CN111833188A - Non-contact intellectual property changing method based on intelligent contract - Google Patents

Non-contact intellectual property changing method based on intelligent contract Download PDF

Info

Publication number
CN111833188A
CN111833188A CN202010689740.6A CN202010689740A CN111833188A CN 111833188 A CN111833188 A CN 111833188A CN 202010689740 A CN202010689740 A CN 202010689740A CN 111833188 A CN111833188 A CN 111833188A
Authority
CN
China
Prior art keywords
contract
change
intellectual property
transfer
intelligent contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010689740.6A
Other languages
Chinese (zh)
Other versions
CN111833188B (en
Inventor
王妍
李继鑫
刘德伟
刘万胜
谭爱平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liaoning University
Original Assignee
Liaoning University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liaoning University filed Critical Liaoning University
Priority to CN202010689740.6A priority Critical patent/CN111833188B/en
Publication of CN111833188A publication Critical patent/CN111833188A/en
Application granted granted Critical
Publication of CN111833188B publication Critical patent/CN111833188B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/133Protocols for remote procedure calls [RPC]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Accounting & Taxation (AREA)
  • Tourism & Hospitality (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Primary Health Care (AREA)
  • Operations Research (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A non-contact intellectual property changing method based on an intelligent contract comprises the following steps: 1) formulating an intellectual property service management protocol; 2) observing behaviors of the intelligent contract in operation under different data by adopting a dynamic program analysis method, and judging whether the intelligent contract has a safety problem or not; 3) realizing automatic execution of the known production change on a block chain platform through an intelligent contract, and detecting the determined known production works; 4) according to the detection result of the step 3), the user can initiate a transaction request through the client after the detection is passed; 5) and receiving a transaction request from the client according to the block chain node in the step 4), and calling a corresponding contract interface according to the request type. The invention provides a non-contact intellectual property right changing method which has high safety performance, low repetition rate of known products and high known product changing and transferring efficiency.

Description

Non-contact intellectual property changing method based on intelligent contract
Technical Field
The invention provides a non-contact intellectual property changing method based on an intelligent contract, aiming at the defects of overhigh intellectual property changing and transferring cost, fussy procedure, longer period and the like in the current internet ecology.
Background
With the continuous improvement of intellectual property system in China, the intellectual property service industry is developed to enter a new normal state, so that not only is the digitalization and networking of intellectual property more obvious, but also the intellectual property works with excellent quality are layered endlessly. However, the great increase of the known products leads to the problems of difficult intellectual property change, disordered property trade and the like under the internet ecology to be gradually exposed. Digital construction is a future trend as blockchains are first brought into the new construction category. The block chain technology can add a time stamp in each data record, and the reliability of the data record is guaranteed due to characteristics such as decentralization and trusting, so that the data record is not easy to be tampered. Therefore, the block chain technology can be well fused with the intellectual property service industry for development. The intelligent contract is a programmed protocol which is loaded on a block chain, can be driven by events and has a state mechanism, and replaces a paper protocol.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a non-contact intellectual property changing method based on an intelligent contract. The method comprises the steps of firstly, formulating an intellectual property service management protocol through a programming language, wherein the protocol mainly comprises a known property change contract and a known property transfer contract; observing behaviors of the intelligent contract in operation under different data by adopting a dynamic program analysis method, and judging whether the intelligent contract has a safety problem or not; the automatic execution of the known production change is realized on a block chain platform through an intelligent contract, and the correct detection technology is adopted for detecting whether the determined known production works exist repeatedly, have originality and have the right to change; after the detection is passed, the user can initiate a transaction request through the client to trigger a corresponding intelligent contract; and the block chain nodes receive the transaction requests from the client, and call corresponding contract interfaces according to the request types to finally realize the change or transfer of the intellectual property.
In order to achieve the purpose, the invention adopts the technical scheme that: a non-contact intellectual property changing method based on an intelligent contract comprises the following steps:
step 1), an intellectual property service management agreement is formulated, wherein the agreement consists of a known property change contract and a known property transfer contract;
step 2), observing behaviors of the intelligent combination in operation under different data by adopting a dynamic program analysis method, and judging whether the safety problem exists;
step 3), realizing automatic execution of the known production change on a block chain platform through an intelligent contract, and detecting the determined known production by adopting a detection technology;
step 4), according to the detection result of the step 3), the user initiates a transaction request through the client after the detection is passed;
and 5) receiving a transaction request from the client according to the block chain link point in the step 4), and calling a corresponding contract interface according to the request type.
In step 1), the specific method is as follows:
1.1) clear agreement between two parties: the developer makes clear the rights and obligations of both parties in the process of intellectual property change and transfer;
1.2) editing contract code: writing a known production change contract and a known production transfer contract by using a specific programming language;
1.3) intelligent contract compilation: compiling the source codes of the known yield change contract and the known yield transfer contract into byte codes by the compiler;
1.4) deploying contract instances: deploying the byte codes of the known production change contract and the known production transfer contract on a blockchain platform in a transaction mode at a client;
1.5) contract deployment completion: and after the intelligent contract deployment is completed, displaying the called contract methods.
In the step 2), the specific method is as follows:
2.1) contract function analysis: analyzing all functions in the known yield change and the known yield transfer contract based on a Contract fuzzy intelligent contract analysis tool, and analyzing all external functions of the intelligent contract if the intelligent contract does not provide ABI;
2.2) fuzz testing: generating input data by using ABI of the known yield change and the known yield transfer contract, and performing vulnerability analysis by using the running track recorded by the EVM;
2.3) stain marking and spreading: marking the input data as taint, and spreading the taint in the operation process of the known production change and the known production transfer contract;
2.4) dynamic taint analysis: the taint analysis mainly focuses on the behavior of input parameters, and judges whether a security hole appears on a path or not by tracking the propagation path of the taint;
2.5) safety problem treatment: if the intelligent contract is found to have the problems of low code coverage rate, index-level input data and integer overflow, the intelligent contract needs to be upgraded and then deployed according to the current security vulnerability.
In step 3), whether the determined known product exists repeatedly, whether the known product has originality or not and whether the known product is authorized to be changed are detected, and the specific method is as follows:
3.1) presence detection: the data information recorded through the block chain has accuracy and uniqueness, cannot be tampered, and needs to be subjected to tracing query before the known product changing operation is carried out to determine whether the data information exists;
3.2) original detection: adopting plagiarism detection technology to detect whether the works have originality, wherein the detection types are divided into two types: text media detection and digital image detection; if the product is known to belong to the text media type, the digital fingerprint technology is adopted for identification; if the product is known to belong to the digital image type, identifying by adopting a copy detection technology;
3.3) detecting operability: the change and transfer of the intellectual property rights are operated by the right holders, and if the user is the right holder licensed by the intellectual property rights, the user is entitled to change and transfer the intellectual property works.
In the step 4), the specific method is as follows:
4.1) selecting service type: the user selects intellectual property right change or intellectual property right transfer according to the self requirement;
4.2) judging by a state machine: when the event or data information is transmitted into a known yield change contract or a known yield transfer contract, the contract state is updated, the corresponding contract is triggered to carry out state machine judgment, and if the response condition is met, the state machine automatically executes a corresponding intelligent contract code according to a preset response rule;
4.3) triggering execution: if the user needs to change the right main body and the right content of the intellectual property work in the existing period, executing a known property change contract which is already deployed on the blockchain; if the user needs to transfer the intellectual property works in the existing period in a buying, selling, reciprocal and giving way, executing a known property transfer contract which is deployed on the blockchain;
4.4) result feedback: the result after the known production change contract/the known production transfer contract is executed is output to the user, and the change of the contract value and the state is recorded on the blockchain.
In step 5), the specific method is as follows:
5.1) block creation: executing a known yield change contract or a known yield transfer contract to generate transaction data, packaging the transaction data to be processed in the period of time into a block by the system at a set time, and permanently recording the transaction data on a block chain network;
5.2) broadcasting in the whole network: the generated blocks are broadcasted to all participants of the whole network, and all nodes in the network verify the new blocks by using a set of consensus mechanism;
5.3) consensus strand: if all transactions are verified, the new block will be linked to the previous block, forming a block chain, and the system broadcasts the updated status of the distributed ledger to the network.
The invention has the beneficial effects that:
the invention provides a non-contact intellectual property changing method based on an intelligent contract, aiming at the existing problems. The method comprises the steps of firstly, formulating an intellectual property service management protocol through a programming language, wherein the protocol mainly comprises a known property change contract and a known property transfer contract; observing behaviors of the intelligent contract in operation under different data by adopting a dynamic program analysis method, and judging whether the intelligent contract has a safety problem or not; the automatic execution of the known production change is realized on a block chain platform through an intelligent contract, and the correct detection technology is adopted for detecting whether the determined known production works exist repeatedly, have originality and have the right to change; after the detection is passed, the user can initiate a transaction request through the client to trigger a corresponding intelligent contract; and the block chain nodes receive the transaction requests from the client, and call corresponding contract interfaces according to the request types to finally realize the change or transfer of the intellectual property.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a schematic diagram of an intellectual property service management agreement model.
Detailed Description
A non-contact intellectual property changing method based on an intelligent contract comprises the following steps:
step 1), an intellectual property service management agreement is formulated, the agreement consists of a known property change contract and a known property transfer contract, and the specific method comprises the following steps:
1.1) clear agreement between two parties: the developer makes clear the rights and obligations of both parties in the process of intellectual property change and transfer;
1.2) editing contract code: writing a known production change contract and a known production transfer contract by using a specific programming language;
1.3) intelligent contract compilation: compiling the source codes of the known yield change contract and the known yield transfer contract into byte codes by the compiler;
1.4) deploying contract instances: deploying the byte codes of the known production change contract and the known production transfer contract on a blockchain platform in a transaction mode at a client;
1.5) contract deployment completion: and after the intelligent contract deployment is completed, displaying the called contract methods.
Step 2), observing behaviors of the intelligent complex running under different data by adopting a dynamic program analysis method, and judging whether the behaviors have safety problems, wherein the specific method is as follows:
2.1) contract function analysis: analyzing all functions in the known yield change and the known yield transfer contract based on a Contract fuzzy intelligent contract analysis tool, and analyzing all external functions of the intelligent contract if the intelligent contract does not provide ABI;
2.2) fuzz testing: generating input data by using ABI of the known yield change and the known yield transfer contract, and performing vulnerability analysis by using the running track recorded by the EVM;
2.3) stain marking and spreading: marking the input data as taint, and spreading the taint in the operation process of the known production change and the known production transfer contract;
2.4) dynamic taint analysis: the taint analysis mainly focuses on the behavior of input parameters, and judges whether a security hole appears on a path or not by tracking the propagation path of the taint;
2.5) safety problem treatment: if the intelligent contract is found to have the problems of low code coverage rate, index-level input data and integer overflow, the intelligent contract needs to be upgraded and then deployed according to the current security vulnerability.
Step 3), realizing automatic execution of the known production change on a block chain platform through an intelligent contract, and detecting whether the determined known production works exist, have originality and have right to change by adopting a correct detection technology, wherein the specific steps are as follows:
3.1) presence detection: the data information recorded through the block chain has accuracy and uniqueness, cannot be tampered, and needs to be subjected to tracing query before the known product changing operation is carried out to determine whether the data information exists;
3.2) original detection: whether works have originality or not is rapidly and accurately detected by adopting a plagiarism detection technology, and the detection types are divided into two types: text media detection and digital image detection; if the product is known to belong to the text media type, the digital fingerprint technology is adopted for identification; if the product is known to belong to the digital image type, identifying by adopting a copy detection technology;
3.3) detecting operability: the change and transfer of the intellectual property rights are operated by the right holders, and if the user is the right holder licensed by the intellectual property rights, the user is entitled to change and transfer the intellectual property works.
Step 4), according to the detection result of the step 3), detecting that the user initiates a transaction request through the client after passing the detection, and the specific method is as follows:
4.1) selecting service type: the user selects intellectual property right change or intellectual property right transfer according to the self requirement;
4.2) judging by a state machine: when the event or data information is transmitted into a known yield change contract or a known yield transfer contract, the contract state is updated, the corresponding contract is triggered to carry out state machine judgment, and if the response condition is met, the state machine automatically executes a corresponding intelligent contract code according to a preset response rule;
4.3) triggering execution: if the user needs to change the right main body and the right content of the intellectual property work in the existing period, executing a known property change contract which is already deployed on the blockchain; if the user needs to transfer the intellectual property works in the existing period in a buying, selling, reciprocal and giving way, executing a known property transfer contract which is deployed on the blockchain;
4.4) result feedback: the result after the known production change contract/the known production transfer contract is executed is output to the user, and the change of the contract value and the state is recorded on the blockchain.
And 5) receiving a transaction request from the client according to the block chain link point in the step 4), and calling a corresponding contract interface according to the request type.
5.1) block creation: executing a known yield change contract or a known yield transfer contract to generate transaction data, packaging the transaction data to be processed in the period of time into a block by the system at a set time, and permanently recording the transaction data on a block chain network;
5.2) broadcasting in the whole network: the generated blocks are broadcasted to all participants of the whole network, and all nodes in the network verify the new blocks by using a set of consensus mechanism;
5.3) consensus strand: if all transactions are verified, the new block will be linked to the previous block, forming a block chain, and the system broadcasts the updated status of the distributed ledger to the network.
Example 1:
suppose that user a wants to transfer a proprietary work through an intellectual property service platform based on a blockchain.
Firstly, two parties of the known production transaction (including a user A and a user B), a notarization department, a judicial authority and other parties jointly make a set of contract rules, including the execution conditions, the execution process and the expected execution result of the contract. And deploying the created known production transfer contract to a blockchain platform, and before the known production transaction is really executed, carrying out security detection on the known production transfer contract by adopting a dynamic program analysis method. The dynamic program analysis method judges whether security holes exist or not by observing the behaviors of the known product transfer common in operation under different data, and mainly comprises the steps of fuzzy test and dynamic taint analysis. If an unmodified security vulnerability exists in a certain path in the detection process, for example, the code coverage rate is low, the input data is of an index level, the integer overflows, and the like, the contract needs to be upgraded and then deployed. Here, it is known that both parties (user a and user B) to the production transaction need to optimize contract rules and code implementation with other parties.
After the safety detection is passed, the patent works are uploaded to the platform, and correct detection technology is adopted to sequentially detect whether the patent works exist repeatedly, have originality or not and have the right to change or not. Then, the user A can initiate a transaction request through the client, and the automatic execution of the transfer of the known product work is realized on the intellectual property service platform based on the block chain. And when the relevant data information of the transaction request is transmitted into a known delivery contract, the contract is triggered and the state machine judgment is carried out. If the response conditions are met (for example, the transaction initiator is a property owner, the intellectual property works are authorized to transfer, and the like), the state machine automatically executes intellectual property transfer contract codes according to preset response rules, and outputs the executed results to the user. And finally, the system packs the transaction data into blocks to perform whole network broadcasting, and records the change of contract values and states on a block chain after the consensus is passed. At this point, the transfer of intellectual property rights is complete and the property owner of the patent work is changed from user a to user B.

Claims (6)

1. A non-contact intellectual property changing method based on an intelligent contract comprises the following steps:
step 1), an intellectual property service management agreement is formulated, wherein the agreement consists of a known property change contract and a known property transfer contract;
step 2), observing behaviors of the intelligent combination in operation under different data by adopting a dynamic program analysis method, and judging whether the safety problem exists;
step 3), realizing automatic execution of the known production change on a block chain platform through an intelligent contract, and detecting the determined known production by adopting a detection technology;
step 4), according to the detection result of the step 3), the user initiates a transaction request through the client after the detection is passed;
and 5) receiving a transaction request from the client according to the block chain link point in the step 4), and calling a corresponding contract interface according to the request type.
2. The method of claim 1, wherein the method comprises: in the step 1), the specific method is as follows:
1.1) clear agreement between two parties: the developer makes clear the rights and obligations of both parties in the process of intellectual property change and transfer;
1.2) editing contract code: writing a known production change contract and a known production transfer contract by using a specific programming language;
1.3) intelligent contract compilation: compiling the source codes of the known yield change contract and the known yield transfer contract into byte codes by the compiler;
1.4) deploying contract instances: deploying the byte codes of the known production change contract and the known production transfer contract on a blockchain platform in a transaction mode at a client;
1.5) contract deployment completion: and after the intelligent contract deployment is completed, displaying the called contract methods.
3. The method of claim 1, wherein the method comprises: in the step 2), the specific method is as follows:
2.1) contract function analysis: analyzing all functions in the known yield change and the known yield transfer contract based on a Contract fuzzy intelligent contract analysis tool, and analyzing all external functions of the intelligent contract if the intelligent contract does not provide ABI;
2.2) fuzz testing: generating input data by using ABI of the known yield change and the known yield transfer contract, and performing vulnerability analysis by using the running track recorded by the EVM;
2.3) stain marking and spreading: marking the input data as taint, and spreading the taint in the operation process of the known production change and the known production transfer contract;
2.4) dynamic taint analysis: the taint analysis mainly focuses on the behavior of input parameters, and judges whether a security hole appears on a path or not by tracking the propagation path of the taint;
2.5) safety problem treatment: if the intelligent contract is found to have the problems of low code coverage rate, index-level input data and integer overflow, the intelligent contract needs to be upgraded and then deployed according to the current security vulnerability.
4. The method of claim 1, wherein the method comprises: in the step 3), whether the determined known product exists repeatedly, whether the known product has originality or not and whether the known product is authorized to be changed are detected, and the specific method is as follows:
3.1) presence detection: the data information recorded through the block chain has accuracy and uniqueness, cannot be tampered, and needs to be subjected to tracing query before the known product changing operation is carried out to determine whether the data information exists;
3.2) original detection: adopting plagiarism detection technology to detect whether the works have originality, wherein the detection types are divided into two types: text media detection and digital image detection; if the product is known to belong to the text media type, the digital fingerprint technology is adopted for identification; if the product is known to belong to the digital image type, identifying by adopting a copy detection technology;
3.3) detecting operability: the change and transfer of the intellectual property rights are operated by the right holders, and if the user is the right holder licensed by the intellectual property rights, the user is entitled to change and transfer the intellectual property works.
5. The method of claim 1, wherein the method comprises: in the step 4), the specific method is as follows:
4.1) selecting service type: the user selects intellectual property right change or intellectual property right transfer according to the self requirement;
4.2) judging by a state machine: when the event or data information is transmitted into a known yield change contract or a known yield transfer contract, the contract state is updated, the corresponding contract is triggered to carry out state machine judgment, and if the response condition is met, the state machine automatically executes a corresponding intelligent contract code according to a preset response rule;
4.3) triggering execution: if the user needs to change the right main body and the right content of the intellectual property work in the existing period, executing a known property change contract which is already deployed on the blockchain; if the user needs to transfer the intellectual property works in the existing period in a buying, selling, reciprocal and giving way, executing a known property transfer contract which is deployed on the blockchain;
4.4) result feedback: the result after the known production change contract/the known production transfer contract is executed is output to the user, and the change of the contract value and the state is recorded on the blockchain.
6. The method of claim 1, wherein the method comprises: in the step 5), the specific method is as follows:
5.1) block creation: executing a known yield change contract or a known yield transfer contract to generate transaction data, packaging the transaction data to be processed in the period of time into a block by the system at a set time, and permanently recording the transaction data on a block chain network;
5.2) broadcasting in the whole network: the generated blocks are broadcasted to all participants of the whole network, and all nodes in the network verify the new blocks by using a set of consensus mechanism;
5.3) consensus strand: if all transactions are verified, the new block will be linked to the previous block, forming a block chain, and the system broadcasts the updated status of the distributed ledger to the network.
CN202010689740.6A 2020-07-17 2020-07-17 Non-contact intellectual property right changing method based on intelligent contract Active CN111833188B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010689740.6A CN111833188B (en) 2020-07-17 2020-07-17 Non-contact intellectual property right changing method based on intelligent contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010689740.6A CN111833188B (en) 2020-07-17 2020-07-17 Non-contact intellectual property right changing method based on intelligent contract

Publications (2)

Publication Number Publication Date
CN111833188A true CN111833188A (en) 2020-10-27
CN111833188B CN111833188B (en) 2024-03-22

Family

ID=72923403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010689740.6A Active CN111833188B (en) 2020-07-17 2020-07-17 Non-contact intellectual property right changing method based on intelligent contract

Country Status (1)

Country Link
CN (1) CN111833188B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180285996A1 (en) * 2017-04-03 2018-10-04 FutureLab Consulting Inc. Methods and system for managing intellectual property using a blockchain
CN108711051A (en) * 2018-05-03 2018-10-26 法信公证云(厦门)科技有限公司 A kind of intellectual property transaction shared platform and method based on block chain
CN109840429A (en) * 2019-01-08 2019-06-04 北京众享比特科技有限公司 Intelligent contract deployment, call method and device
CN110399730A (en) * 2019-07-24 2019-11-01 上海交通大学 Inspection method, system and the medium of intelligent contract loophole
US20200160465A1 (en) * 2018-10-19 2020-05-21 Erich Lawson Spangenberg System and Method of IP Ownership and IP Transactions with Guaranteed Buy Valuation and Broker Rewards

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180285996A1 (en) * 2017-04-03 2018-10-04 FutureLab Consulting Inc. Methods and system for managing intellectual property using a blockchain
CN108711051A (en) * 2018-05-03 2018-10-26 法信公证云(厦门)科技有限公司 A kind of intellectual property transaction shared platform and method based on block chain
US20200160465A1 (en) * 2018-10-19 2020-05-21 Erich Lawson Spangenberg System and Method of IP Ownership and IP Transactions with Guaranteed Buy Valuation and Broker Rewards
CN109840429A (en) * 2019-01-08 2019-06-04 北京众享比特科技有限公司 Intelligent contract deployment, call method and device
CN110399730A (en) * 2019-07-24 2019-11-01 上海交通大学 Inspection method, system and the medium of intelligent contract loophole

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
余正逸凡;: "基于区块链技术的知识产权保护模型初探", 办公自动化, no. 14 *

Also Published As

Publication number Publication date
CN111833188B (en) 2024-03-22

Similar Documents

Publication Publication Date Title
US8312440B2 (en) Method, computer program product, and hardware product for providing program individuality analysis for source code programs
Walkinshaw et al. Reverse engineering state machines by interactive grammar inference
US8621417B2 (en) Rule merging in system for monitoring adherence by developers to a software code development process
CN101377759A (en) Automatic interface test system
CN104965999B (en) The analysis joining method of a kind of short-and-medium genetic fragment order-checking and equipment
CN108536521A (en) Based on emulation platform offline environment checking method and device
CN114996126B (en) Vulnerability detection method and system for EOSIO intelligent contracts
CN111563041A (en) Test case on-demand accurate execution method
CN114844689A (en) Website logic vulnerability detection method and system based on finite-state machine
Li et al. Logtracker: Learning log revision behaviors proactively from software evolution history
CN106844219A (en) Using detection method and apply detection means
US20230185692A1 (en) Highly Tested Systems
CN117633808A (en) Method, processor and machine-readable storage medium for vulnerability detection
Hozano et al. Using developers' feedback to improve code smell detection
CN111833188A (en) Non-contact intellectual property changing method based on intelligent contract
CN116305247B (en) Sensitive information detection method and system for process data of vehicle-mounted application software
CN105608006B (en) A kind of program error detection method and system based on probabilistic model
CN114792006B (en) LSTM-based android cross-application collusion security analysis method and system
CN112015715A (en) Industrial Internet data management service testing method and system
CN115268847A (en) Block chain intelligent contract generation method and device and electronic equipment
CN114579809A (en) Event analysis method and device, electronic equipment and storage medium
CN114153746A (en) Intelligent contract testing method based on symbolic execution and fuzziness
CN113282504A (en) Incremental code coverage rate detection method and service development method and device
CN111934949A (en) Safety test system based on database injection test
US10417110B2 (en) Method for verifying traceability of first instructions in a procedural programming language generated from second instructions in a modelling language

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant