CN111008366A - Copyright authorization method and device based on block chain - Google Patents

Copyright authorization method and device based on block chain Download PDF

Info

Publication number
CN111008366A
CN111008366A CN201911227994.XA CN201911227994A CN111008366A CN 111008366 A CN111008366 A CN 111008366A CN 201911227994 A CN201911227994 A CN 201911227994A CN 111008366 A CN111008366 A CN 111008366A
Authority
CN
China
Prior art keywords
authorization
work
data
request
uplink
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911227994.XA
Other languages
Chinese (zh)
Inventor
蔡弋戈
秦青
杨晨
王乐庆
李琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911227994.XA priority Critical patent/CN111008366A/en
Publication of CN111008366A publication Critical patent/CN111008366A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The embodiment of the application provides a copyright authorization method and a copyright authorization device based on a block chain, wherein the method comprises the following steps: acquiring an authorized uplink request aiming at a target work, and acquiring to-be-uplink authorized data and a deposit certificate identifier corresponding to the target work based on the authorized uplink request; the authorization data to be linked up comprises authorized object information, authorization time limit and authorization type, and the certificate storing identification is used for associating the work blocks in the work block chain, which are associated with the target work; obtaining historical authorization data corresponding to a target work from a work block chain, and setting an authorization relation between authorized object information and a certificate storing identification when determining that an authorization uplink request is a legal request based on a historical authorization period and a historical authorization type in the historical authorization data; and generating an authorization block according to the authorization relationship and the authorization data to be linked, and adding the authorization block to the work block chain. By adopting the embodiment of the application, the accuracy of the authorization information of the works can be improved.

Description

Copyright authorization method and device based on block chain
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a copyright authorization method and apparatus based on a blockchain.
Background
With the development of computer information technology and the popularization of the internet, the distribution range of multimedia data is wider and wider, a lot of information and resources appear on the internet in the form of electronic data, and the characteristic that the electronic data is easy to copy and disperse puts higher requirements on the management of copyright data.
In the prior art, a copyright owner can negotiate with an authorization requester, the authorization agreement is completed after both parties reach authorization intention, and the authorization requester legally has the right of copyright data use or re-creation after signing the authorization agreement. Since the authorization agreement is an agreement between the copyright owner and the authorization requester, it is difficult to ensure whether the user or the re-creator really has the right to use the copyright data during the usage or re-creation of the copyright data.
Disclosure of Invention
The embodiment of the application provides a copyright authorization method and device based on a block chain, which can improve the accuracy of work authorization information.
An embodiment of the present application provides a block chain-based copyright authorization method, including:
acquiring an authorized uplink request aiming at a target work, and acquiring to-be-uplink authorized data and a deposit certificate identifier corresponding to the target work based on the authorized uplink request; the authorization data to be linked up comprises authorized object information, authorization time limit and authorization type, and the certificate storing identification is used for associating the work blocks in the work block chain, which are associated with the target work;
obtaining historical authorization data corresponding to a target work from a work block chain, and setting an authorization relation between authorized object information and a corresponding certificate-storing identification of the target work when determining that an authorization uplink request is a legal request based on a historical authorization period and a historical authorization type in the historical authorization data;
and generating an authorization block according to the authorization relationship and the authorization data to be linked, and adding the authorization block to the work block chain.
Wherein, the method also comprises:
obtaining an uplink request carrying work data associated with a target work; the work data comprises work original data and copyright certification data;
distributing certificate storing identification for the target work, packaging original data of the work, copyright certificate data and the certificate storing identification into work blocks, and adding the work blocks to a work block chain.
Wherein, for the distribution of target works deposit the certificate sign, pack into the piece block with work original data, copyright certification data and deposit the certificate sign, include:
performing hash operation on the original data of the work and the copyright certification data respectively based on a hash algorithm to generate a first hash value corresponding to the original data of the work and a second hash value corresponding to the copyright certification data;
distributing certificate storage identification for the target work, and packaging the first hash value, the second hash value and the certificate storage identification into a work block.
Wherein, the above-mentioned historical authorization data that obtains the target work correspondence from the work blockchain includes:
traversing blocks contained in the block chain of the work based on the evidence storage identification;
and obtaining authorization data associated with the evidence storing identification from the work block chain as historical authorization data corresponding to the target work.
Wherein, when determining that the uplink authorization request is a legal request based on the historical authorization term and the historical authorization type in the historical authorization data, setting an authorization relationship between the authorized object information and the corresponding certificate-storing identification of the target work, including:
when the historical authorization deadline in the historical authorization data is not overlapped with the authorization deadline, determining the uplink authorization request as a legal request;
and setting an authorization relation between the authorized object information and the evidence storing identification corresponding to the target work.
Wherein, when determining that the uplink authorization request is a legal request based on the historical authorization term and the historical authorization type in the historical authorization data, setting an authorization relationship between the authorized object information and the corresponding certificate-storing identification of the target work, including:
when the historical authorization deadline in the historical authorization data is overlapped with the authorization deadline, and the authorization type and the historical authorization type are both non-exclusive authorization types, determining the uplink authorization request as a legal request;
and setting an authorization relation between the authorized object information and the evidence storing identification corresponding to the target work.
Wherein, the method also comprises:
configuring the use permission information aiming at the target work for the authorized object based on the intelligent contract;
when a work use request aiming at an authorized object sent by a request terminal is received, obtaining a work to be verified corresponding to the work use request, and recording a time stamp of the obtained work use request;
and if the fact that the works to be verified and the time stamps accord with the use permission information is detected based on the intelligent contract, opening the use permission for the authorized object.
An embodiment of the present application provides a block chain-based copyright authorization apparatus, including:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring an authorized uplink request aiming at a target work and acquiring to-be-uplink authorized data and a evidence storing identification corresponding to the target work based on the authorized uplink request; the authorization data to be linked up comprises authorized object information, authorization time limit and authorization type, and the certificate storing identification is used for associating the work blocks in the work block chain, which are associated with the target work;
the verification module is used for acquiring historical authorization data corresponding to the target work from the work block chain, and setting an authorization relation between authorized object information and a certificate-storing identifier corresponding to the target work when the authorization uplink request is determined to be a legal request based on a historical authorization period and a historical authorization type in the historical authorization data;
and the first uplink module is used for generating an authorization block according to the authorization relationship and the authorization data to be uplink authorized, and adding the authorization block to the work block chain.
Wherein, the device still includes:
the request acquisition module is used for acquiring a cochain request carrying work data associated with a target work; the work data comprises work original data and copyright certification data;
and the second cochain module is used for distributing certificate storage identification for the target works, packaging original data of the works, copyright certificate data and the certificate storage identification into work blocks, and adding the work blocks to the work block chain.
Wherein, the second cochain module includes:
the Hash operation unit is used for respectively carrying out Hash operation on the original data of the work and the copyright certification data based on a Hash algorithm to generate a first Hash value corresponding to the original data of the work and a second Hash value corresponding to the copyright certification data;
and the block generation unit is used for distributing the certificate storing identification for the target work and packaging the first hash value, the second hash value and the certificate storing identification into the work block.
Wherein, the verification module includes:
the traversal unit is used for traversing the blocks contained in the block chain of the work based on the evidence storage identification;
and the historical data acquisition unit is used for acquiring the authorization data associated with the evidence storage identification from the work block chain as the historical authorization data corresponding to the target work.
Wherein, the verification module includes:
the determining unit is used for determining the uplink authorization request as a legal request when the historical authorization deadline in the historical authorization data is not overlapped with the authorization deadline;
and the setting unit is used for setting an authorization relationship between the authorized object information and the evidence storing identification corresponding to the target work.
Wherein, the verification module includes:
a second determining unit, configured to determine the uplink authorization request as a valid request when the historical authorization deadline in the historical authorization data overlaps with the authorization deadline, and the authorization type and the historical authorization type are both non-exclusive authorization types;
and the setting unit is used for setting an authorization relationship between the authorized object information and the evidence storing identification corresponding to the target work.
Wherein, the device still includes:
the configuration module is used for configuring the use permission information aiming at the target work for the authorized object based on the intelligent contract;
the recording module is used for acquiring the works to be verified corresponding to the work use request and recording the time stamp of the acquired work use request when the work use request aiming at the authorized object sent by the request terminal is received;
and the permission verification module is used for opening the use permission to the authorized object if detecting that the work to be verified and the timestamp both accord with the use permission information based on the intelligent contract.
An aspect of the embodiments of the present application provides a computer device, including a memory and a processor, where the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to execute the steps of the method in the aspect of the embodiments of the present application.
An aspect of the embodiments of the present application provides a computer-readable storage medium, in which a computer program is stored, the computer program comprising program instructions that, when executed by a processor, perform the steps of the method as in an aspect of the embodiments of the present application.
According to the method and the device, the authorization uplink request aiming at the target work can be obtained, the authorization data to be uplink and the certificate storing identification corresponding to the target work can be obtained based on the authorization uplink request, the authorization data to be uplink comprises authorized object information, an authorization time limit and an authorization type, the certificate storing identification is used for associating with a work block associated with the target work in a work block chain, whether the authorization uplink request is a legal request or not is determined according to historical authorization data stored in the work block chain and associated with the target work, when the authorization uplink request is a legal request, an authorization relation can be set between the authorized object information and the certificate storing identification, an authorization block is generated according to the authorization relation between the authorized object information and the certificate storing identification and the authorization block is added to the work block chain. Due to the decentralization and the non-tamper property of the block chain, the authorization data are public and transparent to the management nodes with the query authority, and the accuracy, the credibility and the traceability of the authorization data record are improved. The target works and the authorization information corresponding to the target works can be recorded in the work block chain, and the accuracy of authorization data can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a diagram of a network architecture provided by an embodiment of the present application;
fig. 2 is a diagram illustrating an uplink scenario of grant data according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a block chain-based copyright authorization method according to an embodiment of the present application;
FIG. 4 is a diagram illustrating an uplink scenario of work data according to an embodiment of the present application;
fig. 5 is a schematic flowchart of another block chain-based copyright authorization method according to an embodiment of the present application;
FIG. 6 is a diagram illustrating a method for determining usage rights according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a block chain-based copyright authorization apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The Blockchain (Blockchain) is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission (P2P transmission), a consensus mechanism, an encryption algorithm and the like, and is essentially a decentralized database; the blockchain can be composed of a plurality of serial transaction records (also called blocks) which are connected in series by cryptography and protect the contents, and the distributed accounts connected in series by the blockchain can effectively record the transaction by multiple parties and can permanently check the transaction (can not be tampered). The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
An intelligent contract may be understood as a computer program that runs on a distributed ledger (i.e., blockchain) that presets rules, has status, conditional responses, can encapsulate, validate, execute complex behaviors of distributed nodes, and performs information exchange, value transfer, and asset management. Based on a distributed architecture, a consensus algorithm and the like of a block chain, the intelligent contracts allow users who are not trusted to finish transactions without any trusted intermediary or authority of a third party, and meanwhile, the digital intelligent contracts can be flexibly embedded into various tangible or intangible assets, transactions and data, so that active or passive assets, information management and control are realized, and programmable intelligent assets, systems and the like are gradually constructed.
Fig. 1 is a diagram of a network architecture according to an embodiment of the present application. As shown in fig. 1, the network architecture includes a terminal device 10a, a terminal device 10b, and a server 10c, where the terminal device 10a may refer to a terminal corresponding to a work creator, after the creator creates a new work, the terminal device 10a may upload works of the creator and copyright certification materials corresponding to the works (such as information of the creator of the work, creation thought of the work, and the like) to a blockchain network, the server 10c may be a blockchain link point in the blockchain network, and the server 10c may pack the works uploaded by the terminal device 10a and the copyright certification materials corresponding to the works into work blocks and add the work blocks to the work blockchain. The terminal device 10b may refer to a terminal corresponding to an authorized party, when an author authorizes a work to an authorized party, the authorized party has a right to use or re-create the work, after the author and the authorized party reach an authorization intention and sign an authorization agreement, the terminal device 10b corresponding to the authorized party may upload authorization data to a blockchain network, where the authorization data may include information of the authorized party, authorization rights, authorization types, and authorized works, and after receiving the authorization data, the server 10c generates an authorization block for the work and adds the authorization block to the blockchain of the work.
The terminal devices 10a and 10b may each include a mobile phone, a tablet computer, a notebook computer, a palm computer, a Mobile Internet Device (MID), a wearable device (e.g., a smart watch, a smart band, etc.), and the like.
Please refer to fig. 2, which is a diagram illustrating an uplink scenario of grant data according to an embodiment of the present application. As shown in fig. 2, the server 10c may be represented as any blockchain node in the blockchain network, when the creator and the authorization requester reach authorization intention for the target work and sign an authorization agreement, the authorization requester is an authorized object corresponding to the target work, the terminal device 10b may be represented as a user terminal corresponding to the authorized object, and the terminal device 10b may upload authorization data for the target work to the blockchain network, so that the blockchain node (e.g., the server 10c) in the blockchain network may uplink the authorization data uploaded by the terminal device 10 b. When the object a and the creator of the target work sign an authorization agreement and the object a pays a certain copyright fee to the creator of the target work, the terminal device 10b corresponding to the object a may upload the authorization data 20a corresponding to the target work to the blockchain network and send an authorization uplink request to the blockchain network. The authorization data 20a may include authorized object information of the target work (e.g., the object a is a business, the authorized object information may be information such as a business name and a business code; e.g., the object a is a person; the authorized object information may be information such as a name and an identification number, an authorization deadline (i.e., the authorized object has a right to use the target work only within the authorization deadline, such as 2018.01-2020.01) and an authorization type (e.g., a sole authorization, i.e., within a period of 2018.01-2020.01, the target work cannot be authorized to other users or businesses after being authorized to the object a), the authorization data 20a may further carry corresponding certificate identifiers of the target work, such as a number 3, which may be used to characterize the target work, each target work corresponds to a unique certificate identifier in a block chain, and when the target work includes a plurality of sub-works (e.g., an illustration of a poster, Words, etc.), the deposit certificate identifier may be used to associate multiple sub-works in the target work in the block chain, that is, multiple sub-works in the target work may be linked up at different times, but all of the multiple sub-works correspond to the same deposit certificate identifier.
It should be understood that, when the author creates the target work, the user terminal corresponding to the author has uploaded information (original data of the work, author information, and creation idea) associated with the target work to the blockchain network, and generates a work block from the blockchain link points, and adds the work block to the blockchain. When the target work is linked up, the block chain link point can distribute a certificate of deposit identifier for the target work and return the certificate of deposit identifier to the user terminal corresponding to the creator. Certainly, after distributing the evidence storing identifier to the target work, the consensus needs to be performed in the blockchain network, and the purpose of the consensus mainly lies in that when the following remaining works are uplink-linked, a new evidence storing identifier is distributed to the remaining works, for example, when the target work is uplink-linked, the evidence storing identifier distributed by the blockchain node point is: number 3, when the rest of the works are linked up, the rest of the evidence-storing marks except number 3 can be allocated.
After receiving the authorized uplink request sent by the terminal device 10b, the server 10c in the blockchain network may obtain the authorization data 20a uploaded by the terminal device 10b based on the authorized uplink request. The server 10c needs to verify the authorization data 20a, and the uplink can be performed after the verification. The verification process may include: the server 10c obtains the history block set 20c associated with the evidence storing identifier "number 3" from the work block chain 20b according to the evidence storing identifier "number 3" in the authorization data 20a, that is, traverses all blocks included in the work block chain 20b, and obtains all blocks in which the evidence storing identifier "number 3" is stored. The server 10c reads the data stored in each history block in the history block set 20c, and the history block set 20c obtains the history authorization data 20d for the target work, where the history authorization data 20d includes: the authorization relationship between the number 3 and the object B, the authorized object is the object B, and the authorization term is: 2016.12-2017.12, the authorization types are: non-exclusive authorization. According to the historical authorization data 20d, it can be known that there is no overlap between the authorization deadline corresponding to the object B and the authorization deadline corresponding to the object a in the authorization data 20a, and it can be determined that the authorization data 20a passes the verification, that is, the authorized uplink request sent by the terminal device 10B is legal. The server 10c may then package the authenticated authorization data 20a into an authorization tile 20e and add the agreed authorization tile 20e to the work tile chain 20 b. The work block chain 20b is used for recording information of the works created by the creator and authorization data of the works.
It should be understood that, when there is an overlap between the authorization deadline corresponding to the object B in the historical authorization data 20d and the authorization deadline corresponding to the object a in the authorization data 20a, and the authorization type in the authorization data 20a is an exclusive authorization type, it may be determined that the authorization data 20a fails to be verified, that is, the authorized uplink request sent by the terminal device 10B is illegal, and then the authorization data 20a may be determined as invalid data to be deleted, and the following steps are not performed.
Please refer to fig. 3, which is a flowchart illustrating a block chain-based copyright authorization method according to an embodiment of the present application. As shown in fig. 3, the method may include:
step S101, obtaining an authorized uplink request aiming at a target work, and obtaining to-be-uplink authorized data and a deposit certificate identifier corresponding to the target work based on the authorized uplink request; the authorization data to be linked up comprises authorized object information, authorization time limit and authorization type, and the certificate storing identification is used for associating the work blocks in the work block chain, which are associated with the target work;
specifically, the authorization requester may apply the usage right for the target work to the work creator, and after both the work creator and the authorization requester reach authorization intention and sign an authorization agreement, the authorization requester is an authorized object for the target user, and the terminal device corresponding to the authorized object (the terminal device 10b in the embodiment corresponding to fig. 2) or the terminal device corresponding to the work creator (the terminal device 10a in the embodiment corresponding to fig. 1) may upload the authorization data to be uplink authorized corresponding to the target work to the blockchain network, and send an authorization uplink request for the target work to the blockchain network, so as to request to write the uploaded authorization data to be uplink into the blockchain of the work (the blockchain 20b in the embodiment corresponding to fig. 2). After receiving an authorized uplink request sent by a terminal device, a node server (e.g., the server 10c in the embodiment corresponding to fig. 2) in a blockchain network may obtain, according to the authorized uplink request, to-be-uplink authorized data and a certificate store identifier corresponding to a target work.
The to-be-uplink authorization data may include authorized object information, an authorization term, an authorization type, and the like corresponding to the target work. The authorization period represents the time range of the authorized object having the target work usage right, and the authorization types comprise an exclusive authorization type and a non-exclusive authorization type. The exclusive authorization type means that the target work can only be authorized to one object in the same time period, namely the target object cannot authorize the target work to other objects during the authorization of the target object to the authorized object; the non-exclusive authorization type means that the target work can be authorized to a plurality of objects simultaneously, namely, the target object can authorize the target work to other objects during the authorization to the authorized object. The authorization cochain request can carry a certificate storage identification corresponding to the target work, the certificate storage identification can be used for associating with the work blocks associated with the target work in the target block chain, each target work corresponds to a unique certificate storage identification, when the target work comprises a plurality of sub-works, the plurality of sub-works belong to the target work, so that the plurality of sub-works have the same certificate storage identification in the work block chain, and the plurality of sub-works of the target work in the work block chain can be associated according to the certificate storage identification. In other words, the voucher identification can associate at least one block of the work blockchain that stores a plurality of sub-works.
It should be appreciated that before the work author authorizes the target work to the authorized subject, the work author may upload work data associated with the target work to the blockchain network and send an uplink request for the target work to the blockchain network. After receiving a chaining request for a target work, a node server in the block chain network can acquire work data uploaded by a terminal device corresponding to a creator, wherein the work data comprises work original data and copyright certification data, the node server can distribute evidence storage identification for the target work, pack the evidence storage identification, the work original data and the copyright certification data into work blocks, and add the work blocks into a work block chain. The original data of the work refers to the work created by the creator, such as a song, a poster, a book, etc., the copyright certification data may refer to materials for certifying the copyright of the target work, such as creator information, creation background, creation idea, etc., the evidence storage identifier may be an identifier allocated to the target work by the node server, or may be an identifier set for the target work by the terminal device corresponding to the creator, and no specific limitation is made here. It should be noted that, after the evidence storing identifier of the target work is determined, the node server may broadcast the evidence storing identifier in the blockchain network to notify other nodes in the blockchain network that the evidence storing identifier has been used by the target work, and when a subsequent sub-work with the target work performs uplink, the node server may use the evidence storing identifier to perform uplink; when other works are subsequently linked, different evidence storing identifications need to be distributed for the other works.
For example, when the target work is a book, the target work may include book illustrations and texts (the texts and the book illustrations are original data of the work), after the author completes the text portion, the terminal device corresponding to the author may upload the texts and the copyright certification data corresponding to the texts to the blockchain network, and send a data chaining request for the book to the blockchain network, and a node server in the blockchain network may obtain the texts of the book and the copyright certification data corresponding to the texts, and allocate a certificate identifier for the book: and the mark 1 is used for packaging the mark 1, the characters and copyright certification data corresponding to the characters into a work block and adding the work block to a work block chain. When the author completes creation of the book illustration, the terminal device corresponding to the author can upload the book illustration and the copyright certification data corresponding to the book illustration to the blockchain network, and send a data uplink request for the book to the blockchain network again, and a node server in the blockchain network can acquire the book illustration and the copyright certification data corresponding to the book illustration, and acquire the deposit certificate identifier corresponding to the book: and marking 1, generating a new work block according to the representation 1, the book illustration and the copyright certification data corresponding to the book illustration, and adding the new work block to the work block chain.
Optionally, in order to ensure the security of the work data and save the storage space of the block chain, hash operations may be performed on the original work data and the copyright certification data included in the work data based on a hash algorithm, so as to generate a first hash value corresponding to the original work data and a second hash value corresponding to the copyright certification data, allocate a certificate-depositing identifier for the target work, package the first hash value, the second hash value, and the certificate-depositing identifier into work blocks, and add the work blocks into the work block chain. The hash algorithm may compress data or messages into digests, not only fix the format of the data, but also reduce the amount of the data, and the hash algorithm may include, but is not limited to, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. Taking the SHA-256 algorithm as an example, the SHA-256 algorithm can generate a 256-bit hash value for any size of data, and can generate different hash values for different data.
Please refer to fig. 4, which is a diagram illustrating an uplink scenario of work data according to an embodiment of the present application. As shown in fig. 4, the target work created by the creator is a work 1 (the work 1 may be a poster, a book, a cartoon, etc.), the work 1 includes two parts, namely an illustration a and a letter b, and when the creator completes the illustration a in the work 1, the terminal device 30a may upload copyright certification data 1 (including author information and creation idea 1) corresponding to the illustration a and the illustration a as work data 30c for the work 1 to the blockchain network. After receiving the work data 30c uploaded by the terminal device 30a, the node server 30b in the block chain network may perform hash operation on the illustration a and the copyright certification data 1 respectively by using hash operation to obtain a hash value 1 corresponding to the illustration a and a hash value 2 corresponding to the copyright certification data 1, and the node server 30b may further allocate a certificate-storing identifier, such as identifier 1, to the work 1, generate a work block 30d according to the hash value 1, the hash value 2, and the table identifier 1, and add the commonly identified work block 30d to the work block chain 30 h.
When the creator completes the text b in the work 1, the terminal device 30e (which may be the same terminal device as the terminal device 30a or a different terminal device, and is not specifically limited herein) may upload the text b and the copyright certification data 2 (including the author information and the creation idea 2) corresponding to the text b as the work data 30f for the work 1 to the block chain network. After the node server 30b in the block chain network receives the work data 30f uploaded by the terminal device 30f, hash operation can be used to perform hash operation on the characters b and the copyright certification data 2 respectively, so as to obtain hash values 3 corresponding to the characters b and hash values 4 corresponding to the copyright certification data 2, and the node server 30b obtains the distribution certificate storage identification of the works 1: and an identifier 1, generating a work block 30g according to the hash value 3, the hash value 4 and the table identifier 1, and adding the work block 30g passing the consensus to a work block chain 30 h. Certainly, the terminal device may also upload the work data corresponding to the whole work to the blockchain network when the creator completes the whole work 1 (including the illustration a and the text b) to request to uplink the work data.
Optionally, in order to prevent the authorization data or the work data from being tampered in the uploading process, before the terminal device uploads the to-be-uplink authorization data or the work data to the blockchain network, a digital signature corresponding to the to-be-uplink authorization data or the work data may be generated, so that the node server in the blockchain network may perform signature verification on actually received data, and further determine whether the to-be-uplink authorization data or the work data is tampered.
Step S102, obtaining historical authorization data corresponding to a target work from a work block chain, and setting an authorization relation between authorized object information and a certificate-storing identification corresponding to the target work when determining that an uplink authorization request is a legal request based on a historical authorization time limit and a historical authorization type in the historical authorization data;
specifically, the node server may obtain historical authorization data corresponding to the target work from the work blockchain, determine whether the uplink authorization request is a legal request or not through a historical authorization period and a historical authorization type in the historical authorization data, and when the uplink authorization request is a legal request, may set an authorization relationship between the authorized object information and the certificate of the target object, that is, perform authorization binding on the authorized object information and the certificate. Optionally, the node server may further set an authorization relationship between the public key and the certificate authority corresponding to the authorized object, that is, perform authorization binding on the public key and the certificate authority corresponding to the authorized object.
The node server may traverse the blocks included in the block chain of the work based on the certificate-deposit identifier, and obtain authorization data associated with the certificate-deposit identifier from the block chain of the work as historical authorization data corresponding to the target work. In other words, the node server may use the certificate storage identifier corresponding to the target work as a parameter, obtain the block associated with the certificate storage identifier in the work block chain, and further read the authorization data corresponding to the certificate storage identifier from the block associated with the certificate storage identifier as the historical authorization data corresponding to the target work. If the historical authorization data matched with the evidence storing identification is not acquired from the work block chain, the target work is not authorized to any object before, the authorization uplink request can be determined to be a legal request, and an authorization relation is set between the authorized object information and the evidence storing identification of the target object; if the historical authorization data matched with the evidence storing identification is obtained from the work block chain, the target work is authorized to other objects before the target work, and whether the uplink authorization request is a legal request can be further determined according to information contained in the historical authorization data.
When the historical authorization deadline in the historical authorization data is not overlapped with the authorization deadline in the to-be-uplink authorization data, the authorization uplink request can be determined as a legal request, and an authorization relationship is set between the authorized object information and the certificate storing identifier, namely, the authorization uplink request can be determined as a legal request as long as the authorization deadline in the historical authorization data is not overlapped with the authorization deadline in the to-be-uplink authorization data no matter whether the historical authorization type in the historical authorization data is an exclusive authorization type or an exclusive authorization type. For example, the authorized objects in the uplink authorization data are: object a, authorization deadline is: in year 2018, month 01-2020, month 01, the authorization types are: the exclusive authorization type, the authorized objects in the historical authorization data are: object B, historical authorization terms are: 2016-12-2017-12, authorization type is: the unique authorization type can determine that the uplink authorization request is a legal request because the 01 month to 2020 in 2018 is not overlapped with the 12 months in 2016 12 to 2017 in 12; the authorized objects in the historical authorization data are: object B, historical authorization terms are: 2016-12-2017-12, authorization type is: when the type of the non-exclusive authorization is the same, the uplink authorization request can be determined to be a legal request.
Optionally, when there is an overlap between a historical authorization deadline in the historical authorization data and an authorization deadline in the to-be-uplink authorization data, and both the authorization type and the historical authorization type are non-exclusive authorization types, determining the authorization uplink request as a legal request, and setting an authorization relationship between the authorized object information and the certificate-storing identifier. In other words, when there is an overlap between the historical authorization deadline in the historical authorization data and the authorization deadline in the to-be-uplink authorization data, it is further required to determine the authorization type in the to-be-uplink data and the historical authorization type in the historical authorization data, and if both the authorization type and the historical authorization type are non-exclusive authorization types, the authorization uplink request is determined to be a legal request; if at least one of the authorization type and the historical authorization type is the exclusive authorization type, the uplink authorization request is determined to be an illegal request, namely, the to-be-uplink authorization data is invalid data, and the to-be-uplink authorization data can be deleted. For example, the authorized objects in the uplink authorization data are: object a, authorization deadline is: in year 2018, month 01-2020, month 01, the authorization types are: the non-exclusive authorization type, the authorized objects in the historical authorization data are: object B, historical authorization terms are: 2016-12-2018-12, authorization type is: a non-exclusive authorization type, which can determine that the uplink authorization request is a legal request; the authorized objects in the uplink authorization data are: object a, authorization deadline is: in year 2018, month 01-2020, month 01, the authorization types are: the exclusive authorization type, the authorized objects in the historical authorization data are: object B, historical authorization terms are: 2016-12-2018-12, authorization type is: the non-exclusive authorization type can determine that the uplink authorization request is an illegal request, namely the data to be uplink authorized is invalid data, delete the illegal request, and return warning information to the terminal equipment sending the uplink authorization request.
Step S103, generating an authorization block according to the authorization relationship and the authorization data to be linked, and adding the authorization block to the work block chain.
Specifically, the node server may generate an authorization block according to a hash value corresponding to a block with a maximum block height in a work block chain, an authorization relationship between authorized object information and a certificate storing identifier, and authorization data to be uplink linked, and the node server may broadcast the authorization block in the block chain network, so that other nodes in the block chain network verify the authorization block according to a consensus algorithm, and when the authorization block passes the consensus, the authorization block that passes the consensus may be added to the work block chain for formal uplink linking, where the hash value corresponding to the block with the maximum block height in the work block chain may be used as an input of a block header in the authorization block, and the authorization relationship between the authorized object information and the certificate storing identifier and the authorization data to be uplink linked may be stored in the block body of the authorization block.
Optionally, after receiving the to-be-cochain authorization data, if the to-be-cochain authorization data carries a digital signature, the node server needs to perform signature verification on the to-be-cochain authorization data, and a specific signature verification process may include: the node server can decrypt a digital signature carried by the authorization data to be uplink authorized according to a public key of a terminal device corresponding to an authorized object, acquire first abstract information corresponding to the digital signature, further perform hash operation on the authorization data to be uplink authorized based on a hash algorithm, generate second abstract information corresponding to the authorization data to be uplink authorized, if the first abstract information is detected to be the same as the second abstract information, the authorization data to be uplink authorized passes the verification, determine that an authorization uplink request is legal, generate an authorization block according to the authorization relationship between the authorization data to be uplink authorized and the authorized object information and the certificate storage identifier, and add the authorization block after achieving common identification to a work block chain. If the digital signature carried in the to-be-uplink authorized data received by the node server is not the digital signature of the terminal device corresponding to the authorized object, that is, the digital signature in the to-be-uplink authorized data is the digital signature generated by using the false private key, the node server directly displays that the decryption fails when decrypting by using the real public key. The first abstract information is the abstract information of the terminal equipment corresponding to the authorized object and aiming at the data to be uplink authorized, which is obtained by the calculation of the hash operation, and the second abstract information is the abstract information of the node server and aiming at the actual data to be uplink authorized, which is obtained by the calculation of the hash operation, wherein the hash algorithm used by the terminal equipment corresponding to the authorized object and the node server is the same.
According to the method and the device, the authorization uplink request aiming at the target work can be obtained, the authorization data to be uplink and the certificate storing identification corresponding to the target work can be obtained based on the authorization uplink request, the authorization data to be uplink comprises authorized object information, an authorization time limit and an authorization type, the certificate storing identification is used for associating with a work block associated with the target work in a work block chain, whether the authorization uplink request is a legal request or not is determined according to historical authorization data stored in the work block chain and associated with the target work, when the authorization uplink request is a legal request, an authorization relation can be set between the authorized object information and the certificate storing identification, an authorization block is generated according to the authorization relation between the authorized object information and the certificate storing identification and the authorization block is added to the work block chain. Due to the decentralization and the non-tamper property of the block chain, the authorization data are public and transparent to the management nodes with the query authority, and the accuracy, the credibility and the traceability of the authorization data record are improved. The target works and the authorization information corresponding to the target works can be recorded in the work block chain, and the accuracy of authorization data can be improved.
Please refer to fig. 5, which is a flowchart illustrating another block chain-based copyright authorization method according to an embodiment of the present application. As shown in fig. 5, the method may include:
step S201, obtaining an authorized uplink request aiming at a target work, and obtaining to-be-uplink authorized data and a deposit certificate identifier corresponding to the target work based on the authorized uplink request;
step S202, obtaining historical authorization data corresponding to a target work from a work block chain, and setting an authorization relation between authorized object information and a certificate-storing identification corresponding to the target work when determining that an uplink authorization request is a legal request based on a historical authorization time limit and a historical authorization type in the historical authorization data;
step S203, generating an authorization block according to the authorization relationship and the authorization data to be linked, and adding the authorization block to the work block chain;
the specific implementation process of steps S201 to S203 may refer to steps S101 to S103 in the embodiment corresponding to fig. 3, which is not described herein again.
Step S204, configuring the use authority information aiming at the target work for the authorized object based on the intelligent contract;
specifically, the node server may deploy an intelligent contract in the blockchain network, and after the authorization data to be linked is written into the blockchain of the work for formal linking, the node server may configure the usage permission information for the target work for the authorized object in the intelligent contract, that is, create a method for setting an authorization deadline, a method for setting a work evidence identifier, a method for setting an authorization type, and the like in the intelligent contract. The usage right information includes information such as a target work, a usage object, and a usage term for the target work.
Step S205, when receiving a work use request for an authorized object sent by a request terminal, obtaining a work to be verified corresponding to the work use request, and recording a timestamp for obtaining the work use request;
specifically, when the node server receives a work use request for an authorized object sent by the request terminal, it may acquire a work to be verified of the work use request, and record a timestamp of receiving the work use request. In other words, when an authorized object needs to use a certain work, a work usage request may be sent to the node server, and the node server may determine whether the authorized object has the usage right of the work to be verified by obtaining authorized object information corresponding to the work usage request, the work to be verified, and obtaining the timestamp of the work usage request.
Step S206, if it is detected that the works to be verified and the time stamp both accord with the use permission information based on the intelligent contract, the use permission is opened for the authorized object.
Specifically, if it is detected based on the smart contract that the certificate of authenticity corresponding to the work to be verified has an authorization relationship with the authorized object and the timestamp of the received work use request belongs to the authorization deadline of the authorized object, the use right may be opened for the authorized object, that is, the authorized object may use the work to be verified. If it is detected based on the intelligent contract that the certificate of existence corresponding to the work to be verified does not have an authorization relationship with the authorized object, or the timestamp of the received work use request does not belong to the authorization deadline of the authorized object, it is determined that the authorized object does not have the use permission for the work to be verified, that is, the authorized object cannot use the work to be verified.
Please refer to fig. 6, which is a schematic diagram of determining usage rights according to an embodiment of the present application. As shown in fig. 6, when the user wants to publish the hand drawing 40b on the information publishing platform, and uploads the hand drawing 40b to the information publishing platform, and selects the "publish" option on the information publishing page, the hand drawing 40b is published. When the user selects the "publish" option, the terminal device 40a may send a work use request to the server 40c (a blockchain node in the blockchain network), where the work use request may carry user information 40d, and the user information 40d may include: a user name (e.g., object a), time information (i.e., the time at which the work use request was initiated, such as 03/2019), and work information (e.g., work a, where the hand drawing 40b is by default a sub-work in work a). The server 40c may obtain, after receiving the work use request, the use right information 40e associated with the work information according to the work information in the user information 40d, where the use right information 40e includes: the work information (such as the work a), the authorized object information (such as the object A), and the authorization period (such as 12 month and 01 day in 2017-2020 and 12 month and 01 day), it can be determined that the user has the usage right for the work a, that is, the user has the publishing right, and the hand painting 40b can be successfully published on the information publishing platform.
Optionally, when the user does not have the usage right for the work a (for example, the user information is inconsistent with the authorized object information, or the time of initiating the work usage request does not belong to the authorized time limit), the user does not have the publishing right and cannot publish the hand-drawn 40b on the information publishing platform.
According to the method and the device, the authorization uplink request aiming at the target work can be obtained, the authorization data to be uplink and the certificate storing identification corresponding to the target work can be obtained based on the authorization uplink request, the authorization data to be uplink comprises authorized object information, an authorization time limit and an authorization type, the certificate storing identification is used for associating with a work block associated with the target work in a work block chain, whether the authorization uplink request is a legal request or not is determined according to historical authorization data stored in the work block chain and associated with the target work, when the authorization uplink request is a legal request, an authorization relation can be set between the authorized object information and the certificate storing identification, an authorization block is generated according to the authorization relation between the authorized object information and the certificate storing identification and the authorization block is added to the work block chain. Due to the decentralization and the non-tamper property of the block chain, the authorization data are public and transparent to the management nodes with the query authority, and the accuracy, the credibility and the traceability of the authorization data record are improved. The target works and the authorization information corresponding to the target works can be recorded in the work block chain, so that the accuracy of authorization data can be improved; when the user needs to use the target work, the use permission result aiming at the target work can be returned to the user according to the authorization information recorded in the work block chain, and the query efficiency can be improved.
Fig. 7 is a schematic structural diagram of a block chain-based copyright authorization apparatus according to an embodiment of the present application. As shown in fig. 7, the block chain-based copyright authorization apparatus 1 may include: an acquisition module 11, a verification module 12 and a first uplink module 13;
the obtaining module 11 is configured to obtain an authorized uplink request for a target work, and obtain to-be-uplink authorized data and a deposit certificate identifier corresponding to the target work based on the authorized uplink request; the authorization data to be linked up comprises authorized object information, authorization time limit and authorization type, and the certificate storing identification is used for associating the work blocks in the work block chain, which are associated with the target work;
the verification module 12 is configured to obtain historical authorization data corresponding to the target work from the work blockchain, and set an authorization relationship between the authorized object information and the corresponding certificate-storing identifier of the target work when the authorization uplink request is determined to be a legal request based on a historical authorization term and a historical authorization type in the historical authorization data;
the first uplink module 13 is configured to generate an authorization block according to the authorization relationship and the authorization data to be uplink, and add the authorization block to the work block chain.
The specific functional implementation manners of the obtaining module 11, the verifying module 12, and the first uplink module 13 may refer to steps S101 to S103 in the embodiment corresponding to fig. 3, which are not described herein again.
Referring to fig. 7 together, the block chain-based copyright authorization apparatus 1 may further include: a request acquisition module 14, a second uplink module 15, a configuration module 16, a recording module 17 and a permission verification module 18;
a request obtaining module 14, configured to obtain an uplink request carrying work data associated with a target work; the work data comprises work original data and copyright certification data;
the second uplink module 15 is configured to allocate a certificate storing identifier to the target work, package original data of the work, copyright certification data, and the certificate storing identifier into a work block, and add the work block to a work block chain;
a configuration module 16, configured to configure usage right information for the target work for the authorized object based on the intelligent contract;
the recording module 17 is configured to, when receiving a work use request for an authorized object sent by a request terminal, obtain a work to be verified corresponding to the work use request, and record a timestamp of the obtained work use request;
and the permission verification module 18 is used for opening the use permission to the authorized object if the fact that the work to be verified and the timestamp both accord with the use permission information is detected based on the intelligent contract.
The specific functional implementation manners of the request obtaining module 14 and the second uplink module 15 may refer to step S101, the configuration module 16, the recording module 17, and the permission verifying module 18 in the embodiment corresponding to fig. 3, and refer to step S204 to step S206 in the embodiment corresponding to fig. 5, which is not described herein again.
Referring also to fig. 7, the verification module 12 may include: a traversing unit 121, a history data acquiring unit 122, a first determining unit 123, a setting unit 124, a second determining unit 125;
a traversal unit 121, configured to traverse blocks included in a work block chain based on the evidence storage identifier;
a historical data obtaining unit 122, configured to obtain authorization data associated with the certificate authority from the work blockchain, where the authorization data is used as historical authorization data corresponding to the target work;
a first determining unit 123, configured to determine, when a historical authorization deadline in the historical authorization data does not overlap with the authorization deadline, the uplink authorization request as a legal request;
the setting unit 124 is used for setting an authorization relationship between the authorized object information and the evidence storing identification corresponding to the target work;
a second determining unit 125, configured to determine the uplink grant request as a valid request when there is an overlap between a historical grant duration and a grant duration in the historical grant data, and the grant type and the historical grant type are both non-exclusive grant types.
For specific functional implementation manners of the traversal unit 121, the historical data obtaining unit 122, the first determining unit 123, the setting unit 124, and the second determining unit 125, reference may be made to step S102 in the embodiment corresponding to fig. 3, which is not described herein again. Wherein, when the first determining unit 123 performs the corresponding operation, the second determining unit 125 suspends performing the operation; when the second determining unit 125 is performing the corresponding operation, the first determining unit 123 suspends the performing operation. The first determining unit 123 and the second determining unit 125 may be combined into the same determining unit.
Referring to fig. 7, the second uplink module 15 may include: a hash operation unit 151, a block generation unit 152;
a hash operation unit 151, configured to perform a hash operation on the original data of the work and the copyright certification data based on a hash algorithm, respectively, to generate a first hash value corresponding to the original data of the work and a second hash value corresponding to the copyright certification data;
and the block generating unit 152 is configured to allocate a certificate storing identifier for the target work, and package the first hash value, the second hash value, and the certificate storing identifier into a work block.
The specific functional implementation manners of the hash operation unit 151 and the block generation unit 152 may refer to step S101 in the embodiment corresponding to fig. 3, which is not described herein again.
According to the method and the device, the authorization uplink request aiming at the target work can be obtained, the authorization data to be uplink and the certificate storing identification corresponding to the target work can be obtained based on the authorization uplink request, the authorization data to be uplink comprises authorized object information, an authorization time limit and an authorization type, the certificate storing identification is used for associating with a work block associated with the target work in a work block chain, whether the authorization uplink request is a legal request or not is determined according to historical authorization data stored in the work block chain and associated with the target work, when the authorization uplink request is a legal request, an authorization relation can be set between the authorized object information and the certificate storing identification, an authorization block is generated according to the authorization relation between the authorized object information and the certificate storing identification and the authorization block is added to the work block chain. Due to the decentralization and the non-tamper property of the block chain, the authorization data are public and transparent to the management nodes with the query authority, and the accuracy, the credibility and the traceability of the authorization data record are improved. The target works and the authorization information corresponding to the target works can be recorded in the work block chain, so that the accuracy of authorization data can be improved; when the user needs to use the target work, the use permission result aiming at the target work can be returned to the user according to the authorization information recorded in the work block chain, and the query efficiency can be improved.
Please refer to fig. 8, which is a schematic structural diagram of a computer device according to an embodiment of the present application. As shown in fig. 8, the computer apparatus 1000 may include: the processor 1001, the network interface 1004, and the memory 1005, and the computer apparatus 1000 may further include: a user interface 1003, and at least one communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display) and a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a standard wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1004 may be a high-speed RAM memory or a non-volatile memory (e.g., at least one disk memory). The memory 1005 may optionally be at least one memory device located remotely from the processor 1001. As shown in fig. 8, a memory 1005, which is a kind of computer-readable storage medium, may include therein an operating system, a network communication module, a user interface module, and a device control application program.
In the computer device 1000 shown in fig. 8, the network interface 1004 may provide a network communication function; the user interface 1003 is an interface for providing a user with input; and the processor 1001 may be used to invoke a device control application stored in the memory 1005 to implement:
acquiring an authorized uplink request aiming at a target work, and acquiring to-be-uplink authorized data and a deposit certificate identifier corresponding to the target work based on the authorized uplink request; the authorization data to be linked up comprises authorized object information, authorization time limit and authorization type, and the certificate storing identification is used for associating the work blocks in the work block chain, which are associated with the target work;
obtaining historical authorization data corresponding to a target work from a work block chain, and setting an authorization relation between authorized object information and a corresponding certificate-storing identification of the target work when determining that an authorization uplink request is a legal request based on a historical authorization period and a historical authorization type in the historical authorization data;
and generating an authorization block according to the authorization relationship and the authorization data to be linked, and adding the authorization block to the work block chain.
It should be understood that the computer device 1000 described in this embodiment of the present application may perform the description of the block chain-based copyright authorization method in the embodiment corresponding to any one of fig. 3 and fig. 5, and may also perform the description of the block chain-based copyright authorization apparatus 1 in the embodiment corresponding to fig. 7, which is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
Further, here, it is to be noted that: an embodiment of the present application further provides a computer-readable storage medium, where a computer program executed by the block chain based copyright authorization apparatus 1 mentioned above is stored in the computer-readable storage medium, and the computer program includes program instructions, and when the processor executes the program instructions, the description of the block chain based copyright authorization method in any one of the embodiments shown in fig. 3 and fig. 5 can be executed, so that details are not repeated here. In addition, the beneficial effects of the same method are not described in detail. For technical details not disclosed in embodiments of the computer-readable storage medium referred to in the present application, reference is made to the description of embodiments of the method of the present application.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium and can include the processes of the embodiments of the methods described above when the computer program is executed. The readable storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (10)

1. A copyright authorization method based on a block chain is characterized by comprising the following steps:
acquiring an authorized uplink request aiming at a target work, and acquiring to-be-uplink authorized data and a deposit certificate identifier corresponding to the target work based on the authorized uplink request; the authorization data to be linked up comprises authorized object information, an authorization period and an authorization type, and the evidence storing identification is used for associating the work blocks in the work block chain, which are associated with the target work;
obtaining historical authorization data corresponding to the target work from the work block chain, and setting an authorization relation between the authorized object information and the certificate-storing identification corresponding to the target work when the authorization uplink request is determined to be a legal request based on a historical authorization period and a historical authorization type in the historical authorization data;
and generating an authorization block according to the authorization relationship and the authorization data to be linked, and adding the authorization block to the work block chain.
2. The method of claim 1, further comprising:
obtaining an uplink request carrying work data associated with the target work; the work data comprises work original data and copyright certification data;
distributing the certificate storing identification for the target work, packaging the original data of the work, the copyright certification data and the certificate storing identification into the work block, and adding the work block to the work block chain.
3. The method of claim 2, wherein said assigning said certificate of authenticity identification to said target work, and packaging said original data of work, said copyright certification data and said certificate of authenticity identification into said block of work comprises:
performing hash operation on the original work data and the copyright certification data respectively based on a hash algorithm to generate a first hash value corresponding to the original work data and a second hash value corresponding to the copyright certification data;
distributing the certificate storing identification for the target work, and packaging the first hash value, the second hash value and the certificate storing identification into the work block.
4. The method of claim 1, wherein the obtaining historical authorization data corresponding to the target work from the work blockchain comprises:
traversing blocks included in the work block chain based on the evidence storing identification;
and obtaining authorization data associated with the evidence storage identification from the work block chain as historical authorization data corresponding to the target work.
5. The method of claim 1, wherein when it is determined that the uplink authorization request is a legal request based on a historical authorization duration and a historical authorization type in the historical authorization data, setting an authorization relationship between the authorized object information and the evidence storing identifier corresponding to the target work comprises:
when the historical authorization deadline in the historical authorization data is not overlapped with the authorization deadline, determining the authorization uplink request as a legal request;
and setting an authorization relation between the authorized object information and the evidence storing identification corresponding to the target work.
6. The method of claim 1, wherein when it is determined that the uplink authorization request is a legal request based on a historical authorization duration and a historical authorization type in the historical authorization data, setting an authorization relationship between the authorized object information and the evidence storing identifier corresponding to the target work comprises:
when the historical authorization deadline in the historical authorization data is overlapped with the authorization deadline, and the authorization type and the historical authorization type are both non-exclusive authorization types, determining the uplink authorization request as a legal request;
and setting an authorization relation between the authorized object information and the evidence storing identification corresponding to the target work.
7. The method of claim 1, further comprising:
configuring the use permission information aiming at the target work for the authorized object based on the intelligent contract;
when a work use request aiming at the authorized object sent by a request terminal is received, obtaining a work to be verified corresponding to the work use request, and recording a time stamp for obtaining the work use request;
and if the fact that the work to be verified and the timestamp both accord with the use permission information is detected based on the intelligent contract, opening the use permission for the authorized object.
8. A block chain-based copyright authorization apparatus, comprising:
the system comprises an acquisition module, a verification module and a processing module, wherein the acquisition module is used for acquiring an authorized uplink request aiming at a target work and acquiring to-be-uplink authorized data and a evidence storing identification corresponding to the target work based on the authorized uplink request; the authorization data to be linked up comprises authorized object information, an authorization period and an authorization type, and the evidence storing identification is used for associating the work blocks in the work block chain, which are associated with the target work;
the verification module is used for acquiring historical authorization data corresponding to the target work from the work blockchain, and setting an authorization relation between the authorized object information and the evidence storing identification corresponding to the target work when the authorization uplink request is determined to be a legal request based on a historical authorization deadline and a historical authorization type in the historical authorization data;
and the first uplink module is used for generating an authorization block according to the authorization relationship and the authorization data to be uplink authorized, and adding the authorization block to the work block chain.
9. A computer arrangement comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions which, when executed by a processor, perform the steps of the method according to any one of claims 1 to 7.
CN201911227994.XA 2019-12-04 2019-12-04 Copyright authorization method and device based on block chain Pending CN111008366A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911227994.XA CN111008366A (en) 2019-12-04 2019-12-04 Copyright authorization method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911227994.XA CN111008366A (en) 2019-12-04 2019-12-04 Copyright authorization method and device based on block chain

Publications (1)

Publication Number Publication Date
CN111008366A true CN111008366A (en) 2020-04-14

Family

ID=70115322

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911227994.XA Pending CN111008366A (en) 2019-12-04 2019-12-04 Copyright authorization method and device based on block chain

Country Status (1)

Country Link
CN (1) CN111008366A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112150146A (en) * 2020-09-22 2020-12-29 京东数字科技控股股份有限公司 Block processing method, device and equipment of block chain and storage medium
CN112231755A (en) * 2020-10-27 2021-01-15 腾讯科技(深圳)有限公司 Data authorization method, device and system based on block chain
CN112560110A (en) * 2020-12-08 2021-03-26 爱信诺征信有限公司 Signing method and device of authorization protocol, electronic equipment and storage medium
CN112787808A (en) * 2020-12-31 2021-05-11 车主邦(北京)科技有限公司 Method and device for processing service data of co-managed account
CN113095966A (en) * 2021-04-28 2021-07-09 支付宝(杭州)信息技术有限公司 Copyright authentication method and device based on block chain and electronic equipment
CN113742539A (en) * 2021-08-18 2021-12-03 杭州网易云音乐科技有限公司 Work authorization method, device, medium and computing equipment
CN113783965A (en) * 2021-09-18 2021-12-10 北京俩撇科技有限公司 Block chaining-out method, device, equipment and storage medium
CN115391751A (en) * 2022-10-31 2022-11-25 知安视娱(北京)科技有限公司 Infringement determination method

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112150146A (en) * 2020-09-22 2020-12-29 京东数字科技控股股份有限公司 Block processing method, device and equipment of block chain and storage medium
CN112150146B (en) * 2020-09-22 2023-11-03 京东科技控股股份有限公司 Block processing method, device, equipment and storage medium of block chain
CN112231755A (en) * 2020-10-27 2021-01-15 腾讯科技(深圳)有限公司 Data authorization method, device and system based on block chain
CN112560110A (en) * 2020-12-08 2021-03-26 爱信诺征信有限公司 Signing method and device of authorization protocol, electronic equipment and storage medium
CN112787808A (en) * 2020-12-31 2021-05-11 车主邦(北京)科技有限公司 Method and device for processing service data of co-managed account
CN112787808B (en) * 2020-12-31 2023-05-02 能链物流科技有限公司 Service data processing method and device for common management account
CN113095966A (en) * 2021-04-28 2021-07-09 支付宝(杭州)信息技术有限公司 Copyright authentication method and device based on block chain and electronic equipment
CN113742539A (en) * 2021-08-18 2021-12-03 杭州网易云音乐科技有限公司 Work authorization method, device, medium and computing equipment
CN113783965A (en) * 2021-09-18 2021-12-10 北京俩撇科技有限公司 Block chaining-out method, device, equipment and storage medium
CN115391751A (en) * 2022-10-31 2022-11-25 知安视娱(北京)科技有限公司 Infringement determination method

Similar Documents

Publication Publication Date Title
CN111008366A (en) Copyright authorization method and device based on block chain
CN107566116B (en) Method and apparatus for digital asset weight registration
CN111027028A (en) Copyright data processing method and device based on intelligent contract
CN111931238B (en) Block chain-based data asset transfer method, device and equipment
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
US20070226507A1 (en) Method and System for Depositing Digital Works, A Corresponding Computer Program, and a Corresponding Computer-Readable Storage Medium
CN104156862A (en) Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method
CN111798209A (en) Engineering project management method based on block chain, electronic equipment and storage medium
CN110958319B (en) Method and device for managing infringement and evidence-based block chain
CN110855428A (en) Movie copyright protection method based on block chain
CN109491965A (en) The storage method and its network and electronic equipment of purchase sale of electricity contract
CN111292041A (en) Electronic contract generating method, device, equipment and storage medium
CN111259439B (en) Intangible asset management service platform based on block chain and implementation method thereof
US11743027B2 (en) Decentralized methods and systems for storage, access, distribution and exchange of electronic information and documents over the internet using blockchain to protect against cyber attacks and theft
CN111797430A (en) Data verification method, device, server and storage medium
US20150095971A1 (en) Authentication in computer networks
CN113326533B (en) Electronic license service system and method based on blockchain and distributed file storage
CN111488372A (en) Data processing method, device and storage medium
CN111475778A (en) Music data processing method and device based on block chain
CN111274597A (en) Data processing method and equipment
CN114303129A (en) Document authentication method and system
US7716478B2 (en) Method and device for data protection
CN111008900A (en) Data distribution method and device based on intelligent contract
CN112559974A (en) Picture copyright protection method, equipment and medium based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination