CN105701367A - Security system for Internet original commercial works - Google Patents
Security system for Internet original commercial works Download PDFInfo
- Publication number
- CN105701367A CN105701367A CN201610160193.6A CN201610160193A CN105701367A CN 105701367 A CN105701367 A CN 105701367A CN 201610160193 A CN201610160193 A CN 201610160193A CN 105701367 A CN105701367 A CN 105701367A
- Authority
- CN
- China
- Prior art keywords
- damage
- module
- saving
- file
- saved
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 claims description 32
- 238000003860 storage Methods 0.000 claims description 18
- 230000007246 mechanism Effects 0.000 claims description 17
- 230000008520 organization Effects 0.000 claims description 17
- 238000000034 method Methods 0.000 claims description 16
- 230000001360 synchronised effect Effects 0.000 claims description 8
- 238000012546 transfer Methods 0.000 claims description 5
- 230000008859 change Effects 0.000 claims description 3
- 238000007710 freezing Methods 0.000 claims description 3
- 230000008014 freezing Effects 0.000 claims description 3
- 238000007789 sealing Methods 0.000 claims description 3
- 238000013461 design Methods 0.000 abstract description 3
- 238000012795 verification Methods 0.000 abstract 1
- 230000008569 process Effects 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 3
- 238000000151 deposition Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000001427 coherent effect Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of the Internet, and discloses a security system for Internet original commercial works. The security system comprises an uploading module, a security module, an account management module, an identity authentication module, a certificate module, a verification module, a supervising module, a judicial certifying module, a data storing module and a certification auditing module. According to the security system, identification information of a secured person (that is an author) is adopted as parameters when a global supervision abstract is calculated, therefore, a security file contains the identification information of the author, and the ownership of the original works (comprising the network design works, the network photography works, the network literary works, the network original videos, the network academic works, the original music, the original official documents and the like) is determined. The convenient certificate saving and taking problems of the secured person are solved by synchronously handing the secured security file, global supervision abstract, identification information and national standard time to judicial institutions such as the notary institution, the judicial identification institution, the arbitration commission and the court and combining the judicial certifying module and the certification auditing module.
Description
Technical field
The present invention relates to Internet technical field, particularly to the original business works safety system in a kind of the Internet。
Background technology
Along with the emergence of the Internet, mobile Internet, increasing original works pours in network, and the authorship for large quantities of New Times brings income, and the Internet infringement has also become a great problem of puzzlement authorship。In the Internet, the urgent needs of authorship is not only in the anti-infringement of original works, also significant for promoting that internet environment develops in a healthy way。
Works in the Internet are using electronic data as carrier, once encroach right, difficulty of not only collecting evidence, evidence is also easily obliterated amendment, as infringing party is denied, judicial decision lacks again objective evidence, and authorship is difficult to safeguard number one。
Some prior aries are in that the point-to-point solution protection to file, but for application scenarios changeable on the Internet, are not had retrospective track by infringement process, it is impossible to provide complete law chain evidence。After on the Internet, original works is concluded the business, persistently the problem of anti-infringement can not well solve。
In the juridical practice that original works is encroached right in the Internet, the evidence obtaining means that proof people mainly adopts also rest on traditional sectional drawing, take pictures, print, and are difficult to ensure the objectivity of evidence in this process。Cyberspace virtual, make behavioral agent have more easily condition, chance, use more means to destroy, destroy evidence, and this artificial mistake, add the objective factors such as environment (instability such as system) and all can have influence on the verity of electronic evidence。Specifically, people are likely to because of mistake, deception or prejudice, and add, omit, revise or delete some electronic data information。The risk of these mistakes is likely to be dependent on many factors, including motivation and its suffered training crossed, the quantity of typing or the information of acquisition, and the quality etc. that program is monitored of data input or the personnel of acquisition。And owing to electronic evidence is different from traditional evidence to the requirement of preservation condition, it is necessary to height dust-proof, anti-is warm, antimagnetic, if preservation condition changes causes that the magnetic field around storage medium is heavily disturbed, it is possible to electronic evidence verity can be produced impact。By sectional drawing, take pictures, electronic evidence that printing obtains, it is easy to being tampered or forge, this brings greatly difficulty and problem to electronic evidence evidence obtaining and qualification。Along with the development of cryptanalysis technology, existing SHA-1 hashing algorithm is unsafe, can construct collision under certain conditions and crack。A lot of safety systems adopt client to calculate digest value, are easily intercepted and crack in network transmits。
In sum, the method for the anti-infringement in existing the Internet and technology there is also some problems to be optimized, are summarized as follows:
1, in application practice, root, works ownership problem is not determined。Namely whom works uploaded and deposited card by, gives tacit consent to this and uploads artificial works author, but the objective circumstances that upper successor is exactly not necessarily original author also likely to be present。
2, the application scenarios problem of the Internet original works platform is agreed with。The mainstream carrier that the Internet original works platform circulates as Internet work, whether the infringement protection not single identification file that it needs encrypts watermarking can meet, and needs to realize the system solution methods of the convenient access card of authorship。
Summary of the invention
The present invention proposes a kind of the Internet original business works safety system to solve above-mentioned Problems existing。
The original business works safety system in the Internet of the present invention includes: upper transmission module, save module from damage, module, data memory module and auditing module of coming to testify are come to testify in account management module, authentication module, certificate module, authentication module, supervision module, the administration of justice;
Described upper transmission module for will files passe be saved from damage to saving module from damage, described in the type of file to be saved from damage include: original works, electronic contract, electronic certificate or electronic diary;
Described module of saving from damage receives the file to be saved from damage that upper transmission module is transmitted through, the identity information saving people from damage is obtained from account management module, and with the data that include national standard time and described identity information for parameter by hashing algorithm calculate described in the overall situation supervision summary of file to be saved from damage, file described to be saved from damage, overall situation supervision summary, described identity information, national standard time synchronized are distributed to the server of data memory module, notary organization and judicial expertise mechanism, Arbitration Committee and law court;
Described account management module is for saving the identity information registration of people, accounts information setting, security set, asset management, managing bill, the binding of third party's account from damage, freezing and nullify, and registration and the information transmission arranged is stored to data memory module;
Described authentication module is used for accessing the service of CA digital certificate authentication, authentication four Feature Service, recognition of face service and the Third-party payment service for checking credentials, so that the identity information saving people from damage to be verified;
Described certificate module is used for saving file, overall situation supervision summary from damage and saving the identity information generation of people from damage, update or nullify and save certificate from damage according to data memory module storage, and certificate transmission will be saved from damage to data memory module storage, it is additionally operable to send to saving people from damage described certificate of saving from damage;
Described authentication module is for saving whether the file to be saved from damage that successfully afterwards checking is local is consistent with the file saved from damage being stored in data memory module from damage wait saving file from damage, and maybe whether this file to be saved from damage is through saving from damage;
Described supervision module real-time reception saves the overall situation supervision summary that module sends from damage, and by described overall situation supervision summary in the official website real-time release saving platform, notary organization, judicial expertise mechanism, Arbitration Committee, law court from damage;
The described administration of justice come to testify module for receive save that people proposes online from damage provide the request of coming to testify including notarial certificate and judicial expertise report, and the described request of coming to testify is committed to auditing module of coming to testify;
Described come to testify auditing module for judge ask artificial described data memory module storage provide when saving people from damage include notarial certificate and judicial expertise report take the evidence, and by the described administration of justice come to testify module return claimant;
Described data memory module is used for encrypting the described overall situation supervision summary of storage and file to be saved from damage, and by encryption after the overall situation supervision summary synchronized transmission to notary organization, judicial expertise mechanism, Arbitration Committee, law court server store, and file to be saved from damage, the overall situation supervision summary, identity information and accounts information storage on different media。
Wherein, also include: shift module, people's identity information is saved from damage for what change in described data memory module storage, according to the amended people's of saving from damage identity information, save from damage file and the overall situation supervision summarization generation new save certificate from damage, new certificate of saving from damage is sent to the storage of described data memory module, be additionally operable to by new save that certificate sends to transfer from damage save people from damage。
Wherein, also including: law aid module, for receiving the online law request saving people from damage, and acquisition saves certificate from damage to make legal argument from described data memory module。
Wherein, the SHA-512 hashing algorithm that module adopts is saved described in from damage。
Wherein, described upper transmission module receive save from damage people by B/S browser, C/S client, mobile client, third-party platform or application program by API upload described in file to be saved from damage。
Wherein, the DEA that described data memory module adopts for encrypting overall situation supervision summary includes: any one in SHA-512 hashing algorithm, DEA DES and message digest algorithm MD5。
Wherein, described data memory module be additionally operable to by current point in time the overall situation supervision summary notary organization website, judicial expertise mechanism, Arbitration Committee, law court website on announce。
Wherein, described in save module from damage saving from damage of file same to be saved from damage uploaded for the same period, with being as the criterion of first saving from damage, it is ensured that first saves from damage comes into force。
Wherein, described in save module from damage and be additionally operable to the difference according to file type to be saved from damage, save file from damage for the band of each type and be respectively created an overall situation supervision summary chain, different overall situation supervision summary chains separates operation independent, encryption and stores。
Wherein, described in save module from damage when meeting algorithm and being cracked, save file from damage before sealing up for safekeeping in time, and more recalculate this overall situation supervision summary saving file from damage after scaling method and announce to the public in time。
It is parameter that the present invention have employed, when calculating overall situation supervision summary, the identity information saving people (author) from damage, is the identity information saved from damage and contain author in file, it is determined that the right of attribution of original works。By by after saving from damage save file from damage, overall situation supervision summary, identity information, national standard time synchronized are distributed to notary organization, judicial expertise mechanism, other judiciaries such as Arbitration Committee, law court, and come to testify module in conjunction with the administration of justice and auditing module of coming to testify solves and saves the convenient problem depositing, withdrawing card of people from damage。And native system possesses characteristic efficient, simple, and Data Concurrent disposal ability measured data is per second up to pens up to ten thousand, saves people from damage simple, convenient, easy-to-use。
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings。
Fig. 1 is the Internet original business works safety system structural representation of the present invention;
Fig. 2 is for saving people from damage by upper transmission terminal (such as mobile phone or computer) from the flow chart of main memory card evidence obtaining;
Fig. 3 uploads platform (such as prestige visitor's platform and the original platform of literature) by third party and deposits, for saving people from damage, the flow chart that card is collected evidence;
Fig. 4 deposits the flow chart of card evidence obtaining for saving people from damage by third party software (such as copy editor's software, photo-editing software, design software etc.)。
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments。Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention。
The original business works safety system in the Internet of the present embodiment as it is shown in figure 1, include transmission module 1, save module 2 from damage, module 8, data memory module 9 and auditing module 10 of coming to testify are come to testify in account management module 3, authentication module 4, certificate module 5, authentication module 6, supervision module 7, the administration of justice。
Upper transmission module 1 for will files passe be saved from damage to saving module 2 from damage, upper transmission module 1 is positioned at the client of whole system。Wherein, the type of file to be saved from damage includes: original works (includes network design works, webcam works, online literature works, network creator video, network academic works, original music, original official documents and correspondence etc.), electronic contract, electronic certificate or electronic diary etc.。Original works includes: the rough draft in each stage and/or works in production process。Save people from damage to be logged in by upper transmission module, and upload file to be saved from damage。
Save module 2 from damage and receive the file to be saved from damage that upper transmission module 1 is transmitted through, from account management module 3, obtain the identity information saving people from damage, make a summary with the overall situation supervision that the data including national standard time and described identity information calculate file to be saved from damage for parameter by the hashing algorithm of safety。Then file to be saved from damage, overall situation supervision summary, described identity information (mainly include save from damage people's name and save people's passport NO. from damage), national standard time synchronized are distributed to data memory module and the server of notary organization, judicial expertise mechanism, Arbitration Committee, law court and other judiciaries, make data save the supervision obtaining judicial justice from damage。Save module 2 from damage and be positioned at the service end of whole system, in the present embodiment, all calculating overall situation supervision summary in service end for file to be saved from damage, the relatively conventional mode safety uploaded again after client calculates is improved, and ensure that the uniqueness of overall situation supervision summary simultaneously。Saving module from damage can adopt SHA-512 hashing algorithm to calculate overall situation supervision summary。
Specifically, when saving module 2 initial launch from damage, generate a fixed number, with first file characteristic value saving file from damage (when uploading, upper transmission module 1 adopts unique mark of the mark file that hash algorithm calculates), save people's name from damage, save people's passport NO. from damage, the national standard time, generate current overall situation supervision summary (namely first overall situation supervision saving file from damage is made a summary) by hashing algorithm。Below each saves file from damage, all saved from damage file file characteristic value, save people's name from damage, save people's passport NO. from damage, the national standard time is together with the previous overall situation supervision summary saving file generated from damage, carry out hash operations, generate the overall situation supervision summary currently saved from damage, and this overall situation supervision summary is saved from damage as the next one " the previous overall situation supervision summary saving file generated from damage " of file computing overall situation supervision summary。By that analogy。Ensure that each element of electronic evidence (file characteristic value, save people's name from damage, save people's passport NO. from damage, save the time from damage) saved module 2 from damage and carry out saving from damage all cannot be distorted by outside is even internal, it is ensured that the original objectivity of evidence。The national standard time includes: satellite time transfer and country's time service center time service etc.。
Account management module 3 is for saving the identity information registration of people, accounts information setting, security set, asset management, managing bill, the binding of third party's account from damage, freezing and nullify, and registration and the information transmission arranged is stored to data memory module 9。
Authentication module 4 is used for accessing the service of CA digital certificate authentication, authentication four Feature Service (name, identification card number, bank's card number and binding cell-phone number), recognition of face service and the Third-party payment service for checking credentials etc., so that the identity information saving people from damage to be verified, authentication module 4 obtains from data memory module 9 and logs in the identity information saving people from damage。Wherein verify that can pass through to save the various ways such as name/password, CA digital certificate and biological characteristic from damage is verified, to guarantee that the identity saving people from damage is true, reliable。
Certificate module 5 is for saving the generation of certificate, renewal and cancellation operation from damage, generate, update or nullify save certificate from damage with specific reference to the relevant information of file (save file, overall situation supervision summary from damage, save the identity information etc. of people from damage) of saving from damage of storage in data memory module 9, and will save certificate transmission from damage and store to data memory module 9。Send to saving people from damage additionally, certificate module 5 is additionally operable to save certificate from damage, mail can be passed through or short message mode sends to saving people from damage。
Authentication module 6 is for wait saving whether the file to be saved from damage that file saves successfully afterwards checking from damage local is consistent with the file saved from damage being stored in data memory module 9 from damage, and maybe whether this file to be saved from damage is through saving from damage。
Supervision module 7 real-time reception saves the overall situation supervision summary that module 2 sends from damage, and by overall situation supervision summary in the official website real-time release saving the judiciaries such as platform, notary organization, judicial expertise mechanism, Arbitration Committee, law court from damage, accepts the supervision of the public。
The administration of justice come to testify module 8 for receive save that people proposes online from damage provide the request of coming to testify including notarial certificate and judicial expertise report, and the request of coming to testify is committed to auditing module 10 of coming to testify。
Auditing module of coming to testify 10 is for judging to ask providing when saving people from damage of artificial data memory module 9 storage to include taking the evidence and (being different from and save certificate from damage of notarial certificate and judicial expertise report, take the evidence is that a kind of acquisition is saved from damage and obtains saving from damage judicial proof or the evidence of certificate), and return claimant by administration of justice module 8 of coming to testify。
Data memory module 9 is used for encrypting storage overall situation supervision summary and file to be saved from damage, prevent malicious attack, steal and distort, and the server of the overall situation supervision summary synchronized transmission after encryption to notary organization, judicial expertise mechanism, Arbitration Committee, law court and other judiciaries is stored。And file to be saved from damage, overall situation supervision summary, identity information and accounts information store on different media, ensure the safety of data to greatest extent。Wherein, AES can adopt any one in SHA-512 hashing algorithm, DEA DES and message digest algorithm MD5。
In the present embodiment, have employed, when calculating overall situation supervision summary, the identity information saving people (author) from damage is parameter, is the identity information saved from damage and contain author in file, it is determined that the right of attribution of original works。By by after saving from damage save file from damage, overall situation supervision summary, identity information, national standard time synchronized are distributed to the judiciaries such as notary organization, judicial expertise mechanism, Arbitration Committee, law court, and come to testify module 8 in conjunction with the administration of justice and auditing module 10 of coming to testify solves and saves the problem that the convenient access of people is demonstrate,proved from damage。And native system possesses characteristic efficient, simple, and Data Concurrent disposal ability measured data is per second up to pens up to ten thousand, saves people from damage simple, convenient, easy-to-use。
The original business works safety system in the Internet of the present embodiment also includes: shift module 11, people's identity information is saved from damage for what change in data memory module 9 storage, according to the amended people's of saving from damage identity information, save from damage file and the overall situation supervision summarization generation new save certificate from damage, new certificate of saving from damage is sent and stores to data memory module 9, be additionally operable to by new save that certificate sends to transfer from damage save people from damage。Avoid the persistently anti-infringement problem after works are bought and sold in the Internet and intellectual property transfer is occurred。
The original business works safety system in the Internet of the present embodiment also includes: law aid module 12, for receiving the online law request saving people from damage, and acquisition saves certificate from damage to make legal argument from data memory module 9, it is simple to save people from damage and carry out and save relevant legal advice from damage。
In the present embodiment, data memory module 9 is additionally operable to the overall situation supervision summary of current point in time in notary organization website, judicial expertise mechanism, Arbitration Committee, law court and other judiciaries website announce, to guarantee that overall situation supervision summary accepts the supervision of the public。
In the present embodiment, save module from damage and saving from damage of file same to be saved from damage is uploaded for the same period, with being as the criterion of first saving from damage, it is ensured that first saves from damage comes into force, it is to avoid save people from damage and produce unnecessary dispute。
Save the module 2 difference according to (especially save from damage quantity big time) file type to be saved from damage from damage, save file from damage for the band of each type and be respectively created a coherent overall situation supervision summary chain, different overall situation supervision summary chains separates operation independent, encryption and stores, in order to the dissimilar inquiry saving file from damage and operation。
In the present embodiment, save module 2 from damage when meeting algorithm and being cracked, before sealing up for safekeeping in time, save file from damage, and more recalculate this overall situation supervision summary saving file from damage after scaling method and announce to the public in time。
In the present embodiment, the reception of upper transmission module is saved people from damage and is uploaded file to be saved from damage by B/S browser, C/S client, mobile client, third-party platform or application program by API。
Described upper transmission module can for saving the upper transmission terminal of people from damage, as in figure 2 it is shown, by saving the upper transmission terminal of people (such as mobile phone or computer) from damage, from the process of main memory card evidence obtaining, idiographic flow is as follows in order to save people from damage:
Step 1: save people's login from damage and save the upper transmission terminal (namely going up transmission module) of people from damage, directly uploads works and rough draft or selects to deposit card in creation of works process。Authentication module is after people's identity is saved in certification from damage, card file will be deposited or unique characteristic of correspondence value passes to and saves module from damage through api interface, plus identity information with use the national standard time, and calculate the overall situation supervision summary of this document by the hashing algorithm of safety and save from damage。Because supporting that save people from damage deposits card or subsidiary works sketch in production process, can review works birth track, determine works proprietary rights root。Use scene is illustrated: saving people A from damage is artistic illustration designer, with the works of the cell-phone customer terminal film recording oneself of present invention research and development from rough draft to finished product, use simple, but save people A from damage to record every time and save from damage and deposit card because passing through, evidence chain is complete, with a high credibility, can as the vaild evidence of court's confrontation。
Step 2: save module from damage and will save people's identity, national standard time from damage and deposit card content (saving file and overall situation supervision summary thereof from damage) three elements and be cured as a certificate。When saving people from damage and needing these works of effect whether to save from damage, authentication module can be used to carry out effect in terminal。
Step 3: original works there occurs online transaction, and intellectual property shifts therewith, the certificate that shift module generates will be transferred to the side of buying automatically, saves people B from damage, these works of sustainable protection in Fig. 2, it is prevented that abuse occurs。
Step 4: when there is infringement disputes, saves people from damage and sends evidence obtaining (judicial proof) request by administration of justice module of coming to testify, and people's identity is saved in auditing module of coming to testify checking from damage, and confirms it is start after saving people from damage to process to collect evidence to ask。
The administration of justice is come to testify a module big innovative point as the present invention, and by notarizing under line, judicial expertise flow process is embedded in the Internet, has ensured notarization, judicial expertise and has carried out under line the same having act of law and greatly facilitate the Internet and save people from damage。Saving people from damage and send evidence obtaining request online, final notarial certificate, judicial expertise certificate can be delivered to by logistics means to be saved from damage in staff, meets very much the Internet and saves the use habit of people from damage。Technically realized on-line real time system docking by electronic evidence safety system by judiciaries such as api interface program and notary organization, judicial expertise mechanism, Arbitration Committee, law courts, save from damage people upload deposit card content save from damage after successfully, electronic evidence safety system can synchronize that the cryptographic Hash saved from damage passes to the judiciaries such as notary organization, judicial expertise mechanism, Arbitration Committee, law court to be put on record, it is achieved the transmitting in time and put on record of information。Save from damage people can see on the judiciary official websites such as notary organization, judicial expertise mechanism, Arbitration Committee, law court in real time disclosed in save record information from damage。
Save the upper transmission module of people from damage and can also upload platform for third party, the Internet original works platform classification is various, as: prestige visitor's platform, design website, material website, the creation of sound shadow website, original literature website etc., and use scene disunity, as: prestige visitor's platform need to support authorship repeatedly to hand over original text, hand over source file deposit card;Literature website needs to support author once update and automatically depositing card。The present invention solves the problem that these platforms use scene differentiation flexibly。As it is shown on figure 3, upload platform (such as prestige visitor's platform and the original platform of literature) by third party and deposit, for saving people from damage, the process that card is collected evidence, idiographic flow is as follows:
Step 1: api interface is arranged in the original platform of third party, it is necessary to the position of transmission works file, this step completely can according to the use scene setting of original platform。Citing: A platform is prestige visitor's (online competitive bidding) platform, and api interface can be arranged on authorship and submit a tender for the first time, again submits a tender, and uploads each step of source file after acceptance of the bid, and the upper transmitting file of authorship can deposit card works simultaneously。B platform is original literature website, api interface can be arranged on author every time more new works chapters and sections time, automatically call and deposit card。
Original works file data or unique corresponding cryptographic Hash are uploaded to and save module from damage by step 2:API interface, save module from damage and will save people's identity, uplink time (national standard time) from damage and deposit card content three elements and be cured as portion evidence。
Step 3: save people from damage and can inquire about in the terminal for original platform building and deposit card record, and use checking, the administration of justice to come to testify functions of modules。
Step 4: original works there occurs online transaction, and intellectual property shifts therewith, the certificate that shift module (namely shifts API) and generates will be transferred to the side of buying automatically, these works of sustainable protection, it is prevented that abuse occurs。
Step 5: when there is infringement, application is come to testify, and deposit the flow process of coming to testify of card with individual autonomy identical for flow process, repeats no more。
As shown in Figure 4, deposited the process of card evidence obtaining by third party's program (such as the office program of Microsoft and mapping program etc.) for saving people from damage。It is with Fig. 3 similar process, is not both and cannot realize saving people's right forwarding function from damage based on third party's program, repeats no more herein。
Above-mentioned three kinds use paths, and the great majority that can cover the original business works circulation of current the Internet use scene, system and effectively solve the anti-infringement problem of the Internet business works。
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention。
Claims (10)
1. the original business works safety system in the Internet, it is characterized in that, including: upper transmission module, save module from damage, module, data memory module and auditing module of coming to testify are come to testify in account management module, authentication module, certificate module, authentication module, supervision module, the administration of justice;
Described upper transmission module for will files passe be saved from damage to saving module from damage, described in the type of file to be saved from damage include: original works, electronic contract, electronic certificate or electronic diary;
Described module of saving from damage receives the file to be saved from damage that upper transmission module is transmitted through, the identity information saving people from damage is obtained from account management module, and with the data that include national standard time and described identity information for parameter by hashing algorithm calculate described in the overall situation supervision summary of file to be saved from damage, file described to be saved from damage, overall situation supervision summary, described identity information, national standard time synchronized are distributed to the server of data memory module, notary organization and judicial expertise mechanism, Arbitration Committee and law court;
Described account management module is for saving the identity information registration of people, accounts information setting, security set, asset management, managing bill, the binding of third party's account from damage, freezing and nullify, and registration and the information transmission arranged is stored to data memory module;
Described authentication module is used for accessing the service of CA digital certificate authentication, authentication four Feature Service, recognition of face service and the Third-party payment service for checking credentials, so that the identity information saving people from damage to be verified;
Described certificate module is used for saving file, overall situation supervision summary from damage and saving the identity information generation of people from damage, update or nullify and save certificate from damage according to data memory module storage, and certificate transmission will be saved from damage to data memory module storage, it is additionally operable to send to saving people from damage described certificate of saving from damage;
Described authentication module is for saving whether the file to be saved from damage that successfully afterwards checking is local is consistent with the file saved from damage being stored in data memory module from damage wait saving file from damage, and maybe whether this file to be saved from damage is through saving from damage;
Described supervision module real-time reception saves the overall situation supervision summary that module sends from damage, and by described overall situation supervision summary in the official website real-time release saving platform, notary organization, judicial expertise mechanism, Arbitration Committee and law court from damage;
The described administration of justice come to testify module for receive save that people proposes online from damage provide the request of coming to testify including notarial certificate and judicial expertise report, and the described request of coming to testify is committed to auditing module of coming to testify;
Described come to testify auditing module for judge ask artificial described data memory module storage provide when saving people from damage include notarial certificate and judicial expertise report take the evidence, and by the described administration of justice come to testify module return claimant;
Described data memory module is used for encrypting the described overall situation supervision summary of storage and file to be saved from damage, and stored by the server of the overall situation supervision summary synchronized transmission after encryption to notary organization, judicial expertise mechanism, Arbitration Committee and law court, and file to be saved from damage, overall situation supervision summary, identity information and accounts information store on different media。
2. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, also include: shift module, people's identity information is saved from damage for what change in described data memory module storage, according to the amended people's of saving from damage identity information, save from damage file and the overall situation supervision summarization generation new save certificate from damage, new certificate of saving from damage is sent to the storage of described data memory module, be additionally operable to by new save that certificate sends to transfer from damage save people from damage。
3. the original business works safety system in the Internet as claimed in claim 1, it is characterised in that also include: law aid module, for receiving the online law request saving people from damage, and acquisition saves certificate from damage to make legal argument from described data memory module。
4. the original business works safety system in the Internet as claimed in claim 1, it is characterised in that described in save the SHA-512 hashing algorithm that module adopts from damage。
5. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, described upper transmission module receive save from damage people by B/S browser, C/S client, mobile client, third-party platform or application program by API upload described in file to be saved from damage。
6. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, the DEA that described data memory module adopts for encrypting overall situation supervision summary includes: any one in SHA-512 hashing algorithm, DEA DES and message digest algorithm MD5。
7. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, described data memory module is additionally operable to announce the overall situation supervision summary of current point in time on the website of notary organization website, judicial expertise mechanism, Arbitration Committee and law court。
8. the original business works safety system in the Internet as claimed in claim 1, it is characterised in that described in save module from damage saving from damage of file same to be saved from damage uploaded for the same period, with being as the criterion of first saving from damage, it is ensured that first saves from damage comes into force。
9. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, described module of saving from damage is additionally operable to the difference according to file type to be saved from damage, saving file from damage for the band of each type and be respectively created an overall situation supervision summary chain, different overall situation supervision summary chains separates operation independent, encryption and stores。
10. the original business works safety system in the Internet as claimed in claim 1, it is characterized in that, described module of saving from damage, when meeting algorithm and being cracked, saves file from damage before sealing up for safekeeping in time, and more recalculates this overall situation supervision summary saving file from damage after scaling method and announce to the public in time。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610160193.6A CN105701367B (en) | 2016-03-21 | 2016-03-21 | The original business works safety system in internet |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610160193.6A CN105701367B (en) | 2016-03-21 | 2016-03-21 | The original business works safety system in internet |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105701367A true CN105701367A (en) | 2016-06-22 |
CN105701367B CN105701367B (en) | 2017-08-22 |
Family
ID=56231485
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610160193.6A Active CN105701367B (en) | 2016-03-21 | 2016-03-21 | The original business works safety system in internet |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105701367B (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106254078A (en) * | 2016-08-02 | 2016-12-21 | 冯颖 | The Internet evidence collecting method, device and the Internet safety system |
CN106559433A (en) * | 2016-12-07 | 2017-04-05 | 北京信任度科技有限公司 | The method and system of electronic evidence and user identity are fixed using digital certificate |
CN107508806A (en) * | 2017-08-11 | 2017-12-22 | 北京理工大学 | Internet financial electronic data safety system and method based on block chain |
CN107578222A (en) * | 2017-10-24 | 2018-01-12 | 广东华伦招标有限公司 | A kind of invitation system |
CN107819777A (en) * | 2017-11-17 | 2018-03-20 | 北京亿生生网络科技有限公司 | A kind of data based on block chain technology deposit card method and system |
CN108108593A (en) * | 2017-12-20 | 2018-06-01 | 厦门市美亚柏科信息股份有限公司 | E text power certificates constructing, the method used, terminal device and storage medium |
CN108364242A (en) * | 2018-01-31 | 2018-08-03 | 北京安妮全版权科技发展有限公司 | The copyright for preserving intermediate file really weighs method and device |
CN108711032A (en) * | 2018-05-09 | 2018-10-26 | 杭州安存网络科技有限公司 | The management method and device of a kind of internet law court electronic evidence |
CN109493038A (en) * | 2018-09-25 | 2019-03-19 | 法信公证云(厦门)科技有限公司 | A kind of front-end system and method for applying to financial industry and having pressure notarization function |
CN109492426A (en) * | 2018-10-09 | 2019-03-19 | 重庆易保全网络科技有限公司 | Security method, device, storage medium and server based on block chain |
CN109740375A (en) * | 2018-12-19 | 2019-05-10 | 深圳市汇星数字技术有限公司 | A kind of shared and dissemination method of original audio production |
CN110233996A (en) * | 2019-06-25 | 2019-09-13 | 艺生活(北京)电子商务有限公司 | The true true evidence collection method of the art work |
CN110378079A (en) * | 2018-04-13 | 2019-10-25 | 胡小凡 | Information processing, protection, marketing method and device based on original works |
CN110443008A (en) * | 2019-08-05 | 2019-11-12 | 北京如优教育科技有限公司 | Creation security method based on creation competition model |
CN111950005A (en) * | 2020-08-07 | 2020-11-17 | 甘肃紫光智能交通与控制技术有限公司 | Highway engineering data uploading method and system |
CN112579984A (en) * | 2019-09-30 | 2021-03-30 | 广州艾美网络科技有限公司 | Multimedia information authentication method, system, computer device and storage medium |
CN112769953A (en) * | 2021-01-26 | 2021-05-07 | 山西晋合思创信息科技有限公司 | Judicial case data diversified preservation method and system based on cloud storage |
CN115146598A (en) * | 2022-09-06 | 2022-10-04 | 天津联想协同科技有限公司 | File collaborative editing method and device, network disk and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537312A (en) * | 2015-01-22 | 2015-04-22 | 杭州安存网络科技有限公司 | Network communication data preservation method and device |
CN104539636A (en) * | 2015-01-22 | 2015-04-22 | 杭州安存网络科技有限公司 | Video evidence service system |
CN104618564A (en) * | 2015-01-22 | 2015-05-13 | 杭州安存网络科技有限公司 | Speech evidence perpetuation method and device |
CN204578618U (en) * | 2015-01-22 | 2015-08-19 | 杭州安存网络科技有限公司 | A kind of voice evidence protection device |
CN204578617U (en) * | 2015-01-22 | 2015-08-19 | 杭州安存网络科技有限公司 | A kind of voice evidence service system |
CN204695315U (en) * | 2015-01-22 | 2015-10-07 | 杭州安存网络科技有限公司 | A kind of network communication data secure device |
-
2016
- 2016-03-21 CN CN201610160193.6A patent/CN105701367B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537312A (en) * | 2015-01-22 | 2015-04-22 | 杭州安存网络科技有限公司 | Network communication data preservation method and device |
CN104539636A (en) * | 2015-01-22 | 2015-04-22 | 杭州安存网络科技有限公司 | Video evidence service system |
CN104618564A (en) * | 2015-01-22 | 2015-05-13 | 杭州安存网络科技有限公司 | Speech evidence perpetuation method and device |
CN204578618U (en) * | 2015-01-22 | 2015-08-19 | 杭州安存网络科技有限公司 | A kind of voice evidence protection device |
CN204578617U (en) * | 2015-01-22 | 2015-08-19 | 杭州安存网络科技有限公司 | A kind of voice evidence service system |
CN204695315U (en) * | 2015-01-22 | 2015-10-07 | 杭州安存网络科技有限公司 | A kind of network communication data secure device |
Non-Patent Citations (2)
Title |
---|
刘仁: "《"公正邮"能否破解电子邮件出证难题?》", 《中国知识产权报》 * |
周惠媛 等: "《公证在"版权保险箱"中的作用》", 《中国公证》 * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106254078A (en) * | 2016-08-02 | 2016-12-21 | 冯颖 | The Internet evidence collecting method, device and the Internet safety system |
CN106559433A (en) * | 2016-12-07 | 2017-04-05 | 北京信任度科技有限公司 | The method and system of electronic evidence and user identity are fixed using digital certificate |
CN106559433B (en) * | 2016-12-07 | 2019-12-31 | 北京信任度科技有限公司 | Method and system for fixing electronic evidence and user identity by using digital certificate |
CN107508806A (en) * | 2017-08-11 | 2017-12-22 | 北京理工大学 | Internet financial electronic data safety system and method based on block chain |
CN107578222A (en) * | 2017-10-24 | 2018-01-12 | 广东华伦招标有限公司 | A kind of invitation system |
CN107819777A (en) * | 2017-11-17 | 2018-03-20 | 北京亿生生网络科技有限公司 | A kind of data based on block chain technology deposit card method and system |
CN108108593A (en) * | 2017-12-20 | 2018-06-01 | 厦门市美亚柏科信息股份有限公司 | E text power certificates constructing, the method used, terminal device and storage medium |
CN108364242A (en) * | 2018-01-31 | 2018-08-03 | 北京安妮全版权科技发展有限公司 | The copyright for preserving intermediate file really weighs method and device |
CN110378079A (en) * | 2018-04-13 | 2019-10-25 | 胡小凡 | Information processing, protection, marketing method and device based on original works |
CN108711032A (en) * | 2018-05-09 | 2018-10-26 | 杭州安存网络科技有限公司 | The management method and device of a kind of internet law court electronic evidence |
CN109493038A (en) * | 2018-09-25 | 2019-03-19 | 法信公证云(厦门)科技有限公司 | A kind of front-end system and method for applying to financial industry and having pressure notarization function |
CN109493038B (en) * | 2018-09-25 | 2022-06-14 | 法信公证云(厦门)科技有限公司 | Preposition system and method with compulsory notarization function applied to financial industry |
CN109492426A (en) * | 2018-10-09 | 2019-03-19 | 重庆易保全网络科技有限公司 | Security method, device, storage medium and server based on block chain |
CN109740375A (en) * | 2018-12-19 | 2019-05-10 | 深圳市汇星数字技术有限公司 | A kind of shared and dissemination method of original audio production |
CN109740375B (en) * | 2018-12-19 | 2023-07-28 | 深圳市汇星数字技术有限公司 | Sharing and publishing method of original audio works |
CN110233996A (en) * | 2019-06-25 | 2019-09-13 | 艺生活(北京)电子商务有限公司 | The true true evidence collection method of the art work |
CN110443008A (en) * | 2019-08-05 | 2019-11-12 | 北京如优教育科技有限公司 | Creation security method based on creation competition model |
CN112579984A (en) * | 2019-09-30 | 2021-03-30 | 广州艾美网络科技有限公司 | Multimedia information authentication method, system, computer device and storage medium |
CN112579984B (en) * | 2019-09-30 | 2024-03-15 | 广州艾美网络科技有限公司 | Multimedia information authentication method, system, computer device and storage medium |
CN111950005A (en) * | 2020-08-07 | 2020-11-17 | 甘肃紫光智能交通与控制技术有限公司 | Highway engineering data uploading method and system |
CN112769953A (en) * | 2021-01-26 | 2021-05-07 | 山西晋合思创信息科技有限公司 | Judicial case data diversified preservation method and system based on cloud storage |
CN115146598A (en) * | 2022-09-06 | 2022-10-04 | 天津联想协同科技有限公司 | File collaborative editing method and device, network disk and storage medium |
CN115146598B (en) * | 2022-09-06 | 2023-01-06 | 天津联想协同科技有限公司 | File collaborative editing method and device, network disk and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN105701367B (en) | 2017-08-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105701367B (en) | The original business works safety system in internet | |
US10942994B2 (en) | Multicomputer processing for data authentication using a blockchain approach | |
Konashevych | General concept of real estate tokenization on blockchain: The right to choose | |
CN111133734B (en) | Block chain based decision execution | |
CN106130987B (en) | Internet evidence collecting method, device and internet safety system | |
US20190166133A1 (en) | Multicomputer processing for data authentication and event execution using a blockchain approach | |
KR20190132938A (en) | Method and apparatus for managing subject data based on blockchain | |
CN111213139A (en) | Paperless document processing based on block chain | |
CN111226249A (en) | Trusted platform based on block chain | |
CN111108522A (en) | Block chain based summons delivery | |
CN110771093B (en) | Method and system for proving existence of digital document | |
KR20200106000A (en) | System and method for implementing blockchain-based digital certificate | |
CN110855428A (en) | Movie copyright protection method based on block chain | |
US11755998B2 (en) | Smart data annotation in blockchain networks | |
KR20200105999A (en) | System and method for generating digital marks | |
CN115398857A (en) | Block chain based dispute resolution | |
CN1848144A (en) | Electronic bill management system and electronic bill management device thereof | |
KR20200067282A (en) | System and method for certificate easily submission service support | |
US7660981B1 (en) | Verifiable chain of transfer for digital documents | |
Wu et al. | Electronic evidence in the blockchain era: New rules on authenticity and integrity | |
Wheeler et al. | Cloud storage security: A practical guide | |
WO2018088475A1 (en) | Electronic authentication method and program | |
CN110866222A (en) | Digital content asset right confirming system and method | |
Clark et al. | Crypto-pie in the sky? How blockchain technology is impacting intellectual property law | |
WO2021090120A1 (en) | Downstream tracking of content consumption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200509 Address after: 401120 c1-12-1, No. 68, Xingguang Avenue, gaoxinyuan, Beibu New District, Yubei District, Chongqing Patentee after: CHONGQING EBAOQUAN NETWORK TECHNOLOGY Co.,Ltd. Address before: 400000 Chongqing city Yubei District Yuanyang road two section as boundless as the sea and sky District 1 building 26-4 Patentee before: Feng Ying |