CN109522681A - Digital content really weighs method, apparatus and storage medium - Google Patents

Digital content really weighs method, apparatus and storage medium Download PDF

Info

Publication number
CN109522681A
CN109522681A CN201811095369.XA CN201811095369A CN109522681A CN 109522681 A CN109522681 A CN 109522681A CN 201811095369 A CN201811095369 A CN 201811095369A CN 109522681 A CN109522681 A CN 109522681A
Authority
CN
China
Prior art keywords
digital content
ciphertext
node
block chain
index information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811095369.XA
Other languages
Chinese (zh)
Inventor
李万胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Asymmetric Block Chain Technology Co Ltd
Original Assignee
Beijing Asymmetric Block Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Asymmetric Block Chain Technology Co Ltd filed Critical Beijing Asymmetric Block Chain Technology Co Ltd
Priority to CN201811095369.XA priority Critical patent/CN109522681A/en
Publication of CN109522681A publication Critical patent/CN109522681A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

This disclosure relates to which a kind of digital content really weighs method, apparatus and storage medium, it is encrypted the described method includes: treating the digital content really weighed according to the symmetric key of holder's node, digital content ciphertext is obtained, holder's node is block chain node of the owner of the digital content in block chain network;Digital content ciphertext is written in the first block chain, the storage index information of digital content is obtained;Storage index information and symmetric key are encrypted according to the public key of holder's node, obtain index information ciphertext;Index information ciphertext is written in the second block chain.Pass through the technical solution of the disclosure, it may insure that other any nodes can not directly acquire digital content, and storage index information of the digital content ciphertext in the first block chain uniquely specify the information that is stored in digital content ciphertext and block chain have can not tamper so that index information ciphertext can be used as owner to the proof of digital content ownership.

Description

Digital content really weighs method, apparatus and storage medium
Technical field
This disclosure relates to information technology field, and in particular, to a kind of digital content really weighs method, apparatus and storage is situated between Matter.
Background technique
Due to digital content (including text, image, audio-video, application software etc.) have lossless copy, be easy to distribute etc. Characteristic, random batch duplicating digital content product and by its by all kinds of communication network carriers carry out it is unauthorized distribution, propagate and The phenomenon that abuse, is generally existing, and very disruptive market order has invaded the interests of the ownership owner, hit content original work The creation enthusiasm of person.It is to protect digital content from a kind of control for illegally using and replicate without permission that digital content, which is really weighed, Means.
Digital content in the prior art really weighs method, and the usually owner of digital content will be digital by user equipment The relevant information of content and authorization certificate server is sent to the proof data of digital content ownership, is recognized by authorization It demonstrate,proves server and identification information is generated according to the data of proof, the relevant information of digital content is associated with identification information and is deposited It stores up and identification information is returned into the user equipment that the owner uses, which is used as the owner couple The proof of digital content ownership.However, the proof data due to digital content ownership is easy to be tampered, so that digital content Ownership be easy detinued.
Summary of the invention
In order to overcome problems of the prior art, the disclosure provides a kind of digital content and really weighs method, apparatus and deposit Storage media.
To achieve the goals above, the disclosure provides a kind of digital content and really weighs method, which comprises
The digital content really weighed is treated according to the symmetric key of holder's node to encrypt, and obtains digital content ciphertext, Holder's node is block chain node of the owner of the digital content in block chain network;
The digital content ciphertext is written in the first block chain, the storage index information of the digital content, institute are obtained Storage index information is stated for obtaining the digital content ciphertext;
The storage index information and the symmetric key are encrypted according to the public key of holder's node, obtained Index information ciphertext;
The index information ciphertext is written in the second block chain.
Optionally, the method also includes:
Request is transferred the possession of in the intelligent contract write-in disposed into the second block chain, is executed such as with triggering the intelligent contract Lower operation:
The index information ciphertext is decrypted according to the private key for transferring the possession of holder's node in request, is obtained To the symmetric key and the storage index information;
The symmetric key and the storage index information are encrypted according to the public key of purchase node, obtain new rope Fuse ceases ciphertext;
The new index information ciphertext is written in the newest block of the second block chain, wherein the purchase section The public key of point is that the purchase node is written when triggering the intelligent contract, and the purchase node is the purchase of the digital content Block chain node of the buyer in the block chain network.
The disclosure also provides a kind of digital content and really weighs method, which comprises
The digital content really weighed is treated according to the symmetric key of holder's node to encrypt, and obtains digital content ciphertext, Holder's node is block chain node of the owner of the digital content in block chain network;
The digital content ciphertext is sent at least one storage equipment and receives at least one described storage equipment hair The storage index information sent, the storage index information is for obtaining the digital content ciphertext;
The storage index information and the symmetric key are encrypted according to the public key of holder's node, obtained Index information ciphertext;
The index information ciphertext is written in block chain.
Optionally, the symmetric key according to holder's node is treated the digital content really weighed and is encrypted, and is counted Word content ciphertext, comprising:
It generates n+1 symmetric key and the digital content is encrypted according to initial key, obtain initial ciphertext, In, the initial key is any symmetric key in the n+1 symmetric key, and n is the integer greater than 0;
The initial ciphertext is divided into n part, correspond in other n symmetric key one of each section is symmetrical close Key;
For each section in the n part, the part is encrypted according to the corresponding symmetric key in the part, Obtain digital content cyphertext component, wherein the digital content ciphertext includes in n digital content cyphertext component and a number Hold the corresponding storage equipment of cyphertext component;
It is described that the digital content ciphertext is sent at least one storage equipment, comprising:
For each digital content cyphertext component, which is sent to corresponding storage equipment.
The disclosure also provides a kind of digital content and really weighs device, and described device includes:
First encrypting module, is configured as treating the digital content really weighed according to the symmetric key of holder's node and adds It is close, digital content ciphertext is obtained, holder's node is block of the owner of the digital content in block chain network Chain node;
First writing module is configured as the digital content ciphertext being written in the first block chain, obtains the number The storage index information of content, the storage index information is for obtaining the digital content ciphertext;
Second encrypting module is configured as according to the public key of holder's node to the storage index information and described Symmetric key is encrypted, and index information ciphertext is obtained;
Second writing module is configured as the index information ciphertext being written in the second block chain.
Optionally, described device further include:
Trigger module is configured as the intelligent contract disposed into the second block chain write-in and transfers the possession of request, with triggering The intelligence contract performs the following operations:
The index information ciphertext is decrypted according to the private key for transferring the possession of holder's node in request, is obtained To the symmetric key and the storage index information;
The symmetric key and the storage index information are encrypted according to the public key of purchase node, obtain new rope Fuse ceases ciphertext;
The new index information ciphertext is written in the newest block of the second block chain, wherein the purchase section The public key of point is that the purchase node is written when triggering the intelligent contract, and the purchase node is the purchase of the digital content Block chain node of the buyer in the block chain network.
The disclosure also provides a kind of digital content and really weighs device, and described device includes:
Third encrypting module is configured as treating the digital content really weighed according to the symmetric key of holder's node It is encrypted, obtains digital content ciphertext, holder's node is the owner of the digital content in block chain network Block chain node;
Transceiver module is configured as the digital content ciphertext being sent at least one storage equipment and reception is described extremely The storage index information that few storage equipment is sent, the storage index information is for obtaining the digital content ciphertext;
4th encrypting module is configured as according to the public key of holder's node to the storage index information and described Symmetric key is encrypted, and index information ciphertext is obtained;
Third writing module is configured as the index information ciphertext being written in block chain.
Optionally, the third encrypting module includes:
First encryption submodule, is configurable to generate n+1 symmetric key and according to initial key to the digital content It is encrypted, obtains initial ciphertext, wherein the initial key is any symmetric key in the n+1 symmetric key, n For the integer greater than 0;
Submodule is divided, is configured as the initial ciphertext being divided into n part, each section corresponds to other n symmetrically A symmetric key in key;
Second encryption submodule, is configured as each section in the n part, corresponding right according to the part Claim the key pair part to be encrypted, obtain digital content cyphertext component, wherein the digital content ciphertext includes n number Content ciphertext and the corresponding storage equipment of a digital content cyphertext component;
The transceiver module includes:
Sending submodule is configured as distributing the digital content cyphertext component for each digital content cyphertext component Give corresponding storage equipment.
The disclosure also provides a kind of computer readable storage medium, is stored thereon with computer program, and the program is processed The step of digital content for realizing that the disclosure provides when device executes really weighs method.
The disclosure also provides a kind of digital content and really weighs device, comprising: memory is stored thereon with computer program;Place Device is managed, for executing the computer program in the memory, method is weighed really with the digital content for realizing that the disclosure provides The step of.
The technical scheme provided by this disclosed embodiment can include the following benefits:
It is stored in the first block chain after digital content after really weigh to be passed through to the symmetric key encryption of holder's node, it can To ensure that other any nodes can not directly acquire digital content, and then guarantee the storage security of digital content.Secondly, will add The index letter obtained after the public key encryption that the symmetric key and digital content ciphertext of close digital content ciphertext pass through holder's node It ceases ciphertext to be written in the second block chain, index information ciphertext only could be decrypted by the private key of holder's node, and other illegal accounts Family can not decrypt to obtain digital content ciphertext and for decrypting the symmetrical close of digital content ciphertext in the case where being not authorized to Key, and then can not know digital content, and since storage index information of the digital content ciphertext in the first block chain is unique Specify the information that is stored in digital content ciphertext and block chain have can not tamper, index information ciphertext, which can be used as, to be possessed Proof of the person to digital content ownership.Compared with the prior art, the owner of digital content is not necessarily to any third party center Authorization identifying mechanism provides data and proof, and digital content ownership is detinued caused by being tampered to avoid proof The problem of.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Other feature and advantage of the disclosure will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is and to constitute part of specification for providing further understanding of the disclosure, with following tool Body embodiment is used to explain the disclosure together, but does not constitute the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is the flow chart that method is really weighed according to a kind of digital content shown in one exemplary embodiment of the disclosure;
Fig. 2 is the schematic diagram according to a kind of implementation environment shown in one exemplary embodiment of the disclosure;
Fig. 3 is the flow chart that a kind of digital content shown according to disclosure another exemplary embodiment really weighs method;
Fig. 4 is the flow chart that a kind of digital content shown according to disclosure another exemplary embodiment really weighs method;
Fig. 5 is a kind of schematic diagram of implementation environment shown according to disclosure another exemplary embodiment;
Fig. 6 is the flow chart that a kind of digital content shown according to disclosure another exemplary embodiment really weighs method;
Fig. 7 is the block diagram that device is really weighed according to a kind of digital content shown in one exemplary embodiment of the disclosure;
Fig. 8 is the block diagram that a kind of digital content shown according to disclosure another exemplary embodiment really weighs device;
Fig. 9 is the block diagram that a kind of digital content shown according to disclosure another exemplary embodiment really weighs device;
Figure 10 is the block diagram that a kind of digital content shown according to disclosure another exemplary embodiment really weighs device;
Figure 11 is the block diagram that a kind of digital content shown according to disclosure another exemplary embodiment really weighs device.
Specific embodiment
It is described in detail below in conjunction with specific embodiment of the attached drawing to the disclosure.It should be understood that this place is retouched The specific embodiment stated is only used for describing and explaining the disclosure, is not limited to the disclosure.
It should be noted that the specification and claims of the disclosure and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being interpreted as specific sequence or precedence.
In order to make those skilled in the art be easier to understand the technical solution of embodiment of the present disclosure offer, first below to this The open the relevant technologies being related to simply are introduced.
Block chain is the decentralization distributed data base system for participating in maintenance jointly by nodes all in block chain network, It is by a series of data chunks generated based on cryptography method at each data block is a block in block chain. According to the sequencing of generation time, block is linked together in an orderly manner, forms a data chain, is visually known as area Block chain.Block chain is generated by its special block and transaction, indentification protocol can not forge with that can not change, is completely traceable Security feature.
The related notion explanation being related in block chain technology:
Block chain node: block chain network is based on P2P (Peer to Peer, peer-to-peer network) network, each participates in business With the node that block storage, verifying, the P2P network node forwarded are all in a block chain network.
User identity: the user identity in block chain is indicated using public key, and public key and private key occur in pairs, In, private key is grasped by user without being published in above-mentioned block chain network, and public key after specific Hash and coding by becoming " address ", " address " represents user, and public key and " address " can arbitrarily issue in block chain network.It is worth explanation It is that one-to-one relationship is not present in user identity and block chain node, and user can use on any one block chain node The private key of oneself.
The write-in of block chain data: block chain node to block chain network publication " transaction " (Transaction) by realizing Data are written to block chain.Use oneself private key to the signature of transaction comprising user in transaction, to prove the identity of user.Transaction The new block of generation is recorded by " miner " (the block chain node for executing block chain common recognition competition mechanism), is then published to block Chain network, and after being passed through and received by other block chain node verifications, transaction data is written into block chain.
Intelligent contract: technically, intelligent contract is considered as network server, and only these servers are not It is to be set up on the internet using IP address, but be erected on block chain, so as to run specific contract above it Program.But unlike network server, intelligent contract does not depend on some specific hardware device, in fact, intelligence is closed Code about is executed by all equipment for participating in digging mine.
Intelligent contract is the assembler language being programmed on block chain, such as similar with Solidity or Javascript Specific language pre-establishes intelligent contract when creating block chain.These bytecodes provide finger to the functionality of block chain really Draw, therefore code can be easy to interact with it, such as transfer pin currency and record event.
The characteristic that block chain has:
Decentralization: entire block catenary system does not have the hardware of centralization or management organization, the power between arbitrary node Benefit and obligation are all impartial, and the damage of any node or lose the running that can not all influence whole system.It therefore can also To think that block chain has fabulous robustness.
It goes trustization: participating in carrying out data exchange between each node in entire block catenary system being without trusting each other , the operation regulation of whole system is that open and clear, all data content is also rule that are disclosed, therefore specifying in system It is that can not cannot also cheat other nodes then within the scope of scope and time, between node.
Based on block chain technology, the embodiment of the present disclosure provides a kind of digital content and really weighs method, as shown in Figure 1, this method The following steps are included:
In step s 11, the digital content really weighed is treated according to the symmetric key of holder's node to encrypt, counted Word content ciphertext, wherein holder's node is block chain node of the owner of the digital content in block chain network.
In embodiment of the disclosure, digital content can include but is not limited to: software, picture, music, video, design Drawing etc. can be understood and be stored by computer system in binary form.
The owner of digital content can run corresponding block chain program to produce on the equipment as holder's node It is born from oneself account (including public key and private key) and symmetric key, and uses the account of oneself and symmetrical close on holder's node Key.
In step s 12, digital content ciphertext is written in the first block chain, obtains the storage index letter of digital content Breath.
In embodiment of the disclosure, block chain network includes the first block chain and the second block chain, this two block chains It can be used for storing different contents, for example, the first block chain can be used for storing the digital content ciphertext of each owner, the second block Chain can be used for storing the other informations such as the symmetric key of each owner, storage index information.
In order to avoid digital content leakage, after generating symmetric key, true power can be treated according to the symmetric key of generation Digital content encrypted, obtain digital content ciphertext and by digital content ciphertext be written the first block chain in, and at After digital content ciphertext is written in function, the available associated storage index information on the first block chain.The storage index information Digital content ciphertext uniquely is specified, can be used as the index for accessing digital content ciphertext on the first block chain.
Since encryption has been carried out before the first block chain is written in the digital content to really weigh, in these numbers Hold for other any nodes in block chain network in addition to holder's node, can not all obtain.
It is worth noting that storage index information may include carrying out the cryptographic Hash that Hash calculation obtains to digital content Deng.
In step s 13, storage index information and symmetric key are encrypted according to the public key of holder's node, is obtained Index information ciphertext.
In step S14, index information ciphertext is written in the second block chain.
Digital content is being obtained after the storage index information on the first block chain, it can be according to the public key of holder's node Storage index information and the symmetric key for encrypting the digital content are encrypted, and by obtained index information ciphertext write-in the In two block chains, index information ciphertext will can not be usurped with the block height of block where index information ciphertext, timestamp etc. The information changed is synchronous by each node in block chain network together.
Method is really weighed using above-mentioned digital content, the digital content to really weigh is added by the symmetric key of holder's node It is stored in after close in first block chain, it can be ensured that other any nodes can not directly acquire digital content, and then guarantee number The storage security of content.Secondly, the symmetric key of encrypted digital content ciphertext and digital content ciphertext are saved by holder The index information ciphertext obtained after the public key encryption of point is written in the second block chain, so that only by the private key ability of holder's node Decrypt index information ciphertext, and other illegal accounts can not decrypt to obtain in the case where being not authorized to digital content ciphertext and For decrypting the symmetric key of digital content ciphertext, and then it can not know digital content, and since digital content ciphertext is Storage index information in one block chain uniquely specifies that the information that stores in digital content ciphertext and block chain has can not It distorts, disclosed characteristic, index information ciphertext can be used as owner to the proof of digital content ownership.Compared to existing skill Art, the owner of digital content are not necessarily to provide data and proof to any third party's central authority certification authority, can be to avoid card It is bright be tampered caused by digital content ownership the problem of being detinued.
In another embodiment, the above method further include: the intelligent contract write-in disposed into the second block chain is transferred the possession of Request is performed the following operations with triggering intelligent contract: firstly, being believed according to the private key for transferring the possession of holder's node in request index Breath ciphertext is decrypted, and obtains symmetric key and storage index information;Then, according to the public key of purchase node to symmetric key and Storage index information is encrypted, and new index information ciphertext is obtained;The second block chain is written into new index information ciphertext In newest block, wherein be written when buying the public key purchase node triggering intelligence contract of node, purchase node is in number Block chain node of the buyer of appearance in block chain network.The private key for only buying node as a result, could be decrypted to obtain symmetrical close Key and digital content ciphertext, and storage index information of the digital content ciphertext in storage equipment uniquely specifies digital content The information stored in ciphertext and block chain have can not tamper so that new index information ciphertext can be used as buyer's logarithm The proof of word content ownership.
It is worth noting that when buyer is needed using digital content, it can be by purchase node from the second block chain New index information ciphertext is read, and new index information ciphertext is decrypted according to the private key of purchase node, obtains number The storage index information and symmetric key of content, inquiring the first block chain according to the storage index information can be obtained digital content Ciphertext is simultaneously decrypted digital content ciphertext according to symmetric key, and digital content can be obtained.
Secondly, transfer operation can also be performed in intelligent contract, for example, intelligent contract can be by the generation of digital content owner Coin quantity increases and reduces the token quantity of buyer, and correspondingly, the income of transaction is recorded in block chain.
The transaction of ownership transaction and the acquisition of digital content are completed in intelligent contract as a result, and the intelligence contract is only It will be in the case where the owner of digital content enables its private key and buyer enables its public key, so that it may complete intelligent contract Execution, and in whole process both parties without meeting and be familiar with, improve ownership transaction efficiency and reliability.
In addition, transaction relevant information be stored on block chain and can not modify, thus both parties block chain it Outside when ownership dispute has occurred, block chain information can not distort characteristic and can provide number for ruling under the line of ownership dispute According to support, the transaction record on block chain can provide data reference for reparation.
In order to understand those skilled in the art more, digital content is really weighed and transference, below to be illustrated in combination with fig. 2 The digital content that the embodiment of the present disclosure provides really is weighed method and is illustrated.
Fig. 2 is a kind of schematic diagram for implementation environment that the embodiment of the present disclosure provides, as shown in Fig. 2, the implementation environment includes Holder's node 201, purchase node 202 and block chain network 203, wherein the block chain network 203 includes the first block chain With the second block chain.In conjunction with Fig. 2, it is as shown in Figure 3 that a kind of digital content that the embodiment of the present disclosure provides really weighs method, comprising:
In step S31, holder's node 201 is treated the digital content really weighed according to its symmetric key and is encrypted, and obtains To digital content ciphertext.
Wherein, holder's node 201 is block chain node of the owner of the digital content in block chain network 203.
In step s 32, digital content ciphertext is written in the first block chain holder's node 201, obtains digital content Storage index information.
Wherein, block chain network includes the first block chain and the second block chain, this two block chains can be used for storing difference Content, for example, the first block chain can be used for storing the digital content ciphertext of each owner, the second block chain can be used for storing respectively The other informations such as key, the storage index information of owner.
It is worth noting that storage index information may include the cryptographic Hash for obtaining digital content progress Hash calculation Deng.
In step S33, holder's node 201 encrypts storage index information and symmetric key according to its public key, Obtain index information ciphertext.
In step S34, index information ciphertext is written in the second block chain holder's node 201.
Wherein, index information ciphertext is by block height, the timestamp etc. with the index information ciphertext in the second block chain The information that can not be tampered is synchronous by each node in block chain network together.
In step s 35, the intelligent contract write-in purchase node 202 that purchase node 202 is disposed into the second block chain Public key.
Wherein, purchase node 202 is block chain node of the buyer of the digital content in block chain network 203.
In step S36, transfer request is written into the intelligence contract for holder's node 201.
In step S37, intelligent contract is according to the private key of holder's node 201 in transfer request to index information ciphertext It is decrypted, obtains symmetric key and storage index information.
In step S38, intelligent contract carries out symmetric key and storage index information according to the public key of purchase node 202 Encryption, obtains new index information ciphertext.
In step S39, intelligent contract new index information ciphertext is written in the newest block of the second block chain.
Method is really weighed using digital content described in the embodiment, the digital content to really weigh is passed through into holder's node It being stored in after symmetric key encryption in the first block chain, it can be ensured that other any nodes can not directly acquire digital content, into And guarantee the storage security of digital content.Secondly, the symmetric key of encrypted digital content ciphertext and digital content ciphertext are led to It crosses the index information ciphertext obtained after the public key encryption of holder's node to be written in the second block chain, so that only by holder's node Private key could decrypt index information ciphertext, and other illegal accounts can not decrypt to obtain number in the case where being not authorized to Content ciphertext and symmetric key for decrypting digital content ciphertext, and then can not know digital content, and due in number Hold storage index information of the ciphertext in the first block chain and uniquely specifies the letter stored in digital content ciphertext and block chain Breath have can not tamper, index information ciphertext can be used as owner to the proof of digital content ownership.Compared to existing skill Art, the owner of digital content are not necessarily to provide data and proof to any third party's central authority certification authority, can be to avoid card It is bright be tampered caused by digital content ownership the problem of being detinued.
Secondly, the transaction of ownership transaction and the acquisition of digital content are completed in intelligent contract, the intelligence contract is only It will be in the case where the owner of digital content enables its private key and buyer enables its public key, so that it may complete intelligent contract Execution, and in whole process both parties without meeting and be familiar with, improve ownership transaction efficiency and reliability.
In addition, transaction relevant information be stored on block chain and can not modify, thus both parties block chain it Outside when ownership dispute has occurred, block chain information can not distort characteristic and can provide number for ruling under the line of ownership dispute According to support, the transaction record on block chain can provide data reference for reparation.
The embodiment of the present disclosure also provides another middle digital content and really weighs method, as shown in figure 4, this method may include following Step:
In step S41, the digital content really weighed is treated according to the symmetric key of holder's node and is encrypted, is counted Word content ciphertext, wherein holder's node is block chain node of the owner of the digital content in block chain network.
In step S42, digital content ciphertext is sent at least one storage equipment and receives at least one storage The storage index information that equipment is sent, the storage index information is for obtaining digital content ciphertext.
In one possible implementation, the owner of digital content can transport on the equipment as holder's node Corresponding one symmetric key of Program Generating of row.Correspondingly, holder's node can according to the symmetric key to digital content into Obtained digital content ciphertext is sent the needle for storing equipment and being stored and receiving storage equipment return by row encryption To the storage index information of the digital content ciphertext, holder's node may have access to the storage equipment simultaneously by the storage index information Digital content ciphertext is therefrom obtained, digital content ciphertext, which is decrypted, according to symmetric key can be obtained digital content ciphertext.
In alternatively possible implementation, digital content can be stored using distributed storage mode, be had Body, the owner of digital content can run corresponding Program Generating n+1 symmetrically on the equipment as holder's node Key simultaneously chooses any one symmetric key in this n+1 symmetric key as initial key, according to the initial key to number Content is encrypted, and initial ciphertext is obtained.Then, which is divided into n part, wherein each section corresponds to other n A symmetric key in a symmetric key.For each section in this n part, according to the corresponding symmetric key in the part The part is encrypted, digital content cyphertext component is obtained, correspondingly, digital content ciphertext includes this n digital content Cyphertext component.
One digital content cyphertext component can correspond to a storage equipment and hold for each digital content cyphertext component The digital content cyphertext component can be sent to its corresponding storage equipment by people's node, correspondingly, be can receive the storage and set The standby storage index information for the digital content cyphertext component returned.Holder's node can receive for each as a result, The storage index information of a digital content cyphertext component stores index information by these, and holder's node is accessible corresponding Storage equipment and therefrom read corresponding digital content cyphertext component.In this way, by the way that digital content is divided into multiple encryption units Divide and is respectively stored in independent storage equipment, even if multi-layer security is cracked, the external security of any single storage equipment Notch can only also allow other people to be able to access the no-good sub-fraction of digital ciphertext, not will cause letting out for digital content Dew, so as to further promote the safety and confidentiality of digital content storage.
It is worth noting that storage index information described in the embodiment of the present disclosure may include storage equipment to digital content Ciphertext/digital content cyphertext component carries out the cryptographic Hash that Hash calculation obtains.
In step S43, storage index information and symmetric key are encrypted according to the public key of holder's node, obtained Index information ciphertext.
In step S44, index information ciphertext is written in block chain.
Storage index information and symmetric key are encrypted according to the public key of holder's node and index information is close The process of text write-in block chain is similar with the step S13 in digital content described in Fig. 1 really power method and step S14, reference can be made to The above-mentioned detailed description to step S13 and step S14, in order to reduce redundancy, details are not described herein.
Method is really weighed using above-mentioned digital content, the digital content to really weigh is added by the symmetric key of holder's node At least one storage equipment storage is sent to after close, it can be ensured that these storage equipment can not directly acquire digital content, in turn Guarantee the storage security of digital content.Secondly, the symmetric key of encrypted digital content ciphertext and digital content ciphertext are passed through In the index information ciphertext write-in block chain obtained after the public key encryption of holder's node, so that only by the private key of holder's node Could decrypt index information ciphertext, and other illegal accounts can not decrypt to obtain digital content in the case where being not authorized to it is close Text and the symmetric key for decrypting digital content ciphertext, and then can not know digital content, and due to digital content ciphertext Storage index information in the first block chain, which uniquely specifies the information stored in digital content ciphertext and block chain, to be had Can not tamper, index information ciphertext can be used as owner to the proof of digital content ownership.Compared with the prior art, digital The owner of content is not necessarily to provide data and proof to any third party's central authority certification authority, can be tampered to avoid proof Caused by digital content ownership the problem of being detinued.
In another embodiment, the above method further include: request is transferred the possession of in the intelligent contract write-in disposed into block chain, It is performed the following operations with triggering intelligent contract: firstly, close to index information according to the private key for transferring the possession of holder's node in request Text is decrypted, and obtains symmetric key and storage index information;Then, according to the public key of purchase node to symmetric key and storage Index information is encrypted, and new index information ciphertext is obtained;The newest of the second block chain is written into new index information ciphertext In block, wherein be written when buying the public key purchase node triggering intelligence contract of node, purchase node is digital content Block chain node of the buyer in block chain network.
It is worth noting that can be read from block chain by buying node when buyer is needed using digital content New index information ciphertext, and new index information ciphertext is decrypted according to the private key of purchase node, obtain digital content Storage index information and symmetric key, inquiring corresponding storage equipment according to the storage index information can be obtained digital content Ciphertext is simultaneously decrypted digital content ciphertext according to symmetric key, and digital content can be obtained.
Secondly, transfer operation can also be performed in intelligent contract, for example, intelligent contract can be by the generation of digital content owner Coin quantity increases and reduces the token quantity of buyer, and correspondingly, the income of transaction is recorded in block chain.
The transaction of ownership transaction and the acquisition of digital content are completed in intelligent contract as a result, and the intelligence contract is only It will be in the case where the owner of digital content enables its private key and buyer enables its public key, so that it may complete intelligent contract Execution, and in whole process both parties without meeting and be familiar with, improve ownership transaction efficiency and reliability.
In addition, transaction relevant information be stored on block chain and can not modify, thus both parties block chain it Outside when ownership dispute has occurred, block chain information can not distort characteristic and can provide number for ruling under the line of ownership dispute According to support, the trade tokens record on block chain can provide data reference for reparation.
In order to understand those skilled in the art more, digital content is really weighed and transference, below to combine Fig. 5 explanation The digital content that the embodiment of the present disclosure provides really is weighed method and is illustrated.
Fig. 5 is the schematic diagram for another implementation environment that the embodiment of the present disclosure provides, as shown in figure 5, the implementation environment packet Include holder's node 501, purchase node 502, n storage equipment 503 and block chain network 504.In conjunction with Fig. 5, the disclosure is real Applying another digital content of example offer, really to weigh method as shown in Figure 6, comprising:
In step S61, holder's node 501 is treated the digital content really weighed according to its symmetric key and is encrypted, and obtains To digital content ciphertext.
In step S62, digital content ciphertext is sent at least one equipment 503 and received and is somebody's turn to do by holder's node 501 The storage index information that at least one equipment 503 returns.
In step S63, holder's node 501 according to its public key to symmetric key and the storage index information that receives into Row encryption, obtains index information ciphertext.
In one possible implementation, the owner of digital content can transport on the equipment as holder's node Corresponding one symmetric key of Program Generating of row.
In alternatively possible implementation, digital content can be stored using distributed storage mode, i.e., Digital content ciphertext is divided into multiple portions and is respectively stored in different storage equipment.
For both the above embodiment, reference can be made to the description of the step S41 and step S42 of Fig. 4 the embodiment described, are Reduction redundancy, details are not described herein.
In step S64, index information ciphertext is written in block chain holder's node 501.
In step S65, the public key for the intelligent contract write-in purchase node 502 that purchase node 502 is disposed into block chain.
Wherein, purchase node 502 is block chain node of the buyer of the digital content in block chain network 504.
In step S66, transfer request is written into the intelligence contract for holder's node 501.
In step S67, intelligent contract is according to the private key of holder's node 501 in transfer request to index information ciphertext It is decrypted, obtains symmetric key and storage index information.
In step S68, intelligent contract carries out symmetric key and storage index information according to the public key of purchase node 502 Encryption, obtains new index information ciphertext.
In step S69, intelligent contract will be in the newest block of new index information ciphertext write-in block chain.
It is worth noting that transfer operation can also be performed in intelligent contract, for example, intelligent contract can gather around digital content The token quantity for the person of having increases and reduces the token quantity of buyer, and correspondingly, the income of transaction is recorded in block chain.
Method is really weighed using above-mentioned digital content, the digital content to really weigh is added by the symmetric key of holder's node At least one storage equipment storage is sent to after close, it can be ensured that these storage equipment can not directly acquire digital content, in turn Guarantee the storage security of digital content.Secondly, the symmetric key of encrypted digital content ciphertext and digital content ciphertext are passed through In the index information ciphertext write-in block chain obtained after the public key encryption of holder's node, so that only by the private key of holder's node Could decrypt index information ciphertext, and other illegal accounts can not decrypt to obtain digital content in the case where being not authorized to it is close Text and the symmetric key for decrypting digital content ciphertext, and then can not know digital content, and due to digital content ciphertext Storage index information in the first block chain, which uniquely specifies the information stored in digital content ciphertext and block chain, to be had Can not tamper, index information ciphertext can be used as owner to the proof of digital content ownership.Compared with the prior art, digital The owner of content is not necessarily to provide data and proof to any third party's central authority certification authority, can be tampered to avoid proof Caused by digital content ownership the problem of being detinued.
Secondly, the transaction of ownership transaction and the acquisition of digital content are completed in intelligent contract, the intelligence contract is only It will be in the case where the owner of digital content enables its private key and buyer enables its public key, so that it may complete intelligent contract Execution, and in whole process both parties without meeting and be familiar with, improve ownership transaction efficiency and reliability.
In addition, transaction relevant information be stored on block chain and can not modify, thus both parties block chain it Outside when ownership dispute has occurred, block chain information can not distort characteristic and can provide number for ruling under the line of ownership dispute According to support, the transaction record on block chain can provide data reference for reparation.
The embodiment of the present disclosure also provides a kind of digital content and really weighs device, as shown in fig. 7, the device 700 includes:
First encrypting module 701, be configured as being treated according to the symmetric key of holder's node the digital content really weighed into Row encryption, obtains digital content ciphertext, holder's node is the owner of the digital content in block chain network Block chain node;
First writing module 702 is configured as the digital content ciphertext being written in the first block chain, obtains the number The storage index information of word content, the storage index information is for obtaining the digital content ciphertext;
Second encrypting module 703, be configured as according to the public key of holder's node to the storage index information and The symmetric key is encrypted, and index information ciphertext is obtained;
Second writing module 704 is configured as the index information ciphertext being written in the second block chain.
Optionally, as shown in figure 8, the device 700 further include:
Trigger module 705 is configured as the intelligent contract disposed into the second block chain write-in and transfers the possession of request, with touching Sending out intelligent contract described performs the following operations:
The index information ciphertext is decrypted according to the private key for transferring the possession of holder's node in request, is obtained To the symmetric key and the storage index information;
The symmetric key and the storage index information are encrypted according to the public key of purchase node, obtain new rope Fuse ceases ciphertext;
The new index information ciphertext is written in the newest block of the second block chain, wherein the purchase section The public key of point is that the purchase node is written when triggering the intelligent contract, and the purchase node is the purchase of the digital content Block chain node of the buyer in the block chain network.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
In addition, the above-mentioned division to the progress of device comprising modules is really weighed applied to digital content, only a kind of logic function It divides, there may be another division manner in actual implementation.Also, the physics realization of modules can also there are many mode, The disclosure does not limit this.
Device is really weighed using above-mentioned digital content, the digital content to really weigh is added by the symmetric key of holder's node It is stored in after close in first block chain, it can be ensured that other any nodes can not directly acquire digital content, and then guarantee number The storage security of content.Secondly, the symmetric key of encrypted digital content ciphertext and digital content ciphertext are saved by holder The index information ciphertext obtained after the public key encryption of point is written in the second block chain, so that only by the private key ability of holder's node Decrypt index information ciphertext, and other illegal accounts can not decrypt to obtain in the case where being not authorized to digital content ciphertext and For decrypting the symmetric key of digital content ciphertext, and then it can not know digital content, and since digital content ciphertext is Storage index information in one block chain uniquely specifies that the information that stores in digital content ciphertext and block chain has can not Tamper, index information ciphertext can be used as owner to the proof of digital content ownership.Compared with the prior art, digital content Owner be not necessarily to provide data and proof to any third party's central authority certification authority, can be led to avoid proving be tampered The problem of digital content ownership of cause is detinued.
The embodiment of the present disclosure also provides another digital content and really weighs device, as shown in figure 9, the device 900 includes:
Third encrypting module 901 is configured as treating the number really weighed according to the symmetric key of holder's node Content is encrypted, and digital content ciphertext is obtained, and holder's node is the owner of the digital content in block link network Block chain node in network;
Transceiver module 902 is configured as the digital content ciphertext being sent at least one storage equipment and receives institute The storage index information that at least one storage equipment is sent is stated, the storage index information is close for obtaining the digital content Text;
4th encrypting module 903, be configured as according to the public key of holder's node to the storage index information and The symmetric key is encrypted, and index information ciphertext is obtained;
Third writing module 904 is configured as the index information ciphertext being written in block chain.
Optionally, as shown in Figure 10, the third encrypting module 901 includes:
First encryption submodule 911 is configurable to generate n+1 symmetric key and according to initial key in the number Appearance is encrypted, and initial ciphertext is obtained, wherein and the initial key is any symmetric key in the n+1 symmetric key, N is the integer greater than 0;
Submodule 912 is divided, is configured as the initial ciphertext being divided into n part, it is a right that each section corresponds to other n Claim a symmetric key in key;
Second encryption submodule 913, is configured as each section in the n part, corresponding according to the part Symmetric key the part is encrypted, obtain digital content cyphertext component, wherein the digital content ciphertext includes n Digital content ciphertext and the corresponding storage equipment of a digital content cyphertext component;
The transceiver module 902 includes:
Sending submodule 921 is configured as each digital content cyphertext component, by the digital content cyphertext component point It is sent to corresponding storage equipment.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
In addition, the above-mentioned division to the progress of device comprising modules is really weighed applied to digital content, only a kind of logic function It divides, there may be another division manner in actual implementation.Also, the physics realization of modules can also there are many mode, The disclosure does not limit this.
Device is really weighed using above-mentioned digital content, the digital content to really weigh is added by the symmetric key of holder's node At least one storage equipment storage is sent to after close, it can be ensured that these storage equipment can not directly acquire digital content, in turn Guarantee the storage security of digital content.Secondly, the symmetric key of encrypted digital content ciphertext and digital content ciphertext are passed through In the index information ciphertext write-in block chain obtained after the public key encryption of holder's node, so that only by the private key of holder's node Could decrypt index information ciphertext, and other illegal accounts can not decrypt to obtain digital content in the case where being not authorized to it is close Text and the symmetric key for decrypting digital content ciphertext, and then can not know digital content, and due to digital content ciphertext Storage index information in the first block chain, which uniquely specifies the information stored in digital content ciphertext and block chain, to be had Can not tamper, index information ciphertext can be used as owner to the proof of digital content ownership.Compared with the prior art, digital The owner of content is not necessarily to provide data and proof to any third party's central authority certification authority, can be tampered to avoid proof Caused by digital content ownership the problem of being detinued.
Figure 11 is the block diagram that a kind of digital content shown according to an exemplary embodiment really weighs device 1100.Such as Figure 11 institute Show, which may include: processor 1101, memory 1102.The device 1100 can also include multimedia component 1103, one or more of input/output (I/O) interface 1104 and communication component 1105.
Wherein, processor 1101 is used to control the integrated operation of the device 1100, is really weighed with completing above-mentioned digital content All or part of the steps in method.Memory 1102 is for storing various types of data to support the behaviour in the device 1100 To make, these data for example may include the instruction of any application or method for operating on the device 1100, and The relevant data of application program, such as contact data, the message of transmitting-receiving, picture, audio, video etc..The memory 1102 It can be realized by any kind of volatibility or non-volatile memory device or their combination, such as static random-access is deposited Reservoir (Static Random Access Memory, abbreviation SRAM), electrically erasable programmable read-only memory (Electrically Erasable Programmable Read-Only Memory, abbreviation EEPROM), erasable programmable Read-only memory (Erasable Programmable Read-Only Memory, abbreviation EPROM), programmable read only memory (Programmable Read-Only Memory, abbreviation PROM), and read-only memory (Read-Only Memory, referred to as ROM), magnetic memory, flash memory, disk or CD.Multimedia component 1103 may include screen and audio component.Wherein Screen for example can be touch screen, and audio component is used for output and/or input audio signal.For example, audio component may include One microphone, microphone is for receiving external audio signal.The received audio signal can be further stored in storage Device 1102 is sent by communication component 1105.Audio component further includes at least one loudspeaker, is used for output audio signal.I/ O Interface 1104 provides interface between processor 1101 and other interface modules, other above-mentioned interface modules can be keyboard, mouse Mark, button etc..These buttons can be virtual push button or entity button.Communication component 1105 is for the device 1100 and other Wired or wireless communication is carried out between equipment.Wireless communication, such as Wi-Fi, bluetooth, near-field communication (Near Field Communication, abbreviation NFC), 2G, 3G or 4G or they one or more of combination, therefore corresponding communication Component 1105 may include: Wi-Fi module, bluetooth module, NFC module.
In one exemplary embodiment, device 1100 can be by one or more application specific integrated circuit (Application Specific Integrated Circuit, abbreviation ASIC), digital signal processor (Digital Signal Processor, abbreviation DSP), digital signal processing appts (Digital Signal Processing Device, Abbreviation DSPD), programmable logic device (Programmable Logic Device, abbreviation PLD), field programmable gate array (Field Programmable Gate Array, abbreviation FPGA), controller, microcontroller, microprocessor or other electronics member Part realizes that the digital content for executing above-mentioned really weighs method.
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should The step of above-mentioned digital content method is realized when program instruction is executed by processor.For example, the computer readable storage medium Can be the above-mentioned memory 1102 including program instruction, above procedure instruction can by the processor 1101 of device 1100 execution with Complete above-mentioned digital content method.
The preferred embodiment of the disclosure is described in detail in conjunction with attached drawing above, still, the disclosure is not limited to above-mentioned reality The detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosure Monotropic type, these simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, it can be combined in any appropriate way.In order to avoid unnecessary repetition, the disclosure to it is various can No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally Disclosed thought equally should be considered as disclosure disclosure of that.

Claims (10)

1. a kind of digital content really weighs method, which is characterized in that the described method includes:
The digital content really weighed is treated according to the symmetric key of holder's node to encrypt, and obtains digital content ciphertext, it is described Holder's node is block chain node of the owner of the digital content in block chain network;
The digital content ciphertext is written in the first block chain, the storage index information of the digital content is obtained, it is described to deposit Storage index information is for obtaining the digital content ciphertext;
The storage index information and the symmetric key are encrypted according to the public key of holder's node, indexed Information ciphertext;
The index information ciphertext is written in the second block chain.
2. the method according to claim 1, wherein the method also includes:
Request is transferred the possession of in the intelligent contract write-in disposed into the second block chain, executes following behaviour to trigger the intelligent contract Make:
The index information ciphertext is decrypted according to the private key for transferring the possession of holder's node in request, obtains institute State symmetric key and the storage index information;
The symmetric key and the storage index information are encrypted according to the public key of purchase node, obtain new index letter Cease ciphertext;
The new index information ciphertext is written in the newest block of the second block chain, wherein the purchase node Public key is that the purchase node is written when triggering the intelligent contract, and the purchase node is the buyer of the digital content Block chain node in the block chain network.
3. a kind of digital content really weighs method, which is characterized in that the described method includes:
The digital content really weighed is treated according to the symmetric key of holder's node to encrypt, and obtains digital content ciphertext, it is described Holder's node is block chain node of the owner of the digital content in block chain network;
The digital content ciphertext is sent at least one storage equipment and receives what at least one described storage equipment was sent Index information is stored, the storage index information is for obtaining the digital content ciphertext;
The storage index information and the symmetric key are encrypted according to the public key of holder's node, indexed Information ciphertext;
The index information ciphertext is written in block chain.
4. according to the method described in claim 3, it is characterized in that, the symmetric key according to holder's node treats true power Digital content encrypted, obtain digital content ciphertext, comprising:
It generates n+1 symmetric key and the digital content is encrypted according to initial key, obtain initial ciphertext, wherein The initial key is any symmetric key in the n+1 symmetric key, and n is the integer greater than 0;
The initial ciphertext is divided into n part, each section corresponds to a symmetric key in other n symmetric key;
For each section in the n part, the part is encrypted according to the corresponding symmetric key in the part, is obtained Digital content cyphertext component, wherein the digital content ciphertext includes n digital content cyphertext component and a digital content is close The corresponding storage equipment of literary component;
It is described that the digital content ciphertext is sent at least one storage equipment, comprising:
For each digital content cyphertext component, which is sent to corresponding storage equipment.
5. a kind of digital content really weighs device, which is characterized in that described device includes:
First encrypting module, is configured as treating the digital content really weighed according to the symmetric key of holder's node and encrypts, Digital content ciphertext is obtained, holder's node is block chain link of the owner of the digital content in block chain network Point;
First writing module is configured as the digital content ciphertext being written in the first block chain, obtains the digital content Storage index information, the storage index information is for obtaining the digital content ciphertext;
Second encrypting module is configured as according to the public key of holder's node to the storage index information and described symmetrical Key is encrypted, and index information ciphertext is obtained;
Second writing module is configured as the index information ciphertext being written in the second block chain.
6. device according to claim 5, which is characterized in that described device further include:
Trigger module is configured as the intelligent contract disposed into the second block chain write-in and transfers the possession of request, described in triggering Intelligent contract performs the following operations:
The index information ciphertext is decrypted according to the private key for transferring the possession of holder's node in request, obtains institute State symmetric key and the storage index information;
The symmetric key and the storage index information are encrypted according to the public key of purchase node, obtain new index letter Cease ciphertext;
The new index information ciphertext is written in the newest block of the second block chain, wherein the purchase node Public key is that the purchase node is written when triggering the intelligent contract, and the purchase node is the buyer of the digital content Block chain node in the block chain network.
7. a kind of digital content really weighs device, which is characterized in that described device includes:
Third encrypting module is configured as carrying out according to treating the digital content really weighed with the symmetric key of holder's node Encryption, obtains digital content ciphertext, holder's node is area of the owner of the digital content in block chain network Block chain node;
Transceiver module is configured as the digital content ciphertext being sent at least one storage equipment and receives described at least one The storage index information that a storage equipment is sent, the storage index information is for obtaining the digital content ciphertext;
4th encrypting module is configured as according to the public key of holder's node to the storage index information and described symmetrical Key is encrypted, and index information ciphertext is obtained;
Third writing module is configured as the index information ciphertext being written in block chain.
8. device according to claim 7, which is characterized in that the third encrypting module includes:
First encryption submodule is configurable to generate n+1 symmetric key and is carried out according to initial key to the digital content Encryption, obtains initial ciphertext, wherein the initial key is any symmetric key in the n+1 symmetric key, and n is big In 0 integer;
Submodule is divided, is configured as the initial ciphertext being divided into n part, each section corresponds to other n symmetric key In a symmetric key;
Second encryption submodule is configured as each section in the n part, corresponding symmetrical close according to the part Key encrypts the part, obtains digital content cyphertext component, wherein the digital content ciphertext includes n digital content Ciphertext and the corresponding storage equipment of a digital content cyphertext component;
The transceiver module includes:
Sending submodule is configured as giving digital content cyphertext component distribution for each digital content cyphertext component Corresponding storage equipment.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The step of any one of claim 1-4 the method is realized when row.
10. a kind of digital content really weighs device characterized by comprising
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize described in any one of claim 1-4 The step of method.
CN201811095369.XA 2018-09-19 2018-09-19 Digital content really weighs method, apparatus and storage medium Pending CN109522681A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811095369.XA CN109522681A (en) 2018-09-19 2018-09-19 Digital content really weighs method, apparatus and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811095369.XA CN109522681A (en) 2018-09-19 2018-09-19 Digital content really weighs method, apparatus and storage medium

Publications (1)

Publication Number Publication Date
CN109522681A true CN109522681A (en) 2019-03-26

Family

ID=65771031

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811095369.XA Pending CN109522681A (en) 2018-09-19 2018-09-19 Digital content really weighs method, apparatus and storage medium

Country Status (1)

Country Link
CN (1) CN109522681A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110430186A (en) * 2019-07-31 2019-11-08 国网电子商务有限公司 Block chain data transacting system and method based on proxy re-encryption and intelligent contract
CN110737905A (en) * 2019-09-19 2020-01-31 深圳市先河系统技术有限公司 Data authorization method, data authorization device and computer storage medium
CN110851843A (en) * 2019-10-08 2020-02-28 立旃(上海)科技有限公司 Data management method and device based on block chain
CN111726343A (en) * 2020-06-11 2020-09-29 桂林电子科技大学 Electronic official document safe transmission method based on IPFS and block chain
CN111918012A (en) * 2020-08-05 2020-11-10 杭州当虹科技股份有限公司 Video encryption and key management method based on private block chain
CN113067704A (en) * 2021-03-29 2021-07-02 安徽慧可科技有限公司 Data right determining method, system and equipment based on block chain
US11308224B2 (en) 2019-12-13 2022-04-19 Google Llc Encrypted search system design for email client-side encryption
US11902425B2 (en) 2019-12-12 2024-02-13 Google Llc Encrypted search with a public key

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250770A (en) * 2015-06-03 2016-12-21 三星电子株式会社 For to the electronic equipment of content-encrypt and method
CN107040520A (en) * 2017-03-13 2017-08-11 华北理工大学 A kind of cloud computing data-sharing systems and method
CN107330694A (en) * 2017-07-03 2017-11-07 重庆小犀智能科技有限公司 Copyright trading system and method for commerce based on block chain
CN107705114A (en) * 2017-08-31 2018-02-16 中链科技有限公司 Copyright data processing method, system and storage medium based on block chain technology
CN108259169A (en) * 2018-01-09 2018-07-06 北京大学深圳研究生院 A kind of file security sharing method and system based on block chain cloud storage

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250770A (en) * 2015-06-03 2016-12-21 三星电子株式会社 For to the electronic equipment of content-encrypt and method
CN107040520A (en) * 2017-03-13 2017-08-11 华北理工大学 A kind of cloud computing data-sharing systems and method
CN107330694A (en) * 2017-07-03 2017-11-07 重庆小犀智能科技有限公司 Copyright trading system and method for commerce based on block chain
CN107705114A (en) * 2017-08-31 2018-02-16 中链科技有限公司 Copyright data processing method, system and storage medium based on block chain technology
CN108259169A (en) * 2018-01-09 2018-07-06 北京大学深圳研究生院 A kind of file security sharing method and system based on block chain cloud storage

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110430186A (en) * 2019-07-31 2019-11-08 国网电子商务有限公司 Block chain data transacting system and method based on proxy re-encryption and intelligent contract
CN110737905A (en) * 2019-09-19 2020-01-31 深圳市先河系统技术有限公司 Data authorization method, data authorization device and computer storage medium
CN110737905B (en) * 2019-09-19 2021-11-23 深圳市先河系统技术有限公司 Data authorization method, data authorization device and computer storage medium
CN110851843A (en) * 2019-10-08 2020-02-28 立旃(上海)科技有限公司 Data management method and device based on block chain
US11902425B2 (en) 2019-12-12 2024-02-13 Google Llc Encrypted search with a public key
US11308224B2 (en) 2019-12-13 2022-04-19 Google Llc Encrypted search system design for email client-side encryption
CN111726343A (en) * 2020-06-11 2020-09-29 桂林电子科技大学 Electronic official document safe transmission method based on IPFS and block chain
CN111918012A (en) * 2020-08-05 2020-11-10 杭州当虹科技股份有限公司 Video encryption and key management method based on private block chain
CN113067704A (en) * 2021-03-29 2021-07-02 安徽慧可科技有限公司 Data right determining method, system and equipment based on block chain
CN113067704B (en) * 2021-03-29 2022-08-30 安徽慧可科技有限公司 Data right determining method, system and equipment based on block chain

Similar Documents

Publication Publication Date Title
CN109522681A (en) Digital content really weighs method, apparatus and storage medium
KR102409819B1 (en) Distributed transaction propagation and verification system
JP2020145733A (en) Method for managing a trusted identity
CN107145768A (en) Copyright managing method and system
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN110149322A (en) A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild
CN109740384A (en) Data based on block chain deposit card method and apparatus
CN109417478A (en) Multilink cryptologic block chain
CN109314637A (en) Method and system for efficient transfer of payroll-associated cryptocurrency over blockchains
CN109074434A (en) Method and system for verifying ownership of digital assets using distributed hash tables and point-to-point distributed ledgers
CN108781161A (en) Method for controlling and distributing blockchain implementation of digital content
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
US20060153380A1 (en) Personal cryptoprotective complex
KR20210040078A (en) Systems and methods for safe storage services
CN110046996A (en) The generation method and device of block chain transaction
CN110383752A (en) Compact recording agreement
WO2021174927A1 (en) Blockchain-based identity verification method and apparatus, device, and storage medium
CN109583215A (en) It is a kind of to handle the method and device of collage-credit data, block chain data-sharing systems
CN102906755A (en) Content control method using certificate revocation lists
JP2006246543A (en) Cryptographic system and method with key escrow function
CN106233292B (en) Synthesize document access
CN110264200A (en) Block chain data processing method and device
Gayvoronskaya et al. Blockchain
Gupta et al. End to end secure e-voting using blockchain & quantum key distribution
US20230259899A1 (en) Method, participant unit, transaction register and payment system for managing transaction data sets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190326