CN109145617A - A kind of digital literary property protection method and system based on block chain - Google Patents

A kind of digital literary property protection method and system based on block chain Download PDF

Info

Publication number
CN109145617A
CN109145617A CN201810892685.3A CN201810892685A CN109145617A CN 109145617 A CN109145617 A CN 109145617A CN 201810892685 A CN201810892685 A CN 201810892685A CN 109145617 A CN109145617 A CN 109145617A
Authority
CN
China
Prior art keywords
chained list
data information
work data
detection system
works
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810892685.3A
Other languages
Chinese (zh)
Other versions
CN109145617B (en
Inventor
刘志
向尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spider Web (guangzhou) Education Technology Co Ltd
Original Assignee
Spider Web (guangzhou) Education Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spider Web (guangzhou) Education Technology Co Ltd filed Critical Spider Web (guangzhou) Education Technology Co Ltd
Priority to CN201810892685.3A priority Critical patent/CN109145617B/en
Publication of CN109145617A publication Critical patent/CN109145617A/en
Application granted granted Critical
Publication of CN109145617B publication Critical patent/CN109145617B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

This application provides a kind of digital literary property protection method and system based on block chain, the system comprises data interaction detection systems and distributed trust database to solve the problems, such as unauthorized theft digital work content for carrying out digital copyright protection.Apply for the obtained digital literary property protection method and device based on block chain by this; so that the works content that copyright owning side uploads will not be by other people bootleggings; carry out pirate abuse; and works copyright can be grasped; when copyright is invaded, copyright owning side indicts the infringement operation of visitor on evidence.

Description

A kind of digital literary property protection method and system based on block chain
Technical field
This application involves block chain copyright protection technology fields, relate generally to a kind of digital copyright protection based on block chain Method and system.
Background technique
People's lives mode is just being altered in steps in the development of network and electronic technology.From the point of view of medium field, at present quite A part of crowd has had moved away from traditional paper media, instead utilizes the phases such as multimedia technology and mobile phone, tablet computer The e-book of pass tool.The e-book industry rapid development for saving memory space, read interface close friend, before Publishing Industry faces The major transformation not having.
What is stood in the breach is digital rights issue, and network accelerates the propagation of digital publication as important medium, However it is many propagate be it is unordered even illegal, the content of copyright is easy by other people bootleggings, so as to cause piracy The behavior of infringement, the copyright of electronic publication author are difficult to be guaranteed.It has good grounds, China Digital Library, internet Giant Google company Zeng Yin illegally upload other people books works without approval and are listed in defendant.Meanwhile e-book goes out The safety in version quotient data library is to be improved, once had hacker to crack publisher's reader easily and causes the illegal biography of publication It broadcasts.Unquestionably, if electronic copyright, which cannot obtain protecting conscientiously, to threaten the practical interests of author and publisher, and then to whole A industry generates impact.
Apply for content
The application's is designed to provide a kind of digital literary property protection method and system based on block chain, for being counted Word copyright protection solves the problems, such as unauthorized theft digital work content.
To achieve the goals above, it is as follows that this application provides following technical schemes:
First aspect: this application provides a kind of digital copyright protection systems based on block chain, and the system comprises numbers According to interaction detecting system and distributed trust database,
The data interaction detection system, for receiving the work data information and works behaviour that the copyright owning side uploads Make information, by the chained list of works operation information write-in block chain, the works operation information includes each of purchase works Transaction Identification Number and the corresponding mode of operation of each Transaction Identification Number;And the work data information and the chained list are sent to the distribution Formula trust data library;
The distributed trust database, for receiving the work data information and the chained list, and to the works Data information and the chained list are encrypted;
The data interaction detection system is also used to receive the operation requests of copyright access side initiation, checks the operation Whether the Transaction Identification Number carried in request matches with mode of operation with the works operation information being recorded on block chain, if matching, It is sent to the distributed trust database and obtains work data information request, the acquisition work data information request is for asking It asks and obtains the corresponding work data information of the Transaction Identification Number;
The distributed trust database is also used in the acquisition work data letter for receiving the data interaction system transmission After breath request, the corresponding work data information of the Transaction Identification Number and chained list are decrypted, and by the work data information and chain The corresponding list item of Transaction Identification Number described in table is sent to the data interaction detection system;
The data interaction detection system, in the work data information for receiving the distributed trust database transmission And chained list, and the chained list in received chained list and the data interaction system block chain is subjected to consistency checking, if verifying is logical It crosses, then the received work data information is sent to the copyright access side.
In the optional implementation of first aspect, the data interaction detection system is also used to receive copyright access side and awards The permission of block chain where the access chained list given.
In the optional embodiment of first aspect, the data interaction detection system is also used to: being possessed receiving copyright Before the work data information and works operation information of Fang Shangchuan, the public key that copyright owning side provides is received;
The distributed trust database, is also used to: before receiving the work data information and the chained list, receiving The public key that copyright owning side provides;
The distributed trust database is used for: the work data information and the chained list encrypted, specifically: The work data information and the chained list are encrypted according to the private key that copyright owning side provides;
The distributed trust database is used for: decrypting the corresponding work data information of the Transaction Identification Number and chained list, has Body are as follows: the corresponding work data information of the Transaction Identification Number and chained list are decrypted according to the public key that copyright owning side provides.
In the optional embodiment of first aspect, the data interaction detection system is receiving distributed trust database After the work data information and chained list of transmission, the public key for being also used to provide by copyright owning side is to the chained list and is recorded in number Consistency checking is carried out according to the chained list in interaction detecting system block chain.
In the optional embodiment of first aspect, the corresponding mode of operation of the Transaction Identification Number includes that the Transaction Identification Number is corresponding Mode of operation cryptographic Hash, store course operation information carrier, provide verifying voucher label and encrypted form.
In the optional embodiment of first aspect, the corresponding mode of operation of the Transaction Identification Number includes type and the behaviour of operation The number of work.
In the optional embodiment of first aspect, the data interaction detection system is also used to, and is receiving the copyright After the operation requests that access side initiates,
The operation requests that the copyright access side initiates are recorded in the block chain of the data detection system.
Second aspect: this application provides a kind of digital publishing rights access methods based on block chain, which comprises
Data interaction detection system receives the work data information and works operation information that copyright owning side uploads, will be described Works operation information is written in the chained list of block chain, and the works operation information includes each Transaction Identification Number for buying works and each friendship Easy number corresponding mode of operation;
The work data information and the chained list are sent to distributed trust data by the data interaction detection system Library;
The data interaction detection system receives the operation requests that copyright access side initiates, and checks and takes in the operation requests Whether the Transaction Identification Number of band matches with mode of operation with the works operation information being recorded on block chain;
If matching, the data interaction detection system sends acquisition work data information request and gives distributed trust data Library;
The data interaction detection system receives the work data information and chained list that the distributed trust database returns, And the received chained list and the chained list in data interaction system block chain are verified;
If verifying is errorless, the received work data information is sent to the version by the data interaction detection system Weigh access side.
The third aspect: this application provides a kind of digital publishing rights access methods based on block chain, which comprises
Distributed trust database receives the work data information and chained list that data interaction detection system is sent, and to described Work data information and the chained list are encrypted;The chained list includes the work that the copyright owning side being recorded on block chain uploads Product operation information, the works operation information include buying each Transaction Identification Number and the corresponding mode of operation of each Transaction Identification Number of works;
The distributed trust database receives the acquisition data information request that the data interaction detection system is sent, institute It states and obtains data information request for the corresponding work data information of Transaction Identification Number described in request;The distributed trust data Library decrypts corresponding work data information and chained list after receiving the acquisition work data information request, and by the chain Table is sent to the data interaction detection system and is verified, and verifying is errorless, then the work data information is passed through the number The copyright access side is sent to according to interaction detecting system.
Fourth aspect: present invention also provides a kind of digital publishing rights access mechanism based on block chain, described device includes:
Receiving module, for receiving the work data information and works operation information of copyright owning side upload, the works Operation information includes buying each Transaction Identification Number and the corresponding mode of operation of each Transaction Identification Number of works;
Writing module, for the received works operation information of the receiving module to be written in the chained list of block chain;
Sending module, for sending the chained list of the received work data information of the receiving module and writing station write-in Give distributed trust database;
The receiving module is also used to receive the operation requests of copyright access side initiation;
Check module, for check the Transaction Identification Number carried in the received operation requests of the receiving module and mode of operation with Whether the works operation information being recorded on block chain matches;
The sending module, the Transaction Identification Number for being also used to carry in the verification module checks operation requests and mode of operation After being matched with the works operation information being recorded on block chain, sends acquisition work data information request and give distributed trust data Library;
The receiving module is also used to receive work data information and chained list that the distributed trust database returns;
Authentication module, for carrying out the chained list in the received chained list of the receiving module and data interaction system block chain Verifying;
The sending module is also used to the received work data information of the receiving module being sent to the copyright Access side.
5th aspect: the application also provides a kind of digital publishing rights access mechanism based on block chain, and described device includes:
Receiving module, the work data information and chained list that interaction detecting system is sent for receiving data, the chained list packet The works operation information that the copyright owning side being recorded on block chain uploads is included, the works operation information includes purchase works Each Transaction Identification Number and the corresponding mode of operation of each Transaction Identification Number;
Encrypting module, for being encrypted to the received work data information of the receiving module and the chained list;
The receiving module is also used to receive the acquisition data information request that the data interaction detection system is sent, institute It states and obtains data information request for the corresponding work data information of Transaction Identification Number described in request;
Deciphering module, for decrypting and reading out corresponding work data information and chained list;
Sending module, the chained list for decrypting the deciphering module are sent to the data interaction detection system It is verified, verifying is errorless, then the work data information is sent to the copyright by the data interaction detection system Access side.
6th aspect: the application provides a kind of calculating equipment, comprising: processor, and connected to the processor respectively deposit Reservoir and communication module, the memory are stored with the executable machine readable instructions of the processor, and the communication module is used In with external equipment carry out communications;When calculating equipment operation, the processor executes the machine readable instructions, It is any optional that first aspect, any optional implementation of first aspect, second aspect or second aspect are executed when executing Implementation in the method.
7th aspect: the application provides a kind of computer readable storage medium, stores on the computer readable storage medium There is computer program, any optional realization of first aspect, first aspect is executed when which is run by processor The method in mode, second aspect or any optional implementation of second aspect.
Eighth aspect: the application provides a kind of computer program product, and the computer program product is transported on computers When row, so that computer executes first aspect, any optional implementation, second aspect or the second aspect of first aspect are appointed The method in one optional implementation.
The beneficial effect of the application includes: the digital copyright protection based on block chain that the application obtains by above-mentioned design Method and apparatus, so that the works content that copyright owning side uploads will not carry out pirate abuse by other people bootleggings, and And works copyright can be grasped, when copyright is invaded, copyright owning side indicts the infringement operation of visitor on evidence.
Other feature and advantage of the application will be illustrated in subsequent specification, also, partly be become from specification It is clear that being understood and implementing the embodiment of the present application.The purpose of the application and other advantages can be by written Specifically noted structure is achieved and obtained in specification, claims and attached drawing.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, below will be to institute in embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the application Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.By the way that shown in attached drawing, above and other purpose, the feature and advantage of the application will be more clear.In whole Identical appended drawing reference indicates identical part in attached drawing.Attached drawing, emphasis deliberately are not drawn by actual size equal proportion scaling It is that the purport of the application is shown.
Fig. 1 is the digital copyright protection system structure chart based on block chain that the application first embodiment provides;
Fig. 2 is the digital literary property protection method flow chart based on block chain that the application first embodiment provides;
Fig. 3 is the digital copyright protector schematic diagram based on block chain that the application second embodiment provides;
Fig. 4 is the digital copyright protector schematic diagram based on block chain that the application 3rd embodiment provides;
Fig. 5 is the calculating device structure schematic diagram that the application fourth embodiment provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application embodiment clearer, implement below in conjunction with the application The technical solution in the application embodiment is clearly and completely described in attached drawing in mode, it is clear that described reality The mode of applying is a part of embodiment of the application, rather than whole embodiments.Based on the embodiment in the application, ability Domain those of ordinary skill every other embodiment obtained without creative efforts, belongs to the application The range of protection.Therefore, the detailed description of the presently filed embodiment provided in the accompanying drawings is not intended to limit below and is wanted The scope of the present application of protection is sought, but is merely representative of the selected embodiment of the application.Based on the embodiment in the application, Every other embodiment obtained by those of ordinary skill in the art without making creative efforts belongs to this Apply for the range of protection.
In the description of the present application, it is to be understood that term " center ", " length ", " width ", " thickness ", "upper", The orientation or positional relationship of the instructions such as "lower", "front", "rear", "left", "right", "inner", "outside" is orientation based on the figure Or positional relationship, it is merely for convenience of description the application and simplifies description, rather than the equipment or element of indication or suggestion meaning It must have a particular orientation, be constructed and operated in a specific orientation, therefore should not be understood as the limitation to the application.
In addition, term " first ", " second " etc. are used for description purposes only, it is not understood to indicate or imply relatively important Property or implicitly indicate the quantity of indicated technical characteristic.The feature for defining " first ", " second " etc. as a result, can be expressed Or implicitly include one or more of the features.In the description of the present application, the meaning of " plurality " is two or two More than, unless otherwise specifically defined.
In this application unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc. Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or integral;It can be direct phase Even, can also indirectly connected through an intermediary, the interaction that can be connection or two elements inside two elements is closed System.For the ordinary skill in the art, above-mentioned term in this application specific can be understood as the case may be Meaning.
In this application unless specifically defined or limited otherwise, fisrt feature second feature "upper" or "lower" It may include that the first and second features directly contact, also may include that the first and second features are not direct contacts but pass through it Between other characterisation contact.Moreover, fisrt feature includes the first spy above the second feature " above ", " above " and " above " Sign is right above second feature and oblique upper, or is merely representative of first feature horizontal height higher than second feature.Fisrt feature exists Second feature " under ", " lower section " and " following " include that fisrt feature is directly below and diagonally below the second feature, or is merely representative of First feature horizontal height is less than second feature.
First embodiment
Digital copyright management, full name in English Digital Rights Management, the technology mainly used is digital water Print, copyright protection, digital signature, data encryption.Generally it is translated as digital copyright protection or digital copyright management.It is two that DRM, which is divided to, Class one kind is multimedia protection, such as encryption film, music, audio-video, files in stream media.In addition one kind is encrypted document, example Such as Word, Excel, PDF etc..DRM mainly protects document, film, music not pirated by technological means.This technology By to digital content carry out encryption and additional usage rule digital content is protected, wherein can be concluded that using rule Whether user meets broadcasting.
The digital publishing rights protected in the application may include literary works, text, video, audio, animation, picture and The copyright of flash etc..It is not limit it should be understood that only listing the common digital content works form of several classes here Make this few class works form.
As shown in Figure 1, the application provides a kind of digital copyright protection system based on block chain, including data interaction detection System and distributed trust database, copyright owning side upload work data information and works operation information and detect to data interaction System, data interaction detection system is by the chained list of works operation information write-in block chain, and by works operation information and chained list It is sent to distributed trust database;
Distributed trust database encrypts work data information and chained list;
Data interaction detection system receives the operation requests that copyright access side initiates, and checks carrying in the operation requests Whether Transaction Identification Number matches with mode of operation with the works operation information being recorded on block chain, if matching, sends acquisition works Request of data gives distributed trust database;
Distributed trust database receive obtain work data request, decrypt and read out corresponding work data information and Chained list, and send it to data interaction detection system;
Data interaction detection system receives corresponding work data information and chained list, and will be in received chained list and block chain Chained list carry out consistency checking.
Specifically, as shown in Fig. 2, the application provides a kind of digital literary property protection method based on block chain, this method packet It includes:
Step 101: data interaction system receives the works operation information and work data information that copyright owning side uploads, and By in the chained list of works operation information write-in block chain, the works operation information includes buying each Transaction Identification Number of works and each The corresponding mode of operation of Transaction Identification Number, goes to step 102.
Step 102: work data information and chained list are sent to distributed trust database by data interaction detection system, are turned To step 103.
Step 103: distributed trust database receives the work data information and chained list that the data interaction system is sent, And the work data information and chained list are encrypted, go to step 104.
Step 104: data interaction detection system is checked the operation and is asked in the operation requests for receiving copyright access side initiation It asks whether the Transaction Identification Number of carrying matches with mode of operation with the works operation information being recorded in chained list, is obtained if so, sending It is taken as product data information request and gives distributed trust database, then go to step 105.
Step 105: distributed trust database receives the acquisition work data information that data interaction detection system is sent and asks It asks, decrypts and read corresponding work data information and chained list, and the work data information and chained list that read out are sent to data Interaction detecting system goes to step 106.
Step 106: data interaction detection system receives the work data information and chain that distributed trust database is read out Chained list in received chained list and data interaction detection system block chain is carried out consistency checking by table;If verifying is errorless, send out Work data information is sent to give copyright access side.
Optionally, before step 101, copyright owning side is received the method also includes: data interaction detection system to award The permission of block chain where the access chained list given.
Specifically, only copyright owning side is granted by data interaction detection system permission, data interaction inspection in above-mentioned steps Examining system could access and operate the works operation information being stored on block chain.
Here it is worth noting that, when copyright owning side is because of certain reasons, for example is not desired to continue copyright access side access Works, it is desirable to terminate and use copyright, can be visited by cancelling its works in the permission of data interaction detection system to terminate copyright Access and operation of the side of asking to oneself works.
Optionally, before step 101, the method also includes data interaction detection system and distributed trust data Library receives the public key that copyright owning side provides.
Specifically, public key at this time provides for copyright owning side, using asymmetric cryptosystem in technical scheme Algorithm, asymmetrical encryption algorithm: a pair of of key-public key and private key entirely different using two but that be exact matching make When encrypting file with asymmetrical encryption algorithm, only using matched a pair of of public key and private key, it could complete to encryption of plaintext And decrypting process, for example one file is encrypted using public key, it is necessary to it can just be unlocked, be made using paired private key One file is encrypted with private key, it is necessary to can just be unlocked using paired public key.
Optionally, the corresponding mode of operation of the Transaction Identification Number in a step 101 includes the corresponding operation of the Transaction Identification Number The cryptographic Hash of mode, provides the voucher label and encrypted form of verifying at the carrier for storing course operation information.
Optionally, the corresponding mode of operation of the Transaction Identification Number in a step 101 includes the type of operation and of operation Number.
Specifically, work data information includes the particular content of works;Works operation information includes copyright owning side, copyright Access side to the operation informations each time of works, wherein specific works operation information include play, downloading.Chained list is record On block chain, including all block chain Transaction Identification Numbers and its corresponding mode of operation by verifying, wherein corresponding detailed Thin information includes: Hash, Token, Signature, Encrypt, and what Hash was indicated is the cryptographic Hash of corresponding mode of operation, It is sightless to database;What Token was indicated is the carrier for storing course operational motion, is visible to database; Signature indicates validating documents or label;What Encrypt was indicated is the encrypted form of work data information.
Optionally, in step 103, specifically: distributed trust database root believes work data according to the private key of offer Breath and chained list are encrypted;In step 105, specifically: distributed trust database root is according to the public key of exchange to being stored in point Work data information and chained list in cloth trust data library are decrypted;In step 106, specifically: data interaction detection The public key that system is provided by copyright owning side is to the chained list and the chained list being recorded in data interaction detection system block chain Carry out consistency checking.
In step 103, the public key exchanged with step 101 that distributed trust database is provided by copyright owning side Pairs of private key encrypts work data information and chained list, and is stored in distributed trust database, wherein chained list Encrypted form be Encrypt.
At step 104, specifically, data interaction detection system is after receiving the operation information that copyright access side initiates, According to the Transaction Identification Number that copyright access side sends, the chained list where corresponding works operation information is found, reads and checks chained list In Token storage the operation of all works number and type and copyright the access side number and type of operation information initiated Whether correspond.Optionally, if data interaction detection system is after verification, the operation that discovery copyright access side initiates Information is inconsistent, then data interaction detection system terminates operation of the copyright access side for works.
Optionally, at step 104, after receiving the operation requests that the copyright access side initiates, the copyright is visited The operation requests that the side of asking initiates are recorded in the block chain of the data detection system.
Specifically, copyright owning side can also carry copyright access side in database by called data interaction detecting system The token value of course is accessed, is recorded to obtain copyright access side to the operation information of corresponding course, so that copyright owning side can be with The operating process of copyright access side is grasped, if copyright access side is related to the operation letter for having illegal to the works of copyright owning side Breath, and the subsequent dependencies for being related to encroaching right, during subsequent right-safeguarding, the access that copyright access side grasps is recorded It can be used as the evidence of right-safeguarding.
In step 106, specifically, public key also has the function of verifying digital signature, the chained list decrypted will be with storage Chained list in the database that data interaction system carries is completely the same, and it is errorless to can be only achieved verifying.Specifically, and passing through friendship Easy number is found corresponding chained list, is verified information in all information and singnature in chained list in Token and is read out Whether the corresponding informance in chained list is consistent.
The meaning of verifying is: first, confirm the work data letter decrypted and read out from distributed trust database Whether breath is to access required for copyright access side;Second, confirmation is decrypted and whether the work data information read out is complete , if imperfect, the operation that copyright access side carries out possibly can not be fully achieved;Third, distributed trust database is not It is completely reliable, it is also possible to be maliciously tampered, so verifying to the chained list interpreted and original chained list, reach true Surely it is needed the effect of work data information.
Second embodiment
The application also provides a kind of digital publishing rights access mechanism based on block chain, comprising:
Receiving module 201, for receiving the work data information and works operation information of copyright owning side upload, works behaviour It include buying each Transaction Identification Number and the corresponding mode of operation of each Transaction Identification Number of works as information;
Writing module 202, for the received works operation information of receiving module 201 to be written in the chained list of block chain;
Sending module 203, for sending out the chained list of the received work data information of receiving module 201 and writing station write-in Give distributed trust database;
Receiving module 201 is also used to receive the operation requests of copyright access side initiation;
Module 204 is checked, for checking the Transaction Identification Number carried in the received operation requests of receiving module 201 and mode of operation Whether matched with the works operation information being recorded on block chain;
Sending module 203, be also used to verification module 204 check in operation requests the Transaction Identification Number that carries and mode of operation with After being recorded in the works operation information matching on block chain, sends acquisition work data information request and give distributed trust data Library;
Receiving module 201 is also used to receive the work data information and chained list of the return of distributed trust database;
Authentication module 205, for by the chained list in the received chained list of receiving module 201 and data interaction system block chain into Row verifying;
Sending module 203 is also used to for the received work data information of receiving module 201 being sent to the copyright access Side.
3rd embodiment
The present invention also provides a kind of digital publishing rights access mechanisms based on block chain, comprising:
Receiving module 301, the work data information and chained list, chained list that interaction detecting system is sent for receiving data include The works operation information that the copyright owning side being recorded on block chain uploads, works operation information include buying each transaction of works Number and the corresponding mode of operation of each Transaction Identification Number;
Encrypting module 302, for being encrypted to the received work data information of receiving module 301 and chained list;
Receiving module 301 is also used to receive the acquisition data information request of data interaction detection system transmission, obtains data Information request is for the corresponding work data information of Transaction Identification Number described in request;
Deciphering module 303, for decrypting and reading out corresponding work data information and chained list;
Sending module 304 is sent to data interaction detection system for will decrypt the chained list that decrypts of device 303 and tests Card, verifying is errorless, then work data information is sent to copyright access side by data interaction detection system.
Fourth embodiment
The application provides a kind of calculating equipment, comprising: processor 401, and memory 402 connected to the processor respectively With communication module 403, memory 402 is stored with the executable machine readable instructions of processor 401, communication module 403 be used for External equipment carries out communications;When calculating equipment operation, processor 401 executes the machine readable instructions, to hold Times of first embodiment, any optional implementation of first embodiment or second embodiment, second embodiment is executed when row One optional implementation or 3rd embodiment, 3rd embodiment any optional implementation in the method.
The application provides a kind of computer readable storage medium, and computer journey is stored on the computer readable storage medium Sequence, when which is run by processor execute first embodiment, first embodiment any optional implementation or Second embodiment, any optional implementation of second embodiment or 3rd embodiment, 3rd embodiment it is any optional The method in implementation.
The application provides a kind of computer program product, when the computer program product is run on computers, so that Computer executes first embodiment, any optional implementation of first embodiment or second embodiment, second embodiment Any optional implementation or 3rd embodiment, 3rd embodiment any optional implementation in the method set.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.

Claims (10)

1. a kind of digital copyright protection system based on block chain, which is characterized in that the system comprises data interaction detection systems System and distributed trust database,
The data interaction detection system, for receiving the work data information and works operation letter that the copyright owning side uploads Breath, by the chained list of works operation information write-in block chain, the works operation information includes buying each transaction of works Number and the corresponding mode of operation of each Transaction Identification Number;And the work data information and the chained list are sent to the distributed letter Appoint database;
The distributed trust database, for receiving the work data information and the chained list, and to the work data Information and the chained list are encrypted;
The data interaction detection system is also used to receive the operation requests of copyright access side initiation, checks the operation requests Whether the Transaction Identification Number of middle carrying matches with mode of operation with the works operation information being recorded on block chain, if matching, to institute It states distributed trust database and sends acquisition work data information request, the acquisition work data information request is obtained for requesting Take the corresponding work data information of the Transaction Identification Number;
The distributed trust database is also used to ask in the acquisition work data information for receiving the data interaction system transmission After asking, the corresponding work data information of the Transaction Identification Number and chained list are decrypted, and will be in the work data information and chained list The corresponding list item of the Transaction Identification Number is sent to the data interaction detection system;
The data interaction detection system, for receiving the work data information and chain that the distributed trust database is sent Table, and the chained list in received chained list and the data interaction system block chain is subjected to consistency checking, if being verified, The received work data information is sent to the copyright access side.
2. system according to claim 1, which is characterized in that the data interaction detection system is also used to receive copyright access The permission of block chain where the access chained list of Fang Shouyu.
3. system according to claim 1, which is characterized in that the data interaction detection system is also used to: receiving copyright Before work data information and works operation information that owning side uploads, the public key that copyright owning side provides is received;
The distributed trust database, is also used to: before receiving the work data information and the chained list, receiving copyright The public key that owning side provides;
The distributed trust database is used for: the work data information and the chained list encrypted, specifically: according to The private key that copyright owning side provides encrypts the work data information and the chained list;
The distributed trust database is used for: the corresponding work data information of the Transaction Identification Number and chained list are decrypted, specifically: The corresponding work data information of the Transaction Identification Number and chained list are decrypted according to the public key that copyright owning side provides.
4. system according to claim 3, which is characterized in that the data interaction detection system is receiving distributed trust number After the work data information and chained list that send according to library, the public key for being also used to provide by copyright owning side is to the chained list and record Chained list in data interaction detection system block chain carries out consistency checking.
5. system according to claim 1, which is characterized in that the corresponding mode of operation of the Transaction Identification Number includes the Transaction Identification Number The cryptographic Hash of corresponding mode of operation, provides the voucher label and encrypted form of verifying at the carrier for storing course operation information.
6. system according to claim 1, which is characterized in that the corresponding mode of operation of the Transaction Identification Number includes the type of operation With the number of operation.
7. system according to claim 1, which is characterized in that the data interaction detection system is also used to, described in reception After the operation requests that copyright access side initiates,
The operation requests that the copyright access side initiates are recorded in the block chain of the data detection system.
8. a kind of digital publishing rights access method based on block chain, which is characterized in that the described method includes:
Data interaction detection system receives the work data information and works operation information that copyright owning side uploads, by the works Operation information is written in the chained list of block chain, and the works operation information includes buying each Transaction Identification Number and each Transaction Identification Number of works Corresponding mode of operation;
The work data information and the chained list are sent to distributed trust database by the data interaction detection system;
The data interaction detection system receives the operation requests that copyright access side initiates, and checks carrying in the operation requests Whether Transaction Identification Number matches with mode of operation with the works operation information being recorded on block chain;
If matching, the data interaction detection system sends acquisition work data information request and gives distributed trust database;
The data interaction detection system receives the work data information and chained list that the distributed trust database returns, and will The received chained list is verified with the chained list in data interaction system block chain;
If verifying is errorless, the received work data information is sent to the copyright and visited by the data interaction detection system The side of asking.
9. a kind of digital publishing rights access method based on block chain, which is characterized in that the described method includes:
Distributed trust database receives the work data information and chained list that data interaction detection system is sent, and to the works Data information and the chained list are encrypted;The chained list includes the works behaviour that the copyright owning side being recorded on block chain uploads Make information, the works operation information includes buying each Transaction Identification Number and the corresponding mode of operation of each Transaction Identification Number of works;
The distributed trust database receives the acquisition data information request that the data interaction detection system is sent, described to obtain Take data information request for the corresponding work data information of Transaction Identification Number described in request;The distributed trust database exists After receiving the acquisition work data information request, corresponding work data information and chained list are decrypted, and the chained list is sent out It gives the data interaction detection system to be verified, verifying is errorless, then hands over the work data information by the data Mutual detection system is sent to the copyright access side.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited Computer instruction is stored up, the computer instruction makes the computer execute the method as described in any one of claim 8-9.
CN201810892685.3A 2018-08-07 2018-08-07 Block chain-based digital copyright protection method and system Active CN109145617B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810892685.3A CN109145617B (en) 2018-08-07 2018-08-07 Block chain-based digital copyright protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810892685.3A CN109145617B (en) 2018-08-07 2018-08-07 Block chain-based digital copyright protection method and system

Publications (2)

Publication Number Publication Date
CN109145617A true CN109145617A (en) 2019-01-04
CN109145617B CN109145617B (en) 2021-04-30

Family

ID=64791796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810892685.3A Active CN109145617B (en) 2018-08-07 2018-08-07 Block chain-based digital copyright protection method and system

Country Status (1)

Country Link
CN (1) CN109145617B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109729093A (en) * 2019-01-17 2019-05-07 重庆邮电大学 A kind of digital publishing rights register technique based on block chain
CN110610067A (en) * 2019-06-21 2019-12-24 深圳市元征科技股份有限公司 Copyright management method and device
CN110968846A (en) * 2019-11-27 2020-04-07 浙江大学 Music content copyright protection method and system based on block chain
CN112199738A (en) * 2019-05-17 2021-01-08 创新先进技术有限公司 Method and device for infringement and evidence preservation based on block chain and electronic equipment
CN116305003A (en) * 2023-05-11 2023-06-23 南京信息工程大学 PDF document copyright protection system based on blockchain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160275461A1 (en) * 2015-03-20 2016-09-22 Rivetz Corp. Automated attestation of device integrity using the block chain
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
CN107222303A (en) * 2017-05-11 2017-09-29 暨南大学 Digital publishing rights traceability system building method based on block chain and cloud platform
CN107330694A (en) * 2017-07-03 2017-11-07 重庆小犀智能科技有限公司 Copyright trading system and method for commerce based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160275461A1 (en) * 2015-03-20 2016-09-22 Rivetz Corp. Automated attestation of device integrity using the block chain
CN107222303A (en) * 2017-05-11 2017-09-29 暨南大学 Digital publishing rights traceability system building method based on block chain and cloud platform
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
CN107330694A (en) * 2017-07-03 2017-11-07 重庆小犀智能科技有限公司 Copyright trading system and method for commerce based on block chain

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109729093A (en) * 2019-01-17 2019-05-07 重庆邮电大学 A kind of digital publishing rights register technique based on block chain
CN112199738A (en) * 2019-05-17 2021-01-08 创新先进技术有限公司 Method and device for infringement and evidence preservation based on block chain and electronic equipment
CN112199738B (en) * 2019-05-17 2024-03-08 创新先进技术有限公司 Infringement evidence method and device based on blockchain and electronic equipment
CN110610067A (en) * 2019-06-21 2019-12-24 深圳市元征科技股份有限公司 Copyright management method and device
CN110968846A (en) * 2019-11-27 2020-04-07 浙江大学 Music content copyright protection method and system based on block chain
CN116305003A (en) * 2023-05-11 2023-06-23 南京信息工程大学 PDF document copyright protection system based on blockchain
CN116305003B (en) * 2023-05-11 2023-08-15 南京信息工程大学 PDF document copyright protection system based on blockchain

Also Published As

Publication number Publication date
CN109145617B (en) 2021-04-30

Similar Documents

Publication Publication Date Title
CN109145617A (en) A kind of digital literary property protection method and system based on block chain
US20180270048A1 (en) System, device, and method of secure entry and handling of passwords
US20110185179A1 (en) System And Method For Digital Rights Management With A Lightweight Digital Watermarking Component
CN104541281B (en) For the scrambled method and apparatus of selective RAM
EP1686504B1 (en) Flexible licensing architecture in content rights management systems
US8386799B2 (en) Methods and apparatuses for providing DRM interoperability
JP5331920B2 (en) Computer-readable storage medium
CN105745660B (en) For supporting the technology of multiple digital rights management agreements on a client device
JPWO2004109972A1 (en) User terminal for license reception
JP2005536951A (en) Apparatus, system, and method for securing digital documents in a digital device
Diehl Securing digital video: techniques for DRM and content protection
CN101989988A (en) Copyright protection system and method of ebook online reading
Hassan et al. A robust computational DRM framework for protecting multimedia contents using AES and ECC
CN101578608A (en) Methods and apparatuses for accessing content based on a session ticket
Nair et al. Enabling DRM-preserving digital content redistribution
CN104966000A (en) Multimedia copyright protection method based on security engine
Miao et al. Digital copyright works management system based on DOSA
Yang et al. Enhanced digital rights management authentication scheme based on smart card
US20050060544A1 (en) System and method for digital content management and controlling copyright protection
US20190044709A1 (en) Incorporating software date information into a key exchange protocol to reduce software tampering
CN104462872A (en) Terminal, server and authorization method of digital contents
CN101099207A (en) Portable data support with watermark function
Lee et al. A portable DRM scheme using smart cards
Sarode et al. Supporting Digital Rights and Copyright in Online eBook Stores Using Blockchain.
Nützel et al. How to increase the security of Digital Rights Management systems without affecting consumer’s security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant