CN113112262B - Digital asset circulation method corresponding to intellectual property - Google Patents

Digital asset circulation method corresponding to intellectual property Download PDF

Info

Publication number
CN113112262B
CN113112262B CN202110483419.7A CN202110483419A CN113112262B CN 113112262 B CN113112262 B CN 113112262B CN 202110483419 A CN202110483419 A CN 202110483419A CN 113112262 B CN113112262 B CN 113112262B
Authority
CN
China
Prior art keywords
intellectual property
authorized party
digital asset
chain
asset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110483419.7A
Other languages
Chinese (zh)
Other versions
CN113112262A (en
Inventor
王吉元
夏凝
王一宝
张如意
陈刚
刘文慧
熊漪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Ant Blockchain Technology Shanghai Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Ant Blockchain Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd, Ant Blockchain Technology Shanghai Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202110483419.7A priority Critical patent/CN113112262B/en
Publication of CN113112262A publication Critical patent/CN113112262A/en
Application granted granted Critical
Publication of CN113112262B publication Critical patent/CN113112262B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Bioethics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Data Mining & Analysis (AREA)
  • Primary Health Care (AREA)
  • Development Economics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

One or more embodiments of the present disclosure provide a digital asset circulation method corresponding to intellectual property rights. An intellectual property right usage authorization system is established based on a blockchain network, one-time usage rights of the intellectual property right under the chain are anchored to one digital asset on the chain, and an authorized party needs to acquire opportunities of legally using one-time intellectual property right in a way of consuming one digital asset associated with the authorized party on the chain. The authorized party may further transfer one or more unconsumed digital assets (spent digital assets being inactive) associated with itself on the chain to the transferee.

Description

Digital asset circulation method corresponding to intellectual property
Technical Field
One or more embodiments of the present disclosure relate to the field of terminal technologies, and in particular, to a digital asset circulation method corresponding to intellectual property rights.
Background
A party possessing intellectual property rights (an authorized party) may authorize a person or an organization (an authorized party) to use the intellectual property rights in practice. For example, a party possessing cartoon copyrights may authorize a coffee cup manufacturer to print a cartoon character in a cartoon on a coffee cup that it makes. For another example, a party possessing a drug patent may authorize a pharmaceutical factory to produce a corresponding drug.
In practice, authorized parties sometimes transfer at least some of the usage rights of the intellectual property rights further to other individuals or organizations (transferees), however, in such complex transfer relationships, there are trust issues between the authorized party, and the transferee.
Disclosure of Invention
In view of this, one or more embodiments of the present description provide a digital asset circulation method corresponding to intellectual property rights.
In order to achieve the above object, one or more embodiments of the present disclosure provide the following technical solutions:
according to a first aspect of one or more embodiments of the present disclosure, a digital asset circulation method corresponding to intellectual property rights is provided, including:
the authorized party client invokes the intelligent contract in the blockchain network to perform asset application steps: determining application information appointed by an authorized party, and triggering event information containing the application information; the application information specifies intellectual property rights that are authorized for use;
at least one authorizing party client side calls an intelligent contract in the blockchain network to execute the issuing step and the associating step after monitoring the event message containing the application information; the issuing step includes: issuing at least one digital asset corresponding to the intellectual property; the step of associating includes: creating an association between the authorized party and the at least one digital asset; wherein the intellectual property right is legally used once in a manner of consuming one digital asset issued on a chain;
The authorized party client invokes an intelligent contract in a blockchain network to perform an asset transfer step: determining at least one unconsumed digital asset designated by the authorized party with which it is associated on a chain, and determining at least one transferee designated by the authorized party; an association is created between the at least one unconsumed digital asset and the at least one transferee.
According to a second aspect of one or more embodiments of the present specification, there is provided a digital asset circulation system corresponding to intellectual property rights, comprising: the system comprises a blockchain network, an authorized party client and at least one authorized party client;
the authorized party client side invokes an intelligent contract in the blockchain network to execute asset application steps: determining application information appointed by an authorized party, and triggering event information containing the application information; the application information specifies intellectual property rights that are authorized for use;
at least one authorizer client, after monitoring the event message containing the application information, invoking an intelligent contract in the blockchain network to execute the issuing step and the associating step; the issuing step includes: issuing at least one digital asset corresponding to the intellectual property; the step of associating includes: creating an association between the authorized party and the at least one digital asset; wherein the intellectual property right is legally used once in a manner of consuming one digital asset issued on a chain;
The authorized party client also invokes an intelligent contract in the blockchain network to perform an asset transfer step: determining at least one unconsumed digital asset designated by the authorized party with which it is associated on a chain, and determining at least one transferee designated by the authorized party; an association is created between the at least one unconsumed digital asset and the at least one transferee.
An intellectual property right usage authorization system is established based on a blockchain network, one-time usage rights of the intellectual property right under the chain are anchored to one digital asset on the chain, and an authorized party needs to acquire opportunities of legally using one-time intellectual property right in a way of consuming one digital asset associated with the authorized party on the chain. The authorized party may further transfer one or more unconsumed digital assets (spent digital assets being inactive) associated with itself on the chain to the transferee.
Therefore, the circulation path of the use right of the intellectual property can be clearly stored on the chain, and the authorized party can conveniently trace back.
Drawings
FIG. 1 is a schematic diagram of creating a smart contract provided by an exemplary embodiment.
FIG. 2 is a schematic diagram of a call to a smart contract provided by an exemplary embodiment.
FIG. 3 is a schematic diagram of creating and invoking a smart contract provided by an exemplary embodiment.
Fig. 4 is a flow chart of a payment method for intellectual property rights usage authorization provided in an embodiment of the present disclosure.
Fig. 5 is a flow chart of a digital asset circulation method corresponding to intellectual property rights provided in the present specification.
Fig. 6 is a flow chart of a digital asset application method corresponding to intellectual property rights provided in the present specification.
Fig. 7 is a flow chart of another digital asset application method corresponding to the intellectual property rights provided in the present specification.
Fig. 8 is a flow chart of a method for authorizing the manufacture of an intellectual property product provided in the present specification.
Fig. 9 is a schematic diagram of a blockchain-based IP brand usage authorization system provided herein.
Fig. 10 is a schematic flow chart of a block chain based IP brand usage authorization provided in the present specification.
Fig. 11 is a schematic flow chart of the charging of the on-chain account by the IP merchant based on the off-chain account provided in the present specification.
Fig. 12 is a schematic flow chart of an IP merchant purchasing IP brand usage rights on a chain provided in the present specification.
Fig. 13 is a schematic flow chart of the IP copyright party extracting from the chain provided in the present specification.
Fig. 14 and 15 are schematic diagrams of NFT flow-through provided in the present specification.
Fig. 16 is a schematic diagram of NFT secondary flow provided in the present specification.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of the present specification. Rather, they are merely examples of apparatus and methods consistent with aspects of one or more embodiments of the present description as detailed in the accompanying claims.
It should be noted that: in other embodiments, the steps of the corresponding method are not necessarily performed in the order shown and described in this specification. In some other embodiments, the method may include more or fewer steps than described in this specification. Furthermore, individual steps described in this specification, in other embodiments, may be described as being split into multiple steps; while various steps described in this specification may be combined into a single step in other embodiments.
Currently, a party possessing intellectual property rights (an authorizer) may authorize a person or an organization (an authorized party) to use the intellectual property rights in practice. For example, a party possessing cartoon copyrights may authorize a coffee cup manufacturer to print a cartoon character in a cartoon on a coffee cup that it makes. For another example, a party possessing a drug patent may authorize a pharmaceutical factory to produce a corresponding drug.
In practice, there are several trust challenges in authorizing an intellectual property right to an authorized party for use by an authorized party:
1. the authorizer often achieves the limitation terms related to the use of the intellectual property with the authorizer before the use of the intellectual property is authorized to the authorizer, and the limitation terms can be used for limiting the use times of the intellectual property by the authorizer or limiting the use time of the intellectual property by the authorizer.
However, it is difficult for the authorized party to trace back the implementation of the terms of the restrictions. The authorized party may not adhere to the terms of the restrictions, overuse the intellectual property or continue to use the intellectual property outside of the period of use. Even if the authorized party knows that there is a behavior that does not adhere to the restriction terms, because the intellectual property is intangible and repeatable, it is difficult for the authorized party to specifically distinguish which usage behavior of the authorized party is legal and which usage behavior is illegal, which means that the authorized party can obtain clear evidence that the authorized party does not adhere to the restriction terms.
2. The authorized party often needs to pay the authorizing party for the use of the intellectual property. However, since intellectual property rights are intangible, it is difficult in practice to explicitly relate the payment behavior of an authorized party to the intellectual property right itself. That is, even if the authorized party receives a funds from the authorized party, the authorized party may not acknowledge that the funds are the use fee of the intellectual property rights and repudiate the funds.
3. The authorized party may further transfer at least part of the intellectual property rights to other individuals or institutions (transferees), however, in such complex circulation relationships, it is difficult for the authorized party to trace the circulation path, and control over the own intellectual property rights is lost.
4. In practice, products manufactured using intellectual property are often referred to as intellectual property products, and an authorized party often makes a contract with an authorized party in advance regarding what intellectual property products can be manufactured, and the authorized party wishes to trace back which intellectual property products the authorized party manufactured using the intellectual property. Therefore, how to prevent the authorized party from abusing the intellectual property rights for product manufacturing is a problem to be solved.
Aiming at the trust problems in the 4 aspects, the specification respectively provides a plurality of technical schemes realized based on the block chain technology. It should be noted that, these technical schemes may be arbitrarily combined into new technical schemes, and the combined new technical schemes should be within the scope described in the present specification.
Blockchain techniques are described herein.
Blockchains are generally divided into three types: public chains (Public Blockchain), private chains (Private Blockchain) and federated chains (Consortium Blockchain). In addition, there are many types of combinations, such as different combinations of private chain+federation chain, federation chain+public chain, and the like. Among them, the highest degree of decentralization is the public chain. The public chain is represented by bitcoin and ethernet, and participants joining the public chain can read data records on the chain, participate in transactions, compete for accounting rights of new blocks, and the like. Moreover, each participant (i.e., node) is free to join and leave the network and perform related operations. The private chain is the opposite, the write rights of the network are controlled by an organization or organization, and the data read rights are specified by the organization. In short, the private chain may be a weakly centralized system with few and strict restrictions on participating nodes. This type of blockchain is more suitable for use within a particular organization. The alliance chain is a block chain between public and private chains, and can realize 'partial decentralization'. Each node in the federation chain typically has an entity organization or organization corresponding thereto; participants join the network by authorization and form a benefit-related federation, collectively maintaining blockchain operation.
Whether public, private, or federation, it is possible to provide the functionality of a smart contract. Intelligent contracts on blockchains are contracts on blockchain systems that can be executed by transaction triggers. The smart contracts may be defined in the form of codes.
Taking the ethernet as an example, support users create and invoke some complex logic in the ethernet network, which is the biggest challenge for ethernet to distinguish from the bitcoin blockchain technology. At the heart of the ethernet as a programmable blockchain is an Ethernet Virtual Machine (EVM), which can be run by each ethernet node. The EVM is a graphics-complete virtual machine, meaning that various complex logic can be implemented by it. The user's issuing and invoking of the smart contract in the ethernet is running on the EVM. In practice, the virtual machine runs directly on virtual machine code (virtual machine bytecode, hereinafter "bytecode"). The intelligent contracts deployed on the blockchain may be in the form of bytecodes.
For example, as shown in fig. 1, bob sends a transaction containing information to create a smart contract to the ethernet network, the EVM of node 1 may execute the transaction and generate the corresponding contract instance. "0x6f8ae93 …" in fig. 1 represents the address of this contract, the data field of the transaction may hold byte code, and the to field of the transaction is empty. After agreement is reached between nodes through the consensus mechanism, this contract is successfully created and can be invoked in a subsequent process. After the contract is created, a contract account corresponding to the intelligent contract appears on the blockchain, and the contract account is stored with a specific address. The behavior of the smart contract is controlled by the contract code. In other words, the smart contract causes a virtual account to be generated on the blockchain that includes a contract code and an account store (Storage).
Still taking the ethernet as an example, as shown in fig. 2, bob sends a transaction for invoking a smart contract to the ethernet network, the EVM of a node may execute the transaction and generate the corresponding contract instance. In fig. 2, the from field of the transaction is the address of the account of the transaction initiator (i.e. Bob), the "0x6f8ae93 …" in the to field represents the address of the called smart contract, the value field is the value of the ethernet in the ethernet, and the data field of the transaction holds the method and parameters for calling the smart contract. The value of the policy may change after invoking the smart contract. Subsequently, a client may view the current value of the policy through a blockchain node (e.g., node 6 in FIG. 2). The intelligent contract is independently executed at each node in the blockchain network in a specified mode, all execution records and data are stored on the blockchain, so that when the transaction is completed, transaction credentials which cannot be tampered and cannot be lost are stored on the blockchain.
A schematic diagram of creating a smart contract and invoking a smart contract is shown in fig. 3. To create an intelligent contract in the ethernet, the intelligent contract needs to be written, changed into byte codes, deployed to a blockchain and the like. The intelligent contract is called in the Ethernet, a transaction pointing to the intelligent contract address is initiated, and intelligent contract codes are distributed and run in the virtual machine of each node in the Ethernet network.
It should be noted that, in addition to the smart contracts that can be created by the user, the smart contracts can also be set by the system in the creation block. Such contracts are commonly referred to as an opening contract. In general, some blockchain networks may be configured with data structures, parameters, attributes, and methods in the creating contracts. In addition, an account with system administrator rights may create a system level contract, or modify a system level contract (simply referred to as a system contract). In addition, different blockchain networks may employ various virtual machines in addition to the EVM in the ethernet, which is not limited herein.
After executing a transaction invoking the smart contract, a node in the blockchain network generates a corresponding receipt (receipt) for recording information related to executing the smart contract. In this way, information about the result of contract execution can be obtained by querying the receipt of the transaction. The contract execution result may be represented as an event (event) in a receipt. The messaging mechanism may implement messaging through events in the receipt to trigger a blockchain node or node device deploying the blockchain node to perform a corresponding process.
The structure of the event may be, for example:
Event:
[topic][data]
[topic][data]
......
in the above examples, the number of events may be one or more; wherein each event includes fields such as a theme (topic) and data (data), respectively. The blockchain node or the node device deploying the blockchain node may perform a preset process by listening to the topic of the event, thereby performing a preset process in case of listening to the predefined topic, or read the related content from the data field of the corresponding event, and may perform a preset process based on the read content.
Blockchain technology differs from one of the decentralized features of conventional technology in that accounting is performed on individual nodes, otherwise known as distributed accounting, rather than conventional centralized accounting. The blockchain system is to be a hard-to-break, public, untampered, decentralised, honest and trusted system for data records, and needs to be secure, clear and irreversible for distributed data records in as short a time as possible. In different types of blockchain networks, in order to keep account books consistent among the nodes of each record account book, a consensus algorithm is generally adopted to ensure that the above-mentioned consensus mechanism is adopted. After a node (e.g., a unique node) creates a block, if the created block is approved by other nodes, the other nodes record the same block. The process that the generated block is approved by other nodes is a consensus mechanism. The consensus mechanism is a mechanism that the blockchain node achieves the consensus of the whole network about the blockinformation (or blockdata), and can ensure that the latest block is accurately added to the blockchain. The consensus mechanisms of the current mainstream include: proof of Work (POW), proof of equity (POS), proof of commission (Delegated Proof of Stake, DPOS), practical bayer fault tolerance (Practical Byzantine Fault Tolerance, PBFT) algorithm, honeybadgenbft algorithm, etc.
Some concepts will be described herein as will be used later.
Intellectual property rights: typically including copyrights, patent rights, trademark rights, service marks, vendor names, origin names, plant new species rights, integrated circuit layout design proprietary rights, and the like. Intellectual property has intangibility and reusability, and all the intellectual property can authorize other people to use the intellectual property.
The authorized party: typically the owner of the intellectual property right. The authorizer may obtain the benefit by granting intellectual property rights to others. In practice, an authority of intellectual property may have more than one party.
The authorized party: and the party with the intellectual property right authorization relationship with the authorizer directly cooperates with the authorizer for using and authorizing the intellectual property right.
The transferee: at least part of the use rights of the intellectual property rights are secondarily streamed from the authorized party to the party.
The re-transferee: at least part of the intellectual property rights are streamed again from the transferee to the party. It will be appreciated that the usage rights for intellectual property may be continuously circulated a number of times to form a circulation chain.
Client side: refers to clients of a blockchain network, also known as blockchain clients. The blockchain client may or may not be a node of a blockchain network (as in the case of a public chain network). The blockchain client may initiate a transaction to the blockchain network, invoking the intelligent contract in the blockchain network through the transaction, such that the blockchain network performs the business-related steps of the transaction request based on the code logic described in the invoked intelligent contract. The client of the authorized party is a client of the authorized party, the client of the transfered party is a client of the transfered party, and the client of the transfered party is a client of the transfered party once.
Digital asset: is a data structure defined by intelligent contracts in a blockchain network based on some digital asset protocol. The digital assets on the chain are mappings of objects under the chain on the chain, the digital assets having uniqueness and an anchoring relationship with the objects under the chain. Alternatively, digital assets may be defined using the digital asset protocol (ERC 721), which is currently popular, and such digital assets are commonly referred to as Non-homogeneous tokens (NFTs). In addition, other digital asset protocols may be used to define digital assets.
Several technical solutions implemented based on blockchain technology are described below.
The present specification first provides an intellectual property rights usage authorization infrastructure, as follows:
in one aspect, an authorized party client invokes an intelligent contract in a blockchain network to perform asset application steps: determining application information appointed by an authorized party, and triggering event information containing the application information; the application information specifies the intellectual property rights that are authorized for use.
On the other hand, after at least one authorized party client monitors the event message containing the application information, calling an intelligent contract in the blockchain network to execute the issuing step and the associating step; the issuing step includes: issuing at least one digital asset corresponding to the intellectual property; the step of associating includes: an association between the authorized party and the at least one digital asset is created.
Thus, a principal under the chain having access to the intellectual property (either an authorized party or an transferee to whom the authorized party transfers at least part of the intellectual property's usage rights) needs to use the intellectual property once legally in a manner that consumes one digital asset issued on the chain, leaving a record on the chain of the legal use of the intellectual property once, facilitating traceability by the authorized party. Specifically, the authorized party may initiate a transaction to the blockchain for consuming one or more digital assets, the transaction invoking an intelligent contract to place the digital asset specified by the transaction in a consumed state from an unconsumed state after determining that the digital asset specified by the transaction has a chain-link association with the authorized party and has not been consumed, indicating that the intellectual property usage opportunity anchored by the digital asset has been achieved.
By "legal use" is meant that the usage behavior complies with the usage restriction terms agreed upon by the authorized party and the authorizing party. In practice, if the authorized party finds that the one-time use behavior of the authorized party is not recorded on the chain by consuming a digital asset, the one-time use behavior may be deemed illegal.
As used herein, "consuming" digital assets is understood to mean that each digital asset can only be called once, and once called once by its associated principal, is equivalent to being "consumed" and no longer valid.
In practice, multiple authorizers may share the same intellectual property, in which case the multiple authorizers are required to make decisions based on some decision mechanism in determining whether to authorize the intellectual property to the authorized party. For example, a vote may be made between the plurality of authorized parties, each of which submits a signature of the vote to the smart contract, which performs statistics to determine whether to authorize. That is, the smart contract needs to gather signatures of a specified number of the plurality of authorizers before the issuing step and the associating step can be performed.
Further, in actual application, the authorized party may first request the authorized party to obtain the right to use the intellectual property rights, and then further apply the authorized party to issue a number of digital assets anchoring the single use behavior on the chain based on the right to use. Specifically, the above basic scheme may further include:
in one aspect, an authorized party client invokes an intelligent contract in a blockchain network to perform an authorization request step: determining order information designated by an authorized party, and triggering event messages containing the order information; the order information specifies the intellectual property rights requested for authorized use. The authorization request step precedes the asset application step described above.
On the other hand, after at least one authorized party client monitors the event message containing the order information, calling an intelligent contract in the blockchain network to execute an order confirmation step; the order confirmation step includes: an order is created based on the order information.
Similarly, if there are multiple authorizers, the intelligent contract needs to gather signatures of a specified number of the plurality of authorizers before the order validation step can be performed.
Further, in practical applications, intellectual property corresponds to various usage forms. For example, the plurality of usage forms corresponding to the copyrights of a certain animation film may be a plurality of copyrighted materials (e.g., different animation characters); the various usage patterns corresponding to a particular patent right may include in-production usage, in-sales usage, etc.
Specifically, the step of the authorized party client invoking intelligent contract execution in the blockchain network further includes the step of using the morphology request. The usage modality requesting step precedes the asset application step. The usage pattern request step may be to determine usage pattern information specified by the authorized party and trigger an event message containing the usage pattern information. Wherein the usage pattern information specifies at least one usage pattern. The step of at least one authorizer client, after monitoring for an event message containing the order information, may invoke execution of a smart contract in the blockchain network further includes using a morphology validation step. The usage pattern confirmation step may be to add the usage pattern information to the order.
In addition, the usage modality information may be added to the order in a case where the number of authorized party clients that invoke the intelligent contract in the blockchain network to perform the usage modality confirmation step is not less than a specified number. In this context, only one smart contract may be deployed in a blockchain network, which is used to perform various steps.
In addition, more than one intelligent contract may be deployed in a blockchain network that shares execution of various steps. In this case, when a certain smart contract performs the step, if the function of other smart contracts is needed, other smart contracts can be called to perform corresponding processing in a calling manner between contracts, and the results returned by other smart contracts are obtained.
In addition, where more than one step is performed by invoking an intelligent contract in a blockchain network, the steps may be performed by invoking the trigger once or multiple times. For example, the authorizer client invoking the intelligent contract in the blockchain network to perform the issuing step and the associating step may be that the authorizer client submits a transaction invoking the intelligent contract to the blockchain network so that both the issuing step and the associating step are performed; or the authorizing party client submits a transaction for calling the intelligent contract to the blockchain network firstly, so that the issuing step is executed firstly, and then the authorizing party client submits another transaction for calling the intelligent contract to the blockchain network, so that the association step is executed again.
In summary, throughout the description herein, "invoking a smart contract in a blockchain network to perform at least one step" may include a variety of situations, may invoke more than one step in a blockchain network, may invoke more than one smart contract in a blockchain network to perform one step, may invoke more than one smart contract in a blockchain network to perform more than one step, may invoke one smart contract in a blockchain network to perform one step, and so on.
On the basis of the basic scheme, a plurality of more specific technical schemes are described below with reference to the accompanying drawings.
Fig. 4 is a flowchart of a payment method for intellectual property rights usage authorization provided in an embodiment of the present disclosure, including:
s400: the authorized party client invokes the intelligent contract in the blockchain network to perform the authorization request step.
In the method shown in fig. 4, it is necessary to pre-freeze at least part of the under-link balance in the under-link account of the authorized party, and create an on-link balance for the on-link account of the authorized party that matches the at least part of the under-link balance.
That is, at least a portion of the under-link balance in the under-link account of the authorized party is mapped to the on-link balance of the on-link account of the authorized party. The purpose of this is to have the virtual resources paid by the authorized party to purchase intellectual property rights on the chain have a corresponding real value.
In a specific implementation, the under-chain account manager may interface with the blockchain network manager, the authorized party requests the under-chain account manager to freeze at least a portion of the under-chain balance in its under-chain account, and then the under-chain account manager notifies the blockchain network manager that the blockchain network manager submits a transaction to the blockchain network for recharging the on-chain account of the authorized party, and the on-chain balance matched with the at least a portion of the under-chain balance is recharged to the on-chain account of the authorized party.
The balance on the chain, which is matched with at least part of the balance under the chain, can be equal in amount or can be exchanged according to a certain proportion.
The data structure of the authorized party's on-chain account typically includes account identification, on-chain balance, anchor currency (e.g., RMB under the anchor chain), authorized party information (e.g., KYC information).
In addition, the authorizer may have an on-chain account, but the authorizer's on-chain account does not directly receive a transfer of the authorizer's on-chain account. In another embodiment, the balance may not be set for the on-chain account of the authorizer, which typically includes account identification, authorizer information (e.g., KYC information, license information, legal person information, etc.).
In the method shown in fig. 4, the authorization request step is performed as follows: determining order information designated by an authorized party, and triggering event messages containing the order information; the order information specifies intellectual property rights and usage fees for which authorization is requested.
S402: and after the at least one authorized party client monitors the event message containing the order information, calling an intelligent contract in the blockchain network to execute an order confirmation step and an order proposal step.
The order confirmation step is as follows: creating an order based on the order information and deducting the usage charge from the on-chain balance of the authorized party. Further, an order may be created based on the order information if the number of authorizer clients invoking the intelligent contract in the blockchain network to perform the order confirmation step is not less than a specified number.
The data structure of the order typically includes authorized party account information, usage fees, intellectual property identification, anchor currencies, types of intellectual property usage restrictions (e.g., usage times restrictions, usage period restrictions, etc.), status information (whether or not to present), and the like.
The order proposal steps are as follows: triggering an event message requesting that the order be placed. Further, an event message requesting that the order be placed may be triggered if the number of authorizer clients invoking the intelligent contract in the blockchain network to perform the order-placement step is not less than a specified number.
In addition, in the order proposing step, the state of the order can be changed from unrepresentative to proposed.
S404: after determining that the order is requested to be placed, the under-chain account manager device thaws the under-chain balance matched with the authorized expense in the under-chain account of the authorized party, and transfers the under-chain balance to the under-chain account of the at least one authorized party.
When there are a plurality of authorizers, the authorized fees are generally divided according to a certain proportion and then transferred to the under-chain accounts of the authorizers respectively.
In some embodiments of the method of fig. 4, the under-chain account manager device may have a client of the blockchain network, in which case the under-chain manager device may directly monitor from the blockchain network for an event message requesting that the order be placed, and in response to the event message, defrost the under-chain balance in the under-chain account of the authorized party that matches the authorization cost, and transfer to the under-chain account of the at least one authorized party.
In other embodiments, the under-chain account manager does not own clients of the blockchain network. In this case, the under-chain manager device needs to interface with clients in the blockchain network (e.g., manager clients of the blockchain network). The link-down account manager device determines that the order is requested to be placed, in fact, the link-down account manager device receives a notification sent by a client of the blockchain network according to an event message that the client monitors that the order is requested to be placed, and determines that the order is requested to be placed in response to the received notification.
By the method shown in fig. 4, an intellectual property right use authorization system is established based on a blockchain network, and an authorized party needs to map at least part of the under-chain balance in the own under-chain account to the on-chain balance in the on-chain account, and purchase the right to use the intellectual property right using the on-chain balance. The authorized party may make an order request through an intelligent contract in the blockchain network, the order request carrying order information specifying the intellectual property rights and usage fees for which authorization is requested. The intelligent contract triggers the order information in the form of event information, and after each authority client of the intellectual property monitors the order information, the client decides whether to authorize (in the case of a plurality of authorities, each authority can call the intelligent contract to vote, the intelligent contract counts voting results), and if each authority decides to authorize, the intelligent contract can create an order according to the order information and deduct the use expense from the balance on the chain of the authorized party. In this way, the order of the authorized party for the use of the intellectual property rights is verified on the chain, and the use fee is automatically deducted by the intelligent contract and the paid use fee is recorded in the order (corresponding to being locked in the order), so that the association between the use fee paid by the authorized party and the intellectual property rights can be clarified.
The authorizers may perform the order raising step at any time by means of intelligent contracts in the blockchain network, i.e. raising the usage charges locked in the order, triggering the transfer of the usage charges from the under-chain accounts of the authorizers to the under-chain accounts of the authorizers. Therefore, the order proposal record of the authorized party can be stored in the chain and cannot be repudiated, and meanwhile, the financial supervision and management institution can conveniently supervise the account entering of the authorized party by taking the order proposal record as a trusted basis.
Fig. 5 is a flow chart of a digital asset circulation method corresponding to intellectual property provided in the present specification, including:
s500: the authorized party client invokes the intelligent contract in the blockchain network to perform the asset application step.
The asset application steps in the method shown in fig. 5 are: determining application information appointed by an authorized party, and triggering event information containing the application information; the application information specifies the intellectual property rights that are authorized for use.
S502: at least one authorizer client, after monitoring the event message containing the application information, invokes a smart contract in the blockchain network to perform the issuing step and the associating step.
The issuing steps in the method shown in fig. 5 are: and issuing at least one digital asset corresponding to the intellectual property. The association steps are as follows: an association between the authorized party and the at least one digital asset is created. Wherein the intellectual property right is legally used once in a manner that consumes one digital asset issued on the chain.
S504: the authorized party client invokes a smart contract in the blockchain network to perform an asset transfer step.
The asset transfer steps in the method shown in fig. 5 are: determining at least one unconsumed digital asset designated by the authorized party with which it is associated on a chain, and determining at least one transferee designated by the authorized party; an association is created between the at least one unconsumed digital asset and the at least one transferee.
In addition, in the method shown in fig. 5, the asset transfer step may further include: transferring the amount owned by the at least one transferee to the authorized party based on the transfer fees. That is, the transferee needs to pay a certain fee to the authorized party.
Further, the transfer fee may not be paid to the authorized party at all, but may be divided into a portion of the transfer fee. Specifically, a partial amount of the transfer fee may be transferred to the authorized party.
In addition, the transferee may further transfer the right to use the intellectual property right. Specifically, any transferee client may invoke a smart contract in the blockchain network to perform an asset re-transfer step: determining at least one unconsumed digital asset designated by the transferee that is associated with the chain, and determining at least one transferee designated by the transferee; an association is created between the at least one unconsumed digital asset and the at least one reassigned party.
Accordingly, the asset re-transfer step may further include: the amount owned by the at least one transferee is transferred to the transferor based on the transfer fees. Further, a portion of the amount of the re-transfer fee may be transferred to the authorized party.
By the method shown in fig. 5, an intellectual property right usage authorization system is established based on a blockchain network, one-time usage rights for intellectual property right under the chain are anchored to one digital asset on the chain, and an authorized party needs to acquire opportunities for legal one-time usage of the intellectual property right in a way of consuming one digital asset associated with the authorized party on the chain. The authorized party may further transfer one or more unconsumed digital assets (spent digital assets being inactive) associated with itself on the chain to the transferee.
Therefore, the circulation path of the use right of the intellectual property can be clearly stored on the chain, and the authorized party can conveniently trace back.
In addition, intellectual property may be further diverted from the transferee to the re-transferee, creating a longer chain of circulation that clearly manifests itself in the chain.
Fig. 6 is a flow chart of a digital asset application method corresponding to intellectual property rights provided in the present specification, including:
S600: the authorized party client invokes the intelligent contract in the blockchain network to perform the asset application step.
The asset application steps in the method of fig. 6 include: and determining application information designated by the authorized party, and triggering event messages containing the application information. The application information not only specifies intellectual property rights that are authorized to be used, but also specifies that the application use times N, N is greater than 0.
The number of applications may be defined as: using the intellectual property on an application effort of varying amount within an application domain; can also be defined as: the intellectual property right is used on an application result. Wherein an application outcome may refer to a product or an item.
S602: at least one authorizer client, after monitoring the event message containing the application information, invokes a smart contract in the blockchain network to perform the issuing step and the associating step.
The issuing steps are as follows: and issuing N digital assets corresponding to the intellectual property rights. The association steps are as follows: and creating an association relationship between the authorized party and the N digital assets.
As such, an authorized party needs to legally use the intellectual property once in a manner that consumes one of its digital assets associated on the chain.
In some embodiments, the triggering event message including the application information may specifically be: checking whether the authorized party is authorized; and if the verification result representation passes, triggering the event message containing the application information, and if the verification result representation does not pass, refusing to trigger the event message containing the application information.
In some embodiments, in the issuing step, it may be verified whether the at least one authorizer client is authorized; and if the verification result representation passes, issuing N digital assets corresponding to the intellectual property rights.
In some embodiments, the step of the authorized party client invoking intelligent contract execution in the blockchain network further comprises an authorization request step. An authorization request step precedes the asset application step, the authorization request step comprising: determining order information designated by an authorized party, and triggering event messages containing the order information; the order information specifies the intellectual property rights requested for authorized use and an upper limit M on the number of uses.
Thus, the method of fig. 6 further includes, after the at least one authorizer client monitors the event message containing the order information, invoking an intelligent contract in the blockchain network to perform an order validation step: creating an order corresponding to the order information. Further, an order corresponding to the order information may be created when the number of authorized party clients that invoke the intelligent contract in the blockchain network to perform the order confirmation step is not less than a specified number.
Further, in some embodiments, the issuing of the N digital assets corresponding to the intellectual property may specifically be: and if N is not greater than M, issuing N digital assets corresponding to the intellectual property rights, and re-using M-N as M. In this way, it is ensured that the number of digital assets issued from past times does not exceed the upper limit of the number of uses in orders contracted by the authorized party and the authorizing party.
In addition, in the order confirmation step, the authorization fee may be transferred from the account of the authorized party to the account of the at least one authorized party, or the authorization fee may be transferred from the account of the authorized party to the account corresponding to the order.
By the method shown in fig. 6, an intellectual property right usage authorization system is established based on a blockchain network, one-time usage rights for intellectual property right under the chain are anchored to one digital asset on the chain, and an authorized party needs to acquire opportunities for legal one-time usage of the intellectual property right in a way of consuming one digital asset associated with the authorized party on the chain. In particular implementations, an authorized party submits application information through an intelligent contract in a blockchain network, the application information mainly specifying the intellectual property rights that the authorized party wants to use and the number of times N that the authorized party applies for use of the intellectual property rights. The authorizing party monitors the application information from the chain, invokes an intelligent contract in the blockchain network to issue N digital assets corresponding to the intellectual property rights, and creates an association relationship between the authorized party and the N digital assets.
In this way, the agreement between the authorized and authorized parties on the number of uses of the intellectual property (i.e., the terms of restrictions) will be documented and the one-time use right for the intellectual property will be anchored to one digital asset on the chain, and each legal use of the intellectual property by the authorized party will be required at the expense of one digital asset on the chain, so that each legal use of the intellectual property by the authorized party can be documented on the chain. In the event that the authorized party and the authorized party dispute the implementation of the terms of restriction on the number of intellectual property uses, the dispute may be resolved using a trusted record on the chain.
FIG. 7 is a flow chart of another digital asset application method corresponding to intellectual property rights provided by the present disclosure, comprising:
s700: the authorized party client invokes the intelligent contract in the blockchain network to perform the asset application step.
The asset application steps in the method of fig. 7 include: and determining application information designated by the authorized party, and triggering event messages containing the application information. Wherein the application information specifies the intellectual property rights that are authorized to be used during the specified period, i.e., not only the intellectual property rights that are requested to be authorized to be used but also the period during which the intellectual property rights are used.
S702: at least one authorizer client, after monitoring the event message containing the application information, invokes a smart contract in the blockchain network to perform the issuing step and the associating step.
The issuing steps in the method shown in fig. 7 include: and issuing at least one digital asset corresponding to the intellectual property. Wherein the at least one digital asset is valid for a specified period and is not valid for a specified period.
The association steps in the method shown in fig. 7 include: an association between the authorized party and the at least one digital asset is created.
In the method shown in fig. 7, each digital asset issued has a validity period, which is the specified period described above. That is, the authorized party can only legally use the intellectual property once in a manner that consumes a valid digital asset that it associates on the chain for a specified period of time, leaving a legal usage record on the chain.
In some embodiments, triggering the event message including the application information may specifically include: checking whether the authorized party is authorized; and if the verification result representation passes, triggering the event message containing the application information, and if the verification result representation does not pass, refusing to trigger the event message containing the application information.
In some embodiments, issuing the N digital assets corresponding to the intellectual property may specifically include: verifying whether the at least one authorizer client is authorized; and if the verification result representation passes, issuing at least one digital asset corresponding to the intellectual property.
In some embodiments, issuing the at least one digital asset corresponding to the intellectual property may specifically include: and issuing at least one digital asset corresponding to the intellectual property under the condition that the number of the authorized party clients for calling the intelligent contracts in the blockchain network to execute the issuing step is not less than the specified number.
In some embodiments, the step of the authorized party client invoking intelligent contract execution in the blockchain network further comprises the step of authorizing the requesting; the authorization request step precedes the asset application step, and the authorization request step may include: determining order information designated by an authorized party, and triggering event messages containing the order information; the order information specifies an intellectual property right for which authorization is requested and a specified period for which authorization is requested to use the intellectual property right.
Correspondingly, the method shown in fig. 7 further comprises: at least one authorizer client, after monitoring an event message containing the order information, invokes an intelligent contract in a blockchain network to perform an order validation step: creating an order corresponding to the order information.
In some embodiments, creating an order corresponding to the order information may include: and under the condition that the number of the authorized party clients for calling the intelligent contracts in the blockchain network to execute the order confirmation step is not less than the specified number, creating an order corresponding to the order information.
In some embodiments, issuing the at least one digital asset corresponding to the intellectual property may include: and issuing at least one digital asset corresponding to the intellectual property right under the condition that the current time is not later than the corresponding ending time of the specified period.
By the method shown in fig. 7, an intellectual property right usage authorization system is established based on a blockchain network, one-time usage rights for intellectual property right under the chain are anchored to one digital asset on the chain, and an authorized party needs to acquire opportunities for legal one-time usage of the intellectual property right in a way of consuming one digital asset associated with the authorized party on the chain. In particular implementations, an authorized party submits application information through an intelligent contract in a blockchain network that primarily specifies the intellectual property rights that the authorized party wants to use and the period of time that the authorized party applies for use of the intellectual property rights. The authorizing party monitors the application information from the chain, invokes an intelligent contract in the blockchain network to issue at least one digital asset corresponding to the intellectual property, each digital asset has a validity period during use, and creates an association relationship between the authorized party and the at least one digital asset.
As such, the agreement (i.e., the terms of restriction) between the authorized and authorized parties during the use of the intellectual property may be documented and the one-time use right for the intellectual property anchored to one digital asset on the chain, each legal use of the intellectual property by the authorized party, may be required at the expense of consuming one valid digital asset on the chain so that each legal use of the intellectual property by the authorized party may be documented on the chain. In the event that the authorized party and the authorized party dispute the implementation of the terms of restriction during use of the intellectual property, the dispute may be resolved using a trusted record on the chain.
The present specification also provides a method of generating a digital asset, the generating method being based on an intelligent contract implementation that performs the issuing step, comprising:
taking the authorized party identifier, the authorized party identifier and the authorized intellectual property identifier as inputs of an asset basic code generating function, and outputting to obtain an asset basic code; generating a data structure of an ith digital asset corresponding to the intellectual property according to the asset basic code and the ith unique index code; where i=1, 2, …, N.
Wherein the asset base code generation function may be a one-way hash function.
Further, generating a data structure of an ith digital asset corresponding to the intellectual property rights according to the asset base code and the ith unique index code may include: combining the asset basic code with an ith unique index code to obtain an ith asset code; and generating a data structure of the ith digital asset corresponding to the intellectual property according to the ith asset code.
Further, generating the ith digital asset corresponding to the intellectual property right according to the ith asset code may include: encrypting the ith asset code using a management encryption key corresponding to the smart contract that performs the issuing step; and generating a data structure of the ith digital asset corresponding to the intellectual property according to the encrypted ith asset code.
In some embodiments, generating the ith digital asset corresponding to the intellectual property right from the ith asset code may include: acquiring an authorizer signature and an authorizer signature for an ith asset code; and combining the acquired signature and the ith asset code into a data structure of the ith digital asset corresponding to the intellectual property.
In some embodiments, the input of the asset base code generation function further comprises: order identification.
In some embodiments, the input of the asset base code generation function further comprises: identification of each usage modality in the order.
In addition, before the intelligent contract generates the digital asset, the authorized party signature, the authorized party qualification, and the authorized party qualification may be verified, and after the verification is passed, the digital asset may be generated.
With respect to the digital asset generation method described above, the present specification also corresponds to providing a digital asset verification method (applicable to an embodiment in which the number of uses is a limiting term) implemented based on an intelligent contract that performs an issuing step, comprising the steps of:
1. acquiring a data structure of a digital asset to be verified;
2. analyzing the data structure to obtain an asset basic code and a unique index code;
3. judging whether the recorded legal asset basic codes comprise the asset basic codes obtained through analysis or not, and judging whether the serial number represented by the unique index code is not more than N or not; if the judgment results are all yes, determining that the verification is passed; if any judgment result is negative, determining that the verification is not passed.
In some embodiments, parsing the asset base code and unique index code from the data structure may include: checking the authorized party signature and the authorized party signature in the data structure, and if the verification is passed, analyzing the data structure to obtain an asset basic code and a unique index code.
In some embodiments, parsing the asset base code and unique index code from the data structure may include: and decrypting the encrypted asset code in the data structure by using the management decryption key corresponding to the intelligent contract executing the issuing step to obtain an asset basic code and a unique index code.
In some embodiments, if verification is determined to be passed, the digital asset may be placed in a state that characterizes the verification. If the verification is determined to pass, the number of verifications corresponding to the digital asset may be increased by 1.
The present specification also corresponds to providing a digital asset verification method (applicable to an embodiment of terms limited by a lifetime), the verification method being implemented based on an intelligent contract performing an issuing step, comprising:
1. acquiring a data structure of a digital asset to be verified;
2. analyzing the data structure to obtain an asset basic code;
3. judging whether the recorded legal asset basic codes comprise the asset basic codes obtained through analysis; if the judgment result is yes, determining that the verification is passed; if the judgment result is negative, determining that the verification is not passed.
In some embodiments, parsing the asset base code from the data structure may include: checking the authorized party signature and the authorized party signature in the data structure, and if the verification is passed, analyzing the data structure to obtain an asset basic code.
In some embodiments, parsing the asset base code and unique index code from the data structure may include: and decrypting the encrypted asset code in the data structure by using the management decryption key corresponding to the intelligent contract executing the issuing step to obtain an asset basic code and a unique index code.
In some embodiments, further comprising: if verification is determined to be passed, the digital asset is placed in a state that characterizes the verification. If the verification is determined to pass, the number of times of verification corresponding to the digital asset is increased by 1.
The present disclosure provides a method for applying for intellectual property based on digital asset, which is applicable to an embodiment using the number of times as a limiting term, and specifically includes: the authorized party client invokes the intelligent contract in the blockchain network to perform the asset consumption step. The asset consumption step includes: acquiring a use application submitted by an authorized party for realizing one-time intellectual property use behavior under a chain; an unconsumed digital asset associated with the authorized party is set to characterize the consumed state and an event message is triggered that permits the use of the intellectual property right. The client of the authorized party notifies the authorized party after monitoring the event message of the license of the intellectual property right use behavior.
The present disclosure provides a method for applying for intellectual property based on digital asset, which is applicable to an embodiment of limiting terms by using a service life, and specifically includes: the authorized party client invokes the intelligent contract in the blockchain network to perform the asset consumption step. The asset consumption step includes: acquiring a use application submitted by an authorized party for realizing one-time intellectual property use behavior under a chain; an unconsumed and valid digital asset associated with the authorized party is set to a state that characterizes the consumption and triggers an event message that permits the use of the intellectual property right. The client of the authorized party notifies the authorized party after monitoring the event message of the license of the intellectual property right use behavior.
Fig. 8 is a flow chart of a method for authorizing the manufacture of an intellectual property product provided in the present specification, comprising:
s800: the authorized party client invokes the intelligent contract in the blockchain network to perform the asset application step.
The asset application steps in the method of fig. 8 include: and determining application information designated by the authorized party, and triggering event messages containing the application information. The application information specifies the intellectual property rights that are authorized for use.
S802: and after the at least one authorized party client monitors the event message containing the application information, invoking an intelligent contract in the blockchain network to execute the first issuing step and the first associating step.
The first transmitting step comprises the following steps: and issuing N title digital assets corresponding to the intellectual property rights. The first association step includes: and creating an association relationship between the authorized party and the N title digital assets.
S804: the authorized party client invokes an intelligent contract in the blockchain network to perform the second issuing step and the second associating step.
The second issuing step is as follows: n product digital assets are issued in one-to-one correspondence with the N base products. The second association step is as follows: a one-to-one association between the N title digital assets and the N product digital assets is created.
It should be noted that the second issuing step may be performed prior to the first associating step.
The base product is the basis for manufacturing the intellectual property product, and can be regarded as an intellectual property product obtained by superposing one-time use behaviors of the intellectual property on the base product. For example, a coffee cup is the base product and after the animated character is printed onto the coffee cup, the intellectual property product is obtained.
By the method of fig. 8, the authorized party makes an intellectual property product based on the base product to which the product digital asset associated with the property digital asset corresponds in a manner that consumes the one of the property digital assets associated with the chain.
In the method of fig. 8, the authorized party needs to be limited in two points when using the intellectual property to manufacture a product: 1. manufacturing an intellectual property product, requiring the consumption of its associated digital property asset; 2. in manufacturing this intellectual property product, it is necessary to use the base product corresponding to the digital asset of the product associated with the digital asset consumed for manufacturing. In this way, each intellectual property product manufactured by the authorized party is mapped to the association relationship between a group of product digital assets and the property digital assets on the chain, and the authorized party controls the product manufacturing behaviors of the authorized party based on the association relationship on the chain, so that the product manufacturing behaviors of the authorized party meet the agreement, and the authorized party is difficult to abuse the intellectual property product.
Continuing with the method of FIG. 8, the base product may be a physical base product (e.g., a coffee cup) or a virtual base product (e.g., a membership card of a cafe, the code in the card being a virtual product).
Further, in some embodiments, a third publishing step may be invoked to execute a smart contract in the blockchain network: based on each set of associated title digital assets and product digital assets, a corresponding portfolio digital asset is generated and issued. In practical application, if the basic product belongs to an entity product, the authorized party can print or post the identification of the combined digital asset on the basic product to obtain an intellectual property product; if the base product belongs to the virtual product, the authorized party can write the identification of the combined digital asset into the code of the base product to obtain the intellectual property product.
Further, the third issuing step may be invoked by the authorizer client or the at least one authorizer client invoking an intelligent contract in the blockchain network.
In some embodiments, the data structure for any combined digital asset may include: a combination of corresponding title digital asset, corresponding product digital asset, authorized party signature, blockchain network signature.
The signature of the authorized party is obtained by signing the property digital asset and the product digital asset by using a private key of the authorized party; the blockchain network signature is obtained by signing the digital property asset and the digital product asset by using an administrator public key of the blockchain network.
Accordingly, for any portfolio digital asset, the portfolio digital asset is verified by:
respectively verifying the property digital asset, the product digital asset, the authorized party signature and the blockchain network signature in the data structure of the combined digital asset; if each verification passes, determining that the combined digital asset verification passes; if either verification fails, it is determined that the combined digital asset verification fails.
The technical solutions provided in the present specification are exemplified herein by the intellectual property being an IP brand, the digital property being an NFT, the authorized party being a copyrighting party of the IP brand, and the authorized party being an IP merchant, and it should be understood that this should not be construed as limiting the scope of the present specification.
Fig. 9 is a schematic diagram of a blockchain-based IP brand usage authorization system provided herein. As shown in fig. 9, an IP authorization transaction intelligent contract is deployed in a blockchain network, and a plurality of IP merchants (IP merchant A, IP merchant C) and a plurality of IP copyrighters (IP copyrighter B, IP copyrighter D) can conduct IP authorization transactions through the blockchain network. It should be noted that, the IP brand of the on-link intelligent contract that the copyrighter publishes can be represented by using the subject of the copyrighted work owned by the copyrighter.
Fig. 10 is a schematic flow chart of a block chain based IP brand usage authorization provided in the present specification. As shown in fig. 10, IP merchant a first requests to purchase IP brand usage rights and specifies an upper limit of 1000 NFTs (i.e., usage up to 1000 times). Copyright party B (in effect corresponding to a plurality of specific copyright parties) needs to make a multiparty signature validation of the contract (i.e. the order information), create the order on the chain, and IP merchant a can simultaneously complete payment of the usage fee (the usage fee is locked into the order). The IP merchant a may then further specify a certain material under the IP brand (e.g. a certain animated character) as a specific usage modality using the IP brand, and the copyrighter B continues the signature verification. Then, the IP merchant a may apply for the copyright B to issue 1000 NFTs on the chain, each NFT corresponding to a single use opportunity, the copyright B may sign a confirmation, generate and issue 1000 NFTs on the chain.
Fig. 11 is a schematic flow chart of the charging of the on-chain account by the IP merchant based on the off-chain account provided in the present specification. As shown in fig. 11, the bank/financial institution is the under-chain account manager, the IP authorization chain (i.e., blockchain network described herein) funds gateway is the manager of the blockchain network interfacing responsible for interfacing with the under-chain account manager.
Fig. 12 is a schematic flow chart of an IP merchant purchasing IP brand usage rights on a chain provided in the present specification. As shown in fig. 12, IP merchant a places an order by an on-chain smart contract, resulting in an on-chain account deduction for IP merchant a, IP copyright party B acknowledges authorization, triggers the on-chain smart contract to create an order, and locks the usage charge in the order. The IP copyright party B can call the contract to execute the order presenting step by taking the order as granularity, and present the funds locked in the order to the own account under the chain in the bank. Each withdrawal of the IP rights party B is according to the fact that the account on the chain of the IP rights party B has no balance, the order is locked with funds, and after the order is withdrawn, the account model and the uxo model are considered to be spent.
Fig. 13 is a schematic flow chart of the IP copyright party extracting from the chain provided in the present specification. As shown in fig. 13, the IP rights party B invoking a contract to execute an order proposal step will cause the order status to change to proposed, and the contract triggers an event message, which is equivalent to mapping the amount locked in the order out of the chain. The funds of the under-chain account in the bank of the IP copyright party B are increased, and the funds in the under-chain account of the IP merchant A are thawed and deducted.
Fig. 14 and 15 are schematic diagrams of NFT flow-through provided in the present specification. The NFT codes authorized by each brand can be converted into two-dimensional codes to be printed on objects (such as water cups and clothes), and the objects can be communicated for the second time.
Fig. 16 is a schematic diagram of NFT secondary flow provided in the present specification. As shown in fig. 16, after the IP copyright party B grants the IP brand to the IP merchant a, the IP merchant a may further grant the IP brand to the IP merchant C for use, resulting in a secondary transfer, where the cost paid by the IP merchant C to the IP merchant a needs to be separated based on the intelligent contracts on the chain, and a portion of the funds will be transferred to the IP copyright party B.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in one or more software and/or hardware elements when implemented in the present specification.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. In a typical configuration, a computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, read only compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic disk storage, quantum memory, graphene-based storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by the computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The terminology used in the one or more embodiments of the specification is for the purpose of describing particular embodiments only and is not intended to be limiting of the one or more embodiments of the specification. As used in this specification, one or more embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in one or more embodiments of the present description to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
The foregoing description of the preferred embodiment(s) is (are) merely intended to illustrate the embodiment(s) of the present invention, and it is not intended to limit the embodiment(s) of the present invention to the particular embodiment(s) described.

Claims (10)

1. A digital asset transfer method corresponding to intellectual property, comprising:
the authorized party client invokes the intelligent contract in the blockchain network to perform asset application steps: determining application information appointed by an authorized party, and triggering event information containing the application information; the application information specifies intellectual property rights that are authorized for use; the application information also specifies the application use times N;
at least one authorizing party client side calls an intelligent contract in the blockchain network to execute the issuing step and the associating step after monitoring the event message containing the application information; the issuing step includes: issuing at least one digital asset corresponding to the intellectual property; the step of associating includes: creating an association between the authorized party and the at least one digital asset; wherein the intellectual property right is legally used once in a manner of consuming one digital asset issued on a chain; issuing at least one digital asset corresponding to the intellectual property, comprising: issuing N digital assets corresponding to the intellectual property rights;
The authorized party client invokes an intelligent contract in a blockchain network to perform an asset transfer step: determining at least one unconsumed digital asset designated by the authorized party with which it is associated on a chain, and determining at least one transferee designated by the authorized party; an association is created between the at least one unconsumed digital asset and the at least one transferee.
2. The method of claim 1, the intellectual property rights comprising one of:
copyright, patent rights, trademark rights, service marks, manufacturer's names, origin's names, plant new species rights, integrated circuit layout design proprietary rights.
3. The method of claim 1, the digital asset being a heterogeneous voucher NFT.
4. The method of claim 1, the application information further specifying a specified period of time during which the intellectual property rights are authorized for use; at least one digital asset issued by the issuing step is valid for a specified period and is not valid for a specified period;
legal use of the intellectual property once in a manner that consumes one digital asset issued on the chain, comprising:
the intellectual property right is used legally once in a manner that consumes one valid digital asset issued on the chain.
5. The method of claim 1, the asset transfer step further comprising:
transferring the amount owned by the at least one transferee to the authorized party based on the transfer fees.
6. The method of claim 5, the asset transfer step further comprising:
and transferring a part of the transfer fee to the authorized party.
7. The method of claim 1, further comprising:
any transferee client invokes a smart contract in the blockchain network to perform the asset re-transfer step: determining at least one unconsumed digital asset designated by the transferee that is associated with the chain, and determining at least one transferee designated by the transferee; an association is created between the at least one unconsumed digital asset and the at least one reassigned party.
8. The method of claim 7, the asset reassignment step further comprising:
the amount owned by the at least one transferee is transferred to the transferor based on the transfer fees.
9. The method of claim 8, the asset transfer step further comprising:
and transferring a part of the amount of the re-transfer fee to the authorized party.
10. A digital asset circulation system corresponding to intellectual property rights, comprising: the system comprises a blockchain network, an authorized party client and at least one authorized party client;
The authorized party client side invokes an intelligent contract in the blockchain network to execute asset application steps: determining application information appointed by an authorized party, and triggering event information containing the application information; the application information specifies intellectual property rights that are authorized for use; the application information also specifies the application use times N;
at least one authorizer client, after monitoring the event message containing the application information, invoking an intelligent contract in the blockchain network to execute the issuing step and the associating step; the issuing step includes: issuing at least one digital asset corresponding to the intellectual property; the step of associating includes: creating an association between the authorized party and the at least one digital asset; wherein the intellectual property right is legally used once in a manner of consuming one digital asset issued on a chain; issuing at least one digital asset corresponding to the intellectual property, comprising: issuing N digital assets corresponding to the intellectual property rights;
the authorized party client also invokes an intelligent contract in the blockchain network to perform an asset transfer step: determining at least one unconsumed digital asset designated by the authorized party with which it is associated on a chain, and determining at least one transferee designated by the authorized party; an association is created between the at least one unconsumed digital asset and the at least one transferee.
CN202110483419.7A 2021-04-30 2021-04-30 Digital asset circulation method corresponding to intellectual property Active CN113112262B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110483419.7A CN113112262B (en) 2021-04-30 2021-04-30 Digital asset circulation method corresponding to intellectual property

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110483419.7A CN113112262B (en) 2021-04-30 2021-04-30 Digital asset circulation method corresponding to intellectual property

Publications (2)

Publication Number Publication Date
CN113112262A CN113112262A (en) 2021-07-13
CN113112262B true CN113112262B (en) 2023-07-25

Family

ID=76720817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110483419.7A Active CN113112262B (en) 2021-04-30 2021-04-30 Digital asset circulation method corresponding to intellectual property

Country Status (1)

Country Link
CN (1) CN113112262B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114091052B (en) * 2021-11-01 2024-04-12 天津理工大学 Intellectual property generation, transaction and authorization method based on NFT
CN114065269B (en) * 2022-01-14 2022-04-12 北京大学深圳研究生院 Method for generating and analyzing bindless heterogeneous token and storage medium
CN114429366A (en) * 2022-01-17 2022-05-03 支付宝(杭州)信息技术有限公司 Block chain based brand value assessment method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110163483A (en) * 2019-04-22 2019-08-23 阿里巴巴集团控股有限公司 Virtual resource allocation method and apparatus based on block chain
CN111047310A (en) * 2018-10-15 2020-04-21 阿里巴巴集团控股有限公司 Method and device for realizing distribution and transfer of digital assets and online financing

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI267753B (en) * 2004-08-20 2006-12-01 Cyberlink Corp System and method for licensing software
US11074663B2 (en) * 2015-12-31 2021-07-27 Camelot Uk Bidco Limited System and method of facilitating intellectual property transactions
CN108510412A (en) * 2018-04-04 2018-09-07 广州科创空间科技服务有限公司 Intellectual property transfer management method, electronic equipment and storage medium based on alliance's chain
CN108846655A (en) * 2018-06-29 2018-11-20 佛山伊苏巨森科技有限公司 A kind of system for digital properties power to be distributed to Digital Media
WO2020006639A1 (en) * 2018-07-05 2020-01-09 Three Lefts Inc. System and method of enforcing and monitoring contracts
US20200160465A1 (en) * 2018-10-19 2020-05-21 Erich Lawson Spangenberg System and Method of IP Ownership and IP Transactions with Guaranteed Buy Valuation and Broker Rewards
JP6640320B1 (en) * 2018-12-28 2020-02-05 玲於奈 日置 Token management system and token management method
KR102252954B1 (en) * 2019-03-05 2021-05-17 주식회사 헤세그 System for trading intellectual property using block chain, and method for operating the same
CN111768257A (en) * 2019-04-02 2020-10-13 南京大学 Patent transaction method based on block chain and patent pool technology
US11256551B2 (en) * 2019-04-22 2022-02-22 Advanced New Technologies Co., Ltd. Blockchain-based virtual resource allocation
US20210035246A1 (en) * 2019-07-30 2021-02-04 Intellectual Technologies PDE. LTD. Intellectual property asset management system using distributed ledger technology
CN111709838B (en) * 2020-06-05 2024-01-30 海南国际知识产权交易所有限责任公司 Transaction method based on intellectual property standardized digital asset and related equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111047310A (en) * 2018-10-15 2020-04-21 阿里巴巴集团控股有限公司 Method and device for realizing distribution and transfer of digital assets and online financing
CN110163483A (en) * 2019-04-22 2019-08-23 阿里巴巴集团控股有限公司 Virtual resource allocation method and apparatus based on block chain

Also Published As

Publication number Publication date
CN113112262A (en) 2021-07-13

Similar Documents

Publication Publication Date Title
CN113112262B (en) Digital asset circulation method corresponding to intellectual property
CN108492180B (en) Asset management method and device and electronic equipment
US20220198418A1 (en) Systems and methods for commerce in a distributed system with blockchain protocols and smart contracts
EP3961455B1 (en) Data verification methods, apparatuses, and devices
CN108885761B (en) Method for secure point-to-point communication on a blockchain
CN109417465B (en) Registration and automatic management method of intelligent contracts executed by block chains
CN111026789B (en) Block chain-based electronic bill query method and device and electronic equipment
CN113255005B (en) Block chain-based data asset circulation method, device and equipment
JP2022166214A (en) System and method for controlling asset-related actions via blockchain
CN113129177B (en) Digital asset application method corresponding to intellectual property
CN111492634A (en) Secure and confidential custody transaction systems, methods, and apparatus using zero-knowledge protocols
CN109003185B (en) Intelligent contract establishing method and device, computing equipment and storage medium
CN110333948A (en) Virtual resource allocation method and apparatus based on block chain
TW202318306A (en) Blockchain-implemented system and method
US20230004970A1 (en) Distributed Ledgers with Ledger Entries Containing Redactable Payloads
CN111461691B (en) Flow statistical system, method and device based on block chain
CN113221191B (en) Block chain-based data evidence storage method, device, equipment and storage medium
CN113129176B (en) Digital asset application method corresponding to intellectual property
US20150052066A1 (en) Reconciling electronic transactions
US20230114684A1 (en) Cryptographic Content Co-Creation Mechanisms and Linking Physical Elements to Cryptographic Elements
CN113128992A (en) Payment method based on intellectual property right use authorization
CN111274597B (en) Data processing method and device
CN112561407A (en) Asset management method, system and device based on block chain
CN116308903A (en) Digital asset right-determining protection method based on block chain
CN113869901B (en) Key generation method, key generation device, computer-readable storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant