CN109740375A - A kind of shared and dissemination method of original audio production - Google Patents
A kind of shared and dissemination method of original audio production Download PDFInfo
- Publication number
- CN109740375A CN109740375A CN201811566897.9A CN201811566897A CN109740375A CN 109740375 A CN109740375 A CN 109740375A CN 201811566897 A CN201811566897 A CN 201811566897A CN 109740375 A CN109740375 A CN 109740375A
- Authority
- CN
- China
- Prior art keywords
- network
- block
- storage
- file block
- audio production
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention is suitable for audio files storage and encryption technology improvement areas, provide a kind of shared and dissemination method of original audio production, comprising: S1, original audio production is generated into multiple copy source file blocks and small documents block is being divided into each copy source file block;S2, using it is double add it is close each small documents block is generated into encryption file block, use file block and decrypted list to save encryption file block and decryption method and decrypt the relationship of code key;S3, audio production author grasp file block and decrypted list transmits encryption file block on the network storage node of random dispersion in a network by peer-to-peer network.It supports works author to share and issue the works of oneself over a peer-to-peer, and obtains corresponding income;It goes the administration fee of platform and is pumped into expense, reduce the cost of author;Eliminate the purchase expenditure of memory space, bandwidth.
Description
Technical field
The invention belongs to being total to for audio files storage and encryption technology improvement areas more particularly to a kind of original audio production
It enjoys and dissemination method and system.
Background technique
Conventional audio file is typically stored on local computer or server.There are some risks, such as 1) storage event
Barrier, computer glitch will lead to loss of data and cannot provide service;2) Malware, hacker etc. may destroy and leakage is literary
Part;3) after legitimate user reuses audio file, it is possible to create copy.The copy may reveal that (intentionally, unintentionally having can
Can), it is stolen so as to cause file.
For personal or original medium-sized and small enterprises audio content, generally to be issued by various platforms.Platform can extract height
The income of high expense, author is compressed.Such case is unfavorable for motivating the enthusiasm of author, has biggish inhibition to innovation
Effect.Meanwhile the safety of works places one's entire reliance upon platform.If platform is leaky or under attack.The works of author can be straight
Junction faces the risk of leakage.
Summary of the invention
The purpose of the present invention is to provide a kind of shared and dissemination methods of original audio production, it is intended to solve above-mentioned skill
Art problem.
The invention is realized in this way a kind of shared and dissemination method of original audio production, the shared and publisher
Method the following steps are included:
S1, original audio production is generated into multiple copy source file blocks and small text is being divided into each copy source file block
Part block;
S2, using it is double add it is close each small documents block is generated into encryption file block, use file block and decrypted list to protect
It deposits encryption file block and decryption method and decrypts the relationship of code key;
S3, audio production author grasp file block and decrypted list and will encrypt file block and be transmitted at random by peer-to-peer network
On the network storage node of dispersion in a network.
A further technical solution of the present invention is: the shared and dissemination method is further comprising the steps of:
Confidential information is conciliate from audio production author demand file list when S4, works user need to consume works and is paid corresponding
Audio production assets.
A further technical solution of the present invention is: being that each small documents block generates additional content, institute in the step S1
Stating additional content includes file block number, digital watermarking and the information for examining HASH value.
A further technical solution of the present invention is: using multiple encryption algorithms in the step S2 is each small documents block
It is all encrypted with different key and Encryption Algorithm, file block is using kind of an Encryption Algorithm, by the verification HASH value of the block
First four bit determine.
A further technical solution of the present invention is: in the step S3 the following steps are included:
S31, after network storage node storing data, network verification person verify storage whether validity, such as verify effectively, then network
The certain audio production assets of network storage node are paid as reward, such as network verification person and verify some encryption file block
Storage changes, then can issue the request for re-starting storage.
A further technical solution of the present invention is: storage competition in storage in the S3 the following steps are included:
Whether S321, audio production author inspection file block and decrypted list have encryption file block to need to be published on network
Storage waits network storage node if so, then network verification person issues the encryption file block storage demand that block ID is A
Response;
S322, network storage node Y compete the encryption file block storage demand that block ID is A;
S323, network verification person are according to the credit value judgement of itself file block and decrypted list and network storage node Y
It is no to give network storage node Y storage, if agreement, performs the next step, if disagreeing, return step S321;
Network storage node starts memory block after S324, network freeze network storage node Y credit value guarantee fund, and passes through net
Network broadcast distribution stores the encryption file block.
A further technical solution of the present invention is: network verification person after the network storage node storage encryption file block
Constantly it is stored and is verified, it is described verifying the following steps are included:
SA1, network verification person for the verification HASH value of the encryption file block of x and protect from audio production author request block ID
Save as HASH1;
It is the contents value for the encryption file block that block ID is x, meter that SA2, network verification person, which request number from network storage node,
It calculates the verification HASH value of the block and saves as HASH2;
SA3, network verification person compare HASH1 and HASH2 and judge whether equal, if equal, verifying broadcasts are correct in network, net
Network is issued to network storage node and is rewarded, and network verification person obtains verifying workload and rewards and perform the next step, if unequal,
Verifying broadcasts do not pass through in a network, and network does not give the publication reward of network storage node, and network verification person obtains verifying workload
It rewards and performs the next step;
SA4, network storage node are according to verifying situation to the encryption file block feedback storage feelings that audio production author ID is x
Condition.
A further technical solution of the present invention is: the audio production author is safeguarded using file block and decrypted list
All encryption file block storage address, decipherment algorithm and decruption key.
A further technical solution of the present invention is: the audio production author is established in storage with network storage node
Intelligent contract is stored, the time of storage, the expense of storage, the amount of money and credit value freezed are arranged.
Sentence a further technical solution of the present invention is: the network verification person carries out verifying to the storage of network storage node
Whether break, if verifying does not pass through, the message for issuing reduction network storage node credit value issues promotion if being verified
The message of network storage node credit value.
The beneficial effects of the present invention are: works author is supported to share and issue the works of oneself over a peer-to-peer, and
Obtain corresponding income;It goes the administration fee of platform and is pumped into expense, reduce the cost of author;Works of the author to oneself
There is complete control, the behavior lost and encroached right without worrying copyright;Eliminate the purchase expenditure of memory space, bandwidth;It is more
Copy saves in a peer-to-peer network, and file is not lost, and DDOS attack is also not easily susceptible to;It is double add it is close guarantee file confidentiality and
It prevents from usurping.The use of digital watermarking guarantee to chase after in blabber.
Detailed description of the invention
Fig. 1 is original audio works file block schematic diagram provided in an embodiment of the present invention.
Fig. 2 is generation encryption file block diagram provided in an embodiment of the present invention.
Fig. 3 is the dispersion storage schematic diagram of encryption file block provided in an embodiment of the present invention.
Fig. 4 is competition storing process flow chart provided in an embodiment of the present invention.
Fig. 5 is storage verification process flow chart provided in an embodiment of the present invention.
Fig. 6 is the schematic diagram of downloading and decrypted list provided in an embodiment of the present invention.
Specific embodiment
It is double more: to add decryption method and the encryption of more code keys.
NetStorager network storage node: the equipment of storage file.
NetVerifier network verification person: storage, the transaction etc. of network are verified.
ProductOriginator audio production author: the right person of audio file enjoys the copyright and income of response
Right.
ProductConsumer works user: the consumer of audio production.
FbDecryptList file block and decrypted list: when having in user's ProductConsumer requesting consumption file
Rong Shi, ProductOriginator generate the table for it, with file block lists and its corresponding decryption method and close in table
Code.
AudioAsset audio production assets: there is a kind of assets sub of exchange and use value in present networks.
The source SourceFileBlock small documents block: from small documents block made of original audio file division, these blocks
Size is identical, with number and digital watermarking.
EnFileBlock encrypts file block: SourceFileBlock using it is double add it is close after obtained encryption file
Block.One audio file is divided into the identical some fritters of size.These fritters are added with different encryption method and password
It is close, and random dispersion is stored on NetStorager.
As shown in figures 1 to 6, the shared and dissemination method of original audio production provided by the invention, first according to original works
Multiple copies are generated, each copy are divided into source small documents block (SourceFileBlock) and plus digital watermarking.It reuses
It is double to add dense at encryption file block (EnFileBlock), use file block and decrypted list (FbDecryptList) to protect
Deposit EnFileBlock and decryption method, the relationship for decrypting code key.FbDecryptList is by audio production author
(ProductOriginator) it grasps.EnFileBlock is transmitted by peer-to-peer network, is randomly dispersed within network storage node
(NetStorager) on.NetStorager has paid storage resource, and AudioAsset is to it for Web vector graphic audio production assets
It is rewarded.When works user (ProductConsumer) will consume works, arranged from ProductOriginator demand file
Table conciliates confidential information, and pays corresponding AudioAsset as needed.
It include network storage node (NetStorager), audio production author in network
(ProductOriginator), the entities such as works user (ProductConsumer), network verification person (NetVerifier).
ProductOriginator, ProductConsumer, NetStorager, NetVerifier participate in the various affairs of network, are
Guarantee honesty, these entities have corresponding credit value, and freeze certain guarantee gold as needed.When under credit value
It drops to a certain degree, certain activities is participated in into limitation, and confiscate the guarantee fund freezed.
ProductOriginator is the right person of audio file, enjoys the copyright and income right of response.
ProductConsumer is the consumer of audio production.NetStorager is the node of storage file.
NetVerifier verifies storage, the transaction etc. of network.
Small documents block (SourceFileBlock) made of ProductOriginator divides original audio works.
These block sizes of SourceFileBlock are identical.Comprising marking off the original contents (SourceContent) come, and additional packet
Additional content (AttachedContent) containing file block number, digital watermarking and HASH check value.
ProductOriginator again the SourceContent of SourceFileBlock by it is double add it is close, attached
Upper AttachedContent forms encryption blocks of files (EnFileBlock).
Simultaneously random dispersion is stored on NetStorager EnFileBlock.
ProductOriginator is saved all using file block and decrypted list (FbDecryptList)
Storage location, file block lists, decryption method and the password of EnFileBlock.
When ProductConsumer needs consumer audio works, issues and request to ProductOriginator.
ProductOriginator can be generated by FbDecryptList the storage locations of a complete works, file block lists,
Decryption method and password, and ProductConsumer is sent to after encrypting.ProductConsumer is logical according to the information received
It crosses peer-to-peer network and requests and receive all EnFileBlock, then decryption restoration goes out original document
Audio production assets (AudioAsset) are a kind of assets subs for having exchange and use value in present networks.
NetStorager provides storage service, can obtain AudioAsset as reward.ProductConsumer has consumed works
Content needs to pay certain AudioAsset to ProductOriginator.AudioAsset is shifted in a network,
NetStorager also provides book keeping operation function.Keeping accounts successfully can also obtain certain AudioAsset as reward.
A. file block divides
Original audio works file is divided into multiple source file block SourceFileBlock by ProductOriginator, is such as schemed
Shown in 1.Each copy is further subdivided into small documents block SourceContent.It is generated in additional for each SourceContent again
Hold AttachedContent.AttachedContent includes the information such as file block number, digital watermarking and inspection HASH value.
After SourceFileBlock is generated, its SourceContent progress pair is added close.Each SourceContent
All encrypted with different key and Encryption Algorithm.Using 16 kinds of Encryption Algorithm, 0:AES128,1:AES192,2:
AES256、3:DES、4:3DES、5:SM4、6:RC2、7:RC4、8:RC5、9:TDEA、10:Blowfish、11:IDEA、12:
SKIPJACK,13:TWOFISH,14:SERPENT,15:MARS.The specifically used any Encryption Algorithm of file block, by the area
The first four bit of the verification HASH value of block determines that specific corresponding relationship is as shown in Figure 2.Respectively encryption setting each time is random
Key.
It is combined after SourceContent encryption with AttachedContent, forms EnFileBlock.
ProductOriginator is by information preservations such as file block number, Encryption Algorithm, secret code keys in file block and decrypted list
(FbDecryptList) in.When customer requests use audio production, ProductOriginator can pass through
FbDecryptList generates a complete file block lists and corresponding decryption method and code key for it.
FbDecryptList should maintain secrecy, and be grasped by ProductOriginator.
B.EnFileBlock storage method
The present invention stores EnFileBlock data file block using dedicated equity P2P network.EnFileBlock can be with
Machine is stored in multiple node tops.One group of EnFileBlock that can restore entire works file, should not be stored in one
It on NetStorager node, but is distributed on different NetStorager nodes and is saved, as shown in Figure 3.Pass through this
Kind mode can accomplish multiple redundancy, improve the reliability of storage.
ProductOriginator safeguards the storage inventory of EnFileBlock, will appreciate that the All Files storage of oneself
Where.
Once after NetStorager node storing data, the validity of NetVerifier verifying storage, once verifying
Effectively, network payment is to the certain AudioAsset of NetStorager node as reward.
If NetVerifier verifies some EnFileBlock storage and changes, it can issue and re-start asking for storage
It asks.NetStorager can choose whether to receive request according to request.
Guarantee the correctness of storage by motivating.
Competition storage
Storage demand is issued by ProductOriginator, NetStorager competition stores, and process is as shown in Figure 4.
1) ProductOriginator checks whether FbDecryptList has EnFileBlock to need to be published on network
Storage, if it is that the EnFileBlock of A needs to store that discovery, which has block ID, it is A's that NetVerifier, which issues block ID,
EnFileBlock storage demand waits the response of NetStorager;
2) NetStorager Y competes the EnFileBlock storage demand that block ID is A;
3) NetVerifier decides whether to give according to the credit value of itself FbDecryptList and NetStorager
NetStorager Y storage.It goes to 4), is otherwise returned 1) if agreeing to give NetStorager Y;
4) network freezes NetStorager credit value guarantee fund;
5) NetStorager starts memory block, and has properly stored the EnFileBlock by Web broadcast;
Store verification process
After NetStorager stores EnFileBlock, NetVerifier constantly stores it and verifies.See whether provide
Correct storage.Its verification process is as shown in Figure 5.
1) verification HASH of the NetVerifier from the ProductOriginator request block ID EnFileBlock for being x
Value, saves as HASH1.
2) contents value that NetVerifier is the EnFileBlock that block ID is x from NetStorager request number, meter
The verification HASH value for calculating block, saves as HASH2.
3) NetVerifier compares HASH1 and HASH2, if the two is equal, goes to step 4), if the two etc., goes to
Step 5;
4) verifying broadcasts are correct in network, and network is issued to NetStorager and rewarded, and NetVerifier is also verified itself
Workload reward.
5) verifying broadcasts do not pass through in a network, and network is no longer issued to NetStorager and rewarded, and NetVerifier is certainly
Body also obtains the reward of authentication workload.
6) NetStorager notifies the EnFileBlock storage that ProductOriginator ID is x to fail.
C. the decryption of file
ProductConsumer is when consumer audio file, it is necessary to obtain encryption from the there ProductOriginator
Algorithm and password.
ProductOriginator safeguards all EnFileBlock storage address, decryption using FbDecryptList person
Algorithm and decruption key.When there is node to need using file, ProductOriginator generates a downloading and decryption for it
List, as shown in fig. 6, being then issued to requestor.
After ProductConsumer obtains list, download corresponding EnFileBlock according to address, and according to method into
Row decompression, can recover ciphertext data, consume to audio file.
ProductConsumer pays AudioAsset to the consumer need of audio file.
D. intelligent contract
ProductOriginator is established with NetStorager in storage and is stored intelligent contract.Contract can arrange: storage
The contents such as time, the expense of storage, the amount of money freezed, credit value.
ProductConsumer establishes consumption contract when consuming works with ProductOriginator.Contract agreement:
The contents such as file, the expense of consumption.
In intelligent contract storage to the public chain such as Ethereum.
E.ProductConsumer credit value management
NetVerifier verifies the storage of NetStorager.If verifying does not pass through, issuing reduces NetStorager
The message of credit value.Other NetVerifier can also verify the verifying.
It only divulges a secret a part of file block, the safety of entire file can't be threatened.Because only partial content is divulged a secret
, other parts are also in safe condition.The principal risk that file is divulged a secret concentrates on ProductConsumer.Because
ProductConsumer obtains the decryption method and password of entire complete file block.Therefore, it is necessary to right
ProductConsumer is monitored, and is had method that whom can find out and be proved to be and has been revealed file.
ProductOriginator generates audio file digital watermarking with private key.Other nodes do not know watermark insertion
Position.ProductOriginator preserves the ProductConsumer of each request password.According to the number of the file of leakage
Word watermark, can find out is who is leaked out.If there is node is divulged a secret, ProductOriginator can provide evidence,
NetVerifier can be verified.After verifying, blabber can be punished, reduce the prestige of ProductConsumer
Value, and deprive frozen capital.
There are multiple computers as network storage node (NetStorager) in network.Company C is audio production author
(ProductOriginator).Ordinary individual obtains simultaneously consumer audio content as works user (ProductConsumer).
There are some computers in network, as the entities such as verifier (NetVerifier).ProductOriginator,
ProductConsumer, NetStorager, NetVerifier participate in the various affairs of network, their initial credit value is 80.
59 small documents blocks made of ProductOriginator divides audio file Audio1 works
(SourceFileBlock).These block sizes of SourceFileBlock are 1M size, the filling of the last one small documents end
0, to guarantee just to be 1M size.
Company C is each small documents block calculation document block number (1 ~ 59), digital watermarking and HASH check value, and is combined
For additional content (AttachedContent).The SourceContent of SourceFileBlock is added by double again later
It is close, encryption blocks of files (EnFileBlock) is formed enclosing AttachedContent.
Simultaneously random dispersion is stored on 25 NetStorager computers EnFileBlock.
Company C saves the storage position of all EnFileBlock using file block and decrypted list (FbDecryptList)
It sets, file block lists, decryption method and password.
A. file block divides
Frequency works file Audio1 is divided into multiple source file blocks as ProductOriginator by company C
SourceFileBlock.Each copy is further subdivided into 59 small documents block SourceContent.It is again each
SourceContent generates additional content AttachedContent.AttachedContent include file block number (1 ~
59), the information such as digital watermarking and inspection HASH value.
After SourceFileBlock is generated, its SourceContent progress pair is added close.Each SourceContent
All encrypted with different key and Encryption Algorithm.Using 16 kinds of Encryption Algorithm, 0:AES128,1:AES192,2:
AES256、3:DES、4:3DES、5:SM4、6:RC2、7:RC4、8:RC5、9:TDEA、10:Blowfish、11:IDEA、12:
SKIPJACK,13:TWOFISH,14:SERPENT,15:MARS.The specifically used any Encryption Algorithm of file block, by the area
The first four bit of the verification HASH value of block determines that specific corresponding relationship is as shown in Figure 2.Respectively encryption setting each time is random
Key.
It is combined after SourceContent encryption with AttachedContent, forms EnFileBlock.
ProductOriginator is by information preservations such as file block number, Encryption Algorithm, secret code keys in file block and decrypted list
In FbDecryptList.
B.EnFileBlock storage method
EnFileBlock data file block is stored using dedicated equity P2P network.EnFileBlock can be saved at random
In multiple node tops.One group of EnFileBlock that can restore entire works file, should not be stored in a NetStorager
It on node, but is distributed on different NetStorager nodes and is saved, as shown in Figure 3.It can do in this way
To multiple redundancy, the reliability of storage is improved.But a NetStorager can completely restore original document there is no all
EnFileBlock, in this way raising safety.
ProductOriginator safeguards the storage inventory of EnFileBlock, how many copy of file, how many file area
Block, be respectively stored in where, what Encryption Algorithm and code key used, has all been grasped by ProductOriginator.
Once NetVerifier(is also net after the computer in network is as NetStorager node storing data
Computer in network) validity of storage is verified, once verifying effectively, network payment is 1 to NetStorager number of nodes
AudioAsset is as reward.
If NetVerifier verifies some EnFileBlock storage and changes, it can issue and re-start asking for storage
It asks.NetStorager can choose whether to receive request according to request.
Competition storage
Storage demand, network computer NetStorager competition storage, mistake are issued by the ProductOriginator of company C
Journey is as shown in Figure 4.
1) ProductOriginator checks whether FbDecryptList has EnFileBlock to need to be published on network
Storage, if it is that the EnFileBlock of A needs to store that discovery, which has block ID, it is A's that NetVerifier, which issues block ID,
EnFileBlock storage demand, a block are ready 0.1 AudioAsset of payment, and storage period is 8 months, wait
The response of NetStorager;
2) NetStorager Y competes the EnFileBlock storage demand that block ID is A;
3) NetVerifier is according to the credit value of itself FbDecryptList and NetStorager, if credit value is greater than
90, decide whether to give NetStorager Y storage.It goes to 4), is otherwise returned 1) if agreeing to give NetStorager Y;
4) network freezes 10 AudioAsset of NetStorager credit value guarantee fund;
5) NetStorager starts memory block, and has properly stored the EnFileBlock by Web broadcast;
Store verification process
After network computer NetStorager stores EnFileBlock, the computer as NetVerifier is constantly to it
Storage is verified.See whether provide correct storage.Its verification process is as shown in Figure 5.
1) EnFileBlock of the NetVerifier from ProductOriginator request block (such as ID is 1256)
HASH value is verified, HASH1 is saved as.
2) content that NetVerifier is the EnFileBlock that block ID is 1256 from NetStorager request number
Value, the verification HASH value of calculation block save as HASH2.
3) NetVerifier compares HASH1 and HASH2, if the two is equal, goes to step 4), if the two etc., goes to
Step 5;
4) verifying broadcasts are correct in network, and network is rewarded to the AudioAsset of NetStorager publication 0.01,
NetVerifier itself also obtains verifying workload reward.
5) verifying broadcasts do not pass through in a network, and network is no longer issued to NetStorager and rewarded, and NetVerifier is certainly
Body also obtains the AudioAsset of authentication workload reward 0.01.
6) NetStorager notifies the EnFileBlock storage that ProductOriginator ID is 1256 to fail.
C. the decryption of file
ProductConsumer is when consumer audio file, it is necessary to obtain encryption from the there ProductOriginator
Algorithm and password.
ProductOriginator safeguards all EnFileBlock storage address, decryption using FbDecryptList person
Algorithm and decruption key.When there is node to need using file, ProductOriginator generates a downloading and decryption for it
List, as shown in fig. 6, being then issued to requestor.
After ProductConsumer obtains list, download corresponding EnFileBlock according to address, and according to method into
Row decompression, can recover ciphertext data, consume to audio file.
ProductConsumer pays AudioAsset to the consumer need of audio file.
D. intelligent contract
ProductOriginator is established with NetStorager in storage and is stored intelligent contract.Contract can arrange: storage
The contents such as time, the expense of storage, the amount of money freezed, credit value.
ProductConsumer establishes consumption contract when consuming works with ProductOriginator.Contract agreement:
The contents such as file, the expense of consumption.
In intelligent contract storage to the public chain such as Ethereum.
E.ProductConsumer credit value management
NetVerifier verifies the storage of NetStorager.If verifying does not pass through, issuing reduces NetStorager
The message of credit value.Other NetVerifier can also verify the verifying.
It only divulges a secret a part of file block, the safety of entire file can't be threatened.Because only partial content is divulged a secret
, other parts are also in safe condition.The principal risk that file is divulged a secret concentrates on ProductConsumer.Because
ProductConsumer obtains the decryption method and password of entire complete file block.Therefore, it is necessary to right
ProductConsumer is monitored, and is had method that whom can find out and be proved to be and has been revealed file.
ProductOriginator generates audio file digital watermarking with private key.Other nodes do not know watermark insertion
Position.ProductOriginator preserves the ProductConsumer of each request password.According to the number of the file of leakage
Word watermark, can find out is who is leaked out.If there is node is divulged a secret, ProductOriginator can provide evidence,
NetVerifier can be verified.After verifying, blabber can be punished, reduce the credit value of ProductConsumer
(reducing by 10 every time), and deprive frozen capital.
By the work of above several parts, storage, the consumption of audio production are realized, author does not have to worry to divulge a secret,
Can guarantee can obtain income.The computer of the storage of participation also can be rewarded accordingly.Because having credit value and guarantee fund about
Otherwise beam will receive punishment, and compensate the loss of author so the computer for participating in storage has to honest offer service.
To the user that file is consumed, decryption method can be obtained after paying successfully, can be consumed.Simultaneously he also by
The constraint of credit value, guarantee fund.Network verification person can obtain income, him can be motivated to participate in net by providing the service for checking credentials
The maintenance of network.Participating parties all suffers restraints in this way, and guarantees to obtain expected income.Whole system can be normal
Operating.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of shared and dissemination method of original audio production, which is characterized in that the shared and dissemination method includes following
Step:
S1, original audio production is generated into multiple copy source file blocks and small text is being divided into each copy source file block
Part block;
S2, using it is double add it is close each small documents block is generated into encryption file block, use file block and decrypted list to protect
It deposits encryption file block and decryption method and decrypts the relationship of code key;
S3, audio production author grasp file block and decrypted list and will encrypt file block and be transmitted at random by peer-to-peer network
On the network storage node of dispersion in a network.
2. the shared and dissemination method of original audio production according to claim 1, which is characterized in that described shared and hair
Cloth method is further comprising the steps of:
Confidential information is conciliate from audio production author demand file list when S4, works user need to consume works and is paid corresponding
Audio production assets.
3. the shared and dissemination method of original audio production according to claim 2, which is characterized in that in the step S1
Additional content is generated for each small documents block, the additional content includes file block number, digital watermarking and inspection HASH
The information of value.
4. the shared and dissemination method of original audio production according to claim 3, which is characterized in that in the step S2
It is encrypted for each small documents block with different key and Encryption Algorithm using multiple encryption algorithms, file block uses
Kind Encryption Algorithm, is determined by the first four bit of the verification HASH value of the block.
5. the shared and dissemination method of original audio production according to claim 4, which is characterized in that in the step S3
The following steps are included:
S31, after network storage node storing data, network verification person verify storage whether validity, such as verify effectively, then network
The certain audio production assets of network storage node are paid as reward, such as network verification person and verify some encryption file block
Storage changes, then can issue the request for re-starting storage.
6. the shared and dissemination method of original audio production according to claim 5, which is characterized in that depositing in the S3
In storage storage competition the following steps are included:
Whether S321, audio production author inspection file block and decrypted list have encryption file block to need to be published on network
Storage waits network storage node if so, then network verification person issues the encryption file block storage demand that block ID is A
Response;
S322, network storage node Y compete the encryption file block storage demand that block ID is A;
S323, network verification person are according to the credit value judgement of itself file block and decrypted list and network storage node Y
It is no to give network storage node Y storage, if agreement, performs the next step, if disagreeing, return step S321;
Network storage node starts memory block after S324, network freeze network storage node Y credit value guarantee fund, and passes through net
Network broadcast distribution stores the encryption file block.
7. the shared and dissemination method of original audio production according to claim 6, which is characterized in that the network storage
Network verification person constantly stores it and verifies after node storage encryption file block, the verifying the following steps are included:
SA1, network verification person for the verification HASH value of the encryption file block of x and protect from audio production author request block ID
Save as HASH1;
It is the contents value for the encryption file block that block ID is x, meter that SA2, network verification person, which request number from network storage node,
It calculates the verification HASH value of the block and saves as HASH2;
SA3, network verification person compare HASH1 and HASH2 and judge whether equal, if equal, verifying broadcasts are correct in network, net
Network is issued to network storage node and is rewarded, and network verification person obtains verifying workload and rewards and perform the next step, if unequal,
Verifying broadcasts do not pass through in a network, and network does not give the publication reward of network storage node, and network verification person obtains verifying workload
It rewards and performs the next step;
SA4, network storage node are according to verifying situation to the encryption file block feedback storage feelings that audio production author ID is x
Condition.
8. the shared and dissemination method of original audio production according to claim 7, which is characterized in that the audio production
Author safeguards all encryption file block storage address, decipherment algorithm and decruption key using file block and decrypted list.
9. the shared and dissemination method of original audio production according to claim 8, which is characterized in that the audio production
Author establishes with network storage node in storage and stores intelligent contract, arranges the time of storage, the expense of storage, freezes
The amount of money and credit value.
10. the shared and dissemination method of original audio production according to claim 9, which is characterized in that the network is tested
Card person carries out verifying to the storage of network storage node and judges whether, if verifying does not pass through, issuing reduces network storage node
The message of credit value issues the message for promoting network storage node credit value if being verified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811566897.9A CN109740375B (en) | 2018-12-19 | 2018-12-19 | Sharing and publishing method of original audio works |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811566897.9A CN109740375B (en) | 2018-12-19 | 2018-12-19 | Sharing and publishing method of original audio works |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109740375A true CN109740375A (en) | 2019-05-10 |
CN109740375B CN109740375B (en) | 2023-07-28 |
Family
ID=66360888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811566897.9A Active CN109740375B (en) | 2018-12-19 | 2018-12-19 | Sharing and publishing method of original audio works |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109740375B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625780A (en) * | 2020-01-15 | 2020-09-04 | 支付宝(杭州)信息技术有限公司 | Block chain-based audio work authorization method, device and equipment |
CN111641609A (en) * | 2020-05-18 | 2020-09-08 | 中科易贺(江苏)区块链高科技有限公司 | System and method for tracing information by using block chain |
CN112835855A (en) * | 2021-02-22 | 2021-05-25 | 北京众享比特科技有限公司 | File storage method and system based on block chain |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1341240A (en) * | 1999-12-20 | 2002-03-20 | 大日本印刷株式会社 | Distributed data archive device and system |
CN105701367A (en) * | 2016-03-21 | 2016-06-22 | 冯颖 | Security system for Internet original commercial works |
US20180139042A1 (en) * | 2016-11-16 | 2018-05-17 | StreamSpace, LLC | Decentralized nodal network for providing security of files in distributed filesystems |
US9990511B1 (en) * | 2015-11-20 | 2018-06-05 | Symantec Corporation | Using encrypted backup to protect files from encryption attacks |
CN108390891A (en) * | 2018-03-28 | 2018-08-10 | 电子科技大学天府协同创新中心 | Information protecting method based on privately owned block chain |
CN108647523A (en) * | 2018-04-28 | 2018-10-12 | 华南理工大学 | A kind of electronic identification system based on block chain and deposit card, file access pattern method |
-
2018
- 2018-12-19 CN CN201811566897.9A patent/CN109740375B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1341240A (en) * | 1999-12-20 | 2002-03-20 | 大日本印刷株式会社 | Distributed data archive device and system |
US9990511B1 (en) * | 2015-11-20 | 2018-06-05 | Symantec Corporation | Using encrypted backup to protect files from encryption attacks |
CN105701367A (en) * | 2016-03-21 | 2016-06-22 | 冯颖 | Security system for Internet original commercial works |
US20180139042A1 (en) * | 2016-11-16 | 2018-05-17 | StreamSpace, LLC | Decentralized nodal network for providing security of files in distributed filesystems |
CN108390891A (en) * | 2018-03-28 | 2018-08-10 | 电子科技大学天府协同创新中心 | Information protecting method based on privately owned block chain |
CN108647523A (en) * | 2018-04-28 | 2018-10-12 | 华南理工大学 | A kind of electronic identification system based on block chain and deposit card, file access pattern method |
Non-Patent Citations (3)
Title |
---|
XIAOFENG LI ET AL.: "Individual Encryption and Watermarking for Protecting Video on the Networks", 《2009 SECOND INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING》 * |
朱蔚恒等: "一种支持信息检索的安全网络文件存储模型", 《计算机工程与科学》 * |
翟社平 等: "区块链关键技术中的数据一致性研究", 《计算机技术与发展》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625780A (en) * | 2020-01-15 | 2020-09-04 | 支付宝(杭州)信息技术有限公司 | Block chain-based audio work authorization method, device and equipment |
CN111625780B (en) * | 2020-01-15 | 2023-04-18 | 支付宝(杭州)信息技术有限公司 | Block chain-based audio work authorization method, device and equipment |
CN111641609A (en) * | 2020-05-18 | 2020-09-08 | 中科易贺(江苏)区块链高科技有限公司 | System and method for tracing information by using block chain |
CN111641609B (en) * | 2020-05-18 | 2023-07-14 | 中科易贺(江苏)区块链高科技有限公司 | System and method for tracing information |
CN112835855A (en) * | 2021-02-22 | 2021-05-25 | 北京众享比特科技有限公司 | File storage method and system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN109740375B (en) | 2023-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109033855B (en) | Data transmission method and device based on block chain and storage medium | |
CN107770115B (en) | Method and system for distributing digital content in a peer-to-peer network | |
CN101241527B (en) | System and method for ordinary authentication | |
CN109697365B (en) | Information processing method, block chain node and electronic equipment | |
US10417392B2 (en) | Device-independent management of cryptographic information | |
KR20080098372A (en) | Account linking with privacy keys | |
JPH10254909A (en) | Data management system | |
US8347098B2 (en) | Media storage structures for storing content, devices for using such structures, systems for distributing such structures | |
CN109740375A (en) | A kind of shared and dissemination method of original audio production | |
US20160204939A1 (en) | Media storage structures for storing content, devices for using such structures, systems for distributing such structures | |
CN109151507A (en) | Audio/video player system and method | |
WO2024087470A1 (en) | Blockchain transaction data supervision method and apparatus, and device and nonvolatile readable storage medium | |
CN107690079A (en) | Privacy of user guard method in live platform | |
CN111818000A (en) | Block chain-based distributed Digital Rights Management (DRM) system | |
CN105868987B (en) | A kind of method and system of shared information between devices | |
US7640438B2 (en) | System and method for protected content rendering | |
US20210392177A1 (en) | Secure multi-party random bit generation | |
US20040025014A1 (en) | Secure internet-scale eventing | |
KR102394608B1 (en) | Digital Rights Management System using Attribute-based Encryption | |
Yao et al. | A privacy-preserving system for targeted coupon service | |
Yuan et al. | A tamper-resistant timed secure data transmission protocol based on smart contract | |
KR102055888B1 (en) | Encryption and decryption method for protecting information | |
Smid | A key notarization system for computer networks | |
CN111160888B (en) | Payment method based on zero knowledge proof | |
Yao et al. | Privacy preserving DRM solution with content classification and superdistribution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |