YucongDuan的个人博客分享 http://blog.sciencenet.cn/u/YucongDuan

博文

Detecting and Identifying Unauthorized Use of DIKWP (初学者版)

已有 129 次阅读 2024-9-4 11:45 |系统分类:论文交流

Detecting and Identifying Unauthorized Use of DIKWP Patents

(初学者版)

By Prof. Yucong Duan(段玉聪)

International Standardization Committee of Networked DIKWP 

for Artificial Intelligence Evaluation(DIKWP-SC)

World Artificial Consciousness CIC(WAC)

World Conference on Artificial Consciousness(WCAC)

This report will detail how to detect and identify unauthorized use of DIKWP patents, using 10 to 20 representative patents from the 90 authorized DIKWP patents. The focus will be on specific technical features, such as efficiency improvements, precision enhancements under incomplete data conditions, and knowledge validation techniques, that are unique to DIKWP technology.

1. Efficiency Improvement Detection
  • Patent Example: CN202011198393.3 - Cross Data, Information, Knowledge Modality and Dimension Task Processing Method and Components

    • Benchmarking Performance: Compare the processing time and resource utilization of a target system with known benchmarks from DIKWP-based systems.

    • Efficiency Markers: Systems showing significant efficiency improvements in cross-modal processing could indicate the use of this patented technology.

    • Summary: This patent focuses on improving the efficiency of task processing across multiple modalities and dimensions by utilizing DIKWP's semantic transformation capabilities.

    • Detection Method:

  • Patent Example: CN202010728065.3 - DIKW-based Virtual Community Resource Processing Method

    • Resource Allocation Monitoring: Evaluate how efficiently a system manages and allocates resources in virtual communities.

    • Efficiency Red Flags: Efficient management without a clear underlying method might suggest unauthorized use of this patent.

    • Summary: This patent improves resource allocation and processing efficiency within virtual communities using DIKWP transformations.

    • Detection Method:

2. Precision Improvement under Incomplete Data and Knowledge Rules
  • Patent Example: CN202010693137.5 - Differential Content Recommendation Method Based on DIKW Modality

    • Data Handling Analysis: Monitor how systems handle incomplete or fragmented user data in their recommendation engines.

    • Precision Indicators: High accuracy in recommendations with incomplete data may signal the use of DIKWP technology.

    • Summary: This patent enables precise content recommendations even with incomplete user data by leveraging DIKWP’s semantic linking capabilities.

    • Detection Method:

  • Patent Example: CN202011198393.3 - Cross Data, Information, Knowledge Modality and Dimension Task Processing Method and Components

    • Task Output Evaluation: Assess how well systems perform when operating with partial data or rules.

    • Precision Clues: Consistent high precision in such scenarios could be a sign of unauthorized use.

    • Summary: This patent addresses processing tasks across different data, information, and knowledge modalities, enhancing precision even with incomplete inputs.

    • Detection Method:

3. Validation of Incorrect Knowledge Rules Using Data and Information
  • Patent Example: CN202011104613.1 - Cross DIKW Modality Privacy Resource Protection Method

    • Knowledge Validation Monitoring: Track how systems validate and correct their knowledge rules, particularly in privacy-sensitive environments.

    • Validation Patterns: Systems that frequently correct knowledge rules based on new data might be using this DIKWP method.

    • Summary: This patent enhances privacy protection by validating and correcting knowledge rules using cross-modality data and information.

    • Detection Method:

  • Patent Example: CN202110043010.3 - Randomized Privacy Protection Method and System for Cross-Modality and Essential Computation

    • Privacy Mechanism Analysis: Investigate how AI models protect user privacy while validating knowledge.

    • Detection Markers: Systems with advanced privacy protection and knowledge validation could be using DIKWP technology.

    • Summary: This patent improves privacy protection by randomizing the correction of incorrect knowledge rules using DIKWP principles.

    • Detection Method:

4. Knowledge Identification of Missing or Inconsistent Information
  • Patent Example: CN202110043702.8 - DIKW Privacy Resource Processing Method and Components

    • Knowledge Graph Analysis: Develop tools to analyze how knowledge graphs handle inconsistencies or gaps.

    • Inconsistency Handling: Systems that efficiently resolve knowledge inconsistencies may be applying this patent's techniques.

    • Summary: This patent identifies and addresses missing or inconsistent knowledge in privacy-sensitive data using DIKWP methodologies.

    • Detection Method:

  • Patent Example: CN202110907780.8 - DIKW Resource Analysis Method and System for Intent-driven Computing and Reasoning

    • Intent Analysis Evaluation: Monitor how systems analyze and resolve inconsistencies based on user intent.

    • Identification Signs: Superior handling of knowledge gaps through intent-driven reasoning may indicate DIKWP use.

    • Summary: This patent addresses the identification of missing or inconsistent information in knowledge systems through DIKWP-based intent analysis.

    • Detection Method:

5. Cross-Modal and Cross-Domain Adaptations
  • Patent Example: CN202011084392.6 - Feature Mining Method and Device for Multi-Modal Data, Information, and Knowledge

    • Feature Extraction Monitoring: Evaluate how AI models perform feature extraction across various domains.

    • Adaptation Clues: Unusually effective cross-domain feature extraction may suggest DIKWP influence.

    • Summary: This patent enhances feature extraction across different modalities, improving cross-domain adaptability using DIKWP.

    • Detection Method:

  • Patent Example: CN202010728065.3 - Cross DIKW Modality Virtual Community Resource Processing Method

    • Cross-Domain Processing Evaluation: Assess how systems manage cross-domain tasks.

    • Adaptation Efficiency: Superior cross-domain performance could indicate the use of DIKWP methods.

    • Summary: This patent enables efficient resource processing across different domains using DIKWP.

    • Detection Method:

6. AI Model Outputs and Decision-Making Processes
  • Patent Example: CN202110430285.2 - DIKW Model Construction Method for Intent-Driven Computing and Reasoning

    • Decision Output Monitoring: Track decision-making outputs, especially in complex scenarios.

    • Decision Precision: Highly accurate decisions in complex tasks may be a sign of DIKWP usage.

    • Summary: This patent enhances AI decision-making by constructing models that integrate DIKWP’s semantic transformations.

    • Detection Method:

  • Patent Example: CN202110906268.7 - Intent-Driven Multi-Modal DIKW Content Transmission Method

    • Content Transmission Evaluation: Monitor how systems transmit and process content, particularly in decision-making contexts.

    • Detection Markers: Efficient and accurate content processing could suggest DIKWP technology application.

    • Summary: This patent optimizes content transmission based on the DIKWP framework, improving decision-making.

    • Detection Method:

7. Digital Fingerprinting and Watermarking
  • Patent Example: CN202111532716.2 - Fairness-Driven Emotional Content DIKW Mapping and Transmission Method

    • Watermark Detection Tools: Use tools to detect digital watermarks in AI-generated content.

    • Tracing Clues: Systems showing unexpected watermarks may be unauthorized users of DIKWP technologies.

    • Summary: This patent uses DIKWP methodologies to embed digital watermarks in emotional content, enhancing security and traceability.

    • Detection Method:

  • Patent Example: CN202111006620.2 - Emotional Expression Mapping and Transmission Optimization System for DIKW Resources

    • Signature Analysis: Develop tools to analyze and trace digital signatures in AI communications.

    • Tracing Indicators: Unauthorized use may be detected through unexpected digital signatures.

    • Summary: This patent embeds digital signatures in emotional communication, ensuring DIKWP content traceability.

    • Detection Method:

8. Patent-Centric Analytics and Reporting
  • Patent Example: CN202110043701.3 - Data and Information Portrait Value Exchange Method and System

    • Patent Citation Monitoring: Regularly analyze patent citations to identify potential infringements.

    • Reporting Tools: Use automated tools to generate reports on unauthorized use.

    • Summary: This patent provides methods for monitoring and reporting unauthorized use of DIKWP technologies through value exchange analytics.

    • Detection Method:

  • Patent Example: CN202110743029.1 - Knowledge-Driven Content Transmission Optimization Method

    • Text and Process Analysis: Analyze competitors’ technical documents for similarities with DIKWP patents.

    • Detection Patterns: Overlaps in methods or language may indicate unauthorized usage.

    • Summary: This patent uses DIKWP methodologies to monitor and report unauthorized use in content transmission.

    • Detection Method:

Conclusion and Next Steps

These representative patents illustrate the key areas where DIKWP technologies can be detected for unauthorized use, leveraging specific technical features like efficiency improvements, precision enhancements, and knowledge validation techniques. By focusing on these unique attributes, tools and methods can be developed to monitor and enforce the protection of DIKWP intellectual property effectively.

Next steps involve refining these detection techniques, developing monitoring tools, and possibly pursuing legal action where unauthorized use is identified. The strategies outlined here provide a robust foundation for protecting DIKWP's patented technologies in the competitive AI landscape.



https://blog.sciencenet.cn/blog-3429562-1449572.html

上一篇:Step-by-step detection of unauthorized DIKWP usage (初学者版)
下一篇:DIKWP\'s Application Prospects in Marine Development
收藏 IP: 140.240.35.*| 热度|

0

该博文允许注册用户评论 请点击登录 评论 (0 个评论)

数据加载中...

Archiver|手机版|科学网 ( 京ICP备07017567号-12 )

GMT+8, 2024-9-4 14:09

Powered by ScienceNet.cn

Copyright © 2007- 中国科学报社

返回顶部