CN116596708A - Agricultural intellectual property data right-determining method based on alliance chain - Google Patents

Agricultural intellectual property data right-determining method based on alliance chain Download PDF

Info

Publication number
CN116596708A
CN116596708A CN202310576619.6A CN202310576619A CN116596708A CN 116596708 A CN116596708 A CN 116596708A CN 202310576619 A CN202310576619 A CN 202310576619A CN 116596708 A CN116596708 A CN 116596708A
Authority
CN
China
Prior art keywords
intellectual property
transaction
data
watermark information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202310576619.6A
Other languages
Chinese (zh)
Inventor
乔杨
吴家萍
王颖
耿丽霞
杨亚维
司海平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou University of Light Industry
Original Assignee
Zhengzhou University of Light Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou University of Light Industry filed Critical Zhengzhou University of Light Industry
Priority to CN202310576619.6A priority Critical patent/CN116596708A/en
Publication of CN116596708A publication Critical patent/CN116596708A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)

Abstract

The invention relates to an agricultural intellectual property data right-confirming method based on a alliance chain, which belongs to the technical field of agriculture, and constructs an agricultural intellectual property right-confirming model based on a blockchain, wherein the agricultural intellectual property right-confirming model comprises a data right-confirming storage certificate, an intellectual property right transaction, a copyright Fang Weiquan and other functional modules, and the data is stored on the blockchain to realize the data right-confirming storage certificate so as to ensure the non-falsification and traceability of the data; meanwhile, the decentralization characteristic of the blockchain is utilized to realize the safety and reliability of intellectual property transaction; the copyright side rights maintenance is realized through an automatic intelligent contract, so that the complicated flow of the traditional rights maintenance mode is avoided, and the time and the cost are saved; through the application of the blockchain technology, a plurality of problems existing in the process of confirming the right of the agricultural intellectual property are solved, and meanwhile, the process of confirming and transferring the right of the intellectual property is more automatic and efficient through the application of the intelligent contract and the digital watermark technology.

Description

Agricultural intellectual property data right-determining method based on alliance chain
Technical Field
The invention relates to the technical field of agricultural intellectual property protection, in particular to an agricultural intellectual property data right-determining method based on a alliance chain.
Background
With the rapid development of intellectual property and the continuous reinforcement of economic globalization, intellectual property becomes a mark for possessing leading technology, independent innovation capability and future development potential, the creation, occupation and application of intellectual property become the key for maintaining agricultural advantages in international competition, investigation shows that in international agriculture related trade competition,the yield increasing element of (2) is derived from a new technology or a new product, and the economic benefit brought by agricultural intellectual property rights is huge.
With the breakthrough development of information technology and modern biology, the agricultural knowledge is simpler to trade on a network and is also more concealed, infringement is easier to avoid through modification and imitation, the protection difficulty of the agricultural intellectual property is further increased, the problems that the intellectual property is long in right-consuming time and high in cost, single-point faults exist and the like are solved by the traditional enterprises, the mechanisms for helping copyrights to conduct right-keeping are fewer, the provoking party is required to find infringement evidence by the provoking party, and infringement provoking and copyrights tracing are also extremely difficult;
in view of the above, the scheme provides an agricultural intellectual property data right-determining method based on a alliance chain.
Disclosure of Invention
Aiming at the situation, in order to overcome the defects of the prior art, the invention provides an agricultural intellectual property data right-confirming method based on a alliance chain.
An agricultural intellectual property data right-determining method based on a alliance chain is characterized in that an intelligent contract based on the alliance chain is constructed, wherein the intelligent contract comprises a right-determining contract, a transaction contract and a right-maintaining contract;
the validation contract includes: embedding the encrypted watermark information into a PDF document by adopting a digital watermark algorithm, storing the PDF document containing the watermark into an IPFS, generating unique address hash for each document, and uploading IPFS hash addresses and data summaries to a chain;
the trade contract includes: after finding out corresponding data from the chain, the purchaser initiates a transaction request, triggers a transaction process, and transaction information is stored in a alliance chain ledger book to realize patent right transfer and watermark information change;
the right-to-hold contract includes: the title party obtains data transaction evidence from the alliance chain, extracts document watermark information from the IPFS system, collects infringement evidence and realizes on-chain evidence storage, and realizes rights maintenance according to the watermark information, the transaction evidence and the infringement evidence.
The technical scheme has the beneficial effects that:
(1) The agricultural intellectual property right-confirming model based on the blockchain is constructed, and the agricultural intellectual property right-confirming model comprises functional modules such as a data right-confirming evidence, an intellectual property right transaction and a copyright Fang Weiquan, and the like, and the data is stored on the blockchain to realize the data right-confirming evidence, so that the non-falsification and traceability of the data are ensured; meanwhile, the decentralization characteristic of the blockchain is utilized to realize the safety and reliability of intellectual property transaction; the copyright side rights maintenance is realized through an automatic intelligent contract, so that the complicated flow of the traditional rights maintenance mode is avoided, and the time and the cost are saved;
(2) Through the application of the blockchain technology, various problems existing in the agricultural intellectual property right confirming process, such as long right confirming time, high cost, difficult infringement evidence and the like, are solved, meanwhile, the intelligent contract and digital watermark technology is applied, so that the right confirming and transferring process of the intellectual property right is more automatic and efficient, finally, the design of the model has good expansibility and adaptability, customized development and application can be carried out according to different requirements, a new thought and method are provided for the right confirming and protecting of the agricultural intellectual property right, and the method has important significance for popularization and application of agricultural technological achievements.
Drawings
FIG. 1 is a schematic diagram of an intellectual property rights model for agriculture based on a alliance chain;
FIG. 2 is a schematic diagram of the present flow of the data validation of the present invention;
FIG. 3 is a schematic representation of the agricultural intellectual property transaction process of the present invention;
FIG. 4 is a schematic diagram of a copyright maintenance flow of the present invention;
FIG. 5 is a prior art flow chart of a digital watermarking algorithm based on a line end identifier according to the present invention;
FIG. 6 is a schematic diagram of an IPFS initialization state of the present invention;
FIG. 7 is a diagram illustrating a process for uploading files using IPFS in accordance with the present invention;
FIG. 8 is a schematic diagram of the present invention using IPFS to store lists.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions in the embodiments of the present invention will be clearly and completely described below, and it should be apparent that the described embodiments are some embodiments of the present invention, but not all embodiments, and the present invention is described in detail below with reference to the accompanying drawings, however, it should be understood that the accompanying drawings are provided only for better understanding of the present invention, and they should not be construed as limiting the present invention.
1. Design of right-confirming method for agricultural intellectual property
The agricultural intellectual property right-confirming model aims at solving the right-confirming problem of patents in the agricultural field, and aims to better protect rights and interests of the patents by realizing the right-confirming of the patents, prevent others from invading, and realize the economic benefits of right persons at the same time;
the right-confirming function comprises links of patent application, patent examination, patent certificate issuing and the like, and can confirm the right of the patent in the technical field of agricultural planting;
the transaction function provides a transaction platform for patent owners, is convenient for the owners to sell or transfer the patents to other people, and can protect the rights and interests of buyers;
the right-keeping function provides patent right-keeping service, including monitoring the infringement of the patent, prosecuting the infringer, providing legal support and the like;
as shown in fig. 1, a federation chain-based intellectual property rights model diagram of the related farmers is shown, a user realizes the whole patent protection flow by calling an intelligent contract, in a data right-determining part, the encrypted watermark information is embedded into a PDF document by adopting a digital watermark algorithm, the watermark document is stored in an IPFS, a unique address hash is generated for each document, and meanwhile, the IPFS hash address and a data abstract are uplink-stored to ensure the uniqueness and the non-tamper property of the data;
in the data transaction part, a purchaser initiates a query from a client and initiates a transaction request after finding corresponding data from a chain, after the transaction is completed, transaction information is stored in a blockchain classification account book, and patent rights are transferred accordingly;
in the user right-keeping part, the property party can acquire data transaction certificates from the alliance chain, extract document watermark information from the IPFS system, acquire copyright information, acquire infringed evidence and realize on-chain certificate storage.
In the method for confirming the intellectual property rights of the farmers, the network topology structure is organized in a alliance chain mode and consists of a plurality of nodes, the nodes can be divided into ordering nodes and peer nodes, wherein the ordering nodes are used for ordering and packaging the transactions to ensure the order and the integrity of the transactions, and the peer nodes are other participants in the network, including property persons, buyers and the like;
the title person can uplink and store own patent information through a blockchain network to realize right confirmation;
the buyer can inquire the authenticity of the patent through the blockchain network, so that the rights and interests of the purchased patent are ensured;
the intellectual property office is responsible for supervising and supporting the patent validation work;
the intellectual property court can acquire information such as transaction certificates, infringement evidences and the like of the patent through the blockchain network for judging and maintaining rights.
Wherein the communication flow between the participants comprises the following steps:
firstly, a title person can upload own patent information to an IPFS through an AddWatermark interface of a contract, and store key information in metadata to upload to a blockchain network, wherein the key information comprises a patent name, a patent number, a patent type, an applicant, an application date, an IPFS hash address and the like;
issuing a patent certificate for the intellectual property office after the intellectual property office passes the verification;
then, the buyer can inquire the authenticity of the patent through the QueryPatent interface of the transaction contract, and purchase the rights and interests of the patent through the transfer Patent interface;
finally, if infringement occurs, the intellectual property court can acquire the infringement evidence extracted by the transaction evidence and the watermark of the patent through the GetTransactionEvence interface of the infringement contract and store the infringement evidence on the blockchain for infringement.
2. Design of different intelligent contract module functions
2.1 data rights contract
The data right contract realizes digital watermark embedding, IPFS storage and blockchain right storage, and the flow is shown in figure 2, and the specific process is as follows:
firstly, a new user needs to register and generate an identity credential, the registered user can log in a system through a web end by using the identity credential and perform related operation, and in the digital watermark embedding process, the user invokes an addWatermark (file) method to embed the watermark of a patent data document and stores the embedded document into an IPFS node of the user;
then, the user calls SaveMetadata (metadata) method to realize the generation and the input of the document abstract information, and metadata such as a Hash value, uploading information, uploading time and the like of the document are stored in a uplink mode, so that the traceability and the non-falsifiability of the data are guaranteed, and the situation that the data are lost or falsified is avoided;
the user sends a transaction request to peer nodes in a alliance chain by calling an intelligent contract, and uses an RSA asymmetric encryption algorithm to digitally sign the transaction, the digital signature can ensure the identity authentication and data integrity of the transaction, the nodes verify user signature information and broadcast the user signature information through a P2P network, the user transaction request is subjected to consensus through a PBFT algorithm after being verified by the nodes, the PBFT algorithm can tolerate a certain number of faults or malicious behaviors of the nodes without affecting the correctness of the system, in the algorithm, each node can broadcast the transaction request to other nodes, and consider to reach consensus when receiving node responses exceeding 2/3, the nodes write transaction records into blocks after reaching consensus, and broadcast the blocks to other nodes for confirmation, after the new blocks are confirmed by the nodes exceeding 2/3, the whole transaction process is completed, the IPFS address and metadata of the document are recorded in the block chain, so as to ensure the data availability and the tamper-proof performance of the document are completed, and the user can successfully search the complete information of the document and the verification of the real information is searched by the user;
the intellectual property digital asset uplink storage implementation pseudo code is shown in the table 1, and the correctness and the safety of a user transaction request can be ensured through the combination of a PBFT algorithm and a digital signature mechanism, and meanwhile, the intellectual property digital asset uplink storage implementation pseudo code also has certain decentralization characteristics;
table 1 digital asset ul storage
2.2 transaction contracts
After the patent information is uploaded, a buyer can inquire the needed patent information by calling a Query function to acquire information such as a patent name, copyright information, a patent type and the like so as to help the buyer to select, when a transaction request is initiated by using an Invoke function, the system firstly verifies the identity of the buyer and automatically completes the transaction process according to an intelligent contract, the system comprises judging whether the transaction condition is met, verifying the payment information of the buyer, completing the patent transfer of the copyright and the like, and after the transaction is completed, the system returns the generated hashID to the buyer and writes a transaction record into a block chain account book so as to realize the preservation and traceability of the transaction information, wherein the transaction process is shown in an attached figure 3;
in the transaction stage, a user also needs to update the watermark information of the patent document in the IPFS network to complete the change of the patent rights, the update of the watermark information of the document can be realized through IPNS, namely, the new watermark information is issued to a new IPNS address, then the link in the patent document is updated to point to the new IPNS address, as the blockchain and the IPFS are both the decentralised systems, the nodes need to agree with each other to ensure the correctness and consistency of the transaction record and the IPFS document, if the transaction condition is not satisfied or the transaction fails, the system returns the failure reason to the buyer to ensure the safety and the reliability of the transaction, and the pseudo code realization of the functions of inquiring the patent information, initiating the transaction and updating the watermark information is shown in the table 2:
table 2 title transaction implementation
2.3 rights contract
The copyright party's right is one of the important means for protecting intellectual property rights, strict evidence collection and right-keeping flow is needed, the specific flow is shown in fig. 4, when the copyright party finds infringement, the infringement evidence including pictures, videos and the like is uploaded on the web side, then the evidence can be stored in a chain by calling StoreEvidence (evidence) method to ensure that the evidence is not tampered or deleted, then a user can extract watermark information through ExtractWatermark (file) functions and GetTransactionEvidence (transactionID) functions and obtain historical transaction records to obtain patentee information and related transaction information, obtain the real source of data as right-keeping evidence, and after enough evidence is collected, the right-keeping can be carried out, and the copyright party can choose to propose litigation application to legal institutions added with alliance chain nodes according to own needs or solve infringement problems through negotiation;
in addition, the user can realize automatic maintenance through an intelligent contract by means of an event monitoring mechanism provided by Hyperledger Fabric according to own requirements, define functions of sending maintenance notification, storing evidence and inquiring historical transaction records in the intelligent contract, define an event trigger in the intelligent contract by using the event monitoring mechanism provided by Hyperledger Fabric, and trigger corresponding events when the maintenance notification needs to be sent, the storing evidence needs to be called and the historical transaction records need to be inquired, so that the system can automatically execute corresponding operations, and the functions of automatically sending maintenance notification, automatically calling the storing evidence method, automatically searching the historical transaction records and the like can be realized according to an automatic script by means of a Truffle integrated automation tool;
the pseudo code of the automatic maintenance right realizing process is shown in the table 3, so that the copyright party can be helped to collect evidence and acquire transaction information more efficiently, and the traceability and reliability of the maintenance right flow are improved;
TABLE 3 automated rights maintenance
/>
3. Watermark authorization mechanism
3.1 after researching and investigating the existing digital watermarking algorithm, we find that the watermark embedding technology is mature for format files such as pictures, but the hidden watermark embedding and extraction are carried out on PDF format files to realize the feasible scheme of copyright protection is less, as shown in figure 5, the scheme selects a line end identifier as a watermark embedding point, replaces the line end identifier in a cross reference table by the characteristic that blank characters in the PDF file cannot be displayed on a page, realizes watermark information embedding, transmits the line end identifier into the PDF file and watermark information in a formData format by a user in the watermark embedding stage, uniformly modifies the line end identifier, encrypts watermark information and encodes ciphertext into binary data stream, modifies the line end identifier in the cross reference table according to the binary data stream, regenerates the PDF file to complete watermark embedding work, and the watermark extraction is to reverse the embedding process, restore watermark binary data stream according to the line end identifier in the embedded watermark file, and obtain watermark plaintext through decoding and decryption;
3.2 improvement scheme
The improvement on the watermark embedding scheme based on the end-of-line identifier generally comprises the following steps:
firstly, in order to avoid that the end-of-line identifier is automatically adjusted or deleted by an editor, selecting a blank behind a line where a title is located as a more concealed embedded point;
in the process of selecting the embedded point, a pseudo-random number generator is used for generating random embedded positions, namely, different positions are selected for each embedding, so that the concealment and the attack resistance of the watermark are improved;
secondly, in order to increase the fault tolerance and robustness of the watermark, a Reed-Solomon code (RS code) is selected to encode the encrypted watermark information to generate an error correction code, and the encoded redundant information and the encrypted information are combined to finally obtain a new data sequence for embedding;
in addition, some users may not want to reveal personal information or proprietary transaction information, so before watermark embedding, the watermark information is encrypted by using an AES encryption algorithm, so that only legal users with decryption keys can decrypt and extract the watermark information, and the security of the watermark is improved;
the following is a specific implementation of the improved watermark embedding scheme:
firstly, encrypting watermark information to be embedded by using an AES encryption algorithm, and importing the encrypted watermark information into a cryptaphy library capable of realizing AES encryption;
then, converting the character string to be encrypted into a byte array, generating a 16-byte key and initializing the 16-byte key by using the key, and filling the byte array to ensure that the length of the byte array is an integer multiple of the length of an AES (advanced encryption standard) packet in order to meet the requirement of an AES (advanced encryption standard) encryption algorithm;
then, encrypting the filled byte array to obtain an encrypted byte array;
finally, converting the encrypted byte array into a Base64 coded character string as encrypted watermark information;
as shown in formula 3.1, M represents watermark information to be encrypted, K represents an encryption key, and C represents encrypted ciphertext;
C=AES K (M)
then, selecting a random embedding position, and embedding the encrypted and coded data sequence into a blank behind the title of the document;
the implementation steps are as follows:
(1) Opening a PDF document by using a PyPDF2 library, identifying titles and blanks in the document, specifically, traversing each page, acquiring the content of each page by using a getPage method, searching the positions of the titles and the blanks, importing a re module, matching the titles and the blanks by using a regular expression, and storing the positions in a list;
(2) In order to increase the concealment and attack resistance of the watermark, in the process of selecting the embedded point, the embedded point needs to be randomized, namely, different positions are selected when each embedded point is embedded, a random number is generated by using a random library of Python, and then the random number is added with a blank index to be used as the embedded position;
(3) Then, the encrypted watermark information is required to be subjected to Reed-Solomon coding to generate error correction codes, the coded redundant information is combined with the encrypted information to generate a new data sequence to be embedded, the implementation process is that a Python rscode library is imported, the encrypted watermark information is converted into a byte array, the Reed-Solomon coding is performed on the byte array to generate redundant information, and the coded redundant information is combined with the encrypted watermark information;
(4) Finally, embedding the coded data sequence into a blank behind a title of the PDF document;
the above process can be summarized as: firstly, a PDF document is opened by using a PyPDF2 library, and the title and blank information in the document are read; then, randomizing the blank position to generate a random number r, and adding the random number r and the blank index i to obtain a new embedded position p (p=i+r); then embedding the coded data sequence into a blank position p behind the title of the PDF document; finally, the modified PDF document is saved again by using a PyPDF2 library;
as shown in equation 3.2, PDF represents the original PDF document, PDF watermark Representing a new PDF document embedded with the watermark, wherein Ebed (·) represents a watermark embedding function, and C represents encrypted and encoded watermark information;
PDF watermark =Embed(PDF,C)
when extracting the watermark, extracting embedded watermark information from the PDF document by using the same randomization method and decoding method, wherein C' represents the encrypted and encoded watermark information extracted from the PDF document, and Extract (·) represents a watermark extraction function as shown in formula 3.3;
C′=Extract(PDFwatermark)
finally, the authenticity and the integrity of the watermark can be verified by decrypting and comparing the extracted watermark information;
Verification=(M==M′)
as shown in equations 3.4 and 3.5, M' represents the decrypted watermark information,and representing an AES decryption function, representing a watermark Verification result by Verification, and if the Verification is true, indicating that the watermark information is complete and error-free.
4. IPFS-based distributed storage scheme
The system adopts a link-up and link-down collaborative storage mode, a PDF document embedded with a digital watermark is stored through an IPFS system, a file abstract and an IPFS hash value of the PDF document are stored through the link-up storage mode, so that the authority-confirming evidence of patent data is ensured, meanwhile, a certificate issued by a CA is required to access the IPFS, and a alliance link system is responsible for maintaining a Certificate Revocation List (CRL) to ensure the safety of data access;
after the transaction is completed, when the watermark information needs to be updated and the IPFS content needs to be modified, the IPFS naming system (IPNS) can be used for reissuing;
in the user right-keeping process, the hash address of the IPFS can be used as a unique identifier of the file content, so that the user can conveniently extract watermark information and fix evidence.
The IPFS-based distributed storage steps are as follows:
(1) Building IPFS: firstly, downloading and compiling an IPFS, entering a catalog of the IPFS through a command line tool, running an 'IPFS init' command to initialize the IPFS node, generating a private key and a public key of the node, initializing the IPFS as shown in fig. 6, then running an 'IPFS daemon' command to start the IPFS node, and calling various functions of the IPFS node through an API interface;
(2) Configuration Hyperledger Fabric: in the IPFS distributed storage scheme, hyperledger Fabric is used as a distributed ledger system to store IPFS hash values and file digests to ensure traceability and non-tamper property of data, so before using IPFS for file uploading and storage, hyperledger Fabric networks need to be configured first, including creating a channel and corresponding intelligent contracts to handle storage and query of IPFS hash values and file digests, so that after the file is uploaded to the IPFS, CID and corresponding metadata of the file can be stored on a Hyperledger Fabric chain, thereby realizing permanent storage and verifiability of the data;
(3) Uploading files to IPFS: uploading a file to be stored to an IPFS system, returning the IPFSCID of the file by the system, wherein the CID can be used for uniquely identifying the file so as to store and inquire on a chain, the process of uploading the file by using the IPfs is shown in FIG. 7, and a storage list is shown in FIG. 8;
(4) Storing file information onto a chain: the CID and the file abstract of the file are stored on a chain to ensure the authenticity and the integrity of the file, and the information can be stored and inquired through an intelligent contract to ensure the non-tamper property and the public transparency of the data;
(5) Accessing an IPFS database: when accessing the IPFS database, the certificate issued by CA is required to be used for accessing, the alliance chain system is responsible for maintaining a certificate revocation list CRL to ensure the validity of the certificate, in addition, the IPFS hash value and the public key can be bound by using IPNS to generate a variable link, and one link in the node domain name space can be led to point to a variable IPFS hash value by using IPNS, so that the aim that the updated content is always pointed to for the same link is realized;
(6) Updating IPFS content: if the IPFS content needs to be modified, it can be reissued by means of IPNS. Updating PDF document watermark information on IPFS to generate new hash value; issue a new hash value to the IPNS using command ipfs name publish < new hash value >; resolving the IPNS name using a ipfs name resolve < IPNS name > command to obtain the latest hash value; the updated PDF document information is accessed through the acquired latest hash value.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may be modified or some or all of the technical features may be replaced with other technical solutions, which do not depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (4)

1. An agricultural intellectual property data right-determining method based on a alliance chain is characterized in that an intelligent contract based on the alliance chain is constructed, wherein the intelligent contract comprises a right-determining contract, a transaction contract and a right-maintaining contract;
the validation contract includes: embedding the encrypted watermark information into a PDF document by adopting a digital watermark algorithm, storing the PDF document containing the watermark into an IPFS, generating unique address hash for each document, and uploading IPFS hash addresses and data summaries to a chain;
the trade contract includes: after finding out corresponding data from the chain, the purchaser initiates a transaction request, triggers a transaction process, and transaction information is stored in a alliance chain ledger book to realize patent right transfer and watermark information change;
the right-to-hold contract includes: the title party obtains data transaction evidence from the alliance chain, extracts document watermark information from the IPFS system, collects infringement evidence and realizes on-chain evidence storage, and realizes rights maintenance according to the watermark information, the transaction evidence and the infringement evidence.
2. The method for determining the rights of the intellectual property data of agriculture based on a alliance chain according to claim 1, wherein the watermark information embedding process comprises the following steps:
s1: encrypting watermark information to be embedded by using an AES encryption algorithm, and importing the watermark information into a cryptagraphy library capable of realizing AES encryption;
s2: converting the character string to be encrypted into a byte array, and filling the byte array to ensure that the length of the byte array is an integer multiple of the length of an AES (advanced encryption standard) packet;
s3: encrypting the filled byte array to obtain an encrypted byte array;
s4: converting the encrypted byte array into a Base64 coded character string as encrypted watermark information;
s5: a random embedding location is selected and the encrypted and encoded data sequence is embedded in a space behind the title of the document.
3. The method for determining the right of the intellectual property data of agriculture based on the alliance chain according to claim 2, wherein the step of S5 comprises the following steps:
s5-1: opening a PDF document by using a PyPDF2 library, and identifying titles and blanks in the document;
s5-2: during the process of selecting the embedded points, the embedded points are randomized, so that different positions are selected when each embedding is performed;
s5-3: reed-Solomon encoding is carried out on the encrypted watermark information to generate error correction codes, and the encoded redundant information and the encrypted information are combined to generate a new data sequence for embedding;
s5-4: the encoded data sequence is embedded into a blank behind the title of the PDF document, and the modified PDF document is restored using the PyPDF2 library.
4. The method for determining the rights of the intellectual property data of agriculture based on the alliance chain according to claim 1, wherein the embedded watermark information is extracted from the PDF document by using the same randomization method and decoding method when the watermark information is extracted.
CN202310576619.6A 2023-05-18 2023-05-18 Agricultural intellectual property data right-determining method based on alliance chain Withdrawn CN116596708A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310576619.6A CN116596708A (en) 2023-05-18 2023-05-18 Agricultural intellectual property data right-determining method based on alliance chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310576619.6A CN116596708A (en) 2023-05-18 2023-05-18 Agricultural intellectual property data right-determining method based on alliance chain

Publications (1)

Publication Number Publication Date
CN116596708A true CN116596708A (en) 2023-08-15

Family

ID=87604217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310576619.6A Withdrawn CN116596708A (en) 2023-05-18 2023-05-18 Agricultural intellectual property data right-determining method based on alliance chain

Country Status (1)

Country Link
CN (1) CN116596708A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117350721A (en) * 2023-10-27 2024-01-05 上海创图网络科技股份有限公司 Digital asset right determining system based on block chain
CN117853101A (en) * 2024-03-07 2024-04-09 北京邮电大学 Blockchain-based intellectual property management transaction method, system and computer program product

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117350721A (en) * 2023-10-27 2024-01-05 上海创图网络科技股份有限公司 Digital asset right determining system based on block chain
CN117853101A (en) * 2024-03-07 2024-04-09 北京邮电大学 Blockchain-based intellectual property management transaction method, system and computer program product

Similar Documents

Publication Publication Date Title
US10769252B2 (en) Method and apparatus for watermarking of digital content, method for extracting information
KR102051288B1 (en) Methods and systems for verifying the integrity of digital assets using distributed hash tables and peer-to-peer distributed ledgers
JP3130267B2 (en) How to create a cryptographic envelope
US8126918B2 (en) Using embedded data with file sharing
CN116596708A (en) Agricultural intellectual property data right-determining method based on alliance chain
CN101004805B (en) Digital document management system, digital document management method
US20200226233A1 (en) Distributed ledger-based digital content piracy deterrence
CN111475836B (en) File management method and device based on alliance block chain
CN110096903B (en) Asset verification method based on block chain and block chain network system
CN101529792A (en) Method and apparatus for delivering encoded content
EP3905076A1 (en) Content protection
US11917071B2 (en) Data protection using universal tagging
CN101689989A (en) creating and validating cryptographically secured documents
CN111405223A (en) Video processing method, device and equipment
CN111046346A (en) Book copyright protection platform based on block chain, equipment and medium
CN116167017A (en) Shoe original design AI digital copyright management system based on blockchain technology
CN113077264A (en) Copyright protection method and system based on block chain and timestamp technology
JP4105583B2 (en) Wireless tag security expansion method, ID management computer device, proxy server device, program thereof, and recording medium of the program
CN114254269A (en) System and method for determining rights of biological digital assets based on block chain technology
CN116436708A (en) Trusted data sharing method and system based on blockchain technology
CN117454442A (en) Anonymous security and traceable distributed digital evidence obtaining method and system
CN103955633A (en) Electronic audio-visual product copyright management method based on dynamic information verification
CN117134893A (en) Digital collection processing method, device and system
CN113342802A (en) Method and device for storing block chain data
Kaushik et al. Securing the transfer and controlling the piracy of digital files using Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20230815

WW01 Invention patent application withdrawn after publication