In the era of branding, the design of plush toy brands often faces a contradiction with the needs of target user groups. Addressing the brand transformation challenges faced by small and micro enterprises in the plush toy industry, this paper proposes a method for generating creative design schemes for plush toy brands based on extension theory. This method involves introducing the theory of primitives, utilizing extension primitives to construct problem models, employing extension diamond thinking for ideation and divergence, and using extension analysis for a comprehensive description of brand design elements. Subsequently, the method involves transforming these elements through extension transformation to generate innovative brand design schemes.
The regulatory system for hazardous materials is complex, with poor inter-departmental communication and low levels of data sharing, making effective regulation challenging. Blockchain technology, known for its decentralization, traceability, and secure and trustworthy information, is widely applied in data sharing. Concurrently, attribute-based encryption (ABE), a novel encryption technique, offers high security and fine-grained access control, providing technical support for secure data access and privacy protection. However, existing attribute encryption algorithms do not consider the hierarchical relationship of access structures among data files during data sharing. Moreover, the immutable nature of blockchain means that access policies stored on it cannot be altered, leading to a lack of flexibility in data sharing. To address these issues, this paper proposes a blockchain and attribute-based dynamic layered access scheme for hazardous materials circulation data sharing. By constructing a Linear Secret-Sharing Scheme (LSSS) matrix, layered access control is achieved, allowing data decryption related to the matching parts of a user's attributes with the access structure. Additionally, through the design of a policy update algorithm, the blockchain structure is organized into transaction blocks and policy blocks, storing the encrypted symmetric keys separately to enable dynamic updates of access policies. Security analysis and experimental comparisons demonstrate the scheme's effectiveness and security in hazardous materials circulation data sharing.