CN112073489A - Digital copyright management method based on block chain technology composite encryption - Google Patents

Digital copyright management method based on block chain technology composite encryption Download PDF

Info

Publication number
CN112073489A
CN112073489A CN202010890414.1A CN202010890414A CN112073489A CN 112073489 A CN112073489 A CN 112073489A CN 202010890414 A CN202010890414 A CN 202010890414A CN 112073489 A CN112073489 A CN 112073489A
Authority
CN
China
Prior art keywords
module
key
information
purchaser
comparison
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010890414.1A
Other languages
Chinese (zh)
Inventor
张辉
牛庾鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaxing Qinshen Intelligent Technology Co ltd
Original Assignee
Jiaxing Qinshen Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiaxing Qinshen Intelligent Technology Co ltd filed Critical Jiaxing Qinshen Intelligent Technology Co ltd
Priority to CN202010890414.1A priority Critical patent/CN112073489A/en
Publication of CN112073489A publication Critical patent/CN112073489A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a digital copyright management method based on block chain technology composite encryption, which comprises the following steps: s1, the content and resource purchased by the purchaser from the website appointed by the server terminal or the software can generate random and unrepeated messy codes of twenty-four bytes through the secret key generating system of the server terminal, and the messy codes and the purchaser device information are uploaded to the block chain through the uploading module in the server terminal; s2, the blockchain stores the information through the storage module, and the server terminal generates the secret key through the secret key generating system using the messy codes and the purchaser device information. The invention greatly reduces the possibility that the digital media is illegally copied by people during sharing by arranging the multiple encryption system in the digital copyright management, avoids the copyright of the digital media from being infringed, and greatly reduces the loss to a copyright holder.

Description

Digital copyright management method based on block chain technology composite encryption
Technical Field
The invention belongs to the technical field of block chain application, and particularly relates to a digital copyright management method based on block chain technology composite encryption.
Background
The blockchain is a term in the field of information technology, and essentially, the blockchain is a shared database, data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like, based on the characteristics, the blockchain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism, has a wide application prospect, has wide application range, is one of the blockchain, is digital copyright management, refers to some technologies used by a publisher for controlling the use right of a protected object, protects digital contents (such as software, music and movies) and hardware, limits the use of a certain example of a digital product to facilitate the term and copyright protection, and confuses the technology of the copyright protection, which is applied to the digital media contents on electronic equipment, digital rights management, which is a new technology developed along with the widespread distribution of electronic audio video programs over the internet, aims to protect the rights of digital media, technically prevent illegal copying of digital media, or make copying difficult to a certain extent, and end users must be authorized to use digital media.
At present, digital media are merged into the life of people, the awareness of people on copyright is gradually enhanced, but at present, a lot of digital media are illegally copied or acquired, although the current digital copyright management is strict, the sharing of the digital media is always a headache problem, and the digital media can be illegally copied in the sharing process, so that the copyright of the digital media is damaged, and the immeasurable loss and even psychological trauma are caused to copyright holders.
Therefore, in view of the above technical problems, it is desirable to provide a digital rights management method based on block chain technology composite encryption.
Disclosure of Invention
The invention aims to provide a digital copyright management method based on block chain technology composite encryption, which aims to solve the problem that the copyright of a digital medium is damaged because the digital medium is easily illegally copied by people during sharing.
In order to achieve the above object, an embodiment of the present invention provides the following technical solutions:
a digital copyright management method based on block chain technology composite encryption comprises the following steps:
s1, a purchaser generates a random and unrepeated messy code of twenty-four bytes from a website appointed by a server terminal or contents and resources purchased from software through a secret key generation system of the server terminal, and uploads the messy code and purchaser equipment information to a block chain through an uploading module in the server terminal;
s2, the block chain stores the information through a storage module and uploads the information to a server terminal through an uploading module, the server terminal generates secret keys through a secret key generation system by using the messy codes and the purchaser equipment information, the secret keys are synchronized to a computer of the purchaser along with downloading of the purchaser, the secret keys downloaded to the computer are scattered by a secret key analysis system in the server terminal, and the secret keys can only be fused through the information stored in the secret key analysis system;
s3, when a purchaser opens the purchase content, the server terminal fuses the secret keys through the secret key analysis system, the retrieval system retrieves whether the secret keys in purchaser equipment are repeated or not, the secret keys are synchronously uploaded to the block chain through the uploading module, the secret keys are compared through the comparison system, when the secret keys are successfully compared with the secret keys stored in the block chain storage module and the retrieval of the server terminal retrieval system is not repeated, the secret keys are registered in the block chain through the registration system, the secret keys are uploaded to the server terminal through the uploading module after the registration is successful, and then the purchaser can check the surface layer information of the purchase content;
s4, if the comparison is unsuccessful, sending an information prompt such as 'registration failure' to the purchaser, and providing a're-registration' option for the purchaser;
s5, when the purchaser loads the surface layer information, the purchaser can synchronously monitor through a real-time monitoring system in the block chain, and through continuous comparison with a malicious software comparison system in the server terminal, if the malicious software is found, the purchaser immediately stops checking, and the purchased content is automatically deleted through a clearing system, if the malicious software is not found, the retrieval system compares whether the secret key is falsified again, and if the secret key is not falsified, the deep layer information can be checked;
s6, if a certain part of the resource needs to be shared, a purchaser can apply for a sharing setting system in a block chain and set shared content, the sharing setting system can verify the equipment information and the secret key of the purchaser and upload the secret key of the purchaser to a server through an uploading module, the downloadable content set by the purchaser can be downloaded in an open mode through authorization of a server terminal authorization system, the equipment information of the sharee is extracted, the equipment information of the sharee and the secret key of the purchaser are synthesized through a secret key generation system to generate a new secret key, the information downloaded by the sharee is encrypted, and the information enters the equipment of the sharee through downloading of the sharee;
s7, the blockchain detects that the shared person tries to contact the unshared content through the real-time monitoring system, the shared person is warned, and the information is submitted to the device of the buyer, the buyer can monitor through the real-time monitoring system in the blockchain, the buyer can forcibly close the authority of the shared person through the sharing setting system in the blockchain, once the blockchain real-time monitoring system detects that the content loses the authority, the shared content is deleted through the clearing system, if the shared person tries to modify or crack the key by using malicious software, the real-time monitoring system in the blockchain notifies the buyer, the authority of the shared person is forcibly closed through the sharing setting system, and the shared content is automatically deleted.
Further, the secret key generating system in S1 includes a disorder code generating module, a disorder code extracting module, an equipment information extracting module, a secret key generating module and a secret key storage module, where the disorder code generating module is configured to generate a disorder code that is twenty-four bytes and is not duplicated, the disorder code that is twenty-four bytes and is not duplicated raises the difficulty of decoding the disorder code, avoids the disorder code from being decoded, and can represent the uniqueness of the file, one disorder code corresponds to one file, and corresponds to one purchaser, so that a suspect can be quickly found in case of true piracy, and a part of loss is recovered, the disorder code extracting module is configured to extract the generated disorder code into the secret key storage module, the disorder code extracting module is configured to extract the disorder code into the secret key storage module and store the disorder code through the secret key storage module, so that the comparison system can perform comparison, the equipment information extracting module is configured to extract the equipment information required for secret key generation into the secret key storage module, the extraction of the equipment information is necessary, the method for realizing one person to one equipment to one file can be realized by extracting the equipment information, the digital media can be independently monitored, the movement of the digital media is correspondingly and properly monitored, the key generation module is used for extracting the messy codes and the equipment information in the key storage module, the key generation module is used for mixing the messy codes and the equipment information into a key, the key generation module can mix the messy codes and the equipment information into the key, the independent messy codes are used for mixing the independent equipment information, the uniqueness of the key is more obvious, the single key is matched with the assistance of a key disassembling and analyzing system, the illegal copying probability is greatly reduced, the protection on the digital media is greatly enhanced, the key storage module is used for storing the extracted messy codes, the extracted equipment information and the generated key, and the key storage module can effectively store the key, the method is convenient for subsequent comparison and extraction during sharing, and the illegally copied secret key can be compared in the subsequent comparison, so that the clearing system can clear the illegally copied secret key.
Further, the key decommissioning system in S2 includes a key scattering module, a key fusion module, a decommissioning storage module, and a key sorting module, where the key scattering module is configured to scatter and download the key into the purchaser device, the arrangement of the scattering module avoids the possibility of a malicious person extracting a complete key, avoids the possibility of copying the key, and greatly reduces the possibility of illegal copying of the digital media, the key fusion module is configured to combine the scattered modules, when it is necessary to compare the keys to detect whether the keys are modified, the key fusion module can completely find back and fuse the scattered data, the decommissioning storage module is configured to scatter and store the key scattering modules in sequence, the sequence of the data is more difficult to recover the illegally copied person after being disturbed, and as random scattering is made, it is basically irregular, the key fusion module is used for fusing data, recombining the data through the key sorting module, and recombining the data by recording the sequence of scattered data to avoid the key from being copied, wherein the key sorting module is used for recombining the data into the key according to the stored scattered sequence.
Further, the retrieval system in S3 includes a retrieval storage module, a retrieval extraction module, a retrieval comparison module, and a retrieval information output module, where the retrieval storage module is used to store information of all keys, the retrieval storage module can store information of all keys of purchasers, and is convenient for use in later period, and meanwhile, the possibility of key data loss is avoided, the retrieval extraction module is used to extract keys used in the retrieval, the retrieval extraction module can be used to extract and merge keys scattered in purchasers' equipment in cooperation with a key parsing system, the retrieval comparison module is used to compare keys, duplicate information is retrieved by comparing the merged keys with all keys in the storage module, the retrieval information output module is used to feed back the retrieval information of this time, and the retrieved information is submitted to a block chain, the copied digital media and keys are purged through a block chain controlled purge system.
Further, the comparison system in S3 includes a comparison storage module, a comparison extraction module and a comparison information output module, the comparison extraction module is used for extracting the current device information used by the purchaser, the comparison extraction module can extract the current device information of the purchaser, the subsequent comparison with the information in the comparison storage module is performed, the comparison storage module is used for storing the current device information used by the purchaser and the comparison result, the device information extracted by the comparison extraction module is compared with the original device information of the purchaser using the secret key in the comparison storage module, if the comparison is successful, the comparison system in the block chain is registered, the comparison information output module is used for feeding back the comparison result information to the server terminal, and the comparison information output module feeds back the registration system.
Further, the registration system in S3 includes an account generating module, a password generating module, a registration output module, and a password changing module, where the account generating module is configured to generate a random and unrepeated account, the account generating module generates a random and unrepeated account for a purchaser to log in and browse surface layer information, and because the account is random and unrepeated and the password can be set independently, all possibilities of stealing are almost zero, so that the possibility of stealing the account is greatly reduced, even if the account is stolen, only the surface layer information can be browsed, and all the information can be emptied when the secret key is compared again subsequently, the password generating module is configured to generate a random and unrepeated password, the registration output module is configured to transmit the generated account and password to a device of the purchaser, and the password changing module is configured to facilitate a user to change the password, the randomly generated password can be changed into a familiar password, so that the possibility of forgetting the password is avoided, and the possibility of stealing the account is avoided due to double protection of the random account number and the set password.
Further, the real-time monitoring system in S5 includes a tamper key module, a basic file tamper module, a protection module, and a feedback module, where the tamper key module is used to monitor whether the key is tampered, the setting of the tamper key module prevents malicious software from tampering with the key, guarantees the rights and interests of the purchaser, and simultaneously improves the security of the digital media purchased by the purchaser, the basic file tamper module is used to monitor whether the basic file is tampered, the basic file tamper module prevents basic file tampering, guarantees the flow operation of the digital media, the protection module is used to protect the key and the basic file, the setting of the protection module effectively protects the security of the key and the basic file, avoids the possibility that an illegal molecule maliciously modifies the key and the basic file, and greatly reduces the probability that the purchaser cannot use, the use experience of a purchaser is optimized, and the feedback module is used for feeding back the server terminal after the protection module is started.
Further, the malicious software comparison system in S5 includes a software storage module, a software comparison module, a software scanning module, and a software comparison result output module, where the software storage module is used to store the scanned malicious software information, the software storage module can continuously perform self-optimization, and at the same time, the software storage module can record all the scanned malicious software and synchronize with all the devices to avoid the appearance of fish missing from the internet, the software comparison module is used to compare the stored software information with the software in the purchaser device, the security in the purchaser device is optimized through the setting of the software comparison module, and the situation that the secret key and the basic file are attacked and tampered is avoided, the software scanning module is used to scan out hidden malicious software, and the software comparison result output module transmits the comparison result to the purchaser, the buyer can choose to uninstall the malicious software through the information fed back, thereby not only ensuring the digital media, but also ensuring the safety of other software and files in the equipment.
Further, the sharing setting system in S6 includes a setting module, a sharing extraction module, a forced end sharing module, a sharing verification module, an upload module, and a sharing storage module, where the setting module is configured to set a shared person, set sharing time, and set sharing content, the setting module optimizes user experience of a purchaser, sets content that the shared person wants to see and content that the shared person does not want to see by the other person by setting the shared person, setting sharing time, and setting sharing content, optimizes privacy of the purchaser, the sharing extraction module is configured to extract device information of the shared person, the forced end sharing module is configured to end sharing of the content, the sharing verification module is configured to verify device information and a key of the purchaser, the device information and the key can be prevented from being shared again by the shared person, and possibility of a group of copyright audiences is greatly reduced, the uploading module is used for uploading the device information of the shared person to a key generation system of the server terminal, the possibility of illegal copying from the shared person is avoided due to the arrangement of the uploading module, the key of the shared person is independent and protected even if the key of the shared person is illegally copied, and the sharing storage module is used for storing the shared person and the time and content shared this time.
Further, the authorization system in S6 includes an authorization comparison module, an authorization storage module, an authorization feedback module, and an authorization protection module, where the authorization comparison module is used to compare whether authorization is performed, the authorization comparison module further reduces the possibility that the digital media is illegally copied, the authorization storage module stores authorized device information and a key, and the authorization storage module can effectively find out the belonged person and the belonged device of the key in subsequent comparison, the authorization feedback module is used to feed back whether authorization is successful, the authorization protection module is used to protect the authorized device information and the key information, and the authorization protection module greatly improves the protection of the device information and the key information, and provides better privacy protection for the purchaser and the sharee.
Compared with the prior art, the invention has the following advantages:
the invention greatly reduces the possibility that the digital media is illegally copied by people during sharing by arranging the multiple encryption system in the digital copyright management, avoids the copyright of the digital media from being damaged, greatly reduces the loss to a copyright holder and avoids the formation of psychological trauma of the copyright holder.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a functional diagram of a server terminal according to an embodiment of the present invention;
FIG. 2 is a functional diagram of a blockchain according to an embodiment of the present invention;
FIG. 3 is a functional diagram of a key generation system according to an embodiment of the present invention;
FIG. 4 is a functional diagram of a key parsing system according to an embodiment of the invention;
FIG. 5 is a functional diagram of a retrieval system in accordance with an embodiment of the present invention;
FIG. 6 is a functional diagram of a comparison system according to an embodiment of the present invention;
FIG. 7 is a functional diagram of a registration system in accordance with an embodiment of the present invention;
FIG. 8 is a functional diagram of a malware comparison system according to an embodiment of the present invention;
FIG. 9 is a functional diagram of a real-time monitoring system in accordance with an embodiment of the present invention;
FIG. 10 is a functional diagram of a sharing setup system according to an embodiment of the present invention;
FIG. 11 is a functional diagram of an authorization system in accordance with an embodiment of the present invention;
FIG. 12 is a functional diagram of a purge system in accordance with an embodiment of the present invention.
Detailed Description
The present invention will be described in detail below with reference to embodiments shown in the drawings. The embodiments are not intended to limit the present invention, and structural, methodological, or functional changes made by those skilled in the art according to the embodiments are included in the scope of the present invention.
The invention discloses a digital copyright management method based on block chain technology composite encryption, as shown in figures 1-3, a secret key generating system in S1 comprises a messy code generating module, a messy code extracting module, an equipment information extracting module, a secret key generating module and a secret key storage module, wherein the messy code generating module is used for generating a messy code which is twenty-four bytes and can not be repeated, the messy code which is twenty-four bytes and can not be repeated can improve the decoding difficulty of the messy code, the messy code is prevented from being decoded, the messy code can reflect the unicity of the file, one messy code corresponds to one file and corresponds to one buyer, a criminal suspect can be quickly found in case of real pirate occurrence, part loss is recovered, the messy code extracting module is used for extracting the generated messy code into the secret key storage module, the messy code extracting module can extract the messy code into the secret key storage module to be stored through the secret key storage module, the device information extraction module is used for extracting device information required by key generation into the key storage module, the device information extraction is necessary, a method for realizing one person for one device for one file can be realized by extracting the device information, the digital media can be independently monitored, the corresponding proper monitoring is carried out on the movement direction of the digital media, the key generation module is used for extracting messy codes and the device information in the key storage module, the key generation module is used for mixing the messy codes and the device information into keys, the key generation module can mix the messy codes and the device information into keys, the independent messy codes are used for mixing the independent device information, the uniqueness of the keys is more obvious, the single key is matched with the assistance of a key analysis system, the illegal copying probability is greatly reduced, and the copyright protection of the digital media is greatly enhanced, the secret key storage module is used for storing the extracted messy codes, the extracted equipment information and the generated secret key, the secret key storage module can be used for effectively storing the secret key, so that the subsequent comparison and the extraction during sharing are facilitated, the illegally copied secret key can be compared in the subsequent comparison, and the clearing system is used for clearing the illegally copied secret key.
Referring to fig. 3-6, the key decommissioning system in S2 includes a key scattering module, a key fusing module, a decommissioning storage module, and a key sorting module, the key scattering module is used for scattering and downloading the key into the purchaser device, the arrangement of the scattering module avoids the probability of extracting the complete key by a person with attention, the probability of copying the key is avoided, the possibility of illegally copying the digital media is greatly reduced, the key fusing module is used for combining the scattered modules, when the key needs to be compared and the key is detected to be modified, the key fusing module can completely retrieve and fuse the scattered data, the decommissioning storage module is used for scattering the key scattering module in sequence, the sequence of the data is more difficult to recover the illegally copied person after being disordered, and since the random scattering is achieved, the key fusing module can reorganize the data through the key sorting module, the data are recombined by recording the sequence of the scattered data, the secret key is prevented from being copied, and the secret key sorting module is used for recombining the data into the secret key according to the stored scattered sequence.
Referring to fig. 6 to 9, the retrieval system in S3 includes a retrieval storage module, a retrieval extraction module, a retrieval comparison module, and a retrieval information output module, the retrieval storage module is used to store information of all keys, the retrieval storage module can store information of all keys of purchasers, so as to be convenient for use in later period, and avoid possibility of key data loss, the retrieval extraction module is used to extract keys used in the retrieval, the retrieval extraction module can extract and merge keys scattered in purchasers' equipment in cooperation with a key parsing system, the retrieval comparison module is used to compare keys, copied information is retrieved by comparing the merged keys with all keys in the storage module, the retrieval information output module is used to feed back the retrieval information of this time, and the retrieved information is submitted to a block chain, the copied digital media and keys are purged through a block chain controlled purge system.
Referring to fig. 9-12, the comparison system in S3 includes a comparison storage module, a comparison extraction module, and a comparison information output module, where the comparison extraction module is configured to extract information of a device currently used by a purchaser, the comparison extraction module can extract information of the device currently used by the purchaser, and the comparison storage module is configured to store information of the device currently used by the purchaser and a comparison result, the device information extracted by the comparison extraction module is compared with original device information of the purchaser of a secret key in the comparison storage module, and if the comparison is successful, the comparison system is registered in a block chain, the comparison information output module is configured to feed back information of the comparison result to the server terminal, and the comparison information output module feeds back the information of the registration system.
Referring to fig. 1-12, in S3, the registration system includes an account generating module, a password generating module, a registration outputting module, and a password changing module, where the account generating module is configured to generate a random and unrepeated account, the account generating module generates a random and unrepeated account for a purchaser to log in, and browse surface layer information, and because the account is random and unrepeated and the account can be set independently with a password, all possibilities of theft are almost zero, so that the possibility of account theft is greatly reduced, even if the account is stolen, only the surface layer information can be browsed, and all these information will be emptied when the secret key is compared again subsequently, the password generating module is configured to generate a random and unrepeated password, the registration outputting module is configured to transmit the generated account password to a device of the purchaser, and the password changing module is configured to facilitate a user to change the password, the randomly generated password can be changed into a familiar password, so that the possibility of forgetting the password is avoided, and the possibility of stealing the account is avoided due to double protection of the random account number and the set password.
Referring to fig. 4-7, the real-time monitoring system in S5 includes a tamper key module, a basic file tamper module, a protection module, and a feedback module, the tamper key module is used to monitor whether the key is tampered, the setting of the tamper key module prevents malicious software from tampering the key, thereby ensuring rights and interests of purchasers, and simultaneously improving the security of digital media purchased by purchasers, the basic file tamper module is used to monitor whether the basic file is tampered, the basic file tamper module prevents basic file tampering, thereby ensuring the flow operation of digital media, the protection module is used to protect the key and the basic file, the setting of the protection module effectively protects the security of the key and the basic file, thereby avoiding the possibility that an illegal molecule maliciously modifies the key and the basic file, greatly reducing the probability of being unusable purchasers, and optimizing the use experience of purchasers, and the feedback module is used for feeding back the server terminal after the protection module is started.
Referring to fig. 1 to 5, the malicious software comparison system in S5 includes a software storage module, a software comparison module, a software scanning module, and a software comparison result output module, where the software storage module is used to store scanned malicious software information, the software storage module can continuously perform self-optimization, and at the same time, the software storage module can record all scanned malicious software and synchronize with all devices to avoid fish missing, the software comparison module is used to compare the stored software information with software in the purchaser device, the security in the purchaser device is optimized and the situation that secret key and basic file are attacked and tampered is avoided by the setting of the software comparison module, the software scanning module is used to scan hidden malicious software, and the software comparison result output module transmits the comparison result to the purchaser, the buyer can choose to uninstall the malicious software through the information fed back, thereby not only ensuring the digital media, but also ensuring the safety of other software and files in the equipment.
Referring to fig. 5 to 11, the sharing setting system in S6 includes a setting module, a sharing extracting module, a forced end sharing module, a sharing verifying module, an uploading module and a sharing storage module, the setting module is configured to set a shared person, set sharing time and set sharing content, the setting module optimizes user experience of a purchaser, sets content desired to be seen by an opposite party and content not desired to be seen by the opposite party by setting the shared person, setting sharing time and setting sharing content, optimizes privacy of the purchaser, the sharing extracting module is configured to extract device information of the shared person, the forced end sharing module is configured to end sharing of the content, the sharing verifying module is configured to verify device information and a secret key of the purchaser, the device information and the secret key can be prevented from being shared again by the shared person, and possibility of a group of copyright audiences is greatly reduced, the uploading module is used for uploading the device information of the shared person to a key generation system of the server terminal, the possibility of illegal copying from the shared person is avoided due to the arrangement of the uploading module, the key of the shared person is independent and protected even if the key is illegally copied, and the sharing storage module is used for storing the shared person and the time and content shared this time.
As shown in fig. 4-12, the authorization system in S6 includes an authorization comparison module, an authorization storage module, an authorization feedback module, and an authorization protection module, where the authorization comparison module is used to compare whether authorization is performed, the authorization comparison module further reduces the possibility of illegal copying of digital media, the authorization storage module stores authorized device information and a key, and meanwhile, the authorization storage module can effectively find out a belonged person and a belonged device of the key in subsequent comparison, the authorization feedback module is used to feedback whether authorization is successful, the authorization protection module is used to protect the authorized device information and the key information, and the authorization protection module greatly improves protection of the device information and the key information, and provides better privacy protection for purchasers and sharees.
Specifically, the clearing system in the S7 includes a clearing protection module, a clearing feedback module, a closing module, a clearing module and a forced clearing module, the clearing protection module is used for protecting the safe operation of the clearing module when the clearing module operates, the clearing protection module prevents the attack received when the clearing module operates, the clearing feedback module is used for feeding back whether the clearing module is cleared completely, the setting of the clearing feedback module prevents the digital media from leaving traces in the device, so that the security of the digital media is higher, the closing module is used for closing the malicious component, the closing module better protects the clearing module, the clearing module is prevented from being attacked, the forced clearing module is used for forced clearing, and when the digital media cannot be cleared, the forced clearing can be performed.
A digital copyright management method based on block chain technology composite encryption comprises the following steps:
s1, a purchaser generates a random and unrepeated messy code of twenty-four bytes from a website appointed by a server terminal or contents and resources purchased from software through a secret key generation system of the server terminal, and uploads the messy code and purchaser equipment information to a block chain through an uploading module in the server terminal;
s2, the block chain stores the information through a storage module and uploads the information to a server terminal through an uploading module, the server terminal generates secret keys through a secret key generation system by using the messy codes and the purchaser equipment information, the secret keys are synchronized to a computer of the purchaser along with downloading of the purchaser, the secret keys downloaded to the computer are scattered by a secret key analysis system in the server terminal, and the secret keys can only be fused through the information stored in the secret key analysis system;
s3, when a purchaser opens the purchase content, the server terminal fuses the secret keys through the secret key analysis system, the retrieval system retrieves whether the secret keys in purchaser equipment are repeated or not, the secret keys are synchronously uploaded to the block chain through the uploading module, the secret keys are compared through the comparison system, when the secret keys are successfully compared with the secret keys stored in the block chain storage module and the retrieval of the server terminal retrieval system is not repeated, the secret keys are registered in the block chain through the registration system, the secret keys are uploaded to the server terminal through the uploading module after the registration is successful, and then the purchaser can check the surface layer information of the purchase content;
s4, if the comparison is unsuccessful, sending an information prompt such as 'registration failure' to the purchaser, and providing a're-registration' option for the purchaser;
s5, when the purchaser loads the surface layer information, the purchaser can synchronously monitor through a real-time monitoring system in the block chain, and through continuous comparison with a malicious software comparison system in the server terminal, if the malicious software is found, the purchaser immediately stops checking, and the purchased content is automatically deleted through a clearing system, if the malicious software is not found, the retrieval system compares whether the secret key is falsified again, and if the secret key is not falsified, the deep layer information can be checked;
s6, if a certain part of the resource needs to be shared, a purchaser can apply for a sharing setting system in a block chain and set shared content, the sharing setting system can verify the equipment information and the secret key of the purchaser and upload the secret key of the purchaser to a server through an uploading module, the downloadable content set by the purchaser can be downloaded in an open mode through authorization of a server terminal authorization system, the equipment information of the sharee is extracted, the equipment information of the sharee and the secret key of the purchaser are synthesized through a secret key generation system to generate a new secret key, the information downloaded by the sharee is encrypted, and the information enters the equipment of the sharee through downloading of the sharee;
s7, the blockchain detects that the shared person tries to contact the unshared content through the real-time monitoring system, the shared person is warned, and the information is submitted to the device of the buyer, the buyer can monitor through the real-time monitoring system in the blockchain, the buyer can forcibly close the authority of the shared person through the sharing setting system in the blockchain, once the blockchain real-time monitoring system detects that the content loses the authority, the shared content is deleted through the clearing system, if the shared person tries to modify or crack the key by using malicious software, the real-time monitoring system in the blockchain notifies the buyer, the authority of the shared person is forcibly closed through the sharing setting system, and the shared content is automatically deleted.
According to the technical scheme, the invention has the following beneficial effects:
the invention greatly reduces the possibility that the digital media is illegally copied by people during sharing by arranging the multiple encryption system in the digital copyright management, avoids the copyright of the digital media from being infringed, and greatly reduces the loss to a copyright holder.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A digital copyright management method based on block chain technology composite encryption is characterized by comprising the following steps:
s1, the content and resource purchased by the purchaser from the website appointed by the server terminal or the software can generate random and unrepeated messy codes of twenty-four bytes through the secret key generating system of the server terminal, and the messy codes and the purchaser device information are uploaded to the block chain through the uploading module in the server terminal;
s2, the block chain stores the information through the storage module and uploads the information to the server terminal through the uploading module, the server terminal generates the secret keys through the secret key generation system by the messy codes and the equipment information of the purchaser, the secret keys are synchronized to the computer of the purchaser along with the downloading of the purchaser, the secret keys downloaded to the computer are scattered by the secret key analysis system in the server terminal, and the secret keys can only be fused through the information stored in the secret key analysis system;
s3, when a purchaser opens the purchase content, the server terminal fuses the keys through the key analysis system, the retrieval system retrieves whether the keys in the purchaser equipment are repeated, the keys are synchronously uploaded to the block chain through the uploading module, the keys are compared through the comparison system, when the keys are successfully compared with the keys stored in the block chain storage module and the retrieval of the server terminal retrieval system is not repeated, the keys are registered in the block chain through the registration system, the keys are uploaded to the server terminal through the uploading module after the registration is successful, and then the purchaser can check the surface layer information of the purchase content;
s4, if the comparison is unsuccessful, sending a message prompt such as 'registration failure' to the buyer, and providing the buyer with an option of're-registration';
s5, when the purchaser loads the surface layer information, the purchaser can synchronously monitor through the real-time monitoring system in the block chain, through the continuous comparison with the malicious software comparison system in the server terminal, if the malicious software is found, the purchaser stops checking immediately, and the purchased content is automatically deleted through the clearing system, if the malicious software is not found, the retrieval system compares whether the secret key is falsified again, and if the secret key is not falsified, the deep layer information can be checked;
s6, if a certain part of the resource needs to be shared, the buyer can apply for the sharing setting system in the blockchain and set the shared content, the sharing setting system can verify the device information and the key of the buyer and upload the key of the buyer to the server through the upload module, the downloadable content set by the buyer can be downloaded openly through the authorization of the server terminal authorization system, the device information of the sharee is extracted, the device information of the sharee and the key of the buyer are synthesized through the key generation system to generate a new key, the information downloaded by the sharee is encrypted, and the information enters the device of the sharee through the download of the sharee;
s7, the blockchain detects that the sharee tries to contact the unshared content through the real-time monitoring system, then the blockchain warns the sharee and submits the information to the buyer' S equipment, the buyer can monitor through the real-time monitoring system in the blockchain, the buyer can forcibly close the authority of the sharee through the sharing setting system in the blockchain, once the blockchain real-time monitoring system detects that the content loses the authority, the shared content can be deleted through the clearing system, if the sharee tries to modify or crack the secret key by using malicious software, the real-time monitoring system in the blockchain notifies the buyer, forcibly closes the authority of the sharee through the sharing setting system, and the shared content is automatically deleted.
2. The method of claim 1, wherein the digital rights management method is based on block chain technology composite encryption, the system for generating the secret key in the S1 is characterized by comprising a messy code generating module, a messy code extracting module, an equipment information extracting module, a secret key generating module and a secret key storing module, the messy code generating module is used for generating a messy code which is twenty-four bytes and can not be repeated, the messy code extracting module is used for extracting the generated messy code to the secret key storage module, the device information extraction module is used for extracting device information required by key generation into the key storage module, the secret key generation module is used for extracting the messy codes and the equipment information in the secret key storage module, the secret key generation module is used for mixing the messy codes and the equipment information into a secret key, the key storage module is used for storing the extracted messy codes, the extracted equipment information and the generated key.
3. The digital rights management method based on block chain technology composite encryption of claim 1, wherein the key decommissioning system in S2 includes a key scattering module, a key fusion module, a decommissioning storage module and a key sorting module, the key scattering module is used for scattering and downloading keys into a purchaser device, the key fusion module is used for combining the scattered modules, the decommissioning storage module is used for storing scattering sequences of the key scattering module, and the key sorting module is used for recombining keys according to the stored scattering sequences.
4. The method according to claim 1, wherein the retrieval system in S3 includes a retrieval storage module, a retrieval extraction module, a retrieval comparison module, and a retrieval information output module, the retrieval storage module is configured to store information of all keys, the retrieval extraction module is configured to extract keys used for the retrieval, the retrieval comparison module is configured to compare the keys, and the retrieval information output module is configured to feed back the retrieved information.
5. The method according to claim 1, wherein the comparison system in S3 includes a comparison storage module, a comparison extraction module and a comparison information output module, the comparison extraction module is configured to extract information of a device currently used by the purchaser, the comparison storage module is configured to store information of the device currently used by the purchaser and a comparison result, and the comparison information output module is configured to feed back information of the comparison result to the server terminal.
6. The method for digital rights management based on blockchain technology composite encryption of claim 4, wherein the registration system in S3 includes an account generation module, a password generation module, a registration output module and a password modification module, the account generation module is configured to generate a random and non-repeating account, the password generation module is configured to generate a random and non-repeating password, the registration output module is configured to transmit the generated account password to a purchaser' S device, and the password modification module is configured to facilitate a user to modify a password.
7. The method according to claim 1, wherein the real-time monitoring system in S5 includes a tamper key module, a base file tamper module, a protection module, and a feedback module, the tamper key module is used for monitoring whether a key is tampered, the base file tamper module is used for monitoring whether a base file is tampered, the protection module is used for protecting the key and the base file, and the feedback module is used for feeding back the protection module to the server terminal after the protection module is started.
8. The method as claimed in claim 1, wherein the malicious software comparison system in S5 comprises a software storage module for storing the scanned malicious software information, a software comparison module for comparing the stored software information with software in a device of the purchaser, a software scanning module for scanning out hidden malicious software, and a software comparison result output module for transmitting the comparison result to the purchaser.
9. The method according to claim 1, wherein the share setting system in S6 includes a setting module, a share extracting module, a forced end sharing module, a share verifying module, an uploading module, and a share storage module, the setting module is configured to set a shared person, set sharing time, and set shared content, the share extracting module is configured to extract device information of the shared person, the forced end sharing module is configured to end sharing of content, the share verifying module is configured to verify device information and a key of a purchaser, the uploading module is configured to upload the device information of the shared person to a key generating system of a server terminal, and the share storage module is configured to store the shared person and the time and content shared this time.
10. The method according to claim 1, wherein the authorization system in S6 includes an authorization comparison module, an authorization storage module, an authorization feedback module, and an authorization protection module, the authorization comparison module is used to compare whether authorization is performed, the authorization storage module stores authorized device information and a key, the authorization feedback module is used to feedback whether authorization is successful, and the authorization protection module is used to protect the authorized device information and the key information.
CN202010890414.1A 2020-08-29 2020-08-29 Digital copyright management method based on block chain technology composite encryption Withdrawn CN112073489A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010890414.1A CN112073489A (en) 2020-08-29 2020-08-29 Digital copyright management method based on block chain technology composite encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010890414.1A CN112073489A (en) 2020-08-29 2020-08-29 Digital copyright management method based on block chain technology composite encryption

Publications (1)

Publication Number Publication Date
CN112073489A true CN112073489A (en) 2020-12-11

Family

ID=73659210

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010890414.1A Withdrawn CN112073489A (en) 2020-08-29 2020-08-29 Digital copyright management method based on block chain technology composite encryption

Country Status (1)

Country Link
CN (1) CN112073489A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112613946A (en) * 2020-12-24 2021-04-06 哈尔滨理工大学 Transaction platform and transaction method based on Ether house motor data set file

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112613946A (en) * 2020-12-24 2021-04-06 哈尔滨理工大学 Transaction platform and transaction method based on Ether house motor data set file

Similar Documents

Publication Publication Date Title
US10769252B2 (en) Method and apparatus for watermarking of digital content, method for extracting information
USRE47313E1 (en) Securing digital content system and method
US8909924B2 (en) Digital asset management system
US20200226233A1 (en) Distributed ledger-based digital content piracy deterrence
CN111859422A (en) Digital asset deposit certificate system based on block chain
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
CN102891754B (en) Method and device for protecting network digital multimedia copyright
US8359657B2 (en) Method and apparatus for enabling secure distribution of digital content
US20060149683A1 (en) User terminal for receiving license
US20090037388A1 (en) Network-based content distribution system
KR20060002755A (en) Distribution and rights management of digital content
CN109151506B (en) Method, system and server for operating video file
CN102867515A (en) Method for authenticating digital audio copyright through digital watermarking
WO2001061913A9 (en) Network-based content distribution system
EP3100193A1 (en) Using a security feature with a digital image file
CN103971033A (en) Digital rights management method for solving problem of illegal copying
CN105740725A (en) File protection method and system
CN102004890B (en) Network environment-based universal digital copyright protection method
US20120109784A1 (en) Method and system for automating protection of media files for download
CN112073489A (en) Digital copyright management method based on block chain technology composite encryption
CN104866736B (en) The system for numeral copyright management and method of a kind of non-proliferation
US20120284522A1 (en) Method and System for Securing Multimedia Data Streamed Over a Network
CN108076352B (en) Video anti-theft method and system
CN107392050B (en) System and method for realizing burning after printing of electronic supervision code
CN115277093A (en) Tamper verification method, system and device thereof and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201211