CN109040026A - A kind of authorization method of digital asset, device, equipment and medium - Google Patents

A kind of authorization method of digital asset, device, equipment and medium Download PDF

Info

Publication number
CN109040026A
CN109040026A CN201810758489.7A CN201810758489A CN109040026A CN 109040026 A CN109040026 A CN 109040026A CN 201810758489 A CN201810758489 A CN 201810758489A CN 109040026 A CN109040026 A CN 109040026A
Authority
CN
China
Prior art keywords
target number
application program
information
digital asset
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810758489.7A
Other languages
Chinese (zh)
Inventor
晏亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Onething Technology Co Ltd
Shenzhen Xunlei Network Technology Co Ltd
Original Assignee
Shenzhen Onething Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Onething Technology Co Ltd filed Critical Shenzhen Onething Technology Co Ltd
Priority to CN201810758489.7A priority Critical patent/CN109040026A/en
Publication of CN109040026A publication Critical patent/CN109040026A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/103Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of authorization method of digital asset, device, equipment and medium, the step of this method includes: the access request to target number assets for receiving and being initiated by application program, wherein application program is logged in advance with user identity;Access request is responded, authority request is initiated to block chain according to the information of access request, and receive the authority information of block chain return;Record has user identity to the authority information of target number assets in block chain;Authority information is back to the application program.Corresponding relationship is pre-recorded in block chain by this method, can be guaranteed the reliability and correctness that are authorized according to corresponding relationship to digital asset relatively, be thereby reduced the copyright protection difficulty to digital asset.In addition, the present invention also provides a kind of authorization device of digital asset, equipment and medium, beneficial effect is same as above.

Description

A kind of authorization method of digital asset, device, equipment and medium
Technical field
The present invention relates to copyright protection fields, more particularly to a kind of authorization method of digital asset, device, equipment and Jie Matter.
Background technique
It is that enterprise or individual are important since copyright is the embodiment of personal self-value and the performance of enterprise innovation strength Intangible asset, therefore facilitate to safeguard the legal power of author or other copyright owners and works user for the protection of copyright Benefit, and be conducive to works and embody economic value.
Current network-type enterprise would generally provide a user corresponding APP (application program), user can by APP to Enterprise obtains the digital asset including literature, music, film, scientific works, software, picture etc..Due to the number of enterprise Assets are often the product by enterprise's creation or enterprise's purchase, therefore enterprise has copyrighted authorization qualification for digital asset, I.e. enterprise can constrain user to the access right of digital asset.In the current situation, user accesses a certain number by APP and provides When production, needs to first pass through enterprise's preset certificate server and the APP qualification for accessing the digital asset is inquired and authenticated, into And the digital asset can be got by the APP of Certificate Authority.But since current certificate server is usually centralization Equipment, therefore once break down or data be tampered with, then be difficult to ensure when being authorized to the use of digital asset Reliability and correctness, while also improving the copyright protection difficulty to digital asset.
It can be seen that a kind of authorization method of digital asset is provided, when guaranteeing to authorize the use of digital asset Reliability and correctness, and then reduce to the copyright protection difficulty of digital asset, be that those skilled in the art are urgently to be resolved The problem of.
Summary of the invention
The object of the present invention is to provide a kind of authorization method of digital asset, device, equipment and media, to guarantee to number Reliability and correctness when the use of assets is authorized, and then reduce the copyright protection difficulty to digital asset.
In order to solve the above technical problems, the present invention provides a kind of authorization method of digital asset, it is applied to server, packet It includes:
Receive the access request to target number assets initiated by application program, wherein application program is in advance with user Identity logs;
Access request is responded, authority request is initiated to block chain according to the information of access request, and receive the return of block chain Authority information;Record has user identity to the authority information of target number assets in block chain;
Authority information is back to the application program.
Preferably, including at least the characteristic information of target number assets and the identity information of user identity in access request.
Preferably, further includes:
The characteristic information of target number assets is received, and generates encryption key for the characteristic information of target number assets, Encryption key is for encrypting corresponding target number assets, and encrypted target number asset store is in the section of content distributing network Point.
Preferably, the type of authority information includes having the right information and to have no right information;
Correspondingly, before authority information is back to the application program, further includes:
The type of authority information is judged, if authority information is when having the right information, by the encryption key of target number assets It is back to application program, so that the target number that application program uses encryption key decryption to download from content delivery network node Assets.
Preferably, when application program, which carries out user identity login, to be passed through, the signing certificate with public key is received, is received By application program initiate to the access requests of target number assets when, also receive public key, authority information be back to using journey The data channel of sequence is encrypted using public key.
It preferably, include the default copyright information being embedded in using digital watermark technology in the data of target number assets.
In addition, the present invention also provides a kind of authorization devices of digital asset, comprising:
Request module, for receiving the access request to target number assets initiated by application program, wherein answer It is logged in advance with user identity with program;
Ask respond module initiates authority request to block chain according to the information of access request for responding access request, And receive the authority information of block chain return;Record has user identity to the authority information of target number assets in block chain;
Authorization module, for authority information to be back to application program.
In addition, the present invention also provides a kind of authorisation devices of digital asset, comprising:
Memory, for storing computer program;
Processor, when for executing computer program the step of the realization such as authorization method of above-mentioned digital asset.
In addition, being stored with meter on computer readable storage medium the present invention also provides a kind of computer readable storage medium Calculation machine program, when computer program is executed by processor the step of the realization such as authorization method of above-mentioned digital asset.
In addition, being applied to block chain the present invention also provides a kind of authorization method of digital asset, comprising:
Receive the authority request to target number assets initiated by server, wherein include user in authority request Identity;
According to authority request, user is returned to the authority information of target number assets to server.
The authorization method of digital asset provided by the present invention, application program are logged in advance with user identity, obtain by After the access request to target number assets that application program is initiated, permission is initiated to block chain according to the information of access request Request, since user identity pre-recorded in block chain is to the authority information of target number assets, by block chain Corresponding authority information can be returned to by initiating authority request, and then by authority information return value application program to complete to authorize.By Have the characteristics that decentralization in block chain, recorded in hold the recognizing of all nodes under block chain network, and can not It is tampered, therefore corresponding relationship is pre-recorded in block chain by this method, opposite can guarantee according to corresponding relationship to number The reliability and correctness that assets are authorized thereby reduce the copyright protection difficulty to digital asset.In addition, of the invention Authorization device, equipment and the medium of a kind of digital asset are also provided, beneficial effect is same as above.
Detailed description of the invention
In order to illustrate the embodiments of the present invention more clearly, attached drawing needed in the embodiment will be done simply below It introduces, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ordinary skill people For member, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the authorization method of digital asset provided in an embodiment of the present invention;
Fig. 2 is the flow chart of the authorization method of another digital asset provided in an embodiment of the present invention;
Fig. 3 is the system flow chart of digital asset authorization provided in an embodiment of the present invention;
Fig. 4 is a kind of structure chart of the authorization device of digital asset provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole embodiments.Based on this Embodiment in invention, those of ordinary skill in the art are without making creative work, obtained every other Embodiment belongs to the scope of the present invention.
Core of the invention is to provide a kind of authorization method of digital asset, to guarantee to award the use of digital asset Reliability and correctness temporary, and then reduce the copyright protection difficulty to digital asset.Another core of the invention is to mention For a kind of authorization device of digital asset, equipment and medium.
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed description The present invention is described in further detail.
Embodiment one
Fig. 1 is a kind of flow chart of the authorization method of digital asset provided in an embodiment of the present invention.Referring to FIG. 1, digital The specific steps of the authorization method of assets include:
Step S10: the access request to target number assets initiated by application program is received.
Wherein, application program is logged in advance with user identity.
It should be noted that since difference, application is generally not present in the application program itself that enterprise provides a user Program itself is only used in the often login application program that user provides the approach for obtaining digital asset, and has differences The digital asset access right of user identity, different user identity has differences.Such as the application program of current video type In, user can access particular video frequency content by way of paying, i.e., the user identity of paying customer, which has, obtains particular video frequency The permission of content, and the user identity of non-paid user does not have the permission for obtaining particular video frequency content then.This step obtain with It, can be in the next steps for target user's identity after the access request that the application program of target user's identity logs is initiated The access authority for whether enjoying target number assets is determined.In addition, application program mentioned by this step can be mobile phone Using, computer applications or TV applications etc., it is not specifically limited herein.
Step S11: response access request initiates authority request, and reception area to block chain according to the information of access request The authority information that block chain returns.
Record has user identity to the authority information of target number assets in block chain.
It should be noted that since the node of block chain network is safeguarded and more new block chain jointly, and have between node The corresponding relationship for having common recognition mechanism, therefore being recorded in block chain can not be tampered, mutually in the same time under, it is each in block chain network Content in block chain accessed by a node is all the same.In this step, by the power between user identity and digital asset Limit information is previously recorded in block chain the reliability and correctness that can ensure authority information, the permission letter of this step meaning Breath characterization is for user identity to permission possessed by target number assets.
Step S12: authority information is back to application program.
It is understood that due to authority information characterization be access authority of the user identity to target number assets, because After authority information is back to application program by this, application program can understand according to the content of authority information, the user's body of itself Whether part can access to target number assets, that is, being awarded to using routine access target number assets Power.
The authorization method of digital asset provided by the present invention, application program are logged in advance with user identity, obtain by After the access request to target number assets that application program is initiated, permission is initiated to block chain according to the information of access request Request, since user identity pre-recorded in block chain is to the authority information of target number assets, by block chain Corresponding authority information can be returned to by initiating authority request, and then by authority information return value application program to complete to authorize.By Have the characteristics that decentralization in block chain, recorded in hold the recognizing of all nodes under block chain network, and can not It is tampered, therefore corresponding relationship is pre-recorded in block chain by this method, opposite can guarantee according to corresponding relationship to number The reliability and correctness that assets are authorized thereby reduce the copyright protection difficulty to digital asset.
Embodiment two
On the basis of the above embodiments, the present invention also provides a series of preferred embodiments.
As a preferred embodiment, including at least the characteristic information of target number assets and user in access request The identity information of identity.
It should be noted that characteristic information is generated and the data to digital asset carry out feature extraction, it is different Characteristic information corresponding to available digital assets is all different.Since the data volume of characteristic information is often much smaller than digital asset sheet The data volume of body, thus as request carry out transmission be can more efficiently.Each characteristic information is by corresponding number money It produces and carries out feature extraction and generate, and be not in repetition between characteristic information, therefore characteristic information is in the present embodiment The a certain digital asset of characterization can be uniquely corresponded to as CID (Content ID).In addition, can currently be calculated by MD5Hash etc. Method generates characteristic information, and the mode due to generating characteristic information is content known in those skilled in the art, therefore is not done herein Specifically repeat.Present embodiment is by the characteristic information of target number assets and user identity to should be used as access request, with this Access request can concisely, be accurately shown to be so which target number assets what user identity accesses to, improve access The high efficiency of request.
Fig. 2 is the flow chart of the authorization method of another digital asset provided in an embodiment of the present invention.Step S10- in Fig. 2 S12 is identical as Fig. 1, and details are not described herein.
As shown in Fig. 2, as a preferred embodiment, further include:
Step S20: the characteristic information of target number assets is received, and generates and adds for the characteristic information of target number assets Key, encryption key is for encrypting corresponding target number assets, and encrypted target number asset store is in content distribution Network node.
It should be noted that encryption key can the key schedule according to provided by the prior art generate, and not The encryption key of same target number assets is different, and the safety of each target number assets is ensured with this.Digital asset It can specifically by the encryption of encryption key and be uploaded in CDN (content distributing network) node, in turn, application program can be to CDN initiates to carry the visit order of encryption key, and then CDN is determined corresponding to encryption key according to preset corresponding relationship Target number assets, i.e. application program have the digital asset of access authority, and then to application transfer target number assets, Application program can be decrypted and be used to it by encryption key after receiving target number assets.It needs to illustrate It is that content distributing network is the device network for storing digital asset, relatively reliable number can be provided for application transfer The support of assets.In addition, ordinal relation between step S20 and remaining step can according to the actual situation depending on, do not do herein It is specific to limit.
In addition, as a preferred embodiment, the type of authority information includes having the right information and to have no right information;
Correspondingly, before authority information is back to application program, further includes:
The type of authority information is judged, if authority information is when having the right information, by the encryption key of target number assets It is back to application program, so that the target number that application program uses encryption key decryption to download from content delivery network node Assets.
It should be noted that in the present embodiment, the type of authority information includes to have the right information and to have no right information, Whether the user identity for characterizing application program respectively has a permission of access target digital asset, and then by authority information It is back to before application program, first the type of authority information is judged, it, will be by target when authority information is to have the right information The encryption key return value application program of digital asset, and then application program can explicitly learn that user identity has acquisition target The permission of digital asset, and the target number assets downloaded using encryption key decryption from content delivery network node.
In addition, as a preferred embodiment, receiving band when application program progress user identity login passes through Have a signing certificate of public key, receive by application program initiates to the access requests of target number assets when, also receive public key, general The data channel that authority information is back to application program is encrypted using public key.
It should be noted that application program can receive characterization after logining successfully with user identity in present embodiment The proof of user identity, i.e. signing certificate have public key in signing certificate, provide secrecy branch with the communication process to application program It holds, and then during authority information is back to application program, is added by public key to used data channel is communicated It is close, it can guarantee that during authority information is transmitted to application program be not in that it is logical to improve data the case where being stolen with this The safety of road transmitting rights information.
In addition, as a preferred embodiment, including to utilize digital watermarking skill in the data of target number assets The default copyright information of art insertion.
Digital watermark technology (Digital Watermarking) is that some identification informations (i.e. digital watermarking) are directly embedding Enter in digital carrier (including multimedia, document, software etc.), but do not influence the use value of original vector, is also not easy by people Consciousness system (such as vision or auditory system) perceive or notice.Information in the carrier is hidden by these, can achieve Confirmation creator of content, buyer, transmission secret information judge the purpose of whether carrier is tampered.In present embodiment, After default copyright information is embedded in target number assets by digital watermark technology, mesh can be learned according to default copyright information The copyright ownership of digital asset is marked, and default copyright information is difficult to be tampered, improves the copyright guarantor to target number assets Shield degree.
The application also provides the embodiment under a kind of concrete application scene, please refers to digital asset as shown in Figure 3 and awards The system flow chart of power.
Functional interpretation is carried out to the noun mentioned in this scene embodiment below:
Key server is previously stored with the characteristic information generated by digital asset, and finger print data is as characterization number money Unique CID (Content ID) of identity is produced, and is previously stored with the corresponding encryption key of each CID, is added by the way that CID is corresponding The corresponding digital asset of the CID can be decrypted in key.There are between CID and encryption key in key server Corresponding relationship;
Assets uploading device, can be to the node upload digital assets of content distributing network;
Content distributing network can provide digital asset to application program;
Application program, can be by certificate server authenticating identity and to key server application to the corresponding of certain CID Digital asset accesses, and according to the corresponding digital asset for obtaining content distributing network and providing of CID;
Certificate server is prestored the letter of identity of application program and is authenticated with the identity to application program;
Block chain, for recording each user identity for the permission of digital asset.
The executing subject of technical solution provided herein is the key server in Fig. 3, the entirety of present embodiment Process is divided into two major parts, the respectively upload operation of digital asset and the access to digital asset, wherein number money The upload of production is related to step (1) and (2) in figure, and step (3)-(6) in figure are related to the access of digital asset.
In the upload operation part of digital asset, step (1), (2) are specifically included:
Assets uploading device obtains the corresponding encryption key of the CID to key server by the CID of digital asset, in turn Encryption production is carried out to digital asset by encryption key and is uploaded to content distributing network.
In digital asset access operation part, step (3) specifically:
Application program sends certification application to certificate server, and such as account, password, certificate server is according to preset identity The table of comparisons searches account, the corresponding user identity of password, and the letter of identity for characterizing the user identity is returned to application program.
Step (4)-(5) specifically:
Application program initiates the access to the corresponding digital asset of target CID to key server by letter of identity, close Key server judges application program by accessing the corresponding relationship between the letter of identity and CID recorded in advance in block chain Whether current identity is able to access that the corresponding digital asset of target CID, if it is, returning to CID pairs of the target to application program The encryption key answered.
Step (6) specifically:
Application program obtains corresponding digital asset according to encryption key, and then is carried out by encryption key to digital asset It decrypts and uses.
Embodiment three
Hereinbefore the embodiment of the authorization method of digital asset is described in detail, the present invention also provides one The authorization device of kind digital asset corresponding with this method, since the embodiment of device part and the embodiment of method part are mutual It is corresponding, therefore the embodiment of device part refers to the description of the embodiment of method part, wouldn't repeat here.
Fig. 4 is a kind of structure chart of the authorization device of digital asset provided in an embodiment of the present invention.The embodiment of the present invention mentions The authorization device of the digital asset of confession, comprising:
Request module 10, for receiving the access request to target number assets initiated by application program, wherein Application program is logged in advance with user identity.
Ask respond module 11 is initiated permission to block chain according to the information of access request and is asked for responding access request It asks, and receives the authority information of block chain return;Record has user identity to the authority information of target number assets in block chain.
Authorization module 12, for authority information to be back to application program.
The authorization device of digital asset provided by the present invention, application program are logged in advance with user identity, obtain by After the access request to target number assets that application program is initiated, permission is initiated to block chain according to the information of access request Request, since user identity pre-recorded in block chain is to the authority information of target number assets, by block chain Corresponding authority information can be returned to by initiating authority request, and then by authority information return value application program to complete to authorize.By Have the characteristics that decentralization in block chain, recorded in hold the recognizing of all nodes under block chain network, and can not It is tampered, therefore corresponding relationship is pre-recorded in block chain by the present apparatus, opposite can guarantee according to corresponding relationship to number The reliability and correctness that assets are authorized thereby reduce the copyright protection difficulty to digital asset.
Example IV
The present invention also provides a kind of authorisation devices of digital asset, comprising:
Memory, for storing computer program;
Processor, when for executing computer program the step of the realization such as authorization method of above-mentioned digital asset.
The authorisation device of digital asset provided by the present invention, application program are logged in advance with user identity, obtain by After the access request to target number assets that application program is initiated, permission is initiated to block chain according to the information of access request Request, since user identity pre-recorded in block chain is to the authority information of target number assets, by block chain Corresponding authority information can be returned to by initiating authority request, and then by authority information return value application program to complete to authorize.By Have the characteristics that decentralization in block chain, recorded in hold the recognizing of all nodes under block chain network, and can not It is tampered, therefore corresponding relationship is pre-recorded in block chain by this equipment, opposite can guarantee according to corresponding relationship to number The reliability and correctness that assets are authorized thereby reduce the copyright protection difficulty to digital asset.
The present invention also provides a kind of computer readable storage medium, computer journey is stored on computer readable storage medium Sequence, when computer program is executed by processor the step of the realization such as authorization method of above-mentioned digital asset.
Computer readable storage medium provided by the present invention, application program are logged in advance with user identity, obtain by After the access request to target number assets that application program is initiated, permission is initiated to block chain according to the information of access request Request, since user identity pre-recorded in block chain is to the authority information of target number assets, by block chain Corresponding authority information can be returned to by initiating authority request, and then by authority information return value application program to complete to authorize.By Have the characteristics that decentralization in block chain, recorded in hold the recognizing of all nodes under block chain network, and can not It is tampered, therefore corresponding relationship is pre-recorded in block chain by this computer readable storage medium, opposite can guarantee basis The reliability and correctness that corresponding relationship authorizes digital asset, it is difficult to the copyright protection of digital asset to thereby reduce Degree.
Embodiment five
The present invention also provides a kind of authorization methods of digital asset, are applied to block chain, comprising:
Receive the authority request to target number assets initiated by server, wherein include user in authority request Identity;
According to authority request, user identity is returned to the authority information of target number assets to server.
The present invention also provides the authorization methods for the digital asset for being applied to block chain, with the above-mentioned number applied to server The corresponding execution of the authorization method of assets, and identical beneficial effect can be reached, it specifically please refers to above-mentioned applied to service The beneficial effect of the authorization method of the digital asset of device, at this to repeating no more.
A kind of authorization method of digital asset provided by the present invention, device, equipment and medium have been carried out in detail above It introduces.Each embodiment is described in a progressive manner in specification, and the highlights of each of the examples are implement with other The difference of example, the same or similar parts in each embodiment may refer to each other.For device, equipment disclosed in embodiment And for medium, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method Part illustrates.It should be pointed out that for those skilled in the art, before not departing from the principle of the invention It puts, can be with several improvements and modifications are made to the present invention, these improvement and modification also fall into the guarantor of the claims in the present invention It protects in range.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.

Claims (10)

1. a kind of authorization method of digital asset is applied to server characterized by comprising
Receive the access request to target number assets initiated by application program, wherein the application program is in advance with user Identity logs;
The access request is responded, authority request is initiated to block chain according to the information of the access request, and receive the area The authority information that block chain returns;Record has the user identity to believe the permission of the target number assets in the block chain Breath;
The authority information is back to the application program.
2. authorization method according to claim 1, which is characterized in that include at least target number in the access request and provide The identity information of the characteristic information of production and the user identity.
3. authorization method according to claim 2, which is characterized in that further include:
The characteristic information of target number assets is received, and generates encryption key for the characteristic information of the target number assets, The encryption key is for encrypting corresponding target number assets, and the encrypted target number asset store is in content distribution Network node.
4. authorization method according to claim 3, which is characterized in that the type of the authority information include have the right information and Have no right information;
Correspondingly, it is described the authority information is back to the application program before, further includes:
The type of the authority information is judged, if the authority information is when having the right information, by the target number assets Encryption key is back to the application program, so that the application program is divided using the encryption key decryption from the content Send out the target number assets of network node downloading.
5. authorization method according to claim 1, which is characterized in that lead to when the application program carries out user identity login It is out-of-date, the signing certificate with public key is received, the reception asks the access of target number assets by what application program was initiated When asking, also receive the public key, by the authority information be back to the data channel of the application program using the public key into Row encryption.
6. authorization method described in -5 any one according to claim 1, which is characterized in that the data of the target number assets In include using digital watermark technology be embedded in default copyright information.
7. a kind of authorization device of digital asset characterized by comprising
Request module, for receiving the access request to target number assets initiated by application program, wherein described to answer It is logged in advance with user identity with program;
Ask respond module initiates permission to block chain according to the information of the access request for responding the access request Request, and receive the authority information that the block chain returns;Record has the user identity to the target in the block chain The authority information of digital asset;
The authorization module, for the authority information to be back to the application program.
8. a kind of authorisation device of digital asset characterized by comprising
Memory, for storing computer program;
Processor realizes awarding such as digital asset as claimed in any one of claims 1 to 6 when for executing the computer program The step of power method.
9. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the authorization such as digital asset as claimed in any one of claims 1 to 6 when the computer program is executed by processor The step of method.
10. a kind of authorization method of digital asset is applied to block chain, which is characterized in that record has described in the block chain User identity includes: to the authority informations of the target number assets, the authorization method
Receive the authority request to the target number assets initiated by server, wherein include in the authority request The user identity;
According to the authority request, the user identity is returned to the server, the permission of the target number assets is believed Breath.
CN201810758489.7A 2018-07-11 2018-07-11 A kind of authorization method of digital asset, device, equipment and medium Pending CN109040026A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810758489.7A CN109040026A (en) 2018-07-11 2018-07-11 A kind of authorization method of digital asset, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810758489.7A CN109040026A (en) 2018-07-11 2018-07-11 A kind of authorization method of digital asset, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN109040026A true CN109040026A (en) 2018-12-18

Family

ID=64641220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810758489.7A Pending CN109040026A (en) 2018-07-11 2018-07-11 A kind of authorization method of digital asset, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN109040026A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109615498A (en) * 2018-12-19 2019-04-12 广州中软信息技术有限公司 Revenue data method for managing resource, device, equipment, system and medium
CN109658104A (en) * 2018-12-20 2019-04-19 姚前 The system and method for assets consistency confirmation on a kind of chain
CN109685664A (en) * 2018-12-20 2019-04-26 姚前 One kind being based on the associated digital asset real name register system of assets mandatory system
CN109697365A (en) * 2018-12-20 2019-04-30 深圳市元征科技股份有限公司 Information processing method and block chain node, electronic equipment
CN109727044A (en) * 2018-12-29 2019-05-07 百度在线网络技术(北京)有限公司 Brand transaction methods, device, equipment and medium based on block chain
CN109768969A (en) * 2018-12-20 2019-05-17 深圳市元征科技股份有限公司 Authority control method and internet-of-things terminal, electronic equipment
CN109871715A (en) * 2019-03-12 2019-06-11 深圳市网心科技有限公司 Access method, device and the storage medium of distributed storage file
CN109919771A (en) * 2019-03-18 2019-06-21 徐雪松 A kind of hierarchical block chain network and method of commerce applied to industry internet
CN109934581A (en) * 2019-01-24 2019-06-25 成都捕风数据科技有限公司 A kind of non-homogeneous assets application model containing safety precautions
CN109995791A (en) * 2019-04-11 2019-07-09 清华大学 A kind of data grant method and system
CN110427767A (en) * 2019-08-08 2019-11-08 北京阿尔山区块链联盟科技有限公司 Assets recurrence authorization method and device
CN110535880A (en) * 2019-09-25 2019-12-03 四川师范大学 The access control method and system of Internet of Things
CN111339188A (en) * 2020-02-20 2020-06-26 百度在线网络技术(北京)有限公司 Block chain-based media content processing method, apparatus, device, and medium
CN111538784A (en) * 2020-04-21 2020-08-14 全球能源互联网研究院有限公司 Block chain-based digital asset transaction method and device and storage medium
CN111970273A (en) * 2020-08-14 2020-11-20 易联众信息技术股份有限公司 Block chain based distributed network access method, system, medium and device
CN113098899A (en) * 2021-04-29 2021-07-09 四川虹美智能科技有限公司 Intangible asset protection method, device and computer readable medium
CN113282891A (en) * 2021-06-28 2021-08-20 北京安天网络安全技术有限公司 Version authorization control method and device, computing equipment and storage medium
CN113378120A (en) * 2021-06-28 2021-09-10 北京安天网络安全技术有限公司 Version authorization control method, device, equipment and storage medium based on block chain
CN115052011A (en) * 2022-07-25 2022-09-13 深圳前海环融联易信息科技服务有限公司 Information interaction method and device based on block chain, storage medium and electronic equipment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102122336A (en) * 2011-02-14 2011-07-13 中国联合网络通信集团有限公司 Method, equipment and system for encrypting and decrypting game protection
CN103020682A (en) * 2012-11-30 2013-04-03 中企永联数据交换技术(北京)有限公司 Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book
CN103607645A (en) * 2013-11-22 2014-02-26 深圳市九洲电器有限公司 Set top box pirate preventing method and set top box
CN104796745A (en) * 2015-03-26 2015-07-22 成都市斯达鑫辉视讯科技有限公司 Safety protection method for set top box
CN106796688A (en) * 2016-12-26 2017-05-31 深圳前海达闼云端智能科技有限公司 Permission control method, device and system of block chain and node equipment
CN106992990A (en) * 2017-05-19 2017-07-28 北京牛链科技有限公司 Data sharing method and system and block catenary system and computing device
CN107018432A (en) * 2017-03-28 2017-08-04 华为技术有限公司 The Licensing Methods and equipment of media content
CN107079036A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Registration and authorization method, apparatus and system
US20170279783A1 (en) * 2016-03-28 2017-09-28 Accenture Global Solutions Limited Secure 3d model sharing using distributed ledger
CN107995525A (en) * 2017-11-27 2018-05-04 合肥亚慕信息科技有限公司 One kind encrypts online video watermark analysis process system based on safety
CN108028750A (en) * 2015-09-03 2018-05-11 日本电信电话株式会社 License Info management system, user's terminal, right holder's terminal, license information management method and License Info management program

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102122336A (en) * 2011-02-14 2011-07-13 中国联合网络通信集团有限公司 Method, equipment and system for encrypting and decrypting game protection
CN103020682A (en) * 2012-11-30 2013-04-03 中企永联数据交换技术(北京)有限公司 Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book
CN103607645A (en) * 2013-11-22 2014-02-26 深圳市九洲电器有限公司 Set top box pirate preventing method and set top box
CN104796745A (en) * 2015-03-26 2015-07-22 成都市斯达鑫辉视讯科技有限公司 Safety protection method for set top box
CN108028750A (en) * 2015-09-03 2018-05-11 日本电信电话株式会社 License Info management system, user's terminal, right holder's terminal, license information management method and License Info management program
US20170279783A1 (en) * 2016-03-28 2017-09-28 Accenture Global Solutions Limited Secure 3d model sharing using distributed ledger
CN107079036A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Registration and authorization method, apparatus and system
CN106796688A (en) * 2016-12-26 2017-05-31 深圳前海达闼云端智能科技有限公司 Permission control method, device and system of block chain and node equipment
CN107018432A (en) * 2017-03-28 2017-08-04 华为技术有限公司 The Licensing Methods and equipment of media content
CN106992990A (en) * 2017-05-19 2017-07-28 北京牛链科技有限公司 Data sharing method and system and block catenary system and computing device
CN107995525A (en) * 2017-11-27 2018-05-04 合肥亚慕信息科技有限公司 One kind encrypts online video watermark analysis process system based on safety

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109615498A (en) * 2018-12-19 2019-04-12 广州中软信息技术有限公司 Revenue data method for managing resource, device, equipment, system and medium
CN109658104B (en) * 2018-12-20 2022-10-21 姚前 System and method for confirming asset consistency on chain
CN109685664A (en) * 2018-12-20 2019-04-26 姚前 One kind being based on the associated digital asset real name register system of assets mandatory system
CN109697365A (en) * 2018-12-20 2019-04-30 深圳市元征科技股份有限公司 Information processing method and block chain node, electronic equipment
CN109768969A (en) * 2018-12-20 2019-05-17 深圳市元征科技股份有限公司 Authority control method and internet-of-things terminal, electronic equipment
WO2020125512A1 (en) * 2018-12-20 2020-06-25 深圳市元征科技股份有限公司 Information processing method, blockchain node, and electronic apparatus
US11483161B2 (en) 2018-12-20 2022-10-25 Launch Tech Co., Ltd. Method for information processing and non-transitory computer readable storage medium
CN109697365B (en) * 2018-12-20 2023-04-07 深圳市元征科技股份有限公司 Information processing method, block chain node and electronic equipment
CN109768969B (en) * 2018-12-20 2021-09-10 深圳市元征科技股份有限公司 Authority control method, Internet of things terminal and electronic equipment
CN109685664B (en) * 2018-12-20 2021-08-13 姚前 Digital asset real-name registration system based on asset hosting system association
CN109658104A (en) * 2018-12-20 2019-04-19 姚前 The system and method for assets consistency confirmation on a kind of chain
CN109727044A (en) * 2018-12-29 2019-05-07 百度在线网络技术(北京)有限公司 Brand transaction methods, device, equipment and medium based on block chain
CN109934581A (en) * 2019-01-24 2019-06-25 成都捕风数据科技有限公司 A kind of non-homogeneous assets application model containing safety precautions
CN109871715A (en) * 2019-03-12 2019-06-11 深圳市网心科技有限公司 Access method, device and the storage medium of distributed storage file
CN109919771B (en) * 2019-03-18 2020-04-10 徐雪松 Industrial internet transaction device applying hierarchical block chain technology
CN109919771A (en) * 2019-03-18 2019-06-21 徐雪松 A kind of hierarchical block chain network and method of commerce applied to industry internet
CN109995791A (en) * 2019-04-11 2019-07-09 清华大学 A kind of data grant method and system
CN110427767A (en) * 2019-08-08 2019-11-08 北京阿尔山区块链联盟科技有限公司 Assets recurrence authorization method and device
CN110427767B (en) * 2019-08-08 2021-10-08 北京阿尔山区块链联盟科技有限公司 Asset recursive authorization method and device
CN110535880A (en) * 2019-09-25 2019-12-03 四川师范大学 The access control method and system of Internet of Things
CN110535880B (en) * 2019-09-25 2022-06-14 四川师范大学 Access control method and system of Internet of things
CN111339188A (en) * 2020-02-20 2020-06-26 百度在线网络技术(北京)有限公司 Block chain-based media content processing method, apparatus, device, and medium
CN111339188B (en) * 2020-02-20 2023-10-31 百度在线网络技术(北京)有限公司 Media content processing method, device, equipment and medium based on blockchain
CN111538784A (en) * 2020-04-21 2020-08-14 全球能源互联网研究院有限公司 Block chain-based digital asset transaction method and device and storage medium
CN111538784B (en) * 2020-04-21 2023-05-23 国网智能电网研究院有限公司 Digital asset transaction method, device and storage medium based on blockchain
CN111970273A (en) * 2020-08-14 2020-11-20 易联众信息技术股份有限公司 Block chain based distributed network access method, system, medium and device
CN111970273B (en) * 2020-08-14 2022-09-06 易联众信息技术股份有限公司 Block chain based distributed network access method, system, medium and device
CN113098899B (en) * 2021-04-29 2023-04-18 四川虹美智能科技有限公司 Intangible asset protection method, device and computer readable medium
CN113098899A (en) * 2021-04-29 2021-07-09 四川虹美智能科技有限公司 Intangible asset protection method, device and computer readable medium
CN113378120A (en) * 2021-06-28 2021-09-10 北京安天网络安全技术有限公司 Version authorization control method, device, equipment and storage medium based on block chain
CN113282891A (en) * 2021-06-28 2021-08-20 北京安天网络安全技术有限公司 Version authorization control method and device, computing equipment and storage medium
CN115052011A (en) * 2022-07-25 2022-09-13 深圳前海环融联易信息科技服务有限公司 Information interaction method and device based on block chain, storage medium and electronic equipment
CN115052011B (en) * 2022-07-25 2024-05-10 深圳前海环融联易信息科技服务有限公司 Information interaction method and device based on blockchain, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN109040026A (en) A kind of authorization method of digital asset, device, equipment and medium
US8930700B2 (en) Remote device secure data file storage system and method
US7797541B2 (en) Method and apparatus for providing cellular telephone service using an authenticating cellular telephone device
CN109274652B (en) Identity information verification system, method and device and computer storage medium
CN102045367B (en) Registration method and authentication server of real-name authentication
US7552322B2 (en) Using a portable security token to facilitate public key certification for devices in a network
CN110049016B (en) Data query method, device, system, equipment and storage medium of block chain
CN101651714B (en) Downloading method and related system and equipment
CN111538784B (en) Digital asset transaction method, device and storage medium based on blockchain
CN100472550C (en) Method for generating licence and method and apparatus for providing contents using the same
KR20010041400A (en) Transmitting reviews with digital signatures
CN109618341A (en) A kind of digital signature authentication method, system, device and storage medium
CN109547198A (en) The method and system of network transmission video file
CN104811303B (en) The method, apparatus and system of two-way authentication
CN103237010B (en) The server end of digital content is cryptographically provided
CN107145769A (en) A kind of digital rights management method about DRM, equipment and system
CN112800392A (en) Authorization method and device based on soft certificate and storage medium
CN103237011B (en) Digital content encryption transmission method and server end
CN106656955A (en) Communication method and system and user terminal
CN114338201A (en) Data processing method and device, electronic device and storage medium
CN104462872B (en) Terminal, server and digital Content-Authorize method
CN110807210B (en) Information processing method, platform, system and computer storage medium
JP2005128960A (en) Apparatus and method for reproducing content
JP4740560B2 (en) How to use content management
CN112769783B (en) Data transmission method, cloud server, receiving end and sending end

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210910

Address after: 518000 21 / f-23 / F, block B, building 12, Shenzhen Bay science and technology ecological park, No. 18, South Keji Road, high tech community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Xunlei Networking Technologies, Ltd.

Applicant after: SHENZHEN ONETHING TECHNOLOGIES Co.,Ltd.

Address before: 518052 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: SHENZHEN ONETHING TECHNOLOGIES Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181218