Background technique
People's lives mode is just being altered in steps in the development of network and electronic technology.From the point of view of medium field, at present quiteA part of crowd has had moved away from traditional paper media, instead utilizes the phases such as multimedia technology and mobile phone, tablet computerThe e-book of pass tool.The e-book industry rapid development for saving memory space, read interface close friend, before Publishing Industry facesThe major transformation not having.
What is stood in the breach is digital rights issue, and network accelerates the propagation of digital publication as important medium,However it is many propagate be it is unordered even illegal, the content of copyright is easy by other people bootleggings, so as to cause piracyThe behavior of infringement, the copyright of electronic publication author are difficult to be guaranteed.It has good grounds, China Digital Library, internetGiant Google company Zeng Yin illegally upload other people books works without approval and are listed in defendant.Meanwhile e-book goes outThe safety in version quotient data library is to be improved, once had hacker to crack publisher's reader easily and causes the illegal biography of publicationIt broadcasts.Unquestionably, if electronic copyright, which cannot obtain protecting conscientiously, to threaten the practical interests of author and publisher, and then to wholeA industry generates impact.
Apply for content
The application's is designed to provide a kind of digital literary property protection method and system based on block chain, for being countedWord copyright protection solves the problems, such as unauthorized theft digital work content.
To achieve the goals above, it is as follows that this application provides following technical schemes:
First aspect: this application provides a kind of digital copyright protection systems based on block chain, and the system comprises numbersAccording to interaction detecting system and distributed trust database,
The data interaction detection system, for receiving the work data information and works behaviour that the copyright owning side uploadsMake information, by the chained list of works operation information write-in block chain, the works operation information includes each of purchase worksTransaction Identification Number and the corresponding mode of operation of each Transaction Identification Number;And the work data information and the chained list are sent to the distributionFormula trust data library;
The distributed trust database, for receiving the work data information and the chained list, and to the worksData information and the chained list are encrypted;
The data interaction detection system is also used to receive the operation requests of copyright access side initiation, checks the operationWhether the Transaction Identification Number carried in request matches with mode of operation with the works operation information being recorded on block chain, if matching,It is sent to the distributed trust database and obtains work data information request, the acquisition work data information request is for askingIt asks and obtains the corresponding work data information of the Transaction Identification Number;
The distributed trust database is also used in the acquisition work data letter for receiving the data interaction system transmissionAfter breath request, the corresponding work data information of the Transaction Identification Number and chained list are decrypted, and by the work data information and chainThe corresponding list item of Transaction Identification Number described in table is sent to the data interaction detection system;
The data interaction detection system, in the work data information for receiving the distributed trust database transmissionAnd chained list, and the chained list in received chained list and the data interaction system block chain is subjected to consistency checking, if verifying is logicalIt crosses, then the received work data information is sent to the copyright access side.
In the optional implementation of first aspect, the data interaction detection system is also used to receive copyright access side and awardsThe permission of block chain where the access chained list given.
In the optional embodiment of first aspect, the data interaction detection system is also used to: being possessed receiving copyrightBefore the work data information and works operation information of Fang Shangchuan, the public key that copyright owning side provides is received;
The distributed trust database, is also used to: before receiving the work data information and the chained list, receivingThe public key that copyright owning side provides;
The distributed trust database is used for: the work data information and the chained list encrypted, specifically:The work data information and the chained list are encrypted according to the private key that copyright owning side provides;
The distributed trust database is used for: decrypting the corresponding work data information of the Transaction Identification Number and chained list, hasBody are as follows: the corresponding work data information of the Transaction Identification Number and chained list are decrypted according to the public key that copyright owning side provides.
In the optional embodiment of first aspect, the data interaction detection system is receiving distributed trust databaseAfter the work data information and chained list of transmission, the public key for being also used to provide by copyright owning side is to the chained list and is recorded in numberConsistency checking is carried out according to the chained list in interaction detecting system block chain.
In the optional embodiment of first aspect, the corresponding mode of operation of the Transaction Identification Number includes that the Transaction Identification Number is correspondingMode of operation cryptographic Hash, store course operation information carrier, provide verifying voucher label and encrypted form.
In the optional embodiment of first aspect, the corresponding mode of operation of the Transaction Identification Number includes type and the behaviour of operationThe number of work.
In the optional embodiment of first aspect, the data interaction detection system is also used to, and is receiving the copyrightAfter the operation requests that access side initiates,
The operation requests that the copyright access side initiates are recorded in the block chain of the data detection system.
Second aspect: this application provides a kind of digital publishing rights access methods based on block chain, which comprises
Data interaction detection system receives the work data information and works operation information that copyright owning side uploads, will be describedWorks operation information is written in the chained list of block chain, and the works operation information includes each Transaction Identification Number for buying works and each friendshipEasy number corresponding mode of operation;
The work data information and the chained list are sent to distributed trust data by the data interaction detection systemLibrary;
The data interaction detection system receives the operation requests that copyright access side initiates, and checks and takes in the operation requestsWhether the Transaction Identification Number of band matches with mode of operation with the works operation information being recorded on block chain;
If matching, the data interaction detection system sends acquisition work data information request and gives distributed trust dataLibrary;
The data interaction detection system receives the work data information and chained list that the distributed trust database returns,And the received chained list and the chained list in data interaction system block chain are verified;
If verifying is errorless, the received work data information is sent to the version by the data interaction detection systemWeigh access side.
The third aspect: this application provides a kind of digital publishing rights access methods based on block chain, which comprises
Distributed trust database receives the work data information and chained list that data interaction detection system is sent, and to describedWork data information and the chained list are encrypted;The chained list includes the work that the copyright owning side being recorded on block chain uploadsProduct operation information, the works operation information include buying each Transaction Identification Number and the corresponding mode of operation of each Transaction Identification Number of works;
The distributed trust database receives the acquisition data information request that the data interaction detection system is sent, instituteIt states and obtains data information request for the corresponding work data information of Transaction Identification Number described in request;The distributed trust dataLibrary decrypts corresponding work data information and chained list after receiving the acquisition work data information request, and by the chainTable is sent to the data interaction detection system and is verified, and verifying is errorless, then the work data information is passed through the numberThe copyright access side is sent to according to interaction detecting system.
Fourth aspect: present invention also provides a kind of digital publishing rights access mechanism based on block chain, described device includes:
Receiving module, for receiving the work data information and works operation information of copyright owning side upload, the worksOperation information includes buying each Transaction Identification Number and the corresponding mode of operation of each Transaction Identification Number of works;
Writing module, for the received works operation information of the receiving module to be written in the chained list of block chain;
Sending module, for sending the chained list of the received work data information of the receiving module and writing station write-inGive distributed trust database;
The receiving module is also used to receive the operation requests of copyright access side initiation;
Check module, for check the Transaction Identification Number carried in the received operation requests of the receiving module and mode of operation withWhether the works operation information being recorded on block chain matches;
The sending module, the Transaction Identification Number for being also used to carry in the verification module checks operation requests and mode of operationAfter being matched with the works operation information being recorded on block chain, sends acquisition work data information request and give distributed trust dataLibrary;
The receiving module is also used to receive work data information and chained list that the distributed trust database returns;
Authentication module, for carrying out the chained list in the received chained list of the receiving module and data interaction system block chainVerifying;
The sending module is also used to the received work data information of the receiving module being sent to the copyrightAccess side.
5th aspect: the application also provides a kind of digital publishing rights access mechanism based on block chain, and described device includes:
Receiving module, the work data information and chained list that interaction detecting system is sent for receiving data, the chained list packetThe works operation information that the copyright owning side being recorded on block chain uploads is included, the works operation information includes purchase worksEach Transaction Identification Number and the corresponding mode of operation of each Transaction Identification Number;
Encrypting module, for being encrypted to the received work data information of the receiving module and the chained list;
The receiving module is also used to receive the acquisition data information request that the data interaction detection system is sent, instituteIt states and obtains data information request for the corresponding work data information of Transaction Identification Number described in request;
Deciphering module, for decrypting and reading out corresponding work data information and chained list;
Sending module, the chained list for decrypting the deciphering module are sent to the data interaction detection systemIt is verified, verifying is errorless, then the work data information is sent to the copyright by the data interaction detection systemAccess side.
6th aspect: the application provides a kind of calculating equipment, comprising: processor, and connected to the processor respectively depositReservoir and communication module, the memory are stored with the executable machine readable instructions of the processor, and the communication module is usedIn with external equipment carry out communications;When calculating equipment operation, the processor executes the machine readable instructions,It is any optional that first aspect, any optional implementation of first aspect, second aspect or second aspect are executed when executingImplementation in the method.
7th aspect: the application provides a kind of computer readable storage medium, stores on the computer readable storage mediumThere is computer program, any optional realization of first aspect, first aspect is executed when which is run by processorThe method in mode, second aspect or any optional implementation of second aspect.
Eighth aspect: the application provides a kind of computer program product, and the computer program product is transported on computersWhen row, so that computer executes first aspect, any optional implementation, second aspect or the second aspect of first aspect are appointedThe method in one optional implementation.
The beneficial effect of the application includes: the digital copyright protection based on block chain that the application obtains by above-mentioned designMethod and apparatus, so that the works content that copyright owning side uploads will not carry out pirate abuse by other people bootleggings, andAnd works copyright can be grasped, when copyright is invaded, copyright owning side indicts the infringement operation of visitor on evidence.
Other feature and advantage of the application will be illustrated in subsequent specification, also, partly be become from specificationIt is clear that being understood and implementing the embodiment of the present application.The purpose of the application and other advantages can be by writtenSpecifically noted structure is achieved and obtained in specification, claims and attached drawing.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application embodiment clearer, implement below in conjunction with the applicationThe technical solution in the application embodiment is clearly and completely described in attached drawing in mode, it is clear that described realityThe mode of applying is a part of embodiment of the application, rather than whole embodiments.Based on the embodiment in the application, abilityDomain those of ordinary skill every other embodiment obtained without creative efforts, belongs to the applicationThe range of protection.Therefore, the detailed description of the presently filed embodiment provided in the accompanying drawings is not intended to limit below and is wantedThe scope of the present application of protection is sought, but is merely representative of the selected embodiment of the application.Based on the embodiment in the application,Every other embodiment obtained by those of ordinary skill in the art without making creative efforts belongs to thisApply for the range of protection.
In the description of the present application, it is to be understood that term " center ", " length ", " width ", " thickness ", "upper",The orientation or positional relationship of the instructions such as "lower", "front", "rear", "left", "right", "inner", "outside" is orientation based on the figureOr positional relationship, it is merely for convenience of description the application and simplifies description, rather than the equipment or element of indication or suggestion meaningIt must have a particular orientation, be constructed and operated in a specific orientation, therefore should not be understood as the limitation to the application.
In addition, term " first ", " second " etc. are used for description purposes only, it is not understood to indicate or imply relatively importantProperty or implicitly indicate the quantity of indicated technical characteristic.The feature for defining " first ", " second " etc. as a result, can be expressedOr implicitly include one or more of the features.In the description of the present application, the meaning of " plurality " is two or twoMore than, unless otherwise specifically defined.
In this application unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc.Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or integral;It can be direct phaseEven, can also indirectly connected through an intermediary, the interaction that can be connection or two elements inside two elements is closedSystem.For the ordinary skill in the art, above-mentioned term in this application specific can be understood as the case may beMeaning.
In this application unless specifically defined or limited otherwise, fisrt feature second feature "upper" or "lower"It may include that the first and second features directly contact, also may include that the first and second features are not direct contacts but pass through itBetween other characterisation contact.Moreover, fisrt feature includes the first spy above the second feature " above ", " above " and " above "Sign is right above second feature and oblique upper, or is merely representative of first feature horizontal height higher than second feature.Fisrt feature existsSecond feature " under ", " lower section " and " following " include that fisrt feature is directly below and diagonally below the second feature, or is merely representative ofFirst feature horizontal height is less than second feature.
First embodiment
Digital copyright management, full name in English Digital Rights Management, the technology mainly used is digital waterPrint, copyright protection, digital signature, data encryption.Generally it is translated as digital copyright protection or digital copyright management.It is two that DRM, which is divided to,Class one kind is multimedia protection, such as encryption film, music, audio-video, files in stream media.In addition one kind is encrypted document, exampleSuch as Word, Excel, PDF etc..DRM mainly protects document, film, music not pirated by technological means.This technologyBy to digital content carry out encryption and additional usage rule digital content is protected, wherein can be concluded that using ruleWhether user meets broadcasting.
The digital publishing rights protected in the application may include literary works, text, video, audio, animation, picture andThe copyright of flash etc..It is not limit it should be understood that only listing the common digital content works form of several classes hereMake this few class works form.
As shown in Figure 1, the application provides a kind of digital copyright protection system based on block chain, including data interaction detectionSystem and distributed trust database, copyright owning side upload work data information and works operation information and detect to data interactionSystem, data interaction detection system is by the chained list of works operation information write-in block chain, and by works operation information and chained listIt is sent to distributed trust database;
Distributed trust database encrypts work data information and chained list;
Data interaction detection system receives the operation requests that copyright access side initiates, and checks carrying in the operation requestsWhether Transaction Identification Number matches with mode of operation with the works operation information being recorded on block chain, if matching, sends acquisition worksRequest of data gives distributed trust database;
Distributed trust database receive obtain work data request, decrypt and read out corresponding work data information andChained list, and send it to data interaction detection system;
Data interaction detection system receives corresponding work data information and chained list, and will be in received chained list and block chainChained list carry out consistency checking.
Specifically, as shown in Fig. 2, the application provides a kind of digital literary property protection method based on block chain, this method packetIt includes:
Step 101: data interaction system receives the works operation information and work data information that copyright owning side uploads, andBy in the chained list of works operation information write-in block chain, the works operation information includes buying each Transaction Identification Number of works and eachThe corresponding mode of operation of Transaction Identification Number, goes to step 102.
Step 102: work data information and chained list are sent to distributed trust database by data interaction detection system, are turnedTo step 103.
Step 103: distributed trust database receives the work data information and chained list that the data interaction system is sent,And the work data information and chained list are encrypted, go to step 104.
Step 104: data interaction detection system is checked the operation and is asked in the operation requests for receiving copyright access side initiationIt asks whether the Transaction Identification Number of carrying matches with mode of operation with the works operation information being recorded in chained list, is obtained if so, sendingIt is taken as product data information request and gives distributed trust database, then go to step 105.
Step 105: distributed trust database receives the acquisition work data information that data interaction detection system is sent and asksIt asks, decrypts and read corresponding work data information and chained list, and the work data information and chained list that read out are sent to dataInteraction detecting system goes to step 106.
Step 106: data interaction detection system receives the work data information and chain that distributed trust database is read outChained list in received chained list and data interaction detection system block chain is carried out consistency checking by table;If verifying is errorless, send outWork data information is sent to give copyright access side.
Optionally, before step 101, copyright owning side is received the method also includes: data interaction detection system to awardThe permission of block chain where the access chained list given.
Specifically, only copyright owning side is granted by data interaction detection system permission, data interaction inspection in above-mentioned stepsExamining system could access and operate the works operation information being stored on block chain.
Here it is worth noting that, when copyright owning side is because of certain reasons, for example is not desired to continue copyright access side accessWorks, it is desirable to terminate and use copyright, can be visited by cancelling its works in the permission of data interaction detection system to terminate copyrightAccess and operation of the side of asking to oneself works.
Optionally, before step 101, the method also includes data interaction detection system and distributed trust dataLibrary receives the public key that copyright owning side provides.
Specifically, public key at this time provides for copyright owning side, using asymmetric cryptosystem in technical schemeAlgorithm, asymmetrical encryption algorithm: a pair of of key-public key and private key entirely different using two but that be exact matching makeWhen encrypting file with asymmetrical encryption algorithm, only using matched a pair of of public key and private key, it could complete to encryption of plaintextAnd decrypting process, for example one file is encrypted using public key, it is necessary to it can just be unlocked, be made using paired private keyOne file is encrypted with private key, it is necessary to can just be unlocked using paired public key.
Optionally, the corresponding mode of operation of the Transaction Identification Number in a step 101 includes the corresponding operation of the Transaction Identification NumberThe cryptographic Hash of mode, provides the voucher label and encrypted form of verifying at the carrier for storing course operation information.
Optionally, the corresponding mode of operation of the Transaction Identification Number in a step 101 includes the type of operation and of operationNumber.
Specifically, work data information includes the particular content of works;Works operation information includes copyright owning side, copyrightAccess side to the operation informations each time of works, wherein specific works operation information include play, downloading.Chained list is recordOn block chain, including all block chain Transaction Identification Numbers and its corresponding mode of operation by verifying, wherein corresponding detailedThin information includes: Hash, Token, Signature, Encrypt, and what Hash was indicated is the cryptographic Hash of corresponding mode of operation,It is sightless to database;What Token was indicated is the carrier for storing course operational motion, is visible to database;Signature indicates validating documents or label;What Encrypt was indicated is the encrypted form of work data information.
Optionally, in step 103, specifically: distributed trust database root believes work data according to the private key of offerBreath and chained list are encrypted;In step 105, specifically: distributed trust database root is according to the public key of exchange to being stored in pointWork data information and chained list in cloth trust data library are decrypted;In step 106, specifically: data interaction detectionThe public key that system is provided by copyright owning side is to the chained list and the chained list being recorded in data interaction detection system block chainCarry out consistency checking.
In step 103, the public key exchanged with step 101 that distributed trust database is provided by copyright owning sidePairs of private key encrypts work data information and chained list, and is stored in distributed trust database, wherein chained listEncrypted form be Encrypt.
At step 104, specifically, data interaction detection system is after receiving the operation information that copyright access side initiates,According to the Transaction Identification Number that copyright access side sends, the chained list where corresponding works operation information is found, reads and checks chained listIn Token storage the operation of all works number and type and copyright the access side number and type of operation information initiatedWhether correspond.Optionally, if data interaction detection system is after verification, the operation that discovery copyright access side initiatesInformation is inconsistent, then data interaction detection system terminates operation of the copyright access side for works.
Optionally, at step 104, after receiving the operation requests that the copyright access side initiates, the copyright is visitedThe operation requests that the side of asking initiates are recorded in the block chain of the data detection system.
Specifically, copyright owning side can also carry copyright access side in database by called data interaction detecting systemThe token value of course is accessed, is recorded to obtain copyright access side to the operation information of corresponding course, so that copyright owning side can be withThe operating process of copyright access side is grasped, if copyright access side is related to the operation letter for having illegal to the works of copyright owning sideBreath, and the subsequent dependencies for being related to encroaching right, during subsequent right-safeguarding, the access that copyright access side grasps is recordedIt can be used as the evidence of right-safeguarding.
In step 106, specifically, public key also has the function of verifying digital signature, the chained list decrypted will be with storageChained list in the database that data interaction system carries is completely the same, and it is errorless to can be only achieved verifying.Specifically, and passing through friendshipEasy number is found corresponding chained list, is verified information in all information and singnature in chained list in Token and is read outWhether the corresponding informance in chained list is consistent.
The meaning of verifying is: first, confirm the work data letter decrypted and read out from distributed trust databaseWhether breath is to access required for copyright access side;Second, confirmation is decrypted and whether the work data information read out is complete, if imperfect, the operation that copyright access side carries out possibly can not be fully achieved;Third, distributed trust database is notIt is completely reliable, it is also possible to be maliciously tampered, so verifying to the chained list interpreted and original chained list, reach trueSurely it is needed the effect of work data information.
Second embodiment
The application also provides a kind of digital publishing rights access mechanism based on block chain, comprising:
Receiving module 201, for receiving the work data information and works operation information of copyright owning side upload, works behaviourIt include buying each Transaction Identification Number and the corresponding mode of operation of each Transaction Identification Number of works as information;
Writing module 202, for the received works operation information of receiving module 201 to be written in the chained list of block chain;
Sending module 203, for sending out the chained list of the received work data information of receiving module 201 and writing station write-inGive distributed trust database;
Receiving module 201 is also used to receive the operation requests of copyright access side initiation;
Module 204 is checked, for checking the Transaction Identification Number carried in the received operation requests of receiving module 201 and mode of operationWhether matched with the works operation information being recorded on block chain;
Sending module 203, be also used to verification module 204 check in operation requests the Transaction Identification Number that carries and mode of operation withAfter being recorded in the works operation information matching on block chain, sends acquisition work data information request and give distributed trust dataLibrary;
Receiving module 201 is also used to receive the work data information and chained list of the return of distributed trust database;
Authentication module 205, for by the chained list in the received chained list of receiving module 201 and data interaction system block chain intoRow verifying;
Sending module 203 is also used to for the received work data information of receiving module 201 being sent to the copyright accessSide.
3rd embodiment
The present invention also provides a kind of digital publishing rights access mechanisms based on block chain, comprising:
Receiving module 301, the work data information and chained list, chained list that interaction detecting system is sent for receiving data includeThe works operation information that the copyright owning side being recorded on block chain uploads, works operation information include buying each transaction of worksNumber and the corresponding mode of operation of each Transaction Identification Number;
Encrypting module 302, for being encrypted to the received work data information of receiving module 301 and chained list;
Receiving module 301 is also used to receive the acquisition data information request of data interaction detection system transmission, obtains dataInformation request is for the corresponding work data information of Transaction Identification Number described in request;
Deciphering module 303, for decrypting and reading out corresponding work data information and chained list;
Sending module 304 is sent to data interaction detection system for will decrypt the chained list that decrypts of device 303 and testsCard, verifying is errorless, then work data information is sent to copyright access side by data interaction detection system.
Fourth embodiment
The application provides a kind of calculating equipment, comprising: processor 401, and memory 402 connected to the processor respectivelyWith communication module 403, memory 402 is stored with the executable machine readable instructions of processor 401, communication module 403 be used forExternal equipment carries out communications;When calculating equipment operation, processor 401 executes the machine readable instructions, to holdTimes of first embodiment, any optional implementation of first embodiment or second embodiment, second embodiment is executed when rowOne optional implementation or 3rd embodiment, 3rd embodiment any optional implementation in the method.
The application provides a kind of computer readable storage medium, and computer journey is stored on the computer readable storage mediumSequence, when which is run by processor execute first embodiment, first embodiment any optional implementation orSecond embodiment, any optional implementation of second embodiment or 3rd embodiment, 3rd embodiment it is any optionalThe method in implementation.
The application provides a kind of computer program product, when the computer program product is run on computers, so thatComputer executes first embodiment, any optional implementation of first embodiment or second embodiment, second embodimentAny optional implementation or 3rd embodiment, 3rd embodiment any optional implementation in the method set.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is anyThose familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all containLid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.