2010 IEEE International Technology Management Conference (ICE) 2010
DOI: 10.1109/ice.2010.7477025
|View full text |Cite
|
Sign up to set email alerts
|

Securing product know-how by embedding IP-protection into the organisation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…Data preparation can even be done for multiple recipients with multiple process requirements and filter criteria. After introduction the customer can operate the IPP solution for his purpose [43]. Another solution approach subdivides the CAD model that needs to be exchanged in two portions: a confidential portion which has to be encoded, and a non-confidential portion which can be fully accessed by a partner without any restriction.…”
Section: Protection On the Content Levelmentioning
confidence: 99%
See 1 more Smart Citation
“…Data preparation can even be done for multiple recipients with multiple process requirements and filter criteria. After introduction the customer can operate the IPP solution for his purpose [43]. Another solution approach subdivides the CAD model that needs to be exchanged in two portions: a confidential portion which has to be encoded, and a non-confidential portion which can be fully accessed by a partner without any restriction.…”
Section: Protection On the Content Levelmentioning
confidence: 99%
“…These solutions are currently in use in the companies of many industrial customers. These projectdriven implementations of IPP software are known by the term "Knowledge Editor" [43] and work similarly to an additional CAD workbench.…”
Section: Protection On the Content Levelmentioning
confidence: 99%
“…Despite many attempts and research projects nobody succeeded to apply the DRM/ERM on the singular entities within the CAD model. Such IPP methods and tools are still subject to further research while others are already implemented well adjusted to the requirements of the respective information flow [13].…”
Section: Ip Protection On Access Rights Levelmentioning
confidence: 99%
“…Holland et al [33] proposed an Ethereum-based network that works as a digital certificate of authenticity for 3D design intellectual property assets. They have integrated blockchain into OpenDXM GlobalX software [105], which is used by manufacturers for sharing data with maximum intellectual property protection. Each licensor and licensee has his/her own private keys.…”
Section: B Proposed Solutions To the Supply Chain Challengesmentioning
confidence: 99%