CN113821772B - Multi-asset right-confirming circulation safety monitoring system based on block chain - Google Patents

Multi-asset right-confirming circulation safety monitoring system based on block chain Download PDF

Info

Publication number
CN113821772B
CN113821772B CN202111403812.7A CN202111403812A CN113821772B CN 113821772 B CN113821772 B CN 113821772B CN 202111403812 A CN202111403812 A CN 202111403812A CN 113821772 B CN113821772 B CN 113821772B
Authority
CN
China
Prior art keywords
asset
code
monitoring
information
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111403812.7A
Other languages
Chinese (zh)
Other versions
CN113821772A (en
Inventor
曹源
汪大明
邓罡
曹宇
来飞
付宗波
陈磊
曲波
曹恒
陈澄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Chenhan Technology Co ltd
Original Assignee
Hunan Zhaowuxin Chain Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Zhaowuxin Chain Technology Group Co ltd filed Critical Hunan Zhaowuxin Chain Technology Group Co ltd
Priority to CN202111403812.7A priority Critical patent/CN113821772B/en
Publication of CN113821772A publication Critical patent/CN113821772A/en
Application granted granted Critical
Publication of CN113821772B publication Critical patent/CN113821772B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a multi-asset right-confirming circulation safety monitoring system based on a block chain; the monitoring system operates on a chain of asset blocks for multi-asset validation and circulation; the monitoring system comprises an encryption subsystem and a monitoring subsystem; the encryption subsystem is used for determining the right of the digital asset, embedding digital watermark coding into the digital asset and writing the digital asset into a block of the asset block chain; the monitoring subsystem is used for monitoring and decoding the digital watermark during asset circulation and comparing the digital watermark with the existing authority confirming information on the asset block chain so as to judge whether the current asset is in a legal circulation state; and when the digital assets are confirmed to be illegally operated or used, the digital assets are deleted or destroyed so as to prevent the assets from being further infringed.

Description

Multi-asset right-confirming circulation safety monitoring system based on block chain
Technical Field
The invention relates to the technical field of asset right determination. In particular to a multi-asset right circulation safety monitoring system based on a block chain.
Background
The property right determination is the right of property owner to possess, use, gain and punish the owned property according to laws and rules, and is the complete right of property owner to express property, and is the effective basis of property management of property registration, property change, transfer, evaluation, mortgage and the like. With the development of internet technology, a large amount of digital contents are generated, which include various forms of digital assets, such as audio/video data with intellectual property rights, production data processed from raw data, technical patents, even application programs, electronic games, and the like, all of which exist in a virtual form. Meanwhile, the entity assets are also expressed in a digital form and stored in a data system through various technical and legal means, so that higher efficiency, right of certainty and circulation efficiency are realized.
With the rapid development of the block chain technology, evidence storage services based on the block chain are widely applied to various industries. The block link evidence storing service can be accessed to the Internet and has a high-credibility authentication structure, comprises third-party mechanisms such as a court, a judicial appraisal center, CA authentication and the like, and serves as an authenticator and a referee to realize fair treatment on asset rights and interests.
Referring to the related disclosed technical solutions, the technical solution with publication number CN112632478 (a) proposes a method for determining rights to construct digital rights using an intelligent contract, which uses a plurality of hash values representing rights information stored in an encryption database as indexes to determine whether a target digital work is within a copyright protection range; the technical scheme of publication number US11151276 (B1) proposes a block chain right transfer scheme from a private chain to a public chain, so that the right after the private chain is confirmed can be transferred to the public chain through a secure channel to realize wider coverage and circulation of the right; the technical solution disclosed in publication No. US2021192012 (a 1) proposes a blockchain connection system for an rights holder, which is used to protect a secure channel and rights and interests in transmission and reception between two parties from being stolen based on key information of the rights holder or a user. The above technical solutions are all based on the situation of having clear rights transferor and transferee, but do not mention the situation that when rights are confirmed and circulated, a third party may still be stolen privately and not get the attention of the supervisor.
Disclosure of Invention
The invention aims to provide a block chain-based multi-asset right-determining circulation safety monitoring system. The monitoring system carries out digital watermark embedding on digital assets which are determined by an asset owner and authorized to be monitored and protected by the system; the digital watermark comprises ownership party information of the asset and an automatic triggering program, so that the asset can be automatically triggered to be connected with a monitoring system in the processes of reading, running or copying, the information of the current running party is sent, and whether the current running party is an authorized user of the asset or not is confirmed from a block chain; when the assets are illegally read, run or copied, the processing program is executed to delete or destroy the assets, so that the assets are prevented from being further utilized and infringed.
The invention adopts the following technical scheme:
a multi-asset right-determining circulation safety monitoring system based on a block chain; the monitoring system operates on a chain of asset blocks for multi-asset validation and circulation; the monitoring system comprises an encryption subsystem and a monitoring subsystem; the encryption subsystem is used for determining the right of the asset, embedding digital watermark coding into the asset and writing the asset into a block of the asset block chain; the monitoring subsystem is used for monitoring and decoding the digital watermark during asset circulation and comparing the digital watermark with the existing authority confirming information on the asset block chain so as to judge whether the current asset is in a legal circulation state;
wherein the encryption subsystem comprises:
the right confirming unit is used for receiving asset right confirming and right using requests; acquiring a first asset code and a certificate of asset ownership from an asset owner according to an asset authentication request, performing full-chain consensus authentication on the asset ownership, and using a full-chain node as a credit endorsement for the authentication behavior;
an embedding unit for generating a digital watermark associated with the owner of the asset and embedding the digital watermark into a first asset code, thereby obtaining a second asset code;
an output component for outputting and writing the second asset code into a block ledger of the asset block chain;
further, the listening subsystem comprises:
a monitoring unit for monitoring feedback information of the automatic trigger code contained by the second asset code;
a verification unit for receiving and verifying asset user information;
the processing unit is used for operating a corresponding recording strategy and an asset code processing strategy after the verification result of the asset user is obtained;
the first asset code and the second asset code comprise an integral description of the content of one asset and also comprise a plurality of sub-assets which are obtained by splitting one asset and respectively described;
each of said asset owners has a pair of keys based on asymmetric cryptography; the key pair comprises a public key Pkey and a private key Skey; the public key Pkey is published to all nodes on the asset block chain; the private key, Skey, is self-escrowed by the asset owner;
the digital watermark comprises password information, plain code information and feedback information; the password information is a fixed-length character string obtained by processing the first asset code by using a Hash function, and the character string is encrypted by using a private key Skey of the asset owner; the plain code information is public identity information of the property owner; the feedback information comprises an automatically triggered monitoring program used for sending the user information of the second asset code currently operated to the monitoring node;
all legal users who operate the second asset code are explicitly informed of relevant information of the monitoring program, wherein the relevant information at least comprises the existence, the running process and the running effect of the monitoring program; the monitoring program is in communication connection with the monitoring unit when the second asset code is operated each time, and sends the feedback information to the monitoring unit;
the monitoring system has an external application program interface; the feedback information is in data communication with the monitoring unit through the external application program interface;
the embedding unit includes verifying whether a rate of change of an information characteristic of the second asset code and the first asset code exceeds a threshold;
when the user of the third party operates the second asset code, legal application is required to be carried out, the third party is connected to the monitoring system through the external application program interface, the right confirming unit of the monitoring system and the asset owner jointly verify and record the legal identity of the user, and the user is granted the right of use of the second asset code;
the asset code handling policy includes automatic deletion and destruction of the second asset code in a local system.
The beneficial effects obtained by the invention are as follows:
1. the monitoring system can fully utilize the characteristics of high data consistency and non-falsification in the block chain to carry out the authority confirmation and the digital watermark confirmation and monitoring on multiple assets, particularly a large number of simple assets, so that the monitoring range of the digital assets in the circulation process is more widely covered;
2. the digital watermarking technology of the invention can not make obvious quality reduction or effect reduction on the operation of the digital assets after being embedded, so that an illegal user can not realize the automatic trigger program embedded in the digital assets, thereby illegal and targeted infringement operation can not be made;
3. the implementation method is suitable for various types of digital assets, including but not limited to pictures, videos, audios, characters, games and the like, and better provides a multi-asset attribute protection scheme for asset owners;
4. the software and hardware layout requirements of the invention are based on modular design, and the switching and blocking can be conveniently carried out in the technical updating and modifying stage, thereby being beneficial to the optimization and upgrading of the technical scheme in the future.
Drawings
The invention will be further understood from the following description in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. Like reference numerals designate corresponding parts throughout the different views.
FIG. 1 is a schematic illustration of an asset user of the present invention being supervised by the monitoring system;
FIG. 2 is a schematic diagram of an illegal user receiving the supervision of the monitoring system according to the present invention;
FIG. 3 is a schematic flow chart of an asset owner authorizing and joining the asset monitoring system according to the present invention;
FIG. 4 is a schematic diagram of digital watermark generation according to the present invention;
FIG. 5 is a schematic flow chart of the asset user operating the second asset code according to the present invention;
fig. 6 is a schematic flow chart of generating the password information C according to the present invention.
Detailed Description
In order to make the technical solution and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the embodiments thereof; it should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. Other systems, methods, and/or features of the present embodiments will become apparent to those skilled in the art upon review of the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the detailed description that follows.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it is to be understood that if there is an orientation or positional relationship indicated by the terms "upper", "lower", "left", "right", etc. based on the orientation or positional relationship shown in the drawings, it is only for convenience of description and simplification of description, but it is not intended to indicate or imply that the device or assembly referred to must have a specific orientation.
The first embodiment is as follows:
a multi-asset right-determining circulation safety monitoring system based on a block chain; the monitoring system operates on a chain of asset blocks for multi-asset validation and circulation; the monitoring system comprises an encryption subsystem and a monitoring subsystem; the encryption subsystem is used for determining the right of the asset, embedding digital watermark coding into the asset and writing the asset into a block of the asset block chain; the monitoring subsystem is used for monitoring and decoding the digital watermark during asset circulation and comparing the digital watermark with the existing authority confirming information on the asset block chain so as to judge whether the current asset is in a legal circulation state;
wherein the encryption subsystem comprises:
the authority confirming unit is used for receiving the asset authority confirming request and the right of use request, acquiring a first asset code and the proof of the asset ownership from an asset owner according to the asset authority confirming request, carrying out full-chain consensus authentication on the asset ownership, and using a full-chain node as a credit endorsement for the authority confirming action;
an embedding unit for generating a digital watermark associated with the owner of the asset and embedding the digital watermark into a first asset code, thereby obtaining a second asset code;
an output component for outputting and writing the second asset code into a block ledger of the asset block chain;
further, the listening subsystem comprises:
a monitoring unit for monitoring feedback information of the automatic trigger code contained by the second asset code;
a verification unit for receiving and verifying asset user information;
the processing unit is used for operating a corresponding recording strategy and an asset code processing strategy after the verification result of the asset user is obtained;
the first asset code and the second asset code comprise an integral description of the content of one asset and also comprise a plurality of sub-assets which are obtained by splitting one asset and respectively described;
each of said asset owners has a pair of keys based on asymmetric cryptography; the key pair comprises a public key Pkey and a private key Skey; the public key Pkey is published to all nodes on the asset block chain; the private key, Skey, is self-escrowed by the asset owner;
the digital watermark comprises password information, plain code information and feedback information; the password information is a fixed-length character string obtained by processing the first asset code by using a Hash function, and the character string is encrypted by using a private key Skey of the asset owner; the plain code information is public identity information of the property owner; the feedback information comprises an automatically triggered monitoring program used for sending the user information of the second asset code currently operated to the monitoring node;
all legal users who operate the second asset code are explicitly informed of relevant information of the monitoring program, wherein the relevant information at least comprises the existence, the running process and the running effect of the monitoring program; the monitoring program is in communication connection with the monitoring unit when the second asset code is operated each time, and sends the feedback information to the monitoring unit;
the monitoring system has an external application program interface; the feedback information is in data communication with the monitoring unit through the external application program interface;
the embedding unit includes verifying whether a rate of change of an information characteristic of the second asset code and the first asset code exceeds a threshold;
when the user of the third party operates the second asset code, legal application is required to be carried out, the third party is connected to the monitoring system through the external application program interface, the right confirming unit of the monitoring system and the asset owner jointly verify and record the legal identity of the user, and the user is granted the right of use of the second asset code;
the asset code handling policy comprises automatic deletion and destruction of the second asset code in a local system;
in this embodiment, the first asset code includes:
1. during the creation or generation of the asset, or at the original asset code after generation; the original asset code belonged to the original owner from the post-creation ownership and no asset transfer occurred; the original asset code, after being created or generated, is not disclosed by the original owner;
2. the assets have been transferred in the past, the related ownership has been changed, and the legal rights and interests of the assets owned by the related ownership can be fully proved by the owner of the current assets;
optionally, the asset owner realizes the true right of the first asset code by adding a code of its own ownership certificate when the asset is completely created; alternatively, writing ownership certification code is periodically implemented at multiple asset creation phases so that portions of an asset can be certified even after the asset is partitioned;
furthermore, by using a block chain technology, the high consistency, the high credibility endorsement and the non-tamper property of data in a block are ensured, the asset certification information with the ownership certification code uploaded by the asset owner can be used as an effective certification in each time of authority confirmation in the future, is stored on a block chain account for a long time and is traced and certified at any time, so that the asset owner can conveniently certify and declare the ownership and a third party can conveniently inquire the ownership of the target asset; for the first asset code, receiving and accepting further monitoring by the security monitoring system by the authentication unit after obtaining authentication proof of the authentication unit;
further, the digital watermark is an information hiding technology, and information such as copyright, owner identification, date, network IP and the like can be invisibly embedded into digital codes of carriers such as video, audio, pictures, texts and the like; when invisible watermark information is embedded, the embedded watermark information is lower than the range of the minimum induction threshold value which can be born by a human perception system (such as vision and hearing) or is embedded in signal noise which is not easy to be perceived, so that the influence of the embedded data information compared with the original information is basically ignored or is difficult to find by using a conventional method; as shown in fig. 4, by analyzing a large number of low-frequency gray pixels in an original image 401, after slightly transforming the gray pixels at the bottom portion, no obvious difference is visually caused; by transforming the watermark content 402, finding out a specific coordinate position in the original image, and combining information in the watermark content 402 with the original image 401 according to an embedding algorithm to generate an image 403; meanwhile, the embedding algorithm carries out inverse operation, and the watermark content 402 can be restored from the image 403;
currently, the correlation algorithm for implementing the digital watermark includes: least significant bit method (LSB), transform domain algorithms based on transform formulas such as Discrete Cosine Transform (DCT), Fourier transform (FFT), or Hadamard transform, NEC algorithms, and the like; according to different original data characteristics, a specific algorithm and the depth of algorithm transformation can be selected; furthermore, the digital watermark can also carry out inverse operation on the data embedded with the watermark through the algorithm, so as to restore the information of the watermark; the algorithm for generating and restoring the digital watermark and the related running program are packaged into executable programs, and the execution of the generation and restoration can be completed without acquiring the specific content and process of the related algorithm when the digital watermark is generated and restored;
further, for the asset types targeted in this embodiment, such as video, audio, picture, text, game, etc., if the effect needs to be completely presented at present, the corresponding programs need to be used for decoding and reproduction, for example, audio/video, picture need to be played by software, text needs to be played by software, game needs to be played by engine program, etc.; therefore, during the decoding process, the monitoring program must be activated, so as to establish contact with the monitoring unit when the above assets are read;
in the present embodiment, a video is taken as an example;
the first stage is as follows: as shown in fig. 3, after the owner of the video decodes the segment of video by using the associated video decoder, the first asset code is obtained; the owner of the video, namely the property owner can provide legal ownership information by providing shooting equipment information, shooting place longitude and latitude information, shooting team information and the like to prove ownership of the video, namely the first property code; the asset owner uploads the first asset code and necessary ownership information to the right confirming unit through the monitoring system, and the right confirming unit carries out right confirming and authenticating operation; after the right is confirmed, the first asset code becomes an original material V, and the embedding processing of the digital watermark is waited to be carried out;
and a second stage: the embedding unit is used for manufacturing a digital watermark M; the password information C contained in the digital watermark is obtained by adopting a specified Hash function Hash () to carry out Hash operation on the first asset code, and then a section of fixed-length character string D is obtained, namely:
D=Hash(V);
the character string D can be 64 bits or 128 bits in length, and the whole length of the password information can be greatly reduced through Hash operation; meanwhile, due to the characteristics of the hash operation, any change of the original material V of the first asset code results in completely different results of the character string D of the last hash operation, so that the method can also be used as a means for verifying whether the first asset code is changed; further, after encrypting the character string D by using the private key Skey of the asset owner, password information C is obtained, that is:
C=Sign(D);
generating an asymmetric encryption algorithm of the public key Pkey and the private key Skey, wherein the asymmetric encryption algorithm can be selected from an RSA algorithm, a DSA algorithm, an ECC algorithm, a DH algorithm and the like; the method is characterized in that the public key Pkey and the private key Skey are generated in pair, and the information encrypted by the private key Skey can only be decrypted by the public key Pkey; after the secret key Skey of the asset owner is used for encryption, when other users need to verify whether the second asset code is issued by the legal asset owner, the encrypted information C can be decrypted only through the correct public key Pkey;
through the processing links, the ownership of the second asset code and the legality and consistency of the content can be verified in the right confirming link, the transmission link and the acquisition link;
further, the plain code information is public information freely set by the property owner, such as name, code number, etc., to display the identity information, and also can be used as one of the ways for the user to obtain the property;
furthermore, the feedback information has the requirement of collecting the user information, and the user has the right to know and needs to approve the requirement of collecting the information according to the information privacy rule of the network, so that the user can continue to use the assets;
the embedding unit combines the three information to generate a code segment of the digital watermark, and embeds the code segment into the first asset code through an embedding algorithm to generate the second asset code; at present, as the development of the digital watermarking technology is mature, the second asset code embedded with the digital watermark is, in this embodiment, a video V' embedded with the digital watermark, and has an extremely low perceptual degree of difference from the original material V on the whole, and a specific difference cannot be perceived under normal viewing conditions and in mass viewing; in order to ensure that the video V ' does not have too great quality degradation relative to the original material V, the embedding unit may use a video detection algorithm to compare the quality of the video V ' with the quality of the original material V, including calculation of video-related parameters such as resolution, sharpness, contrast, and code rate, and set thresholds of each item, so as to ensure the final output quality of the video V ';
in a third stage, the output unit issues the second asset code to the asset block chain, and outputs a corresponding video V' to a related video platform and a related transaction platform for other users to preview;
further, as shown in FIG. 1, the user can obtain the second asset code through the asset block chain, or in other forms, because it is already published, and can perform a simple preview or other surface operation; if the second asset code is still needed to be used, the identity of the legal user and the asset needed to be used are determined through the authentication of the authorization unit; the right confirming unit and the asset owner jointly confirm the legal identity of the asset user, wherein the legal identity comprises the fact that block chain transactions or other modes of transactions under the chain are carried out, and therefore the asset owner agrees to confirm the identity of the user as a legal user; the following steps are respectively executed for the legal user, as shown in the attached figure 5:
step S1: a verification mechanism in the asset block chain generates a key pair for a legal User, wherein the key pair comprises a User public key User-Pkey and a User private key User-Skey; carrying out full-chain broadcasting on the User public key User-Pkey to the resource block chain and writing the full-chain broadcasting into a block account book, and taking the User public key User-Pkey as the identity of the legal User;
step S2: once detecting that the second asset code is operated, the monitoring program in the digital watermark is simultaneously activated and obtains the information of the legal User, so as to submit the information of the legal User, such as the User public key User-Pkey, to the monitoring unit; the monitoring unit submits the obtained information of the legal User to the verification unit, the verification unit confirms the identity of the corresponding legal User by searching the User public key User-Pkey in a block book of the resource block chain, and the processing unit executes an instruction for reserving the second asset code; thus, the legitimate user may then proceed with further operations on the second asset code;
alternatively, as shown in fig. 2, when an illegal user obtains and reads the second asset code, there are several cases:
1. the second asset code is not known to have the digital watermark;
2. although the second asset code is known to have the digital watermark, the corresponding restoring program is not acquired, so that the watermark cannot be restored and the corresponding cracking means cannot be carried out;
3. even if the digital watermark is cracked and the first asset code is restored, the monitoring program cannot pass the identity authentication of an illegal user;
and when the monitoring system can not confirm the identity of the user, the processing unit executes a strategy of destroying or deleting the second asset code, so that further infringement of the assets by illegal users is blocked.
Example two:
this embodiment should be understood to include at least all of the features of any of the foregoing embodiments and further modifications thereon;
the form of the digital watermark can have various expression forms according to the form of the asset, including in the embodiment, the digital watermark exists in the form of a two-dimensional code in combination with the form of a code;
the embedded unit converts the password information C and the plain code information into a two-dimensional code type after generating the password information C and the plain code information; after the two-dimensional code passes through the conversion algorithm, the bit number occupied by the information can be further compressed, and the information to be sent can be encrypted in the two-dimensional code conversion process through an encryption algorithm and a symmetric encryption means by using a secret key D-key;
in step S2 of embodiment 1, the right determining unit encrypts, with the User public key User-Pkey, the public key Pkey of the asset owner, the Hash function Hash (), the secret key D-key, and the restoring program P for restoring the digital watermark, and sends the above four to the legitimate User in the form of encrypted information, thereby further improving the hiding effect of the digital watermark.
Example three:
this embodiment should be understood to include at least all of the features of any of the foregoing embodiments and further modifications thereon;
meanwhile, an embodiment that the assets are transferred on the asset block chain is provided, and the embodiment is used for performing secondary right confirmation on the assets after transfer;
there is a first owner of the asset, the asset transferor in an transferring relationship, and the asset transferee about to receive the asset transfer; said asset transferor having said first asset code and said second asset code;
the asset transferee needs to obtain a public key as-Pkey and a private key as-Skey of the asset transferee through validity identity authentication in an authentication mechanism in the asset block chain;
in the transfer, the following transfer steps are performed:
transfer step T1: the asset transferee and the asset transferee achieve transfer consensus, transfer information is broadcasted to the asset block chain, and consensus is confirmed by all nodes on the block chain;
transfer step T2: the right determining unit encrypts a public key Pkey of the asset owner, the Hash function Hash () and a restoring program P for restoring the digital watermark by using a public key as-Pkey of the asset assignee, and sends the public key Pkey, the Hash function Hash () and the restoring program P to the legal user in an encrypted information form;
transfer step T3: the asset assignor decrypts the encrypted information obtained in the step T2 by using the asset assignor private key as-Skey to obtain the restoring program P of the digital watermark; then, the password information C and the first asset code in the digital watermark are obtained in a restoring mode; further obtaining a character string D after the Hash operation of the first asset code and a Hash function Hash () from the password information C; performing Hash operation on the obtained first asset code by using the Hash function Hash () to obtain a character string D'; the asset transferee compares the character string D 'obtained by the asset transferee with the character string D' obtained by the asset transferee, and then may verify whether the first asset code obtained currently is the same as the first asset code, and ensure that the first asset code obtained by the asset transferee is the original asset data;
transfer step T4: and the asset transferee generates a new digital watermark through the embedding unit again, and finishes the re-output of the second asset.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Although the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications may be made without departing from the scope of the invention. That is, the methods, systems, and devices discussed above are examples. Various configurations may omit, substitute, or add various procedures or components as appropriate. For example, in alternative configurations, the methods may be performed in an order different than that described, and/or various components may be added, omitted, and/or combined. Moreover, features described with respect to certain configurations may be combined in various other configurations, as different aspects and elements of the configurations may be combined in a similar manner. Further, elements therein may be updated as technology evolves, i.e., many elements are examples and do not limit the scope of the disclosure or claims.
Specific details are given in the description to provide a thorough understanding of the exemplary configurations including implementations. However, configurations may be practiced without these specific details, for example, well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring the configurations. This description provides example configurations only, and does not limit the scope, applicability, or configuration of the claims. Rather, the foregoing description of the configurations will provide those skilled in the art with an enabling description for implementing the described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure.
In conclusion, it is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that these examples are illustrative only and are not intended to limit the scope of the invention. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.

Claims (4)

1. A block chain based multi-asset entitlement distribution security monitoring system, wherein the monitoring system operates on a resource block chain for multi-asset entitlement and distribution; the monitoring system comprises an encryption subsystem and a monitoring subsystem; the encryption subsystem is used for determining the right of the asset, embedding digital watermark coding into the asset and writing the asset into a block of the asset block chain; the monitoring subsystem is used for monitoring and decoding the digital watermark during asset circulation and comparing the digital watermark with the existing authority confirming information on the asset block chain so as to judge whether the current asset is in a legal circulation state;
wherein the encryption subsystem comprises:
the right confirming unit is used for receiving asset right confirming and right using requests; acquiring a first asset code and a certificate of asset ownership from an asset owner according to an asset authentication request, performing full-chain consensus authentication on the asset ownership, and using a full-chain node as a credit endorsement for the authentication behavior;
an embedding unit for generating a digital watermark associated with the owner of the asset and embedding the digital watermark into a first asset code, thereby obtaining a second asset code;
an output component for outputting and writing the second asset code into a block ledger of the asset block chain;
the listening subsystem comprises:
a monitoring unit for monitoring feedback information of the automatic trigger code contained by the second asset code;
a verification unit for receiving and verifying asset user information;
the processing unit is used for operating corresponding recording strategies and asset code processing strategies after the verification result of the asset user is obtained;
the first asset code and the second asset code comprise an integral description of asset contents and also comprise a plurality of sub-assets which are obtained by splitting assets and respectively described;
each of said asset owners has a pair of keys based on asymmetric cryptography; the key pair comprises a public key Pkey and a private key Skey; the public key Pkey is published to all nodes on the asset block chain; the private key, Skey, is self-escrowed by the asset owner;
the digital watermark comprises password information, plain code information and feedback information; the password information is a fixed-length character string obtained by processing the first asset code by using a Hash function, and the character string is encrypted by using a private key Skey of the asset owner; the plain code information is public identity information of the property owner; the feedback information comprises an automatically triggered monitoring program used for sending the user information of the second asset code currently operated to the monitoring unit;
all legal users who operate the second asset code are explicitly informed of relevant information of the monitoring program, wherein the relevant information at least comprises the existence, the running process and the running effect of the monitoring program; the monitoring program is in communication connection with the monitoring unit when the second asset code is operated each time, and sends the feedback information to the monitoring unit;
the monitoring system has an external application program interface; and the feedback information is in data communication with the monitoring unit through the external application program interface.
2. The system of claim 1, wherein the embedding unit is configured to verify whether a rate of change of the information characteristic of the second asset code and the first asset code exceeds a threshold.
3. The system as claimed in claim 2, wherein a third party user applies for legality when running the second asset code, the system is connected to the monitoring system through the external api, the authentication unit of the monitoring system and the asset owner jointly authenticate and record the user's legal identity, and grant the user the right to use the second asset code.
4. The block chain based multi-asset certified circulation security monitoring system according to claim 3, wherein said asset code handling strategy comprises automatic deletion and destruction of said second asset code in a local system.
CN202111403812.7A 2021-11-24 2021-11-24 Multi-asset right-confirming circulation safety monitoring system based on block chain Active CN113821772B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111403812.7A CN113821772B (en) 2021-11-24 2021-11-24 Multi-asset right-confirming circulation safety monitoring system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111403812.7A CN113821772B (en) 2021-11-24 2021-11-24 Multi-asset right-confirming circulation safety monitoring system based on block chain

Publications (2)

Publication Number Publication Date
CN113821772A CN113821772A (en) 2021-12-21
CN113821772B true CN113821772B (en) 2022-02-08

Family

ID=78918288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111403812.7A Active CN113821772B (en) 2021-11-24 2021-11-24 Multi-asset right-confirming circulation safety monitoring system based on block chain

Country Status (1)

Country Link
CN (1) CN113821772B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2803010B1 (en) * 2012-01-11 2021-05-19 Intel Corporation File vault and cloud based document notary service
CN110288504A (en) * 2019-06-21 2019-09-27 杭州云象网络技术有限公司 It is a kind of to automatically add water impression method towards block chain digital education platform
CN110851538A (en) * 2020-01-15 2020-02-28 支付宝(杭州)信息技术有限公司 Block chain-based content generation method, device, equipment and storage medium
CN111369248B (en) * 2020-03-03 2023-07-04 南京大学 Digital product safe transaction method and system based on blockchain technology
CN111444275A (en) * 2020-03-30 2020-07-24 九次方大数据信息集团有限公司 Block chain-based data security right confirming method and system
CN111538784B (en) * 2020-04-21 2023-05-23 国网智能电网研究院有限公司 Digital asset transaction method, device and storage medium based on blockchain

Also Published As

Publication number Publication date
CN113821772A (en) 2021-12-21

Similar Documents

Publication Publication Date Title
Bouslimi et al. A crypto-watermarking system for ensuring reliability control and traceability of medical images
US10769252B2 (en) Method and apparatus for watermarking of digital content, method for extracting information
RU2352985C2 (en) Method and device for authorisation of operations with content
Bouslimi et al. A joint encryption/watermarking system for verifying the reliability of medical images
Qiao et al. Watermarking schemes and protocols for protecting rightful ownership and customer's rights
Lian et al. Recent advances in multimedia information system security
US7376624B2 (en) Secure communication and real-time watermarking using mutating identifiers
CN111327620B (en) Data security traceability and access control system under cloud computing framework
CN1808972A (en) Recording device and recording method of generating information flow
JP4231286B2 (en) Content transmission device, content transmission program, content reception device, and content reception program
US20180225428A1 (en) Secure recording and rendering of encrypted multimedia content
JP3917395B2 (en) Content distribution method, content distribution device, content illegal copy inspection method, content illegal copy inspection device, content distribution program, content illegal copy inspection program, and computer-readable recording medium recording these programs
Horng et al. Blockchain-based reversible data hiding for securing medical images
Kumar A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving
EP2503480A1 (en) Method and devices for secure data access and exchange
Li et al. A novel DRM framework for peer-to-peer music content delivery
CN113821772B (en) Multi-asset right-confirming circulation safety monitoring system based on block chain
KR100906067B1 (en) Standard file generation method using a steganography technology, and apparatus and method to validate the integrity of a metadata in its
Katzenbeisser et al. Malicious attacks on media authentication schemes based on invertible watermarks
JP2007158984A (en) Electronic document authenticity assurance method, and electronic document disclosure system
Sian et al. The Techniques of Securing Imaging Data in Medical System
KR20040098876A (en) The construction of CRS(Certification Remote System) for DRM(Digital Right Management) on network and internet.
WO2024027783A1 (en) Method and system for processing digital content, method and system for confirming copyrights of digital content, and method and system for tracing digital content
Tomsich et al. Towards a secure and de-centralized digital watermarking infrastructure for the protection of intellectual property
Okada et al. Semi-blind fingerprinting utilizing ordinary existing watermarking techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240416

Address after: 410003 No. 816, Hemei building, building 1, No. 189, Sany Avenue, wujialing street, Kaifu District, Changsha City, Hunan Province

Patentee after: Hunan Chenhan Technology Co.,Ltd.

Country or region after: China

Address before: 410000 floor 3, building 12, Xincheng Science Park, Yuelu District, Changsha City, Hunan Province

Patentee before: Hunan zhaowuxin Chain Technology Group Co.,Ltd.

Country or region before: China