[go: up one dir, main page]

CN118468350A - Distributed authentication method and system for intellectual property rights and interests based on blockchain - Google Patents

Distributed authentication method and system for intellectual property rights and interests based on blockchain Download PDF

Info

Publication number
CN118468350A
CN118468350A CN202410642189.8A CN202410642189A CN118468350A CN 118468350 A CN118468350 A CN 118468350A CN 202410642189 A CN202410642189 A CN 202410642189A CN 118468350 A CN118468350 A CN 118468350A
Authority
CN
China
Prior art keywords
intellectual property
information
authentication
rights
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410642189.8A
Other languages
Chinese (zh)
Inventor
吴哲伊
梁兴通
傅福斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haisi Xiamen E Commerce Intellectual Property Operation Center Co ltd
Original Assignee
Haisi Xiamen E Commerce Intellectual Property Operation Center Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haisi Xiamen E Commerce Intellectual Property Operation Center Co ltd filed Critical Haisi Xiamen E Commerce Intellectual Property Operation Center Co ltd
Priority to CN202410642189.8A priority Critical patent/CN118468350A/en
Publication of CN118468350A publication Critical patent/CN118468350A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a distributed authentication method and a distributed authentication system for intellectual property rights based on a blockchain, which belong to the technical field of intellectual property management and comprise the following steps: uploading intellectual property rights information to the intellectual property rights blockchain; authenticating the uploaded intellectual property right information by using an intelligent contract, and judging whether an authentication result of the intellectual property right information is valid or not; and storing the authentication result to the distributed account book of the intellectual property rights block chain by calling the intelligent contract. The system includes a receiving unit, an acquiring unit, an authenticating unit, and a registering unit. The distributed authentication method and the system for intellectual property rights based on the blockchain record the rights and interests of the intellectual property owners on the distributed account book by using the blockchain technology, ensure the authenticity and the credibility of authentication by using intelligent contracts, and provide a safer, more reliable, more efficient and more convenient intellectual property authentication mode by adopting a decentralization authentication mode.

Description

Distributed authentication method and system for intellectual property rights and interests based on blockchain
Technical Field
The invention relates to the technical field of intellectual property management, in particular to a distributed authentication method and a distributed authentication system for intellectual property rights based on a blockchain.
Background
With the society entering a new development stage, the promotion of high-quality development is a necessary requirement for keeping economic continuous healthy development, the effect of intellectual property as a national development strategic resource and an international competitive core element is more remarkable, and the awareness of the whole society intellectual property is gradually improved. However, the current intellectual property generally needs to go to the related official network by oneself to query information to confirm the right of the intellectual property, so that the operation is complex, the time consumption is long, and the information is easily misled by false information of lawbreakers, so that piracy and infringement events frequently occur, and the intellectual property rights and interests are difficult to maintain personal interests.
Currently, certification of intellectual property is mainly based on authority certification by a central institution, and there are many problems in this way, for example: the central authorities are easily targeted for hacking, the centralized authentication mode is easily tampered with, etc. In addition, the existing blockchain technical authentication schemes have the problems of long authentication period, high complexity, easy attack and the like, and the problems also seriously affect the efficiency and the security of intellectual property authentication.
Existing intellectual property protection techniques have a number of problems, the most prominent of which are technical unreliability and security issues. In particular in the field of intellectual property authentication, current techniques often fail to ensure the authenticity and trustworthiness of the authentication, which presents significant risks and inconveniences to the intellectual property owners and users. In the conventional intellectual property transfer process, transactions are usually completed through an intermediary agency or legal procedure, which not only has high time cost, but also has the problems of asymmetric information, fraud, disputes and the like. Because the blockchain is used as the information technology of the decentralised database, an integrated solution and important technical support are provided for intellectual property management. Based on this, it is an object of the present invention to provide an intellectual property rights system based on blockchain distributed certification to solve these problems of the prior art.
Disclosure of Invention
In order to overcome the defects of the prior art, the technical problem to be solved by the invention is to provide a distributed authentication method and a distributed authentication system for intellectual property rights based on a blockchain, wherein the rights and interests of an intellectual property owner are recorded on a distributed account book by using a blockchain technology, and the authenticity and the credibility of authentication are ensured by using an intelligent contract. Meanwhile, the invention adopts a decentralization authentication mode, and ensures the security and fairness of authentication. Therefore, the invention aims to provide a safer, more reliable, more efficient and more convenient intellectual property authentication mode.
To achieve the purpose, the invention adopts the following technical scheme:
The invention provides a distributed authentication method for intellectual property rights based on a blockchain, which comprises the following steps:
S10: uploading intellectual property rights information to an exclusive blockchain, wherein the exclusive blockchain is an intellectual property rights authentication chain;
S20: authenticating the uploaded intellectual property right information by using an intelligent contract, and judging whether an authentication result of the intellectual property right information is valid or not;
S30: if the authentication result is valid, outputting the authentication result, and storing the authentication result to the distributed account book of the exclusive blockchain by calling the intelligent contract when the authentication result indicates that the intellectual property rights and interests information passes authentication;
s40: if the authentication result is invalid, reminding the user of authentication failure and ending the task.
The preferred technical scheme of the invention is that the intelligent contract is used for authenticating the uploaded intellectual property rights and interests information, and judging whether the authentication result of the intellectual property rights and interests information is valid or not comprises the following steps:
Carrying out hash operation processing on the uploaded intellectual property rights and interests information to obtain data fingerprint information, sequentially carrying out signature verification and rights and interests verification on the data fingerprint information, and judging whether an authentication result of the intellectual property rights and interests information is effective or not;
If the data fingerprint information sequentially performs signature verification and rights verification, and the signature verification and the rights verification pass, the authenticity and the attribute of the intellectual property rights information pass, the authentication result is valid, otherwise, the authentication result is invalid and the task is ended.
The preferred technical scheme of the invention is that the hash operation processing is carried out on the uploaded intellectual property rights information, and the hash operation processing comprises the following steps:
carrying out hash operation processing on the uploaded intellectual property right information, generating a digest hash value of the data fingerprint information of the current intellectual property right, and judging whether the digest hash value of the data fingerprint information exists in a digest Ha Xiku stored in the intellectual property right block chain;
If so, indicating that the current intellectual property right information is registered in the intellectual property right blockchain, and reminding an uploading person to upload information again;
if not, writing the data fingerprint information of the current intellectual property into the intellectual property right block chain, and recording uploading time and authentication results.
The preferred technical scheme of the invention is that the signature verification comprises the following steps:
Matching the signature information of the uploading person with the signature information in the signature information library stored in the intellectual property rights block chain, and judging whether the signature of the uploaded intellectual property rights information is matched or not;
If the signatures are matched, carrying out the rights and interests verification;
and if the signatures are not matched, re-verifying the intellectual property rights and interests information.
The preferred technical scheme of the invention is that if the signature verification is not matched, a knowledge verification intellectual property rights and interests information base is called to verify whether the intellectual property rights and interests are transferred or not;
if the intellectual property rights and interests are transferred, determining whether the transferred rights and interests are matched with the signature;
If the transferred rights and the signature are matched, the signature information base is updated, otherwise, the task is ended.
The preferred technical scheme of the invention is that the rights and interests verification comprises:
according to the uploaded intellectual property rights information, matching the identity information of the uploading person with the right person information of the current intellectual property rights information, and verifying whether the uploading person has rights for authentication;
if the information is successfully matched, the uploading person is indicated to have authentication authority, wherein if the identity of the uploading person is the intellectual property owner or the user authorized by the intellectual property owner, the uploading person is indicated to have authentication authority;
if the information matching fails, reminding an uploading person to check the identity information again, and ending the task.
The preferred technical scheme of the invention is that each intellectual property owner is provided with a distributed identity DID account on the intellectual property right block chain;
The distributed identity DID account comprises a super public key pair, a sub public key pair, a super private key pair and a sub private key pair, and is used for encryption, decryption and signature verification;
The distributed identity DID account hosts an intellectual property management bureau through an uploading sub public key and is used for issuing a signature;
The super public key pair and the super private key pair are issued by a local Ca, generated based on an sm2 algorithm, and subjected to local escrow, and the super private key pair provides unique downloading;
The sub public key pair and the sub private key pair are both generated by the derivation of the user according to the super private key pair and uploaded to the local side trusteeship, and signature verification and decryption are carried out when the sub public key pair and the sub private key pair are used;
and creating an intellectual property non-homogeneous verification model token for mapping the entity intellectual property on a blockchain network, so that the entity intellectual property content is stored on the intellectual property right blockchain by adopting distributed storage.
The preferred technical scheme of the invention is that the intellectual property right blockchain stores and records uploading information, uploading time, authentication result, signature record, verification record, authorization record and transaction information of the intellectual property right to form a blockchain tracing mechanism;
The blockchain tracing mechanism is used for tracing the history record process of creation, modification and transfer of intellectual property rights.
The preferred technical scheme of the invention is that the intelligent contract adopts a multi-factor authentication mechanism to authenticate the uploaded intellectual property rights and interests information;
The multi-factor authentication mechanism includes at least one authentication mechanism of password authentication, biometric authentication, and verification code authentication.
The preferable technical scheme of the invention is that a credit system model based on data consensus nodes is established by utilizing a consensus algorithm, the state of an account book is confirmed through the interaction of multiple nodes, the actual condition of the account book record is decided by combining the credit weighting evaluation of the nodes, and the authenticity of the intellectual property rights and interests information and the decisions of the attributes are agreed by all the nodes;
wherein the ledger is used for recording matters generated by the intellectual property rights authentication chain, and the matters comprise proposal phase, voting phase and acceptance phase matters.
The invention provides an authentication system adopting the distributed authentication method for intellectual property rights based on blockchain, which comprises the following steps:
a receiving unit for receiving an intellectual property rights information authentication request of an uploading person;
an acquisition unit configured to acquire the intellectual property rights and interests information, hash information, and signature information;
the authentication unit is used for carrying out examination and authentication on the signature information of the uploading person and the uploaded intellectual property right information by calling the intelligent contract to obtain an authentication result of the intellectual property right information authentication request;
And the registration unit is used for recording the uploading information, the uploading time, the authentication result, the signature record, the verification record, the authorization record and the transaction information storage of the intellectual property rights and interests to the intellectual property rights and interests blockchain.
The beneficial effects of the invention are as follows:
1. The safety and reliability are improved: the security and reliability of authentication are ensured by adopting a decentralization authentication mechanism and a multi-factor authentication mode.
2. More efficient and convenient: and by adopting a block chain technology and an intelligent contract, automatic management and quick authentication are realized, and the efficiency and convenience of the system are improved.
3. More fair and fair: the decentralization authentication mechanism can ensure fairness and fairness of authentication and avoid authority abuse of a central agency.
4. The intellectual property owner can use own public and private key pair to infinitely create rights and interests copies, is similar to a special identity card with watermarking and is applied to each actual service, and can authenticate the authenticity and attribution validity of rights and interests only by showing the corresponding private key by the intellectual property owner or the intellectual property authorizer.
Drawings
Fig. 1 is a schematic flow control diagram of a distributed authentication method for intellectual property rights based on blockchain in an embodiment of the present invention.
Fig. 2 is a schematic block diagram of an authentication system employing a blockchain-based intellectual property rights distributed authentication method according to an embodiment of the present invention.
FIG. 3 is a flowchart illustrating the overall operation of a distributed authentication method for intellectual property rights based on blockchain as provided in an embodiment of the present invention.
Fig. 4 is a schematic diagram of a system architecture of an authentication system employing a blockchain-based intellectual property rights distribution authentication method according to an embodiment of the present invention.
In the figure:
1. A receiving unit; 2. an acquisition unit; 3. an authentication unit; 4. a registration unit.
Detailed Description
The technical scheme of the invention is further described below by the specific embodiments with reference to the accompanying drawings.
Example 1
As shown in fig. 1 to fig. 4, in order to avoid the security problem that the centralized authentication mode is easy to tamper with information, the known authentication process is ensured to be safer, more reliable, more efficient and more convenient, and furthermore, the distributed authentication method for intellectual property rights and interests based on blockchain provided in the embodiment comprises the following steps:
S10: uploading intellectual property rights information to an exclusive blockchain, wherein the exclusive blockchain is an intellectual property rights authentication chain;
S20: authenticating the uploaded intellectual property right information by using an intelligent contract, and judging whether an authentication result of the intellectual property right information is valid or not;
S30: if the authentication result is valid, outputting the authentication result, and storing the authentication result to the distributed account book of the exclusive blockchain by calling the intelligent contract when the authentication result indicates that the intellectual property rights and interests information passes authentication;
s40: if the authentication result is invalid, reminding the user of authentication failure and ending the task.
The intellectual property owner uploads the own intellectual property right information to the blockchain through a system interface, and the uploaded intellectual property right information can comprise various types of intellectual property right information such as copyright, patent, trademark and the like, wherein the intellectual property right information comprises a right person name, a right person identity certificate, a right person contact way, a right name, a right scope, a right term and the like. Through the process, the rights and interests information of the intellectual property owners is recorded on the distributed account book of the blockchain, so that the non-tamper property and security of the information are ensured. Here authentication will be divided into two parts, meaning passing authentication to varying degrees: firstly, the authenticity of the rights and interests information can be checked through the normal signature disclosed by the office party and can be decrypted and applied when the user party issues the rights and interests information; the second property of the rights information can be verified to have the right to use by using the authorization mode of the user. Wherein, the office party represents authority management mechanisms such as an intellectual property management office, a central institution and the like.
In order to ensure that the identity of the uploader is the intellectual property owner, the intellectual property rights information needs to be authenticated to ensure the safe reliability of the intellectual property management. Further, smart contracts are used to ensure authenticity and trustworthiness of the authentication to prevent malicious attacks and tampering of intellectual property beneficial information. Automated intellectual property transfer is achieved through blockchain intelligence contracts. The intelligent contract can be automatically executed under the condition that the preset condition is met, manual intervention is not needed, and the transaction efficiency and the credibility are improved. The method can combine various authentication modes such as data hash authentication, signature authentication, rights and interests authentication, password authentication, biological feature authentication, verification code authentication and the like, so that an uploading user is ensured to be the owner of the intellectual property or a user authorized by the owner of the intellectual property, and the safety and reliability of the information authentication of the rights and interests of the intellectual property are ensured.
Preferably, the authenticating the uploaded intellectual property right information by using the intelligent contract, and judging whether the authentication result of the intellectual property right information is valid, includes:
Carrying out hash operation processing on the uploaded intellectual property rights and interests information to obtain data fingerprint information, sequentially carrying out signature verification and rights and interests verification on the data fingerprint information, and judging whether an authentication result of the intellectual property rights and interests information is effective or not;
If the data fingerprint information sequentially performs signature verification and rights verification, and the signature verification and the rights verification pass, the authenticity and the attribute of the intellectual property rights information pass, the authentication result is valid, otherwise, the authentication result is invalid and the task is ended.
And carrying out hash processing on the uploaded intellectual property rights and interests information to generate a unique data fingerprint. The hash algorithm has the main functions of ensuring the consistency and the non-falsification of the data and reducing the cost of data storage and transmission. Wherein, the hash algorithm can adopt SHA-256, MD5 and the like. The authenticity and effectiveness of the intellectual property rights and interests information can be ensured through hash operation verification.
The data fingerprint information is carried by the office party when issuing and signed by the private key of the office party, and is stored in a chain after being encrypted by using the encryption private key submitted when the party to which the rights belong applies, and is stored icfs by a fragmentation technology, so that the data security is ensured and the data privacy is also ensured. The public key provided by the office party to the public is an important certificate for verifying the authenticity of the information, and all people can download or obtain the public information to the official network. The public key can be verified by the public party, the authenticity of the rights and interests can be verified by decrypting the information from the party, the verification can be released, the fact that the party is actually the party can be verified, and the metadata can be indexed to the metadata through the complete distributed storage link address to download and reconstruct to obtain the actual text.
Preferably, the hash operation processing for the uploaded intellectual property right information includes:
carrying out hash operation processing on the uploaded intellectual property right information, generating a digest hash value of the data fingerprint information of the current intellectual property right, and judging whether the digest hash value of the data fingerprint information exists in a digest Ha Xiku stored in the intellectual property right block chain;
If so, indicating that the current intellectual property right information is registered in the intellectual property right blockchain, and reminding an uploading person to upload information again;
if not, writing the data fingerprint information of the current intellectual property into the intellectual property right block chain, and recording uploading time and authentication results.
When the intellectual property right information authentication is carried out, firstly, the hash value of the intellectual property right information to be authenticated is calculated, specifically, the hash value of text information such as the intellectual property copyright information, abstract content and the like is calculated, wherein, the hash value calculation can be carried out by adopting an MD5 algorithm,
The method comprises the steps of carrying out MD5 calculation on byte streams of intellectual property right information data to be authenticated to obtain 64-bit abstract ciphertext, inquiring whether the hash value of the intellectual property right information to be authenticated has a matched hash value in an intellectual property right block chain, if so, indicating that the intellectual property right information to be authenticated exists in the intellectual property right block chain, not allowing the intellectual property to be repeatedly registered, and if not, writing data fingerprints into the block chain, and recording uploading time and authentication results. The authentication results are written onto the blockchain for subsequent querying and verification. Through the process, the uniqueness of the intellectual property rights and interests information is ensured, and the repeated authentication registration problem is avoided.
It should be noted that, the hash value is obtained by calculating the content of the file of the intellectual property rights and interests information, the hash value can change along with the change of the file content, the hash value can be stored as the name of the file, the repeated registration of the intellectual property rights and interests information can be avoided to a certain extent through the hash value, the consistency and the non-falsifiability of the data are ensured, and the cost of data storage and transmission can be reduced. Each right hash value is unique, so that the repeatability is ensured, and the real file can be verified on the premise of not unlocking the whole capacity of the real file, thereby obtaining the authentication result of the authenticity and the attribution.
In order to ensure that the uploaded intellectual property rights and interests information is real and effective intellectual property rights information and ensure the accuracy and reliability of the information, further, hash operation processing is carried out on the copyrighted information in the uploaded intellectual property rights and interests information, wherein the copyrighted information comprises an intellectual property name, an application number or a registration number, an applicant or a right man, abstract hash of the copyrighted information of the current intellectual property rights is extracted, and whether the abstract hash of the copyrighted information is matched with abstract hash in abstract Ha Xiku of the copyrighted information of the intellectual property rights registered by the national intellectual property bureau is judged;
if the matching is successful, indicating that the current intellectual property rights and interests information is real and effective information;
If the matching fails, the current intellectual property rights and interests information is indicated to be invalid information, and an uploading person is reminded to upload information again.
Preferably, the signature verification includes:
Matching the signature information of the uploading person with the signature information in the signature information library stored in the intellectual property rights block chain, and judging whether the signature of the uploaded intellectual property rights information is matched or not;
If the signatures are matched, carrying out the rights and interests verification;
and if the signatures are not matched, re-verifying the intellectual property rights and interests information.
In the process of block chain authentication, signature verification is required to be carried out on the uploaded rights and interests information so as to ensure that the identity of an uploading person is true and reliable. The digital signature algorithm is a cryptography-based encryption technology, and can encrypt and decrypt information and verify the authenticity and integrity of the information. Common digital signature algorithms are RSA, DSA, ECDSA, etc.
In a specific embodiment, the intelligent contract verifies the data fingerprint to determine whether the uploaded intellectual property rights information is valid. The signature verification is used for judging whether the signatures of the uploading rights and interests information are matched or not so as to identify whether the identity of the uploading person is legal and effective or not, and the identity of the uploading person is ensured to be true and reliable. The identity of the uploading person is the intellectual property owner which is identified and authenticated by the system and registers the signature information or the user which is authorized by the intellectual property owner to sign the information, and the identity is identified as legal and effective identity.
Further, if the signature verification is not matched, calling a knowledge verification intellectual property rights and interests information base to verify whether the intellectual property rights and interests are transferred or not;
if the intellectual property rights and interests are transferred, determining whether the transferred rights and interests are matched with the signature;
If the transferred rights and the signature are matched, the signature information base is updated, otherwise, the task is ended.
In the event of transfer, the transferor re-encrypts the information for storage in pieces, and embodies the asset transfer operation in the equity contracts, and the distributed storage is also transferred. Due to the uniqueness of the hash value, the rights and interests stored on the chain can only be independently used at each moment, and the decryption can only be carried out by using the public and private keys of the real owners, and the original owners do not have the decryption use capability after transfer.
Preferably, the rights verification includes:
according to the uploaded intellectual property rights information, matching the identity information of the uploading person with the right person information of the current intellectual property rights information, and verifying whether the uploading person has rights for authentication;
if the information is successfully matched, the uploading person is indicated to have authentication authority, wherein if the identity of the uploading person is the intellectual property owner or the user authorized by the intellectual property owner, the uploading person is indicated to have authentication authority;
if the information matching fails, reminding an uploading person to check the identity information again, and ending the task.
By judging that the identity information of the uploading user is matched with the right person information, when the identity of the uploading user is the intellectual property owner or the user authorized by the intellectual property owner, the uploading user is indicated to have authentication rights, so that the property of the intellectual property rights and interests information is verified, and the right of use can be verified by using a user authorization mode.
Preferably, each intellectual property owner is provided with a distributed identity DID account on the intellectual property rights block chain;
The distributed identity DID account comprises a super public key pair, a sub public key pair, a super private key pair and a sub private key pair, and is used for encryption, decryption and signature verification;
The distributed identity DID account hosts an intellectual property management bureau through an uploading sub public key and is used for issuing a signature;
The super public key pair and the super private key pair are issued by a local Ca, generated based on an sm2 algorithm, and subjected to local escrow, and the super private key pair provides unique downloading;
The sub public key pair and the sub private key pair are both generated by the derivation of the user according to the super private key pair and uploaded to the local side trusteeship, and signature verification and decryption are carried out when the sub public key pair and the sub private key pair are used;
and creating an intellectual property non-homogeneous verification model token for mapping the entity intellectual property on a blockchain network, so that the entity intellectual property content is stored on the intellectual property right blockchain by adopting distributed storage.
The adoption of a distributed identity DID account corresponds to opening an account at a bank and then placing rights and interests into a safe. Specifically, the user applies for opening an account on the platform, real-name authentication is carried out by the office party, a corresponding DID is generated after the real-name authentication is passed, the DID comprises a unique account on a chain, and the DID account comprises a super public key pair and a sub public key pair. The super public-private key pair is issued by the office Ca, generated based on the sm2 algorithm, and the public key pair is subjected to office hosting, and the private key pair provides a unique download. The sub-private key pair and the public-private key pair are generated by the user according to the super private key pair in a derived mode and uploaded to the local side host, the generation algorithm is not limited, the user determines the sub-private key pair and the public-private key pair by using the corresponding algorithm in use, signature verification and decryption are achieved, all the public-private key pairs are managed through local side management and on-chain mounting operation, and the super private key pair and the sub-private key pair are used for encryption, decryption and signature verification.
It should be noted that, in order to ensure that the ownership and the usage rights of the intellectual property owners are safer and more reliable, the reliability is higher, so that the product or service has leading uniqueness without actually disclosing the technical details of the product or service to the clients or the public. The present invention should therefore focus on utilizing the binding of blockchain distributed identities to intellectual property.
Each intellectual property owner is temporarily set as a company, each company has a unique identity in the intellectual property blockchain network, which is called a distributed identity DID account temporarily, the distributed identity DID account owner has a super public and private key pair on hand, and a plurality of fixed sub public and private key pairs are arranged below the super public and private key pair for encryption, decryption and signature verification.
The general logic is that each piece of applied intellectual property is issued by the intellectual property management bureau, the DID account owner is hosted by the intellectual property management bureau through uploading a sub public key for signature issuing, and meanwhile, an intellectual property non-homogeneous general certificate model token is created for mapping the entity intellectual property on a blockchain network, and the content of the entity intellectual property is stored by using distributed storage and bound with the token one to one.
The DID account owner may disclose the token in any of his products or descriptions and issue a child private key and a super private key to the verifying party to be checked, and verifying the signature of the intellectual property authority with the child private key may achieve verification of the authenticity of the asset. The knowledge right can be proved to be really owned by the DID account owner by using the super private key.
The system can also be used for realizing the scene of intellectual property transfer or authorized use. In particular, the transfer process is similar to token transfer transaction, and the token ownership is transferred to the name of the new DID account owner, and the transfer process is also applicable to the logic of the super public and private key pair and the sub public and private key pair. Except that the electronic content in the distributed storage needs to be re-encrypted with the new master's private key and saved.
In an authorized use scenario, authorized use requires the use of a specific smart contract, similar to signature logic that is valid for a period of time. The method is characterized in that an intelligent contract is created by using a super private key of a DID account owner, which is equivalent to an independent Ca visa mechanism-belonging to the DID account owner, ca can perform secondary issuing operation on all assets under the name of the Ca, but the intelligent contract has certain timeliness (set by the DID account owner), namely, a certificate issued by Ca has a specific public-private key pair and becomes an authorized public-private key pair temporarily, the intelligent contract is paid to an authorizer, the authorizer holds the authorized public-private key pair and can check signature of a specific sub private key signature by a function similar to that of the super private key, the encryption of the sub public key is decrypted, the unique difference is that the special public key is attached with two invalidation conditions, the effective period of the contract is noted, the special public-private key is automatically invalidated, and the DID account owner can realize immediate invalidation by invoking a breach of faith method of the intelligent contract through the super private key.
Registering the intellectual property right information successfully authenticated in the form of digital assets on the intellectual property right blockchain for carrying out intellectual property transaction and intellectual property assignment tasks; and under the condition that the preset condition is met, the intelligent contract automatically executes the intellectual property transaction and the intellectual property transfer task. In the intellectual property transfer process, payment and settlement issues are involved. Blockchain technology can provide a secure, fast, low cost payment and settlement mechanism while avoiding the cumbersome and costly procedures of traditional financial institutions.
Through the process, the ownership and the use right of the intellectual property owner are ensured to be safer and more reliable, and the reliability is higher.
In order to prevent fraud and disputes in intellectual property transfer, further, the intellectual property right blockchain stores and records uploading information, uploading time, authentication results, signature records, verification records, authorization records and transaction information of the intellectual property right to form a blockchain tracing mechanism;
The blockchain tracing mechanism is used for tracing the history record process of creation, modification and transfer of intellectual property rights.
The intellectual property right blockchain is managed by authority management mechanisms such as a central mechanism, each creation, modification and transfer dynamic state of the intellectual property right is actually recorded in the blockchain, the attribution right or the use right branch of each stage is clearly recorded, the attribution right or the use right branch comprises time, signature records, verification records and the like, and finally a blockchain tracing mechanism is formed. By using the blockchain tracing mechanism, fraud and disputes in intellectual property transfer can be prevented, the history record and the transaction process of the intellectual property transfer can be tracked, the transparency and the credibility of the transaction can be ensured, and the potential risk is avoided.
According to the intellectual property right authentication method, the intellectual property right information, the authentication result, the authorization record, the transaction flow direction and other information are recorded through the blockchain, and the rights and interests of an intellectual property owner and a purchaser are protected through the blockchain. And the problems that the loss of an intellectual property owner is caused by the fault of the management center are avoided by combining the cryptography related technology in the processes of intellectual property authentication, intellectual property registration, intellectual property purchase and intellectual property traceability. The authority management mechanism ensures the legal security of the identity of the verifier through multiple Bool verification (namely invalid verification) such as intellectual property rights and interests information verification, signature verification, rights and interests verification and the like.
Preferably, the intelligent contract adopts a multi-factor authentication mechanism to authenticate the uploaded intellectual property rights information;
The multi-factor authentication mechanism includes at least one authentication mechanism of password authentication, biometric authentication, and verification code authentication.
It should be noted that, the authentication mechanism is used as a way to operate in a convenient application scenario, in fact, the unique text content such as a password, a biological feature, etc. is hashed, and is used as a mapping of the above-mentioned super public-private key pair, and is recorded into the intelligent contract, that is, the super public-private key pair in the intelligent contract can be used by using the authentication methods, so as to transfer, use or authorize the intellectual property rights under the super public-private key pair. But the user must be ensured to keep the password and the biological characteristics safely or a secondary authentication mode can be used. Encryption technology based on cryptography ensures the privacy and security of information by using cryptography technology. The multi-factor authentication method is adopted, and the security and reliability of authentication are ensured by adopting a plurality of authentication methods including password authentication, biological feature authentication, verification code authentication, secondary confirmation and the like. The intellectual property owner uploads own rights and interests information to the blockchain, the system uses the intelligent contract to authenticate, the authentication result is recorded on the blockchain, and the security and reliability of authentication are ensured through a multi-factor authentication mechanism.
Preferably, the intellectual property rights information includes at least one of trademark rights information, patent rights information, copyright rights information, integrated circuit layout design information, and geographical mark information. The application is applicable to rights and interests information authentication of various intellectual property rights and has wider application scenes.
In addition to the above technical solution, the present invention may also adopt various embodiments. For example, intellectual property rights information may be stored on a plurality of blockchain nodes to improve fault tolerance and robustness of the system. In addition, the authorization and licensing process of intellectual property rights can be automatically managed through intelligent contracts to improve the efficiency and operability of the system.
In other embodiments, the invention can also utilize consensus algorithm to create a reputation system model based on data consensus nodes, confirm the state of the account book through the interaction of multiple nodes, combine the credit weighting evaluation of the nodes, and make a decision on the actual condition of the account book record, so that all nodes agree on the authenticity of the intellectual property rights information and the decisions of the attribute;
the account book is used for recording matters generated by the intellectual property rights authentication chain, and the matters comprise proposal phase matters, voting phase matters and acceptance phase matters, and specifically comprises the following steps:
Proposal phase: one or more nodes provide a decision or suggestion to other nodes, make a decision on the authenticity and the attribution of the intellectual property rights and interests information, the reputation system model simulates human society, an event generator can be an intellectual property owner or a user authorized by the intellectual property owner, such as a creator and a modifier newly created by the intellectual property data content or a transferee or a transferor of rights transfer, the simulated event generator broadcasts outwards, the nodes which can be directly contacted are recording nodes, and the actual situation of recording is determined by combining the credit weighting evaluation of the nodes, namely, the authenticity and the attribution of the intellectual property rights and interests information are determined.
Voting: after the node receives the proposal, it needs to vote on the proposal, and usually only if the vote reaches a certain proportion is accepted. The account book state refers to the real state of the blockchain world describing the intellectual property rights and interests authentication chain, the account book generally refers to a notepad, records the occurrence of the intellectual property rights and interests authentication chain, namely when an occurrence happens, the occurrence tells other nodes that the nodes reach consensus to perform unified recording, if people hold anti-opinion, voting is needed, the account book state can be recorded exceeding 2/3, if no agreement or inconsistent response is achieved, an additional node is added to perform voting until a plurality of agreements are achieved.
And (3) a receiving stage: when a proposal is accepted by enough nodes, it can be considered as a consensus result.
In the present invention, a social principle-based consensus algorithm is created, which may be referred to as "social proving consensus" (Social Proof Consensus, SPC). The core of this algorithm is to determine acknowledge a debt the present state through multi-node interactions, while punishing inconsistent respondents. The following is a preliminary, stylized description of this algorithm:
Initializing: each node has an initial reputation score (Reputation Score, RS) indicating its trustworthiness, and certain social network relationships between nodes indicating their familiarity or communication efficiency. All nodes on the network can participate in the record, and the nodes which are recorded in advance actually are a plurality of nodes described by the consensus algorithm.
The query process comprises the following steps: when account balance needs to be verified, a certain number of adjacent nodes (for example 3) are selected to initiate a query, and the query message contains account ID and requested property information. All the evidence-passing economy of the blockchain network refers to token, and the token can be used as a valuable balance record or simply used as an index of more contents.
Response mechanism: the node which receives the inquiry checks the local account book and returns the property information of the account. If a node does not have relevant information, it will forward the query to other nodes it knows. The property information of the invention refers to specific content indexed by the token, such as actual files, content, abstracts and the like of actual intellectual property rights and interests information.
Consistency test: if at least 2/3 of the responses (in the first 3 nodes) are identical, then the consensus result is accepted. If the responses are inconsistent, an additional node is added to vote until a majority agreement is reached.
Reputation system:
an initial reputation value (R i (0) =r 0) is set,
Updating the reputation value after each round of answers based on the correctness of the answer
R_i(t+1)=R_i(t)+DeltaR_{text(pos)};
If the answer is wrong or dishonest
R_i(t+1)=R_i(t)+DeltaR_{text(neg)};
Wherein t represents a time step;
[ DeltaR _ { text (pos) } ] and [ DeltaR _ { text (neg) } ] represent the positive and negative reputation amounts,
Delta = Σ { theoretical Delta value (i) ×number of options (i) ×corresponding rights per option };
In the subsequent queries, the voting weight of node (i) is
Nodes that answer errors, whose RS is subtracted, such as- Δrs, where Δrs is a predetermined deduction value.
Nodes that do not provide information may not be withheld by their RSs if they subsequently provide the correct information, but may be considered unreliable if there are multiple times of no information.
Specifically, when the patent inventor who needs the query technology A1 is company a, it is possible to go to the blockchain network query, broadcast the query, then someone knows and someone else does not know the answer, and the person who does not know can go to ask his friends until the person who has resolved the situation is transferred to answer.
In the process of collecting answers, a person says that company A is an invention of company B, A is borrowed or infringed only, then the result needs to be identified through 2/3 majority voting, then inconsistent I consider as dishonest node, the credit model is deduction processing, and the next time the node answers again needs to be weighted. It should be noted that if you initially ask node a next to you but it answers unknown, then go to ask friend a2 next to her, a2 does not know and then ask a3 again, then a3 gives the wrong answer, then the credit model process will be a3 instead of a. a simply communicates information, similar to the principle of link forwarding where 6 phones can reach the united states president.
Weighted voting: on the next query, the voting weight of the node with the lower reputation score is reduced, for example, w=rs/MaxRS, which is the full reputation score.
Dynamic adjustment: the social network can be dynamically adjusted according to the reputation and interaction effect of the nodes, and frequently-erroneous nodes can be gradually dredged by other nodes.
Final decision: when a majority agreement is reached, the results are recorded into the blockchain and broadcast to the full network.
Randomly selecting (K) nodes (adjacent nodes) from the node set for inquiring,
(K) Satisfy the following requirements
Let (V) be the set of all responses, if there is one financial value (V),
So that
And is also provided with
Then (V) is considered to be the property that has been identified,
If the consensus is not reached, then (K+m) < frac { K } until the consensus is reached,
Wherein (m) is a newly added node.
In the above process, the node set is a node that can be directly contacted after broadcasting, but not all nodes of the present network. The response is an action taken on the event, for example, if the response is a newly added broadcast, it refers to the case that the node set records the event, and if the response is a query, it is the result returned by the query. Property information of the invention refers to specific content indexed by a token, such as actual files, content, abstracts, etc. of actual intellectual property rights information. By coordinating the communication and state conversion between the nodes, the agreement between the nodes is ensured, thereby ensuring the authenticity of the intellectual property rights and interests information and the consistency of decisions made by the attribution of the authentication system.
Example two
As shown in fig. 1 to fig. 4, in order to avoid the security problem that the centralized authentication mode is easy to tamper with information, the known authentication process is ensured to be safer, more reliable, more efficient and more convenient, and meanwhile, a solution which is more efficient, transparent and more reliable is provided for property transfer of intellectual property by adopting a blockchain technology. Further, an authentication system adopting the distributed authentication method for intellectual property rights based on blockchain provided in this embodiment includes:
a receiving unit 1 for receiving an intellectual property rights information authentication request of an uploader;
an obtaining unit 2, configured to obtain the intellectual property rights and interests information, hash information, and signature information;
an authentication unit 3, configured to obtain an authentication result of the intellectual property rights and interests information authentication request by invoking the intelligent contract to perform examination and authentication on the signature information of the uploader and the uploaded intellectual property rights and interests information;
a registration unit 4, configured to record the uploading information, uploading time, authentication result, signature record, verification record, authorization record and transaction information storage of the intellectual property rights and interests onto the intellectual property rights and interests blockchain.
The receiving unit 1 may be configured to receive intellectual property rights information data of an uploader and to receive an authentication request. The acquisition unit 2 acquires the intellectual property rights information, hash information and signature information on the intellectual property rights blockchain, and transmits the information to the authentication unit 3 for examination and authentication, wherein the registration unit 4 is used for storing related information data and flow records on the intellectual property rights blockchain, so that follow-up tracking and inquiring are facilitated.
Through the above process, an authentication system employing blockchain technology can provide a more efficient, transparent and reliable solution for property transfer of intellectual property. Meanwhile, the development of intellectual property trade markets is promoted, and the effective circulation and utilization of the intellectual property are promoted.
While the application has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the application. The application is not to be limited by the specific embodiments disclosed herein, but rather, embodiments falling within the scope of the appended claims are intended to be embraced by the application.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of technical features or steps not listed in a claim. The word "a" or "an" preceding a technical feature does not exclude the presence of a plurality of such technical features. The invention can be implemented by means of hardware comprising several distinct technical features, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms should not be understood as necessarily being directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
The foregoing description is only of the preferred embodiments of the invention, and all changes and modifications that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.

Claims (10)

1. A blockchain-based intellectual property rights distributed authentication method, the method comprising:
S10: uploading intellectual property rights information to an exclusive blockchain, wherein the exclusive blockchain is an intellectual property rights authentication chain;
S20: authenticating the uploaded intellectual property right information by using an intelligent contract, and judging whether an authentication result of the intellectual property right information is valid or not;
S30: if the authentication result is valid, outputting the authentication result, and storing the authentication result to the distributed account book of the exclusive blockchain by calling the intelligent contract when the authentication result indicates that the intellectual property rights and interests information passes authentication;
s40: if the authentication result is invalid, reminding the user of authentication failure and ending the task.
2. The blockchain-based intellectual property rights distributed authentication method of claim 1, wherein:
The authentication of the uploaded intellectual property right information by using the intelligent contract, and judging whether the authentication result of the intellectual property right information is valid, comprises the following steps:
Carrying out hash operation processing on the uploaded intellectual property rights and interests information to obtain data fingerprint information, sequentially carrying out signature verification and rights and interests verification on the data fingerprint information, and judging whether an authentication result of the intellectual property rights and interests information is effective or not;
If the data fingerprint information sequentially performs signature verification and rights verification, and the signature verification and the rights verification pass, the authenticity and the attribute of the intellectual property rights information pass, the authentication result is valid, otherwise, the authentication result is invalid and the task is ended.
3. The blockchain-based intellectual property rights distributed authentication method of claim 2, wherein:
The hash operation processing is carried out on the uploaded intellectual property right information, and the hash operation processing comprises the following steps:
carrying out hash operation processing on the uploaded intellectual property right information, generating a digest hash value of the data fingerprint information of the current intellectual property right, and judging whether the digest hash value of the data fingerprint information exists in a digest Ha Xiku stored in the intellectual property right block chain;
If so, indicating that the current intellectual property right information is registered in the intellectual property right blockchain, and reminding an uploading person to upload information again;
if not, writing the data fingerprint information of the current intellectual property into the intellectual property right block chain, and recording uploading time and authentication results.
4. The blockchain-based intellectual property rights distributed authentication method of claim 2, wherein:
The signature verification includes:
Matching the signature information of the uploading person with the signature information in the signature information library stored in the intellectual property rights block chain, and judging whether the signature of the uploaded intellectual property rights information is matched or not;
If the signatures are matched, carrying out the rights and interests verification;
and if the signatures are not matched, re-verifying the intellectual property rights and interests information.
5. The blockchain-based intellectual property rights distributed authentication method of claim 4, wherein:
if the signature verification is not matched, calling a knowledge verification intellectual property rights and interests information base to verify whether the intellectual property rights and interests are transferred or not;
if the intellectual property rights and interests are transferred, determining whether the transferred rights and interests are matched with the signature;
If the transferred rights and the signature are matched, the signature information base is updated, otherwise, the task is ended.
6. The blockchain-based intellectual property rights distributed authentication method of claim 2 or 4, wherein:
The rights verification includes:
according to the uploaded intellectual property rights information, matching the identity information of the uploading person with the right person information of the current intellectual property rights information, and verifying whether the uploading person has rights for authentication;
if the information is successfully matched, the uploading person is indicated to have authentication authority, wherein if the identity of the uploading person is the intellectual property owner or the user authorized by the intellectual property owner, the uploading person is indicated to have authentication authority;
if the information matching fails, reminding an uploading person to check the identity information again, and ending the task.
7. The blockchain-based intellectual property rights distributed authentication method of claim 1, wherein:
Each intellectual property owner is provided with a distributed identity DID account on the intellectual property rights block chain;
The distributed identity DID account comprises a super public key pair, a sub public key pair, a super private key pair and a sub private key pair, and is used for encryption, decryption and signature verification;
The distributed identity DID account hosts an intellectual property management bureau through an uploading sub public key and is used for issuing a signature;
The super public key pair and the super private key pair are issued by a local Ca, generated based on an sm2 algorithm, and subjected to local escrow, and the super private key pair provides unique downloading;
The sub public key pair and the sub private key pair are both generated by the derivation of the user according to the super private key pair and uploaded to the local side trusteeship, and signature verification and decryption are carried out when the sub public key pair and the sub private key pair are used;
and creating an intellectual property non-homogeneous verification model token for mapping the entity intellectual property on a blockchain network, so that the entity intellectual property content is stored on the intellectual property right blockchain by adopting distributed storage.
8. The blockchain-based intellectual property rights distributed authentication method of claim 1, wherein:
the intellectual property right blockchain stores and records uploading information, uploading time, authentication results, signature records, verification records, authorization records and transaction information of the intellectual property right to form a blockchain tracing mechanism;
The blockchain tracing mechanism is used for tracing the history record process of creation, modification and transfer of intellectual property rights.
9. The blockchain-based intellectual property rights distributed authentication method of claim 1, wherein:
creating a reputation system model based on data consensus nodes by utilizing a consensus algorithm, confirming the state of an account book through interaction of multiple nodes, and deciding the actual condition of the account book record by combining credit weighted evaluation of the nodes so as to enable all nodes to agree on authenticity of the intellectual property rights information and the decisions of the attribute;
wherein the ledger is used for recording matters generated by the intellectual property rights authentication chain, and the matters comprise proposal phase, voting phase and acceptance phase matters.
10. An authentication system employing the blockchain-based intellectual property rights distributed authentication method of any one of claims 1 to 9, comprising:
A receiving unit (1) for receiving an intellectual property rights information authentication request of an uploading person;
An acquisition unit (2) for acquiring the intellectual property rights and interests information, hash information, and signature information;
An authentication unit (3) for obtaining an authentication result of the intellectual property rights and interests information authentication request by invoking the intelligent contract to perform examination and authentication on the signature information of the uploading person and the uploaded intellectual property rights and interests information;
and the registration unit (4) is used for recording the uploading information, uploading time, authentication result, signature record, verification record, authorization record and transaction information storage of the intellectual property rights to the intellectual property rights blockchain.
CN202410642189.8A 2024-05-23 2024-05-23 Distributed authentication method and system for intellectual property rights and interests based on blockchain Pending CN118468350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410642189.8A CN118468350A (en) 2024-05-23 2024-05-23 Distributed authentication method and system for intellectual property rights and interests based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410642189.8A CN118468350A (en) 2024-05-23 2024-05-23 Distributed authentication method and system for intellectual property rights and interests based on blockchain

Publications (1)

Publication Number Publication Date
CN118468350A true CN118468350A (en) 2024-08-09

Family

ID=92149166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410642189.8A Pending CN118468350A (en) 2024-05-23 2024-05-23 Distributed authentication method and system for intellectual property rights and interests based on blockchain

Country Status (1)

Country Link
CN (1) CN118468350A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119359308A (en) * 2024-09-30 2025-01-24 中仓登信息有限公司 Method, system, medium, equipment and program for registration and authentication of electronic title certificate

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119359308A (en) * 2024-09-30 2025-01-24 中仓登信息有限公司 Method, system, medium, equipment and program for registration and authentication of electronic title certificate

Similar Documents

Publication Publication Date Title
US11360963B2 (en) Tracking and verification of physical assets
US11323269B2 (en) Preserving privacy of linked cross-network transactions
CN110771095B (en) Systems and methods for implementing blockchain-based digital certificates
US11334882B1 (en) Data access management on a distributed ledger system
CN110800254B (en) System and method for generating digital signature
WO2020088108A1 (en) Blockchain-based data attestation method and apparatus, and electronic device
WO2023044496A1 (en) Systems and methods for token content unlocking, biometric authentication using privacy-protecting tokens, ownership-based limitations of content access, policy-based time capsule technology, and content lock mechanisms
US20190019180A1 (en) Digital ledger authentication using address encoding
US11356258B2 (en) Methods and systems for distributed cryptographically secured data validation
TW202018557A (en) Data evidence saving method and device based on blockchain and electronic equipment
US20230306412A1 (en) Docket credential insertion in non-fungible tokens
CN109729093A (en) A blockchain-based digital copyright registration technology
WO2023279059A2 (en) Distributed ledgers with ledger entries containing redactable payloads
US20240364529A1 (en) Authenticated Modification of Blockchain-Based Data
CN112052474B (en) Method and system relating to blue-ray copy services
CN116361823A (en) Selective audit processing of blockchains for privacy protection
US20240281796A1 (en) Systems and Methods for Facilitating Digital Wallet-Based Transactions
WO2018088475A1 (en) Electronic authentication method and program
CN111414434B (en) Block chain-based data transaction management network, transaction device and storage medium
CN112801778A (en) Federated bad asset blockchain
JP7607672B2 (en) Authorized event processing in a distributed database.
CN112418851A (en) Digital copyright registration, transaction and protection method and system
US20220278845A1 (en) Honest behavior enforcement via blockchain
CN118468350A (en) Distributed authentication method and system for intellectual property rights and interests based on blockchain
CN112801659A (en) Privacy transaction processing method and device based on intelligent contract and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination