Disclosure of Invention
The invention aims to provide a block chain-based multi-asset right-determining circulation safety monitoring system. The monitoring system carries out digital watermark embedding on digital assets which are determined by an asset owner and authorized to be monitored and protected by the system; the digital watermark comprises ownership party information of the asset and an automatic triggering program, so that the asset can be automatically triggered to be connected with a monitoring system in the processes of reading, running or copying, the information of the current running party is sent, and whether the current running party is an authorized user of the asset or not is confirmed from a block chain; when the assets are illegally read, run or copied, the processing program is executed to delete or destroy the assets, so that the assets are prevented from being further utilized and infringed.
The invention adopts the following technical scheme:
a multi-asset right-determining circulation safety monitoring system based on a block chain; the monitoring system operates on a chain of asset blocks for multi-asset validation and circulation; the monitoring system comprises an encryption subsystem and a monitoring subsystem; the encryption subsystem is used for determining the right of the asset, embedding digital watermark coding into the asset and writing the asset into a block of the asset block chain; the monitoring subsystem is used for monitoring and decoding the digital watermark during asset circulation and comparing the digital watermark with the existing authority confirming information on the asset block chain so as to judge whether the current asset is in a legal circulation state;
wherein the encryption subsystem comprises:
the right confirming unit is used for receiving asset right confirming and right using requests; acquiring a first asset code and a certificate of asset ownership from an asset owner according to an asset authentication request, performing full-chain consensus authentication on the asset ownership, and using a full-chain node as a credit endorsement for the authentication behavior;
an embedding unit for generating a digital watermark associated with the owner of the asset and embedding the digital watermark into a first asset code, thereby obtaining a second asset code;
an output component for outputting and writing the second asset code into a block ledger of the asset block chain;
further, the listening subsystem comprises:
a monitoring unit for monitoring feedback information of the automatic trigger code contained by the second asset code;
a verification unit for receiving and verifying asset user information;
the processing unit is used for operating a corresponding recording strategy and an asset code processing strategy after the verification result of the asset user is obtained;
the first asset code and the second asset code comprise an integral description of the content of one asset and also comprise a plurality of sub-assets which are obtained by splitting one asset and respectively described;
each of said asset owners has a pair of keys based on asymmetric cryptography; the key pair comprises a public key Pkey and a private key Skey; the public key Pkey is published to all nodes on the asset block chain; the private key, Skey, is self-escrowed by the asset owner;
the digital watermark comprises password information, plain code information and feedback information; the password information is a fixed-length character string obtained by processing the first asset code by using a Hash function, and the character string is encrypted by using a private key Skey of the asset owner; the plain code information is public identity information of the property owner; the feedback information comprises an automatically triggered monitoring program used for sending the user information of the second asset code currently operated to the monitoring node;
all legal users who operate the second asset code are explicitly informed of relevant information of the monitoring program, wherein the relevant information at least comprises the existence, the running process and the running effect of the monitoring program; the monitoring program is in communication connection with the monitoring unit when the second asset code is operated each time, and sends the feedback information to the monitoring unit;
the monitoring system has an external application program interface; the feedback information is in data communication with the monitoring unit through the external application program interface;
the embedding unit includes verifying whether a rate of change of an information characteristic of the second asset code and the first asset code exceeds a threshold;
when the user of the third party operates the second asset code, legal application is required to be carried out, the third party is connected to the monitoring system through the external application program interface, the right confirming unit of the monitoring system and the asset owner jointly verify and record the legal identity of the user, and the user is granted the right of use of the second asset code;
the asset code handling policy includes automatic deletion and destruction of the second asset code in a local system.
The beneficial effects obtained by the invention are as follows:
1. the monitoring system can fully utilize the characteristics of high data consistency and non-falsification in the block chain to carry out the authority confirmation and the digital watermark confirmation and monitoring on multiple assets, particularly a large number of simple assets, so that the monitoring range of the digital assets in the circulation process is more widely covered;
2. the digital watermarking technology of the invention can not make obvious quality reduction or effect reduction on the operation of the digital assets after being embedded, so that an illegal user can not realize the automatic trigger program embedded in the digital assets, thereby illegal and targeted infringement operation can not be made;
3. the implementation method is suitable for various types of digital assets, including but not limited to pictures, videos, audios, characters, games and the like, and better provides a multi-asset attribute protection scheme for asset owners;
4. the software and hardware layout requirements of the invention are based on modular design, and the switching and blocking can be conveniently carried out in the technical updating and modifying stage, thereby being beneficial to the optimization and upgrading of the technical scheme in the future.
Detailed Description
In order to make the technical solution and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the embodiments thereof; it should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. Other systems, methods, and/or features of the present embodiments will become apparent to those skilled in the art upon review of the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the detailed description that follows.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it is to be understood that if there is an orientation or positional relationship indicated by the terms "upper", "lower", "left", "right", etc. based on the orientation or positional relationship shown in the drawings, it is only for convenience of description and simplification of description, but it is not intended to indicate or imply that the device or assembly referred to must have a specific orientation.
The first embodiment is as follows:
a multi-asset right-determining circulation safety monitoring system based on a block chain; the monitoring system operates on a chain of asset blocks for multi-asset validation and circulation; the monitoring system comprises an encryption subsystem and a monitoring subsystem; the encryption subsystem is used for determining the right of the asset, embedding digital watermark coding into the asset and writing the asset into a block of the asset block chain; the monitoring subsystem is used for monitoring and decoding the digital watermark during asset circulation and comparing the digital watermark with the existing authority confirming information on the asset block chain so as to judge whether the current asset is in a legal circulation state;
wherein the encryption subsystem comprises:
the authority confirming unit is used for receiving the asset authority confirming request and the right of use request, acquiring a first asset code and the proof of the asset ownership from an asset owner according to the asset authority confirming request, carrying out full-chain consensus authentication on the asset ownership, and using a full-chain node as a credit endorsement for the authority confirming action;
an embedding unit for generating a digital watermark associated with the owner of the asset and embedding the digital watermark into a first asset code, thereby obtaining a second asset code;
an output component for outputting and writing the second asset code into a block ledger of the asset block chain;
further, the listening subsystem comprises:
a monitoring unit for monitoring feedback information of the automatic trigger code contained by the second asset code;
a verification unit for receiving and verifying asset user information;
the processing unit is used for operating a corresponding recording strategy and an asset code processing strategy after the verification result of the asset user is obtained;
the first asset code and the second asset code comprise an integral description of the content of one asset and also comprise a plurality of sub-assets which are obtained by splitting one asset and respectively described;
each of said asset owners has a pair of keys based on asymmetric cryptography; the key pair comprises a public key Pkey and a private key Skey; the public key Pkey is published to all nodes on the asset block chain; the private key, Skey, is self-escrowed by the asset owner;
the digital watermark comprises password information, plain code information and feedback information; the password information is a fixed-length character string obtained by processing the first asset code by using a Hash function, and the character string is encrypted by using a private key Skey of the asset owner; the plain code information is public identity information of the property owner; the feedback information comprises an automatically triggered monitoring program used for sending the user information of the second asset code currently operated to the monitoring node;
all legal users who operate the second asset code are explicitly informed of relevant information of the monitoring program, wherein the relevant information at least comprises the existence, the running process and the running effect of the monitoring program; the monitoring program is in communication connection with the monitoring unit when the second asset code is operated each time, and sends the feedback information to the monitoring unit;
the monitoring system has an external application program interface; the feedback information is in data communication with the monitoring unit through the external application program interface;
the embedding unit includes verifying whether a rate of change of an information characteristic of the second asset code and the first asset code exceeds a threshold;
when the user of the third party operates the second asset code, legal application is required to be carried out, the third party is connected to the monitoring system through the external application program interface, the right confirming unit of the monitoring system and the asset owner jointly verify and record the legal identity of the user, and the user is granted the right of use of the second asset code;
the asset code handling policy comprises automatic deletion and destruction of the second asset code in a local system;
in this embodiment, the first asset code includes:
1. during the creation or generation of the asset, or at the original asset code after generation; the original asset code belonged to the original owner from the post-creation ownership and no asset transfer occurred; the original asset code, after being created or generated, is not disclosed by the original owner;
2. the assets have been transferred in the past, the related ownership has been changed, and the legal rights and interests of the assets owned by the related ownership can be fully proved by the owner of the current assets;
optionally, the asset owner realizes the true right of the first asset code by adding a code of its own ownership certificate when the asset is completely created; alternatively, writing ownership certification code is periodically implemented at multiple asset creation phases so that portions of an asset can be certified even after the asset is partitioned;
furthermore, by using a block chain technology, the high consistency, the high credibility endorsement and the non-tamper property of data in a block are ensured, the asset certification information with the ownership certification code uploaded by the asset owner can be used as an effective certification in each time of authority confirmation in the future, is stored on a block chain account for a long time and is traced and certified at any time, so that the asset owner can conveniently certify and declare the ownership and a third party can conveniently inquire the ownership of the target asset; for the first asset code, receiving and accepting further monitoring by the security monitoring system by the authentication unit after obtaining authentication proof of the authentication unit;
further, the digital watermark is an information hiding technology, and information such as copyright, owner identification, date, network IP and the like can be invisibly embedded into digital codes of carriers such as video, audio, pictures, texts and the like; when invisible watermark information is embedded, the embedded watermark information is lower than the range of the minimum induction threshold value which can be born by a human perception system (such as vision and hearing) or is embedded in signal noise which is not easy to be perceived, so that the influence of the embedded data information compared with the original information is basically ignored or is difficult to find by using a conventional method; as shown in fig. 4, by analyzing a large number of low-frequency gray pixels in an original image 401, after slightly transforming the gray pixels at the bottom portion, no obvious difference is visually caused; by transforming the watermark content 402, finding out a specific coordinate position in the original image, and combining information in the watermark content 402 with the original image 401 according to an embedding algorithm to generate an image 403; meanwhile, the embedding algorithm carries out inverse operation, and the watermark content 402 can be restored from the image 403;
currently, the correlation algorithm for implementing the digital watermark includes: least significant bit method (LSB), transform domain algorithms based on transform formulas such as Discrete Cosine Transform (DCT), Fourier transform (FFT), or Hadamard transform, NEC algorithms, and the like; according to different original data characteristics, a specific algorithm and the depth of algorithm transformation can be selected; furthermore, the digital watermark can also carry out inverse operation on the data embedded with the watermark through the algorithm, so as to restore the information of the watermark; the algorithm for generating and restoring the digital watermark and the related running program are packaged into executable programs, and the execution of the generation and restoration can be completed without acquiring the specific content and process of the related algorithm when the digital watermark is generated and restored;
further, for the asset types targeted in this embodiment, such as video, audio, picture, text, game, etc., if the effect needs to be completely presented at present, the corresponding programs need to be used for decoding and reproduction, for example, audio/video, picture need to be played by software, text needs to be played by software, game needs to be played by engine program, etc.; therefore, during the decoding process, the monitoring program must be activated, so as to establish contact with the monitoring unit when the above assets are read;
in the present embodiment, a video is taken as an example;
the first stage is as follows: as shown in fig. 3, after the owner of the video decodes the segment of video by using the associated video decoder, the first asset code is obtained; the owner of the video, namely the property owner can provide legal ownership information by providing shooting equipment information, shooting place longitude and latitude information, shooting team information and the like to prove ownership of the video, namely the first property code; the asset owner uploads the first asset code and necessary ownership information to the right confirming unit through the monitoring system, and the right confirming unit carries out right confirming and authenticating operation; after the right is confirmed, the first asset code becomes an original material V, and the embedding processing of the digital watermark is waited to be carried out;
and a second stage: the embedding unit is used for manufacturing a digital watermark M; the password information C contained in the digital watermark is obtained by adopting a specified Hash function Hash () to carry out Hash operation on the first asset code, and then a section of fixed-length character string D is obtained, namely:
D=Hash(V);
the character string D can be 64 bits or 128 bits in length, and the whole length of the password information can be greatly reduced through Hash operation; meanwhile, due to the characteristics of the hash operation, any change of the original material V of the first asset code results in completely different results of the character string D of the last hash operation, so that the method can also be used as a means for verifying whether the first asset code is changed; further, after encrypting the character string D by using the private key Skey of the asset owner, password information C is obtained, that is:
C=Sign(D);
generating an asymmetric encryption algorithm of the public key Pkey and the private key Skey, wherein the asymmetric encryption algorithm can be selected from an RSA algorithm, a DSA algorithm, an ECC algorithm, a DH algorithm and the like; the method is characterized in that the public key Pkey and the private key Skey are generated in pair, and the information encrypted by the private key Skey can only be decrypted by the public key Pkey; after the secret key Skey of the asset owner is used for encryption, when other users need to verify whether the second asset code is issued by the legal asset owner, the encrypted information C can be decrypted only through the correct public key Pkey;
through the processing links, the ownership of the second asset code and the legality and consistency of the content can be verified in the right confirming link, the transmission link and the acquisition link;
further, the plain code information is public information freely set by the property owner, such as name, code number, etc., to display the identity information, and also can be used as one of the ways for the user to obtain the property;
furthermore, the feedback information has the requirement of collecting the user information, and the user has the right to know and needs to approve the requirement of collecting the information according to the information privacy rule of the network, so that the user can continue to use the assets;
the embedding unit combines the three information to generate a code segment of the digital watermark, and embeds the code segment into the first asset code through an embedding algorithm to generate the second asset code; at present, as the development of the digital watermarking technology is mature, the second asset code embedded with the digital watermark is, in this embodiment, a video V' embedded with the digital watermark, and has an extremely low perceptual degree of difference from the original material V on the whole, and a specific difference cannot be perceived under normal viewing conditions and in mass viewing; in order to ensure that the video V ' does not have too great quality degradation relative to the original material V, the embedding unit may use a video detection algorithm to compare the quality of the video V ' with the quality of the original material V, including calculation of video-related parameters such as resolution, sharpness, contrast, and code rate, and set thresholds of each item, so as to ensure the final output quality of the video V ';
in a third stage, the output unit issues the second asset code to the asset block chain, and outputs a corresponding video V' to a related video platform and a related transaction platform for other users to preview;
further, as shown in FIG. 1, the user can obtain the second asset code through the asset block chain, or in other forms, because it is already published, and can perform a simple preview or other surface operation; if the second asset code is still needed to be used, the identity of the legal user and the asset needed to be used are determined through the authentication of the authorization unit; the right confirming unit and the asset owner jointly confirm the legal identity of the asset user, wherein the legal identity comprises the fact that block chain transactions or other modes of transactions under the chain are carried out, and therefore the asset owner agrees to confirm the identity of the user as a legal user; the following steps are respectively executed for the legal user, as shown in the attached figure 5:
step S1: a verification mechanism in the asset block chain generates a key pair for a legal User, wherein the key pair comprises a User public key User-Pkey and a User private key User-Skey; carrying out full-chain broadcasting on the User public key User-Pkey to the resource block chain and writing the full-chain broadcasting into a block account book, and taking the User public key User-Pkey as the identity of the legal User;
step S2: once detecting that the second asset code is operated, the monitoring program in the digital watermark is simultaneously activated and obtains the information of the legal User, so as to submit the information of the legal User, such as the User public key User-Pkey, to the monitoring unit; the monitoring unit submits the obtained information of the legal User to the verification unit, the verification unit confirms the identity of the corresponding legal User by searching the User public key User-Pkey in a block book of the resource block chain, and the processing unit executes an instruction for reserving the second asset code; thus, the legitimate user may then proceed with further operations on the second asset code;
alternatively, as shown in fig. 2, when an illegal user obtains and reads the second asset code, there are several cases:
1. the second asset code is not known to have the digital watermark;
2. although the second asset code is known to have the digital watermark, the corresponding restoring program is not acquired, so that the watermark cannot be restored and the corresponding cracking means cannot be carried out;
3. even if the digital watermark is cracked and the first asset code is restored, the monitoring program cannot pass the identity authentication of an illegal user;
and when the monitoring system can not confirm the identity of the user, the processing unit executes a strategy of destroying or deleting the second asset code, so that further infringement of the assets by illegal users is blocked.
Example two:
this embodiment should be understood to include at least all of the features of any of the foregoing embodiments and further modifications thereon;
the form of the digital watermark can have various expression forms according to the form of the asset, including in the embodiment, the digital watermark exists in the form of a two-dimensional code in combination with the form of a code;
the embedded unit converts the password information C and the plain code information into a two-dimensional code type after generating the password information C and the plain code information; after the two-dimensional code passes through the conversion algorithm, the bit number occupied by the information can be further compressed, and the information to be sent can be encrypted in the two-dimensional code conversion process through an encryption algorithm and a symmetric encryption means by using a secret key D-key;
in step S2 of embodiment 1, the right determining unit encrypts, with the User public key User-Pkey, the public key Pkey of the asset owner, the Hash function Hash (), the secret key D-key, and the restoring program P for restoring the digital watermark, and sends the above four to the legitimate User in the form of encrypted information, thereby further improving the hiding effect of the digital watermark.
Example three:
this embodiment should be understood to include at least all of the features of any of the foregoing embodiments and further modifications thereon;
meanwhile, an embodiment that the assets are transferred on the asset block chain is provided, and the embodiment is used for performing secondary right confirmation on the assets after transfer;
there is a first owner of the asset, the asset transferor in an transferring relationship, and the asset transferee about to receive the asset transfer; said asset transferor having said first asset code and said second asset code;
the asset transferee needs to obtain a public key as-Pkey and a private key as-Skey of the asset transferee through validity identity authentication in an authentication mechanism in the asset block chain;
in the transfer, the following transfer steps are performed:
transfer step T1: the asset transferee and the asset transferee achieve transfer consensus, transfer information is broadcasted to the asset block chain, and consensus is confirmed by all nodes on the block chain;
transfer step T2: the right determining unit encrypts a public key Pkey of the asset owner, the Hash function Hash () and a restoring program P for restoring the digital watermark by using a public key as-Pkey of the asset assignee, and sends the public key Pkey, the Hash function Hash () and the restoring program P to the legal user in an encrypted information form;
transfer step T3: the asset assignor decrypts the encrypted information obtained in the step T2 by using the asset assignor private key as-Skey to obtain the restoring program P of the digital watermark; then, the password information C and the first asset code in the digital watermark are obtained in a restoring mode; further obtaining a character string D after the Hash operation of the first asset code and a Hash function Hash () from the password information C; performing Hash operation on the obtained first asset code by using the Hash function Hash () to obtain a character string D'; the asset transferee compares the character string D 'obtained by the asset transferee with the character string D' obtained by the asset transferee, and then may verify whether the first asset code obtained currently is the same as the first asset code, and ensure that the first asset code obtained by the asset transferee is the original asset data;
transfer step T4: and the asset transferee generates a new digital watermark through the embedding unit again, and finishes the re-output of the second asset.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Although the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications may be made without departing from the scope of the invention. That is, the methods, systems, and devices discussed above are examples. Various configurations may omit, substitute, or add various procedures or components as appropriate. For example, in alternative configurations, the methods may be performed in an order different than that described, and/or various components may be added, omitted, and/or combined. Moreover, features described with respect to certain configurations may be combined in various other configurations, as different aspects and elements of the configurations may be combined in a similar manner. Further, elements therein may be updated as technology evolves, i.e., many elements are examples and do not limit the scope of the disclosure or claims.
Specific details are given in the description to provide a thorough understanding of the exemplary configurations including implementations. However, configurations may be practiced without these specific details, for example, well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring the configurations. This description provides example configurations only, and does not limit the scope, applicability, or configuration of the claims. Rather, the foregoing description of the configurations will provide those skilled in the art with an enabling description for implementing the described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure.
In conclusion, it is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that these examples are illustrative only and are not intended to limit the scope of the invention. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.