CN108961110B - Method and system for negotiating encryption management intellectual property based on block chain - Google Patents

Method and system for negotiating encryption management intellectual property based on block chain Download PDF

Info

Publication number
CN108961110B
CN108961110B CN201810681324.4A CN201810681324A CN108961110B CN 108961110 B CN108961110 B CN 108961110B CN 201810681324 A CN201810681324 A CN 201810681324A CN 108961110 B CN108961110 B CN 108961110B
Authority
CN
China
Prior art keywords
block
applicants
agent
intellectual property
check
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810681324.4A
Other languages
Chinese (zh)
Other versions
CN108961110A (en
Inventor
朱萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Chengfa Information Technology Co ltd
Original Assignee
Shenzhen Chengfa Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Chengfa Information Technology Co ltd filed Critical Shenzhen Chengfa Information Technology Co ltd
Priority to CN201810681324.4A priority Critical patent/CN108961110B/en
Publication of CN108961110A publication Critical patent/CN108961110A/en
Application granted granted Critical
Publication of CN108961110B publication Critical patent/CN108961110B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Tourism & Hospitality (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

A method and a system for negotiating encryption management intellectual property based on a block chain comprise a database module, a storage unit in a storage device, an inquiry module and an input change module, wherein a plurality of applicants, agent partners and agents form N nodes, each application of the applicants is successfully submitted to form a record to form a new block, an bookkeeper is selected by a random number algorithm, and all the nodes are informed to update corresponding block chains; different nodes possess public or private keys for each block; the different applicants have different permissions for viewing different blocks, and the applicants can only view the associated blocks applied by the applicants; and when the related application state changes, only the bookkeeper has the state changing authority. The invention realizes a new mode of intellectual property field management, enhances privacy through different keys and password authorities, enhances intelligent processing degree through image processing of confidential details, and improves case management efficiency.

Description

Method and system for managing intellectual property based on block chain negotiation encryption
Technical Field
The invention relates to the technical field of block chains, data storage and information security, in particular to a method for managing intellectual property rights based on block chain negotiation encryption.
Background
With the development of internet technology, information decentralization has been popularized and is applied like a distributed system, the method can reduce transaction cost, increase the convenient and fast degree of transaction due to the fact that unnecessary third parties are not introduced, and the block chain provides possibility for achieving the method.
The block chain is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, a distributed accounting system which cannot be tampered and counterfeited is guaranteed in a cryptographic mode, all generated value exchange activities are recorded by the block chain, integrity of a database is guaranteed, and meanwhile information such as generated time nodes is recorded in a timestamp mode.
In the prior art, a verification mechanism and a consensus mechanism of a block chain cause that a lot of information has to be exposed outside in a plaintext form, so that a lot of privacy information is revealed, while a centralized transaction mechanism increases transaction cost, how to ensure privacy is not revealed and reduce transaction cost, and how to improve intellectualization becomes a research topic, and in the service industry field, especially the intellectual property field, the degree of change of related processes is relatively frequent, for example, when applying for a patent, a plurality of links such as preliminary examination, substantial examination and the like are required, a plurality of notice books are required, a related block needs to be frequently operated, how to protect the information, and reducing the error rate in the operation process becomes a relatively important research content.
Disclosure of Invention
In order to solve the technical problems, the invention provides a method and a system for managing intellectual property rights based on block chain negotiation encryption. The invention is realized in such a way that:
a method for managing intellectual property based on block chain negotiation encryption comprises a database module, a storage unit in a storage device, an inquiry module and an input change module, wherein the input change module is a mobile phone terminal or a computer, a plurality of applicants, agent partners and agents form N nodes, each application of the applicants is successfully submitted to form a record to form a new block, a bookkeeping person is selected through a random number algorithm, and all nodes are notified to update corresponding block chains; different nodes possess public keys or private keys for each block, and the blocks comprise time stamps, file numbers, contract numbers, right numbers, drawing numbers and intellectual property types; in order to enhance privacy, different applicants check different blocks with different authorities, the applicants who possess the private key of the block and possess the public key can check the block, and the applicants can only check the associated block applied by the applicants; the partner and the agent have the private key and the public key at the same time to check the blocks associated with the agent; and when the related application state changes, only the bookkeeper has the state change authority, and the change timestamp and the change record are added.
Preferably, the partner and the agent have the private key and the public key at the same time to view the block, further comprising that the partner and the agent view the authority to further distinguish, and the agent can only view the contract technology and the time requirement description part and cannot view the contract amount; when the agent checks, the image frequency domain transformation processing is carried out on the part with the same amount, and the processing steps are as follows: for the input image F, F is its Fourier transform, and the convolution filter H can be represented by the Fourier transform H; h may be called a unit impulse response filter, H is a frequency transfer function, H and H may both represent filters, and after convolution of image f with filter H, the fourier transform may be used in the frequency domain with the following equation: g (u, v) · F (u, v) · H (u, v) · operation — indicates that the matrices F and H are multiplied by elements, rather than by matrices, and the agent performs inverse fourier transform after viewing, and returns to the original image.
Preferably, the block further comprises application number, publication number, legal status, authorization text, classification number, opinion statement reply confirmation, review opinion notice confirmation.
Preferably, each successful application submission by said applicant constitutes a record including the verification step of: whether to adopt the record is determined by confirming the ID value of the applicant and the electronic signature information.
Preferably, the random number algorithm comprises: the feedback shift register generator has the formula as follows: alpha (alpha) ("alpha")k=(cpαk-p+cp-1αk-p+1+...c1αk-1) (mod2) where p is a given positive integer, ciE {0,1}, k is a variable.
Preferably, the intellectual property types include: copyright registration, invention, utility model, appearance design, integrated circuit copyright, trade mark.
The invention also comprises a system for negotiating encryption management intellectual property based on the block chain, which comprises a database module, a storage unit in a storage device, an inquiry module and an input change module, wherein the input change module is a mobile phone terminal or a computer, a plurality of applicants, agent partners and agents form N nodes, each application of the applicants is successfully submitted to form a record to form a new block, a bookkeeper is selected by a random number algorithm, and all nodes are informed to update corresponding block chains; different nodes possess public keys or private keys for each block, and the blocks comprise time stamps, file numbers, contract numbers, right numbers, drawing numbers and intellectual property types; in order to enhance privacy, different applicants check different blocks with different authorities, the applicants who possess the private key of the block and possess the public key can check the block, and the applicants can only check the associated block applied by the applicants; the partner and the agent have the private key and the public key at the same time to check the blocks associated with the agent; when the related application state changes, only the bookkeeper has the state change authority and adds a change timestamp and a change record, the partner and the agent have the private key and the public key at the same time to check the block, and the method further comprises the steps that the partner and the agent check authority is further distinguished, and the agent can only check the contract technology and the time requirement description part and cannot check the contract amount; when the agent checks, the image frequency domain transformation processing is carried out on the part with the same amount, and the processing steps are as follows: for the input image F, F is its Fourier transform, and the convolution filter H can be represented by the Fourier transform H; h may be called a unit impulse response filter, H is a frequency transfer function, H and H may both represent filters, and after convolution of image f with filter H, the fourier transform may be used in the frequency domain with the following equation: g (u, v) · F (u, v) · H (u, v) · operation — indicates that the matrices F and H are multiplied by elements, rather than by matrices, and the agent performs inverse fourier transform after viewing, and returns to the original image.
Preferably, a block module is included, said block further comprising an application number, publication number, legal status, authorization text, classification number, opinion statement reply confirmation, review opinion notice confirmation.
Preferably, a verification module is included, each successful application submission by said applicant constituting a record, comprising the verification steps of: determining whether to adopt the record by confirming the ID value of the applicant and the electronic signature information, wherein the random number algorithm comprises the following steps: the feedback shift register generator has the formula as follows: alpha is alphak=(cpαk-p+cp-1αk-p+1+...c1αk-1) (mod2) where p is a given positive integer, ciE {0,1}, k is a variable.
Preferably, a type module is included, the intellectual property types including: copyright registration, invention, utility model, appearance design, integrated circuit copyright, trade mark.
Compared with the prior art, the technical scheme of the invention has the following beneficial effects:
the problems that related privacy cannot be reasonably protected, transaction cost is high, and error rate is high in the traditional technology are solved, and related applications in the field of intellectual property management are few; therefore, the method and the system for managing intellectual property rights based on block chain negotiation encryption remarkably protect related privacy, reduce transaction cost, reduce error rate, greatly enhance accuracy and enhance user experience.
Drawings
Fig. 1 is a diagram of a system for managing intellectual property based on block chain negotiation encryption of the present invention;
fig. 2 is a block diagram of the present invention.
Detailed Description
As will be appreciated by those skilled in the art, as the background art shows, the conventional blockchain technology has the problems of unreasonable protection of related privacy, high transaction cost, high error rate, and poor user experience, and therefore, it is necessary to design an intellectual property management system and method capable of greatly enhancing the protection of privacy and improving the accuracy. In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Example 1:
fig. 1 shows a system diagram of managing intellectual property based on block chain negotiation encryption of the present application, wherein when an applicant applies for a patent, the application is first submitted, other nodes in the block chain can judge whether the application is true or false according to an applicant ID value or corporate information or other effective information, all nodes vote whether the application is true or false, if the application is supported by more than 60%, the application enters the block chain, in other embodiments, encryption and decryption calculation is directly performed through a hash algorithm or an AES algorithm, and a true or false value is obtained by performing internet matching on an applicant identity check and related modules, for example, related applicant information is searched in the internet through an ant crawling algorithm, and the internet is checked by itself without judging by other nodes. The intellectual property management system comprises a database module, a storage unit in a storage device, an inquiry module and an input change module, wherein the input change module is a mobile phone terminal or a computer; each node is connected through a world wide web, wherein a plurality of applicants, agent partners and agents form N nodes, each application of the applicants is successfully submitted to form a record to form a new block, a bookkeeper is selected through a random number algorithm, in some block chain technologies, the bookkeeper selects the node with the strongest computing power and rewards the node, and the mode has higher requirement on hardware equipment and informs all the nodes to update corresponding block chains; different nodes possess a public key or a private key for each block, and as shown in fig. 2, a related structure diagram is shown, wherein the blocks comprise timestamps, file numbers, contract numbers, rights numbers, drawing numbers and intellectual property types; in order to enhance privacy, different applicants check different blocks with different authorities, the applicants who possess the private key of the block and possess the public key can check the block, and the applicants can only check the associated block applied by the applicants; the partner and the agent have the private key and the public key at the same time to check the blocks associated with the agent; and when the related application state changes, only the bookkeeper has the state change authority, and the change timestamp and the change record are added.
Example 2:
in some embodiments, a node in a block chain possesses a key for viewing related information in a block, and viewing the content of the block through a public key and the key in combination, while in some practical patent applications, a part of a contract does not want a proxy to see, and the authority level of the partner is higher than that of the proxy, so that the part of the contract is added into the block chain authority setting through an image processing mode, and the problem of poor privacy is solved by changing a related display form through image transformation on related content; when the agent checks, the image frequency domain transformation processing is carried out on the part with the same amount, and the processing steps are as follows: for the input image F, F is its Fourier transform, and the convolution filter H can be represented by the Fourier transform H; h may be called a unit impulse response filter, H is a frequency transfer function, H and H may both represent filters, and after convolution of image f with filter H, the fourier transform may be used in the frequency domain with the following equation: g (u, v) · F (u, v) · H (u, v) · operation — indicates that the matrices F and H are multiplied by elements, rather than by matrices, and the agent performs inverse fourier transform after viewing, and returns to the original image.
In some embodiments, digital watermark encryption is performed on contents such as the same amount of money and the like in a watermark encryption manner, the basis is that images are processed and encrypted, the blocks further include application numbers, publication numbers, legal states, authorization texts, classification numbers, comment statement reply confirmation and examination comment notice confirmation, and in some blocks, blacklist information is further included, namely, records are performed on non-credited applicants or agent partners, and all nodes of the viewing authority of the block have keys.
In some embodiments, each successful application submission by the applicant constitutes a record, including the verification step: whether to adopt the record is determined by confirming the ID value of the applicant and the electronic signature information.
In some embodiments, the random number algorithm comprises: the feedback shift register generator has the formula as follows: alpha is alphak=(cpαk-p+cp-1αk-p+1+...c1αk-1) (mod2) where p is a given positive integer, ciE {0,1}, k is a variable, and a related random quantity is obtained through a remainder operation.
In some embodiments, the intellectual property types include: copyright registration, invention, utility model, design, integrated circuit copyright, trademark, but not limited to the above types.
Example 3:
the invention also comprises a system for managing intellectual property based on block chain negotiation encryption, which comprises a database module, a storage unit in a storage device, an inquiry module and an input change module, wherein the input change module is a mobile phone terminal or a computer, each node carrier is a computer or a mobile phone terminal, a block copy or other related information is stored, the input change module can be input in a keyboard or voice mode, the storage unit can be a computer hard disk or a mobile phone extensible memory card, a plurality of applicants, agent partners and agents form N nodes, each application of the applicants successfully forms a record to form a new block, a bookkeeper is selected by a random number algorithm, and all nodes are informed to update corresponding block chains; different nodes possess public keys or private keys for each block, and the blocks comprise time stamps, file numbers, contract numbers, right numbers, drawing numbers and intellectual property types; in order to enhance privacy, different applicants check different blocks with different authorities, the applicants who possess the private key of the block and possess the public key can check the block, and the applicants can only check the associated block applied by the applicants; the partner and the agent have the private key and the public key at the same time to check the blocks associated with the agent; when the related application state changes, only the bookkeeper has the state change authority and adds a change timestamp and a change record, the partner and the agent have the private key and the public key at the same time to check the block, and the method further comprises the steps that the partner and the agent check authority is further distinguished, and the agent can only check the contract technology and the time requirement description part and cannot check the contract amount; when the agent checks, the image frequency domain transformation processing is carried out on the part with the same amount, and the processing steps are as follows: for the input image F, F is its Fourier transform, and the convolution filter H can be represented by the Fourier transform H; h may be called a unit impulse response filter, H is a frequency transfer function, H and H may both represent filters, and after convolution of image f with filter H, the fourier transform may be used in the frequency domain with the following equation: g (u, v) · F (u, v) · H (u, v) · operation — indicates that the matrices F and H are multiplied by elements, rather than by matrices, and the agent performs inverse fourier transform after viewing, and returns to the original image.
As shown in the block structure diagram of fig. 2, the block further includes a hash coding module, and the block chain further includes location information, and in some embodiments, the block further includes an application number, a publication number, a legal status, an authorization text, a classification number, an opinion statement reply confirmation, and an examination opinion notice confirmation.
In some embodiments, a validation module is included, each successful application submission by the applicant comprising a record, including the validation steps of: determining whether to adopt the record by confirming the ID value of the applicant and the electronic signature information, wherein the random number algorithm comprises the following steps: the feedback shift register generator has the formula as follows: alpha is alphak=(cpαk-p+cp-1αk-p+1+...c1αk-1) (mod2) where p is a given positive integer, ciE {0,1}, k is a variable.
In some embodiments, a type module is included, the intellectual property types including: copyright registration, invention, utility model, appearance design, integrated circuit copyright, trade mark; different contract templates exist according to different types, so that the applicant and the partner can conveniently sign.
The method and the system for managing the intellectual property based on block chain negotiation encryption solve the problems that the related privacy cannot be reasonably protected, the transaction cost is high and the error rate is high in the traditional technology, and have less related application in the field of intellectual property management; therefore, the method and the system for managing intellectual property rights based on block chain negotiation encryption remarkably protect related privacy, reduce transaction cost, reduce error rate, greatly enhance accuracy and enhance user experience.
Those skilled in the art will appreciate that embodiments of the present application may be provided as a method, system, or computer program product and thus the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects.
Although the present invention is disclosed above, the invention is not limited thereto, and the invention is equally applicable to the management of other intellectual property scenarios, such as trade secrets. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (9)

1. A method for managing intellectual property based on block chain negotiation encryption is characterized by comprising a database module, a storage unit in a storage device, an inquiry module and an input change module, wherein the input change module is a mobile phone terminal or a computer, a plurality of applicants, agent partners and agents form N nodes, each application of the applicants is successfully submitted to form a record to form a new block, a bookkeeper is selected by a random number algorithm, and all nodes are notified to update corresponding block chains; different nodes possess public keys or private keys for each block, and the blocks comprise time stamps, file numbers, contract numbers, right numbers, drawing numbers and intellectual property types; in order to enhance privacy, different applicants check different blocks with different authorities, the applicants who possess the private key of the block and possess the public key can check the block, and the applicants can only check the associated block applied by the applicants; the partner and the agent have the private key and the public key at the same time to check the blocks associated with the agent; when the related application state changes, only the bookkeeper has the state changing authority, and a change timestamp and a change record are added;
the partner and the agent have a private key and a public key at the same time to check the block, and the checking authority of the partner and the agent is further distinguished, and the agent can only check contract technology and time requirement description parts and cannot check the contract amount; when the agent checks, the image frequency domain transformation processing is carried out on the part with the same amount, and the processing steps are as follows: for the input image F, F is its Fourier transform, and the convolution filter H can be represented by the Fourier transform H; h may be called a unit impulse response filter, H is a frequency transfer function, H and H may both represent filters, and after convolution of image f with filter H, the fourier transform may be used in the frequency domain with the following equation: and G (u, v) — F (u, v) · H (u, v), wherein the operation represents that the matrixes F and H are multiplied by elements instead of matrix multiplication, and the agent performs inverse Fourier transform after checking, and returns to the original image.
2. The method for intellectual property management based on block chain negotiation encryption according to claim 1, wherein the block further comprises an application number, a publication number, a legal status, an authorization text, a classification number, an opinion statement reply confirmation, an audit opinion notice confirmation.
3. The method for block chain negotiation based encryption management intellectual property rights of claim 1, wherein each successful application submission of said applicant constitutes a record comprising the steps of verifying: whether to adopt the record is determined by confirming the ID value of the applicant and the electronic signature information.
4. The method for block chain based negotiation encryption management intellectual property rights of claim 1, wherein the random number algorithm comprises: the feedback shift register generator has the formula as follows: alpha is alphak=(cpαk-p+cp-1αk-p+1+...c1αk-1) (mod2) where p is a given positive integer, ciE {0,1}, k is a variable.
5. The method for block chain based negotiation encryption management intellectual property rights of claim 1, wherein the intellectual property types comprise: copyright registration, invention, utility model, appearance design, integrated circuit copyright, trade mark.
6. A system for managing intellectual property based on block chain negotiation encryption is characterized by comprising a database module, a storage unit in a storage device, an inquiry module and an input change module, wherein the input change module is a mobile phone terminal or a computer, a plurality of applicants, agent partners and agents form N nodes, each application of the applicants is successfully submitted to form a record to form a new block, a bookkeeper is selected by a random number algorithm, and all nodes are notified to update corresponding block chains; different nodes possess public keys or private keys for each block, and the blocks comprise time stamps, file numbers, contract numbers, right numbers, drawing numbers and intellectual property types; in order to enhance privacy, different applicants check different blocks with different authorities, the applicants who possess the private key of the block and possess the public key can check the block, and the applicants can only check the associated block applied by the applicants; the partner and the agent have the private key and the public key at the same time to check the blocks associated with the agent; when the related application state changes, only the bookkeeper has the state change authority and adds a change timestamp and a change record, the partner and the agent have the private key and the public key at the same time to check the block, and the method further comprises the steps that the partner and the agent check authority is further distinguished, and the agent can only check the contract technology and the time requirement description part and cannot check the contract amount; when the agent checks, the image frequency domain transformation processing is carried out on the part with the same amount, and the processing steps are as follows: for the input image F, F is its Fourier transform, and the convolution filter H can be represented by the Fourier transform H; h may be called a unit impulse response filter, H is a frequency transfer function, H and H may both represent filters, and after convolution of image f with filter H, the fourier transform may be used in the frequency domain with the following equation: g (u, v) · F (u, v) · H (u, v) · operation — indicates that the matrices F and H are multiplied by elements, rather than by matrices, and the agent performs inverse fourier transform after viewing, and returns to the original image.
7. The system for intellectual property management based on blockchain negotiation encryption according to claim 6, comprising a block module, wherein the block module further comprises an application number, a publication number, a legal status, an authorization text, a classification number, an opinion statement reply confirmation, a review opinion notice confirmation.
8. A system for intellectual property management based on block chain negotiation encryption according to any one of claims 6-7 comprising a verification module, each successful application submission by said applicant constituting a record, comprising a verification step of: determining whether to adopt the record by confirming the ID value of the applicant and the electronic signature information, wherein the random number algorithm comprises the following steps: inverse directionThe feed shift register generator has the formula: alpha is alphak=(cpαk-p+cp-1αk-p+1+...c1αk-1) (mod2) where p is a given positive integer, ciE {0,1}, k is a variable.
9. The system for intellectual property management based on blockchain negotiation encryption according to claim 6, comprising a type module, wherein the intellectual property types comprise: copyright registration, invention, utility model, appearance design, integrated circuit copyright, trade mark.
CN201810681324.4A 2018-06-27 2018-06-27 Method and system for negotiating encryption management intellectual property based on block chain Active CN108961110B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810681324.4A CN108961110B (en) 2018-06-27 2018-06-27 Method and system for negotiating encryption management intellectual property based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810681324.4A CN108961110B (en) 2018-06-27 2018-06-27 Method and system for negotiating encryption management intellectual property based on block chain

Publications (2)

Publication Number Publication Date
CN108961110A CN108961110A (en) 2018-12-07
CN108961110B true CN108961110B (en) 2022-05-17

Family

ID=64487446

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810681324.4A Active CN108961110B (en) 2018-06-27 2018-06-27 Method and system for negotiating encryption management intellectual property based on block chain

Country Status (1)

Country Link
CN (1) CN108961110B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112860786A (en) * 2019-11-27 2021-05-28 阿里健康信息技术有限公司 Data processing method and device, computing node and storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9858569B2 (en) * 2014-03-21 2018-01-02 Ramanan Navaratnam Systems and methods in support of authentication of an item
US20170116693A1 (en) * 2015-10-27 2017-04-27 Verimatrix, Inc. Systems and Methods for Decentralizing Commerce and Rights Management for Digital Assets Using a Blockchain Rights Ledger
US20170344988A1 (en) * 2016-05-24 2017-11-30 Ubs Ag System and method for facilitating blockchain-based validation
CN106250721A (en) * 2016-07-28 2016-12-21 杭州云象网络技术有限公司 A kind of electronic copyright protection method based on block chain
CN106339639A (en) * 2016-08-30 2017-01-18 弗洛格(武汉)信息科技有限公司 Credit score management method and system based on block chain
GB2557577A (en) * 2016-10-21 2018-06-27 Cygnetise Ltd Methods and apparatus for recording a change of authorisation state of one or more authorisation agents
CN106790431B (en) * 2016-12-05 2020-11-27 同济大学 Cloud manufacturing service transaction information recording system and method based on block chain
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
CN107330694A (en) * 2017-07-03 2017-11-07 重庆小犀智能科技有限公司 Copyright trading system and method for commerce based on block chain

Also Published As

Publication number Publication date
CN108961110A (en) 2018-12-07

Similar Documents

Publication Publication Date Title
Schneier et al. Secure audit logs to support computer forensics
CN100399737C (en) Method of data protection
US7797541B2 (en) Method and apparatus for providing cellular telephone service using an authenticating cellular telephone device
Mandal et al. Symmetric key image encryption using chaotic Rossler system
CN112215608A (en) Data processing method and device
EP3984164A1 (en) Binding of decentralized identifiers to verified claims
MX2007014237A (en) Implementation of an integrity-protected secure storage.
TWI648679B (en) License management system and method using blockchain
CN112765268A (en) Block chain-based data privacy protection method, device and equipment
CN108881230B (en) Secure transmission method and device for government affair big data
Singh Network Security and Management
CN114969786A (en) Block chain-based insurance function data processing method, node and system
US20230259899A1 (en) Method, participant unit, transaction register and payment system for managing transaction data sets
CN108961110B (en) Method and system for negotiating encryption management intellectual property based on block chain
CN114268447A (en) File transmission method and device, electronic equipment and computer readable medium
Arulananth et al. Multi party secure data access management in cloud using user centric block chain data encryption
Parisi Securing Blockchain Networks like Ethereum and Hyperledger Fabric: Learn advanced security configurations and design principles to safeguard Blockchain networks
Santoso et al. On Max‐Plus Algebra and Its Application on Image Steganography
US8682800B2 (en) Controlling access to technology based upon authorization
Huth Secure communicating systems: design, analysis, and implementation
Naser et al. QR code based two-factor authentication to verify paper-based documents
Noam et al. Realizing privacy aspects in blockchain networks
CN114462067A (en) Digital asset trusted exchange management method and device based on block chain
Xu et al. Application of Data Encryption Technology in Network Information Security Sharing
Verma et al. Applications of Data Security and Blockchain in Smart City Identity Management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant