CN116258494A - Copyright transaction circulation method and device based on blockchain and computer equipment - Google Patents

Copyright transaction circulation method and device based on blockchain and computer equipment Download PDF

Info

Publication number
CN116258494A
CN116258494A CN202310131952.6A CN202310131952A CN116258494A CN 116258494 A CN116258494 A CN 116258494A CN 202310131952 A CN202310131952 A CN 202310131952A CN 116258494 A CN116258494 A CN 116258494A
Authority
CN
China
Prior art keywords
party
request
digital asset
encrypted
key pair
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310131952.6A
Other languages
Chinese (zh)
Inventor
谭林
贾时雨
姚昱旻
姜载乐
陈孝经
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Tianhe Guoyun Technology Co Ltd
Original Assignee
Hunan Tianhe Guoyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Tianhe Guoyun Technology Co Ltd filed Critical Hunan Tianhe Guoyun Technology Co Ltd
Priority to CN202310131952.6A priority Critical patent/CN116258494A/en
Publication of CN116258494A publication Critical patent/CN116258494A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/184Intellectual property management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Primary Health Care (AREA)
  • Bioethics (AREA)
  • Human Resources & Organizations (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of blockchains, and provides a blockchain-based copyright transaction circulation method, a blockchain-based copyright transaction circulation device and computer equipment, wherein the method comprises the following steps: collecting biological characteristic information of a copyright party and a requester and generating a corresponding key pair; receiving a copyright registration request carrying an encrypted copyright registration file sent by the copyright party; decrypting the encrypted copyright registration file to obtain a copyright registration file, and encrypting the copyright registration file and the biological characteristic information of the copyright party by using the corresponding key pair to obtain an encrypted copyright digital asset; when a request for a rights transaction is received by the requestor, the encrypted rights digital asset is transacted based on the key pair, the rights party, and biometric information of the requestor. By adopting the method, the dependence on a third-party central mechanism can be avoided, and the copyright security is improved.

Description

Copyright transaction circulation method and device based on blockchain and computer equipment
Technical Field
The invention belongs to the technical field of blockchains, and particularly relates to a blockchain-based copyright transaction circulation method, a blockchain-based copyright transaction circulation device, computer equipment and a storage medium.
Background
At present, most of copyright management modes are realized by adopting a third party record mode of a centralization mode, and the full-flow management of copyright is carried out by a management center. Although the operation efficiency of the centralization mechanism is higher, the dependency of each participant on the third party copyright management center is strong, and the third party copyright management center is used as an intermediary to bear the operation of each link of the copyright management and perform centralization accounting, so that single-point failure and centralization attack risks are easy to exist. Meanwhile, the third party copyright management center is an intermediary mechanism of copyright transaction and is also a turnover center of funds, and the transfer of funds between the copyright party and the transferee is undertaken, so that frequent funds circulation can be generated, and the copyright management center is required to reasonably distribute and effectively manage the funds, so that part of flowing funds are occupied to a certain extent, and the liquidity of the funds is lost. The copyright management center still adopts the identity authentication of traditional password form at present, has stored the account password of numerous users, makes it become the main objective of hacking, therefore still has user's identity to steal the risk, has reduced copyright security.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, apparatus, computer device, and storage medium for circulation of copyright transactions in a blockchain that can avoid reliance on a third party central authority and promote copyright security.
The invention provides a copyright transaction circulation method of a blockchain, which comprises the following steps:
collecting biological characteristic information of a copyright party and a requester and generating a corresponding key pair;
receiving a copyright registration request carrying an encrypted copyright registration file sent by the copyright party;
decrypting the encrypted copyright registration file to obtain a copyright registration file, and encrypting the copyright registration file and the biological characteristic information of the copyright party by using the corresponding key pair to obtain an encrypted copyright digital asset;
when a request for a rights transaction is received by the requestor, the encrypted rights digital asset is transacted based on the key pair, the rights party, and biometric information of the requestor.
In one embodiment, said trading the encrypted rights digital asset based on the key pair, the rights party and biometric information of the requesting party when the rights trade request of the requesting party is received comprises:
when the copyright transaction request is a copyright assignment request, decrypting the encrypted copyright digital asset by the copyright party based on an intelligent contract by utilizing a private key of the key pair to obtain a copyright digital asset to be finally decrypted;
after the biological characteristic information of the copyright party passes the identification authentication and the request pays the transfer license to the copyright party, carrying out final decryption on the digital asset of the copyright to be finally decrypted to obtain the copyright to be traded;
encrypting and storing the copyright to be traded in a uplink manner based on the biological characteristic information of the requester.
In one embodiment, said trading the encrypted rights digital asset based on the key pair, the rights party and biometric information of the requesting party when the rights trade request of the requesting party is received comprises:
when the copyright transaction request is a copyright license request, decrypting the encrypted copyright digital asset by the copyright party based on an intelligent contract by utilizing a private key of the key pair to obtain a copyright digital asset to be finally decrypted;
after the biological characteristic information of the copyright party passes the identification authentication and the request pays a license to the copyright party, finally decrypting the digital asset to be finally decrypted to obtain the copyright to be traded;
and re-encrypting and storing the copyright to be traded in a chain based on the biological characteristic information of the copyright party and the biological characteristic information of the requester.
In one embodiment, the method further comprises:
when the copyright asset corresponding to the copyright license request comprises at least two copyright parties, any one of the copyright parties carries out copyright license transaction with the requesting party based on a ring signature.
In one embodiment, the generating the corresponding key pair includes:
acquiring a first prime number and a second prime number randomly selected by a person to whom a key pair belongs, and calculating difference values of the first prime number and the second prime number with a value 1 respectively to obtain a first difference value and a second difference value;
obtaining the product of the first prime number and the second prime number as a first product, and obtaining the product of the first difference value and the second difference value as a second product;
selecting an integer which is more than 0 and less than the second product and is compatible with the second product, and performing extended Euclidean calculation by using the integer, the second product and the value 1 to obtain an extended Euclidean value;
and taking the integer and the first product as public keys, and taking the extended Euclidean value and the first product as private keys to obtain a key pair corresponding to the person to which the key pair belongs.
A block chain copyright transaction circulation apparatus, comprising:
the registration module is used for collecting biological characteristic information of the copyright party and the requester and generating a corresponding key pair;
the request receiving module is used for receiving a copyright registration request which is sent by the copyright party and carries an encrypted copyright registration file;
the copyright encryption module is used for decrypting the encrypted copyright registration file to obtain a copyright registration file, and encrypting the copyright registration file and the biological characteristic information of the copyright party by using the corresponding secret key to obtain an encrypted copyright digital asset;
and the copyright trading module is used for trading the encrypted copyright digital asset based on the key pair, the copyright party and the biological characteristic information of the requester when receiving the copyright trading request of the requester.
In one embodiment, the copyright trading module is further configured to:
when the copyright transaction request is a copyright assignment request, decrypting the encrypted copyright digital asset by the copyright party based on an intelligent contract by utilizing a private key of the key pair to obtain a copyright digital asset to be finally decrypted;
after the biological characteristic information of the copyright party passes the identification authentication and the request pays the transfer license to the copyright party, carrying out final decryption on the digital asset of the copyright to be finally decrypted to obtain the copyright to be traded;
encrypting and storing the copyright to be traded in a uplink manner based on the biological characteristic information of the requester.
In one embodiment, the copyright trading module is further configured to:
when the copyright transaction request is a copyright license request, decrypting the encrypted copyright digital asset by the copyright party based on an intelligent contract by utilizing a private key of the key pair to obtain a copyright digital asset to be finally decrypted;
after the biological characteristic information of the copyright party passes the identification authentication and the request pays a license to the copyright party, finally decrypting the digital asset to be finally decrypted to obtain the copyright to be traded;
and re-encrypting and storing the copyright to be traded in a chain based on the biological characteristic information of the copyright party and the biological characteristic information of the requester.
The present invention also provides a computer device comprising a processor and a memory storing a computer program, the processor implementing the steps of the blockchain copyright transaction circulation method of any of the above when executing the computer program.
The present invention also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the blockchain copyright transaction circulation method of any of the above.
According to the block chain copyright transaction circulation method, the device, the computer equipment and the storage medium, copyright data are maintained to be true and reliable through the block chain distributed account book structure, centralized storage is not needed by a large-scale centralized mechanism, the redundant storage of the distributed structure avoids malicious tampering, data loss caused by central disasters can be dealt with, and defects in centralized management and excessive dependence on a copyright management center database are avoided. Meanwhile, the copyright is doubly encrypted by adopting asymmetric encryption and biological characteristic information, so that a licensee only uses the copyright in the range of the copyright owner in the copyright licensing transaction, the abuse of the copyright is prevented, and the security of the copyright is improved.
Drawings
FIG. 1 is a flow chart of a block chain copyright transaction circulation method in one embodiment.
FIG. 2 is a schematic diagram of a communication flow in one embodiment.
Fig. 3 is a block diagram of a block chain copyright transaction circulation apparatus in one embodiment.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In one embodiment, as shown in fig. 1, a method for circulation of copyright transactions in a blockchain is provided, which includes the following steps:
step S101, collecting biological characteristic information of copyrights and requesters, and generating corresponding key pairs.
The copyright party (CH) refers to a user who owns the copyright asset, the requester refers to a user who requests to trade the copyright asset, and the copyright trade is divided into two modes of copyright assignment and permission based on the copyright trade, and the requester comprises an Assignee (AS) and a Licensee (LI). The biometric information refers to information for biometric recognition including fingerprint recognition, face recognition, iris recognition, vein recognition, and the like, and the present embodiment prefers faces and fingerprints.
Specifically, before a block chain-based copyright transaction circulation platform (C) performs copyright transaction, a copyright party (CH), an Assignee (AS) and a Licensee (LI) are first required to register on the platform (C), and the registration information in this embodiment mainly adopts a neural network to perform biometric identification, such AS facial identification and fingerprint identification, and the platform (C) stores the obtained biometric information records of each participant. Then, an RSA algorithm is utilized to generate a key pair for each participant, wherein the key pair is an asymmetric key comprising a public key and a private key, and then encryption and decryption are carried out on the copyright asset based on the key pair.
In one embodiment, the manner in which the key pair is generated includes: acquiring a first prime number and a second prime number randomly selected by a person to which the key pair belongs, and calculating difference values of the first prime number and the second prime number with a value 1 respectively to obtain a first difference value and a second difference value; obtaining a product of the first prime number and the second prime number as a first product, and obtaining a product of the first difference value and the second difference value as a second product; selecting an integer which is more than 0 and less than the second product and is compatible with the second product, and performing extended Euclidean calculation by using the integer, the second product and the value 1 to obtain an extended Euclidean value; and taking the integer and the first product as a public key, and expanding the Euclidean value and the first product as a private key to obtain the key pair corresponding to the person to whom the key pair belongs.
Specifically, each party such AS a copyright party (CH), an Assignee (AS), a Licensee (LI) and the like randomly selects two larger prime numbers respectively to obtain a first prime number p and a second prime number q, wherein p is not equal to q. The prime number can be selected randomly by the platform (C) or by the platform @C) Indicating the participants to randomly select themselves. Then, the difference value between the first prime number and the second prime number and the value 1 is obtained, and a first difference value p-1 and a second difference value q-1 are obtained. And calculating a first product and a second product, wherein the first product is a product N, N1=p×q of the first prime number and the second prime number, and the second product is a product N2, N2= (p-1) ×q-1 of the first difference value and the second difference value. Finally, an integer e is selected, e satisfying 0 < e being smaller than N2, and e being mutually exclusive with N2, whereby the public key (e, N) is obtained. For ejd≡1mod N2, the extended euclidean value d is found by an extended euclidean algorithm, thereby obtaining the private key (d, N). To this end, the key Pair (PK) of each party is obtained based on this approach CH ,SK CH )、(PK AS ,SK AS )、(PK LI ,SK LI ). Furthermore, a key pair (PKC, SKC) is generated for the platform (C) on the basis of the same RSA algorithm.
Step S102, receiving a copyright registration request carrying an encrypted copyright registration file sent by a copyright party.
Specifically, in the copyright transaction flow, the platform (C) needs to first receive a copyright registration request proposed by the copyright party, where the copyright registration request carries the encrypted copyright registration file M2. The encrypted copyright registration file M2 is obtained by signing the copyright registration file M by adopting RSA algorithm and using the private key SKCH of the copyright party to obtain M1, and then using the public key PK of the receiving party, namely the platform (C) C And (5) encrypting to obtain the product. Wherein m1=sigsk CH (M),M2=EncPK C (M1)。
Step S103, decrypting the encrypted copyright registration file to obtain the copyright registration file, and encrypting the copyright registration file and the biological characteristic information of the copyright party by using the corresponding key pair to obtain the encrypted copyright digital asset.
Specifically, the platform (C) decrypts the encrypted copyright registration application M2 after receiving the encrypted copyright registration application M2, and first decrypts M2 using its own private key SKC, denoted m1=decsk C (M2) after which the digital signature is decrypted using the public key PK of the Copyrighter (CH) CH Decryption m1=decskc (M2) gives m=dsigpk CH (M1), thereby acquiring the copyright registration file M. Then, the copyright M and the biological characteristic information representing the identity of the copyright party, such as face and fingerprint information y CH1 、y CH2 Generating an encrypted version of a copyrighted digital asset CM, cm=encpk, using public key encryption of a copyrighter CH (y CH1 ,y CH2 ,EncPK C (M)) and store the hash value of the CM in the uplink.
In addition, the platform (C) can also verify whether the information submitted by the copyright party meets the requirement of copyright registration based on the intelligent contract before encryption, if so, the copyright party is prompted to pay for copyright registration, otherwise, the copyright party is prompted to submit the supplementary material. For the completed audited copyrights, the platform regenerates the encrypted copyrighted digital asset CM.
Step S104, when a request for a rights transaction by a requester is received, the encrypted rights digital asset is transacted based on the key pair, the rights party, and biometric information of the requester.
Specifically, the requester can view the public part of copyright information at any time on the platform (C), and when the copyright is required, a copyright transaction request, including a copyright assignment request and a copyright license request, is provided to the copyright party through the platform (C). After the copyright party receives the request and agrees to the transaction, a copyright transaction flow is performed. Correspondingly, when the copyright trade request is a copyright assignment request, the platform (C) executes a copyright assignment flow. When the copyright transaction request is a copyright license request, the platform (C) executes a copyright license flow.
It should be noted that, in this embodiment, each participant is mainly based on a license transaction, and the license is used as a payment means of the platform (C), so that a communication can be performed among the platform, the copyright party and the requester. The pass can be purchased through a legal token, as shown in fig. 2, providing a schematic representation of the pass circulation. The method enables the pass demander to have multiple pass acquisition ways, and enables the pass holder to acquire economic benefits through selling the pass. Therefore, the participants need to purchase a certain pass during the copyright transaction to realize the transaction circulation.
In one embodiment, step S104 includes: when the copyright transaction request is a copyright assignment request, decrypting the encrypted copyright digital asset by a copyright party based on the intelligent contract by utilizing a private key of the key pair to obtain the copyright digital asset to be finally decrypted; after the biological characteristic information of the copyright party passes the identification authentication and the request pays the copyright party a transfer license, carrying out final decryption on the digital asset to be finally decrypted to obtain the copyright to be traded; the copyright to be traded is encrypted based on the biological characteristic information of the requesting party and stored in a uplink mode.
Specifically, after the transaction is successful, the requester, i.e. the assignee, becomes a new version of the copyright, and the original copyright is no longer owned by the copyright. For such transactions, first the rights party needs to prove ownership of the rights, based on the smart contract, decrypt the encrypted rights digital asset CM, decSK by its private key SKCH CH (CM)=EncPK CH (y CH1 ,y CH2 ,EncPK C (M)) to obtain a copyrighted digital asset to be finally decrypted. Then the platform (C) automatically enters a biological feature recognition stage, namely, enters a facial recognition and fingerprint recognition stage to verify the identity of a copyright party, and if the copyright party generates a code y in the recognition process CH1 ,y CH2 The matching face and fingerprint indicate that the biometric authentication is successfully completed, and then the platform (C) performs final copyright decryption operation on the digital asset to be finally decrypted based on the intelligent contract to obtain the copyright M to be traded, wherein M=DecSK CH (EncPK CH (M)). And then, after the two parties reach the trade consensus, the assignee pays the universal certificate to the copyright party according to the universal certificate value marked by the copyright digital asset, and the intelligent contract triggers the copyright assignment after recognizing that the universal certificate payment is completed. Then, in the process of copyright assignment, the assignee first verifies the identity through the recognition and verification of the face and the fingerprint, and if the verification is passed, the platform (C) generates a new copyright attribute relationship for the copyright M, and the CM2 = EncPK AS (y AS1 ,y AS2 ,EncPK AS (M)) and store the hash value of CM2 in the uplink. After that, the original copyright party (CH) does not have the right of the copyright any more, and can not decrypt the copyright through the private key, the face and the fingerprint information held by the original copyright party (CH).
In one embodiment, step S104 includes: when the copyright transaction request is a copyright license request, decrypting the encrypted copyright digital asset by a copyright party based on the intelligent contract by utilizing a private key of the key pair to obtain the copyright digital asset to be finally decrypted; after the biological characteristic information of the copyright party passes the identification authentication and the request to pay the license to the copyright party, carrying out final decryption on the digital asset to be finally decrypted to obtain the copyright to be traded; the copyright to be traded is re-encrypted and stored in a chain based on the biological characteristic information of the copyright party and the biological characteristic information of the requesting party.
Specifically, the copyright licensing transaction has the copyright right after successful transaction, and the licensee only has the copyright right in the licensed and licensed range. For such transactions, the copyright party first needs to prove the right to the copyright as well, based on the intelligent contract, through its private key SK CH Decrypting an encrypted rights digital asset CM, decSK CH (CM)=EncPKCH(y CH1 ,y CH2 EncPKC (M)) to obtain a copyrighted digital asset to be finally decrypted. Then the platform (C) automatically enters a face recognition and fingerprint recognition stage to verify the identity of the copyright party, and if the copyright party generates a code y in the recognition process CH1 ,y CH2 The matching face and fingerprint indicate that the biometric authentication is successfully completed, and then the platform (C) performs final copyright decryption operation on the digital asset to be finally decrypted based on the intelligent contract to obtain the copyright M to be traded, wherein M=DecSK CH (EncPK CH (M)). And then, after the two parties reach the trade consensus, the assignee pays the clearance to the copyright party according to the clearance value marked by the copyright digital asset, and the intelligent contract triggers the copyright license after recognizing that the clearance payment is completed. In the copyright licensing process, the licensee also verifies the identity of the licensee through the recognition and verification of the face and the fingerprint to generate a new copyright attribute relationship for the copyright M by the platform (C), and the Cm3=EncPKLI (y CH2 ,y LI1 ,y LI2 ,EncPK LI (M)) and store the hash value of CM3 in the uplink. It follows that, unlike copyright assignment, the CM3 also includes biometric information of the copyright party, which is shown in this embodiment as fingerprint information of the copyright party. Thereafter the licensee has the right to use the copyright and needs to be participated in fingerprint verification by the copyright party when in use, the process ensures that the copyright is not illegally used beyond the authorized limit or beyond the authorized range, if the normally used copyright is not fingerprint authorized for the reasons of the copyright party, the licensee can mention the complaint to the platform (C), if yesThe platform will penalize copyrighters accordingly if the complaints are successful.
In one embodiment, when the copyright asset corresponding to the copyright license request includes at least two copyright parties, a copyright license transaction is conducted with the requesting party by either of the copyright parties based on the ring signature.
Specifically, there is a common situation where copyrights exist, and where there are multiple copyrighted parties that have ownership of the copyrights. In the copyright license service, each copyright use needs to be verified by all copyright parties, which causes efficiency reduction and resource waste. Therefore, in order to improve efficiency and reduce resource waste, when at least two copyright parties exist for copyright license transaction, verification can be performed in a ring signature mode, and license operation of the copyright can be realized only by performing ring signature by one of a plurality of copyright parties. The process of the multi-person copyright license transaction is the same as that described in the above embodiment, and will not be described here, except that in the process of the license transaction, the licensor needs to sign the transaction in a ring. The copyright party sends the ring signature data to the platform, and the platform verifies the ring signature data to determine that the signature is valid, so that the copyright licensing operation can be realized. The ring signature may be constructed in any of the existing ways.
According to the block chain copyright transaction circulation method, the block chain distributed account book structure is used for maintaining the authenticity and credibility of copyright data, a large centralized mechanism is not needed for centralized storage, the redundant storage of the distributed structure avoids malicious tampering, the data loss caused by central disasters can be dealt with, and the defects in centralized management and the excessive dependence on a copyright management center database are avoided. And, carry out copyright transaction based on lead-through, regard economic value that the lead-through contains as the transaction medium, the digital economic development demand under the intelligent age of adaptation number promotes the application and the circulation rate of lead-through, compares traditional adoption and adopts the payment mode of legal coin transaction to do not need to pay the fund management cost and carry out frequent fund receipt and payment operation, has avoided the management cost that frequent sending out coin receipt and payment brought. Meanwhile, the copyright is doubly encrypted by adopting asymmetric encryption and biological characteristic information, so that a licensee only uses the copyright in the range of the copyright owner in the copyright licensing transaction, the abuse of the copyright is prevented, and the security of the copyright is improved.
In one embodiment, as shown in fig. 3, there is provided a block chain copyright transaction circulation apparatus, comprising:
the registration module 301 is configured to collect biometric information of the copyrighter and the requester, and generate a corresponding key pair.
The request receiving module 302 is configured to receive a copyright registration request carrying an encrypted copyright registration file sent by a copyright party.
The copyright encryption module 302 is configured to decrypt the encrypted copyright registration file to obtain a copyright registration file, encrypt the copyright registration file and biometric information of the copyright party with corresponding key pairs, and obtain an encrypted copyright digital asset.
The copyright trading module 304 is configured to trade the encrypted copyright digital asset based on the key pair, the copyright party and biometric information of the requester when receiving a request for a copyright trade of the requester.
In one embodiment, the rights transaction module 304 is further configured to, when the rights transaction request is a rights transfer request, decrypt, by the rights party, the encrypted rights digital asset using the private key of the key pair based on the smart contract, to obtain a rights digital asset to be finally decrypted; after the biological characteristic information of the copyright party passes the identification authentication and the request pays the copyright party a transfer license, carrying out final decryption on the digital asset to be finally decrypted to obtain the copyright to be traded; the copyright to be traded is encrypted based on the biological characteristic information of the requesting party and stored in a uplink mode.
In one embodiment, the copyright transaction module 304 is further configured to, when the copyright transaction request is a copyright license request, decrypt, by the copyright party, the encrypted copyright digital asset using the private key of the key pair based on the smart contract, to obtain a copyright digital asset to be finally decrypted; after the biological characteristic information of the copyright party passes the identification authentication and the request to pay the license to the copyright party, carrying out final decryption on the digital asset to be finally decrypted to obtain the copyright to be traded; the copyright to be traded is re-encrypted and stored in a chain based on the biological characteristic information of the copyright party and the biological characteristic information of the requesting party.
In one embodiment, the copyright trading module 304 is further configured to, when the copyright asset corresponding to the copyright license request includes at least two copyright parties, conduct a copyright license trade with the requesting party based on the ring signature by any of the copyright parties.
In one embodiment, the registration module 301 is further configured to obtain a first prime number and a second prime number randomly selected by a person to whom the key pair belongs, and calculate differences between the first prime number and the second prime number and between the first prime number and the value 1, so as to obtain a first difference and a second difference; obtaining a product of the first prime number and the second prime number as a first product, and obtaining a product of the first difference value and the second difference value as a second product; selecting an integer which is more than 0 and less than the second product and is compatible with the second product, and performing extended Euclidean calculation by using the integer, the second product and the value 1 to obtain an extended Euclidean value; and taking the integer and the first product as a public key, and expanding the Euclidean value and the first product as a private key to obtain the key pair corresponding to the person to whom the key pair belongs.
For specific limitation of the blockchain copyright trade streaming apparatus, reference may be made to the limitation of the blockchain copyright trade streaming method hereinabove, and the description thereof will not be repeated here. The above-described respective modules in the blockchain copyright transaction circulation apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules. Based on such understanding, the present invention may implement all or part of the above-described embodiments of the method, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and the computer program may implement the steps of the above-described embodiments of the method for circulation of copyright transactions in each blockchain when the computer program is executed by a processor. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc.
In one embodiment, a computer device is provided, which may be a server, including a processor, a memory, and a network interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a blockchain copyright transaction circulation method. For example, a computer program may be split into one or more modules, one or more modules stored in memory and executed by a processor to perform the present invention. One or more modules may be a series of computer program instruction segments capable of performing particular functions to describe the execution of a computer program in a computer device. The processor may be a central processing unit (Central Processing Unit, CPU), other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like that is a control center of the computer device, connecting various parts of the overall computer device using various interfaces and lines.
The memory may be used to store the computer program and/or modules, and the processor may implement various functions of the computer device by running or executing the computer program and/or modules stored in the memory, and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, plug-in hard disk, smart Media Card (SMC), secure Digital (SD) Card, flash Card (Flash Card), at least one disk storage device, flash memory device, or other volatile solid-state storage device.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A method of block chain copyright trading circulation, comprising:
collecting biological characteristic information of a copyright party and a requester and generating a corresponding key pair;
receiving a copyright registration request carrying an encrypted copyright registration file sent by the copyright party;
decrypting the encrypted copyright registration file to obtain a copyright registration file, and encrypting the copyright registration file and the biological characteristic information of the copyright party by using the corresponding key pair to obtain an encrypted copyright digital asset;
when a request for a rights transaction is received by the requestor, the encrypted rights digital asset is transacted based on the key pair, the rights party, and biometric information of the requestor.
2. The method of claim 1, wherein said trading the encrypted digital asset based on the key pair, the rights party, and biometric information of the requesting party upon receipt of the rights trade request by the requesting party comprises:
when the copyright transaction request is a copyright assignment request, decrypting the encrypted copyright digital asset by the copyright party based on an intelligent contract by utilizing a private key of the key pair to obtain a copyright digital asset to be finally decrypted;
after the biological characteristic information of the copyright party passes the identification authentication and the request pays the transfer license to the copyright party, carrying out final decryption on the digital asset of the copyright to be finally decrypted to obtain the copyright to be traded;
encrypting and storing the copyright to be traded in a uplink manner based on the biological characteristic information of the requester.
3. The method of claim 1, wherein said trading the encrypted digital asset based on the key pair, the rights party, and biometric information of the requesting party upon receipt of the rights trade request by the requesting party comprises:
when the copyright transaction request is a copyright license request, decrypting the encrypted copyright digital asset by the copyright party based on an intelligent contract by utilizing a private key of the key pair to obtain a copyright digital asset to be finally decrypted;
after the biological characteristic information of the copyright party passes the identification authentication and the request pays a license to the copyright party, finally decrypting the digital asset to be finally decrypted to obtain the copyright to be traded;
and re-encrypting and storing the copyright to be traded in a chain based on the biological characteristic information of the copyright party and the biological characteristic information of the requester.
4. A method according to claim 3, characterized in that the method further comprises:
when the copyright asset corresponding to the copyright license request comprises at least two copyright parties, any one of the copyright parties carries out copyright license transaction with the requesting party based on a ring signature.
5. The method of claim 1, wherein the generating the corresponding key pair comprises:
acquiring a first prime number and a second prime number randomly selected by a person to whom a key pair belongs, and calculating difference values of the first prime number and the second prime number with a value 1 respectively to obtain a first difference value and a second difference value;
obtaining the product of the first prime number and the second prime number as a first product, and obtaining the product of the first difference value and the second difference value as a second product;
selecting an integer which is more than 0 and less than the second product and is compatible with the second product, and performing extended Euclidean calculation by using the integer, the second product and the value 1 to obtain an extended Euclidean value;
and taking the integer and the first product as public keys, and taking the extended Euclidean value and the first product as private keys to obtain a key pair corresponding to the person to which the key pair belongs.
6. A block chain copyright transaction flow-through device, comprising:
the registration module is used for collecting biological characteristic information of the copyright party and the requester and generating a corresponding key pair;
the request receiving module is used for receiving a copyright registration request which is sent by the copyright party and carries an encrypted copyright registration file;
the copyright encryption module is used for decrypting the encrypted copyright registration file to obtain a copyright registration file, and encrypting the copyright registration file and the biological characteristic information of the copyright party by using the corresponding secret key to obtain an encrypted copyright digital asset;
and the copyright trading module is used for trading the encrypted copyright digital asset based on the key pair, the copyright party and the biological characteristic information of the requester when receiving the copyright trading request of the requester.
7. The method of claim 6, wherein the copyright trading module is further configured to:
when the copyright transaction request is a copyright assignment request, decrypting the encrypted copyright digital asset by the copyright party based on an intelligent contract by utilizing a private key of the key pair to obtain a copyright digital asset to be finally decrypted;
after the biological characteristic information of the copyright party passes the identification authentication and the request pays the transfer license to the copyright party, carrying out final decryption on the digital asset of the copyright to be finally decrypted to obtain the copyright to be traded;
encrypting and storing the copyright to be traded in a uplink manner based on the biological characteristic information of the requester.
8. The method of claim 6, wherein the copyright trading module is further configured to:
when the copyright transaction request is a copyright license request, decrypting the encrypted copyright digital asset by the copyright party based on an intelligent contract by utilizing a private key of the key pair to obtain a copyright digital asset to be finally decrypted;
after the biological characteristic information of the copyright party passes the identification authentication and the request pays a license to the copyright party, finally decrypting the digital asset to be finally decrypted to obtain the copyright to be traded;
and re-encrypting and storing the copyright to be traded in a chain based on the biological characteristic information of the copyright party and the biological characteristic information of the requester.
9. A computer device comprising a processor and a memory, the memory storing a computer program, wherein the processor is configured to implement the blockchain-based copyright transaction circulation method of any of claims 1-5 when executing the computer program.
10. A computer readable storage medium having stored thereon a computer program, which when executed by a processor implements the blockchain-based copyright transaction circulation method of any of claims 1-5.
CN202310131952.6A 2023-02-07 2023-02-07 Copyright transaction circulation method and device based on blockchain and computer equipment Pending CN116258494A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310131952.6A CN116258494A (en) 2023-02-07 2023-02-07 Copyright transaction circulation method and device based on blockchain and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310131952.6A CN116258494A (en) 2023-02-07 2023-02-07 Copyright transaction circulation method and device based on blockchain and computer equipment

Publications (1)

Publication Number Publication Date
CN116258494A true CN116258494A (en) 2023-06-13

Family

ID=86685946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310131952.6A Pending CN116258494A (en) 2023-02-07 2023-02-07 Copyright transaction circulation method and device based on blockchain and computer equipment

Country Status (1)

Country Link
CN (1) CN116258494A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116503070A (en) * 2023-06-21 2023-07-28 子亥科技(成都)有限公司 Digital asset right-determining and trading method, device, equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116503070A (en) * 2023-06-21 2023-07-28 子亥科技(成都)有限公司 Digital asset right-determining and trading method, device, equipment and storage medium
CN116503070B (en) * 2023-06-21 2023-09-19 子亥科技(成都)有限公司 Digital asset right-determining and trading method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US11004067B2 (en) Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
CN108418680B (en) Block chain key recovery method and medium based on secure multi-party computing technology
US20190333031A1 (en) System, method, and computer program product for validating blockchain or distributed ledger transactions in a service requiring payment
JP5578788B2 (en) Method and apparatus for granting content item license to party
US8539233B2 (en) Binding content licenses to portable storage devices
US8261073B2 (en) Digital rights management method and apparatus
US20080154782A1 (en) Apparatus, method and system for protecting personal information
TW202018557A (en) Data evidence saving method and device based on blockchain and electronic equipment
CN111538784B (en) Digital asset transaction method, device and storage medium based on blockchain
JP2008501176A (en) Information distribution system that protects privacy
JP2001230768A (en) System and method for information transaction and program supply medium
CN102906755A (en) Content control method using certificate revocation lists
CN111683082A (en) Data sharing method and system based on block chain and electronic equipment
CN113706344A (en) Block chain-based digital copyright protection method
EP4092984A1 (en) Data processing method and apparatus, device and medium
CN111914293A (en) Data access authority verification method and device, computer equipment and storage medium
CN112364305A (en) Digital content copyright protection method and device based on block chain platform
Chen et al. A novel DRM scheme for accommodating expectations of personal use
CN116258494A (en) Copyright transaction circulation method and device based on blockchain and computer equipment
US20030014652A1 (en) Licensing method and license providing system
CN113901520A (en) Data processing method, device, equipment and medium based on block chain
CN112381634A (en) Tax statistics and settlement method, device, equipment and storage medium
US20230283466A1 (en) Content protection system
Yee et al. Ensuring privacy for e-health services
CN112464178B (en) Data transaction copyright protection method based on blockchain and homomorphic encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination