The Complete Defense of Constitutive Consent Works Original Official Announcement of Establishment of Copyright and Acquisition of Notarization
Yuki Takeuchi Copyright(4) Chat GPT Analysis - Point Organization, Inc.
株式会社ポイント機構
The Point Organization, Inc. (President: Yuki Takeuchi) has officially obtained a notarial deed (No. 212 of 2025) on August 14, 2025 (for the main body) and August 18, 2025 (for the commentary) for the work "The Complete Defense Sourcebook of Constructive Uniformity Type Works" (hereinafter "the main body") created on July 26, 2025 as a joint work of Yuki Takeuchi and Kenichi Takeuchi, and the "commentary" for the main body on August 14, 2025 and August 18, 2025, respectively. After the existence of the two works was proven by a notary public on August 14, 2025 (main body) and August 18, 2025 (commentary), a notarial deed integrating the two works was officially acquired on August 22, 2025 (No. 212, 2025). In accordance with the Copyright Act, the rights to this group of works arise upon creation, and the "three-step defense system" (creation date, notary certification, and notarization) is in place to further strengthen the evidentiary capacity of the works. In this release, we will focus on the following four points. In addition, a joint patent application has been filed on July 26, 2025.
(1) Scope of rights as a copyright / (2) Term of rights as a copyright / (3) Requirements and liability for copyright infringement / (4) Absence of prior use right and its meaning
Scope of rights as a copyright ((1))
Relevant pages in the main body of this document
p.4-6: In the list of the composition of all chapters, the definitions of composition from C01 to C45 are systematized and the entire scope of rights is clearly shown.
p.85-194: Indicates that pseudo code and implementation definition parts (forceConsume / skipReward / chargeFromIssuer, etc.) are protected as program works.
p.257-419: UI/UX design and contract inducement flow are visually shown, and graphic/screen design is also subject to copyright protection.
P.996-1010: Includes an evaluation of the economic impact of the scope of rights and defines the social coverage of rights.
Relevant pages in the commentary
p.9-15: The definitions of the 5 x 5 configuration matching model, scoring, and natural language matching clearly state that the scope of the right extends to "configuration + purpose + operation + order + effect".
p.37-45: Matching API specifications and evidence output items are described, and the program/API invocation structure is also subject to copyright protection.
P.61-123: Scope of rights by entity (users/merchants/developers/manufacturers, etc.) is organized, and the scope of protection for each entity is clearly stated.
P.125-133: A matrix by industry, service, and object clearly indicates that cryptographic assets, stocks, and insurance fields are covered.
● Summary
The entire domain is included in the scope of rights, including text, diagrams, code, UI/UX, API, contract examples, and industry-specific application matrices. Unauthorized use of even a single line, diagram, or code constitutes copyright infringement.
2. Term of rights as copyright((2))
Relevant pages in the main body of the document
P.1050-1052: In the "Certificate of Intellectual Property Valuation," the term of copyright protection and 70 years after death are clearly stated and its validity over the future is recorded.
Relevant pages of the commentary
p.7-8: In the General Discussion section, the time durability of the "three-tier defense" is described, which supports the long term of the right.
● Summary
Copyright accrues on the date of creation (July 26, 2025) and is protected for 70 years after the author's death. Based on international treaties, similar periods are granted in other countries. 3.
3. copyright infringement((3))
Relevant pages in the main body of the document
P.143, P.180-181: Enumeration of infringement (reproduction, adaptation, distribution, translation) is specifically stated.
P.446: Declaration of prohibition of unauthorized use.
The relevant page of the commentary
P.31-35: Examples of pseudo-code implementation and execution logs are presented to support the conclusion that infringement can be established even at the code level.
P.61-123: LIABILITY FOR INFRINGEMENT IN CASE OF UNAUTHORIZED USE BY MERCHANT, DEVELOPER, MANUFACTURER, AND AGENT are organized.
Criteria for establishing infringement
Even a one-line match constitutes infringement.
Even if a variable name is changed or the syntax is altered, infringement is established by "constructive agreement.
Infringement is established even if the UI/UX screen, contract text, API specifications, and log format are identical.
Civil liability: Injunction, damages, and license fee
Criminal liability: Up to 10 years imprisonment or a fine of up to 10 million yen (up to 300 million yen for corporations)
Explanation of prior user's right ((4))
Relevant pages in the main body
P.820-830: In the contract clause, it is indicated that "there is no exemption from liability on the grounds of prior use.
Relevant pages in the commentary
p.114-122: Together with the "Record of Submission through Diplomatic channels," it is recorded that copyrights arise upon creation, and that there is no prior right of use like patents.
Summary
The "right of prior use" in patent law does not exist in copyright law. Therefore, any use of a similar composition after the date of creation (July 26, 2025) will always constitute infringement, and no exemption is possible.
5. summary and message
The body (1,053 pages) and the commentary (133 pages) each systematically define the scope of rights on every page, establishing long-term protection for 70 years after death.
The Copyright Act provides that "first use rights" are protected for 70 years after death, and that "infringement" can be established even by a single line of agreement and involves extremely serious civil and criminal liability.
There is no right of first use under the Copyright Act, and latecomers cannot escape infringement for any reason.
In light of the above, Point Organization, Inc. aims to build a sound intellectual creative society free from imitation and infringement through the proper exercise of rights and the promotion of a licensing system.
1] Assumption arrangement
The main body (1,053 pages) and commentary (133 pages) define the scope of rights extending to all industries (cryptographic assets, stocks, insurance, etc.).
The "Prohibited acts" are defined as the acts of copying, adaptation, distribution, distribution, display, etc. The "Prohibited acts" are defined as the acts of copying, adaptation, distribution, distribution, display, etc. The "Prohibited acts" are defined as the acts of copying, adaptation, distribution, distribution, display, etc.
The "content of prohibited acts" refers to restrictions on use based on Articles 21-28 of the Copyright Act, and corresponds to rights of reproduction, adaptation, public transmission, transfer, distribution, showing, exhibition, lending, importation, and use of derivative works, etc.
2] Number of types of prohibited acts specific to points/coupons
The following 19 types of acts are prohibited in the "point/coupon area" as far as can be confirmed in the explanatory materials and the main body.
Major prohibited acts (19 types)
複製(システムコード、UI、テンプレートの無断コピー)【本体p.143, p.181】/翻案(構造や変数を変えても同一処理をする場合)【解説書p.31-35】/公衆送信・配信(無断でアプリやWebに公開)【本体p.143】/頒布(無断配布・二次利用)【本体p. 143] / Rental (use by a third party without permission) / Transfer (sale without a license agreement) / Import (bringing the same configuration from overseas) / Screening (presenting UX screens to the public) / Exhibition (using the contract flow or UI as an exhibit) / Reproduction and reuse of electronic trails / Modification and diversion of log data / Imitation and reproduction of API specifications [Explanatory Note p.37-45] / Imitation and use of contract guidance UX [BODY p.257-419] / Partial use and diversion of configuration IDs (C01-C45) / Unauthorized implementation of compound configuration (A→B→C, etc.) / Adaptation through language conversion (unauthorized use through English and Chinese translations) [Explanatory notes p.125-133] / Unauthorized reproduction and diversion of contract terms [BODY p. 820-830] / Unauthorized reproduction and misappropriation of contract clauses [p. 820-830] / Unauthorized reproduction and misappropriation of point allocation/reproduction of clearing controls / imitation of coupon usage history and score visualization
[3] Conclusion
The total number of prohibited acts as copyrights limited to points and coupons is 19.
● General list of copyright prohibited acts (organized based on the description in the main body and commentary: all types + reverse pattern + case study commentary)
<1> Basic copyright prohibited acts (statutory types)
Based on Articles 21-28 of the Copyright Act, the following 10 core types of acts are prohibited without the permission of the copyright owner.
(1) Infringement of the right of reproduction
Copying the contents (printing, scribbling, converting to PDF, data reproduction)
Example: Copying the C01 pseudo code of the main body and implementing it in another application.
Reverse pattern: Mere quotation (source clearly indicated and minimized) is legal.
(2) Performance right infringement
Performing a copyrighted work on stage or at an event.
Example: Unauthorized reproduction of a scenario for awarding points in an event demo.
Reverse pattern: Official demos with the consent of the rights holder are legal.
(3) Performance right infringement
Unauthorized use of voice or music.
Example :Use of notification UX in narration materials.
Reverse pattern: No problem for self-written explanatory text.
(4) Screening right infringement
Unauthorized presentation of UI/UX or flow on screen or exhibition.
Example: Unauthorized use of UI diagrams at a presentation for merchants.
(5) Public transmission right infringement (distribution)
Unauthorized disclosure on the Web, SNS, or apps.
Case example: Posting of UX flow for inducing contracts on the company's website.
(6) Infringement of the right to dictate
Reading out and publishing the text of an instruction manual.
(7) Exhibition right infringement
Unauthorized use of diagrams and flowcharts in exhibitions.
(8) Distribution right infringement
Distributing copies of the main unit or the explanatory manual.
(9) Transfer/rental right infringement
Selling or renting data or modified versions.
(10) Infringement of the right of adaptation (creation of derivative works)
Reproducing the same configuration by modification, translation, or code rewriting.
Example: If the processing flow matches even if the variable name or syntax is changed, it is infringement (e.g., point allocation → exclusion of liquidation).
Reverse pattern: Completely original design that removes structural match is legal.
<2> Prohibited acts specific to the main body and manual (additional extension)
Prohibited acts based on the "structural match" determination specific to this work (including points and coupons).
(11) Unauthorized use of composition IDs (C01-C45)
C01: Compulsory consumption / C02: Revisit reward exclusion / ... Using a configuration up to C45 is an immediate infringement.
(12) Imitation of composite configuration (A→B→C, etc.)
Protects not only stand-alone but also linked configurations.
(13) Diversion of log/trace data
Imitating electronic evidence output format.
(14) Imitation of contractual inducement UX → pre-checking
Acts that imitate license agreement inducement.
(15) Unauthorized use of collation API specifications
Imitating matchStructure, block/notify/license, etc.
(16) Misappropriation of cross-industry matrix
Reuse of point/coupon coverage matrix.
(17) Unauthorized creation of translations and multilingual versions
Creating English, Chinese, and Korean versions without permission.
(18) Unauthorized reproduction of contract clause templates
Use of the contractual clause examples described in the main body and explanatory manuals without permission.
(19) Redesigning by AI to generate similar systems
(19) Redesigning a system using AI to generate a similar system
4】Explanation of specific cases
Case 1: Another company changed only the UI and used the process of "point allocation→exclude from liquidation"→It matches the C01 configuration on p.85-96 of the main body, and infringement is established.
Case 2: Original implementation that only displays the point balance in a graph→Failure of infringement unless the main body's matching API structure is relied upon.
Case 3: Use of the JSON API example on p. 37-45 of the instruction manual for own application → Adapted use of the matching API specification, infringement established.
Case 4: Citing a few lines from the main body of the article and clearly stating the source → Legal according to the citation rule.
5] General arrangement (Conclusion)
Types of prohibited acts: 10 basic statutory types + 9 types specific to the main body commentary = 19 types in total. Reverse pattern: Citation, private use, educational use, original design, etc. are legal. /Case studies: Infringement is established if the "configuration matches" in any of the implementation, UI, contract text, and API.
Therefore, copyright prohibited acts are organized into 19 types in total, and "Inverse Pattern (when it does not constitute infringement)" and "Explanation of Specific Cases" are provided for each type.
Specific explanations of copyright infringement (manufacturer / merchant / distributor / user / developer + criminal penalty)
<1> Manufacturer (system/application provider)
Typical infringement: Providing a system that implements the configuration IDs (C01-C45) listed on the main unit without permission. /Providing a product by diverting the contract guidance UX and API specifications in the manual. / Reproduce the charts and contract templates in its manual.
Applicable pages: Main body: p.85-194 (pseudo code and configuration ID definition), p.257-419 (UI/UX design)
Commentary: p.37-45 (Matching API Specification), p.61-123 (Scope of Rights by Entity)
Responsibility: Primary infringing entity. Heaviest liability: Primary infringing entity. Subject to claims for compensation for damages and injunction.
<2) Merchants (businesses that install and use the product)
Typical infringing acts: issuing points/coupons by installing the infringing system provided by the manufacturer as it is. / Distribute them to customers without permission or use them for sales promotions.
Relevant pages: Explanatory notes, p. 61-78 (Merchant functions and prohibited acts)
Liability: Indirect infringing entity. Liability arises when the infringing system is installed and profits are earned. The liability is joint and several liability as a joint tort.
<3> Distributor (responsible for sales and distribution)
Typical infringement: Selling or brokering a system that unauthorizedly incorporates the configuration based on the main unit or instruction manual. Reproduction of diagrams and contractual templates from the manual in business materials.
Relevant pages: p.79-95 (Scope of rights of distributors and sales side) of the manual.
Responsibility: Contribution to infringement at the distribution stage. The distributor or sales person is liable for distribution or transfer of the software, not for not knowing about it.
<4> Users (end users)
Typical infringement: Using unauthorized applications or systems to process points or coupons. Screenshot and publish the UI or contract screen.
Applicable pages: Main body p.446 (Declaration of prohibition of unauthorized use) / Explanatory notes p.61-123 (Scope of user rights)
Severity of liability: Infringement is established even if the scale is small. Even if the scale of infringement is small, it may be the subject of a civil claim.
<5> Developers (engineers and designers)
Typical infringement: Implementing pseudo code (p.85-194) or API specification (p.37-45 of the manual) as is. System development with only variable names changed from /C configuration.
Responsibility: The engineer himself is also responsible as a "co-infringer. The engineer himself is liable as a "joint infringer" and is subject to lawsuits together with his employer and the company from which he placed the order.
<6> Criminal penalties (based on the Japanese Copyright Law)
Copyright infringement is subject to not only civil liability but also criminal penalties.
For individuals: imprisonment for not more than 10 years or a fine of not more than 10 million yen, or both.
For corporations: up to 10 years in prison or a fine of up to 300 million yen (both penalties are applicable).
Cases of particular importance: infringement on a commercial scale (manufacturers, merchants, and distributors are subject to this rule) / organized development and distribution / distribution including overseas expansion
Conclusion: Copyright infringement is established regardless of "who is the subject," and everyone from the manufacturer to the user is liable. Especially in the point/coupon field, it is extremely difficult to avoid copyright infringement because a "one-line match" constitutes infringement.
Below is the scope of copyright rights for Pattern A (A-configuration alone)
(1) Definition of Pattern A
A-configuration alone (A)" is "a basic configuration that allows the granting/processing of points, coupons, etc. to stand alone. Since it indicates "a mechanism that works only with A," the minimum scope of prohibited acts as a copyrighted work is included here.
(2) Relevant pages in the main body
p.85-96: Pseudo code examples of single processing configuration such as C01-C05 (forceConsume, skipReward). → Basic behavior definition of A configuration
p.143: Enumeration of copyright infringement acts (copying and adaptation). → Copying or modification of A-configuration is immediate infringement.
p.257-270: UI screen example and flow. →Protection of A-configuration when it is expressed as UI.
P.446: Declaration of prohibition of unauthorized use.
(3) Relevant pages in the Explanatory Notes
P.9-15: 5x5 configuration matching model → A corresponds to the basic axis of "configuration
p.31-35: Pseudo code examples and matching templates → Includes judgment rules for A alone.
P.61-70: List of prohibited acts by user and merchant → Unauthorized implementation of A is also prohibited
p.125-133: Matrix by business type -> Scope of application of A configuration directly applicable to points/coupons
(4) Scope of copyright rights for pattern A (prohibited acts)
Prohibited acts regarding A composition (examples)
Reproduction: Copying the code or UI of A as it is / Adaptation: Performing the same processing as A even if the variable name or order is changed / Distribution: Releasing an application containing A configuration / Distribution: Distributing/displaying a system incorporating A configuration / Screening: Using the UI of A configuration on screen without permission / Unauthorized diversion of contract terms: Using contract guidance based on A configuration / Translation / Multilingualization: A is translated into English and implemented (e.g., appropriated by an overseas application) / Record trail appropriation: Log/JSON format of the A configuration is imitated
(5) Case Examples
Infringing use (illegal)
Case 1: Introduction of a "point awarding function" into the company's own application, which is an unauthorized copy of the A-configuration. →The code corresponds to the code on p. 85-96 of the main body, and infringement is established.
Case 2: Imitating the process of A by changing only the UI design. →The code is matched with the pseudo code on p. 31-35 of the instruction manual, and infringement is found to have occurred.
Case 3: A is translated into English and released for overseas markets. →Infringement is found for adaptation and use of the translation.
(6) Illustration (Text Diagram): Positioning of A configuration
──────────────┐
│ Pattern A (stand-alone) │ ← Minimum unit composition
└──────────────┘
│
▼ "Point/Coupon Granting
Point/Coupon Granting
│ │ ▼ "Point / Coupon grant
▼ ▼ "Point/Coupon Granting" │ ▼ "Point/Coupon Granting
Reflected and saved to the user
The contents of this article are the contents of a partial scope of rights as a copyrighted work. The document will be attached separately.
Comment from inventor/copyright holder/inventor (Mr. Yuki Takeuchi):
Copyright infringement is a clear criminal act. We are committed to protecting intellectual property rights holders and eradicating infringement of intellectual property rights.
Mr. Yuki Takeuchi is currently developing the "A-GEL Gift Point" and "A-GEL Gift Card" services that utilize intellectual property rights such as patent rights and copyrights at Point Organization Co. We are also planning to offer "A-GEL Point" service.
Point Organization Co.
2-7-9 Sendagaya, Shibuya-ku, Tokyo
Representative Director: Yuki Takeuchi
Copyright © Yuki Takeuchi and Kenichi Takeuchi
Date of creation : July 26, 2023
Existence fact determined : August 12, 2025
Notarized acquisition : August 22, 2025
- Category:
- Research & Reports