|
Detecting and Identifying Unauthorized Use of DIKWP Patents
(初学者版)
By Prof. Yucong Duan(段玉聪)
International Standardization Committee of Networked DIKWP
for Artificial Intelligence Evaluation(DIKWP-SC)
World Artificial Consciousness CIC(WAC)
World Conference on Artificial Consciousness(WCAC)
This report will detail how to detect and identify unauthorized use of DIKWP patents, using 10 to 20 representative patents from the 90 authorized DIKWP patents. The focus will be on specific technical features, such as efficiency improvements, precision enhancements under incomplete data conditions, and knowledge validation techniques, that are unique to DIKWP technology.
1. Efficiency Improvement DetectionPatent Example: CN202011198393.3 - Cross Data, Information, Knowledge Modality and Dimension Task Processing Method and Components
Benchmarking Performance: Compare the processing time and resource utilization of a target system with known benchmarks from DIKWP-based systems.
Efficiency Markers: Systems showing significant efficiency improvements in cross-modal processing could indicate the use of this patented technology.
Summary: This patent focuses on improving the efficiency of task processing across multiple modalities and dimensions by utilizing DIKWP's semantic transformation capabilities.
Detection Method:
Patent Example: CN202010728065.3 - DIKW-based Virtual Community Resource Processing Method
Resource Allocation Monitoring: Evaluate how efficiently a system manages and allocates resources in virtual communities.
Efficiency Red Flags: Efficient management without a clear underlying method might suggest unauthorized use of this patent.
Summary: This patent improves resource allocation and processing efficiency within virtual communities using DIKWP transformations.
Detection Method:
Patent Example: CN202010693137.5 - Differential Content Recommendation Method Based on DIKW Modality
Data Handling Analysis: Monitor how systems handle incomplete or fragmented user data in their recommendation engines.
Precision Indicators: High accuracy in recommendations with incomplete data may signal the use of DIKWP technology.
Summary: This patent enables precise content recommendations even with incomplete user data by leveraging DIKWP’s semantic linking capabilities.
Detection Method:
Patent Example: CN202011198393.3 - Cross Data, Information, Knowledge Modality and Dimension Task Processing Method and Components
Task Output Evaluation: Assess how well systems perform when operating with partial data or rules.
Precision Clues: Consistent high precision in such scenarios could be a sign of unauthorized use.
Summary: This patent addresses processing tasks across different data, information, and knowledge modalities, enhancing precision even with incomplete inputs.
Detection Method:
Patent Example: CN202011104613.1 - Cross DIKW Modality Privacy Resource Protection Method
Knowledge Validation Monitoring: Track how systems validate and correct their knowledge rules, particularly in privacy-sensitive environments.
Validation Patterns: Systems that frequently correct knowledge rules based on new data might be using this DIKWP method.
Summary: This patent enhances privacy protection by validating and correcting knowledge rules using cross-modality data and information.
Detection Method:
Patent Example: CN202110043010.3 - Randomized Privacy Protection Method and System for Cross-Modality and Essential Computation
Privacy Mechanism Analysis: Investigate how AI models protect user privacy while validating knowledge.
Detection Markers: Systems with advanced privacy protection and knowledge validation could be using DIKWP technology.
Summary: This patent improves privacy protection by randomizing the correction of incorrect knowledge rules using DIKWP principles.
Detection Method:
Patent Example: CN202110043702.8 - DIKW Privacy Resource Processing Method and Components
Knowledge Graph Analysis: Develop tools to analyze how knowledge graphs handle inconsistencies or gaps.
Inconsistency Handling: Systems that efficiently resolve knowledge inconsistencies may be applying this patent's techniques.
Summary: This patent identifies and addresses missing or inconsistent knowledge in privacy-sensitive data using DIKWP methodologies.
Detection Method:
Patent Example: CN202110907780.8 - DIKW Resource Analysis Method and System for Intent-driven Computing and Reasoning
Intent Analysis Evaluation: Monitor how systems analyze and resolve inconsistencies based on user intent.
Identification Signs: Superior handling of knowledge gaps through intent-driven reasoning may indicate DIKWP use.
Summary: This patent addresses the identification of missing or inconsistent information in knowledge systems through DIKWP-based intent analysis.
Detection Method:
Patent Example: CN202011084392.6 - Feature Mining Method and Device for Multi-Modal Data, Information, and Knowledge
Feature Extraction Monitoring: Evaluate how AI models perform feature extraction across various domains.
Adaptation Clues: Unusually effective cross-domain feature extraction may suggest DIKWP influence.
Summary: This patent enhances feature extraction across different modalities, improving cross-domain adaptability using DIKWP.
Detection Method:
Patent Example: CN202010728065.3 - Cross DIKW Modality Virtual Community Resource Processing Method
Cross-Domain Processing Evaluation: Assess how systems manage cross-domain tasks.
Adaptation Efficiency: Superior cross-domain performance could indicate the use of DIKWP methods.
Summary: This patent enables efficient resource processing across different domains using DIKWP.
Detection Method:
Patent Example: CN202110430285.2 - DIKW Model Construction Method for Intent-Driven Computing and Reasoning
Decision Output Monitoring: Track decision-making outputs, especially in complex scenarios.
Decision Precision: Highly accurate decisions in complex tasks may be a sign of DIKWP usage.
Summary: This patent enhances AI decision-making by constructing models that integrate DIKWP’s semantic transformations.
Detection Method:
Patent Example: CN202110906268.7 - Intent-Driven Multi-Modal DIKW Content Transmission Method
Content Transmission Evaluation: Monitor how systems transmit and process content, particularly in decision-making contexts.
Detection Markers: Efficient and accurate content processing could suggest DIKWP technology application.
Summary: This patent optimizes content transmission based on the DIKWP framework, improving decision-making.
Detection Method:
Patent Example: CN202111532716.2 - Fairness-Driven Emotional Content DIKW Mapping and Transmission Method
Watermark Detection Tools: Use tools to detect digital watermarks in AI-generated content.
Tracing Clues: Systems showing unexpected watermarks may be unauthorized users of DIKWP technologies.
Summary: This patent uses DIKWP methodologies to embed digital watermarks in emotional content, enhancing security and traceability.
Detection Method:
Patent Example: CN202111006620.2 - Emotional Expression Mapping and Transmission Optimization System for DIKW Resources
Signature Analysis: Develop tools to analyze and trace digital signatures in AI communications.
Tracing Indicators: Unauthorized use may be detected through unexpected digital signatures.
Summary: This patent embeds digital signatures in emotional communication, ensuring DIKWP content traceability.
Detection Method:
Patent Example: CN202110043701.3 - Data and Information Portrait Value Exchange Method and System
Patent Citation Monitoring: Regularly analyze patent citations to identify potential infringements.
Reporting Tools: Use automated tools to generate reports on unauthorized use.
Summary: This patent provides methods for monitoring and reporting unauthorized use of DIKWP technologies through value exchange analytics.
Detection Method:
Patent Example: CN202110743029.1 - Knowledge-Driven Content Transmission Optimization Method
Text and Process Analysis: Analyze competitors’ technical documents for similarities with DIKWP patents.
Detection Patterns: Overlaps in methods or language may indicate unauthorized usage.
Summary: This patent uses DIKWP methodologies to monitor and report unauthorized use in content transmission.
Detection Method:
These representative patents illustrate the key areas where DIKWP technologies can be detected for unauthorized use, leveraging specific technical features like efficiency improvements, precision enhancements, and knowledge validation techniques. By focusing on these unique attributes, tools and methods can be developed to monitor and enforce the protection of DIKWP intellectual property effectively.
Next steps involve refining these detection techniques, developing monitoring tools, and possibly pursuing legal action where unauthorized use is identified. The strategies outlined here provide a robust foundation for protecting DIKWP's patented technologies in the competitive AI landscape.
Archiver|手机版|科学网 ( 京ICP备07017567号-12 )
GMT+8, 2024-9-27 08:22
Powered by ScienceNet.cn
Copyright © 2007- 中国科学报社