CN117992932A - Digital resource right protection method and system for collaborative storage of upper chain and lower chain of block chain - Google Patents

Digital resource right protection method and system for collaborative storage of upper chain and lower chain of block chain Download PDF

Info

Publication number
CN117992932A
CN117992932A CN202311702901.0A CN202311702901A CN117992932A CN 117992932 A CN117992932 A CN 117992932A CN 202311702901 A CN202311702901 A CN 202311702901A CN 117992932 A CN117992932 A CN 117992932A
Authority
CN
China
Prior art keywords
rights
information
data
client
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311702901.0A
Other languages
Chinese (zh)
Other versions
CN117992932B (en
Inventor
林镇南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Science And Technology Beijing Technology Co ltd
Original Assignee
China Science And Technology Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Science And Technology Beijing Technology Co ltd filed Critical China Science And Technology Beijing Technology Co ltd
Priority to CN202311702901.0A priority Critical patent/CN117992932B/en
Publication of CN117992932A publication Critical patent/CN117992932A/en
Application granted granted Critical
Publication of CN117992932B publication Critical patent/CN117992932B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a digital resource right protection method and a system for collaborative storage under a block chain, wherein the method comprises the following steps: the client side interacts with the rights center according to the security parameters to generate a public-private key pair; generating auxiliary verification information; storing the auxiliary verification information and the public key on a blockchain chain, and storing the original rights data in a rights database; inquiring the position in the rights database, and generating a certificate according to the rights information and the public key; verifying returned right data according to the latest right verification information and the proof in the blockchain; uploading the right works, detecting the similarity of the right works, storing right information into a right database, and uploading auxiliary verification information into a blockchain; and uploading the latest right information, inquiring and verifying the integrity of the data by the client, generating auxiliary verification information, verifying the validity of the auxiliary verification information by the right center, and uploading the auxiliary verification information to the blockchain. The invention reduces the storage burden of the block chain; ensuring the consistency of the data under the chain and the integrity of the data under the chain; and the verification efficiency is improved.

Description

Digital resource right protection method and system for collaborative storage of upper chain and lower chain of block chain
Technical Field
The invention relates to the technical field of digital resource rights protection of blockchain, in particular to a digital resource rights protection method and system for collaborative storage of the upper chain and the lower chain of a blockchain.
Background
At present, digital resource rights are mainly protected by various technologies such as digital watermarking, a digital rights management system (DIGITAL RIGHTS MANAGEMENT, DRM), a blockchain and the like. The blockchain technology is used as a digital ledger with decentralization, and is very suitable for being applied to the field of right protection by virtue of the characteristics of non-tampering, traceability, uniqueness and the like.
The application of the blockchain technology in the aspect of digital resource rights protection is mainly focused on the aspects of rights content submission auditing and content storage. The method comprises the steps that important information such as a unique digital resource identifier and the like is extracted and stored on a block chain, a block header is packaged with a current version number of a block, an address of a last block, a time stamp, a hash value of the current block and a random number, and the block body contains the corresponding transaction number of digital resource rights and all right change records which are generated in the block creation process and verified; the rights data is stored in the rights database in an encrypted manner to ensure the integrity and security of the rights works.
But in the digital resource right protection system based on the blockchain at present, right data in a right database is directly compressed and packed into data nodes, and the data nodes are chained on the blockchain; or the right data content is encrypted and then stored on the blockchain, so that the storage space on the blockchain is insufficient, and the storage burden of the blockchain is increased.
In addition, the digital resources are stored under the blockchain chain, so that the problem that the digital resources and the right data stored under the chain are inconsistent with the data on the chain exists, and because the right data of the digital resources with different versions are uplink, different right information is stored in different blocks, a history block needs to be positioned when the user inquires or updates each time, and the inquiry efficiency is low.
The existing problems of the difficulties and pain points directly influence the timely acquisition and verification efficiency of the digital resource right information.
Disclosure of Invention
In view of this, the present invention aims to provide a method and a system for protecting digital resource rights in cooperative storage under the upper chain of a blockchain, which alleviate the pressure stored on the blockchain of the digital resource, ensure the integrity and consistency under the upper chain of a rights data chain, and improve the query and verification efficiency of rights data.
The invention provides a digital resource right protection method for collaborative storage of upper chains and lower chains of a block chain, which comprises the following steps:
S1, before a client side uploads a right work to a right authentication center server for the first time, generating a security parameter k, and generating a public-private key pair by interaction with the right authentication center according to the security parameter k, wherein the public key is sent to a verifier for verifying queried right data evidence, and the private key is used for updating a right database;
S2, generating auxiliary verification information by the client according to the generated public and private key pair and the original right data to be submitted, and sending the auxiliary verification information to a right center; the right center verifies whether the auxiliary verification information and the public key are legal or not, and the auxiliary verification information and the public key are stored on a blockchain chain after passing verification, and original right data are stored in a right database;
s3, the client sends the position in the right database to be queried to the right center, and the right center returns the right information in the database to the client and generates a certificate according to the returned right information and the public key;
s4, after the client receives the right information and the corresponding proving information returned by the right center, verifying the returned right data according to the latest right verification information in the blockchain and the proving calculated by the right center;
S5, uploading the right works to a right center by the client, detecting the similarity of the right works by the right center, storing right information into a right database by the right center after the similarity is detected, and uploading auxiliary verification information into a blockchain after the right information is successfully stored;
S6, uploading the latest right information to a right center by a right owner, inquiring and verifying whether the data of the position to be modified in a right database of the right center is complete by a client, generating auxiliary verification information according to the current latest data after the data is complete by verification, sending the auxiliary verification information to the right center, verifying whether the auxiliary verification information is legal by the right center, modifying the information in the right database after the auxiliary verification information is legal by verification, and uploading the auxiliary verification information to a blockchain.
Further, the operation of step S1 includes the following processing procedures:
Generating a security parameter k by a client, and multiplying a cyclic group according to two prime orders p Constructing a bilinear mapping function pair e: /(I)The generator of (2) is g;
Defining three hash functions Random number selection/>
Calculation of
Setting common parameters
Database db= (x, v x) is set, where 1.ltoreq.x.ltoreq.q.
Further, the operation of step S2 includes the following processing procedures:
encrypting, by the client, the original rights data (v 1,v2,...,vq):
Setting (Y, Y) as public and private key pairs of the client sides, and meeting the requirements of
Computing signaturesWherein T represents an update counter, and t=0 is initially set;
Setting a public key pk= (PP, Y), s= (PP, aux, DB), sk=y, aux= (H 0,Cc,CR, T);
after the rights issuer receives the public key PK and the auxiliary authentication information aux, calculate Verifying whether the rights data are legal, storing aux as rights verification information on a blockchain chain after the rights verification is passed, and storing the original rights data in a rights database.
Further, the query operation in the step S3 includes the following processing procedures:
The client sends the position x to be queried to the rights center, the rights center queries the data of the corresponding position in the rights database after receiving the request of the client, calculates the data of the corresponding position And returns proof σ= (v xx,H0) to the client; wherein v x is the message on subscript x; pi x is a proof of the value on subscript x.
Further, the verification operation of the step S4 includes the following processing procedures:
after the client receives the rights data and the corresponding attestation information from the rights issuer, it calculates And/>Wherein C c,CR is a promise value; verifying whether the right data is legal; if the verification is legal, the right data can be used; if the verification is illegal, the rights data may not be used.
Further, the operation of the step S5 includes the following processing procedures:
The client sets the counter to T 't+1, and calculates new auxiliary information aux according to the uploaded right data v' x And/>Sending (t' x,v′x) to the rights issuer; wherein t' x is a signature generated after the client updates the data on the subscript x;
The rights management center detects the similarity of the rights works, and verifies the signatures t' x,e((C′c,C′R,T),Y)=e(t′x and g according to the public key PK after the rights works pass the detection; if the signature T 'x is legal, modifying the data DB (x) = (v x,v′x) in the rights database by the rights issuer, and simultaneously updating the rights verification information aux= (T' x,C′c,C′R, T) and storing on the blockchain; if the signature t' x is not legal, the data in the rights database is not modified and the rights verification information is not updated.
Further, the operation of the step S6 includes the following processing procedures:
To update the rights issuer, it is first ensured that the data stored in the current rights database is complete; thus, the client queries the data stored in the position x to be modified in the rights database and verifies the complete similarity with the uploaded rights information, sets the counter to T+.T+1 at the client, calculates And/>Sending (t' x,v′x) to the rights issuer;
Verifying the signature t' x,e((Cc,C′R,T),Y)=e(t′x, g) by the rights issuer from the public key; if the signature t' x is legal, the rights issuer modifies the data DB (x) = (v x,v′x) in the rights database; meanwhile, the rights issuer updates the rights verification information aux= (T' x,Cc,C′R, T) and stores it onto the blockchain chain.
The meaning of the parameters in each calculation expression is shown in table 1:
TABLE 1
The invention also provides a digital resource right protection system for the cooperative storage of the upper chain and the lower chain of the block chain, which executes the digital resource right protection method for the cooperative storage of the upper chain and the lower chain of the block chain, and comprises the following steps:
An initialization module: before the client side uploads the right works to the right authentication center server for the first time, generating a security parameter k, and generating a public-private key pair by interaction with the right authentication center according to the security parameter k, wherein the public key is sent to a verifier for verifying the queried right data evidence, and the private key is used for updating a right database;
And (3) a setting module: the client generates auxiliary verification information according to the generated public and private key pair and the original right data to be submitted, and sends the auxiliary verification information to the right center; the right center verifies whether the auxiliary verification information and the public key are legal or not, and the auxiliary verification information and the public key are stored on a blockchain chain after passing verification, and original right data are stored in a right database;
And a query module: the method comprises the steps that a client sends a position in a right database to be queried to a right center, the right center returns right information in the database to the client, and a certificate is generated according to the returned right information and a public key;
The right verification module: the method comprises the steps that after right information and corresponding proving information returned by a right center are received by a client, returned right data are verified according to latest right verification information in a blockchain and proving calculated by the right center;
the stage module is uploaded to the claim works: the method comprises the steps that a client uploads a right work to a right center, the right center detects similarity of the right work, after the similarity is detected, the right center stores right information into a right database, and after the right information is successfully stored, auxiliary verification information is uploaded into a blockchain;
the right updating module: the method comprises the steps that a right owner uploads the latest right information to a right center, a client inquires and verifies whether data of a position to be modified in a right database of the right center is complete, auxiliary verification information is generated according to the current latest data after the data is complete through verification and is sent to the right center, the right center verifies whether the auxiliary verification information is legal, information in the right database is modified after the auxiliary verification information is legal through verification, and the auxiliary verification information is uploaded to a blockchain.
The present invention also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of a method of protecting digital resource rights in co-storage of blockchain links up and down as described above.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and operable on the processor, wherein the processor implements the steps of the digital resource rights protection method cooperatively stored under the blockchain upper chain as described above when executing the program.
Compared with the prior art, the invention has the beneficial effects that:
Compared with the traditional method for storing the right data in the right database, the method for storing the right data abstract in the blockchain provides new different designs, and the right data is stored in the database under the blockchain through uploading the right data to the right center and detecting the similarity of the right center, and the metadata of the right data is stored in the blockchain; calculating all right data to obtain auxiliary verification information of the whole right data, and storing the auxiliary verification information on a block chain; when uploading or updating the rights database, updating the auxiliary verification information and uploading the auxiliary verification information to the blockchain chain for storage, so that all rights related data are prevented from being stored in the blockchain, and the storage burden of the blockchain is reduced; moreover, the consistency of the data under the upper chain of the block chain and the integrity of the data under the chain can be ensured; furthermore, only auxiliary verification information in the latest area block is required to be obtained for verifying the right data in each inquiry, and the history area block is not required to be inquired, so that the verification efficiency is effectively improved.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention.
In the drawings:
FIG. 1 is a schematic diagram of an execution flow of uploading, storing, updating, querying, verifying, etc. of entitlement information according to an embodiment of the present invention;
FIG. 2 is a block diagram of a blockchain in accordance with an embodiment of the present invention;
FIG. 3 is a flow chart of a method for protecting digital resource rights in collaborative storage under a blockchain upper link of the present invention;
Fig. 4 is a schematic diagram of a computer device according to an embodiment of the invention.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of systems and products consistent with some aspects of the present disclosure as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in this disclosure to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination" depending on the context.
Embodiments of the present invention are described in further detail below.
The embodiment of the invention provides a digital resource right protection method for collaborative storage under a block chain, which is shown in fig. 3 and comprises the following steps:
S1, before a client side uploads a right work to a right authentication center server for the first time, generating a security parameter k, and generating a public-private key pair according to interaction of the security parameter k and the right authentication center, wherein the public key is sent to a verifier for verifying queried right data evidence, and the private key is used for updating a right database, and comprises the following processing procedures:
Generating a security parameter k by a client, and multiplying a cyclic group according to two prime orders p Constructing a bilinear mapping function pair e: /(I)The generator of (2) is g;
Defining three hash functions Random number selection/>
Calculation of
Setting common parameters
Database db= (x, v x) is set, where 1.ltoreq.x.ltoreq.q.
S2, generating auxiliary verification information by the client according to the generated public and private key pair and the original right data to be submitted, and sending the auxiliary verification information to a right center; the auxiliary verification information and the public key are verified to be legal by the rights center, the auxiliary verification information and the public key are stored on the blockchain after passing verification, and the original rights data are stored in a rights database, and the method comprises the following processing procedures:
encrypting, by the client, the original rights data (v 1,v2,...,vq):
Setting (Y, Y) as public and private key pairs of the client sides, and meeting the requirements of
Computing signaturesWherein T represents an update counter, and t=0 is initially set;
Setting a public key pk= (PP, Y), s= (PP, aux, DB), sk=y, aux= (H 0,Cc,CR, T);
after the rights issuer receives the public key PK and the auxiliary authentication information aux, calculate Verifying whether the rights data are legal, storing aux as rights verification information on a blockchain chain after the rights verification is passed, and storing the original rights data in a rights database.
Referring to FIG. 2, a block structure diagram of the blockchain of the present embodiment is shown.
S3, the client sends the position in the right database to be queried to the right center, the right center returns the right information in the database to the client, and generates a certificate according to the returned right information and the public key, and the method comprises the following processing steps:
The client sends the position x to be queried to the rights center, the rights center queries the data of the corresponding position in the rights database after receiving the request of the client, calculates the data of the corresponding position And returns proof σ= (v xx,H0) to the client.
S4, after the client receives the right information and the corresponding proving information returned by the right center, the returned right data is verified according to the latest right verification information in the blockchain and the proving calculated by the right center, and the method comprises the following processing steps:
after the client receives the rights data and the corresponding attestation information from the rights issuer, it calculates And/>Wherein C c,CR is a promise value; verifying whether the right data is legal; if the verification is legal, the right data can be used; if the verification is illegal, the rights data may not be used.
S5, uploading the right works to a right center by a client, detecting the similarity of the right works by the right center, storing right information into a right database by the right center after the similarity is detected, and uploading auxiliary verification information into a blockchain after the right information is successfully stored, wherein the method comprises the following processing procedures:
The client sets the counter to T 't+1, and calculates new auxiliary information aux according to the uploaded right data v' x And/>Sending (t' x,v′x) to the rights issuer;
The rights management center detects the similarity of the rights works, and verifies the signatures t' x,e((C′c,C′R,T),Y)=e(t′x and g according to the public key PK after the rights works pass the detection; if the signature T 'x is legal, modifying the data DB (x) = (v x,v′x) in the rights database by the rights issuer, and simultaneously updating the rights verification information aux= (T' x,C′c,C′R, T) and storing on the blockchain; if the signature t' x is not legal, the data in the rights database is not modified and the rights verification information is not updated.
S6, uploading the latest right information to a right center by a right owner, inquiring and verifying whether the data of the position to be modified in a right database of the right center is complete by a client, generating auxiliary verification information according to the current latest data after the data is complete by verification, sending the auxiliary verification information to the right center, verifying whether the auxiliary verification information is legal by the right center, modifying the information in the right database after the auxiliary verification information is legal by verification, and uploading the auxiliary verification information to a blockchain chain, wherein the method comprises the following processing steps of:
To update the rights issuer, it is first ensured that the data stored in the current rights database is complete; thus, the client queries the data stored in the position x to be modified in the rights database and verifies the complete similarity with the uploaded rights information, sets the counter to T+.T+1 at the client, calculates And/>Sending (t' x,v′x) to the rights issuer; wherein t' x is a signature generated after the client updates the data on the subscript x;
Verifying the signature t' x,e((Cc,C′R,T),Y)=e(t′x, g) by the rights issuer from the public key; if the signature t' x is legal, the rights issuer modifies the data DB (x) = (v x,v′x) in the rights database; meanwhile, the rights issuer updates the rights verification information aux= (T' x,Cc,C′R, T) and stores it onto the blockchain chain.
The meaning of the parameters in each calculation expression is shown in table 1.
Referring to fig. 1, the flow of uploading, storing, updating, querying, verifying and the like of the rights product data information in the present embodiment is shown.
The embodiment of the invention also provides a digital resource right protection system for the cooperative storage of the upper chain and the lower chain of the block chain, which executes the digital resource right protection method for the cooperative storage of the upper chain and the lower chain of the block chain, and comprises the following steps:
An initialization module: before the client side uploads the right works to the right authentication center server for the first time, generating a security parameter k, and generating a public-private key pair by interaction with the right authentication center according to the security parameter k, wherein the public key is sent to a verifier for verifying the queried right data evidence, and the private key is used for updating a right database;
And (3) a setting module: the client generates auxiliary verification information according to the generated public and private key pair and the original right data to be submitted, and sends the auxiliary verification information to the right center; the right center verifies whether the auxiliary verification information and the public key are legal or not, and the auxiliary verification information and the public key are stored on a blockchain chain after passing verification, and original right data are stored in a right database;
And a query module: the method comprises the steps that a client sends a position in a right database to be queried to a right center, the right center returns right information in the database to the client, and a certificate is generated according to the returned right information and a public key;
The right verification module: the method comprises the steps that after right information and corresponding proving information returned by a right center are received by a client, returned right data are verified according to latest right verification information in a blockchain and proving calculated by the right center;
the stage module is uploaded to the claim works: the method comprises the steps that a client uploads a right work to a right center, the right center detects similarity of the right work, after the similarity is detected, the right center stores right information into a right database, and after the right information is successfully stored, auxiliary verification information is uploaded into a blockchain;
the right updating module: the method comprises the steps that a right owner uploads the latest right information to a right center, a client inquires and verifies whether data of a position to be modified in a right database of the right center is complete, auxiliary verification information is generated according to the current latest data after the data is complete through verification and is sent to the right center, the right center verifies whether the auxiliary verification information is legal, information in the right database is modified after the auxiliary verification information is legal through verification, and the auxiliary verification information is uploaded to a blockchain.
The embodiment of the invention also provides a computer device, and fig. 4 is a schematic structural diagram of the computer device provided by the embodiment of the invention; referring to fig. 4 of the drawings, the computer apparatus includes: an input system 23, an output system 24, a memory 22, and a processor 21; the memory 22 is configured to store one or more programs; when the one or more programs are executed by the one or more processors 21, the one or more processors 21 are caused to implement a blockchain link up-link and down-link co-stored digital resource rights protection method as provided by the above embodiments; wherein the input system 23, the output system 24, the memory 22 and the processor 21 may be connected by a bus or otherwise, for example in fig. 4.
The memory 22 is used as a readable storage medium of a computing device and can be used for storing software programs and computer executable programs, and the program instructions corresponding to the digital resource right protection method cooperatively stored in the upper chain and the lower chain of the blockchain according to the embodiment of the invention; the memory 22 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, at least one application program required for functions; the storage data area may store data created according to the use of the device, etc.; in addition, memory 22 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device; in some examples, memory 22 may further comprise memory located remotely from processor 21, which may be connected to the device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input system 23 is operable to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the device; output system 24 may include a display device such as a display screen.
The processor 21 executes various functional applications of the device and data processing by running software programs, instructions and modules stored in the memory 22, i.e., implementing the above-described digital resource rights protection method for co-storage of blockchain links up and down.
The computer equipment provided by the embodiment can be used for executing the digital resource right protection method for the collaborative storage of the upper chain and the lower chain of the block chain, and has corresponding functions and beneficial effects.
Embodiments of the present invention also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are for performing a method of digital resource rights protection for blockchain up-and-down collaborative storage as provided by the above embodiments, the storage medium being any of various types of memory devices or storage devices, the storage medium comprising: mounting media such as CD-ROM, floppy disk or tape systems; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, lanbas (Rambus) RAM, etc.; nonvolatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc.; the storage medium may also include other types of memory or combinations thereof; in addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a second, different computer system, the second computer system being connected to the first computer system through a network (such as the internet); the second computer system may provide program instructions to the first computer for execution. Storage media includes two or more storage media that may reside in different locations (e.g., in different computer systems connected by a network). The storage medium may store program instructions (e.g., embodied as a computer program) executable by one or more processors.
Of course, the storage medium containing the computer executable instructions provided in the embodiments of the present invention is not limited to the method for protecting digital resource rights in the co-storage of the blockchain upper chain and the lower chain described in the above embodiments, and may also perform the related operations in the method for protecting digital resource rights in the co-storage of the blockchain upper chain and the lower chain provided in any embodiment of the present invention.
Thus far, the technical solution of the present invention has been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of protection of the present invention is not limited to these specific embodiments. Equivalent modifications and substitutions for related technical features may be made by those skilled in the art without departing from the principles of the present invention, and such modifications and substitutions will be within the scope of the present invention.
The foregoing description is only of the preferred embodiments of the invention and is not intended to limit the invention; various modifications and variations of the present invention will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The digital resource right protection method for the cooperative storage of the upper chain and the lower chain of the block chain is characterized by comprising the following steps:
S1, before a client side uploads a right work to a right authentication center server for the first time, generating a security parameter k, and generating a public-private key pair by interaction with the right authentication center according to the security parameter k, wherein the public key is sent to a verifier for verifying queried right data evidence, and the private key is used for updating a right database;
S2, generating auxiliary verification information by the client according to the generated public and private key pair and the original right data to be submitted, and sending the auxiliary verification information to a right center; the right center verifies whether the auxiliary verification information and the public key are legal or not, and the auxiliary verification information and the public key are stored on a blockchain chain after passing verification, and original right data are stored in a right database;
s3, the client sends the position in the right database to be queried to the right center, and the right center returns the right information in the database to the client and generates a certificate according to the returned right information and the public key;
s4, after the client receives the right information and the corresponding proving information returned by the right center, verifying the returned right data according to the latest right verification information in the blockchain and the proving calculated by the right center;
S5, uploading the right works to a right center by the client, detecting the similarity of the right works by the right center, storing right information into a right database by the right center after the similarity is detected, and uploading auxiliary verification information into a blockchain after the right information is successfully stored;
S6, uploading the latest right information to a right center by a right owner, inquiring and verifying whether the data of the position to be modified in a right database of the right center is complete by a client, generating auxiliary verification information according to the current latest data after the data is complete by verification, sending the auxiliary verification information to the right center, verifying whether the auxiliary verification information is legal by the right center, modifying the information in the right database after the auxiliary verification information is legal by verification, and uploading the auxiliary verification information to a blockchain.
2. The method of claim 1, wherein the operation of step S1 comprises the following steps:
Generating a security parameter k by a client, and multiplying a cyclic group according to two prime orders p Constructing a bilinear mapping function pair e: /(I) The generator of (2) is g;
Three hash functions f are defined: Random number selection/>
Calculation of1≤i,j≤q,i≠j;
Setting common parameters
Database db= (x, v x) is set, where 1.ltoreq.x.ltoreq.q.
3. The method of claim 1, wherein the operation of step S2 comprises the following steps:
encrypting, by the client, the original rights data (v 1,v2,...,vq):
Setting (Y, Y) as public and private key pairs of the client sides, and meeting the requirements of
Computing signaturesWherein T represents an update counter, and t=0 is initially set;
Setting a public key pk= (PP, Y), s= (PP, aux, DB), sk=y, aux= (H 0,Cc,CR, T);
after the rights issuer receives the public key PK and the auxiliary authentication information aux, calculate Verifying whether the rights data are legal, storing aux as rights verification information on a blockchain chain after the rights verification is passed, and storing the original rights data in a rights database.
4. The method for protecting digital resource rights cooperatively stored under a blockchain uplink as in claim 1, wherein the query operation of step S3 comprises the following processing steps:
The client sends the position x to be queried to the rights center, the rights center queries the data of the corresponding position in the rights database after receiving the request of the client, calculates the data of the corresponding position And returns proof σ= (v xx,H0) to the client; wherein v x is the message on subscript x; pi x is a proof of the value on subscript x.
5. The method of claim 1, wherein the step S4 of verifying comprises the steps of:
after the client receives the rights data and the corresponding attestation information from the rights issuer, it calculates And/>Wherein C c,CR is a promise value; verifying whether the right data is legal; if the verification is legal, the right data can be used; if the verification is illegal, the rights data may not be used.
6. The method of claim 1, wherein the operation of step S5 comprises the following steps:
The client sets the counter to T 't+1, and calculates new auxiliary information aux according to the uploaded right data v' x And/>Sending (t' x,v′x) to the rights issuer; wherein t' x is a signature generated after the client updates the data on the subscript x;
The rights management center detects the similarity of the rights works, and verifies the signatures t' x,e((C′c,C′R,T),Y)=e(t′x and g according to the public key PK after the rights works pass the detection; if the signature T 'x is legal, modifying the data DB (x) = (v x,v′x) in the rights database by the rights issuer, and simultaneously updating the rights verification information aux= (T' x,C′c,C′R, T) and storing on the blockchain; if the signature t' x is not legal, the data in the rights database is not modified and the rights verification information is not updated.
7. The method of claim 1, wherein the operation of step S6 comprises the following steps:
The data stored in the right database at the location x to be modified is queried by the client, and verifying the complete similarity with the uploaded rights information, setting a counter to T+.T+1 at the client, and calculating AndSending (t' x,v′x) to the rights issuer;
Verifying the signature t' x,e((Cc,C′R,T),Y)=e(t′x, g) by the rights issuer from the public key; if the signature t' x is legal, the rights issuer modifies the data DB (x) = (v x,v′x) in the rights database; meanwhile, the rights issuer updates the rights verification information aux= (T' x,Cc,C′R, T) and stores it onto the blockchain chain.
8. A blockchain up-and-down co-stored digital resource rights protection system performing the blockchain up-and-down co-stored digital resource rights protection method of any of claims 1-7, comprising:
An initialization module: before the client side uploads the right works to the right authentication center server for the first time, generating a security parameter k, and generating a public-private key pair by interaction with the right authentication center according to the security parameter k, wherein the public key is sent to a verifier for verifying the queried right data evidence, and the private key is used for updating a right database;
And (3) a setting module: the client generates auxiliary verification information according to the generated public and private key pair and the original right data to be submitted, and sends the auxiliary verification information to the right center; the right center verifies whether the auxiliary verification information and the public key are legal or not, and the auxiliary verification information and the public key are stored on a blockchain chain after passing verification, and original right data are stored in a right database;
And a query module: the method comprises the steps that a client sends a position in a right database to be queried to a right center, the right center returns right information in the database to the client, and a certificate is generated according to the returned right information and a public key;
The right verification module: the method comprises the steps that after right information and corresponding proving information returned by a right center are received by a client, returned right data are verified according to latest right verification information in a blockchain and proving calculated by the right center;
the stage module is uploaded to the claim works: the method comprises the steps that a client uploads a right work to a right center, the right center detects similarity of the right work, after the similarity is detected, the right center stores right information into a right database, and after the right information is successfully stored, auxiliary verification information is uploaded into a blockchain;
the right updating module: the method comprises the steps that a right owner uploads the latest right information to a right center, a client inquires and verifies whether data of a position to be modified in a right database of the right center is complete, auxiliary verification information is generated according to the current latest data after the data is complete through verification and is sent to the right center, the right center verifies whether the auxiliary verification information is legal, information in the right database is modified after the auxiliary verification information is legal through verification, and the auxiliary verification information is uploaded to a blockchain.
9. A computer readable storage medium having stored thereon a computer program, wherein the program when executed by a processor performs the steps of the digital resource rights protection method cooperatively stored under the blockchain upper chain of any of claims 1-7.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor, when executing the program, performs the steps of the digital resource rights protection method of co-stored under and over a blockchain as claimed in any of claims 1 to 7.
CN202311702901.0A 2023-12-12 2023-12-12 Digital resource right protection method and system for collaborative storage of upper chain and lower chain of block chain Active CN117992932B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311702901.0A CN117992932B (en) 2023-12-12 2023-12-12 Digital resource right protection method and system for collaborative storage of upper chain and lower chain of block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311702901.0A CN117992932B (en) 2023-12-12 2023-12-12 Digital resource right protection method and system for collaborative storage of upper chain and lower chain of block chain

Publications (2)

Publication Number Publication Date
CN117992932A true CN117992932A (en) 2024-05-07
CN117992932B CN117992932B (en) 2024-07-05

Family

ID=90898256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311702901.0A Active CN117992932B (en) 2023-12-12 2023-12-12 Digital resource right protection method and system for collaborative storage of upper chain and lower chain of block chain

Country Status (1)

Country Link
CN (1) CN117992932B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021010766A1 (en) * 2019-07-18 2021-01-21 삼성전자 주식회사 Electronic authentication device and method using blockchain
US20210049600A1 (en) * 2018-05-18 2021-02-18 Qredo Ltd. Digital Asset Delivery Network
CN112765650A (en) * 2021-01-05 2021-05-07 西安电子科技大学 Attribute-based searchable encryption block chain medical data sharing method
US20210255993A1 (en) * 2020-02-19 2021-08-19 Tata Consultancy Services Limited System and method for blockchain based decentralized storage with dynamic data operations
US20220191005A1 (en) * 2020-12-14 2022-06-16 Brandon E. D'Amore Stranded blockchain
US20230043852A1 (en) * 2021-07-13 2023-02-09 Zhengzhou University Of Light Industry Blockchain-based privacy protection method for content centric network (ccn)
US20230188337A1 (en) * 2021-12-14 2023-06-15 Micron Technology, Inc. Combined Cryptographic Key Management Services for Access Control and Proof of Space
CN116562874A (en) * 2023-04-27 2023-08-08 北京交通大学 Privacy protection cross-chain transaction verification method based on zero knowledge proof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210049600A1 (en) * 2018-05-18 2021-02-18 Qredo Ltd. Digital Asset Delivery Network
WO2021010766A1 (en) * 2019-07-18 2021-01-21 삼성전자 주식회사 Electronic authentication device and method using blockchain
US20210255993A1 (en) * 2020-02-19 2021-08-19 Tata Consultancy Services Limited System and method for blockchain based decentralized storage with dynamic data operations
US20220191005A1 (en) * 2020-12-14 2022-06-16 Brandon E. D'Amore Stranded blockchain
CN112765650A (en) * 2021-01-05 2021-05-07 西安电子科技大学 Attribute-based searchable encryption block chain medical data sharing method
US20230043852A1 (en) * 2021-07-13 2023-02-09 Zhengzhou University Of Light Industry Blockchain-based privacy protection method for content centric network (ccn)
US20230188337A1 (en) * 2021-12-14 2023-06-15 Micron Technology, Inc. Combined Cryptographic Key Management Services for Access Control and Proof of Space
CN116562874A (en) * 2023-04-27 2023-08-08 北京交通大学 Privacy protection cross-chain transaction verification method based on zero knowledge proof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
朱彧;陈越;严新成;王晓晶;: "一种带权单链表多分支树云数据完整性验证方案", 小型微型计算机系统, no. 03, 15 March 2020 (2020-03-15) *
苗田田;杨惠杰;沈剑;: "电子医疗环境中支持用户隐私保护的访问控制方案", 网络空间安全, no. 10, 25 October 2019 (2019-10-25) *

Also Published As

Publication number Publication date
CN117992932B (en) 2024-07-05

Similar Documents

Publication Publication Date Title
EP3824403B1 (en) Method, apparatus, and electronic device for blockchain-based recordkeeping
KR102332031B1 (en) Systems and Methods for Implementing Blockchain-Based Digital Certificates
Yan et al. A novel efficient remote data possession checking protocol in cloud storage
Li et al. FADB: A fine-grained access control scheme for VANET data based on blockchain
KR102404284B1 (en) Systems and methods for creating digital marks
US11526616B1 (en) Method to verify the execution integrity of an application in a target device
JP4896537B2 (en) Method and system for asymmetric key security
WO2018032377A1 (en) Read-only security file storage system for block chain, and method thereof
CN110569668A (en) data encryption storage method, device, equipment and medium based on block chain
CN111164594A (en) System and method for mapping decentralized identity to real entity
CN110785760A (en) Method and system for registering digital documents
CN114691669A (en) Electronic certificate storage method and device, electronic equipment and storage medium
JP2023530594A (en) Permitted Event Processing in Distributed Databases
CN116910739A (en) Device data access control method, system, device and medium based on block chain
CN116975936B (en) Finance qualification proving method and finance qualification verifying method
Gan et al. Enabling online/offline remote data auditing for secure cloud storage
CN117992932B (en) Digital resource right protection method and system for collaborative storage of upper chain and lower chain of block chain
WO2022205961A1 (en) Method and apparatus for updating blockchain domain name configuration
JP2023087665A (en) System, method and computer program product (multi-issuer anonymous credentials for permissioned blockchains)
CN112052292B (en) Network content certification method, device, equipment and storage medium
CN111275406B (en) Blockchain transaction contract auditing method, device, computer equipment and storage medium
CN112950209A (en) Nuclear power experience feedback information management method and system based on block chain
Li et al. Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts
CN117574408B (en) Production data management method and device based on block chain and electronic equipment
US12051061B2 (en) Method for operating a distributed database system, distributed database system, and industrial automation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant