期刊文献+

区块链技术与数字环境下的商业秘密保护 被引量:19

Blockchain Technology and the Protection of Trade Secret in the Digital Environment
下载PDF
导出
摘要 数字环境下的商业秘密保护面临严峻的挑战,大量存在网络空间的商业秘密被窃取,给企业造成巨大损失。区块链技术(Blockchain Technology)是一种基于分布式账本、加密技术、时间戳技术的组合,已经在金融业、音乐版权保护、物流等领域得到广泛的运用。区块链技术运用于商业秘密保护,能够有效解决企业商业秘密在数字环境下遇到的保密措施难以实施、电子证据的证明难度大等难题。利用时间戳技术和"零知识证明"可以为商业秘密保护提供存在性证明,并在诉讼中提供更具可靠性和真实性的电子证据。区块链的分布式账本、非对称加密算法和共识信任机制可以有效保证商业秘密存储的真实性问题,确保数据在交易中不被篡改。 The protection of Trade Secret was faced with grim challenge in the Digital Environment: a large number of Trade Secrets which are stored online are stolen and bring great mount of damages for companies. Blockchain Technology is a combination of distributed account book, encryption technology and time stamp, and already widely used in the field of finance, the protection of music copyright and logistics. The use of blockchain technology in the protection of Trade Secret can effectively deal with all kinds of difficulties which was faced by companies in the digital environment: it’s hard to take storing measures and difficult proof of digital evidence. The use of time stamp and zero-knowledge proof can offer proof of existence for the protection of Trade Secret, and offer more reliable and authentic proof in the suit. The distributed account book, asymmetric encryption algorithm and consensus trust mechanism can effectively ensure the facticity of the storage of Trade Secrets, and ensure the data is difficult to distort.
作者 张怀印 Zhang Huaiyin
出处 《电子知识产权》 CSSCI 2019年第3期71-78,共8页 Electronics Intellectual Property
基金 中央高校基本科研业务费专项资金资助(22120180083) 上海市哲学社会科学规划办公室课题(2013FFX005)
关键词 区块链技术 商业秘密 存在性证明 保管 Blockchain Technology Trade Secret Proof of Existence Store
  • 相关文献

参考文献14

二级参考文献80

  • 1温刚,于海燕.商业秘密侵权诉讼中举证问题探析[J].山东法官培训学院学报,2006,22(5):93-96. 被引量:2
  • 2刘金波,朴勇植.日、美商业秘密保护法律制度比较研究[J].中国法学,1994(3):109-116. 被引量:30
  • 3赵霞.举证责任在商业秘密侵权案件中的分配[J].平原大学学报,2005,22(5):45-47. 被引量:3
  • 4张颖,于文广.论商业秘密的价值性[J].科技与法律,2006(2):63-66. 被引量:5
  • 5National Institute of Standards and Techr ologw.C oud Computing Synopsis and P.ecommendations [ EB/OL ] . http://csrc.nist.gov/publications/ nistpubs/ 800-14 5 / SP800-14 5.pdfi 2012-12-14.
  • 6Christian Verstraete. Build trod secure yot r :omplete cloud environment [ EB/OL ] . http://www.enterprisecioforunl.con~/en/blogs/christian/build- and-secure-yot-complete-cloud-env; 20 l 1 -l 2-07 .
  • 7Cloud Security Alliance.Top Threats to Cloud Computing [ EB/OL ] . https://cloudsecurityalliance.org/topthreats/csathreats.vl.0.pdf. 2112-12-14.
  • 8Infornlationweek, Cloud Security Alliance To Tackle Cloud Standards [EB/OL ] . http://www.inf'ormationweek.com/news/storage/ systems/223101102; 2012-12-14.
  • 9Cloud Security Alliance. Securit-y Guidance for Critical Areas of Focus in Cloud [ EB/OL ]. https://cloudsecurityalliance.org/guidance/csaguide. v3.0.pdt:, 2012-12-14.
  • 10Amazon EC2 Service Level Agreemmlt, http://aws.amazon.conl/ec2-sla/.

同被引文献245

引证文献19

二级引证文献107

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部