CN108881244A - Intellectual property protection method for network short texts based on block chains - Google Patents
Intellectual property protection method for network short texts based on block chains Download PDFInfo
- Publication number
- CN108881244A CN108881244A CN201810674499.2A CN201810674499A CN108881244A CN 108881244 A CN108881244 A CN 108881244A CN 201810674499 A CN201810674499 A CN 201810674499A CN 108881244 A CN108881244 A CN 108881244A
- Authority
- CN
- China
- Prior art keywords
- intellectual property
- cryptographic hash
- reprinting
- server
- network short
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000013475 authorization Methods 0.000 claims description 12
- 238000011002 quantification Methods 0.000 abstract 1
- 238000013139 quantization Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 239000012634 fragment Substances 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000006854 communication Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
- G06Q50/184—Intellectual property management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Marketing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Primary Health Care (AREA)
- Health & Medical Sciences (AREA)
- Operations Research (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- General Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention belongs to the field of intellectual property protection, and provides a block chain-based intellectual property protection method for a network short text, aiming at the technical problems that whether works are infringed or not is difficult to detect and the 'plagiarism degree' quantification is lacked in the existing intellectual property protection for the network short text, which comprises the following steps: the first stage is as follows: an intellectual property statement; and a second stage: authorizing the transshipment; and a third stage: and (5) maintaining the right. The invention can set the granularity of the protection of the intellectual property rights of the network short texts, and the original author of the network short texts can declare the intellectual property rights of the network short texts in a fine-grained manner, and after finding the infringement, the server compares the illegal reprinting content with the hash value array of the original article to obtain the reprinting proportion value, thereby quantifying the plagiarism degree, being more convenient for the original author to maintain the own right according to the infringement degree of the infringement, and improving the protection of the intellectual property rights of the network short texts.
Description
Technical field
The invention belongs to intellectual property protection fields, and in particular to network of the one kind based on block chain (Blockchain) is short
Literary intellectual property protection method.
Background technique
With the rapid development of the social platforms such as microblogging, wechat, a kind of emerging media format has been increasingly becoming from media.
Expand the influence power of oneself by way of issuing original article from media, to obtain attention rate and income.However, derived from mutual
The opening of networking, the article on internet are extremely easy to be reprinted and plagiarized.In the publication and communication process of original article,
The intellectual property of author is unable to get statement well and protection.From media platform itself to the side of the intellectual property protection of author
Method is only limitted to play " original " label to original article or hits plagiarist by modes such as report, but can not fundamentally protect
The right of authorship.
Block chain technology is the core technology of bit coin (Bitcoin), has gathered distributed system, P2P network, cryptography
Etc. multinomial mature technology, a kind of account book of decentralization that can not be distorted is provided, so that the encryption of bit coin one kind
Currency can reliably can be traded in the case where the regulatory agencies such as no bank control.In addition to electronic banking field,
Block chain technology also has revolutionary application by providing point-to-point trust under distributed environment, in other fields.Example
Such as in copyright protection field, author can be using Hash (hash) value of oneself works as a part of information preservation of transaction in area
In block chain, as the intellectual property statement to oneself works.It can not be distorted using data in block chain, the characteristic that can be traced,
Protect the right of oneself.
There is preferable application using intellectual properties fields such as block chain protection picture, music in the prior art, but in net
In terms of the intellectual property protection of network short essay, also have the following drawbacks and deficiency:
(1) plagiarist of network short essay may can't original text reprint original article, but part of plagiarism paragraph or sentence,
It is difficult to entire article progress Hash to detect whether works are encroached right merely;
(2) cribbing of network short essay cannot only lean on single cryptographic Hash to compare and determine, lack to " plagiarizing degree "
Quantization.
Summary of the invention
The present invention exists for the intellectual property protection of existing network short essay is difficult to detect whether works are encroached right and lacked pair
The technical issues of " plagiarizing degree " quantization, a kind of network short essay intellectual property protection method based on block chain is provided, by setting
The granularity of network short essay intellectual property protection is set, the authorship of network short essay can be with fine granularity to network short essay intellectual property
It is stated, after discovery is encroached right, illegal content of reprinting is carried out cryptographic Hash after Hash processing with original article by server
Array compares, the ratio value reprinted, and then to " plagiarizing degree " quantization, more convenient authorship is according to infringer
Infringement degree safeguard oneself right, improve the protection of network short essay intellectual property.
Technical solution of the present invention includes intellectual property statement, authorization reprinting, right-safeguarding three phases, is included the following steps:
First stage:Intellectual property statement, has main steps that:
1.1 authors upload onto the server the original article of oneself, and select the granularity of intellectual property protection, and note is known
The granularity for knowing property right protection is segment;
The intellectual property protection granularity that 1.2 servers use hash algorithm to choose according to user, owns original article
Fragment computations cryptographic Hash;
1.3 servers establish archives to the works, save the Hash of full text and the cryptographic Hash array of each segment;
1.4 servers are that each cryptographic Hash in array creates a transaction in block chain, save it in transaction
In Optional Field, while authorship's identity information and the timestamp of transaction being saved in the server;
Second stage:Authorization is reprinted, and is had main steps that:
2.1 reprinting persons will reprint content uploading to server, request authorship's authorization;
2.2 authorships check reprinting content, if agreeing to reprint, with oneself private key to the cryptographic Hash of reprinting content into
Row signature, submits to server for the cryptographic Hash of original article and its private key signature;If disagreeing reprinting, turn the phase III;
After 2.3 server authentications signature, a block chain transaction is created, by the cryptographic Hash of original article, reprints content
Cryptographic Hash and authorship sign in the Optional Field that deposit is traded;Simultaneously by the time of the identity information of the reprinting person and transaction
Stamp saves in the server, to retrieve corresponding block, and informs authorship;
Phase III:Right-safeguarding has main steps that:
3.1, when authorship has found illegal reprint, will illegally reprint content uploading to server;
3.2 servers calculate the cryptographic Hash of each segment after dividing article of encroaching right according to intellectual property protection granularity, obtain
To cryptographic Hash array;Then the cryptographic Hash array of obtained cryptographic Hash array and original article is compared, the ratio reprinted
Value;
3.3 users submit to the ratio value as the evidence of infringement degree from media platform or the progress of other right-safeguarding departments
Network short essay intellectual property right-safeguarding.
As the further improvement of technical solution of the present invention, in the step 1.1, granularity, that is, piece of intellectual property protection
Section is sentence or paragraph.
Following technical effect can achieve using the present invention:
1, in step 1.1 of the present invention be arranged the intellectual property protection of network short essay granularity, can be sentence or paragraph, in turn
The authorship of network short essay with fine granularity can state solve part in the prior art to network short essay intellectual property
Paragraph or sentence plagiarized, is difficult to entire article progress Hash the technical issues of whether works are encroached right detected merely.
2, in the second stage authorization reprinting stage of the present invention, feelings are reprinted in the authorization that authorship can see oneself works
Condition.
3, the present invention discovery encroached right after, in step 3.2, server will illegally reprint content carry out Hash processing after with
The cryptographic Hash array of original article compares, the ratio value reprinted, and then to " plagiarizing degree " quantization, authorship will
The ratio value is submitted to from media platform or other right-safeguarding departments as the evidence of infringement degree and carries out network short essay intellectual property
Right-safeguarding, by the quantization to " plagiarizing degree ", more convenient authorship safeguards the power of oneself according to the infringement degree of infringer
Benefit.
Detailed description of the invention
Fig. 1 is the network short essay intellectual property protection method flow diagram the present invention is based on block chain;
Fig. 2 is first stage intellectual property statement treatment process figure of the invention;
Fig. 3 is that treatment process figure is reprinted in second stage authorization of the present invention;
Fig. 4 is phase III right-safeguarding process flow diagram of the invention.
Specific embodiment
Fig. 1 is the network short essay intellectual property protection method flow diagram the present invention is based on block chain.Technical side of the invention
Case includes intellectual property statement, authorization reprinting, right-safeguarding three phases, is included the following steps:First stage:Intellectual property statement;
Second stage:Authorization is reprinted;Phase III:Right-safeguarding.
Fig. 2 is first stage intellectual property statement treatment process figure of the invention.It has main steps that:
1.1 authors upload onto the server the original article of oneself, and select the granularity of intellectual property protection, and note is known
The granularity for knowing property right protection is segment;
The Hash granularity intellectual property protection granularity that 1.2 servers use hash algorithm to choose according to user, to original text
All fragment computations cryptographic Hash of chapter;
1.3 servers establish archives to the works, save the Hash of full text and the cryptographic Hash array of each segment;
1.4 servers are that each cryptographic Hash in array creates a transaction in block chain, save it in transaction
In Optional Field, while authorship's identity information and the timestamp of transaction being saved in the server.
Fig. 3 is that treatment process figure is reprinted in second stage authorization of the present invention.It has main steps that:
2.1 reprinting persons will reprint content uploading to server, request authorship's authorization;
2.2 authorships check reprinting content, if agreeing to reprint, with oneself private key to the cryptographic Hash of reprinting content into
Row signature, submits to server for the cryptographic Hash of original article and its private key signature;If disagreeing reprinting, turn the phase III;
After 2.3 server authentications signature, a block chain transaction is created, by the cryptographic Hash of original article, reprints content
Cryptographic Hash and authorship sign in the Optional Field that deposit is traded;Simultaneously by the time of the identity information of the reprinting person and transaction
Stamp saves in the server, to retrieve corresponding block, and informs authorship.
Fig. 4 is phase III right-safeguarding process flow diagram of the invention.It has main steps that:
3.1, when authorship has found illegal reprint, will illegally reprint content uploading to server;
3.2 servers calculate the cryptographic Hash of each segment after dividing article of encroaching right according to intellectual property protection granularity, obtain
To cryptographic Hash array;Then the cryptographic Hash array of obtained cryptographic Hash array and original article is compared, the ratio reprinted
Value;
3.3 users submit to the ratio value as the evidence of infringement degree from media platform or the progress of other right-safeguarding departments
Network short essay intellectual property right-safeguarding.
Claims (2)
1. a kind of network short essay intellectual property protection method based on block chain, which is characterized in that including intellectual property statement, award
Power reprinting, right-safeguarding three phases, process are as follows:
First stage:Intellectual property statement, has main steps that:
1.1 authors upload onto the server the original article of oneself, and select the granularity of intellectual property protection, and note knowledge produces
The granularity of power protection is segment;
The intellectual property protection granularity that 1.2 servers use hash algorithm to choose according to user, to all segments of original article
Calculate cryptographic Hash;
1.3 servers establish archives to the works, save the Hash of full text and the cryptographic Hash array of each segment;
1.4 servers are that each cryptographic Hash in array creates a transaction in block chain, save it in the optional of transaction
In field, while authorship's identity information and the timestamp of transaction being saved in the server;
Second stage:Authorization is reprinted, and is had main steps that:
2.1 reprinting persons will reprint content uploading to server, request authorship's authorization;
2.2 authorships check reprinting content, if agreeing to reprint, are signed with the private key of oneself to the cryptographic Hash for reprinting content
Name, submits to server for the cryptographic Hash of original article and its private key signature;If disagreeing reprinting, turn the phase III;
After 2.3 server authentications signature, a block chain transaction is created, by the Hash of the cryptographic Hash of original article, reprinting content
Value and authorship sign in the Optional Field that deposit is traded;The identity information of the reprinting person and the timestamp of transaction are protected simultaneously
In presence server, and inform authorship;
Phase III:Right-safeguarding has main steps that:
3.1, when authorship has found illegal reprint, will illegally reprint content uploading to server;
3.2 servers calculate the cryptographic Hash of each segment after dividing article of encroaching right according to intellectual property protection granularity, breathed out
Uncommon value array;Then the cryptographic Hash array of obtained cryptographic Hash array and original article is compared, the ratio value reprinted;
The ratio value is submitted to as the evidence of infringement degree from media platform or other right-safeguarding departments and carries out network by 3.3 users
Short essay intellectual property right-safeguarding.
2. the network short essay intellectual property protection method based on block chain as described in claim 1, which is characterized in that the step
In rapid 1.1, granularity, that is, segment of intellectual property protection is sentence or paragraph.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810674499.2A CN108881244A (en) | 2018-06-27 | 2018-06-27 | Intellectual property protection method for network short texts based on block chains |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810674499.2A CN108881244A (en) | 2018-06-27 | 2018-06-27 | Intellectual property protection method for network short texts based on block chains |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108881244A true CN108881244A (en) | 2018-11-23 |
Family
ID=64294957
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810674499.2A Pending CN108881244A (en) | 2018-06-27 | 2018-06-27 | Intellectual property protection method for network short texts based on block chains |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108881244A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110011785A (en) * | 2018-12-28 | 2019-07-12 | 阿里巴巴集团控股有限公司 | A kind of method and device that based on block chain structuring works deposit with card |
CN110060154A (en) * | 2018-12-28 | 2019-07-26 | 阿里巴巴集团控股有限公司 | Works based on block chain deposit card method, system, device and equipment |
CN110310147A (en) * | 2019-06-05 | 2019-10-08 | 上海易点时空网络有限公司 | Original content declares method and device |
CN110598190A (en) * | 2019-09-06 | 2019-12-20 | 湖南天河国云科技有限公司 | Method for determining authority of text data on chain based on block chain |
CN111339188A (en) * | 2020-02-20 | 2020-06-26 | 百度在线网络技术(北京)有限公司 | Block chain-based media content processing method, apparatus, device, and medium |
CN111444479A (en) * | 2018-12-29 | 2020-07-24 | 北京奇虎科技有限公司 | Method and system for verifying ownership of digital fingerprint |
CN112215732A (en) * | 2020-09-07 | 2021-01-12 | 深圳市安络科技有限公司 | Intellectual property protection method and device based on block chain |
CN112307440A (en) * | 2020-10-29 | 2021-02-02 | 云南师范大学 | Method for protecting online education and teaching video property right by using block chain technology |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106250721A (en) * | 2016-07-28 | 2016-12-21 | 杭州云象网络技术有限公司 | A kind of electronic copyright protection method based on block chain |
CN106682457A (en) * | 2016-12-16 | 2017-05-17 | 北京握奇智能科技有限公司 | Picture copyright protection method and picture copyright protection system based on blockchain technology |
CN107659610A (en) * | 2017-08-02 | 2018-02-02 | 北京瑞卓喜投科技发展有限公司 | Copyright protection methods, devices and systems based on block chain technology |
US20180068091A1 (en) * | 2016-09-06 | 2018-03-08 | Intel Corporation | Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content |
CN107832384A (en) * | 2017-10-28 | 2018-03-23 | 北京安妮全版权科技发展有限公司 | Infringement detection method, device, storage medium and electronic equipment |
CN107967416A (en) * | 2016-10-19 | 2018-04-27 | 华为技术有限公司 | The methods, devices and systems of copyright right-safeguarding detection |
-
2018
- 2018-06-27 CN CN201810674499.2A patent/CN108881244A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106250721A (en) * | 2016-07-28 | 2016-12-21 | 杭州云象网络技术有限公司 | A kind of electronic copyright protection method based on block chain |
US20180068091A1 (en) * | 2016-09-06 | 2018-03-08 | Intel Corporation | Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content |
CN107967416A (en) * | 2016-10-19 | 2018-04-27 | 华为技术有限公司 | The methods, devices and systems of copyright right-safeguarding detection |
CN106682457A (en) * | 2016-12-16 | 2017-05-17 | 北京握奇智能科技有限公司 | Picture copyright protection method and picture copyright protection system based on blockchain technology |
CN107659610A (en) * | 2017-08-02 | 2018-02-02 | 北京瑞卓喜投科技发展有限公司 | Copyright protection methods, devices and systems based on block chain technology |
CN107832384A (en) * | 2017-10-28 | 2018-03-23 | 北京安妮全版权科技发展有限公司 | Infringement detection method, device, storage medium and electronic equipment |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110060154A (en) * | 2018-12-28 | 2019-07-26 | 阿里巴巴集团控股有限公司 | Works based on block chain deposit card method, system, device and equipment |
CN110011785A (en) * | 2018-12-28 | 2019-07-12 | 阿里巴巴集团控股有限公司 | A kind of method and device that based on block chain structuring works deposit with card |
WO2020134628A1 (en) * | 2018-12-28 | 2020-07-02 | 阿里巴巴集团控股有限公司 | Method and apparatus for performing evidence storage on structured work based on blockchain |
CN111444479A (en) * | 2018-12-29 | 2020-07-24 | 北京奇虎科技有限公司 | Method and system for verifying ownership of digital fingerprint |
CN111444479B (en) * | 2018-12-29 | 2024-05-14 | 北京奇虎科技有限公司 | Digital fingerprint ownership verification method and system |
CN110310147A (en) * | 2019-06-05 | 2019-10-08 | 上海易点时空网络有限公司 | Original content declares method and device |
CN110598190A (en) * | 2019-09-06 | 2019-12-20 | 湖南天河国云科技有限公司 | Method for determining authority of text data on chain based on block chain |
CN110598190B (en) * | 2019-09-06 | 2024-03-08 | 湖南天河国云科技有限公司 | Method for determining right of text data on chain based on block chain |
CN111339188B (en) * | 2020-02-20 | 2023-10-31 | 百度在线网络技术(北京)有限公司 | Media content processing method, device, equipment and medium based on blockchain |
CN111339188A (en) * | 2020-02-20 | 2020-06-26 | 百度在线网络技术(北京)有限公司 | Block chain-based media content processing method, apparatus, device, and medium |
CN112215732A (en) * | 2020-09-07 | 2021-01-12 | 深圳市安络科技有限公司 | Intellectual property protection method and device based on block chain |
CN112307440A (en) * | 2020-10-29 | 2021-02-02 | 云南师范大学 | Method for protecting online education and teaching video property right by using block chain technology |
CN112307440B (en) * | 2020-10-29 | 2023-11-14 | 云南师范大学 | Method for protecting online education and teaching video property by using blockchain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881244A (en) | Intellectual property protection method for network short texts based on block chains | |
US11379771B2 (en) | Management of workflows | |
US8601276B2 (en) | Managing access to a secure content-part of a PPCD following introduction of the PPCD into a workflow | |
CN103201746B (en) | For the technology that the safety management at data storage device place is supplied | |
US20160365978A1 (en) | Making cryptographic claims about stored data using an anchoring system | |
US20150120567A1 (en) | System and method for monitoring third party access to a restricted item | |
Zhang et al. | Blockchain-based secure data provenance for cloud storage | |
US8984298B2 (en) | Managing access to a secure content-part of a PPCD using a key reset point | |
CN105701367A (en) | Security system for Internet original commercial works | |
KR102002488B1 (en) | Document Acquisition System Using Off-Chain Distributed Storage Based on Block chain | |
CN104021318B (en) | Anti-replay-attack device and anti-replay-attack method | |
Ayed et al. | The blockchain technology: applications and threats | |
CN109582641A (en) | A kind of screening technique and screening system of the works typing based on block chain | |
Krishnasamy et al. | An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm | |
Gurulian et al. | You can’t touch this: Consumer-centric android application repackaging detection | |
Miao et al. | Digital copyright works management system based on DOSA | |
CN116361823A (en) | Selective audit processing of blockchains for privacy protection | |
Saini | A survey on watermarking web contents for protecting copyright | |
Motwani et al. | A proposed digital rights management system for 3d graphics using biometric watermarks | |
US7958102B1 (en) | Method and apparatus for searching a storage system for confidential data | |
CN114363068B (en) | Picture and text issuing method and device, electronic equipment and storage medium | |
CN105046112B (en) | A kind of digital literary property protection method | |
Saini et al. | Securing web contents through invisible text watermarking for copyright protection | |
Li et al. | Information sharing and privacy protection of electronic nursing record management system | |
CN109284615A (en) | Mobile device digital resource method for managing security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181123 |
|
WD01 | Invention patent application deemed withdrawn after publication |