Disclosure of Invention
In view of the above problems, the present application provides a method and related apparatus for protecting copyright of digital information, so as to achieve the purpose of improving copyright security of digital information. The specific scheme is as follows:
The first aspect of the present application provides a copyright protection method for digital information, which is applied to a content provider system, and the copyright protection method for digital information comprises the following steps:
After a content requester system purchases first digital information and successfully transacts, generating an authorization credential of the first digital information, and recording a binding relationship between the authorization credential of the first digital information and a wallet address of the content requester system into a non-homogeneous token contract of the first digital information in a blockchain node;
Transmitting contract information of the first digital information to the content requester system, the contract information including a contract identification and an authorization credential;
Acquiring a display request sent by the content requester system, wherein the display request comprises a wallet address of the content requester system, an authorization credential of second digital information and a contract identifier, and the display request is used for requesting the second digital information;
Searching whether the authorization certificate of the second digital information has a binding relation with the wallet address of the content requester system in a target contract; wherein the target contract is about a contract identification indicative of a non-homogenous token contract for the second digital information;
If yes, the information source address of the second digital information is sent to the content requester system, so that the content requester system obtains the second digital information based on the information source address of the second digital information.
In one possible implementation, obtaining the presentation request sent by the content requester system includes:
Receiving a signature data packet sent by the content requester system, wherein the signature data is obtained after the content requester system signs the display request by using a private key of the content requester system;
signing the private key signature in the signature data packet by using the public key of the content requester system;
And obtaining the display request after the verification passes.
In one possible implementation, the method for protecting copyright of digital information further includes: the method comprises the steps of sending an original file of digital information to be distributed to a key management service (DRM) system, enabling the DRM system to conduct slicing encryption processing on the original file of the digital information to be distributed by using a key to obtain an encrypted file of the digital information to be distributed, storing the key and a key identifier correspondingly, and returning the encrypted file of the digital information to be distributed to a content provider system;
storing an encrypted file of the digital information to be distributed by using the video source address of the digital information to be distributed, distributing a heterogeneous token contract of the digital information to be distributed on the blockchain node, recording an interface address of display information of the digital information to be distributed in the heterogeneous token contract of the digital information to be distributed, wherein the display information comprises DRM information, and the DRM information comprises a key identification and a verification address.
In one possible implementation, after obtaining the presentation request sent by the content requester system, the method for protecting copyright of digital information further includes:
Searching an interface address of display information of the second digital information from the target contract based on the contract identification of the second digital information;
Accessing an interface address of the display information of the second digital information to obtain the display information of the second digital information;
requesting a certificate service identifier from the DRM system according to the DRM information of the second digital information so as to enable the DRM system to return the certificate service identifier;
And sending the certificate service identifier to the content requester system so that the content requester system requests a key of the second digital information from the DRM system based on the certificate service identifier and the display information of the second digital information, and decrypting the encrypted file of the second digital information based on the key of the second digital information.
A second aspect of the present application provides a copyright protection method for digital information, which is applied to a content requester system, the copyright protection method for digital information including:
Acquiring contract information of the first digital information returned by a content provider system, wherein the contract information comprises contract identification and authorization vouchers, the first digital information comprises any item of digital information which is successfully purchased from the content provider system, the authorization vouchers of the first digital information are generated by the content provider system after the purchase is successful, and the binding relationship between the first digital information and wallet addresses of the content requester system is recorded in heterogeneous token contracts indicated by the contract identification of the first digital information;
Sending a display request to the content provider system so that the content provider system searches whether an authorization ticket of second digital information has a binding relation with a wallet address of the content requester system in a target contract; if yes, sending the information source address of the second digital information to the content requester system;
Wherein the presentation request includes a wallet address of the content requester system, an authorization credential of the second digital information, and a contract identification, the presentation request being for requesting the second digital information; a contract identification indicating a non-homogenous token contract for which the target contract is about the second digital information;
And acquiring the second digital information based on the information source address of the second digital information.
In one possible implementation, sending a presentation request to the content provider system includes:
Carrying out private key signature on the display request by using the private key of the content requester system to obtain a signature data packet;
and sending the signature data packet to the content provider system so that the content provider system uses the public key of the content requester system to sign the private key signature in the signature data packet, and obtaining the display request after the sign verification is passed.
In one possible implementation, the exhibition information of the second digital information is recorded in advance in the target contract, the exhibition information comprises DRM information, the DRM information comprises a key identifier and a verification address, and the key identifier in the DRM information is an identifier of a key used when the DRM system performs slice encryption processing on an original file of the second digital information; the copyright protection method of the digital information further comprises the following steps:
Sending an information request to the blockchain node so that the blockchain node searches an interface website of the display information of the second digital information in the target contract, and sends the interface website of the display information of the second digital information to the requester system, wherein the information request comprises a contract identifier of the second digital information;
And acquiring the display information of the second digital information according to the interface website of the display information of the second digital information.
In one possible implementation, obtaining the second digital information based on an information source address of the second digital information includes:
Downloading an encrypted file of the second digital information based on an information source address of the second digital information;
receiving a certificate service identifier sent by the content provider system, wherein the certificate service identifier is requested to be obtained by the content provider system from the DRM system according to the DRM information of the second digital information;
Requesting a key of the second digital information from the DRM system based on the certificate service identifier and the display information of the second digital information, and decrypting an encrypted file of the second digital information based on the key of the second digital information to obtain the second digital information.
A third aspect of the present application provides a content provider system, comprising:
The information transaction unit is used for generating an authorization certificate of the first digital information after the first digital information is purchased successfully by the content requester system, and recording the binding relation between the authorization certificate of the first digital information and the wallet address of the content requester system into a non-homogeneous token contract of the first digital information in a blockchain node;
an information authorization unit for transmitting contract information of the first digital information to the content requester system, the contract information including a contract identification and an authorization credential;
a display request receiving unit, configured to obtain a display request sent by the content requester system, where the display request includes a wallet address of the content requester system, an authorization credential of second digital information, and a contract identifier, and the display request is used to request the second digital information;
An authorization checking unit, configured to find out whether a binding relationship exists between an authorization credential of the second digital information and a wallet address of the content requester system in a target contract; wherein the target contract is about a contract identification indicative of a non-homogenous token contract for the second digital information;
and the checking result executing unit is used for sending the information source address of the second digital information to the content requester system if so, so that the content requester system acquires the second digital information based on the information source address of the second digital information.
A fourth aspect of the present application provides a content requester system, comprising:
The certificate recording unit is used for acquiring contract information of the first digital information returned by the content provider system, wherein the contract information comprises contract identification and authorization certificates, the first digital information comprises any item of digital information which is successfully purchased from the content provider system, the authorization certificates of the first digital information are generated by the content provider system after the purchase is successful, and the binding relation between the first digital information and the wallet address of the content requester system is recorded in a heterogeneous token contract indicated by the contract identification of the first digital information;
A verification request unit, configured to send a display request to the content provider system, so that the content provider system searches whether an authorization credential of the second digital information has a binding relationship with a wallet address of the content requester system in a target contract; if yes, sending the information source address of the second digital information to the content requester system;
Wherein the presentation request includes a wallet address of the content requester system, an authorization credential of the second digital information, and a contract identification, the presentation request being for requesting the second digital information; a contract identification indicating a non-homogenous token contract for which the target contract is about the second digital information;
And the source information acquisition unit is used for acquiring the second digital information based on the information source address of the second digital information.
A fourth aspect of the application provides a computer program product comprising computer readable instructions which, when run on an electronic device, cause the electronic device to implement the method of protecting copyright of digital information of the first aspect or any implementation manner of the first aspect.
A fifth aspect of the application provides an electronic device comprising at least one processor and a memory coupled to the processor, wherein:
The memory is used for storing a computer program;
the processor is configured to execute the computer program to enable the electronic device to implement the method for protecting copyright of digital information in the first aspect or any implementation manner of the first aspect.
A fifth aspect of the present application provides a computer storage medium carrying one or more computer programs which, when executed by an electronic device, enable the electronic device to implement a method of protecting copyright of digital information as described above in the first aspect or any implementation manner of the first aspect.
By means of the technical scheme, the copyright protection method and the related device for the digital information are characterized in that a content provider system issues a non-homogeneous token contract of any item of digital information (marked as first digital information) on a blockchain node, after a content requester system purchases the first digital information, an authorization certificate of the first digital information is generated, a binding relation between the authorization certificate of the first digital information and a wallet address of the content requester system is recorded in the contract of the first digital information, the copyright information of the digital information is recorded on a non-tamperable blockchain account book, the content provider system can verify copyright attribution of the blockchain node by sending the wallet address, a contract identification of second digital information and the authorization certificate to the content provider system, namely, whether the wallet address and the authorization certificate have the binding relation or not is verified, if the binding relation exists, the copyright attribution verification is confirmed to pass, an information source address of the second digital information is returned to the content requester system, and after the copyright verification is passed, the copyright information source is obtained by the content requester system, the copyright protection of the digital information is realized by the digital information.
Detailed Description
Embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application. The terminology used in the description of the embodiments of the application herein is for the purpose of describing particular embodiments of the application only and is not intended to be limiting of the application.
Embodiments of the present application are described below with reference to the accompanying drawings. As one of ordinary skill in the art can know, with the development of technology and the appearance of new scenes, the technical scheme provided by the embodiment of the application is also applicable to similar technical problems.
The terms first, second and the like in the description and in the claims and in the above-described figures, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the terms so used are interchangeable under appropriate circumstances and are merely illustrative of the manner in which embodiments of the application have been described in connection with the description of the objects having the same attributes. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of elements is not necessarily limited to those elements, but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The copyright protection method of the digital information provided by the embodiment of the application can be applied to the field of digital information processing, and particularly can be applied to scenes of copyright protection of the digital information by a publisher of the digital information, wherein the digital information comprises but is not limited to digital information contents such as videos, images, audios, text documents and the like. The present application may be applied, but not limited to, to an application program having a copyright protection function of digital information, a cloud service provided by a cloud server, or the like, and will be described below:
Referring to fig. 1, fig. 1 shows a schematic diagram of a system architecture. The system may include a terminal 100 and a server 200. Wherein the server 200 may include one or more servers (illustrated in fig. 1 as including one server as an example), the server 200 may provide the method provided by the embodiment of the present application for one or more terminals.
The terminal can be provided with an application program (a mobile client or a webpage client), the application program can provide an interface, the terminal can receive relevant parameters input by a user on the interface and send the parameters to the server, and the server can obtain a processing result based on the received parameters and return the processing result to the terminal. It should be understood that, in some alternative implementations, the terminal may also perform the action of obtaining the processing result based on the received parameters by itself, without requiring a server to cooperate with the implementation, which is not limited by the embodiment of the present application.
The terminals in the embodiments of the present application may be a mobile phone, a tablet computer, a wearable device, a vehicle-mounted device, an Augmented Reality (AR)/Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), etc., which are not limited in the embodiments of the present application.
Fig. 2 shows an alternative hardware architecture diagram of the terminal.
Referring to fig. 2, the terminal may include a radio frequency unit 110, a memory 120, an input unit 130, a display unit 140, a camera 150 (optional), an audio circuit 160 (optional), a speaker 161 (optional), a microphone 162 (optional), a headphone jack 163 (optional), a processor 170, an external interface 180, a power supply 190, and the like. It will be appreciated by those skilled in the art that fig. 2 is merely an example of a terminal or multifunction device and is not intended to limit the terminal or multifunction device, and may include more or fewer components than shown, or may combine certain components, or may be different components.
The input unit 130 may be used to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the portable multifunction device. In particular, the input unit 130 may comprise a touch screen 131 (optional) and/or other input devices 132. The touch screen 131 may collect touch operations on or near the user (e.g., operations of the user on or near the touch screen using any suitable object such as a finger, a joint, a stylus, etc.), and drive the corresponding connection means according to a preset program. The touch screen can detect the touch action of a user on the touch screen, convert the touch action into a touch signal, send the touch signal to the processor 170, and receive and execute a command sent by the processor 170; the touch signal includes at least touch point coordinate information. The touch screen 131 may provide an input interface and an output interface between the terminal and a user. In addition, the touch screen may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 130 may include other input devices in addition to the touch screen 131. In particular, other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc.
Wherein the input device 132 may receive input data, etc.
The display unit 140 may be used to display information input by a user or information provided to the user, various menus of a terminal, an interactive interface, file display, and/or play of any one of multimedia files. In the embodiment of the present application, the display unit 140 may be used to display an interface for copyright protection of digital information, a processing result, and the like.
The memory 120 may be used to store instructions and data, and the memory 120 may mainly include a storage instruction area and a storage data area, and the storage data area may store various data, such as multimedia files, text, and the like; the store instruction area may store software elements such as operating systems, applications, instructions required for at least one function, or a subset, an extension set thereof. And may also include nonvolatile random access memory; providing processor 170 includes managing hardware, software, and data resources in the computing processing device, supporting control software and applications. And is also used for storing multimedia files and storing running programs and applications.
The processor 170 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by executing or executing instructions stored in the memory 120 and calling data stored in the memory 120, thereby performing overall control of the terminal device. Optionally, the processor 170 may include one or more processing units; preferably, the processor 170 may integrate an application processor and a modem processor, wherein the application processor primarily handles operating systems, user interfaces, application programs, etc., and the modem processor primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 170. In some embodiments, the processor, memory, may be implemented on a single chip, or they may be implemented separately on separate chips in some embodiments. The processor 170 may be further configured to generate corresponding operation control signals to corresponding components of the computing processing device, and to read and process data in the software, and in particular, to read and process data and programs in the memory 120, so that each functional module therein performs a corresponding function, thereby controlling the corresponding components to act as required by the instructions.
The memory 120 may be used to store software codes related to a copyright protection method of digital information, and the processor 170 may execute steps of the copyright protection method of digital information, and may schedule other units (such as the input unit 130 and the display unit 140) to implement corresponding functions.
The rf unit 110 (optional) may be configured to receive and send information or receive and send signals during a call, for example, after receiving downlink information of a base station, process the downlink information with the processor 170; in addition, the data of the design uplink is sent to the base station. Typically, RF circuitry includes, but is not limited to, antennas, at least one amplifier, transceivers, couplers, low noise amplifiers (Low Noise Amplifier, LNAs), diplexers, and the like. In addition, the radio frequency unit 110 may also communicate with network devices and other devices via wireless communications. The wireless communication may use any communication standard or protocol including, but not limited to, global system for mobile communications (Global System of Mobile communication, GSM), general packet Radio Service (GENERAL PACKET Radio Service, GPRS), code division multiple access (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), email, short message Service (Short MESSAGING SERVICE, SMS), and the like.
In this embodiment of the present application, the rf unit 110 may send data to the server 200 and receive the processing result sent by the server 200.
It should be appreciated that the radio unit 110 is optional and may be replaced with other communication interfaces, such as a portal.
The terminal also includes a power supply 190 (e.g., a battery) for powering the various components, which may be logically connected to the processor 170 via a power management system, such as to provide for managing charge, discharge, and power consumption by the power management system.
The terminal also includes an external interface 180, which may be a standard Micro USB interface, or a multi-pin connector, which may be used to connect the terminal to communicate with other devices, or to connect a charger to charge the terminal.
Although not shown, the terminal may further include a flash, a wireless fidelity (WIRELESS FIDELITY, wiFi) module, a bluetooth module, sensors of different functions, etc., which will not be described herein. Some or all of the methods described hereinafter may be applied to a terminal as shown in fig. 2.
Next, the product form of the server 200 in fig. 1 will be described;
Fig. 3 provides a schematic structural diagram of a server 200, and as shown in fig. 3, the server 200 includes a bus 201, a processor 202, a communication interface 203, and a memory 204. Communication between processor 202, memory 204, and communication interface 203 is via bus 201.
Bus 201 may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, or the like. The buses may be divided into address buses, data buses, control buses, etc. For ease of illustration, only one thick line is shown in fig. 3, but not only one bus or one type of bus.
The processor 202 may be any one or more of a central processing unit (central processing unit, CPU), a graphics processor (graphics processing unit, GPU), a Microprocessor (MP), or a digital signal processor (DIGITAL SIGNAL processor, DSP).
The memory 204 may include volatile memory (RAM), such as random access memory (random access memory). The memory 204 may also include non-volatile memory (non-volatile memory), such as read-only memory (ROM), flash memory, mechanical hard disk (HARD DRIVE DRIVE, HDD) or solid state disk (SSD STATE DRIVE).
The memory 204 may be used to store software codes related to a copyright protection method for digital information, and the processor 202 may execute steps of the copyright protection method for digital information of the chip, and may schedule other units to implement corresponding functions.
It should be appreciated that the terminal and the server 200 may be centralized or distributed devices, and the processor (e.g., the processor 170 and the processor 202) in the terminal and the server 200 may be a hardware circuit (e.g., an application SPECIFIC INTEGRATED circuit, an ASIC, a field-programmable gate array GATE ARRAY, an FPGA), a general purpose processor, a digital signal processor (DIGITAL SIGNAL processing, DSP), a microprocessor, or a microcontroller, etc.), or a combination of these hardware circuits, for example, the processor may be a hardware system with an instruction execution function, such as a CPU, a DSP, etc., or a hardware system without an instruction execution function, such as an ASIC, an FPGA, etc., or a combination of the hardware system without an instruction execution function and the hardware system with an instruction execution function.
The conventional copyright protection method for digital information includes DRM (DIGITAL RIGHTS MANAGEMENT ) technology and content watermarking and identification technology, and for example, video, unauthorized pirated films and episodes are widely spread on the internet, and unauthorized network transfer and reproduction and other actions bring serious economic loss to legal copyright owners. The existing video player is used for encrypting and authorizing video contents through a DRM technology, preventing unauthorized downloading and spreading, and reducing the difficulty of tracking and monitoring the copyright of the video through a content watermarking and identification technology. But the application limit of the DRM technology is high, for example, the limit of the number of devices and the cumbersome authentication step. The misjudgment probability of the content identification algorithm of the content watermarking and identification technology for detecting infringement content is high, and legal content is often misconsidered as infringement.
In order to solve the above problems, an embodiment of the present application provides a method for protecting copyright of digital information, which aims to improve the security and reliability of protecting copyright of digital information. Referring to fig. 4, fig. 4 is a flowchart of a method for protecting copyright of digital information according to an embodiment of the present application, as shown in fig. 4, the method for protecting copyright of digital information according to an embodiment of the present application is applied to a system for protecting copyright of digital information, where the system for protecting copyright of digital information includes a content provider system, a blockchain node, and a system for requesting content, and the method for protecting copyright of digital information includes steps S401 to S404, which are described in detail below.
S401, after the content provider system purchases the first digital information and the content requester system is successful in transaction, generating an authorization certificate of the first digital information, and recording the binding relation between the authorization certificate of the first digital information and the wallet address of the content requester system to the non-homogeneous token contract of the first digital information in the blockchain node.
In this embodiment, the first digital information is any item of digital information, for example, the first digital information is a first video.
In this embodiment, the content provider system issues a non-homogenous token contract NFT for each item of digital information on a blockchain node in advance, where the NFT records presentation information of the digital information, for example, the presentation information includes meta information of the digital information or an interface website for recording the meta information.
S402, the content provider system transmits contract information of the first digital information to the content requester system.
In this embodiment, the contract information includes a contract identification and an authorization credential.
S403, the content requester system sends a display request to the content provider system.
In this embodiment, the second digital information is any item of digital information, for example, the second digital information is a second video. The presentation request includes a request to the content provider system for presentation of the target digital information using the wallet address of the content requester system, the authorization credential for the second digital information, and the contract identification, the presentation request being for requesting the second digital information.
S404, the content provider system searches whether the authorization ticket of the second digital information has a binding relation with the wallet address of the content requester system in the target contract.
In this embodiment, the target closes to a contract identification indicating a heterogeneous token contract about the second digital information.
And S405, after the content provider system determines that the binding relationship exists, the information source address of the second digital information is sent to the content requester system.
In this embodiment, the information source address of the second digital information is an address where the second digital information is stored. If the binding relationship exists between the authorization voucher of the second digital information and the wallet address of the content requester system, the content provider system records the binding relationship between the authorization voucher of the second digital information and the wallet address of the content requester system to the blockchain node after the content requester system purchases the first digital information and successfully transacts.
S406, the content requester system acquires the second digital information based on the information source address of the second digital information.
In this embodiment, the method for displaying the second digital information by the content requester system includes various methods, for example, the second digital information is a second video, and the content requester system downloads a video file of the second video by requesting access to an information source address, analyzes a format of the video file, and plays the second video in a preset display manner.
According to the technical scheme, the content provider system issues any non-homogeneous token contract of digital information (marked as first digital information) on the blockchain node, generates the authorization certificate of the first digital information after the first digital information is purchased by the content requester system, records the binding relation between the authorization certificate of the first digital information and the wallet address of the content requester system into the contract of the first digital information, records the copyright information of the digital information on the non-tamperable blockchain account, and can verify copyright attribution of the blockchain node by sending the wallet address, the contract identification of the second digital information and the authorization certificate to the content provider system, namely, verify whether the wallet address and the authorization certificate have the binding relation or not, if so, the copyright attribution verification is passed, returns the information source address of the second digital information to the content requester system, so that the content requester system obtains the second digital information based on the information source after the attribution the copyright verification, and the copyright protection technology of the digital information is improved by the digital information of the blockchain is realized.
In one possible implementation, the method for protecting the copyright of the digital information provided by the embodiment of the present application is applied to, but not limited to, a copyright protection system for protecting the digital information based on the blockchain construction, and fig. 5 is a system structure diagram of a copyright protection system for protecting the digital information provided by the embodiment of the present application, and as shown in fig. 5, a copyright protection system 500 for protecting the digital information includes a blockchain 501, a content provider system 502, a content requester system 503 and a DRM system 504. The block chain comprises block chain nodes for providing block chain service. Alternatively, the number of any of the content provider system, blockchain node, content requester system, and content provider system may be greater than 1. Wherein the content requester system operates at a terminal or server of the content requester, the content provider system operates at a terminal or server of the content provider, and the DRM system operates at a DRM service terminal or server. The system architecture of the content requester system, the content provider system, and the DRM system may all refer to the system architecture diagram shown in fig. 1.
The following describes a copyright protection method for digital information according to an embodiment of the present application in detail with reference to the accompanying drawings.
Fig. 6 is a schematic diagram of a specific implementation flow of a method for protecting copyright of digital information according to an embodiment of the present application. As shown in fig. 6, the method specifically includes:
s601, the content provider system sends an original file of digital information to be distributed to the DRM system.
In this embodiment, the content provider system embeds a digital watermark in the digital information to be distributed to obtain an original file of the digital information to be distributed, where the digital watermark is a unique identifier generated based on copyright information, creator information and other related information.
S602, the DRM system performs slicing encryption processing on an original file of the digital information to be distributed by using the secret key to obtain an encrypted file of the digital information to be distributed, correspondingly stores the secret key and the secret key identification, and returns the encrypted file of the digital information to be distributed to the content provider system.
In this embodiment, the DRM system performs slice encryption processing on the digital information original file by using a key through the package service, and stores the key and the key id corresponding to the key using KMS (KEY MANAGEMENT SERVICE ).
S603, the content provider system stores an encrypted file of the digital information to be issued at a video source address of the digital information to be issued, and issues a non-homogeneous token contract NFT of the digital information to be issued on a blockchain node.
In this embodiment, in an NFT (Non-Fungible Token, non-homogeneous token contract) issued by a content provider system and to which display information of digital information is to be issued, an interface address of the display information may be an interface address of the display information of the digital information to be issued.
The display information comprises basic information and DRM information, optionally taking digital information as video as an example, wherein the video basic information comprises video format, video resolution, video duration, video title, video profile, DRM information, video producer, actor information, video producer, producer and year of production. The DRM information includes a key identification key id and a DRM verification address. It should be noted that, the NFT further includes information such as use permission of the digital information to be issued and fee distribution rules.
It should be noted that, the content provider system receives the encrypted file of the digital information to be released and stores the encrypted file to the information source address, and further publishes the purchase link of the released digital information after completing the release of the digital information to be released through this step, so that other systems initiate the purchase request of the released digital information, thereby completing the purchase transaction of the released digital information through the specified transaction flow.
S604, after the content provider system purchases the first digital information and the content requester system is successful in transaction, generating an authorization ticket NFT Token of the first digital information, and recording the binding relation between the NFT Token of the first digital information and the wallet address of the content requester system to the NFT of the first digital information.
In this embodiment, the NFT Token may be a string of characters, and the NFT Token of the first digital information is used to instruct the content provider system to purchase the first digital information successfully. That is, the content provider system is provided with playback authorization of the first digital information.
It should be noted that, after the content provider system purchases the first digital information and the transaction is successful, the content provider system may also generate a transaction record, and store the transaction record to the NFT, where the transaction record is used to record transaction information such as transaction amount and transaction time, and may be used to trace transaction actions.
S605, the content provider system sends a purchase success instruction of the first digital information to the content requester system.
In this embodiment, the purchase success instruction of the first digital information includes an authorization credential of the first digital information and a corresponding contract identifier, which are used to indicate that the purchase of the first digital information is successful. Wherein the contract identification may be a contract name.
It should be noted that, after writing the binding relationship between the NFT token of the first digital information and the wallet address of the content requester system into the NFT successfully, the content provider system receives a success instruction fed back by the blockchain node, and feeds back the success instruction to the wallet address of the content requester system, where the success instruction indicates that the first digital information purchase is successful. At this point, the wallet of the content requester system includes the authorization ticket for the first digital information and a corresponding contract identification.
In this embodiment, the purchase transaction of the first digital information is implemented through S604 to S605, and the authorization credential record of the content requester system for the first digital information is implemented after the purchase transaction is successful, where the first digital information may be any item of digital information that the content requester system initiates the purchase.
S606, the content requester system sends an information request of the second digital information to the blockchain node.
In this embodiment, in response to the display operation of the input second digital information, the content requester system searches for whether an authorization credential for the second digital information exists in the wallet, and if so, generates an information request.
The information request comprises contract identification of the second digital information, and the contract identification is used for requesting display information of the second digital information from the block link point.
S607, the blockchain node receives the information request, obtains the interface address of the display information of the second digital information from the target contract based on the contract identification of the second digital information, and sends the interface address to the content requester system.
In this embodiment, the block link point searches whether an interface address of display information of the second digital information exists in an NFT (referred to as a target contract) indicated by the contract identification of the second digital information based on the contract identification of the second digital information, if yes, acquires the interface address of the display information corresponding to the second digital information, and feeds back the interface address of the display information to the content requester system.
S608, the content requester system acquires the display information of the second digital information based on the interface address of the display information of the second digital information.
In this embodiment, the content requester system requests access to the interface address of the presentation information from the content provider system and obtains the presentation information of the second digital information from the interface address of the presentation information.
S609, the content requester system uses the private key of the content requester system to sign the second digital information display request, and then a signature data packet is obtained.
In this embodiment, the presentation request includes the authorization credential for the second digital information, the contract identification, and the wallet address of the content requester system. The signature data packet comprises a signature hash obtained by private key signature and request content of a display request. Specific methods of private key signing can be found in the prior art.
S610, the content requester system sends the signature data packet to the content provider system.
In this embodiment, the content requester system sends the signed data packet directly to the content provider system or uploads the signed data packet via the blockchain.
In this embodiment, the content requester system also transmits the public key of the content requester system to the content provider system. The content requester system encrypts the contract identification, the authorization credential of the second digital information and the wallet address by using a prestored private key of the content requester system, optionally, the content requester system obtains a public root certificate provided by the blockchain in advance and generates a unique public-private key pair by using a certificate generating tool, and stores the public-private key, wherein the public-private key pair comprises a corresponding public key and private key.
S611, the content provider system uses the public key of the content requester system to check the private key signature in the signature data packet.
It should be noted that the verification of the signature indicates that the authentication of the content provider system is passed.
And S612, if the verification passes, the content provider system inquires whether the binding relationship exists between the authorization certificate of the second digital information and the wallet address of the content requester system in the target contract according to the contract identification and the authorization certificate of the second digital information.
In this embodiment, if there is a binding relationship, it indicates that the second digital information is attributed to the content requester system.
S613, if the binding relation exists, the content provider system sends the information source address of the second digital information to the content requester system, requests the certificate service identification to the DRM system according to the DRM information, and sends the certificate service identification to the content requester system.
In this embodiment, the content provider system searches for an interface address of the display information of the second digital information from the target contract based on the contract identifier of the second digital information, accesses the interface address of the display information of the second digital information, obtains DRM information in the display information of the second digital information, and requests a certificate service identifier from the DRM system according to the DRM information of the second digital information.
In this embodiment, the content provider system sends a certificate service identification request to the DRM system to cause the DRM system to return a certificate service identification DRM token. The content provider system sends the information source address of the second digital information to the content requester system to cause the content requester system to access the information source address to obtain the second digital information.
S614, the content requesting party system requests the information source address of the second digital information from the content provider system, and acquires the second digital information.
In this embodiment, the content requester system determines whether the digital information file is an encrypted file, and if not, directly displays the second digital information. If yes, S615 is executed.
S615, the content requester system sends a key request to the DRM system.
In this embodiment, the key request includes the DRM token and the key id of the key identification of the second digital information, and the key request is for requesting the key of the second digital information.
And S616, the DRM system receives the key request, searches a corresponding target key according to the key identification of the second digital information, and feeds back the target key to the content requester system.
In this embodiment, the target key is a key corresponding to a key identifier of the second digital information, where the key is a key used when the DRM system encrypts the second digital information. Specifically, the corresponding target key is searched for according to the verification address of the key identification of the second digital information in the DRM information.
S617, after the content requester system receives the target key returned by the DRM system, the encrypted file of the second digital information is decrypted by using the target key, and the original file of the second digital information is obtained and played.
According to the technical scheme, the content provider system can issue the non-homogeneous Token contract NFT of the digital information to be issued on the blockchain node, generates the authorization certificate NFT Token of the digital information after the digital information is purchased by the content requester system, records the binding relation between the authorization certificate of the digital information and the wallet address of the content requester system to the NFT of the digital information, records the copyright information of the digital information on the non-tamperable blockchain account, can acquire the contract identification of the digital information and the NFT Token from the wallet after the digital information copyright is purchased by the content requester system, and requests the content provider system to display the digital information based on the contract identification, the NFT Token and the wallet address.
Further, the content requester system may obtain a contract identification of the target digital information from the wallet and look up an interface address of the corresponding presentation information according to the contract identification deblocking chain node. Because only the interface address of the presentation information is recorded in the NFT, but not the presentation information, the storage pressure on the blockchain node and the consumption of data transmission resources are reduced.
Further, a digital watermark is embedded in the digital information file, which contains unique identifiers for copyrights, creators and other related information. The information of the digital watermark, including the associated copyright and creator information, is registered on the blockchain. Ensuring copyright and transparency of content.
Further, the content requester system requests presentation to the content provider system according to the DRM information, carrying the contract identification, wallet address and NFT token after the user public key, private key signature encryption. The content provider system performs signature verification on the private key signature through the public key, and after verification is passed, the block chain node is inquired whether the NFT token is bound with the wallet address, so that identity authentication of the content requester system is performed before copyright verification, and the security of the display request is ensured through the digital signature. Thereby further improving the security of copyright authentication.
Further, the present solution integrates Widevine, fairPlay, playReady and other various digital rights management functions to ensure the security and rights protection of digital content. And supports various streaming protocols such as HLS, DASH, MSS, etc. to ensure compatibility with various digital information sources.
It should be noted that, the above embodiment is a specific implementation of the method for protecting copyright of digital information provided by the embodiment of the present application, and the present application further includes other optional specific implementation flows.
For example: the digital information in the scheme is not limited to video, can be digital information contents such as images, audios and text documents, and the like, and the encryption method of the digital information comprises a plurality of optional digital information according to different types of the digital information, and the types of the added content watermarks and the marks are different according to different types of the digital information.
For another example, in an alternative embodiment, after receiving the signature data packet, the content provider system searches the public key published in the blockchain for the public key corresponding to the content requester system, decrypts the private key signature by using the public key, and then successfully verifies the signature to obtain the decrypted display request. After the content requester system obtains the public and private key pair, the public key is published in advance, and the method for publishing the public key is to publish the wallet address and the public key to the blockchain. When the content requester system succeeds in purchasing any one video from the content provider system, the public key is published to the content provider system, which is equivalent to the content requester system registering the identity with the content provider system, during which the existing authentication can be seen in the prior art.
For another example, when the DRM information does not exist in the presentation information, the content provider system does not need to request the certificate service identifier from the DRM system according to the DRM information and send the certificate service identifier to the content requester system, and the content requester system does not need to perform the steps of requesting a key from the DRM system and decrypting the encrypted file based on the key, specifically, when the DRM information does not exist in the presentation information, the content requester system directly parses and presents the second digital information after obtaining the second digital information from the information source address.
For another example, the basic information in the presentation information is optional information, and when the presentation information includes the basic information, the content requester system may present the second digital information and the basic information in a preset manner.
Referring to fig. 7, taking digital information as an example of video, fig. 7 illustrates a timing diagram of another alternative method for protecting copyrights of digital information, where the content provider system includes a client of an integrated blockchain player, and the DRM service system is a DRM system. As shown in fig. 7, the copyright protection method of digital information includes:
The video provider system issues a video blockchain intelligence contract NFT to the blockchain service. The client uses the wallet address to purchase a video (e.g., a target video) from the video provider system, and records transaction information of the purchase of the target video onto the blockchain service, and if the purchase is successful, the video provider system generates an NFT token of the target video to the user wallet, i.e., records the binding relationship between the wallet address and the NFT token in the blockchain service. The blockchain service sends a success command to the video provider system, which sends the success command to the user. Thus, distribution and purchase of videos are realized.
The client sends a video play request, i.e., an information request, including a contract name (i.e., a contract identification of the NFT) and an NFT token to the blockchain service requesting to view the target video in the wallet. The block chain service searches the interface address of the video playing information corresponding to the NFT token (namely, the NFT token url recorded on the block chain by the video provider system) by using the contract name and the NFT token, and returns the NFT token url to the user side. Wherein the video playing information includes video basic information and DRM information.
The user side requests the NFT token url to be accessed to the video provider system, and obtains video playing information returned by the video provider system, namely display information.
And the user side signs an encrypted playing request to the video provider system by using a user public key and a user private key according to DRM information in the video playing information to request playing, wherein the playing request comprises information such as a contract name, an NFT token and the like.
The video provider system performs signature verification on the play request through the public key, verifies the play request, if verification is passed, inquires the attribution of the NFT token from the blockchain server, so that the blockchain service inquires the attribution of the NFT token, verifies the attribution of the NFT token, and returns an inquiry result that the attribution verification is passed. After the attribution verification is passed, the video provider system returns the nft token attribution video information, and the attribution video information after the verification is passed comprises a video source address.
The user side requests DRM LICENSE a service token, i.e., a DRM token, according to the corresponding attribution information DRM system, and specifically, sends NFT token video attribution information, a certificate and a private key signature provided by a DRM server to the DRM system. The DRM service provider includes a self-research DRM service and an open source DRM service.
After the video provider system sends the DRM token and the video source address returned by the DRM system to the user side, the user side requests the video source address to obtain the encrypted file of the target video, and sends information such as the DRM token, the key id and the like to request the DRM system to obtain the decryption key, namely the DRM token is used for exchanging the decryption key. And after receiving the decoding key, decrypting the encrypted file by using the decoding key to obtain video content for playing, and playing the video.
In summary, the embodiment of the application provides a video playing solution combining with a blockchain, so that a copyright party can issue a copyright NFT contract on the blockchain, and after a user purchases the copyright NFT on different platforms, the user can play the purchased video on the blockchain player by using own blockchain wallet certificate. And the copyright party carries out copyright attribution authentication on the play request of the user in the blockchain, marks the play request in the blockchain and can trace the play request later.
Specifically, all operations generated by a user while watching a video are recorded on the blockchain, including a detailed process of copyright verification and a history of play requests. The transparent data link enables the third party video platform to easily verify the real copyright of the video and rapidly issue the playing license and the secret key, thereby realizing a seamless playing flow. The innovation not only improves the safety and stability of the system on the technical level, but also brings significant improvement on the aspect of user experience. The user does not need to register in any third party platform in a complicated way, and can directly enjoy high-quality video content, so that the whole video watching process is smoother and simpler. The innovative method fused with the blockchain technology not only provides a more reliable means for copyright protection, but also greatly improves the enjoyment level of users in the field of digital entertainment.
In summary, the present invention allows copyright information of digital content to be recorded on a non-tamperable blockchain ledger. This helps to protect the intellectual property rights of the creator from piracy and unauthorized use. And integrates various digital rights management functions to ensure the security and copyright protection of digital content, including encryption and control access to video content. Digital watermarking technology is combined with blockchain to identify and track unauthorized video content to help prevent piracy. The method not only provides reliable data sources for the third-party video platform and is used for performing accurate copyright verification, but also injects higher level transparency and traceability into the film watching experience of the user. The solution masks the difference of distribution ways for users, and can acquire necessary information for video playing according to the information in the blockchain contract so as to play the video. For videos purchased from different issuers, a playing platform limited to the issuers is not needed, and the method is simple, convenient and quick. In terms of copyright parties, copyright attribution verification of each video can be completed without a third party. For the video distribution number, distribution route, play request, etc. are all completed on the blockchain
Having described a method for protecting copyright of digital information provided by an embodiment of the present application, an apparatus for performing the method for protecting copyright of digital information described above will be described.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a content provider system according to an embodiment of the application. As shown in fig. 8, the content provider system 800 includes:
An information transaction unit 801, configured to generate an authorization credential of a first digital information after a successful purchase of the first digital information by a content requester system, and record a binding relationship between the authorization credential of the first digital information and a wallet address of the content requester system into a non-homogenous token contract of the first digital information in a blockchain node;
An information authorization unit 802 for transmitting contract information of the first digital information to the content requester system, the contract information including a contract identification and an authorization credential;
A display request receiving unit 803, configured to obtain a display request sent by the content requester system, where the display request includes a wallet address of the content requester system, an authorization credential of second digital information, and a contract identifier, and the display request is used to request the second digital information;
An authorization checking unit 804, configured to find out whether an authorization credential of the second digital information has a binding relationship with a wallet address of the content requester system in a target contract; wherein the target contract is about a contract identification indicative of a non-homogenous token contract for the second digital information;
And the checking result executing unit 805 is configured to send, if yes, the information source address of the second digital information to the content requester system, so that the content requester system obtains the second digital information based on the information source address of the second digital information.
In one possible implementation, when the display request receiving unit is configured to obtain a display request sent by the content requester system, the display request receiving unit is specifically configured to:
Receiving a signature data packet sent by the content requester system, wherein the signature data is obtained after the content requester system signs the display request by using a private key of the content requester system; signing the private key signature in the signature data packet by using the public key of the content requester system; and obtaining the display request after the verification passes.
In one possible implementation, the content provider system further comprises: an information issuing unit configured to:
The method comprises the steps of sending an original file of digital information to be distributed to a key management service (DRM) system, enabling the DRM system to conduct slicing encryption processing on the original file of the digital information to be distributed by using a key to obtain an encrypted file of the digital information to be distributed, storing the key and a key identifier correspondingly, and returning the encrypted file of the digital information to be distributed to a content provider system;
storing an encrypted file of the digital information to be distributed by using the video source address of the digital information to be distributed, distributing a heterogeneous token contract of the digital information to be distributed on the blockchain node, recording an interface address of display information of the digital information to be distributed in the heterogeneous token contract of the digital information to be distributed, wherein the display information comprises DRM information, and the DRM information comprises a key identification and a verification address.
In one possible implementation, the content provider system further comprises: a service identification request unit, configured to search, after obtaining a display request sent by the content requester system, for an interface address of display information of the second digital information from the target contract based on a contract identification of the second digital information; accessing an interface address of the display information of the second digital information to obtain the display information of the second digital information; requesting a certificate service identifier from the DRM system according to the DRM information of the second digital information so as to enable the DRM system to return the certificate service identifier; and sending the certificate service identifier to the content requester system so that the content requester system requests a key of the second digital information from the DRM system based on the certificate service identifier and the display information of the second digital information, and decrypting the encrypted file of the second digital information based on the key of the second digital information.
Referring to fig. 9, fig. 9 is a schematic structural diagram of a content requester system according to an embodiment of the present application. As shown in fig. 9, the content requester system 900 includes:
A voucher recording unit 901, configured to obtain contract information of the first digital information returned by the content provider system, where the contract information includes a contract identifier and an authorization voucher, the first digital information includes any item of digital information that is successfully purchased from the content provider system, the authorization voucher of the first digital information is generated by the content provider system after the purchase is successful, and a binding relationship between the first digital information and a wallet address of the content requester system is recorded in a heterogeneous token contract indicated by the contract identifier of the first digital information;
A verification request unit 902, configured to send a display request to the content provider system, so that the content provider system searches whether an authorization ticket of the second digital information has a binding relationship with a wallet address of the content requester system in a target contract; if yes, sending the information source address of the second digital information to the content requester system;
Wherein the presentation request includes a wallet address of the content requester system, an authorization credential of the second digital information, and a contract identification, the presentation request being for requesting the second digital information; a contract identification indicating a non-homogenous token contract for which the target contract is about the second digital information;
A source information obtaining unit 903, configured to obtain the second digital information based on an information source address of the second digital information.
In one possible implementation, when the verification request unit is configured to send a presentation request to the content provider system, the verification request unit is specifically configured to:
Carrying out private key signature on the display request by using the private key of the content requester system to obtain a signature data packet;
and sending the signature data packet to the content provider system so that the content provider system uses the public key of the content requester system to sign the private key signature in the signature data packet, and obtaining the display request after the sign verification is passed.
In one possible implementation, the exhibition information of the second digital information is recorded in advance in the target contract, the exhibition information comprises DRM information, the DRM information comprises a key identifier and a verification address, and the key identifier in the DRM information is an identifier of a key used when the DRM system performs slice encryption processing on an original file of the second digital information; the content requester system further includes a presentation information acquisition unit configured to:
Sending an information request to the blockchain node so that the blockchain node searches an interface website of the display information of the second digital information in the target contract, and sends the interface website of the display information of the second digital information to the requester system, wherein the information request comprises a contract identifier of the second digital information;
And acquiring the display information of the second digital information according to the interface website of the display information of the second digital information.
In one possible implementation, the source information obtaining unit is configured to, when obtaining the second digital information based on the information source address of the second digital information, specifically:
Downloading an encrypted file of the second digital information based on an information source address of the second digital information;
receiving a certificate service identifier sent by the content provider system, wherein the certificate service identifier is requested to be obtained by the content provider system from the DRM system according to the DRM information of the second digital information;
Requesting a key of the second digital information from the DRM system based on the certificate service identifier and the display information of the second digital information, and decrypting an encrypted file of the second digital information based on the key of the second digital information to obtain the second digital information.
The embodiment of the application also provides electronic equipment. Referring to fig. 10, a schematic diagram of an electronic device suitable for use in implementing embodiments of the present application is shown. The electronic device in the embodiment of the present application may include, but is not limited to, a fixed terminal such as a mobile phone, a notebook computer, a PDA (personal digital assistant), a PAD (tablet computer), a desktop computer, and the like. The electronic device shown in fig. 10 is merely an example, and should not impose any limitation on the functionality and scope of use of embodiments of the present application.
As shown in fig. 6, the electronic device may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 1001 that may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 1002 or a program loaded from a storage means 1008 into a Random Access Memory (RAM) 1003. In the state where the electronic device is powered on, various programs and data necessary for the operation of the electronic device are also stored in the RAM 1003. The processing device 1001, the ROM 1002, and the RAM 1003 are connected to each other by a bus 1004. An input/output (I/O) interface 1005 is also connected to bus 1004.
In general, the following devices may be connected to the I/O interface 1005: input devices 1006 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, and the like; an output device 1007 including, for example, a Liquid Crystal Display (LCD), speaker, vibrator, etc.; storage 1008 including, for example, memory cards, hard disks, and the like; and communication means 1009. The communication means 1009 may allow the electronic device to communicate with other devices wirelessly or by wire to exchange data. While fig. 6 shows an electronic device having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
Embodiments of the present application also provide a computer program product including computer readable instructions, which when executed on an electronic device, cause the electronic device to implement any of the digital information copyright protection methods provided by the embodiments of the present application.
The embodiment of the application also provides a computer readable storage medium, which carries one or more computer programs, and when the one or more computer programs are executed by the electronic device, the electronic device can realize any of the copyright protection methods of the digital information provided by the embodiment of the application.
It should be further noted that the above-described apparatus embodiments are merely illustrative, and that the units described as separate units may or may not be physically separate, and that units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. In addition, in the drawings of the embodiment of the device provided by the application, the connection relation between the modules represents that the modules have communication connection, and can be specifically implemented as one or more communication buses or signal lines.
From the above description of the embodiments, it will be apparent to those skilled in the art that the present application may be implemented by means of software plus necessary general purpose hardware, or of course by means of special purpose hardware including application specific integrated circuits, special purpose CPUs, special purpose memories, special purpose components, etc. Generally, functions performed by computer programs can be easily implemented by corresponding hardware, and specific hardware structures for implementing the same functions can be varied, such as analog circuits, digital circuits, or dedicated circuits. But a software program implementation is a preferred embodiment for many more of the cases of the present application. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a readable storage medium, such as a floppy disk, a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk or an optical disk of a computer, etc., comprising several instructions for causing a computer device (which may be a personal computer, a training device, a network device, etc.) to perform the method according to the embodiments of the present application.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, training device, or data center to another website, computer, training device, or data center via a wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a training device, a data center, or the like that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk (Solid STATE DISK, SSD)), etc.