CN113221160A - Method and system for sharing data and protecting electronic data copyright - Google Patents

Method and system for sharing data and protecting electronic data copyright Download PDF

Info

Publication number
CN113221160A
CN113221160A CN202110424062.5A CN202110424062A CN113221160A CN 113221160 A CN113221160 A CN 113221160A CN 202110424062 A CN202110424062 A CN 202110424062A CN 113221160 A CN113221160 A CN 113221160A
Authority
CN
China
Prior art keywords
data
user
file
information
uploaded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110424062.5A
Other languages
Chinese (zh)
Inventor
时鹏
贺鸣
章立军
张卫冬
蒋立武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology Beijing USTB
Original Assignee
University of Science and Technology Beijing USTB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology Beijing USTB filed Critical University of Science and Technology Beijing USTB
Priority to CN202110424062.5A priority Critical patent/CN113221160A/en
Publication of CN113221160A publication Critical patent/CN113221160A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method and a system for sharing data and protecting electronic data copyright, wherein the method comprises the following steps: saving the data file uploaded by the user by adopting a distributed database file storage mode; the method for storing the user information and the basic information of the data file by adopting a data information storage mode based on a block chain comprises the following steps: verifying the identity of a user when an uplink request of the user is received, performing duplicate checking detection on data information uploaded by the user after the user passes the verification, and adding the data uploaded by the user to a block chain if the user passes the detection; checking the duplicate of the data file after chaining, and carrying out sealing treatment on the data or the user corresponding to the data file with the plagiarism problem; and feeding back a query result to the user if the data to be queried by the user is the data uploaded by the user aiming at the query request of the user. The invention can safely store the electronic data in the network and provide copyright certification for the data.

Description

Method and system for sharing data and protecting electronic data copyright
Technical Field
The invention relates to the technical field of electronic data copyright protection, in particular to a method and a system for sharing data and protecting electronic data copyright.
Background
The scientific data is data generated and accumulated by human beings in the activities of understanding nature and developing science and technology, is the knowledge accumulation of human beings in long-term scientific activities, and is important basic resources and strategic resources. However, as the problem of data leakage becomes more and more serious in recent years, cases of data leakage are increasing, and data protection, especially protection of scientific data, is getting more and more attention from academia and society.
Although the traditional copyright protection system provides an online registration service, the centralized copyright protection mode has difficulty meeting the requirement of copyright protection in the digital age. In conventional copyright protection systems, the copyright owner needs to submit a data file and descriptive information to a centralized system. Once the system is attacked, the data leakage and the information arbitrary tampering can be caused, and the whole system can be crashed. Moreover, traditional copyright protection systems do not provide strong evidence for the interests of the scientific data owners. That is, conventional digital evidence is difficult to be strong evidence for protecting the rights and interests of the data owner when the electronic data of the data owner is stolen. The technical characteristics of the block chain can well solve the problems.
At present, the existing block chain-based electronic data copyright protection system is mainly used for preventing data theft and tampering, and most of them only perform identity limitation on data uplink, but allow the accessed node to view the data on the chain at will. In this way, although specific data on the chain is not easily tampered, the private data information of the scientific data cannot be well protected. In addition, at present, when the existing blockchain platform releases data, there is no other special uploading restriction except for user authentication, and an authorized user can arbitrarily upload data onto a chain. However, due to the particularity of the field of copyright protection, the problem that the data on the chain has plagiarism is avoided, and basic information of some scientific data with higher requirement on security is ensured to be invisible. Moreover, due to the technical characteristics that data on the blockchain is difficult to change once written, the error data or plagiarism data on the chain is difficult to process correspondingly.
Disclosure of Invention
The invention provides a method and a system for sharing data and protecting electronic data copyright, which aim to solve the technical problems that electronic evidence is easy to be tampered and stolen and privacy is easy to be revealed in the existing data storage technology.
In order to solve the technical problems, the invention provides the following technical scheme:
in one aspect, the present invention provides a method for sharing data and protecting electronic data copyright, comprising:
saving the data file uploaded by the user by adopting a distributed database file storage mode;
the method for storing the user information and the file information corresponding to the data file by adopting a data information storage mode based on the block chain comprises the following steps: receiving uplink request information of a user, wherein the uplink request information comprises user information and file information corresponding to a data file; verifying the identity of the current user according to the user information, after the identity of the current user passes the verification, performing duplicate checking detection on the file information uploaded by the current user, and if the duplicate checking detection passes, adding the user information and the file information uploaded by the current user to a block chain;
receiving query request information of a user, wherein the query request information comprises user information and data to be queried;
and verifying the identity of the current user according to the user information, and if the data to be inquired is the data uploaded by the current user, feeding the inquiry result of the data to be inquired back to the current user.
Further, the step of saving the data file uploaded by the user in the distributed database file storage mode includes:
receiving upload request information of a user, wherein the upload request information comprises a data file to be uploaded;
and storing the data file uploaded by the user in the distributed database, and returning the hash value of the data file.
Further, the user information comprises an identification ID of the user;
the file information comprises descriptive information and a hash value corresponding to the data file.
Further, the performing duplicate checking detection on the file information uploaded by the current user, and if the duplicate checking detection is passed, adding the user information and the file information uploaded by the current user to the block chain includes:
carrying out duplicate checking comparison on the file information uploaded by the current user and the existing file information in the block chain; when the duplicate checking comparison is carried out, the two pieces of file information which are compared respectively belong to different users;
if the repetition rate of the file information uploaded by the current user and any file information existing in the block chain exceeds a first repetition rate threshold, rejecting an uplink request of the current user; and if the repetition rate does not exceed the first repetition rate threshold, adding the user information and the file information uploaded by the current user to a block chain.
Further, after performing duplicate checking detection on the file information uploaded by the current user, and after the duplicate checking detection passes and adding the user information and the file information uploaded by the current user to the block chain, the method further includes:
according to the hash value, taking out a corresponding data file from the distributed database;
comparing the extracted data file with the existing data file in the distributed database; when the duplicate checking comparison is carried out, the two compared data files respectively belong to different users;
and if the duplicate checking result of the current data file is greater than the second repetition rate threshold value, manually detecting the current data file, and if the current data file is confirmed to have the plagiarism problem, carrying out blocking processing on file information corresponding to the current data file stored on the block chain or an uploading user of the current file according to the plagiarism severity degree.
Further, the blocking processing of file information corresponding to the current data file stored on the block chain or an uploading user of the current file according to the plagiarism severity includes:
grading the plagiarism severity of the data file;
and if the plagiarism severity of the current data file exceeds a preset grade threshold, carrying out the block processing on the uploading user of the current data file, and if the plagiarism severity of the current data file does not exceed the grade threshold, carrying out the block processing on the file information which is stored on the block chain and corresponds to the current data file.
Further, the blocking process includes:
and adding a record to the block chain to indicate that the corresponding user or data is forbidden, and refusing to provide corresponding copyright protection service for the forbidden data uploading user and the forbidden user.
Further, when the data or the user is forbidden, the new data is not subjected to duplicate checking comparison on the forbidden data during uploading.
Further, the method further comprises:
all operations are pre-written into the intelligent contract of the blockchain to achieve operation marking.
In another aspect, the present invention further provides a system for sharing data and protecting electronic data copyright, including:
the data file storage module based on the distributed database is used for storing the data file uploaded by the user in a distributed database file storage mode;
the data information storage module based on the block chain is used for storing user information and file information corresponding to the data file by adopting a data information storage mode based on the block chain, and comprises: receiving uplink request information of a user, wherein the uplink request information comprises user information and file information corresponding to a data file; verifying the identity of the current user according to the user information, after the identity of the current user passes the verification, performing duplicate checking detection on the file information uploaded by the current user, and if the duplicate checking detection passes, adding the user information and the file information uploaded by the current user to a block chain;
the query module is used for receiving query request information of a user, wherein the query request information comprises user information and data to be queried; and verifying the identity of the current user according to the user information, and if the data to be inquired is the data uploaded by the current user, feeding back the inquiry result of the data to be inquired to the current user.
In yet another aspect, the present invention also provides an electronic device comprising a processor and a memory; wherein the memory has stored therein at least one instruction that is loaded and executed by the processor to implement the above-described method.
In yet another aspect, the present invention also provides a computer-readable storage medium having at least one instruction stored therein, the instruction being loaded and executed by a processor to implement the above method.
The technical scheme provided by the invention has the beneficial effects that at least:
the technical scheme of the invention is suitable for electronic data sharing and electronic data copyright protection, and can protect the private information of a user and the uploaded file information from being randomly checked by others; whether the data uploaded by the user has the data plagiarism problem or not can be detected in time, corresponding forbidden processing is carried out on the plagiarism data on the premise that the data is not deleted when the data plagiarism problem is detected, the phenomenon that the data uploaded by the user has no data plagiarism phenomenon is ensured, and the data uploaded by the user cannot be maliciously deleted by a third party. The electronic copyright monitoring and protecting level can be improved, the safety of the electronic copyright is greatly improved, the problem of scientific data leakage is effectively prevented, the piracy phenomenon is prevented, and the legal rights and interests of copyright owners are protected to the maximum extent.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of a method for sharing data and protecting electronic data copyright according to an embodiment of the present invention;
FIG. 2 is a flow chart of secure storage of data information and data files provided by an embodiment of the present invention;
fig. 3 is a flowchart of content monitoring in a linked and distributed database according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
First embodiment
Aiming at the technical problems that electronic data is easy to be tampered and stolen and privacy is easy to be revealed in the existing data storage technology, the embodiment provides a method for sharing data and protecting electronic data copyright according to the difficulty in the field of electronic copyright protection, a complete data protection mode is established, a mode of combining block chain storage and off-chain storage is adopted, namely a specific data file is stored in a distributed storage system outside a block chain, and file basic information and a data file hash value are stored in the block chain. Therefore, the method and the device protect the privacy information of the scientific data, ensure that the data on the block chain has no problem of data plagiarism, and process the plagiarism data on the premise of not deleting the data. The specific data file is not stored in the block chain, but is stored outside the chain, and only the hash value of the data file and the data descriptive information are stored in the block chain. The problems of low storage efficiency and high cost of the block chain are solved to a great extent.
Specifically, the execution flow of the method is shown in fig. 1, and includes the following steps:
s101, saving a data file uploaded by a user by adopting a distributed database file storage mode;
it should be noted that, after the electronic works are completed, the corresponding authors may issue information in the electronic copyright network, and the authors may upload specific data files to the secure distributed file database after authorization. The realization process is as follows: the system receives the uploading request information of the user; the uploading request information comprises a data file to be uploaded by a user; and then, according to the uploading request of the user, encrypting and storing the data file uploaded by the corresponding user into a preset distributed database, and returning the hash value of the data file.
S102, saving user information and file information corresponding to the data file by adopting a data information storage mode based on a block chain, wherein the method comprises the following steps: receiving uplink request information of a user; the uplink request information comprises user information and file information corresponding to the data file; verifying the identity of the current user according to the user information, after the identity of the current user passes the verification, performing duplicate checking detection on the file information uploaded by the current user, and if the duplicate checking detection passes, adding the user information and the file information uploaded by the current user to the block chain;
it should be noted that, the above steps are to package the electronic copyright by using a block chain technique, and an authorized copyright owner possesses the write and read permissions of the block corresponding to the copyright, that is, a copyright author can use a key provided by the system to write data information into the information in the block chain and the read block chain. When the information is read, only the data information uploaded by the user can be checked, but the data information uploaded by other users cannot be checked; the block body contains data information corresponding to the electronic copyright and all copyright change records and time stamps which are generated in the block creating process and are verified. And when determining that the uplink request of the user is a legal request, setting an authorization relationship between the authorized object information and the certificate storing identification. The user information comprises an identity ID of a user; the user can obtain the ID of the user after authorization, and when the user uploads information to the block chain, the ID of the user can be used as a key word to be stored in the block chain. When querying the information in the blockchain, the correct ID is also provided to query the corresponding data. The authentication in this embodiment is to authenticate the user ID, and search for the corresponding public and private key file through the ID. The file information includes descriptive information and hash values corresponding to the data files.
Specifically, in this embodiment, performing duplicate checking detection on file information uploaded by a current user, and if the duplicate checking detection passes, adding the user information and the file information uploaded by the current user to a block chain, including:
carrying out duplicate checking comparison on the file information uploaded by the current user and the existing file information in the block chain; when the duplicate checking comparison is carried out, the two pieces of file information which are compared respectively belong to different users; that is, duplicate checking detection is only carried out among different users, so that the users can update the versions of the data information uploaded before the users;
if the repetition rate of the file information uploaded by the current user and any file information existing in the block chain exceeds a first repetition rate threshold, rejecting an uplink request of the current user; and if the repetition rate does not exceed the first repetition rate threshold, adding the user information and the file information uploaded by the current user to the block chain.
S103, after adding the user information and the file information uploaded by the current user to the block chain, taking out the corresponding data file from the distributed database according to the hash value of the file uploaded by the user; using duplication checking software to compare the extracted data file with the existing data file in the distributed database; when the duplicate checking is carried out, the two compared data files respectively belong to different users; if the duplicate checking result of the current data file is larger than the second repetition rate threshold value, the current data file is sent to a worker for further detection, and if the current data file is confirmed to have a plagiarism problem, file information corresponding to the current data file and stored on the block chain or an uploading user of the current file is subjected to sealing treatment according to the plagiarism severity;
it should be noted that the combination of S102 and S103 can implement upload detection of copyrighted work; the method comprises the steps of S102, detection of file information before data chaining (realized by an intelligent contract and automatically executed after a user sends a data information chaining request), and S103, detection of data files after data chaining, wherein the uploaded data files can be guaranteed to have no data plagiarism problem by a method combining the two detection modes.
Because the content of the specific data file is checked for duplication for a long time, the duplication checking of the data file is not performed during uplink. Therefore, the data on the link is ensured to have no data plagiarism problem, and the speed of data chaining is also ensured.
The method for carrying out block chain copying on the current data file comprises the following steps of:
grading the plagiarism severity of the data file;
if the plagiarism severity of the current data file exceeds a preset grade threshold, carrying out blocking processing on an uploading user of the current data file, refusing to accept the uploading request after the user accepts the uploading request, and considering the uploaded data as invalid; and if the plagiarism severity of the current data file does not exceed the grade threshold, carrying out sealing treatment on file information which is stored on the block chain and corresponds to the current data file.
The block chain is a block chain, and the block chain is a block chain with a block number, wherein the block chain is a block chain with a block number, and the block chain is a block chain with a block number. The method comprises the steps of adding a record to a block chain, indicating that corresponding users or data are forbidden, and refusing to provide corresponding copyright protection services for users uploading the forbidden data and the forbidden users. Namely, the operation of the blocking processing is written into the intelligent contract, and the blocking operation executed by the system is recorded on the block chain. The authorized user can check the forbidden user ID and data, so that the behavior of deleting the user data maliciously by a third party can be effectively avoided. In addition, when the data or the user is forbidden, the new data cannot be checked for duplication during uploading, so that the problem that the real data owner cannot upload own data is avoided, and the speed of the new data during uplink cannot be influenced.
S104, receiving query request information of a user; the query request information comprises user information and data to be queried; and verifying the identity of the current user according to the user information, and if the data to be inquired is the data uploaded by the current user, feeding the inquiry result of the data to be inquired back to the current user.
It should be noted that, the above steps are to ensure that the user can only view the data information uploaded by the user, but cannot view the data information uploaded by other users, so as to protect the private data of the user. After the user identity authentication is passed, the historical data information issued by the user and the blocking information of the user and the data can be inquired.
Further, the method of this embodiment may further include:
all operations of a user and a system are written into an intelligent contract of a block chain in advance, namely when the user or the system executes the operations, the operations are written into the block chain as records, so that operation marks are realized, and a third party is prevented from maliciously deleting and tampering the data file of the user.
In summary, the present embodiment provides a method for sharing data and protecting electronic data copyright based on the block chain technology, which can prevent the data plagiarism problem on the chain, protect private data information, and process the data that is in error or suspected plagiarism on the chain without deleting or changing the data on the chain. Therefore, a set of safe data sharing and electronic data copyright protection system is constructed. Based on the above, the system can be roughly divided into two parts, wherein the first part mainly comprises the safe storage of data information and data files, including uploading data files, chaining data basic information and querying and releasing data history records. The second part is mainly used for monitoring the contents in the chain and distributed databases, including data file duplicate checking, data sealing and user ID sealing.
Specifically, the secure storage of the data information and the data file is shown in fig. 2, and the flow thereof is as follows:
(1) the data file provided by the user is uploaded to the distributed file database through the interface, the distributed file database encrypts the data file uploaded by the user and returns the hash value of the data file to the user, and the data hash value is used for subsequent data chaining.
(2) And the user sends the data uplink request to the blockchain network through the interface by using the file hash value returned by the distributed file database, the user ID of the user and the basic information of the data file.
(3) The blockchain network first looks up a corresponding private key file according to a user ID provided by a user to verify the user identity.
(4) If the user identity authentication is passed, calling an intelligent contract to carry out data information duplication checking on the data to be linked and the existing data on the chain, and checking whether the data information input by the user has the problem of overhigh repetition rate with the existing data information on the chain. And if the repetition rate is too high, rejecting the uplink request of the user.
(5) If the duplicate checking passes, a corresponding time stamp is generated and successfully saved on the block chain together with the data information.
(6) When a user needs to check the data on the link, the user ID is used for searching, the block link network searches a corresponding private key file according to the user ID input by the user, and if the identity verification is passed, the historical record of the data information issued by the user ID and a corresponding timestamp can be obtained.
The mode of combining the on-chain storage and the off-chain storage is adopted, so that the problems of low storage efficiency and insufficient storage space on the block chain are effectively relieved. The private data of the user is effectively protected from being freely viewed through the limitation of uploading and inquiring. The duplicate checking during the chain linking can effectively avoid the suspected plagiarism data on the chain before the data chain linking.
The monitoring of the content on the chain and in the distributed database is shown in fig. 3, and the flow is as follows:
(1) and downloading the corresponding data files from the distributed file database according to the user ID classification.
(2) The data files are classified according to different user IDs and the repetition rate of the content of the data files is calculated by using duplication checking software. And then, further manually detecting the data files with high repetition rate according to the duplicate checking result. If a data file is detected to have a data plagiarism problem, the data or user ID will be disabled based on the severity of the plagiarism.
(3) If the plagiarism degree is relatively light, the plagiarism data is forbidden, and if the plagiarism degree is relatively serious, the user ID of the data is directly forbidden to be issued.
The operation of the seal data is written into the intelligent contract in advance, if the seal data is needed, the intelligent contract is called to add a record into the block chain to indicate that the data is sealed, and when a user inquires the data, the data can be indicated to be marked as invalid. And when new data is uploaded and checked for duplication, the data does not participate in the duplication checking process. Therefore, the problem that the real data owner cannot upload own data can be avoided.
The operation of blocking the user ID is also written into the intelligent contract in advance, if the user needs to be blocked, the intelligent contract is called to add a record into the blockchain network to indicate that the user ID is blocked, and if the user ID is blocked, the blockchain network can refuse the uploading and inquiring request from the user ID. And other authorized users can also view all blocked user IDs by providing the correct user ID.
And the problem of plagiarism in the system is further avoided by blocking the error data or plagiarism data on the chain in time. And the operation of the sealed data and the user account can be uploaded to the block chain as records to be stored, so that the problem that a third party privately tampers and deletes the data randomly is avoided.
In summary, in this embodiment, a block chain technology is used to encapsulate an electronic copyright, a safe data sharing and copyright protection method is provided based on a block chain, and processing of erroneous data or suspected plagiarism data is implemented on the premise that data information is not deleted according to the technical characteristics of the block chain. Therefore, the electronic copyright supervision and protection level is improved, the safety of the electronic copyright is greatly improved, the problem of scientific data leakage is effectively prevented, the piracy phenomenon is favorably prevented, and the legal rights and interests of copyright owners are protected to the maximum extent.
Second embodiment
The embodiment provides a system for sharing data and protecting electronic data copyright, which comprises the following modules:
the data file storage module based on the distributed database is used for storing the data file uploaded by the user in a distributed database file storage mode;
the data information storage module based on the block chain is used for storing user information and file information corresponding to the data file by adopting a data information storage mode based on the block chain, and comprises: receiving uplink request information of a user, wherein the uplink request information comprises user information and file information corresponding to a data file; verifying the identity of the current user according to the user information, after the identity of the current user passes the verification, performing duplicate checking detection on the file information uploaded by the current user, and if the duplicate checking detection passes, adding the user information and the file information uploaded by the current user to a block chain;
the query module is used for receiving query request information of a user, wherein the query request information comprises user information and data to be queried; and verifying the identity of the current user according to the user information, and if the data to be inquired is the data uploaded by the current user, feeding back the inquiry result of the data to be inquired to the current user.
The system for sharing and protecting electronic data copyrights of the present embodiment corresponds to the method for sharing and protecting electronic data copyrights of the first embodiment described above; the functions realized by the functional modules in the system for sharing and protecting electronic data copyright of the embodiment correspond to the flow steps in the method for sharing and protecting electronic data copyright of the first embodiment one by one; therefore, it is not described herein.
Third embodiment
The present embodiment provides an electronic device, which includes a processor and a memory; wherein the memory has stored therein at least one instruction that is loaded and executed by the processor to implement the method of the first embodiment.
The electronic device may have a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) and one or more memories, where at least one instruction is stored in the memory, and the instruction is loaded by the processor and executes the method.
Fourth embodiment
The present embodiment provides a computer-readable storage medium, in which at least one instruction is stored, and the instruction is loaded and executed by a processor to implement the method of the first embodiment. The computer readable storage medium may be, among others, ROM, random access memory, CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like. The instructions stored therein may be loaded by a processor in the terminal and perform the above-described method.
Furthermore, it should be noted that the present invention may be provided as a method, apparatus or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media having computer-usable program code embodied in the medium.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
Finally, it should be noted that while the above describes a preferred embodiment of the invention, it will be appreciated by those skilled in the art that, once the basic inventive concepts have been learned, numerous changes and modifications may be made without departing from the principles of the invention, which shall be deemed to be within the scope of the invention. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.

Claims (10)

1. A method for sharing data and protecting electronic data copyrights, comprising:
saving the data file uploaded by the user by adopting a distributed database file storage mode;
the method for storing the user information and the file information corresponding to the data file by adopting a data information storage mode based on the block chain comprises the following steps: receiving uplink request information of a user, wherein the uplink request information comprises user information and file information corresponding to a data file; verifying the identity of the current user according to the user information, after the identity of the current user passes the verification, performing duplicate checking detection on the file information uploaded by the current user, and if the duplicate checking detection passes, adding the user information and the file information uploaded by the current user to a block chain;
receiving query request information of a user, wherein the query request information comprises user information and data to be queried;
and verifying the identity of the current user according to the user information, and if the data to be inquired is the data uploaded by the current user, feeding the inquiry result of the data to be inquired back to the current user.
2. The method for data sharing and electronic data copyright protection as claimed in claim 1, wherein the saving of the data file uploaded by the user in the distributed database file storage mode comprises:
receiving upload request information of a user, wherein the upload request information comprises a data file to be uploaded;
and storing the data file uploaded by the user in the distributed database, and returning the hash value of the data file.
3. A method for sharing and protecting electronic data rights according to claim 2, wherein the user information includes an identification ID of the user;
the file information comprises descriptive information and a hash value corresponding to the data file.
4. The method for data sharing and electronic data copyright protection according to claim 3, wherein the performing duplicate checking detection on the file information uploaded by the current user, and if the duplicate checking detection is passed, adding the user information and the file information uploaded by the current user to a block chain comprises:
carrying out duplicate checking comparison on the file information uploaded by the current user and the existing file information in the block chain; when the duplicate checking comparison is carried out, the two pieces of file information which are compared respectively belong to different users;
if the repetition rate of the file information uploaded by the current user and any file information existing in the block chain exceeds a first repetition rate threshold, rejecting an uplink request of the current user; and if the repetition rate does not exceed the first repetition rate threshold, adding the user information and the file information uploaded by the current user to a block chain.
5. The method for data sharing and electronic data copyright protection according to claim 4, wherein after performing duplicate checking detection on the file information uploaded by the current user and adding the user information and the file information uploaded by the current user to the block chain by the duplicate checking detection, the method further comprises:
according to the hash value, taking out a corresponding data file from the distributed database;
comparing the extracted data file with the existing data file in the distributed database; when the duplicate checking comparison is carried out, the two compared data files respectively belong to different users;
and if the duplicate checking result of the current data file is greater than the second repetition rate threshold value, manually detecting the current data file, and if the current data file is confirmed to have the plagiarism problem, carrying out blocking processing on file information corresponding to the current data file stored on the block chain or an uploading user of the current file according to the plagiarism severity degree.
6. The method for data sharing and electronic data copyright protection according to claim 5, wherein the blocking process of the file information corresponding to the current data file stored on the block chain or the uploading user of the current file according to the plagiarism severity degree comprises:
grading the plagiarism severity of the data file;
and if the plagiarism severity of the current data file exceeds a preset grade threshold, carrying out the block processing on the uploading user of the current data file, and if the plagiarism severity of the current data file does not exceed the grade threshold, carrying out the block processing on the file information which is stored on the block chain and corresponds to the current data file.
7. The method for data sharing and electronic data copyright protection according to claim 6, wherein the blocking process includes:
and adding a record to the block chain to indicate that the corresponding user or data is forbidden, and refusing to provide corresponding copyright protection service for the forbidden data uploading user and the forbidden user.
8. The method for data sharing and electronic data copyright protection of claim 7, wherein when the data or the user is blocked, the new data is uploaded without performing a duplicate comparison on the blocked data.
9. A method for data sharing and protection of electronic data copyrights according to any of claims 1-8, further comprising:
all operations are pre-written into the intelligent contract of the blockchain to achieve operation marking.
10. A system for sharing data and protecting electronic data copyrights, comprising:
the data file storage module based on the distributed database is used for storing the data file uploaded by the user in a distributed database file storage mode;
the data information storage module based on the block chain is used for storing user information and file information corresponding to the data file by adopting a data information storage mode based on the block chain, and comprises: receiving uplink request information of a user, wherein the uplink request information comprises user information and file information corresponding to a data file; verifying the identity of the current user according to the user information, after the identity of the current user passes the verification, performing duplicate checking detection on the file information uploaded by the current user, and if the duplicate checking detection passes, adding the user information and the file information uploaded by the current user to a block chain;
the query module is used for receiving query request information of a user, wherein the query request information comprises user information and data to be queried; and verifying the identity of the current user according to the user information, and if the data to be inquired is the data uploaded by the current user, feeding back the inquiry result of the data to be inquired to the current user.
CN202110424062.5A 2021-04-20 2021-04-20 Method and system for sharing data and protecting electronic data copyright Pending CN113221160A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110424062.5A CN113221160A (en) 2021-04-20 2021-04-20 Method and system for sharing data and protecting electronic data copyright

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110424062.5A CN113221160A (en) 2021-04-20 2021-04-20 Method and system for sharing data and protecting electronic data copyright

Publications (1)

Publication Number Publication Date
CN113221160A true CN113221160A (en) 2021-08-06

Family

ID=77088014

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110424062.5A Pending CN113221160A (en) 2021-04-20 2021-04-20 Method and system for sharing data and protecting electronic data copyright

Country Status (1)

Country Link
CN (1) CN113221160A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635521A (en) * 2018-12-06 2019-04-16 中链科技有限公司 A kind of copyright protection based on block chain, verification method and device
CN111460395A (en) * 2020-04-03 2020-07-28 北京邮电大学 Shared data storage and copyright protection tracing method and system
CN111538963A (en) * 2020-04-29 2020-08-14 铭数科技(青岛)有限公司 Block chain copyright protection system and method based on double chains

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635521A (en) * 2018-12-06 2019-04-16 中链科技有限公司 A kind of copyright protection based on block chain, verification method and device
CN111460395A (en) * 2020-04-03 2020-07-28 北京邮电大学 Shared data storage and copyright protection tracing method and system
CN111538963A (en) * 2020-04-29 2020-08-14 铭数科技(青岛)有限公司 Block chain copyright protection system and method based on double chains

Similar Documents

Publication Publication Date Title
US8769296B2 (en) Software signature tracking
JP2019530109A (en) Dynamic access control on blockchain
US8769675B2 (en) Clock roll forward detection
CN101371490A (en) Methods and apparatus for implementing context-dependent file security
CN111046346A (en) Book copyright protection platform based on block chain, equipment and medium
CN101482887A (en) Anti-tamper verification method for key data in database
CN103632080A (en) Mobile data application safety protection system and mobile data application safety protection method based on USBKey
TW200529016A (en) Method for ensuring the integrity of a data record set
CN111581659B (en) Method and device for calling electronic evidence
CN111125776A (en) Operation data tamper-proofing method based on block chain
CN113962787A (en) Safety protection method for financial information
CN112000928A (en) Picture distributed infringement right confirming method, system, storage medium and computer equipment
CN111914278A (en) Input data checking method of database and database management system
CN112329042A (en) Big data secure storage system and method
JPH10260939A (en) Client machine authentication method of computer network, client machine, host machine and computer system
CN109033882A (en) A kind of safe dissemination method of retrospective big data and system
KR20190027207A (en) System and method for verifying integrity of personal information
CN117763595A (en) Data privacy protection method applied to data management system
CN113221160A (en) Method and system for sharing data and protecting electronic data copyright
CN116361292A (en) Cross-chain resource mapping and management method and system
CN112016119B (en) Autonomous identity management method based on block chain
US20220058289A1 (en) Controlled data access
CN114239034A (en) Log recording system for protecting sensitive resources and accident evidence obtaining method
CN109583204B (en) Method for monitoring static object tampering in mixed environment
CN112000953A (en) Big data terminal safety protection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination