+

CN119026095A - Copyright protection and traceability method based on physical unclonable function watermark and blockchain - Google Patents

Copyright protection and traceability method based on physical unclonable function watermark and blockchain Download PDF

Info

Publication number
CN119026095A
CN119026095A CN202411125020.1A CN202411125020A CN119026095A CN 119026095 A CN119026095 A CN 119026095A CN 202411125020 A CN202411125020 A CN 202411125020A CN 119026095 A CN119026095 A CN 119026095A
Authority
CN
China
Prior art keywords
blockchain
watermark
digital
unclonable function
physical unclonable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202411125020.1A
Other languages
Chinese (zh)
Other versions
CN119026095B (en
Inventor
徐明辉
薛晓龙
郭河川
成秀珍
时云智
王伟兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University
Inspur Cloud Information Technology Co Ltd
Original Assignee
Shandong University
Inspur Cloud Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University, Inspur Cloud Information Technology Co Ltd filed Critical Shandong University
Priority to CN202411125020.1A priority Critical patent/CN119026095B/en
Publication of CN119026095A publication Critical patent/CN119026095A/en
Application granted granted Critical
Publication of CN119026095B publication Critical patent/CN119026095B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

本发明属于区块链技术领域,涉及一种基于物理不可克隆函数水印和区块链的版权保护及溯源方法。该方法包括:PUF设备注册步骤:构建PUF设备,并通过挑战‑响应机制生成设备指纹;设备指纹在区块链上注册,并生成公私钥对;版权注册步骤:使用认证的PUF设备将数字媒体文件的哈希摘要提交到区块链,创建版权标识。本发明借助物理不可克隆函数的特性为嵌入式设备提供唯一密钥的生成方法,进而为每个存入嵌入式设备的数字媒体嵌入基于物理不可克隆函数水印,达到版权的物理归属目的;在区块链上注册PUF设备保证版权转移过程的交易双方信息的真实性,达到防止伪造身份问题的同时结合安全数字水印提取过程实现区块链上溯源。

The present invention belongs to the field of blockchain technology, and relates to a copyright protection and traceability method based on a physical unclonable function watermark and blockchain. The method comprises: a PUF device registration step: constructing a PUF device, and generating a device fingerprint through a challenge-response mechanism; the device fingerprint is registered on the blockchain, and a public-private key pair is generated; a copyright registration step: using a certified PUF device to submit a hash summary of a digital media file to the blockchain to create a copyright identifier. The present invention provides a method for generating a unique key for an embedded device by means of the characteristics of a physical unclonable function, and then embeds a watermark based on a physical unclonable function for each digital media stored in the embedded device, so as to achieve the purpose of physical ownership of the copyright; registering a PUF device on the blockchain ensures the authenticity of the information of both parties to the transaction in the copyright transfer process, so as to prevent the problem of forged identity while realizing traceability on the blockchain in combination with a secure digital watermark extraction process.

Description

Copyright protection and tracing method based on physical unclonable function watermark and blockchain
Technical Field
The invention belongs to the technical field of blockchains, and relates to a copyright protection and tracing method based on a physical unclonable function watermark and a blockchain.
Background
In recent years, the development of digital media technology has become a focus of attention. Innovations in digital media technology have prompted copyists and creators to launch new media areas, and thus information dissemination, with the growing emphasis on digital media copyright protection issues. With the increasing awareness of copyrights, providing the public with reliable copyright attribution proof and traceable copyright assignment flows has become a key factor in promoting the healthy development of digital media technology. Digital watermarking techniques are commonly used to protect the copyright of digital media by confirming ownership and preventing unauthorized use. However, without reliable third party supervision, these methods present a risk of security vulnerabilities in the watermark extraction process. In addition, digital media lacks tangible ownership properties, which presents challenges for secure copyright transfer and traceability.
Based on Kerckhoff principles, the rest of the content in modern cryptosystems, except for the keys, should be well known. But for most embedded devices, an attacker can physically access the integrated circuit and the keys encapsulated in the non-volatile memory of the integrated circuit can easily be stolen. A Physical Unclonable Function (PUF) is able to provide a single device with a set of digital fingerprints that uniquely identify itself, and the PUF will only generate a digital fingerprint when receiving a challenge input, with the key generated by the digital fingerprint being destroyed immediately after use. Therefore, the existence of the PUF makes the memory probe attack unable to read the stored key from the memory, thereby guaranteeing the uniqueness and authenticity of the embedded device. However, the current research area focuses on PUF-based integrated circuit design and protection of neural network models, which methods need to be limited to specific devices and are not directly applicable for protecting digital rights.
The essence of the hidden information of the digital watermarking technology is to modify redundant bits of the digital media embedded with the watermark on the premise of not causing perceptually perceptible change, and the modified content contains secret information to be hidden. However, the design of the prior art watermarking ignores the contradiction between digital watermarking and copyright evidence: 1. the secret key generated in the process of embedding the digital watermark is inevitably revealed in the verification process, so that malicious participants can easily erase the watermark; 2. the conventional digital watermark is in the form of a pseudo-random sequence or binary image, which is easily counterfeited and thus unsuitable for use in authenticating an identity. Some studies explore the fusion of biometric features as proof of copyright in digital watermarks, but asserting copyrights through biometric features may inadvertently reveal sensitive personal information, and still fail to address the problem of key disclosure.
Blockchain technology provides a novel decentralization architecture for distributed applications. The technology is vigorously developed together with an intelligent contract, wherein the intelligent contract is an automatically executed protocol, can automatically meet the conditions of all related parties and simplify the flow, and the non-tamperable property of a blockchain provides strong traceability for information on the chain. Blockchain-based digital rights management systems may be used to manage digital rights for design works, but this approach requires users to submit private keys to applications, which carries a centralized risk of the decryption program stealing the private keys. Similarly, ma et al propose a scheme to combine blockchain and watermark to detect abuse of online images. However, they do not adequately address the problem of identity fraud in copyright transfers, which limits the ability to accurately locate copyright infringers during tracking. Once data is compromised from the system, none of the above works provides a mechanism to prevent unauthorized redistribution of data, and therefore requires the introduction of trusted hardware to provide protection.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a copyright protection and tracing method combining a Physical Unclonable Function (PUF) and a blockchain technology. The PUF device uses its unique fingerprint for blockchain enrollment. These devices then incorporate invisible watermarking techniques to embed digital watermarks into the media. The watermark verification process is limited to devices, maintains confidentiality during extraction, verifies identity during copyright exchange, and facilitates blockchain-based copyright assignment traceability.
The technical scheme adopted for solving the technical problems is as follows: a copyright protection and tracing method based on physical unclonable function watermark and blockchain comprises the following steps:
PUF device enrollment: constructing a PUF device and generating a device fingerprint through a challenge-response mechanism; registering the device fingerprint on the blockchain and generating a public-private key pair;
A copyright registration step: the authenticated PUF device is used to submit a hash digest of the digital media file to the blockchain, creating a copyright identification.
Further, the method further comprises the step of copyright assignment: the copyright owner negotiates transaction details with the purchaser and records transaction information by using an intelligent contract, the copyright owner generates a copyright assignment identifier, a private key signature is used, then the signature is converted into a digital watermark to be embedded into a file, the copyright owner submits the watermark file and the copyright assignment identifier to a blockchain, and the watermark file is sent to the purchaser; the purchaser uses the private key to decrypt the information, extracts the digital watermark after the verification is successful, verifies the correctness of the watermark by using the public key of the copyright owner, and completes payment through the blockchain; the copyright assignment identification comprises an ID of the copyright identification recorded in the blockchain and an address of both parties of the transaction.
Further, the digital watermark embedding includes:
signing the copyright transfer mark by using an elliptic curve digital signature algorithm to generate a digital watermark;
Generating an embedded location key using a PUF device;
the digital watermark is embedded into the digital media according to an embedded location key, wherein the embedded location key comprises a random number and a modification operation.
Further, the digital watermark extraction includes:
extracting the embedded location key using the PUF device;
extracting a digital watermark from the digital medium according to the embedded location key;
the digital watermark signature is verified using an elliptic curve digital signature algorithm.
Further, for copyright assignment, tracing and attribution verification of copyright are realized through transaction information and watermark extraction processes of blockchain records.
Compared with the prior art, the invention has the beneficial effects that: the invention provides a method for generating a unique key for the embedded equipment by means of the characteristic of the physical unclonable function, so that the watermark based on the physical unclonable function is embedded into each digital media stored in the embedded equipment, and the physical attribution purpose of copyrights is achieved. In order to solve the problem of privacy disclosure in digital watermark extraction, a device (PUF device) realizing unclonable function properties is used to realize a secure digital watermark extraction process, so that the disclosure of the privacy of a copyright proof process is prevented. In order to ensure traceability of copyright assignment, PUF equipment is registered on a blockchain to ensure authenticity of information of both transaction parties in a copyright transfer process, and the problem of preventing counterfeiting identity is solved, and meanwhile, the traceability of the blockchain is realized by combining a secure digital watermark extraction process.
Drawings
FIG. 1 is a flowchart of a copyright protection and tracing method based on a physical unclonable function watermark and a blockchain in an embodiment of the present invention;
FIG. 2 is a schematic diagram of a location key watermarking technique;
FIG. 3 is a wiring diagram of a prototype system;
fig. 4 is a diagram of copyright trade information.
Detailed description of the preferred embodiments
In order that the invention may be readily understood, a more particular description thereof will be rendered by reference to specific embodiments that are illustrated in the appended drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
The invention provides a copyright protection and tracing method based on physical unclonable function watermarking and blockchain, which realizes safe and traceable digital copyright management by applying unclonable property of trusted hardware security primitive and traceable property of blockchain. In the invention, "copyright protection" is essentially a technical means for adding a physical device watermark to digital media to complete binding with the physical device, and by the technical means, the purpose of preventing copyright plagiarism or tampering is achieved.
The flow of the method is shown in figure 1, and mainly comprises the following steps: PUF device enrollment, copyright assignment flow, digital watermark embedding and extraction, and blockchain tracing.
(1) PUF device enrollment
First, the PUF device is built within a secure environment where the secure environment can ensure that the response to the challenge generated by the PUF device is not stolen and counterfeited. After initialization of the PUF device, a random number c should be chosen by the manufacturer and then sent as a challenge to the PUF device, which builds a digital fingerprint DF and helper data FE on SRAM, generates an original output o c using a function Gen (DF, FE, c) obfuscating the random number and then generates a response r using a Hash function Hash (o c), which is sent to the manufacturer, who then stores the device identifier id and challenge-response < c, r > assigned to the device during manufacture to a security database, which is the security fingerprint that verifies the PUF device.
Next, the manufacturer selects one blockchain node as a certification authority whose role is limited to the enrollment of PUF devices. It is connected to a secure database for device authentication and then specifies the public parameters required for generating public-private key pairs, including elliptic curves E a,b:y2=x3 + ax + b over a finite field F p, where p is a large prime number and a and b satisfy the condition 4a 3+27b2≠0 mod p,a,b∈Fp. Then the certification authority selects a big prime number n and its generator P E a,b in F p, selects a random number sk c in n as the private key, and calculates the public key pk c=skc ·p. The certification authority stores the private key and publishes the public parameters and the public key.
Finally, PUF devices need to be enrolled on the blockchain. The PUF device selects a random number sk e n as the device private key from the public parameter and calculates the device public key pk=sk·p. The device uses the function Gen (DF, FE, sk) confusion sk to generate the original output o sk and stores it in non-volatile memory. The PUF device then initiates an authentication request to the authentication authority, which together generates a temporary symmetric key for encrypting sensitive information by key agreement, the following communication being encrypted. The PUF device provides a device identifier id to the certification authority, the certification authority accesses the security database to obtain a challenge random number c corresponding to the id, sends the challenge random number c to the PUF device, the PUF device generates an original output o c by using a Gen (DF, FE, c), and then regenerates a response r by means of a Hash function (o c) and sends the response r to the certification authority, and the certification authority verifies < c, r >. If the verification passes, the certification authority issues a transaction on the chain, registers the device as a certification device, and stores the hash value of the parameters pk, pk as the address addr of the certification device on the blockchain. If the verification fails, the certificate authority will send a notification to the device asking for the registration procedure to be restarted.
(2) Copyright assignment flow
In the copyright assignment process, an authentication device is introduced as a holder of digital rights, and a device fingerprint of the authentication device is embedded in digital media. The copyright assignment only approves the authentication device which is registered in the blockchain, so that the user participating in the copyright assignment needs to hold the authentication device, thereby achieving the purpose that the identity cannot be counterfeited in the copyright assignment process. Copyright assignment includes two processes: and registering the copyright file and trading the copyright file.
A. copyright file registration
The digital media can be received by the block link to become a copyright file after being registered in the block chain, and the only way for the digital media to be registered as the copyright file is to upload the file hash digest to the block chain by the authentication device to generate the copyright identification. A copyright flag should contain: a file hash digest H (f) and the address addr of the copyright owner. Assuming an external memory stores a digital media f requiring copyright authentication, authentication device a computes a hash digest H (f) of f, packages H (f) and the address addr of device a into transaction TX r and sends to the blockchain. After the verification node in the blockchain verifies the transaction, the transaction is recorded into the block, and the original file is still in the device A without leakage.
B. Copyright file trading
1. Initiating a transaction: authentication device B wants to purchase document f from authentication device a, both negotiating transaction details such as transaction price, expiration time for delivering the document a, expiration time for payment of B, and expiration time for confirming receipt. These content are written to the smart contract and deployed on the blockchain.
2. Payment of the goods: and B, driving a token for negotiating the price into the intelligent contract, and informing the A to start the delivery link by the intelligent contract.
