In order to explore the impact relationship between intellectual property protection(IPP) system and technological innovation,a game model was constructed.The system of IPP is a set of game rules to protect the innova...In order to explore the impact relationship between intellectual property protection(IPP) system and technological innovation,a game model was constructed.The system of IPP is a set of game rules to protect the innovation under the background of R&D internationalization.Only when the main parties abide by the system of intellectual property,can the self-interest and collective interest of the two sides be maximized.The government must strengthen the penalties for intellectual property right(IPR) violations,reduce the cost of IPP declaration,reduce the cost of the innovator's own rights protection,and increase the cost of imitate behavior of IPR.展开更多
On June 29 this year, Mr. Song Jian, State Councillor and Minister of the State Scientific and Technology Commission, was elected chairman at the 1995 Annual Meeting of the Chinese Group of the Association for the Int...On June 29 this year, Mr. Song Jian, State Councillor and Minister of the State Scientific and Technology Commission, was elected chairman at the 1995 Annual Meeting of the Chinese Group of the Association for the International Protection of Industrial Property (AIPPI). A leader in China’s scientific field and world-renowned expert, Mr. Song fully recognizes the positive role played by the Chinese Group of the AIPPI in promoting the establishment and development of China’s intellectual property system, expanding relations展开更多
Deep neural networks have achieved great success in varieties of artificial intelligent fields. Since training a good deep model is often challenging and costly, such deep models are of great value and even the key co...Deep neural networks have achieved great success in varieties of artificial intelligent fields. Since training a good deep model is often challenging and costly, such deep models are of great value and even the key commercial intellectual properties. Recently, deep model intellectual property protection has drawn great attention from both academia and industry, and numerous works have been proposed. However, most of them focus on the classification task. In this paper, we present the first attempt at protecting deep semantic segmentation models from potential infringements. In details, we design a new hybrid intellectual property protection framework by combining the trigger-set based and passport based watermarking simultaneously. Within it, the trigger-set based watermarking mechanism aims to force the network output copyright watermarks for a pre-defined trigger image set, which enables black-box remote ownership verification. And the passport based watermarking mechanism is to eliminate the ambiguity attack risk of trigger-set based watermarking by adding an extra passport layer into the target model. Through extensive experiments, the proposed framework not only demonstrates its effectiveness upon existing segmentation models, but also shows strong robustness to different attack techniques.展开更多
The intellectual property protection system was formed when civilization and the commodity economy were developing to a certain extent, and was a significant landmark for mankind in respecting talents and knowledge. N...The intellectual property protection system was formed when civilization and the commodity economy were developing to a certain extent, and was a significant landmark for mankind in respecting talents and knowledge. Now it is playing an important role in promoting scientific and technical progress, cultural prosperity and economic development. Such an important system ensures the smooth performance of the socialist economy, making up one of the basic premises for展开更多
At the invitation of Pen-tsao Chang, Chairman of the Commercial Affairs Coordination Committee for the Two Sides of the Straits, a delegation composed of nine intellectual property experts and scholars, headed by Xie ...At the invitation of Pen-tsao Chang, Chairman of the Commercial Affairs Coordination Committee for the Two Sides of the Straits, a delegation composed of nine intellectual property experts and scholars, headed by Xie Jianqun, Vicechairman of the China Council for the Promotion of International Trade (CCPIT) and Chairman of the Economic and Trade Coordination Committee for the Two Sides of the Straits, recently paid a nineday visit to Taiwan. The visit caught the attention of Taiwan’s mass media as it was the first high-ranking economic展开更多
With legislation on intellectualproperty being perfectedcontinuously,"no law to follow"inChina’s intellectual property protectionhas become a phenomenon of thepast.Legislation is the prerequisitefor law enf...With legislation on intellectualproperty being perfectedcontinuously,"no law to follow"inChina’s intellectual property protectionhas become a phenomenon of thepast.Legislation is the prerequisitefor law enforcement,whereas thelatter is the aim of the former,and aguarantee for safeguarding people’slegitimate rights and interests.Thejudicial organs at various levels inBeijing have strictly implemented theintellectual property laws,safeguarded the legitimate rights andinterests of intellectual propertyproprietors,and enhanced the judicialprotection of intellectual property.展开更多
The year 2001 is the first year in the new century. This year, together with efforts of the State Administration for Industry and Commerce and the National Copyright Administration, we organized a series of major publ...The year 2001 is the first year in the new century. This year, together with efforts of the State Administration for Industry and Commerce and the National Copyright Administration, we organized a series of major publicity and celebration activities展开更多
In the past decades,artificial intelligence(AI)has achieved unprecedented success,where statistical models become the central entity in AI.However,the centralized training and inference paradigm for building and using...In the past decades,artificial intelligence(AI)has achieved unprecedented success,where statistical models become the central entity in AI.However,the centralized training and inference paradigm for building and using these models is facing more and more privacy and legal challenges.To bridge the gap between data privacy and the need for data fusion,an emerging AI paradigm feder-ated learning(FL)has emerged as an approach for solving data silos and data privacy problems.Based on secure distributed AI,feder-ated learning emphasizes data security throughout the lifecycle,which includes the following steps:data preprocessing,training,evalu-ation,and deployments.FL keeps data security by using methods,such as secure multi-party computation(MPC),differential privacy,and hardware solutions,to build and use distributed multiple-party machine-learning systems and statistical models over different data sources.Besides data privacy concerns,we argue that the concept of“model”matters,when developing and deploying federated models,they are easy to expose to various kinds of risks including plagiarism,illegal copy,and misuse.To address these issues,we introduce FedIPR,a novel ownership verification scheme,by embedding watermarks into FL models to verify the ownership of FL models and protect model intellectual property rights(IPR or IP-right for short).While security is at the core of FL,there are still many articles re-ferred to distributed machine learning with no security guarantee as“federated learning”,which are not satisfied with the FL definition supposed to be.To this end,in this paper,we reiterate the concept of federated learning and propose secure federated learning(SFL),where the ultimate goal is to build trustworthy and safe AI with strong privacy-preserving and IP-right-preserving.We provide a com-prehensive overview of existing works,including threats,attacks,and defenses in each phase of SFL from the lifecycle perspective.展开更多
This paper investigates how international cooperation for patent examination using Patent Prosecution Highway(PPH)agreements has affected the quality of firms'exports.Taking the PPH agreements signed between China...This paper investigates how international cooperation for patent examination using Patent Prosecution Highway(PPH)agreements has affected the quality of firms'exports.Taking the PPH agreements signed between China and the export destinations as a quasi-natural experiment,we established a difference-in-difference-in-differences model.We found that international cooperation for patent examination caused firms to increase export quality to PPH partners in patent-intensive industries to a greater extent.This effect was more profound among PPH partners with stronger intellectual property protection,diferentiated products and core products,and agreements along with the Patent Cooperation Treaty.We also found that PPH agreements increased the number of Chinese patent applications filed in PPH partners,patent applications by PPH partners in China,and the level of innovation,all of which constitute the major channels through which export quality to PPH partners increases.Our findings demonstrate that international patent cooperation has played an important role in promoting international trade quality.展开更多
Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intell...Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intellectual property (IP) protection, key generation and digital rights management. Ring oscillator (RO) PUF and Arbiter PUF are the most popular PUFs, but they are not specially designed for FPGA. RO PUF incurs high resource overhead while obtaining less challenge-response pairs, and requires "hard macros" to implement on FPGAs. The arbiter PUF brings low resource overhead, but its structure has big bias when it is mapped on FPGAs. Anderson PUF can address these weaknesses of current Arbiter and RO PUFs implemented on FPGAs. However, it cannot be directly implemented on the new generation 28 nm FPGAs. In order to address these problems, this paper designs and implements a delay-based PUF that uses two LUTs in an SLICEM to implement two 16-bit shift registers of the PUF, 2-to-1 multiplexers in the carry chain to implement the multiplexers of the PUF, and any one of the 8 flip-flops to latch 1-bit PUF signatures. The proposed delay-based PUF is completely realized on 28 nm commercial FPGAs, and the experimental results show its high uniqueness, reliability and reconfigurability. Moreover, we test the impact of aging on it, and the results show that the effect of aging on the proposed PUF is insignificant, with only 6% bit-flips. Finally, the prospects of the proposed PUF in the FPGA binding and volatile key generation are discussed.展开更多
Innovative development extends the vitality of ethnomedicines. Developing ethnomedicines is not only beneficial to the public but also to the related industry and transforms economic growth, driving local social and e...Innovative development extends the vitality of ethnomedicines. Developing ethnomedicines is not only beneficial to the public but also to the related industry and transforms economic growth, driving local social and economic development further. Its economic benefit can be used to optimize and promote the hardware and software of the platform, as well as support the sustainable development of ethnomedicines. Apart from research and discussion on the innovative development of ethnomedicines on the basis of theory and regulations, this series of articles also summarizes cases that are conducive to the overall understanding of the necessity and feasibility of the innovative development. In terms of industrial development, large enterprises and products, such as Yunnan Baiyao, Guizhou Miao ethnomedicines, Cheezheng Tibetan Medicine, products developed from Dengzhanhua (Erigeron breviscapus), the Gold series of Yi ethnomedicines, and products developed from Sanqi (Panax notoginseng), in China are introduced and summarized, focusing on resource superiority, sustainable innovation, standard research and development, and production, as well as intellectual property protection.展开更多
Intellectual property (IP) protection is one of the hardcore problems in hardware security. Semiconductor industry still lacks effective and proactive defense to shield IPs from reverse engineering (RE) based atta...Intellectual property (IP) protection is one of the hardcore problems in hardware security. Semiconductor industry still lacks effective and proactive defense to shield IPs from reverse engineering (RE) based attacks. Integrated circuit (IC) camouflaging technique fills this gap by replacing some conventional logic gates in tile IPs with specially designed logic cells (called camouflaged gates) without changing the functions of tile IPs. The camouflaged gates can perform different logic functions while maintaining an identical look to RE attackers, thus preventing them from obtaining the layout information of the IP directly from RE tools. Since it was first proposed in 2012, circuit camouflaging has become one of the hottest research topics in hardware security focusing on two fundamental problems. How to choose the types of camouflaged gates and decide where to insert them in order to simultaneously minimize the performance overhead and optimize the RE complexity? How can an attacker de-camouflage a camouflaged circuit and complete the RE attack? In this article, we review the evolution of circuit camouflaging through this spear and shield race. First, we introduce the design methods of four different kinds of camouflaged ceils based on true/dummy contacts, static random access memory (SRAM), doping, and emerging devices, respectively. Then we elaborate four representative de-camouflaging attacks: brute force attack, IC testing based attack, satisfiability-based (SAT-based) attack, and the circuit partition based attack, and the corresponding countermeasures: clique-based camouflaging, CamoPerturb, AND-tree camouflaging, and equivalent class based camouflaging, respectively. We argue that the current research efforts should be on reducing overhead introduced by circuit camouflaging and defeating decamouflaging attacks. We point out that exploring features of emerging devices could be a promising direction. Finally, as a complement to circuit camouflaging, we conclude with a brief review of other state-of-the-art IP protection techniques.展开更多
文摘In order to explore the impact relationship between intellectual property protection(IPP) system and technological innovation,a game model was constructed.The system of IPP is a set of game rules to protect the innovation under the background of R&D internationalization.Only when the main parties abide by the system of intellectual property,can the self-interest and collective interest of the two sides be maximized.The government must strengthen the penalties for intellectual property right(IPR) violations,reduce the cost of IPP declaration,reduce the cost of the innovator's own rights protection,and increase the cost of imitate behavior of IPR.
文摘On June 29 this year, Mr. Song Jian, State Councillor and Minister of the State Scientific and Technology Commission, was elected chairman at the 1995 Annual Meeting of the Chinese Group of the Association for the International Protection of Industrial Property (AIPPI). A leader in China’s scientific field and world-renowned expert, Mr. Song fully recognizes the positive role played by the Chinese Group of the AIPPI in promoting the establishment and development of China’s intellectual property system, expanding relations
基金supported in part by the National Natural Science Foundation of China(Grant Nos.61872189,41975183,61825601)in part by the Natural Science Foundation of Jiangsu Province(BK20191397).
文摘Deep neural networks have achieved great success in varieties of artificial intelligent fields. Since training a good deep model is often challenging and costly, such deep models are of great value and even the key commercial intellectual properties. Recently, deep model intellectual property protection has drawn great attention from both academia and industry, and numerous works have been proposed. However, most of them focus on the classification task. In this paper, we present the first attempt at protecting deep semantic segmentation models from potential infringements. In details, we design a new hybrid intellectual property protection framework by combining the trigger-set based and passport based watermarking simultaneously. Within it, the trigger-set based watermarking mechanism aims to force the network output copyright watermarks for a pre-defined trigger image set, which enables black-box remote ownership verification. And the passport based watermarking mechanism is to eliminate the ambiguity attack risk of trigger-set based watermarking by adding an extra passport layer into the target model. Through extensive experiments, the proposed framework not only demonstrates its effectiveness upon existing segmentation models, but also shows strong robustness to different attack techniques.
文摘The intellectual property protection system was formed when civilization and the commodity economy were developing to a certain extent, and was a significant landmark for mankind in respecting talents and knowledge. Now it is playing an important role in promoting scientific and technical progress, cultural prosperity and economic development. Such an important system ensures the smooth performance of the socialist economy, making up one of the basic premises for
文摘At the invitation of Pen-tsao Chang, Chairman of the Commercial Affairs Coordination Committee for the Two Sides of the Straits, a delegation composed of nine intellectual property experts and scholars, headed by Xie Jianqun, Vicechairman of the China Council for the Promotion of International Trade (CCPIT) and Chairman of the Economic and Trade Coordination Committee for the Two Sides of the Straits, recently paid a nineday visit to Taiwan. The visit caught the attention of Taiwan’s mass media as it was the first high-ranking economic
文摘With legislation on intellectualproperty being perfectedcontinuously,"no law to follow"inChina’s intellectual property protectionhas become a phenomenon of thepast.Legislation is the prerequisitefor law enforcement,whereas thelatter is the aim of the former,and aguarantee for safeguarding people’slegitimate rights and interests.Thejudicial organs at various levels inBeijing have strictly implemented theintellectual property laws,safeguarded the legitimate rights andinterests of intellectual propertyproprietors,and enhanced the judicialprotection of intellectual property.
文摘The year 2001 is the first year in the new century. This year, together with efforts of the State Administration for Industry and Commerce and the National Copyright Administration, we organized a series of major publicity and celebration activities
基金supported by National Key Research and Development Program of China(No.2018AAA 0101100).
文摘In the past decades,artificial intelligence(AI)has achieved unprecedented success,where statistical models become the central entity in AI.However,the centralized training and inference paradigm for building and using these models is facing more and more privacy and legal challenges.To bridge the gap between data privacy and the need for data fusion,an emerging AI paradigm feder-ated learning(FL)has emerged as an approach for solving data silos and data privacy problems.Based on secure distributed AI,feder-ated learning emphasizes data security throughout the lifecycle,which includes the following steps:data preprocessing,training,evalu-ation,and deployments.FL keeps data security by using methods,such as secure multi-party computation(MPC),differential privacy,and hardware solutions,to build and use distributed multiple-party machine-learning systems and statistical models over different data sources.Besides data privacy concerns,we argue that the concept of“model”matters,when developing and deploying federated models,they are easy to expose to various kinds of risks including plagiarism,illegal copy,and misuse.To address these issues,we introduce FedIPR,a novel ownership verification scheme,by embedding watermarks into FL models to verify the ownership of FL models and protect model intellectual property rights(IPR or IP-right for short).While security is at the core of FL,there are still many articles re-ferred to distributed machine learning with no security guarantee as“federated learning”,which are not satisfied with the FL definition supposed to be.To this end,in this paper,we reiterate the concept of federated learning and propose secure federated learning(SFL),where the ultimate goal is to build trustworthy and safe AI with strong privacy-preserving and IP-right-preserving.We provide a com-prehensive overview of existing works,including threats,attacks,and defenses in each phase of SFL from the lifecycle perspective.
基金the support from the National Natural Science Foundation of China(No.71903003)the National Social Science Fund of China(No.21CTJ015)+1 种基金the Strategic Economy and Civil-Military Integration Interdisciplinarity Program of Beijing Universities Advanced Disciplines Initiative(No.GJ2019163)the Program for Innovation Research in Central Universityof Financeand Economics。
文摘This paper investigates how international cooperation for patent examination using Patent Prosecution Highway(PPH)agreements has affected the quality of firms'exports.Taking the PPH agreements signed between China and the export destinations as a quasi-natural experiment,we established a difference-in-difference-in-differences model.We found that international cooperation for patent examination caused firms to increase export quality to PPH partners in patent-intensive industries to a greater extent.This effect was more profound among PPH partners with stronger intellectual property protection,diferentiated products and core products,and agreements along with the Patent Cooperation Treaty.We also found that PPH agreements increased the number of Chinese patent applications filed in PPH partners,patent applications by PPH partners in China,and the level of innovation,all of which constitute the major channels through which export quality to PPH partners increases.Our findings demonstrate that international patent cooperation has played an important role in promoting international trade quality.
基金This work was supported in part by the National Science Foundation for Distinguished Young Scholars of China under Grant No. 61225012, the National Natural Science Foundation of China under Grant Nos. 61572123, 61501525, 61402162, 61232016, and U1405254, Hunan Province Science and Technology Project under Grant No. 2014RS4033, and the PAPD fund.
文摘Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intellectual property (IP) protection, key generation and digital rights management. Ring oscillator (RO) PUF and Arbiter PUF are the most popular PUFs, but they are not specially designed for FPGA. RO PUF incurs high resource overhead while obtaining less challenge-response pairs, and requires "hard macros" to implement on FPGAs. The arbiter PUF brings low resource overhead, but its structure has big bias when it is mapped on FPGAs. Anderson PUF can address these weaknesses of current Arbiter and RO PUFs implemented on FPGAs. However, it cannot be directly implemented on the new generation 28 nm FPGAs. In order to address these problems, this paper designs and implements a delay-based PUF that uses two LUTs in an SLICEM to implement two 16-bit shift registers of the PUF, 2-to-1 multiplexers in the carry chain to implement the multiplexers of the PUF, and any one of the 8 flip-flops to latch 1-bit PUF signatures. The proposed delay-based PUF is completely realized on 28 nm commercial FPGAs, and the experimental results show its high uniqueness, reliability and reconfigurability. Moreover, we test the impact of aging on it, and the results show that the effect of aging on the proposed PUF is insignificant, with only 6% bit-flips. Finally, the prospects of the proposed PUF in the FPGA binding and volatile key generation are discussed.
文摘Innovative development extends the vitality of ethnomedicines. Developing ethnomedicines is not only beneficial to the public but also to the related industry and transforms economic growth, driving local social and economic development further. Its economic benefit can be used to optimize and promote the hardware and software of the platform, as well as support the sustainable development of ethnomedicines. Apart from research and discussion on the innovative development of ethnomedicines on the basis of theory and regulations, this series of articles also summarizes cases that are conducive to the overall understanding of the necessity and feasibility of the innovative development. In terms of industrial development, large enterprises and products, such as Yunnan Baiyao, Guizhou Miao ethnomedicines, Cheezheng Tibetan Medicine, products developed from Dengzhanhua (Erigeron breviscapus), the Gold series of Yi ethnomedicines, and products developed from Sanqi (Panax notoginseng), in China are introduced and summarized, focusing on resource superiority, sustainable innovation, standard research and development, and production, as well as intellectual property protection.
基金This work is supported by the National Natural Science Foundation of China under Grant No. 61774091. Gang Qu is supported in part by Air Force Office of Scientific Research Multi-University Research Initiative of USA under Award No. FA9550-14-1-0351.
文摘Intellectual property (IP) protection is one of the hardcore problems in hardware security. Semiconductor industry still lacks effective and proactive defense to shield IPs from reverse engineering (RE) based attacks. Integrated circuit (IC) camouflaging technique fills this gap by replacing some conventional logic gates in tile IPs with specially designed logic cells (called camouflaged gates) without changing the functions of tile IPs. The camouflaged gates can perform different logic functions while maintaining an identical look to RE attackers, thus preventing them from obtaining the layout information of the IP directly from RE tools. Since it was first proposed in 2012, circuit camouflaging has become one of the hottest research topics in hardware security focusing on two fundamental problems. How to choose the types of camouflaged gates and decide where to insert them in order to simultaneously minimize the performance overhead and optimize the RE complexity? How can an attacker de-camouflage a camouflaged circuit and complete the RE attack? In this article, we review the evolution of circuit camouflaging through this spear and shield race. First, we introduce the design methods of four different kinds of camouflaged ceils based on true/dummy contacts, static random access memory (SRAM), doping, and emerging devices, respectively. Then we elaborate four representative de-camouflaging attacks: brute force attack, IC testing based attack, satisfiability-based (SAT-based) attack, and the circuit partition based attack, and the corresponding countermeasures: clique-based camouflaging, CamoPerturb, AND-tree camouflaging, and equivalent class based camouflaging, respectively. We argue that the current research efforts should be on reducing overhead introduced by circuit camouflaging and defeating decamouflaging attacks. We point out that exploring features of emerging devices could be a promising direction. Finally, as a complement to circuit camouflaging, we conclude with a brief review of other state-of-the-art IP protection techniques.