CN105701367A - Security system for Internet original commercial works - Google Patents

Security system for Internet original commercial works Download PDF

Info

Publication number
CN105701367A
CN105701367A CN201610160193.6A CN201610160193A CN105701367A CN 105701367 A CN105701367 A CN 105701367A CN 201610160193 A CN201610160193 A CN 201610160193A CN 105701367 A CN105701367 A CN 105701367A
Authority
CN
China
Prior art keywords
damage
module
saving
file
saved
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610160193.6A
Other languages
Chinese (zh)
Other versions
CN105701367B (en
Inventor
冯颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHONGQING EBAOQUAN NETWORK TECHNOLOGY Co.,Ltd.
Original Assignee
冯颖
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 冯颖 filed Critical 冯颖
Priority to CN201610160193.6A priority Critical patent/CN105701367B/en
Publication of CN105701367A publication Critical patent/CN105701367A/en
Application granted granted Critical
Publication of CN105701367B publication Critical patent/CN105701367B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Abstract

The invention relates to the technical field of the Internet, and discloses a security system for Internet original commercial works. The security system comprises an uploading module, a security module, an account management module, an identity authentication module, a certificate module, a verification module, a supervising module, a judicial certifying module, a data storing module and a certification auditing module. According to the security system, identification information of a secured person (that is an author) is adopted as parameters when a global supervision abstract is calculated, therefore, a security file contains the identification information of the author, and the ownership of the original works (comprising the network design works, the network photography works, the network literary works, the network original videos, the network academic works, the original music, the original official documents and the like) is determined. The convenient certificate saving and taking problems of the secured person are solved by synchronously handing the secured security file, global supervision abstract, identification information and national standard time to judicial institutions such as the notary institution, the judicial identification institution, the arbitration commission and the court and combining the judicial certifying module and the certification auditing module.

Description

The original business works safety system in the Internet
Technical field
The present invention relates to Internet technical field, particularly to the original business works safety system in a kind of the Internet。
Background technology
Along with the emergence of the Internet, mobile Internet, increasing original works pours in network, and the authorship for large quantities of New Times brings income, and the Internet infringement has also become a great problem of puzzlement authorship。In the Internet, the urgent needs of authorship is not only in the anti-infringement of original works, also significant for promoting that internet environment develops in a healthy way。
Works in the Internet are using electronic data as carrier, once encroach right, difficulty of not only collecting evidence, evidence is also easily obliterated amendment, as infringing party is denied, judicial decision lacks again objective evidence, and authorship is difficult to safeguard number one。
Some prior aries are in that the point-to-point solution protection to file, but for application scenarios changeable on the Internet, are not had retrospective track by infringement process, it is impossible to provide complete law chain evidence。After on the Internet, original works is concluded the business, persistently the problem of anti-infringement can not well solve。
In the juridical practice that original works is encroached right in the Internet, the evidence obtaining means that proof people mainly adopts also rest on traditional sectional drawing, take pictures, print, and are difficult to ensure the objectivity of evidence in this process。Cyberspace virtual, make behavioral agent have more easily condition, chance, use more means to destroy, destroy evidence, and this artificial mistake, add the objective factors such as environment (instability such as system) and all can have influence on the verity of electronic evidence。Specifically, people are likely to because of mistake, deception or prejudice, and add, omit, revise or delete some electronic data information。The risk of these mistakes is likely to be dependent on many factors, including motivation and its suffered training crossed, the quantity of typing or the information of acquisition, and the quality etc. that program is monitored of data input or the personnel of acquisition。And owing to electronic evidence is different from traditional evidence to the requirement of preservation condition, it is necessary to height dust-proof, anti-is warm, antimagnetic, if preservation condition changes causes that the magnetic field around storage medium is heavily disturbed, it is possible to electronic evidence verity can be produced impact。By sectional drawing, take pictures, electronic evidence that printing obtains, it is easy to being tampered or forge, this brings greatly difficulty and problem to electronic evidence evidence obtaining and qualification。Along with the development of cryptanalysis technology, existing SHA-1 hashing algorithm is unsafe, can construct collision under certain conditions and crack。A lot of safety systems adopt client to calculate digest value, are easily intercepted and crack in network transmits。
In sum, the method for the anti-infringement in existing the Internet and technology there is also some problems to be optimized, are summarized as follows:
1, in application practice, root, works ownership problem is not determined。Namely whom works uploaded and deposited card by, gives tacit consent to this and uploads artificial works author, but the objective circumstances that upper successor is exactly not necessarily original author also likely to be present。
2, the application scenarios problem of the Internet original works platform is agreed with。The mainstream carrier that the Internet original works platform circulates as Internet work, whether the infringement protection not single identification file that it needs encrypts watermarking can meet, and needs to realize the system solution methods of the convenient access card of authorship。
Summary of the invention
The present invention proposes a kind of the Internet original business works safety system to solve above-mentioned Problems existing。
The original business works safety system in the Internet of the present invention includes: upper transmission module, save module from damage, module, data memory module and auditing module of coming to testify are come to testify in account management module, authentication module, certificate module, authentication module, supervision module, the administration of justice;
Described upper transmission module for will files passe be saved from damage to saving module from damage, described in the type of file to be saved from damage include: original works, electronic contract, electronic certificate or electronic diary;
Described module of saving from damage receives the file to be saved from damage that upper transmission module is transmitted through, the identity information saving people from damage is obtained from account management module, and with the data that include national standard time and described identity information for parameter by hashing algorithm calculate described in the overall situation supervision summary of file to be saved from damage, file described to be saved from damage, overall situation supervision summary, described identity information, national standard time synchronized are distributed to the server of data memory module, notary organization and judicial expertise mechanism, Arbitration Committee and law court;
Described account management module is for saving the identity information registration of people, accounts information setting, security set, asset management, managing bill, the binding of third party's account from damage, freezing and nullify, and registration and the information transmission arranged is stored to data memory module;
Described authentication module is used for accessing the service of CA digital certificate authentication, authentication four Feature Service, recognition of face service and the Third-party payment service for checking credentials, so that the identity information saving people from damage to be verified;
Described certificate module is used for saving file, overall situation supervision summary from damage and saving the identity information generation of people from damage, update or nullify and save certificate from damage according to data memory module storage, and certificate transmission will be saved from damage to data memory module storage, it is additionally operable to send to saving people from damage described certificate of saving from damage;
Described authentication module is for saving whether the file to be saved from damage that successfully afterwards checking is local is consistent with the file saved from damage being stored in data memory module from damage wait saving file from damage, and maybe whether this file to be saved from damage is through saving from damage;
Described supervision module real-time reception saves the overall situation supervision summary that module sends from damage, and by described overall situation supervision summary in the official website real-time release saving platform, notary organization, judicial expertise mechanism, Arbitration Committee, law court from damage;
The described administration of justice come to testify module for receive save that people proposes online from damage provide the request of coming to testify including notarial certificate and judicial expertise report, and the described request of coming to testify is committed to auditing module of coming to testify;
Described come to testify auditing module for judge ask artificial described data memory module storage provide when saving people from damage include notarial certificate and judicial expertise report take the evidence, and by the described administration of justice come to testify module return claimant;
Described data memory module is used for encrypting the described overall situation supervision summary of storage and file to be saved from damage, and by encryption after the overall situation supervision summary synchronized transmission to notary organization, judicial expertise mechanism, Arbitration Committee, law court server store, and file to be saved from damage, the overall situation supervision summary, identity information and accounts information storage on different media。
Wherein, also include: shift module, people's identity information is saved from damage for what change in described data memory module storage, according to the amended people's of saving from damage identity information, save from damage file and the overall situation supervision summarization generation new save certificate from damage, new certificate of saving from damage is sent to the storage of described data memory module, be additionally operable to by new save that certificate sends to transfer from damage save people from damage。
Wherein, also including: law aid module, for receiving the online law request saving people from damage, and acquisition saves certificate from damage to make legal argument from described data memory module。
Wherein, the SHA-512 hashing algorithm that module adopts is saved described in from damage。
Wherein, described upper transmission module receive save from damage people by B/S browser, C/S client, mobile client, third-party platform or application program by API upload described in file to be saved from damage。
Wherein, the DEA that described data memory module adopts for encrypting overall situation supervision summary includes: any one in SHA-512 hashing algorithm, DEA DES and message digest algorithm MD5。
Wherein, described data memory module be additionally operable to by current point in time the overall situation supervision summary notary organization website, judicial expertise mechanism, Arbitration Committee, law court website on announce。
Wherein, described in save module from damage saving from damage of file same to be saved from damage uploaded for the same period, with being as the criterion of first saving from damage, it is ensured that first saves from damage comes into force。
Wherein, described in save module from damage and be additionally operable to the difference according to file type to be saved from damage, save file from damage for the band of each type and be respectively created an overall situation supervision summary chain, different overall situation supervision summary chains separates operation independent, encryption and stores。
Wherein, described in save module from damage when meeting algorithm and being cracked, save file from damage before sealing up for safekeeping in time, and more recalculate this overall situation supervision summary saving file from damage after scaling method and announce to the public in time。
It is parameter that the present invention have employed, when calculating overall situation supervision summary, the identity information saving people (author) from damage, is the identity information saved from damage and contain author in file, it is determined that the right of attribution of original works。By by after saving from damage save file from damage, overall situation supervision summary, identity information, national standard time synchronized are distributed to notary organization, judicial expertise mechanism, other judiciaries such as Arbitration Committee, law court, and come to testify module in conjunction with the administration of justice and auditing module of coming to testify solves and saves the convenient problem depositing, withdrawing card of people from damage。And native system possesses characteristic efficient, simple, and Data Concurrent disposal ability measured data is per second up to pens up to ten thousand, saves people from damage simple, convenient, easy-to-use。
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings。
Fig. 1 is the Internet original business works safety system structural representation of the present invention;
Fig. 2 is for saving people from damage by upper transmission terminal (such as mobile phone or computer) from the flow chart of main memory card evidence obtaining;
Fig. 3 uploads platform (such as prestige visitor's platform and the original platform of literature) by third party and deposits, for saving people from damage, the flow chart that card is collected evidence;
Fig. 4 deposits the flow chart of card evidence obtaining for saving people from damage by third party software (such as copy editor's software, photo-editing software, design software etc.)。
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments。Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention。
The original business works safety system in the Internet of the present embodiment as it is shown in figure 1, include transmission module 1, save module 2 from damage, module 8, data memory module 9 and auditing module 10 of coming to testify are come to testify in account management module 3, authentication module 4, certificate module 5, authentication module 6, supervision module 7, the administration of justice。
Upper transmission module 1 for will files passe be saved from damage to saving module 2 from damage, upper transmission module 1 is positioned at the client of whole system。Wherein, the type of file to be saved from damage includes: original works (includes network design works, webcam works, online literature works, network creator video, network academic works, original music, original official documents and correspondence etc.), electronic contract, electronic certificate or electronic diary etc.。Original works includes: the rough draft in each stage and/or works in production process。Save people from damage to be logged in by upper transmission module, and upload file to be saved from damage。
Save module 2 from damage and receive the file to be saved from damage that upper transmission module 1 is transmitted through, from account management module 3, obtain the identity information saving people from damage, make a summary with the overall situation supervision that the data including national standard time and described identity information calculate file to be saved from damage for parameter by the hashing algorithm of safety。Then file to be saved from damage, overall situation supervision summary, described identity information (mainly include save from damage people's name and save people's passport NO. from damage), national standard time synchronized are distributed to data memory module and the server of notary organization, judicial expertise mechanism, Arbitration Committee, law court and other judiciaries, make data save the supervision obtaining judicial justice from damage。Save module 2 from damage and be positioned at the service end of whole system, in the present embodiment, all calculating overall situation supervision summary in service end for file to be saved from damage, the relatively conventional mode safety uploaded again after client calculates is improved, and ensure that the uniqueness of overall situation supervision summary simultaneously。Saving module from damage can adopt SHA-512 hashing algorithm to calculate overall situation supervision summary。
Specifically, when saving module 2 initial launch from damage, generate a fixed number, with first file characteristic value saving file from damage (when uploading, upper transmission module 1 adopts unique mark of the mark file that hash algorithm calculates), save people's name from damage, save people's passport NO. from damage, the national standard time, generate current overall situation supervision summary (namely first overall situation supervision saving file from damage is made a summary) by hashing algorithm。Below each saves file from damage, all saved from damage file file characteristic value, save people's name from damage, save people's passport NO. from damage, the national standard time is together with the previous overall situation supervision summary saving file generated from damage, carry out hash operations, generate the overall situation supervision summary currently saved from damage, and this overall situation supervision summary is saved from damage as the next one " the previous overall situation supervision summary saving file generated from damage " of file computing overall situation supervision summary。By that analogy。Ensure that each element of electronic evidence (file characteristic value, save people's name from damage, save people's passport NO. from damage, save the time from damage) saved module 2 from damage and carry out saving from damage all cannot be distorted by outside is even internal, it is ensured that the original objectivity of evidence。The national standard time includes: satellite time transfer and country's time service center time service etc.。
Account management module 3 is for saving the identity information registration of people, accounts information setting, security set, asset management, managing bill, the binding of third party's account from damage, freezing and nullify, and registration and the information transmission arranged is stored to data memory module 9。
Authentication module 4 is used for accessing the service of CA digital certificate authentication, authentication four Feature Service (name, identification card number, bank's card number and binding cell-phone number), recognition of face service and the Third-party payment service for checking credentials etc., so that the identity information saving people from damage to be verified, authentication module 4 obtains from data memory module 9 and logs in the identity information saving people from damage。Wherein verify that can pass through to save the various ways such as name/password, CA digital certificate and biological characteristic from damage is verified, to guarantee that the identity saving people from damage is true, reliable。
Certificate module 5 is for saving the generation of certificate, renewal and cancellation operation from damage, generate, update or nullify save certificate from damage with specific reference to the relevant information of file (save file, overall situation supervision summary from damage, save the identity information etc. of people from damage) of saving from damage of storage in data memory module 9, and will save certificate transmission from damage and store to data memory module 9。Send to saving people from damage additionally, certificate module 5 is additionally operable to save certificate from damage, mail can be passed through or short message mode sends to saving people from damage。
Authentication module 6 is for wait saving whether the file to be saved from damage that file saves successfully afterwards checking from damage local is consistent with the file saved from damage being stored in data memory module 9 from damage, and maybe whether this file to be saved from damage is through saving from damage。
Supervision module 7 real-time reception saves the overall situation supervision summary that module 2 sends from damage, and by overall situation supervision summary in the official website real-time release saving the judiciaries such as platform, notary organization, judicial expertise mechanism, Arbitration Committee, law court from damage, accepts the supervision of the public。
The administration of justice come to testify module 8 for receive save that people proposes online from damage provide the request of coming to testify including notarial certificate and judicial expertise report, and the request of coming to testify is committed to auditing module 10 of coming to testify。
Auditing module of coming to testify 10 is for judging to ask providing when saving people from damage of artificial data memory module 9 storage to include taking the evidence and (being different from and save certificate from damage of notarial certificate and judicial expertise report, take the evidence is that a kind of acquisition is saved from damage and obtains saving from damage judicial proof or the evidence of certificate), and return claimant by administration of justice module 8 of coming to testify。
Data memory module 9 is used for encrypting storage overall situation supervision summary and file to be saved from damage, prevent malicious attack, steal and distort, and the server of the overall situation supervision summary synchronized transmission after encryption to notary organization, judicial expertise mechanism, Arbitration Committee, law court and other judiciaries is stored。And file to be saved from damage, overall situation supervision summary, identity information and accounts information store on different media, ensure the safety of data to greatest extent。Wherein, AES can adopt any one in SHA-512 hashing algorithm, DEA DES and message digest algorithm MD5。
In the present embodiment, have employed, when calculating overall situation supervision summary, the identity information saving people (author) from damage is parameter, is the identity information saved from damage and contain author in file, it is determined that the right of attribution of original works。By by after saving from damage save file from damage, overall situation supervision summary, identity information, national standard time synchronized are distributed to the judiciaries such as notary organization, judicial expertise mechanism, Arbitration Committee, law court, and come to testify module 8 in conjunction with the administration of justice and auditing module 10 of coming to testify solves and saves the problem that the convenient access of people is demonstrate,proved from damage。And native system possesses characteristic efficient, simple, and Data Concurrent disposal ability measured data is per second up to pens up to ten thousand, saves people from damage simple, convenient, easy-to-use。
The original business works safety system in the Internet of the present embodiment also includes: shift module 11, people's identity information is saved from damage for what change in data memory module 9 storage, according to the amended people's of saving from damage identity information, save from damage file and the overall situation supervision summarization generation new save certificate from damage, new certificate of saving from damage is sent and stores to data memory module 9, be additionally operable to by new save that certificate sends to transfer from damage save people from damage。Avoid the persistently anti-infringement problem after works are bought and sold in the Internet and intellectual property transfer is occurred。
The original business works safety system in the Internet of the present embodiment also includes: law aid module 12, for receiving the online law request saving people from damage, and acquisition saves certificate from damage to make legal argument from data memory module 9, it is simple to save people from damage and carry out and save relevant legal advice from damage。
In the present embodiment, data memory module 9 is additionally operable to the overall situation supervision summary of current point in time in notary organization website, judicial expertise mechanism, Arbitration Committee, law court and other judiciaries website announce, to guarantee that overall situation supervision summary accepts the supervision of the public。
In the present embodiment, save module from damage and saving from damage of file same to be saved from damage is uploaded for the same period, with being as the criterion of first saving from damage, it is ensured that first saves from damage comes into force, it is to avoid save people from damage and produce unnecessary dispute。
Save the module 2 difference according to (especially save from damage quantity big time) file type to be saved from damage from damage, save file from damage for the band of each type and be respectively created a coherent overall situation supervision summary chain, different overall situation supervision summary chains separates operation independent, encryption and stores, in order to the dissimilar inquiry saving file from damage and operation。
In the present embodiment, save module 2 from damage when meeting algorithm and being cracked, before sealing up for safekeeping in time, save file from damage, and more recalculate this overall situation supervision summary saving file from damage after scaling method and announce to the public in time。
In the present embodiment, the reception of upper transmission module is saved people from damage and is uploaded file to be saved from damage by B/S browser, C/S client, mobile client, third-party platform or application program by API。
Described upper transmission module can for saving the upper transmission terminal of people from damage, as in figure 2 it is shown, by saving the upper transmission terminal of people (such as mobile phone or computer) from damage, from the process of main memory card evidence obtaining, idiographic flow is as follows in order to save people from damage:
Step 1: save people's login from damage and save the upper transmission terminal (namely going up transmission module) of people from damage, directly uploads works and rough draft or selects to deposit card in creation of works process。Authentication module is after people's identity is saved in certification from damage, card file will be deposited or unique characteristic of correspondence value passes to and saves module from damage through api interface, plus identity information with use the national standard time, and calculate the overall situation supervision summary of this document by the hashing algorithm of safety and save from damage。Because supporting that save people from damage deposits card or subsidiary works sketch in production process, can review works birth track, determine works proprietary rights root。Use scene is illustrated: saving people A from damage is artistic illustration designer, with the works of the cell-phone customer terminal film recording oneself of present invention research and development from rough draft to finished product, use simple, but save people A from damage to record every time and save from damage and deposit card because passing through, evidence chain is complete, with a high credibility, can as the vaild evidence of court's confrontation。
Step 2: save module from damage and will save people's identity, national standard time from damage and deposit card content (saving file and overall situation supervision summary thereof from damage) three elements and be cured as a certificate。When saving people from damage and needing these works of effect whether to save from damage, authentication module can be used to carry out effect in terminal。
Step 3: original works there occurs online transaction, and intellectual property shifts therewith, the certificate that shift module generates will be transferred to the side of buying automatically, saves people B from damage, these works of sustainable protection in Fig. 2, it is prevented that abuse occurs。
Step 4: when there is infringement disputes, saves people from damage and sends evidence obtaining (judicial proof) request by administration of justice module of coming to testify, and people's identity is saved in auditing module of coming to testify checking from damage, and confirms it is start after saving people from damage to process to collect evidence to ask。
The administration of justice is come to testify a module big innovative point as the present invention, and by notarizing under line, judicial expertise flow process is embedded in the Internet, has ensured notarization, judicial expertise and has carried out under line the same having act of law and greatly facilitate the Internet and save people from damage。Saving people from damage and send evidence obtaining request online, final notarial certificate, judicial expertise certificate can be delivered to by logistics means to be saved from damage in staff, meets very much the Internet and saves the use habit of people from damage。Technically realized on-line real time system docking by electronic evidence safety system by judiciaries such as api interface program and notary organization, judicial expertise mechanism, Arbitration Committee, law courts, save from damage people upload deposit card content save from damage after successfully, electronic evidence safety system can synchronize that the cryptographic Hash saved from damage passes to the judiciaries such as notary organization, judicial expertise mechanism, Arbitration Committee, law court to be put on record, it is achieved the transmitting in time and put on record of information。Save from damage people can see on the judiciary official websites such as notary organization, judicial expertise mechanism, Arbitration Committee, law court in real time disclosed in save record information from damage。
Save the upper transmission module of people from damage and can also upload platform for third party, the Internet original works platform classification is various, as: prestige visitor's platform, design website, material website, the creation of sound shadow website, original literature website etc., and use scene disunity, as: prestige visitor's platform need to support authorship repeatedly to hand over original text, hand over source file deposit card;Literature website needs to support author once update and automatically depositing card。The present invention solves the problem that these platforms use scene differentiation flexibly。As it is shown on figure 3, upload platform (such as prestige visitor's platform and the original platform of literature) by third party and deposit, for saving people from damage, the process that card is collected evidence, idiographic flow is as follows:
Step 1: api interface is arranged in the original platform of third party, it is necessary to the position of transmission works file, this step completely can according to the use scene setting of original platform。Citing: A platform is prestige visitor's (online competitive bidding) platform, and api interface can be arranged on authorship and submit a tender for the first time, again submits a tender, and uploads each step of source file after acceptance of the bid, and the upper transmitting file of authorship can deposit card works simultaneously。B platform is original literature website, api interface can be arranged on author every time more new works chapters and sections time, automatically call and deposit card。
Original works file data or unique corresponding cryptographic Hash are uploaded to and save module from damage by step 2:API interface, save module from damage and will save people's identity, uplink time (national standard time) from damage and deposit card content three elements and be cured as portion evidence。
Step 3: save people from damage and can inquire about in the terminal for original platform building and deposit card record, and use checking, the administration of justice to come to testify functions of modules。
Step 4: original works there occurs online transaction, and intellectual property shifts therewith, the certificate that shift module (namely shifts API) and generates will be transferred to the side of buying automatically, these works of sustainable protection, it is prevented that abuse occurs。
Step 5: when there is infringement, application is come to testify, and deposit the flow process of coming to testify of card with individual autonomy identical for flow process, repeats no more。
As shown in Figure 4, deposited the process of card evidence obtaining by third party's program (such as the office program of Microsoft and mapping program etc.) for saving people from damage。It is with Fig. 3 similar process, is not both and cannot realize saving people's right forwarding function from damage based on third party's program, repeats no more herein。
Above-mentioned three kinds use paths, and the great majority that can cover the original business works circulation of current the Internet use scene, system and effectively solve the anti-infringement problem of the Internet business works。
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention。

Claims (10)

1. the original business works safety system in the Internet, it is characterized in that, including: upper transmission module, save module from damage, module, data memory module and auditing module of coming to testify are come to testify in account management module, authentication module, certificate module, authentication module, supervision module, the administration of justice;
Described upper transmission module for will files passe be saved from damage to saving module from damage, described in the type of file to be saved from damage include: original works, electronic contract, electronic certificate or electronic diary;
Described module of saving from damage receives the file to be saved from damage that upper transmission module is transmitted through, the identity information saving people from damage is obtained from account management module, and with the data that include national standard time and described identity information for parameter by hashing algorithm calculate described in the overall situation supervision summary of file to be saved from damage, file described to be saved from damage, overall situation supervision summary, described identity information, national standard time synchronized are distributed to the server of data memory module, notary organization and judicial expertise mechanism, Arbitration Committee and law court;
Described account management module is for saving the identity information registration of people, accounts information setting, security set, asset management, managing bill, the binding of third party's account from damage, freezing and nullify, and registration and the information transmission arranged is stored to data memory module;
Described authentication module is used for accessing the service of CA digital certificate authentication, authentication four Feature Service, recognition of face service and the Third-party payment service for checking credentials, so that the identity information saving people from damage to be verified;
Described certificate module is used for saving file, overall situation supervision summary from damage and saving the identity information generation of people from damage, update or nullify and save certificate from damage according to data memory module storage, and certificate transmission will be saved from damage to data memory module storage, it is additionally operable to send to saving people from damage described certificate of saving from damage;
Described authentication module is for saving whether the file to be saved from damage that successfully afterwards checking is local is consistent with the file saved from damage being stored in data memory module from damage wait saving file from damage, and maybe whether this file to be saved from damage is through saving from damage;
Described supervision module real-time reception saves the overall situation supervision summary that module sends from damage, and by described overall situation supervision summary in the official website real-time release saving platform, notary organization, judicial expertise mechanism, Arbitration Committee and law court from damage;
The described administration of justice come to testify module for receive save that people proposes online from damage provide the request of coming to testify including notarial certificate and judicial expertise report, and the described request of coming to testify is committed to auditing module of coming to testify;
Described come to testify auditing module for judge ask artificial described data memory module storage provide when saving people from damage include notarial certificate and judicial expertise report take the evidence, and by the described administration of justice come to testify module return claimant;
Described data memory module is used for encrypting the described overall situation supervision summary of storage and file to be saved from damage, and stored by the server of the overall situation supervision summary synchronized transmission after encryption to notary organization, judicial expertise mechanism, Arbitration Committee and law court, and file to be saved from damage, overall situation supervision summary, identity information and accounts information store on different media。
2. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, also include: shift module, people's identity information is saved from damage for what change in described data memory module storage, according to the amended people's of saving from damage identity information, save from damage file and the overall situation supervision summarization generation new save certificate from damage, new certificate of saving from damage is sent to the storage of described data memory module, be additionally operable to by new save that certificate sends to transfer from damage save people from damage。
3. the original business works safety system in the Internet as claimed in claim 1, it is characterised in that also include: law aid module, for receiving the online law request saving people from damage, and acquisition saves certificate from damage to make legal argument from described data memory module。
4. the original business works safety system in the Internet as claimed in claim 1, it is characterised in that described in save the SHA-512 hashing algorithm that module adopts from damage。
5. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, described upper transmission module receive save from damage people by B/S browser, C/S client, mobile client, third-party platform or application program by API upload described in file to be saved from damage。
6. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, the DEA that described data memory module adopts for encrypting overall situation supervision summary includes: any one in SHA-512 hashing algorithm, DEA DES and message digest algorithm MD5。
7. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, described data memory module is additionally operable to announce the overall situation supervision summary of current point in time on the website of notary organization website, judicial expertise mechanism, Arbitration Committee and law court。
8. the original business works safety system in the Internet as claimed in claim 1, it is characterised in that described in save module from damage saving from damage of file same to be saved from damage uploaded for the same period, with being as the criterion of first saving from damage, it is ensured that first saves from damage comes into force。
9. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, described module of saving from damage is additionally operable to the difference according to file type to be saved from damage, saving file from damage for the band of each type and be respectively created an overall situation supervision summary chain, different overall situation supervision summary chains separates operation independent, encryption and stores。
10. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, described module of saving from damage, when meeting algorithm and being cracked, saves file from damage before sealing up for safekeeping in time, and more recalculates this overall situation supervision summary saving file from damage after scaling method and announce to the public in time。
CN201610160193.6A 2016-03-21 2016-03-21 The original business works safety system in internet Active CN105701367B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610160193.6A CN105701367B (en) 2016-03-21 2016-03-21 The original business works safety system in internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610160193.6A CN105701367B (en) 2016-03-21 2016-03-21 The original business works safety system in internet

Publications (2)

Publication Number Publication Date
CN105701367A true CN105701367A (en) 2016-06-22
CN105701367B CN105701367B (en) 2017-08-22

Family

ID=56231485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610160193.6A Active CN105701367B (en) 2016-03-21 2016-03-21 The original business works safety system in internet

Country Status (1)

Country Link
CN (1) CN105701367B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254078A (en) * 2016-08-02 2016-12-21 冯颖 The Internet evidence collecting method, device and the Internet safety system
CN106559433A (en) * 2016-12-07 2017-04-05 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using digital certificate
CN107508806A (en) * 2017-08-11 2017-12-22 北京理工大学 Internet financial electronic data safety system and method based on block chain
CN107578222A (en) * 2017-10-24 2018-01-12 广东华伦招标有限公司 A kind of invitation system
CN107819777A (en) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 A kind of data based on block chain technology deposit card method and system
CN108108593A (en) * 2017-12-20 2018-06-01 厦门市美亚柏科信息股份有限公司 E text power certificates constructing, the method used, terminal device and storage medium
CN108364242A (en) * 2018-01-31 2018-08-03 北京安妮全版权科技发展有限公司 The copyright for preserving intermediate file really weighs method and device
CN108711032A (en) * 2018-05-09 2018-10-26 杭州安存网络科技有限公司 The management method and device of a kind of internet law court electronic evidence
CN109492426A (en) * 2018-10-09 2019-03-19 重庆易保全网络科技有限公司 Security method, device, storage medium and server based on block chain
CN109493038A (en) * 2018-09-25 2019-03-19 法信公证云(厦门)科技有限公司 A kind of front-end system and method for applying to financial industry and having pressure notarization function
CN109740375A (en) * 2018-12-19 2019-05-10 深圳市汇星数字技术有限公司 A kind of shared and dissemination method of original audio production
CN110233996A (en) * 2019-06-25 2019-09-13 艺生活(北京)电子商务有限公司 The true true evidence collection method of the art work
CN110378079A (en) * 2018-04-13 2019-10-25 胡小凡 Information processing, protection, marketing method and device based on original works
CN110443008A (en) * 2019-08-05 2019-11-12 北京如优教育科技有限公司 Creation security method based on creation competition model
CN111950005A (en) * 2020-08-07 2020-11-17 甘肃紫光智能交通与控制技术有限公司 Highway engineering data uploading method and system
CN112579984A (en) * 2019-09-30 2021-03-30 广州艾美网络科技有限公司 Multimedia information authentication method, system, computer device and storage medium
CN112769953A (en) * 2021-01-26 2021-05-07 山西晋合思创信息科技有限公司 Judicial case data diversified preservation method and system based on cloud storage
CN115146598A (en) * 2022-09-06 2022-10-04 天津联想协同科技有限公司 File collaborative editing method and device, network disk and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537312A (en) * 2015-01-22 2015-04-22 杭州安存网络科技有限公司 Network communication data preservation method and device
CN104539636A (en) * 2015-01-22 2015-04-22 杭州安存网络科技有限公司 Video evidence service system
CN104618564A (en) * 2015-01-22 2015-05-13 杭州安存网络科技有限公司 Speech evidence perpetuation method and device
CN204578618U (en) * 2015-01-22 2015-08-19 杭州安存网络科技有限公司 A kind of voice evidence protection device
CN204578617U (en) * 2015-01-22 2015-08-19 杭州安存网络科技有限公司 A kind of voice evidence service system
CN204695315U (en) * 2015-01-22 2015-10-07 杭州安存网络科技有限公司 A kind of network communication data secure device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537312A (en) * 2015-01-22 2015-04-22 杭州安存网络科技有限公司 Network communication data preservation method and device
CN104539636A (en) * 2015-01-22 2015-04-22 杭州安存网络科技有限公司 Video evidence service system
CN104618564A (en) * 2015-01-22 2015-05-13 杭州安存网络科技有限公司 Speech evidence perpetuation method and device
CN204578618U (en) * 2015-01-22 2015-08-19 杭州安存网络科技有限公司 A kind of voice evidence protection device
CN204578617U (en) * 2015-01-22 2015-08-19 杭州安存网络科技有限公司 A kind of voice evidence service system
CN204695315U (en) * 2015-01-22 2015-10-07 杭州安存网络科技有限公司 A kind of network communication data secure device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘仁: "《"公正邮"能否破解电子邮件出证难题?》", 《中国知识产权报》 *
周惠媛 等: "《公证在"版权保险箱"中的作用》", 《中国公证》 *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254078A (en) * 2016-08-02 2016-12-21 冯颖 The Internet evidence collecting method, device and the Internet safety system
CN106559433A (en) * 2016-12-07 2017-04-05 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using digital certificate
CN106559433B (en) * 2016-12-07 2019-12-31 北京信任度科技有限公司 Method and system for fixing electronic evidence and user identity by using digital certificate
CN107508806A (en) * 2017-08-11 2017-12-22 北京理工大学 Internet financial electronic data safety system and method based on block chain
CN107578222A (en) * 2017-10-24 2018-01-12 广东华伦招标有限公司 A kind of invitation system
CN107819777A (en) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 A kind of data based on block chain technology deposit card method and system
CN108108593A (en) * 2017-12-20 2018-06-01 厦门市美亚柏科信息股份有限公司 E text power certificates constructing, the method used, terminal device and storage medium
CN108364242A (en) * 2018-01-31 2018-08-03 北京安妮全版权科技发展有限公司 The copyright for preserving intermediate file really weighs method and device
CN110378079A (en) * 2018-04-13 2019-10-25 胡小凡 Information processing, protection, marketing method and device based on original works
CN108711032A (en) * 2018-05-09 2018-10-26 杭州安存网络科技有限公司 The management method and device of a kind of internet law court electronic evidence
CN109493038A (en) * 2018-09-25 2019-03-19 法信公证云(厦门)科技有限公司 A kind of front-end system and method for applying to financial industry and having pressure notarization function
CN109493038B (en) * 2018-09-25 2022-06-14 法信公证云(厦门)科技有限公司 Preposition system and method with compulsory notarization function applied to financial industry
CN109492426A (en) * 2018-10-09 2019-03-19 重庆易保全网络科技有限公司 Security method, device, storage medium and server based on block chain
CN109740375A (en) * 2018-12-19 2019-05-10 深圳市汇星数字技术有限公司 A kind of shared and dissemination method of original audio production
CN109740375B (en) * 2018-12-19 2023-07-28 深圳市汇星数字技术有限公司 Sharing and publishing method of original audio works
CN110233996A (en) * 2019-06-25 2019-09-13 艺生活(北京)电子商务有限公司 The true true evidence collection method of the art work
CN110443008A (en) * 2019-08-05 2019-11-12 北京如优教育科技有限公司 Creation security method based on creation competition model
CN112579984A (en) * 2019-09-30 2021-03-30 广州艾美网络科技有限公司 Multimedia information authentication method, system, computer device and storage medium
CN112579984B (en) * 2019-09-30 2024-03-15 广州艾美网络科技有限公司 Multimedia information authentication method, system, computer device and storage medium
CN111950005A (en) * 2020-08-07 2020-11-17 甘肃紫光智能交通与控制技术有限公司 Highway engineering data uploading method and system
CN112769953A (en) * 2021-01-26 2021-05-07 山西晋合思创信息科技有限公司 Judicial case data diversified preservation method and system based on cloud storage
CN115146598A (en) * 2022-09-06 2022-10-04 天津联想协同科技有限公司 File collaborative editing method and device, network disk and storage medium
CN115146598B (en) * 2022-09-06 2023-01-06 天津联想协同科技有限公司 File collaborative editing method and device, network disk and storage medium

Also Published As

Publication number Publication date
CN105701367B (en) 2017-08-22

Similar Documents

Publication Publication Date Title
CN105701367B (en) The original business works safety system in internet
US10949511B2 (en) Multicomputer processing for data authentication using a blockchain approach
US11063761B2 (en) Blockchain-based paperless documentation
US11256820B2 (en) Blockchain-based service of process
US11250528B2 (en) Blockchain-based trusted platform
CN111133734B (en) Block chain based decision execution
CN106130987B (en) Internet evidence collecting method, device and internet safety system
US20190166133A1 (en) Multicomputer processing for data authentication and event execution using a blockchain approach
KR20190132938A (en) Method and apparatus for managing subject data based on blockchain
US11900493B2 (en) Blockchain-based dispute resolution
CN110771093B (en) Method and system for proving existence of digital document
KR20200106000A (en) System and method for implementing blockchain-based digital certificate
CN110855428A (en) Movie copyright protection method based on block chain
US11755998B2 (en) Smart data annotation in blockchain networks
KR20200105999A (en) System and method for generating digital marks
Wu et al. Electronic evidence in the blockchain era: New rules on authenticity and integrity
CN114930330A (en) User management of customs clearance service platform based on block chain
JPWO2018088475A1 (en) Electronic authentication method and program
CN110866222A (en) Digital content asset right confirming system and method
CN111936994A (en) Block chain based document registration for customs clearance
WO2021090120A1 (en) Downstream tracking of content consumption
US8799675B2 (en) System and method for electronic certification and authentication of data
KR102288522B1 (en) System for promoting transaction of digital copyright by supplying certifying information of digital contents
Sung Prospects and challenges posed by blockchain technology on the copyright legal system
CN115795405A (en) Scientific research academic union service system based on union chain and operation method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200509

Address after: 401120 c1-12-1, No. 68, Xingguang Avenue, gaoxinyuan, Beibu New District, Yubei District, Chongqing

Patentee after: CHONGQING EBAOQUAN NETWORK TECHNOLOGY Co.,Ltd.

Address before: 400000 Chongqing city Yubei District Yuanyang road two section as boundless as the sea and sky District 1 building 26-4

Patentee before: Feng Ying