Disclosure of Invention
The application aims to provide a block chain-based digital copyright protection method and a block chain-based digital copyright protection system, which are used for performing digital copyright protection and solving the problem of illegally stealing digital work content.
In order to achieve the above object, the present application provides the following technical solutions:
in a first aspect: the application provides a digital copyright protection system based on a block chain, which comprises a data interaction detection system and a distributed trust database,
the data interaction detection system is used for receiving the work data information and the work operation information uploaded by the copyright owner and writing the work operation information into a linked list of a block chain, wherein the work operation information comprises transaction numbers of purchased works and operation modes corresponding to the transaction numbers; sending the work data information and the linked list to the distributed trust database;
the distributed trust database is used for receiving the work data information and the linked list and encrypting the work data information and the linked list;
the data interaction detection system is also used for receiving an operation request initiated by a copyright access party, checking whether a transaction number and an operation mode carried in the operation request are matched with the work operation information recorded on the block chain, and if the transaction number and the operation mode are matched with the work operation information, sending a work data information acquisition request to the distributed trust database, wherein the work data information acquisition request is used for requesting to acquire the work data information corresponding to the transaction number;
the distributed trust database is also used for decrypting the work data information and the linked list corresponding to the transaction number after receiving a request for acquiring the work data information, which is sent by the data interaction system, and sending the table entries corresponding to the transaction number in the work data information and the linked list to the data interaction detection system;
and the data interaction detection system is used for receiving the work data information and the linked list sent by the distributed trust database, carrying out consistency verification on the received linked list and the linked list in the block chain of the data interaction system, and sending the received work data information to the copyright access party if the verification is passed.
In an optional implementation manner of the first aspect, the data interaction detection system is further configured to receive a right granted by a copyright accessing party to access the blockchain in which the linked list is located.
In an optional implementation manner of the first aspect, the data interaction detection system is further configured to: before receiving the work data information and work operation information uploaded by a copyright owner, receiving a public key provided by the copyright owner;
the distributed trust database is further configured to: before receiving the work data information and the linked list, receiving a public key provided by a copyright owner;
the distributed trust database is to: encrypting the work data information and the linked list, specifically: encrypting the work data information and the linked list according to a private key provided by a copyright owner;
the distributed trust database is to: decrypting the work data information and the linked list corresponding to the transaction number specifically comprises the following steps: and decrypting the work data information and the linked list corresponding to the transaction number according to the public key provided by the copyright owner.
In an optional implementation manner of the first aspect, after receiving the work data information and the linked list sent by the distributed trust database, the data interaction detection system is further configured to perform consistency verification on the linked list and the linked list recorded in the block chain of the data interaction detection system through a public key provided by a copyright owner.
In an optional implementation manner of the first aspect, the operation manner corresponding to the transaction number includes a hash value of the operation manner corresponding to the transaction number, a carrier storing the course operation information, a credential tag providing verification, and an encrypted form.
In an optional implementation manner of the first aspect, the operation manner corresponding to the transaction number includes a type of operation and a number of operations.
In an optional implementation manner of the first aspect, the data interaction detection system is further configured to, after receiving an operation request initiated by the copyright accessor,
and recording the operation request initiated by the copyright access party in a block chain of the data detection system.
In a second aspect: the application provides a block chain-based digital copyright access method, which comprises the following steps:
the data interaction detection system receives work data information and work operation information uploaded by a copyright owner, and writes the work operation information into a linked list of a block chain, wherein the work operation information comprises transaction numbers of purchased works and operation modes corresponding to the transaction numbers;
the data interaction detection system sends the work data information and the linked list to a distributed trust database;
the data interaction detection system receives an operation request initiated by a copyright access party, and checks whether a transaction number and an operation mode carried in the operation request are matched with the work operation information recorded on the block chain;
if the data interaction detection system is matched with the distributed trust database, the data interaction detection system sends a request for acquiring the data information of the works to the distributed trust database;
the data interaction detection system receives the work data information and the linked list returned by the distributed trust database, and verifies the received linked list and the linked list in the block chain of the data interaction system;
and if the verification is correct, the data interaction detection system sends the received work data information to the copyright access party.
In a third aspect: the application provides a block chain-based digital copyright access method, which comprises the following steps:
the distributed trust database receives the work data information and the linked list sent by the data interaction detection system and encrypts the work data information and the linked list; the linked list comprises work operation information which is recorded on the block chain and uploaded by a copyright owner, wherein the work operation information comprises transaction numbers for purchasing works and operation modes corresponding to the transaction numbers;
the distributed trust database receives a data information acquisition request sent by the data interaction detection system, wherein the data information acquisition request is used for requesting to acquire the data information of the work corresponding to the transaction number; and after receiving the request for acquiring the work data information, the distributed trust database decrypts the corresponding work data information and the linked list, sends the linked list to the data interaction detection system for verification, and sends the work data information to the copyright access party through the data interaction detection system if the verification is not wrong.
In a fourth aspect: the present application also provides a digital rights access device based on a block chain, the device including:
the receiving module is used for receiving the work data information and the work operation information uploaded by the copyright owner, wherein the work operation information comprises transaction numbers for purchasing works and operation modes corresponding to the transaction numbers;
the writing module is used for writing the work operation information received by the receiving module into a linked list of the block chain;
the sending module is used for sending the work data information received by the receiving module and the linked list written by the writing device to a distributed trust database;
the receiving module is further configured to receive an operation request initiated by a copyright access party;
the checking module is used for checking whether the transaction number and the operation mode carried in the operation request received by the receiving module are matched with the work operation information recorded on the block chain or not;
the sending module is also used for sending a request for acquiring the data information of the works to the distributed trust database after the transaction number and the operation mode carried in the check operation request of the checking module are matched with the operation information of the works recorded on the block chain;
the receiving module is also used for receiving the work data information and the linked list returned by the distributed trust database;
the verification module is used for verifying the linked list received by the receiving module and the linked list in the block chain of the data interaction system;
the sending module is further configured to send the work data information received by the receiving module to the copyright access party.
In a fifth aspect: the present application also provides a digital rights access device based on a block chain, the device including:
the receiving module is used for receiving the work data information and the linked list sent by the data interaction detection system, the linked list comprises work operation information which is recorded on a block chain and uploaded by a copyright owner, and the work operation information comprises transaction numbers of purchased works and operation modes corresponding to the transaction numbers;
the encryption module is used for encrypting the work data information and the linked list received by the receiving module;
the receiving module is further configured to receive a data information acquisition request sent by the data interaction detection system, where the data information acquisition request is used to request to acquire the data information of the work corresponding to the transaction number;
the decryption module is used for decrypting and reading out corresponding work data information and a linked list;
and the sending module is used for sending the linked list decrypted by the decryption module to the data interaction detection system for verification, and if the verification is correct, the work data information is sent to the copyright access party through the data interaction detection system.
A sixth aspect: the present application provides a computing device comprising: the device comprises a processor, a memory and a communication module, wherein the memory and the communication module are respectively connected with the processor, the memory stores machine readable instructions executable by the processor, and the communication module is used for carrying out communication transmission with an external device; when the computing device is running, the processor executes the machine readable instructions to perform the method of the first aspect, any of the optional implementations of the first aspect, the second aspect or any of the optional implementations of the second aspect when executed.
Seventh aspect: the present application provides a computer readable storage medium having stored thereon a computer program for performing, when executed by a processor, the method of the first aspect, any of the alternative implementations of the first aspect, the second aspect or any of the alternative implementations of the second aspect.
An eighth aspect: the present application provides a computer program product which, when run on a computer, causes the computer to perform the method of the first aspect, any of the alternative implementations of the first aspect, the second aspect or any of the alternative implementations of the second aspect.
The beneficial effect of this application includes: according to the block chain-based digital copyright protection method and device, the content of the works uploaded by the copyright owner cannot be illegally copied by others to carry out piracy infringement, the copyright of the works can be mastered, and the copyright owner has evidence to inform infringement operation of an accessor when the copyright is infringed.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art without any inventive work based on the embodiments in the present application are within the scope of protection of the present application. Thus, the following detailed description of the embodiments of the present application, as presented in the figures, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments obtained by a person of ordinary skill in the art without any inventive work based on the embodiments in the present application are within the scope of protection of the present application.
In the description of the present application, it is to be understood that the terms "center", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience in describing the present application and simplifying the description, but do not indicate or imply that the referenced device or element must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be construed as limiting the present application.
Furthermore, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first," "second," etc. may explicitly or implicitly include one or more of that feature. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
In this application, unless expressly stated or limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can include, for example, fixed connections, removable connections, or integral parts; either directly or indirectly through intervening media, either internally or in any other relationship. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate.
In this application, unless expressly stated or limited otherwise, the first feature "on" or "under" the second feature may comprise direct contact of the first and second features, or may comprise contact of the first and second features not directly but through another feature in between. Also, the first feature being "on," "above" and "over" the second feature includes the first feature being directly on and obliquely above the second feature, or merely indicating that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature includes the first feature being directly under and obliquely below the second feature, or simply meaning that the first feature is at a lesser elevation than the second feature.
First embodiment
Digital copyright Management, the English full name of Digital Rights Management, mainly adopts the techniques of Digital watermarking, copyright protection, Digital signature and data encryption. Typically as digital rights protection or digital rights management. DRM falls into two categories, multimedia protection, such as encrypted movies, music, audio-video, streaming media files. Another type is an encrypted document, such as Word, Excel, PDF, and the like. DRM mainly protects documents, movies, music from piracy by technical means. This technology protects digital content by encrypting it and appending usage rules that can tell if the user is eligible for playback.
Digital rights protected in this application may include copyrights for literary works, text, video, audio, animation, pictures, flash, and the like. It should be noted that: the digital content work forms are listed here only in several types, but are not limited to these types.
As shown in fig. 1, the present application provides a block chain-based digital copyright protection system, which includes a data interaction detection system and a distributed trust database, where a copyright owner uploads work data information and work operation information to the data interaction detection system, and the data interaction detection system writes the work operation information into a linked list of the block chain and sends the work operation information and the linked list to the distributed trust database;
the distributed trust database encrypts the data information of the works and the linked list;
the data interaction detection system receives an operation request initiated by a copyright access party, checks whether a transaction number and an operation mode carried in the operation request are matched with the work operation information recorded on the block chain, and sends a work data acquisition request to the distributed trust database if the transaction number and the operation mode are matched with the work operation information;
the distributed trust database receives the request for acquiring the work data, decrypts and reads out corresponding work data information and a linked list, and sends the corresponding work data information and the linked list to the data interaction detection system;
and the data interaction detection system receives corresponding work data information and a linked list and carries out consistency verification on the received linked list and the linked list in the block chain.
Specifically, as shown in fig. 2, the present application provides a block chain-based digital rights protection method, including:
step 101: the data interaction system receives the work operation information and the work data information uploaded by the copyright owner, writes the work operation information into a linked list of the block chain, and transfers the work operation information to step 102, wherein the work operation information comprises transaction numbers of purchased works and operation modes corresponding to the transaction numbers.
Step 102: the data interaction detection system sends the work data information and the linked list to the distributed trust database and goes to step 103.
Step 103: and the distributed trust database receives the work data information and the linked list sent by the data interaction system, encrypts the work data information and the linked list and transfers to the step 104.
Step 104: the data interaction detection system receives an operation request initiated by a copyright access party, checks whether a transaction number and an operation mode carried in the operation request are matched with the work operation information recorded in the linked list or not, if yes, sends a request for acquiring the work data information to the distributed trust database, and then goes to step 105.
Step 105: the distributed trust database receives the request for obtaining the work data information sent by the data interaction detection system, decrypts and reads the corresponding work data information and the linked list, sends the read work data information and the read linked list to the data interaction detection system, and goes to step 106.
Step 106: the data interaction detection system receives the work data information and the linked list read out by the distributed trust database, and carries out consistency verification on the received linked list and the linked list in the block chain of the data interaction detection system; if the verification is correct, the data information of the works is sent to the copyright access party.
Optionally, before step 101, the method further comprises: and the data interaction detection system receives the permission of the block chain where the access linked list is located, which is granted by the copyright owner.
Specifically, in the above steps, only if the copyright owner grants the data interaction detection system right, the data interaction detection system can access and operate the work operation information stored in the blockchain.
It should be noted here that when the copyright owner wants to terminate the usage of the copyright for some reason, such as not wanting to continue the access of the copyright owner to the work, the access and operation of the copyright owner to the work can be terminated by revoking the right of the work in the data interaction detection system.
Optionally, before step 101, the method further comprises: the data interaction detection system and the distributed trust database receive a public key provided by a copyright owner.
Specifically, the public key at this time is provided for the copyright owner, and the technical scheme of the application adopts an asymmetric encryption algorithm, which is as follows: when a file is encrypted by using an asymmetric encryption algorithm, only a pair of matched public key and private key is used to complete the encryption and decryption process of a plaintext, for example, a public key is used to encrypt a file, a private key matched with the public key is used to decrypt the file, and a private key is used to encrypt a file, and a public key matched with the private key is used to decrypt the file.
Optionally, the operation mode corresponding to the transaction number in step 101 includes a hash value of the operation mode corresponding to the transaction number, a carrier storing the course operation information, a credential tag providing verification, and an encryption form.
Optionally, the operation mode corresponding to the transaction number in step 101 includes a type of operation and a number of operations.
Specifically, the work data information includes specific content of the work; the work operation information comprises operation information of a copyright owner and a copyright access party on works each time, wherein the specific work operation information comprises playing and downloading. The linked list is recorded on the blockchain, and comprises all verified blockchain transaction numbers and corresponding operation modes thereof, wherein the corresponding detailed information comprises: hash, Token, Signature and Encrypt, wherein the Hash represents a Hash value of a corresponding operation mode and is invisible to a database; token represents a carrier for storing the operation actions of the curriculum, and is visible to the database; signature represents a verification credential or tag; encrypt denotes an encrypted form of the work data information.
Optionally, in step 103, specifically: the distributed trust database encrypts the work data information and the linked list according to the provided private key; in step 105, specifically: the distributed trust database decrypts the work data information and the linked list stored in the distributed trust database according to the exchanged public key; in step 106, specifically: and the data interaction detection system carries out consistency verification on the linked list and the linked list recorded in the block chain of the data interaction detection system through a public key provided by a copyright owner.
In step 103, the distributed trust database encrypts the work data information and the linked list through a private key provided by the copyright owner and paired with the public key exchanged in step 101, and stores the encrypted form of the linked list in the distributed trust database, wherein the encrypted form of the linked list is Encrypt.
In step 104, specifically, after receiving the operation information initiated by the copyright accessing party, the data interaction detection system finds the linked list where the corresponding work operation information is located according to the transaction number sent by the copyright accessing party, and reads and checks whether the number and the type of all work operations stored by Token in the linked list correspond to the number and the type of the operation information initiated by the copyright accessing party one to one. Optionally, if the data interaction detection system finds that the operation information initiated by the copyright accessing party is inconsistent after checking, the data interaction detection system terminates the operation of the copyright accessing party on the works.
Optionally, in step 104, after receiving the operation request initiated by the copyright accessing party, the operation request initiated by the copyright accessing party is recorded in the blockchain of the data detection system.
Specifically, the copyright owner can also obtain the operation information record of the copyright access party on the corresponding course by calling the token value of the access course of the copyright access party in the database of the data interaction detection system, so that the copyright owner can master the operation process of the copyright access party, if the copyright access party relates to illegal operation information on works of the copyright owner and subsequently relates to infringement related matters, the access record mastered by the copyright access party can be used as an evidence for maintaining the right in the subsequent right maintaining process.
In step 106, the public key also has the function of verifying the digital signature, and the decrypted linked list is completely consistent with the linked list stored in the database of the data interaction system, so that the verification is correct. Specifically, a corresponding linked list is found through the transaction number, and whether all information in Token in the linked list is consistent with information in the singnature and corresponding information in the read linked list is verified.
The significance of the verification is as follows: firstly, confirming whether the work data information decrypted and read from the distributed trust database is required to be accessed by a copyright access party; secondly, whether the data information of the decrypted and read works is complete or not is confirmed, and if the data information of the decrypted and read works is incomplete, the operation performed by a copyright access party can not be completely realized; thirdly, the distributed trust database is not completely reliable and may be maliciously tampered, so that the read linked list and the original linked list are verified, and the effect of determining the required work data information is achieved.
Second embodiment
The present application further provides a digital rights access device based on a block chain, including:
the receiving module 201 is configured to receive work data information and work operation information uploaded by a copyright owner, where the work operation information includes transaction numbers of purchased works and operation modes corresponding to the transaction numbers;
a writing module 202, configured to write the work operation information received by the receiving module 201 into a linked list of the block chain;
the sending module 203 is used for sending the work data information received by the receiving module 201 and the linked list written by the writing device to the distributed trust database;
the receiving module 201 is further configured to receive an operation request initiated by a rights access party;
a checking module 204, configured to check whether the transaction number and the operation mode carried in the operation request received by the receiving module 201 are matched with the work operation information recorded on the blockchain;
the sending module 203 is further configured to send a request for obtaining data information of the work to the distributed trust database after the checking module 204 checks that the transaction number and the operation mode carried in the operation request are matched with the work operation information recorded on the blockchain;
the receiving module 201 is further configured to receive the work data information and the linked list returned by the distributed trust database;
the verifying module 205 is configured to verify the linked list received by the receiving module 201 and a linked list in a block chain of the data interaction system;
the sending module 203 is further configured to send the work data information received by the receiving module 201 to the copyright accessing party.
Third embodiment
The present application further provides a digital rights access device based on a block chain, including:
the receiving module 301 is configured to receive work data information and a linked list sent by a data interaction detection system, where the linked list includes work operation information recorded on a blockchain and uploaded by a copyright owner, and the work operation information includes transaction numbers of purchased works and operation modes corresponding to the transaction numbers;
an encryption module 302, configured to encrypt the work data information and the linked list received by the receiving module 301;
the receiving module 301 is further configured to receive a data information acquisition request sent by the data interaction detection system, where the data information acquisition request is used to request to acquire the data information of the work corresponding to the transaction number;
a decryption module 303, configured to decrypt and read out corresponding work data information and a linked list;
and the sending module 304 is configured to send the linked list decrypted by the decryption device 303 to the data interaction detection system for verification, and if the verification is correct, send the data information of the work to the copyright access party through the data interaction detection system.
Fourth embodiment
The present application provides a computing device comprising: the device comprises a processor 401, a memory 402 and a communication module 403, wherein the memory 402 and the communication module 403 are respectively connected with the processor, the memory 402 stores machine-readable instructions executable by the processor 401, and the communication module 403 is used for communicating with an external device; when the computing device is running, the processor 401 executes the machine readable instructions to perform the method of the first embodiment, any optional implementation of the first embodiment, or any optional implementation of the second embodiment, or any optional implementation of the third embodiment.
The present application provides a computer-readable storage medium having stored thereon a computer program, which when executed by a processor performs the method of any of the first embodiment, any optional implementation of the first embodiment, or any of the second embodiment, any optional implementation of the second embodiment, or any optional implementation of the third embodiment.
The present application provides a computer program product, which when run on a computer causes the computer to execute the method of any of the first embodiment, any optional implementation of the first embodiment, or any optional implementation of the second embodiment, or any optional implementation of the third embodiment.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.