Font Size: a A A

Research And Application On Intellectual Property Protection Methods Of Witkey

Posted on:2011-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:J X XieFull Text:PDF
GTID:2178360308464442Subject:E-commerce project
Abstract/Summary:PDF Full Text Request
With the popularization of web2.0 application, Internet is more and more important in people's life. Internet can bring forth convenience to people on the one hand, but on the other hand there exist problem of Intellectual Property disputes which become increase serious. So how to protect Intellectual Property in internet is the focus of attention in the present academic circles and society. To resolve this problem, scholars at home and abroad have put forward method about perfect law regulations, but this method's complexity and hysteretic nature badly impact effects. Therefore, it can't satisfy the demands of complex intellectual property protection in internet by signal means of legislation.Witkey is a new electronic commerce model which deal intelligent product, as classic application of web2.0, it also exist serious problem of Intellectual Property. By thoroughly study on problems, this paper summarizes three types of Intellectual Property on witkey: 1. the witkey platform as third party can sell witkey works freely; 2. the witkey can plagiarize others' work; 3. the employer can make a deal with themself. According to above problems, this paper raised two technology methods based on Digital Watermarking and Digital Time Stamp and a management method based on credit system. Three methods of protecting intellectual property can provide theoretical guidance and realistic significance to resolve Intellectual Property Protection for witkey and even to resolve Intellectual Property Protection for internet.From the perspective of technology, this paper first analysis background and target of Digital Watermarking and Digital Time Stamp, then raise models for them, design corresponding detailed system for model, finally, analyzes safety of models to prove the workability of them.From the perspective of management, this paper prompts a new credit system which compose of real name authentication system, credit evaluation system and infringement authentication system, put emphasis on detail design for three systems, in this credit system, it includes real name authentication system which based on credible third party, multi-dimension credit evaluation system and infringement authentication system which involved in credible witkey.At last this paper applies two methods on the website, evaluate results by questionnaire survey and fuzzy comprehensive evaluation method to prove their feasibility and effectiveness.
Keywords/Search Tags:Witkey, Intellectual Property Protection, Digital Watermarking, Digital Time Stamp, Credit Authentication System
PDF Full Text Request
Related items