Intellectual Property Assurance Method for Digital University Ecosystem based on Blockchain Technology

In the university digital ecosystem it is very important to have a proper process of collecting, processing and storing the data about students educational results which could confirm the level of the achieved outcomes within their study. In the paper authors provide an analysis of the data which should be stored and existing system which are used for diploma verification. According to the authors' research, the strategy for the digital transformation of the high educational institutes education system should include the modernization of the management of the intellectual property and learning outcomes (competencies and skills). To provide an intellectual property assurance for the students’ documents there were chosen blockchain technology. Intellectual property assurance method for digital university ecosystem based on blockchain technology was proposed by the authors.

[1]  Andis Āriņš Blockchain Arhitecture in Smart Pedagogy , 2019 .

[2]  Peter Arras,et al.  Development of Cross-Domain Competences for Work 4.0 , 2021 .

[3]  Anneli Martin,et al.  Global education , 2019, Making Humanities and Social Sciences Come Alive.

[4]  Blockchain, IoT and Fog Computing for Smart Education Management , 2020 .

[5]  Han Sun,et al.  Application of Blockchain Technology in Online Education , 2018, Int. J. Emerg. Technol. Learn..

[6]  O. Petrova,et al.  Fuzzy verification method for indoor-navigation systems , 2018, 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET).

[7]  Oliver Hinz,et al.  Blockchain , 2020, Bus. Inf. Syst. Eng..

[8]  A. Mikroyannidis,et al.  A Case Study on the Decentralisation of Lifelong Learning Using Blockchain Technology , 2020, Journal of Interactive Media in Education.

[9]  Galyna Tabunshchyk,et al.  Virtual Reality Implementation for Design of Warehouse Lighting , 2019, 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[10]  Helena Handschuh SHA Family (Secure Hash Algorithm) , 2005, Encyclopedia of Cryptography and Security.

[11]  K. Sandkuhl,et al.  DIGITAL TRANSFORMATION OF UNIVERSITY EDUCATION IN UKRAINE: TRAJECTORIES OF DEVELOPMENT IN THE CONDITIONS OF NEW TECHNOLOGICAL AND ECONOMIC ORDER , 2018 .

[12]  Petre Ogrutan,et al.  An Analysis on the Opportunity of Introducing Blockchain Technology in Education - A Case Study , 2020 .

[13]  William Stallings Secure Hash Algorithm , 2011, Encyclopedia of Cryptography and Security.