NL2029246B1 - Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium - Google Patents

Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium Download PDF

Info

Publication number
NL2029246B1
NL2029246B1 NL2029246A NL2029246A NL2029246B1 NL 2029246 B1 NL2029246 B1 NL 2029246B1 NL 2029246 A NL2029246 A NL 2029246A NL 2029246 A NL2029246 A NL 2029246A NL 2029246 B1 NL2029246 B1 NL 2029246B1
Authority
NL
Netherlands
Prior art keywords
nft
encrypted
digital product
instruction
authorization
Prior art date
Application number
NL2029246A
Other languages
Dutch (nl)
Inventor
Cao Feng
Original Assignee
Shenzhen Hande Finmaker Co Ltd
Shenzhen Blockchain Financial Services Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hande Finmaker Co Ltd, Shenzhen Blockchain Financial Services Co Ltd filed Critical Shenzhen Hande Finmaker Co Ltd
Priority to NL2029246A priority Critical patent/NL2029246B1/en
Application granted granted Critical
Publication of NL2029246B1 publication Critical patent/NL2029246B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]

Abstract

Disclosed are a method, and a system of generating, distribute, transferring and authorizing a digital product, and a storage medium. The method of generating a digital product includes: receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information, receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain. According to the present disclosure, the digital product is encrypted in the form of NFT, improving copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be eXpanded in scale under copyright protection.

Description

I METHOD, SYSTEM OF GENERATING, DISTRIBUTING, TRANSFERRING, AND AUTHORIZING DIGITAL PRODUCT, AND STORAGE MEDIUM TECHNICAL FIELD
[0001] The present disclosure relates to a technical field of digital product, in particular to a method, and a system of generating, distributing, transferring and authorizing a digital product, and a storage medium.
BACKGROUND
[0002] With a boom of emerging technologies including Internet, big data, artificial intelligence and block chain, the online digital product industries are rapidly developing such as e-books, videos, audio, pictures and security documents. Their online transaction has been soaring year by year. The traditional digital products are restricted in regards to copyright protection, as they are vulnerable to copy, or tamper with. And origins are difficult to trace.
[0003] The current protection for digital products is DRM (Digital Rights Management) technology. DRM protects digital contents by algorithms, and the digital contents may include: eBook, video, audio, pictures and security documents. Although, the DRM technology can definitely provide sufficient security for the copyright of digital media, it requires the combination of the user's decryption key with local computer hardware. Obviously, the user can only get the ordered service on a specific computer in a specific place, which is an obvious shortcoming for this method.
[0004] Block chain technology, as a new decentralized protocol, can safely store digital currency transactions or other data, and the information cannot be forged or tampered with. The transaction confirmation in the block chain is completed by all nodes of the block chain, and its consistency is guaranteed by consensus algorithm. The block chain maintains a public account book, which is visible for any node in the storage block, thus ensuring its security from being forged or tempered with. Rooting from the development of block chain technology, many digital product protection technologies have been derived.
[0005] In which, copyright protection derived from block chain technology is mainly categorized into traceability protection and Non-Fungible Token (NFT). Traceability protection is to protect digital product by using block chain's traceability and tamperability. Non-fungible token generates an NFT from a digital product, and protects it as a unique identity, which protects the distribution of the digital product to a certain extent and improves the efficiency of the distribution. However, because of their openness and transparency, digital products can be easily copied, and copyrights are vulnerable.
SUMMARY
[0006] The present disclosure is to provide a method, a system of generating, distributing, transferring and authorizing digital product, and a storage medium, which aims to validly protect the copyright of a digital product and improves the copyright security of a digital product.
[0007] To achieve such purpose, an embodiment of the present disclosure provides a method of generating a digital product, which includes the following operations:
[0008] receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information;
[0009] receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain.
[0010] Optionally, the registration information includes: an ownership wallet address of a registered user, and a pair of public key and private key of the registered user, and the operations of “receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain”, includes:
[0011] receiving the calling instruction based on the registration information, and calling the generation service of the encrypted NFT in the block chain according to the calling instruction to generate a pair of data public key and data private key;
[0012] uploading the original file of the digital product, encrypting the uploaded original file of the digital product through the data public key, where encrypted data is used as NFT metadata, and writing the data private key into the block chain with the encrypted data as a key, and obtaining the NFT code, where the NFT code is the address of the digital product created based on the block chain.
[0013] In addition, an embodiment of the present disclosure also provides a method of distributing a digital product, which includes the following operations:
[0014] receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens;
[0015] distributing the equity tokens as an distributing asset of an encrypted NFT.
[0016] In addition, an embodiment of the present disclosure also provides a method of transferring a digital product, which includes the following operations:
[0017] receiving a transfer instruction for a digital product, where a transfer of the digital product includes: a transfer of an encrypted NFT and/or a transfer of equity tokens of the encrypted NFT;
[0018] transferring the encrypted NFT and/or transferring the equity token of the encrypted NFT according to the transfer instruction.
[0019] Optionally, the transfer of digital product includes: the transfer of encrypted NFT;
[0020] the operation of “receiving a transfer instruction for a digital product”, includes:
[0021] receiving a payment instruction by a purchasing user for the encrypted NFT;
[0022] triggering a transfer instruction to the encrypted NFT, after the payment instruction is successfully operated, and
[0023] the operation of “transferring the encrypted NFT according to the transfer instruction”, includes:
[0024] replacing the ownership wallet address of the encrypted NFT with a wallet address of the purchasing user;
[0025] receiving a calling instruction from the purchasing user, calling and executing a modification service of the encrypted NFT key according to the calling instruction, and generating a pair of new data public key and new data private key;
[0026] encrypting the original file of the digital product which 1s uploaded by the purchasing user through the new data public key, and taking encrypted data as NFT metadata, and writing the new data private key into the block chain with the encrypted data as a key.
[0027] Optionally, the transfer of the digital product includes the transfer of the equity tokens of the encrypted NFT, and
[0028] the operation of “receiving a transfer instruction for a digital product”, includes:
[0029] receiving a transfer instruction for the equity tokens of the encrypted NFT;
[0030] the operation of “transferring the equity token of the encrypted NFT according to the transfer instruction”, includes:
[0031] determining whether a current account related to an equity change holds more than 50% of equity tokens;
[0032] in response that the current account related to the equity change holds more than 50% of the equity tokens, calling an ownership change service of the encrypted NFT, and determining whether the current account related to the equity change validly holds more than 50% of the equity tokens;
[0033] in response that the current account related to the equity change validly holds more than 50% of the equity tokens, changing an ownership to the current account related to the equity change; otherwise, failing of the equity change.
[0034] In addition, an embodiment of the present disclosure also provides a method of authorizing a digital product, which includes the following operations:
[0035] in response to an authorization instruction related to a digital product, determining an authorization mode corresponding to the authorization instruction;
[0036] calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of the encrypted NFT, and authorizing the digital product.
[0037] Optionally, the operation of “in response to an authorization instruction related to a digital product, determining an authorization mode corresponding to the authorization instruction”, includes:
[0038] in response to the authorization instruction, determining that the authorization mode corresponding to the authorization instruction is an active authorization, where the authorization instruction is triggered by an owner of the digital product calling the authorization service of the encrypted NFT, or, in response to the authorization instruction, determining that the authorization mode corresponding to the authorization instruction is an application authorization,
where the authorization instruction is triggered by an applicant of the digital product calling the authorization service of the encrypted NFT;
[0039] the operation of “calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of 5 the encrypted NFT, and authorizing the digital product”, includes:
[0040] in response that the authorization mode is the active authorization, uploading a list to be authorized and writing the list to be authorized into the block chain according to the authorization instruction;
[0041] adding the list to be authorized to an authorization list of the encrypted NFT, after a transaction is confirmed, where the list to be authorized is a wallet address list in the block chain;
[0042] calling a key request service of the encrypted NFT based on a wallet address in the authorization list of the encrypted NFT, and obtaining a data private key of the encrypted NFT;
[0043] in response that the authorization mode is the application authorization, uploading an encrypted NFT address and an applicant address according to the authorization instruction, paying an application fee, and writing the encrypted NFT address and the applicant address into the block chain;
[0044] receiving the calling instruction related to the digital product, inquiring and examining an application list, and writing a result into the block chain, where the calling instruction is triggered by the owner of the digital product calling an authorization and approval service of the encrypted NFT, and the result includes whether the examining of the application list is passed,
[0045] adding an applicant address into the authorization list of the encrypted NFT, after the transaction is confirmed;
[0046] receiving an calling instruction from the applicant calling a key request service of the encrypted NFT, and obtaining the data private key of the encrypted NFT.
[0047] An embodiments of the present disclosure further provides a processing system for a digital product, which includes a memory, a processor and a computer program stored on the memory and executable on the processor. The computer program, when executed by the processor, implements a method of generating a digital product as described above, or implements a method of distributing the digital product as described above, or implements a method of transferring the digital product as described above, or implements a method of authorizing the digital product as described above.
[0048] An embodiments of the present disclosure further provides a computer-readable storage medium. The computer-readable storage medium stores a computer program, and when computer program is executed by a processor, implements a method of generating a digital product as described above, or implements a method of distributing the digital product as described above, or implements a method of transferring the digital product as described above, or implements a method of authorizing the digital product as described above.
[0049] According to technical solution provided by the embodiment of the present disclosure regarding the method, and system of generating, distributing, transferring and authorizing the digital product, and the storage medium, an instruction for registration is received, and a wallet service in a block chain is called to register a wallet account according to the instruction for registration, and registration information is obtained. A calling instruction based on the registration information is received, and a generation service of an encrypted NFT in the block chain is called according to the calling instruction, an original file of the digital product is uploaded, and a NFT code is obtained. Where the NFT code is an address of the digital product created based on the block chain. In addition, by operations receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens; and distributing the equity tokens as an distributing asset of an encrypted NFT, the NFT is encrypted, equity tokens of the encrypted NFT can be transferred and authorized. Compared with the related art, the present disclosure provides a method of generating, distributing, transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. By distributing NFT and distributing equity token of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
BRIEF DESCRIPTION OF THE DRAWINGS
[0050] Fig. | is a schematic diagram showing functional modules of a digital product processing system according to an embodiment of the present disclosure;
[0051] Fig. 2 is a flow diagram showing a method of generating a digital product according to an exemplary embodiment of the present disclosure;
[0052] Fig. 3 is a detailed flow diagram of the method of generating the digital product according to the embodiment of the present disclosure;
[0053] Fig. 4 is a flow diagram showing a method of distributing a digital product according to an exemplary embodiment of the present disclosure;
[0054] Fig. 5 is a flow diagram of a method of distributing a digital product according to another embodiment of the present disclosure;
[0055] Fig. 6 is a flow diagram showing a method of transferring a digital product according to an exemplary embodiment of the present disclosure;
[0056] Fig. 7 is a flow diagram showing a method of authorizing a digital product according to an exemplary embodiment of the present disclosure;
[0057] Fig. 8 is a schematic diagram showing core service modules of a block chain according to an embodiment of the present disclosure.
[0058] The implementation, functional features and advantages of the present disclosure will be further described with reference to the accompanying drawings with the embodiments.
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0059] It should be understood that the specific embodiments described herein are only for the purpose of explaining the present disclosure and are not intended to limit the present disclosure.
[0060] The solution of the embodiment of the present disclosure is: receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information; receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code. Where the NFT code is an address of the digital product created based on the block chain. In addition, by operations receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens; and distributing the equity tokens as an distributing asset of an encrypted NFT, the NFT is encrypted, equity tokens of the encrypted NFT can be transferred and authorized. Compared with the related art, the present disclosure provides a method of generating, distributing, transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. By distributing NFT and distributing equity token of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[0061] Technical terms related to the embodiments of the present disclosure:
[0062] DRM is a technology that protects digital contents by algorithms, and the digital contents may include: eBook, video, audio, pictures and security documents.
[0063] Block chain technology, as a new decentralized protocol, can safely store digital currency transactions or other data, and the information cannot be forged or tampered with. The transaction confirmation in the block chain is completed by all nodes of the block chain, and its consistency is guaranteed by consensus algorithm. The block chain maintains a public account book, which is visible for any node in the storage block, thus ensuring its security from being forged or tempered with.
[0064] Core services of the block chain involves a wallet generation service, a generation service of the encrypted NFT, a data public and private key generation service, an authorization service of the encrypted NFT, an application authorization service of the encrypted NFT, an authorization approval service of the encrypted NFT and a key request service of the encrypted NFT, as shown in Fig. 8.
[0065] It has been considered that in the existing related solutions, the protection are mainly
DRM and block chain technologies, where DRM requires the combination of the user's decryption key with local computer hardware. Obviously, the user can only get the ordered service on a specific computer in a specific place, which is an obvious shortcoming for this method. Non-fungible token generates an NFT from a digital product, and protect it as a unique identity, which protects the distribution of the digital product to a certain extent and improves the efficiency of the distribution. However, due to their openness and transparency, digital product are easily copied, and copyrights are difficult to effectively be protected.
[0066] Therefore, the solution proposed by the embodiment of the present disclosure provides encrypts and protects the digital product in the form of encrypted NFT. By distributing NFT and distributing equity token of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorization of digital product, the circulation of the digital product in the entire industry circle is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[0067] Specifically, refer to Fig. 1, which is a schematic diagram showing functional modules of a digital product processing system according to an embodiment of the present disclosure. The digital product processing system can be a device independent of terminal device and capable of generating, distributing, transferring and authorizing a digital product, and can be carried on the terminal device in the form of hardware or software. The terminal device can be a network device that combines block chain technology to realize the generation, distribution, transfer and authorization of a digital product.
[0068] In the present embodiment, the digital product processing system at least includes an output module 110, a processor 120, a memory 130 and a communication module 140.
[0069] The memory 130 stores an operating system and a digital product processing program. The output module 110 may be a display screen, a speaker, etc. The communication module 140 may include a WIFI module, a mobile communication module, a Bluetooth module, etc., and the system communicates with external devices or servers through the communication module 140.
[0070] As an embodiment, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are implemented:
[0071] receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information;
[0072] receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain.
[0073] Further, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are also implemented:
[0074] receiving the calling instruction based on the registration information, and calling the generation service of the encrypted NFT in the block chain according to the calling instruction to generate a pair of data public key and data private key;
[0075] uploading the original file of the digital product, encrypting the uploaded original file of the digital product through the data public key to create encrypted data, where the encrypted data is used as NFT metadata, and writing the data private key into the block chain with the encrypted data as a key, and obtaining the NFT code, where the NFT code is the address of the digital product created based on the block chain.
[0076] Further, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are also implemented:
[0077] receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens;
[0078] distributing the equity tokens as an distributing asset of an encrypted NFT.
[0079] Further, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are also implemented:
[0080] receiving a transfer instruction for a digital product, where a transfer of the digital product includes: a transfer of an encrypted NFT and/or a transfer of equity tokens of the encrypted NFT;
i
[0081] transferring the encrypted NFT and/or transferring the equity token of the encrypted NFT according to the transfer instruction.
[0082] Further, when the processing program related to the digital product in the memory 130 1s executed by the processor, the following operations are also implemented:
[0083] receiving a payment instruction by a purchasing user for the encrypted NFT;
[0084] triggering a transfer instruction to the encrypted NFT, after the payment instruction is successfully operated; and
[0085] replacing the ownership wallet address of the encrypted NFT with a wallet address of the purchasing user;
[0086] receiving a calling instruction from the purchasing user, calling and executing a modification service of the encrypted NFT key according to the calling instruction, and generating a pair of new data public key and new data private key;
[0087] encrypting the original file of the digital product which is uploaded by the purchasing user through the new data public key to create encrypted data, and taking the encrypted data as NFT metadata, and writing the new data private key into the block chain with the encrypted data as a key.
[0088] Further, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are also implemented:
[0089] receiving a transfer instruction for the equity tokens of the encrypted NFT;
[0090] the operation of “transferring the equity token of the encrypted NFT according to the transfer instruction”, includes:
[0091] determining whether a current account related to an equity change holds more than 50% of equity tokens;
[0092] in response that the current account related to the equity change holds more than 50% of the equity tokens, calling an ownership change service of the encrypted NFT, and determining whether the current account related to the equity change validly holds more than 50% of the equity tokens;
[0093] in response that the current account related to the equity change validly holds more than 50% of the equity tokens, changing an ownership to the current account related to the equity change; otherwise, failing to change the equity.
[0094] Further, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are also implemented:
[0095] in response to an authorization instruction related to a digital product, determining an authorization mode corresponding to the authorization instruction;
[0096] calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of the encrypted NFT, and authorizing the digital product.
[0097] Further, when the processing program related to the digital product in the memory 130 1s executed by the processor, the following operations are also implemented:
[0098] in response to the authorization instruction, determining that the authorization mode corresponding to the authorization instruction is an active authorization, where the authorization instruction is triggered by an owner of the digital product calling the authorization service of the encrypted NFT, or, in response to the authorization instruction, determining that the authorization mode corresponding to the authorization instruction is an application authorization, where the authorization instruction is triggered by an applicant of the digital product calling the authorization service of the encrypted NFT;
[0099] the operation of “calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of the encrypted NFT, and authorizing the digital product”, includes:
[00100] in response that the authorization mode is the active authorization, uploading a list to be authorized and writing the list to be authorized into the block chain according to the authorization instruction;
[00101] adding the list to be authorized to an authorization list of the encrypted NFT, after a transaction is confirmed, where the list to be authorized is a wallet address list in the block chain;
[00102] calling a key request service of the encrypted NFT based on a wallet address in the authorization list of the encrypted NFT, and obtaining a data private key of the encrypted NFT;
[00103] in response that the authorization mode is the application authorization, uploading an encrypted NFT address and an applicant address according to the authorization instruction, paying an application fee, and writing the encrypted NFT address and the applicant address into the block chain;
[00104] receiving the calling instruction related to the digital product, inquiring and examining an application list, and writing a result into the block chain, where the calling instruction is triggered by the owner of the digital product calling an authorization and approval service of the encrypted NFT, and the result includes whether the examining of the application listis passed,
[00105] adding an applicant address into the authorization list of the encrypted NFT, after the transaction is confirmed;
[00106] receiving an calling instruction from the applicant calling a key request service of the encrypted NFT, and obtaining the data private key of the encrypted NFT.
[00107] The solution is implemented by: receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information; receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code. Where the NFT code is an address of the digital product created based on the block chain. In addition, by operations receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens; and distributing the equity tokens as an distributing asset of an encrypted NFT, the NFT is encrypted, equity tokens of the encrypted NFT can be transferred and authorized. Compared with the related art, the present disclosure provides a method of generating, distributing, transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. By distributing NFT and distributing equity token of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00108] Based on but not limited to the above system architecture, an embodiment of the methods are proposed.
[00109] Referring to Fig. 2, which is a flow diagram showing a method of generating a digital product according to an exemplary embodiment of the present disclosure. The method of generating a digital product includes the following operations:
[00110] Operation S101, receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information;
[00111] where the registration information may include a wallet account, an ownership wallet address of a registered user and a pair of public key and private key.
[00112] In practical implementation, users can call a wallet generation service in the block chain to register a wallet account and get an ownership wallet address and a pair of public and private keys.
[00113] Operation S102, receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain.
[00114] In the present embodiment, digital product can be encrypted and protected in the form of encrypted NFT.
[00115] In practical implementation, the user can call the generation service of the encrypted NFT in the block chain, upload the original file of the original digital product, and return an NFT code, which is the digital product address created by the user based on the block chain.
[00116] The generation service of the encrypted NFT will generate a pair of data public and private keys, encrypt the original file of the digital product uploaded by the user with the data public key to create encrypted data, and use the encrypted data as the metadata of NFT. Further, the data private key will be written into the block chain, with the data encrypted by the user's public key as the key.
[00117] The encrypted NFT is a non-fungible token, and the information includes the ownership wallet address, name, symbol, description information, metadata, key, equity token address, authorization list, etc. The modification right of these information is the ownership wallet address.
[00118] The specific implementation solution of generating the digital product in the present embodiment can be shown in Fig. 3.
[00119] The present embodiment is achieved by receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain. Compared with the related art, the embodiment solution of the present disclosure provides a method of generating a digital product with copyright protection, which encrypts and protects the digital product in the form of encrypted NFT. As such, such technical solution improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00120] Referring to Fig. 4, Fig. 4 is a flow diagram showing a method of distributing a digital product according to an exemplary embodiment of the present disclosure. The method of distributing a digital product includes the following operations:
[00121] Operation S201, receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens;
[00122] where the asset distribution parameters include: hash of encrypted NFT, symbol of equity token, total amount of equity tokens, etc.
[00123] Operation S202, distributing the equity tokens as distributing assets of an encrypted NFT.
[00124] Specifically, there are two distribution methods for the encrypted NFT generated by the aforementioned solution:
[00125] in a general scenario, the generated encrypted NFT itself is a kind of issued asset; in a special scenario where the digital product is of high value and inconvenient to transfer its copyright, the digital product distribution can adopt the solution of the present embodiment. The specific process flows can be shown in Fig. 5, and the solution is implemented as follows:
[00126] when a user needs to distributes a special digital product asset having high value or inconvenient for copyright transfer, the user can call the asset distribution service in the block chain, pass in asset distribution parameters, and generate a certain number of equity tokens, where the asset distribution parameters can include hash of the encrypted NFT, equity token symbols, a total amount of equity tokens, etc.
[00127] Therefore, users have a certain number of equity tokens, which are the assets of the distributed encrypted NFT.
[00128] The equity token is the equity representation of the encrypted NFT and represents the equity interest of the encrypted NFT, and the equity token cannot be modified after being distributed.
[00129] In the present embodiment, through the above solution, the asset distribution service in the block chain is specifically called, and the asset distribution parameters are input to generate a predetermined number of equity tokens. And the equity tokens are distributed as assets of the encrypted NFT. Compared with the related art, the embodiment solution of the present disclosure provides a method of distributing a digital product with copyright protection, which encrypts and protects the digital product in the form of encrypted NFT. The distribution of the digital products are more flexible by directly distributing the NFT or distributing the equity tokens of the NFT. As such, such technical solution improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00130] Referring to Fig. 6, Fig. 6 is a flow diagram showing a method of transferring a digital product according to an exemplary embodiment of the present disclosure. The method of transferring a digital product includes the following operations:
[00131] Operation S301, receiving a transfer instruction for a digital product, where a transfer of the digital product includes: a transfer of an encrypted NFT and/or a transfer of equity tokens of the encrypted NFT.
[00132] Operation S302, transferring the encrypted NFT and/or transferring the equity tokens of the encrypted NFT according to the transfer instruction.
[00133] As to the transfer of encrypted NFT, the specific processing operations can be as follows:
[00134] receiving a payment instruction by a purchasing user for the encrypted NFT;
[00135] triggering a transfer instruction to the encrypted NFT, after the payment instruction is successtully operated, and
[00136] replacing the ownership wallet address of the encrypted NFT with a wallet address of the purchasing user;
[00137] receiving a calling instruction from the purchasing user, calling and executing a modification service of the encrypted NFT key according to the calling instruction, and generating a pair of new data public key and new data private key;
[00138] encrypting the original file of the digital product which is uploaded by the purchasing user through the new data public key to create encrypted data, and taking the encrypted data as NFT metadata, and writing the new data private key into the block chain with the encrypted data as a key.
[00139] As such, the encrypted NFT is transferred by the above solution.
[00140] As to the transfer of the equity tokens of the encrypted NFT, the specific processing operations can be as follows:
[00141] receiving a transfer instruction for the equity tokens of the encrypted NFT; determining whether a current account related to an equity change holds more than 50% of the equity tokens based on the transfer instruction; in response that the current account related to the equity change holds more than 50% of the equity tokens, calling an ownership change service of the encrypted NFT, and determining whether the current account related to the equity change validly holds more than 50% of the equity tokens; in response that the current account related to the equity change validly holds more than 50% of the equity tokens, changing an ownership to the current account related to the equity change; otherwise, failing of the equity change.
[00142] As such, the equity tokens of the encrypted NFT is transferred.
[00143] The following is a detailed explanation of the embodiment.
[00144] Specifically, in the present embodiment, the transfer of the digital product includes the transfer of the digital product itself, namely the transfer of the encrypted NFT and the transfer of the equity tokens.
[00145] The transfer of encrypted NFT includes the following operations:
[00146] at first, the purchasing user pays effective funds to purchase the encrypted NFT,
where the effective funds are the price of the encrypted NFT. Afterwards, the ownership wallet address of the encrypted NFT is changed to the wallet address of the purchasing user.
[00147] Then, when the purchasing user executes a key modification service of the encrypted NFT. A pair of new data public and new data private keys will be generated, and the original file of the original digital product uploaded by the purchasing user will be encrypted with the new data public key to create encrypted data. The encrypted data will be used as NFT metadata. The new data private key will afterwards be written into the block chain with the data encrypted by the purchasing user's public key as a new key.
[00148] The caller of the key modification service is only valid for the ownership wallet address of the encrypted NFT.
[00149] The transfer of the equity tokens of the encrypted NFT includes the following operations:
[00150] the general equity token transfer is actually a transfer of the token owner. An equity change account is maintained, and when the equity change account holds more than 50% of the equity tokens, the owner change service of the encrypted NFT is called. And it is judged whether the equity change account holds more than 50% of equity tokens validly, if so, changing the encrypted NFT owner into an equity change account; otherwise, the owner change service fails.
[00151] The present embodiment implements the transfer of the encrypted NFT and the equity tokens of the encrypted NFT. Compared with the related art, the present disclosure provides a method of transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00152] Referring to Fig. 7, Fig. 7 is a flow diagram showing a method of authorizing a digital product according to an exemplary embodiment of the present disclosure. The method of authorizing a digital product includes the following operations:
[00153] Operation S401, in response to an authorization instruction related to a digital product, determining an authorization mode corresponding to the authorization instruction.
[00154] The authorization mode includes: active authorization and application authorization.
[00155] As to the triggering of active authorization, the owner of the digital product can call the authorization service of the encrypted NFT in the block chain to trigger the authorization instruction for the digital product; and as to the triggering of the application authorization, the applicant of the digital product can call the application authorization service of the encrypted NFT to trigger the authorization instruction for the digital product.
[00156] In practical implementation, in response to the authorization instruction, it is determined that the authorization mode corresponding to the authorization instruction is an active authorization, where the authorization instruction is triggered by an owner of the digital product calling the authorization service of the encrypted NFT, or, in response to the authorization instruction, it is determined that the authorization mode corresponding to the authorization instruction is an application authorization, where the authorization instruction is triggered by an applicant of the digital product calling the authorization service of the encrypted IS NFT.
[00157] Operation S402, calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of the encrypted NFT, and authorizing the digital product.
[00158] In response that the authorization mode is the active authorization, a list to be authorized is transmitted and written into the block chain according to the authorization instruction. An active authorization list is then added to the authorization list of the encrypted NFT after the transaction is confirmed, where the active authorization list is a wallet address list in the block chain. A key request service of the encrypted NFT is called based on the wallet address in the authorization list of the encrypted NFT in the block chain, and the data private key of the encrypted NFT is obtained.
[00159] In response that the authorization mode is the application authorization, an encrypted NFT address and an applicant address are uploaded according to the authorization instruction, and an application fee is paid. The encrypted NFT address and the applicant address are then written into the block chain. Afterwards, the calling instruction related to the digital product 1s received, and an application list is inquired and examined, and a result is written into the block chain, where the calling instruction is triggered by the owner of the digital product calling an authorization and approval service of the encrypted NFT, and the result includes whether the examining of the application list is passed. An applicant address is then added into the authorization list of the encrypted NFT, after the transaction is confirmed. An calling instruction from the applicant is called, calling a key request service of the encrypted NFT, to obtain the data private key of the encrypted NFT.
[00160] If the applicant is in the authorization list of the encrypted NFT, the applicant can call the key request service of the encrypted NFT, that is, the applicant is qualified to obtain the data private key of the encrypted NFT. On the contrary, the data private key of the encrypted NFT cannot be validly requested for the applicant who does not in the authorization list.
[00161] The solution is implemented by: receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information; receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code. The NFT code is an address of the digital product created based on the block chain. In addition, by operations receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens; and distributing the equity tokens as distributing assets of an encrypted NFT, the NFT is encrypted, equity tokens of the encrypted NFT can be transferred and authorized. Compared with the related art, the present disclosure provides a method of generating, distributing, transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. By distributing NFT and distributing equity tokens of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00162] Further, embodiments of the present disclosure further provide a processing system for a digital product, which includes a memory, a processor and a computer program stored on the memory and executable on the processor. The computer program, when executed by the processor, implements a method of generating a digital product as described in previous embodiments, or implements a method of distributing the digital product as described in previous embodiments, or implements a method of transferring the digital product as described in previous embodiments, or implements a method of authorizing the digital product as described in previous embodiments.
[00163] As the processing program for generating, distributing, transferring and authorizing the digital product is executed by the processor, and adopts all the technical solutions in all the aforementioned embodiments, it has at least all the beneficial effects as described previously, and will not be repeated herein.
[00164] An embodiments of the present disclosure further provides a computer-readable storage medium. The computer-readable storage medium stores a computer program, and when computer program is executed by a processor, implements a method of generating a digital product as described in previous embodiments, or implements a method of distributing the digital product as described in previous embodiments, or implements a method of transferring the digital product as described above, or implements a method of authorizing the digital product as described in previous embodiments.
[00165] As the processing program for generating, distributing, transferring and authorizing the digital product is executed by the processor, and adopts all the technical solutions in all the aforementioned embodiments, it has at least all the beneficial effects as described previously, and will not be repeated herein.
[00166] Compared to the related art, in the technical solution provided by the embodiment of the present disclosure regarding the method, and the system of generating, distributing, transferring and authorizing the digital product, and the storage medium, an instruction for registration is received, and a wallet service in a block chain is called to register a wallet account according to the instruction for registration, and registration information is obtained. A calling instruction based on the registration information is received, and a generation service of an encrypted NFT in the block chain is called according to the calling instruction, an original file of the digital product is uploaded, and a NFT code is obtained. The NFT code is an address of the digital product created based on the block chain. In addition, by operations receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens; and distributing the equity tokens as distributing assets of an encrypted NFT, the NFT is encrypted, equity tokens of the encrypted NFT can be transferred and authorized. Compared with the related art, the present disclosure provides a method of generating, distributing, transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. By distributing NFT and distributing equity token of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00167] It should be noted that in this document, the terms “comprising” “including” or any other variation thereof are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that includes a list of elements includes not only those elements but also other elements not expressly listed, or elements inherent to such process, method, article, or system. Without further restrictions, an element defined by the statement “includes an” does not exclude the presence of another identical element in a process, method, article, or system including the element.
[00168] The aforementioned serial numbers regarding the embodiments of the present disclosure are for description only and do not represent the superiority and inferiority of the embodiments.
[00169] From the description of the above embodiments, it will be clear to those skilled in the art that the method of the above embodiments can be implemented by means of software plus the necessary general hardware platform, although it can also be implemented by hardware, but in many cases the former is a better embodiment. Based on this understanding, the technical solution of the present disclosure can be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, and includes several instructions to cause a terminal device (which can be a mobile phone, a computer, a server, a controlled terminal, or a network device, etc.) to perform the methods described in various embodiments of the present disclosure.
[00170] The above is only the preferred embodiment of the present disclosure and is not therefore limiting the scope of the present disclosure. Any equivalent structure or process change made by using the contents of the present specification and drawings, or directly or indirectly applied in other related technical fields, shall be included in the protection scope of the present disclosure.

Claims (10)

CONCLUSIESCONCLUSIONS 1. Een methode voor het genereren van een digitaal product, bestaande uit een instructie voor registratie en het oproepen van een walletservice in een blockchain voor het registreren van een walletaccount volgens de instructie voor registratie, en het verkrijgen van registratiegegevens; en Ontvangen van een roepinstructie, gebaseerd op de registratie-informatie, roepen van een generatieservice van een versleutelde NFT in de blockchain volgens de roepinstructie, uploaden van een oorspronkelijk bestand van het digitale product en verkrijgen van een NFT- code, waarin de NFT-code een adres is van het digitale product dat gecreëerd is op basis van de blockchain.A method of generating a digital product consisting of an instruction for registration and calling a wallet service in a blockchain to register a wallet account according to the instruction for registration, and obtain registration data; and Receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the blockchain according to the calling instruction, uploading an original file of the digital product, and obtaining an NFT code, wherein the NFT code is an address of the digital product created on the basis of the blockchain. 2. De methode volgens conclusie 1, waarbij de registratie-informatie bestaat uit: een eigendomwalletadres van een geregistreerde gebruiker, en een paar van een openbare en geheime sleutel van de geregistreerde gebruiker, en de bewerkingen van “ontvangen van een roepinstructie gebaseerd op registratie-informatie, roepen van een generatieservice van een versleutelde NFT in de blockchain volgens de roepinstructie, uploaden van een oorspronkelijk bestand van het digitale product, en verkrijgen van een NFT-code, waarbij de NFT-code een adres is van het digitale product gecreëerd volgens de blockchain”, bestaande uit: Ontvangen van de roepinstructie gebaseerd op registratie-informatie, en reopen van de generatieservice van de versleutelde NFT in de blockchain volgens de roepinstructie voor het genereren van een paar van een openbare en een geheime sleutel; en Uploaden van het oorspronkelijke bestand van het digitale product, versleutelen van het geüploade oorspronkelijke bestand van het digitale product met de openbare sleutel zodat er versleutelde gegevens ontstaan, waarbij de versleutelde gegevens worden gebruikt als NFT- metagegevens, en schrijven van de geheime sleutel in de blockchain met de versleutelde gegevens als sleutel, en verkrijgen van de NFT-code, waarbij de NFT-code het adres is van het digitale product dat gecreëerd is op basis van de blockchain.The method of claim 1, wherein the registration information consists of: a proprietary wallet address of a registered user, and a pair of a public and private key of the registered user, and the operations of "receiving a call instruction based on registration information, calling a generation service of an encrypted NFT in the blockchain according to the calling instruction, uploading an original file of the digital product, and obtaining an NFT code, the NFT code being an address of the digital product created according to the blockchain”, consisting of: Receiving the calling instruction based on registration information, and reopening the generation service of the encrypted NFT in the blockchain according to the calling instruction to generate a pair of a public and a secret key; and Uploading the original file of the digital product, encrypting the uploaded original file of the digital product with the public key to produce encrypted data, using the encrypted data as NFT metadata, and writing the secret key in the blockchain using the encrypted data as the key, and obtaining the NFT code, where the NFT code is the address of the digital product created from the blockchain. 3. Een methode voor het verspreiden van een digitaal product, bestaande uit: Ontvangen van roepinstructie, aanroepen van een distributieservice in de blockchain volgens die roepinstructie, uploaden van een distributieparameter en genereren van een vooraf bepaald aantal equitytokens; en Verspreiden van de equitytokens als verspreidingsgegevens van een versleutelde NFT.3. A method of distributing a digital product comprising: receiving calling instruction, calling a distribution service in the blockchain according to that calling instruction, uploading a distribution parameter and generating a predetermined number of equity tokens; and Distributing the equity tokens as dissemination data of an encrypted NFT. 4. Een methode van overdracht van een digitaal product, bestaande uit: Ontvangen van een overdrachtinstructie voor een digitaal product, waarbij een overdracht van het digitale product bestaat uit: een overdracht van een versleutelde NFT en/of een overdracht van equitytokens van de versleutelde NFT; en Overdracht van de versleutelde NFT en/of overdracht van equitytokens van de versleutelde NFT volgens de overdrachtinstructie.4. A method of transfer of a digital product, consisting of: Receiving a transfer instruction for a digital product, where a transfer of the digital product consists of: a transfer of an encrypted NFT and/or a transfer of equity tokens from the encrypted NFT ; and Transfer of the encrypted NFT and/or transfer of equity tokens of the encrypted NFT according to the transfer instruction. 5. De methode volgens conclusie 4, waarbij de overdracht van het digitale product bestaat uit de overdracht van de versleutelde NFT, en De bewerking van “ontvangen van een overdrachtinstructie voor een digitaal product”, bestaat uit: Ontvangen van een betalingsinstructie door een kopende gebruiker voor de versleutelde NFT; Aansturen van de overdrachtinstructie naar de versleutelde NFT, nadat de betalingsinstructie correct verwerkt is, en De bewerking van “overdracht van de versleutelde NFT volgens de overdrachtinstructie”, bestaat uit: Vervangen van het eigendomwalletadres van de versleutelde NFT door een walletadres van de kopende gebruiker; Ontvangen van een roepinstructie van de kopende gebruiker, roepen en uitvoeren van een modificatieservice van een versleutelde NFT-sleutel volgens de roepinstructie, en genereren van een nieuw paar van een openbare sleutel en een geheime sleutel; en Versleutelen van een oorspronkelijk bestand van het digitale product dat is geüpload door de kopende gebruiker met de nieuwe openbare sleutel voor het creëren van versleutelde gegevens, en het nemen van de versleutelde gegevens als NFT-metagegevens, en schrijven van de nieuwe geheime sleutel in de blockchain met de versleutelde gegevens als sleutel.The method of claim 4, wherein the transfer of the digital product consists of the transfer of the encrypted NFT, and The operation of "receiving a transfer instruction for a digital product" consists of: Receiving a payment instruction by a purchasing user for the encrypted NFT; Driving the transfer instruction to the encrypted NFT, after the payment instruction has been correctly processed, and The operation of “transfer the encrypted NFT according to the transfer instruction” consists of: Replacing the proprietary wallet address of the encrypted NFT with a wallet address of the purchasing user; receiving a call instruction from the purchasing user, calling and executing a modification service of an encrypted NFT key according to the calling instruction, and generating a new pair of a public key and a secret key; and Encrypting an original file of the digital product uploaded by the purchasing user with the new public key to create encrypted data, and taking the encrypted data as NFT metadata, and writing the new secret key in the blockchain with the encrypted data as the key. 6. De methode volgens conclusie 4, waarbij de overdracht van het digitale product betsaat uit de overdracht van de equity tokens van de versleutelde NFT, enThe method of claim 4, wherein the transfer of the digital product consists of the transfer of the equity tokens of the encrypted NFT, and De bewerking van het “ontvangen van een overdrachtinstructie voor een digitaal product” bestaat uit: Ontvangen van een overdrachtinstructie voor de equitytokens van de versleutelde NFT; de bewerking van “overdracht van het equitytoken van de versleutelde NFT volgens de overdrachtinstructie”, bestaat uit: bepalen of een huidige account gerelateerd met een equityverandering meer dan 50% van de equitytokens bevat; als blijkt dat het huidige account gerelateerd met een equityverandering meer dan 50% van de equitytokens bevat, een dienst voor het veranderen van de eigendom van de versleutelde NFT aanroepen, en bepalen of het huidige account gerelateerd met een equityverandering meer dan 50% van de equitytokens bevat; en als blijkt dat het huidige account gerelateerd met een equityverandering meer dan 50% van de equitytokens bevat, de eigendom veranderen van de huidige account gerelateerd met een equityverandering; en anders geldt de equityverandering als mislukt.The operation of “receiving a transfer instruction for a digital product” consists of: Receiving a transfer instruction for the encrypted NFT's equity tokens; the operation of “transfer the equity token of the encrypted NFT according to the transfer instruction” consists of: determining whether a current account related to an equity change contains more than 50% of the equity tokens; if it is found that the current account related to an equity change has more than 50% of the equity tokens, call an encrypted NFT ownership change service, and determine if the current account related to an equity change has more than 50% of the equity tokens contains; and if it is found that the current account related to an equity change contains more than 50% of the equity tokens, change ownership of the current account related to an equity change; otherwise the equity change counts as failed. 7. Een methode voor het autoriseren van een digitaal product, bestaande uit: in respons op een autorisatie-instructie gerelateerd met een digitaal product, een autorisatiemodus bepalen die correspondeert met de autorisatie-instructie; en aanroepen van een autorisatieservice van een versleutelde NFT die correspondeert met de autorisatiemodus en de autorisatie-instructie, waarbij een autorisatielijst van de versleutelde NFT wordt bepaald, en autorisatie van het digitale product.A method for authorizing a digital product, comprising: in response to an authorization instruction related to a digital product, determining an authorization mode corresponding to the authorization instruction; and calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of the encrypted NFT, and authorization of the digital product. 8. De methode volgens conclusie 7, waarbij de operatie van “in respons op een autorisatie-instructie gerelateerd met een digitaal product, een autorisatiemodus bepalen die correspondeert met de autorisatie-instructie”, bestaat uit: in respons op een autorisatie-instructie, bepalen dat de autorisatiemodus die correspondeert met de autorisatie-instructie een actieve autorisatie is, waarbij de autorisatie- instructie getriggerd wordt door een eigenaar van het digitale product die de autorisatieservice van de versleutelde NFT aanroept; of, in respons op de autorisatie- instructie, bepalen dat de autorisatiemodus die correspondeert met de autorisatie-instructie een applicatieautorisatie is, waarbij de autorisatie-instructie getriggerd wordt door een applicant van het digitale product dat de autorisatieservice van de versleutelde NFT aanroept;The method of claim 7, wherein the operation of "in response to an authorization instruction related to a digital product, determine an authorization mode corresponding to the authorization instruction", comprises: in response to an authorization instruction, determine that the authorization mode corresponding to the authorization instruction is an active authorization, wherein the authorization instruction is triggered by an owner of the digital product invoking the authorization service of the encrypted NFT; or, in response to the authorization instruction, determine that the authorization mode corresponding to the authorization instruction is an application authorization, wherein the authorization instruction is triggered by an applicant of the digital product calling the authorization service of the encrypted NFT; De operatie “aanroepen van een autorisatieservice van een versleutelde NFT die correspondeert met de autorisatiemodus en de autorisatie-instructie, waarbij een autorisatielijst van de versleutelde NFT wordt bepaald, en autorisatie van het digitale product”, bestaat uit: in respons dat de autorisatiemodus de actieve autorisatie is, een lijst die moet worden geautoriseerd uploaden en de lijst die moet worden geautoriseerd schrijven in de blockchain, volgens de autorisatie-instructie; toevoegen van de lijst die moet worden geautoriseerd aan de autorisatielijst van de versleutelde NFT, nadat een transactie bevestigd is, waarbij de lijst die moet worden geautoriseerd een walletadreslijst is in de blockchain; aanroepen van een sleutelverzoekservice van de versleutelde NFT gebaseerd op een walletadres in de autorisatielijst van de versleutelde NFT, en verkrijgen van een geheime sleutel van de versleutelde NFT; de lijst die moet worden geautoriseerd na respons dat de autorisatiemodus de applicatie-autorisatie is, uploaden van een versleuteld NFT-adres en een applicantadres volgens de autorisatie-instructie, waarbij een applicatiefee wordt betaald, en schrijven van het versleutelde NFT-adres en het applicantadres in de blockchain; ontvangen van de roepinstructie die gerelateerd is aan het digitale product, waarbij een applicatielijst wordt opgevraagd en onderzocht, en het resultaat schrijven in de blockchain, waarbij de roepinstructie getriggerd wordt door de eigenaar van het digitale product, aanroepen van een autorisatie- en goedkeuringsservice van de versleutelde NFT. Het resultaat geeft aan of het onderzoek van de applicatielijst een goed resultaat had; toevoegen van een applicantadres aan de autorisatielijst van de versleutelde NFT, nadat de transactie bevestigd is, en ontvangen van een roepinstructie van de applicant, waarbij een sleutelverzoekservice van de versleutelde NFT wordt aangeroepen, en verkrijgen van de geheime sleutel van de versleutelde NFT.The operation “calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of the encrypted NFT, and authorization of the digital product” consists of: in response that the authorization mode is the active authorization is, upload a list to be authorized and write the list to be authorized in the blockchain, according to the authorization instruction; adding the list to be authorized to the authorization list of the encrypted NFT after a transaction is confirmed, the list to be authorized being a wallet address list in the blockchain; calling a key request service from the encrypted NFT based on a wallet address in the authorization list of the encrypted NFT, and obtaining a secret key from the encrypted NFT; the list to be authorized after response that the authorization mode is the application authorization, upload an encrypted NFT address and an applicant address according to the authorization instruction, paying an application fee, and write the encrypted NFT address and the applicant address in the blockchain; receiving the calling instruction related to the digital product, requesting and examining an application list, and writing the result into the blockchain, triggering the calling instruction by the owner of the digital product, calling an authorization and approval service from the encrypted NFT. The result indicates whether the examination of the application list had a good result; adding an applicant address to the authorization list of the encrypted NFT, after the transaction is confirmed, and receiving a call instruction from the applicant calling a key request service of the encrypted NFT, and obtaining the secret key of the encrypted NFT. 9. Een verwerkingssysteem voor een digitaal product, bestaande uit geheugen, een processor en een computerprogramma dat in het geheugen is opgeslagen en door de processor kan worden uitgevoerd, waarbij het computerprogramma, als het door de processor wordt uitgevoerd, een methode implementeert voor het genereren van een digitaal product volgens een van de conclusies 1 en 2, of een methode implementeert voor het distribueren van een digitaal product volgens conclusie 3, of een methode implementeert voor overdracht van een digitaal product volgens een van de conclusies 4 tot en met 6, of een methode implementeert voor het autoriseren van een digitaal product volgens een van de conclusies 4 totenmet8.9. A processing system for a digital product comprising memory, a processor and a computer program stored in the memory and executable by the processor, wherein the computer program, when executed by the processor, implements a method of generating of a digital product according to any one of claims 1 and 2, or implements a method for distributing a digital product according to claim 3, or implements a method for transmitting a digital product according to any one of claims 4 to 6, or implements a method for authorizing a digital product according to any one of claims 4 to 8. 10. Een voor een computer leesbaar opslagmedium, waarbij het door een computer leesbare opslagmedium een computerprogramma bevat, en als dat computerprogramma door een processor wordt uitgevoerd, wordt een methode geïmplementeerd voor het genereren van een digitaal product volgens een van de conclusies 1 en 2, of een methode geïmplementeerd voor het distribueren van een digitaal product volgens conclusie 3, of wordt een methode geïmplementeerd voor overdracht van een digitaal product volgens van de conclusies 4 tot en met 6, een methode geïmplementeerd voor het autoriseren van een digitaal product volgens een van de conclusies 4 tot en met 8.A computer-readable storage medium, wherein the computer-readable storage medium contains a computer program, and when said computer program is executed by a processor, a method for generating a digital product is implemented according to any one of claims 1 and 2, or implemented a method for distributing a digital product according to claim 3, or implemented a method for transmitting a digital product according to claims 4 to 6, implemented a method for authorizing a digital product according to any one of the claims 4 to 8.
NL2029246A 2021-09-24 2021-09-24 Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium NL2029246B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
NL2029246A NL2029246B1 (en) 2021-09-24 2021-09-24 Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
NL2029246A NL2029246B1 (en) 2021-09-24 2021-09-24 Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium

Publications (1)

Publication Number Publication Date
NL2029246B1 true NL2029246B1 (en) 2022-08-12

Family

ID=80448658

Family Applications (1)

Application Number Title Priority Date Filing Date
NL2029246A NL2029246B1 (en) 2021-09-24 2021-09-24 Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium

Country Status (1)

Country Link
NL (1) NL2029246B1 (en)

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CRYPTOKITTIES TEAM: "CryptoKitties:Collectible BreedableBlockchainWHITEPA-PURR", 1 January 2018 (2018-01-01), pages 1 - 9, XP055922571, Retrieved from the Internet <URL:https://drive.google.com/file/d/1soo-eAaJHzhw_XhFGMJp3VNcQoM43byS/view> [retrieved on 20220518] *
ISHIDA TATSURO ET AL: "Tokenizing and Managing the Copyrights of Digital Content on Blockchains", 2019 IEEE 8TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), IEEE, 15 October 2019 (2019-10-15), pages 170 - 172, XP033726314, DOI: 10.1109/GCCE46687.2019.9015595 *
WILLIAM ENTRIKEN ET AL: "EIP 721: ERC-721 Non-Fungible Token Standard", ETHEREUM IMPROVEMENT PROPOSALS, NO. 721, 24 January 2018 (2018-01-24), https://github.com/ethereum/eips, XP055723345, Retrieved from the Internet <URL:https://eips.ethereum.org/EIPS/eip-721> [retrieved on 20200818] *

Similar Documents

Publication Publication Date Title
Yuan et al. Shadoweth: Private smart contract on public blockchain
JP6640320B1 (en) Token management system and token management method
JP3216607B2 (en) Digital work distribution system and method, digital work reproduction apparatus and method, and recording medium
CN102592069B (en) Apparatus and method for managing digital rights through hooking a kernel native API
JP2020503579A (en) Blockchain-based method and system for specifying recipients of electronic communication
JP2005536951A (en) Apparatus, system, and method for securing digital documents in a digital device
TW486902B (en) Method capable of preventing electronic documents from being illegally copied and its system
MXPA06001252A (en) Flexible licensing architecture in content rights management systems.
CN102073826A (en) System and method for digital copyright management using lightweight digital watermark adding component
CA3157920A1 (en) Controlling access to secured data in multi-system exchange environments
WO2023030450A1 (en) Data sharing method and electronic device
CN110213251B (en) Method for anonymously reporting reward distribution, method for obtaining reward, equipment and storage medium
CN109344566A (en) A kind of copyright managing method based on block chain, device and equipment
JP5399400B2 (en) Digital content counting system and method
CN101783807A (en) System and method for digital rights management using a standard rendering engine
Sahoo et al. Traceability and ownership claim of data on big data marketplace using blockchain technology
TWI622949B (en) Know your customer (kyc) data marking dispute relief system with multiple secret key and method thereof
WO2020156400A1 (en) Digital artwork display device, management method, and electronic device
CN106233292A (en) Synthesis document access
KR20210037274A (en) Apparatus and method for managing contents
WO2019082442A1 (en) Data registration method, data decoding method, data structure, computer, and program
TW201913529A (en) Confirmation system based on blockchain smart contract and method thereof
CN110766548A (en) Block chain based information processing method and device, storage medium and electronic equipment
NL2029246B1 (en) Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium
US20230012276A1 (en) System, Method, and Apparatus for Decentralized E-Commerce