CN114154985A - Pay-per-view method based on block chain and RSA algorithm - Google Patents
Pay-per-view method based on block chain and RSA algorithm Download PDFInfo
- Publication number
- CN114154985A CN114154985A CN202111225802.9A CN202111225802A CN114154985A CN 114154985 A CN114154985 A CN 114154985A CN 202111225802 A CN202111225802 A CN 202111225802A CN 114154985 A CN114154985 A CN 114154985A
- Authority
- CN
- China
- Prior art keywords
- user
- service provider
- identification information
- ciphertext
- encryption key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Abstract
The invention relates to a pay-per-view method based on a block chain and an RSA algorithm. Firstly, a control center generates an encryption key and a decryption key, wherein the encryption key is sent to a user, and the decryption key is sent to a service provider; secondly, after the user pays, the intelligent contract writes the transaction information of the audit expense into the block chain, generates unique purchase identification information and returns the unique purchase identification information to the user; and then the user encrypts the purchase identification information by using the encryption key to generate a ciphertext and sends the ciphertext to the service provider. The service provider decrypts the ciphertext by using the decryption key to obtain plaintext information. And finally, comparing whether the plaintext information is consistent with the purchase identification information. The invention can meet the requirement of a service provider to make diversified benefits and protect the payment safety. The invention does not need a trusted third party, completes the authority transaction and issues the unique identification information through the intelligent contract, and records the illegal user by using the block chain, thereby avoiding the problem of single point failure easily caused by a centralized content server in the traditional digital authority protection system.
Description
Technical Field
The invention belongs to the technical field of information security, and relates to a pay-per-view method based on a block chain and an RSA algorithm.
Background
Some of the current apps provide a large amount of resources and cost-effective services to users according to their needs. While these services provide many benefits to users, there is still a need for data security that prevents unauthorized access to the services (data). Only authorized users can access certain content, such as an article, a movie, etc., only after a fee.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a pay-per-view method based on a block chain and an RSA algorithm.
The invention comprises the following steps:
generating an encryption key and a decryption key by the control center, wherein the encryption key is sent to the user, and the decryption key is sent to the service provider;
when the user wants to watch the paid content, the service provider creates an intelligent contract and informs the user of the address of the intelligent contract;
after the user pays, the intelligent contract writes the transaction information of the audit expense into the block chain, generates unique purchase identification information m and returns the unique purchase identification information m to the user, and simultaneously sends the unique purchase identification information m to the service provider;
and the user encrypts m by using the encryption key e to generate a ciphertext c and sends the ciphertext c to the service provider. After the service provider receives the cipher text, the cipher text is decrypted by using the decryption key d to obtain the plaintext information m'.
If m 'is m, the user is allowed to access the paid content, if m' is not m, the illegal user is confirmed by freezing the account, and therefore legal transaction cannot be carried out.
The invention has the beneficial effects that: the invention can meet the requirement of a service provider to make diversified benefits and protect the payment safety. The invention does not need a trusted third party, completes the authority transaction and issues the unique identification information through the intelligent contract, and records the illegal user by using the block chain, thereby avoiding the problem of single point failure easily caused by a centralized content server in the traditional digital authority protection system.
Drawings
FIG. 1 is a diagram of the method architecture of the present invention.
Detailed Description
The present embodiment is further explained with reference to the drawings, as shown in fig. 1, the present embodiment includes the following steps:
before the transaction begins, the facilitator creates an intelligent contract containing the block chain's billing policy, i.e. the fee the user needs to pay, and then notifies the user of the intelligent contract address.
The following steps are performed
Step 1, the control center randomly selects two different large prime numbers p and q, and calculates:
The integer e is used as an encryption key and sent to the user.
Determining a decryption key d, satisfyingd is used as a decryption key and sent to the service provider. Only the service provider can have the decryption key d, so that a malicious attacker can be prevented from forging the identity of a legal user to cause unreal transaction records.
And 2, when the user wants to watch the paid content, the service provider creates an intelligent contract, wherein the intelligent contract comprises the charging policy of the block chain, namely the fee to be paid by the user. The user is then notified of the smart contract address.
And 3, after the transaction is successful, the intelligent contract writes the transaction information of the audit expense into the block chain, generates unique purchase identification information m and returns the unique purchase identification information m to the user.
And 4, returning the unique purchasing identification information m to the service provider by the blockchain.
Step 5, the user encrypts m by using the private key e of the user to generate a ciphertext c ═ memod n, to the facilitator.
Step 6, the service verifies the payment status of the user with the decryption key d to determine whether the user is authorized. After receiving the cipher text, the service provider decrypts the cipher text by using the decryption key d to obtain m' ═ cdmodn。
If m ═ m, the user is said to have paid successfully. The user will be allowed access to the paid content, both the user's public and private keys being generated by the control center. Since all transactions are bound to users, the blockchain system can find the corresponding users according to the public key. Therefore, if m' ≠ m occurs, an illegal user can be confirmed by freezing the account, and a legal transaction cannot be carried out.
Claims (4)
1. A pay-per-view method based on blockchain and RSA algorithms, the method comprising the steps of:
generating an encryption key and a decryption key by the control center, wherein the encryption key is sent to the user, and the decryption key is sent to the service provider;
when the user wants to watch the paid content, the service provider creates an intelligent contract and informs the user of the address of the intelligent contract;
after the user pays, the intelligent contract writes the transaction information of the audit expense into the block chain, generates unique purchase identification information m and returns the unique purchase identification information m to the user, and simultaneously sends the unique purchase identification information m to the service provider;
the user encrypts m by using the encryption key e to generate a ciphertext c and sends the ciphertext c to the service provider; after receiving the ciphertext, the service provider decrypts the ciphertext by using the decryption key d to obtain plaintext information m';
if m 'is m, the user is allowed to access the paid content, if m' is not m, the illegal user is confirmed by freezing the account, and therefore legal transaction cannot be carried out.
2. The method for pay-per-view based on blockchain and RSA algorithms of claim 1, wherein the method comprisesThe method comprises the following steps: the encryption key selects a large integer e for the control center to satisfyWhereinn is pq, and p and q are control centers and two different large prime numbers are selected optionally; said decryption key d satisfies
3. The method for pay-per-view based on blockchain and RSA algorithms of claim 2, wherein: the ciphertext c ═ memod n, said plaintext information m ═ cdmodn。
4. The method for pay-per-view based on blockchain and RSA algorithms of claim 2, wherein: the encryption key generated by the control center has a corresponding public key, and a corresponding user can be found according to the public key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111225802.9A CN114154985A (en) | 2021-10-21 | 2021-10-21 | Pay-per-view method based on block chain and RSA algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111225802.9A CN114154985A (en) | 2021-10-21 | 2021-10-21 | Pay-per-view method based on block chain and RSA algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114154985A true CN114154985A (en) | 2022-03-08 |
Family
ID=80458433
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111225802.9A Pending CN114154985A (en) | 2021-10-21 | 2021-10-21 | Pay-per-view method based on block chain and RSA algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114154985A (en) |
-
2021
- 2021-10-21 CN CN202111225802.9A patent/CN114154985A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11483161B2 (en) | Method for information processing and non-transitory computer readable storage medium | |
US5841865A (en) | Enhanced cryptographic system and method with key escrow feature | |
EP1253742B1 (en) | Method and system for generation and management of secret key of public key cryptosystem | |
US8843415B2 (en) | Secure software service systems and methods | |
JP2008501176A (en) | Information distribution system that protects privacy | |
US20010050990A1 (en) | Method for initiating a stream-oriented encrypted communication | |
US20080154782A1 (en) | Apparatus, method and system for protecting personal information | |
EP1220078B1 (en) | Content distribution system, copyright protection system and content receiving terminal | |
CN110855426B (en) | Method for software use authorization | |
CN110719176A (en) | Logistics privacy protection method and system based on block chain and readable storage medium | |
CN113706344A (en) | Block chain-based digital copyright protection method | |
CN115242553B (en) | Data exchange method and system supporting safe multi-party calculation | |
Okamoto | Proposal for integrated security systems | |
Gaber et al. | Privdrm: A privacy-preserving secure digital right management system | |
JP3348753B2 (en) | Encryption key distribution system and method | |
CN114154985A (en) | Pay-per-view method based on block chain and RSA algorithm | |
CN112632602A (en) | Block chain coin mixing method and device, terminal and storage medium | |
Berta et al. | A framework for the revocation of unintended digital signatures initiated by malicious terminals | |
AU705473B2 (en) | Cryptographic system and method with key escrow feature | |
Frattolillo et al. | A novel approach to DRM systems | |
Nosrati et al. | A review of Security Assessment in E-Banking | |
Kravitz et al. | Secure open systems for protecting privacy and digital services | |
CN115955300A (en) | Quantum security information sharing platform and information sharing method | |
AU2007234609B2 (en) | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (DRM) | |
Yu et al. | An adaptive approach to hardware alteration for digital rights management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |