CN110855428A - Movie copyright protection method based on block chain - Google Patents
Movie copyright protection method based on block chain Download PDFInfo
- Publication number
- CN110855428A CN110855428A CN201911131465.XA CN201911131465A CN110855428A CN 110855428 A CN110855428 A CN 110855428A CN 201911131465 A CN201911131465 A CN 201911131465A CN 110855428 A CN110855428 A CN 110855428A
- Authority
- CN
- China
- Prior art keywords
- block chain
- film
- infringement
- information
- movie
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000012795 verification Methods 0.000 claims abstract description 11
- 238000013475 authorization Methods 0.000 claims description 6
- 230000001360 synchronised effect Effects 0.000 claims description 6
- 230000008520 organization Effects 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000004744 fabric Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a movie copyright protection method based on a block chain, belonging to the technical field of block chain intelligent contracts, symmetric encryption and decryption and asymmetric encryption and decryption, and comprising the following steps: 1) using the block chain to store the film copyright; 2) using the block chain to detect and track the film copyright; 3) verifying the film copyright; 4) film copyright infringement and verification; 5) and realizing the sharing of the movie copyright assets by using the intelligent contract. The safe and credible cooperation of all the parties on the block chain is ensured, and the convenient management and the fair and transparent division of the content consumption income are facilitated.
Description
Technical Field
The invention relates to technologies such as a block chain intelligent contract, symmetric encryption and decryption, asymmetric encryption and decryption and the like, in particular to a method for protecting film copyright based on a block chain.
Background
The development of the internet brings convenience to people, but brings financial and financial channels to many lawbreakers, which is the copyright problem of the current film, the film is just shown and pirated, so that great creation impact is brought to the creators, the country pays attention to the problem and makes various legal terms about copyright, but due to the technical limitation, the problem is difficult to be solved fundamentally, the block chain appears, due to the characteristics of the block chain, the copyright protection can be combined with the block chain, so that the effect of protecting the copyright of the film is achieved, and the block chain can conveniently pack and store metadata such as time stamps, author information, original content and the like on the block chain. And the mode that only a single node can enter the data center for registration in the past is broken through, and the multi-party and multi-node access is realized, so that the method is more convenient and faster.
The Hyperledger Fabric is an enterprise-level client oriented alliance chaining source project, and can be conveniently used for building an alliance chain which is participated in by each enterprise and social organization and is used for data sharing.
For the alliance chain, many movie copyright owners desire a more secure way to store the copyright, and so it is desirable to have some authority to form the alliance chain. Many movie copyright owners will want the copyright of a movie to be granted only to a specific enterprise, and not to be opened to other enterprises on the same blockchain network, or to be opened to only one enterprise.
Disclosure of Invention
In order to solve the above technical problems, the present invention provides a method for protecting a movie copyright based on a block chain, so as to effectively protect the movie copyright of the block chain.
The technical scheme of the invention is as follows:
a method for protecting film copyright based on block chain includes following steps:
1) using the block chain to store the film copyright;
2) using the block chain to detect and track the film copyright;
3) verifying the film copyright;
4) film copyright infringement and verification;
5) and realizing the sharing of the movie copyright assets by using the intelligent contract.
Further, in the above-mentioned case,
and writing the film copyright certificate data calculated by hash by using the SHA-256 algorithm into a block chain, and generating a certificate according to the requirement of an author to be reserved by the author. Paper written reports can be provided according to the requirements of users.
Further, in the above-mentioned case,
the main algorithms used in the storage of movie copyrights are summarized as follows: the method is completed by adding owner signature and generating time stamp information to the film copyright, and the main execution steps are as follows:
1) a user acquires a private key encrypted by a public key from an authorization center and installs a digital certificate;
2) the user carries out owner signature on the film copyright to generate a copyright a, and the copyright a' is generated after being encrypted by a public key and is transmitted to a film copyright block acceptance system through a public network; the acceptance system decrypts a' by using a private key b of the acceptance system to obtain copyright information a;
3) the copyright control server applies for the timestamp thumbnail movie copyright information c to the CA center;
4) the CA center returns the thumbnail movie copyright information c of the timestamp to the movie copyright controller, and simultaneously stores a and c to a certain block of the block chain;
5) updating the block chain information to each node of the whole film copyright block chain.
Further, in the above-mentioned case,
from the content characteristics of the copyrighted work, corresponding DNA characteristics are generated and registered on the federation chain: the notarization department and the copyright bureau are used as one of the organization and the nodes of the alliance chain, and after the block chain is certified, all information can be synchronized to the notarization department in real time; and then providing an automatic crawler of a key website, matching the monitored content with DNA of the works, performing automatic infringement and evidence obtaining operation when the similarity reaches a threshold value, performing continuous tracking and further analysis and matching on the infringement and pre-evidence obtaining content, directly performing continuous tracking and further analysis and matching when the infringement is confirmed, and directly performing infringement and evidence obtaining when the infringement is confirmed.
Further, in the above-mentioned case,
the film copyright holder automatically uses the private key to digitally sign the works in writing the works information into the block chain, if the third party wants to verify the copyright information, the public key of the copyright holder can be used to verify the digital signature, and if the digital signature value of the works passes the verification, the works are really owned by the copyright holder.
In a still further aspect of the present invention,
on the basis, SHA-256 is also used for calculating the digital fingerprint of the work, and the copyright verification condition is compared through the digital fingerprint.
Further, in the above-mentioned case,
when an infringement behavior is found, an infringement evidence obtaining interface in the movie copyright service is called, page capture evidence obtaining is carried out on an infringement website, and an evidence obtaining result is stored in a copyright platform; solidifying the infringement behavior into evidence for storage; for infringed content which is subjected to infringement operation, the movie copyright service provides continuous infringement monitoring and infringement tracking service, and ensures that an infringer takes corresponding treatment on the infringed content.
Further, in the above-mentioned case,
the intelligent contract is used for film copyright publishing, if the object of transaction is an author, the draft declaration of the format contract is digitalized, the condition as a trigger is to obtain the authorization of the film works, the record requesting the authorization needs to be written into a block chain, and the intelligent contract is used for searching whether a response is obtained or not;
and when the copyright transaction object is a database facilitator, carrying out synchronous transaction record with a system of the database facilitator, associating bank accounts and block chains of all parties of the film copyright supply chain, and carrying out electronic contract after negotiating contents.
Furthermore, the payment information can be written into the chain in the form of an intelligent contract and transmitted to the user side through the block chain network, and the user confirms the information on the chain, verifies the payment document and completes single downloading.
The invention has the advantages that
(1) Secure trust
The identity identification based on the digital certificate is introduced, and ecological participants such as a copyright bureau, a notarization department, a content platform and the like are used as participating nodes to link up based on a centralized PKI system, so that safe and credible cooperation of the participants on a block chain is ensured
(2) Real-time, fair and fair
The creation is to determine the copyright, the verification of the right confirming information can be rapidly carried out with nodes such as notarization and the like, the creation content can be safely and reliably stored on the block chain in real time, a plurality of nodes are set for backup mechanism so as to be convenient for a third party to check, and the non-tampering characteristic of the nodes also ensures the safety and reliability of the information. And introducing a block chain browser module to provide movie copyright information inquiry service on a block chain, disclosing all movie copyright data such as right confirmation, infringement, evidence storage and the like, and inquiring by any person and any organization to ensure fairness, justness and disclosure of the service. Any node can completely backup node information on the chain, and an original author and a related organization maintain a uniform service platform together, so that the method is beneficial to convenient management and fair and transparent division of content consumption income.
Drawings
FIG. 1 is a schematic workflow diagram of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.
The invention relates to a method for protecting film copyright in a block chain network, which mainly comprises the following steps:
1) using block chain to realize film copyright storage certificate
In the prior art, a redundant and tedious process is required for copyright registration and registration is required at a high cost, so that an author is prohibited, a technology with a block chain can use a technology of a timestamp, a national authorization center can provide a credible timestamp, in a block chain system, each block is ensured to be sequentially connected in sequence through the timestamp, the timestamp is used for authenticating each transaction record, each data can have time for transaction, authenticity of the transaction is displayed, copyright registration can be performed on the block chain, film copyright storage certificate data calculated by hash is written into the block chain by using a SHA-256 algorithm, a certificate generated according to the requirement of the author is reserved for the author, and even a paper written report can be provided according to the requirement of a user. By utilizing the PBFT type consensus algorithm used by the alliance chain, the copyright transaction cannot be tampered once written.
The main algorithms used in the storage of movie copyrights can be summarized as: the method is mainly completed by adding owner signature and generating time stamp information to the film copyright, and mainly comprises the following steps: 1. the user obtains a private key encrypted with a public key from the authorization center and installs the digital certificate. 2. The user carries out owner signature on the film copyright to generate a copyright a, and the copyright a' is generated after the public key encryption and is transmitted to the film copyright block acceptance system through the public network. The acceptance system decrypts a' by using the private key b of the acceptance system to obtain the copyright information a. 3. The copyright control server applies for the timestamp thumbnail movie copyright information c from the CA center. And 4, the CA center returns the time stamp thumbnail film copyright information c to the film copyright controller, and simultaneously stores a and c in a certain block of the block chain. 5. Updating the block chain information to each node of the whole film copyright block chain.
2) Tracking film copyright detection by using block chain
From the content characteristics of the copyrighted work, corresponding DNA characteristics are generated and registered on the federation chain: the notarization department and the copyright bureau are used as one of organizations and nodes of the alliance chain, after the block chain stores the notarization, all information can be synchronized to the notarization department in real time, the notarization can be shown at any time at the notarization department, the high judicial effectiveness is achieved, the alliance chain mainly uses a Hyperhedger Fabric system, non-alliance members can not access data in the alliance chain, on the basis that the alliance chain protects the film copyright, deeper protection is conducted, the private data of the film copyright is safer, and homomorphic encryption is used for protecting the copyright. After registration and providing deep level protection on the federation chain. And then providing an automatic crawler of a key website, matching the monitored content with DNA of the works, performing automatic infringement and evidence obtaining operation when the similarity reaches a threshold value, performing continuous tracking and further analysis and matching on the infringement and pre-evidence obtaining content, directly performing continuous tracking and further analysis and matching when the infringement is confirmed, and directly performing infringement and evidence obtaining when the infringement is confirmed.
3) Movie copyright verification
The film copyright holder automatically uses the private key to digitally sign the works in writing the work information into the block chain, if the third party wants to verify the copyright information, the public key of the copyright holder can be used for verifying the digital signature, if the digital signature value of the works passes the verification, the works are really owned by the copyright holder, because only the copyright holder has the private key to generate the signature value. On the basis, the SHA-256 can also be used for calculating the digital fingerprint of the work, and the copyright verification condition is compared through the digital fingerprint.
4) Film copyright infringement and storage certificate
When an infringement behavior is found, an infringement evidence obtaining interface in the movie copyright service is quickly called, page capture evidence obtaining is carried out on an infringement website, and an evidence obtaining result is stored in a copyright platform; the infringement behavior is solidified into evidence for preservation, and the data is stored permanently and cannot be tampered and has legal effectiveness. For infringed contents which are subjected to infringement operation, the movie copyright service provides continuous infringement monitoring, infringement tracking and other services, and ensures that an infringer takes corresponding treatment on the infringed contents.
5) Sharing movie copyright assets using intelligent contracts
The intelligent contract execution process is efficient and can be used for film copyright publishing, if the transaction object is an author, a film copyright publisher can digitalize the draft declaration of the format contract, the trigger condition is that the authorization of the film works is obtained, the record requesting the authorization needs to be written into a block chain, and the intelligent contract is matched to find out whether the response is obtained. Such a new approach does not create a situation where the previous written statement could not be confirmed. When the copyright transaction object is the database facilitator, the film copyright publisher and the database facilitator can perform synchronous transaction record, thereby reducing repeated accounting and reducing a series of costs. And each party of the film copyright supply chain can associate the bank account with the block chain, and the electronic contract is realized after the contents are negotiated, so that repeated signing caused by non-examination is prevented. The intelligent contract can also be used for more flexible pricing to increase income, the film copyright publisher writes payment information into a chain in the form of the intelligent contract and transmits the payment information to the user side through the block chain network, and the user confirms the information on the chain, verifies the payment document and completes single downloading. The method can accelerate the processing speed and simplify the transaction flow.
1) And the related characteristics of the block chain are utilized to protect the film copyright: the block chain movie copyright alliance chain is built by a copyright operator, a copyright owner, a consumer representative and a trusted authority, and any person can not tamper with the information of each copyright and can trace the information at any time.
2) And the spreading of film copyright is more strict: the movie copyright information is stored in the blockchain, transparent to his next transaction, public, so it is more strict for the streaming of the copyright.
3) The intelligent contract ensures accurate transaction and improves the income: it features that the intelligent contract is used to write payment information, so the user can clearly verify.
The above description is only a preferred embodiment of the present invention, and is only used to illustrate the technical solutions of the present invention, and not to limit the protection scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.
Claims (10)
1. A method for protecting film copyright based on block chain is characterized in that,
the method comprises the following steps:
1) using the block chain to store the film copyright;
2) using the block chain to detect and track the film copyright;
3) verifying the film copyright;
4) film copyright infringement and verification;
5) and realizing the sharing of the movie copyright assets by using the intelligent contract.
2. The method of claim 1,
and writing the film copyright certificate data calculated by hash by using the SHA-256 algorithm into a block chain, and generating a certificate according to the requirement of an author to be reserved by the author.
3. The method of claim 2,
paper written reports can be provided according to the requirements of users.
4. The method of claim 1,
the main algorithms used in the storage of movie copyrights are summarized as follows: the method is completed by adding owner signature and generating time stamp information to the film copyright, and the main execution steps are as follows:
1) a user acquires a private key encrypted by a public key from an authorization center and installs a digital certificate;
2) the user carries out owner signature on the film copyright to generate a copyright a, and the copyright a' is generated after being encrypted by a public key and is transmitted to a film copyright block acceptance system through a public network; the acceptance system decrypts a' by using a private key b of the acceptance system to obtain copyright information a;
3) the copyright control server applies for the timestamp thumbnail movie copyright information c to the CA center;
4) the CA center returns the thumbnail movie copyright information c of the timestamp to the movie copyright controller, and simultaneously stores a and c to a certain block of the block chain;
5) updating the block chain information to each node of the whole film copyright block chain.
5. The method of claim 1,
from the content characteristics of the copyrighted work, corresponding DNA characteristics are generated and registered on the federation chain: the notarization department and the copyright bureau are used as one of the organization and the nodes of the alliance chain, and after the block chain is certified, all information can be synchronized to the notarization department in real time; and then providing an automatic crawler of a key website, matching the monitored content with DNA of the works, performing automatic infringement and evidence obtaining operation when the similarity reaches a threshold value, performing continuous tracking and further analysis and matching on the infringement and pre-evidence obtaining content, directly performing continuous tracking and further analysis and matching when the infringement is confirmed, and directly performing infringement and evidence obtaining when the infringement is confirmed.
6. The method of claim 1,
the film copyright holder automatically uses the private key to digitally sign the works in writing the works information into the block chain, if the third party wants to verify the copyright information, the public key of the copyright holder can be used to verify the digital signature, and if the digital signature value of the works passes the verification, the works are really owned by the copyright holder.
7. The method of claim 6,
on the basis, SHA-256 is also used for calculating the digital fingerprint of the work, and the copyright verification condition is compared through the digital fingerprint.
8. The method of claim 1,
when an infringement behavior is found, an infringement evidence obtaining interface in the movie copyright service is called, page capture evidence obtaining is carried out on an infringement website, and an evidence obtaining result is stored in a copyright platform; solidifying the infringement behavior into evidence for storage; for infringed content which is subjected to infringement operation, the movie copyright service provides continuous infringement monitoring and infringement tracking service, and ensures that an infringer takes corresponding treatment on the infringed content.
9. The method of claim 1,
the intelligent contract is used for film copyright publishing, if the object of transaction is an author, the draft declaration of the format contract is digitalized, the condition as a trigger is to obtain the authorization of the film works, the record requesting the authorization needs to be written into a block chain, and the intelligent contract is used for searching whether a response is obtained or not;
and when the copyright transaction object is a database facilitator, carrying out synchronous transaction record with a system of the database facilitator, associating bank accounts and block chains of all parties of the film copyright supply chain, and carrying out electronic contract after negotiating contents.
10. The method of claim 9,
the payment information can be written into the chain in the form of an intelligent contract and transmitted to the user side through the block chain network, and the user confirms the information on the chain, verifies the payment document and completes single downloading.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911131465.XA CN110855428A (en) | 2019-11-19 | 2019-11-19 | Movie copyright protection method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911131465.XA CN110855428A (en) | 2019-11-19 | 2019-11-19 | Movie copyright protection method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110855428A true CN110855428A (en) | 2020-02-28 |
Family
ID=69602105
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911131465.XA Withdrawn CN110855428A (en) | 2019-11-19 | 2019-11-19 | Movie copyright protection method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110855428A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111324869A (en) * | 2020-03-09 | 2020-06-23 | 广东珠影星光科技有限公司 | Movie copyright protection method based on block chain |
CN111476667A (en) * | 2020-06-24 | 2020-07-31 | 支付宝(杭州)信息技术有限公司 | Block chain-based original work transaction method and device and electronic equipment |
CN111641707A (en) * | 2020-05-29 | 2020-09-08 | 兰州理工大学 | Block chain-based digital copyright protection method |
CN111859309A (en) * | 2020-06-19 | 2020-10-30 | 华新(北京)网络科技有限公司 | Digital copyright protection system construction method based on block chain technology |
CN112069469A (en) * | 2020-11-11 | 2020-12-11 | 支付宝(杭州)信息技术有限公司 | Method and device for processing work data based on block chain |
CN112464178A (en) * | 2020-09-27 | 2021-03-09 | 中国科学技术大学苏州研究院 | Data transaction copyright protection method based on block chain and homomorphic encryption |
CN112559974A (en) * | 2020-11-13 | 2021-03-26 | 山东浪潮质量链科技有限公司 | Picture copyright protection method, equipment and medium based on block chain |
CN112650978A (en) * | 2020-08-14 | 2021-04-13 | 支付宝(杭州)信息技术有限公司 | Infringement detection method and device based on block chain and electronic equipment |
CN112733089A (en) * | 2021-01-15 | 2021-04-30 | 深圳市龙影天下信息系统有限公司 | Movie key distribution management method, movie key distribution management device, computer equipment and storage medium |
CN113704822A (en) * | 2021-08-27 | 2021-11-26 | 浙江中电远为科技有限公司 | Business secret protection system and method based on block chain technology |
CN114528579A (en) * | 2022-03-02 | 2022-05-24 | 南京国础工程技术有限公司 | Block chain strengthening method |
-
2019
- 2019-11-19 CN CN201911131465.XA patent/CN110855428A/en not_active Withdrawn
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111324869A (en) * | 2020-03-09 | 2020-06-23 | 广东珠影星光科技有限公司 | Movie copyright protection method based on block chain |
CN111641707A (en) * | 2020-05-29 | 2020-09-08 | 兰州理工大学 | Block chain-based digital copyright protection method |
CN111859309A (en) * | 2020-06-19 | 2020-10-30 | 华新(北京)网络科技有限公司 | Digital copyright protection system construction method based on block chain technology |
CN111476667A (en) * | 2020-06-24 | 2020-07-31 | 支付宝(杭州)信息技术有限公司 | Block chain-based original work transaction method and device and electronic equipment |
CN112650978B (en) * | 2020-08-14 | 2023-01-20 | 支付宝(杭州)信息技术有限公司 | Infringement detection method and device based on block chain and electronic equipment |
CN112650978A (en) * | 2020-08-14 | 2021-04-13 | 支付宝(杭州)信息技术有限公司 | Infringement detection method and device based on block chain and electronic equipment |
CN112464178A (en) * | 2020-09-27 | 2021-03-09 | 中国科学技术大学苏州研究院 | Data transaction copyright protection method based on block chain and homomorphic encryption |
CN112464178B (en) * | 2020-09-27 | 2024-04-19 | 中国科学技术大学苏州研究院 | Data transaction copyright protection method based on blockchain and homomorphic encryption |
CN112069469A (en) * | 2020-11-11 | 2020-12-11 | 支付宝(杭州)信息技术有限公司 | Method and device for processing work data based on block chain |
CN112559974A (en) * | 2020-11-13 | 2021-03-26 | 山东浪潮质量链科技有限公司 | Picture copyright protection method, equipment and medium based on block chain |
CN112733089B (en) * | 2021-01-15 | 2021-09-17 | 深圳市龙影天下信息系统有限公司 | Movie key distribution management method, movie key distribution management device, computer equipment and storage medium |
CN112733089A (en) * | 2021-01-15 | 2021-04-30 | 深圳市龙影天下信息系统有限公司 | Movie key distribution management method, movie key distribution management device, computer equipment and storage medium |
CN113704822A (en) * | 2021-08-27 | 2021-11-26 | 浙江中电远为科技有限公司 | Business secret protection system and method based on block chain technology |
CN114528579A (en) * | 2022-03-02 | 2022-05-24 | 南京国础工程技术有限公司 | Block chain strengthening method |
CN114528579B (en) * | 2022-03-02 | 2022-10-14 | 南京国础科学技术研究院有限公司 | Block chain strengthening method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110855428A (en) | Movie copyright protection method based on block chain | |
CN109889504B (en) | Decentralized data access right transaction method and system | |
CN111931238B (en) | Block chain-based data asset transfer method, device and equipment | |
CN108737361B (en) | Data verification method based on block chain | |
CN108875093B (en) | Resume management method and system based on block chain | |
CN111027028A (en) | Copyright data processing method and device based on intelligent contract | |
CN105701367A (en) | Security system for Internet original commercial works | |
CN111415157A (en) | Block chain-based data asset safety circulation method | |
CN112364305B (en) | Digital content copyright protection method and device based on blockchain platform | |
CN111008366A (en) | Copyright authorization method and device based on block chain | |
CN108898495A (en) | A kind of finance and money management confirmation of responsibility method based on block chain | |
CN111259439B (en) | Intangible asset management service platform based on block chain and implementation method thereof | |
US11917071B2 (en) | Data protection using universal tagging | |
CN111046346A (en) | Book copyright protection platform based on block chain, equipment and medium | |
CN110992218A (en) | Music copyright protection method, device and medium based on block chain | |
Guo et al. | A blockchain-driven electronic contract management system for commodity procurement in electronic power industry | |
JPWO2018088475A1 (en) | Electronic authentication method and program | |
CN113315745A (en) | Data processing method, device, equipment and medium | |
US11301823B2 (en) | System and method for electronic deposit and authentication of original electronic information objects | |
Lemieux et al. | Addressing audit and accountability issues in self-sovereign identity blockchain systems using archival science principles | |
CN115225346B (en) | Data evidence storage system oriented to credit investigation big data field | |
Scoville | Clear Signatures, Obscure Signs | |
CN112559974A (en) | Picture copyright protection method, equipment and medium based on block chain | |
Malaurie-Vignal | Blockchain, intellectual property and fashion | |
Zhang | Research on the judicial expertise of electronic evidence based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200228 |
|
WW01 | Invention patent application withdrawn after publication |