CN113706344B - Digital copyright protection method based on block chain - Google Patents

Digital copyright protection method based on block chain Download PDF

Info

Publication number
CN113706344B
CN113706344B CN202110895257.8A CN202110895257A CN113706344B CN 113706344 B CN113706344 B CN 113706344B CN 202110895257 A CN202110895257 A CN 202110895257A CN 113706344 B CN113706344 B CN 113706344B
Authority
CN
China
Prior art keywords
work
user
function
key
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110895257.8A
Other languages
Chinese (zh)
Other versions
CN113706344A (en
Inventor
徐彦彦
毛养素
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN202110895257.8A priority Critical patent/CN113706344B/en
Publication of CN113706344A publication Critical patent/CN113706344A/en
Application granted granted Critical
Publication of CN113706344B publication Critical patent/CN113706344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Technology Law (AREA)
  • Tourism & Hospitality (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention aims to provide a digital copyright protection scheme based on a blockchain, and designs the whole process of copyright service by combining a blockchain technology and a digital watermark technology, thereby realizing five functional requirements of copyright registration, copyright inquiry, copyright transaction, copyright assignment and copyright maintenance. In addition, the OptiFairSwap protocol is realized through the intelligent contract to complete effective delivery certification and prevent malicious behaviors of both transaction parties, and the piracy tracking function is realized by combining the digital fingerprint technology. Once the work is authorized on the blockchain, the subsequent transaction is recorded in real time, so that the traceability and traceability of the work from the creation, circulation and use of the whole life cycle are realized, and a strong technical guarantee and conclusive evidence is provided for judicial evidence collection. Meanwhile, in the processes of copyright transaction and copyright assignment, copyright owners can directly participate in the copyright management of own works, the transaction process is overtly and transparently disclosed, and royalty transparency settlement is realized.

Description

Digital copyright protection method based on block chain
Technical Field
The invention belongs to the field of multimedia information security protection, and particularly relates to a digital copyright protection method of a blockchain technology and a digital watermarking technology.
Background
With the rapid development of computer technology and network technology, the spread of digital media is facilitated, and people can rapidly upload and share digital multimedia (such as photos, music, movies) through personal websites or social networks. At the same time, these media content are likely to be downloaded and distributed by unauthorized users, which would seriously undermine the interests of the content owners. In order to protect conventional copyrights, a content owner needs to provide digital works and personal information as copyrights information to a rights-registering authority. The copyright protection mechanism stores the copyright protection mechanism in a centralized server for processing, and risks of single-point faults, easy attack and the like exist; specific information in the transaction process is not disclosed to a copyright owner, and the copyright owner cannot directly participate in managing the copyright of own works; before delivering the content, the user needs to pay a subscription fee to order the work, and is at risk of receiving tampered data.
The blockchain has the characteristics of decentralization, tamper resistance, disclosure transparency and the like, and ensures the real and complete data, transparent disclosure and traceability, so that the blockchain technology can be utilized to protect the digital copyrighted content. The copyright protection comprises the processes of copyright registration, copyright transaction, copyright monitoring, infringement evidence taking, copyright maintenance and the like, the existing digital copyright protection scheme based on the blockchain mainly focuses on providing protection for a copyright confirming link and a copyright transaction link, and the scheme for providing safety protection for the processes of copyright inquiry, copyright assignment, copyright maintenance and the like is less common. In addition, the existing digital product copyright protection scheme based on the blockchain technology lacks a mechanism for stopping malicious behaviors of both transaction parties, namely, after a malicious buyer receives a correct file, the malicious buyer lies the file as an error file and does not pay corresponding money; the malicious seller sends the wrong file but still charges the money paid by the buyer. This not only compromises the economic benefits of both parties to the transaction, but also presents difficulties for judicial evidence collection.
Disclosure of Invention
The invention aims to provide a digital copyright protection scheme based on a blockchain, and designs the whole process of copyright service by combining a blockchain technology and a digital watermark technology so as to realize the functions of copyright registration, copyright inquiry, copyright transaction, copyright assignment and copyright maintenance. In addition, the transaction of the digital work is completed based on the OptiFairSwap delivery method, malicious behaviors of both transaction parties can be prevented, effective delivery proof is completed, and a piracy tracking function is realized by combining a digital fingerprint technology. The scheme can solve the fairness problem of the two untrusted transaction parties in the transaction process.
The solution of the scheme is as follows: the scheme comprises a copyright protection center mechanism, a registration mechanism, a copyright owner and a user. The copyright protection center is responsible for auditing and registering the original works, and embedding the digital fingerprints of the users in the digital works during copyright transactions (copyright permissions). The registration authorities are responsible for key distribution and management, and for the examination and verification of the identity of the copyright owners and users. The copyright owner refers to a person who enjoys the copyright of the digital work, is responsible for managing the copyright of the own work, and completes the distribution of the work in the processes of copyright trading and copyright assignment. The user refers to the transferee in the process of copyright trade and copyright transfer, and provides identity information and pays corresponding money in the trade process and verifies whether the work is correct.
First, the rights issuer registers on the blockchain network, deploys the rights protection intelligent contract, and designates the blockchain account address of the registration authority (Registration Agency). The copyright owner and user then register on the blockchain network and authenticate the identity to the registration authority. After the copyright owner completes the creation of the work, the work and the verified identity information are encrypted and sent to a copyright protection center, after the copyright protection center decrypts the created work, the copyright protection center stores the work information through an intelligent contract and embeds the copyright information into the work, so that the effect of confirming the right of the digital work is achieved.
The blockchain user may obtain detailed information of a digital work by invoking an intelligent contract. If a user wants to purchase a digital work, a request may be sent to the copyright owner. The copyright owner sends the requested work to the copyright protection center, and the user sends the authenticated identity information to the copyright protection center. The copyright protection center is then responsible for embedding the user's digital fingerprint in the digital work, storing the encrypted fingerprint information and the embedded key in the blockchain network, and then transmitting the digital work containing the user's fingerprint to the copyright owner. And calling the intelligent contract by the copyright owner and the user to complete the transaction of the digital work.
If the user wants to acquire the copyright of a certain digital work, a copyright assignment request is required to be sent to a copyright owner, and after the copyright owner invokes the intelligent contract to set the assignment amount and open the assignment authority according to the negotiation condition, the copyright owner and the user invoke the intelligent contract to finish the delivery certification of the digital work.
If the copyright owner finds out the suspected infringement work X ', the suspected infringement work X' and the original work X are encrypted and sent to a copyright protection center, the copyright protection center compares the original work X with the suspected infringement work X ', and if infringement exists, the copyright protection center extracts the user fingerprint ID of the work X' u And initiates a true authentication request to the registration authority. Meanwhile, the state of the transaction is obtained from the blockchain account book, and if the transaction is normally ended, the illegally distributed work can be judgedIs revealed from user u; otherwise, the piracy source is the copyright owner.
The invention provides a digital copyright protection method based on a block chain, which comprises the following six stages:
in the preprocessing stage, a copyright protection center mechanism registers on a blockchain network, deploys intelligent contracts of copyright protection to become owners of the contracts, and then sets blockchain account addresses of the registration mechanism.
And in the copyright registration stage, after the copyright owner finishes the creation of the work, encrypting and transmitting the created work and the verified identity information to a copyright protection center, after the copyright protection center decrypts the created work and checks the created work, the copyright protection center is responsible for embedding the copyright information into the original work and storing the information of the digital work through an intelligent contract, so that the effect of right confirmation of the digital work is achieved.
In the copyright inquiry stage, the blockchain user can acquire detailed information of a certain digital work by calling the intelligent contract.
In the copyright transaction stage, a user sends a data request to a copyright owner, the copyright owner sends the requested data to a copyright protection center, and then the user sends authenticated identity information to the copyright protection center. The copyright protection center is responsible for embedding the digital fingerprint of the user in the digital work, transmitting the digital work containing the user fingerprint to the copyright owner, and calling the intelligent contract by the copyright owner and the user to finish the delivery certification of the digital work.
In the copyright assignment stage, a user requests a copyright assignment from a copyright owner, and the copyright owner sets an assignment amount and opens assignment rights through an intelligent contract. And then the copyright owner and the user call the intelligent contract to finish the delivery certification of the digital work.
In the copyright maintenance stage, the copyright owner discovers the suspected infringing work X ', encrypts and transmits the suspected infringing work X ' and the original work X to a copyright protection center, and the copyright protection center compares the original work X and the suspected infringing work X '. If infringement exists, the copyright protection center extracts the user fingerprint ID of the work X' u And initiates a true authentication request to the registration authority. At the same time, copyrightThe protection center acquires the state of the transaction from the blockchain account book, and if the transaction is normally ended, the protection center can judge that the illegally distributed work is revealed by a user u; otherwise, the piracy source is the copyright owner.
Pretreatment:
the copyright protection center registers on the blockchain, deploys Ownable, copyrightRegistration, modifyInformation, copyrightInquiry, copyrightTransaction and Copyrighttransfer 6 intelligent contracts to become owners of the 6 intelligent contracts, and then calls the setRegistrict options function in the Ownable contract to set the blockchain account address of the registration mechanism.
Wherein the down-able intelligent contracts include down-able functions and setregistranstioangenecy functions. The lowable function records the contract owner, setregistextionangenecy function sets the blockchain account address of the registry.
The CopyrightRegulation Smart contract includes a CopyrightRegulation function. The copyrightmaster function is called by the rights issuer to hold metadata (work id, work name, copyright holder, category, description, authoring completion time, trade price, transfer price, hash value) for the digital work.
The Modifinformation smart contracts include a setTransferOfPrice function, a setSubspribeOfPrice function, and a settranferLock function. The setTransferOfPrace function is used to set the transfer price of the digital work, the setSubscribeOfPrace function is used to set the trade price of the digital work, and the setTransferLock function is used to control the transfer rights of the digital work.
The function in the CopyrightInquiry smart contract is getInformation, getAllSubscribers, getSubscribersCount, getAllDigitalWorks, getTransferOfLock, getOwner, getSubscribers as follows. The getInformation function queries the digital work for details (id, name, owner, category, description, creation time, transaction price, transfer price, raw hash, subscriber address), the getallrascribers function is used to query all users subscribing to a digital work, and the getsubs count function queries the number of users subscribing to a digital work. The getallDigitalWorks function queries all work ids owned by a copyright owner. The getTransferOfLock function queries the transfer rights for a digital work. The getOwner function queries the copyright owner of a digital work. The getsubscirber function queries the ethernet address of a user subscribing to the digital work.
The CopyrightTransaction Smart contract contains the following functions: requestTransaction, saveInformation, ininitializeOfTxn, acceptOfTxn, revealKeyOfTxn, noComplainOfTxn, complainRootOfTxn, complainLeafOfTxn, complainNodeOfTxn, refundOfTxn. The user invokes the requestTransaction function to send a data request to the copyright owner. After the copyright protection center embeds the digital fingerprint in the work, the saveInformation function is called to store the encrypted digital fingerprint and the encrypted embedded key, and the Merkle root of the work containing the digital fingerprint. The copyright owner calls an inititialzeoftxn function to initialize transaction details (block information, user address, key hash value, ciphertext Merkle root) and pay a deposit, if the initialization data is correct, the user calls an accept oftxn function to pay a transaction price and a deposit, and if the user pays the transaction price and the deposit, the copyright owner calls a revealekeyoftxn function to upload a key. The user downloads the key and decrypts, the user checks the file, the file is not objection, and the nocomplainfTxn function is called to end the transaction; if the objection exists, the corresponding decision function is called according to the checked error node, and the two parties call the refndOfTxn function according to the transaction state to end the transaction.
The CopyrightTransferSmart contract contains the following functions: requestTransfer, ininitialize, accept, revealKey, noComplain, complainAboutRoot, complainAboutLeaf, complainAboutNode, refund. The user invokes the requestTransfer function to send a rights transfer request to the rights holder. The copyright owner calls the initalize function to initialize transfer process information (block information, user address, key hash value, plaintext Merkle root, ciphertext Merkle root) and pay a deposit, if the initialization data is correct, the user calls the accept function to pay the transfer price and deposit, and if the user pays the transfer price and deposit, the copyright owner calls the revealekey function to upload the key. The user downloads the secret key and decrypts the secret key, the user checks the file, the file is not objection, and the noComplain function is called to end the copyright assignment process; if the transaction state is inconsistent, the corresponding decision function is called according to the checked error node, and the two parties call the refend function according to the transaction state to end the transaction.
The CodrightRegulation Smart contract inherits from the down able, the Modifinformation Smart contract inherits from the CopyrightRegistration, copyrightInquiry Smart contract inherits from the CopyrightRegistration, copyrightTransfer Smart contract inherits from the Modifinformation, copyrightInquiry, copyrightTransaction inherits from the CodrightTransfere. Six smart contracts constitute a DApp running on the blockchain and perform the functions of each phase.
Copyright registration:
in step 21, the copyright owner registers in the blockchain network and performs identity authentication to the registration mechanism to acquire an identity ID.
Step 22, copyright owner uses AES encryption algorithm and key k 1 Encrypting the work X to be registered to obtain an encrypted work X e And uses the public key pk of the rights issuer c To key k 1 Encryption to obtainThen the encrypted work X eAnd the ID is sent to the copyright protection center.
Step 23, the copyright protection center uses its own private key sk c For a pair ofDecryption is performed to obtain a key k 1 And uses the key k 1 For encrypted works X e And decrypting to obtain the work X. After the copyright protection center examines the work X, firstly calculating the Hash value Hash (X) of the plaintext work X, and embedding the identity ID of the copyright owner into the work X to obtain X w Thereafter, a work X containing a copyright watermark is calculated w Hash value Hash (X w )。
Step 24, the copyright protection center calls the copyrightthreshold function in the copyrightthreshold intelligent contract to write the related information of the work to the blockchain, including the work id, the work name, the copyright owner, the category, the description, the creation completion time, the transaction price, the transfer price, the Hash value Hash (X) of the original work, the work containing the copyright watermark X w Hash value Hash (X w ) 10 parts. After the related information is up-linked, the copyright protection center uses AES encryption algorithm and key k 2 For works X containing copyright information w Encryption to obtain X ew And uses the public key pk of the copyright owner o To key k 2 Encryption to obtainAnd X is taken as ew And->To the copyright owner.
Step 25, the copyright owner uses its own private key sk o For a pair ofDecryption is performed to obtain a key k 2 And uses the key k 2 For encrypted work X containing copyright watermark ew Decrypting to obtain a copyright watermark-containing work X w . The copyright owner may call the setsubscobeofpace function, setTransferOfPrice function, and settransferferlock function in the modification information smart contract to set the copyright trade price and the copyright transfer price, and the copyright transfer authority, respectively.
And (3) a copyright inquiry stage:
in step 31, the user registers as a user of the blockchain in the blockchain network.
Step 32, the user may call the getInformation function in the CopyrightInquiry Smart contract to query the blockchain for details of the registered work, such as: work id, work name, copyright holder, category, description, authoring completion time, trade price, transfer priceLattice, hash (X), hash (X w ) Subscriber address. Wherein the subscriber address refers to a blockchain account address of the user who successfully subscribes to the work during the copyright transaction. The user can also call the getallctrichures function to inquire all users subscribing to the work, or call the getsubstrichur count function to inquire the number of subscribers of the work, and call the getallDitalWorks function to inquire all the ids of the work registered by a certain user in the blockchain.
Copyright trading stage:
step 41, the user registers in the blockchain network and performs identity authentication to the registration mechanism to obtain a unique identity ID u
Step 42, the user sends a data request message to the copyright owner by calling the requestTransaction function in the CopyrightTransaction Smart contract.
Step 43, after the copyright owner receives the data request message, the copyright owner uses AES encryption algorithm and key k 1 For requested data X w Encryption to obtain an encrypted work X ew And uses the public key pk of the rights issuer c To key k 1 Encryption to obtainThen the encrypted work X ew And->And sending the information to a copyright protection center.
Step 44, the user authenticates himselfAnd requesting the purchase work id to be encrypted and sent to the copyright protection center. Wherein (1)>Indicating that the registration authority uses its own private key sk a For user identity ID u Is a digital signature of (a).
Step 45, the copyright protection center uses its own private key sk c For a pair ofDecryption is performed to obtain a key k 1 And uses the key k 1 For encrypted works X ew Decrypting to obtain the requested data X w And selecting a proper digital fingerprint algorithm to carry out user identity ID u Embedded in X w X is obtained in (1) u And calculates work X containing user fingerprint information u Hash value Hash (X u ). The copyright protection center then applies X u And (3) constructing a Merkle tree in a blocking way, calculating to obtain a plaintext Merkle root, and calling a saveInformation function to write encrypted fingerprint information, an encrypted embedded key and the plaintext Merkle root into the blockchain account book. The rights issuer then uses the AES encryption algorithm and the key k 2 For work X u Encryption is carried out to obtain an encrypted work X eu And uses the public key pk of the copyright owner o To key k 2 Encryption get->And will encrypt work X eu 、/>The plaintext Merkle root and the blocking information are sent to the copyright owner. The block information comprises a block mode, a block size, a block number and a Merkle tree depth.
Step 46, copyright owner uses own private key sk o For a pair ofLine decryption to obtain key k 2 And uses the key k 2 For encrypted works X eu Decrypting to obtain data X containing user fingerprint u . The transaction parties complete the work X according to the OptiFairSwap protocol u The status of the transaction is recorded on the blockchain ledger.
Copyright assignment phase:
step 51, the user registers in the blockchain network and performs identity to the registration mechanismAuthentication to obtain unique identity ID u
At step 52, the user sends a copyright transfer request to the copyright owner by invoking the requestTransfer function in the CopyrightTransferSmart contract.
Step 53, the copyright owner negotiates with the user and invokes the settranferlock function in the modification information intelligent contract to open the copyright assignment right.
In step 54, the transaction parties complete the distribution of work X according to OptiFairSwap protocol, and the status of the transaction is recorded on the blockchain ledger.
Copyright maintenance stage:
step 61, the copyright owner discovers the suspected infringement work X' and combines it with the original work X w After encryption, the encrypted data is sent to a copyright protection center, and a copyright owner calculates a Hash value Hash (X ') of the suspected infringement work X' and uploads the Hash value Hash to a blockchain account book for storage.
Step 62, the copyright protection center compares the suspected infringement work X 'with the original work X, and if the suspected infringement work X' and the original work X have no correlation, the arbitration is finished; if infringement exists, the encrypted digital fingerprint information and the encrypted embedded key corresponding to the work are downloaded from the blockchain ledger, and are decrypted by using the private key of the user, and the fingerprint information ID is extracted from the infringement work X' u Fingerprint information ID u To the registration authority.
Step 63, the registration authority retrieves the ID in the local database u The corresponding real identity information u is sent to a copyright protection center.
Step 64, the copyright protection center inquires transaction information of the work distribution in the transaction process from the blockchain account book, and if the transaction state of the work distribution is normally finished, the illegally distributed work can be judged to be revealed by the user u; otherwise, the piracy source is the copyright owner.
In the process of copyright transaction and copyright transfer, an OptiFairSwap protocol is proposed to complete the transaction of the digital works, so that malicious behaviors of both transaction parties are prevented. The specific steps of OptiFairSwap are as follows:
step 1, copyright owner will needThe file X to be distributed is partitioned to obtain { X } 1 ,x 2 ,x 3 ,…,x n Building Merkle tree, and taking the leaf node vector { x } of Merkle 1 ,x 2 ,x 3 ,…,x n Sum of non-leaf node vectors y 1 ,y 2 ,y 3 ,…,y m The combination results in a vector { x } 1 ,x 2 ,…,x n ,y 1 ,y 2 ,…,y m Use of key k 1 Encrypting it results in z= { Z 1 ,z 2 ,…,z n ,z n+1 ,z n+2 ,…,z n+m }. The copyright owner uses the AES encryption algorithm and the key k 2 Encrypting the Z vector to obtain ciphertext C, and using the public key pk of the user u To key k 2 Encryption to obtainCiphertext C and ++>And sending the information to the user, and simultaneously, storing the deposit of the guarantee into the intelligent contract by the copyright owner.
Step 2, the user uses his own private key sk u For a pair ofDecryption is performed to obtain a key k 2 And uses the key k 2 And decrypting the ciphertext C to obtain a vector Z. And carrying out block construction on the vector Z to obtain the root r of the Merkle tree of the vector Z.
And 3, the user writes the root r of the Merkle tree of the vector Z into the blockchain ledger through the intelligent contract, and stores the cost of the deposit and the purchase of the file and the root h of the Merkle tree of the file X into the intelligent contract.
Step 4, the copyright owner reads r from the blockchain, performs the same operation as the user on the vector Z locally to construct a Merkle tree, calculates the root r 'of the Merkle tree by the vector Z, compares whether the values of r and r' are the same or not, and if the values are different, stops the transaction; if the rights are the same, the copyright owner invokes the smart contract to key k 1 Uploading toAnd storing in a blockchain ledger.
Step 5, the user reads the key k from the blockchain ledger 1 Locally using key k 1 Decrypting the vector Z to obtain { x' 1 ,x′ 2 ,…,x′ n ,y′ 1 ,y′ 2 ,…,y′ m }. User stitching { x' 1 ,x′ 2 ,…,x′ n And obtaining the file X', if the file is correct, normally ending the transaction, retrieving the self-assurance, and retrieving the self-assurance and the cost for purchasing the file by the copyright owner. If the file is wrong, the user sends the data pi= { z of the wrong block i ,z i+1 ,z n+(i+1)/2 The corresponding sibling node value in the sum path is used as the input parameter of the intelligent contract decision function.
Step 6, the decision function first determines pi= { z submitted i ,z i+1 ,z n+(i+1)/2 Whether or not the leaf nodes and non-leaf nodes of the root r of the Merkle tree. If not, then pi= { z submitted by the user is described i ,z i+1 ,z n+(i+1)/2 When tampered with by the user, the copyright owner retrieves from the smart contract his own deposit and the user's money for purchasing the file and the user's deposit. The transaction is normally ended; if the submitted input parameters are leaf nodes and non-leaf nodes of the root r of the Merkle tree, the decision function uses the key k 1 P = { z i ,z i+1 ,z n+(i+1)/2 Decryption is carried out to obtain { x } i ,x i+1 ,y (i+1)/2 }. And verify { x } i ,x i+1 ,y (i+1)/2 Whether or not it is a leaf node and a non-leaf node of the root h of the Merkle tree. If not, the distributed file is described as an error file, the user retrieves the self deposit from the intelligent contract, the money for purchasing the file and the deposit of the copyright owner, and the transaction is ended abnormally; if yes, the distributed files are the correct files, the copyright owner retrieves the self deposit from the intelligent contract, the money of the user for purchasing the files and the deposit of the user, and the transaction is normally ended.
Compared with other methods, the invention has the advantages that: the invention provides a digital copyright protection method based on a block chain, which combines the block chain technology and the digital watermark technology to design the copyright service in the whole process, thereby realizing five functional requirements of copyright registration, copyright inquiry, copyright transaction, copyright assignment and copyright maintenance. Once the copyright registration mode works are confirmed on the blockchain, the subsequent transactions are recorded in real time, so that the traceability and traceability of the works from creation, circulation and use of the whole life cycle can be realized, and a strong technical guarantee and conclusive evidence is provided for judicial evidence collection. Meanwhile, in the processes of copyright transaction and copyright assignment, copyright owners can directly participate in the copyright management of own works, the transaction process is overtly and transparently disclosed, and royalty transparency settlement is realized. In addition, the scheme provides the OptiFairSwap protocol to complete the transaction of the digital work, so that the fair exchange of the untrusted transaction parties in the transaction process is ensured, and the malicious behaviors of the transaction parties can be prevented; if the transaction state is normally ended, the user cannot repudiate the occurrence of the transaction, so that effective delivery certification is realized.
Drawings
Fig. 1 is a flowchart of a specific process for copyright registration of a digital work according to an embodiment of the present invention.
Fig. 2 is a flowchart of a specific process for querying copyright information of a digital work according to an embodiment of the present invention.
Fig. 3 is a flowchart of a specific process for performing a copyright transaction on a digital work according to an embodiment of the present invention.
Fig. 4 is a flowchart of a particular process for copyright transfer of a digital work in accordance with an embodiment of the present invention.
FIG. 5 is a flowchart of a specific process for copyright maintenance of a digital work according to an embodiment of the present invention.
FIG. 6 is a block diagram of an Ownable intelligent contract according to an embodiment of the invention.
FIG. 7 is a diagram of a CopyrightRegulation Smart contract according to an embodiment of the invention.
Fig. 8 is a structural diagram of a modification information intelligent contract according to an embodiment of the present invention.
Fig. 9 is a diagram of a CopyrightInquiry smart contract structure, according to an embodiment of the present invention.
Fig. 10 is a diagram of a CopyrightTransaction smart contract structure, according to an embodiment of the present invention.
Fig. 11 is a diagram of a CopyrightTransfer smart contract structure according to an embodiment of the present invention.
Detailed Description
The digital copyright protection method based on the block chain provided by the embodiment of the invention is concretely realized in six stages:
in the preprocessing stage, a copyright protection center mechanism registers on a blockchain network, deploys intelligent contracts of copyright protection to become owners of the contracts, and then sets blockchain account addresses of the registration mechanism.
And in the copyright registration stage, after the copyright owner finishes the creation of the work, encrypting and transmitting the created work and the verified identity information to a copyright protection center, after the copyright protection center decrypts the created work and checks the created work, the copyright protection center is responsible for embedding the copyright information into the original work and storing the information of the digital work through an intelligent contract, so that the effect of right confirmation of the digital work is achieved.
In the copyright inquiry stage, the blockchain user can acquire detailed information of a certain digital work by calling the intelligent contract.
In the copyright transaction stage, a user sends a data request to a copyright owner, the copyright owner sends the requested data to a copyright protection center, and then the user sends authenticated identity information to the copyright protection center. The copyright protection center is responsible for embedding the digital fingerprint of the user in the digital work, transmitting the digital work containing the user fingerprint to the copyright owner, and calling the intelligent contract by the copyright owner and the user to finish the delivery certification of the digital work.
In the copyright assignment stage, a user requests a copyright assignment from a copyright owner, and the copyright owner sets an assignment amount and opens assignment rights through an intelligent contract. And then the copyright owner and the user call the intelligent contract to finish the delivery certification of the digital work.
In the copyright maintenance stage, the copyright owner discovers the suspected infringing work X ', encrypts and transmits the suspected infringing work X ' and the original work X to a copyright protection center, and the copyright protection center compares the original work X and the suspected infringing work X '. If it isIf infringement exists, the copyright protection center extracts the user fingerprint ID of the work X' u And initiates a true authentication request to the registration authority. Meanwhile, the copyright protection center acquires the state of the transaction from the blockchain account book, and if the transaction is normally ended, the illegally distributed work can be judged to be revealed by the user u; otherwise, the piracy source is the copyright owner.
Pretreatment:
the copyright protection center registers on the blockchain, deploys Ownable, copyrightRegistration, modifyInformation, copyrightInquiry, copyrightTransaction and Copyrighttransfer 6 intelligent contracts to become owners of the 6 intelligent contracts, and then calls the setRegistrict options function in the Ownable contract to set the blockchain account address of the registration mechanism.
As shown in FIG. 6, the Ownable smart contracts include an Ownable function and a setRegistationNAgene function. The lowable function records the contract owner, setregistextionangenecy function sets the blockchain account address of the registry.
As shown in fig. 7, the copyrightextraction smart contract includes a copyrightextraction function. The copyrightmaster function is called by the rights issuer to hold metadata (work id, work name, copyright holder, category, description, authoring completion time, trade price, transfer price, hash value) for the digital work.
As shown in fig. 8, the modification information intelligent contract includes a setTransferOfPrice function, a setsubspribeofprice function, and a settransferferlock function. The setTransferOfPrace function is used to set the transfer price of the digital work, the setSubscribeOfPrace function is used to set the trade price of the digital work, and the setTransferLock function is used to control the transfer rights of the digital work.
As shown in fig. 9, the function in the CopyrightInquiry smart contract is getInformation, getAllSubscribers, getSubscribersCount, getAllDigitalWorks, getTransferOfLock, getOwner, getSubscribers as follows. The getInformation function queries the digital work for details (id, name, owner, category, description, creation time, transaction price, transfer price, raw hash, subscriber address), the getallrascribers function is used to query all users subscribing to a digital work, and the getsubs count function queries the number of users subscribing to a digital work. The getallDigitalWorks function queries all work ids owned by a copyright owner. The getTransferOfLock function queries the transfer rights for a digital work. The getOwner function queries the copyright owner of a digital work. The getsubscirber function queries the ethernet address of a user subscribing to the digital work.
As shown in fig. 10, the CopyrightTransaction smart contract contains the following functions: requestTransaction, saveInformation, ininitializeOfTxn, acceptOfTxn, revealKeyOfTxn, noComplainOfTxn, complainRootOfTxn, complainLeafOfTxn, complainNodeOfTxn, refundOfTxn. The user invokes the requestTransaction function to send a data request to the copyright owner. After the copyright protection center embeds the digital fingerprint in the work, the saveInformation function is called to store the encrypted digital fingerprint and the encrypted embedded key, and the Merkle root of the work containing the digital fingerprint. The copyright owner calls an inititialzeoftxn function to initialize transaction details (block information, user address, key hash value, ciphertext Merkle root) and pay a deposit, if the initialization data is correct, the user calls an accept oftxn function to pay a transaction price and a deposit, and if the user pays the transaction price and the deposit, the copyright owner calls a revealekeyoftxn function to upload a key. The user downloads the key and decrypts, the user checks the file, the file is not objection, and the nocomplainfTxn function is called to end the transaction; if the objection exists, the corresponding decision function is called according to the checked error node, and the two parties call the refndOfTxn function according to the transaction state to end the transaction.
As shown in fig. 11, the CopyrightTransfer smart contract contains the following functions: requestTransfer, ininitialize, accept, revealKey, noComplain, complainAboutRoot, complainAboutLeaf, complainAboutNode, refund. The user invokes the requestTransfer function to send a rights transfer request to the rights holder. The copyright owner calls the initalize function to initialize transfer process information (block information, user address, key hash value, plaintext Merkle root, ciphertext Merkle root) and pay a deposit, if the initialization data is correct, the user calls the accept function to pay the transfer price and deposit, and if the user pays the transfer price and deposit, the copyright owner calls the revealekey function to upload the key. The user downloads the secret key and decrypts the secret key, the user checks the file, the file is not objection, and the noComplain function is called to end the copyright assignment process; if the transaction state is inconsistent, the corresponding decision function is called according to the checked error node, and the two parties call the refend function according to the transaction state to end the transaction.
The CodrightRegulation Smart contract inherits from the down able, the Modifinformation Smart contract inherits from the CopyrightRegistration, copyrightInquiry Smart contract inherits from the CopyrightRegistration, copyrightTransfer Smart contract inherits from the Modifinformation, copyrightInquiry, copyrightTransaction inherits from the CodrightTransfere. Six smart contracts constitute a DApp running on the blockchain and perform the functions of each phase.
Copyright registration:
in step 21, the copyright owner registers in the blockchain network and performs identity authentication to the registration mechanism to acquire an identity ID.
Step 22, copyright owner uses AES encryption algorithm and key k 1 Encrypting the work X to be registered to obtain an encrypted work X e And uses the public key pk of the rights issuer c To key k 1 Encryption to obtainThen the encrypted work X eAnd the ID is sent to the copyright protection center.
Step 23, the copyright protection center uses its own private key sk c For a pair ofDecryption is performed to obtain a key k 1 And uses the key k 1 For encrypted works X e And decrypting to obtain the work X.Then, after the copyright protection center examines the work X, firstly calculating the Hash value Hash (X) of the plaintext work X, and embedding the identity ID of the copyright owner into the work X to obtain X w Thereafter, a work X containing a copyright watermark is calculated w Hash value Hash (X w )。
Step 24, the copyright protection center calls the copyrightthreshold function in the copyrightthreshold intelligent contract to write the related information of the work to the blockchain, including the work id, the work name, the copyright owner, the category, the description, the creation completion time, the transaction price, the transfer price, the Hash value Hash (X) of the original work and the work containing the copyright watermark X w Hash value Hash (X w ) 10 parts. After the related information is up-linked, the copyright protection center uses AES encryption algorithm and key k 2 For works X containing copyright information w Encryption to obtain X ew And uses the public key pk of the copyright owner o To key k 2 Encryption to obtainAnd X is taken as ew And->To the copyright owner.
Step 25, the copyright owner uses its own private key sk o For a pair ofDecryption is performed to obtain a key k 2 And uses the key k 2 For encrypted work X containing copyright watermark ew Decrypting to obtain a copyright watermark-containing work X w . The copyright owner may call the setsubscobeofpace function, setTransferOfPrice function, and settransferferlock function in the modification information smart contract to set the copyright trade price and the copyright transfer price, and the copyright transfer authority, respectively.
And (3) a copyright inquiry stage:
in step 31, the user registers as a user of the blockchain in the blockchain network.
Step 32, the user may call the getInformation function in the CopyrightInquiry Smart contract to query the blockchain for details of the registered work, such as: work id, work name, copyright owner, category, description, authoring completion time, trade price, transfer price, hash (X), hash (X w ) Subscriber address. Where subscriber address refers to the blockchain account address of the user who successfully subscribes to the work during the copyright trade (copyright license). The user can also call the getallctrichures function to inquire all users subscribing to the work, or call the getsubstrichur count function to inquire the number of subscribers of the work, and call the getallDitalWorks function to inquire all the ids of the work registered by a certain user in the blockchain.
Copyright trading stage:
step 41, the user registers in the blockchain network and performs identity authentication to the registration mechanism to obtain a unique identity ID u
Step 42, the user sends a data request message to the copyright owner by calling the requestTransaction function in the CopyrightTransaction Smart contract.
Step 43, after the copyright owner receives the data request message, the copyright owner uses AES encryption algorithm and key k 1 For requested data X w Encryption to obtain an encrypted work X ew And uses the public key pk of the rights issuer c To key k 1 Encryption to obtainThen the encrypted work X ew And->And sending the information to a copyright protection center.
Step 44, the user authenticates himselfAnd requesting the purchase work id to be encrypted and sent to the copyright protection center. Wherein (1) >Indicating that the registration authority uses its own private key sk a For user identity ID u Is a digital signature of (a).
Step 45, the copyright protection center uses its own private key sk c For a pair ofDecryption is performed to obtain a key k 1 And uses the key k 1 For encrypted works X ew Decrypting to obtain the requested data X w And selecting a proper digital fingerprint algorithm to carry out user identity ID u Embedded in X w X is obtained in (1) u And calculates work X containing user fingerprint information u Hash value Hash (X u ). The copyright protection center then applies X u And (3) constructing a Merkle tree in a blocking way, calculating to obtain a plaintext Merkle root, and calling a saveInformation function to write encrypted fingerprint information, an encrypted embedded key and the plaintext Merkle root into the blockchain account book. The rights issuer then uses the AES encryption algorithm and the key k 2 For work X u Encryption is carried out to obtain an encrypted work X eu And uses the public key pk of the copyright owner o To key k 2 Encryption get->And will encrypt work X eu 、/>The plaintext Merkle root and the blocking information are sent to the copyright owner. The block information comprises a block mode, a block size, a block number and a Merkle tree depth.
Step 46, copyright owner uses own private key sk o For a pair ofDecryption is performed to obtain a key k 2 And uses the key k 2 For encrypted works X eu Decrypting to obtain data X containing user fingerprint u . Copyright ownerOriginal work X u Constructing Merkle tree according to the same blocking mode of the copyright protection center, and combining Merkle leaf child nodes and non-leaf nodes to use encryption key k 3 Encrypting to obtain a ciphertext Z, constructing a Merkle tree, and calculating a ciphertext Merkle root. The copyright owner calls an initialzeOfTxn function to initialize copyright transaction process information, and uploads the block information, the user blockchain account address and the key k 1 Hash value, ciphertext Merkle root, and pay deposit. The copyright owner uses the AES encryption algorithm and the key k 4 Encrypting the Z vector to obtain ciphertext C, and using the public key pk of the user u To key k 4 Encryption get->And ciphertext C,And sending the message to the user.
Step 47, the user uses his own private key sk u For a pair ofDecryption is carried out to obtain a key k 4 And uses the key k 4 And decrypting the ciphertext C to obtain a vector Z. The user reads the block information and the ciphertext Merkle root uploaded in the step 46 by the copyright owner from the blockchain, constructs a Merkle tree of the vector Z according to the same block mode of the copyright owner, and obtains the root r of the Merkle tree of the vector Z, compares the root r with the ciphertext Merkle root, and if the root r is different from the root r, the transaction is terminated; if so, the user invokes the accept OfTxn function to pay the transfer price and deposit.
Step 48, the copyright owner invokes the function revealkeoftxn upload key k 3
Step 49, user reads key k from blockchain ledger 3 Locally using key k 3 Decrypting the vector Z to recover the original file X u Checking whether the file is wrong, if the file is correct, calling a function nocomplainfTxn to end the copyright transaction process; if the file is wrong, the file X is obtained u According to copyright owner profileAnd constructing the Merkle tree in the same block mode, judging whether the node value in the Merkle tree is wrong, calling a corresponding judgment function complainRootOfTxn, complainLeafOfTxn, complainNodeOfTxn to prove malicious behavior, and ending the transaction.
Copyright assignment phase:
step 51, the user registers in the blockchain network and performs identity authentication to the registration mechanism to obtain a unique identity ID u
At step 52, the user sends a copyright transfer request to the copyright owner by invoking the requestTransfer function in the CopyrightTransferSmart contract.
Step 53, after negotiating with the user, the copyright owner invokes the settranferlock function in the modification information intelligent contract to open the copyright assignment right.
Step 54, the copyright owner blocks the original work X to construct a Merkle tree, calculates a plaintext Merkle root, and combines the Merkle leaf child node and the non-leaf node to use the encryption key k 1 Encrypting to obtain a ciphertext Z, constructing a Merkle tree, and calculating a ciphertext Merkle root. Copyright owner calls initial function to initialize transfer process information, and uploads block information, user block chain account address and key k 1 Hash value, plaintext Merkle root, ciphertext Merkle root, and pay the deposit, wherein the block information includes block mode, block size, block number, merkle tree depth. The copyright owner uses the AES encryption algorithm and the key k 2 Encrypting the Z vector to obtain ciphertext C, and using the public key pk of the user u To key k 2 Encryption to obtainAnd ciphertext C>And sending the message to the user.
Step 55, the user uses his own private key sk u For a pair ofDecryption is carried out to obtainKey k 2 And uses the key k 2 And decrypting the ciphertext C to obtain a vector Z. The user reads the block information and the ciphertext Merkle root uploaded by the copyright owner in the step 54 from the blockchain, constructs a Merkle tree of the vector Z according to the same block mode of the copyright owner, and obtains the root r of the Merkle tree of the vector Z, compares the root r with the ciphertext Merkle root, and if the root r is different from the root r, the transaction is terminated; if so, the user invokes the accept function to pay the transfer price and deposit.
Step 56, the copyright owner invokes the function revealKey upload key k 1
Step 57, user reads key k from blockchain ledger 1 Locally using key k 1 Decrypting the vector Z, recovering an original file X, checking whether the file is wrong, and if the file is correct, calling a function noComplain to end the copyright assignment process; if the file is wrong, the file X is constructed into a Merkle tree according to the same block mode of the copyright owner, whether the node value in the Merkle tree is wrong or not is judged, a corresponding judgment function complainAboutRoot, complainAboutLeaf, complainAboutNode is called to prove malicious behavior, and the transfer process is ended.
Copyright maintenance stage:
step 61, the copyright owner discovers the suspected infringement work X' and combines it with the original work X w After encryption, the encrypted data is sent to a copyright protection center, and a copyright owner calculates a Hash value Hash (X ') of the suspected infringement work X' and uploads the Hash value Hash to a blockchain account book for storage.
Step 62, the copyright protection center compares the suspected infringement work X 'with the original work X, and if the suspected infringement work X' and the original work X have no correlation, the arbitration is finished; if infringement exists, the digital fingerprint information and the encrypted embedded key corresponding to the work are downloaded from the blockchain ledger, and are decrypted by using the private key of the user, and the fingerprint information ID is extracted from the infringement work X' u Fingerprint information ID u To the registration authority.
Step 63, the registration authority retrieves the ID in the local database u The corresponding real identity information u is sent to a copyright protection center.
Step 64, the copyright protection center inquires transaction information of the work distribution in the transaction process from the blockchain account book, and if the transaction state of the work distribution is normally finished, the illegally distributed work can be judged to be revealed by the user u; otherwise, the piracy source is the copyright owner.
The foregoing is a further detailed description of the invention in connection with the preferred embodiments, and is not intended to limit the practice of the invention to such description. It will be understood by those skilled in the art that various changes in detail may be effected therein without departing from the scope of the invention as defined by the claims appended hereto.

Claims (7)

1. The digital copyright protection method based on the block chain is characterized by comprising the following steps:
in the preprocessing stage, a copyright protection center mechanism registers on a blockchain network, deploys intelligent contracts of copyright protection to become owners of the contracts, and then sets blockchain account addresses of the registration mechanism;
In the copyright registration stage, after the copyright owner finishes the creation of the work, the created work and the verified identity information are encrypted and sent to a copyright protection center, after the copyright protection center decrypts the created work and checks the created work, the copyright protection center is responsible for embedding the copyright information into the original work and storing the information of the digital work through an intelligent contract, so that the effect of right confirmation of the digital work is achieved;
in the copyright inquiry stage, the blockchain user acquires detailed information of a certain digital work by calling an intelligent contract;
in the copyright transaction stage, a user sends a data request to a copyright owner, the copyright owner sends the requested data to a copyright protection center, and then the user sends authenticated identity information to the copyright protection center; the copyright protection center is responsible for embedding digital fingerprints of users in the digital works, transmitting the digital works containing the user fingerprints to a copyright owner, and calling intelligent contracts by the copyright owner and the users to finish delivery certification of the digital works;
in the copyright assignment stage, a user requests the copyright assignment to a copyright owner, the copyright owner sets the assignment amount and opens the assignment authority through an intelligent contract, and then the copyright owner and the user call the intelligent contract to finish the delivery certification of the digital work;
The copyright trade stage and the copyright transfer stage are realized by adopting a distribution mode OptiFairSwap for delivering the digital works, and the specific realization modes are as follows,
step 1, a copyright owner blocks a file X to be distributed to obtain { X } 1 ,x 2 ,x 3 ,…,x n Building Merkle tree, and taking the leaf node vector { x } of Merkle 1 ,x 2 ,x 3 ,…,x n Sum of non-leaf node vectors y 1 ,y 2 ,y 3 ,…,y m The combination results in a vector { x } 1 ,x 2 ,…,x n ,y 1 ,y 2 ,…,y m Use of key k 1 Encrypting it results in z= { Z 1 ,z 2 ,…,z n ,z n+1 ,z n+2 ,…,z n+m -a }; the copyright owner uses the AES encryption algorithm and the key k 2 Encrypting the Z vector to obtain ciphertext C, and using the public key pk of the user u To key k 2 Encryption to obtainCiphertext C and ++>Sending to the user, and simultaneously storing the deposit into the intelligent contract by the copyright owner;
step 2, the user uses his own private key sk u For a pair ofDecryption is performed to obtain a key k 2 And uses the key k 2 Decrypting the ciphertext C to obtain a vector Z, and carrying out block construction on the vector Z to obtain a root r of a Merkle tree of the vector Z;
step 3, the user writes the root r of the Merkle tree of the vector Z into the blockchain account book through the intelligent contract, and stores the cost of the deposit and the purchase of the file and the root h of the Merkle tree of the file X into the intelligent contract;
step 4, the copyright owner reads r from the blockchain, performs the same operation as the user on the vector Z locally to construct a Merkle tree, calculates the root r 'of the Merkle tree by the vector Z, compares whether the values of r and r' are the same or not, and if the values are different, stops the transaction; if the rights are the same, the copyright owner invokes the smart contract to key k 1 Uploading to a blockchain account book for storage;
step 5, the user reads the key k from the blockchain ledger 1 Locally using key k 1 Decrypting the vector Z to obtain { x' 1 ,x′ 2 ,…,x′ n ,y′ 1 ,y′ 2 ,…,y′ m -a }; user stitching { x' 1 ,x′ 2 ,…,x′ n Obtaining a file X', if the file is correct, normally ending the transaction, retrieving the self-assurance, and retrieving the self-assurance and the cost for purchasing the file by a copyright owner; if the file is wrong, the user sends the data pi= { z of the wrong block i ,z i+1 ,z n+(i+1)/2 The corresponding brother node value in the path is used as the input parameter of the intelligent contract judging function;
step 6, the decision function first determines pi= { z submitted i ,z i+1 ,z n+(i+1)/2 Whether or not the leaf node and the non-leaf node of the root r of the Merkle tree; if not, then pi= { z submitted by the user is described i ,z i+1 ,z n+(i+1)/2 When the user tampers, the copyright owner retrieves the self deposit from the intelligent contract and the money of the purchase file of the user and the deposit of the user; the transaction is normally ended; if the submitted input parameters are leaf nodes and non-leaf nodes of the root r of the Merkle tree, the decision function uses the key k 1 P = { z i ,z i+1 ,z n+(i+1)/2 Decryption is carried out to obtain { x } i ,x i+1 ,y (i+1)/2 -a }; and verify { x } i ,x i+1 ,y (i+1)/2 Whether or not the leaf node and the non-leaf node of the root h of the Merkle tree; if not, the distributed file is described as an error file, and the user retrieves the self-assurance from the intelligent contract And purchase money of the file and the guarantee of the copyright owner, and the transaction is abnormally ended; if yes, the distributed files are the correct files, the copyright owner retrieves the self deposit from the intelligent contract, the money of the user for purchasing the files and the deposit of the user, and the transaction is normally ended;
in the copyright maintenance stage, a copyright owner discovers a suspected infringement work X ', encrypts and transmits the suspected infringement work X ' and the original work X to a copyright protection center, and the copyright protection center compares the original work X with the suspected infringement work X '; if infringement exists, the copyright protection center extracts the user fingerprint ID of the work X' u And initiates a true identity verification request to the registration mechanism; meanwhile, the copyright protection center acquires the state of the transaction from the blockchain account book, and if the transaction is normally ended, the illegally distributed work can be judged to be revealed by the user u; otherwise, the piracy source is the copyright owner.
2. The blockchain-based digital rights protection method of claim 1, wherein: the specific implementation of the pre-treatment stage is as follows,
the copyright protection center registers on the blockchain, deploys Ownable, copyrightRegistration, modifyInformation, copyrightInquiry, copyrightTransaction and Copyrighttransfer6 intelligent contracts to become owners of the 6 intelligent contracts, and then calls setRegistrict options function in the Ownable contract to set the blockchain account address of the registration mechanism;
The intelligent contract comprises an lowable function and a setregistextiongene function, wherein the lowable function records a contract owner, and the setregistextiongene function sets a blockchain account address of a registration mechanism;
the CodrightRegulation Smart contract includes a CodrightRegulation function called by the rights issuer for holding metadata of the digital work including work id, work name, copyright owner, category, description, authoring completion time, transaction price, transfer price, hash value;
the modification information intelligent contract comprises a setTransferOfPrice function, a setSubscribeOfPrice function and a settransferLock function; the setTransferOfPrace function is used for setting the transfer price of the digital work, the setSubscribeOfPrace function is used for setting the transaction price of the digital work, and the setTransferLock function is used for controlling the transfer authority of the digital work;
the function in the CopyrightInquiry smart contract is getInformation, getAllSubscribers, getSubscribersCount, getAllDigitalWorks, getTransferOfLock, getOwner, getSubscribers as follows; the getInformation function is used for inquiring the detailed information of the digital work and comprises an id, a name, an owner, a category, a description, creation time, transaction price, transfer price, original hash and subscriber address, the getAllSubscribers function is used for inquiring all users subscribed to a certain digital work, and the getSubscriberCount function is used for inquiring the number of users subscribed to the certain digital work; the getAllDigitalWorks function queries all work ids owned by a copyright owner; the getTransferOfLock function queries the transfer rights of a digital work; the getOwner function queries the copyright owner of a digital work; the getSubscribers function queries the ethernet address of a user subscribing to the digital work;
The CopyrightTransaction Smart contract contains the following functions: requestTransaction, saveInformation, ininitializeOfTxn, acceptOfTxn, revealKeyOfTxn, noComplainOfTxn, complainRootOfTxn, complainLeafOfTxn, complainNodeOfTxn, refundOfTxn, the user invokes the requestTransaction function to send a data request to the copyright owner; after the copyright protection center embeds the digital fingerprint in the work, calling a saveInformation function to store the encrypted digital fingerprint and the encrypted embedded key, and a Merkle root of the work containing the digital fingerprint; the copyright owner calls an initialzeOfTxn function to initialize transaction details and pay deposit, wherein the transaction details comprise block information, user addresses, key hash values and ciphertext Merkle root; if the initialization data is correct, the user calls an accept OfTxn function to pay the transaction price and deposit, and if the user pays the transaction price and deposit, the copyright owner calls a revealeKeyOfTxn function to upload a secret key; the user downloads the key and decrypts, the user checks the file, the file is not objection, and the nocomplainfTxn function is called to end the transaction; if objection exists, calling a corresponding decision function according to the checked error node, and calling a refndOfTxn function according to the transaction state by both parties to end the transaction;
The CopyrightTransferSmart contract contains the following functions: requestTransfer, ininitialize, accept, revealKey, noComplain, complainAboutRoot, complainAboutLeaf, complainAboutNode, refund; the user calls a requestTransfer function to send a copyright transfer request to a copyright owner; the copyright owner calls the initial value function to initialize transfer process information and pay deposit, if the initialization data is correct, the user calls the accept function to pay transfer price and deposit, if the user pays transfer price and deposit, the copyright owner calls the revealeKey function to upload the key; the user downloads the secret key and decrypts the secret key, the user checks the file, the file is not objection, and the noComplain function is called to end the copyright assignment process; if the objection exists, calling a corresponding decision function according to the checked error node, and calling a refend function according to the transaction state by both parties to end the transaction;
the CodrightRegulation Smart contract inherits from the down able, the Modifinformation Smart contract inherits from the CopyrightRegistration, copyrightInquiry Smart contract inherits from the CopyrightRegistration, copyrightTransfer Smart contract inherits from the Modifinformation, copyrightInquiry, copyrightTransaction inherits from the CodrightTransferer; six smart contracts constitute a DApp running on the blockchain and perform the functions of each phase.
3. The blockchain-based digital rights protection method of claim 2, wherein: the specific implementation of the rights registration phase is as follows,
step 21, the copyright owner registers in the blockchain network and performs identity authentication to a registration mechanism to acquire an identity ID;
step 22, copyright owner uses AES encryption algorithm and key k 1 Encrypting the work X to be registered to obtain an encrypted work X e And uses the public key pk of the rights issuer c To key k 1 Encryption to obtainThen the encrypted work X eAnd the ID is sent to a copyright protection center;
step 23, the copyright protection center uses its own private key sk c For a pair ofDecryption is performed to obtain a key k 1 And uses the key k 1 For encrypted works X e Decrypting to obtain a work X; after the copyright protection center examines the work X, firstly calculating the Hash value Hash (X) of the plaintext work X, and embedding the identity ID of the copyright owner into the work X to obtain X w Thereafter, a work X containing a copyright watermark is calculated w Hash value Hash (X w );
Step 24, the copyright protection center calls the copyrightthreshold function in the copyrightthreshold intelligent contract to write the related information of the work to the blockchain, including the work id, the work name, the copyright owner, the category, the description, the creation completion time, the transaction price, the transfer price, the Hash value Hash (X) of the original work, the work containing the copyright watermark X w Hash value Hash (X w ) 10 parts; after the related information is up-linked, the copyright protection center uses AES encryption algorithm and key k 2 For works X containing copyright information w Encryption to obtain X ew And uses the public key pk of the copyright owner o To key k 2 Encryption to obtainAnd X is taken as ew And->Send to the copyright owner;
step 25, the copyright owner uses its own private key sk o For a pair ofDecryption is performed to obtain a key k 2 And uses the key k 2 For encrypted work X containing copyright watermark ew Decrypting to obtain a copyright watermark-containing work X w The method comprises the steps of carrying out a first treatment on the surface of the The copyright owner may call the setsubscobeofpace function, setTransferOfPrice function, and settransferferlock function in the modification information smart contract to set the copyright trade price and the copyright transfer price, and the copyright transfer authority, respectively.
4. The blockchain-based digital rights protection method of claim 2, wherein: the specific implementation of the copyright inquiry phase is as follows,
step 31, the user registers in the blockchain network as the user of the blockchain;
step 32, the user may call the getInformation function in the CopyrightInquiry Smart contract to query details of the registered work in the blockchain, including: work id, work name, copyright owner, category, description, authoring completion time, trade price, transfer price, hash (X), hash (X w ) Subscriber address; wherein subscriber address refers to a blockchain account address of a user who successfully subscribes to the work in the course of copyright transactions; the user can also call the getallctrichures function to inquire all users subscribing to the work, or call the getsubstrichur count function to inquire the number of subscribers of the work, and call the getallDitalWorks function to inquire all the ids of the work registered by a certain user in the blockchain.
5. The blockchain-based digital rights protection method of claim 2, wherein: the specific implementation of the copyright trade phase is as follows,
step 41, the user registers in the blockchain network and performs identity authentication to the registration mechanism to obtain a unique identity ID u
Step 42, the user sends a data request message to the copyright owner by calling the requestTransaction function in the CopyrightTransaction Smart contract;
step 43, after the copyright owner receives the data request message, the copyright owner uses AES encryption algorithm and key k 1 For requested data X w Encryption to obtain an encrypted work X ew And uses the public key pk of the rights issuer c To key k 1 Encryption to obtainThen the encrypted work X ew And->Sending the information to a copyright protection center;
step 44, the user authenticates himself And requesting the encryption of the id of the purchased work to be sent to a copyright protection center; wherein (1)>Indicating that the registration authority uses its own private key sk a For user identity ID u Is a digital signature of (a);
step 45, the copyright protection center uses its own private key sk c For a pair ofDecryption is performed to obtain a key k 1 And uses the key k 1 For encrypted works X ew Decrypting to obtain the requested data X w And selecting a proper digital fingerprint algorithm to carry out user identity ID u Embedded in X w X is obtained in (1) u And calculates work X containing user fingerprint information u Hash value Hash (X u ) The method comprises the steps of carrying out a first treatment on the surface of the The copyright protection center then applies X u The method comprises the steps of constructing a Merkle tree in a blocking mode, calculating to obtain a plaintext Merkle root, and calling a saveInformation function to write encrypted fingerprint information, an encrypted embedded key and the plaintext Merkle root into a blockchain account book; the rights issuer then uses the AES encryption algorithm and the key k 2 For work X u Proceeding withEncryption to obtain an encrypted work X eu And uses the public key pk of the copyright owner o To key k 2 Encryption get->And will encrypt work X eu 、/>The plaintext Merkle root and the blocking information are sent to a copyright owner; the partitioning information comprises a partitioning mode, a block size, a block number and a Merkle tree depth;
step 46, copyright owner uses and uses key k 2 For encrypted works X eu Decrypting to obtain data X containing user fingerprint u The method comprises the steps of carrying out a first treatment on the surface of the The transaction parties use their own private key sk o For a pair ofLine decryption to obtain key k 2 Work X is completed according to the OptiFairSwap protocol u The status of the transaction is recorded on the blockchain ledger.
6. The blockchain-based digital rights protection method of claim 2, wherein: the specific implementation of the copyright assignment phase is as follows,
step 51, the user registers in the blockchain network and performs identity authentication to the registration mechanism to obtain a unique identity ID u
Step 52, the user sends a copyright transfer request to the copyright owner by calling the requestTransfer function in the CopyrightTransferSmart contract;
step 53, the copyright owner negotiates with the user and invokes the settranferLock function in the modification information intelligent contract to open the copyright assignment right;
in step 54, the transaction partner agreement completes the distribution of work X according to OptiFairSwap, and the status of the transaction is recorded on the blockchain ledger.
7. The blockchain-based digital rights protection method of claim 2, wherein: the copyright maintenance phase is specifically implemented as follows,
Step 61, the copyright owner discovers the suspected infringement work X' and combines it with the original work X w After encryption, the encrypted data is sent to a copyright protection center, and a copyright owner calculates a Hash value Hash (X ') of a suspected infringement work X ' and uploads the Hash value Hash (X ') to a blockchain account book for storage;
step 62, the copyright protection center compares the suspected infringement work X 'with the original work X, and if the suspected infringement work X' and the original work X have no correlation, the arbitration is finished; if infringement exists, the encrypted digital fingerprint information and the encrypted embedded key corresponding to the work are downloaded from the blockchain ledger, and are decrypted by using the private key of the user, and the fingerprint information ID is extracted from the infringement work X' u Fingerprint information ID u Sending to a registration mechanism;
step 63, the registration authority retrieves the ID in the local database u The corresponding real identity information u is sent to a copyright protection center;
step 64, the copyright protection center inquires transaction information of the work distribution in the transaction process from the blockchain account book, and if the transaction state of the work distribution is normally finished, the illegally distributed work can be judged to be revealed by the user u; otherwise, the piracy source is the copyright owner.
CN202110895257.8A 2021-08-05 2021-08-05 Digital copyright protection method based on block chain Active CN113706344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110895257.8A CN113706344B (en) 2021-08-05 2021-08-05 Digital copyright protection method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110895257.8A CN113706344B (en) 2021-08-05 2021-08-05 Digital copyright protection method based on block chain

Publications (2)

Publication Number Publication Date
CN113706344A CN113706344A (en) 2021-11-26
CN113706344B true CN113706344B (en) 2024-03-01

Family

ID=78651635

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110895257.8A Active CN113706344B (en) 2021-08-05 2021-08-05 Digital copyright protection method based on block chain

Country Status (1)

Country Link
CN (1) CN113706344B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114117495B (en) * 2021-11-30 2024-10-29 上海大学 Copyright privacy protection method and system in material data copyright auction process
CN114202325B (en) * 2021-12-16 2023-06-06 北京天德科技有限公司 NFR issuing intelligent contract and operation method thereof
CN114386147B (en) * 2022-01-05 2024-07-23 武汉市市政建设集团有限公司 Copyright protection method and system of BIM model based on blockchain and intelligent contract
CN114463006A (en) * 2022-01-26 2022-05-10 蚂蚁区块链科技(上海)有限公司 Geographical indication processing method and device based on alliance chain
CN114841701B (en) * 2022-07-04 2022-10-21 浙江大学 Digital artwork anti-theft credible transaction method and device based on NFT
CN115964680B (en) * 2022-12-13 2023-09-29 暨南大学 Copyright protection method based on double authentication blocking signature and blockchain
CN116305017B (en) * 2023-03-10 2023-11-03 西安工程大学 Image copyright protection method based on mask and identification hidden embedding
CN116563030A (en) * 2023-07-07 2023-08-08 四海良田(天津)智能科技有限公司 Software copyright protection method and system based on blockchain technology
CN117670599A (en) * 2023-12-13 2024-03-08 校宝在线(杭州)科技股份有限公司 Block chain technology-based post-class work trading method for students

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012088663A1 (en) * 2010-12-28 2012-07-05 北京邮电大学 Digital watermark works with characteristics of copyright protection and generation method thereof
CN107798650A (en) * 2017-09-18 2018-03-13 众安信息技术服务有限公司 A kind of digital asset infringement decision method and device based on block chain
CN109002487A (en) * 2018-06-25 2018-12-14 百度在线网络技术(北京)有限公司 A kind of post-processing approach based on copyright registration information, device, equipment and medium
CN109711120A (en) * 2018-12-17 2019-05-03 浙江大学 A kind of digital resource infringement method for tracing and system based on block chain digital watermarking
CN111428207A (en) * 2020-04-23 2020-07-17 重庆邮电大学 Digital copyright registration and transaction method based on block chain technology
CN111538784A (en) * 2020-04-21 2020-08-14 全球能源互联网研究院有限公司 Block chain-based digital asset transaction method and device and storage medium
CN112418851A (en) * 2019-08-21 2021-02-26 余伟坚 Digital copyright registration, transaction and protection method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012088663A1 (en) * 2010-12-28 2012-07-05 北京邮电大学 Digital watermark works with characteristics of copyright protection and generation method thereof
CN107798650A (en) * 2017-09-18 2018-03-13 众安信息技术服务有限公司 A kind of digital asset infringement decision method and device based on block chain
CN109002487A (en) * 2018-06-25 2018-12-14 百度在线网络技术(北京)有限公司 A kind of post-processing approach based on copyright registration information, device, equipment and medium
CN109711120A (en) * 2018-12-17 2019-05-03 浙江大学 A kind of digital resource infringement method for tracing and system based on block chain digital watermarking
CN112418851A (en) * 2019-08-21 2021-02-26 余伟坚 Digital copyright registration, transaction and protection method and system
CN111538784A (en) * 2020-04-21 2020-08-14 全球能源互联网研究院有限公司 Block chain-based digital asset transaction method and device and storage medium
CN111428207A (en) * 2020-04-23 2020-07-17 重庆邮电大学 Digital copyright registration and transaction method based on block chain technology

Also Published As

Publication number Publication date
CN113706344A (en) 2021-11-26

Similar Documents

Publication Publication Date Title
CN113706344B (en) Digital copyright protection method based on block chain
US8078725B2 (en) Method and system for secure distribution and utilization of data over a network
CN109376504B (en) Picture privacy protection method based on block chain technology
US7725404B2 (en) Secure electronic commerce using mutating identifiers
US7376624B2 (en) Secure communication and real-time watermarking using mutating identifiers
AU2001269856B2 (en) Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm)
US7484246B2 (en) Content distribution system, content distribution method, information processing apparatus, and program providing medium
US8359392B2 (en) System and method for securely communicating on-demand content from closed network to dedicated devices, and for compiling content usage data in closed network securely communicating content to dedicated devices
KR100467929B1 (en) System for protecting and managing digital contents
US7587366B2 (en) Secure information vault, exchange and processing system and method
WO2021128244A1 (en) Registration authorization method and system
EP1722532A2 (en) Deliver-upon-request secure electronic message system
US20040133797A1 (en) Rights management enhanced storage
EA009793B1 (en) Distribution and rights management of digital content
TWI234979B (en) Digital content protection method
JP3896909B2 (en) Access right management device using electronic ticket
JP3999527B2 (en) Computer network authentication method and data distribution method
Conrado et al. Controlled sharing of personal content using digital rights management
JP2002007912A (en) Digital content rental system and method
CN115239331A (en) Block chain-based data transaction method with copyright protection function
TW201530345A (en) Digital right management system, management method and information transmission system and method thereof
KR20240073387A (en) Did-based verification system for strengthening sovereignty of copyright holders and method for the same
Frattolillo et al. A novel approach to DRM systems
WO2023235199A1 (en) A system for managing distributed digital rights
Frattolillo et al. A model for the distribution of watermarked digital content on mobile networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant