CN111641609B - System and method for tracing information - Google Patents

System and method for tracing information Download PDF

Info

Publication number
CN111641609B
CN111641609B CN202010423312.9A CN202010423312A CN111641609B CN 111641609 B CN111641609 B CN 111641609B CN 202010423312 A CN202010423312 A CN 202010423312A CN 111641609 B CN111641609 B CN 111641609B
Authority
CN
China
Prior art keywords
information
audio
node
copy
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010423312.9A
Other languages
Chinese (zh)
Other versions
CN111641609A (en
Inventor
龙洋
宋喜海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Yihe Jiangsu Blockchain High Tech Co ltd
Original Assignee
Zhongke Yihe Jiangsu Blockchain High Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Yihe Jiangsu Blockchain High Tech Co ltd filed Critical Zhongke Yihe Jiangsu Blockchain High Tech Co ltd
Priority to CN202010423312.9A priority Critical patent/CN111641609B/en
Publication of CN111641609A publication Critical patent/CN111641609A/en
Application granted granted Critical
Publication of CN111641609B publication Critical patent/CN111641609B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/108Resource delivery mechanisms characterised by resources being split in blocks or fragments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a system and a method for tracing information, wherein the system comprises an audio creator node module, an authorized Qu Kufang node module and an audio buyer node module, wherein the audio creator node module is used for processing audio files and transmitting the audio files to the authorized Qu Kufang node module, meanwhile, transmitting information to the audio buyer node module to enable the audio buyer node to acquire audio file information, the authorized Qu Kufang node module is used for further processing the file information transmitted from the audio creator node and verifying whether the file information purchased by an audio buyer is true or not, and the audio buyer node is used for uploading the purchased file information and processing the information transmitted by the audio creator node module under the condition that the purchased file information is true so as to acquire the audio file information.

Description

System and method for tracing information
Technical Field
The invention relates to the field of blockchains, in particular to a system and a method for tracing information.
Background
In recent years, with the sequential development of the internet, digital contents such as electronic books, music, movies and the like which are traded and spread on the internet are increasingly more and more, so that the problem of protecting the copyright of the digital contents is increasingly raised, and some lawbreakers pirate digital products to gain violence from the digital products, so that the rights of consumers who purchase the digital products are damaged, and the rights of copyrights of the digital products are also damaged. In the prior art, effective traceability identification cannot be performed on digital products purchased by consumers.
Disclosure of Invention
The invention aims to provide a system and a method for tracing information, which are used for solving the problems in the prior art.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a system for tracing information, the system comprising an audio creator node module, an authorizing Qu Kufang node module and an audio buyer node module, wherein the audio creator node module is configured to process audio files and transmit the audio files to the authorizing Qu Kufang node module, and transmit information to the audio buyer node module to enable the audio buyer node to obtain audio file information, the authorizing Qu Kufang node module further processes the file information transmitted from the audio creator node and verifies whether the file information purchased by the audio buyer is authentic, and the audio buyer node is configured to upload the purchased file information and process the information transmitted by the audio creator node module to obtain the audio file information if the purchased file information is authentic.
More optimally, the audio creator node module comprises an encryption segmentation module, an information copy and copy module, a hash processing module and a decryption information sending module, wherein the encryption segmentation module is used for segmenting the audio file information into a plurality of file fragment information after encryption processing, the information copy and copy transmission module randomly copies each file fragment information into a plurality of information copies respectively, randomly sends each file fragment information and each information copy thereof to each authorization Qu Kufang respectively, the hash processing module carries out hash processing on the file fragment information distributed on each authorization Qu Kufang node, a hash table is built according to hash values of all the file fragment information and corresponding information of storage nodes corresponding to the hash values, and the decryption information sending module builds a first secure transaction channel between the audio creator node and the audio buyer node and sends the hash table to the audio buyer node through the first secure transaction channel.
More preferably, the authorization Qu Kufang node module includes an information copy processing module and an information copy verification module, where the information copy processing module is configured to add respective identifiers to respective received information copies by using respective authorizations Qu Kufang, extract information content of the information copies as verification content, and calculate hash values of the preprocessed information copies by using a hash algorithm based on the preprocessed information copies; the information copy verification module is used for verifying whether the file information purchased by the audio purchaser is true.
More optimally, the audio buyer node module comprises an information uploading module, an audio buyer acquisition module and a download group decryption module, wherein the information uploading module is used for uploading the information copy purchased and downloaded by the audio buyer and a download key, the audio buyer acquisition module is used for acquiring the equipment information and the biological characteristic information of the audio buyer for verification by the information copy verification module, and the download group decryption module is used for receiving a hash table transmitted by an audio creator node under the condition that the information copy uploaded by the audio buyer node is true, searching for corresponding file fragment information corresponding to the authorized Qu Kufang node for downloading according to the hash table, reorganizing the downloaded file fragment information into a complete encrypted file, and decrypting and restoring the encrypted file into audio file information.
More optimally, the information copy verification module comprises an information copy hash value comparison module, a pick-up information comparison module, a download key judgment module, an audio purchaser information comparison module and a verification result transmission module, wherein the information copy hash value comparison module is used for comparing whether the hash value of the information copy uploaded by the audio purchaser is identical to the hash value of the information copy preprocessed by the information copy processing module, when the information copy hash value comparison module is identical, the pick-up information comparison module picks up the content of the uploaded information copy and compares the content with the verification content of the corresponding preprocessed information copy to judge whether the content is identical, the download key judgment module is used for judging whether the corresponding download key is uploaded in the history of the purchaser node under the condition that the pick-up information comparison module is identical, the audio purchaser information comparison module is used for comparing whether the equipment information of the current information copy uploaded by the audio purchaser is identical to the equipment information of the audio purchaser or comparing whether the biological characteristic information of the current audio purchaser is identical to the biological characteristic of the audio purchaser and verifies whether the audio information is transmitted to the purchaser node according to the verification result, and the verification result is transmitted to the verification result is that the audio purchaser node is identical to the purchaser node.
A method of performing information tracing, the method comprising:
step S1: the audio creator node encrypts the audio file information and then divides the audio file information into a plurality of file fragment information, randomly copies each piece of file fragment information into a plurality of information copies, and randomly sends each piece of file fragment information and each piece of information copy thereof to each authorized Qu Kufang node;
step S2: after each authorization Qu Kufang node receives file fragment information and information copies, each authorization Qu Kufang adds respective identifications to each received information copy, the identifications of each authorization Qu Kufang are different from each other, the information content of the information copy is extracted to be verification content, and hash values of the preprocessed information copies are calculated by a hash algorithm based on the preprocessed information copies;
step S3: after purchasing the audio file, the audio purchaser downloads a copy of the information via a unique download key;
step S4: and uploading the information copy at the audio buyer node and uploading the downloading key at the same time, comparing the uploaded information copy with the preprocessed information copy, verifying whether the information copy uploaded by the audio buyer node is true or false, and transmitting information to the audio buyer node by the audio creator node when the information copy uploaded by the audio buyer node is true, so that the audio buyer node obtains the audio file information.
More preferably, the step S1 further includes: the hash processing is carried out on the file fragment information distributed on each authorized Qu Kufang node, and a hash table is built according to the hash values of all the file fragment information and the corresponding information of the storage nodes corresponding to the hash values.
More preferably, the step S4 of comparing the uploaded information copy with the preprocessed information copy, and verifying whether the uploaded information copy of the audio buyer node is true or false includes:
calculating the hash value of the uploaded information copy by adopting a hash algorithm based on the uploaded information copy, comparing the hash value of the uploaded information copy with the hash value of the information copy preprocessed by the authorized Qu Kufang node,
if the hash value of one of the preprocessed information copies of the authorized Qu Kufang node is the same as the hash value of the uploaded information copy, acquiring the verification content of the preprocessed information copy, picking the content of the uploaded information copy as the discrimination content,
if the discrimination content is consistent with the verification content, collecting whether the download key has been uploaded historically by the purchaser node,
if the download key has not been uploaded by the purchaser node historically, verifying that the audio purchaser node uploaded the copy of the information is authentic, and collecting and storing device information of the audio purchaser uploaded the copy of the information and the biometric of the audio purchaser,
if the downloading key is uploaded by the purchaser node historically, acquiring the equipment information of the current uploading information copy and the biological characteristic information of the current audio purchaser, and if the equipment information of the current uploading information copy is consistent with the equipment information of the current uploading information copy of the audio purchaser or the biological characteristic information of the current audio purchaser is consistent with the biological characteristic of the historical audio purchaser, verifying that the current audio purchaser node uploading information copy is true;
otherwise, the information copy uploaded by the information transmission information to the audio purchaser is false.
More preferably, the transmitting the information by the audio creator node to the audio buyer node in the step S4, so that the audio buyer node obtains the audio file information further includes:
the audio creator node establishes a first secure transaction channel with the audio purchaser node, the audio creator node transmits the hash table to the audio purchaser node via the first secure transaction channel,
the audio purchaser node searches the corresponding authorized Qu Kufang node according to the hash table and downloads the corresponding file fragment information, the downloaded file fragment information is recombined into a complete encrypted file, and the encrypted file is decrypted and restored into the audio file information.
Compared with the prior art, the invention has the beneficial effects that: according to the method, the information copy is uploaded by the audio buyer node, the hash value of the uploaded information copy is calculated, and whether the hash value of the information copy is the same as that of the information copy of the authorized Qu Kufang node is judged, so that the authenticity of the information copy uploaded by the audio buyer node can be rapidly identified, the hash values of the information copies of the authorized Qu Kufang nodes are different, the specific authorized Qu Kufang node to which the information copy uploaded by the audio buyer node belongs can be rapidly traced, and when the uploaded information copy is fake, the information is transmitted to the audio buyer node to remind the audio buyer, and the rights and interests of the audio buyer are protected; in addition, when the information copy uploaded by the audio buyer node is true, the audio creator node independently transmits information to the audio buyer node, so that the audio buyer node acquires the audio file information, the leakage of the audio file information is reduced, and the rights and interests of the audio creator are protected.
Drawings
FIG. 1 is a schematic diagram of a system for tracing information according to the present invention;
fig. 2 is a flow chart of a method for tracing information according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-2, in an embodiment of the present invention, a system for tracing information includes an audio creator node module, an authorized Qu Kufang node module, and an audio buyer node module, where the audio creator node module is configured to process an audio file and transmit the audio file to the authorized Qu Kufang node module, and transmit information to the audio buyer node module to enable the audio buyer node to obtain audio file information, and the authorized Qu Kufang node module further processes the file information transmitted from the audio creator node, and verifies whether the file information purchased by the audio buyer is true, and the audio buyer node is configured to upload the purchased file information, and process the information transmitted by the audio creator node module to obtain the audio file information if the purchased file information is true.
The audio creator node module comprises an encryption segmentation module, an information copy and copy module, a hash processing module and a decryption information sending module, wherein the encryption segmentation module is used for carrying out encryption processing on audio file information and then segmenting the audio file information into a plurality of file fragment information, the information copy and copy transmission module is used for randomly copying each file fragment information into a plurality of information copies respectively, randomly sending each file fragment information and each information copy thereof to each authorization Qu Kufang respectively, the hash processing module is used for carrying out hash processing on the file fragment information distributed on each authorization Qu Kufang node, a hash table is built according to hash values of all the file fragment information and corresponding information of storage nodes corresponding to the hash values, and the decryption information sending module is used for building a first secure transaction channel between the audio creator node and the audio buyer node and sending the hash table to the audio buyer node through the first secure transaction channel.
The authorization Qu Kufang node module comprises an information copy processing module and an information copy verification module, wherein the information copy processing module is used for adding respective identifications on respective received information copies by each authorization Qu Kufang, picking information content of the information copies to be verification content, and respectively calculating hash values of the preprocessed information copies by a hash algorithm based on the preprocessed information copies; the information copy verification module is used for verifying whether the file information purchased by the audio purchaser is true.
The audio buyer node module comprises an information uploading module, an audio buyer acquisition module and a download and recombination decryption module, wherein the information uploading module is used for uploading the purchased and downloaded information copy and a download key by the audio buyer, the audio buyer acquisition module is used for acquiring equipment information and biological characteristic information of the audio buyer verified by the information copy verification module, and the download and recombination decryption module is used for receiving a hash table transmitted by an audio creator node under the condition that the information copy uploaded by the audio buyer node is true, searching corresponding file fragment information corresponding to the authorized Qu Kufang node for downloading according to the hash table, recombining the downloaded file fragment information into a complete encrypted file, and decrypting and restoring the encrypted file into audio file information.
The information copy verification module comprises an information copy hash value comparison module, a pick-up information comparison module, a download key judgment module, an audio purchaser information comparison module and a verification result transmission module, wherein the information copy hash value comparison module is used for comparing whether the hash value of the information copy uploaded by the audio purchaser is identical to the hash value of the information copy preprocessed by the information copy processing module, when the information copy hash value comparison module is identical, the pick-up information comparison module picks up the content of the uploaded information copy and compares the content with the verification content of the corresponding preprocessed information copy to judge whether the content is identical, the download key judgment module is used for judging whether the corresponding download key is uploaded in the history of the purchaser node under the condition that the pick-up information comparison module is identical, the audio purchaser information comparison module is used for comparing whether the equipment information of the current information copy and the equipment information of the audio purchaser are identical or comparing whether the biological characteristic information of the current information purchaser and the audio frequency biological characteristic of the audio purchaser are identical, and verifying whether the audio frequency biological characteristic information of the current purchaser is identical to the audio frequency biological information of the information copy uploaded by the purchaser node, and verifying whether the audio purchaser is identical to the audio purchaser information is transmitted to the verification result transmission node, and the purchaser information is true-false to the purchaser information when the purchaser information is transmitted to the verification result is transmitted to the purchaser node.
A method of performing information tracing, the method comprising:
step S1: the audio creator node encrypts the audio file information and then divides the audio file information into a plurality of file fragment information, randomly copies each file fragment information into a plurality of information copies, randomly transmits each file fragment information and the information copies thereof to each authority Qu Kufang node, hashes the file fragment information distributed on each authority Qu Kufang node, and creates a hash table according to hash values of all the file fragment information and corresponding information of storage nodes corresponding to the hash values; the method has the advantages that the method is divided into a plurality of file fragment information, and each file fragment information is randomly copied into a plurality of information copies, so that the risk of complete audio file information leakage is reduced, and even if fragments on a certain node fail, corresponding fragment copies can be obtained from other nodes, so that an audio purchaser can recover complete audio file information conveniently;
step S2: after each authorization Qu Kufang node receives file fragment information and information copies, each authorization Qu Kufang adds respective identifications to each received information copy, the identifications of each authorization Qu Kufang are different from each other, the information content of the information copy is extracted to be verification content, and hash values of the preprocessed information copies are calculated by a hash algorithm based on the preprocessed information copies;
step S3: after purchasing the audio file, the audio purchaser downloads a copy of the information via a unique download key;
step S4: uploading the information copy at the audio buyer node and uploading the downloading key at the same time, comparing the uploaded information copy with the preprocessed information copy, verifying whether the information copy uploaded by the audio buyer node is true or false, and transmitting information to the audio buyer node by the audio creator node when the information copy uploaded by the audio buyer node is true, so that the audio buyer node obtains the audio file information;
comparing the uploaded information copy with the preprocessed information copy, verifying whether the uploaded information copy of the audio buyer node is true or false comprises:
calculating the hash value of the uploaded information copy by adopting a hash algorithm based on the uploaded information copy, comparing the hash value of the uploaded information copy with the hash value of the information copy preprocessed by the authorized Qu Kufang node,
if the hash value of the information copy subjected to preprocessing by the authorized Qu Kufang node is the same as that of the information copy subjected to uploading, verification content of the information copy subjected to preprocessing is obtained, the content of the information copy subjected to uploading is taken as judgment content, the source of the information copy can be rapidly judged by comparing the hash value, the information copy of which authorized Qu Kufang node is particularly can be rapidly traced out, and meanwhile, the reliability of the verification information copy result is further improved by comparing the content of the information copy;
if the discrimination content is consistent with the verification content, collecting whether the download key has been uploaded historically by the purchaser node,
if the downloading key is not uploaded by the purchaser node historically, verifying that the information copy uploaded by the audio purchaser node is true, collecting equipment information for storing the information copy uploaded by the audio purchaser and biological characteristics of the audio purchaser, and increasing the difficulty of using the audio file information by the audio purchaser to other people and reducing the probability of privately reselling the information copy by the audio purchaser by verifying the equipment information for storing the information copy uploaded by the audio purchaser or the biological characteristics of the audio purchaser;
if the downloading key is uploaded by the purchaser node historically, acquiring the equipment information of the current uploading information copy and the biological characteristic information of the current audio purchaser, and if the equipment information of the current uploading information copy is consistent with the equipment information of the current uploading information copy of the audio purchaser or the biological characteristic information of the current audio purchaser is consistent with the biological characteristic of the historical audio purchaser, verifying that the current audio purchaser node uploading information copy is true;
otherwise, transmitting the information to the audio buyer, wherein the information copy uploaded by the audio buyer is false;
the audio creator node transmits information to the audio purchaser node, so that the audio purchaser node obtains the audio file information, including:
the audio creator node establishes a first secure transaction channel with the audio purchaser node, the audio creator node transmits the hash table to the audio purchaser node via the first secure transaction channel,
the audio purchaser node searches the corresponding authorized Qu Kufang node according to the hash table, downloads the corresponding file fragment information through the message protocol, reassembles the downloaded file fragment information into a complete encrypted file, and decrypts and restores the encrypted file into audio file information. The audio creator node transmits the hash table to the audio purchaser node directly through the first secure transaction channel, so that the propagation path is reduced, and the leakage probability of the audio file information in the propagation process is reduced.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (7)

1. A method for tracing information is characterized in that: the method comprises the following steps:
step S1: the audio creator node encrypts the audio file information and then divides the audio file information into a plurality of file fragment information, randomly copies each piece of file fragment information into a plurality of information copies, and randomly sends each piece of file fragment information and each piece of information copy thereof to each authorized Qu Kufang node;
step S2: after each authorization Qu Kufang node receives file fragment information and information copies, each authorization Qu Kufang adds respective identifications to each received information copy, the identifications of each authorization Qu Kufang are different from each other, the information content of the information copy is extracted to be verification content, and hash values of the preprocessed information copies are calculated by a hash algorithm based on the preprocessed information copies;
step S3: after purchasing the audio file, the audio purchaser downloads a copy of the information via a unique download key;
step S4: uploading the information copy at the audio buyer node and uploading the downloading key at the same time, comparing the uploaded information copy with the preprocessed information copy, verifying whether the information copy uploaded by the audio buyer node is true or false, and transmitting information to the audio buyer node by the audio creator node when the information copy uploaded by the audio buyer node is true, so that the audio buyer node obtains the audio file information;
the step S1 further includes: carrying out hash processing on the file fragment information distributed on each authorized Qu Kufang node, and establishing a hash table according to the hash values of all the file fragment information and the corresponding information of the storage node corresponding to the hash values;
comparing the uploaded information copy with the preprocessed information copy in the step S4, verifying whether the information copy uploaded by the audio buyer node is true or false includes:
calculating the hash value of the uploaded information copy by adopting a hash algorithm based on the uploaded information copy, comparing the hash value of the uploaded information copy with the hash value of the information copy preprocessed by the authorized Qu Kufang node,
if the hash value of one of the preprocessed information copies of the authorized Qu Kufang node is the same as the hash value of the uploaded information copy, acquiring the verification content of the preprocessed information copy, picking the content of the uploaded information copy as the discrimination content,
if the discrimination content is consistent with the verification content, collecting whether the download key has been uploaded historically by the purchaser node,
if the download key has not been uploaded by the purchaser node historically, verifying that the audio purchaser node uploaded the copy of the information is authentic, and collecting and storing device information of the audio purchaser uploaded the copy of the information and the biometric of the audio purchaser,
if the downloading key is uploaded by the purchaser node historically, acquiring the equipment information of the current uploading information copy and the biological characteristic information of the current audio purchaser, and if the equipment information of the current uploading information copy is consistent with the equipment information of the current uploading information copy of the audio purchaser or the biological characteristic information of the current audio purchaser is consistent with the biological characteristic of the historical audio purchaser, verifying that the current audio purchaser node uploading information copy is true;
otherwise, the information copy uploaded by the information transmission information to the audio purchaser is false.
2. The method for tracing information according to claim 1, wherein: the step S4 of transmitting information by the audio creator node to the audio buyer node, so that the audio buyer node obtaining the audio file information further includes:
the audio creator node establishes a first secure transaction channel with the audio purchaser node, the audio creator node transmits the hash table to the audio purchaser node via the first secure transaction channel,
the audio purchaser node searches the corresponding authorized Qu Kufang node according to the hash table to download the corresponding file fragment information, reassembles the downloaded file fragment information into a complete encrypted file, and decrypts and restores the encrypted file into audio file information.
3. A system for tracing information by using the method for tracing information according to claim 1 or 2, wherein: the system comprises an audio creator node module, an authorized Qu Kufang node module and an audio buyer node module, wherein the audio creator node module is used for processing audio files and transmitting the audio files to the authorized Qu Kufang node module, meanwhile, transmitting information to the audio buyer node module to enable the audio buyer node to acquire audio file information, the authorized Qu Kufang node module further processes the file information transmitted from the audio creator node and verifies whether the file information purchased by the audio buyer is true, and the audio buyer node is used for uploading the purchased file information and processing the information transmitted by the audio creator node module to acquire the audio file information under the condition that the purchased file information is true.
4. A system for tracing information according to claim 3, wherein: the audio creator node module comprises an encryption segmentation module, an information copy and copy module, a hash processing module and a decryption information sending module, wherein the encryption segmentation module is used for carrying out encryption processing on audio file information and then segmenting the audio file information into a plurality of file fragment information, the information copy and copy transmission module is used for randomly copying each file fragment information into a plurality of information copies respectively, randomly sending each file fragment information and each information copy thereof to each authorization Qu Kufang respectively, the hash processing module is used for carrying out hash processing on the file fragment information distributed on each authorization Qu Kufang node, a hash table is built according to hash values of all the file fragment information and corresponding information of storage nodes corresponding to the hash values, and the decryption information sending module is used for building a first secure transaction channel between the audio creator node and the audio buyer node and sending the hash table to the audio buyer node through the first secure transaction channel.
5. The system for tracing information according to claim 4, wherein: the authorization Qu Kufang node module comprises an information copy processing module and an information copy verification module, wherein the information copy processing module is used for adding respective identifications on respective received information copies by each authorization Qu Kufang, picking information content of the information copies to be verification content, and respectively calculating hash values of the preprocessed information copies by a hash algorithm based on the preprocessed information copies; the information copy verification module is used for verifying whether the file information purchased by the audio purchaser is true.
6. The system for tracing information according to claim 5, wherein: the audio buyer node module comprises an information uploading module, an audio buyer acquisition module and a download and recombination decryption module, wherein the information uploading module is used for uploading the purchased and downloaded information copy and a download key by the audio buyer, the audio buyer acquisition module is used for acquiring equipment information and biological characteristic information of the audio buyer verified by the information copy verification module, and the download and recombination decryption module is used for receiving a hash table transmitted by an audio creator node under the condition that the information copy uploaded by the audio buyer node is true, searching corresponding file fragment information corresponding to the authorized Qu Kufang node for downloading according to the hash table, recombining the downloaded file fragment information into a complete encrypted file, and decrypting and restoring the encrypted file into audio file information.
7. The system for tracing information according to claim 6, wherein: the information copy verification module comprises an information copy hash value comparison module, a pick-up information comparison module, a download key judgment module, an audio purchaser information comparison module and a verification result transmission module, wherein the information copy hash value comparison module is used for comparing whether the hash value of the information copy uploaded by the audio purchaser is identical to the hash value of the information copy preprocessed by the information copy processing module, when the information copy hash value comparison module is identical, the pick-up information comparison module picks up the content of the uploaded information copy and compares the content with the verification content of the corresponding preprocessed information copy to judge whether the content is identical, the download key judgment module is used for judging whether the corresponding download key is uploaded in the history of the purchaser node under the condition that the pick-up information comparison module is identical, the audio purchaser information comparison module is used for comparing whether the equipment information of the current information copy and the equipment information of the audio purchaser are identical or comparing whether the biological characteristic information of the current information purchaser and the audio frequency biological characteristic of the audio purchaser are identical, and verifying whether the audio frequency biological characteristic information of the current purchaser is identical to the audio frequency biological information of the information copy uploaded by the purchaser node, and verifying whether the audio purchaser is identical to the audio purchaser information is transmitted to the verification result transmission node, and the purchaser information is true-false to the purchaser information when the purchaser information is transmitted to the verification result is transmitted to the purchaser node.
CN202010423312.9A 2020-05-18 2020-05-18 System and method for tracing information Active CN111641609B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010423312.9A CN111641609B (en) 2020-05-18 2020-05-18 System and method for tracing information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010423312.9A CN111641609B (en) 2020-05-18 2020-05-18 System and method for tracing information

Publications (2)

Publication Number Publication Date
CN111641609A CN111641609A (en) 2020-09-08
CN111641609B true CN111641609B (en) 2023-07-14

Family

ID=72332850

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010423312.9A Active CN111641609B (en) 2020-05-18 2020-05-18 System and method for tracing information

Country Status (1)

Country Link
CN (1) CN111641609B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108647523A (en) * 2018-04-28 2018-10-12 华南理工大学 A kind of electronic identification system based on block chain and deposit card, file access pattern method
CN109347878A (en) * 2018-11-30 2019-02-15 西安电子科技大学 The data verification of decentralization and data safety transaction system and method
CN109740375A (en) * 2018-12-19 2019-05-10 深圳市汇星数字技术有限公司 A kind of shared and dissemination method of original audio production
CN111090626A (en) * 2019-11-05 2020-05-01 西安西电链融科技有限公司 File storage processing method based on block chain distributed file transaction system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108647523A (en) * 2018-04-28 2018-10-12 华南理工大学 A kind of electronic identification system based on block chain and deposit card, file access pattern method
CN109347878A (en) * 2018-11-30 2019-02-15 西安电子科技大学 The data verification of decentralization and data safety transaction system and method
CN109740375A (en) * 2018-12-19 2019-05-10 深圳市汇星数字技术有限公司 A kind of shared and dissemination method of original audio production
CN111090626A (en) * 2019-11-05 2020-05-01 西安西电链融科技有限公司 File storage processing method based on block chain distributed file transaction system

Also Published As

Publication number Publication date
CN111641609A (en) 2020-09-08

Similar Documents

Publication Publication Date Title
US10769252B2 (en) Method and apparatus for watermarking of digital content, method for extracting information
EP0968585A1 (en) Digital product rights management technique
US7653940B2 (en) Tracing and identifying piracy in wireless digital rights management system
CN109274644B (en) Data processing method, terminal and watermark server
CN111538784B (en) Digital asset transaction method, device and storage medium based on blockchain
WO2007120215A2 (en) Secure electronic commerce using mutating identifiers
CN102867515A (en) Method for authenticating digital audio copyright through digital watermarking
WO2014068336A1 (en) Content protection
US6889323B2 (en) Method and apparatus for contents information
CN113034128B (en) Block chain-based data transaction and right confirmation method
US20120036349A1 (en) Datebase server, customer terminal and protection method for digital contents
CN103841469A (en) Digital film copyright protection method and device
CN113065149A (en) Data copyright protection method based on block chain and collusion attack resistant fingerprint code
CN109151506A (en) A kind of method of video file operation, system and server
CN104966000A (en) Multimedia copyright protection method based on security engine
Okada et al. A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking
CN103186731B (en) The digital literary property protection method of a kind of hybrid mode and system
CN111641609B (en) System and method for tracing information
CN117134893A (en) Digital collection processing method, device and system
CN108933766B (en) Method and client for improving equipment ID security
CN112073489A (en) Digital copyright management method based on block chain technology composite encryption
CN113536334A (en) Authorization checking method, module and system
CN111382420A (en) Data transaction method, device, system, electronic equipment and readable storage medium
Tomsich et al. Copyright protection protocols for multimedia distribution based on trusted hardware
CN114745100B (en) Software authentication method for energy controller

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant