CN109740375A - A kind of shared and dissemination method of original audio production - Google Patents

A kind of shared and dissemination method of original audio production Download PDF

Info

Publication number
CN109740375A
CN109740375A CN201811566897.9A CN201811566897A CN109740375A CN 109740375 A CN109740375 A CN 109740375A CN 201811566897 A CN201811566897 A CN 201811566897A CN 109740375 A CN109740375 A CN 109740375A
Authority
CN
China
Prior art keywords
network
block
storage
file block
audio production
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811566897.9A
Other languages
Chinese (zh)
Other versions
CN109740375B (en
Inventor
王群华
黎富德
魏万晓
王翔
张谅
张帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yoostar Technology Co Ltd
Original Assignee
Yoostar Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yoostar Technology Co Ltd filed Critical Yoostar Technology Co Ltd
Priority to CN201811566897.9A priority Critical patent/CN109740375B/en
Publication of CN109740375A publication Critical patent/CN109740375A/en
Application granted granted Critical
Publication of CN109740375B publication Critical patent/CN109740375B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention is suitable for audio files storage and encryption technology improvement areas, provide a kind of shared and dissemination method of original audio production, comprising: S1, original audio production is generated into multiple copy source file blocks and small documents block is being divided into each copy source file block;S2, using it is double add it is close each small documents block is generated into encryption file block, use file block and decrypted list to save encryption file block and decryption method and decrypt the relationship of code key;S3, audio production author grasp file block and decrypted list transmits encryption file block on the network storage node of random dispersion in a network by peer-to-peer network.It supports works author to share and issue the works of oneself over a peer-to-peer, and obtains corresponding income;It goes the administration fee of platform and is pumped into expense, reduce the cost of author;Eliminate the purchase expenditure of memory space, bandwidth.

Description

A kind of shared and dissemination method of original audio production
Technical field
The invention belongs to being total to for audio files storage and encryption technology improvement areas more particularly to a kind of original audio production It enjoys and dissemination method and system.
Background technique
Conventional audio file is typically stored on local computer or server.There are some risks, such as 1) storage event Barrier, computer glitch will lead to loss of data and cannot provide service;2) Malware, hacker etc. may destroy and leakage is literary Part;3) after legitimate user reuses audio file, it is possible to create copy.The copy may reveal that (intentionally, unintentionally having can Can), it is stolen so as to cause file.
For personal or original medium-sized and small enterprises audio content, generally to be issued by various platforms.Platform can extract height The income of high expense, author is compressed.Such case is unfavorable for motivating the enthusiasm of author, has biggish inhibition to innovation Effect.Meanwhile the safety of works places one's entire reliance upon platform.If platform is leaky or under attack.The works of author can be straight Junction faces the risk of leakage.
Summary of the invention
The purpose of the present invention is to provide a kind of shared and dissemination methods of original audio production, it is intended to solve above-mentioned skill Art problem.
The invention is realized in this way a kind of shared and dissemination method of original audio production, the shared and publisher Method the following steps are included:
S1, original audio production is generated into multiple copy source file blocks and small text is being divided into each copy source file block Part block;
S2, using it is double add it is close each small documents block is generated into encryption file block, use file block and decrypted list to protect It deposits encryption file block and decryption method and decrypts the relationship of code key;
S3, audio production author grasp file block and decrypted list and will encrypt file block and be transmitted at random by peer-to-peer network On the network storage node of dispersion in a network.
A further technical solution of the present invention is: the shared and dissemination method is further comprising the steps of:
Confidential information is conciliate from audio production author demand file list when S4, works user need to consume works and is paid corresponding Audio production assets.
A further technical solution of the present invention is: being that each small documents block generates additional content, institute in the step S1 Stating additional content includes file block number, digital watermarking and the information for examining HASH value.
A further technical solution of the present invention is: using multiple encryption algorithms in the step S2 is each small documents block It is all encrypted with different key and Encryption Algorithm, file block is using kind of an Encryption Algorithm, by the verification HASH value of the block First four bit determine.
A further technical solution of the present invention is: in the step S3 the following steps are included:
S31, after network storage node storing data, network verification person verify storage whether validity, such as verify effectively, then network The certain audio production assets of network storage node are paid as reward, such as network verification person and verify some encryption file block Storage changes, then can issue the request for re-starting storage.
A further technical solution of the present invention is: storage competition in storage in the S3 the following steps are included:
Whether S321, audio production author inspection file block and decrypted list have encryption file block to need to be published on network Storage waits network storage node if so, then network verification person issues the encryption file block storage demand that block ID is A Response;
S322, network storage node Y compete the encryption file block storage demand that block ID is A;
S323, network verification person are according to the credit value judgement of itself file block and decrypted list and network storage node Y It is no to give network storage node Y storage, if agreement, performs the next step, if disagreeing, return step S321;
Network storage node starts memory block after S324, network freeze network storage node Y credit value guarantee fund, and passes through net Network broadcast distribution stores the encryption file block.
A further technical solution of the present invention is: network verification person after the network storage node storage encryption file block Constantly it is stored and is verified, it is described verifying the following steps are included:
SA1, network verification person for the verification HASH value of the encryption file block of x and protect from audio production author request block ID Save as HASH1;
It is the contents value for the encryption file block that block ID is x, meter that SA2, network verification person, which request number from network storage node, It calculates the verification HASH value of the block and saves as HASH2;
SA3, network verification person compare HASH1 and HASH2 and judge whether equal, if equal, verifying broadcasts are correct in network, net Network is issued to network storage node and is rewarded, and network verification person obtains verifying workload and rewards and perform the next step, if unequal, Verifying broadcasts do not pass through in a network, and network does not give the publication reward of network storage node, and network verification person obtains verifying workload It rewards and performs the next step;
SA4, network storage node are according to verifying situation to the encryption file block feedback storage feelings that audio production author ID is x Condition.
A further technical solution of the present invention is: the audio production author is safeguarded using file block and decrypted list All encryption file block storage address, decipherment algorithm and decruption key.
A further technical solution of the present invention is: the audio production author is established in storage with network storage node Intelligent contract is stored, the time of storage, the expense of storage, the amount of money and credit value freezed are arranged.
Sentence a further technical solution of the present invention is: the network verification person carries out verifying to the storage of network storage node Whether break, if verifying does not pass through, the message for issuing reduction network storage node credit value issues promotion if being verified The message of network storage node credit value.
The beneficial effects of the present invention are: works author is supported to share and issue the works of oneself over a peer-to-peer, and Obtain corresponding income;It goes the administration fee of platform and is pumped into expense, reduce the cost of author;Works of the author to oneself There is complete control, the behavior lost and encroached right without worrying copyright;Eliminate the purchase expenditure of memory space, bandwidth;It is more Copy saves in a peer-to-peer network, and file is not lost, and DDOS attack is also not easily susceptible to;It is double add it is close guarantee file confidentiality and It prevents from usurping.The use of digital watermarking guarantee to chase after in blabber.
Detailed description of the invention
Fig. 1 is original audio works file block schematic diagram provided in an embodiment of the present invention.
Fig. 2 is generation encryption file block diagram provided in an embodiment of the present invention.
Fig. 3 is the dispersion storage schematic diagram of encryption file block provided in an embodiment of the present invention.
Fig. 4 is competition storing process flow chart provided in an embodiment of the present invention.
Fig. 5 is storage verification process flow chart provided in an embodiment of the present invention.
Fig. 6 is the schematic diagram of downloading and decrypted list provided in an embodiment of the present invention.
Specific embodiment
It is double more: to add decryption method and the encryption of more code keys.
NetStorager network storage node: the equipment of storage file.
NetVerifier network verification person: storage, the transaction etc. of network are verified.
ProductOriginator audio production author: the right person of audio file enjoys the copyright and income of response Right.
ProductConsumer works user: the consumer of audio production.
FbDecryptList file block and decrypted list: when having in user's ProductConsumer requesting consumption file Rong Shi, ProductOriginator generate the table for it, with file block lists and its corresponding decryption method and close in table Code.
AudioAsset audio production assets: there is a kind of assets sub of exchange and use value in present networks.
The source SourceFileBlock small documents block: from small documents block made of original audio file division, these blocks Size is identical, with number and digital watermarking.
EnFileBlock encrypts file block: SourceFileBlock using it is double add it is close after obtained encryption file Block.One audio file is divided into the identical some fritters of size.These fritters are added with different encryption method and password It is close, and random dispersion is stored on NetStorager.
As shown in figures 1 to 6, the shared and dissemination method of original audio production provided by the invention, first according to original works Multiple copies are generated, each copy are divided into source small documents block (SourceFileBlock) and plus digital watermarking.It reuses It is double to add dense at encryption file block (EnFileBlock), use file block and decrypted list (FbDecryptList) to protect Deposit EnFileBlock and decryption method, the relationship for decrypting code key.FbDecryptList is by audio production author (ProductOriginator) it grasps.EnFileBlock is transmitted by peer-to-peer network, is randomly dispersed within network storage node (NetStorager) on.NetStorager has paid storage resource, and AudioAsset is to it for Web vector graphic audio production assets It is rewarded.When works user (ProductConsumer) will consume works, arranged from ProductOriginator demand file Table conciliates confidential information, and pays corresponding AudioAsset as needed.
It include network storage node (NetStorager), audio production author in network (ProductOriginator), the entities such as works user (ProductConsumer), network verification person (NetVerifier). ProductOriginator, ProductConsumer, NetStorager, NetVerifier participate in the various affairs of network, are Guarantee honesty, these entities have corresponding credit value, and freeze certain guarantee gold as needed.When under credit value It drops to a certain degree, certain activities is participated in into limitation, and confiscate the guarantee fund freezed.
ProductOriginator is the right person of audio file, enjoys the copyright and income right of response. ProductConsumer is the consumer of audio production.NetStorager is the node of storage file.
NetVerifier verifies storage, the transaction etc. of network.
Small documents block (SourceFileBlock) made of ProductOriginator divides original audio works. These block sizes of SourceFileBlock are identical.Comprising marking off the original contents (SourceContent) come, and additional packet Additional content (AttachedContent) containing file block number, digital watermarking and HASH check value.
ProductOriginator again the SourceContent of SourceFileBlock by it is double add it is close, attached Upper AttachedContent forms encryption blocks of files (EnFileBlock).
Simultaneously random dispersion is stored on NetStorager EnFileBlock.
ProductOriginator is saved all using file block and decrypted list (FbDecryptList) Storage location, file block lists, decryption method and the password of EnFileBlock.
When ProductConsumer needs consumer audio works, issues and request to ProductOriginator. ProductOriginator can be generated by FbDecryptList the storage locations of a complete works, file block lists, Decryption method and password, and ProductConsumer is sent to after encrypting.ProductConsumer is logical according to the information received It crosses peer-to-peer network and requests and receive all EnFileBlock, then decryption restoration goes out original document
Audio production assets (AudioAsset) are a kind of assets subs for having exchange and use value in present networks. NetStorager provides storage service, can obtain AudioAsset as reward.ProductConsumer has consumed works Content needs to pay certain AudioAsset to ProductOriginator.AudioAsset is shifted in a network, NetStorager also provides book keeping operation function.Keeping accounts successfully can also obtain certain AudioAsset as reward.
A. file block divides
Original audio works file is divided into multiple source file block SourceFileBlock by ProductOriginator, is such as schemed Shown in 1.Each copy is further subdivided into small documents block SourceContent.It is generated in additional for each SourceContent again Hold AttachedContent.AttachedContent includes the information such as file block number, digital watermarking and inspection HASH value.
After SourceFileBlock is generated, its SourceContent progress pair is added close.Each SourceContent All encrypted with different key and Encryption Algorithm.Using 16 kinds of Encryption Algorithm, 0:AES128,1:AES192,2: AES256、3:DES、4:3DES、5:SM4、6:RC2、7:RC4、8:RC5、9:TDEA、10:Blowfish、11:IDEA、12: SKIPJACK,13:TWOFISH,14:SERPENT,15:MARS.The specifically used any Encryption Algorithm of file block, by the area The first four bit of the verification HASH value of block determines that specific corresponding relationship is as shown in Figure 2.Respectively encryption setting each time is random Key.
It is combined after SourceContent encryption with AttachedContent, forms EnFileBlock. ProductOriginator is by information preservations such as file block number, Encryption Algorithm, secret code keys in file block and decrypted list (FbDecryptList) in.When customer requests use audio production, ProductOriginator can pass through FbDecryptList generates a complete file block lists and corresponding decryption method and code key for it. FbDecryptList should maintain secrecy, and be grasped by ProductOriginator.
B.EnFileBlock storage method
The present invention stores EnFileBlock data file block using dedicated equity P2P network.EnFileBlock can be with Machine is stored in multiple node tops.One group of EnFileBlock that can restore entire works file, should not be stored in one It on NetStorager node, but is distributed on different NetStorager nodes and is saved, as shown in Figure 3.Pass through this Kind mode can accomplish multiple redundancy, improve the reliability of storage.
ProductOriginator safeguards the storage inventory of EnFileBlock, will appreciate that the All Files storage of oneself Where.
Once after NetStorager node storing data, the validity of NetVerifier verifying storage, once verifying Effectively, network payment is to the certain AudioAsset of NetStorager node as reward.
If NetVerifier verifies some EnFileBlock storage and changes, it can issue and re-start asking for storage It asks.NetStorager can choose whether to receive request according to request.
Guarantee the correctness of storage by motivating.
Competition storage
Storage demand is issued by ProductOriginator, NetStorager competition stores, and process is as shown in Figure 4.
1) ProductOriginator checks whether FbDecryptList has EnFileBlock to need to be published on network Storage, if it is that the EnFileBlock of A needs to store that discovery, which has block ID, it is A's that NetVerifier, which issues block ID, EnFileBlock storage demand waits the response of NetStorager;
2) NetStorager Y competes the EnFileBlock storage demand that block ID is A;
3) NetVerifier decides whether to give according to the credit value of itself FbDecryptList and NetStorager NetStorager Y storage.It goes to 4), is otherwise returned 1) if agreeing to give NetStorager Y;
4) network freezes NetStorager credit value guarantee fund;
5) NetStorager starts memory block, and has properly stored the EnFileBlock by Web broadcast;
Store verification process
After NetStorager stores EnFileBlock, NetVerifier constantly stores it and verifies.See whether provide Correct storage.Its verification process is as shown in Figure 5.
1) verification HASH of the NetVerifier from the ProductOriginator request block ID EnFileBlock for being x Value, saves as HASH1.
2) contents value that NetVerifier is the EnFileBlock that block ID is x from NetStorager request number, meter The verification HASH value for calculating block, saves as HASH2.
3) NetVerifier compares HASH1 and HASH2, if the two is equal, goes to step 4), if the two etc., goes to Step 5;
4) verifying broadcasts are correct in network, and network is issued to NetStorager and rewarded, and NetVerifier is also verified itself Workload reward.
5) verifying broadcasts do not pass through in a network, and network is no longer issued to NetStorager and rewarded, and NetVerifier is certainly Body also obtains the reward of authentication workload.
6) NetStorager notifies the EnFileBlock storage that ProductOriginator ID is x to fail.
C. the decryption of file
ProductConsumer is when consumer audio file, it is necessary to obtain encryption from the there ProductOriginator Algorithm and password.
ProductOriginator safeguards all EnFileBlock storage address, decryption using FbDecryptList person Algorithm and decruption key.When there is node to need using file, ProductOriginator generates a downloading and decryption for it List, as shown in fig. 6, being then issued to requestor.
After ProductConsumer obtains list, download corresponding EnFileBlock according to address, and according to method into Row decompression, can recover ciphertext data, consume to audio file.
ProductConsumer pays AudioAsset to the consumer need of audio file.
D. intelligent contract
ProductOriginator is established with NetStorager in storage and is stored intelligent contract.Contract can arrange: storage The contents such as time, the expense of storage, the amount of money freezed, credit value.
ProductConsumer establishes consumption contract when consuming works with ProductOriginator.Contract agreement: The contents such as file, the expense of consumption.
In intelligent contract storage to the public chain such as Ethereum.
E.ProductConsumer credit value management
NetVerifier verifies the storage of NetStorager.If verifying does not pass through, issuing reduces NetStorager The message of credit value.Other NetVerifier can also verify the verifying.
It only divulges a secret a part of file block, the safety of entire file can't be threatened.Because only partial content is divulged a secret , other parts are also in safe condition.The principal risk that file is divulged a secret concentrates on ProductConsumer.Because ProductConsumer obtains the decryption method and password of entire complete file block.Therefore, it is necessary to right ProductConsumer is monitored, and is had method that whom can find out and be proved to be and has been revealed file.
ProductOriginator generates audio file digital watermarking with private key.Other nodes do not know watermark insertion Position.ProductOriginator preserves the ProductConsumer of each request password.According to the number of the file of leakage Word watermark, can find out is who is leaked out.If there is node is divulged a secret, ProductOriginator can provide evidence, NetVerifier can be verified.After verifying, blabber can be punished, reduce the prestige of ProductConsumer Value, and deprive frozen capital.
There are multiple computers as network storage node (NetStorager) in network.Company C is audio production author (ProductOriginator).Ordinary individual obtains simultaneously consumer audio content as works user (ProductConsumer). There are some computers in network, as the entities such as verifier (NetVerifier).ProductOriginator, ProductConsumer, NetStorager, NetVerifier participate in the various affairs of network, their initial credit value is 80.
59 small documents blocks made of ProductOriginator divides audio file Audio1 works (SourceFileBlock).These block sizes of SourceFileBlock are 1M size, the filling of the last one small documents end 0, to guarantee just to be 1M size.
Company C is each small documents block calculation document block number (1 ~ 59), digital watermarking and HASH check value, and is combined For additional content (AttachedContent).The SourceContent of SourceFileBlock is added by double again later It is close, encryption blocks of files (EnFileBlock) is formed enclosing AttachedContent.
Simultaneously random dispersion is stored on 25 NetStorager computers EnFileBlock.
Company C saves the storage position of all EnFileBlock using file block and decrypted list (FbDecryptList) It sets, file block lists, decryption method and password.
A. file block divides
Frequency works file Audio1 is divided into multiple source file blocks as ProductOriginator by company C SourceFileBlock.Each copy is further subdivided into 59 small documents block SourceContent.It is again each SourceContent generates additional content AttachedContent.AttachedContent include file block number (1 ~ 59), the information such as digital watermarking and inspection HASH value.
After SourceFileBlock is generated, its SourceContent progress pair is added close.Each SourceContent All encrypted with different key and Encryption Algorithm.Using 16 kinds of Encryption Algorithm, 0:AES128,1:AES192,2: AES256、3:DES、4:3DES、5:SM4、6:RC2、7:RC4、8:RC5、9:TDEA、10:Blowfish、11:IDEA、12: SKIPJACK,13:TWOFISH,14:SERPENT,15:MARS.The specifically used any Encryption Algorithm of file block, by the area The first four bit of the verification HASH value of block determines that specific corresponding relationship is as shown in Figure 2.Respectively encryption setting each time is random Key.
It is combined after SourceContent encryption with AttachedContent, forms EnFileBlock. ProductOriginator is by information preservations such as file block number, Encryption Algorithm, secret code keys in file block and decrypted list In FbDecryptList.
B.EnFileBlock storage method
EnFileBlock data file block is stored using dedicated equity P2P network.EnFileBlock can be saved at random In multiple node tops.One group of EnFileBlock that can restore entire works file, should not be stored in a NetStorager It on node, but is distributed on different NetStorager nodes and is saved, as shown in Figure 3.It can do in this way To multiple redundancy, the reliability of storage is improved.But a NetStorager can completely restore original document there is no all EnFileBlock, in this way raising safety.
ProductOriginator safeguards the storage inventory of EnFileBlock, how many copy of file, how many file area Block, be respectively stored in where, what Encryption Algorithm and code key used, has all been grasped by ProductOriginator.
Once NetVerifier(is also net after the computer in network is as NetStorager node storing data Computer in network) validity of storage is verified, once verifying effectively, network payment is 1 to NetStorager number of nodes AudioAsset is as reward.
If NetVerifier verifies some EnFileBlock storage and changes, it can issue and re-start asking for storage It asks.NetStorager can choose whether to receive request according to request.
Competition storage
Storage demand, network computer NetStorager competition storage, mistake are issued by the ProductOriginator of company C Journey is as shown in Figure 4.
1) ProductOriginator checks whether FbDecryptList has EnFileBlock to need to be published on network Storage, if it is that the EnFileBlock of A needs to store that discovery, which has block ID, it is A's that NetVerifier, which issues block ID, EnFileBlock storage demand, a block are ready 0.1 AudioAsset of payment, and storage period is 8 months, wait The response of NetStorager;
2) NetStorager Y competes the EnFileBlock storage demand that block ID is A;
3) NetVerifier is according to the credit value of itself FbDecryptList and NetStorager, if credit value is greater than 90, decide whether to give NetStorager Y storage.It goes to 4), is otherwise returned 1) if agreeing to give NetStorager Y;
4) network freezes 10 AudioAsset of NetStorager credit value guarantee fund;
5) NetStorager starts memory block, and has properly stored the EnFileBlock by Web broadcast;
Store verification process
After network computer NetStorager stores EnFileBlock, the computer as NetVerifier is constantly to it Storage is verified.See whether provide correct storage.Its verification process is as shown in Figure 5.
1) EnFileBlock of the NetVerifier from ProductOriginator request block (such as ID is 1256) HASH value is verified, HASH1 is saved as.
2) content that NetVerifier is the EnFileBlock that block ID is 1256 from NetStorager request number Value, the verification HASH value of calculation block save as HASH2.
3) NetVerifier compares HASH1 and HASH2, if the two is equal, goes to step 4), if the two etc., goes to Step 5;
4) verifying broadcasts are correct in network, and network is rewarded to the AudioAsset of NetStorager publication 0.01, NetVerifier itself also obtains verifying workload reward.
5) verifying broadcasts do not pass through in a network, and network is no longer issued to NetStorager and rewarded, and NetVerifier is certainly Body also obtains the AudioAsset of authentication workload reward 0.01.
6) NetStorager notifies the EnFileBlock storage that ProductOriginator ID is 1256 to fail.
C. the decryption of file
ProductConsumer is when consumer audio file, it is necessary to obtain encryption from the there ProductOriginator Algorithm and password.
ProductOriginator safeguards all EnFileBlock storage address, decryption using FbDecryptList person Algorithm and decruption key.When there is node to need using file, ProductOriginator generates a downloading and decryption for it List, as shown in fig. 6, being then issued to requestor.
After ProductConsumer obtains list, download corresponding EnFileBlock according to address, and according to method into Row decompression, can recover ciphertext data, consume to audio file.
ProductConsumer pays AudioAsset to the consumer need of audio file.
D. intelligent contract
ProductOriginator is established with NetStorager in storage and is stored intelligent contract.Contract can arrange: storage The contents such as time, the expense of storage, the amount of money freezed, credit value.
ProductConsumer establishes consumption contract when consuming works with ProductOriginator.Contract agreement: The contents such as file, the expense of consumption.
In intelligent contract storage to the public chain such as Ethereum.
E.ProductConsumer credit value management
NetVerifier verifies the storage of NetStorager.If verifying does not pass through, issuing reduces NetStorager The message of credit value.Other NetVerifier can also verify the verifying.
It only divulges a secret a part of file block, the safety of entire file can't be threatened.Because only partial content is divulged a secret , other parts are also in safe condition.The principal risk that file is divulged a secret concentrates on ProductConsumer.Because ProductConsumer obtains the decryption method and password of entire complete file block.Therefore, it is necessary to right ProductConsumer is monitored, and is had method that whom can find out and be proved to be and has been revealed file.
ProductOriginator generates audio file digital watermarking with private key.Other nodes do not know watermark insertion Position.ProductOriginator preserves the ProductConsumer of each request password.According to the number of the file of leakage Word watermark, can find out is who is leaked out.If there is node is divulged a secret, ProductOriginator can provide evidence, NetVerifier can be verified.After verifying, blabber can be punished, reduce the credit value of ProductConsumer (reducing by 10 every time), and deprive frozen capital.
By the work of above several parts, storage, the consumption of audio production are realized, author does not have to worry to divulge a secret, Can guarantee can obtain income.The computer of the storage of participation also can be rewarded accordingly.Because having credit value and guarantee fund about Otherwise beam will receive punishment, and compensate the loss of author so the computer for participating in storage has to honest offer service. To the user that file is consumed, decryption method can be obtained after paying successfully, can be consumed.Simultaneously he also by The constraint of credit value, guarantee fund.Network verification person can obtain income, him can be motivated to participate in net by providing the service for checking credentials The maintenance of network.Participating parties all suffers restraints in this way, and guarantees to obtain expected income.Whole system can be normal Operating.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of shared and dissemination method of original audio production, which is characterized in that the shared and dissemination method includes following Step:
S1, original audio production is generated into multiple copy source file blocks and small text is being divided into each copy source file block Part block;
S2, using it is double add it is close each small documents block is generated into encryption file block, use file block and decrypted list to protect It deposits encryption file block and decryption method and decrypts the relationship of code key;
S3, audio production author grasp file block and decrypted list and will encrypt file block and be transmitted at random by peer-to-peer network On the network storage node of dispersion in a network.
2. the shared and dissemination method of original audio production according to claim 1, which is characterized in that described shared and hair Cloth method is further comprising the steps of:
Confidential information is conciliate from audio production author demand file list when S4, works user need to consume works and is paid corresponding Audio production assets.
3. the shared and dissemination method of original audio production according to claim 2, which is characterized in that in the step S1 Additional content is generated for each small documents block, the additional content includes file block number, digital watermarking and inspection HASH The information of value.
4. the shared and dissemination method of original audio production according to claim 3, which is characterized in that in the step S2 It is encrypted for each small documents block with different key and Encryption Algorithm using multiple encryption algorithms, file block uses Kind Encryption Algorithm, is determined by the first four bit of the verification HASH value of the block.
5. the shared and dissemination method of original audio production according to claim 4, which is characterized in that in the step S3 The following steps are included:
S31, after network storage node storing data, network verification person verify storage whether validity, such as verify effectively, then network The certain audio production assets of network storage node are paid as reward, such as network verification person and verify some encryption file block Storage changes, then can issue the request for re-starting storage.
6. the shared and dissemination method of original audio production according to claim 5, which is characterized in that depositing in the S3 In storage storage competition the following steps are included:
Whether S321, audio production author inspection file block and decrypted list have encryption file block to need to be published on network Storage waits network storage node if so, then network verification person issues the encryption file block storage demand that block ID is A Response;
S322, network storage node Y compete the encryption file block storage demand that block ID is A;
S323, network verification person are according to the credit value judgement of itself file block and decrypted list and network storage node Y It is no to give network storage node Y storage, if agreement, performs the next step, if disagreeing, return step S321;
Network storage node starts memory block after S324, network freeze network storage node Y credit value guarantee fund, and passes through net Network broadcast distribution stores the encryption file block.
7. the shared and dissemination method of original audio production according to claim 6, which is characterized in that the network storage Network verification person constantly stores it and verifies after node storage encryption file block, the verifying the following steps are included:
SA1, network verification person for the verification HASH value of the encryption file block of x and protect from audio production author request block ID Save as HASH1;
It is the contents value for the encryption file block that block ID is x, meter that SA2, network verification person, which request number from network storage node, It calculates the verification HASH value of the block and saves as HASH2;
SA3, network verification person compare HASH1 and HASH2 and judge whether equal, if equal, verifying broadcasts are correct in network, net Network is issued to network storage node and is rewarded, and network verification person obtains verifying workload and rewards and perform the next step, if unequal, Verifying broadcasts do not pass through in a network, and network does not give the publication reward of network storage node, and network verification person obtains verifying workload It rewards and performs the next step;
SA4, network storage node are according to verifying situation to the encryption file block feedback storage feelings that audio production author ID is x Condition.
8. the shared and dissemination method of original audio production according to claim 7, which is characterized in that the audio production Author safeguards all encryption file block storage address, decipherment algorithm and decruption key using file block and decrypted list.
9. the shared and dissemination method of original audio production according to claim 8, which is characterized in that the audio production Author establishes with network storage node in storage and stores intelligent contract, arranges the time of storage, the expense of storage, freezes The amount of money and credit value.
10. the shared and dissemination method of original audio production according to claim 9, which is characterized in that the network is tested Card person carries out verifying to the storage of network storage node and judges whether, if verifying does not pass through, issuing reduces network storage node The message of credit value issues the message for promoting network storage node credit value if being verified.
CN201811566897.9A 2018-12-19 2018-12-19 Sharing and publishing method of original audio works Active CN109740375B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811566897.9A CN109740375B (en) 2018-12-19 2018-12-19 Sharing and publishing method of original audio works

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811566897.9A CN109740375B (en) 2018-12-19 2018-12-19 Sharing and publishing method of original audio works

Publications (2)

Publication Number Publication Date
CN109740375A true CN109740375A (en) 2019-05-10
CN109740375B CN109740375B (en) 2023-07-28

Family

ID=66360888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811566897.9A Active CN109740375B (en) 2018-12-19 2018-12-19 Sharing and publishing method of original audio works

Country Status (1)

Country Link
CN (1) CN109740375B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625780A (en) * 2020-01-15 2020-09-04 支付宝(杭州)信息技术有限公司 Block chain-based audio work authorization method, device and equipment
CN111641609A (en) * 2020-05-18 2020-09-08 中科易贺(江苏)区块链高科技有限公司 System and method for tracing information by using block chain
CN112835855A (en) * 2021-02-22 2021-05-25 北京众享比特科技有限公司 File storage method and system based on block chain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1341240A (en) * 1999-12-20 2002-03-20 大日本印刷株式会社 Distributed data archive device and system
CN105701367A (en) * 2016-03-21 2016-06-22 冯颖 Security system for Internet original commercial works
US20180139042A1 (en) * 2016-11-16 2018-05-17 StreamSpace, LLC Decentralized nodal network for providing security of files in distributed filesystems
US9990511B1 (en) * 2015-11-20 2018-06-05 Symantec Corporation Using encrypted backup to protect files from encryption attacks
CN108390891A (en) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 Information protecting method based on privately owned block chain
CN108647523A (en) * 2018-04-28 2018-10-12 华南理工大学 A kind of electronic identification system based on block chain and deposit card, file access pattern method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1341240A (en) * 1999-12-20 2002-03-20 大日本印刷株式会社 Distributed data archive device and system
US9990511B1 (en) * 2015-11-20 2018-06-05 Symantec Corporation Using encrypted backup to protect files from encryption attacks
CN105701367A (en) * 2016-03-21 2016-06-22 冯颖 Security system for Internet original commercial works
US20180139042A1 (en) * 2016-11-16 2018-05-17 StreamSpace, LLC Decentralized nodal network for providing security of files in distributed filesystems
CN108390891A (en) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 Information protecting method based on privately owned block chain
CN108647523A (en) * 2018-04-28 2018-10-12 华南理工大学 A kind of electronic identification system based on block chain and deposit card, file access pattern method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
XIAOFENG LI ET AL.: "Individual Encryption and Watermarking for Protecting Video on the Networks", 《2009 SECOND INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING》 *
朱蔚恒等: "一种支持信息检索的安全网络文件存储模型", 《计算机工程与科学》 *
翟社平 等: "区块链关键技术中的数据一致性研究", 《计算机技术与发展》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625780A (en) * 2020-01-15 2020-09-04 支付宝(杭州)信息技术有限公司 Block chain-based audio work authorization method, device and equipment
CN111625780B (en) * 2020-01-15 2023-04-18 支付宝(杭州)信息技术有限公司 Block chain-based audio work authorization method, device and equipment
CN111641609A (en) * 2020-05-18 2020-09-08 中科易贺(江苏)区块链高科技有限公司 System and method for tracing information by using block chain
CN111641609B (en) * 2020-05-18 2023-07-14 中科易贺(江苏)区块链高科技有限公司 System and method for tracing information
CN112835855A (en) * 2021-02-22 2021-05-25 北京众享比特科技有限公司 File storage method and system based on block chain

Also Published As

Publication number Publication date
CN109740375B (en) 2023-07-28

Similar Documents

Publication Publication Date Title
CN109033855B (en) Data transmission method and device based on block chain and storage medium
CN107770115B (en) Method and system for distributing digital content in a peer-to-peer network
CN101241527B (en) System and method for ordinary authentication
CN109697365B (en) Information processing method, block chain node and electronic equipment
US10417392B2 (en) Device-independent management of cryptographic information
KR20080098372A (en) Account linking with privacy keys
JPH10254909A (en) Data management system
US8347098B2 (en) Media storage structures for storing content, devices for using such structures, systems for distributing such structures
CN109740375A (en) A kind of shared and dissemination method of original audio production
US20160204939A1 (en) Media storage structures for storing content, devices for using such structures, systems for distributing such structures
CN109151507A (en) Audio/video player system and method
WO2024087470A1 (en) Blockchain transaction data supervision method and apparatus, and device and nonvolatile readable storage medium
CN107690079A (en) Privacy of user guard method in live platform
CN111818000A (en) Block chain-based distributed Digital Rights Management (DRM) system
CN105868987B (en) A kind of method and system of shared information between devices
US7640438B2 (en) System and method for protected content rendering
US20210392177A1 (en) Secure multi-party random bit generation
US20040025014A1 (en) Secure internet-scale eventing
KR102394608B1 (en) Digital Rights Management System using Attribute-based Encryption
Yao et al. A privacy-preserving system for targeted coupon service
Yuan et al. A tamper-resistant timed secure data transmission protocol based on smart contract
KR102055888B1 (en) Encryption and decryption method for protecting information
Smid A key notarization system for computer networks
CN111160888B (en) Payment method based on zero knowledge proof
Yao et al. Privacy preserving DRM solution with content classification and superdistribution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant