HEADQUARTERS

9 RIVER STREET

MILFORD, CT 06460

Other Locations

Trade Secret Warning, Actions To Commence

February 18, 2018 – AGGRECOST™ OF NORTH AMERICA BENEFIT CORP issues Notification to intellectual property theft parties stemming years in abuses of fraud and those in conspiracy or long arm of official capacity, more importantly, those who defraud the government either unknowingly or in all consciousness should know.

As a member and founder of the economic system we and all user will protect and preserve it by any means neccesary and enforce it to all extents but not limited within.

As a representative or agent and certification method, manager or other wise we track these offenders and relation to and carry or travel of said information internationally and the companies or people thereof back to 1999 to day.

Please review the USPTO law on use of TM and how we are protected when using it without registrations and regardless of said Registered cases. Also learn more about the Trade Secret Act.

We track associated relational connected parties politically or otherwise and the events, people and publications there of and those of venture backing, enriching or defrauding investors and those related of track connections to those founders or officers of whom to piece mill by patent or distribute in bits of many patents to launder or represent in bad faith to adjoin in the thefts of, defrauding, ANTI-Trust law, RICO, CUPTA and Racketeering in order to defraud or obtain through fraud or obstruction of right or right there of. These are also financial crime to shareholders and will be prosecuted or refereed.

AGGRECOST™ maintains time stamped tokenism systems, articles, and conducts the most advanced tracking systems and records them to track these for over 25 years. Our intellectual properties are documented in such and due diligence to thawt those and have a list of if not pending litigation that has begun to enforce illegal thefts, relational parties, attempted destruction of evidence and or conspiracy test verification of law for those to commence action and trace to known parties who capitalize in bad faith with the crimes of such activities. Especially when it comes to the industries were have solely predated and created. Whether knowingly to interfere in these patent rights in efforts to defraud the USPOT including what AGGRECOST™ has discovered automatic bulk uploading to attempt to block or hijack those right of AGGRECOST™ and all parties it represents.

Records, whether attacked to delete or take advantage of though constant extortion or hijaking of will be returned and Federal Charges enforced. Are discoveries have discovered violations related to the systems we invented and had or have reclaimable patent application or in continuation of dated to 1999 to this day that have not been enforced yet at the USPOT office and this is do to certain strategic and fee based costs due to the abuse of systems there including those patenting much like laundering Bitcoin and crypto are bulk uploaded in piece mill to obstruct and or conceal almost every patent known to man and or standard products on the markets.

You should note that there is since 2017 our blockchain and systems and all specialty products to the current day, Combined with many pending continuation applicable patent rights from then to this day that day that include and prove violations and attempts to defraud the United States and those entities whether our Clients, AGGRECOST™, Its Parent or any other related subsidiaries and products. Being not existing when in use and the attempts to conceal the thefts and use of we take these matters serious and follow through to the very end of the case.

It is has also come to our attention these are still happening and the abnormal abuse to try to take one part of our products and file thousands of said technology in efforts to abuse or defraud that may not have passed the correct review of the USPTO till we present such finding to said.

We will indemnify and adjoin “Oracles” for distributing said and aiding abetting of the stolen technology and their funded there off.

AGGRECOST™, Its subsidiaries and party’s hold rights in continuation that combine all these rights and products related to banking that include tokensization, NFT an immutable traceable or other version controllable and aggregated while immersive and dynamic, whether modular or within the spatial relms and embeddables or otherwise not understood or aggregation thereof and an entire system of an economy built on these solely owned products and services by the format we define and that many do not understand or changed to or entered into said markets AGGRECOST and PARTNERS or SUBSIDIARIES OR Clients did and protected and continue to own.

These and other data including real time access to search, hire, sell or otherwise hold and invest on a connected basis protecting by and geosptaily or spacial edge connected are still within our rights and to be enforced.

Knowingly or trying to interfere or register our patentable and rightful owned intellectual property is a USPTO law requiring no patent under the TRADE SECRETE law if documented and overturning of such for enforcement. Whether or not thinking we lost patent rights by not exercises in time, Is not a legal excuse because such become open domain and not the person stealing such and patent. When done and due to cyber crime activity we choose when the investigation is done to enforce said rights.

Whether by a consultant instructing you to patent or VC or otherwise will be adjoined and handled correctly and by AGGRECOST legal policy documented publicly filed and not through settlements when did intentional and these records and actions are known to the public file of consistent abuse and business practice beyond our systems and not through closed or settlements.

To steal these and or have no relational products that you did not get or have before AGGRECOST, CLIENTS AND PARTNER that are bought our for basically changed and funded in attempts to predate are easily established and documented. Whether shell company sense, planted CEO or Officers to control will be linked and will be enforced, and in additional to defrauding your investors, or shareholders it includes RICO, CUPTA and enforcement of the United States of America, USPTO, Copy Rights laws, Victim Protections and criminal prosecutions laws and any other fine and criminal activity we can enforce by refer to Federal court and seize. Defendants will be due said fees for expenses to that point by injunction or bonds associated, will be charged the Federal Marshal commission fees and any and all damages from an in the future of these costs of doing business or otherwise.

Includes any process we invented which is a while market in its entirely and economy or products for which we are retroactively enjoyed such as mobile payments and communications, contactless and wireless payments, or otherwise in continuation to the rights and upgrades to our combined portfolio.

These did not exist and or those having to do with PASSPORT™ or xD™ and gChain™ wallet and payment technology or otherwise etc otherwise a safe and secure social system of connected and distributed hybrid systems and technology or otherwise the real definition of NFT, Or Immutable safe guard asset representing such and or digital secure currency both physical, virtual or digital or ledgers including new physical currency, energy and business products,. We maintain rights to the entire foundational systems of this economy and the processes there of that include real time data and exchanges or investments, tickers, real time data and materials or otherwise that are distributed and protected by our users, foundations or assets.

As most are easily going to be thrown out and those costs recouped the majority are from the largest of Banks, Search Engines, Financial Institutions and those in the flawed WEB 3, IPFS and Blockchain sectors including other in City Planning, Steaming, Credentials, TV, And News But not limited to all the devices themselves based off our secure and verifiable technology and transaction based technology are the most violations including banking or payment technology which in turn we hold rights to. Not limited to other edge to or otherwise new communication technology and new networks and storage to all devices within our true operation system connected products with dynamic and real time processes of transactions on any device in secure identification on all fronts and critical infrastructure including broadcasting of immersive news, tv, streaming, apps and sandboxes, and or otherwise that include spatial compute, materials and tech, or geospatial 3D Bim, additives, robotic and inventory of, all financial apps etc and assets and media, BANKING Institutions, Insurance tech, Compliance and Process, Design and Copyright, Proof of credentials and on-boarding, investing in or capital raising, real estate and construction or otherwise known as the MODULAR OPERATING SYSTEM which is and was new technology in full that is hybrid to adapt and scale with known lagacy apps and payment systems , ERP, CRM, ACCOUNTING and definable presets or meta based search of and those people, consultants, businesses or otherwise immersive and includes building products, assets or otherwise and interactive and immersive related real and virtual property, supply chain, inline aggregated compliance and tax obligations, and legal tech, In inline smart contract and payments, settlements, based on ptp, m2p, b2b or otherwise,

Relational algorithms and associated processes and otherwise whether on demand os social technology and communications, messaging, and supply chain immutable single source of truth or otherwise safeguarded and protected technology has been violated and in risk, protected, subject to severe damages and will be reclaimed as these proceedings proceed or added to in real time. protects through TRADE SECRET law in additions to others who abuse the United States Patent Office of someone with rights in which you have patented knowingly while published items and posts related to public non trade secret corresponding publications.

INTERNATIONAL PATENT PROTECTIONS AND REVERSAL OF SAID BACK RETROACTIVELY HAS COMMENCED TO FURTHER ENFORCE. ANYTHING OTHER THEN CRYPTO CURRENCIES SUCH AS BITCOIN AND ETHERIUM OR OTHERWISE IN THERE ORIGINAL PURPOSE OR USE BEFORE STOLEN IP CHANGES SINCE 2017 WILL BE ENFORCED INCLUDING ORACLES AND EXCHANGES.

ANY TRANSACTION INFRINGEMENT ON OUR COMMUNICATIONS AND OS PLATFORMS OF HOLISTIC PROCESS AND WILL BE ENFORCED BACK TO 1999 AND INCLUDE CONTINUATIONS TO THE NEW RIGHTS AND EXTENSIONS TO THIS DAY FORWARD WHILE DISSOLVING OF SEIZING ANYTHING IN BETWEEN THE 1999 DATE.

Owning a trademark vs. having a registered trademark

You become a trademark owner as soon as you start using your trademark with your goods or services. You establish rights in your trademark by using it, but those rights are limited, and they only apply to the geographic area in which you’re providing your goods or services. If you want stronger, nationwide rights, you’ll need to apply to register your trademark with us.

You’re not required to register your trademark. However, a registered trademark provides broader rights and protections than an unregistered one.

For example, you use a logo as a trademark for the handmade jewelry you sell at a local farmer’s market. As your business grows and you expand online, you might want more protection for your trademark and decide to apply for federal registration. Registering your trademark with us means that you create nationwide rights in your trademark.

Using the trademark symbols TM, SM, and ®

Every time you use your trademark, you can use a symbol with it. The symbol lets consumers and competitors know you’re claiming the trademark as yours. You can use “TM” for goods or “SM” for services even if you haven’t filed an application to register your trademark.

Once you register your trademark with us, use an ® with the trademark. You may use the registration symbol anywhere around the trademark, although most trademark owners use the symbol in a superscript or subscript manner to the right of the trademark. You may only use the registration symbol with the trademark for the goods or services listed in the federal trademark registration.

What is a trademark

A trademark can be any word, phrase, symbol, design, or a combination of these things that identifies your goods or services. It’s how customers recognize you in the marketplace and distinguish you from your competitors.

The word “trademark” can refer to both trademarks and service marks. A trademark is used for goods, while a service mark is used for services.

A trademark:

  • Identifies the source of your goods or services.
  • Provides legal protection for your brand.
  • Helps you guard against counterfeiting and fraud.

Trademark, patent, or copyright

Trademarks, patents, and copyrights are different types of intellectual property. The USPTO grants patents and registers trademarks. The U.S. Copyright Office at the Library of Congress registers copyrights. Use the IP Identifier to learn what kind of intellectual property you have.

 TrademarkPatentCopyright
What’s legally protected?A word, phrase, design, or a combination that identifies your goods or services, distinguishes them from the goods or services of others, and indicates the source of your goods or services.Technical inventions, such as chemical compositions like pharmaceutical drugs, mechanical processes like complex machinery, or machine designs that are new, unique, and usable in some type of industry.Artistic, literary, or intellectually created works, such as novels, music, movies, software code, photographs, and paintings that are original and exist in a tangible medium, such as paper, canvas, film, or digital format.
What’s an example?Coca-Cola® for soft drinksA new type of hybrid engineSong lyrics to “Let It Go”
from “Frozen”
What are the benefits
of federal protection?
Protects the trademark from being registered by others without permission and helps you prevent others from using a trademark that is similar to yours with related goods or services. Safeguards inventions and processes from other parties copying, making, using, or selling the invention without the inventor’s consent.Protects your exclusive right to reproduce, distribute, and perform or display the created work, and prevents other people from copying or exploiting the creation without the copyright holder’s permission.

Enforcement policy

The United States Patent and Trademark Office (USPTO) provides policy leadership, advocacy, and technical and trade expertise in the domestic and international enforcement of intellectual property rights (IPR). This includes providing substantive training and capacity building for foreign government officials in the area of IPR enforcement and providing technical assistance on issues related to the enforcement of IPR. It also provides interagency policy advice and legislative analysis on: 

  • Domestic and international IPR enforcement issues
  • Training programs, technical assistance, and capacity building activities addressing civil criminal, border, and administrative enforcement of IPR
  • The role of foreign courts in the disposition of civil and criminal IPR cases, IPR case management, alternative dispute resolution, and judicial mediation
  • Public education and training on IPR enforcement issues
  • Trade related policies

Enforcement initiatives

The USPTO engages in IPR enforcement capacity building across the globe, and participates actively in international IP enforcement policy discussions.

Trade secrets policy

Trade secrets are vital IP assets held by innovators. Protection of those assets against theft and misappropriation is essential to foster innovation and promote economic growth.

Counterfeit medications

Tracking domestic and international legislation on counterfeit medicines and working with foreign governments, law enforcement agencies, regulatory bodies, and IP offices to raise awareness about the dangers of counterfeit pharmaceuticals.

Enforcement resources

Additional resources on enforcement of IPR available from the USPTO, U.S. government, and international organizations.

Trade secrets / regulatory data protection

A trade secret:

  • is information that has either actual or potential independent economic value by virtue of not being generally known,
  • has value to others who cannot legitimately obtain the information, and
  • is subject to reasonable efforts to maintain its secrecy. 

All three elements are required; if any element ceases to exist, then the trade secret will also cease to exist. Otherwise there is no limit on the amount of time a trade secret is protected.

Protection of trade secrets

The Economic Espionage Act of 1996 criminalizes trade theft under two sets of circumstances. Economic espionage refers to the theft of a trade secret “intending or knowing that the offense will benefit any foreign government, foreign instrumentality, or foreign agent.” The second offense — the theft of trade secrets — addresses theft “that is related to a product or service used in or intended for use in interstate or foreign commerce, to the economic benefit of anyone other than the owner thereof, and intending or knowing that the offense will, injure any owner of that trade secret.” These crimes are prosecuted by the Department of Justice and are punishable by imprisonment and/or fines.

The Defend Trade Secrets Act of 2016 (DTSA) amended the Economic Espionage Act to establish a private civil cause of action for the misappropriation of a trade secret. This cause of action provides trade secret owners with a uniform, reliable, and predictable way to protect their valuable trade secrets anywhere in the country. The DTSA does not preempt existing state trade secret law, thus giving trade secret owners the option of state or federal venues.

U.S. courts can protect a trade secret by (a) ordering that the misappropriation stop, (b) that the secret be protected from public exposure, and (c) in extraordinary circumstances, ordering the seizure of the misappropriated trade secret. At the conclusion of a trade secret case, courts can award damages, court costs, reasonable attorneys’ fees and a permanent injunction, if warranted. 

Trade secrets versus patents

Trade secret protection is a complement to patent protection. Patents require the inventor to provide a detailed and enabling disclosure about the invention in exchange for the right to exclude others from practicing the invention for a limited period of time. Patents expire, and when that happens the information contained within is no longer protected. However, unlike trade secrets, patents may protect against independent discovery. Patent protection also eliminates the need to maintain secrecy. 

While the definition of protectable “information” is very broad under trade secret law, there are more limitations on what can be protected by a patent. If a given invention is eligible for either patent or trade secret protection, then the decision on how to protect that invention depends on business considerations and weighing the relative benefits of each type of intellectual property protection.

Trade secrets resources

Trade Secrets Video

A three-minute video produced by the USPTO provides a brief, yet informative introduction on what trade secrets are, why you should protect them, how they can impact a business’s bottom line, and their importance as intellectual property.

2017 Trade Secrets Symposium

On May 8, 2017, at the one-year anniversary of the enactment of the Defend Trade Secrets Act of 2016, the USPTO convened a one-day symposium on trade secrets: “Developments in Trade Secret Protection.” Videos of all four panel sessions are available for viewing online.

2015 Trade Secrets Symposium

On January 8, 2015, the USPTO organized a one-day symposium on issues relevant to the protection of trade secrets. Videos of the symposium are available for viewing online.

Defend Trade Secrets Act of 2016

Public law 114-153. Dated May 11, 2016. Read the full text of the law here.

The Defend Trade Secrets Act at Five: The Inevitable Disclosure Doctrine (October 2021)

On the fifth anniversary of the enactment of the Defend Trade Secrets Act of 2016, this paper looks at the relationship between the act and the “inevitable disclosure” doctrine. The doctrine allows a court to enjoin a former employee from working for a competitor because the nature of the new job and the knowledge of the employee makes it inevitable that the trade secrets of the former employer will be disclosed.

Industrial design policy

IP Policy and international affairs: Industrial Design Policy

The United States Patent and Trademark Office (USPTO) provides policy leadership, advocacy, and technical and trade expertise in domestic and international industrial design rights. This includes regular representation of the U.S. government in bilateral and multilateral intellectual property (IP) and trade negotiations, including representation at the World Intellectual Property Organization (WIPO), the ID5 Industrial Design Forum (ID5), and other international and domestic forums and frameworks. 

Industrial design (design patent) policy encompasses a number of areas that are critical to responding to the many design-related domestic and international issues that face U.S. rights holders. These include:

  • Domestic design and design-related policy issues as they relate to international agreements and treaties, as well as the development of domestic U.S. laws and practice.
  • Treaty negotiation and monitoring the enforcement of industrial design-related international treaty provisions.
  • U.S. implementation of, and adherence to, international treaty obligations relating to industrial designs.
  • Cooperative efforts and studies with foreign intellectual property and design offices, including cataloging and sharing practices for industrial design protection.
  • Technical assistance and training on industrial design and design-related matters for U.S. and foreign officials.

Some of the key industrial design and design-related international agreements the USPTO negotiated, helped develop, and continues to monitor and advance, include the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), the Hague Agreement Concerning the International Registration of Industrial Designs, and the proposed Design Law Treaty. For further information on these treaties and related issues, please visit the links below.

For information about types of patents, including design patents, visit the USPTO’s Applying for Patents webpage.

Areas of focus

The USPTO is a key agency in providing IP policy expertise, advice, and guidance to the administration on a variety of subjects, including the key design-related topics below.

Collaboration

The USPTO actively engages with counterpart governments and IP offices through the forums listed below.

International treaties

International agreements related to industrial designs and their protection.

Reports, research, and studies

Additional resources on industrial designs from the U.S. government and international organizations.