3. Generating a rights assignment identification: a constructs a copyright assignment identifier ctm AB, and the content includes the ID of the copyright identifier recorded in the blockchain and the address of both parties of the transaction. And then embedding a digital watermark into the file f to obtain a new copyrighted file f' and an embedded position key lk. Finally, A assembles hash digest H (f ') and ctm AB of f' into transaction TX u for transmission to the smart contract, which verifies the transaction and then records the transaction into the blockchain.
4. Delivering a file: a encrypts lk using B's public key and then sends f' and the encrypted lk to B either directly or indirectly.
5. Verification and transfer: b decrypts the information using the private key to obtain f' and lk. B, firstly, calculating a hash abstract H (f ') of the file, comparing the hash abstract H (f ') with the hash abstract recorded in the blockchain, and if the hash abstractH (f ') is not equal to the hash abstract, canceling the transaction by B; if equal, B will extract the digital watermark from f ', then B calculates the hash of ctm AB, and verifies the correctness of the digital watermark with A's public key. Then, B sends a confirmation message to the smart contract, which transfers the frozen tokens to A's address.
(3) Digital watermark embedding and extraction
The privacy risk of digital watermarking is that the watermark needs to be extracted with a public key to the verifier, which means that a malicious verifier who obtains the key can privately erase the watermark, and if a trusted third party is introduced as the verifier, there is a risk of centralization. The PUF watermark proposed by the present invention places the embedding and extraction process on an authentication device.
A. Digital watermark embedding
The ctm AB is signed by means of ECDSA algorithm using the private key held by authentication device a, and then the signature is converted into binary bit form, yielding a digital watermark w AB with physical attribution. Then, based on the least significant bit watermark embedding algorithm, a watermark embedding and extracting algorithm relying on the embedding position key is designed, as shown in fig. 2, and the principle is that: the low order bits of the digital media storage information are randomly distributed, with 0 and 1 each being one half. The combination of the next lowest order bits can be relied upon as a condition for modifying the lowest order bits. For example, for a 24-bit true color image, a pixel p ij corresponding to an RGB format R={r0,r1,…,r7},G={g0,g1,…,g7},B={b0,b1,…,b7}, can extract the information group { r 6,g6,b6 } of the next lower bit, then a random number generator is used to generate a random number x with a proper length to perform bit exclusive OR operation with the information group to obtain a feature groupThen classifying the feature groups according to the information quantity and the defined rules to be embedded and defining the modification action of the least significant bit. Taking the image format as an example, four modification actions are defined for any pixel of the image format:
1. Least significant bit substitution (LSBR): for one color channel RGB ij of the RGB format pixel p ij and one bit m b of the ciphertext m, the next bit of the ciphertext is replaced on the lowest bit.
2. Least significant matching (LSBM): the lowest order bits of the RGB format pixels p ij-1 are filled with random numbers, and the next bit of ciphertext is matched to the lowest order bit for one color channel RGB ij of the next pixel p ij and one bit m b of ciphertext m.
Wherein rand is 1 or-1.
3. Random number filling: random number filling is used for the lowest bit RGB ij of the color channel of the RGB format pixel p ij.
4. Unchanged: the lowest order bits of RGB format pixel p ij remain unchanged.
And constructing lk through x and a modification action, wherein the modification action can be autonomously defined according to a file format and aims at improving the security.
B. Digital watermark extraction
The authentication device B uses the private key of the device to decrypt lk, processes the file according to x in lk and defined modification action to obtain the digital watermark w AB, and then verifies the correctness of the digital watermark w AB according to the transaction record on the chain, thereby confirming the attribution of the copyright. In the process, a malicious verifier does not have relevant information of lk, so that the watermark cannot be deleted under the condition of not damaging the file, and the effectiveness of copyright protection is ensured.
(4) Blockchain tracing
In the copyright assignment process, the authentication device records transaction information through a blockchain, and it is ensured that each copyright assignment has a traceable record. Specifically, the authentication device C makes a request to purchase the file f 'to the authentication device B, both complete the file transaction according to the steps defined in the rights assignment flow, B sends the rights file f″ containing the watermark and the location key lk' to C, and records the rights assignment identifier ctm BC on the blockchain. In this process, B encrypts f' only if the hash digest matches ctm AB. And then C, extracting the watermark by using the key lk' and verifying, so that the transfer path of the copyright can be confirmed asAnd tracing the copyright assignment is realized.
To verify the feasibility of the invention, a prototype system was developed. The prototype system adopts an LPC55S69-EVK development board of NXP semiconductor company, is provided with a dual-core Arm Cortex-M33 microcontroller, and utilizes SRAM PUF to establish a trust root. The blockchain part uses go-ethereum realized by the Ethernet protocol based on Golang to build a private blockchain network. The connection and configuration of the system is shown in fig. 3.
The physical unclonable information of the two development boards is stored in the authentication server, the development boards prove the identity to the authentication server by submitting a correct response after establishing a secure connection with the server, and then register in the blockchain to obtain a public key address. Then, using a Lena image in BMP format as an experimental example, in the development board of the seller, the image is registered into the blockchain, and copyrights are shown in fig. 4 (a). The seller and buyer then agree on the rights file, with the buyer issuing a smart contract on the blockchain. In the development board, the seller constructs a rights assignment identification and then signs the identification using the device private key. Embedding the content into the image generates a Lena image embedded with the watermark, and the peak signal-to-noise ratio calculation result is 55.387dB.
The hash value of the embedded watermark image is then calculated, and a transaction is constructed and uploaded to the blockchain, the transaction content being as shown in fig. 4 (b). After the buyer obtains the file, the development board decrypts the location key and then verifies the watermark signature. In the whole process, the position key is not leaked, and the buyer cannot acquire the original image by erasing the watermark.
The invention also considers an attack mode, namely malicious selling behaviors of sellers, such as repeatedly selling the copyright files registered on the chain, and the development board refuses to register the copyright files with the same hash after detecting the existence of the copyright files; or the seller registers on the chain by modifying the file hash and completes the transaction flow, if other users find similar contents on the chain, the original attribution of the file can be judged through the timestamp and the traceability of the transaction on the chain, and the development board is blocked by reporting to the blockchain, so that the development board is prevented from suffering economic loss.

Claims (5)

1. The copyright protection and tracing method based on the physical unclonable function watermark and the blockchain is characterized by comprising the following steps:
PUF device enrollment: constructing a PUF device and generating a device fingerprint through a challenge-response mechanism; registering the device fingerprint on the blockchain and generating a public-private key pair;
A copyright registration step: the authenticated PUF device is used to submit a hash digest of the digital media file to the blockchain, creating a copyright identification.
2. The method for protecting and tracing copyrights based on physical unclonable function watermarking and blockchain of claim 1, further comprising the step of copyright assignment: the copyright owner negotiates transaction details with the purchaser and records transaction information by using an intelligent contract, the copyright owner generates a copyright assignment identifier, a private key signature is used, then the signature is converted into a digital watermark to be embedded into a file, the copyright owner submits the watermark file and the copyright assignment identifier to a blockchain, and the watermark file is sent to the purchaser; the purchaser uses the private key to decrypt the information, extracts the digital watermark after the verification is successful, verifies the correctness of the watermark by using the public key of the copyright owner, and completes payment through the blockchain; the copyright assignment identification comprises an ID of the copyright identification recorded in the blockchain and an address of both parties of the transaction.
3. The copyright protection and tracing method based on physical unclonable function watermarking and blockchain according to claim 2, wherein the digital watermark embedding includes:
signing the copyright transfer mark by using an elliptic curve digital signature algorithm to generate a digital watermark;
Generating an embedded location key using a PUF device;
the digital watermark is embedded into the digital media according to an embedded location key, wherein the embedded location key comprises a random number and a modification operation.
4. The copyright protection and tracing method based on physical unclonable function watermarking and blockchain according to claim 2, wherein the digital watermark extraction includes:
extracting the embedded location key using the PUF device;
extracting a digital watermark from the digital medium according to the embedded location key;
the digital watermark signature is verified using an elliptic curve digital signature algorithm.
5. The copyright protection and tracing method based on physical unclonable function watermarking and blockchain according to claim 2, wherein tracing and attribution verification of copyright is realized through transaction information and watermark extraction process of blockchain record for copyright assignment.
CN202411125020.1A 2024-08-16 2024-08-16 Copyright protection and traceability method based on physical unclonable function watermark and blockchain Active CN119026095B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411125020.1A CN119026095B (en) 2024-08-16 2024-08-16 Copyright protection and traceability method based on physical unclonable function watermark and blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411125020.1A CN119026095B (en) 2024-08-16 2024-08-16 Copyright protection and traceability method based on physical unclonable function watermark and blockchain

Publications (2)

Publication Number Publication Date
CN119026095A true CN119026095A (en) 2024-11-26
CN119026095B CN119026095B (en) 2025-09-26

Family

ID=93530587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411125020.1A Active CN119026095B (en) 2024-08-16 2024-08-16 Copyright protection and traceability method based on physical unclonable function watermark and blockchain

Country Status (1)

Country Link
CN (1) CN119026095B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120455003A (en) * 2025-07-09 2025-08-08 中国地质环境监测院(自然资源部地质灾害技术指导中心) Geological disaster monitoring and early warning network safety encryption system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113162768A (en) * 2021-02-24 2021-07-23 北京科技大学 Intelligent Internet of things equipment authentication method and system based on block chain
US20220370778A1 (en) * 2021-05-24 2022-11-24 Blackdot, Inc. Robotic tattooing machine with an optical tattoo analyzer to analyze tattoos associated with non-fungible tokens
CN116882993A (en) * 2023-07-11 2023-10-13 杭州电子科技大学 Data transaction method based on Internet of things and PUF

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113162768A (en) * 2021-02-24 2021-07-23 北京科技大学 Intelligent Internet of things equipment authentication method and system based on block chain
US20220370778A1 (en) * 2021-05-24 2022-11-24 Blackdot, Inc. Robotic tattooing machine with an optical tattoo analyzer to analyze tattoos associated with non-fungible tokens
CN116882993A (en) * 2023-07-11 2023-10-13 杭州电子科技大学 Data transaction method based on Internet of things and PUF

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨科迪: ""基于区块链的数据动态溯源 及检测算法研究"", 《中国优秀硕士学位论文全文数据库》, 15 March 2021 (2021-03-15) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120455003A (en) * 2025-07-09 2025-08-08 中国地质环境监测院(自然资源部地质灾害技术指导中心) Geological disaster monitoring and early warning network safety encryption system

Also Published As

Publication number Publication date
CN119026095B (en) 2025-09-26

Similar Documents

Publication Publication Date Title
CN109067801B (en) Identity authentication method, identity authentication device and computer readable medium
JP4638990B2 (en) Secure distribution and protection of cryptographic key information
JP5423088B2 (en) Integrated circuit, encryption communication device, encryption communication system, information processing method, and encryption communication method
US6073237A (en) Tamper resistant method and apparatus
US5768389A (en) Method and system for generation and management of secret key of public key cryptosystem
US5602918A (en) Application level security system and method
CN109905360B (en) Data verification method and terminal equipment
JP2002183633A (en) Information-recording medium, information processor, information processing method, program recording medium and information processing system
CN106953732B (en) Key management system and method for chip card
CN116057554A (en) Method for managing transaction data sets, participant unit, transaction register and payment system
CN113837875B (en) Transaction methods, nodes and media based on blockchain network
CN119762070B (en) Data asset transaction control method and device, decentralization PUF network and storage medium
CN103281180B (en) User is protected to access the bill generation method of privacy in a kind of network service
JPH10135943A (en) Portable information storage medium, authentication method and authentication system using the same
CN114841701B (en) NFT-based digital artwork anti-theft and trusted transaction method and device
CN116388972A (en) A method and system for encrypting and decrypting electronic contracts based on two-way authentication
JP2000215280A (en) Identity certification system
CN114553547A (en) Data authentication method and system for block chain sensor capable of being managed
CN119026095B (en) Copyright protection and traceability method based on physical unclonable function watermark and blockchain
Xue et al. DataSafe: Copyright Protection with PUF Watermarking and Blockchain Tracing
CN109635594A (en) Electronics execution of contract and the anti-counterfeit authentication method for signing process again
CN118673535B (en) A digital document implementation method based on data voucher
Xue¹ et al. DataSafe: Copyright Protection with PUF Watermarking and Blockchain Tracing
CN101425163A (en) Trading, identifying and arbitraging method, system and equipment based on watermark technology
JPH1013402A (en) Private key management method and apparatus for public key cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载