Skip to main content

License Chain - An Identity-Protecting Intellectual Property License Trading Platform

  • Conference paper
  • First Online:
  • 3563 Accesses

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 361))

Abstract

This paper proposes a design for privacy-critical blockchain applications with a focus on license trading: Observing parties shall neither know about the licenses nor the identity of the parties involved. On the other hand trading partners, themselves shall only get the information disclosed after the deal is completed. The proposed platform-concept enables trading intellectual property licenses while simultaneously decreasing transaction costs. The manuscript contains a concept analysis regarding privacy and security issues.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Brewer, E.A.: Towards robust distributed systems (abstract). In: Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing - PODC 2000, Portland, Oregon, USA, p. 7. ACM Press (2000). https://doi.org/10.1145/343477.343502, ISBN 978-1-58113-183-3

  2. Bundesamt für Sicherheit in der Informationstechnik (BSI). Absicherung eines Servers (ISi-Server) (2013)

    Google Scholar 

  3. Bundesamt für Sicherheit in der Informationstechnik (BSI). Blockchain Sicher Gestalten - Konzepte, Anforderungen, Bewertungen, March 2019

    Google Scholar 

  4. Chowdhury, M.J.M., et al.: Blockchain versus database: a critical analysis. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, vol. 00186, pp. 1348–1353. IEEE, August 2018. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00186, ISBN 978-1-5386-4388-4

  5. Coase, R.: The nature of the firm. Economica 4(16), 386–405 (1937)

    Article  Google Scholar 

  6. Debnath, S., Chattopadhyay, A., Dutta, S.: Brief review on journey of secured hash algorithms. In: 2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix), pp. 1–5, November 2017. https://doi.org/10.1109/OPTRONIX.2017.8349971

  7. DeCusatis, C., Zimmermann, M., Sager, A.: Identity-based network security for commercial blockchain services. In: 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, pp. 474–477. IEEE, January 2018. https://doi.org/10.1109/CCWC.2018.8301713, ISBN 978-1-5386-4649-6

  8. Dworkin, M.J.: SHA-3 standard: permutation-based hash and extendable-output functions. NIST FIPS 202. National Institute of Standards and Technology, July 2015. https://doi.org/10.6028/NIST.FIPS.202

  9. Fama, E.: Efficient capital markets: a review of theory and empirical work. J. Finance 25(2), 383–417 (1970)

    Article  Google Scholar 

  10. Robert Fly: Detecting fraud on websites. IEEE Secur. Priv. Mag. 9(6), 80–85 (2011). https://doi.org/10.1109/MSP.2011.161, ISSN 1540–7993

    Article  Google Scholar 

  11. Gans, J., Stern, S.: Is there a market for ideas? Ind. Corp. Change 19(3), 805–837 (2010)

    Article  Google Scholar 

  12. Gilbert, S., Lynch, N.: Perspectives on the CAP theorem. Computer 45(2), 30–36 (2012). https://doi.org/10.1109/MC.2011.389, ISSN 0018–9162

    Article  Google Scholar 

  13. Günter, M., Gisler, M.: Intellectual properties as intangible goods. In: Hawaii International Conference on System Sciences (2000). ISBN 0-7695-0493-0/00

    Google Scholar 

  14. Hagiu, A., Yoffie, D.B.: The new patent intermediaries: platforms, defensive aggregators, and super-aggregators. J. Econ. Perspect. 27(1), 45–66H (2013)

    Article  Google Scholar 

  15. Hyperledger Foundation. Chaincode for Operators (2017). https://hyperledger-fabric.readthedocs.io/en/release-1.2/chaincode4noah.html. Accessed 28 Sept 2018

  16. Hyperledger Foundation: Hyperledger Fabric Documentation (2017). https://hyperledger-fabric.readthedocs.io/en/release-1.2/. Accessed 02 Sept 2018

  17. Hyperledger Foundation: Peers (2017). https://hyperledger-fabric.readthedocs.io/en/release-1.2/peers/peers.html. Accessed 21 Sept 2018

  18. Li, et al.: Towards scalable and private industrial blockchains. In: Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts - BCC 2017. The ACM Workshop, Abu Dhabi, United Arab Emirates, pp. 9–14. ACM Press (2017). https://doi.org/10.1145/3055518.3055531, ISBN 978-1-4503-4974-1

  19. Li, X., et al.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. (2017). https://doi.org/10.1016/j.future.2017.08.020, ISSN 0167739X

  20. Merges, R., Nelson, R.: On the complex economics of patent scope. Columbia Law Rev. 90, 839–916 (1990)

    Article  Google Scholar 

  21. Moubarak, J., Filiol, E., Chamoun, M.: Comparative analysis of blockchain technologies and TOR network: two faces of the same reality? In: 2017 1st Cyber Security in Networking Conference (CSNet), Rio de Janeiro, pp. 1–9. IEEE, October 2017. https://doi.org/10.1109/CSNET.2017.8242004, ISBN 978-1-5386-1332-0

  22. Moubarak, J., Filiol, E., Chamoun, M.: On blockchain security and relevant attacks. In: 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM). Institute of Electrical and Electronics Engineers (2018). OCLC: 1048269446, ISBN 978-1-5386-1254-5, 978-1-5386-1253-8, 978-1-5386-1255-2

    Google Scholar 

  23. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  24. Ogiela, M.R., Majcher, M.: Security of distributed ledger solutions based on blockchain technologies. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, pp. 1089–1095. IEEE, May 2018. https://doi.org/10.1109/AINA.2018.00156, ISBN 978-1-5386-2195-0

  25. Paar, C., Pelzl, J.: Understanding Cryptography. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-04101-3, ISBN 978-3-642-44649-8, 978-3-642-04101-3

    Book  Google Scholar 

  26. Rivest, R.: The MD5 Message-Digest Algorithm, April 1992

    Google Scholar 

  27. Stickler, B.A., Schachinger, E.: Basic Concepts in Computational Physics, 377 p. Springer, Cham (2014). OCLC: 869872006, ISBN 978-3-319-02435-6, 978-3-319-02434-9

    Google Scholar 

  28. Ulybyshev, D., et al.: Blockhub: blockchain-based software development system for untrusted environments. In: 2018 IEEE 11th International Conference on Cloud Computing (2018)

    Google Scholar 

  29. Richter, S., Witt, J.: Ein problemzentrierter Blick auf Blockchain - Anwendungsfälle. Lüneburg (2018)

    Google Scholar 

  30. Xia, H.: Industrial-Design-Centered Intellectual Property Strategy of the Company. In: Institute of Electrical and Electronics Engineers (2010). ISBN 978-1-4244-5161-6/10

    Google Scholar 

  31. Zhang, K., Jacobsen, H.-A.: Towards dependable, scalable, and pervasive distributed ledgers with blockchains. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, pp. 1337–1346. IEEE, July 2018. https://doi.org/10.1109/ICDCS.2018.00134, ISBN 978-1-5386-6871- 9

Download references

Acknowledgements

This research was conducted within the framework of the project HANSEBLOC and supported by Bundesministerium für Bildung und Forschung (BMBF-Förderung Nr. 03VNE2044D).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Julian Kakarott .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kakarott, J., Zeuch, K., Skwarek, V. (2019). License Chain - An Identity-Protecting Intellectual Property License Trading Platform. In: Di Ciccio, C., et al. Business Process Management: Blockchain and Central and Eastern Europe Forum. BPM 2019. Lecture Notes in Business Information Processing, vol 361. Springer, Cham. https://doi.org/10.1007/978-3-030-30429-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30429-4_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30428-7

  • Online ISBN: 978-3-030-30429-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics