CN109002693A - A kind of contribution guard method based on block chain - Google Patents

A kind of contribution guard method based on block chain Download PDF

Info

Publication number
CN109002693A
CN109002693A CN201810782985.6A CN201810782985A CN109002693A CN 109002693 A CN109002693 A CN 109002693A CN 201810782985 A CN201810782985 A CN 201810782985A CN 109002693 A CN109002693 A CN 109002693A
Authority
CN
China
Prior art keywords
contribution
block
data
periodical
sharing network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810782985.6A
Other languages
Chinese (zh)
Other versions
CN109002693B (en
Inventor
李凤岐
王腾宇
刘克猛
刘学
肖奇颖
陆坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University of Technology
Original Assignee
Dalian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University of Technology filed Critical Dalian University of Technology
Priority to CN201810782985.6A priority Critical patent/CN109002693B/en
Publication of CN109002693A publication Critical patent/CN109002693A/en
Application granted granted Critical
Publication of CN109002693B publication Critical patent/CN109002693B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Abstract

The invention belongs to academic pre- publication and the works right to use to protect field, be related to a kind of contribution guard method based on block chain.This method comprises the following steps: establishing data sharing network, establishes multicenter sync server, receive the external data submitted, data are compared, data are carried out with really power protection, is managed to copyright.The present invention is directed to the shared account book feature of block chain, and the anti-tamper characteristic of encryption, block chain technology is devised in a kind of application method of academic journal Publishing Industry, give full play to the technical advantage of block chain, break data barrier existing for academic publishing industry, it realizes and carries out credible reliable data sharing with block chain technology, make the sponsor of academic journal or meeting, the manuscript not yet delivered can be shared and be detected, even if two manuscripts are not all delivered, also it can detect in systems similar, to realize the protection to contribution and the strike to misbehavior in academy.

Description

A kind of contribution guard method based on block chain
Technical field
The invention belongs to academic pre- publication and the works right to use to protect field, be related to a kind of contribution protection based on block chain Method.
Background technique
With information-based and internet development, in all trades and professions, information management system all has become important composition Part.Contribution is managed using computer and network technologies, meets electronization, the demand of networking of the development of periodical Publishing Industry. But periodical is published, especially academic journal publication period of going over a manuscript or draft is longer, within the period of going over a manuscript or draft, since works are in network It is propagated, but is not done statement or the record of copyright protection, it is thus possible to it will appear misbehavior in academy, it is specific next It says, especially colleague plagiarizes the generation with multiple contribution behavior.
It, can be to text for paper plagiarism and multiple contribution behavior, traditional crawler technology or database retrieval technology It is matched and is detected, but detection range can only deliver contribution.If contribution is not yet delivered, between different periodicals for Protection to copyright can only select to refuse shared contribution.The presence of this information barrier, so that colleague plagiarizes and multiple contribution In the presence of being difficult to be timely detected, and until contribution is delivered, infringement has just been actually occurred.Plagiarization of such as going together, which is tried to be the first, to be delivered, original work Person can not right-safeguarding;A certain periodical first include by determination in multiple contribution, and author is informed about other periodicals and sends back the manuscript, and leads to other periodicals Effort waste.
And if it is intended to solving the problems, such as this, it is necessary to which a kind of contribution guard method enables contribution in shielded item It is shared under part.If can be realized the good protection in shared procedure to contribution, by other periodicals or will not go over a manuscript or draft Colleague plagiarizes, then more periodicals are just ready that the contribution that will not yet deliver in hand shares out, relies to eliminate abuse With the information barrier of existence.
Summary of the invention
To solve the above problems, the invention proposes a kind of contribution guard methods based on block chain, all wait try Contribution is stored in the network of decentralization, and each of network node all preserves identical record.The content packet of record Original text containing contribution and manuscript information (author, delivery periodical etc.), record itself is also a kind of existence proof of more copies of independence. If once generating abuse, all nodes all can serve as third party and provide the existence proof of original copy in a network, To protect original author.If contribution is repeated submission to more periodicals by original author simultaneously, system can also be detected automatically not With between periodical, there are similar contributions, and successively providing equity for periodical and prove according to block storage order.
Technical solution of the present invention is as follows:
A kind of contribution guard method based on block chain, the specific steps are as follows:
(1) it establishes data sharing network: inside academic governance and Publishing Industry, establishing data sharing network, each phase Periodical is a node, the submission automatic synchronization that each periodical receives to other all nodes;Concurrent thing in data sharing network Business request by administrator be ranked up with uniform packing become a block, in data sharing network using block chain technology into Row record;
(2) it establishes multicenter sync server: in data sharing network, the synchronous clothes of multicenter being established by data service quotient Business device, establishes block storage pool in multicenter sync server, and the block that administrator in step (1) is packaged is write in sequence Enter into block storage pool;
(3) the external data submitted are received: in data sharing network, there are the periodical of multiple and different types, each phase Periodical receives the submission from author according to respective trafficwise and range;
(4) data are compared: are receiving the submission of external submission and is completing preliminary integrality and Content inspection Afterwards, contribution is carried out broadcast comparison in data sharing network by periodical, checks contribution with the presence or absence of academic improper problem;
(5) really weighed to data: after completing academic improper detection, administrator records contribution, then according to Step (1) carries out data sharing network record, determines periodical to the ownership of contribution;
(6) be managed to copyright: after completing really power, periodical tries contribution;If produced in hearing process Raw copyright change, including periodical is sent back the manuscript or author removes original text, rights management request can be initiated again, by administrator to copyright management Request carries out data sharing network record.
There are four types of users involved in this method:
(1) administrator: the sequence ISP of data sharing network affairs handles the concurrent thing in data sharing network Business problem is ranked up concurrent transaction and unifies to update;
(2) data service quotient: providing data publication and data service, establishes the server of storing data, and total to data It enjoys and data service is provided in network;
(3) periodical: the person of accepting of contribution and the unit of going over a manuscript or draft of contribution copyright;Contribution is delivered, then periodical is the copyright of contribution One of owner;
(4) author: the creator of contribution, for personal or R&D institution.
Concurrent request carries out unified sequence by administrator;Administrator cannot modify to data content, can only be to concurrent Request under environment is ranked up and is packaged, and guarantees that the data of multicenter sync server storage are consistent.
In block storage pool, data are stored with the data block of regular length;All blocks generate one in sequence The chain of directed acyclic, the whole hash value of each block, the block head as next block;If block content is repaired Change, the chain of directed acyclic will be interrupted, to be detected, to guarantee that all records are not tampered.
When data are compared, if author shows as institute there are the misbehavior in academy that multiple contribution, contribution are plagiarized Part of contributing is similar to having contribution in data sharing network or repeats, and multicenter sync server provides testing result.
For the contribution that academic improper detection passes through, it is packaged and is put into block, and be written in all block storage pools;Original text The right information of part includes author information and the periodical information for possessing contribution copyright, and contribution right information is in data sharing network It broadcasts and records, be to weigh statement operation really to contribution itself.
All historical operation records of contribution are all recorded within a block and can not be distorted, but the record of contribution is with contribution State and update, inquiry when only match effective last state.
Beneficial effects of the present invention: the present invention provides a kind of to can be carried out the network for repeating to detect, solution before publication The problem of this class behavior of multiple contribution can not be detected under traditional technology background of having determined.
The present invention is directed to the shared account book feature of block chain, and the anti-tamper characteristic of encryption, devises block chain technology and exists A kind of contribution guard method of academic journal Publishing Industry, gives full play to the technical advantage of block chain, breaks academic publishing industry Existing data barrier realizes the academic contribution protection based on block chain technology, so that the tradition such as multiple contribution, colleague's plagiarization Insurmountable problem can be timely detected discovery in systems under scene.This achievement, in the application of block chain, science There is stronger application value in the fields such as Publishing Industry.
Detailed description of the invention
Fig. 1 is to publish platform under the contribution protected mode of the invention based on block chain to build flow diagram.
Fig. 2 is guard method tortious under the contribution protected mode of the invention based on block chain (with multiple contribution For).
Specific embodiment
Below in conjunction with attached drawing and technical solution, a specific embodiment of the invention is further illustrated.
That platform is published under the contribution protected mode based on block chain of the invention builds process, as shown in Figure 1.
A kind of contribution guard method based on block chain, the specific implementation process is as follows:
S1, based on workflow of the invention, contribution is delivered to the phase by network after completing contribution and writing by author Periodical.
After S2, magazinist receive contribution, first trial can be carried out to contribution, analyze contribution quality itself and content, judgement Whether contribution, which meets the current period, is published version content and basic demand.If do not met, contribution can be retracted, S1 step is repeated by author Suddenly, it throws and gives other periodicals.
By after magazinist first trial, meeting publication content and the basic demand of periodical, magazinist can be with for S3, contribution Academic improper detection is carried out to contribution.The improper detection of science mainly carries out in the data sharing network based on block chain, completely Detection is executed by intelligent contract, judges whether there is similar contribution.If it does, returning to the letter of the repetition contribution to magazinist Breath, is judged by magazinist, if is existed for same contribution repetition submission or similar contribution and is plagiarized, and compiles in periodical It collects and thinks to send back the manuscript to contribution there are after misbehavior in academy, return to S1.
After S4, contribution are by academic improper detection, magazinist can carry out really power protection, concrete mode to contribution are as follows: After being signed by magazinist to contribution, contribution is sent to data sharing network, data sharing network remembers contribution Record, and record is distributed to all nodes, hereafter can all there be the content of the contribution in the block storage pool of all nodes.If Author repeats submission in refereeing procedure later or responsible reader plagiarizes contribution, can be with original text already existing in data sharing network Part repeats, to be detected.And when broadcasting the contribution in data sharing network, since the data consistency of block chain is set Meter, all nodes all completely can truly record presence and the copyright signature of contribution, and periodical also needs not worry about contribution leakage and asks Topic.
After S5, contribution carry out really power protection, magazinist can start according to the relevant regulations and workflow of periodical Please expert and going together contribution is tried, may modify to contribution in hearing process, this process is in data sharing It carries out outside network, is participated in jointly by magazinist, peer-reviewers, author.If peer-reviewers think that Article quality is unqualified, This step can stop modifying, processing of sending back the manuscript.
S6, author carry out after modifying repeatedly contribution, give chief editor by magazinist according to step in S5, to contribution into Row publishes typesetting, and finally confirms.The problems such as inadequate, content is finally undesirable if there is the space of a whole page, can move back copyright It returns, that is, processing of sending back the manuscript.
In S6 and S5 step, if contribution eventually by the examination of chief editor, and is determined and is published, chief editor can to contribution into Row delivers processing, i.e., original copy is replaced with final draft.Specifically, it in data sharing network, shows as, is recorded to where original copy Status modifier is done, is revised as sending back the manuscript, and final draft is sent to data sharing network, state, which is denoted as, to be delivered.
According to the decentralization synchronizing network built in Fig. 1, it is seen that abuse is to be easily detected out , by taking multiple contribution as an example, specific method is as shown in Figure 2:
(1) original author completes a contribution, and contribution is delivered to first hand periodical, first hand periodical by author's selection at this time Selection is gone over a manuscript or draft by responsible reader A.
(2) during responsible reader A is gone over a manuscript or draft, contribution is delivered to second periodical, second periodical selection again by author It is gone over a manuscript or draft by responsible reader B.
(3) under traditional network environment, first hand periodical and second periodical are will not to share the contribution that do not deliver to obtain, Responsible reader A will not exchange the contribution that do not deliver in oneself hand with responsible reader B.So A and B can not mutually be learnt in other side's hand Has similar contribution.Multiple contribution behavior at this time is generated and can not be detected.
(4) block chain network described in the invention is used, the memory mechanism for information of going over a manuscript or draft is changed.When the contribution of author When being given responsible reader A and going over a manuscript or draft, responsible reader A stores contribution within a block, and block in the whole network be it is synchronous, i.e., it is all Periodical can all synchronize additional block content at this time.And when author generates multiple contribution behavior, contribution is given responsible reader B progress When going over a manuscript or draft, responsible reader B can carry out multiple contribution detection, and responsible reader B can be looked into the block of periodical where oneself at this time It askes the contribution to have existed, and the sequence of block provides existence proof, i.e. someone first receives this contribution than oneself.This When responsible reader B can find the contribution in oneself hand in time there are multiple contribution behaviors.
It is the contribution guard method for multiple contribution behavior above.Colleague is plagiarized, detection method is similar.When going over a manuscript or draft People A deliberately delays contribution and not delivers, and tries to be the first to when the submission of another periodical, and the responsible reader B of the periodical is as block chain The synchronization of data, and finding this contribution in responsible reader A goes over a manuscript or draft, to refuse the submission request of author, realizes contribution Protection.

Claims (8)

1. a kind of contribution guard method based on block chain, which is characterized in that specific step is as follows:
(1) it establishes data sharing network: inside academic governance and Publishing Industry, establishing data sharing network, each periodical is One node, the submission automatic synchronization that each periodical receives to other all nodes;Concurrent transaction in data sharing network is asked It asks to be ranked up by administrator and becomes a block with uniform packing, remembered in data sharing network using block chain technology Record;
(2) it establishes multicenter sync server: in data sharing network, multicenter synchronous service being established by data service quotient Device establishes block storage pool in multicenter sync server, and the block that administrator in step (1) is packaged is written in sequence Into block storage pool;
(3) receive the external data submitted: in data sharing network, there are the periodical of multiple and different types, each periodical is pressed According to respective trafficwise and range, the submission from author is received;
(4) data are compared: after receiving the submission of external submission and completing preliminary integrality and Content inspection, the phase Contribution is carried out broadcast comparison in data sharing network by periodical, checks contribution with the presence or absence of academic improper problem;
(5) really weighed to data: after completing academic improper detection, administrator records contribution, then according to step (1) data sharing network record is carried out, determines periodical to the ownership of contribution;
(6) be managed to copyright: after completing really power, periodical tries contribution;If generating version in hearing process More, including periodical is sent back the manuscript or author removes original text, rights management request can be initiated again, by administrator to rights management request for adaptability in tactics Carry out data sharing network record.
2. a kind of contribution guard method based on block chain according to claim 1, which is characterized in that involved in this method User there are four types of:
(1) administrator: the sequence ISP of data sharing network affairs, the concurrent transaction handled in data sharing network are asked Topic is ranked up concurrent transaction and unifies to update;
(2) data service quotient: providing data and publish and data service, establish the server of storing data, and to Data Sharing Network Data service is provided in network;
(3) periodical: the person of accepting of contribution and the unit of going over a manuscript or draft of contribution copyright;Contribution is delivered, then periodical is that all rights reserved for contribution One of person;
(4) author: the creator of contribution, for personal or R&D institution.
3. a kind of contribution guard method based on block chain according to claim 1 or 2, which is characterized in that concurrent request Unified sequence is carried out by administrator;Administrator cannot modify to data content, can only carry out to the request under concurrent environment Sequence and packing guarantee that the data of multicenter sync server storage are consistent.
4. a kind of contribution guard method based on block chain according to claim 1 or 2, which is characterized in that block storage Chi Zhong, data are stored with the data block of regular length;All blocks generate the chain of a directed acyclic in sequence, often The whole hash value of one block, the block head as next block;If block content is modified, the chain of directed acyclic will It is interrupted, to be detected, to guarantee that all records are not tampered.
5. a kind of contribution guard method based on block chain according to claim 3, which is characterized in that block storage pool In, data are stored with the data block of regular length;All blocks generate the chain of a directed acyclic in sequence, each The whole hash value of a block, the block head as next block;If block content is modified, the chain of directed acyclic will be by It interrupts, to be detected, to guarantee that all records are not tampered.
6. a kind of according to claim 1, contribution guard method based on block chain described in 2 or 5, which is characterized in that
When data are compared, if author shows as being contributed there are the misbehavior in academy that multiple contribution, contribution are plagiarized Part is similar to having contribution in data sharing network or repeats, and multicenter sync server provides testing result;
For the contribution that academic improper detection passes through, it is packaged and is put into block, and be written in all block storage pools;Contribution Right information includes author information and the periodical information for possessing contribution copyright, and contribution right information is broadcasted in data sharing network And record, it is to weigh statement operation really to contribution itself;
All historical operation records of contribution are all recorded within a block and can not be distorted, but the record of contribution is with the state of contribution And update, effective last state is only matched in inquiry.
7. a kind of contribution guard method based on block chain according to claim 3, which is characterized in that
When data are compared, if author shows as being contributed there are the misbehavior in academy that multiple contribution, contribution are plagiarized Part is similar to having contribution in data sharing network or repeats, and multicenter sync server provides testing result;
For the contribution that academic improper detection passes through, it is packaged and is put into block, and be written in all block storage pools;Contribution Right information includes author information and the periodical information for possessing contribution copyright, and contribution right information is broadcasted in data sharing network And record, it is to weigh statement operation really to contribution itself;
All historical operation records of contribution are all recorded within a block and can not be distorted, but the record of contribution is with the state of contribution And update, effective last state is only matched in inquiry.
8. a kind of contribution guard method based on block chain according to claim 4, which is characterized in that
When data are compared, if author shows as being contributed there are the misbehavior in academy that multiple contribution, contribution are plagiarized Part is similar to having contribution in data sharing network or repeats, and multicenter sync server provides testing result;
For the contribution that academic improper detection passes through, it is packaged and is put into block, and be written in all block storage pools;Contribution Right information includes author information and the periodical information for possessing contribution copyright, and contribution right information is broadcasted in data sharing network And record, it is to weigh statement operation really to contribution itself;
All historical operation records of contribution are all recorded within a block and can not be distorted, but the record of contribution is with the state of contribution And update, effective last state is only matched in inquiry.
CN201810782985.6A 2018-07-17 2018-07-17 Manuscript protection method based on block chain Active CN109002693B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810782985.6A CN109002693B (en) 2018-07-17 2018-07-17 Manuscript protection method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810782985.6A CN109002693B (en) 2018-07-17 2018-07-17 Manuscript protection method based on block chain

Publications (2)

Publication Number Publication Date
CN109002693A true CN109002693A (en) 2018-12-14
CN109002693B CN109002693B (en) 2021-03-26

Family

ID=64599469

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810782985.6A Active CN109002693B (en) 2018-07-17 2018-07-17 Manuscript protection method based on block chain

Country Status (1)

Country Link
CN (1) CN109002693B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109582641A (en) * 2018-10-17 2019-04-05 北京瑞卓喜投科技发展有限公司 A kind of screening technique and screening system of the works typing based on block chain
CN110008746A (en) * 2019-04-01 2019-07-12 大连理工大学 Medical records storage, shared and safety Claims Resolution model and method based on block chain
CN110109888A (en) * 2019-04-04 2019-08-09 深圳市元征科技股份有限公司 A kind of document handling method and device
CN110472201A (en) * 2019-07-26 2019-11-19 阿里巴巴集团控股有限公司 Based on the text similarity detection method and device of block chain, electronic equipment
CN110598190A (en) * 2019-09-06 2019-12-20 湖南天河国云科技有限公司 Method for determining authority of text data on chain based on block chain
CN111126962A (en) * 2019-12-24 2020-05-08 南方电网科学研究院有限责任公司 New energy grid-connected standard reporting system and method based on block chain
CN111625627A (en) * 2020-07-30 2020-09-04 卓尔智联(武汉)研究院有限公司 Data right determining method and device based on block chain and computer equipment
CN111966749A (en) * 2020-08-04 2020-11-20 中国科学院上海微系统与信息技术研究所 Data processing method and device, electronic equipment and storage medium
US10909317B2 (en) 2019-07-26 2021-02-02 Advanced New Technologies Co., Ltd. Blockchain-based text similarity detection method, apparatus and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
CN107563905A (en) * 2017-07-20 2018-01-09 西安电子科技大学 A kind of academic platform service system and method for building up based on block chain
CN107659610A (en) * 2017-08-02 2018-02-02 北京瑞卓喜投科技发展有限公司 Copyright protection methods, devices and systems based on block chain technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
CN107563905A (en) * 2017-07-20 2018-01-09 西安电子科技大学 A kind of academic platform service system and method for building up based on block chain
CN107659610A (en) * 2017-08-02 2018-02-02 北京瑞卓喜投科技发展有限公司 Copyright protection methods, devices and systems based on block chain technology
CN107659610B (en) * 2017-08-02 2020-08-21 北京瑞卓喜投科技发展有限公司 Copyright protection method, device and system based on block chain technology

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
薛腾飞等: "基于区块链的医疗数据共享模型研究", 《自动化学报》 *
陈晓峰等: "区块链在学术出版领域的创新应用及", 《情报工程》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109582641A (en) * 2018-10-17 2019-04-05 北京瑞卓喜投科技发展有限公司 A kind of screening technique and screening system of the works typing based on block chain
CN110008746A (en) * 2019-04-01 2019-07-12 大连理工大学 Medical records storage, shared and safety Claims Resolution model and method based on block chain
CN110109888A (en) * 2019-04-04 2019-08-09 深圳市元征科技股份有限公司 A kind of document handling method and device
CN110472201B (en) * 2019-07-26 2020-07-21 阿里巴巴集团控股有限公司 Text similarity detection method and device based on block chain and electronic equipment
CN110472201A (en) * 2019-07-26 2019-11-19 阿里巴巴集团控股有限公司 Based on the text similarity detection method and device of block chain, electronic equipment
US10909317B2 (en) 2019-07-26 2021-02-02 Advanced New Technologies Co., Ltd. Blockchain-based text similarity detection method, apparatus and electronic device
WO2021017440A1 (en) * 2019-07-26 2021-02-04 创新先进技术有限公司 Blockchain-based text similarity detection method and apparatus, and electronic device
US11100284B2 (en) 2019-07-26 2021-08-24 Advanced New Technologies Co., Ltd. Blockchain-based text similarity detection method, apparatus and electronic device
CN110598190A (en) * 2019-09-06 2019-12-20 湖南天河国云科技有限公司 Method for determining authority of text data on chain based on block chain
CN110598190B (en) * 2019-09-06 2024-03-08 湖南天河国云科技有限公司 Method for determining right of text data on chain based on block chain
CN111126962A (en) * 2019-12-24 2020-05-08 南方电网科学研究院有限责任公司 New energy grid-connected standard reporting system and method based on block chain
CN111126962B (en) * 2019-12-24 2024-03-12 南方电网科学研究院有限责任公司 New energy grid-connected standard declaration system and method based on blockchain
CN111625627A (en) * 2020-07-30 2020-09-04 卓尔智联(武汉)研究院有限公司 Data right determining method and device based on block chain and computer equipment
CN111966749A (en) * 2020-08-04 2020-11-20 中国科学院上海微系统与信息技术研究所 Data processing method and device, electronic equipment and storage medium
CN111966749B (en) * 2020-08-04 2021-08-17 中国科学院上海微系统与信息技术研究所 Data processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109002693B (en) 2021-03-26

Similar Documents

Publication Publication Date Title
CN109002693A (en) A kind of contribution guard method based on block chain
Lynch The integrity of digital information: Mechanics and definitional issues
US7949666B2 (en) Synchronizing distributed work through document logs
RU2730899C1 (en) Tracing objects between different parties
Tsai et al. Intellectual-property blockchain-based protection model for microfilms
CN110771093B (en) Method and system for proving existence of digital document
CN110674140B (en) Block chain-based content processing method, device, equipment and storage medium
US20090228716A1 (en) Method and system for distributed coordination of access to digital files
CN101689166B (en) Processing write requests with server having global knowledge
CA2474752A1 (en) Data replication based upon a non-destructive data model
US20190347660A1 (en) System and method for protection of confidential information
JP2017123692A (en) Existence proof device, existence proof method, and program therefor
CN110598373B (en) Copyright verification method, system and storage medium
US11687904B2 (en) Downstream tracking of content consumption
Onsrud et al. Public commons of geographic data: Research and development challenges
Kleedorfer et al. Verifiability and traceability in a linked data based messaging system
WO2020096109A1 (en) Method, server, and system for managing distribution of business plan on basis of blockchain
JP2011524044A (en) System and method for preventing duplicate investigation attempts
CN111797426A (en) Distrust notification service
JP2008097301A (en) File management server, program thereof and file management method
KR20210014278A (en) Method and system for sharing data in block chain environment
Angelov et al. Dynamic and secure B2B e-contract update management
Bradley Digital authenticity and integrity: Digital cultural heritage documents as research resources
US10565167B2 (en) Method and apparatus for peer-to-peer file authoring
JP2004133600A (en) Electronic data sharing system and method using email and recording medium for achieving this method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant