CN113255008A - Method and system for outputting multimedia file - Google Patents
Method and system for outputting multimedia file Download PDFInfo
- Publication number
- CN113255008A CN113255008A CN202110743945.2A CN202110743945A CN113255008A CN 113255008 A CN113255008 A CN 113255008A CN 202110743945 A CN202110743945 A CN 202110743945A CN 113255008 A CN113255008 A CN 113255008A
- Authority
- CN
- China
- Prior art keywords
- multimedia file
- authentication information
- creator
- file
- unique identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 61
- 238000012545 processing Methods 0.000 claims description 29
- 238000010586 diagram Methods 0.000 description 12
- 230000007246 mechanism Effects 0.000 description 12
- 238000003860 storage Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 10
- 238000012544 monitoring process Methods 0.000 description 10
- 238000004590 computer program Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 230000008520 organization Effects 0.000 description 5
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 229910021389 graphene Inorganic materials 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000005304 joining Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- General Health & Medical Sciences (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
One or more embodiments of the present specification provide a method and system for outputting a multimedia file. And the creator equipment writes the creator authentication information processed by the blockchain system or the trusted equipment by using a secret key which cannot be leaked into the file code of the generated multimedia file, and outputs the file code of the multimedia file written with the processed creator authentication information.
Description
Technical Field
One or more embodiments of the present disclosure relate to the field of information technology, and in particular, to a method and system for outputting a multimedia file.
Background
In the internet era, multimedia files can be widely spread, and copyright infringement for multimedia files is also prevalent.
Therefore, how to specify the creator of the distributed multimedia file is an urgent technical problem to be solved.
Disclosure of Invention
In view of the above, one or more embodiments of the present disclosure provide a method and system for outputting a multimedia file.
To achieve the above object, one or more embodiments of the present disclosure provide the following technical solutions:
according to a first aspect of one or more embodiments of the present specification, there is provided a method of outputting a multimedia file, including:
the creation side equipment generates a multimedia file and submits creation side authentication transaction to the blockchain system; the authentication transaction comprises a unique identifier corresponding to the equipment of the creation party and specifies the multimedia file;
the block chain system calls a deployed intelligent contract to execute according to the certification transaction of the creation party: according to the multimedia file and the unique identifier, determining the authentication information of the creator; processing the authentication information of the creator by using the key of the smart contract, and returning the processed authentication information of the creator to the creator equipment;
and the creator equipment writes the processed creator authentication information into the file code of the multimedia file and then outputs the file code of the multimedia file.
According to a second aspect of one or more embodiments of the present specification, there is provided another method of outputting a multimedia file, including:
the method comprises the steps that an authoring side device generates a multimedia file and submits an authoring side authentication request to a trusted device with a trusted execution environment; the authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file;
the trusted device executes, in a trusted execution environment, according to the author authentication request: judging whether the authentication information of the creator is determined according to the multimedia file before; if the judgment result is yes, determining the authentication information of the creator according to the multimedia file and the unique identifier; processing the authorship authentication information by using a secret key of the trusted execution environment, and returning the processed authorship authentication information to the authorship equipment;
and the creator equipment writes the processed creator authentication information into the file code of the multimedia file and then outputs the file code of the multimedia file.
According to a third aspect of one or more embodiments of the present specification, there is provided another method of outputting a multimedia file, including:
the method comprises the steps that an authoring side device generates a multimedia file and submits an authoring side authentication request to a trusted device with a trusted execution environment; the authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file;
the trusted device executes, in a trusted execution environment, according to the author authentication request: determining authorship authentication information according to the multimedia file, the unique identifier and the current time provided by a clock deployed in the trusted execution environment; processing the authorship authentication information by using a secret key of the trusted execution environment, and returning the processed authorship authentication information to the authorship equipment;
and the creator equipment writes the processed creator authentication information into the file code of the multimedia file and then outputs the file code of the multimedia file.
According to a fourth aspect of one or more embodiments of the present specification, there is provided a system for outputting a multimedia file, including an authoring apparatus and a blockchain system;
the creation side equipment generates a multimedia file and submits creation side authentication transaction to the block chain system; the authentication transaction comprises a unique identifier corresponding to the equipment of the creation party and specifies the multimedia file; writing the processed authorship authentication information into a file code of the multimedia file, and then outputting the file code of the multimedia file;
the block chain system calls a deployed intelligent contract to execute according to the authentication transaction of the creation party: according to the multimedia file and the unique identifier, determining the authentication information of the creator; and processing the authentication information of the creator by using the key of the intelligent contract, and returning the processed authentication information of the creator to the device of the creator.
According to a fifth aspect of one or more embodiments herein, another system for outputting a multimedia file is provided, including an authoring device and a trusted device;
the authoring side equipment generates a multimedia file and submits an authoring side authentication request to trusted equipment with a trusted execution environment; the authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file; writing the processed authorship authentication information into a file code of the multimedia file, and then outputting the file code of the multimedia file;
the trusted device, according to the author authentication request, executes in a trusted execution environment: judging whether the authentication information of the creator is determined according to the multimedia file before; if the judgment result is yes, determining the authentication information of the creator according to the multimedia file and the unique identifier; and processing the authentication information of the creator by using the secret key of the trusted execution environment, and returning the processed authentication information of the creator to the creator equipment.
According to a sixth aspect of one or more embodiments herein, there is provided another system for outputting a multimedia file, including an authoring side device and a trusted device;
the authoring side equipment generates a multimedia file and submits an authoring side authentication request to trusted equipment with a trusted execution environment; the authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file; writing the processed authorship authentication information into a file code of the multimedia file, and then outputting the file code of the multimedia file;
the trusted device, according to the author authentication request, executes in a trusted execution environment: determining authorship authentication information according to the multimedia file, the unique identifier and the current time provided by a clock deployed in the trusted execution environment; and processing the authentication information of the creator by using the secret key of the trusted execution environment, and returning the processed authentication information of the creator to the creator equipment.
In the above technical solution, the creator device writes the creator authentication information processed by the blockchain system or the trusted device using the secret key that will not leak into the file code of the generated multimedia file, and the creator device outputs the file code of the multimedia file into which the creator authentication information is processed. Therefore, the file coding of the multimedia file can always carry information capable of defining an author in the process of transmission.
Drawings
Fig. 1 is a flowchart illustrating a method for outputting a multimedia file provided in the present specification.
FIG. 2 is a schematic diagram of one type of creating an intelligent contract provided by the present specification.
FIG. 3 is a schematic diagram of a calling intelligent contract provided herein.
FIG. 4 is a schematic diagram of the creation and invocation of an intelligent contract as provided by the present specification.
Fig. 5 is a flowchart of another method for outputting a multimedia file provided in the present specification.
Fig. 6 is a flowchart of another method for outputting a multimedia file provided in the present specification.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of one or more embodiments of the specification, as detailed in the claims which follow.
It should be noted that: in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein. In some other embodiments, the method may include more or fewer steps than those described herein. Moreover, a single step described in this specification may be broken down into multiple steps for description in other embodiments; multiple steps described in this specification may be combined into a single step in other embodiments.
Fig. 1 is a schematic flowchart of a method for outputting a multimedia file provided in the present specification, including the following steps:
s100: the authoring side device generates a multimedia file.
The multimedia file described herein may refer to a file containing multimedia information. The multimedia information may be text, pictures, video, audio, etc. in general.
The data form of the multimedia file is generally coding, and the multimedia file can be displayed or played by analyzing the coding mode of the multimedia file.
The authoring side device as described herein refers to a device that generates multimedia files, which is typically the device used by the author of the multimedia file. For example, the creator device may be a mobile phone with a photographing function, and the creator takes a picture using the mobile phone of the creator device, and the obtained picture is the multimedia file.
S102: the authoring side device submits an authoring side authentication transaction to the blockchain system.
The block chain technique is described first.
Blockchains are generally divided into three types: public chain (Public Blockchain), Private chain (Private Blockchain) and alliance chain (Consortium Blockchain). In addition, there are various types of combinations, such as private chain + federation chain, federation chain + public chain, and other different combinations. The most decentralized of these is the public chain. The public chain is represented by bitcoin and ether house, and the participators joining the public chain can read the data record on the chain, participate in transaction, compete for accounting right of new blocks, and the like. Furthermore, each participant (i.e., node) is free to join and leave the network and perform related operations. Private chains are the opposite, with the network's write rights controlled by an organization or organization and the data read rights specified by the organization. Briefly, a private chain can be a weakly centralized system with strictly limited and few participating nodes. This type of blockchain is more suitable for use within a particular establishment. A federation chain is a block chain between a public chain and a private chain, and "partial decentralization" can be achieved. Each node in a federation chain typically has a physical organization or organization corresponding to it; participants jointly maintain blockchain operation by authorizing to join the network and forming a benefit-related alliance.
Whether public, private, or alliance, may provide the functionality of an intelligent contract. An intelligent contract on a blockchain is a contract that can be executed on a blockchain system triggered by a transaction. An intelligent contract may be defined in the form of code.
Taking the ethernet as an example, the support user creates and invokes some complex logic in the ethernet network, which is the biggest challenge of ethernet to distinguish from bitcoin blockchain technology. The core of the ethernet plant as a programmable blockchain is the ethernet plant virtual machine (EVM), each ethernet plant node can run the EVM. The EVM is a well-behaved virtual machine, which means that a variety of complex logic can be implemented through it. The user issuing and invoking smart contracts in the etherhouse is running on the EVM. In fact, what the virtual machine directly runs is virtual machine code (virtual machine bytecode, hereinafter referred to as "bytecode"). The intelligent contracts deployed on the blockchain may be in the form of bytecodes.
For example, as shown in fig. 2, after Bob sends a transaction containing information to create an intelligent contract to the ethernet network, the EVM of node 1 may execute the transaction and generate a corresponding contract instance. The "0 x6f8ae93 …" in fig. 2 represents the address of the contract, the data field of the transaction holds the byte code, and the to field of the transaction is empty. After agreement is reached between the nodes through the consensus mechanism, this contract is successfully created and can be invoked in subsequent procedures. After the contract is created, a contract account corresponding to the intelligent contract appears on the blockchain and has a specific address, and the contract code is stored in the contract account. The behavior of the intelligent contract is controlled by the contract code. In other words, an intelligent contract causes a virtual account to be generated on a blockchain that contains a contract code and an account store (Storage).
As shown in fig. 3, still taking an ethernet house as an example, after Bob sends a transaction for invoking an intelligent contract to the ethernet house network, the EVM of a certain node may execute the transaction and generate a corresponding contract instance. The from field of the transaction in FIG. 3 is the address of the account of the initiator of the transaction (i.e., Bob), the "0 x6f8ae93 …" in the to field represents the address of the smart contract being invoked, and the value field is the value in EtherFang that is kept in the data field of the transaction as the method and parameters for invoking the smart contract. After invoking the smart contract, the value of balance may change. Subsequently, a client can view the current value of balance through a blockchain node (e.g., node 6 in fig. 3). The intelligent contract is independently executed at each node in the blockchain network in a specified mode, and all execution records and data are stored on the blockchain, so that after the transaction is completed, transaction certificates which cannot be tampered and cannot be lost are stored on the blockchain.
A schematic diagram of creating an intelligent contract and invoking the intelligent contract is shown in fig. 4. To create an intelligent contract in an ethernet workshop, the intelligent contract needs to be compiled, compiled into byte codes, deployed to a block chain and the like. The intelligent contract is called in the Ethernet workshop, a transaction pointing to the intelligent contract address is initiated, and the intelligent contract codes are distributed and run in the virtual machine of each node in the Ethernet workshop network.
It should be noted that, in addition to the creation of the smart contracts by the users, the smart contracts may also be set by the system in the creation block. Such contracts are generally referred to as foundational contracts. In general, the data structure, parameters, attributes and methods of some blockchain networks may be set in the startup contract. Further, an account with system administrator privileges may create a contract at the system level, or modify a contract at the system level (simply referred to as a system contract). In addition to EVM in the ethernet, different blockchain networks may employ various virtual machines, which is not limited herein.
After executing a transaction that invokes a smart contract, a node in the blockchain network generates a corresponding receipt (receipt) for recording information related to executing the smart contract. In this way, information about the contract execution results may be obtained by querying the receipt of the transaction. The contract execution result may be represented as an event (event) in the receipt. The message mechanism can realize message passing through an event in a receipt so as to trigger the blockchain node or a node device deploying the blockchain node to execute corresponding processing. The structure of the event may be, for example:
Event:
[topic][data]
[topic][data]
......
in the above example, the number of events may be one or more; wherein, each event respectively comprises fields of a subject (topic) and data (data). The blockchain node or the node device deploying the blockchain node may perform the preset processing by monitoring the topic of the event, in case that the predefined topic is monitored, or read the related content from the data field of the corresponding event, and may perform the preset processing based on the read content.
In the event mechanism, it is equivalent to that there is a client with a monitoring function at a monitoring party (e.g. a user with a monitoring requirement), for example, an SDK or the like for implementing the monitoring function is run on the client, and the client monitors events generated by the blockchain node, and the blockchain node only needs to generate a receipt normally. The passage of transaction information may be accomplished in other ways than through the event mechanism described above. For example, the monitoring code can be embedded in a blockchain platform code running at blockchain nodes, so that the monitoring code can monitor one or more data of transaction content of blockchain transactions, contract states of intelligent contracts, receipts generated by contracts and the like, and send the monitored data to a predefined monitoring party. Since the snoop code is deployed in the blockchain platform code, rather than at the snooper's client, this implementation based on snoop code is relatively more proactive than the event mechanism. The above monitoring code may be added by a developer of the blockchain platform in the development process, or may be embedded by the monitoring party based on the own requirement, which is not limited in this specification.
The blockchain technology is different from the traditional technology in one of decentralization characteristics, namely accounting is performed on each node, or distributed accounting is performed, and the traditional centralized accounting is not performed. To be a difficult-to-defeat, open, non-falsifiable data record decentralized honest and trusted system, the blockchain system needs to be secure, unambiguous, and irreversible in the shortest possible time for distributed data records. In different types of blockchain networks, in order to keep the ledger consistent among the nodes recording the ledger, a consensus algorithm is generally adopted to ensure that the consensus mechanism is the aforementioned mechanism. For example, a common mechanism of block granularity can be implemented between block nodes, such as after a node (e.g., a unique node) generates a block, if the generated block is recognized by other nodes, other nodes record the same block. For another example, a common mechanism of transaction granularity may be implemented between the blockchain nodes, such as after a node (e.g., a unique node) acquires a blockchain transaction, if the blockchain transaction is approved by other nodes, each node that approves the blockchain transaction may add the blockchain transaction to the latest block maintained by itself, and finally, each node may be ensured to generate the same latest block. The consensus mechanism is a mechanism for the blockchain node to achieve a global consensus on the block information (or called blockdata), which can ensure that the latest block is accurately added to the blockchain. The current mainstream consensus mechanisms include: proof of Work (POW), Proof of stock (POS), Proof of commission rights (DPOS), Practical Byzantine Fault Tolerance (PBFT) algorithm, HoneyBadgerBFT algorithm, etc.
Returning to step S102, the creator authentication transaction submitted by the creator device to the blockchain system includes the unique identifier corresponding to the creator device. The unique identification can be an identity identification of an authoring party, an equipment identification of the authoring party and a combination of the identity identification of the authoring party and the equipment identification of the authoring party.
Further, the authoring side authentication transaction may also specify the multimedia file generated in step S100. In some embodiments, the authoring party authentication transaction may include the multimedia file. In other embodiments, the authoring party authentication transaction may include a hash value of the multimedia file.
S104: and the blockchain system calls the deployed intelligent contract to execute steps according to the authenticated transaction of the creating party.
The creation party authentication transaction is used for calling an intelligent contract deployed in the blockchain system, and the blockchain system executes corresponding logic in the intelligent contract according to parameters carried by the creation party authentication transaction. Specifically, the step of the blockchain system calling the intelligent contract to execute may include: according to the multimedia file and the unique identifier, determining the authentication information of the creator; and processing the authentication information of the creator by using the key of the intelligent contract, and returning the processed authentication information of the creator to the device of the creator.
There are various ways to determine the authorship authentication information according to the multimedia file and the unique identifier. For example, authorship authentication information may be determined that includes a hash value of the multimedia file and the unique identification. For another example, the encoding of the multimedia file and the unique identifier may be combined and then a hash value may be calculated, and the calculated hash value may be used as the authorship authentication information.
In short, the multimedia file and the unique identifier can represent that the multimedia file is generated by the authoring party equipment corresponding to the unique identifier, and the authoring party authentication information determined according to the multimedia file and the unique identifier can play a role in performing authoring party authentication on the multimedia file.
In addition, considering that the creator authentication information needs to be generated by a trusted blockchain system, and malicious counterfeiting of the creator authentication information by others is avoided, in the steps executed by the blockchain system calling the smart contract, in the embodiments of the method shown in fig. 1, the determined creator authentication information needs to be processed by using the key of the smart contract to ensure that the creator authentication information returned to the creator device is endorsed by the blockchain system.
In some embodiments, the author authentication information may be cryptographically processed using a cryptographic key of the smart contract. In this way, only the decryption key of the smart contract can be decrypted, and the authentication information of the creator can be ensured to be difficult to forge.
In other embodiments, the originator authentication information may be signed using a signing key of the smart contract. In this way, the creator authentication information that is not signed by the smart contract in the blockchain system is not trusted, and it is also ensured that the creator authentication information is difficult to forge.
S106: and the creator equipment writes the processed creator authentication information into the file code of the multimedia file.
S108: the authoring side device outputs a file encoding of the multimedia file.
When analyzing the encoding of the multimedia file for displaying or playing the multimedia file, it is necessary to distinguish which part of the file encoding of the multimedia file is the creator authentication information and which part is the actual content corresponding to the multimedia file. Therefore, in step S106, the authorship authentication information after the processing is usually written into a designated area in the file encoding of the multimedia file, and the encoding format of the multimedia file is specific, and therefore, the parsing rule for parsing the encoding format is also specific.
For example, a blank area (128 bytes in length) may be reserved in the header of the file encoding of the multimedia file, and the processed originator authentication information may be written in the blank area in the file encoding of the multimedia file. When the file coding of the multimedia file is analyzed, the first 128 bytes of the file coding are skipped first, and then the file coding after the analysis is started, so that the multimedia file can be displayed or played.
It should be noted that, in practice, one may delete the authentication information of the creator in the file encoding of the multimedia file, however, the multimedia file whose file encoding does not include the authentication information of the creator belongs to the stolen multimedia file, which is equivalent to proving the fact that the person violates the copyright of the creator.
In practice, the authorship authentication information in the file code of the multimedia file may be replaced by other authorship authentication information indicating that the pirate is the author, however, the authenticity of the authorship authentication information in the file code of the multimedia file can be easily verified, and the fact that the person violates the copyright of the author can also be proved.
It is worth emphasizing that in practice, after the author certification information in the file encoding of the multimedia file is deleted, the multimedia file is submitted to the blockchain system again for certification. In this case, the blockchain system may re-determine the author authentication information indicating that the person is an author based on the method shown in fig. 1. However, since the real creator of the multimedia file is usually the one who first requests the blockchain system to perform creator authentication, the blockchain system not only calls the smart contract to execute according to the creator authentication transaction, but also recognizes the creator authentication transaction and writes the recognized creator authentication transaction into the blockchain to store the blockchain, and the blockchain storage data has a time sequence, so that it is easy to determine that the person is not the real creator of the multimedia file according to the data records in the blockchain.
In addition, in some embodiments, in the step of calling the intelligent contract to execute by the blockchain system, it may be determined whether the creator authentication information is determined previously according to the multimedia file; and if so, determining the authentication information of the creator according to the multimedia file and the unique identifier. Further, if the judgment result is no, the determination of the authoring party authentication information may be rejected.
In some embodiments, in the step of calling the intelligent contract by the blockchain system to execute, the creator authentication information may be determined according to the multimedia file, the unique identifier and the current time provided by the blockchain system. The current time provided by the blockchain system is often trusted. In this way, the true creator can be certified based on the creator authentication information determined at the earliest time.
Further, author authentication information including a hash value of the multimedia file, the unique identification, and a current time provided by the blockchain system may be determined.
Fig. 5 is a schematic flow chart of another method for outputting a multimedia file provided in the present specification, including the following steps:
s500: the authoring side device generates a multimedia file.
S502: an author device submits an author authentication request to a trusted device having a trusted execution environment.
The authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file. The authentication request may contain the multimedia file or a hash value of the multimedia file.
S504: and the trusted device executes the steps in the trusted execution environment according to the authentication request of the creator.
The steps performed in the trusted execution environment include: judging whether the authentication information of the creator is determined according to the multimedia file before; if the judgment result is yes, determining the authentication information of the creator according to the multimedia file and the unique identifier; and processing the authentication information of the creator by using the secret key of the trusted execution environment, and returning the processed authentication information of the creator to the creator equipment.
S506: and the creator equipment writes the processed creator authentication information into the file code of the multimedia file.
S508: and the authoring side equipment outputs the file code of the multimedia file.
In the method of fig. 5, unlike the method of fig. 1, the author authentication is not performed using a blockchain system, but rather is performed using a trusted device having a trusted execution environment (e.g., TEE). It should be noted that, because the trusted execution environment does not necessarily store the authorship authentication request in order, in the step executed in the trusted execution environment, it may be determined whether the authorship authentication information has been previously determined according to the multimedia file; and if so, determining the authentication information of the creator according to the multimedia file and the unique identifier. Further, if the judgment result is negative, the determination of the authentication information of the creator may be rejected.
The method shown in fig. 5 can be understood by referring to the description of the method shown in fig. 1, and the principles are similar except for the above differences, which are not repeated.
Fig. 6 is a schematic flow chart of another method for outputting a multimedia file provided in the present specification, including the following steps:
s600: the authoring side device generates a multimedia file.
S602: an author device submits an author authentication request to a trusted device having a trusted execution environment.
S604: and the trusted device executes the steps in the trusted execution environment according to the authentication request of the creator.
The steps performed in the trusted execution environment include: determining authorship authentication information according to the multimedia file, the unique identifier and the current time provided by a clock deployed in the trusted execution environment; and processing the authentication information of the creator by using the secret key of the trusted execution environment, and returning the processed authentication information of the creator to the creator equipment.
S606: and the creator equipment writes the processed creator authentication information into the file code of the multimedia file.
S608: and the authoring side equipment outputs the file code of the multimedia file.
The method of fig. 6 can be understood with reference to the method of fig. 5.
The main difference between the method shown in fig. 6 and the method shown in fig. 5 is that in step S604, the steps executed in the trusted execution environment include: and determining the authentication information of the creator according to the multimedia file, the unique identifier and the current time provided by a clock deployed in the trusted execution environment. That is, the author authentication information is determined using the current time provided by a clock deployed in the trusted execution environment, and thus, the authentic author can be characterized based on the author authentication information determined at the earliest trusted time.
Further, the present specification provides:
a system for outputting multimedia files comprises an authoring side device and a blockchain system;
the creation side equipment generates a multimedia file and submits creation side authentication transaction to the block chain system; the authentication transaction comprises a unique identifier corresponding to the equipment of the creation party and specifies the multimedia file; writing the processed authorship authentication information into a file code of the multimedia file, and then outputting the file code of the multimedia file;
the block chain system calls a deployed intelligent contract to execute according to the authentication transaction of the creation party: according to the multimedia file and the unique identifier, determining the authentication information of the creator; and processing the authentication information of the creator by using the key of the intelligent contract, and returning the processed authentication information of the creator to the device of the creator.
A system for outputting multimedia files comprises an authoring side device and a trusted device;
the authoring side equipment generates a multimedia file and submits an authoring side authentication request to trusted equipment with a trusted execution environment; the authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file; writing the processed authorship authentication information into a file code of the multimedia file, and then outputting the file code of the multimedia file;
the trusted device, according to the author authentication request, executes in a trusted execution environment: judging whether the authentication information of the creator is determined according to the multimedia file before; if the judgment result is yes, determining the authentication information of the creator according to the multimedia file and the unique identifier; and processing the authentication information of the creator by using the secret key of the trusted execution environment, and returning the processed authentication information of the creator to the creator equipment.
A system for outputting multimedia files comprises an authoring side device and a trusted device;
the authoring side equipment generates a multimedia file and submits an authoring side authentication request to trusted equipment with a trusted execution environment; the authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file; writing the processed authorship authentication information into a file code of the multimedia file, and then outputting the file code of the multimedia file;
the trusted device, according to the author authentication request, executes in a trusted execution environment: determining authorship authentication information according to the multimedia file, the unique identifier and the current time provided by a clock deployed in the trusted execution environment; and processing the authentication information of the creator by using the secret key of the trusted execution environment, and returning the processed authentication information of the creator to the creator equipment.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the various elements may be implemented in the same one or more software and/or hardware implementations of the present description.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. In a typical configuration, a computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic disk storage, quantum memory, graphene-based storage media or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in one or more embodiments of the present description to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of one or more embodiments herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The above description is only for the purpose of illustrating the preferred embodiments of the one or more embodiments of the present disclosure, and is not intended to limit the scope of the one or more embodiments of the present disclosure, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the one or more embodiments of the present disclosure should be included in the scope of the one or more embodiments of the present disclosure.
Claims (16)
1. A method of outputting a multimedia file, comprising:
the creation side equipment generates a multimedia file and submits creation side authentication transaction to the blockchain system; the authentication transaction comprises a unique identifier corresponding to the equipment of the creation party and specifies the multimedia file;
the block chain system calls a deployed intelligent contract to execute according to the certification transaction of the creation party: according to the multimedia file and the unique identifier, determining the authentication information of the creator; processing the authentication information of the creator by using the key of the smart contract, and returning the processed authentication information of the creator to the creator equipment;
and the creator equipment writes the processed creator authentication information into the file code of the multimedia file and then outputs the file code of the multimedia file.
2. The method of claim 1, wherein the authentication transaction comprises the multimedia file or comprises a hash of the multimedia file.
3. The method of claim 1, wherein the unique identifier corresponding to the authoring device comprises: an author identity identifier, and/or an author device identifier.
4. The method of claim 1, wherein determining authorship authentication information based on the multimedia file and the unique identifier comprises:
and determining the authorship authentication information containing the hash value of the multimedia file and the unique identifier.
5. The method of any of claims 1-4, determining authorship authentication information based on the multimedia file and the unique identifier, comprising:
judging whether the authentication information of the creator is determined according to the multimedia file before;
and if so, determining the authentication information of the creator according to the multimedia file and the unique identifier.
6. The method of claim 5, the step of invoking the smart contract execution for deployment further comprising:
and if the judgment result is negative, refusing to determine the authentication information of the creator.
7. The method of claim 1, wherein determining authorship authentication information based on the multimedia file and the unique identifier comprises:
and determining the authentication information of the creator according to the multimedia file, the unique identifier and the current time provided by the block chain system.
8. The method of claim 7, determining authorship authentication information based on the multimedia file, the unique identifier and a current time provided by the blockchain system, comprising:
determining creator authentication information including a hash value of the multimedia file, the unique identifier, and a current time provided by the blockchain system.
9. The method of claim 1, wherein processing the originator authentication information using a key of the smart contract comprises:
encrypting the creator authentication information by using an encryption key of the smart contract;
or
And signing the authentication information of the creator by using the signature key of the intelligent contract.
10. A method of outputting a multimedia file, comprising:
the method comprises the steps that an authoring side device generates a multimedia file and submits an authoring side authentication request to a trusted device with a trusted execution environment; the authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file;
the trusted device executes, in a trusted execution environment, according to the author authentication request: judging whether the authentication information of the creator is determined according to the multimedia file before; if the judgment result is yes, determining the authentication information of the creator according to the multimedia file and the unique identifier; processing the authorship authentication information by using a secret key of the trusted execution environment, and returning the processed authorship authentication information to the authorship equipment;
and the creator equipment writes the processed creator authentication information into the file code of the multimedia file and then outputs the file code of the multimedia file.
11. The method of claim 10, the step performed in the trusted execution environment further comprising:
and if the judgment result is negative, refusing to determine the authentication information of the creator.
12. A method of outputting a multimedia file, comprising:
the method comprises the steps that an authoring side device generates a multimedia file and submits an authoring side authentication request to a trusted device with a trusted execution environment; the authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file;
the trusted device executes, in a trusted execution environment, according to the author authentication request: determining authorship authentication information according to the multimedia file, the unique identifier and the current time provided by a clock deployed in the trusted execution environment; processing the authorship authentication information by using a secret key of the trusted execution environment, and returning the processed authorship authentication information to the authorship equipment;
and the creator equipment writes the processed creator authentication information into the file code of the multimedia file and then outputs the file code of the multimedia file.
13. The method of claim 12, determining authorship authentication information based on the multimedia file, the unique identifier and a current time provided by a clock deployed in the trusted execution environment, comprising:
determining author authentication information including a hash value of the multimedia file, the unique identification, and a current time provided by a clock deployed in the trusted execution environment.
14. A system for outputting multimedia files comprises an authoring side device and a blockchain system;
the creation side equipment generates a multimedia file and submits creation side authentication transaction to the block chain system; the authentication transaction comprises a unique identifier corresponding to the equipment of the creation party and specifies the multimedia file; writing the processed authorship authentication information into a file code of the multimedia file, and then outputting the file code of the multimedia file;
the block chain system calls a deployed intelligent contract to execute according to the authentication transaction of the creation party: according to the multimedia file and the unique identifier, determining the authentication information of the creator; and processing the authentication information of the creator by using the key of the intelligent contract, and returning the processed authentication information of the creator to the device of the creator.
15. A system for outputting multimedia files comprises an authoring side device and a trusted device;
the authoring side equipment generates a multimedia file and submits an authoring side authentication request to trusted equipment with a trusted execution environment; the authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file; writing the processed authorship authentication information into a file code of the multimedia file, and then outputting the file code of the multimedia file;
the trusted device, according to the author authentication request, executes in a trusted execution environment: judging whether the authentication information of the creator is determined according to the multimedia file before; if the judgment result is yes, determining the authentication information of the creator according to the multimedia file and the unique identifier; and processing the authentication information of the creator by using the secret key of the trusted execution environment, and returning the processed authentication information of the creator to the creator equipment.
16. A system for outputting multimedia files comprises an authoring side device and a trusted device;
the authoring side equipment generates a multimedia file and submits an authoring side authentication request to trusted equipment with a trusted execution environment; the authentication request comprises a unique identifier corresponding to the authoring side equipment and specifies the multimedia file; writing the processed authorship authentication information into a file code of the multimedia file, and then outputting the file code of the multimedia file;
the trusted device, according to the author authentication request, executes in a trusted execution environment: determining authorship authentication information according to the multimedia file, the unique identifier and the current time provided by a clock deployed in the trusted execution environment; and processing the authentication information of the creator by using the secret key of the trusted execution environment, and returning the processed authentication information of the creator to the creator equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110743945.2A CN113255008B (en) | 2021-07-01 | 2021-07-01 | Method and system for outputting multimedia file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110743945.2A CN113255008B (en) | 2021-07-01 | 2021-07-01 | Method and system for outputting multimedia file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113255008A true CN113255008A (en) | 2021-08-13 |
CN113255008B CN113255008B (en) | 2021-10-22 |
Family
ID=77190409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110743945.2A Active CN113255008B (en) | 2021-07-01 | 2021-07-01 | Method and system for outputting multimedia file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113255008B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1517827A (en) * | 2003-01-08 | 2004-08-04 | Kddi株式会社 | Identification mode of contents file producer and its program |
CN106096335A (en) * | 2016-06-08 | 2016-11-09 | 北京小米移动软件有限公司 | Copyright information detection method, copyright information detection device and electronic equipment |
CN107330694A (en) * | 2017-07-03 | 2017-11-07 | 重庆小犀智能科技有限公司 | Copyright trading system and method for commerce based on block chain |
US20180089761A1 (en) * | 2016-09-26 | 2018-03-29 | Shapeshift Ag | System and method of providing a leader-follower multi-asset portfolio |
CN110457873A (en) * | 2018-05-08 | 2019-11-15 | 中移(苏州)软件技术有限公司 | A kind of watermark embedding and detection method and device |
CN110598376A (en) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Copyright authentication method, device and equipment based on block chain and storage medium |
CN111859309A (en) * | 2020-06-19 | 2020-10-30 | 华新(北京)网络科技有限公司 | Digital copyright protection system construction method based on block chain technology |
CN111881425A (en) * | 2020-07-28 | 2020-11-03 | 平安科技(深圳)有限公司 | Picture copyright authentication method and device and storage medium |
-
2021
- 2021-07-01 CN CN202110743945.2A patent/CN113255008B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1517827A (en) * | 2003-01-08 | 2004-08-04 | Kddi株式会社 | Identification mode of contents file producer and its program |
CN106096335A (en) * | 2016-06-08 | 2016-11-09 | 北京小米移动软件有限公司 | Copyright information detection method, copyright information detection device and electronic equipment |
US20180089761A1 (en) * | 2016-09-26 | 2018-03-29 | Shapeshift Ag | System and method of providing a leader-follower multi-asset portfolio |
CN107330694A (en) * | 2017-07-03 | 2017-11-07 | 重庆小犀智能科技有限公司 | Copyright trading system and method for commerce based on block chain |
CN110457873A (en) * | 2018-05-08 | 2019-11-15 | 中移(苏州)软件技术有限公司 | A kind of watermark embedding and detection method and device |
CN110598376A (en) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Copyright authentication method, device and equipment based on block chain and storage medium |
CN111859309A (en) * | 2020-06-19 | 2020-10-30 | 华新(北京)网络科技有限公司 | Digital copyright protection system construction method based on block chain technology |
CN111881425A (en) * | 2020-07-28 | 2020-11-03 | 平安科技(深圳)有限公司 | Picture copyright authentication method and device and storage medium |
Non-Patent Citations (2)
Title |
---|
YAPING ZENG: "Digital Music Resource Copyright Management Mechanism Based on Blockchain", 《2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK)》 * |
沈阳 等: "一种基于区块链技术的版权登记交易方案设计", 《广播电视信息》 * |
Also Published As
Publication number | Publication date |
---|---|
CN113255008B (en) | 2021-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110245506B (en) | Intelligent contract management method and device based on block chain and electronic equipment | |
CN110580418B (en) | Private data query method and device based on block chain account | |
CN110580262B (en) | Private data query method and device based on intelligent contract | |
CN110032884B (en) | Method for realizing privacy protection in block chain, node and storage medium | |
CN110580414A (en) | private data query method and device based on block chain account | |
CN110580412B (en) | Permission query configuration method and device based on chain codes | |
CN111047443B (en) | User scoring method and device, electronic equipment and computer readable storage medium | |
CN113114476B (en) | Privacy evidence storing method and device based on contract | |
CN110580417B (en) | Private data query method and device based on intelligent contract | |
CN110580245B (en) | Private data sharing method and device | |
CN110580413A (en) | Private data query method and device based on down-link authorization | |
CN112073807B (en) | Video data processing method and device based on block chain | |
CN112101938B (en) | Digital seal using method and device based on block chain and electronic equipment | |
CN110580411B (en) | Permission query configuration method and device based on intelligent contract | |
CN111127021B (en) | Service request method and device based on block chain | |
CN111669434B (en) | Method, system, device and equipment for establishing communication group | |
CN114465790A (en) | Method, device and equipment for processing IP content library service | |
CN113206893B (en) | Method for block synchronization and node joining block chain network | |
CN113255008B (en) | Method and system for outputting multimedia file | |
CN114756903A (en) | Homote advice processing method and device based on block chain intelligent contract and computing equipment | |
CN113536384B (en) | Block chain-based private data mapping method, block chain-based private data mapping device, block chain-based private data mapping medium and electronic equipment | |
CN112434264A (en) | Infringement processing method and device based on block chain and electronic equipment | |
CN114418769A (en) | Block chain transaction charging method and device and readable storage medium | |
CN113761496A (en) | Identity verification method and device based on block chain and electronic equipment | |
CN113282864A (en) | Webpage processing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240923 Address after: Room 803, floor 8, No. 618 Wai Road, Huangpu District, Shanghai 200010 Patentee after: Ant blockchain Technology (Shanghai) Co.,Ltd. Country or region after: China Address before: 310000 801-11 section B, 8th floor, 556 Xixi Road, Xihu District, Hangzhou City, Zhejiang Province Patentee before: Alipay (Hangzhou) Information Technology Co.,Ltd. Country or region before: China |