WO2022220062A1 - アートワーク管理方法、コンピュータ、及びプログラム - Google Patents
アートワーク管理方法、コンピュータ、及びプログラム Download PDFInfo
- Publication number
- WO2022220062A1 WO2022220062A1 PCT/JP2022/014311 JP2022014311W WO2022220062A1 WO 2022220062 A1 WO2022220062 A1 WO 2022220062A1 JP 2022014311 W JP2022014311 W JP 2022014311W WO 2022220062 A1 WO2022220062 A1 WO 2022220062A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- artwork
- document
- computer
- artist
- identifies
- Prior art date
Links
- 238000007726 management method Methods 0.000 title claims abstract description 29
- 238000000034 method Methods 0.000 claims description 42
- 230000008569 process Effects 0.000 claims description 37
- 238000012545 processing Methods 0.000 claims description 35
- 238000010586 diagram Methods 0.000 description 49
- 238000003860 storage Methods 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 6
- 238000001514 detection method Methods 0.000 description 6
- 230000004044 response Effects 0.000 description 6
- 238000012790 confirmation Methods 0.000 description 5
- 238000003825 pressing Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 3
- 238000013499 data model Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 230000005674 electromagnetic induction Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
Definitions
- the present invention relates to artwork management methods, computers, and programs.
- SSI Self-Sovereign Identity
- ID a decentralized identity
- IPFS InterPlanetary File System
- Non-Patent Document 1 describes standards for DIDs and DID documents.
- VC Verifiable Credentials
- VC is information containing an electronic signature obtained by encrypting the hash value of information to be certified using the issuer's private key. The person who receives the VC together with the information to be certified derives the hash value of the received information, decrypts the electronic signature with the issuer's public key, and compares the derived hash value with the decrypted electronic signature. , to verify the authenticity of the information received.
- Non-Patent Document 2 describes the VC standard.
- one of the objects of the present invention is to provide an artwork management method, a computer, and a program that can appropriately manage artwork by SSI.
- An artwork management method is a computer-executed artwork management method, wherein the computer receives a request for use of a first artwork, and the computer receives the first artwork. and a second DID that is a DID that identifies a first user requesting use of the first artwork. It is a method of managing the generated artwork.
- a computer receives a request for use of a first artwork, a first DID that identifies the first artwork, and a first DID that requests use of the first artwork.
- a computer that generates a first DID document that is a DID document that includes a second DID that is a DID that identifies one user.
- the program according to the present invention causes a computer to receive a request for use of a first artwork, and to provide a first DID that is a DID that identifies the first artwork and use of the first artwork.
- artwork can be appropriately managed by SSI.
- FIG. 1 is a diagram showing the configuration of an artwork management system 1 according to this embodiment
- FIG. 3 is a diagram showing an example of the hardware configuration of an artist terminal 3 and a web server 4
- FIG. FIG. 4 is a diagram showing the configuration of biometric signature data
- 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 in which artwork 1 is to be registered.
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 in which artwork 1 is to be registered.
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 in which artwork 1 is to be registered.
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 in which artwork 1 is to be registered.
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 in which artwork 1 is to be registered.
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 in which artwork 1 is to be registered.
- FIG. 10 is a sequence diagram showing processing related to registration of a new user;
- FIG. 10 is a sequence diagram showing a process for registering artwork 1;
- FIG. 10 is a sequence diagram showing a process for registering artwork 1;
- (a) is a diagram showing a configuration example of a DID document of artwork 1
- (b) is a diagram showing the contents of a VC for artwork 1.
- FIG. 10 is a flow diagram showing a flow of processing executed by a computer that receives artwork data of artwork 1 and VC via SNS or a sales site;
- 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 for applying for use of artwork 1.
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 for applying for use of artwork 1.
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 that has received an application for using artwork 1.
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 that has received an application for using artwork 1.
- FIG. 10 is a flow diagram showing a flow of processing executed by a computer that receives artwork data of artwork 1 and VC via SNS or a sales site;
- 3 is a diagram showing an example of a screen of
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 for applying for use of artwork 1.
- FIG. 4 is a diagram showing an example of a request list screen displayed by a web application 3a of an artist 2 who is an applicant as a result of processing performed by a web server 4.
- FIG. 10 is a sequence diagram showing processing related to application for use of artwork 1;
- FIG. 10 is a sequence diagram showing processing related to application for use of artwork 1;
- (a) is a diagram showing a configuration example of a DID document of a project, and
- (b) is a diagram showing the contents of a VC for the project.
- FIG. 4 is a flow diagram showing the flow of processing performed by a computer that receives a project's DID document and VC via an SNS or sales site;
- 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 for registering an artwork 2.
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 for registering an artwork 2.
- FIG. 3 is a diagram showing an example of a screen of a web application 3a displayed on the display of an artist terminal 3 for registering an artwork 2.
- FIG. 10 is a sequence diagram showing a process for registering artwork 2;
- FIG. 10 is a sequence diagram showing a process for registering artwork 2;
- FIG. 10 is a sequence diagram showing a process for registering artwork 2;
- FIG. 10 is a sequence diagram showing a process for registering artwork 2;
- FIG. 10 is a sequence diagram showing a process for registering artwork 2;
- FIG. 10 is a sequence diagram showing a process for registering artwork 2;
- FIG. 10 is a sequence diagram showing a process for registering artwork 2;
- (a) is a diagram showing a configuration example of a DID document for artwork 2
- (b) is a diagram showing the contents of a VC for artwork 2
- (c) is an updated project Fig. 3 shows a DID document;
- FIG. 1 is a diagram showing the configuration of an artwork management system 1 according to this embodiment.
- the artwork management system 1 has a configuration in which a plurality of artist terminals 3, a web server 4, a distributed file system 5, and a blockchain network 6 are interconnected via a network 2. have.
- FIG. 2 is a diagram showing an example of the hardware configuration of the artist terminal 3 and the web server 4.
- the artist terminal 3 and the web server 4 can each be configured by a computer 100 having the illustrated configuration.
- the web server 4 may be configured by combining a plurality of computers 100 .
- the computer 100 includes a CPU (Central Processing Unit) 101, a storage device 102, an input device 103, an output device 104, and a communication device 105.
- CPU Central Processing Unit
- the CPU 101 is a device that controls each part of the computer 100 and reads and executes various programs stored in the storage device 102 .
- Each process described later with reference to FIGS. 3 to 31 is implemented by CPU 101 of artist terminal 3 or web server 4 executing a program stored in storage device 102 .
- the programs executed by the CPU 101 of the artist terminal 3 include the web application 3a shown in FIG.
- the storage device 102 includes a main storage device such as a DRAM (Dynamic Random Access Memory) and an auxiliary storage device such as a hard disk. serves to store data used by programs in a main storage device.
- a main storage device such as a DRAM (Dynamic Random Access Memory)
- an auxiliary storage device such as a hard disk. serves to store data used by programs in a main storage device.
- the input device 103 is a device that receives a user's input operation and supplies it to the CPU 101, and includes, for example, a keyboard, a mouse, and a touch detection device.
- the touch detection device is a device including a touch sensor and a touch controller, and is used to detect pen input or touch input.
- a pen P shown in FIG. 1 is an electronic pen used to perform pen input to the touch detection device of the artist terminal 3 .
- Pen input by the pen P is realized by, for example, an active electrostatic method or an electromagnetic induction method.
- the output device 104 is a device that outputs the processing results of the CPU 101 to the user, and includes, for example, a display and a speaker.
- a communication device 105 is a device for communicating with an external device, and transmits and receives data according to instructions from the CPU 101 .
- Each artist terminal 3 and web server 4 use this communication device 105 to communicate with other devices, systems, networks, etc. including the illustrated distributed file system 5 and blockchain network 6 .
- Each of the plurality of artist terminals 3 performs the production of artwork, registration of the produced artwork with the web server 4, application for use of artwork produced by other artists, and input of biometric signature data to be described later.
- Each of the artwork and biometric signature data is digital data, and includes digital ink data (described later) generated by the artist performing pen input using the pen P to the input device 103 of the artist terminal 3. be done.
- FIG. 3 is a diagram showing the configuration of biometric signature data.
- Biometric signature data is data generated according to, for example, WILL (Wacom Ink Layer Language) or FSS (Forensic Signature Stream), and as shown in the figure, dynamic signature data, hash value of signed document, context information , and the additional information, the dynamic signature data, the hash value of the signed document, the hash value of the context information, the hash value of this hash value and the hash value of the additional information, and possible errors in the transmission and reception of this hash value. It contains a checksum for
- Dynamic signature data is digital ink data that includes a series of coordinate data that make up a line drawing. Each coordinate data is data indicating the position of the pen P detected by the touch detection device described above.
- the touch sensor includes a plurality of X electrodes each extending in the Y direction and arranged at equal intervals in the X direction, and a plurality of electrodes each extending in the X direction and arranged at equal intervals in the Y direction. and a plurality of Y electrodes.
- the touch controller receives the burst signals transmitted by the pen P at each of the plurality of X electrodes and the plurality of Y electrodes, thereby obtaining coordinates indicating the position of the pen P. Get data.
- the touch controller sequentially sends a signal to each of the plurality of X electrodes, receives this signal at each of the plurality of Y electrodes, and detects the amplitude change of the received signal. By doing so, coordinate data indicating the position of the pen P is acquired.
- the touch controller is configured to collect coordinate data at a frequency of, for example, 100 or 200 times per second.
- the hash value of the signed document is the hash value of the electronic data of the document (exhibition application form, contract, etc.) signed by the artist to generate the biometric signature data.
- a hash value is a value obtained by inputting target electronic data into a predetermined one-way hash function. This point is the same for other hash values to be described later.
- the context information includes the name data of the artist who signed the signature, the date and time of the signature, the purpose of the signature, the information of the touch detection device used for the signature (manufacturer name, model name, etc.), the information of the application used for the signature (application name , version information, etc.), operating system information (operating system name, version information, etc.) of the artist terminal 3, address information (IP address, MAC address, etc.) of the artist terminal 3, and the like. Additional information is dynamic signature data, hash values of signed documents, context information, and information that can be arbitrarily designated by the administrator of the artwork management system 1 .
- the web server 4 is a server that executes various processes for implementing artwork management.
- the various processes include a process of registering the artwork and its related data in the distributed file system 5 or the blockchain network 6, and a process of accepting an application for use of the artwork. Details of each process will be described later. Note that when the web server 4 is configured by connecting a plurality of computers 100 , various processes described later can be distributed to the plurality of computers 100 and executed.
- the distributed file system 5 is a network of multiple computers connected by peer-to-peer and configured to store arbitrary electronic data.
- a specific distributed file system 5 may be the interplanetary file system described above, or may be another type of distributed file system.
- electronic data stored within distributed file system 5 is identified by its hash value. That is, in the distributed file system 5, the hash value of the stored electronic data functions as the address information of the electronic data.
- a distributed file system 5 is used to store encrypted artwork and various DID documents. As will be described later, when artwork is managed by SSI, a DID is assigned to each artwork stored in the distributed file system 5, and owner information indicating the owner of the artwork is included in the DID document. , address information indicating the place where the actual artwork is placed, and license information (whether secondary creation is permitted, whether commercial use is permitted, etc.).
- the blockchain network 6 is a network of multiple computers connected by peer-to-peer and configured to record smart contract transactions on the blockchain.
- the blockchain network 6 is the Ethereum network. Recording of transactions on the blockchain is performed by several computers (hereinafter referred to as “miners”) connected to the blockchain network 6 .
- each block that makes up the blockchain includes a block header and data (transaction data) that indicates the specific contents of the transaction.
- the block header includes a Merkle root, which is data obtained by compressing the size of transaction data, a hash value of the previous block, and a nonce value, which is an arbitrary character string.
- the hash value of that block in order to connect a new block to the blockchain, the hash value of that block must satisfy a predetermined condition (for example, a value starting with "000").
- a miner who intends to record a block in the blockchain brute forcely finds a nonce value (mining) so that the hash value of the block header of that block satisfies the above-mentioned predetermined conditions.
- the miner that succeeds in discovering the nonce value earliest will link that block to the blockchain, completing the recording of the transaction on the blockchain.
- an artwork created without relying on other artwork hereinafter referred to as “artwork 1”, and the artist who created artwork 1 is referred to as “artist 1”) 14 to 23, and finally to FIGS. 24 to 31.
- artwork 2 an artwork created without relying on other artwork
- artist 2 the artist who created artwork 1
- FIGS. 24 to 31 the processing related to the registration of artwork created based on artwork 1 (hereinafter referred to as “artwork 2" and the artist who created artwork 2 is referred to as “artist 2" or “Hanako Hanako”) explain.
- FIG. 4 to 8 are examples of screens of the web application 3a displayed on the display of the artist terminal 3 where the artwork 1 is to be registered.
- the login screen shown in FIG. 4 is displayed by the web application 3a.
- the login screen includes an email address entry field 10, a password entry field 11, and a login button 12.
- FIG. Here, when the artist 1 enters the e-mail address and password pre-registered in the web application 3a into the e-mail address entry field 10 and the password entry field 11, respectively, and presses the login button 12, the web application 3a displays the screen shown in FIG. is displayed.
- the screen of the web application 3a displayed after login has a configuration in which a side menu is arranged on the left side.
- a side menu is arranged on the left side.
- a photo 13 and name 14 of the logged-in user a link 15 to the registered content screen, a link 16 to the request list screen, a link 17 to the transaction screen, a link 18 to the profile screen, and , a link 19 to the My Project screen is arranged.
- the Registered Contents screen is for managing artworks uploaded by logged-in users
- the Request List screen is for artwork usage applications (applications made by logged-in users and , and usage applications made to logged-in users)
- the transaction screen is a screen for managing the transaction ID obtained as a result of recording in the blockchain network 6.
- the profile screen is a screen for managing the information of the logged-in user (name, photo, email address, password, etc., hereinafter referred to as "user information"), and the My Project screen is generated by the logged-in user. This is a screen for managing the created project (described later).
- FIG. 5 shows the registered content screen when there is no registered content.
- a registration button 20 is displayed on the registered content screen in this case.
- FIG. 6 is a content registration screen displayed by the web application 3a that has detected that the registration button 20 in FIG. 5 has been pressed.
- the content registration screen includes a content name input field 21 , a file selection interface 22 , an artwork metadata input interface 23 , and a registration button 24 .
- the content name input field 21 is a text box for inputting the name of the artwork 1 arbitrarily named by the artist 1.
- "rider" is entered as the name of artwork 1.
- the selection interface 22 is an interface for selecting an artwork file that the artist 1 intends to register.
- the files selected here are image files such as jpg files and png files, and the artwork 1 is composed of one or more files selected here.
- the selection interface 22 is configured so that a folder containing a plurality of files can also be selected.
- FIG. 6 shows a state in which two images A1 and A2 are selected.
- Image A2 is, for example, a picture including a person
- image A1 is, for example, a partially enlarged image of image A2.
- the metadata input interface 23 is an interface for inputting metadata, which is information for describing the artwork 1. As a specific content of the metadata input here, as illustrated in FIG. , whether the artist 1 is the owner of the artwork 1), and various information about the license of the artwork 1. In the example of FIG. 6, the various types of information regarding this license include information indicating whether or not to set a collaborator license, information indicating whether or not to set a commercial license, and input based on the user's own thinking. Contains one or more pieces of information (unique IP settings).
- the web application 3a When the user presses the registration button 24, the web application 3a displays the signature window 25 shown in FIG.
- the signature window 25 has an interface for the artist 1 to input a handwritten signature using the pen P, and a confirmation button 26 .
- the web application 3a When the artist 1 who has entered the signature presses the confirmation button 26, the web application 3a generates the biometric signature data shown in FIG. 3 based on the entered signature, and then issues a registration request shown in FIG. Send to web server 4 .
- the web server 4 responds to this registration request by processing to register the artwork 1 in the distributed file system 5, generates the DID and DID document of the artwork 1, and sends the DID document to the distributed file system 5. While registering, the process of recording the DID in the blockchain network 6, the process of generating a VC for proving the authenticity of the artwork 1, and the process of embedding a watermark in each file that constitutes the artwork 1 are performed.
- FIG. 8 is a registration completion screen displayed by the web application 3a after a series of processing by the web server 4 is completed.
- the registration completion screen includes display columns 27 to 31 for displaying predetermined information and operation buttons 32 to 36 for executing predetermined operations.
- the display field 27 displays the DID of the artwork 1 recorded in the blockchain network 6 by the web server 4.
- a list of thumbnails of files that constitute the artwork 1 is displayed. By clicking on this thumbnail, Artist 1 can download the corresponding file.
- the file downloaded here is preferably a file with a watermark, which will be described later, but a file without a watermark may be downloaded.
- a display field 29 displays a content ID assigned when the web server 4 registers the artwork 1 in the distributed file system 5 .
- the content ID is a hash value of artwork data including each file and metadata that constitute the artwork 1 .
- the display column 30 displays the address of the artwork 1 in the distributed file system 5 . In a typical example, this address is the URL (Uniform Resource Locator) of the distributed file system 5 with a content ID. All or part of the medadata of the artwork 1 is displayed in the display column 31 .
- the operation button 32 is a push button for updating the artwork 1.
- the web application 3a that has detected that the operation button 32 has been pressed displays a screen for adding, changing, and deleting files that make up the artwork 1.
- the operation button 33 is a push button for changing ownership of the artwork 1 .
- the web application 3a that has detected that the operation button 33 has been pressed displays a screen for designating a new owner of the artwork 1.
- the operation button 34 is a push button for changing metadata of the artwork 1 .
- the web application 3 a that has detected that the operation button 34 has been pressed displays a screen for changing the metadata of the artwork 1 .
- the web application 3a transmits a registration request to the web server 4 again.
- the artwork 1 registered in the distributed file system 5 is changed, a new DID is recorded in the blockchain network 6, a new VC is issued, and new water is added to each file that constitutes the artwork 1.
- the mark will be embedded.
- the operation button 35 is a push button for uploading the artwork 1 to SNS (Social Networking Service). Further, the operation button 36 is a push button for uploading the artwork 1 to the sales site.
- the web application 3a that has detected that the operation button 35 or the operation button 36 has been pressed displays a screen for selecting the SNS or sales site to which the artwork 1 is to be uploaded. When the user selects a certain SNS or sales site on this screen, the web application 3a sends each file (watermark is embedded) and metadata. This makes it possible to securely disclose the information of the artwork 1 on the SNS or sales site.
- FIG. 9 is a sequence diagram showing processing for registering a new user.
- the web application 3a and the web server 4 first execute login processing using the login screen shown in FIG. 4 (step S1). It should be noted that if the e-mail address and password have not been registered in the web application 3a, a process of registering various types of user information including the combination of the e-mail address and password is also executed in step S1.
- the web server 4 determines whether or not the user's key pair (combination of public key and private key for public key cryptography; hereinafter the same) has been generated. If so, a new key pair is generated and stored (step S2).
- the web application 3a receives and stores the generated key pair from the web server 4 (step S3).
- the web server 4 generates and stores the DID of the user and the DID document containing all or part of the user information described above (step S4). Then, the generated DID document is registered in the distributed file system 5 (step S5), and a smart contract for recording the generated DID in the blockchain is issued to the blockchain network 6 (step S6). When the recording on the blockchain is completed, the blockchain network 6 issues a transaction ID. The web server 4 receives and stores this transaction ID (user's transaction ID) from the blockchain network 6 (step S7). The web server 4 also transmits the generated user's DID and DID document to the web application 3a (step S8). The web application 3a stores the received DID and DID document, uses the user's DID when generating a registration request for the artwork 1 described later, and uses the user's DID to generate the above-described profile screen. Use documentation.
- FIG. 10 and 11 are sequence diagrams showing the process of registering artwork 1.
- FIG. 10 the content registration screen shown in FIG. 6 is displayed by the web application 3a (step S10).
- the web application 3a displays the signature window 25 shown in FIG. 7, and transmits a registration request for the artwork 1 to the web server 4 (step S11).
- This registration request contains the DID of the artist 1 stored by the web application 3a in step S7 of FIG.
- Metadata of the work 1 (information including the name input in the content name input field 21 shown in FIG. 6 and each information input in the metadata input interface 23 shown in FIG. 6), and the metadata shown in FIG.
- Biometric signature data generated based on the signature entered with a pen in the signature window 25 and the electronic signature of artist 1 are included.
- FIG. 10 and subsequent figures exemplify "FSS" as biometric signature data, it is of course possible to use biometric signature data other than FSS.
- the web application 3a is configured to generate the electronic signature of the artist 1 by encrypting the hash value of the data (excluding the electronic signature) constituting the registration request with the user's private key.
- web server 4 Upon receiving the registration request for artwork 1, web server 4 first confirms the validity of the electronic signature and biometric signature data (steps S12 and S13).
- the validity of the electronic signature is confirmed by decrypting the electronic signature included in the registration request with the user's public key, deriving the hash value of the data (excluding the electronic signature) that constitutes the registration request, and This can be done by comparison.
- one or more pieces of dynamic signature data corresponding to the user DID included in the registration request are retrieved from a database that stores one or more pieces of dynamic signature data in association with the user DID. This may be done by retrieving and comparing with the dynamic signature data contained in the biometric signature data. If the validity of the biometric signature data is confirmed as a result of this comparison, the web server 4 replaces the dynamic signature data included in the registration request with the new dynamic signature data of the user in the database. preferably added to.
- the web server 4 generates and stores a key pair for artwork 1 (step S14).
- the private key included in the key pair generated here will be referred to as the "artwork private key”
- the public key will be referred to as the "artwork public key”.
- the web server 4 then encrypts the artwork data (data consisting of each file and metadata that make up the artwork 1) with the generated artwork secret key and registers it in the distributed file system 5 (step S15). to the web application 3a (step S17).
- the web server 4 generates and stores the DID of the artwork 1 and the DID document containing all or part of the metadata of the artwork 1 (step S18). Then, the generated DID document is registered in the distributed file system 5 (step S19), and a smart contract for recording the generated DID in the blockchain is issued to the blockchain network 6 (step S20). When the recording on the blockchain is completed, the blockchain network 6 issues a transaction ID. The web server 4 receives and stores this transaction ID (transaction ID of artwork 1) from the blockchain network 6 (step S21). The web server 4 also transmits the generated DID of the artwork 1 and the DID document to the web application 3a (step S22).
- FIG. 12(a) is a diagram showing a configuration example of the DID document of the artwork 1 generated by the web server 4 in step S18.
- the DID document of Artwork 1 can include information on owner, contributor, secondary creation, IP share, usage mode, signature, storage location, and public key.
- the owner is the user who holds ownership of artwork 1 (artist 1 in this case), and the contributor is the artist who contributed to the creation of artwork 1 (artist 1 in this case).
- the user's DID included in the registration request is set for both the owner and the contributor, but it may be possible for the user to individually specify them on the content registration screen shown in FIG.
- Information in the metadata included in the registration request is set for the secondary creation, IP share, and usage mode.
- the signature is set with a hash value of the biometric signature data included in the registration request (information indicating dynamic signature data included in the biometric signature data).
- the storage location is set to the address obtained when the web server 4 registers the artwork data in the distributed file system 5 in step S15.
- the public key is set to the artwork public key generated by the web server 4 in step S14.
- web server 4 generates a watermark based on the biometric signature data included in the registration request (or the dynamic signature data included therein) to compose artwork 1. embedded in each file to be used (step S23). Specifically, the biometric signature data or dynamic signature data itself may be used as the watermark, or the hash value of the biometric signature data or dynamic signature data may be used as the watermark. Then, the web server 4 stores each watermarked file in which the watermark is embedded in association with the DID of the artwork 1 (step S24), and transmits it to the web application 3a (step S25). Each file stored in step S24 is used when the file is displayed on the registration completion screen shown in FIG. 8, the artwork details screen shown in FIG. 14, which will be described later, and the like.
- the web server 4 replaces each file in the artwork data with a file with a watermark (step S26), and sends the hash value of the data consisting of the DID document of the artwork data and the artwork 1 to the web server 4. (hereinafter referred to as "publisher's private key") to generate an electronic signature (step S27). Then, a VC including the generated electronic signature and the transaction ID of the artwork 1 received from the blockchain network 6 is issued (step S28) and transmitted to the web application 3a (step S29).
- FIG. 12(b) is a diagram showing the contents of the VC for artwork 1.
- the VC includes the issue date, issuer, issuer's electronic signature, and transaction ID.
- the issue date is set with the date when the web server 4 issued the VC.
- Information (name, address, etc.) specifying the web server 4 that issued the VC is set in the issuer.
- the issuer's electronic signature is set to the electronic signature generated in step S27.
- the transaction ID is set to the transaction ID of the artwork 1 received from the blockchain network 6 .
- the web application 3a Upon receiving the VC from the web server 4, the web application 3a generates and displays the registration completion screen shown in FIG. 8 (step S30). This completes a series of registration processes.
- FIG. 13 is a flow chart showing the flow of processing executed by a computer that receives artwork data of artwork 1 and VC via SNS or a sales site.
- This computer may be the artist terminal 3 shown in FIG. 1, or may be another computer.
- a specific use of the VC of artwork 1 will be described below with reference to FIG.
- the computer acquires the VC of Artwork 1 together with the artwork data (one or more watermarked files and metadata that constitute Artwork 1) published on the SNS or sales site (step S40). Subsequently, the computer acquires the DID of artwork 1 from the blockchain network 6 based on the transaction ID contained in the VC (step S41), and further, based on the acquired DID of artwork 1, from the distributed file system 5 A DID document of artwork 1 is obtained (step S42).
- the computer derives the hash value of the artwork data acquired in step S40 and the data consisting of the DID document of artwork 1 acquired in step S42 (step S43). Also, based on the issuer information contained in the VC, the computer acquires the public key of the issuer who issued the VC (hereinafter referred to as the "issuer public key") (step S44), The electronic signature in the VC is decrypted using the public key of the person (step S45). Then, the hash value obtained by decryption is compared with the hash value derived in step S43 (step S46). As a result, if these hash values match, the authenticity of the published artwork data is confirmed. By performing verification by VC in this way, it becomes possible to confirm the authenticity of the published artwork data.
- the computer that verifies the VC acquires the DID document of the artwork 1 from the distributed file system 5, but the DID document is also published together with the artwork data of the artwork 1 on the SNS or sales site. You can do it.
- the hash value derivation in step S43 may use the published DID document, so there is no need to arrange the transaction ID of artwork 1 in the VC.
- FIG. 16 and 17 are examples of screens of the web application 3a displayed on the display of the artist terminal 3 that has received the application for using the artwork 1.
- FIG. 16 and 17 are examples of screens of the web application 3a displayed on the display of the artist terminal 3 that has received the application for using the artwork 1.
- the screen shown in FIG. 14 is an artwork detail screen displayed when artist 2 selects artwork 1 on the artwork list display screen.
- the artwork details screen includes display columns 40 to 45 for information about artwork 1, a request content input interface 46, and a request button 47.
- the display field 40 contains the owner information (photograph, name, etc.) of the artwork 1, the display field 41 contains the content name of the artwork 1, the display field 42 contains the DID of the artwork 1, and the display field 43 contains the DID of the artwork 1. DIDs of one or more users who are the owners of the artwork 1 are displayed, and information (photograph, name, etc.) of one or more users who are the contributors of the artwork 1 are displayed in the display field 44 . To display this information, the web server 4 obtains the DID document of artwork 1 from the DID of artwork 1, and also extracts the respective DID documents from the owner and contributor DIDs described therein. By acquiring, the data to be displayed in the display columns 40 to 44 are configured to be acquired. Also, in the display column 45, thumbnails of the watermarked files stored in step S24 of FIG. 11 are displayed.
- the request content input interface 46 is an interface for inputting the content of a request to the owner of artwork 1.
- the specific content of the request input here may include non-commercial license content, commercial license content, profit sharing rate proposal, and arbitrary sentences.
- Fig. 14 shows a state in which artist 2 has not yet logged into web application 3a.
- the web application 3a displays the login screen shown in FIG. 4 and causes the artist 2 to perform login processing.
- the web application 3a displays a request transmission screen shown in FIG.
- the request transmission screen is a screen displayed when the artist 2 is logged into the web application 3a, and therefore has a side menu on the left side, similar to FIG.
- the contents of the information displayed on the side menu are as described with reference to FIG.
- the contact button 49 is a push button for contacting the owner of artwork 1 separately from the usage application.
- the web application 3a detects that the contact button 49 has been pressed and displays an e-mail input screen. Send an email to the email address of
- communication means other than e-mail such as SNS. In that case, as part of the user information of the owner of the artwork 1, information about the SNS of the owner of the artwork 1 needs to be stored in advance.
- the send request button 48 is a push button for actually sending a request for use of artwork 1 to the owner of artwork 1.
- the web application 3a that has detected that the request transmission button 48 has been pressed displays a signature window 50 shown in FIG.
- This signature window 50 is an interface similar to the signature window 25 shown in FIG. be.
- the web application 3a When the artist 2 who has entered the signature presses the confirmation button 51, the web application 3a generates the biometric signature data shown in FIG. 3 based on the entered signature, and then submits the usage application shown in FIG. Send to web server 4 .
- the web server 4 processes to notify the owner of the usage application, acquires the content of agreement according to the approval result of the owner, and processes the DID and DID document of the project related to the usage application, which will be described later in detail. and register the DID document in the distributed file system 5, record the DID in the blockchain network 6, and generate a VC for proving the authenticity of the project.
- FIG. 17 shows the request list screen displayed by the web application 3a of the artist terminal 3 (the artist terminal 3 of the artist 1 who is the owner of the artwork 1) that has received the notification of the usage application (pressing the link 16 in the side menu).
- This is the screen displayed by In this example, one request for "rider” is displayed on the screen as a usage application received from another computer.
- the request ID is information for uniquely identifying a usage application, and is assigned by the web server 4 each time a usage application is transmitted.
- information other than these, such as information constituting the metadata of the artwork 1, may be displayed.
- the request ID is a hyperlink to the usage application details screen shown in FIG.
- the web application 3a displays the usage application details screen shown in FIG.
- the usage application details screen includes display columns 52 to 58, a permission button 59, a rejection button 60, and a contact button 61.
- the content name of artwork 1 is displayed in display field 52
- the DID of artwork 1 is displayed in display field 53
- the DID of the user who is the owner of artwork 1 is displayed in display field 54
- the artwork is displayed in display field 55.
- the display column 56 contains all or part of the metadata of the artwork
- the display column 57 contains the applicant's information (photo, name, etc.)
- the display column 58 displays the content of the request (information input to the request content input interface 46 shown in FIG. 15).
- the contact button 61 is a push button for contacting the applicant.
- the web application 3a detects that the contact button 61 has been pressed, it displays an e-mail input screen in the same way as when the contact button 49 shown in FIG. 15 is pressed, and presses the send button displayed on the screen.
- An e-mail is sent to the e-mail address of the owner of the artwork 1 in response to the user's pressing.
- other means of communication may be used in place of e-mail.
- the permission button 59 is a push button for accepting usage applications.
- the reject button 60 is a push button for rejecting the usage application.
- the web application 3a that has detected that any button has been pressed transmits information (permission or denial) according to the pressed button to the web server 4. FIG. Processing performed by the web server 4 according to this information will be described later.
- FIG. 19 is a diagram showing an example of a request list screen displayed by the web application 3a of the artist 2 who is the applicant as a result of the processing performed by the web server 4.
- the status displayed is "permitted" as a result of the usage application being permitted by the owner.
- a download button 62 for downloading each file constituting the artwork 1 is displayed near the request ID. The operation of the web application 3a when the user presses the download button 62 will be described later.
- FIGS. 20 and 21 are sequence diagrams showing the processing related to application for use of artwork 1.
- FIG. "Web application 1" shown in these figures indicates the web application 3a running on the artist terminal 3 of artist 1 who is the owner of artwork 1, and "web application 2" is the artist of artist 2 who is the applicant.
- a web application 3a running on the terminal 3 is shown.
- the web application 3a displays the request transmission screen shown in FIG. 15 (step S50).
- the web application 3a displays the signature window 50 shown in FIG. S51).
- the DID of artist 2 who is the applicant the DID of artwork 1, the DID of artist 1 who is the owner of artwork 1, and the DID of artist 1, which is the owner of artwork 1, are input to the request content input interface 46 shown in FIG. information, biometric signature data generated based on the signature entered in the signature window 50 shown in FIG. 16, and artist 2's electronic signature.
- the web application 3a generates the electronic signature of the artist 2 by encrypting the hash value of the data (excluding the electronic signature) constituting the usage application with the user's private key.
- the web server 4 that has received the application for use of artwork 1 first confirms the validity of the electronic signature and biometric signature data (steps S52 and S53). The details of each are the same as those described with reference to steps S12 and S13 in FIG.
- the web server 4 transmits a usage application to the web application 3a of the artist 1 who owns the artwork 1 (step S54).
- the web application 3a that has thus received the usage application displays the received usage application in the request list screen as shown in FIG. is displayed (step S55).
- the artist 1 presses the permission button 59 the information indicating "permit” is sent to the web server 4, and when the artist 1 presses the reject button 60, the information indicating "rejection” is sent to the web server 4. (step S56).
- the web server 4 determines whether the information (owner's reply) received from the web application 3a of the owner of the artwork 1 is permission or denial (step S57). Information indicating refusal is transmitted to the web application 3a of a certain artist 2. In this case, on the request list screen shown in FIG. 19, "rejected" is displayed in the status column of the corresponding usage application. On the other hand, in the case of permission, the web server 4 transmits the content agreed upon between the applicant and the owner (in principle, the information entered in the request content input interface 46 shown in FIG. 15; however, the applicant and the owner may be changed later by ) is acquired (step S58).
- the web server 4 newly sets a project related to the usage application, generates and stores the DID and DID document of the set project (step S59). Then, the generated DID document is registered in the distributed file system 5 (step S60), and a smart contract for recording the generated DID in the blockchain is issued to the blockchain network 6 (step S61). When the recording on the blockchain is completed, the blockchain network 6 issues a transaction ID. The web server 4 receives and stores this transaction ID (project transaction ID) from the blockchain network 6 (step S62). The web server 4 also transmits the generated DID of the project and the DID document to the applicant's web application 3a (step S63).
- FIG. 22(a) is a diagram showing a configuration example of a project DID document generated by the web server 4 in step S59.
- a project DID document may include owner, signature, target work, and terms of use information.
- the owner is set with the DID of the applicant (artist 2 in this case) included in the usage application.
- a hash value of biometric signature data included in the usage application is set in the signature.
- the DID of the artwork 1 for which the use application is made is set for the target work.
- Information indicating the content of the agreement acquired in step S58 is set in the terms of use.
- the web server 4 generates an electronic signature by encrypting the hash value of the project's DID document using the issuer's private key (step S64). Then, a VC (verifiable certificate) containing the generated electronic signature and the transaction ID of the project received from the blockchain network 6 is issued (step S65) and transmitted to the applicant's web application 3a (step S66 ).
- VC verifiable certificate
- FIG. 22(b) is a diagram showing the contents of the VC for the project.
- This VC also includes the issue date, issuer, issuer's electronic signature, and transaction ID, like the VC of artwork 1 shown in FIG. 12(b).
- the setting contents of the issue date, issuer, and issuer's electronic signature are the same as those of the artwork 1 VC.
- the transaction ID is set to the transaction ID of the project received from the blockchain network 6 .
- a project's VC may not include a transaction ID.
- the web application 3a that has received the project VC displays the request list screen shown in FIG. 19 (step S67). In this case, "permitted” is displayed in the status column of the corresponding usage application.
- the web application 3a that has detected that the download button 62 has been pressed on the request list screen shown in FIG. View the download page for each file you want. As a result, artist 2 who is the applicant can use each piece of information.
- FIG. 23 is a flow diagram showing the flow of processing executed by a computer that receives a project's DID document and VC via SNS or sales site.
- This computer may be the artist terminal 3 shown in FIG. 1, or may be another computer.
- a specific use of the project VC will be described below with reference to FIG.
- the computer acquires the VC of the project along with the DID document of the project published on the SNS or sales site (step S70). The computer then derives the hash value of the obtained DID document (step S71). The computer also obtains the issuer public key based on the issuer information contained in the VC (step S72), and decrypts the electronic signature in the VC using the obtained issuer public key (step S73). Then, the hash value obtained by decryption is compared with the hash value derived in step S74 (step S74). As a result, if these hash values match, the authenticity of the published DID document (and the agreement contained therein) has been confirmed. By performing verification by the VC in this way, it is possible to confirm the authenticity of the content agreed upon between the owner of the artwork 1 and the applicant who applied for use.
- 24 to 26 are examples of screens of the web application 3a displayed on the display of the artist terminal 3 where the artwork 2 is to be registered.
- the web application 3a displays the above-described my project screen.
- web application 3a displays a content registration screen shown in FIG.
- the content registration screen shown in FIG. 24 includes a content name input field 70, an original work display field 71, a file selection interface 72, an artwork metadata input interface 73, and a registration button 74.
- the content name input field 70 is a text box for inputting the name of the artwork 2 arbitrarily named by the user.
- “rider” which is the same as the artwork 1, is entered in the content name input field 70, but a name different from the name of the artwork 1 may be entered.
- the original work display field 71 displays information (content name, content ID, thumbnail, etc.) indicating the target work of the project (hereinafter referred to as "original work").
- the selection interface 72 is an interface for selecting the artwork file that the user intends to register.
- the file selected here is, for example, an image file such as a jpg file or a png file, or a folder containing a plurality of files, similar to the selection interface 22 shown in FIG. FIG. 24 shows a state in which one folder F1 and one image B1 are selected.
- Image B1 is, for example, a 3D model of a person included in image A2.
- Folder F1 may contain, for example, one or more image files that constitute textures (3D textures) used for displaying image B1.
- Each file in folder F1 constitutes artwork 2 together with image B1.
- the metadata input interface 73 is an interface for inputting metadata that is information for describing the artwork 2. As will be described later, since Artwork 2 is shared with the owner of Artwork 1, some metadata cannot be edited here. On the other hand, it is possible to input other metadata, and FIG. 24 shows the content of the contribution by artist 2 and the IP setting as an example of such metadata.
- the web application 3a When the user presses the registration button 74, the web application 3a displays the signature window 75 shown in FIG.
- the signature window 75 is an interface similar to the signature window 25 shown in FIG. 7 and the signature window 50 shown in FIG. 76.
- the web application 3a When the user who has entered the signature presses the confirmation button 76, the web application 3a generates the biometric signature data shown in FIG. 3 based on the entered signature, and then transmits the registration request shown in FIG. Send to server 4.
- the web server 4 responds to this registration request by processing to register the artwork 2 in the distributed file system 5, generates the DID and DID document of the artwork 2, and sends the DID document to the distributed file system 5. While registering, the process of recording the DID in the blockchain network 6, the process of generating a VC for proving the authenticity of the artwork 2, and the process of embedding a watermark in each file that constitutes the artwork 2 are performed.
- FIG. 26 is a registration completion screen displayed by the web application 3a after the series of processes performed by the web server 4 is completed.
- the registration completion screen includes display fields 77 to 83 for displaying predetermined information and operation buttons 84 to 87 for executing predetermined operations.
- the display field 77 displays the DID of the artwork 2 recorded in the blockchain network 6 by the web server 4.
- a list of thumbnails of files constituting the artwork 2 is displayed. By clicking on this thumbnail, the user can download the corresponding file, but the file downloaded here will be a file with a watermark, which will be described later.
- a display column 79 displays information (content name, content ID, thumbnail, etc.) indicating the original work.
- information photograph, name, etc.) of one or more artists (artist 1 and artist 2 in this case) involved in the production of artwork 2 is displayed.
- the content ID given when the web server 4 registers the artwork 2 in the distributed file system 5 is displayed.
- the content ID is a hash value of artwork data including each file and metadata that constitute the artwork 2 .
- the display column 82 displays the address of the artwork 2 in the distributed file system 5 . All or part of the medadata of the artwork 2 is displayed in the display field 83 .
- the operation button 84 is a push button for updating the artwork 2.
- the web application 3a displays a screen for adding, changing, and deleting files that make up the artwork 2.
- the operation button 85 is a push button for changing the metadata of the artwork 2 .
- the web application 3 a that has detected that the operation button 85 has been pressed displays a screen for changing the metadata of the artwork 2 .
- the web application 3a transmits a registration request to the web server 4 again.
- the artwork 2 registered in the distributed file system 5 is changed, a new DID is recorded in the blockchain network 6, a new VC is issued, and new water is added to each file that constitutes the artwork 2.
- the mark will be embedded.
- the operation button 86 is a push button for uploading the artwork 2 to the SNS. Further, the operation button 87 is a push button for uploading the artwork 2 to the sales site. Details of these are the same as those of the operation buttons 35 and 36 described with reference to FIG.
- FIG. 27 is an artwork detail screen displayed when the user selects artwork 2 on the artwork list display screen (not shown).
- the artwork details screen includes display columns 88 to 94 for information on artwork 2, a request content input interface 95, and a request button 96.
- FIG. Details of the request content input interface 95 and the request button 96 are the same as those of the request content input interface 46 and the request button 47 described with reference to FIG.
- Information indicating the original work is displayed in the display column 89 .
- the content name of artwork 2 is displayed in a display field 90
- the DID of artwork 2 is displayed in a display field 91
- the owner of artwork 2 (the owner set in the DID document of artwork 2) is displayed in a display field 92.
- the DIDs of one or more users are shown in the display field 93 as one or more contributors of artwork 2 (contributors set in the DID document of artwork 2).
- Information (photograph, name, etc.) of each user is displayed.
- the method by which the web server 4 acquires these pieces of information is as described with reference to FIG.
- FIG. 28 to 30 are sequence diagrams showing the process of registering artwork 2.
- FIG. 28 the specific contents of the processes of steps S80 to S87 are the same as the processes of steps S10 to S17 shown in FIG. 10, except that artwork 1 is replaced with artwork 2.
- the metadata of the artwork 2 included in the registration request is generated by the web application 3a based on the metadata input interface 73 shown in FIG. 24 and the agreed contents set in the DID document of the corresponding project. data.
- the content ID and address of the artwork 2 are sent to the web application 3a (step S87).
- step S87 the web server 4 generates and stores the DID of the artwork 2 and the DID document including all or part of the metadata of the artwork 2 (step S88), and then steps S89 to S92. process.
- the specific contents of the processing of steps S89 to S92 are the same as the processing of steps S19 to S22 shown in FIG. 10, except that artwork 1 is replaced with artwork 2.
- the DID of the artwork 2 and the DID document are sent to the web application 3a (step S92).
- FIG. 31(a) is a diagram showing a configuration example of the DID document of artwork 2 generated by the web server 4 in step S88.
- the components of the DID document of artwork 2 are the same as those of the DID document of artwork 1 shown in FIG.
- both the DID of Artist 1, who owns Artwork 1, and the DID of Artist 2, who created Artwork 2 are set for the Owner along with their respective shares.
- the DID of artist 1 and the DID of artist 2 are set as the contributors together with their contribution contents.
- steps S93 to S99 the web server 4 performs steps S93 to S99.
- the specific contents of the processing of steps S93 to S99 are the same as the processing of steps S23 to S29 shown in FIG. 11, except that artwork 1 is replaced with artwork 2.
- each file with a watermark and the VC of artwork 2 are sent to web application 3a (steps S95 and S99).
- FIG. 31(b) is a diagram showing the contents of the VC for artwork 2.
- the VC for artwork 2 has the same configuration as the VC for artwork 1.
- the issuer's electronic signature is set by encrypting the hash value of the data consisting of the artwork data of artwork 2 and the DID document with the issuer's private key, and the transaction ID is set to the artwork 2 A transaction ID is set.
- the web server 4 adds the DID of the artwork 2 to the DID document of the corresponding project (step S100), as shown in FIG. Along with updating the DID document of the project, the DID document of the project stored in the distributed file system 5 is also updated (step S101). The web server 4 also transmits the updated DID document to the web application 3a (step S102).
- FIG. 31(c) is a diagram showing the DID document of the project updated in step S101.
- the updated DID document has a derivative work column added therein, in which the DID of artwork 2 is set. This allows derivative work generated according to a project to be managed within the project's DID document.
- the web server 4 then performs steps S103 to S105.
- the specific contents of the processing of steps S103 to S105 are the same as the processing of steps S64 to S66 shown in FIG.
- a new VC of the project is sent to the web application 3a (step S105).
- the web application 3a that has received the VC from the web server 4 generates and displays the registration completion screen shown in FIG. 26 (step S106), thereby completing a series of registration processing.
- the web server 5 in response to receiving the usage application for the artwork 1, transmits the DID of the artwork 1 and the usage of the artwork 1. Since the DID document of the project including the DID of the user who submitted the application is generated, the information regarding the artwork can be properly managed by the SSI.
- the artwork management system 1 by looking at the DID document of the project, it is possible to know the relationship between the artwork 1 which is the original work and the artwork 2 which is the work derived therefrom. can.
- the project DID document generated by the artwork management system 1 according to the present embodiment it is possible to manage the process of evolution from a picture of a person to a 3D model.
- the authenticity of the DID document of the project can be ensured by performing verification based on the electronic signature in the VC distributed together with the DID document of the project. Therefore, it is possible to appropriately manage information on evolution from artwork 1, which is an original work, to artwork 2 by the SSI.
- the SSI can also manage various information related to projects such as
- DID and DID documents were generated for the artwork as a whole in response to a registration request. may be generated. Also, the generated DID and DID document may be recorded in the blockchain network 6 and registered in the distributed file system 5 in the same manner as the DID and DID document for the artwork as a whole.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Tourism & Hospitality (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Primary Health Care (AREA)
- Computing Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Power Engineering (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
3 アーティスト端末
3a ウェブアプリ
4 ウェブサーバ
5 分散ファイルシステム
6 ブロックチェーンネットワーク
10 メールアドレス入力欄
11 パスワード入力欄
12 ログインボタン
13 写真
14 氏名
15~19 リンク
20,24,74 登録ボタン
21,70 コンテンツ名入力欄
22,72 ファイル選択インターフェイス
23,73 メタデータ入力インターフェイス
25,50,75 署名ウィンドウ
26,51,76 確認ボタン
27~31,40~45,52~58,77~83,88~94 表示欄
32~36,84~87 操作ボタン
46,95 リクエスト内容入力インターフェイス
47,96 リクエストボタン
48 リクエスト送信ボタン
49,61 連絡ボタン
59 許可ボタン
60 拒否ボタン
62 ダウンロードボタン
71 オリジナルワーク表示欄
100 コンピュータ
102 記憶装置
103 入力装置
104 出力装置
105 通信装置
A1,A2,B1 画像
F1 フォルダ
Claims (25)
- コンピュータによって実行されるアートワークの管理方法であって、
前記コンピュータは、第1のアートワークの利用のリクエストを受信し、
前記コンピュータは、前記第1のアートワークを識別するDIDである第1のDIDを含むとともに、前記第1のアートワークの利用をリクエストするユーザを識別するDIDである第2のDIDを含むDIDドキュメントである第1のDIDドキュメントを生成する、
アートワークの管理方法。 - 前記コンピュータは、前記第1のDIDドキュメントに基づいて第1の電子署名を生成し、
前記コンピュータは、前記第1の電子署名を含む第1の証明書を発行する、
請求項1に記載のアートワークの管理方法。 - 前記コンピュータは、前記第1のDIDドキュメントを生成するとともに、前記第1のDIDに関連づけられる第3のDIDを生成し、
前記コンピュータは、前記第3のDIDのブロックチェーンへの記録に伴い生成されるトランザクションIDを受信し、
前記第1の証明書は、前記第1の電子署名及び前記トランザクションIDを含む、
請求項2に記載のアートワークの管理方法。 - 前記第1のDIDドキュメントは、前記第1のアートワークのオーナーと、前記ユーザとの間で合意された内容を含む、
請求項1に記載のアートワーク管理方法。 - 前記コンピュータは、前記第1のアートワークに依拠して制作された第2のアートワークの登録要求を受信し、
前記コンピュータは、前記第2のアートワークを識別するDIDである第4のDIDを生成するとともに、前記第2のアートワークのアーティストを識別するDIDである第5のDIDを含むDIDドキュメントである第2のDIDドキュメントを生成する、
請求項1に記載のアートワークの管理方法。 - 前記第2のDIDドキュメントは、前記第1のアートワークのアーティストを識別するDIDである第6のDIDを含む、
請求項5に記載のアートワーク管理方法。 - 前記第2のDIDドキュメントは、前記第1のアートワークを制作したアーティスト、及び、前記第2のアートワークを制作したアーティストそれぞれの持ち分を示す情報を含む、
請求項6に記載のアートワーク管理方法。 - 前記第2のDIDドキュメントは、前記第1のアートワークを制作したアーティスト、及び、前記第2のアートワークを制作したアーティストそれぞれの寄与の内容を示す情報を含む、
請求項6又は7に記載のアートワーク管理方法。 - 前記コンピュータは、前記第2のアートワークを構成するアートワークデータ及び前記第2のDIDドキュメントからなるデータに基づいて第2の電子署名を生成し、
前記コンピュータは、前記第2の電子署名を含む第2の証明書を発行する、
請求項6乃至8のいずれか一項に記載のアートワーク管理方法。 - 前記第2の証明書は、前記第2のアートワークDIDをブロックチェーンに登録する場合に発行されるトランザクションIDを含む、
請求項9に記載のアートワーク管理方法。 - 前記登録要求は、ペン入力を行うことによって生成されたデジタルインクデータである動的署名データを含み、
前記第1のDIDドキュメントは、前記動的署名データを示す情報を含む、
請求項5乃至10のいずれか一項に記載のアートワーク管理方法。 - 前記コンピュータは、前記動的署名データに基づいてウォーターマークを生成し、前記第2のアートワークを構成する1以上のファイルのそれぞれに埋め込む、
請求項11に記載のアートワーク管理方法。 - 前記第1のアートワーク及び前記第2のアートワークはそれぞれ、ペン入力を行うことによって生成されたデジタルインクデータを含む、
請求項5乃至12のいずれか一項に記載のアートワーク管理方法。 - 第1のアートワークの利用のリクエストを受信し、
前記第1のアートワークを識別するDIDである第1のDIDを含むとともに、前記第1のアートワークの利用をリクエストするユーザを識別するDIDである第2のDIDを含むDIDドキュメントである第1のDIDドキュメントを生成する、
コンピュータ。 - 前記第1のDIDドキュメントに基づいて第1の電子署名を生成し、
前記コンピュータは、前記第1の電子署名を含む第1の証明書を発行する、
請求項14に記載のコンピュータ。 - 前記第1のDIDドキュメントを生成するとともに、前記第1のDIDに関連づけられる第3のDIDを生成し、
前記第3のDIDのブロックチェーンへの記録に伴い生成されるトランザクションIDを受信し、
前記第1の証明書は、前記第1の電子署名及び前記トランザクションIDを含む、
請求項15に記載のコンピュータ。 - 前記第1のDIDドキュメントは、前記第1のアートワークのオーナーと、前記ユーザとの間で合意された内容を含む、
請求項14に記載のコンピュータ。 - 前記第1のアートワークに依拠して制作された第2のアートワークの登録要求を受信し、
前記第2のアートワークを識別するDIDである第4のDIDを生成するとともに、前記第2のアートワークのアーティストを識別するDIDである第5のDIDを含むDIDドキュメントである第2のDIDドキュメントを生成する、
請求項14に記載のコンピュータ。 - 前記第2のDIDドキュメントは、前記第1のアートワークのアーティストを識別するDIDである第6のDIDを含む、
請求項18に記載のコンピュータ。 - コンピュータに、
第1のアートワークの利用のリクエストを受信し、
前記第1のアートワークを識別するDIDである第1のDIDを含むとともに、前記第1のアートワークの利用をリクエストするユーザを識別するDIDである第2のDIDを含むDIDドキュメントである第1のDIDドキュメントを生成する、
処理を実行させるためのプログラム。 - 前記コンピュータに、
前記第1のDIDドキュメントに基づいて第1の電子署名を生成し、
前記コンピュータは、前記第1の電子署名を含む第1の証明書を発行する、
処理を実行させるための請求項20に記載のプログラム。 - 前記コンピュータに、
前記第1のDIDドキュメントを生成するとともに、前記第1のDIDに関連づけられる第3のDIDを生成し、
前記第3のDIDのブロックチェーンへの記録に伴い生成されるトランザクションIDを受信する処理を実行させ、
前記第1の証明書は、前記第1の電子署名及び前記トランザクションIDを含む、
請求項21に記載のプログラム。 - 前記第1のDIDドキュメントは、前記第1のアートワークのオーナーと、前記ユーザとの間で合意された内容を含む、
請求項20に記載のプログラム。 - 前記コンピュータに、
前記第1のアートワークに依拠して制作された第2のアートワークの登録要求を受信し、
前記第2のアートワークを識別するDIDである第4のDIDを生成するとともに、前記第2のアートワークのアーティストを識別するDIDである第5のDIDを含むDIDドキュメントである第2のDIDドキュメントを生成する、
処理を実行させるための請求項20に記載のプログラム。 - 前記第2のDIDドキュメントは、前記第1のアートワークのアーティストを識別するDIDである第6のDIDを含む、
請求項24に記載のプログラム。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2022546706A JP7180038B1 (ja) | 2021-04-06 | 2022-03-25 | アートワーク管理方法、コンピュータ、及びプログラム |
CN202280022914.0A CN117043774A (zh) | 2021-04-06 | 2022-03-25 | 艺术品管理方法、计算机及程序 |
EP22787987.1A EP4296876A4 (en) | 2021-04-06 | 2022-03-25 | METHOD FOR MANAGING ILLUSTRATIONS, COMPUTER AND PROGRAM |
JP2022183495A JP2023143661A (ja) | 2021-04-06 | 2022-11-16 | アートワークの管理方法、コンピュータ、及びプログラム |
US18/461,381 US20230418984A1 (en) | 2021-04-06 | 2023-09-05 | Artwork managing method, computer, and program |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2021064893 | 2021-04-06 | ||
JP2021-064893 | 2021-04-06 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/461,381 Continuation US20230418984A1 (en) | 2021-04-06 | 2023-09-05 | Artwork managing method, computer, and program |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022220062A1 true WO2022220062A1 (ja) | 2022-10-20 |
Family
ID=83640610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2022/014311 WO2022220062A1 (ja) | 2021-04-06 | 2022-03-25 | アートワーク管理方法、コンピュータ、及びプログラム |
Country Status (5)
Country | Link |
---|---|
US (1) | US20230418984A1 (ja) |
EP (1) | EP4296876A4 (ja) |
JP (2) | JP7180038B1 (ja) |
CN (1) | CN117043774A (ja) |
WO (1) | WO2022220062A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024090530A1 (en) * | 2022-10-26 | 2024-05-02 | Nec Corporation | Decentralized identity management apparatus, decentralized identity management system, decentralized identity management method, and decentralized identity management storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210075774A1 (en) * | 2019-09-05 | 2021-03-11 | Microsoft Technology Licensing, Llc | Control of the delegated use of did-related data |
WO2021090838A1 (ja) * | 2019-11-08 | 2021-05-14 | 株式会社ワコム | アートワークの取引方法及び取引装置、並びに、プログラム |
US20210312073A1 (en) * | 2020-09-04 | 2021-10-07 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, and devices |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA3001899C (en) * | 2015-10-16 | 2023-07-18 | Syngrafii Inc. | System and method for providing authentic signatures on demand |
CN107679045B (zh) * | 2016-08-01 | 2021-08-31 | 华为技术有限公司 | 版权授权管理方法及系统 |
-
2022
- 2022-03-25 CN CN202280022914.0A patent/CN117043774A/zh active Pending
- 2022-03-25 WO PCT/JP2022/014311 patent/WO2022220062A1/ja active Application Filing
- 2022-03-25 EP EP22787987.1A patent/EP4296876A4/en active Pending
- 2022-03-25 JP JP2022546706A patent/JP7180038B1/ja active Active
- 2022-11-16 JP JP2022183495A patent/JP2023143661A/ja active Pending
-
2023
- 2023-09-05 US US18/461,381 patent/US20230418984A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210075774A1 (en) * | 2019-09-05 | 2021-03-11 | Microsoft Technology Licensing, Llc | Control of the delegated use of did-related data |
WO2021090838A1 (ja) * | 2019-11-08 | 2021-05-14 | 株式会社ワコム | アートワークの取引方法及び取引装置、並びに、プログラム |
US20210312073A1 (en) * | 2020-09-04 | 2021-10-07 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, and devices |
Non-Patent Citations (3)
Title |
---|
"Decentralized Identifiers (DIDs) v1.0", WORLD WIDE WEB CONSORTIUM, 26 March 2021 (2021-03-26), Retrieved from the Internet <URL:"https://www.w3.org/TR/did-core/> |
"Verifiable Credentials Data Model 1.0", WORLD WIDE WEB CONSORTIUM, 26 March 2021 (2021-03-26), Retrieved from the Internet <URL:https://www.w3.org/TR/vc-data-model/> |
See also references of EP4296876A4 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024090530A1 (en) * | 2022-10-26 | 2024-05-02 | Nec Corporation | Decentralized identity management apparatus, decentralized identity management system, decentralized identity management method, and decentralized identity management storage medium |
Also Published As
Publication number | Publication date |
---|---|
JP2023143661A (ja) | 2023-10-06 |
JP7180038B1 (ja) | 2022-11-29 |
EP4296876A4 (en) | 2024-04-24 |
CN117043774A (zh) | 2023-11-10 |
JPWO2022220062A1 (ja) | 2022-10-20 |
US20230418984A1 (en) | 2023-12-28 |
EP4296876A1 (en) | 2023-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6961818B2 (ja) | データ共有方法、クライアント、サーバ、コンピューティングデバイス、及び記憶媒体 | |
US11049205B2 (en) | System and method for electronically providing legal instrument | |
TWI714843B (zh) | 用於具有分散式共識之分散式系統中之契約資料之存取控制方法及其契約產生器及驗證伺服器 | |
KR102144302B1 (ko) | 저작권 관리 방법 및 시스템 | |
JP7007985B2 (ja) | 鍵を有するリソースロケーター | |
US20190182042A1 (en) | Methods and systems for recovering data using dynamic passwords | |
CN109690549B (zh) | 跨不同方来跟踪对象 | |
US20230108366A1 (en) | Systems for encryption using blockchain distributed ledgers | |
US11928105B2 (en) | System for tracking data associated with a digital token | |
US20160162897A1 (en) | System and method for user authentication using crypto-currency transactions as access tokens | |
CN113056741A (zh) | 基于分布式账本的简档验证 | |
US20160239683A1 (en) | System and method for securely storing files | |
JP6049908B2 (ja) | ファイル保管システム | |
JP6819748B2 (ja) | 情報処理装置、情報処理システム及びプログラム | |
CN111915298A (zh) | 区块链中生成和验证可链接环签名的方法及装置 | |
CN115730277A (zh) | 使用非同质化代币nft的补充数字内容访问控制 | |
WO2013149296A1 (en) | Digital rights management for three dimensional object production | |
JP2022548583A (ja) | ブロックチェーンのトランザクションを介するデータの共有 | |
US20230418984A1 (en) | Artwork managing method, computer, and program | |
CN117082026A (zh) | 一种数字资产的管理方法及相关装置 | |
US20150286843A1 (en) | Method and system for modular digital watermarking of electronic files | |
JP7171504B2 (ja) | 個人情報管理サーバ、個人情報管理方法及び個人情報管理システム | |
CN112954403B (zh) | 视频加密方法、装置、设备及存储介质 | |
WO2023080075A1 (ja) | Nft発行方法、コンピュータ、及びプログラム | |
WO2024009544A1 (ja) | 書類の署名者の証明に関する方法、コンピュータ、及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2022546706 Country of ref document: JP Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22787987 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202280022914.0 Country of ref document: CN Ref document number: 2022787987 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2022787987 Country of ref document: EP Effective date: 20230920 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |