Abstract
AbstractThe purposes are to develop the patent data profoundly, control the data access process effectively, and protect the patent information and content. The traditional patent review systems are analyzed. For the present patent data security and privacy protection technologies and algorithms, the patent information data are stored on different block nodes after data fragmentation using blockchain technology. Then the data are shared using the data encryption algorism. In this way, data access control can be restricted to particular users. Finally, a patent data protection scheme based on privacy protection is proposed. The security of the scheme and the model performance are verified through simulation experiments. The time required to encrypt 10 MB files with 64-bit and 128-bit data is 35 ms and 105 ms, respectively. The proposed re-encryption algorithm only needs 1 s to decrypt 64 KB data, and only 1% of the data needs asymmetric encryption. This greatly reduces the computational overhead of encryption. Results demonstrate that the system can effectively control the access methods of users, efficiently protect the personal privacy and patent content of patent applicants, and reduce the patent office cloud computing overhead using the local resources of branches. The distributed storage methods can reduce the cloud system interaction of the patent office, thereby greatly improving the speed of encryption and ensuring data security. Compared with the state of the art methods, the proposed patent data access and protection system based on blockchain technology have greater advantages in data security and model performance. The research results can provide a research foundation and practical value for the protection and review systems of patent data.
Publisher
Springer Science and Business Media LLC
Reference23 articles.
1. Xing, H., Ren, Z. & Tang, Q. Accelerating the formation of the new development pattern in northern Anhui with higher quality development of digital economy. Mod. Econ. 11(12), 2041–2053 (2020).
2. Wang, C., Li, S., Cheng, T. & Li, B. A construction of smart city evaluation system based on cloud computing platform. Evol. Intell. 13(1), 119–129 (2020).
3. Tariq, N. et al. The security of big data in fog-enabled IoT applications including blockchain: A survey. Sensors. 19(8), 1788–1796 (2019).
4. Zeng, J. & Su, G. High ligation of the inferior mesenteric artery during sigmoid colon and rectal cancer surgery increases the risk of anastomotic leakage: A meta-analysis. World J. Surg. Oncol. 16(1), 157–168 (2018).
5. He, Y., Yang, X., Hu, B. & Wang, W. Dynamic privacy leakage analysis of Android third-party libraries. J. Inf. Secur. Appl. 46, 259–270 (2019).
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献