CN111898114A - Intelligent early warning type intellectual property monitoring management platform - Google Patents

Intelligent early warning type intellectual property monitoring management platform Download PDF

Info

Publication number
CN111898114A
CN111898114A CN202010679553.XA CN202010679553A CN111898114A CN 111898114 A CN111898114 A CN 111898114A CN 202010679553 A CN202010679553 A CN 202010679553A CN 111898114 A CN111898114 A CN 111898114A
Authority
CN
China
Prior art keywords
cloud computing
ccs
computing server
security authentication
intellectual property
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010679553.XA
Other languages
Chinese (zh)
Inventor
何燕军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yongheng Technology Co ltd
Original Assignee
Zhejiang Yongheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Yongheng Technology Co ltd filed Critical Zhejiang Yongheng Technology Co ltd
Priority to CN202010679553.XA priority Critical patent/CN111898114A/en
Publication of CN111898114A publication Critical patent/CN111898114A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of intellectual property monitoring and management, and discloses an intelligent early warning type intellectual property monitoring and management platform, which comprises: cloud computing server CCS (computer communications System) running intellectual property monitoring and management system softwareiCloud authentication server CAS running security authentication system softwareiCloud computing server CCS running with intelligent early warning system software and safety certification system softwarej(ii) a Cloud authentication server CASiThe security authentication system is used for operating the CCS of the cloud computing server with intelligent early warning system softwarejThe identity of the cloud computing server is subjected to security authentication, and only the cloud computing server CCSjPasses through the CASiThe security authentication system of (2) allows the cloud computing server CCSjAnd accessing the intellectual property monitoring and managing system. The invention solves the problems of intelligent early warning system and monitoring management system in the intellectual property monitoring management platformCommunication security problems.

Description

Intelligent early warning type intellectual property monitoring management platform
Technical Field
The invention relates to the technical field of intellectual property monitoring and management, in particular to an intelligent early warning type intellectual property monitoring and management platform.
Background
Under the background of the era of intellectual economy, with the innovation of technology, patent achievements are numerous, and intellectual property rights become the core competitiveness of enterprises, public institutions and colleges as an intangible asset. The high-speed development of intellectual property is very urgent to the requirement of modern management. The intellectual property monitoring management platform constructed by adopting the Internet plus technology can fundamentally overcome the defects of single management, one-sided management and the like of the traditional intellectual property, realize accurate monitoring management on the intellectual property, grasp the current situation of the intellectual property and promote innovation of the intellectual property.
The early warning of the abnormal state of the intellectual property can further promote the improvement of the actual monitoring and management level of the intellectual property, but the intelligent early warning system and the monitoring and management system are necessarily in communication connection, and under the system architecture, if an effective identity authentication mechanism is not adopted for the intelligent early warning system, the risk that a third-party substitute impersonates the intelligent early warning system and privately accesses the intellectual property monitoring and management system under an unauthorized illegal condition is undoubtedly increased.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides an intelligent early warning type intellectual property monitoring and managing platform, which is used for solving the communication safety problem of an intelligent early warning system and a monitoring and managing system in the intellectual property monitoring and managing platform.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
an intelligent early warning type intellectual property monitoring management platform, comprising: cloud computing server CCS (computer communications System) running intellectual property monitoring and management system softwareiCloud authentication server CAS running security authentication system softwareiCloud computing server CCS running with intelligent early warning system software and safety certification system softwarej
Cloud computing server CCSjCloud authentication server CAS on security authentication system through network communication equipmentiPerforming communication connection between them, cloud authentication server CASiThrough network communication equipment and cloud computing server CCSiCarry out communication connection between each other, and the cloud computing server CCSiThrough network communication equipment and cloud computing server CCSjPerforming communication connection between each other;
cloud authentication server CASiThe security authentication system of (1) to the cloud computing server CCSjThe identity of (2) is securely authenticated, and the authentication method comprises the following steps:
the method comprises the following steps: cloud computing server CCSjAt cloud authentication server CASiThe user registration is performed on the security authentication system, specifically:
s1, popping up a security authentication system on a registration page and performing with a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2, the security authentication system is in a binary system domain
Figure BDA0002585276600000021
On the selected curve Dp(a, b) in the curve Dp(a, b) randomly selecting a point g as a base point, and displaying the base point g in a dialog box, namely returning the base point g to the CCSj
S3, cloud computing server CCSjIn the binary field D2 nLast one private key kiComputing the public key Ki=kiX g, and the public key KiInputting the data into a dialog box, namely transmitting the data to a security authentication system;
step two: security authentication system to cloud computing server CCSjThe identity of the user is subjected to security authentication, and the specific authentication process is as follows:
s1, popping up a security authentication system on a verification page and a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2. cloud computing server CCSjIn the binary field
Figure BDA0002585276600000031
Random number m is selectediCalculate g1=miX g, let g1At curve DpOn (a, b), adding g1Inputting the data into a dialog box;
s3, the security authentication system is randomly generated in a binary system domain
Figure BDA0002585276600000032
Random number r ofiA random number riDisplayed in a dialog box, i.e. returned to the cloud computing server CCSj
S4, cloud computing server CCSjCalculating Q ═ mi+ri×kiInputting Q into the dialog box;
s5, the verification equation Q multiplied by g of the security authentication system is g1+ri×KiWhether the result is true or not;
if the equation Q × g is g1+ri×KiEstablishing, proving cloud computing server CCSjKnowing the private key, the security authentication system passes through the CCSjThe identity authentication of (1).
Further, the private key kiFor a unique legal certification key, for a cloud computing server CCSjOwned separately, i.e. the security authentication system does not know the private key ki
Further, the interactive communication dialog box has traceless communication function, that is, all interactive communication contents in the dialog box have no backup record.
Further, the cloud authentication server CASiThe security authentication system is used for operating the CCS of the cloud computing server with intelligent early warning system softwarejThe identity of the cloud computing server is subjected to security authentication, and only the cloud computing server CCSjPasses through the CASiThe security authentication system of (2) allows the cloud computing server CCSjAnd accessing the intellectual property monitoring and managing system.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
1. cloud authentication server CAS of the inventioniThe security authentication system is used for operating the CCS of the cloud computing server with intelligent early warning system softwarejThe identity of the cloud computing server is subjected to security authentication, and only the cloud computing server CCSjPasses through the CASiThe security authentication system of (2) allows the cloud computing server CCSjThe security authentication mechanism is connected into an intellectual property monitoring and management system, and not only is the third-party substitute prevented from impersonating the CCS of the cloud computing serverjPrivately accesses the intellectual property monitoring and management system under the unauthorized illegal condition, and improves the intellectual property monitoring and managementThe safety protection capability of the system obtains the guarantee of the CCS of the cloud computing serveriWith cloud computing server CCSjThe technical effect of secure communication between the two.
2. The invention relates to a cloud computing server CCS in a security authentication systemjAfter the identity is subjected to security authentication, the security authentication system only knows the CCS of the cloud computing serverjIs legitimate and does not know the cloud computing server CCSjThat is to say the cloud computing server CCSjThe identity security authentication is completed on the premise of not revealing the private key of the identity, and the authentication mode remarkably improves the CCS of the cloud computing serverjThe security performance of the identity authentication process of (1).
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An intelligent early warning type intellectual property monitoring management platform, comprising: cloud computing server CCS (computer communications System) running intellectual property monitoring and management system softwareiCloud authentication server CAS running security authentication system softwareiCloud computing server CCS running with intelligent early warning system software and safety certification system softwarej
Cloud computing server CCSjCloud authentication server CAS on security authentication system through network communication equipmentiPerforming communication connection between them, cloud authentication server CASiThrough network communication equipment and cloud computing server CCSiCarry out communication connection between each other, and the cloud computing server CCSiThrough network communication equipment and cloud computing server CCSjPerforming communication connection between each other;
smart pre-staging to prevent third party substitutes from impersonating operationsCloud computing server CCS of alarm system softwarejPrivate access runs on cloud computing server CCS under unauthorized illegal conditionsiIn the intellectual property monitoring and management system, the CAS is a cloud authentication serveriThe security authentication system is used for operating the CCS of the cloud computing server with intelligent early warning system softwarejThe identity of the cloud computing server is subjected to security authentication, and only the cloud computing server CCSjPasses through the CASiThe security authentication system of (2) allows the cloud computing server CCSjAccessing into an intellectual property monitoring and management system, otherwise, refusing the CCS of the cloud computing serverjWith cloud computing server CCSiCarrying out communication;
cloud authentication server CASiThe security authentication system of (1) to the cloud computing server CCSjThe identity of (2) is securely authenticated, and the authentication method comprises the following steps:
the method comprises the following steps: cloud computing server CCSjAt cloud authentication server CASiThe user registration is performed on the security authentication system, specifically:
s1, popping up a security authentication system on a registration page and performing with a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2, the security authentication system is in a binary system domain
Figure BDA0002585276600000051
On the selected curve Dp(a, b) in the curve Dp(a, b) randomly selecting a point g as a base point, and displaying the base point g in a dialog box, namely returning the base point g to the CCSj
S3, cloud computing server CCSjIn the binary field
Figure BDA0002585276600000061
Last one private key kiComputing the public key Ki=kiX g, and the public key KiInputting the data into a dialog box, namely transmitting the data to a security authentication system;
the private key kiAs a unique legal certification key, as a cloud meterComputation server CCSjOwned separately, i.e. the security authentication system does not know the private key ki
Step two: security authentication system to cloud computing server CCSjThe identity of the user is subjected to security authentication, and the specific authentication process is as follows:
s1, popping up a security authentication system on a verification page and a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2. cloud computing server CCSjIn the binary field
Figure BDA0002585276600000062
Random number m is selectediCalculate g1=miX g, let g1At curve DpOn (a, b), adding g1Inputting the data into a dialog box;
s3, the security authentication system is randomly generated in a binary system domain
Figure BDA0002585276600000063
Random number r ofiA random number riDisplayed in a dialog box, i.e. returned to the cloud computing server CCSj
S4, cloud computing server CCSjCalculating Q ═ mi+ri×kiInputting Q into the dialog box;
s5, if the equation Q multiplied by g is g1+ri×KiEstablishing, proving cloud computing server CCSjKnowing the private key, the security authentication system passes through the CCSjThe identity authentication of (2);
the safety authentication mechanism not only prevents a third-party substitute from impersonating a cloud computing server CCS running with intelligent early warning system softwarejPrivate access runs on cloud computing server CCS under unauthorized illegal conditionsiIn the intellectual property monitoring and management system, the safety protection capability of the intellectual property monitoring and management system is improved, and the CCS of the cloud computing server is ensurediWith cloud computing server CCSjThe technical effect of safe communication between the two devices;
at cloud authentication server CASiThe security authentication system of (1) to the cloud computing server CCSjAfter the identity is subjected to security authentication, the security authentication system only knows the CCS of the cloud computing serverjIs legitimate and does not know the cloud computing server CCSjIs a private key kiThat is to say the cloud computing server CCSjWithout revealing its private key kiOn the premise of finishing the safety authentication of the identity, the authentication mode obviously improves the CCS of the cloud computing serverjThe security performance of the identity authentication process of (1);
the interactive communication dialog box has traceless communication function, namely all interactive communication contents in the dialog box do not have any backup record.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (4)

1. The utility model provides an intelligence early warning formula intellectual property monitoring management platform which characterized in that includes: cloud computing server CCS (computer communications System) running intellectual property monitoring and management system softwareiCloud authentication server CAS running security authentication system softwareiCloud computing server CCS running with intelligent early warning system software and safety certification system softwarej
Cloud computing server CCSjCloud authentication server CAS on security authentication system through network communication equipmentiPerforming communication connection between them, cloud authentication server CASiThrough network communication equipment and cloud computing server CCSiCarry out communication connection between each other, and the cloud computing server CCSiThrough network communication equipment and cloud computing server CCSjPerforming communication connection between each other;
cloud authentication server CASiThe security authentication system of (2) is in charge of cloudComputation server CCSjThe identity of (2) is securely authenticated, and the authentication method comprises the following steps:
the method comprises the following steps: cloud computing server CCSjAt cloud authentication server CASiThe user registration is performed on the security authentication system, specifically:
s1, popping up a security authentication system on a registration page and performing with a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2, the security authentication system is in a binary system domain
Figure FDA0002585276590000011
On the selected curve Dp(a, b) in the curve Dp(a, b) randomly selecting a point g as a base point, and displaying the base point g in a dialog box, namely returning the base point g to the CCSj
S3, cloud computing server CCSjIn the binary field
Figure FDA0002585276590000012
Last one private key kiComputing the public key Ki=kiX g, and the public key KiInputting the data into a dialog box, namely transmitting the data to a security authentication system;
step two: security authentication system to cloud computing server CCSjThe identity of the user is subjected to security authentication, and the specific authentication process is as follows:
s1, popping up a security authentication system on a verification page and a Cloud Computing Server (CCS)jA dialog box for interactive communication;
s2. cloud computing server CCSjIn the binary field
Figure FDA0002585276590000021
Random number m is selectediCalculate g1=miX g, let g1At curve DpOn (a, b), adding g1Inputting the data into a dialog box;
s3, the security authentication system is randomly generated in a binary system domain
Figure FDA0002585276590000022
Random number r ofiA random number riDisplayed in a dialog box, i.e. returned to the cloud computing server CCSj
S4, cloud computing server CCSjCalculating Q ═ mi+ri×kiInputting Q into the dialog box;
s5, the verification equation Q multiplied by g of the security authentication system is g1+ri×KiWhether the result is true or not;
if the equation Q × g is g1+ri×KiEstablishing, proving cloud computing server CCSjKnowing the private key, the security authentication system passes through the CCSjThe identity authentication of (1).
2. The intelligent pre-warning intellectual property monitoring and management platform as claimed in claim 1, wherein the private key k isiFor a unique legal certification key, for a cloud computing server CCSjOwned separately, i.e. the security authentication system does not know the private key ki
3. The intelligent pre-warning intellectual property monitoring and management platform according to claim 2, wherein the interactive communication dialog box has traceless communication function, that is, all interactive communication contents in the dialog box have no backup record.
4. The intelligent pre-warning intellectual property monitoring and management platform as claimed in claim 3, wherein the cloud authentication server CAS is configured to perform a CAS operationiThe security authentication system is used for operating the CCS of the cloud computing server with intelligent early warning system softwarejThe identity of the cloud computing server is subjected to security authentication, and only the cloud computing server CCSjPasses through the CASiThe security authentication system of (2) allows the cloud computing server CCSjAnd accessing the intellectual property monitoring and managing system.
CN202010679553.XA 2020-07-15 2020-07-15 Intelligent early warning type intellectual property monitoring management platform Pending CN111898114A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010679553.XA CN111898114A (en) 2020-07-15 2020-07-15 Intelligent early warning type intellectual property monitoring management platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010679553.XA CN111898114A (en) 2020-07-15 2020-07-15 Intelligent early warning type intellectual property monitoring management platform

Publications (1)

Publication Number Publication Date
CN111898114A true CN111898114A (en) 2020-11-06

Family

ID=73192720

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010679553.XA Pending CN111898114A (en) 2020-07-15 2020-07-15 Intelligent early warning type intellectual property monitoring management platform

Country Status (1)

Country Link
CN (1) CN111898114A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112565241A (en) * 2020-12-01 2021-03-26 杭州思源信息技术股份有限公司 Community Internet of things perception system based on smart skynet and construction method
CN112865974A (en) * 2021-01-20 2021-05-28 杨雯雯 Safety protection system based on edge computing access equipment
CN112860934A (en) * 2021-01-29 2021-05-28 浙江知多多网络科技有限公司 Trademark retrieval system based on machine learning
CN113610433A (en) * 2021-08-23 2021-11-05 浙江九烁光电工程技术有限公司 Smart city lighting system lean management system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095459A (en) * 2013-01-17 2013-05-08 广东数字证书认证中心有限公司 Operation method, device and server of modular exponentiation in public key cryptosystem
CN103152178A (en) * 2013-02-04 2013-06-12 浪潮(北京)电子信息产业有限公司 Cloud computing verification method and system
CN108933761A (en) * 2017-05-25 2018-12-04 深圳市鑫科蓝电子科技有限公司 A kind of the control flow encryption method and system of Intelligent hardware product
CN111222176A (en) * 2020-01-08 2020-06-02 中国人民解放军国防科技大学 Block chain-based cloud storage possession proving method, system and medium
CN111259352A (en) * 2020-01-13 2020-06-09 熊国华 Cloud storage data access control system based on zero-knowledge proof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095459A (en) * 2013-01-17 2013-05-08 广东数字证书认证中心有限公司 Operation method, device and server of modular exponentiation in public key cryptosystem
CN103152178A (en) * 2013-02-04 2013-06-12 浪潮(北京)电子信息产业有限公司 Cloud computing verification method and system
CN108933761A (en) * 2017-05-25 2018-12-04 深圳市鑫科蓝电子科技有限公司 A kind of the control flow encryption method and system of Intelligent hardware product
CN111222176A (en) * 2020-01-08 2020-06-02 中国人民解放军国防科技大学 Block chain-based cloud storage possession proving method, system and medium
CN111259352A (en) * 2020-01-13 2020-06-09 熊国华 Cloud storage data access control system based on zero-knowledge proof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112565241A (en) * 2020-12-01 2021-03-26 杭州思源信息技术股份有限公司 Community Internet of things perception system based on smart skynet and construction method
CN112865974A (en) * 2021-01-20 2021-05-28 杨雯雯 Safety protection system based on edge computing access equipment
CN112860934A (en) * 2021-01-29 2021-05-28 浙江知多多网络科技有限公司 Trademark retrieval system based on machine learning
CN113610433A (en) * 2021-08-23 2021-11-05 浙江九烁光电工程技术有限公司 Smart city lighting system lean management system and method

Similar Documents

Publication Publication Date Title
CN111898114A (en) Intelligent early warning type intellectual property monitoring management platform
CN107682331B (en) Block chain-based Internet of things identity authentication method
WO2018032372A1 (en) Trusted power grid transaction platform based on block chain technology
CN114915476B (en) Attack deduction chart generation method and system based on network security assessment process
WO2014004412A1 (en) Identity risk score generation and implementation
CN103259663A (en) User unified authentication method in cloud computing environment
CN102223420A (en) Digital content distribution method for multimedia social network
CN106899561B (en) TNC (network node controller) authority control method and system based on ACL (Access control List)
CN111294796A (en) Smart phone login management system based on zero-knowledge proof
CN111901118A (en) Port enterprise security authentication system based on mobile internet
Lim et al. Chain veri: blockchain-based firmware verification system for IoT environment
WO2019052469A1 (en) Network request processing method and apparatus, electronic device, and storage medium
CN111241562A (en) Purchase, sales and inventory management system based on micro-service architecture
CN118300814A (en) Cross-platform login method and system
CN108347426B (en) Teaching system information security management system based on big data and access method
Liu et al. A blockchain-based verification for sharing data securely
CN105790935A (en) Independent-software-and-hardware-technology-based trusted authentication server
CN112035853B (en) Storage data access control system based on enterprise cloud disk
CN111600838A (en) Authority management system based on network database
Ziyi International Law Protection of Cross‐Border Transmission of Personal Information Based on Cloud Computing and Big Data
CN111563274B (en) Security guarantee system based on government affair big data
CN111581610A (en) Login management system based on database security
Benjula Anbu Malar et al. A distributed collaborative trust service recommender system for secure cloud computing
CN113068188A (en) External user identity authentication system based on wireless sensor node
CN111898113A (en) Intelligent interactive enterprise knowledge management platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201106

RJ01 Rejection of invention patent application after publication