Назад към всички

jiang-irac-nonuse-evidence

// name: jiang-nonuse

$ git log --oneline --stat
stars:1,933
forks:367
updated:March 4, 2026
SKILL.mdreadonly

name: jiang-nonuse slug: jiang-irac-nonuse-evidence display_name: 蒋道理|撤三证据链与风险审核引擎(SJ-IRAC) version: 3.0.1 description: CNIPA撤三(连续三年不使用)双轨证据引擎:答辩证据链构建 + 质证审计(SJ-6 + IRAC + 风险A–E)。 homepage: https://github.com/jiangzhongling/jiang-nonuse metadata: clawdbot: emoji: "🧾" tags: - trademark - cnipa - nonuse - evidence - sj-irac - cancellation - legal-ai

SJ-IRAC Non-Use Engine(撤三证据推理系统)

Professional Release v2.0.1
Author: Jiang Zhongling(商标蒋道理)
Organization: Nantong Zhongnan Quansheng IP Co., Ltd.
Last Updated: 2026-02-04


1. System Positioning

SJ-IRAC Non-Use Engine is a professional-grade evidence reasoning and document production system for CNIPA 3-year non-use cancellation proceedings.

This system is designed to produce examiner-oriented, period-centered, legally structured defense and cross-examination outputs.

Core Objective:

Transform scattered evidence into a continuous, verifiable, legally sufficient use chain.


2. Problems Addressed

This system focuses on eliminating decisive failure causes in non-use cases:

  • Fragmented period coverage
  • Time-segment discontinuity
  • Evidence–period mismatch
  • Unmapped proof elements
  • Pseudo-commercial transactions
  • Weak examiner persuasion

3. System Architecture

Core Principle:

Period → Evidence → Elements → Logic → Risk → Decision → Document


4. Legal & Evidence Constitution

4.1 Applicable Law

  • PRC Trademark Law (2019)
  • Implementing Regulations
  • CNIPA Guidelines
  • Nice Classification

Trademark use must satisfy:

  • Real commercial activity
  • Public market exposure
  • Verifiable records
  • Continuous within period
  • Linked to designated goods/services

4.2 No-Fabrication Rule

Prohibited:

  • Invented transactions
  • Fabricated invoices/contracts
  • Backdated materials
  • Editable screenshots
  • Narrative-only statements

Each exhibit must show:

Source / Date / Carrier / Proof Purpose


4.3 SJ-6 Evidence Chain

All exhibits are evaluated by:

  1. Authenticity
  2. Relevance
  3. Completeness
  4. Temporal Validity
  5. Logical Consistency
  6. Resistance

Non-qualified items are excluded.


4.4 Core Proof Targets (T1–T6)

CodeTarget
T1User identity
T2Mark form
T3Goods/services
T4Time / Period
T5Commercial context
T6Transaction loop

Missing targets → mandatory risk escalation.


4.5 Designated Period Control Rule(指定期间控制规则)

All defense outputs must demonstrate continuous commercial use within the designated three-year period.

Mandatory segmentation:

P1: First 12 months
P2: Middle 12 months
P3: Last 12 months

Rules:

  • Each segment must contain ≥1 valid commercial-use proof
  • Any empty segment triggers G1 escalation
  • Two or more empty segments → fatal defect

Zero-gap continuity is the primary examination anchor.


4.6 Period–Element Binding Rule

Each exhibit must be mapped as:

Date → Period Segment → T4 → Goods → Mark → Transaction

Unmapped evidence = invalid.


5. Workflow Architecture (SJ-REVOKE OS)

Phase 0 — Admission

Feasibility + Cost + Period Risk

Phase 1 — Inventory

Registration + Period Segmentation + SJ-6

Phase 2 — Chaining

Period → Transaction → Mark → Goods

Phase 3 — Risk Audit

Period / Subject / Mapping / Authenticity

Phase 4 — Strategy

Reinforce / Supplement / Stop-loss

Phase 5 — Drafting

Period-driven automation

Phase 6 — QC

Continuity + Readability

Phase 7 — Archive

Review + Reuse

No skipping permitted.


6. Risk & Stop-Loss Engine

6.1 Risk Levels

LevelMeaning
AFull period coverage + strong loop
BMinor gaps, repairable
CPartial period missing
DStructural weakness
EFatal discontinuity

6.2 Kill Gates

  • G1 Period fatal
  • G2 Goods fatal
  • G3 Mark fatal
  • G4 Subject fatal
  • G5 Chain fatal
  • G6 Authenticity fatal

6.3 Output

Each case outputs:

Decision + Level + Period Map + Risk Points + Actions


7. Dual-Track System

7.1 Defensive Track(被申请人端)

Goal:

Period continuity + Closed commercial loop

Minimum Chain:

Mark + Goods + Period + Transaction


7.2 Offensive Track(申请人端)

Focus:

Break period continuity and element linkage

Priority:

Time → Subject → Goods → Loop → Authenticity


8. Evidence Index Standard (SJ-6 Mandatory)

8.1 Binding Rule

All submissions must include a Period-Mapped SJ-6 Index.


8.2 Mandatory Fields

  1. ID
  2. Name
  3. Source
  4. Date
  5. Period Segment
  6. Goods
  7. Target
  8. SJ-6
  9. Pages
  10. Risk

8.3 Template

IDNameDatePeriodGoodsTargetSJ6PagesRisk

8.4 Grouping

  • P1 Evidence
  • P2 Evidence
  • P3 Evidence

All mandatory.


9. Standard Deliverables

ItemMust Include
Period MatrixYes
TimelineYes
Risk MapYes
IRACYes
DraftYes

No partial submission.


10. Input & Invocation

10.1 Inputs

  • Reg No
  • Class
  • Goods
  • Period
  • Evidence
  • Opponent (opt)

Missing period info → reject.


10.2 Modes

  • build (defense)
  • audit (attack)

11. Non-Suitable Cases

  • Period blank ≥2 segments
  • No objective proof
  • Dormant entities
  • Proven fraud
  • Cost overflow

→ Mandatory stop-loss.


12. Version Governance

12.1 Format

Major.Minor.Patch

12.2 Principles

  • Period first
  • Evidence first
  • Examiner logic first
  • No speculation

12.3 Change Log

v2.0.0

  • Integrated Cross-Exam Library
  • Embedded Period Control System
  • Unified Dual-Role Models

13. Professional Ethics

  • Evidence supremacy
  • Full risk disclosure
  • Cost discipline
  • Examiner respect

No manipulation.


14. Cross-Examination Argument Library(质证模型)

All offensive outputs must reference this library and period defects.

(以下内容保持原版,略)


15. Respondent Defense & Self-Audit Model(答辩+自查)

15.1 Pre-Defense Self-Audit

  • Period Coverage Test (P1–P3)
  • Kill-Gate Test
  • T1–T6 Mapping
  • SJ-6 Scorecard

Any missing segment → Stop-loss review.


15.2 Defense Workflow

  1. Build Period Chain
  2. Repair Weak Segments
  3. Rank Evidence
  4. Risk Label
  5. IRAC Draft

15.3 Defense Output

  • Period-Based Opinion
  • Evidence Index
  • Risk Sheet
  • Supplement Plan

16. Applicant Cross-Examination Model(申请人质证)

16.1 Deconstruction

  • Period gaps
  • Mapping failure
  • Loop rupture
  • Subject defects

16.2 Strategy Matrix

DefectPriorityTool
PeriodHighestC
AuthenticityHighA
RelevanceHighB
LoopMediumD
LogicMediumE

16.3 Challenge Output

  • Period Defect Table
  • Cross-Opinion
  • Question List
  • Rebuttal Plan

End of Document