• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Issues Related to Judicial Expertise of Technical Secrets

    2022-05-07 11:43:25SunJiquanHuangDehai
    科技與法律 2022年1期
    關(guān)鍵詞:技術(shù)秘密商業(yè)秘密司法鑒定

    Sun Jiquan Huang Dehai

    Abstract: With the continuous improvement of scientific and technological R&D levels and the intensified market competition within the same industry, more and more scholarly attention has been paid to legal disputes about trade secrets. Litigation cases involving technical secrets often entrust appraisal institutions to identify and anal- yse the special technical problems involved. This paper discusses how to determine the ’secret point’ of the claimed technical secrets and how to judge whether the technical information is unknown to the public. It also ex- plores how to judge whether the technical information of the sued infringement is essentially the same as the tech- nical information contained in the ’secret point’ in the process of judicial expertise involving technical secrets. Finally, it attempts to explore a feasible way for forensic expertise to involve technical secrets.

    Keywords: trade secret; technical secrets; judicial expertise

    CLC:D 918.9DC:AArticle ID:2096-9783(2022)01-0140-09

    1 Introduction

    According to Article 9 of the Anti-Unfair Competition Law of the People’s Republic of China (revised in 2019), "the trade secrets mentioned in this Law refer to the technical information, business information and other business information that are not known to the public, have commercial value and have been protected by certain measures taken by the right holder". As an important intangible asset, trade secrets can not only provide the right holder with a competitive advantage, but also provide an important development direction for it, and can even be used as a strategic asset to establish a boundary for the right holder to distinguish other market competitors. With the continuous development of the market economy, business competition has become increasingly fierce, and ille- gal methods of infringing on others’ business secrets have emerged one after another[1].At present, in many cases where state secrets and trade secrets concurrent, the judicial organs mostly use civil cases of infringement of com- mercial secrets or criminal cases of infringement of commercial secrets to pursue liability separately[2]. And PRC’s latest "Criminal Law Amendment (11)" has made substantial amendments to the crime of infringing on trade se- crets, which is in line with the background of my country’s strengthening of intellectual property protection. The re- vised crime of infringing on trade secrets has been changed from consequential crimes to circumstantial crimes, low- ering the threshold of conviction, raising the statutory penalty, increasing the methods of conduct, and expanding the scope of business secret identification. The content has shown a significant expansion trend[3].

    The case of infringement of trade secrets has always been one of the difficulties in the field of intellectual property litigation—some judicial decisions have caused disputes among the legal professions. This situation is mainly caused by the following reasons. Firstly, as a special type of intellectual property, trade secrets are rights that are generated by ’taking confidentiality measures’ within the scope of a specific person who knows the content of the trade secrets. It is usually held privately by the right holder and cannot be disclosed without administrative or judicial review. Only until the situation that the right holder discovers that their trade secret has been infringed and should seek judicial or administrative protection can it be disclosed to a specific agency. This makes it difficult for both parties involved in the case to produce evidence. Secondly, technical secrets are highly professional and usually involve various technical fields. Therefore, in addition to the traditional risk points divided into personnel risk, medium risk, and partner risk[4], there are also risk points due to referees. In the process of identifying techni- cal secrets, personnel may have the risk of ambiguity in the technical scheme, which creates obstacles to referee- ing. Thirdly, trade secrets are currently protected by administrative, civil and criminal administrative, three sepa- rate areas in China, and the administrative departments and courts that have jurisdiction over trade secret cases are quite different. For example, in the criminal law protection procedures, the basic courts have jurisdiction over cas- es, and they may also require the participation of public security organs. But in administrative cases, market man- agement administrative organs at all levels may also participate. Finally, the trial rules for commercial secret litiga- tion cases involving technical information are relatively independent, with few specific relevant legal provisions, and they also lack more detailed and operational content in relevant judicial interpretations.

    For the reasons discussed above, in specific trade secret litigation cases involving technical information, admin- istrative or judicial agencies often entrust an appraisal agency to analyse the specialized technical issues involved in a case. Sometimes, in order to improve the probability of winning the lawsuit, both parties involved in a case al- so use a third-party appraisal agency to provide support for their claims. The content of judicial appraisal in trade secret litigation cases involving technical information generally includes: determining the technical secret point of the confidentiality of the technical information involved (the secret point); whether the technical information con- tained is known or unknown to the public (unknown identification); and whether the technical information accused of infringement is the same or substantially the same as the technical information contained in the secret point (sim- ilarity identification). This paper attempts to discuss the content of the above two aspects of identification①.

    2 The Necessity of Judicial Authentication of Technical Secrets

    The current laws and regulations on the judicial authentication of technology secrets are incomplete. In prac- tice, some judicial organs or scholars believe that technical secrets must undergo judicial authentication, and even believe that the results of such authentication can determine whether the technical secrets are established or not. As a result, the parties involved in trade secret cases or the trial organs often regard the conclusions of judicial au- thentication as decisive evidence for the determination of trade secrets. These phenomena all show that many mis- understanding urgently need to be clarified and reflected upon among appraisal agencies, parties to the case, and law scholars.

    In practical legal disputes involving technical secrets, the initial main legal basis for judging whether the de- fendant infringed on the technical secrets of the right holder is Article 14 of the Interpretation of the Supreme Peo- ple’s Court on Several Issues Concerning the Application of Law in the Trial of Civil Cases of Unfair Competition, implemented in 2007 (Judicial Interpretation in 2007), which states that, if the parties allege that others have in- fringed on trade secrets, they shall bear the burden of proof for the fact that the trade secrets they possess meet the legal requirements, that the information of the other party is the same or substantially the same as their trade se- crets, and also that the other party has adopted improper means. Among them, the evidence that a trade secret meets statutory conditions includes the carrier, specific content, commercial value, and specific confidentiality mea- sures adopted by the trade secret, etc.

    According to this regulation, whether it is an ’unknown identification’ or ’similarity identification’, the right holder is first required to determine the specific content of the technical secret that they claim, that is to determine the secret point of the technical secret for delimiting the correct boundary of the technical secret. This is not only the basis for the right holders to initiate a series of rights appeals, but also the logical starting point and factual ba- sis for the courts to hear cases, especially to determine whether the rights exist and whether they have been violat- ed.

    3 Problems with Judicial Authentication of Technical Secrets

    In practical technical secret disputes, there are many cases in which the right holder (plaintiff) did not submit a commercial secret carrier, did not explicitly request protection from the court, or the scope of the claimed secret point was too large—all of which could lead to the loss of the right holder. For example, in a civil judgment of the Higher People’s Court of Anhui Province, the court held that the right holders’ "scope of technical secrets request- ed for protection is only a very broad scope of secrets, which may include some publicly known information. As the party requesting the right, they should clarify in this case the technical secrets that it seeks to protect beyond the scope of the criminal ruling and distinguish it from the well-known technical parts in the field". Thus, the court de- nied the claim of the right holder (plaintiff) in the "second instance to reiterate the scope of the technical secrets he requested for protection".

    It was mentioned in a civil ruling of the Supreme People’s Court that the retrial applicant (defendant) stated that, Shenhua Company (plaintiff) claimed that the micro-suspension method paste resin polymerization production technology is a technical secret in the entire process flow, technical formula, actual operation, etc... But, they did not clarify the specific information and content of the technical secrets, which prevented Sanyou Company from con- ducting targeted defence, proof and cross-examination.

    Therefore, the court ruled that, generally speaking, in trade secret infringement disputes, the right holder seek- ing protection should specify the specific content of the technical secret and define the difference between it and publicly known technical information. However, due to the different types of, fields and ways of infringement of technical information or business information requested to be protected as trade secrets, we cannot interpret the spe- cific content of a trade secret only as a concentrated expression of a paragraph, and cannot impose too strict re- quirements on the description of the specific content of a trade secret. The trade secrets requested by Shenhua Com- pany are widely distributed in various links such as specific process flow, core equipment technical specifications and technical parameters, raw material components, etc.

    In this case, the court determined that, under normal circumstances, the right holder should specify the specif- ic content of the technical secrets, and at the same time emphasize the particularity of the case. Therefore, without the final determination of the specific content of the technical secret, the court finally made a ruling in favour of the right holder. However, we believe that the handling of the specific content of the relevant technical secrets in the case is open to question.

    4 Theoretical Analysis of Judicial Authentication of Technical Secrets

    4.1 Unknown Judicial Identification

    The provisions of Article 3, Paragraph 1 of the Supreme People’s Court’s Provisions of the Supreme People’s Court on Several Issues Concerning the Application of Law in the Trial of Civil Cases of Infringement of Commer- cial Secrets (2020 Judicial Interpretation) stipulates that "If the information requested by the right holder was not generally known and easily obtained by relevant personnel in the field when the alleged infringement occurred, the people’s court shall determine it as publicly unknown②according to the Article 9 Paragraph 4 of the Anti-Unfair Competition Law". This provision is a positive or affirmative element confirming that the disputed technical informa- tion is ’public unknown’. According to this regulation, the rights holders of technical secrets can state the facts or provide evidence from the two aspects that the disputed technical information is not generally known to the relevant personnel in the field and thus easily obtained by the public, to show that the relevant technical information is’public unknown’.

    For technical information that is not generally known to relevant persons in the field, it can be understood that technical secrets are not known to other persons in the field other than those who have the obligation to keep confi- dentiality as agreed with the right holder. ’Public unknown’ mainly refers to whether the relevant technical informa- tion has been disclosed at home and abroad before the date when the right holder claims the right to enjoy trade se- crets. The technical information is not disclosed at home and abroad to show that the innovation contained in the technical information is sufficient to separate it from the public information to avoid undue protection of known technologies as technical secrets. It can also be understood in terms of whether the technical information as a whole has been disclosed by domestic and foreign public publications before the issuance of a search report by a depart- ment with patent search qualifications for ascertaining the right to trade secrets.

    That the technical secrets are not easy to obtain by the relevant people in the specific field can be proved in terms of the following three aspects. Firstly, for rights holders who claim technical secrets, based on existing tech- nology, time, manpower and material resources having been spent on the research and development of technical se- crets; for example, the right holder can use the research and development process to show that, because of the rele- vant technical secrets, the right holder may be or is already in a relatively advantageous position in market competi- tion. Secondly, because the right holder has adopted reasonable confidentiality measures, it is difficult for those out- side the obligation of confidentiality to obtain the information. Thirdly, the technical staff in the relevant field needs to work hard or expend effort to obtain the technical secrets, based on the existing technology that has been discov- ered to be closest to the technical secret. Also, it may be the case that the content of technical secrets is only bind- ing on specific persons who are obliged to maintain confidentiality, and the defendant obtained the technical secrets through improper means. The level defined as ’easy to be obtained’ here should be lower than the degree of creativ- ity in the sense of a patent. And the difference between the technical secrets with existing technology that has been discovered to be closest to the technical secret should be limited to the content of direct replacement of convention- al means in the technical field claimed in the patent novelty examination procedure.

    On the other hand, Article 3 of the 2020 Judicial Interpretation also stipulates five situations in which the rele- vant information can be determined to be ’public unknown’. These five situations are negative elements in the judi- cial authentication of technical secrets. The defendant can deny that the technical information of the right holder is’public unknown’ by providing evidence to show the existence of any of these five situations. In the situation that the information has been publicly disclosed in publications or other media, a search report can also be issued by entrusting a department with patent search qualifications to prove that the technical information mentioned is not’public unknown’. The validity of the search reports issued by the right holder and the defendant has no priority or rank. The key point is that who searches the existing technology closer to the content of the technical information defined by the secret point.

    In a successful case of denying that technical information was ’public unknown’ as claimed by the right holder by providing evidence to prove the existence of one of the above five situations, a civil judgment of the Guangzhou Intellectual Property Court stated that, although the plaintiff claimed that its technical secret points 1-4 were not known to the public at least before 30thSeptember 2014, based on the results of its self-entrusted appraisal, the de- fendant provided evidence that the technical information involved in the case had been publicly disclosed on the In- ternet before the act of the defendant occurred or even before the completion of the research and development of the project involved in the case by the plaintiff. Therefore, the case was determined not to involve technical infor- mation that was ’public unknown’, and thus it did not meet the requirements of confidentiality in this case.

    Under the current background of respecting intellectual property rights and strengthening the protection of technical secrets, reducing the difficulty of protecting the rights of trade secret owners and reducing the burden of proof for the owners of trade secrets it has become the trend in trials involving trade secret disputes. In the first phase of the Sino-US Economic and Trade Agreement, it was stipulated that the responsibility for proving that trade secrets are not ’public unknown’ shall be transferred to the defendant, in the case where the right holder pro- vides preliminary evidence to prove that it has taken confidential measures for the claimed trade secret, the burden of proof or the burden of providing evidence is transferred to the defendant to prove that the business secret con- firmed by the right holder is generally known or easily obtained by people within the scope of the information in- volved in the usual processing, and therefore is not a business secret (using appropriate terminologies under respec- tively different legal systems).

    According to this agreement, the risk of the defendant losing the lawsuit is increased in litigation cases involv- ing technical secrets. In response to this agreement, Article 32 of the Anti-Unfair Competition Law also contains a similar provision stating that the responsibility for proving that trade secrets are not ’public unknown’ is transferred to the defendant. It is believed that the ’preliminary evidence’ mentioned in the agreement can include the first two items in the above proof that technical information is not easily obtained by relevant personnel in the field, such as the records of the technology research and development process, evidence of market success, analysis reports that may achieve market success or gain a competitive advantage, reasonable confidentiality measures adopted, and the fact that the defendant has access to technical information.

    4.2 Similarity Judicial Identification

    The legal provisions related to the judgment of technical secrets infringement mainly relate to Article 23 of the Anti-Unfair Competition Law, Article 14 of the 2007 Judicial Interpretation, and Article 13 of the 2020 Judicial In- terpretation. For the similarity comparison between the technical secrets and the alleged infringement of technical information, Article 14 of the 2007 Judicial Interpretation states that one of the conditions for the parties to claim that others infringe on trade secrets is that the information of the other party is the same or substantially the same as the trade secrets. This point is clearly stipulated in Article 32 of the Anti-Unfair Competition Law, and Article 13 of the 2020 Judicial Interpretation further elaborates on the essence of the same. In the following, we will only discuss the situation in which the technical information alleged has been summarized as substantially the same as the technical secret point in the practical cases.

    Although the specific words used in distinct cases are different, there are many correspondences between sub- stantially same judgments in patent infringement litigation and equivalent infringement judgments and the prior art defence in the patent infringement litigation. The principle of "Substantially the Same Infringement of Technical Se- crets" as stipulated in Article 13 Paragraph 2 Items 1-3 of the 2020 Year Judicial Interpretation corresponds to the"Three Basics and One Common" principle in patent infringement regulations.

    According to Article 13 of the 2020 Year Judicial Interpretation, if there is an overall difference between the technical secret and the technical information alleging infringement, but the difference is not substantive, the two are substantially the same. When judging whether the technical secrets involved in the case and the alleged infring- ing technical information are substantially the same, the first thing to consider is the degree of similarity and differ- ence between the two. To do so, the relevant technical features of the alleged infringing technical information should be compared with the technical features of the technical secrets. This can also be used to determine whether the defendant can easily understand the overall technical plan from when the alleged infringement occurred, as well as the difference between the technical features of the alleged infringing technical information and the features of the technical secrets, including use, purpose, and effects. Easily understand in this case should correspond with the’easy access’ in the judgment of the ’public unknown’. As mentioned above, the difficulty of ’easy access’ should be lower than the degree of creativity in the sense of a patent. The technical features of the claimed technical se- crets that are different from the closest prior art should be limited to the content of ’direct replacement of conven- tional means in the technical field’ in the patent examination procedure. Correspondingly, if the different technical characteristics between the alleged infringing technical information and the involved technical secret belong to the’direct replacement of the conventional means in the technical field’, then the different technical characteristics can be considered to be ’easily understood’.

    When comparing the alleged infringing technical information with the technical secrets involved, all the techni- cal features recorded in the technical secrets claimed by the right holder should be compared with the alleged in- fringing technical information. If the alleged infringing technical information contains all the technical features that are the same or substantially the same as all the technical features recorded in the secret point of the involved tech- nical secret, it should be determined that the involved technical secret is identical to the alleged infringing techni- cal information. When one or more technical features recorded in the lack of technical secrets are not substantially the same, it shall be determined that the technical secret involved in the case is not identical to the alleged infring- ing technical information.

    Information related to technical secrets in the public domain can correspond to the defence of prior art in pat- ent infringement litigation. However, this should not include cases where technical secrets are the same as relevant information in the public domain, because the non-publicity judgment and identity judgment of technical secrets are carried out in the same litigation procedure. If the ’technical secret’ is the same as the relevant technical infor- mation in the public domain, then it is not confidential, the technical information claimed by the right holder is not a technical secret, and there is no need to make a similarity judicial identification. Therefore, when there is indeed a difference between the technical secret and the alleged infringing technical information, and if the technical se- cret of the right holder is more similar to the technical information than the relevant technical information and the alleged infringing technical information in the public domain, then it should be determined that the technical secret and the alleged infringing technical information are substantially different, and vice versa, they are substantially the same.

    5 Implementation Path of Technical Secret Confirmation

    Determining the specific content of the claimed technical secrets can be differentiated according to the meth- ods used by the defendant to sue the right holder for infringement. According to Article 9 of the Anti-Unfair Com- petition Law implemented in 2018, the defendant’s infringement of technical secrets can be divided into two behav- iour categories: obtaining and disclosing technical information; and using technical information. Generally, the pro- cess of acquiring and disclosing technical secrets may change the carrier of technical secrets, such as copying draw- ings and electronic files by taking photos or videos. But this process will not lead to substantial changes in the form of technical secrets and solutions. The ultimate purpose of the defendant’s infringement of technical secrets is to use them to obtain commercial benefits. During use, the carrier and manifestation of technical secrets will be changed, and the technical solutions embodied in the technical secrets may also change. According to whether the form of expression of the technical secret has changed, the requirements for the expression of the specific content of the technical secret are also different.

    Carriers of technical secrets include paper documents that record technical information such as product design drawings, technological processes, formulas, experimental reports, instructions, and research and development re- cords, as well as digital storage media, such as USB disks, CDs, personal computers, and network systems. Since the process of obtaining and disclosing technical secrets will not lead to changes in the form of expression of techni- cal secrets, the judgment can use the words, symbols or data information directly recorded by the carrier, or even all the technical content recorded by the carrier, as the secret point. For example, in a civil ruling of the Supreme People’s Court, the court held that: the technical secrets claimed by Tengxuan Company are the five sets of draw- ings in this case, namely ci601, ci602, cim602, cem015-u120, and cem015, including dimensional tolerances, geo- metric tolerances, welding symbols, surface roughness, material heat treatment technical requirements and other pro- cesses. Technical information and technology portfolio including parameters […] [and the court] recognized that the five sets of drawings of Baoxuan Company and Tengxuan Company’s five sets of drawings in this case were substan- tially the same as the technical information and their combinations recorded in the second-instance judgment […] Baoxuan Company, Ma Lianzhong, and Sun Zhiwei recognized that all the rotary joint products put into production were designed in accordance with the five sets of drawings accused of infringement in this case, Ma Lianzhong stat- ed during the investigation by the Wujin Administration for Industry and Commerce that Baoxuan Company had produced 8 sets using the bcid601-b001 drawings, using bcim502 drawings to produce 78 units.

    Therefore, the court determined the amount of compensation based on the number of products produced by the defendant.

    However, there can be many disadvantages in using the technical information obtained, such as dimensional and geometric tolerances, surface roughness, material heat treatment, technical requirements and other process pa- rameters, recorded by the carrier as technical secrets, especially when the defendant is suspected of using technical secrets. This is because: (1) there is a lot of technical information recorded in the carrier (such as drawings), which includes a variety of technical combinations or technical solutions, and different people have different understand- ings of these technical solutions; (2) some of the information recorded on the drawings may contain publicly known information—if the defendant provides evidence to prove that certain technical information belongs to existing tech- nology, it is difficult to determine the non-publicity of the technical solution involved; (3) when judging the similari- ty, if the defendant’s technical information has both the same and different parts compared to the technical informa- tion recorded in the right holder’s drawings, it is difficult to determine whether the two are identical; (4) the carrier obtained by the defendant by improper means may be a duplication or copy of the carrier of the right holder, and it is easy to judge that the technical information recorded in the two is the same—but this can only explain the defen- dant’s improper means of obtaining and disclosing technical secrets; if the infringement occurs where the defendant denies that the product is manufactured completely based on the technical information of the drawing, it is difficult to determine whether the technical affordances of the defendant’s product and the corresponding parts recorded in the drawing are the same or substantially the same; (5) if all the technical information of the carrier is listed as technical secrets, the number of technical secrets will be unreasonably increased, and the full review will inevitably result in a substantial increase in the workload of identification, thereby affecting the efficiency of the trial.

    Therefore, when determining whether the defendant has used the technical information claimed by the right holder, the latter should summarize the technical solution that can solve the corresponding technical problem based on the technical information recorded in the carrier. The Supreme People’s Court of China pointed out that "techni- cal achievements refer to technical solutions involving products, processes, materials and improvements made using scientific and technological knowledge, information and experience, including patents, patent applications, technical secrets, computer software, and integrated circuits, layout design, new plant varieties, etc." This regulation links technical solutions with patents and technical secrets: technical solutions as a technological achievement can be used to describe technical secrets. The Supreme People’s Court also pointed out that "on the basis of business se- cret information that meets legal requirements, the scope of protection of business secrets is accurately defined, and each individual business secret information unit constitutes independent protection". We can understand ’each indi- vidual trade secret information unit’ as the above technical solution. In the Patent Examination Guidelines, a techni- cal solution is defined as "a collection of technical means that use natural laws to solve the technical problem, and the technical means are usually embodied by technical features". Generally, technical information belonging to the category of technical secrets can be expressed in the form of technical features in one or more technical solutions that can solve technical problems and feature certain functions, such as technology-related structure, raw materials, components, formulas, materials, samples, styles, plant new species propagation materials, processes, methods or their steps, algorithms, data, computer programmes and related documents and other information.

    The secret point of technical secrets should be based on the content recorded by the carrier as evidence, but not limited to the content recorded by the carrier. Moreover, the technical information recorded by the carrier can- not all be included in the scope of technical secrets. The scope of protection of the secret point should cover the technical information recorded in the carrier, its equivalent modifications and technical deformations, and the same technical modifications based on the technical information recorded in the carrier obtained to avoid infringement made by the defendant through improper means. Based on the technical information recorded in the carrier, com- bined with the technical ideas formed during the technological research and development process, the upper-level technical solutions can be summarized.

    We recommend that the secret points of the technical secrets be summarized in the form of drafting the claims in the patent application. In the relevant laws and regulations related to patents, whether how to write the claims is clear and complete; how to determine the scope of protection of the claims; how to determine that the claims are novel and inventive relative to the prior art; how to determine whether the accused technical solution is infringing based on the authorized claims. All the above points have detailed and clear regulations. In many years of practice at home and abroad, a complete, detailed and enforceable set of rules about the above points has been generally ac- cepted by the industry. Constructing one or more secret points with a clear level of protection in the form of the technical solution defined by the claims in the patent application is conducive to fixing the scope of the technical secret claimed by the right holder. It also enables right holders and defendants suspected of infringing on technical secrets to have a common understanding of the scope of technical secrets, and at the same time facilitates the con- duct of judgments. In terms of ’public unknown’ confirmation, the right holder and the defendant search and collect evidence in relation to the technical information that they understand together and explain whether the disputed technical information is unknown to the public from both positive and negative aspects. In the similarity confirma- tion stage, the defendant’s technical information is compared with the technical information contained in the secret points that have been confirmed as technical secrets to confirm whether the two are the same or substantially the same.

    In the process of determining the secret point, the scope of the secret point can neither be expanded without limitation, so that the technical information limited by the secret point cannot be distinguished from the existing technology, nor can it deliberately narrow the scope of protection of technical secrets, so that the scope of protec-tion of secret points in the subsequent ’similarity’ judgment procedure cannot cover the defendant’s accused techni- cal solution. At the same time, as a technical solution, the content of the secret point should be sufficient, com- plete, detailed and clear to the extent that ordinary people in the field can understand it. Only in this way can the subject of the case be clarified, and the subsequent ’public unknown’ appraisal and ’similarity’ appraisal can pro- ceed smoothly. Mere principles and technical effects, abstract technical concepts or uncertain technical information cannot become technical secrets. The structure, process parameters, composition, and content that cannot exist inde- pendently in the form of a product or method and cannot achieve a certain function alone are also not suitable to be determined as secret points.

    For example, for the technical information involving tangible products, samples and styles such as drawings, photos, and videos, we can sum up the overall structure, mutual position, connection, control, and driving relation- ship that constitutes the technical secret part hierarchically, as the upper-level technical solution, and then de- scribe in turn the shape, structure, and local size of a certain component. For the technical information related to the raw materials, components, formulas, materials, and propagation materials of new plant varieties such as text materials, instructions, videos, and test records, we can summarize the components that constitute the technical se- crets hierarchically as the upper-level technical plan, and then describe the content of each component and the technical plan of the production process in turn. For flowcharts, training materials, operating video materials, text materials recording related processes, methods or steps, we can sum up the operational steps that constitute the technical secrets as the upper-level technical solution in a hierarchical manner, and then describe a further limited operation step and process indicators as the middle and lower-level technical solutions. For technical information involving algorithms, data, and computer programmes, we can summarize the functional modules that constitute the technical secrets as the upper-level technical solution in a hierarchical manner, and further describe the sub-mod- ules, programming languages, programmes, and program codes of a certain functional module that are further de- fined as the middle and lower technical solutions, up to the source code level of the technical execution information module.

    6 Conclusion

    From 2013 to 2017, 338 unfair competition cases involving trade secrets were resolved by courts nationwide in China, and about 22% of the cases involved technical secrets. At present, there is no universally accepted standard for forensic expertise involving technical secrets in the industry. We believe that the judicial appraisal of technical secrets is a kind of judgment behaviour, not search or retrieval behaviour, and the current appraisal of technical se- crets lacks standardization. Therefore, in order to determine whether the technical information involved in a case is the same or substantially the same as the technical information contained in the ’secret point’, we should first speci- fy the secret point of the technical secret and summarize it by imitating the writing form of the claims in the patent application. At the same time, as a technical solution, the content of the secret point should be sufficient, complete, detailed and clear, to the extent that the ordinary personnel of the profession or industry can understand it, to clari- fy the object of the case, and so that the subsequent ’public unknown’ judicial identification and similarity judicial identification can be carried out smoothly.

    References:

    [1] LONG J T. Research on the rules of proof in trade secret infringement litigation[J]. Xuehai, 2021(4):192-198.

    [2] XIE D C. Legal regulation of secret-related employee flow[J]. Law Science, 2021(8): 177-191.

    [3] LI W Z. Analysis of enterprise trade secret risk and system construction[J]. Business Economics Research, 2021(15): 129-131.

    [4]WANG D S. On the legislative expansion and restriction interpretation of the crime of infringing on commercial se- crets[J]. Intellectual Property, 2021(9): 41-55.

    技術(shù)秘密司法鑒定相關(guān)問題的探討

    孫紀(jì)泉1,黃德海2

    (1.中科專利商標(biāo)代理有限責(zé)任公司,北京100000;2.北京清亦華知識(shí)產(chǎn)權(quán)代理事務(wù)所,北京100000)

    摘要:隨著科技研發(fā)水平的不斷提高和同行業(yè)間的市場(chǎng)競(jìng)爭(zhēng)加劇,有關(guān)商業(yè)秘密的法律糾紛也越來越多受到關(guān)注。在涉及技術(shù)秘密的訴訟案件中,企業(yè)往往委托鑒定機(jī)構(gòu)針對(duì)涉案的專門性技術(shù)問題進(jìn)行鑒定和分析。文章討論了在涉及技術(shù)秘密的司法鑒定過程中,如何確定被主張的技術(shù)秘密的“秘點(diǎn)”、判斷技術(shù)信息是否不為公眾所知悉,以及判斷被訴侵權(quán)的技術(shù)信息是否與“秘點(diǎn)”包含的技術(shù)信息實(shí)質(zhì)上相同,試圖為涉及技術(shù)秘密的司法鑒定工作探索一條可行性的鑒定途徑。

    關(guān)鍵詞:商業(yè)秘密;技術(shù)秘密;司法鑒定

    猜你喜歡
    技術(shù)秘密商業(yè)秘密司法鑒定
    泄露商業(yè)秘密 依法支付賠償
    軍工企業(yè)“5+1+X”技術(shù)秘密保護(hù)管理模式的研究
    淺析中醫(yī)藥技術(shù)秘密的移轉(zhuǎn)*
    非法使用他人技術(shù)秘密完成發(fā)明創(chuàng)造的權(quán)利歸屬問題研究
    美國《保護(hù)商業(yè)秘密法》的立法評(píng)價(jià)
    肌電圖在司法鑒定中的應(yīng)用(續(xù))
    肌電圖在司法鑒定中的應(yīng)用(續(xù))
    肌電圖在司法鑒定中的應(yīng)用(續(xù))
    肌電圖在司法鑒定中的應(yīng)用(續(xù))
    侵犯商業(yè)秘密罪中“重大損失”的內(nèi)外審查方法
    免费大片黄手机在线观看| 伊人久久国产一区二区| 激情五月婷婷亚洲| 在线天堂最新版资源| 免费观看性生交大片5| 在线天堂最新版资源| 伊人久久精品亚洲午夜| 黄色欧美视频在线观看| 嫩草影院新地址| 自拍欧美九色日韩亚洲蝌蚪91 | 亚洲av电影在线观看一区二区三区| 欧美亚洲 丝袜 人妻 在线| 蜜臀久久99精品久久宅男| 男的添女的下面高潮视频| av网站免费在线观看视频| 天堂中文最新版在线下载| 99精国产麻豆久久婷婷| 久久久久久久亚洲中文字幕| 久久久久久人妻| 国产69精品久久久久777片| 欧美xxxx性猛交bbbb| 99九九在线精品视频 | 亚洲精品456在线播放app| 国产精品国产三级国产专区5o| 国产成人aa在线观看| 人妻系列 视频| 人妻少妇偷人精品九色| 精品人妻熟女av久视频| 中文乱码字字幕精品一区二区三区| 高清不卡的av网站| 国产综合精华液| 黑人猛操日本美女一级片| 菩萨蛮人人尽说江南好唐韦庄| 91午夜精品亚洲一区二区三区| 你懂的网址亚洲精品在线观看| 亚洲成人一二三区av| 国产乱来视频区| 国产老妇伦熟女老妇高清| 亚洲,一卡二卡三卡| 狂野欧美激情性xxxx在线观看| 26uuu在线亚洲综合色| 精品人妻偷拍中文字幕| 国产有黄有色有爽视频| 成年人免费黄色播放视频 | av天堂久久9| 九色成人免费人妻av| 亚洲色图综合在线观看| 欧美日韩一区二区视频在线观看视频在线| 99热这里只有精品一区| 99热6这里只有精品| 免费在线观看成人毛片| 久久精品夜色国产| 亚洲四区av| 国产精品熟女久久久久浪| 国产精品久久久久成人av| 大片免费播放器 马上看| 午夜福利影视在线免费观看| 综合色丁香网| 2018国产大陆天天弄谢| 国产成人精品婷婷| 久久久久视频综合| 精品久久久久久久久亚洲| 永久网站在线| 亚洲av日韩在线播放| 99视频精品全部免费 在线| 久久这里有精品视频免费| 午夜影院在线不卡| videos熟女内射| 日本91视频免费播放| 青春草视频在线免费观看| 两个人免费观看高清视频 | 久久99蜜桃精品久久| 免费高清在线观看视频在线观看| 免费黄网站久久成人精品| av一本久久久久| 国产高清国产精品国产三级| 观看美女的网站| 美女xxoo啪啪120秒动态图| 日韩av免费高清视频| 黑人猛操日本美女一级片| 日韩av免费高清视频| 国产av国产精品国产| 国产亚洲91精品色在线| 菩萨蛮人人尽说江南好唐韦庄| 日韩精品有码人妻一区| 日韩伦理黄色片| 成人黄色视频免费在线看| 如日韩欧美国产精品一区二区三区 | 97在线人人人人妻| 国产高清三级在线| 在线观看人妻少妇| 伊人久久国产一区二区| 亚洲国产精品国产精品| 精品人妻一区二区三区麻豆| 丝瓜视频免费看黄片| 一级黄片播放器| 国产中年淑女户外野战色| 国产日韩欧美视频二区| 我要看黄色一级片免费的| 亚洲国产最新在线播放| 国产成人免费无遮挡视频| 国产精品久久久久久av不卡| 成人国产麻豆网| 日韩精品有码人妻一区| 99热网站在线观看| 亚洲美女视频黄频| 亚洲国产欧美在线一区| 国产高清国产精品国产三级| 美女福利国产在线| 亚洲人与动物交配视频| 赤兔流量卡办理| 亚洲精品日韩在线中文字幕| 美女内射精品一级片tv| 各种免费的搞黄视频| 国产又色又爽无遮挡免| 另类亚洲欧美激情| 夜夜爽夜夜爽视频| 蜜桃久久精品国产亚洲av| a 毛片基地| 免费观看性生交大片5| 国产精品人妻久久久影院| 女人精品久久久久毛片| 久久久久视频综合| 亚洲国产欧美在线一区| 人人妻人人澡人人看| 日本与韩国留学比较| 最新中文字幕久久久久| 国产男人的电影天堂91| 国产一区二区在线观看日韩| 日韩制服骚丝袜av| 亚洲av福利一区| 中文在线观看免费www的网站| 在线免费观看不下载黄p国产| 在现免费观看毛片| 日韩免费高清中文字幕av| 亚洲国产最新在线播放| 麻豆精品久久久久久蜜桃| 国产精品一区www在线观看| 久久精品国产亚洲网站| 日本与韩国留学比较| 五月天丁香电影| 噜噜噜噜噜久久久久久91| 国产亚洲91精品色在线| 亚洲天堂av无毛| 国产黄色免费在线视频| 成人毛片a级毛片在线播放| av有码第一页| 亚洲国产精品999| av在线老鸭窝| 亚洲人成网站在线播| 国产亚洲精品久久久com| 日韩强制内射视频| 国产 一区精品| 一级毛片黄色毛片免费观看视频| 久久这里有精品视频免费| 国产精品久久久久久久久免| 春色校园在线视频观看| 免费观看无遮挡的男女| 一本色道久久久久久精品综合| 成人国产av品久久久| 人体艺术视频欧美日本| 涩涩av久久男人的天堂| 精品亚洲成a人片在线观看| 99热这里只有精品一区| 成人漫画全彩无遮挡| 成人国产av品久久久| 激情五月婷婷亚洲| 精品一区在线观看国产| 国产精品欧美亚洲77777| 99久久中文字幕三级久久日本| 又大又黄又爽视频免费| 九九久久精品国产亚洲av麻豆| 精品久久久久久久久亚洲| 欧美日韩精品成人综合77777| 街头女战士在线观看网站| a级毛片在线看网站| 久久免费观看电影| av免费观看日本| 69精品国产乱码久久久| 日本wwww免费看| 又粗又硬又长又爽又黄的视频| 久久6这里有精品| 老司机影院成人| 国产69精品久久久久777片| 亚洲美女搞黄在线观看| 久久婷婷青草| 日韩,欧美,国产一区二区三区| 熟女电影av网| 亚洲精品久久久久久婷婷小说| av播播在线观看一区| 亚州av有码| 最近中文字幕高清免费大全6| 亚洲四区av| 国产精品伦人一区二区| videos熟女内射| 少妇的逼水好多| h日本视频在线播放| 天天操日日干夜夜撸| 亚洲av中文av极速乱| 国产一区二区在线观看日韩| 亚洲伊人久久精品综合| 亚州av有码| av国产精品久久久久影院| 最近手机中文字幕大全| 国产亚洲一区二区精品| 精品亚洲成a人片在线观看| 亚洲欧美成人精品一区二区| 久久国产精品大桥未久av | 美女内射精品一级片tv| 在现免费观看毛片| 另类精品久久| tube8黄色片| 97超碰精品成人国产| 亚洲成人av在线免费| 午夜福利网站1000一区二区三区| 男人舔奶头视频| 日本vs欧美在线观看视频 | 香蕉精品网在线| 十八禁网站网址无遮挡 | 日韩一区二区视频免费看| h日本视频在线播放| 在线观看免费日韩欧美大片 | 黑人猛操日本美女一级片| 能在线免费看毛片的网站| 欧美丝袜亚洲另类| 国产在线男女| 欧美xxⅹ黑人| 日韩不卡一区二区三区视频在线| 亚洲精品久久午夜乱码| 最近2019中文字幕mv第一页| 老女人水多毛片| 成人亚洲精品一区在线观看| 日日啪夜夜撸| 亚洲av福利一区| 亚洲欧美清纯卡通| 国产深夜福利视频在线观看| 三级经典国产精品| 国产一区二区在线观看av| 热re99久久国产66热| 国产爽快片一区二区三区| 成人综合一区亚洲| 国产探花极品一区二区| 一级,二级,三级黄色视频| 亚洲国产av新网站| 日本av手机在线免费观看| 欧美成人精品欧美一级黄| 美女脱内裤让男人舔精品视频| 免费不卡的大黄色大毛片视频在线观看| 亚洲婷婷狠狠爱综合网| 热re99久久精品国产66热6| 97超碰精品成人国产| 日本与韩国留学比较| 国产综合精华液| 国产精品久久久久久久久免| 赤兔流量卡办理| 欧美日韩综合久久久久久| 国产极品天堂在线| 国产一区二区在线观看av| 国产精品久久久久久av不卡| 蜜桃久久精品国产亚洲av| 国产精品一区二区在线观看99| 国产黄频视频在线观看| 精品久久久久久久久av| 一级毛片我不卡| 狠狠精品人妻久久久久久综合| 国产伦在线观看视频一区| 只有这里有精品99| 亚洲情色 制服丝袜| 少妇熟女欧美另类| 亚洲人成网站在线观看播放| 国产黄色免费在线视频| 青青草视频在线视频观看| 嘟嘟电影网在线观看| 国产av码专区亚洲av| 亚洲情色 制服丝袜| 日韩视频在线欧美| 亚洲一级一片aⅴ在线观看| 晚上一个人看的免费电影| 交换朋友夫妻互换小说| 日韩免费高清中文字幕av| 高清视频免费观看一区二区| 欧美另类一区| 在线观看一区二区三区激情| 日本wwww免费看| 亚洲精品成人av观看孕妇| 99国产精品免费福利视频| 男人舔奶头视频| 国产欧美另类精品又又久久亚洲欧美| 天堂8中文在线网| 男人狂女人下面高潮的视频| 精品少妇黑人巨大在线播放| 午夜av观看不卡| 一区二区三区免费毛片| 欧美激情国产日韩精品一区| 中国国产av一级| 一级爰片在线观看| 18禁裸乳无遮挡动漫免费视频| 欧美成人精品欧美一级黄| 亚洲激情五月婷婷啪啪| 国产片特级美女逼逼视频| 国产黄片美女视频| 91精品国产国语对白视频| 国产成人午夜福利电影在线观看| 多毛熟女@视频| 丝袜喷水一区| 美女国产视频在线观看| 亚洲精品乱码久久久v下载方式| 日韩人妻高清精品专区| 国产片特级美女逼逼视频| 大陆偷拍与自拍| 人人妻人人添人人爽欧美一区卜| 国产毛片在线视频| 丰满迷人的少妇在线观看| 日韩电影二区| 国产欧美另类精品又又久久亚洲欧美| 日本91视频免费播放| 久久精品国产自在天天线| 国产视频内射| 男人舔奶头视频| 精品一区二区三区视频在线| 寂寞人妻少妇视频99o| 国模一区二区三区四区视频| av天堂中文字幕网| 好男人视频免费观看在线| 精品人妻熟女毛片av久久网站| 国产亚洲午夜精品一区二区久久| 精品视频人人做人人爽| 高清av免费在线| 中文字幕人妻熟人妻熟丝袜美| 日本午夜av视频| 久久99热6这里只有精品| 伊人亚洲综合成人网| 99久国产av精品国产电影| 精品国产一区二区三区久久久樱花| 久久 成人 亚洲| 国产成人一区二区在线| 美女国产视频在线观看| 狂野欧美白嫩少妇大欣赏| 99九九在线精品视频 | 蜜桃久久精品国产亚洲av| 欧美xxⅹ黑人| 亚洲国产精品999| 在线观看免费日韩欧美大片 | 免费观看的影片在线观看| 18禁动态无遮挡网站| 欧美日韩综合久久久久久| 欧美少妇被猛烈插入视频| 亚洲成人一二三区av| .国产精品久久| 国产国拍精品亚洲av在线观看| 韩国高清视频一区二区三区| 免费av不卡在线播放| 大片电影免费在线观看免费| 欧美3d第一页| 色网站视频免费| 五月玫瑰六月丁香| 久久精品国产亚洲网站| 人体艺术视频欧美日本| 一级二级三级毛片免费看| 新久久久久国产一级毛片| 久久久午夜欧美精品| 大片免费播放器 马上看| 欧美变态另类bdsm刘玥| 午夜福利网站1000一区二区三区| 久久久久久久久大av| 丰满饥渴人妻一区二区三| 成人亚洲欧美一区二区av| 青春草亚洲视频在线观看| 久久久久久久亚洲中文字幕| 中文欧美无线码| 亚洲av免费高清在线观看| 亚洲欧美日韩东京热| 国产精品欧美亚洲77777| 久热久热在线精品观看| 成年美女黄网站色视频大全免费 | 午夜福利视频精品| 久久毛片免费看一区二区三区| 又大又黄又爽视频免费| 少妇熟女欧美另类| av天堂中文字幕网| 亚洲av电影在线观看一区二区三区| 99久久人妻综合| 国产永久视频网站| 91久久精品国产一区二区成人| 国产淫语在线视频| 一区在线观看完整版| 国产精品一区www在线观看| 久久女婷五月综合色啪小说| 男女国产视频网站| 国产亚洲av片在线观看秒播厂| 国产精品成人在线| 五月天丁香电影| 成人亚洲精品一区在线观看| av一本久久久久| 在线观看人妻少妇| 免费人妻精品一区二区三区视频| 日韩三级伦理在线观看| 黄色怎么调成土黄色| 久久国产精品男人的天堂亚洲 | 免费人成在线观看视频色| 精华霜和精华液先用哪个| 国产片特级美女逼逼视频| 国产精品99久久久久久久久| 久久久久视频综合| 国产欧美日韩一区二区三区在线 | 国产欧美日韩综合在线一区二区 | 色吧在线观看| 91精品国产九色| 中文天堂在线官网| 久久午夜福利片| 欧美高清成人免费视频www| a级毛片在线看网站| 啦啦啦中文免费视频观看日本| 少妇的逼水好多| √禁漫天堂资源中文www| 大又大粗又爽又黄少妇毛片口| 国产一区二区在线观看av| 三级国产精品片| 国产永久视频网站| 色视频www国产| 久久久亚洲精品成人影院| av卡一久久| 亚洲国产日韩一区二区| 王馨瑶露胸无遮挡在线观看| 你懂的网址亚洲精品在线观看| 一本一本综合久久| 亚洲精品视频女| 国产精品国产三级国产专区5o| 国产精品福利在线免费观看| 狠狠精品人妻久久久久久综合| 亚洲国产av新网站| 精品久久久噜噜| 国产亚洲欧美精品永久| 少妇的逼水好多| 久久综合国产亚洲精品| 五月开心婷婷网| 国模一区二区三区四区视频| 久久99一区二区三区| 简卡轻食公司| 亚洲真实伦在线观看| 久热久热在线精品观看| 菩萨蛮人人尽说江南好唐韦庄| 少妇精品久久久久久久| 一级毛片电影观看| 免费看光身美女| 嫩草影院入口| 高清午夜精品一区二区三区| 成年人午夜在线观看视频| av网站免费在线观看视频| 99热全是精品| 26uuu在线亚洲综合色| 蜜桃久久精品国产亚洲av| 我的女老师完整版在线观看| 中文字幕久久专区| 91久久精品国产一区二区三区| 久久亚洲国产成人精品v| 91在线精品国自产拍蜜月| 看免费成人av毛片| 91精品国产国语对白视频| 全区人妻精品视频| 亚洲欧美清纯卡通| 亚洲精品亚洲一区二区| 女的被弄到高潮叫床怎么办| 精品久久久久久电影网| 久久精品熟女亚洲av麻豆精品| 一级二级三级毛片免费看| 赤兔流量卡办理| 青青草视频在线视频观看| 国产黄片美女视频| 国产片特级美女逼逼视频| 汤姆久久久久久久影院中文字幕| 国产乱来视频区| 街头女战士在线观看网站| 自线自在国产av| 最近最新中文字幕免费大全7| 男人添女人高潮全过程视频| 搡老乐熟女国产| 岛国毛片在线播放| 亚洲av免费高清在线观看| 亚洲精品日韩在线中文字幕| 丝袜在线中文字幕| av国产精品久久久久影院| 99国产精品免费福利视频| 亚洲婷婷狠狠爱综合网| 成人毛片a级毛片在线播放| 欧美丝袜亚洲另类| 99热网站在线观看| 国产在线男女| 啦啦啦视频在线资源免费观看| 中文字幕人妻丝袜制服| 韩国av在线不卡| 又大又黄又爽视频免费| 精品一区二区三卡| 欧美日韩视频高清一区二区三区二| 国产成人精品福利久久| 日本欧美国产在线视频| 日韩av在线免费看完整版不卡| 欧美 日韩 精品 国产| 亚洲综合色惰| 99久久精品一区二区三区| 精品少妇久久久久久888优播| 最近中文字幕2019免费版| 简卡轻食公司| 美女主播在线视频| 国产在线一区二区三区精| 国产男女内射视频| 日韩,欧美,国产一区二区三区| 国产在视频线精品| 国产黄色免费在线视频| 久久精品国产亚洲av天美| 亚洲自偷自拍三级| 人妻一区二区av| 99九九在线精品视频 | 亚洲国产欧美日韩在线播放 | 午夜视频国产福利| 啦啦啦中文免费视频观看日本| 肉色欧美久久久久久久蜜桃| 麻豆精品久久久久久蜜桃| 日韩制服骚丝袜av| 精品久久久噜噜| 欧美国产精品一级二级三级 | 国产精品熟女久久久久浪| 自拍偷自拍亚洲精品老妇| 97在线人人人人妻| 欧美少妇被猛烈插入视频| av有码第一页| 黄色视频在线播放观看不卡| 日韩中字成人| 九九爱精品视频在线观看| 国产精品免费大片| 看免费成人av毛片| 成年人午夜在线观看视频| av免费观看日本| 亚洲第一av免费看| 嫩草影院新地址| 国产成人精品久久久久久| 青春草国产在线视频| 色婷婷av一区二区三区视频| 97超碰精品成人国产| videossex国产| 午夜日本视频在线| 亚洲美女搞黄在线观看| a级毛片免费高清观看在线播放| 久久鲁丝午夜福利片| 国语对白做爰xxxⅹ性视频网站| 汤姆久久久久久久影院中文字幕| 极品少妇高潮喷水抽搐| 午夜激情久久久久久久| 不卡视频在线观看欧美| 亚洲精品日本国产第一区| 精华霜和精华液先用哪个| 中文字幕久久专区| 日日摸夜夜添夜夜爱| 男的添女的下面高潮视频| 香蕉精品网在线| 大片电影免费在线观看免费| 国产成人精品福利久久| 水蜜桃什么品种好| 日本wwww免费看| 免费看不卡的av| 午夜老司机福利剧场| 午夜日本视频在线| videos熟女内射| 亚洲情色 制服丝袜| 国产精品.久久久| 黄色毛片三级朝国网站 | 久久午夜福利片| 国产欧美亚洲国产| 日日摸夜夜添夜夜爱| 三级经典国产精品| 91久久精品国产一区二区成人| 久久女婷五月综合色啪小说| 99久久综合免费| 一级毛片黄色毛片免费观看视频| 99久国产av精品国产电影| av网站免费在线观看视频| 免费在线观看成人毛片| 只有这里有精品99| 中文字幕亚洲精品专区| 日日撸夜夜添| 黄色欧美视频在线观看| 激情五月婷婷亚洲| 在线播放无遮挡| 91在线精品国自产拍蜜月| 波野结衣二区三区在线| 一区二区三区乱码不卡18| 日本免费在线观看一区| 久久久久网色| 久久免费观看电影| 妹子高潮喷水视频| 日韩不卡一区二区三区视频在线| 丁香六月天网| 国产男人的电影天堂91| 18+在线观看网站| 嫩草影院新地址| 成人亚洲欧美一区二区av| 日本欧美国产在线视频| 汤姆久久久久久久影院中文字幕| 久久久久久久国产电影| 国产视频首页在线观看| 国产av码专区亚洲av| 国产精品久久久久久久久免| 大片电影免费在线观看免费| 亚洲av二区三区四区| 人妻系列 视频| 精品午夜福利在线看| 女性生殖器流出的白浆| 麻豆乱淫一区二区| 中国三级夫妇交换| 国产欧美亚洲国产| 秋霞在线观看毛片| 大码成人一级视频| 色94色欧美一区二区| 久久精品久久久久久久性| 九色成人免费人妻av|