CN115408666A - Anti-piracy digital content copyright authentication and transaction method and system - Google Patents
Anti-piracy digital content copyright authentication and transaction method and system Download PDFInfo
- Publication number
- CN115408666A CN115408666A CN202211047685.6A CN202211047685A CN115408666A CN 115408666 A CN115408666 A CN 115408666A CN 202211047685 A CN202211047685 A CN 202211047685A CN 115408666 A CN115408666 A CN 115408666A
- Authority
- CN
- China
- Prior art keywords
- digital content
- arbitration
- intelligent contract
- fingerprint vector
- authoritative
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 239000013598 vector Substances 0.000 claims abstract description 218
- 238000012795 verification Methods 0.000 claims description 51
- 238000012545 processing Methods 0.000 claims description 8
- 238000004364 calculation method Methods 0.000 claims description 7
- 238000012790 confirmation Methods 0.000 claims description 4
- 239000004576 sand Substances 0.000 claims description 3
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 230000002085 persistent effect Effects 0.000 abstract 1
- 230000008569 process Effects 0.000 description 20
- 239000011159 matrix material Substances 0.000 description 7
- 230000008520 organization Effects 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 150000001875 compounds Chemical class 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a digital content copyright authentication and transaction method and system for anti-piracy, wherein the system comprises a digital content holder P, a digital content consumer C and an authoritative third party S, the digital content holder P makes a decryption lookup table exclusive to the digital content consumer C and the authoritative third party S, the digital content consumer C and the authoritative third party S decrypt the published digital content Y according to the decryption lookup table and then carry out consistency check with key information in a block chain, thereby carrying out digital content copyright authentication or digital content transaction according to the result of the consistency check, and further deploying a special arbitration contract to carry out data content piracy arbitration based on the consistency of a fingerprint vector. The invention realizes transparent and persistent storage of key data through the block chain, digital content copyright authentication does not need to depend on a trusted third party, digital content transaction between buyers and sellers is convenient, and pirates can be traced and automatic arbitration can be carried out when digital content pirate arbitration is carried out.
Description
Technical Field
The invention relates to the field of digital copyright, in particular to an anti-piracy digital content copyright authentication and transaction method and system.
Background
Digital content is audiovisual media content that exists in digital form, including images, audio, video imagery and animation, etc. that are distributed directly over a network. However, the traditional copyright application authentication process is long in time-consuming, tedious in procedure and relatively high in cost, and the free media creator and the digital media consumer do not trust each other in the digital content transaction process, so that the pirate risk also exists, namely, the digital content consumer cannot distribute the digital content again after obtaining the digital content through the transaction so as not to earn profit, thereby damaging the benefit of the free media.
Aiming at the problem of acquiring digital copyright certificates, digital media copyright online authentication systems such as a digital copyright management system and the like are proposed in academic circles and industrial circles, so that the digital copyright authentication process is simplified, and the digital copyright online authentication system still depends on a trusted third party organization. In an increasingly open network, a centralized third-party organization which is easy to attack and has a single point of failure has the risks of reviewing digital content, then making a profit and reviewing the digital content not according to regulations; secondly, aiming at the problem that the free media creator and the digital media consumer are not trusted with each other in the digital content transaction process, some schemes are solved as transaction guarantee through a trusted third party mechanism, or transaction information is recorded through a blockchain so as to realize atomic transaction, however, the trusted third party mechanism trusted by both the free media creator and the digital media consumer is difficult to find, and the third party mechanism still needs to arbitrate when disputes occur in the mode of recording the transaction information through the blockchain; aiming at the problem of digital content piracy, a plurality of schemes based on digital watermarks still need to be arbitrated by a court, so that the defect of long period and high cost exists, most of the schemes based on the block chain can only limit piracy distribution in the block chain system, and can not monitor and limit the piracy outside the system.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the technical problems in the prior art, the invention provides an anti-piracy digital content copyright authentication and transaction method and system, which do not need to depend on a trusted third party organization and have the complete functions of digital content copyright authentication, digital content transaction and digital content piracy tracing arbitration.
In order to solve the technical problems, the technical scheme provided by the invention is as follows:
a copyright authentication and transaction method of digital content for preventing piracy is applied to a copyright authentication and transaction system of digital content, the copyright authentication and transaction system of digital content comprises a digital content holder P and an authoritative third party S, the digital content holder P deploys a first arbitration intelligent contract in a block chain system, the authoritative third party S deploys a copyright authentication application intelligent contract in the block chain system, the method comprises the steps of copyright authentication of digital content, and specifically comprises the following steps:
s1) a digital content holder P encrypts an original digital content X to obtain an encrypted digital content Y and publishes the encrypted digital content Y;
s2) the digital content holder P calculates target information of the original digital content X, and stores the target information and a token with a specified amount in a copyright authentication application intelligent contract of any authoritative third party S;
s3) the digital content holder P makes an encrypted decryption lookup table exclusive to the authoritative third party S according to the encrypted fingerprint vector of the authoritative third party SAnd stored in its first arbitration smart contract;
s4) the authoritative third party S obtains a decryption lookup table from the first arbitration intelligent contractAnd decrypted with a private key and then with the decryption result D s Decrypting the digital content Y to obtain the digital content X s Verifying the target information and numberWord content X s If the verification is successful, executing step S5), and if the verification is failed, executing step S6);
s5) the authoritative third party S makes a digital content copyright certificate and uploads the digital content copyright certificate to a block chain system for announcement, and after a digital content holder P verifies that the certificate is correct, a token in the copyright authentication application intelligent contract is transferred to an account of the authoritative third party S, and the process is finished and quit;
s6) the authoritative third party S stores the failure reason in a copyright certification application intelligent contract to be sent to a digital content holder P, and a token in the copyright certification application intelligent contract returns to the account of the digital content holder P.
Further, in the step S3), the digital content holder P makes an encrypted decryption lookup table specific to the authoritative third party S according to the encrypted fingerprint vector of the authoritative third party SThe method specifically comprises the following steps:
s31) the authoritative third party S selects the fingerprint vector b S Encrypting the fingerprint vector b with its public key S Obtaining an encrypted fingerprint vectorAnd with the encrypted fingerprint vector b S Hash value of random number string H used in time r Stored in the first arbitrated intelligent contract, further storing a specified amount of token tokens in the first arbitrated intelligent contract;
s32) the digital content holder P obtains the fingerprint vector from the first arbitration intelligent contractAnd encoding the fingerprint to obtain a first encrypted encoded fingerprint vectorSelecting a fingerprint vector b P And after encoding, using said authoritative third party SObtaining a second encrypted encoded fingerprint vector by public key encryptionEncoding the first encrypted encoded fingerprint vectorAnd a second cryptographically encoded fingerprint vectorSplicing to obtain complete encrypted coding fingerprint vector
S33) the digital content holder P encodes the fingerprint vector according to the complete encryptionCalculating to obtain an encrypted decryption lookup table
Further, the digital content copyright authentication and transaction system further includes a digital content consumer C, the digital content holder P is disposed with a transaction intelligent contract and a second arbitration intelligent contract in the blockchain system, and the method includes a step of digital content transaction, specifically including:
a1 ) digital content consumer C picks fingerprint vector b C Generating a random public key and a private key of the transaction, and encrypting the fingerprint vector b by using the public key C Obtaining an encrypted fingerprint vectorThe public key and the fingerprint vector are combinedEncrypted fingerprint vector b C Hash value H of random number string used in time r And a defined amount of token stored in the digital content holder PA transaction intelligence contract and a second arbitration intelligence contract;
a2 The digital content holder P obtains a fingerprint vector from the transaction intelligence contractAnd coding the fingerprint to obtain a third encrypted coding fingerprint vectorSelecting a fingerprint vector b P After the encoding, the public key of the digital content consumer C is used for encrypting to obtain a fourth encryption encoding fingerprint vectorEncoding the third encrypted encoded fingerprint vectorAnd a fourth cryptographically encoded fingerprint vectorSplicing to obtain complete encrypted coding fingerprint vector
A3 The digital content holder P encodes a fingerprint vector according to the complete encryptionCalculating to obtain an encrypted decryption lookup tableAnd stored in the transaction intelligence contract and a second arbitration intelligence contract;
a4 The digital content consumer C obtains the decryption lookup table from the transaction intelligence contractAnd using the random private key of the transaction to decrypt, and then using the decryption result D c Decrypting the digital content Y to obtain the digital content X c Verifying said digital content X c And if the verification is successful, confirming the transaction intelligent contract and transferring the token in the transaction intelligent contract into the account of the digital content holder P, if the verification is failed, initiating dispute arbitration by the digital content consumer C before the automatic confirmation of the transaction intelligent contract, executing the dispute arbitration step, and suspending the execution of the transaction intelligent contract during the dispute arbitration step.
Further, the number of the authoritative third parties S is at least four, the authoritative third parties S deploy a dispute arbitration intelligent contract in the blockchain system, and the dispute arbitration specifically includes the steps of:
a41 The digital content consumer C stores the token with the specified amount in dispute arbitration intelligent contracts corresponding to other authoritative third parties S except for issuing the digital content copyright certificate, and simultaneously stores the private key of the transaction in the corresponding dispute arbitration intelligent contracts together with the verification failure reason after encrypting the private key of the transaction by the public keys of the authoritative third parties S;
a42 Token in the dispute arbitration intelligent contract is transferred to an account of a corresponding authoritative third party S, the authoritative third party S obtains the encrypted digital content consumer C private key from the corresponding dispute arbitration intelligent contract and decrypts the encrypted digital content consumer C private key to obtain the digital content consumer C private key, and also obtains a decryption lookup table from the transaction intelligent contractAnd decrypted with the private key of the digital content consumer C and then with the decrypted result D c Decrypting the digital content Y to obtain the digital content X c Finally verifying said digital content X c The consistency with the corresponding information in the digital content copyright certificate judges whether the verification result is consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract;
a43 If the authentication fails because of the digital content X c The similarity of the similarity hash value and the similarity hash value stored in the digital content copyright certificate is less than a given threshold value, and the judgment is madeThe number proportion of an authority third party S with the verification result consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract exceeds a preset first threshold value, the fact that the digital content holder P is malicious is judged, token tokens in the transaction intelligent contract and the second arbitration intelligent contract are returned to the account C of the digital content consumer, the transaction intelligent contract and the second arbitration intelligent contract are invalid, and the digital content holder P is punished; and if the number proportion of the authoritative third parties S with the verification results consistent with the verification failure reasons in the corresponding dispute arbitration intelligent contract does not exceed a preset first threshold value, judging that the digital content consumer C is malicious, confirming the transaction intelligent contract and transferring the token in the transaction intelligent contract to the account of the digital content holder P.
Further, in step a 43), if the reason for the failure of the verification is the digital content X C And the number proportion of the authoritative third parties S which are inconsistent with the description information in the digital content copyright certificate and are consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract is judged to exceed a preset first threshold value, and the authoritative third parties S which issue the digital content copyright certificate are judged to be malicious, so that the digital content copyright certificate is invalid.
Further, the method further comprises a step of digital content piracy tracing arbitration, which specifically comprises the following steps:
b1 The digital content holder P according to the acquired pirated digital content X L Calculating to obtain a fingerprint vector b * And is split intoAnd
b2 The digital content holder P finds a fingerprint vector from all the selected fingerprint vectorsFingerprint vector b with highest similarity P Invoking the fingerprint vector b P Corresponding first arbitration smart contract orSecond arbitrating the intelligent contract and applying the fingerprint vectorStored in the first or second arbitration smart contracts;
b3 The authoritative third party S corresponding to the first intelligent arbitration contract stores the selected fingerprint vector plaintext and the random number string used for encrypting the fingerprint vector plaintext in the first intelligent arbitration contract, or the digital content consumer C corresponding to the second intelligent arbitration contract stores the selected fingerprint vector plaintext and the random number string used for encrypting the fingerprint vector plaintext in the second intelligent arbitration contract, and the original hash value H corresponding to the random number string is stored in the first intelligent arbitration contract and the second intelligent arbitration contract r ;
B4 The first or second arbitration smart contracts calculate a hash value H 'of the random number string' r If the hash value is H' r And the original hash value H r And if the token tokens S in the first arbitration intelligent contract are inconsistent, judging that the authoritative third party S corresponding to the first arbitration intelligent contract is malicious, and transferring the token tokens S in the first arbitration intelligent contract to the account of the digital content holder P, or judging that the digital content consumer C corresponding to the second arbitration intelligent contract is malicious, and transferring the token S in the second arbitration intelligent contract to the account of the digital content holder P.
Further, the hash value H 'is also included after the step B4)' r And the original hash value H r The processing steps when consistent specifically include: if the Hash value is H' r And the original hash value H r In agreement, the first arbitration smart contract or the second arbitration smart contract calculates the fingerprint vectorSimilarity with the plain text of the fingerprint vector if the fingerprint vectorAnd the fingerprint directionAnd if the similarity of the volume plaintext is greater than or equal to a preset second threshold value, judging that an authoritative third party S corresponding to the first intelligent arbitration contract is malicious, and transferring the token in the first intelligent arbitration contract to the account of the digital content holder P, or judging that a digital content consumer C corresponding to the second intelligent arbitration contract is malicious, and transferring the token in the second intelligent arbitration contract to the account of the digital content holder P.
Further, the hash value H' r And the original hash value H r The fingerprint vector is also included after the processing step when consistentAnd a processing step when the similarity with the fingerprint vector plaintext is smaller than a preset second threshold, specifically comprising: if the fingerprint vectorAnd the similarity between the fingerprint vector plaintext and the fingerprint vector plaintext is smaller than a preset second threshold value, and the first arbitration intelligent contract finds the fingerprint vector plaintext and the fingerprint vectorEncrypting the non-identical items of the fingerprint vector plaintext by using the public key of the authoritative third party S, and if the encrypted non-identical items are not identical with the fingerprint vectorIf the corresponding items in the first arbitration intelligent contract are not consistent, judging that an authoritative third party S corresponding to the first arbitration intelligent contract is malicious, transferring the token in the first arbitration intelligent contract to an account of a digital content holder P, and if the encrypted different items are not identical to the fingerprint vectorIf the corresponding items in the first arbitration intelligent contract are consistent, judging that the digital content holder P is malicious, and transferring the token in the first arbitration intelligent contract into an account of an authoritative third party S;
or the second arbitration intelligent contract finds the fingerprint vector plaintext and the fingerprint vectorDifferent items of the fingerprint vector plaintext are encrypted with the public key of the digital content consumer C; if the encrypted different items are not the same as the fingerprint vectorIf the corresponding items in the second intelligent contract are not consistent, the digital content consumer C corresponding to the second intelligent contract is judged to be malicious, the token in the second intelligent contract is transferred to the account of the digital content holder P, and if the encrypted different items are not the same as the fingerprint vectorIf the corresponding items in the second arbitration intelligent contract are consistent, the digital content holder P is judged to be malicious, and the token in the second arbitration intelligent contract returns the account of the digital content consumer C.
Further, if the first arbitration intelligent contract is not called within the specified time, the token in the first arbitration intelligent contract returns to the account of the authoritative third party S, and if the second arbitration intelligent contract is not called within the specified time, the token in the second arbitration intelligent contract returns to the account of the digital content consumer C.
The invention also provides a digital content copyright authentication and transaction system, which comprises a digital content holder P, a digital content consumer C and an authoritative third party S, wherein the digital content holder P is provided with a transaction intelligent contract, a first arbitration intelligent contract and a second arbitration intelligent contract in a block chain system, the authoritative third party S is provided with a copyright authentication application intelligent contract and a dispute arbitration intelligent contract in the block chain system, and the digital content holder P, the digital content consumer C and the authoritative third party S are programmed or configured to execute any anti-piracy digital content copyright authentication and transaction method.
Compared with the prior art, the invention has the advantages that:
in the process of copyright authentication of the digital content, the necessary information is recorded through the block chain, and a digital content holder does not need to trust an authoritative third party to avoid the commitment of the digital content, so that the online copyright authentication of the digital content is realized, and the copyright authentication cost is reduced;
in the process of digital content transaction, the digital content holder and the digital content consumer do not need to trust each other, only a correct secret key needs to be transmitted, the transaction success can be ensured, and meanwhile, under the condition of unsuccessful transaction, the transaction is completed and the interests of both parties are maintained through online dispute arbitration;
in the process of digital content piracy tracing and arbitration, the pirated digital content publisher can be traced and automatically arbitrated by matching the fingerprint vectors, so that the copyright cost of a digital content holder is greatly reduced, and the copyright benefit of the digital content holder is guaranteed.
Drawings
Fig. 1 is a schematic diagram of a system and a work flow according to an embodiment of the present invention.
Fig. 2 is a flowchart of a digital content copyright authentication process according to an embodiment of the present invention.
Fig. 3 is a flow chart of a digital content transaction process according to an embodiment of the invention.
Fig. 4 is a flowchart of the digital content piracy tracing arbitration process according to the embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the drawings and specific preferred embodiments of the description, without thereby limiting the scope of protection of the invention.
The embodiment provides an anti-piracy digital content copyright authentication and transaction method, which is applied to a digital content copyright authentication and transaction system, as shown in fig. 1, the digital content copyright authentication and transaction system of the embodiment includes a digital content holder P, a digital content consumer C, a plurality of authoritative third parties S, and entities such as a alliance SA and a blockchain system formed by the authoritative third parties S. Where the authoritative third party S refers to an authoritative but untrusted third party organization, which may be assumed by an enterprise influential to the digital content industry, the authoritative third parties S are in a competing relationship with each other, and they are not only supervised by each other, but also by all participants of the system. The block chain system can be a public block chain system or a federation block chain system commonly maintained by members of a federation SA. The block chain system stores intelligent contracts which are deployed in advance by a digital content holder P and an authoritative third party S and used for realizing different functions, system participants exchange data through the intelligent contracts or read data from block chain records, and accordingly three main functions of copyright storage, content transaction and piracy tracking arbitration are respectively realized through three interactive protocols of copyright authentication, content transaction and piracy tracking arbitration shown in fig. 1, and specific implementation details of each protocol are described in the following specific embodiment.
Before describing particular embodiments of the present invention in detail, it is necessary to state in advance the following for the related concepts and preconditions involved in the particular embodiments:
similarity hashing algorithm: not a specific algorithm, but an algorithm with the following properties, property one: mapping the message with any length into a message abstract with a certain fixed length; the second property: the method has the unidirectional property of the common hash algorithm; the third property: the more similar the two input values, the higher the similarity of the output hash value. The similarity hash algorithm is often used for information retrieval, file deduplication, classification clustering and the like. For example: the hash algorithm is used for comparing image similarity and the simhash algorithm is used for comparing text similarity. Probability homomorphic encryption algorithm: the probability public key encryption algorithm with homomorphic property is referred, and a typical representative is the paillier homomorphic encryption algorithm. The present embodiment is based on the premise assumption that most members of the federation are honest, i.e., most members of the SA members of the federation faithfully follow the program execution instructions, and no more than 50% of the members are federated.
The encryption algorithm based on the encryption lookup table is shown as formula (1.1):
Y=X+EA (0.1)
wherein, X = (X) 0 ,x 1 ,...,x N-1 ) In the form of vector of digital content, E is a preset encryption lookup table, and E = (E) 0 ,E 1 ,...,E J-1 ),j∈{0,1,...,J-1},Representing a mathematical expectation of 0, variance ofNormal distribution of (a = { t) } ij |t ij ∈[0,R]I is more than or equal to 0 and less than J-1, J is more than or equal to 0 and less than N-1 is the satisfaction set by the digital content holder P: a J × N order matrix with sum of column elements R (R is a positive integer security parameter, default R = 4), Y = (Y) o ,y 1 ,...,y N-1 ) Is encrypted digital content.
Presetting a Hash algorithm: selecting a common hash algorithm such as SHA256 algorithm of SHA series;
the encryption fingerprint vector coding formula is shown as formula (1.2):
in the formula, E T (b T,k ) For encrypting fingerprint vectorsThe K-th item in the K-th item belongs to {0,1 1 -1},σ W For encoding parametersE T (m T,k ) Encoding the fingerprint vector correspondence for encryption;
the watermark lookup table generation algorithm is shown as formula (1.3):
in the formula, E T (m k ) Encoding fingerprint vectors for encryptionThe kth term of (K) is K e {0,1 j,k Is the jth row and kth column element of a preset KxJ order matrix G j,k Can take on values ofI.e. obeying the mathematical expectation of 0, the variance ofNormal distribution of (E) T (W T,j ) Look up the table corresponding item for the watermark;
the decryption lookup table generation algorithm is shown in equation (1.4):
in the formula D j Look-up table E = (E) for encryption 0 ,E 1 ,...,E J-1 ) The J-th entry J ∈ {0, 1., J-1} is the inverse, E T (D j ) Is D j E after the entity T public key encryption, E T (W T,j ) Look-up table E for watermark T (W T )=(E T (W T,0 ),E T (W T,1 ),...,E T (W T,J-1 ) J ∈ {0, 1., J-1}, E) of the jth term of (J ∈ {0, 1., } T (D T,j ) An encryption and decryption lookup table corresponding item exclusive for the entity T;
the decryption algorithm based on the decryption lookup table is shown in equation (1.5):
X T =Y+D T A (0.5)
wherein Y is encrypted digital content, D T Decryption lookup table specific for entity T, A = { T ij |t ij ∈[0,R]I is more than or equal to 0 and less than J-1, J is more than or equal to 0 and less than N-1, and the digital content holder P shown in the formula (1.1) is set to satisfy the following conditions: a J × N order matrix with column elements summed to R (R is a positive integer security parameter, default R = 4);
the watermark extraction algorithm is shown as the formula (1.6):
in the formula (I), the compound is shown in the specification,the right inverse matrix of matrix A in the encryption algorithm based on the encryption lookup table shown in formula (1.1) For the right inverse matrix of K multiplied by J order matrix G in the watermark lookup table generation algorithm shown in the formula (1.3)X L Pirated digital content found by the digital content holder P, X is original digital content held by the digital content holder P, m * Extracting the obtained watermark vector;
the decoding algorithm is shown in equation (1.7):
in the formula (I), the compound is shown in the specification,as watermark vector m * The kth term K ∈ {0,1, \8230;, K-1},is the corresponding item of the fingerprint vector.
In this embodiment, the digital content holder P first needs to complete the digital content copyright authentication process according to the steps specified in the digital content copyright authentication protocol to obtain the digital content copyright certificate, and the digital content copyright authentication process will check whether the digital content is legal and whether the digital content and the description thereof are consistent, so that the digital content consumer C can perform content authentication when transacting the digital content, and confirm the consistency between the actually obtained digital content and the digital content holder P for the description of the digital content (hereinafter, simply referred to as content and description consistency), and at the same time, the digital content holder P is also a key step for the original authorization of the digital content holder P. As described above, the blockchain system stores intelligent contracts for implementing different functions, which are deployed in advance by a digital content holder P and an authoritative third party S, in particular, the digital content holder P deploys a first arbitration intelligent contract for the authoritative third party S in the blockchain system, and the authoritative third party S deploys a copyright authentication application intelligent contract in the blockchain system, as shown in fig. 1 and fig. 2, the steps of digital content copyright authentication specified by the digital content copyright authentication protocol specifically include:
s1) a digital content holder P encrypts an original digital content X to obtain an encrypted digital content Y and publishes the encrypted digital content Y;
specifically, the original digital content X in step S1) is in a vector form obtained by vectorizing the digital content, in this embodiment, the manner of converting the digital content into the vector form is taken as an example of a picture, and a discrete cosine transform or the like may be adopted to convert the digital content from a spatial domain to a frequency domain, specifically, for an 8-bit image of 1024 × 1024 pixels, the image is divided into 2 by applying 8 × 8 Discrete Cosine Transform (DCT) 14 8 x 8DCT blocks, and taking 4 DCT coefficients at the 7 th to 10 th positions in a zig-zag ordering of each 8 x 8DCT block, thereby obtaining a block containing 2 DCT coefficients 16 A vector X of individual components;
in step S1), the digital content holder P converts the digital content into vector format X = (X) 0 ,x 1 ,...,x N-1 ) In a pre-generated encrypted look-up table E = (E) 0 ,E 1 ,...,E J-1 ),j∈{0,1,...,J-1},According to the encryption algorithm based on the encryption lookup table shown in the formula (1.1), the encrypted digital content Y = (Y) is obtained through calculation 0 ,y 0 ,...,y N-1 ) And publishing the encrypted digital content Y to the network;
s2) the digital content holder P calculates target information of the original digital content X, and stores the target information and a token with a specified amount in a copyright authentication application intelligent contract of any authoritative third party S;
in the step S2), the digital content holder calculates a similarity hash value simHash of the digital content X according to a similarity hash algorithm, then uses description information of the digital content X, the adopted similarity hash algorithm, the similarity hash value simHash, a similarity judgment threshold value e, identity information of the digital content holder P and the like as target information, and stores token tokens with the amount specified by an intelligent contract for copyright authentication application into an intelligent contract for copyright authentication application deployed by any authoritative third party S so as to apply copyright authentication to the corresponding authoritative third party S;
s3) the digital content holder P makes an encrypted decryption lookup table exclusive to the authoritative third party S according to the encrypted fingerprint vector of the authoritative third party SAnd storing the encrypted digital content into a first arbitration intelligent contract, specifically, in the step S3), the digital content holder P makes an encrypted decryption lookup table specific to the authoritative third party S according to the encrypted fingerprint vector of the authoritative third party SThe method specifically comprises the following steps:
s31) the authoritative third party S selects the fingerprint vector b S Encrypting the fingerprint vector b with its public key S Obtaining an encrypted fingerprint vectorAnd with the encrypted fingerprint vector b S Hash value of random number string H used in time r And a specified amount of token is stored in the first arbitration intelligent contract;
step S31), the authoritative third party S receiving the application selects a binary fingerprint vector secretlyThen, a preset probability homomorphic encryption algorithm is used, wherein a paillier homomorphic encryption algorithm is selected, and the binary fingerprint vector is subjected to paillier public key of an authoritative third party S (the public key of the authoritative third party S is fixed and is determined during system initialization)Each item of the fingerprint data is encrypted and calculated to obtain an encrypted fingerprint vectorWhereinIs a positive integer randomly selected by an authoritative third party S, and subsequently, the positive integerWill be filled to a fixed size by an authoritative third party S with the number 0 and spliced into a random number stringAnd using a preset hash algorithm to carry out hash calculation on the random number string r to obtain a hash value H of the random number string r Finally authoritative third party S will encrypt the fingerprint vectorRandom number string hash value H r And the specified token is stored on a first arbitration intelligent contract appointed by the digital content holder P to obtain an exclusive decryption key;
s32) the digital content holder P obtains the fingerprint vector from the first arbitration intelligent contractAnd coding it to obtain a first encrypted coded fingerprint vectorSelecting a fingerprint vector b P After the encoding, the public key of the authoritative third party S is used for encryption to obtain a second encrypted encoding fingerprint vectorEncoding the first encrypted encoded fingerprint vectorAnd a second cryptographically encoded fingerprint vectorSplicing to obtain complete encrypted coding fingerprint vector
Step S32), the digital content holder P receives the encrypted fingerprint vector of the authoritative third party S from the first arbitration intelligent contractThen, firstly, the fingerprint vector b selected by the authoritative third party S is needed s And (3) carrying out coding treatment:since the received fingerprint vector is encryptedTherefore, the encrypted fingerprint vector is required to be coded according to an encrypted fingerprint vector coding formula shown in formula (1.2) by utilizing the homomorphism property of the paillier addition methodPerforming encoding processing to obtain encrypted encoded fingerprint(Vector)(hereinafter referred to as the first cryptographically encoded fingerprint vector) and, in order to accurately locate the transaction corresponding to the leaked information in the later stage of piracy, the digital content holder P also needs to secretly select a section of the binary fingerprint vectorAnd is coded in the same way to obtainThen uses the paillier public key pair of the authoritative third party SIs encrypted to obtain(hereinafter referred to as second encrypted encoded fingerprint vector), and then the digital content holder P needs to encode the first encrypted encoded fingerprint vectorAnd a second cryptographically encoded fingerprint vectorSplicing to obtain complete K-dimension encrypted coding fingerprint vector
S33) the digital content holder P encodes the fingerprint vector according to the complete encryptionCalculating to obtain an encrypted decryption lookup table
In step S33), countingThe word content holder P generates algorithm according to the watermark lookup table shown in formula (1.3) to encrypt and encode the fingerprint vectorObtaining encrypted watermark lookup tables for parameter calculationsThen, according to the decryption lookup table generation algorithm shown in the formula (1.4), the encrypted watermark lookup table is used for generating the algorithmObtaining an encrypted decryption lookup table specific to an authoritative third party S for parameter calculationThe first arbitrated intelligent contract is stored on the first arbitrated intelligent contract and is sent to an authoritative third party S;
s4) the authoritative third party S obtains a decryption lookup table from the first arbitration intelligent contractAnd decrypted with a private key and then with the decrypted result D S Decrypting the digital content Y to obtain the digital content X S Verifying the target information and the digital content X S If the verification is successful (i.e. the target information and the digital content X) are consistent S If the corresponding information is consistent), step S5) is performed, if the verification fails (i.e. the target information is consistent with the digital content X) S The corresponding information is inconsistent), step S6) is executed;
in step S4), the authoritative third party S uses the paillier private key thereof to decrypt the exclusive encrypted decryption lookup table item by itemThen, using the exclusive decryption lookup table D obtained by decryption S According to a decryption algorithm based on a decryption lookup table shown in formula (1.5), the encrypted digital content Y is decrypted to obtain the exclusive digital contentX S The authoritative third party S may then verify the proprietary digital content X S The digital content X exclusive to the digital content X is calculated according to the consistency with the description information of the digital content X in the digital content copyright authentication application information (i.e. the target information in step S2) S Comparing the similarity hash value with the similarity hash value simHash in the digital content copyright authentication application information, and checking whether the similarity of the two is more than or equal to a similarity judgment threshold e;
s5) the authoritative third party S makes a digital content copyright certificate and uploads the digital content copyright certificate to a block chain system for showing, and after a digital content holder P verifies that the certificate is correct, a token in the copyright certification application intelligent contract is transferred to an account of the authoritative third party S, and the operation is finished and quit;
in step S5), the similarity hash value in step S4) verifies that the similarity is greater than or equal to the given similarity judgment threshold e and the digital content X S If the digital content X description information is consistent with the digital content copyright authentication application information (i.e. the target information in step S2), the authoritative third party S calculates the digital content holder P application information (i.e. the target information in step S2), the self identity information and the message digest of the timestamp by using a preset hash algorithm, encrypts the message digest by using its private key to obtain a digital signature, then uses all the information and the digital signature which generate the message digest as a digital content copyright certificate, uploads the digital content to a block chain for public indication by the copyright authentication application intelligent contract, and after the digital content holder P verifies the certificate, the token stored in the copyright authentication application intelligent contract is authoritatively transferred to the third party S account;
s6) the authoritative third party S stores the failure reason in a copyright certification application intelligent contract to be sent to a digital content holder P, and a token in the copyright certification application intelligent contract returns to the account of the digital content holder P.
In the process of digital content copyright authentication, necessary information is recorded through a block chain, a digital content holder does not need to trust an authoritative third party to not release the promise of the digital content, the digital content copyright online authentication is realized, and the copyright authentication cost is reduced; the digital content that is obtained and disclosed by the digital content copyright certificate can be noticed by the digital content consumer C, and the interested digital content consumer C can execute the digital content transaction process according to the digital content transaction protocol to obtain the digital content. In this embodiment, the digital content holder P is configured with a transaction intelligent contract and a second arbitration intelligent contract for the digital content consumer C in the blockchain system, as shown in fig. 1 and fig. 3, the steps of the digital content transaction specified by the digital content transaction protocol specifically include:
a1 ) digital content consumer C picks fingerprint vector b C Generating a random public key and a private key of the transaction, and encrypting the fingerprint vector b by using the random public key C Obtaining an encrypted fingerprint vectorThe public key and the fingerprint vector are combinedEncrypted fingerprint vector b C Hash value of random number string H used in time r And a defined amount of token tokens are stored in a transaction intelligence contract of the digital content holder P and the public key, fingerprint vectorEncrypted fingerprint vector b C Hash value of random number string H used in time r And a specified amount of token is stored in a second sanction intelligence contract corresponding to the digital content holder P;
in step A1), the digital content consumer C firstly randomly selects a pair of paillier public key and private key, and then secretly selects the binary fingerprint vector through the execution flow similar to the step S31And the password is encrypted into an encrypted fingerprint vector item by using a homomorphic encryption algorithm through the paillier public keyAnd use preset hahaThe Chi algorithm calculates and obtains the hash value H of the random number string selected by the digital content consumer C r Then selects the paillier public key and the encrypted fingerprint vectorRandom number string hash value H r The token tokens with the amount specified by the transaction intelligent contract are stored in the transaction intelligent contract and the second arbitration intelligent contract appointed by the digital content holder P;
a2 The digital content holder P obtains a fingerprint vector from the transaction intelligence contractAnd encoding the fingerprint to obtain a third encrypted encoded fingerprint vectorSelecting a fingerprint vector b P After the encoding, the public key of the digital content consumer C is used for encrypting to obtain a fourth encrypted encoding fingerprint vectorEncoding the third encrypted encoded fingerprint vectorAnd a fourth cryptographically encoded fingerprint vectorSplicing to obtain complete encrypted coding fingerprint vector
In step A2), the digital content holder P obtains the encrypted fingerprint vector from the transaction intelligent contract by an execution process similar to step S32And coding according to the encryption fingerprint vector coding formula shown in the formula (1.2) to obtain the encryption coding fingerprint(Vector)(hereinafter referred to as third cryptographically encoded fingerprint vector), and in order to accurately locate the transaction corresponding to the leaked information in the case of piracy in the later stage, the digital content holder P also needs to secretly select a section of binary fingerprint vectorAnd according toIs coded in the same way to obtainAnd then uses the paillier public key pair of digital content consumer CIs encrypted to obtain(hereinafter referred to as the fourth encrypted encoded fingerprint vector), and then the digital content holder P needs to encode the third encrypted encoded fingerprint vectorAnd a fourth cryptographically encoded fingerprint vectorSplicing to obtain complete K-dimension encrypted coding fingerprint vector
A3 The digital content holder P encodes a fingerprint vector according to the complete encryptionCalculating to obtain an encrypted decryption lookup tableAnd stored in the transaction intelligence contract and a second arbitration intelligence contract;
in step A3), the digital content holder P generates an algorithm according to the watermark lookup table shown in formula (1.3) through an execution process similar to step S33, so as to encrypt and encode the fingerprint vectorObtaining encrypted watermark look-up tables for parameter calculationsThen generating algorithm according to the decryption lookup table shown in the formula (1.4) to obtain the encrypted watermark lookup tableObtaining an encrypted decryption lookup table specific to digital content consumer C for parameter calculationAnd stored on the transaction intelligent contract and the second arbitration intelligent contract, and sent by the transaction intelligent contract to the digital content consumer C;
a4 The digital content consumer C obtains the decryption lookup table from the transaction intelligence contractAnd using the random private key of the transaction to decrypt, and then using the decryption result D c Decrypting the digital content Y to obtain the digital content X c Verifying said digital content X c And if the verification is failed, the digital content consumer C initiates dispute arbitration before the automatic confirmation of the transaction intelligent contract and executes the dispute arbitration step, wherein the execution of the transaction intelligent contract is suspended during the dispute arbitration period.
Step A4)In the method, the digital content consumer C uses its paillier private key to decrypt its exclusive encrypted decryption lookup table item by item through the similar execution flow as the step S4Then, using the exclusive decryption lookup table D obtained by decryption C According to a decryption algorithm based on a decryption lookup table shown in the formula (1.5), the encrypted digital content Y is decrypted to obtain the exclusive digital content X C Then, the consumer C can verify the exclusive digital content X C The digital content X which is exclusive to the digital content X is calculated according to the consistency of the description information of the digital content X in the digital content copyright certificate C Comparing the similarity hash value with the similarity hash value simHash in the digital content copyright certificate, and checking whether the similarity of the two is more than or equal to a similarity judgment threshold value e in the digital content copyright certificate; if the similarity is larger than or equal to the similarity judgment threshold e and the digital content X C If the description information of the digital content X in the digital content copyright certificate is consistent, the verification is successful.
In this embodiment, the authoritative third party S deploys the dispute arbitration intelligent contract in the blockchain system, so that in the case of failed verification, the digital content consumer C may apply for arbitration by the dispute arbitration intelligent contract to all authoritative third parties S except for issuing the digital content copyright certificate before the transaction intelligent contract automatically confirms, in this embodiment, at least three authoritative third parties S are required except for issuing the digital content copyright certificate, and the transaction intelligent contract suspends confirmation during arbitration, so that the step A4) is followed by a dispute arbitration step, which specifically includes:
a41 The digital content consumer C stores the token with the specified amount in dispute arbitration intelligent contracts corresponding to other authoritative third parties S except for issuing the digital content copyright certificate, and simultaneously stores the random private key of the transaction in the corresponding dispute arbitration intelligent contracts together with the verification failure reason after encrypting the random private key by the public keys of the authoritative third parties S;
in the step A41), the digital content consumer C pays a token with a specified amount to all authoritative third parties S except for issuing a digital content copyright certificate through a dispute arbitration intelligent contract to initiate an arbitration application, and simultaneously uploads a paillier private key used by the transaction to the dispute arbitration intelligent contract together with the verification failure reason to be stored after being encrypted by the public keys of the authoritative third parties S so as to be sent to the corresponding authoritative third parties S;
a42 Token in the dispute arbitration intelligent contract is transferred to an account of a corresponding authoritative third party S, the authoritative third party S obtains the encrypted digital content consumer C private key from the corresponding dispute arbitration intelligent contract and decrypts the encrypted digital content consumer C private key to obtain the digital content consumer C private key, and obtains a decryption lookup table from the transaction intelligent contractAnd decrypted with the private key of the digital content consumer C and then with the decrypted result D c Decrypting the digital content Y to obtain the digital content X c Finally, verifying said digital content X c The consistency with the corresponding information in the digital content copyright certificate judges whether the verification result is consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract;
in step a 42), after the token is turned over, the authoritative third party S decrypts the encrypted paillier private key in the dispute arbitration intelligent contract through an execution process similar to that in step A4, verifies the paillier private key of the digital content consumer C through the paillier public key of the digital content consumer C stored in the transaction intelligent contract, and then decrypts the encrypted decryption lookup table specific to the digital content consumer C stored in the transaction intelligent contract item by using the paillier private key of the digital content consumer CDeriving a decryption lookup table D specific to a digital content consumer C c (ii) a Then the decryption algorithm based on the decryption lookup table shown in equation (1.5) is used to decrypt the lookup table D c Decrypting the encrypted digital content Y to obtain the digital content X c Then verifying the digital content X C And number ofCalculating the consistency of the description information of the digital content X in the word content copyright certificate C Comparing the similarity hash value with the similarity hash value simHash in the digital content copyright certificate, and checking whether the similarity between the two is more than or equal to a similarity judgment threshold value e in the digital content copyright certificate; arbitrating according to the verification failure reason stored in the dispute arbitration intelligent contract;
a43 If the authentication fails because of the digital content X c The similarity between the similarity hash value and the similarity hash value stored in the digital content copyright certificate is smaller than a given threshold, the number proportion of the authoritative third parties S with the verification result consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract is judged to exceed a preset first threshold, the digital content holder P is judged to be malicious, the token in the transaction intelligent contract and the second arbitration intelligent contract is returned to the account of the digital content consumer C, and the transaction intelligent contract and the second arbitration intelligent contract are invalid; and if the quantity proportion of the authoritative third parties S with the verification result consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract does not exceed a preset first threshold value, judging that the digital content consumer C is malicious, confirming the transaction intelligent contract and transferring the token in the transaction intelligent contract to the account of the digital content holder P.
In step A43), if the verification failure reason is the digital content X c If the number proportion of the authoritative third parties S which judge that the verification result is consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract exceeds a preset first threshold value, if the number proportion of the authoritative third parties S which judge that the verification result is consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract exceeds a given threshold value e, the digital content holder P is malicious, the token stored on the transaction intelligent contract and the second arbitration intelligent contract returns the digital content consumer C and gives a penalty to the digital content holder P, otherwise, the digital content consumer C is judged to be malicious, and the transaction intelligent contract is directly confirmed; if the authentication failure reason is the digital content X C And in digital content copyright certificatesIf the number proportion of the authoritative third parties S with the verification result consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract exceeds a preset first threshold value, if the number proportion of the authoritative third parties S with the verification result consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract exceeds half of authoritative third parties S, the digital content holder P and the authoritative third parties S which issue the digital content copyright certificates are malicious, the token number stored on the transaction intelligent contract and the second arbitration intelligent contract is returned to the digital content consumer C, the corresponding digital content copyright certificates are marked as invalid, the digital content holder P and the third parties S which issue the corresponding digital content copyright certificates are punished, and if the number proportion of the authoritative third parties S is not consistent with the verification result, the digital content consumer C is judged to be malicious.
Through the steps, in the process of digital content transaction, the digital content holder and the digital content consumer do not need to trust each other, only a correct secret key needs to be transmitted, the transaction success can be ensured, and meanwhile, under the condition that the transaction is unsuccessful, the transaction is completed and the interests of both parties are maintained through online dispute arbitration.
In this embodiment, the digital content holder P can also perform tracing arbitration on the pirate through a digital content piracy tracing arbitration protocol; the pirate may be a digital content consumer C who purchases digital content, or may be an authoritative third party S who issues a digital content copyright certificate, as shown in fig. 1 and 4, the digital content piracy tracing arbitration protocol specifies, and the digital content piracy tracing arbitration specifically includes:
b1 The digital content holder P according to the acquired pirated digital content X L Calculating to obtain a fingerprint vector b * And is split intoAnd
in step B1), the digital content holder P extracts the watermark from X by the watermark extraction algorithm shown in formula (1.6) L Extracting watermark vectorThe fingerprint vector is then obtained by the decoding algorithm shown in equation (1.7)And is split intoAnd
b2 The digital content holder P finds a fingerprint vector from all the selected fingerprint vectorsFingerprint vector b with highest similarity P Invoking the fingerprint vector b P Corresponding first arbitration intelligent contract or second arbitration intelligent contract and fingerprint vectorStored in the first or second arbitrated intelligent contract;
in step B2), the digital content holder P finds the fingerprint vector from all the selected fingerprint vectorsFingerprint vector b with highest similarity P Thereby enabling to pass the matched fingerprint vector b P Locate objects that may reveal information and willUploading the intelligent contract to a corresponding first arbitration intelligent contract or a second arbitration intelligent contract for arbitration;
b3 An authoritative third party S corresponding to the first intelligent arbitration contract stores the selected fingerprint vector plaintext and the random number string used for encrypting the fingerprint vector plaintext in the first intelligent arbitration contract, or a digital content consumer C corresponding to the second intelligent arbitration contract stores the selected fingerprint vector plaintext and the random number string used for encrypting the fingerprint vector plaintext in the second intelligent arbitration contract;
in step B3), after the arbitration intelligent contract receives the arbitration request, the corresponding pirate (supposing that the digital content consumer C performs the same processing on the authoritative third party S) is required to upload the fingerprint vector plaintext thereofAnd encrypted fingerprint vector plaintext b' c Random number string for time
B4 The first or second arbitration smart contracts calculate a hash value H 'of the random number string' r If the hash value is H' r And the original hash value H r If the token tokens S in the first arbitration intelligent contract are inconsistent, judging that the authoritative third party S corresponding to the first arbitration intelligent contract is malicious, and transferring the token tokens S in the first arbitration intelligent contract to the account of the digital content holder P, or judging that the digital content consumer C corresponding to the second arbitration intelligent contract is malicious, and transferring the token S in the second arbitration intelligent contract to the account of the digital content holder P;
in step B4, since the pirate may upload the incorrect random number string r', the arbitration intelligence contract first pair the uploaded random number stringCalculating to obtain a Hash value H 'according to a preset Hash algorithm' r And judging H' r Whether it is equal to its stored hash value of the random number string H r If not, it indicates that the digital content consumer C or the authoritative third party S is malicious, transferring the token stored on the arbitration intelligent contract into an account P of a digital content holder to discipline a digital content consumer C or an authoritative third party S;
b5 If the hash value H' r And the original hash value H r In agreement with, whatThe first or second arbitration smart contracts calculate the fingerprint vectorSimilarity with the plain text of the fingerprint vector if the fingerprint vectorIf the similarity of the fingerprint vector plaintext and the authority third party S is larger than or equal to a preset second threshold value, such as a preset threshold value lambda, judging that the authority third party S corresponding to the first arbitration intelligent contract is malicious, and transferring the token in the first arbitration intelligent contract to the account of the digital content holder P, or judging that the digital content consumer C corresponding to the second arbitration intelligent contract is malicious, and transferring the token in the second arbitration intelligent contract to the account of the digital content holder P;
b6 If the fingerprint vectorThe similarity between the fingerprint vector plaintext and the first arbitration intelligent contract is smaller than a preset second threshold value, and the first arbitration intelligent contract finds the fingerprint vector plaintext and the fingerprint vectorEncrypting different items of the fingerprint vector plaintext by using the public key of the authoritative third party S, and if the encrypted different items are different from the fingerprint vectorIf the corresponding items in the first arbitration intelligent contract are not consistent, judging that an authoritative third party S corresponding to the first arbitration intelligent contract is malicious, transferring the token in the first arbitration intelligent contract to an account of a digital content holder P, and if the encrypted different items are not identical to the fingerprint vectorThe corresponding items in the first arbitration policy are consistent, the digital content holder P is judged to be malicious, and the first arbitration policy is appliedEnabling tokens in the contract to be transferred to an account of an authoritative third party S;
or the second arbitration intelligent contract finds the fingerprint vector plaintext and the fingerprint vectorEncrypting the non-identical items of the fingerprint vector plaintext with the public key of the digital content consumer C; if the encrypted different items are not the same as the fingerprint vectorIf the corresponding items in the second intelligent contract are not consistent, the digital content consumer C corresponding to the second intelligent contract is judged to be malicious, the token in the second intelligent contract is transferred to the account of the digital content holder P, and if the encrypted different items are not the same as the fingerprint vectorIf the corresponding items in the second arbitration intelligent contract are consistent, the digital content holder P is judged to be malicious, and the token in the second arbitration intelligent contract returns the account of the digital content consumer C.
In this embodiment, if the first arbitrated intelligent contract is not invoked within the specified time, the token in the first arbitrated intelligent contract returns to the account of the authoritative third party S, and if the second arbitrated intelligent contract is not invoked within the specified time, the token in the second arbitrated intelligent contract returns to the account of the digital content consumer C.
Through the steps, in the digital content piracy tracing arbitration process, the pirated digital content publisher can be traced and automatically arbitrated by matching the fingerprint vectors, so that the copyright cost of a digital content holder is greatly reduced, and the copyright benefit of the digital content holder is guaranteed.
In the digital content copyright authentication and transaction system of this embodiment, a digital content holder P deploys an intelligent transaction contract, a first intelligent arbitration contract and a second intelligent arbitration contract in a blockchain system, the authoritative third party S deploys an intelligent copyright authentication application contract and an intelligent dispute arbitration contract in the blockchain system, and the digital content holder P, the digital content consumer C and the authoritative third party S are programmed or configured to execute the digital content copyright authentication and transaction method for piracy prevention described in this embodiment, so that the system does not need to depend on a third party organization and has complete functions of digital content copyright authentication, digital content transaction and digital content piracy tracing arbitration.
The foregoing is considered as illustrative of the preferred embodiments of the invention and is not to be construed as limiting the invention in any way. Although the present invention has been described with reference to the preferred embodiments, it is not intended to be limited thereto. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical spirit of the present invention should fall within the protection scope of the technical scheme of the present invention, unless the technical spirit of the present invention departs from the content of the technical scheme of the present invention.
Claims (10)
1. A copyright authentication and transaction method of digital content for preventing piracy is characterized in that the method is applied to a copyright authentication and transaction system of the digital content, the copyright authentication and transaction system of the digital content comprises a digital content holder P and an authoritative third party S, the digital content holder P deploys a first arbitration intelligent contract in a block chain system, the authoritative third party S deploys a copyright authentication application intelligent contract in the block chain system, the method comprises the steps of copyright authentication of the digital content, and specifically comprises the following steps:
s1) a digital content holder P encrypts an original digital content X to obtain an encrypted digital content Y and publishes the encrypted digital content Y;
s2) the digital content holder P calculates the target information of the original digital content X, and stores the target information and the token with the specified amount in the copyright authentication application intelligent contract of any authoritative third party S;
s3) the digital content holder P makes an encrypted decryption lookup table exclusive to the authoritative third party S according to the encrypted fingerprint vector of the authoritative third party SAnd stored thereinA first arbitration intelligent contract;
s4) the authoritative third party S obtains a decryption lookup table from the first arbitration intelligent contractAnd decrypted with a private key and then with the decryption result D s Decrypting the digital content Y to obtain the digital content X s Verifying the target information and the digital content X s If the verification is successful, executing step S5), and if the verification is failed, executing step S6);
s5) the authoritative third party S makes a digital content copyright certificate and uploads the digital content copyright certificate to a block chain system for showing, and after a digital content holder P verifies that the certificate is correct, a token in the copyright certification application intelligent contract is transferred to an account of the authoritative third party S, and the operation is finished and quit;
s6) the authoritative third party S stores the failure reason in a copyright authentication application intelligent contract to be sent to the digital content holder P, and the token in the copyright authentication application intelligent contract is returned to the account of the digital content holder P.
2. The method of claim 1, wherein the digital content holder P in step S3) makes an encrypted decryption lookup table specific to the authoritative third party S according to the encrypted fingerprint vector of the authoritative third party SThe method specifically comprises the following steps:
s31) the authoritative third party S selects the fingerprint vector b S Encrypting the fingerprint vector b with its public key S Obtaining an encrypted fingerprint vectorAnd with the encrypted fingerprint vector b S Hash value of random number string H used in time r Is stored in the first arbitration intelligence contract,also storing a specified amount of token into the first arbitration intelligent contract;
s32) the digital content holder P obtains the fingerprint vector from the first arbitration intelligent contractAnd encoding the fingerprint to obtain a first encrypted encoded fingerprint vectorSelecting a fingerprint vector b P After the encoding, the public key of the authoritative third party S is used for encryption to obtain a second encrypted encoding fingerprint vectorEncoding the first encrypted encoded fingerprint vectorAnd a second cryptographically encoded fingerprint vectorSplicing to obtain complete encrypted coding fingerprint vector
3. The anti-piracy digital content rights authentication and transaction method according to claim 2, wherein said digital content rights authentication and transaction system further comprises a digital content consumer C, said digital content holder P having a transaction intelligence contract and a second arbitration intelligence contract deployed in a blockchain system, said method comprising the steps of digital content transaction, specifically comprising:
a1 ) digital content consumer C picks fingerprint vector b C Generating random public key and private key of the transaction, and encrypting the fingerprint vector b by using the public key C Obtaining an encrypted fingerprint vectorThe public key and the fingerprint vector are combinedEncrypted fingerprint vector b C Hash value H of random number string used in time calculation r And a specified amount of token is stored in the transaction intelligence contract and the second sanction intelligence contract of the digital content holder P;
a2 The digital content holder P obtains a fingerprint vector from the transaction intelligence contractAnd encoding the fingerprint to obtain a third encrypted encoded fingerprint vectorSelecting a fingerprint vector b P After the encoding, the public key of the digital content consumer C is used for encrypting to obtain a fourth encryption encoding fingerprint vectorEncoding the third encrypted encoded fingerprint vectorAnd a fourth cryptographically encoded fingerprint vectorSplicing to obtain complete encrypted coding fingerprint vector
A3 The digital content holder P encodes a fingerprint vector according to the complete encryptionCalculating to obtain an encrypted decryption lookup tableAnd stored in the transaction intelligent contract and the second arbitration intelligent contract;
a4 The digital content consumer C retrieves the decryption lookup table from the transaction intelligence contractAnd using the random private key of the transaction to decrypt, and then using the decryption result D c Decrypting the digital content Y to obtain the digital content X c Verifying said digital content X c And if the verification is successful, confirming the transaction intelligent contract and transferring the token in the transaction intelligent contract into the account of the digital content holder P, if the verification is failed, initiating dispute arbitration by the digital content consumer C before the automatic confirmation of the transaction intelligent contract, executing the dispute arbitration step, and suspending the execution of the transaction intelligent contract during the dispute arbitration step.
4. The method according to claim 3, wherein there are at least four authoritative third parties S, said authoritative third parties S deploying intelligent dispute arbitration contracts in the blockchain system, said dispute arbitration steps comprising:
a41 The digital content consumer C respectively stores token tokens of specified amounts in dispute arbitration intelligent contracts corresponding to other authoritative third parties S except for issuing the digital content copyright certificate, and simultaneously stores private keys of the transaction in the corresponding dispute arbitration intelligent contracts together with verification failure reasons after encrypting the private keys of the transaction by the public keys of the authoritative third parties S;
a42 Token in the dispute arbitration intelligent contract is transferred to an account of a corresponding authoritative third party S, the authoritative third party S obtains the encrypted digital content consumer C private key from the corresponding dispute arbitration intelligent contract and decrypts the encrypted digital content consumer C private key to obtain the digital content consumer C private key, and obtains a decryption lookup table from the transaction intelligent contractAnd decrypted with the private key of the digital content consumer C and then with the decrypted result D c Decrypting the digital content Y to obtain the digital content X c Finally, verifying said digital content X c The consistency with the corresponding information in the digital content copyright certificate judges whether the verification result is consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract;
a43 If the authentication fails because of the digital content X c The similarity of the similarity hash value and the similarity hash value stored in the digital content copyright certificate is smaller than a given threshold value, the number proportion of an authoritative third party S with a verification result consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract is judged to exceed a preset first threshold value, the digital content holder P is judged to be malicious, the token in the transaction intelligent contract and the second arbitration intelligent contract is returned to the account of the digital content consumer C, the transaction intelligent contract and the second arbitration intelligent contract are invalid, and the digital content holder P is punished; and if the number proportion of the authoritative third parties S with the verification results consistent with the verification failure reasons in the corresponding dispute arbitration intelligent contract does not exceed a preset first threshold value, judging that the digital content consumer C is malicious, confirming the transaction intelligent contract and transferring the token in the transaction intelligent contract to the account of the digital content holder P.
5. The method for copyright authentication and transaction of digital contents for preventing piracy according to claim 4, wherein in the step A43), if the verification fails, the reason is the digital content X C And number ofAnd judging that the number proportion of the authoritative third parties S with the verification result consistent with the verification failure reason in the corresponding dispute arbitration intelligent contract exceeds a preset first threshold value, and judging that the authoritative third parties S issuing the digital content copyright certificate are malicious, wherein the digital content copyright certificate is invalid.
6. The method for copyright authentication and transaction of anti-piracy digital content according to claim 4, further comprising a step of digital content piracy tracing arbitration, specifically comprising:
b1 ) the digital content holder P according to the acquired pirated digital content X L Calculating to obtain a fingerprint vector b * And is split intoAnd
b2 The digital content holder P finds a fingerprint vector from all the selected fingerprint vectorsFingerprint vector b with highest similarity P Invoking the fingerprint vector b P Corresponding first arbitration intelligent contract or second arbitration intelligent contract and fingerprint vectorStored in the first or second arbitration smart contracts;
b3 The authoritative third party S corresponding to the first arbitration intelligent contract stores the selected fingerprint vector plaintext and the random number string used for encrypting the fingerprint vector plaintext in the first arbitration intelligent contract, or the digital content consumer C corresponding to the second arbitration intelligent contract stores the selected fingerprint vector plaintext and the random number string used for encrypting the fingerprint vector plaintextThe machine number string is stored in the second arbitration intelligent contract, and the original hash value H corresponding to the random number string is stored in the first arbitration intelligent contract and the second arbitration intelligent contract r ;
B4 The first or second arbitration smart contracts calculate a hash value H 'of the random number string' r If the hash value H' r And the original hash value H r And if the judgment result shows that the authority third party S corresponding to the first arbitration intelligent contract is malicious, the token in the first arbitration intelligent contract is transferred to the account of the digital content holder P, or the judgment result shows that the digital content consumer C corresponding to the second arbitration intelligent contract is malicious, and the token in the second arbitration intelligent contract is transferred to the account of the digital content holder P.
7. The method for copyright authentication and transaction of anti-piracy digital content according to claim 6, further comprising the hash value H 'after step B4)' r And the original hash value H r The processing steps when consistent specifically include: if the Hash value is H' r And the original hash value H r In agreement, the first or second arbitration smart contracts compute the fingerprint vectorSimilarity with the plain text of the fingerprint vector if the fingerprint vectorAnd if the similarity of the fingerprint vector plaintext is larger than or equal to a preset second threshold value, judging that an authoritative third party S corresponding to the first arbitration intelligent contract is malicious, and transferring the token in the first arbitration intelligent contract to an account of a digital content holder P, or judging that a digital content consumer C corresponding to the second arbitration intelligent contract is malicious, and transferring the token in the second arbitration intelligent contract to the account of the digital content holder P.
8. The method of claim 7, wherein the hash value H 'is used for copyright authentication and transaction of digital content for piracy protection' r And the original hash value H r The fingerprint vector is further included after the processing step when consistentAnd a processing step when the similarity with the fingerprint vector plaintext is smaller than a preset second threshold, specifically comprising: if the fingerprint vectorThe similarity between the fingerprint vector plaintext and the first arbitration intelligent contract is smaller than a preset second threshold value, and the first arbitration intelligent contract finds the fingerprint vector plaintext and the fingerprint vectorEncrypting the non-identical items of the fingerprint vector plaintext by using the public key of the authoritative third party S, and if the encrypted non-identical items are not identical with the fingerprint vectorIf the corresponding items in the first arbitration intelligent contract are inconsistent, judging that the authoritative third party S corresponding to the first arbitration intelligent contract is malicious, transferring the token in the first arbitration intelligent contract into the account of the digital content holder P, and if the encrypted different items are not identical to the fingerprint vectorIf the corresponding items in the first arbitration intelligent contract are consistent, judging that the digital content holder P is malicious, and transferring the token in the first arbitration intelligent contract into an account of an authoritative third party S;
or the second arbitration intelligent contract finds the fingerprint vector plaintext and the fingerprint vectorIn the case of a non-identical item,encrypting the distinct items of the fingerprint vector plaintext with the digital content consumer C's public key; if the encrypted different items are not the same as the fingerprint vectorIf the corresponding items in the second intelligent contract are not consistent, the digital content consumer C corresponding to the second intelligent contract is judged to be malicious, the token in the second intelligent contract is transferred to the account of the digital content holder P, and if the encrypted different items are not the same as the fingerprint vectorIf the corresponding items in the second arbitration intelligent contract are consistent, the digital content holder P is judged to be malicious, and the token in the second arbitration intelligent contract returns the account of the digital content consumer C.
9. The method of claim 6, wherein the token in the first arbitrated intelligent contract returns to the account of an authoritative third party S if the first arbitrated intelligent contract is not invoked within a specified time, and the token in the second arbitrated intelligent contract returns to the account of the digital content consumer C if the second arbitrated intelligent contract is not invoked within a specified time.
10. A digital content copyright authentication and transaction system, comprising a digital content holder P, a digital content consumer C and an authoritative third party S, wherein the digital content holder P is deployed with a transaction intelligent contract, a first arbitration intelligent contract and a second arbitration intelligent contract in a block chain system, the authoritative third party S is deployed with a copyright authentication application intelligent contract and a dispute arbitration intelligent contract in the block chain system, and the digital content holder P, the digital content consumer C and the authoritative third party S are programmed or configured to execute the anti-piracy digital content copyright authentication and transaction method according to any one of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211047685.6A CN115408666A (en) | 2022-08-30 | 2022-08-30 | Anti-piracy digital content copyright authentication and transaction method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211047685.6A CN115408666A (en) | 2022-08-30 | 2022-08-30 | Anti-piracy digital content copyright authentication and transaction method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115408666A true CN115408666A (en) | 2022-11-29 |
Family
ID=84161390
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211047685.6A Pending CN115408666A (en) | 2022-08-30 | 2022-08-30 | Anti-piracy digital content copyright authentication and transaction method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115408666A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115964680A (en) * | 2022-12-13 | 2023-04-14 | 暨南大学 | Copyright protection method based on double-authentication blocking signature and block chain |
CN117829837A (en) * | 2024-03-04 | 2024-04-05 | 数盾信息科技股份有限公司 | Data processing method and system for digital currency |
-
2022
- 2022-08-30 CN CN202211047685.6A patent/CN115408666A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115964680A (en) * | 2022-12-13 | 2023-04-14 | 暨南大学 | Copyright protection method based on double-authentication blocking signature and block chain |
CN115964680B (en) * | 2022-12-13 | 2023-09-29 | 暨南大学 | Copyright protection method based on double authentication blocking signature and blockchain |
CN117829837A (en) * | 2024-03-04 | 2024-04-05 | 数盾信息科技股份有限公司 | Data processing method and system for digital currency |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11868509B2 (en) | Method and arrangement for detecting digital content tampering | |
US10769252B2 (en) | Method and apparatus for watermarking of digital content, method for extracting information | |
CN115408666A (en) | Anti-piracy digital content copyright authentication and transaction method and system | |
CN113034128B (en) | Block chain-based data transaction and right confirmation method | |
EP1955280A2 (en) | Secure electronic commerce using mutating identifiers | |
EP3673390B1 (en) | Identifying copyrighted material using embedded copyright information | |
WO2021258907A1 (en) | Transaction method based on blockchain network, node, and medium | |
JP3917395B2 (en) | Content distribution method, content distribution device, content illegal copy inspection method, content illegal copy inspection device, content distribution program, content illegal copy inspection program, and computer-readable recording medium recording these programs | |
Xiao et al. | FingerChain: Copyrighted multi-owner media sharing by introducing asymmetric fingerprinting into blockchain | |
Okada et al. | A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking | |
Zhang et al. | Digital image copyright protection method based on blockchain and zero trust mechanism | |
Frattolillo | Watermarking protocols: An excursus to motivate a new approach | |
Huang et al. | A new buyer-seller watermarking protocol without multiple watermarks insertion | |
CN117454442A (en) | Anonymous security and traceable distributed digital evidence obtaining method and system | |
CN112464178A (en) | Data transaction copyright protection method based on block chain and homomorphic encryption | |
TWI776590B (en) | System, method and computer readable medium for authenticaion and transfer traceability of digital documents | |
Bhadauria et al. | Intellectual Property Protection using Blockchain and Digital Watermarking | |
Song et al. | A buyer-seller watermarking protocol for digital secondary market | |
Zhang et al. | Digital Image Copyright Protection Method Based on Blockchain and Perceptual Hashing | |
ZHANG | Cryptographic Techniques in Digital Media Security: Current Practices and Future Directions. | |
Arenas et al. | A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption | |
US20230410072A1 (en) | Systems and methods for enhanced non-fungible tokens | |
CN116703403B (en) | Offline transaction method and financial service platform based on blockchain network | |
WO2024027783A1 (en) | Method and system for processing digital content, method and system for confirming copyrights of digital content, and method and system for tracing digital content | |
Peng et al. | SCPS: A Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |