CN110855428A - Movie copyright protection method based on block chain - Google Patents

Movie copyright protection method based on block chain Download PDF

Info

Publication number
CN110855428A
CN110855428A CN201911131465.XA CN201911131465A CN110855428A CN 110855428 A CN110855428 A CN 110855428A CN 201911131465 A CN201911131465 A CN 201911131465A CN 110855428 A CN110855428 A CN 110855428A
Authority
CN
China
Prior art keywords
block chain
film
infringement
information
movie
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201911131465.XA
Other languages
Chinese (zh)
Inventor
史晨冲
庞松涛
商广勇
王伟兵
马岩堂
赵树林
姜鑫
陶鑫
刘伟巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong ICity Information Technology Co., Ltd.
Original Assignee
Shandong ICity Information Technology Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong ICity Information Technology Co., Ltd. filed Critical Shandong ICity Information Technology Co., Ltd.
Priority to CN201911131465.XA priority Critical patent/CN110855428A/en
Publication of CN110855428A publication Critical patent/CN110855428A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a movie copyright protection method based on a block chain, belonging to the technical field of block chain intelligent contracts, symmetric encryption and decryption and asymmetric encryption and decryption, and comprising the following steps: 1) using the block chain to store the film copyright; 2) using the block chain to detect and track the film copyright; 3) verifying the film copyright; 4) film copyright infringement and verification; 5) and realizing the sharing of the movie copyright assets by using the intelligent contract. The safe and credible cooperation of all the parties on the block chain is ensured, and the convenient management and the fair and transparent division of the content consumption income are facilitated.

Description

Movie copyright protection method based on block chain
Technical Field
The invention relates to technologies such as a block chain intelligent contract, symmetric encryption and decryption, asymmetric encryption and decryption and the like, in particular to a method for protecting film copyright based on a block chain.
Background
The development of the internet brings convenience to people, but brings financial and financial channels to many lawbreakers, which is the copyright problem of the current film, the film is just shown and pirated, so that great creation impact is brought to the creators, the country pays attention to the problem and makes various legal terms about copyright, but due to the technical limitation, the problem is difficult to be solved fundamentally, the block chain appears, due to the characteristics of the block chain, the copyright protection can be combined with the block chain, so that the effect of protecting the copyright of the film is achieved, and the block chain can conveniently pack and store metadata such as time stamps, author information, original content and the like on the block chain. And the mode that only a single node can enter the data center for registration in the past is broken through, and the multi-party and multi-node access is realized, so that the method is more convenient and faster.
The Hyperledger Fabric is an enterprise-level client oriented alliance chaining source project, and can be conveniently used for building an alliance chain which is participated in by each enterprise and social organization and is used for data sharing.
For the alliance chain, many movie copyright owners desire a more secure way to store the copyright, and so it is desirable to have some authority to form the alliance chain. Many movie copyright owners will want the copyright of a movie to be granted only to a specific enterprise, and not to be opened to other enterprises on the same blockchain network, or to be opened to only one enterprise.
Disclosure of Invention
In order to solve the above technical problems, the present invention provides a method for protecting a movie copyright based on a block chain, so as to effectively protect the movie copyright of the block chain.
The technical scheme of the invention is as follows:
a method for protecting film copyright based on block chain includes following steps:
1) using the block chain to store the film copyright;
2) using the block chain to detect and track the film copyright;
3) verifying the film copyright;
4) film copyright infringement and verification;
5) and realizing the sharing of the movie copyright assets by using the intelligent contract.
Further, in the above-mentioned case,
and writing the film copyright certificate data calculated by hash by using the SHA-256 algorithm into a block chain, and generating a certificate according to the requirement of an author to be reserved by the author. Paper written reports can be provided according to the requirements of users.
Further, in the above-mentioned case,
the main algorithms used in the storage of movie copyrights are summarized as follows: the method is completed by adding owner signature and generating time stamp information to the film copyright, and the main execution steps are as follows:
1) a user acquires a private key encrypted by a public key from an authorization center and installs a digital certificate;
2) the user carries out owner signature on the film copyright to generate a copyright a, and the copyright a' is generated after being encrypted by a public key and is transmitted to a film copyright block acceptance system through a public network; the acceptance system decrypts a' by using a private key b of the acceptance system to obtain copyright information a;
3) the copyright control server applies for the timestamp thumbnail movie copyright information c to the CA center;
4) the CA center returns the thumbnail movie copyright information c of the timestamp to the movie copyright controller, and simultaneously stores a and c to a certain block of the block chain;
5) updating the block chain information to each node of the whole film copyright block chain.
Further, in the above-mentioned case,
from the content characteristics of the copyrighted work, corresponding DNA characteristics are generated and registered on the federation chain: the notarization department and the copyright bureau are used as one of the organization and the nodes of the alliance chain, and after the block chain is certified, all information can be synchronized to the notarization department in real time; and then providing an automatic crawler of a key website, matching the monitored content with DNA of the works, performing automatic infringement and evidence obtaining operation when the similarity reaches a threshold value, performing continuous tracking and further analysis and matching on the infringement and pre-evidence obtaining content, directly performing continuous tracking and further analysis and matching when the infringement is confirmed, and directly performing infringement and evidence obtaining when the infringement is confirmed.
Further, in the above-mentioned case,
the film copyright holder automatically uses the private key to digitally sign the works in writing the works information into the block chain, if the third party wants to verify the copyright information, the public key of the copyright holder can be used to verify the digital signature, and if the digital signature value of the works passes the verification, the works are really owned by the copyright holder.
In a still further aspect of the present invention,
on the basis, SHA-256 is also used for calculating the digital fingerprint of the work, and the copyright verification condition is compared through the digital fingerprint.
Further, in the above-mentioned case,
when an infringement behavior is found, an infringement evidence obtaining interface in the movie copyright service is called, page capture evidence obtaining is carried out on an infringement website, and an evidence obtaining result is stored in a copyright platform; solidifying the infringement behavior into evidence for storage; for infringed content which is subjected to infringement operation, the movie copyright service provides continuous infringement monitoring and infringement tracking service, and ensures that an infringer takes corresponding treatment on the infringed content.
Further, in the above-mentioned case,
the intelligent contract is used for film copyright publishing, if the object of transaction is an author, the draft declaration of the format contract is digitalized, the condition as a trigger is to obtain the authorization of the film works, the record requesting the authorization needs to be written into a block chain, and the intelligent contract is used for searching whether a response is obtained or not;
and when the copyright transaction object is a database facilitator, carrying out synchronous transaction record with a system of the database facilitator, associating bank accounts and block chains of all parties of the film copyright supply chain, and carrying out electronic contract after negotiating contents.
Furthermore, the payment information can be written into the chain in the form of an intelligent contract and transmitted to the user side through the block chain network, and the user confirms the information on the chain, verifies the payment document and completes single downloading.
The invention has the advantages that
(1) Secure trust
The identity identification based on the digital certificate is introduced, and ecological participants such as a copyright bureau, a notarization department, a content platform and the like are used as participating nodes to link up based on a centralized PKI system, so that safe and credible cooperation of the participants on a block chain is ensured
(2) Real-time, fair and fair
The creation is to determine the copyright, the verification of the right confirming information can be rapidly carried out with nodes such as notarization and the like, the creation content can be safely and reliably stored on the block chain in real time, a plurality of nodes are set for backup mechanism so as to be convenient for a third party to check, and the non-tampering characteristic of the nodes also ensures the safety and reliability of the information. And introducing a block chain browser module to provide movie copyright information inquiry service on a block chain, disclosing all movie copyright data such as right confirmation, infringement, evidence storage and the like, and inquiring by any person and any organization to ensure fairness, justness and disclosure of the service. Any node can completely backup node information on the chain, and an original author and a related organization maintain a uniform service platform together, so that the method is beneficial to convenient management and fair and transparent division of content consumption income.
Drawings
FIG. 1 is a schematic workflow diagram of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.
The invention relates to a method for protecting film copyright in a block chain network, which mainly comprises the following steps:
1) using block chain to realize film copyright storage certificate
In the prior art, a redundant and tedious process is required for copyright registration and registration is required at a high cost, so that an author is prohibited, a technology with a block chain can use a technology of a timestamp, a national authorization center can provide a credible timestamp, in a block chain system, each block is ensured to be sequentially connected in sequence through the timestamp, the timestamp is used for authenticating each transaction record, each data can have time for transaction, authenticity of the transaction is displayed, copyright registration can be performed on the block chain, film copyright storage certificate data calculated by hash is written into the block chain by using a SHA-256 algorithm, a certificate generated according to the requirement of the author is reserved for the author, and even a paper written report can be provided according to the requirement of a user. By utilizing the PBFT type consensus algorithm used by the alliance chain, the copyright transaction cannot be tampered once written.
The main algorithms used in the storage of movie copyrights can be summarized as: the method is mainly completed by adding owner signature and generating time stamp information to the film copyright, and mainly comprises the following steps: 1. the user obtains a private key encrypted with a public key from the authorization center and installs the digital certificate. 2. The user carries out owner signature on the film copyright to generate a copyright a, and the copyright a' is generated after the public key encryption and is transmitted to the film copyright block acceptance system through the public network. The acceptance system decrypts a' by using the private key b of the acceptance system to obtain the copyright information a. 3. The copyright control server applies for the timestamp thumbnail movie copyright information c from the CA center. And 4, the CA center returns the time stamp thumbnail film copyright information c to the film copyright controller, and simultaneously stores a and c in a certain block of the block chain. 5. Updating the block chain information to each node of the whole film copyright block chain.
2) Tracking film copyright detection by using block chain
From the content characteristics of the copyrighted work, corresponding DNA characteristics are generated and registered on the federation chain: the notarization department and the copyright bureau are used as one of organizations and nodes of the alliance chain, after the block chain stores the notarization, all information can be synchronized to the notarization department in real time, the notarization can be shown at any time at the notarization department, the high judicial effectiveness is achieved, the alliance chain mainly uses a Hyperhedger Fabric system, non-alliance members can not access data in the alliance chain, on the basis that the alliance chain protects the film copyright, deeper protection is conducted, the private data of the film copyright is safer, and homomorphic encryption is used for protecting the copyright. After registration and providing deep level protection on the federation chain. And then providing an automatic crawler of a key website, matching the monitored content with DNA of the works, performing automatic infringement and evidence obtaining operation when the similarity reaches a threshold value, performing continuous tracking and further analysis and matching on the infringement and pre-evidence obtaining content, directly performing continuous tracking and further analysis and matching when the infringement is confirmed, and directly performing infringement and evidence obtaining when the infringement is confirmed.
3) Movie copyright verification
The film copyright holder automatically uses the private key to digitally sign the works in writing the work information into the block chain, if the third party wants to verify the copyright information, the public key of the copyright holder can be used for verifying the digital signature, if the digital signature value of the works passes the verification, the works are really owned by the copyright holder, because only the copyright holder has the private key to generate the signature value. On the basis, the SHA-256 can also be used for calculating the digital fingerprint of the work, and the copyright verification condition is compared through the digital fingerprint.
4) Film copyright infringement and storage certificate
When an infringement behavior is found, an infringement evidence obtaining interface in the movie copyright service is quickly called, page capture evidence obtaining is carried out on an infringement website, and an evidence obtaining result is stored in a copyright platform; the infringement behavior is solidified into evidence for preservation, and the data is stored permanently and cannot be tampered and has legal effectiveness. For infringed contents which are subjected to infringement operation, the movie copyright service provides continuous infringement monitoring, infringement tracking and other services, and ensures that an infringer takes corresponding treatment on the infringed contents.
5) Sharing movie copyright assets using intelligent contracts
The intelligent contract execution process is efficient and can be used for film copyright publishing, if the transaction object is an author, a film copyright publisher can digitalize the draft declaration of the format contract, the trigger condition is that the authorization of the film works is obtained, the record requesting the authorization needs to be written into a block chain, and the intelligent contract is matched to find out whether the response is obtained. Such a new approach does not create a situation where the previous written statement could not be confirmed. When the copyright transaction object is the database facilitator, the film copyright publisher and the database facilitator can perform synchronous transaction record, thereby reducing repeated accounting and reducing a series of costs. And each party of the film copyright supply chain can associate the bank account with the block chain, and the electronic contract is realized after the contents are negotiated, so that repeated signing caused by non-examination is prevented. The intelligent contract can also be used for more flexible pricing to increase income, the film copyright publisher writes payment information into a chain in the form of the intelligent contract and transmits the payment information to the user side through the block chain network, and the user confirms the information on the chain, verifies the payment document and completes single downloading. The method can accelerate the processing speed and simplify the transaction flow.
1) And the related characteristics of the block chain are utilized to protect the film copyright: the block chain movie copyright alliance chain is built by a copyright operator, a copyright owner, a consumer representative and a trusted authority, and any person can not tamper with the information of each copyright and can trace the information at any time.
2) And the spreading of film copyright is more strict: the movie copyright information is stored in the blockchain, transparent to his next transaction, public, so it is more strict for the streaming of the copyright.
3) The intelligent contract ensures accurate transaction and improves the income: it features that the intelligent contract is used to write payment information, so the user can clearly verify.
The above description is only a preferred embodiment of the present invention, and is only used to illustrate the technical solutions of the present invention, and not to limit the protection scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (10)

1. A method for protecting film copyright based on block chain is characterized in that,
the method comprises the following steps:
1) using the block chain to store the film copyright;
2) using the block chain to detect and track the film copyright;
3) verifying the film copyright;
4) film copyright infringement and verification;
5) and realizing the sharing of the movie copyright assets by using the intelligent contract.
2. The method of claim 1,
and writing the film copyright certificate data calculated by hash by using the SHA-256 algorithm into a block chain, and generating a certificate according to the requirement of an author to be reserved by the author.
3. The method of claim 2,
paper written reports can be provided according to the requirements of users.
4. The method of claim 1,
the main algorithms used in the storage of movie copyrights are summarized as follows: the method is completed by adding owner signature and generating time stamp information to the film copyright, and the main execution steps are as follows:
1) a user acquires a private key encrypted by a public key from an authorization center and installs a digital certificate;
2) the user carries out owner signature on the film copyright to generate a copyright a, and the copyright a' is generated after being encrypted by a public key and is transmitted to a film copyright block acceptance system through a public network; the acceptance system decrypts a' by using a private key b of the acceptance system to obtain copyright information a;
3) the copyright control server applies for the timestamp thumbnail movie copyright information c to the CA center;
4) the CA center returns the thumbnail movie copyright information c of the timestamp to the movie copyright controller, and simultaneously stores a and c to a certain block of the block chain;
5) updating the block chain information to each node of the whole film copyright block chain.
5. The method of claim 1,
from the content characteristics of the copyrighted work, corresponding DNA characteristics are generated and registered on the federation chain: the notarization department and the copyright bureau are used as one of the organization and the nodes of the alliance chain, and after the block chain is certified, all information can be synchronized to the notarization department in real time; and then providing an automatic crawler of a key website, matching the monitored content with DNA of the works, performing automatic infringement and evidence obtaining operation when the similarity reaches a threshold value, performing continuous tracking and further analysis and matching on the infringement and pre-evidence obtaining content, directly performing continuous tracking and further analysis and matching when the infringement is confirmed, and directly performing infringement and evidence obtaining when the infringement is confirmed.
6. The method of claim 1,
the film copyright holder automatically uses the private key to digitally sign the works in writing the works information into the block chain, if the third party wants to verify the copyright information, the public key of the copyright holder can be used to verify the digital signature, and if the digital signature value of the works passes the verification, the works are really owned by the copyright holder.
7. The method of claim 6,
on the basis, SHA-256 is also used for calculating the digital fingerprint of the work, and the copyright verification condition is compared through the digital fingerprint.
8. The method of claim 1,
when an infringement behavior is found, an infringement evidence obtaining interface in the movie copyright service is called, page capture evidence obtaining is carried out on an infringement website, and an evidence obtaining result is stored in a copyright platform; solidifying the infringement behavior into evidence for storage; for infringed content which is subjected to infringement operation, the movie copyright service provides continuous infringement monitoring and infringement tracking service, and ensures that an infringer takes corresponding treatment on the infringed content.
9. The method of claim 1,
the intelligent contract is used for film copyright publishing, if the object of transaction is an author, the draft declaration of the format contract is digitalized, the condition as a trigger is to obtain the authorization of the film works, the record requesting the authorization needs to be written into a block chain, and the intelligent contract is used for searching whether a response is obtained or not;
and when the copyright transaction object is a database facilitator, carrying out synchronous transaction record with a system of the database facilitator, associating bank accounts and block chains of all parties of the film copyright supply chain, and carrying out electronic contract after negotiating contents.
10. The method of claim 9,
the payment information can be written into the chain in the form of an intelligent contract and transmitted to the user side through the block chain network, and the user confirms the information on the chain, verifies the payment document and completes single downloading.
CN201911131465.XA 2019-11-19 2019-11-19 Movie copyright protection method based on block chain Withdrawn CN110855428A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911131465.XA CN110855428A (en) 2019-11-19 2019-11-19 Movie copyright protection method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911131465.XA CN110855428A (en) 2019-11-19 2019-11-19 Movie copyright protection method based on block chain

Publications (1)

Publication Number Publication Date
CN110855428A true CN110855428A (en) 2020-02-28

Family

ID=69602105

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911131465.XA Withdrawn CN110855428A (en) 2019-11-19 2019-11-19 Movie copyright protection method based on block chain

Country Status (1)

Country Link
CN (1) CN110855428A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111324869A (en) * 2020-03-09 2020-06-23 广东珠影星光科技有限公司 Movie copyright protection method based on block chain
CN111476667A (en) * 2020-06-24 2020-07-31 支付宝(杭州)信息技术有限公司 Block chain-based original work transaction method and device and electronic equipment
CN111641707A (en) * 2020-05-29 2020-09-08 兰州理工大学 Block chain-based digital copyright protection method
CN111859309A (en) * 2020-06-19 2020-10-30 华新(北京)网络科技有限公司 Digital copyright protection system construction method based on block chain technology
CN112069469A (en) * 2020-11-11 2020-12-11 支付宝(杭州)信息技术有限公司 Method and device for processing work data based on block chain
CN112464178A (en) * 2020-09-27 2021-03-09 中国科学技术大学苏州研究院 Data transaction copyright protection method based on block chain and homomorphic encryption
CN112559974A (en) * 2020-11-13 2021-03-26 山东浪潮质量链科技有限公司 Picture copyright protection method, equipment and medium based on block chain
CN112650978A (en) * 2020-08-14 2021-04-13 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN112733089A (en) * 2021-01-15 2021-04-30 深圳市龙影天下信息系统有限公司 Movie key distribution management method, movie key distribution management device, computer equipment and storage medium
CN113704822A (en) * 2021-08-27 2021-11-26 浙江中电远为科技有限公司 Business secret protection system and method based on block chain technology
CN114528579A (en) * 2022-03-02 2022-05-24 南京国础工程技术有限公司 Block chain strengthening method

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111324869A (en) * 2020-03-09 2020-06-23 广东珠影星光科技有限公司 Movie copyright protection method based on block chain
CN111641707A (en) * 2020-05-29 2020-09-08 兰州理工大学 Block chain-based digital copyright protection method
CN111859309A (en) * 2020-06-19 2020-10-30 华新(北京)网络科技有限公司 Digital copyright protection system construction method based on block chain technology
CN111476667A (en) * 2020-06-24 2020-07-31 支付宝(杭州)信息技术有限公司 Block chain-based original work transaction method and device and electronic equipment
CN112650978B (en) * 2020-08-14 2023-01-20 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN112650978A (en) * 2020-08-14 2021-04-13 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN112464178A (en) * 2020-09-27 2021-03-09 中国科学技术大学苏州研究院 Data transaction copyright protection method based on block chain and homomorphic encryption
CN112464178B (en) * 2020-09-27 2024-04-19 中国科学技术大学苏州研究院 Data transaction copyright protection method based on blockchain and homomorphic encryption
CN112069469A (en) * 2020-11-11 2020-12-11 支付宝(杭州)信息技术有限公司 Method and device for processing work data based on block chain
CN112559974A (en) * 2020-11-13 2021-03-26 山东浪潮质量链科技有限公司 Picture copyright protection method, equipment and medium based on block chain
CN112733089B (en) * 2021-01-15 2021-09-17 深圳市龙影天下信息系统有限公司 Movie key distribution management method, movie key distribution management device, computer equipment and storage medium
CN112733089A (en) * 2021-01-15 2021-04-30 深圳市龙影天下信息系统有限公司 Movie key distribution management method, movie key distribution management device, computer equipment and storage medium
CN113704822A (en) * 2021-08-27 2021-11-26 浙江中电远为科技有限公司 Business secret protection system and method based on block chain technology
CN114528579A (en) * 2022-03-02 2022-05-24 南京国础工程技术有限公司 Block chain strengthening method
CN114528579B (en) * 2022-03-02 2022-10-14 南京国础科学技术研究院有限公司 Block chain strengthening method

Similar Documents

Publication Publication Date Title
CN110855428A (en) Movie copyright protection method based on block chain
CN109889504B (en) Decentralized data access right transaction method and system
CN111931238B (en) Block chain-based data asset transfer method, device and equipment
CN108737361B (en) Data verification method based on block chain
CN108875093B (en) Resume management method and system based on block chain
CN111027028A (en) Copyright data processing method and device based on intelligent contract
CN105701367A (en) Security system for Internet original commercial works
CN111415157A (en) Block chain-based data asset safety circulation method
CN112364305B (en) Digital content copyright protection method and device based on blockchain platform
CN111008366A (en) Copyright authorization method and device based on block chain
CN108898495A (en) A kind of finance and money management confirmation of responsibility method based on block chain
CN111259439B (en) Intangible asset management service platform based on block chain and implementation method thereof
US11917071B2 (en) Data protection using universal tagging
CN111046346A (en) Book copyright protection platform based on block chain, equipment and medium
CN110992218A (en) Music copyright protection method, device and medium based on block chain
Guo et al. A blockchain-driven electronic contract management system for commodity procurement in electronic power industry
JPWO2018088475A1 (en) Electronic authentication method and program
CN113315745A (en) Data processing method, device, equipment and medium
US11301823B2 (en) System and method for electronic deposit and authentication of original electronic information objects
Lemieux et al. Addressing audit and accountability issues in self-sovereign identity blockchain systems using archival science principles
CN115225346B (en) Data evidence storage system oriented to credit investigation big data field
Scoville Clear Signatures, Obscure Signs
CN112559974A (en) Picture copyright protection method, equipment and medium based on block chain
Malaurie-Vignal Blockchain, intellectual property and fashion
Zhang Research on the judicial expertise of electronic evidence based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200228

WW01 Invention patent application withdrawn after publication