CN111625777A - Method and device for publishing work content and verifying intellectual property right - Google Patents

Method and device for publishing work content and verifying intellectual property right Download PDF

Info

Publication number
CN111625777A
CN111625777A CN201910153308.2A CN201910153308A CN111625777A CN 111625777 A CN111625777 A CN 111625777A CN 201910153308 A CN201910153308 A CN 201910153308A CN 111625777 A CN111625777 A CN 111625777A
Authority
CN
China
Prior art keywords
current
work
block
content
binary information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910153308.2A
Other languages
Chinese (zh)
Other versions
CN111625777B (en
Inventor
陈程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910153308.2A priority Critical patent/CN111625777B/en
Publication of CN111625777A publication Critical patent/CN111625777A/en
Application granted granted Critical
Publication of CN111625777B publication Critical patent/CN111625777B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/184Intellectual property management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

Disclosed is a work content distribution method, including: generating binary information based on the content of the intellectual property to be verified; generating a current hash value of a current chunk based at least on a previous hash value of a previous chunk, the binary information, and a current timestamp; and issuing a current chunk including at least the current timestamp, the binary information, and the current hash value as a chunk header. Subsequently, the other nodes may acquire and verify the work content information contained in the block based on the digital signature. By means of decentralized distribution and non-tamper-proof property of the block chain technology, an author can verify the creation time of the work through block release containing the work content, and the author can be helped to carry out high credible certification on the creation content and the creation time, so that a premise and a technical guarantee are provided for creating good weather in the intellectual property field.

Description

Method and device for publishing work content and verifying intellectual property right
Technical Field
The invention relates to the technical field of information, in particular to a method and a device for publishing work content based on a block chain, and a corresponding method and a device for verifying intellectual property rights.
Background
In the existing literature market, a large amount of imitation writing and even plagiarism can appear after a work is burnt. For the plagiarized author, although its own copyright is infringed, it is extremely difficult to prove that other people plagiarize.
Further, because of the way of signature and reduction between the writer and the publisher or literature platform in the literature market at present, the literature may be seen by a few people before official publication and release, and the problem of plagiarism occurring in the period is more difficult to prove.
In addition, it is often difficult for an author or author to self-verify that a musical composition, pictorial composition, or other creative composition was previously created.
Therefore, there is a need for a solution that can prove the author's preferential release of his work.
Disclosure of Invention
In order to guarantee and promote the rights and interests of authors and to fit the large direction of state protection intellectual property rights, the invention provides a work content release based on a block chain technology and a corresponding intellectual property right verification scheme. According to the scheme, by means of decentralized distribution and non-tamper property of the block chain technology, an author can verify the creation time of the work through block release containing the work content, and the author is helped to perform high credible certification on the creation content and the creation time, so that a premise and a technical guarantee are provided for creating good weather of an intellectual property market.
According to an aspect of the present invention, a method for distributing content of a work is provided, including: generating binary information based on the content of the intellectual property to be verified; generating a current hash value of a current chunk based at least on a previous hash value of a previous chunk, the binary information, and a current timestamp; and issuing a current chunk including at least the current timestamp, the binary information, and the current hash value as a chunk header. Thus, the block chain has the block written with the specific content by the author at the specific time, and the proof of intellectual property right can be conveniently performed based on the tamper-proof property of the block on the block chain. The content of the work can be: a text file corresponding to the written work; an audio and/or video file corresponding to an audiovisual work; and an image file corresponding to the image work.
Preferably, generating the binary information based on the intellectual property content to be verified comprises at least one of: generating binary information based on the complete work content of the intellectual property right to be verified; generating simplified work content based on the complete work content of the intellectual property right to be verified, and generating binary information based on the simplified work content; and generating a plurality of copies of binary information based on the complete work content of the intellectual property right to be verified, wherein each copy of binary information corresponds to a portion of the complete work content. Thus, the specific content of the verification is determined according to the size of the work and the release policy.
Preferably, the method may further comprise: encrypting the generated binary information using a work encryption private key, wherein the encrypted binary information is included within a chunk header of a current chunk for generation of the current hash value. Therefore, delayed release of the binary information plaintext is facilitated.
Preferably, a block of work content having intellectual property rights to be verified may be released, wherein the block includes an encrypted or unencrypted version of the work content. Thereby facilitating the complete distribution of a large volume work.
Preferably, the current block can be distributed to an authority node to ensure that the distributed content is not illegally distributed.
The blockchain involved in the present invention may be a private or a universal blockchain. The generation and publication of the current tile may then be based on at least one of: obtaining a hash value of a previous block from a private intellectual property verification block chain and issuing the current block to the private intellectual property verification block chain; and obtaining the hash value of the previous block from the universal block chain and issuing the current block to the universal block chain.
Preferably, the current block further includes at least one of the following information: author information for generating a current hash value; and mode information for specifying when the work content is distributed.
According to still another aspect of the present invention, there is provided an intellectual property verification method, including: decrypting the current chunk published as described in any one of the above based on the published digital signature; verifying the authenticity of the binary content issued at the current timestamp in the block header of the current block based on the authenticity of the hash value in the block header of the current block.
Preferably, the binary content in the block header of the current block is binary content encrypted via a work encryption private key, and the method further comprises: obtaining a work decryption public key corresponding to the work encryption private key; and decrypting the encrypted binary content according to the work decryption public key to obtain readable work content.
According to another aspect of the present invention, there is provided a work content distribution apparatus including: the binary information generating unit is used for generating binary information based on the content of the intellectual property to be verified; a hash value generation unit configured to generate a current hash value of a current block based on at least a previous hash value of a previous block, the binary information, and a current timestamp; and a block issuing unit configured to issue a current block including at least the current timestamp, the binary information, and the current hash value as a block header.
Preferably, the binary information generating unit may be configured to at least one of: generating binary information based on the complete work content of the intellectual property right to be verified; generating simplified work content based on the complete work content of the intellectual property right to be verified, and generating binary information based on the simplified work content; and generating a plurality of copies of binary information based on the complete work content of the intellectual property right to be verified, wherein each copy of binary information corresponds to a portion of the complete work content.
Preferably, the publisher author may further include: a binary information encryption unit for encrypting the generated binary information using a work encryption private key, wherein the encrypted binary information is included in a block header of a current block for generation of the current hash value.
The tile issue unit may be configured to: issuing a block of blocks of work content having the intellectual property right to be verified, wherein the block of blocks includes an encrypted or unencrypted version of the work content. Alternatively or additionally, the current block is published to an authoritative node.
Preferably, the hash value generation unit may be configured to obtain the hash value of the previous tile from the chain of dedicated intellectual property verification tiles or from the chain of general tiles, and the tile issuing unit may be configured to correspondingly connect the chain of dedicated intellectual property verification tiles or the chain of general tiles.
According to still another aspect of the present invention, there is provided an intellectual property right verification apparatus including: a digital signature decryption unit operable to decrypt the current block issued by the issuing apparatus as described in any one of the above based on the issued digital signature; and the verification unit is used for verifying the authenticity of the binary content issued at the current time stamp in the block header of the current block based on the authenticity of the hash value in the block header of the current block.
Preferably, the binary content in the block header of the current block is binary content encrypted via a work encryption private key, and the apparatus may further include: a public key obtaining unit, configured to obtain a work decryption public key corresponding to the work encryption private key; and the binary content decryption unit is used for decrypting the encrypted binary content according to the work decryption public key so as to obtain readable work content.
According to yet another aspect of the present invention, there is provided a mobile device comprising: a processor; and a memory having executable code stored thereon, which when executed by the processor, causes the processor to perform the above-described work content distribution and/or corresponding intellectual property verification method.
According to yet another aspect of the present invention, a non-transitory machine-readable storage medium is presented, having executable code stored thereon, which when executed by a processor of an electronic device, causes the processor to perform a work content distribution and/or a corresponding intellectual property verification method as described above.
The invention realizes a decentralized work intellectual property right release and verification system based on the block chain technology. The author can rapidly and reliably release own works, obtain wide authentication of intellectual property rights, and meanwhile, facilitate evidence obtaining operation when problems such as plagiarism and the like are investigated.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent by describing in greater detail exemplary embodiments thereof with reference to the attached drawings, in which like reference numerals generally represent like parts throughout.
Fig. 1 shows an example of the composition of one block.
Fig. 2 shows a schematic diagram of the "connection" of blocks in a block chain.
FIG. 3 shows a schematic flow of a work content distribution method according to one embodiment of the invention.
Fig. 4 shows an example of a fragment of a block chain of blocks distributed according to the invention.
Fig. 5 shows a schematic flow chart of an intellectual property verification method according to one embodiment of the present invention.
Fig. 6 shows a composition diagram of a work content distribution apparatus according to an embodiment of the present invention.
Fig. 7 shows a schematic composition diagram of an intellectual property verification apparatus according to an embodiment of the present invention.
Fig. 8 is a schematic block diagram of a computing device that may be used to implement the work content distribution and subsequent intellectual property verification method described above according to an embodiment of the present invention.
Detailed Description
Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While the preferred embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
With the development of computer technology, the blockchain technology (also called distributed book technology) has attracted much attention due to its advantages of decentralization, public transparency, non-tamper-ability, trustiness, etc.
In particular, the blockchain technique is a decentralized distributed database technique. Each piece of data in the block chain is broadcasted to the block chain nodes of the whole network, and each node can store the whole amount of consistent data. Blockchain techniques require that the state of each node remain consistent, including the state of the database, etc. In order to ensure the consistency of the database state, the sequence of executing the blockchain transaction is required to be ordered and kept consistent in each node, and each node executes the transaction according to the sequence to complete transaction verification, implementation, data chaining and the like. Taking the blockchain application of the ether house as an example, a timestamp is created when a transaction is received, the transaction is written into a transaction pool, and the transactions are sequenced according to the timestamp; and when mining, executing transactions according to the sequence of the transaction timestamps, and updating the account information after executing each transaction into the database to realize the updating of the account state of the database.
A block chain consists of individual blocks (blocks). A block is similar to a record of a database, and each time data is written, one block is created. Fig. 1 shows an example of the composition of one block. As shown in fig. 1, each block comprises two parts: a Head (Head) for recording a feature value of the current block; and a block Body (Body) containing actual data. The sector block portion may also be omitted when the actual data size is small and may be included in the block header.
The block header contains a plurality of feature values of the current block, including but not limited to: a generation time; the hash value of the actual data (i.e., the block), the hash value of the last chunk, and so on.
Here, "hash" refers to a process in which a computer calculates a feature value having the same length for an arbitrary content. The hash length of the blockchain is 256 bits. That is, regardless of the original content, a 256-bit binary digit is finally calculated. Meanwhile, it can be ensured that corresponding hashes are different as long as the original contents are different.
For example, the hash value obtained by hashing the string 123 is a8fdc205a9f19cc1c7507a60c4f01b13d11d7fd0 (hexadecimal), the conversion to binary is 256 bits, and only 123 can obtain the hash. (theoretically, other strings could also get this hash, but with very low probability, and can be considered approximately impossible.)
Due to the above-described characteristics of hash calculation, it can be considered that: the hash of each block is different, and the blocks can be identified through the hash; and if the contents of a block change, its hash must change.
The chunks are in a one-to-one correspondence with the hashes, and the hash of each chunk is calculated for the "chunk header" (Head). That is, the feature values of the block header are sequentially connected together to form a long character string, and then the hash is calculated for the character string.
Hash as SHA256 (block head)
As the above shows the calculation formula of the block hash, SHA256 is a hash algorithm of the block chain. Note that this formula only contains the block header and no block body, i.e., the hash value is uniquely determined by the block header,
fig. 2 shows a schematic diagram of the "connection" of blocks in a block chain. As shown in the figure, since the block header (data) of the current block includes the hash value (prev: H ()) of the previous block, if the content of the current block becomes changed or the hash of the previous block becomes changed, the hash of the current block must be changed. This is especially important for blockchains. If someone modifies a block, the hash of the block becomes changed. In order for the following block to be attached to it (since the next block contains the hash of the previous block), the person must modify all following blocks in turn, otherwise the modified block leaves the block chain. Since hash computation is time consuming, it is almost impossible to modify multiple blocks in a short time unless one has mastered over 51% of the computation power of the whole network.
By the linkage mechanism, the reliability of the block chain is guaranteed, and once data is written, the data cannot be tampered. This is also the name "blockchain" since each block is linked to the last block based on the correlation of hash values.
The invention utilizes the characteristic that data cannot be tampered once written in the block chain technology, and ensures that the author declares the creation time and the creation content of the work of the author to be effective, thereby improving the original environment of the intellectual property market.
FIG. 3 shows a schematic flow of a work content distribution method according to one embodiment of the invention. The work issued based on the invention is helpful to prove the intellectual property rights of the issuer to the work because the issuing time and the specific content can be traced and verified.
In step S310, binary information is generated based on the content of the work of intellectual property to be verified. Here, the work of intellectual property right to be verified refers to a work capable of describing intellectual labor achievement of an intellectual property right owner, and particularly may include a work of copyright to be verified, for example, may include various kinds of creative works. For example, plain written works (e.g., novels, editorial, etc.), pictorial works, musical works, audiovisual works, dance works, architectural design works, and the like may be included. To facilitate machine storage, the works described above may be saved in a computer-readable form, such as saving novice works as text files, music works as audio files, dance works as video files, paintings and architectural design works (e.g., drafts) as image files, and so forth. In other embodiments, the content may be intellectual property rights related to the content in a broader sense, such as a document or picture reflecting the author's creative idea or even a trademark design. Regardless of the type of intellectual property right, the content of a work may typically include at least one of: a text file corresponding to a written work (e.g., a novel or innovative technical document); audio and/or video files corresponding to audiovisual works (e.g., songs, movie plays, stage plays, etc.); and an image file corresponding to an image work (e.g., a painting, a building, a trademark, or other design drawing, etc.).
Subsequently, at step S320, a current hash value of the current chunk is generated based on at least the previous hash value of the previous chunk, the binary information, and the current timestamp, and at step S330, the current chunk including at least the current timestamp, the binary information, and the current hash value as a chunk header is issued.
In an embodiment of the present invention, in addition to including the hash value and the timestamp of the previous tile in the tile header, which is consistent with tile generation needs, binary information of the content of the work to be verified (which may be the content of the work itself or a representation thereof, as described below) may be included in the tile header itself. Therefore, the hash is carried out according to the current block head to obtain the current hash value. The chunk including the current hash value is then published and used for hash value generation for the next chunk. Since any tampering with the tile itself will cause a change in the hash value and require re-computation of the hash values for all subsequently released tiles, by generating and incorporating the tile into the chain of tiles, the tile itself can be rendered untrustworthy, and therefore the timestamp contained in the tile header of the tile and the content of the work can be used to verify that the content of the work was completed by the releasing party prior to the time represented by the timestamp.
In different application scenarios, the binary information for inclusion in the chunk header and hashing may correspond to or represent the complete work itself.
For example, for literary works, especially chapter-wise updated network novels, the volume per chapter is small. In the case where one block header has a size of 1M, since 1M may generally correspond to 40-50 ten thousand words of content, it is possible to completely convert the text corresponding to the literary work into a binary file contained in the block header.
Corresponding to larger representations of work content, such as video, audio, or pictures, only a representation or portion thereof may be stored within the tile header. In one embodiment, a simplified work content representation may be generated for the complete work content representation and binary information may be generated based on the simplified representation. For example, for a pictorial representation, an author may first take the pictorial representation to obtain a corresponding picture, then turn down the resolution of the picture (e.g., save the original 5M of the picture as a 500k low-definition picture), and generate binary information based on the low-definition picture. In subsequent verifications, the low-definition picture can still be used to prove that the work was created at the time of tile release, as long as the low-definition picture retains the primary details of the pictorial work. Different reduced representations may be chosen for different works. For example, a black and white line drawing of a building work, demo of a music work, or the like can be selected as simplified content that generates binary information and can represent the work itself.
In other embodiments, multiple copies of binary information may also be generated based on the complete work content of the intellectual property right to be verified, where each copy of binary information corresponds to a portion of the complete work content. Subsequently, one block may be generated from each piece of binary information. For example, a certain audio may be divided into three parts, corresponding to three binary information, and three blocks may be generated accordingly. The three blocks may be contiguous or spaced apart depending on whether there are other blocks in the network generated during the last two block generation processes. Thus, non-tamperable distribution of complete work content may be achieved by generating multiple tiles for a single work.
The binary information included in the block header as above may be in plaintext. Therefore, after the decryption is carried out through the issued digital signature in the verification process, the binary information in the block header can be directly obtained. After the network novel file is released, all nodes can directly read the content of the network novel file according to the digital signature, so that the releasing mode is particularly suitable for single-chapter releasing of network novel, and an author can rapidly release own works. In the present invention, such an issue mode may be referred to as an "immediate mode".
Alternatively, the generated binary information may be encrypted using a work encryption private key, wherein the encrypted binary information is included within a chunk header of a current chunk for generation of the current hash value. In other words, the binary information included in the block header is binary information encrypted by the private key. Therefore, after the block header is decrypted by acquiring the digital signature, other nodes can only acquire the encrypted binary information, and the content of the work cannot be directly restored. In this case, only when the publishing node publishes the work decryption public key corresponding to the work encryption private key, other nodes can decrypt by using the public key, and finally obtain the work content information of the plaintext. In the present invention, such an issue mode may be referred to as a "delay mode".
"deferred mode" is particularly useful for distribution, such as writing an entire book or making an entire album. For example, a writer may write while publishing blocks, the content for each block of the book being encrypted via the same private key. The corresponding public key is published after the writer completes the entire book or after the book is published and issued. If someone is found to plagiarism during authoring, the public key can also be used in advance to decrypt the content on the blockchain for forensics. Thus, the author can prove that the author has finished the corresponding work content at the time of timestamp marking by publishing the behavior of the block and the content contained in the block, and further enables other nodes to really acquire understandable work content by publishing the public key.
As described above, one block must include a block header and may also include a block body. For this purpose, in order to implement the storage function of the block, a block of the work content with the intellectual property right to be verified may also be issued, wherein the block includes an encrypted or unencrypted version of the work content.
In one embodiment, the publication of the tiles may be published to the full network. In another embodiment, the publication may be made only to specific nodes. At this time, the publishing node may adopt an invitation system to invite a national department, a trusted larger publisher and a literature platform to participate, so as to publish the current block to the authority node. Therefore, the node quality can be ensured, and meanwhile, the content is prevented from being illegally spread. This distribution to authoritative nodes is particularly applicable when the entire work content is contained in the block header of the block.
In addition, author information may be included within the tile header in addition to the necessary prior hash value, timestamp, and binary information for the work, such that generation of the current hash value likewise needs to be based on the author information, thereby facilitating confirmation of the immediate author of the work. Further, in the block header or the block body of the block, mode information for specifying when the work content is distributed may be further included, for example, mode information for immediately distributing or delaying distribution when the above specification is made.
Fig. 4 shows an example of a fragment of a block chain of blocks distributed according to the invention. As shown, author information, time stamp, work information, and mode information may be included in the tile header of each tile, and a hash value may also be generated based on the above information.
In one embodiment, the three work tiles shown in the figure may be a segment of a common blockchain. In other embodiments, a dedicated chain of work authentication blocks may be created, and the three work blocks shown in the figure are one segment of the chain of work authentication blocks. In other words, the block chain involved in the present invention can be a dedicated or a general block chain. The generation and publication of the current tile may then be based on at least one of: obtaining a hash value of a previous block from a private intellectual property verification block chain and issuing the current block to the private intellectual property verification block chain; and obtaining the hash value of the previous block from the universal block chain and issuing the current block to the universal block chain.
After the blocks are released as described above, a subsequent intellectual property verification method may also be performed. Fig. 5 shows a schematic flow chart of an intellectual property verification method according to one embodiment of the present invention. It is understood that the node performing the authentication is another node than the publishing node, such as any node in the whole network, or an invited node in the node invitation system, such as an authoritative node. The issuing of authoritative nodes is particularly suited in connection with the aforementioned dedicated blockchains.
In step S510, the current block as issued above is decrypted based on the issued digital signature. In step S520, based on the authenticity of the hash value in the chunk header of the current chunk, the authenticity of the binary content issued at the current timestamp in the chunk header of the current chunk is verified.
In a case where the binary content in the block header of the current block is the binary content encrypted via the work encryption private key, the verification method may further include: obtaining a work decryption public key corresponding to the work encryption private key; and decrypting the encrypted binary content according to the work decryption public key to obtain readable work content.
The distribution of work content and corresponding verification methods based on blockchain techniques are described above with reference to fig. 3-5. In other embodiments, the above-mentioned scheme can also be realized by corresponding functional devices.
Fig. 6 shows a composition diagram of a work content distribution apparatus according to an embodiment of the present invention. As shown in the figure, the work content distribution apparatus 600 includes a binary information generation unit 610, a hash value generation unit 620, and a block distribution unit 630. The work content includes, but is not limited to, written works, audiovisual works, and pictorial works. Here, the written works, the audiovisual works, and the image works may refer to works that can be expressed as written works, audiovisual works, and image works, respectively, and for example, paintings and architectural design works may be expressed as image works.
The binary information generating unit 610 may be configured to generate binary information based on the content of the work of intellectual property to be verified. The hash value generation unit 620 may be configured to generate a current hash value of the current chunk based on at least the previous hash value of the previous chunk, the binary information, and the current timestamp. The block issuing unit 630 may be configured to issue the current block including at least the current timestamp, the binary information, and the current hash value as a block header.
Based on the size of the content of the work and different distribution policies, the binary information generation unit 610 may be configured to at least one of: generating binary information based on the complete work content of the intellectual property right to be verified; generating simplified work content based on the complete work content of the intellectual property right to be verified, and generating binary information based on the simplified work content; and generating a plurality of copies of binary information based on the complete work content of the intellectual property right to be verified, wherein each copy of binary information corresponds to a portion of the complete work content.
In one embodiment, the verification apparatus 600 may further include: a binary information encryption unit for encrypting the generated binary information using a work encryption private key, wherein the encrypted binary information is included in a block header of a current block for generation of the current hash value. Therefore, the time for other nodes to acquire the plaintext content of the binary information can be controlled through the release of the corresponding public key.
In one embodiment, the tile issue unit 630 may also be configured to: issuing a block of blocks of work content having the intellectual property right to be verified, wherein the block of blocks includes an encrypted or unencrypted version of the work content.
Alternatively or additionally, the tile issue unit 630 may be further configured to: and issuing the current block to an authoritative node.
Alternatively or additionally, the hash value generation unit 620 may be configured to obtain the hash value of the previous tile from the chain of dedicated intellectual property verification tiles or from the chain of general tiles, and the tile issuing unit 630 may be configured to correspondingly chain the chain of dedicated intellectual property verification tiles or the chain of general tiles.
In one embodiment, the current block further includes at least one of the following information: author information for generating a current hash value; and mode information for specifying when the work content is distributed.
Fig. 7 shows a schematic composition diagram of an intellectual property verification apparatus according to an embodiment of the present invention. As shown in fig. 7, the intellectual property verification apparatus 700 may include a digital signature decryption unit 710 and a verification unit 720.
The digital signature decryption unit 710 may be configured to decrypt the current chunk issued by the issuing apparatus according to any one of claims 10 to 16, based on the issued digital signature. The verifying unit 720 is configured to verify the authenticity of the binary content issued at the current timestamp in the chunk header of the current chunk based on the authenticity of the hash value in the chunk header of the current chunk.
The binary content in the block header of the current block is binary content encrypted via the work encryption private key. To this end, the verification apparatus 700 may include a public key obtaining unit for obtaining a work decryption public key corresponding to the work encryption private key; and the binary content decryption unit is used for decrypting the encrypted binary content according to the work decryption public key so as to obtain readable work content.
Fig. 8 is a schematic block diagram of a computing device that may be used to implement the work content distribution and/or corresponding intellectual property verification methods described above according to one embodiment of the present invention.
Referring to fig. 8, computing device 800 includes memory 810 and processor 820.
The processor 820 may be a multi-core processor or may include multiple processors. In some embodiments, processor 820 may include a general-purpose host processor and one or more special coprocessors such as a Graphics Processor (GPU), a Digital Signal Processor (DSP), or the like. In some embodiments, processor 820 may be implemented using custom circuitry, such as an Application Specific Integrated Circuit (ASIC) or a Field Programmable Gate Array (FPGA).
The memory 810 may include various types of storage units, such as system memory, Read Only Memory (ROM), and permanent storage. Wherein the ROM may store static data or instructions for the processor 820 or other modules of the computer. The persistent storage device may be a read-write storage device. The persistent storage may be a non-volatile storage device that does not lose stored instructions and data even after the computer is powered off. In some embodiments, the persistent storage device employs a mass storage device (e.g., magnetic or optical disk, flash memory) as the persistent storage device. In other embodiments, the permanent storage may be a removable storage device (e.g., floppy disk, optical drive). The system memory may be a read-write memory device or a volatile read-write memory device, such as a dynamic random access memory. The system memory may store instructions and data that some or all of the processors require at runtime. In addition, the memory 810 may include any combination of computer-readable storage media, including various types of semiconductor memory chips (DRAM, SRAM, SDRAM, flash memory, programmable read-only memory), magnetic and/or optical disks, may also be employed. In some embodiments, memory 810 may include a removable storage device that is readable and/or writable, such as a Compact Disc (CD), a read-only digital versatile disc (e.g., DVD-ROM, dual layer DVD-ROM), a read-only Blu-ray disc, an ultra-density optical disc, a flash memory card (e.g., SD card, min SD card, Micro-SD card, etc.), a magnetic floppy disc, or the like. Computer-readable storage media do not contain carrier waves or transitory electronic signals transmitted by wireless or wired means.
The memory 810 has stored thereon executable code that, when processed by the processor 820, may cause the processor 820 to perform the work content distribution and/or corresponding intellectual property verification methods discussed above.
The work content distribution and the subsequent intellectual property right verification method according to the present invention have been described in detail above with reference to the accompanying drawings. The invention designs a work publishing and authenticating mechanism by utilizing a block chain technology, helps to identify intellectual property rights and solves the problems that an author publishes works and surveys and obtains evidence difficultly.
Furthermore, the method according to the invention may also be implemented as a computer program or computer program product comprising computer program code instructions for carrying out the above-mentioned steps defined in the above-mentioned method of the invention.
Alternatively, the invention may also be embodied as a non-transitory machine-readable storage medium (or computer-readable storage medium, or machine-readable storage medium) having stored thereon executable code (or a computer program, or computer instruction code) which, when executed by a processor of an electronic device (or computing device, server, etc.), causes the processor to perform the steps of the above-described method according to the invention.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems and methods according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (22)

1. A method of publishing work content, comprising:
generating binary information based on the content of the intellectual property to be verified;
generating a current hash value of a current chunk based at least on a previous hash value of a previous chunk, the binary information, and a current timestamp; and
issuing a current chunk including at least the current timestamp, the binary information, and the current hash value as a chunk header.
2. The method of claim 1, wherein generating binary information based on intellectual property content to be verified comprises at least one of:
generating binary information based on the complete work content of the intellectual property right to be verified;
generating simplified work content based on the complete work content of the intellectual property right to be verified, and generating binary information based on the simplified work content; and
generating a plurality of copies of binary information based on the complete work content of the intellectual property right to be verified, wherein each copy of binary information corresponds to a portion of the complete work content.
3. The method of claim 1, further comprising:
encrypting the generated binary information using a work encryption private key, wherein the encrypted binary information is included within a chunk header of a current chunk for generation of the current hash value.
4. The method of claim 1, wherein publishing the current chunk including at least the current timestamp, the binary information, and the current hash value as a chunk header comprises:
issuing a block of blocks of work content having the intellectual property right to be verified, wherein the block of blocks includes an encrypted or unencrypted version of the work content.
5. The method of claim 1, wherein publishing the current chunk including at least the current timestamp, the binary information, and the current hash value as a chunk header comprises:
and issuing the current block to an authoritative node.
6. The method of claim 1, wherein the generation and publication of the current tile is based on at least one of:
obtaining a hash value of a previous block from a private intellectual property verification block chain and issuing the current block to the private intellectual property verification block chain; and
and acquiring the hash value of the previous block from the universal block chain and issuing the current block to the universal block chain.
7. The method of claim 1, wherein the current tile further comprises at least one of:
author information for generating a current hash value; and
mode information for specifying when the content of the work is distributed.
8. The method of claim 1, wherein the work content comprises at least one of:
a text file corresponding to the written work;
an audio and/or video file corresponding to an audiovisual work; and
an image file corresponding to the image work.
9. An intellectual property verification method, comprising:
decrypting the current chunk published as claimed in any one of claims 1-8 based on the published digital signature;
verifying the authenticity of the binary content issued at the current timestamp in the block header of the current block based on the authenticity of the hash value in the block header of the current block.
10. The method of claim 9, wherein the binary content in the tile header of the current tile is binary content encrypted via a work encryption private key, and the method further comprises:
obtaining a work decryption public key corresponding to the work encryption private key; and
and decrypting the encrypted binary content according to the work decryption public key to obtain readable work content.
11. A work content distribution apparatus comprising:
the binary information generating unit is used for generating binary information based on the content of the intellectual property to be verified;
a hash value generation unit configured to generate a current hash value of a current block based on at least a previous hash value of a previous block, the binary information, and a current timestamp; and
a block issuing unit, configured to issue a current block including at least the current timestamp, the binary information, and the current hash value as a block header.
12. The apparatus of claim 11, wherein the binary information generating unit is to at least one of:
generating binary information based on the complete work content of the intellectual property right to be verified;
generating simplified work content based on the complete work content of the intellectual property right to be verified, and generating binary information based on the simplified work content; and
generating a plurality of copies of binary information based on the complete work content of the intellectual property right to be verified, wherein each copy of binary information corresponds to a portion of the complete work content.
13. The apparatus of claim 11, further comprising:
a binary information encryption unit for encrypting the generated binary information using a work encryption private key, wherein the encrypted binary information is included in a block header of a current block for generation of the current hash value.
14. The apparatus of claim 11, wherein the tile issue unit is to:
issuing a block of blocks of work content having the intellectual property right to be verified, wherein the block of blocks includes an encrypted or unencrypted version of the work content.
15. The apparatus of claim 11, wherein the tile issue unit is to:
and issuing the current block to an authoritative node.
16. The apparatus of claim 11, wherein the hash value generation unit is configured to obtain the hash value of the previous tile from the chain of proprietary intellectual property verification tiles or from the chain of universal tiles, and
the block issue unit is to verify the private intellectual property verification block chain or the general block chain accordingly.
17. The apparatus of claim 11, wherein the current tile further comprises at least one of:
author information for generating a current hash value; and
mode information for specifying when the content of the work is distributed.
18. The apparatus of claim 10, wherein the work content comprises at least one of:
a text file corresponding to the written work;
an audio and/or video file corresponding to an audiovisual work; and
an image file corresponding to the image work.
19. An intellectual property verification apparatus comprising:
a digital signature decryption unit for decrypting the current block issued by the issuing apparatus according to any one of claims 11 to 18 based on the issued digital signature;
and the verification unit is used for verifying the authenticity of the binary content issued at the current time stamp in the block header of the current block based on the authenticity of the hash value in the block header of the current block.
20. The apparatus of claim 19, wherein the binary content in the tile header of the current tile is binary content encrypted via a work encryption private key, and the apparatus further comprises:
a public key obtaining unit, configured to obtain a work decryption public key corresponding to the work encryption private key; and
and the binary content decryption unit is used for decrypting the encrypted binary content according to the work decryption public key so as to obtain readable work content.
21. A computing device, comprising:
a processor; and
a memory having executable code stored thereon, which when executed by the processor, causes the processor to perform the method of any one of claims 1-10.
22. A non-transitory machine-readable storage medium having stored thereon executable code, which when executed by a processor of an electronic device, causes the processor to perform the method of any one of claims 1-10.
CN201910153308.2A 2019-02-28 2019-02-28 Method and device for publishing content of work and verifying intellectual property Active CN111625777B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910153308.2A CN111625777B (en) 2019-02-28 2019-02-28 Method and device for publishing content of work and verifying intellectual property

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910153308.2A CN111625777B (en) 2019-02-28 2019-02-28 Method and device for publishing content of work and verifying intellectual property

Publications (2)

Publication Number Publication Date
CN111625777A true CN111625777A (en) 2020-09-04
CN111625777B CN111625777B (en) 2024-01-09

Family

ID=72258821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910153308.2A Active CN111625777B (en) 2019-02-28 2019-02-28 Method and device for publishing content of work and verifying intellectual property

Country Status (1)

Country Link
CN (1) CN111625777B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116821941A (en) * 2023-08-25 2023-09-29 建信金融科技有限责任公司 Data encryption and decryption method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032377A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Read-only security file storage system for block chain, and method thereof
WO2018119892A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Method and device for publishing and validating software application program
CN108471510A (en) * 2018-01-29 2018-08-31 东莞理工学院 A kind of vision operation record protection method and system based on block chain
CN108629205A (en) * 2018-04-27 2018-10-09 中国联合网络通信集团有限公司 The monitoring and managing method and device of drug quality detection data
CN109033760A (en) * 2018-08-27 2018-12-18 北京奥曼特奇科技有限公司 A kind of music copyright identification authentication method and Verification System based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032377A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Read-only security file storage system for block chain, and method thereof
WO2018119892A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Method and device for publishing and validating software application program
CN108471510A (en) * 2018-01-29 2018-08-31 东莞理工学院 A kind of vision operation record protection method and system based on block chain
CN108629205A (en) * 2018-04-27 2018-10-09 中国联合网络通信集团有限公司 The monitoring and managing method and device of drug quality detection data
CN109033760A (en) * 2018-08-27 2018-12-18 北京奥曼特奇科技有限公司 A kind of music copyright identification authentication method and Verification System based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
贾引狮;: "基于区块链技术的网络版权交易问题研究" *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116821941A (en) * 2023-08-25 2023-09-29 建信金融科技有限责任公司 Data encryption and decryption method, device, equipment and storage medium
CN116821941B (en) * 2023-08-25 2023-12-19 建信金融科技有限责任公司 Data encryption and decryption method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111625777B (en) 2024-01-09

Similar Documents

Publication Publication Date Title
US11294989B2 (en) Content usage monitor
US20210279306A1 (en) Identifying copyrighted material using embedded timestamped copyright information
US10789339B1 (en) Copyright protection based on hidden copyright information
US8688991B1 (en) Media player embodiments and secure playlist packaging
US6725373B2 (en) Method and apparatus for verifying the integrity of digital objects using signed manifests
US11409850B2 (en) Identifying copyrighted material using embedded copyright information
US11227351B2 (en) Identifying copyrighted material using embedded copyright information
US11106766B2 (en) Identifying copyrighted material using copyright information embedded in electronic files
EP3673393A2 (en) Identifying copyrighted material using embedded copyright information
EP3673391A2 (en) Copyright protection based on hidden copyright information
WO2004051483A1 (en) License movement device and program
US10949936B2 (en) Identifying copyrighted material using copyright information embedded in tables
TWI552015B (en) Method,computer system and non-transitory computer readable storage medium for composite document
WO2019141291A2 (en) Identifying copyrighted material using embedded copyright information
KR20050040697A (en) Post decode watermarking of media
CN109040760A (en) The guard method of network image copyright information, device and storage medium
ATE370597T1 (en) SERVER WITH FILE VERIFICATION
CN111625777B (en) Method and device for publishing content of work and verifying intellectual property
CN114915809A (en) Video file copyright protection method and transaction method based on block chain
ES2383100T3 (en) Registration of content distribution information in an attachment to the content
JP5307825B2 (en) System and method for tracking downloaded digital media files
TW201820815A (en) Method and apparatus for publishing works on network
US20090044018A1 (en) Section Inclusion and Section Order Authentication Method for Computer Electronic Documents
JP2008011219A (en) Digital watermark embedding system, device and program
WO2007128162A1 (en) A method for protecting digital content by encrypting and decrypting a memory card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant