" → "vehicle
Explanation: Conclusion is the same even if the subject is changed
<Conversion of purpose of use
Example: Commercial use → Educational use
Explanation: Non-profit purposes are also prohibited as derivatives
5. general summary
Basic prohibited acts: 23 types
Reverse pattern: 6 types
Total: 29 types
This establishes a complete blockade-type copyright prohibition list applicable to all industries and business categories, including education, nursing care, finance, public administration, manufacturing, and distribution.
<Explanation of case examples (specific images by field)
Education: School bags equipped with an emergency alert system → Child crime prevention
→ Imitation of a similar system is an infringement
Nursing care field: Fall detection for elderly people living alone → Voice + location determination
→ Imitating this combination is an infringement
Financial field: Detect abnormal heartbeat when operating ATM → Fraud prevention
→ Similar Vital+ reporting algorithm infringes
Government: Automatic generation of contracts and profit sharing → Infringement even if the contract wording is adapted
International expansion: Introduction of systems translated into English or Chinese → Infringement by unanimous conclusion even in translation
Based on the above, there are 29 types of prohibited acts applicable to all industries and sectors, and a "complete blockade" is established, including cases and reverse patterns.
Scope of copyright rights for Pattern A (A-configuration alone: A)
1. positioning of A-composition
A = Emergency call system by sound, speech, and location information / Corresponds to Chapter 1 (p.25-297) of this work.
<Features
A system in which "the voice itself becomes a security buzzer" (integrating sound, language, and location information)
Automatic notification, evidence storage, and multi-step notification (family → security → police)
Infringement is established even with a single line match (including algorithms, UI, logs, and APIs)
2. scope of copyrights for A-configuration alone (with corresponding pages)
<Algorithm
Scope of rights: Acoustic analysis (FFT), speech analysis (dangerous word detection), GPS location matching, integrated risk assessment
Relevant pages: p.26, p.40-43
Explanation: "Abnormality Determination" by integrating three elements is copyrighted as a whole.
<Program/Code
Scope of rights: Functions and pseudo-codes such as detectSound(), parseSpeech(), gpsCheck(), notify(), etc.
Applicable pages: p.31, p.80-83
Explanation: If even one line of source code matches, an infringement has occurred.
<UI/UX
Scope of rights: Emergency SOS button, Silent UI, report log screen, evidence replay UI
Applicable pages: p.32, p.59-60, p.211-219
Explanation: Any change in button shape or color scheme is infringing as long as it is "emergency call UI".
<Data Structure
Scope of rights: Report log (time, sound, location, hash) CSV, evidence storage format
Relevant pages: p.32, p.186-200
Explanation: Infringement by matching CSV column name or structure.
<API
Scope of rights :REST API design for /alerts, /evidence, /logs, etc.
Applicable pages: p.176-178
Explanation: Infringement by identical endpoint name or structure.
<Expression, language, symbols
Scope of rights :List of dangerous words such as "help" and "stop",
🚨 icon, red SOS indication
Applicable pages: p.220-224
Explanation :Infringement by matching the conclusion even if the translation or color is different. 3.
3. specific examples (explanation that anyone can understand)
Example 1: Child Crime Prevention (School Bag Reporting)
While leaving school, "Help! while leaving school
System: Speech analysis → GPS matching → report / immediate notification to guardians, school, and police
If other companies implement a similar "shout + location matching → report" system, it will be an infringement.
Example 2: Watching over the elderly (fall detection)
Elderly person living alone falls over at night, and only a "thump" sound is heard.
System: Acoustic analysis → determination of abnormal sound → notification to care center
Infringement if a competitor implements "fall sound + notification".
Case 3: Vehicle theft prevention
Car window is broken in the middle of the night
System: Breakage sound detected → Owner's smartphone + security company notified
Infringement if the result is the same even if the sound type (glass breaking sound) is changed.
Case 4: Disaster relief
Help!" from under a collapsed house due to earthquake
System: Speech detection → GPS transmission → Notification to rescue team
If the same conclusion is reached in the disaster field, it is infringement. 4.
Explanation (key points)
1. "Agreement of configuration = infringement
Even if the means (FFT or Wavelet) or expressions (red -> blue button) are changed, if the conclusion is the same (automatic notification + evidence storage), it is infringement. 2.
2. "even a single line match is infringement"
If score > threshold: alert(), etc., even a single line is infringement. 3.
3. "Infringement even if the industry is changed
Education, crime prevention, nursing care, finance, disaster prevention, etc.: If the structure is the same even if the applicable field is changed, it is infringement. 4.
4. "Blocking escape routes
Reversing the order of processes (save -> report), translation (help -> help), and derivative use (educational material) are all prohibited. 5.
5. illustration (conceptual diagram)
System structure diagram (conceptual)
Acoustic Input → [Acoustic Analysis] ──┐
├─→ [Integrated judgment] → [Report processing] → Family/security/police
Speech input → [speech analysis] ──┘
Location input → [GPS matching] ───┘
└→ [evidence storage (recording/logging/encryption)
Summary
**Pattern A (A configuration alone: A)** is "an emergency call system using sound + speech + location information.
The scope of copyright right encompasses algorithm, code, UI/UX, data structure, API, and expression/symbol.
As shown in **Case Studies (Child Crime Prevention, Elderly Falling Over, Vehicle Theft, Disaster Relief)**, even if the field of application is changed, the conclusion is unanimous: infringement.
The structure is designed to allow intuitive understanding of infringement determinations through illustrations and flowcharts.
The content of this article is a partial scope content of rights as copyrights of works. The documents will be attached separately.
Comment by inventor/copyright holder/inventor (Yuki Takeuchi)
Copyright infringement is a clear criminal act. We are committed to protecting intellectual property rights holders and eradicating infringement of intellectual property rights."
Mr. Yuki Takeuchi is currently developing the "A-GEL Gift Point" and "A-GEL Gift Card" services that utilize intellectual property rights such as patent rights and copyrights at Point Organization Co. We are also planning to offer "A-GEL Point" service.
Point Organization Co.
2-7-9 Sendagaya, Shibuya-ku, Tokyo
Representative Director Yuki Takeuchi
Date of creation: August 25, 2025
Existence fact confirmed : August 26 and 27, 2025
Notarized (No. 218 of 2025): August 28, 2025
- Category:
- Corporate Trends
- Genres:
- General Business Finance Economy(Japan)