WO2022259940A1 - ブロックチェーンに情報を登録するコンテンツ生成装置、コンテンツ生成装置の制御方法、及びプログラム - Google Patents
ブロックチェーンに情報を登録するコンテンツ生成装置、コンテンツ生成装置の制御方法、及びプログラム Download PDFInfo
- Publication number
- WO2022259940A1 WO2022259940A1 PCT/JP2022/022342 JP2022022342W WO2022259940A1 WO 2022259940 A1 WO2022259940 A1 WO 2022259940A1 JP 2022022342 W JP2022022342 W JP 2022022342W WO 2022259940 A1 WO2022259940 A1 WO 2022259940A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- information
- hash value
- image file
- blockchain
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 48
- 230000008569 process Effects 0.000 claims description 27
- 238000003384 imaging method Methods 0.000 abstract description 62
- 238000012545 processing Methods 0.000 abstract description 28
- 238000004364 calculation method Methods 0.000 description 31
- 230000005540 biological transmission Effects 0.000 description 30
- 238000004891 communication Methods 0.000 description 25
- 230000006870 function Effects 0.000 description 20
- 238000012790 confirmation Methods 0.000 description 17
- 238000010586 diagram Methods 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 7
- 238000012795 verification Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 3
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/002—Specific input/output arrangements not covered by G06F3/01 - G06F3/16
- G06F3/005—Input arrangements through a video camera
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Definitions
- the present invention relates to a content generation device that registers information in a blockchain, a control method for the content generation device, and a program.
- Blockchain technology can prevent tampering with digital data in a decentralized manner and at low cost.
- a management system using blockchain technology registers a hash value of content generated by a content generation device and metadata attached to the content as content information in the blockchain. This guarantees the authenticity of the content from the time it is generated (see Patent Document 1, for example).
- This technology makes it possible to acquire from this management system content that has not been processed or the like since it was created, and to publish the acquired content on the Internet, SNS, or the like.
- Patent Document 1 mentions a technique for registering content information in a blockchain.
- this technology has the problem that it is difficult for the user to operate the content generation device, check the content whose information has been registered in the blockchain, and organize it by registering it as a favorite or deleting it. ing.
- the present invention provides a content generation device, a control method for the content generation device, and a program that can easily confirm content whose information has been registered in the blockchain.
- the content generation apparatus of the present invention includes means for generating a hash value of content immediately after generating the content, and a management server for registering content information including the hash value in a blockchain, means for transmitting the content information; means for receiving a notification indicating that the process of registering the content information in the blockchain is completed; and according to the receipt of the notification, transmitting the content information to the blockchain and means for adding registered information indicating that the content has been registered to the content.
- FIG. 3 is a diagram for explaining functions of a management system that communicates with an imaging device as a content generation device according to an embodiment of the present invention
- FIG. 2 is a block diagram schematically showing the configuration of the imaging device of FIG. 1
- FIG. 2 is a flow chart showing a procedure of data transmission processing executed in the imaging device of FIG. 1
- 2 is a block diagram schematically showing the configuration of the management system of FIG. 1
- FIG. 5 is a diagram showing an example of the configuration of an image database in FIG. 4
- FIG. FIG. 2 is a flow chart showing a procedure of blockchain registration processing executed in the management system of FIG. 1
- FIG. 5 is a diagram showing an example of a block data structure of a block chain managed by a block chain management unit shown in FIG. 4;
- FIG. 4 is a block diagram schematically showing the configuration of the imaging device of FIG. 1
- FIG. 2 is a flow chart showing a procedure of data transmission processing executed in the imaging device of FIG. 1
- 2 is a block diagram
- 2 is a flow chart showing a procedure of image file transmission processing to an image publishing site executed by the management system of FIG. 1;
- 2 is a flow chart showing a procedure of authenticity determination processing executed in the management system of FIG. 1;
- 2 is a flow chart showing a procedure of registered information addition processing executed in the imaging apparatus of FIG. 1;
- the content generation device is not limited to an imaging device.
- the content generation device generates content such as a device that generates audio data of recorded voice, a device that generates image data such as an illustration image digitally drawn by a user, a device that generates music data composed by a user, etc. It may be another device that performs
- FIG. 1 is a diagram for explaining functions of a management system 101 that communicates with an imaging device 102 as a content generation device according to this embodiment.
- the management system 101 is a management server having a function of managing content acquired from an external device such as the imaging device 102 via the Internet or the like. Management system 101 is implemented by one or more computer devices. In the present embodiment, a configuration in which the management system 101 further communicates with and uses the blockchain peer-to-peer network 104 will be described, but the configuration is not limited to this, and other networks may be used.
- An image file contains image data and metadata.
- the image data is still image data or moving image data.
- the metadata includes image data attribute information indicating the photographer of the image data, the shooting time, the shooting location, the model of the imaging device, the setting values at the time of shooting, and the like.
- a hash value is a value obtained by executing a hash function on the generated image file.
- the hash value calculation detailed information is information that describes how to thin out the image data contained in the image file when the hash function is executed.
- the algorithm of the hash function to be used may be an initially set algorithm alone, or may be made so that one of a plurality of algorithms such as SHA256 and MD5 can be selected. In the latter case (selecting one of a plurality of algorithms), the hash value calculation detailed information also describes the algorithm used for hash value calculation. For example, when image data is hashed by algorithm SHA256, SHA256 repeatedly performs arithmetic processing on data by 64 bytes from the beginning until the end of the data to generate a hash value of 32 bytes (256 bits).
- the hash value calculation detailed information in this case can be expressed as "Algorithm, SHA256, Read, 64, Skip, 64” or the like using the CSV file format.
- the hash function can be executed every other frame.
- the hash value calculation detailed information in this case can be expressed as "Algorithm, SHA256, SkipFrame, 1," or the like using the CSV file format.
- the hash value calculation detailed information in this case can be expressed as "Algorithm, SHA256, SkipFrame, 1, Read, 64, Skip, 64” or the like using the CSV file format.
- the format of hash value calculation detailed information is not limited to the CSV file format.
- a widely used file format such as the JSON file format may be used, or a unique file format may be used.
- a hash value may be generated based on
- the management system 101 of this embodiment When the management system 101 of this embodiment receives an image file, a hash value, and hash value calculation detailed information from the imaging device 102 , it generates an authenticity assurance number that is a unique number within the management system 101 .
- the authenticity assurance number is an identification number for uniquely identifying the image file.
- the management system 101 generates image file information such as metadata, hash values, and detailed hash value calculation information, and transaction data including authenticity assurance numbers, and connects blocks in which the generated transaction data are written to the blockchain. do. Specifically, the management system 101 issues the generated transaction data and broadcasts it to one or more computers (nodes) participating in the blockchain peer-to-peer network 104 (step (2)). As a result, the transaction data is temporarily stored in the transaction pool, and verification is completed when the transaction data is approved by the miner. A block containing the transaction data is then created and appended to the end of the blockchain. As a result, the image file information is registered in the blockchain.
- the management system 101 After connecting the block in which the transaction data is written to the blockchain, the management system 101 stores (provides) the image file and the authenticity guarantee number in the image database 407 shown in FIG. 4, which will be described later. Then, the management system 101 transmits a registration completion notice indicating that the process of registering the image file information in the blockchain is completed to the imaging device 102 (step (3)).
- the management system 101 then allows the user (for example, a photographer or an image provider) to select an image file to be published on the image publishing site 103 from among a plurality of image files registered in the image database 407 (step (4)).
- the user can access the WEB page of the management system 101 from the communication device 105a operated by the user, and select an image file to be published on the image publishing site 103 on the WEB page.
- the management system 101 provides the image file selected by the user and the authenticity assurance number associated with the image file to the image publication site 103 (step (5)).
- the management system 101 notifies the communication device 105a that the image file selected by the user in step (4) can be made public on the image publication site 103.
- the image publishing site 103 performs display control so that the authenticity assurance number provided by the management system 101 together with the image file is displayed, for example, near the image file on the WEB page.
- the display position of the authenticity assurance number is just an example, and it may be displayed at a position where the viewer of the image publishing site 103 can recognize that it is the authenticity assurance number corresponding to the image file.
- a viewer of the image publishing site 103 may want to confirm (verify authenticity) whether or not the image file displayed on the WEB page of the image publishing site 103 has been tampered with since it was captured.
- the viewer first acquires (downloads) the image file and the associated authenticity assurance number from the image publication site 103 using the communication device 105b (step (6)).
- the viewer accesses the WEB page of the image publication site 103 from the communication device 105b, selects an image file published on the WEB page, and instructs download.
- the image publishing site 103 transmits the selected image file and authenticity guarantee number to the communication device 105b.
- the communication device 105b transmits the obtained image file and the authenticity assurance number together with a request to confirm the authenticity of the image file to the management system 101 (step (7)).
- the authenticity confirmation request is made by the viewer using the communication device 105b and attaching an image file obtained from the image publishing site 103 and an authenticity guarantee number to the input form provided by the management system 101.
- the authenticity confirmation request is not limited to the method of this embodiment.
- the management system 101 determines the authenticity of the image file for which the authenticity confirmation request is requested.
- the timing of authenticity determination is when the management system 101 receives a request to confirm the authenticity of the image data displayed on the image publication site 103 from the communication device 105b of the viewer of the image publication site 103. , but not limited to.
- management system 101 may periodically perform authenticity determinations based on image database 407 .
- the management system 101 displays the determination result of authenticity on the web page of the management system 101 or notifies the communication device 105b by e-mail (step (8)).
- FIG. 2 is a block diagram schematically showing the configuration of the imaging device 102 of FIG.
- the imaging device 102 is an electronic device having a camera function, such as a camera such as a digital camera or a digital video camera, or a mobile phone having a camera function, a computer with a camera, or the like.
- the imaging device 102 includes an MPU 201, a timing signal generation circuit 202, an imaging device 203, an A/D converter 204, a memory controller 205, a buffer memory 206, and an image display section 207.
- the imaging device 102 also includes a recording medium I/F 208 , a recording medium 209 , a hash value generation unit 210 and a communication unit 211 .
- the MPU 201 is a microcontroller for controlling the system of the imaging apparatus 102 such as an imaging sequence.
- the timing signal generation circuit 202 generates a timing signal required to operate the imaging element 203.
- the imaging element 203 is an imaging element such as a CCD or CMOS that receives light reflected by an object, converts the received light into an electrical signal (analog image data), and reads the signal to the A/D converter 204 .
- the A/D converter 204 converts the analog image data read from the image sensor 203 into digital image data.
- this digital image data is simply referred to as "image data”.
- the memory controller 205 controls the reading and writing of image files to the buffer memory 206, the refresh operation of the buffer memory 206, and the like.
- This image file is an image file generated by the MPU 201 as will be described later, in which metadata is added to image data. Details will be described later.
- the buffer memory 206 stores image files.
- the image display unit 207 displays image files stored in the buffer memory 206 .
- the recording medium 209 is, for example, a storage medium such as a memory card that can be inserted into and removed from the imaging device 102, and stores programs, image files, and the like.
- the hash value generation unit 210 executes a hash function on the image file stored in the buffer memory 206 to generate (calculate) a hash value.
- the hash value may be generated by the MPU 201 instead of the hash value generator 210 .
- a hash value may be generated by executing a hash function on image data instead of an image file.
- the communication unit 211 is connected to the Internet and transmits and receives data to and from external devices.
- FIG. 3 is a flowchart showing the procedure of data transmission processing executed in the imaging device 102 of FIG.
- the data transmission processing in FIG. 3 is realized by the MPU 201 of the imaging device 102 executing a program stored in the recording medium 209 or the like.
- the data transmission process in FIG. 3 starts when the imaging apparatus 102 receives a shooting start operation such as pressing a shooting button of the imaging apparatus 102 by a photographer.
- the MPU 201 drives a shutter (not shown) arranged on the subject side of the imaging element 203 in order to control the exposure time (step S301).
- the MPU 201 performs imaging processing for converting the light received from the subject that has passed through the open shutter of the imaging element 203 into an electrical signal (analog image data) (step S302).
- the MPU 201 applies image processing such as development and encoding to the electrical signal obtained by the imaging process (step S303). Thereby, image data is generated.
- the MPU 201 generates metadata including attribute information (photographer, photographing time, photographing location, photographing apparatus model, setting values at the time of photographing, etc.) when the photographing process for generating image data is executed. (step S304).
- attribute information photographer, photographing time, photographing location, photographing apparatus model, setting values at the time of photographing, etc.
- the MPU 201 controls the hash value generation unit 210 to execute a hash function on the binary data of the generated image file to generate a hash value (step S306).
- the hash value When generating the hash value (when calculating), the hash value may be generated while skipping part of the binary data of the image file.
- the MPU 201 When generating the hash value (when calculating), the hash value may be generated while skipping part of the binary data of the image file.
- the MPU 201 generates hash value calculation detailed information that records how the binary data of the image file is skipped (thinning method) (step S307).
- the MPU 201 controls the communication unit 211 to transmit the hash value and the image file to the management system 101 (step S308).
- the MPU 201 causes the image display unit 207 to display a warning notification (step S309).
- This warning notification is displayed on the image display unit 207 until the MPU 201 (imaging device 102) receives the registration completion notification from the management system 101, for example.
- This warning notification is, for example, a notification that calls the user's attention not to insert or remove the recording medium 209 until registration in the blockchain is completed.
- the imaging apparatus 102 when the imaging apparatus 102 performs shooting processing, not only is an image file including image data and metadata recorded on the recording medium 209, but also the image file and its hash value are stored. It is sent to the management system 101 . Further, when the hash value calculation detailed information is generated in step S307, the hash value calculation detailed information is also transmitted to the management system 101.
- FIG. 1 the hash value calculation detailed information is generated in step S307.
- FIG. 4 is a block diagram schematically showing the configuration of the management system 101 of FIG.
- the management system 101 is composed of one or more computers connected to a network.
- the management system 101 includes a control unit 400, a data reception unit 401, a data transmission unit 402, an authenticity guarantee number generation unit 403, and a transaction generation unit 404.
- the management system 101 also includes a block generation unit 405 , a blockchain management unit 406 , an image database 407 , a hash generation unit 408 and a hash comparison unit 409 .
- the control unit 400 controls the entire management system 101.
- the data receiving unit 401 receives various data from an external device. For example, the data receiving unit 401 receives a hash value, hash value calculation detailed information, and an image file from the imaging device 102 . Further, the data receiving unit 401 receives an image file and an authenticity assurance number for determining authenticity from the communication device 105b operated by the viewer of the image publishing site 103. FIG.
- the data transmission unit 402 transmits various data to the external device. For example, the data transmission unit 402 sends the image file selected to be published on the image publication site 103 and the corresponding authenticity guarantee number to the communication device 105a operated by the user (for example, the photographer or the image provider). Send. Further, the data transmission unit 402 transmits the authenticity determination result to the communication device 105b operated by the viewer who requested the authentication of the image file.
- the authenticity assurance number generation unit 403 generates an authenticity assurance number that is a unique number within the management system 101 when receiving the hash value and the image file from the imaging device 102 .
- the transaction generator 404 generates transaction data and broadcasts the generated transaction data to one or more computers (nodes) participating in the peer-to-peer network 104 of the blockchain.
- the transaction data includes a hash value received from the imaging device 102, an authenticity assurance number generated and associated when the hash value is received, and metadata included in the image file.
- the block generation unit 405 When the miner approves the broadcasted transaction data and completes its verification, the block generation unit 405 generates a block in which the transaction data is written, and connects the block to the blockchain.
- the blockchain management unit 406 manages blockchains that are also held by one or more computers (nodes) participating in the peer-to-peer network 104 of blockchains. In addition, the management system 101 and each node are synchronized so that the blockchains held by each node always have the same content.
- the image database 407 image files and authenticity assurance numbers corresponding to the image files are registered. Specifically, as shown in FIG. 5, the image database 407 is composed of a block ID 501, an authenticity guarantee number 502, and an image file name 503, which are linked to each other.
- the authenticity assurance number 502 is set with the authenticity assurance number corresponding to the image file.
- the file name of the image file received by the management system 101 from the imaging device 102 or the like is set in the image file name 503 .
- the configuration of the image database 407 is not limited to the configuration described above, and the image database 407 may include other items.
- the hash generation unit 408 executes a hash function on the image file transmitted from the communication device 105b of the user (viewer) who made the authenticity confirmation request when determining the authenticity. Generate a hash value.
- the hash comparison unit 409 acquires a block (described later) corresponding to the authenticity assurance number sent by the user who made the authenticity confirmation request from the blockchain managed by the blockchain management unit 406. Then, the hash comparison unit 409 acquires the hash value (image hash value) written in that block from the block chain. The hash comparison unit 409 compares the hash value acquired from the block and the hash value generated by the hash generation unit 408 to determine authenticity. If these two hash values are the same, the hash comparison unit 409 determines that the image file transmitted by the user who made the authenticity confirmation request has not been tampered with since its generation (it is true). On the other hand, if these two hash values are different, the hash comparison unit 409 determines that the image file transmitted by the user who made the authentication request has been tampered with (untrue/false) since its generation.
- an image file distributed from the image publishing site 103 to the communication device 105b may be tampered with, and the tampered image file may be sent to the management system 101 together with an authenticity confirmation request.
- the hash value generated by the hash generation unit 408 by executing the hash function on the image file is different from the hash value generated from the image file before tampering.
- the hash value stored in the blockchain cannot be changed by anyone. Therefore, when the above authentication request is made, the hash value generated for the image file by the hash generation unit 408 is the hash stored in the block corresponding to the authentication number of the authentication confirmation request in the block chain. does not match the value.
- FIG. 6 is a flowchart showing the steps of blockchain registration processing executed in the management system 101 of FIG.
- the block chain registration process of FIG. 6 is realized by the control unit 400 executing a program stored in a recording medium included in a computer that constitutes the management system 101.
- FIG. The block chain registration process of FIG. 6 is executed, for example, when the imaging apparatus 102 performs the data transmission process of FIG.
- hash value calculation detailed information is generated in step S307, and the hash value calculation detailed information is also sent to the management system 101 together with the hash value and the image file in step S308.
- the control unit 400 receives a hash value, hash value calculation detailed information, and an image file from the imaging device 102 (step S601). If the received data has been encrypted, the control unit 400 decrypts the received data. After that, the control unit 400 saves image file information such as a hash value, hash value calculation detailed information, and metadata included in the received image file in a RAM (not shown).
- control unit 400 controls the authenticity assurance number generation unit 403 to generate an authenticity assurance number for the received image file (step S602).
- control unit 400 registers the authenticity assurance number generated in step S602, and image file information such as the hash value, hash value calculation detailed information, and metadata stored in the RAM in step S601 in the block chain (step S603).
- control unit 400 first controls the transaction generation unit 404 to generate transaction data including an authenticity assurance number, a hash value, hash value calculation detailed information, and metadata.
- the controller 400 controls the transaction generator 404 to broadcast the transaction data to one or more computers (nodes) participating in the blockchain peer-to-peer network 104 .
- the block generation unit 405 When the miner approves the broadcasted transaction data and completes its verification, the block generation unit 405 generates a block in which the verified transaction data is written, and connects (registers) the block to the blockchain.
- control unit 400 issues a block ID corresponding to the block (step S604).
- the control unit 400 issues a value generated by executing the hash function twice on the header of the block as the block ID.
- the block ID is used to refer to the block, but there is no block ID field within the block.
- control unit 400 associates the issued block ID, the image file received in step S601, and the authenticity assurance number generated in step S602, and registers them in the image database 407 (step S605).
- control unit 400 transmits a registration completion notification indicating that the process of registering the image file information in the blockchain is completed to the imaging device 102 (step S606). After that, the blockchain registration process ends.
- FIG. 7 is a diagram showing an example of the block data structure of the blockchain managed by the blockchain management unit 406 of FIG.
- a blockchain is a database formed by connecting blocks in chronological order like a chain.
- a block 701 connected to the blockchain contains a hash 702 of a previous block, a nonce 703 and a transaction 704 .
- the previous block hash 702 is the hash value of the block connected to the blockchain immediately before block 701.
- a nonce 703 is a nonce value used for mining.
- a transaction 704 is transaction data generated by the transaction generation unit 404, and includes transaction type, image hash, authenticity assurance number, hash value calculation detailed information, and metadata.
- Transaction type is information that indicates the type of transaction.
- the internal structure of the transaction differs depending on the transaction type.
- An image hash is a hash value sent from the imaging device 102 to the management system 101 .
- the authenticity assurance number is an authenticity assurance number generated by the management system 101 when the image hash is transmitted from the imaging device 102 to the management system 101 .
- the hash value calculation detailed information is hash value calculation detailed information transmitted from the imaging device 102 to the management system 101 .
- Metadata is metadata included in an image file transmitted from the imaging device 102 to the management system 101 .
- FIG. 8 is a flow chart showing the procedure of image file transmission processing to the image publishing site 103 executed in the management system 101 of FIG.
- the image file transmission processing of FIG. 8 is also realized by the control unit 400 executing a program stored in a recording medium included in the computer that constitutes the management system 101.
- FIG. 8 for example, a user (for example, a photographer) selects one of a plurality of image files registered in the image database 407 using the communication device 105a, and the image of that image file is selected. It is executed when a transmission request to the public site 103 is made.
- This transmission request includes a block ID associated with the image file selected by the user in the image database 407 .
- control unit 400 receives the transmission request from the communication device 105a operated by the user through the data receiving unit 401 (step S801).
- control unit 400 acquires the image file that is the target of the transmission request and the authentication number of the image file from the image database 407 (step S802). Specifically, the image file and authenticity assurance number corresponding to the block ID included in the transmission request are obtained from the image database 407 .
- control unit 400 uses the data transmission unit 402 to transmit the acquired image file and authenticity guarantee number to the image publication site 103 (step S803).
- control unit 400 notifies the communication device 105a of the user, who is the source of the transmission request, that the image file that is the target of the transmission request can be made public on the image publication site 103.
- the control unit 400 registers the transmission information of the image file in the blockchain (step S804). Specifically, first, the control unit 400 causes the transaction generation unit 404 to generate transaction data including information (URL, etc.) representing the transmission destination of the authenticity assurance number, image file transmission information, image data, and authenticity assurance number. Generate. The controller 400 then broadcasts the transaction data to one or more computers (nodes) participating in the blockchain peer-to-peer network 104 at the transaction generator 404 . When the miner approves the broadcasted transaction data and completes its verification, the block generation unit 405 generates a block in which the verified transaction data is written, and connects the block to the blockchain. After that, the image file transmission process ends.
- information URL, etc.
- FIG. 9 is a flowchart showing the procedure of authenticity determination processing executed in the management system 101 of FIG.
- the authenticity determination process of FIG. 9 is also implemented by the control unit 400 executing a program stored in a recording medium included in a computer that constitutes the management system 101.
- FIG. Here, in the authenticity determination processing of FIG. , but not limited to.
- control unit 400 receives an authenticity confirmation request from the communication device 105b operated by the viewer using the data receiving unit 401 (step S901). At this time, the control unit 400 also receives the image file to be determined for authenticity and the authenticity guarantee number corresponding to the image file by the data receiving unit 401 .
- control unit 400 inquires of the image database 407 using the authenticity assurance number received in step S901 as a key, and acquires the block ID corresponding to the authenticity assurance number (step S902).
- control unit 400 accesses the block corresponding to the acquired block ID in the blockchain and acquires the hash value (image hash value) stored in the block (step S903).
- control unit 400 causes the hash generation unit 408 to execute a hash function on the image file received in step S901 (step S904). Thereby, the control unit 400 generates (acquires) a hash value using the hash generation unit 408 . At this time, the block corresponding to the obtained block ID is accessed among the plurality of blocks constituting the block chain, and the hash value calculation detailed information stored in the block is obtained. In step S904, a hash value is generated with reference to this hash value calculation detailed information.
- control unit 400 causes the hash comparison unit 409 to compare the image hash value acquired in step S903 with the hash value generated in step S904 (step S905).
- the control unit 400 determines whether the two hash values compared in step S905 match (step S906).
- step S906 determines that the image file received in step S901 is "true” indicating that the image file has not been tampered with since its generation (step S907). After that, the process proceeds to step S909.
- step S906 determines that the image file received in step S901 is "false” indicating that the image file has been tampered with after its generation. (Step S908) and proceeds to step S909.
- control unit 400 controls the block generation unit 405 to register the determination result of step S907 or step S908 in the blockchain (step S909).
- the block generation unit 405 generates a block in which the determination result of step S907 or S908 is written, and connects the block to the blockchain.
- control unit 400 controls the data transmission unit 402 to notify the communication device 105b, which is the source of the authenticity confirmation request, of the determination result (step S910), and terminates this process.
- the management system 101 executes the following processes. First, in response to receiving the image file and the hash value at the time of its generation, an authenticity assurance number for identifying the received image file is generated, and the received hash value is associated with the authenticity assurance number and registered in the blockchain. be done. After that, in response to an authenticity confirmation request from the viewer, the hash value generated from the image file received with the authenticity confirmation request is compared with the hash value corresponding to the authenticity assurance number received with the authentication confirmation request in the blockchain. be done. As a result, the management system 101 can easily determine the authenticity of the image file acquired by the viewer.
- the image file that the management system 101 receives together with the hash value from the imaging device 102 includes still image data or moving image data. That is, in the present embodiment, the authenticity of still image data and moving image data registered in management system 101 can be easily determined.
- the imaging apparatus 102 thins out image data included in the image file (for example, when the image data is moving image data, the hash function is executed every other frame). ), thus reducing the computational load.
- the information about this thinning is also linked to the block chain as the hash value calculation detailed information and is not changed, so the accuracy of determination when executing the authenticity determination process for the image file increases.
- an image file corresponding to a hash value registered in the blockchain and an authenticity assurance number displayed together with the image file are stored in the blockchain.
- a registered authenticity guarantee number associated with the value is transmitted.
- the user can transmit the image file and the authenticity assurance number of the image data to the management system 101 when requesting the authenticity confirmation of the image file.
- the authenticity of this image file can be easily determined.
- the management system 101 includes a hash generation unit 408 . Accordingly, the authenticity of the image file can be determined based on the image file transmitted from the user without requesting the user making the authenticity confirmation request to generate the hash value of the image file.
- the management system 101 includes at least a first computer that generates an authenticity assurance number for an image file, and a first computer that associates a hash value at the time of image file generation with the authenticity assurance number and registers it in the blockchain. 2 computers. This makes it possible to easily determine the authenticity of an image file in a configuration in which different computers perform the generation of the authenticity assurance number of the image file and the registration of the block chain.
- the management system 101 is composed of a plurality of computers that register at least the hash value at the time of image file generation in the block chain in association with the authenticity assurance number. This makes it possible to easily determine the authenticity of an image file in a configuration in which blockchain registration is performed by a plurality of computers.
- the recording medium 209 of the imaging device 102 stores a plurality of image files generated by imaging processing performed by the imaging device 102 .
- the plurality of image files also includes image files whose information has been registered in the block chain by the above-described processing.
- the user confirms the image files on the image display unit 207 of the imaging apparatus 102, registers the image files as favorites, deletes the image files, and organizes the image files stored in the recording medium 209.
- the image display unit 207 of the imaging device 102 does not indicate which image file information has already been registered in the blockchain, so image files cannot be easily organized.
- the image file information has been registered in the blockchain in response to the imaging apparatus 102 receiving a registration completion notification indicating that the process of registering the image file information in the blockchain has been completed. Registered information indicating that is is given to the image file.
- FIG. 10 is a flowchart showing the procedure of registered information addition processing executed in the imaging device 102 of FIG. 10 is realized by the MPU 201 of the imaging device 102 executing a program stored in the recording medium 209 or the like.
- the registered information adding process of FIG. 10 is executed when the management system 101 completes the process of registering the image file information in the blockchain.
- the MPU 201 receives the registration completion notification from the management system 101 (step S1001).
- the MPU 201 adds registered information to the image file (step S1002).
- the MPU 201 adds registered information to the metadata included in the image file.
- the registered information is information indicating that the image file information has been registered in the blockchain.
- the MPU 201 notifies the user that the image file information has been registered in the block chain (step S1003).
- the MPU 201 causes the image display unit 207 to display a guide for notifying that the image file information has been registered in the blockchain.
- the MPU 201 determines whether or not a narrowed display instruction has been received (step S1004).
- step S1004 If it is determined in step S1004 that a narrowed-down display instruction has been received, the MPU 201 selects an image file including metadata to which registered information is added from among the plurality of image files stored in the recording medium 209, and displays it on the image display unit 200. is displayed (step S1005).
- an image file including metadata to which registered information is added is referred to as an "image file including registered information”. After that, the process proceeds to step S1006.
- step S1004 If it is determined in step S1004 that a narrowed-down display instruction has not been received, the MPU 201 determines whether or not a favorite registration instruction for the registered information-containing image file has been received (step S1006).
- step S1006 If it is determined in step S1006 that the instruction for registering the registered information-containing image file as a favorite has been received, the MPU 201 registers the registered information-containing image file among the plurality of image files stored in the recording medium 209 as a favorite. (Step S1007). After that, the process proceeds to step S1008.
- step S1006 If it is determined in step S1006 that a favorite registration instruction for the registered information-containing image file has not been received, the MPU 201 determines whether or not an instruction to delete the registered information-containing image file has been received (step S1008).
- step S1008 If it is determined in step S1008 that an instruction to delete the registered information-containing image file has not been received, this process ends. If it is determined in step S1008 that an instruction to delete the image file including registered information has been received, the MPU 201 deletes the image file including registered information from the recording medium 209 (step S1009). After that, the process ends.
- the hash value of the image file is generated immediately after the image file is generated, and the image file information including this hash value is transmitted to the management system 101 .
- Registered information is attached to the image file in accordance with the fact that the imaging device 102 receives a registration completion notification indicating that the processing of registering the information of the image file in the blockchain is completed. This makes it possible to easily check image files whose information has been registered in the blockchain.
- the image file includes image data obtained by photographing the subject. This makes it possible to easily check the image data whose information has been registered in the blockchain.
- image data is still image data or moving image data. This makes it possible to easily check still image data and moving image data whose information has already been registered in the blockchain.
- the registered information-containing image files of the plurality of image files stored in the recording medium 209 are displayed on the image display unit 207 according to the user's instruction to narrow down the display.
- the user can easily grasp the image file whose information has been registered in the blockchain.
- registered information-included image files in a plurality of image files stored in the recording medium 209 are registered as favorites in accordance with the user's instruction to register the registered information-included image files as favorites.
- image files whose information has already been registered in the blockchain can be easily registered as favorites.
- the registered information-including image file is deleted from the recording medium 209 according to the user's instruction to delete the registered information-including image file. This makes it possible to easily delete the image file whose information has been registered in the blockchain from the recording medium 209 .
- step S1002 for example, when the recording medium 209 is removed from the imaging apparatus 102 and the registered information cannot be added to the image file, the user may be notified of the cause of failure to add the registered information. . Thereby, the user can easily grasp the cause of the failure in adding the registered information, and can immediately take action so that the adding of the registered information is successful.
- the configuration in which the imaging device 102 adds the registered information to the image file has been described, but the configuration is not limited to this.
- the management system 101 may add registered information to an image file acquired from the imaging device 102 and transmit the image file to which the registered information is added to the imaging device 102 . Even in such a configuration, the same effects as those of the above-described embodiment can be obtained.
- the video data may be audio data only. This makes it possible to easily check voice data whose information has been registered in the blockchain.
- the registered information-containing image file may be displayed on the image display unit 207 so as to be identifiable from the image file to which the registered information is not added.
- a predetermined mark or the like is displayed near the registered information-containing image file to indicate that the information of the image file has been registered in the blockchain.
- the predetermined mark or the like is not displayed in the vicinity of the image file to which the registered information is not added.
- the present invention supplies a program that implements one or more functions of the above-described embodiments to a system or apparatus via a network or a storage medium, and one or more processors in the computer of the system or apparatus reads the program. It can also be realized by executing processing.
- the invention can also be implemented by a circuit (eg, an ASIC) that implements one or more functions.
- the disclosure of this embodiment includes the following configurations and methods.
- (Configuration 1) means for generating a hash value of the content immediately after generating the content; means for transmitting the content information to a management server that registers the content information including the hash value in a blockchain; means for receiving a notification indicating that the process of registering the content information in the blockchain has been completed; and registered information indicating that the content information has been registered in the blockchain in accordance with the receipt of the notification. and means for adding to the content.
- arrangement 2 The content generation apparatus according to Arrangement 1, further comprising means for photographing a subject, wherein the content includes image data obtained by photographing the subject.
- (Configuration 3) The content generation device according to configuration 2, wherein the image data is still image data or moving image data.
- (Arrangement 4) The content generation device according to Arrangement 3, wherein the video data is audio data only.
- (Configuration 5) Any of Configurations 1 to 4, further comprising display means for displaying content to which the registered information has been assigned so as to be distinguishable from content to which the registered information has not been assigned. 1.
- the content generation device according to claim 1. (Configuration 6) Further comprising storage means for storing a plurality of contents including the content to which the registered information has been added, and displaying the contents to which the registered information of the plurality of contents has been added according to an instruction from the user. 6.
- (Arrangement 7) The content generation apparatus according to arrangement 6, wherein, in accordance with an instruction from a user, the content to which the registered information has been added among the plurality of contents is registered as a favorite.
- (Arrangement 8) The content generation apparatus according to Arrangement 6 or 7, wherein the content to which the registered information is added is deleted from the storage means according to an instruction from a user.
- (Arrangement 9) The storage means can be inserted into and removed from the content generation device, and the user is reminded not to insert or remove the storage means during the period from the transmission of the content information to the reception of the notification.
- 9. The content generation device according to any one of configurations 6 to 8, wherein the notification is displayed on the display means.
- Configuration 10 The configuration according to any one of Configurations 1 to 9, characterized in that, when the registered information cannot be added to the content, the user is notified of the cause of failure to add the registered information.
- Content generation device (Arrangement 11) A control method for a content generation device, comprising: generating a hash value of content immediately after generating content; a step of transmitting content information; a step of receiving a notification indicating completion of processing for registering the content information in the blockchain; and registering the content information in the blockchain in accordance with the receipt of the notification. and adding registered information indicating that the content has been registered to the content.
Abstract
Description
ここで、上述した特許文献1では、コンテンツの情報をブロックチェーンに登録する技術について言及されている。しかしながら、この技術は、ユーザがコンテンツ生成装置を操作して、ブロックチェーンにその情報が登録済みであるコンテンツを確認し、お気に入り登録や削除などを行って整理することが困難であるという問題を抱えている。
上記課題を解決するため、本発明のコンテンツ生成装置は、コンテンツを生成した直後に当該コンテンツのハッシュ値を生成する手段と、前記ハッシュ値を含むコンテンツの情報をブロックチェーンに登録する管理サーバへ、前記コンテンツの情報を送信する手段と、前記ブロックチェーンに前記コンテンツの情報を登録する処理を完了した旨を示す通知を受信する手段と、前記通知の受信に従って、前記ブロックチェーンに前記コンテンツの情報を登録済みであることを示す登録済み情報を、前記コンテンツに付与する手段と、を有することを特徴とする。
(構成1)コンテンツを生成した直後に当該コンテンツのハッシュ値を生成する手段と、前記ハッシュ値を含むコンテンツの情報をブロックチェーンに登録する管理サーバへ、前記コンテンツの情報を送信する手段と、前記ブロックチェーンに前記コンテンツの情報を登録する処理を完了した旨を示す通知を受信する手段と、前記通知の受信に従って、前記ブロックチェーンに前記コンテンツの情報を登録済みであることを示す登録済み情報を、前記コンテンツに付与する手段と、を有することを特徴とするコンテンツ生成装置。
(構成2)被写体を撮影する手段を更に備え、前記コンテンツは、前記被写体を撮影して得られた画像データを含むことを特徴とする構成1に記載のコンテンツ生成装置。
(構成3)前記画像データは、静止画データ又は動画データであることを特徴とする構成2に記載のコンテンツ生成装置。
(構成4)前記動画データは、音声データのみのデータであることを特徴とする構成3に記載のコンテンツ生成装置。
(構成5)表示手段を更に備え、前記登録済み情報が付与されたコンテンツを、前記登録済み情報が付与されないコンテンツと識別可能に前記表示手段に表示させることを特徴とする構成1乃至4の何れか1項に記載のコンテンツ生成装置。
(構成6)前記登録済み情報が付与されたコンテンツを含む複数のコンテンツを格納する格納手段を更に備え、ユーザによる指示に従って、前記複数のコンテンツにおける前記登録済み情報が付与されたコンテンツを前記表示手段に表示させることを特徴とする構成5に記載のコンテンツ生成装置。
(構成7)ユーザによる指示に従って、前記複数のコンテンツにおける前記登録済み情報が付与されたコンテンツのお気に入り登録を行うことを特徴とする構成6に記載のコンテンツ生成装置。
(構成8)ユーザによる指示に従って、前記登録済み情報が付与されたコンテンツを前記格納手段から削除することを特徴とする構成6又は7に記載のコンテンツ生成装置。
(構成9)前記格納手段は、前記コンテンツ生成装置に挿抜可能な構成であり、前記コンテンツの情報を送信してから前記通知を受信するまでの間、前記格納手段を挿抜しないように注意喚起する通知を前記表示手段に表示させることを特徴とする構成6乃至8の何れか1項に記載のコンテンツ生成装置。
(構成10)前記登録済み情報を前記コンテンツに付与できなかった場合、前記登録済み情報の付与を失敗した原因をユーザに通知することを特徴とする構成1乃至9の何れか1項に記載のコンテンツ生成装置。
(構成11)コンテンツ生成装置の制御方法であって、コンテンツを生成した直後に当該コンテンツのハッシュ値を生成する工程と、前記ハッシュ値を含むコンテンツの情報をブロックチェーンに登録する管理サーバへ、前記コンテンツの情報を送信する工程と、前記ブロックチェーンに前記コンテンツの情報を登録する処理を完了した旨を示す通知を受信する工程と、前記通知の受信に従って、前記ブロックチェーンに前記コンテンツの情報を登録済みであることを示す登録済み情報を、前記コンテンツに付与する工程と、を有することを特徴とするコンテンツ生成装置の制御方法。
101 管理システム
102 撮像装置
201 MPU
207 画像表示部
209 記録媒体
210 ハッシュ値生成部
211 通信部
Claims (12)
- コンテンツを生成した直後に当該コンテンツのハッシュ値を生成する手段と、
前記ハッシュ値を含むコンテンツの情報をブロックチェーンに登録する管理サーバへ、前記コンテンツの情報を送信する手段と、
前記ブロックチェーンに前記コンテンツの情報を登録する処理を完了した旨を示す通知を受信する手段と、
前記通知の受信に従って、前記ブロックチェーンに前記コンテンツの情報を登録済みであることを示す登録済み情報を、前記コンテンツに付与する手段と、を有することを特徴とするコンテンツ生成装置。 - 被写体を撮影する手段を更に備え、
前記コンテンツは、前記被写体を撮影して得られた画像データを含むことを特徴とする請求項1に記載のコンテンツ生成装置。 - 前記画像データは、静止画データ又は動画データであることを特徴とする請求項2に記載のコンテンツ生成装置。
- 前記動画データは、音声データのみのデータであることを特徴とする請求項3に記載のコンテンツ生成装置。
- 表示手段を更に備え、
前記登録済み情報が付与されたコンテンツを、前記登録済み情報が付与されないコンテンツと識別可能に前記表示手段に表示させることを特徴とする請求項1に記載のコンテンツ生成装置。 - 前記登録済み情報が付与されたコンテンツを含む複数のコンテンツを格納する格納手段を更に備え、
ユーザによる指示に従って、前記複数のコンテンツにおける前記登録済み情報が付与されたコンテンツを前記表示手段に表示させることを特徴とする請求項5に記載のコンテンツ生成装置。 - ユーザによる指示に従って、前記複数のコンテンツにおける前記登録済み情報が付与されたコンテンツのお気に入り登録を行うことを特徴とする請求項6に記載のコンテンツ生成装置。
- ユーザによる指示に従って、前記登録済み情報が付与されたコンテンツを前記格納手段から削除することを特徴とする請求項6に記載のコンテンツ生成装置。
- 前記格納手段は、前記コンテンツ生成装置に挿抜可能な構成であり、
前記コンテンツの情報を送信してから前記通知を受信するまでの間、前記格納手段を挿抜しないように注意喚起する通知を前記表示手段に表示させることを特徴とする請求項6に記載のコンテンツ生成装置。 - 前記登録済み情報を前記コンテンツに付与できなかった場合、前記登録済み情報の付与を失敗した原因をユーザに通知することを特徴とする請求項1に記載のコンテンツ生成装置。
- コンテンツ生成装置の制御方法であって、
コンテンツを生成した直後に当該コンテンツのハッシュ値を生成する工程と、
前記ハッシュ値を含むコンテンツの情報をブロックチェーンに登録する管理サーバへ、前記コンテンツの情報を送信する工程と、
前記ブロックチェーンに前記コンテンツの情報を登録する処理を完了した旨を示す通知を受信する工程と、
前記通知の受信に従って、前記ブロックチェーンに前記コンテンツの情報を登録済みであることを示す登録済み情報を、前記コンテンツに付与する工程と、を有することを特徴とするコンテンツ生成装置の制御方法。 - コンテンツ生成装置の制御方法をコンピュータに実行させるプログラムであって、
前記コンテンツ生成装置の制御方法は、
コンテンツを生成した直後に当該コンテンツのハッシュ値を生成する工程と、
前記ハッシュ値を含むコンテンツの情報をブロックチェーンに登録する管理サーバへ、前記コンテンツの情報を送信する工程と、
前記ブロックチェーンに前記コンテンツの情報を登録する処理を完了した旨を示す通知を受信する工程と、
前記通知の受信に従って、前記ブロックチェーンに前記コンテンツの情報を登録済みであることを示す登録済み情報を、前記コンテンツに付与する工程と、を有することを特徴とするプログラム。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202280040993.8A CN117461286A (zh) | 2021-06-10 | 2022-06-01 | 在区块链中登记信息的内容生成设备及其控制方法和程序 |
EP22820122.4A EP4354795A1 (en) | 2021-06-10 | 2022-06-01 | Content generation device for registering information to blockchain, method for controlling content generation device, and program |
KR1020237039748A KR20230173704A (ko) | 2021-06-10 | 2022-06-01 | 블록체인에 정보를 등록하는 콘텐츠 생성장치, 콘텐츠 생성장치의 제어방법, 및 기억매체 |
US18/525,188 US20240106672A1 (en) | 2021-06-10 | 2023-11-30 | Content generation apparatus that registers information in blockchain, control method for content generation apparatus, and storage medium |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2021097427 | 2021-06-10 | ||
JP2021-097427 | 2021-06-10 | ||
JP2022-070966 | 2022-04-22 | ||
JP2022070966A JP2022189730A (ja) | 2021-06-10 | 2022-04-22 | コンテンツ生成装置、コンテンツ生成装置の制御方法、及びプログラム |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/525,188 Continuation US20240106672A1 (en) | 2021-06-10 | 2023-11-30 | Content generation apparatus that registers information in blockchain, control method for content generation apparatus, and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022259940A1 true WO2022259940A1 (ja) | 2022-12-15 |
Family
ID=84424956
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2022/022342 WO2022259940A1 (ja) | 2021-06-10 | 2022-06-01 | ブロックチェーンに情報を登録するコンテンツ生成装置、コンテンツ生成装置の制御方法、及びプログラム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20240106672A1 (ja) |
EP (1) | EP4354795A1 (ja) |
KR (1) | KR20230173704A (ja) |
WO (1) | WO2022259940A1 (ja) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005275807A (ja) * | 2004-03-24 | 2005-10-06 | Canon Inc | 文書管理システム、文書登録方法、情報処理装置、プログラムおよび記憶媒体 |
JP2006121493A (ja) * | 2004-10-22 | 2006-05-11 | Ricoh Co Ltd | 電子情報証明方法、電子情報登録受付装置、電子情報登録要求装置、電子情報証明装置およびプログラム |
JP2008108138A (ja) * | 2006-10-26 | 2008-05-08 | Sanyo Electric Co Ltd | 情報処理装置、転送データ数表示方法、及び転送データ数表示プログラム |
JP2009126033A (ja) * | 2007-11-22 | 2009-06-11 | Seiko Epson Corp | プリンタ、および、プリンタ機能を備えた複合機 |
JP2017204706A (ja) | 2016-05-10 | 2017-11-16 | 日本電信電話株式会社 | コンテンツ流通システム、コンテンツ流通方法、コンテンツ生成装置及びコンテンツ生成プログラム |
JP2017204707A (ja) * | 2016-05-10 | 2017-11-16 | 日本電信電話株式会社 | コンテンツ流通システム、コンテンツ流通方法、コンテンツ生成装置及びコンテンツ生成プログラム |
WO2021014863A1 (ja) * | 2019-07-19 | 2021-01-28 | キヤノン株式会社 | 情報処理装置、制御方法、プログラム |
JP2021018514A (ja) * | 2019-07-18 | 2021-02-15 | 株式会社日立製作所 | サーバー装置、データ管理システム、およびデータ管理方法 |
JP2021097427A (ja) | 2019-12-13 | 2021-06-24 | 三菱電機株式会社 | 回転電機 |
JP2022070966A (ja) | 2016-11-08 | 2022-05-13 | メルク パテント ゲゼルシャフト ミット ベシュレンクテル ハフツング | シクロペンタジエニル配位子を含む金属錯体 |
-
2022
- 2022-06-01 KR KR1020237039748A patent/KR20230173704A/ko unknown
- 2022-06-01 EP EP22820122.4A patent/EP4354795A1/en active Pending
- 2022-06-01 WO PCT/JP2022/022342 patent/WO2022259940A1/ja active Application Filing
-
2023
- 2023-11-30 US US18/525,188 patent/US20240106672A1/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005275807A (ja) * | 2004-03-24 | 2005-10-06 | Canon Inc | 文書管理システム、文書登録方法、情報処理装置、プログラムおよび記憶媒体 |
JP2006121493A (ja) * | 2004-10-22 | 2006-05-11 | Ricoh Co Ltd | 電子情報証明方法、電子情報登録受付装置、電子情報登録要求装置、電子情報証明装置およびプログラム |
JP2008108138A (ja) * | 2006-10-26 | 2008-05-08 | Sanyo Electric Co Ltd | 情報処理装置、転送データ数表示方法、及び転送データ数表示プログラム |
JP2009126033A (ja) * | 2007-11-22 | 2009-06-11 | Seiko Epson Corp | プリンタ、および、プリンタ機能を備えた複合機 |
JP2017204706A (ja) | 2016-05-10 | 2017-11-16 | 日本電信電話株式会社 | コンテンツ流通システム、コンテンツ流通方法、コンテンツ生成装置及びコンテンツ生成プログラム |
JP2017204707A (ja) * | 2016-05-10 | 2017-11-16 | 日本電信電話株式会社 | コンテンツ流通システム、コンテンツ流通方法、コンテンツ生成装置及びコンテンツ生成プログラム |
JP2022070966A (ja) | 2016-11-08 | 2022-05-13 | メルク パテント ゲゼルシャフト ミット ベシュレンクテル ハフツング | シクロペンタジエニル配位子を含む金属錯体 |
JP2021018514A (ja) * | 2019-07-18 | 2021-02-15 | 株式会社日立製作所 | サーバー装置、データ管理システム、およびデータ管理方法 |
WO2021014863A1 (ja) * | 2019-07-19 | 2021-01-28 | キヤノン株式会社 | 情報処理装置、制御方法、プログラム |
JP2021097427A (ja) | 2019-12-13 | 2021-06-24 | 三菱電機株式会社 | 回転電機 |
Also Published As
Publication number | Publication date |
---|---|
US20240106672A1 (en) | 2024-03-28 |
KR20230173704A (ko) | 2023-12-27 |
EP4354795A1 (en) | 2024-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6086878B2 (ja) | ネットワークを介して1つのデバイスから別のデバイスへファイルを送信すること | |
JP4520259B2 (ja) | マルチメディア記録装置、マルチメディア記録方法、及びマルチメディア記録システム | |
JP2017204707A (ja) | コンテンツ流通システム、コンテンツ流通方法、コンテンツ生成装置及びコンテンツ生成プログラム | |
US8312284B1 (en) | Verifiable timestamping of data objects, and applications thereof | |
JP2012113634A (ja) | 表示装置、開示制御装置、開示制御方法、及びプログラム | |
CN112632637A (zh) | 防篡改取证方法、系统、装置、存储介质及电子设备 | |
WO2022259940A1 (ja) | ブロックチェーンに情報を登録するコンテンツ生成装置、コンテンツ生成装置の制御方法、及びプログラム | |
JP2019205140A (ja) | 撮像装置、情報処理装置、生成方法、及び検証方法 | |
CN110149528B (zh) | 一种过程录制方法、装置、系统、电子设备、及存储介质 | |
JP2022189730A (ja) | コンテンツ生成装置、コンテンツ生成装置の制御方法、及びプログラム | |
JP2000059771A (ja) | 画像撮像装置および画像データ利用システム | |
JP2017134548A (ja) | 情報処理装置、情報処理方法、及びプログラム | |
JP2012133668A (ja) | 表示装置、画面画像転送方法、及びプログラム | |
KR20080019939A (ko) | 피어(Peer) 간의 컨텐츠 공유방법과 장치 | |
JP6420464B2 (ja) | 情報記録装置および情報記録装置の改竄防止方法 | |
US20230121095A1 (en) | Image capturing apparatus capable of guaranteeing authenticity of digital image, management system, control method, and storage medium | |
CN117461286A (zh) | 在区块链中登记信息的内容生成设备及其控制方法和程序 | |
CN115348472A (zh) | 视频识别方法、装置、可读介质及电子设备 | |
JP2023060814A (ja) | 撮像装置、管理システム、制御方法、及びプログラム | |
WO2023248858A1 (ja) | 動画ファイルにおける音声データを利用してブロックチェーンへ情報を登録するコンテンツ生成装置、コンテンツ管理装置、並びに、それらの制御方法及びプログラム | |
JP2024033520A (ja) | コンテンツ生成装置、管理サーバ、コンテンツ生成装置の制御方法、管理サーバの制御方法、及びプログラム | |
US20240054507A1 (en) | Content management system, content generation apparatus, content management method, control method for contents generation apparatus, and storage medium storing content management program | |
WO2024062920A1 (ja) | 情報処理装置および方法、並びにプログラム | |
EP1693761A1 (en) | Multi-medium-type content reproduction device and reproduction method, and recording medium containing data used for the same | |
JP2005286823A (ja) | 画像入力装置、通信システム、制御方法、コンピュータプログラム及び記憶媒体 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22820122 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20237039748 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020237039748 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022820122 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2022820122 Country of ref document: EP Effective date: 20240110 |