CN111833188A - Non-contact intellectual property changing method based on intelligent contract - Google Patents
Non-contact intellectual property changing method based on intelligent contract Download PDFInfo
- Publication number
- CN111833188A CN111833188A CN202010689740.6A CN202010689740A CN111833188A CN 111833188 A CN111833188 A CN 111833188A CN 202010689740 A CN202010689740 A CN 202010689740A CN 111833188 A CN111833188 A CN 111833188A
- Authority
- CN
- China
- Prior art keywords
- contract
- change
- intellectual property
- transfer
- intelligent contract
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 230000008859 change Effects 0.000 claims abstract description 67
- 238000004519 manufacturing process Methods 0.000 claims abstract description 41
- 238000001514 detection method Methods 0.000 claims abstract description 40
- 230000006399 behavior Effects 0.000 claims abstract description 11
- 238000007726 management method Methods 0.000 claims abstract description 7
- 238000005516 engineering process Methods 0.000 claims description 17
- 238000004458 analytical method Methods 0.000 claims description 13
- 230000006870 function Effects 0.000 claims description 9
- 230000008569 process Effects 0.000 claims description 8
- 230000004044 response Effects 0.000 claims description 8
- 230000007480 spreading Effects 0.000 claims description 6
- 230000007246 mechanism Effects 0.000 claims description 4
- 238000012360 testing method Methods 0.000 claims description 4
- 230000001960 triggered effect Effects 0.000 claims description 4
- 238000004806 packaging method and process Methods 0.000 claims description 3
- 238000012038 vulnerability analysis Methods 0.000 claims description 3
- 238000010276 construction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
- G06Q50/184—Intellectual property management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/133—Protocols for remote procedure calls [RPC]
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Marketing (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- Economics (AREA)
- Accounting & Taxation (AREA)
- Tourism & Hospitality (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Primary Health Care (AREA)
- Operations Research (AREA)
- Human Resources & Organizations (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A non-contact intellectual property changing method based on an intelligent contract comprises the following steps: 1) formulating an intellectual property service management protocol; 2) observing behaviors of the intelligent contract in operation under different data by adopting a dynamic program analysis method, and judging whether the intelligent contract has a safety problem or not; 3) realizing automatic execution of the known production change on a block chain platform through an intelligent contract, and detecting the determined known production works; 4) according to the detection result of the step 3), the user can initiate a transaction request through the client after the detection is passed; 5) and receiving a transaction request from the client according to the block chain node in the step 4), and calling a corresponding contract interface according to the request type. The invention provides a non-contact intellectual property right changing method which has high safety performance, low repetition rate of known products and high known product changing and transferring efficiency.
Description
Technical Field
The invention provides a non-contact intellectual property changing method based on an intelligent contract, aiming at the defects of overhigh intellectual property changing and transferring cost, fussy procedure, longer period and the like in the current internet ecology.
Background
With the continuous improvement of intellectual property system in China, the intellectual property service industry is developed to enter a new normal state, so that not only is the digitalization and networking of intellectual property more obvious, but also the intellectual property works with excellent quality are layered endlessly. However, the great increase of the known products leads to the problems of difficult intellectual property change, disordered property trade and the like under the internet ecology to be gradually exposed. Digital construction is a future trend as blockchains are first brought into the new construction category. The block chain technology can add a time stamp in each data record, and the reliability of the data record is guaranteed due to characteristics such as decentralization and trusting, so that the data record is not easy to be tampered. Therefore, the block chain technology can be well fused with the intellectual property service industry for development. The intelligent contract is a programmed protocol which is loaded on a block chain, can be driven by events and has a state mechanism, and replaces a paper protocol.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a non-contact intellectual property changing method based on an intelligent contract. The method comprises the steps of firstly, formulating an intellectual property service management protocol through a programming language, wherein the protocol mainly comprises a known property change contract and a known property transfer contract; observing behaviors of the intelligent contract in operation under different data by adopting a dynamic program analysis method, and judging whether the intelligent contract has a safety problem or not; the automatic execution of the known production change is realized on a block chain platform through an intelligent contract, and the correct detection technology is adopted for detecting whether the determined known production works exist repeatedly, have originality and have the right to change; after the detection is passed, the user can initiate a transaction request through the client to trigger a corresponding intelligent contract; and the block chain nodes receive the transaction requests from the client, and call corresponding contract interfaces according to the request types to finally realize the change or transfer of the intellectual property.
In order to achieve the purpose, the invention adopts the technical scheme that: a non-contact intellectual property changing method based on an intelligent contract comprises the following steps:
step 1), an intellectual property service management agreement is formulated, wherein the agreement consists of a known property change contract and a known property transfer contract;
step 2), observing behaviors of the intelligent combination in operation under different data by adopting a dynamic program analysis method, and judging whether the safety problem exists;
step 3), realizing automatic execution of the known production change on a block chain platform through an intelligent contract, and detecting the determined known production by adopting a detection technology;
step 4), according to the detection result of the step 3), the user initiates a transaction request through the client after the detection is passed;
and 5) receiving a transaction request from the client according to the block chain link point in the step 4), and calling a corresponding contract interface according to the request type.
In step 1), the specific method is as follows:
1.1) clear agreement between two parties: the developer makes clear the rights and obligations of both parties in the process of intellectual property change and transfer;
1.2) editing contract code: writing a known production change contract and a known production transfer contract by using a specific programming language;
1.3) intelligent contract compilation: compiling the source codes of the known yield change contract and the known yield transfer contract into byte codes by the compiler;
1.4) deploying contract instances: deploying the byte codes of the known production change contract and the known production transfer contract on a blockchain platform in a transaction mode at a client;
1.5) contract deployment completion: and after the intelligent contract deployment is completed, displaying the called contract methods.
In the step 2), the specific method is as follows:
2.1) contract function analysis: analyzing all functions in the known yield change and the known yield transfer contract based on a Contract fuzzy intelligent contract analysis tool, and analyzing all external functions of the intelligent contract if the intelligent contract does not provide ABI;
2.2) fuzz testing: generating input data by using ABI of the known yield change and the known yield transfer contract, and performing vulnerability analysis by using the running track recorded by the EVM;
2.3) stain marking and spreading: marking the input data as taint, and spreading the taint in the operation process of the known production change and the known production transfer contract;
2.4) dynamic taint analysis: the taint analysis mainly focuses on the behavior of input parameters, and judges whether a security hole appears on a path or not by tracking the propagation path of the taint;
2.5) safety problem treatment: if the intelligent contract is found to have the problems of low code coverage rate, index-level input data and integer overflow, the intelligent contract needs to be upgraded and then deployed according to the current security vulnerability.
In step 3), whether the determined known product exists repeatedly, whether the known product has originality or not and whether the known product is authorized to be changed are detected, and the specific method is as follows:
3.1) presence detection: the data information recorded through the block chain has accuracy and uniqueness, cannot be tampered, and needs to be subjected to tracing query before the known product changing operation is carried out to determine whether the data information exists;
3.2) original detection: adopting plagiarism detection technology to detect whether the works have originality, wherein the detection types are divided into two types: text media detection and digital image detection; if the product is known to belong to the text media type, the digital fingerprint technology is adopted for identification; if the product is known to belong to the digital image type, identifying by adopting a copy detection technology;
3.3) detecting operability: the change and transfer of the intellectual property rights are operated by the right holders, and if the user is the right holder licensed by the intellectual property rights, the user is entitled to change and transfer the intellectual property works.
In the step 4), the specific method is as follows:
4.1) selecting service type: the user selects intellectual property right change or intellectual property right transfer according to the self requirement;
4.2) judging by a state machine: when the event or data information is transmitted into a known yield change contract or a known yield transfer contract, the contract state is updated, the corresponding contract is triggered to carry out state machine judgment, and if the response condition is met, the state machine automatically executes a corresponding intelligent contract code according to a preset response rule;
4.3) triggering execution: if the user needs to change the right main body and the right content of the intellectual property work in the existing period, executing a known property change contract which is already deployed on the blockchain; if the user needs to transfer the intellectual property works in the existing period in a buying, selling, reciprocal and giving way, executing a known property transfer contract which is deployed on the blockchain;
4.4) result feedback: the result after the known production change contract/the known production transfer contract is executed is output to the user, and the change of the contract value and the state is recorded on the blockchain.
In step 5), the specific method is as follows:
5.1) block creation: executing a known yield change contract or a known yield transfer contract to generate transaction data, packaging the transaction data to be processed in the period of time into a block by the system at a set time, and permanently recording the transaction data on a block chain network;
5.2) broadcasting in the whole network: the generated blocks are broadcasted to all participants of the whole network, and all nodes in the network verify the new blocks by using a set of consensus mechanism;
5.3) consensus strand: if all transactions are verified, the new block will be linked to the previous block, forming a block chain, and the system broadcasts the updated status of the distributed ledger to the network.
The invention has the beneficial effects that:
the invention provides a non-contact intellectual property changing method based on an intelligent contract, aiming at the existing problems. The method comprises the steps of firstly, formulating an intellectual property service management protocol through a programming language, wherein the protocol mainly comprises a known property change contract and a known property transfer contract; observing behaviors of the intelligent contract in operation under different data by adopting a dynamic program analysis method, and judging whether the intelligent contract has a safety problem or not; the automatic execution of the known production change is realized on a block chain platform through an intelligent contract, and the correct detection technology is adopted for detecting whether the determined known production works exist repeatedly, have originality and have the right to change; after the detection is passed, the user can initiate a transaction request through the client to trigger a corresponding intelligent contract; and the block chain nodes receive the transaction requests from the client, and call corresponding contract interfaces according to the request types to finally realize the change or transfer of the intellectual property.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a schematic diagram of an intellectual property service management agreement model.
Detailed Description
A non-contact intellectual property changing method based on an intelligent contract comprises the following steps:
step 1), an intellectual property service management agreement is formulated, the agreement consists of a known property change contract and a known property transfer contract, and the specific method comprises the following steps:
1.1) clear agreement between two parties: the developer makes clear the rights and obligations of both parties in the process of intellectual property change and transfer;
1.2) editing contract code: writing a known production change contract and a known production transfer contract by using a specific programming language;
1.3) intelligent contract compilation: compiling the source codes of the known yield change contract and the known yield transfer contract into byte codes by the compiler;
1.4) deploying contract instances: deploying the byte codes of the known production change contract and the known production transfer contract on a blockchain platform in a transaction mode at a client;
1.5) contract deployment completion: and after the intelligent contract deployment is completed, displaying the called contract methods.
Step 2), observing behaviors of the intelligent complex running under different data by adopting a dynamic program analysis method, and judging whether the behaviors have safety problems, wherein the specific method is as follows:
2.1) contract function analysis: analyzing all functions in the known yield change and the known yield transfer contract based on a Contract fuzzy intelligent contract analysis tool, and analyzing all external functions of the intelligent contract if the intelligent contract does not provide ABI;
2.2) fuzz testing: generating input data by using ABI of the known yield change and the known yield transfer contract, and performing vulnerability analysis by using the running track recorded by the EVM;
2.3) stain marking and spreading: marking the input data as taint, and spreading the taint in the operation process of the known production change and the known production transfer contract;
2.4) dynamic taint analysis: the taint analysis mainly focuses on the behavior of input parameters, and judges whether a security hole appears on a path or not by tracking the propagation path of the taint;
2.5) safety problem treatment: if the intelligent contract is found to have the problems of low code coverage rate, index-level input data and integer overflow, the intelligent contract needs to be upgraded and then deployed according to the current security vulnerability.
Step 3), realizing automatic execution of the known production change on a block chain platform through an intelligent contract, and detecting whether the determined known production works exist, have originality and have right to change by adopting a correct detection technology, wherein the specific steps are as follows:
3.1) presence detection: the data information recorded through the block chain has accuracy and uniqueness, cannot be tampered, and needs to be subjected to tracing query before the known product changing operation is carried out to determine whether the data information exists;
3.2) original detection: whether works have originality or not is rapidly and accurately detected by adopting a plagiarism detection technology, and the detection types are divided into two types: text media detection and digital image detection; if the product is known to belong to the text media type, the digital fingerprint technology is adopted for identification; if the product is known to belong to the digital image type, identifying by adopting a copy detection technology;
3.3) detecting operability: the change and transfer of the intellectual property rights are operated by the right holders, and if the user is the right holder licensed by the intellectual property rights, the user is entitled to change and transfer the intellectual property works.
Step 4), according to the detection result of the step 3), detecting that the user initiates a transaction request through the client after passing the detection, and the specific method is as follows:
4.1) selecting service type: the user selects intellectual property right change or intellectual property right transfer according to the self requirement;
4.2) judging by a state machine: when the event or data information is transmitted into a known yield change contract or a known yield transfer contract, the contract state is updated, the corresponding contract is triggered to carry out state machine judgment, and if the response condition is met, the state machine automatically executes a corresponding intelligent contract code according to a preset response rule;
4.3) triggering execution: if the user needs to change the right main body and the right content of the intellectual property work in the existing period, executing a known property change contract which is already deployed on the blockchain; if the user needs to transfer the intellectual property works in the existing period in a buying, selling, reciprocal and giving way, executing a known property transfer contract which is deployed on the blockchain;
4.4) result feedback: the result after the known production change contract/the known production transfer contract is executed is output to the user, and the change of the contract value and the state is recorded on the blockchain.
And 5) receiving a transaction request from the client according to the block chain link point in the step 4), and calling a corresponding contract interface according to the request type.
5.1) block creation: executing a known yield change contract or a known yield transfer contract to generate transaction data, packaging the transaction data to be processed in the period of time into a block by the system at a set time, and permanently recording the transaction data on a block chain network;
5.2) broadcasting in the whole network: the generated blocks are broadcasted to all participants of the whole network, and all nodes in the network verify the new blocks by using a set of consensus mechanism;
5.3) consensus strand: if all transactions are verified, the new block will be linked to the previous block, forming a block chain, and the system broadcasts the updated status of the distributed ledger to the network.
Example 1:
suppose that user a wants to transfer a proprietary work through an intellectual property service platform based on a blockchain.
Firstly, two parties of the known production transaction (including a user A and a user B), a notarization department, a judicial authority and other parties jointly make a set of contract rules, including the execution conditions, the execution process and the expected execution result of the contract. And deploying the created known production transfer contract to a blockchain platform, and before the known production transaction is really executed, carrying out security detection on the known production transfer contract by adopting a dynamic program analysis method. The dynamic program analysis method judges whether security holes exist or not by observing the behaviors of the known product transfer common in operation under different data, and mainly comprises the steps of fuzzy test and dynamic taint analysis. If an unmodified security vulnerability exists in a certain path in the detection process, for example, the code coverage rate is low, the input data is of an index level, the integer overflows, and the like, the contract needs to be upgraded and then deployed. Here, it is known that both parties (user a and user B) to the production transaction need to optimize contract rules and code implementation with other parties.
After the safety detection is passed, the patent works are uploaded to the platform, and correct detection technology is adopted to sequentially detect whether the patent works exist repeatedly, have originality or not and have the right to change or not. Then, the user A can initiate a transaction request through the client, and the automatic execution of the transfer of the known product work is realized on the intellectual property service platform based on the block chain. And when the relevant data information of the transaction request is transmitted into a known delivery contract, the contract is triggered and the state machine judgment is carried out. If the response conditions are met (for example, the transaction initiator is a property owner, the intellectual property works are authorized to transfer, and the like), the state machine automatically executes intellectual property transfer contract codes according to preset response rules, and outputs the executed results to the user. And finally, the system packs the transaction data into blocks to perform whole network broadcasting, and records the change of contract values and states on a block chain after the consensus is passed. At this point, the transfer of intellectual property rights is complete and the property owner of the patent work is changed from user a to user B.
Claims (6)
1. A non-contact intellectual property changing method based on an intelligent contract comprises the following steps:
step 1), an intellectual property service management agreement is formulated, wherein the agreement consists of a known property change contract and a known property transfer contract;
step 2), observing behaviors of the intelligent combination in operation under different data by adopting a dynamic program analysis method, and judging whether the safety problem exists;
step 3), realizing automatic execution of the known production change on a block chain platform through an intelligent contract, and detecting the determined known production by adopting a detection technology;
step 4), according to the detection result of the step 3), the user initiates a transaction request through the client after the detection is passed;
and 5) receiving a transaction request from the client according to the block chain link point in the step 4), and calling a corresponding contract interface according to the request type.
2. The method of claim 1, wherein the method comprises: in the step 1), the specific method is as follows:
1.1) clear agreement between two parties: the developer makes clear the rights and obligations of both parties in the process of intellectual property change and transfer;
1.2) editing contract code: writing a known production change contract and a known production transfer contract by using a specific programming language;
1.3) intelligent contract compilation: compiling the source codes of the known yield change contract and the known yield transfer contract into byte codes by the compiler;
1.4) deploying contract instances: deploying the byte codes of the known production change contract and the known production transfer contract on a blockchain platform in a transaction mode at a client;
1.5) contract deployment completion: and after the intelligent contract deployment is completed, displaying the called contract methods.
3. The method of claim 1, wherein the method comprises: in the step 2), the specific method is as follows:
2.1) contract function analysis: analyzing all functions in the known yield change and the known yield transfer contract based on a Contract fuzzy intelligent contract analysis tool, and analyzing all external functions of the intelligent contract if the intelligent contract does not provide ABI;
2.2) fuzz testing: generating input data by using ABI of the known yield change and the known yield transfer contract, and performing vulnerability analysis by using the running track recorded by the EVM;
2.3) stain marking and spreading: marking the input data as taint, and spreading the taint in the operation process of the known production change and the known production transfer contract;
2.4) dynamic taint analysis: the taint analysis mainly focuses on the behavior of input parameters, and judges whether a security hole appears on a path or not by tracking the propagation path of the taint;
2.5) safety problem treatment: if the intelligent contract is found to have the problems of low code coverage rate, index-level input data and integer overflow, the intelligent contract needs to be upgraded and then deployed according to the current security vulnerability.
4. The method of claim 1, wherein the method comprises: in the step 3), whether the determined known product exists repeatedly, whether the known product has originality or not and whether the known product is authorized to be changed are detected, and the specific method is as follows:
3.1) presence detection: the data information recorded through the block chain has accuracy and uniqueness, cannot be tampered, and needs to be subjected to tracing query before the known product changing operation is carried out to determine whether the data information exists;
3.2) original detection: adopting plagiarism detection technology to detect whether the works have originality, wherein the detection types are divided into two types: text media detection and digital image detection; if the product is known to belong to the text media type, the digital fingerprint technology is adopted for identification; if the product is known to belong to the digital image type, identifying by adopting a copy detection technology;
3.3) detecting operability: the change and transfer of the intellectual property rights are operated by the right holders, and if the user is the right holder licensed by the intellectual property rights, the user is entitled to change and transfer the intellectual property works.
5. The method of claim 1, wherein the method comprises: in the step 4), the specific method is as follows:
4.1) selecting service type: the user selects intellectual property right change or intellectual property right transfer according to the self requirement;
4.2) judging by a state machine: when the event or data information is transmitted into a known yield change contract or a known yield transfer contract, the contract state is updated, the corresponding contract is triggered to carry out state machine judgment, and if the response condition is met, the state machine automatically executes a corresponding intelligent contract code according to a preset response rule;
4.3) triggering execution: if the user needs to change the right main body and the right content of the intellectual property work in the existing period, executing a known property change contract which is already deployed on the blockchain; if the user needs to transfer the intellectual property works in the existing period in a buying, selling, reciprocal and giving way, executing a known property transfer contract which is deployed on the blockchain;
4.4) result feedback: the result after the known production change contract/the known production transfer contract is executed is output to the user, and the change of the contract value and the state is recorded on the blockchain.
6. The method of claim 1, wherein the method comprises: in the step 5), the specific method is as follows:
5.1) block creation: executing a known yield change contract or a known yield transfer contract to generate transaction data, packaging the transaction data to be processed in the period of time into a block by the system at a set time, and permanently recording the transaction data on a block chain network;
5.2) broadcasting in the whole network: the generated blocks are broadcasted to all participants of the whole network, and all nodes in the network verify the new blocks by using a set of consensus mechanism;
5.3) consensus strand: if all transactions are verified, the new block will be linked to the previous block, forming a block chain, and the system broadcasts the updated status of the distributed ledger to the network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010689740.6A CN111833188B (en) | 2020-07-17 | 2020-07-17 | Non-contact intellectual property right changing method based on intelligent contract |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010689740.6A CN111833188B (en) | 2020-07-17 | 2020-07-17 | Non-contact intellectual property right changing method based on intelligent contract |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111833188A true CN111833188A (en) | 2020-10-27 |
CN111833188B CN111833188B (en) | 2024-03-22 |
Family
ID=72923403
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010689740.6A Active CN111833188B (en) | 2020-07-17 | 2020-07-17 | Non-contact intellectual property right changing method based on intelligent contract |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111833188B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180285996A1 (en) * | 2017-04-03 | 2018-10-04 | FutureLab Consulting Inc. | Methods and system for managing intellectual property using a blockchain |
CN108711051A (en) * | 2018-05-03 | 2018-10-26 | 法信公证云(厦门)科技有限公司 | A kind of intellectual property transaction shared platform and method based on block chain |
CN109840429A (en) * | 2019-01-08 | 2019-06-04 | 北京众享比特科技有限公司 | Intelligent contract deployment, call method and device |
CN110399730A (en) * | 2019-07-24 | 2019-11-01 | 上海交通大学 | Inspection method, system and the medium of intelligent contract loophole |
US20200160465A1 (en) * | 2018-10-19 | 2020-05-21 | Erich Lawson Spangenberg | System and Method of IP Ownership and IP Transactions with Guaranteed Buy Valuation and Broker Rewards |
-
2020
- 2020-07-17 CN CN202010689740.6A patent/CN111833188B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180285996A1 (en) * | 2017-04-03 | 2018-10-04 | FutureLab Consulting Inc. | Methods and system for managing intellectual property using a blockchain |
CN108711051A (en) * | 2018-05-03 | 2018-10-26 | 法信公证云(厦门)科技有限公司 | A kind of intellectual property transaction shared platform and method based on block chain |
US20200160465A1 (en) * | 2018-10-19 | 2020-05-21 | Erich Lawson Spangenberg | System and Method of IP Ownership and IP Transactions with Guaranteed Buy Valuation and Broker Rewards |
CN109840429A (en) * | 2019-01-08 | 2019-06-04 | 北京众享比特科技有限公司 | Intelligent contract deployment, call method and device |
CN110399730A (en) * | 2019-07-24 | 2019-11-01 | 上海交通大学 | Inspection method, system and the medium of intelligent contract loophole |
Non-Patent Citations (1)
Title |
---|
余正逸凡;: "基于区块链技术的知识产权保护模型初探", 办公自动化, no. 14 * |
Also Published As
Publication number | Publication date |
---|---|
CN111833188B (en) | 2024-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8312440B2 (en) | Method, computer program product, and hardware product for providing program individuality analysis for source code programs | |
Walkinshaw et al. | Reverse engineering state machines by interactive grammar inference | |
US8621417B2 (en) | Rule merging in system for monitoring adherence by developers to a software code development process | |
CN101377759A (en) | Automatic interface test system | |
CN104965999B (en) | The analysis joining method of a kind of short-and-medium genetic fragment order-checking and equipment | |
CN108536521A (en) | Based on emulation platform offline environment checking method and device | |
CN114996126B (en) | Vulnerability detection method and system for EOSIO intelligent contracts | |
CN111563041A (en) | Test case on-demand accurate execution method | |
CN114844689A (en) | Website logic vulnerability detection method and system based on finite-state machine | |
Li et al. | Logtracker: Learning log revision behaviors proactively from software evolution history | |
CN106844219A (en) | Using detection method and apply detection means | |
US20230185692A1 (en) | Highly Tested Systems | |
CN117633808A (en) | Method, processor and machine-readable storage medium for vulnerability detection | |
Hozano et al. | Using developers' feedback to improve code smell detection | |
CN111833188A (en) | Non-contact intellectual property changing method based on intelligent contract | |
CN116305247B (en) | Sensitive information detection method and system for process data of vehicle-mounted application software | |
CN105608006B (en) | A kind of program error detection method and system based on probabilistic model | |
CN114792006B (en) | LSTM-based android cross-application collusion security analysis method and system | |
CN112015715A (en) | Industrial Internet data management service testing method and system | |
CN115268847A (en) | Block chain intelligent contract generation method and device and electronic equipment | |
CN114579809A (en) | Event analysis method and device, electronic equipment and storage medium | |
CN114153746A (en) | Intelligent contract testing method based on symbolic execution and fuzziness | |
CN113282504A (en) | Incremental code coverage rate detection method and service development method and device | |
CN111934949A (en) | Safety test system based on database injection test | |
US10417110B2 (en) | Method for verifying traceability of first instructions in a procedural programming language generated from second instructions in a modelling language |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |