Movatterモバイル変換


[0]ホーム

URL:


CN109145617B - Block chain-based digital copyright protection method and system - Google Patents

Block chain-based digital copyright protection method and system
Download PDF

Info

Publication number
CN109145617B
CN109145617BCN201810892685.3ACN201810892685ACN109145617BCN 109145617 BCN109145617 BCN 109145617BCN 201810892685 ACN201810892685 ACN 201810892685ACN 109145617 BCN109145617 BCN 109145617B
Authority
CN
China
Prior art keywords
work
linked list
detection system
data information
interaction detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810892685.3A
Other languages
Chinese (zh)
Other versions
CN109145617A (en
Inventor
刘志
向尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhizhuwang Guangzhou Education Technology Co ltd
Original Assignee
Zhizhuwang Guangzhou Education Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhizhuwang Guangzhou Education Technology Co ltdfiledCriticalZhizhuwang Guangzhou Education Technology Co ltd
Priority to CN201810892685.3ApriorityCriticalpatent/CN109145617B/en
Publication of CN109145617ApublicationCriticalpatent/CN109145617A/en
Application grantedgrantedCritical
Publication of CN109145617BpublicationCriticalpatent/CN109145617B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The system comprises a data interaction detection system and a distributed trust database, and is used for performing digital copyright protection and solving the problem of illegally stealing digital work content. According to the block chain-based digital copyright protection method and device, the content of the works uploaded by the copyright owner cannot be illegally copied by other people to carry out piracy infringement, the copyright of the works can be mastered, and the copyright owner has evidence to inform an infringement operation of an accessor when the copyright is infringed.

Description

Block chain-based digital copyright protection method and system
Technical Field
The application relates to the technical field of block chain copyright protection, and mainly relates to a block chain-based digital copyright protection method and system.
Background
The development of networks and electronic technologies is gradually changing the lifestyle of people. From the field of media, a considerable portion of people are away from the traditional paper media, and replace the traditional paper media with electronic books using multimedia technology and related tools such as mobile phones and tablet computers. The e-book industry which saves storage space and is friendly in reading interface is rapidly developed, and the publishing industry faces unprecedented great revolution.
The digital copyright problem is brought to the first place, the network is taken as an important medium to accelerate the propagation of digital publications, however, many of the propagation is disordered and even illegal, the content of digital works is easily illegally copied by others, so that piracy infringement is caused, and the copyright of an electronic publication author is difficult to guarantee. It is well documented that China digital library and the Internet Google company have been classified as being advertised for unauthorized illegal uploading of other people's book works. Meanwhile, the security of the database of the electronic book publisher is to be improved, and a hacker easily cracks the reader of the publisher to cause illegal distribution of the publication. Without doubt, the failure of the electronic copyright to be protected practically threatens the practical interests of the author and publisher, which in turn impacts the entire industry.
Disclosure of Invention
The application aims to provide a block chain-based digital copyright protection method and a block chain-based digital copyright protection system, which are used for performing digital copyright protection and solving the problem of illegally stealing digital work content.
In order to achieve the above object, the present application provides the following technical solutions:
in a first aspect: the application provides a digital copyright protection system based on a block chain, which comprises a data interaction detection system and a distributed trust database,
the data interaction detection system is used for receiving the work data information and the work operation information uploaded by the copyright owner and writing the work operation information into a linked list of a block chain, wherein the work operation information comprises transaction numbers of purchased works and operation modes corresponding to the transaction numbers; sending the work data information and the linked list to the distributed trust database;
the distributed trust database is used for receiving the work data information and the linked list and encrypting the work data information and the linked list;
the data interaction detection system is also used for receiving an operation request initiated by a copyright access party, checking whether a transaction number and an operation mode carried in the operation request are matched with the work operation information recorded on the block chain, and if the transaction number and the operation mode are matched with the work operation information, sending a work data information acquisition request to the distributed trust database, wherein the work data information acquisition request is used for requesting to acquire the work data information corresponding to the transaction number;
the distributed trust database is also used for decrypting the work data information and the linked list corresponding to the transaction number after receiving a request for acquiring the work data information, which is sent by the data interaction system, and sending the table entries corresponding to the transaction number in the work data information and the linked list to the data interaction detection system;
and the data interaction detection system is used for receiving the work data information and the linked list sent by the distributed trust database, carrying out consistency verification on the received linked list and the linked list in the block chain of the data interaction system, and sending the received work data information to the copyright access party if the verification is passed.
In an optional implementation manner of the first aspect, the data interaction detection system is further configured to receive a right granted by a copyright accessing party to access the blockchain in which the linked list is located.
In an optional implementation manner of the first aspect, the data interaction detection system is further configured to: before receiving the work data information and work operation information uploaded by a copyright owner, receiving a public key provided by the copyright owner;
the distributed trust database is further configured to: before receiving the work data information and the linked list, receiving a public key provided by a copyright owner;
the distributed trust database is to: encrypting the work data information and the linked list, specifically: encrypting the work data information and the linked list according to a private key provided by a copyright owner;
the distributed trust database is to: decrypting the work data information and the linked list corresponding to the transaction number specifically comprises the following steps: and decrypting the work data information and the linked list corresponding to the transaction number according to the public key provided by the copyright owner.
In an optional implementation manner of the first aspect, after receiving the work data information and the linked list sent by the distributed trust database, the data interaction detection system is further configured to perform consistency verification on the linked list and the linked list recorded in the block chain of the data interaction detection system through a public key provided by a copyright owner.
In an optional implementation manner of the first aspect, the operation manner corresponding to the transaction number includes a hash value of the operation manner corresponding to the transaction number, a carrier storing the course operation information, a credential tag providing verification, and an encrypted form.
In an optional implementation manner of the first aspect, the operation manner corresponding to the transaction number includes a type of operation and a number of operations.
In an optional implementation manner of the first aspect, the data interaction detection system is further configured to, after receiving an operation request initiated by the copyright accessor,
and recording the operation request initiated by the copyright access party in a block chain of the data detection system.
In a second aspect: the application provides a block chain-based digital copyright access method, which comprises the following steps:
the data interaction detection system receives work data information and work operation information uploaded by a copyright owner, and writes the work operation information into a linked list of a block chain, wherein the work operation information comprises transaction numbers of purchased works and operation modes corresponding to the transaction numbers;
the data interaction detection system sends the work data information and the linked list to a distributed trust database;
the data interaction detection system receives an operation request initiated by a copyright access party, and checks whether a transaction number and an operation mode carried in the operation request are matched with the work operation information recorded on the block chain;
if the data interaction detection system is matched with the distributed trust database, the data interaction detection system sends a request for acquiring the data information of the works to the distributed trust database;
the data interaction detection system receives the work data information and the linked list returned by the distributed trust database, and verifies the received linked list and the linked list in the block chain of the data interaction system;
and if the verification is correct, the data interaction detection system sends the received work data information to the copyright access party.
In a third aspect: the application provides a block chain-based digital copyright access method, which comprises the following steps:
the distributed trust database receives the work data information and the linked list sent by the data interaction detection system and encrypts the work data information and the linked list; the linked list comprises work operation information which is recorded on the block chain and uploaded by a copyright owner, wherein the work operation information comprises transaction numbers for purchasing works and operation modes corresponding to the transaction numbers;
the distributed trust database receives a data information acquisition request sent by the data interaction detection system, wherein the data information acquisition request is used for requesting to acquire the data information of the work corresponding to the transaction number; and after receiving the request for acquiring the work data information, the distributed trust database decrypts the corresponding work data information and the linked list, sends the linked list to the data interaction detection system for verification, and sends the work data information to the copyright access party through the data interaction detection system if the verification is not wrong.
In a fourth aspect: the present application also provides a digital rights access device based on a block chain, the device including:
the receiving module is used for receiving the work data information and the work operation information uploaded by the copyright owner, wherein the work operation information comprises transaction numbers for purchasing works and operation modes corresponding to the transaction numbers;
the writing module is used for writing the work operation information received by the receiving module into a linked list of the block chain;
the sending module is used for sending the work data information received by the receiving module and the linked list written by the writing device to a distributed trust database;
the receiving module is further configured to receive an operation request initiated by a copyright access party;
the checking module is used for checking whether the transaction number and the operation mode carried in the operation request received by the receiving module are matched with the work operation information recorded on the block chain or not;
the sending module is also used for sending a request for acquiring the data information of the works to the distributed trust database after the transaction number and the operation mode carried in the check operation request of the checking module are matched with the operation information of the works recorded on the block chain;
the receiving module is also used for receiving the work data information and the linked list returned by the distributed trust database;
the verification module is used for verifying the linked list received by the receiving module and the linked list in the block chain of the data interaction system;
the sending module is further configured to send the work data information received by the receiving module to the copyright access party.
In a fifth aspect: the present application also provides a digital rights access device based on a block chain, the device including:
the receiving module is used for receiving the work data information and the linked list sent by the data interaction detection system, the linked list comprises work operation information which is recorded on a block chain and uploaded by a copyright owner, and the work operation information comprises transaction numbers of purchased works and operation modes corresponding to the transaction numbers;
the encryption module is used for encrypting the work data information and the linked list received by the receiving module;
the receiving module is further configured to receive a data information acquisition request sent by the data interaction detection system, where the data information acquisition request is used to request to acquire the data information of the work corresponding to the transaction number;
the decryption module is used for decrypting and reading out corresponding work data information and a linked list;
and the sending module is used for sending the linked list decrypted by the decryption module to the data interaction detection system for verification, and if the verification is correct, the work data information is sent to the copyright access party through the data interaction detection system.
A sixth aspect: the present application provides a computing device comprising: the device comprises a processor, a memory and a communication module, wherein the memory and the communication module are respectively connected with the processor, the memory stores machine readable instructions executable by the processor, and the communication module is used for carrying out communication transmission with an external device; when the computing device is running, the processor executes the machine readable instructions to perform the method of the first aspect, any of the optional implementations of the first aspect, the second aspect or any of the optional implementations of the second aspect when executed.
Seventh aspect: the present application provides a computer readable storage medium having stored thereon a computer program for performing, when executed by a processor, the method of the first aspect, any of the alternative implementations of the first aspect, the second aspect or any of the alternative implementations of the second aspect.
An eighth aspect: the present application provides a computer program product which, when run on a computer, causes the computer to perform the method of the first aspect, any of the alternative implementations of the first aspect, the second aspect or any of the alternative implementations of the second aspect.
The beneficial effect of this application includes: according to the block chain-based digital copyright protection method and device, the content of the works uploaded by the copyright owner cannot be illegally copied by others to carry out piracy infringement, the copyright of the works can be mastered, and the copyright owner has evidence to inform infringement operation of an accessor when the copyright is infringed.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts. The foregoing and other objects, features and advantages of the application will be apparent from the accompanying drawings. Like reference numerals refer to like parts throughout the drawings. The drawings are not intended to be to scale as practical, emphasis instead being placed upon illustrating the subject matter of the present application.
Fig. 1 is a block chain-based digital rights protection system structure diagram according to a first embodiment of the present application;
fig. 2 is a flowchart of a block chain-based digital rights protection method according to a first embodiment of the present application;
fig. 3 is a schematic diagram of a block chain-based digital rights management apparatus according to a second embodiment of the present application;
fig. 4 is a schematic diagram of a block chain-based digital rights management apparatus according to a third embodiment of the present application;
fig. 5 is a schematic structural diagram of a computing device according to a fourth embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art without any inventive work based on the embodiments in the present application are within the scope of protection of the present application. Thus, the following detailed description of the embodiments of the present application, as presented in the figures, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments obtained by a person of ordinary skill in the art without any inventive work based on the embodiments in the present application are within the scope of protection of the present application.
In the description of the present application, it is to be understood that the terms "center", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience in describing the present application and simplifying the description, but do not indicate or imply that the referenced device or element must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be construed as limiting the present application.
Furthermore, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first," "second," etc. may explicitly or implicitly include one or more of that feature. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
In this application, unless expressly stated or limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can include, for example, fixed connections, removable connections, or integral parts; either directly or indirectly through intervening media, either internally or in any other relationship. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate.
In this application, unless expressly stated or limited otherwise, the first feature "on" or "under" the second feature may comprise direct contact of the first and second features, or may comprise contact of the first and second features not directly but through another feature in between. Also, the first feature being "on," "above" and "over" the second feature includes the first feature being directly on and obliquely above the second feature, or merely indicating that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature includes the first feature being directly under and obliquely below the second feature, or simply meaning that the first feature is at a lesser elevation than the second feature.
First embodiment
Digital copyright Management, the English full name of Digital Rights Management, mainly adopts the techniques of Digital watermarking, copyright protection, Digital signature and data encryption. Typically as digital rights protection or digital rights management. DRM falls into two categories, multimedia protection, such as encrypted movies, music, audio-video, streaming media files. Another type is an encrypted document, such as Word, Excel, PDF, and the like. DRM mainly protects documents, movies, music from piracy by technical means. This technology protects digital content by encrypting it and appending usage rules that can tell if the user is eligible for playback.
Digital rights protected in this application may include copyrights for literary works, text, video, audio, animation, pictures, flash, and the like. It should be noted that: the digital content work forms are listed here only in several types, but are not limited to these types.
As shown in fig. 1, the present application provides a block chain-based digital copyright protection system, which includes a data interaction detection system and a distributed trust database, where a copyright owner uploads work data information and work operation information to the data interaction detection system, and the data interaction detection system writes the work operation information into a linked list of the block chain and sends the work operation information and the linked list to the distributed trust database;
the distributed trust database encrypts the data information of the works and the linked list;
the data interaction detection system receives an operation request initiated by a copyright access party, checks whether a transaction number and an operation mode carried in the operation request are matched with the work operation information recorded on the block chain, and sends a work data acquisition request to the distributed trust database if the transaction number and the operation mode are matched with the work operation information;
the distributed trust database receives the request for acquiring the work data, decrypts and reads out corresponding work data information and a linked list, and sends the corresponding work data information and the linked list to the data interaction detection system;
and the data interaction detection system receives corresponding work data information and a linked list and carries out consistency verification on the received linked list and the linked list in the block chain.
Specifically, as shown in fig. 2, the present application provides a block chain-based digital rights protection method, including:
step 101: the data interaction system receives the work operation information and the work data information uploaded by the copyright owner, writes the work operation information into a linked list of the block chain, and transfers the work operation information to step 102, wherein the work operation information comprises transaction numbers of purchased works and operation modes corresponding to the transaction numbers.
Step 102: the data interaction detection system sends the work data information and the linked list to the distributed trust database and goes to step 103.
Step 103: and the distributed trust database receives the work data information and the linked list sent by the data interaction system, encrypts the work data information and the linked list and transfers to the step 104.
Step 104: the data interaction detection system receives an operation request initiated by a copyright access party, checks whether a transaction number and an operation mode carried in the operation request are matched with the work operation information recorded in the linked list or not, if yes, sends a request for acquiring the work data information to the distributed trust database, and then goes to step 105.
Step 105: the distributed trust database receives the request for obtaining the work data information sent by the data interaction detection system, decrypts and reads the corresponding work data information and the linked list, sends the read work data information and the read linked list to the data interaction detection system, and goes to step 106.
Step 106: the data interaction detection system receives the work data information and the linked list read out by the distributed trust database, and carries out consistency verification on the received linked list and the linked list in the block chain of the data interaction detection system; if the verification is correct, the data information of the works is sent to the copyright access party.
Optionally, before step 101, the method further comprises: and the data interaction detection system receives the permission of the block chain where the access linked list is located, which is granted by the copyright owner.
Specifically, in the above steps, only if the copyright owner grants the data interaction detection system right, the data interaction detection system can access and operate the work operation information stored in the blockchain.
It should be noted here that when the copyright owner wants to terminate the usage of the copyright for some reason, such as not wanting to continue the access of the copyright owner to the work, the access and operation of the copyright owner to the work can be terminated by revoking the right of the work in the data interaction detection system.
Optionally, before step 101, the method further comprises: the data interaction detection system and the distributed trust database receive a public key provided by a copyright owner.
Specifically, the public key at this time is provided for the copyright owner, and the technical scheme of the application adopts an asymmetric encryption algorithm, which is as follows: when a file is encrypted by using an asymmetric encryption algorithm, only a pair of matched public key and private key is used to complete the encryption and decryption process of a plaintext, for example, a public key is used to encrypt a file, a private key matched with the public key is used to decrypt the file, and a private key is used to encrypt a file, and a public key matched with the private key is used to decrypt the file.
Optionally, the operation mode corresponding to the transaction number in step 101 includes a hash value of the operation mode corresponding to the transaction number, a carrier storing the course operation information, a credential tag providing verification, and an encryption form.
Optionally, the operation mode corresponding to the transaction number in step 101 includes a type of operation and a number of operations.
Specifically, the work data information includes specific content of the work; the work operation information comprises operation information of a copyright owner and a copyright access party on works each time, wherein the specific work operation information comprises playing and downloading. The linked list is recorded on the blockchain, and comprises all verified blockchain transaction numbers and corresponding operation modes thereof, wherein the corresponding detailed information comprises: hash, Token, Signature and Encrypt, wherein the Hash represents a Hash value of a corresponding operation mode and is invisible to a database; token represents a carrier for storing the operation actions of the curriculum, and is visible to the database; signature represents a verification credential or tag; encrypt denotes an encrypted form of the work data information.
Optionally, in step 103, specifically: the distributed trust database encrypts the work data information and the linked list according to the provided private key; in step 105, specifically: the distributed trust database decrypts the work data information and the linked list stored in the distributed trust database according to the exchanged public key; in step 106, specifically: and the data interaction detection system carries out consistency verification on the linked list and the linked list recorded in the block chain of the data interaction detection system through a public key provided by a copyright owner.
In step 103, the distributed trust database encrypts the work data information and the linked list through a private key provided by the copyright owner and paired with the public key exchanged in step 101, and stores the encrypted form of the linked list in the distributed trust database, wherein the encrypted form of the linked list is Encrypt.
In step 104, specifically, after receiving the operation information initiated by the copyright accessing party, the data interaction detection system finds the linked list where the corresponding work operation information is located according to the transaction number sent by the copyright accessing party, and reads and checks whether the number and the type of all work operations stored by Token in the linked list correspond to the number and the type of the operation information initiated by the copyright accessing party one to one. Optionally, if the data interaction detection system finds that the operation information initiated by the copyright accessing party is inconsistent after checking, the data interaction detection system terminates the operation of the copyright accessing party on the works.
Optionally, in step 104, after receiving the operation request initiated by the copyright accessing party, the operation request initiated by the copyright accessing party is recorded in the blockchain of the data detection system.
Specifically, the copyright owner can also obtain the operation information record of the copyright access party on the corresponding course by calling the token value of the access course of the copyright access party in the database of the data interaction detection system, so that the copyright owner can master the operation process of the copyright access party, if the copyright access party relates to illegal operation information on works of the copyright owner and subsequently relates to infringement related matters, the access record mastered by the copyright access party can be used as an evidence for maintaining the right in the subsequent right maintaining process.
In step 106, the public key also has the function of verifying the digital signature, and the decrypted linked list is completely consistent with the linked list stored in the database of the data interaction system, so that the verification is correct. Specifically, a corresponding linked list is found through the transaction number, and whether all information in Token in the linked list is consistent with information in the singnature and corresponding information in the read linked list is verified.
The significance of the verification is as follows: firstly, confirming whether the work data information decrypted and read from the distributed trust database is required to be accessed by a copyright access party; secondly, whether the data information of the decrypted and read works is complete or not is confirmed, and if the data information of the decrypted and read works is incomplete, the operation performed by a copyright access party can not be completely realized; thirdly, the distributed trust database is not completely reliable and may be maliciously tampered, so that the read linked list and the original linked list are verified, and the effect of determining the required work data information is achieved.
Second embodiment
The present application further provides a digital rights access device based on a block chain, including:
the receiving module 201 is configured to receive work data information and work operation information uploaded by a copyright owner, where the work operation information includes transaction numbers of purchased works and operation modes corresponding to the transaction numbers;
a writing module 202, configured to write the work operation information received by the receiving module 201 into a linked list of the block chain;
the sending module 203 is used for sending the work data information received by the receiving module 201 and the linked list written by the writing device to the distributed trust database;
the receiving module 201 is further configured to receive an operation request initiated by a rights access party;
a checking module 204, configured to check whether the transaction number and the operation mode carried in the operation request received by the receiving module 201 are matched with the work operation information recorded on the blockchain;
the sending module 203 is further configured to send a request for obtaining data information of the work to the distributed trust database after the checking module 204 checks that the transaction number and the operation mode carried in the operation request are matched with the work operation information recorded on the blockchain;
the receiving module 201 is further configured to receive the work data information and the linked list returned by the distributed trust database;
the verifying module 205 is configured to verify the linked list received by the receiving module 201 and a linked list in a block chain of the data interaction system;
the sending module 203 is further configured to send the work data information received by the receiving module 201 to the copyright accessing party.
Third embodiment
The present application further provides a digital rights access device based on a block chain, including:
the receiving module 301 is configured to receive work data information and a linked list sent by a data interaction detection system, where the linked list includes work operation information recorded on a blockchain and uploaded by a copyright owner, and the work operation information includes transaction numbers of purchased works and operation modes corresponding to the transaction numbers;
an encryption module 302, configured to encrypt the work data information and the linked list received by the receiving module 301;
the receiving module 301 is further configured to receive a data information acquisition request sent by the data interaction detection system, where the data information acquisition request is used to request to acquire the data information of the work corresponding to the transaction number;
a decryption module 303, configured to decrypt and read out corresponding work data information and a linked list;
and the sending module 304 is configured to send the linked list decrypted by the decryption device 303 to the data interaction detection system for verification, and if the verification is correct, send the data information of the work to the copyright access party through the data interaction detection system.
Fourth embodiment
The present application provides a computing device comprising: the device comprises a processor 401, a memory 402 and a communication module 403, wherein the memory 402 and the communication module 403 are respectively connected with the processor, the memory 402 stores machine-readable instructions executable by the processor 401, and the communication module 403 is used for communicating with an external device; when the computing device is running, the processor 401 executes the machine readable instructions to perform the method of the first embodiment, any optional implementation of the first embodiment, or any optional implementation of the second embodiment, or any optional implementation of the third embodiment.
The present application provides a computer-readable storage medium having stored thereon a computer program, which when executed by a processor performs the method of any of the first embodiment, any optional implementation of the first embodiment, or any of the second embodiment, any optional implementation of the second embodiment, or any optional implementation of the third embodiment.
The present application provides a computer program product, which when run on a computer causes the computer to execute the method of any of the first embodiment, any optional implementation of the first embodiment, or any optional implementation of the second embodiment, or any optional implementation of the third embodiment.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

the data interaction detection system is also used for receiving an operation request initiated by a copyright access party, checking whether a transaction number and an operation mode carried in the operation request are matched with the work operation information recorded on the block chain, and if the transaction number and the operation mode are matched with the work operation information, sending a work data information acquisition request to the distributed trust database, wherein the work data information acquisition request is used for requesting to acquire the work data information corresponding to the transaction number; the checking whether the transaction number and the operation mode carried in the operation request are matched with the work operation information recorded on the blockchain or not includes: searching a linked list where corresponding work operation information is located according to a transaction number sent by a copyright access party, reading and checking whether the number and the type of all work operations stored in the linked list are in one-to-one correspondence with the number and the type of operation information initiated by the copyright access party, and if the number and the type are in one-to-one correspondence, indicating matching;
the data interaction detection system receives an operation request initiated by a copyright access party, and checks whether a transaction number and an operation mode carried in the operation request are matched with the work operation information recorded on the block chain; the checking whether the transaction number and the operation mode carried in the operation request are matched with the work operation information recorded on the blockchain or not includes: searching a linked list where corresponding work operation information is located according to a transaction number sent by a copyright access party, reading and checking whether the number and the type of all work operations stored in the linked list are in one-to-one correspondence with the number and the type of operation information initiated by the copyright access party, and if the number and the type are in one-to-one correspondence, indicating matching;
CN201810892685.3A2018-08-072018-08-07Block chain-based digital copyright protection method and systemActiveCN109145617B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810892685.3ACN109145617B (en)2018-08-072018-08-07Block chain-based digital copyright protection method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810892685.3ACN109145617B (en)2018-08-072018-08-07Block chain-based digital copyright protection method and system

Publications (2)

Publication NumberPublication Date
CN109145617A CN109145617A (en)2019-01-04
CN109145617Btrue CN109145617B (en)2021-04-30

Family

ID=64791796

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810892685.3AActiveCN109145617B (en)2018-08-072018-08-07Block chain-based digital copyright protection method and system

Country Status (1)

CountryLink
CN (1)CN109145617B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109729093A (en)*2019-01-172019-05-07重庆邮电大学 A blockchain-based digital copyright registration technology
CN110263583B (en)*2019-05-172020-09-08阿里巴巴集团控股有限公司 A block chain-based infringement certificate storage method, device and electronic device
CN110610067A (en)*2019-06-212019-12-24深圳市元征科技股份有限公司Copyright management method and device
CN110968846A (en)*2019-11-272020-04-07浙江大学Music content copyright protection method and system based on block chain
CN116305003B (en)*2023-05-112023-08-15南京信息工程大学PDF document copyright protection system based on blockchain

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
AU2016235539B2 (en)*2015-03-202019-01-24Rivetz Corp.Automated attestation of device integrity using the block chain
CN107222303A (en)*2017-05-112017-09-29暨南大学Digital publishing rights traceability system building method based on block chain and cloud platform
CN107171785A (en)*2017-05-182017-09-15电子科技大学A kind of digital copyright management method based on block chain technology
CN107330694A (en)*2017-07-032017-11-07重庆小犀智能科技有限公司Copyright trading system and method for commerce based on block chain

Also Published As

Publication numberPublication date
CN109145617A (en)2019-01-04

Similar Documents

PublicationPublication DateTitle
CN109145617B (en)Block chain-based digital copyright protection method and system
US8417966B1 (en)System and method for measuring and reporting consumption of rights-protected media content
KR101509377B1 (en)Device and method for a backup of rights objects
CN102073826B (en)Utilize the system and method for the digital copyright management of lightweight digital watermark adding component
US7870076B2 (en)Method and an apparatus to provide interoperability between different protection schemes
JP5113299B2 (en) DRM providing apparatus, system and method thereof
US10002237B2 (en)System and method for parts-based digital rights management
US8595488B2 (en)Apparatus, system and method for securing digital documents in a digital appliance
US8751795B2 (en)Secure transfer and tracking of data using removable non-volatile memory devices
US8359473B1 (en)System and method for digital rights management using digital signatures
US20040039932A1 (en)Apparatus, system and method for securing digital documents in a digital appliance
JPWO2004109972A1 (en) User terminal for license reception
US20130132733A1 (en)System And Method For Digital Rights Management With System Individualization
US20070014403A1 (en)Controlling distribution of protected content
Nair et al.Enabling DRM-preserving digital content redistribution
CN100364002C (en)Apparatus and method for reading or writing user data
US20050060544A1 (en)System and method for digital content management and controlling copyright protection
CN104462872B (en)Terminal, server and digital Content-Authorize method
JP2002099514A (en) Digital data unauthorized use prevention method, digital data unauthorized use prevention system, registration device, distribution device, playback device, and recording medium
CN103442020B (en)The method sharing digital license authorization certificate between terminal unit
CN101282214A (en) Encryption protection method and client device for digital document
US20090313704A1 (en)Content management methods and systems
TWI465957B (en)Terminal device execution digital rights management off-line licensing method and terminal device thereof
KR20080013058A (en) Security ball CD
CN1700695A (en) A digital book content container format for network monitoring of published content

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp