NL2029246B1 - Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium - Google Patents
Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium Download PDFInfo
- Publication number
- NL2029246B1 NL2029246B1 NL2029246A NL2029246A NL2029246B1 NL 2029246 B1 NL2029246 B1 NL 2029246B1 NL 2029246 A NL2029246 A NL 2029246A NL 2029246 A NL2029246 A NL 2029246A NL 2029246 B1 NL2029246 B1 NL 2029246B1
- Authority
- NL
- Netherlands
- Prior art keywords
- nft
- encrypted
- digital product
- instruction
- authorization
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
Abstract
Disclosed are a method, and a system of generating, distribute, transferring and authorizing a digital product, and a storage medium. The method of generating a digital product includes: receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information, receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain. According to the present disclosure, the digital product is encrypted in the form of NFT, improving copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be eXpanded in scale under copyright protection.
Description
[0001] The present disclosure relates to a technical field of digital product, in particular to a method, and a system of generating, distributing, transferring and authorizing a digital product, and a storage medium.
[0002] With a boom of emerging technologies including Internet, big data, artificial intelligence and block chain, the online digital product industries are rapidly developing such as e-books, videos, audio, pictures and security documents. Their online transaction has been soaring year by year. The traditional digital products are restricted in regards to copyright protection, as they are vulnerable to copy, or tamper with. And origins are difficult to trace.
[0003] The current protection for digital products is DRM (Digital Rights Management) technology. DRM protects digital contents by algorithms, and the digital contents may include: eBook, video, audio, pictures and security documents. Although, the DRM technology can definitely provide sufficient security for the copyright of digital media, it requires the combination of the user's decryption key with local computer hardware. Obviously, the user can only get the ordered service on a specific computer in a specific place, which is an obvious shortcoming for this method.
[0004] Block chain technology, as a new decentralized protocol, can safely store digital currency transactions or other data, and the information cannot be forged or tampered with. The transaction confirmation in the block chain is completed by all nodes of the block chain, and its consistency is guaranteed by consensus algorithm. The block chain maintains a public account book, which is visible for any node in the storage block, thus ensuring its security from being forged or tempered with. Rooting from the development of block chain technology, many digital product protection technologies have been derived.
[0005] In which, copyright protection derived from block chain technology is mainly categorized into traceability protection and Non-Fungible Token (NFT). Traceability protection is to protect digital product by using block chain's traceability and tamperability. Non-fungible token generates an NFT from a digital product, and protects it as a unique identity, which protects the distribution of the digital product to a certain extent and improves the efficiency of the distribution. However, because of their openness and transparency, digital products can be easily copied, and copyrights are vulnerable.
[0006] The present disclosure is to provide a method, a system of generating, distributing, transferring and authorizing digital product, and a storage medium, which aims to validly protect the copyright of a digital product and improves the copyright security of a digital product.
[0007] To achieve such purpose, an embodiment of the present disclosure provides a method of generating a digital product, which includes the following operations:
[0008] receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information;
[0009] receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain.
[0010] Optionally, the registration information includes: an ownership wallet address of a registered user, and a pair of public key and private key of the registered user, and the operations of “receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain”, includes:
[0011] receiving the calling instruction based on the registration information, and calling the generation service of the encrypted NFT in the block chain according to the calling instruction to generate a pair of data public key and data private key;
[0012] uploading the original file of the digital product, encrypting the uploaded original file of the digital product through the data public key, where encrypted data is used as NFT metadata, and writing the data private key into the block chain with the encrypted data as a key, and obtaining the NFT code, where the NFT code is the address of the digital product created based on the block chain.
[0013] In addition, an embodiment of the present disclosure also provides a method of distributing a digital product, which includes the following operations:
[0014] receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens;
[0015] distributing the equity tokens as an distributing asset of an encrypted NFT.
[0016] In addition, an embodiment of the present disclosure also provides a method of transferring a digital product, which includes the following operations:
[0017] receiving a transfer instruction for a digital product, where a transfer of the digital product includes: a transfer of an encrypted NFT and/or a transfer of equity tokens of the encrypted NFT;
[0018] transferring the encrypted NFT and/or transferring the equity token of the encrypted NFT according to the transfer instruction.
[0019] Optionally, the transfer of digital product includes: the transfer of encrypted NFT;
[0020] the operation of “receiving a transfer instruction for a digital product”, includes:
[0021] receiving a payment instruction by a purchasing user for the encrypted NFT;
[0022] triggering a transfer instruction to the encrypted NFT, after the payment instruction is successfully operated, and
[0023] the operation of “transferring the encrypted NFT according to the transfer instruction”, includes:
[0024] replacing the ownership wallet address of the encrypted NFT with a wallet address of the purchasing user;
[0025] receiving a calling instruction from the purchasing user, calling and executing a modification service of the encrypted NFT key according to the calling instruction, and generating a pair of new data public key and new data private key;
[0026] encrypting the original file of the digital product which 1s uploaded by the purchasing user through the new data public key, and taking encrypted data as NFT metadata, and writing the new data private key into the block chain with the encrypted data as a key.
[0027] Optionally, the transfer of the digital product includes the transfer of the equity tokens of the encrypted NFT, and
[0028] the operation of “receiving a transfer instruction for a digital product”, includes:
[0029] receiving a transfer instruction for the equity tokens of the encrypted NFT;
[0030] the operation of “transferring the equity token of the encrypted NFT according to the transfer instruction”, includes:
[0031] determining whether a current account related to an equity change holds more than 50% of equity tokens;
[0032] in response that the current account related to the equity change holds more than 50% of the equity tokens, calling an ownership change service of the encrypted NFT, and determining whether the current account related to the equity change validly holds more than 50% of the equity tokens;
[0033] in response that the current account related to the equity change validly holds more than 50% of the equity tokens, changing an ownership to the current account related to the equity change; otherwise, failing of the equity change.
[0034] In addition, an embodiment of the present disclosure also provides a method of authorizing a digital product, which includes the following operations:
[0035] in response to an authorization instruction related to a digital product, determining an authorization mode corresponding to the authorization instruction;
[0036] calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of the encrypted NFT, and authorizing the digital product.
[0037] Optionally, the operation of “in response to an authorization instruction related to a digital product, determining an authorization mode corresponding to the authorization instruction”, includes:
[0038] in response to the authorization instruction, determining that the authorization mode corresponding to the authorization instruction is an active authorization, where the authorization instruction is triggered by an owner of the digital product calling the authorization service of the encrypted NFT, or, in response to the authorization instruction, determining that the authorization mode corresponding to the authorization instruction is an application authorization,
where the authorization instruction is triggered by an applicant of the digital product calling the authorization service of the encrypted NFT;
[0039] the operation of “calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of 5 the encrypted NFT, and authorizing the digital product”, includes:
[0040] in response that the authorization mode is the active authorization, uploading a list to be authorized and writing the list to be authorized into the block chain according to the authorization instruction;
[0041] adding the list to be authorized to an authorization list of the encrypted NFT, after a transaction is confirmed, where the list to be authorized is a wallet address list in the block chain;
[0042] calling a key request service of the encrypted NFT based on a wallet address in the authorization list of the encrypted NFT, and obtaining a data private key of the encrypted NFT;
[0043] in response that the authorization mode is the application authorization, uploading an encrypted NFT address and an applicant address according to the authorization instruction, paying an application fee, and writing the encrypted NFT address and the applicant address into the block chain;
[0044] receiving the calling instruction related to the digital product, inquiring and examining an application list, and writing a result into the block chain, where the calling instruction is triggered by the owner of the digital product calling an authorization and approval service of the encrypted NFT, and the result includes whether the examining of the application list is passed,
[0045] adding an applicant address into the authorization list of the encrypted NFT, after the transaction is confirmed;
[0046] receiving an calling instruction from the applicant calling a key request service of the encrypted NFT, and obtaining the data private key of the encrypted NFT.
[0047] An embodiments of the present disclosure further provides a processing system for a digital product, which includes a memory, a processor and a computer program stored on the memory and executable on the processor. The computer program, when executed by the processor, implements a method of generating a digital product as described above, or implements a method of distributing the digital product as described above, or implements a method of transferring the digital product as described above, or implements a method of authorizing the digital product as described above.
[0048] An embodiments of the present disclosure further provides a computer-readable storage medium. The computer-readable storage medium stores a computer program, and when computer program is executed by a processor, implements a method of generating a digital product as described above, or implements a method of distributing the digital product as described above, or implements a method of transferring the digital product as described above, or implements a method of authorizing the digital product as described above.
[0049] According to technical solution provided by the embodiment of the present disclosure regarding the method, and system of generating, distributing, transferring and authorizing the digital product, and the storage medium, an instruction for registration is received, and a wallet service in a block chain is called to register a wallet account according to the instruction for registration, and registration information is obtained. A calling instruction based on the registration information is received, and a generation service of an encrypted NFT in the block chain is called according to the calling instruction, an original file of the digital product is uploaded, and a NFT code is obtained. Where the NFT code is an address of the digital product created based on the block chain. In addition, by operations receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens; and distributing the equity tokens as an distributing asset of an encrypted NFT, the NFT is encrypted, equity tokens of the encrypted NFT can be transferred and authorized. Compared with the related art, the present disclosure provides a method of generating, distributing, transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. By distributing NFT and distributing equity token of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[0050] Fig. | is a schematic diagram showing functional modules of a digital product processing system according to an embodiment of the present disclosure;
[0051] Fig. 2 is a flow diagram showing a method of generating a digital product according to an exemplary embodiment of the present disclosure;
[0052] Fig. 3 is a detailed flow diagram of the method of generating the digital product according to the embodiment of the present disclosure;
[0053] Fig. 4 is a flow diagram showing a method of distributing a digital product according to an exemplary embodiment of the present disclosure;
[0054] Fig. 5 is a flow diagram of a method of distributing a digital product according to another embodiment of the present disclosure;
[0055] Fig. 6 is a flow diagram showing a method of transferring a digital product according to an exemplary embodiment of the present disclosure;
[0056] Fig. 7 is a flow diagram showing a method of authorizing a digital product according to an exemplary embodiment of the present disclosure;
[0057] Fig. 8 is a schematic diagram showing core service modules of a block chain according to an embodiment of the present disclosure.
[0058] The implementation, functional features and advantages of the present disclosure will be further described with reference to the accompanying drawings with the embodiments.
[0059] It should be understood that the specific embodiments described herein are only for the purpose of explaining the present disclosure and are not intended to limit the present disclosure.
[0060] The solution of the embodiment of the present disclosure is: receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information; receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code. Where the NFT code is an address of the digital product created based on the block chain. In addition, by operations receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens; and distributing the equity tokens as an distributing asset of an encrypted NFT, the NFT is encrypted, equity tokens of the encrypted NFT can be transferred and authorized. Compared with the related art, the present disclosure provides a method of generating, distributing, transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. By distributing NFT and distributing equity token of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[0061] Technical terms related to the embodiments of the present disclosure:
[0062] DRM is a technology that protects digital contents by algorithms, and the digital contents may include: eBook, video, audio, pictures and security documents.
[0063] Block chain technology, as a new decentralized protocol, can safely store digital currency transactions or other data, and the information cannot be forged or tampered with. The transaction confirmation in the block chain is completed by all nodes of the block chain, and its consistency is guaranteed by consensus algorithm. The block chain maintains a public account book, which is visible for any node in the storage block, thus ensuring its security from being forged or tempered with.
[0064] Core services of the block chain involves a wallet generation service, a generation service of the encrypted NFT, a data public and private key generation service, an authorization service of the encrypted NFT, an application authorization service of the encrypted NFT, an authorization approval service of the encrypted NFT and a key request service of the encrypted NFT, as shown in Fig. 8.
[0065] It has been considered that in the existing related solutions, the protection are mainly
DRM and block chain technologies, where DRM requires the combination of the user's decryption key with local computer hardware. Obviously, the user can only get the ordered service on a specific computer in a specific place, which is an obvious shortcoming for this method. Non-fungible token generates an NFT from a digital product, and protect it as a unique identity, which protects the distribution of the digital product to a certain extent and improves the efficiency of the distribution. However, due to their openness and transparency, digital product are easily copied, and copyrights are difficult to effectively be protected.
[0066] Therefore, the solution proposed by the embodiment of the present disclosure provides encrypts and protects the digital product in the form of encrypted NFT. By distributing NFT and distributing equity token of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorization of digital product, the circulation of the digital product in the entire industry circle is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[0067] Specifically, refer to Fig. 1, which is a schematic diagram showing functional modules of a digital product processing system according to an embodiment of the present disclosure. The digital product processing system can be a device independent of terminal device and capable of generating, distributing, transferring and authorizing a digital product, and can be carried on the terminal device in the form of hardware or software. The terminal device can be a network device that combines block chain technology to realize the generation, distribution, transfer and authorization of a digital product.
[0068] In the present embodiment, the digital product processing system at least includes an output module 110, a processor 120, a memory 130 and a communication module 140.
[0069] The memory 130 stores an operating system and a digital product processing program. The output module 110 may be a display screen, a speaker, etc. The communication module 140 may include a WIFI module, a mobile communication module, a Bluetooth module, etc., and the system communicates with external devices or servers through the communication module 140.
[0070] As an embodiment, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are implemented:
[0071] receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information;
[0072] receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain.
[0073] Further, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are also implemented:
[0074] receiving the calling instruction based on the registration information, and calling the generation service of the encrypted NFT in the block chain according to the calling instruction to generate a pair of data public key and data private key;
[0075] uploading the original file of the digital product, encrypting the uploaded original file of the digital product through the data public key to create encrypted data, where the encrypted data is used as NFT metadata, and writing the data private key into the block chain with the encrypted data as a key, and obtaining the NFT code, where the NFT code is the address of the digital product created based on the block chain.
[0076] Further, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are also implemented:
[0077] receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens;
[0078] distributing the equity tokens as an distributing asset of an encrypted NFT.
[0079] Further, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are also implemented:
[0080] receiving a transfer instruction for a digital product, where a transfer of the digital product includes: a transfer of an encrypted NFT and/or a transfer of equity tokens of the encrypted NFT;
i
[0081] transferring the encrypted NFT and/or transferring the equity token of the encrypted NFT according to the transfer instruction.
[0082] Further, when the processing program related to the digital product in the memory 130 1s executed by the processor, the following operations are also implemented:
[0083] receiving a payment instruction by a purchasing user for the encrypted NFT;
[0084] triggering a transfer instruction to the encrypted NFT, after the payment instruction is successfully operated; and
[0085] replacing the ownership wallet address of the encrypted NFT with a wallet address of the purchasing user;
[0086] receiving a calling instruction from the purchasing user, calling and executing a modification service of the encrypted NFT key according to the calling instruction, and generating a pair of new data public key and new data private key;
[0087] encrypting the original file of the digital product which is uploaded by the purchasing user through the new data public key to create encrypted data, and taking the encrypted data as NFT metadata, and writing the new data private key into the block chain with the encrypted data as a key.
[0088] Further, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are also implemented:
[0089] receiving a transfer instruction for the equity tokens of the encrypted NFT;
[0090] the operation of “transferring the equity token of the encrypted NFT according to the transfer instruction”, includes:
[0091] determining whether a current account related to an equity change holds more than 50% of equity tokens;
[0092] in response that the current account related to the equity change holds more than 50% of the equity tokens, calling an ownership change service of the encrypted NFT, and determining whether the current account related to the equity change validly holds more than 50% of the equity tokens;
[0093] in response that the current account related to the equity change validly holds more than 50% of the equity tokens, changing an ownership to the current account related to the equity change; otherwise, failing to change the equity.
[0094] Further, when the processing program related to the digital product in the memory 130 is executed by the processor, the following operations are also implemented:
[0095] in response to an authorization instruction related to a digital product, determining an authorization mode corresponding to the authorization instruction;
[0096] calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of the encrypted NFT, and authorizing the digital product.
[0097] Further, when the processing program related to the digital product in the memory 130 1s executed by the processor, the following operations are also implemented:
[0098] in response to the authorization instruction, determining that the authorization mode corresponding to the authorization instruction is an active authorization, where the authorization instruction is triggered by an owner of the digital product calling the authorization service of the encrypted NFT, or, in response to the authorization instruction, determining that the authorization mode corresponding to the authorization instruction is an application authorization, where the authorization instruction is triggered by an applicant of the digital product calling the authorization service of the encrypted NFT;
[0099] the operation of “calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of the encrypted NFT, and authorizing the digital product”, includes:
[00100] in response that the authorization mode is the active authorization, uploading a list to be authorized and writing the list to be authorized into the block chain according to the authorization instruction;
[00101] adding the list to be authorized to an authorization list of the encrypted NFT, after a transaction is confirmed, where the list to be authorized is a wallet address list in the block chain;
[00102] calling a key request service of the encrypted NFT based on a wallet address in the authorization list of the encrypted NFT, and obtaining a data private key of the encrypted NFT;
[00103] in response that the authorization mode is the application authorization, uploading an encrypted NFT address and an applicant address according to the authorization instruction, paying an application fee, and writing the encrypted NFT address and the applicant address into the block chain;
[00104] receiving the calling instruction related to the digital product, inquiring and examining an application list, and writing a result into the block chain, where the calling instruction is triggered by the owner of the digital product calling an authorization and approval service of the encrypted NFT, and the result includes whether the examining of the application listis passed,
[00105] adding an applicant address into the authorization list of the encrypted NFT, after the transaction is confirmed;
[00106] receiving an calling instruction from the applicant calling a key request service of the encrypted NFT, and obtaining the data private key of the encrypted NFT.
[00107] The solution is implemented by: receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information; receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code. Where the NFT code is an address of the digital product created based on the block chain. In addition, by operations receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens; and distributing the equity tokens as an distributing asset of an encrypted NFT, the NFT is encrypted, equity tokens of the encrypted NFT can be transferred and authorized. Compared with the related art, the present disclosure provides a method of generating, distributing, transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. By distributing NFT and distributing equity token of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00108] Based on but not limited to the above system architecture, an embodiment of the methods are proposed.
[00109] Referring to Fig. 2, which is a flow diagram showing a method of generating a digital product according to an exemplary embodiment of the present disclosure. The method of generating a digital product includes the following operations:
[00110] Operation S101, receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information;
[00111] where the registration information may include a wallet account, an ownership wallet address of a registered user and a pair of public key and private key.
[00112] In practical implementation, users can call a wallet generation service in the block chain to register a wallet account and get an ownership wallet address and a pair of public and private keys.
[00113] Operation S102, receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain.
[00114] In the present embodiment, digital product can be encrypted and protected in the form of encrypted NFT.
[00115] In practical implementation, the user can call the generation service of the encrypted NFT in the block chain, upload the original file of the original digital product, and return an NFT code, which is the digital product address created by the user based on the block chain.
[00116] The generation service of the encrypted NFT will generate a pair of data public and private keys, encrypt the original file of the digital product uploaded by the user with the data public key to create encrypted data, and use the encrypted data as the metadata of NFT. Further, the data private key will be written into the block chain, with the data encrypted by the user's public key as the key.
[00117] The encrypted NFT is a non-fungible token, and the information includes the ownership wallet address, name, symbol, description information, metadata, key, equity token address, authorization list, etc. The modification right of these information is the ownership wallet address.
[00118] The specific implementation solution of generating the digital product in the present embodiment can be shown in Fig. 3.
[00119] The present embodiment is achieved by receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code, where the NFT code is an address of the digital product created based on the block chain. Compared with the related art, the embodiment solution of the present disclosure provides a method of generating a digital product with copyright protection, which encrypts and protects the digital product in the form of encrypted NFT. As such, such technical solution improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00120] Referring to Fig. 4, Fig. 4 is a flow diagram showing a method of distributing a digital product according to an exemplary embodiment of the present disclosure. The method of distributing a digital product includes the following operations:
[00121] Operation S201, receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens;
[00122] where the asset distribution parameters include: hash of encrypted NFT, symbol of equity token, total amount of equity tokens, etc.
[00123] Operation S202, distributing the equity tokens as distributing assets of an encrypted NFT.
[00124] Specifically, there are two distribution methods for the encrypted NFT generated by the aforementioned solution:
[00125] in a general scenario, the generated encrypted NFT itself is a kind of issued asset; in a special scenario where the digital product is of high value and inconvenient to transfer its copyright, the digital product distribution can adopt the solution of the present embodiment. The specific process flows can be shown in Fig. 5, and the solution is implemented as follows:
[00126] when a user needs to distributes a special digital product asset having high value or inconvenient for copyright transfer, the user can call the asset distribution service in the block chain, pass in asset distribution parameters, and generate a certain number of equity tokens, where the asset distribution parameters can include hash of the encrypted NFT, equity token symbols, a total amount of equity tokens, etc.
[00127] Therefore, users have a certain number of equity tokens, which are the assets of the distributed encrypted NFT.
[00128] The equity token is the equity representation of the encrypted NFT and represents the equity interest of the encrypted NFT, and the equity token cannot be modified after being distributed.
[00129] In the present embodiment, through the above solution, the asset distribution service in the block chain is specifically called, and the asset distribution parameters are input to generate a predetermined number of equity tokens. And the equity tokens are distributed as assets of the encrypted NFT. Compared with the related art, the embodiment solution of the present disclosure provides a method of distributing a digital product with copyright protection, which encrypts and protects the digital product in the form of encrypted NFT. The distribution of the digital products are more flexible by directly distributing the NFT or distributing the equity tokens of the NFT. As such, such technical solution improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00130] Referring to Fig. 6, Fig. 6 is a flow diagram showing a method of transferring a digital product according to an exemplary embodiment of the present disclosure. The method of transferring a digital product includes the following operations:
[00131] Operation S301, receiving a transfer instruction for a digital product, where a transfer of the digital product includes: a transfer of an encrypted NFT and/or a transfer of equity tokens of the encrypted NFT.
[00132] Operation S302, transferring the encrypted NFT and/or transferring the equity tokens of the encrypted NFT according to the transfer instruction.
[00133] As to the transfer of encrypted NFT, the specific processing operations can be as follows:
[00134] receiving a payment instruction by a purchasing user for the encrypted NFT;
[00135] triggering a transfer instruction to the encrypted NFT, after the payment instruction is successtully operated, and
[00136] replacing the ownership wallet address of the encrypted NFT with a wallet address of the purchasing user;
[00137] receiving a calling instruction from the purchasing user, calling and executing a modification service of the encrypted NFT key according to the calling instruction, and generating a pair of new data public key and new data private key;
[00138] encrypting the original file of the digital product which is uploaded by the purchasing user through the new data public key to create encrypted data, and taking the encrypted data as NFT metadata, and writing the new data private key into the block chain with the encrypted data as a key.
[00139] As such, the encrypted NFT is transferred by the above solution.
[00140] As to the transfer of the equity tokens of the encrypted NFT, the specific processing operations can be as follows:
[00141] receiving a transfer instruction for the equity tokens of the encrypted NFT; determining whether a current account related to an equity change holds more than 50% of the equity tokens based on the transfer instruction; in response that the current account related to the equity change holds more than 50% of the equity tokens, calling an ownership change service of the encrypted NFT, and determining whether the current account related to the equity change validly holds more than 50% of the equity tokens; in response that the current account related to the equity change validly holds more than 50% of the equity tokens, changing an ownership to the current account related to the equity change; otherwise, failing of the equity change.
[00142] As such, the equity tokens of the encrypted NFT is transferred.
[00143] The following is a detailed explanation of the embodiment.
[00144] Specifically, in the present embodiment, the transfer of the digital product includes the transfer of the digital product itself, namely the transfer of the encrypted NFT and the transfer of the equity tokens.
[00145] The transfer of encrypted NFT includes the following operations:
[00146] at first, the purchasing user pays effective funds to purchase the encrypted NFT,
where the effective funds are the price of the encrypted NFT. Afterwards, the ownership wallet address of the encrypted NFT is changed to the wallet address of the purchasing user.
[00147] Then, when the purchasing user executes a key modification service of the encrypted NFT. A pair of new data public and new data private keys will be generated, and the original file of the original digital product uploaded by the purchasing user will be encrypted with the new data public key to create encrypted data. The encrypted data will be used as NFT metadata. The new data private key will afterwards be written into the block chain with the data encrypted by the purchasing user's public key as a new key.
[00148] The caller of the key modification service is only valid for the ownership wallet address of the encrypted NFT.
[00149] The transfer of the equity tokens of the encrypted NFT includes the following operations:
[00150] the general equity token transfer is actually a transfer of the token owner. An equity change account is maintained, and when the equity change account holds more than 50% of the equity tokens, the owner change service of the encrypted NFT is called. And it is judged whether the equity change account holds more than 50% of equity tokens validly, if so, changing the encrypted NFT owner into an equity change account; otherwise, the owner change service fails.
[00151] The present embodiment implements the transfer of the encrypted NFT and the equity tokens of the encrypted NFT. Compared with the related art, the present disclosure provides a method of transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00152] Referring to Fig. 7, Fig. 7 is a flow diagram showing a method of authorizing a digital product according to an exemplary embodiment of the present disclosure. The method of authorizing a digital product includes the following operations:
[00153] Operation S401, in response to an authorization instruction related to a digital product, determining an authorization mode corresponding to the authorization instruction.
[00154] The authorization mode includes: active authorization and application authorization.
[00155] As to the triggering of active authorization, the owner of the digital product can call the authorization service of the encrypted NFT in the block chain to trigger the authorization instruction for the digital product; and as to the triggering of the application authorization, the applicant of the digital product can call the application authorization service of the encrypted NFT to trigger the authorization instruction for the digital product.
[00156] In practical implementation, in response to the authorization instruction, it is determined that the authorization mode corresponding to the authorization instruction is an active authorization, where the authorization instruction is triggered by an owner of the digital product calling the authorization service of the encrypted NFT, or, in response to the authorization instruction, it is determined that the authorization mode corresponding to the authorization instruction is an application authorization, where the authorization instruction is triggered by an applicant of the digital product calling the authorization service of the encrypted IS NFT.
[00157] Operation S402, calling an authorization service of an encrypted NFT corresponding to the authorization mode and the authorization instruction, determining an authorization list of the encrypted NFT, and authorizing the digital product.
[00158] In response that the authorization mode is the active authorization, a list to be authorized is transmitted and written into the block chain according to the authorization instruction. An active authorization list is then added to the authorization list of the encrypted NFT after the transaction is confirmed, where the active authorization list is a wallet address list in the block chain. A key request service of the encrypted NFT is called based on the wallet address in the authorization list of the encrypted NFT in the block chain, and the data private key of the encrypted NFT is obtained.
[00159] In response that the authorization mode is the application authorization, an encrypted NFT address and an applicant address are uploaded according to the authorization instruction, and an application fee is paid. The encrypted NFT address and the applicant address are then written into the block chain. Afterwards, the calling instruction related to the digital product 1s received, and an application list is inquired and examined, and a result is written into the block chain, where the calling instruction is triggered by the owner of the digital product calling an authorization and approval service of the encrypted NFT, and the result includes whether the examining of the application list is passed. An applicant address is then added into the authorization list of the encrypted NFT, after the transaction is confirmed. An calling instruction from the applicant is called, calling a key request service of the encrypted NFT, to obtain the data private key of the encrypted NFT.
[00160] If the applicant is in the authorization list of the encrypted NFT, the applicant can call the key request service of the encrypted NFT, that is, the applicant is qualified to obtain the data private key of the encrypted NFT. On the contrary, the data private key of the encrypted NFT cannot be validly requested for the applicant who does not in the authorization list.
[00161] The solution is implemented by: receiving an instruction for registration, and calling a wallet service in a block chain to register a wallet account according to the instruction for registration, and obtaining registration information; receiving a calling instruction based on the registration information, calling a generation service of an encrypted NFT in the block chain according to the calling instruction, uploading an original file of the digital product, and obtaining a NFT code. The NFT code is an address of the digital product created based on the block chain. In addition, by operations receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens; and distributing the equity tokens as distributing assets of an encrypted NFT, the NFT is encrypted, equity tokens of the encrypted NFT can be transferred and authorized. Compared with the related art, the present disclosure provides a method of generating, distributing, transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. By distributing NFT and distributing equity tokens of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00162] Further, embodiments of the present disclosure further provide a processing system for a digital product, which includes a memory, a processor and a computer program stored on the memory and executable on the processor. The computer program, when executed by the processor, implements a method of generating a digital product as described in previous embodiments, or implements a method of distributing the digital product as described in previous embodiments, or implements a method of transferring the digital product as described in previous embodiments, or implements a method of authorizing the digital product as described in previous embodiments.
[00163] As the processing program for generating, distributing, transferring and authorizing the digital product is executed by the processor, and adopts all the technical solutions in all the aforementioned embodiments, it has at least all the beneficial effects as described previously, and will not be repeated herein.
[00164] An embodiments of the present disclosure further provides a computer-readable storage medium. The computer-readable storage medium stores a computer program, and when computer program is executed by a processor, implements a method of generating a digital product as described in previous embodiments, or implements a method of distributing the digital product as described in previous embodiments, or implements a method of transferring the digital product as described above, or implements a method of authorizing the digital product as described in previous embodiments.
[00165] As the processing program for generating, distributing, transferring and authorizing the digital product is executed by the processor, and adopts all the technical solutions in all the aforementioned embodiments, it has at least all the beneficial effects as described previously, and will not be repeated herein.
[00166] Compared to the related art, in the technical solution provided by the embodiment of the present disclosure regarding the method, and the system of generating, distributing, transferring and authorizing the digital product, and the storage medium, an instruction for registration is received, and a wallet service in a block chain is called to register a wallet account according to the instruction for registration, and registration information is obtained. A calling instruction based on the registration information is received, and a generation service of an encrypted NFT in the block chain is called according to the calling instruction, an original file of the digital product is uploaded, and a NFT code is obtained. The NFT code is an address of the digital product created based on the block chain. In addition, by operations receiving a calling instruction, calling an asset distribution service in the block chain according to the calling instruction, uploading an asset distribution parameter, and generating a predetermined number of equity tokens; and distributing the equity tokens as distributing assets of an encrypted NFT, the NFT is encrypted, equity tokens of the encrypted NFT can be transferred and authorized. Compared with the related art, the present disclosure provides a method of generating, distributing, transferring and authorizing a digital product with copyright protection, by encrypting and protecting the digital product in the form of encrypted NFT. By distributing NFT and distributing equity token of the NFT, the flexibility of digital product distribution is enhanced. Together with the transfer and authorized use of digital product, the circulation of digital product in the whole industry line is promoted efficiently, conveniently and safely. The present disclosure improves the copyright and safety of the digital product. Users do not necessarily worry about privacy leakage by sharing data, and the maintenance cost of the industry chain of the digital product is reduced. Therefore sharing of the digital product can be expanded in scale under the copyright protection.
[00167] It should be noted that in this document, the terms “comprising” “including” or any other variation thereof are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that includes a list of elements includes not only those elements but also other elements not expressly listed, or elements inherent to such process, method, article, or system. Without further restrictions, an element defined by the statement “includes an” does not exclude the presence of another identical element in a process, method, article, or system including the element.
[00168] The aforementioned serial numbers regarding the embodiments of the present disclosure are for description only and do not represent the superiority and inferiority of the embodiments.
[00169] From the description of the above embodiments, it will be clear to those skilled in the art that the method of the above embodiments can be implemented by means of software plus the necessary general hardware platform, although it can also be implemented by hardware, but in many cases the former is a better embodiment. Based on this understanding, the technical solution of the present disclosure can be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, and includes several instructions to cause a terminal device (which can be a mobile phone, a computer, a server, a controlled terminal, or a network device, etc.) to perform the methods described in various embodiments of the present disclosure.
[00170] The above is only the preferred embodiment of the present disclosure and is not therefore limiting the scope of the present disclosure. Any equivalent structure or process change made by using the contents of the present specification and drawings, or directly or indirectly applied in other related technical fields, shall be included in the protection scope of the present disclosure.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2029246A NL2029246B1 (en) | 2021-09-24 | 2021-09-24 | Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2029246A NL2029246B1 (en) | 2021-09-24 | 2021-09-24 | Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
NL2029246B1 true NL2029246B1 (en) | 2022-08-12 |
Family
ID=80448658
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NL2029246A NL2029246B1 (en) | 2021-09-24 | 2021-09-24 | Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium |
Country Status (1)
Country | Link |
---|---|
NL (1) | NL2029246B1 (en) |
-
2021
- 2021-09-24 NL NL2029246A patent/NL2029246B1/en active
Non-Patent Citations (3)
Title |
---|
CRYPTOKITTIES TEAM: "CryptoKitties:Collectible BreedableBlockchainWHITEPA-PURR", 1 January 2018 (2018-01-01), pages 1 - 9, XP055922571, Retrieved from the Internet <URL:https://drive.google.com/file/d/1soo-eAaJHzhw_XhFGMJp3VNcQoM43byS/view> [retrieved on 20220518] * |
ISHIDA TATSURO ET AL: "Tokenizing and Managing the Copyrights of Digital Content on Blockchains", 2019 IEEE 8TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), IEEE, 15 October 2019 (2019-10-15), pages 170 - 172, XP033726314, DOI: 10.1109/GCCE46687.2019.9015595 * |
WILLIAM ENTRIKEN ET AL: "EIP 721: ERC-721 Non-Fungible Token Standard", ETHEREUM IMPROVEMENT PROPOSALS, NO. 721, 24 January 2018 (2018-01-24), https://github.com/ethereum/eips, XP055723345, Retrieved from the Internet <URL:https://eips.ethereum.org/EIPS/eip-721> [retrieved on 20200818] * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yuan et al. | Shadoweth: Private smart contract on public blockchain | |
JP6640320B1 (en) | Token management system and token management method | |
JP3216607B2 (en) | Digital work distribution system and method, digital work reproduction apparatus and method, and recording medium | |
CN102592069B (en) | Apparatus and method for managing digital rights through hooking a kernel native API | |
JP2020503579A (en) | Blockchain-based method and system for specifying recipients of electronic communication | |
JP2005536951A (en) | Apparatus, system, and method for securing digital documents in a digital device | |
TW486902B (en) | Method capable of preventing electronic documents from being illegally copied and its system | |
MXPA06001252A (en) | Flexible licensing architecture in content rights management systems. | |
CN102073826A (en) | System and method for digital copyright management using lightweight digital watermark adding component | |
CA3157920A1 (en) | Controlling access to secured data in multi-system exchange environments | |
WO2023030450A1 (en) | Data sharing method and electronic device | |
CN110213251B (en) | Method for anonymously reporting reward distribution, method for obtaining reward, equipment and storage medium | |
CN109344566A (en) | A kind of copyright managing method based on block chain, device and equipment | |
JP5399400B2 (en) | Digital content counting system and method | |
CN101783807A (en) | System and method for digital rights management using a standard rendering engine | |
Sahoo et al. | Traceability and ownership claim of data on big data marketplace using blockchain technology | |
TWI622949B (en) | Know your customer (kyc) data marking dispute relief system with multiple secret key and method thereof | |
WO2020156400A1 (en) | Digital artwork display device, management method, and electronic device | |
CN106233292A (en) | Synthesis document access | |
KR20210037274A (en) | Apparatus and method for managing contents | |
WO2019082442A1 (en) | Data registration method, data decoding method, data structure, computer, and program | |
TW201913529A (en) | Confirmation system based on blockchain smart contract and method thereof | |
CN110766548A (en) | Block chain based information processing method and device, storage medium and electronic equipment | |
NL2029246B1 (en) | Method, system of generating, distributing, transferring, and authorizing digital product, and storage medium | |
US20230012276A1 (en) | System, Method, and Apparatus for Decentralized E-Commerce |