摘要 |
A method, performed by a computer device, may include receiving an indication that a first user has acquired rights to access a digital content; generating a key for the digital content; encrypting the digital content using the generated key to generate encrypted digital content; obtaining a first passcode; and providing the first passcode and the encrypted digital content to a user device associated with the first user. The method may further include receiving, from the user device, a request for the key, wherein the request include the first passcode; determining that the first passcode is valid; determining that the key has not expired; and providing the key to the user device, in response to determining that the first passcode is valid and that the key has not expired. |
主权项 |
1. A method, performed by a computer device, the method comprising:
receiving, by the computer device, an indication that a first user has acquired rights to access a digital content; generating, by the computer device, a key for the digital content; encrypting, by the computer device, the digital content using the generated key to generate encrypted digital content; obtaining, by the computer device, a first passcode, wherein the first passcode is required to obtain the key; providing, by the computer device, the first passcode and the encrypted digital content to a user device associated with the first user; receiving, by the computer device, a request from the first user to transfer the digital content to a second user; obtaining, by the computer device, a second passcode; updating, by the computer device, a passcode blockchain to indicate that the second passcode is valid and that the first passcode is no longer valid; and providing, by the computer device, the second passcode and the encrypted digital content to a user device associated with the second user. |