CN107832384A - Infringement detection method, device, storage medium and electronic equipment - Google Patents

Infringement detection method, device, storage medium and electronic equipment Download PDF

Info

Publication number
CN107832384A
CN107832384A CN201711039307.2A CN201711039307A CN107832384A CN 107832384 A CN107832384 A CN 107832384A CN 201711039307 A CN201711039307 A CN 201711039307A CN 107832384 A CN107832384 A CN 107832384A
Authority
CN
China
Prior art keywords
content
works
works content
target
webpage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711039307.2A
Other languages
Chinese (zh)
Inventor
郝汉
高辉
林森
张士光
卢修禄
姜喜亮
李冠军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anne Full Copyright Technology Development Co Ltd
Original Assignee
Beijing Anne Full Copyright Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Anne Full Copyright Technology Development Co Ltd filed Critical Beijing Anne Full Copyright Technology Development Co Ltd
Priority to CN201711039307.2A priority Critical patent/CN107832384A/en
Publication of CN107832384A publication Critical patent/CN107832384A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Technology Law (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Operations Research (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present disclosure is related to a kind of infringement detection method and device, electronic equipment and computer-readable storage medium, this method can obtain the content of works from webpage and is compared with target works automatically, determine that the works in the webpage have the abuse for invading target works when the similarity of comparison is more than default similarity threshold, the abuse so as to find and count to oneself from the magnanimity information of internet for common copyright user provides facility.

Description

Infringement detection method, device, storage medium and electronic equipment
Technical field
Embodiment of the disclosure is related to field of computer technology, more particularly to infringement detection method, device, storage medium and Electronic equipment.
Background technology
At present, attention degree of the intellectual property in the minds of enterprise and individual increasingly improves.And with the rise of network application, Emerging in multitude for numerous new digital works such as web documents, picture, video display, animation proposes new problem to copyright protection.
By taking web documents as an example, because the wind of network plagiarism is serious, an exclusive text for taking considerable time that painstaking effort are interviewed and write Chapter issue moment just by illegal reprinting to other websites, or even hidden plagiarism by way of adapting " washing original text " escape Liability for tort, the loss on spirit and property is caused to the copyright side of article.
However, during innovation and creation are realized, inventor has found, although consciousness of the user for copyright protection at present Gradually step up, but because internet information is huge numerous and diverse, common copyright user is want to find and unite from the magnanimity information of internet The abuse counted to oneself is extremely difficult thing.
The content of the invention
The main purpose of at least one embodiment of the disclosure is that providing one kind can be carried out automatically on the internet The method and device of infringement detection.
In a first aspect, the embodiment of the present disclosure provides a kind of infringement detection method, including:At electronic equipment,
Works content is obtained from webpage;
The works content got is compared with target works content;
When the similarity of comparison result is more than default similarity threshold, it is determined that the works content got invades target The copyright of works content.
Second aspect, the embodiment of the present disclosure provides a kind of infringement detection means, at electronic equipment, including:
Acquiring unit, for obtaining works content from webpage;
Comparing unit, for the works content got to be compared with target works content;
Processing unit, for when the similarity of comparison result is more than default similarity threshold, it is determined that the work got Product content invades the copyright of target works content.
The third aspect, the disclosure are implemented to provide a kind of electronic equipment, including:Processor and it is coupled to the processor Display, memory and communication module;Store instruction code in the memory;The instruction code is used for by the place When managing device and performing, the step of performing method as described in relation to the first aspect.
Fourth aspect, the disclosure are implemented to provide a kind of computer-readable storage medium, stored in the computer-readable storage medium There is computer program;The computer program is used for be executed by processor method as described in relation to the first aspect the step of
In at least one embodiment of the disclosure, the content of works can be obtained from webpage automatically and is carried out with target works Compare, determine that the works in the webpage have the abuse of infringement target works when comparing consistent, so as to be general The abuse that logical copyright user found and counted to oneself from the magnanimity information of internet provides facility.
Brief description of the drawings
Fig. 1 shows the structural representation for the infringement detection electronic equipment that the embodiment of the disclosure one provides;
Fig. 2 shows the main flow for the infringement detection method that one embodiment of the disclosure provides;
Fig. 3 shows the infringement detection method entire flow figure that one embodiment of the disclosure provides;
Fig. 4 is the structural representation for the device for showing the infringement detection that the embodiment of the disclosure one provides.
Embodiment
It should be appreciated that specific embodiment described herein is not used to limit the disclosure only to explain the disclosure.
Fig. 1 shows the schematic diagram of the structure of the electronic equipment for the infringement detection that the embodiment of the disclosure one provides, and shows in Fig. 1 The scene gone out is the typical case scene for the infringement detection method that the embodiment of the disclosure one provides.Fig. 1 is refer to, the electronic equipment Including processor 110, memory 120 and communication module 130.Wherein, memory 120, communication module 130 are each coupled to processing In device 110, memory 120 can store the computer program that can be executed by processor, and communication module 130 can be set with the external world Standby to carry out information exchange, processor 110 can perform corresponding method flow to realize corresponding work(when performing computer program Energy.
Unless otherwise specified, " coupling " in each embodiment of the disclosure refers to communication connection between component and can handed over A kind of state of mutual data, it is not required that two components are joined directly together.
In a first aspect, the embodiment of the disclosure one provides a kind of method for detection of encroaching right, this method can be by showing in Fig. 1 The electronic equipment that goes out performs.Fig. 2 shows that the embodiment of the disclosure one provides a kind of main flow of the method for detection of encroaching right, Specifically include:
S101, works content is obtained from webpage;
S102, the works content got is compared with target works content;
S103, when the similarity of comparison result is more than default similarity threshold, it is determined that the works content got is invaded Violate the copyright of target works content.
In the infringement detection method that the embodiment of the present disclosure provides, the content and and mesh of works can be obtained from webpage automatically The product of being denoted as are compared, and determine that the works in the webpage are deposited when the similarity of comparison result is more than default similarity threshold The abuse of target works is being invaded, so as to find and count from the magnanimity information of internet for common copyright user Abuse to oneself provides facility.
It is understood that the premise that can carry out infringement comparison is to be stored with target works, namely copyright user creation Works in the disclosed embodiments, this target works is stored in block chain, so as to ensure storage target The authenticity and accuracy of works, therefore in the method for embodiment of the present disclosure offer, in the works content and target got Before works content is compared, methods described can also include:
S100, target works content is obtained from block chain.
And then after the target works of the copyright user obtained from block chain, you can according to target works in webpage Works content carry out infringement detection.
In the specific implementation, obtaining works content from webpage in the step S101 in above method embodiment can be by more Kind mode, the optional mode of one of which are that qualified webpage is crawled from internet to originally by distributed reptile technology Ground, other embodiments can also be passed through certainly.
In order to further improve the speed of acquisition, step S101 can also obtain works from the webpage of particular type website Content, such as textual work content is obtained from major literature website, obtain audio-video frequency content from major audio frequency and video class website.Or Person, works content can also be obtained from the webpage of the website in default list of websites, this default list of websites can root Set according to actual conditions, such as to think that the larger website of platform has a possibility tortious more by user, therefore arranging What is set in table is the larger website of platform.So as to can further reduce the model that crawler algorithm crawls by such mode Enclose, improve the speed of webpage works content obtaining.
In the specific implementation, understandable is that the form of the works content obtained in webpage can have many kinds, for There can be different modes from the comparison process that target works compare in various forms of works content step S102, below to several Kind can the alignments of works content of preferred form of this be specifically described.
(1) works content is textual work
When works content is textual work, the works content got and target works content are carried out in step S102 Compare, can specifically include:
The simhash values for the textual work content that S1021, determination are got and the simhash values of target works content Hamming distances;And/or the hash values of sentence and sentence in target works content in the textual work content for judging to get Whether hash values are identical;
Specifically, qualified webpage is crawled to local, Ran Houke from internet by distributed reptile technology To extract the information such as the text of webpage, title, author, some unrelated symbols are removed, for example, the words such as " ground obtain ", generation text The simhash values of this works body matter.Then the simhash values and target works of the textual work body matter of generation are determined Body matter simhash values Hamming distances.
And/or to the one hash value of every generation of qualified sentence in content of text, then judge each of generation Whether the hash values of sentence are identical with the hash values of each sentence of target works.
S1022, according to Hamming distances and/or judged result determine comparison result.
If the Hamming distances that judgment step S1021 is obtained are less than default distance threshold, then it is assumed that crawl obtained webpage Textual work it is consistent with the comparison result of target works, the webpage text content there may be abuse.Wherein, here Distance threshold can be set according to actual conditions.
And/or if the sentence hash values and target works sentence for the textual work that webpage obtains are crawled in step S1021 Hash value identicals ratio is more than default rate threshold, then it is considered that webpage text content there may be abuse.Its In, rate threshold here can also be set according to actual conditions.
(2) works content is picture works
When works content is picture works, the works content got and target works content are carried out in step S102 Compare, can specifically include:
Similar picture in the works content that S102a, search are got to the picture in target works content;
Specifically, phase Sihe identical picture can be searched out using LIRe technologies by using Lucene instruments, and The picture searched out is compared with the picture in target works content, provides the similarity of two width pictures.
Wherein, Lucene instruments are the full-text search engine kits of an open source code, i.e., it is not one complete Full-text search engine, but the framework of a full-text search engine, there is provided complete query engine and index engine, part Text analyzing engine.And LIRe technologies are then picture retrieval platform LIRe (the Lucene Image based on Lucene REtrieval) Lucene image indexing systems.
S102b, comparison result determined according to the similarity of picture.
Specifically, can be according to default similarity threshold to determine comparison result, such as be more than in the two similarity Think that the Web page picture there may be the behavior of infringement during threshold value.
(3) works content is audio visual work
When works content is picture works, the works content got and target works content are carried out in step S102 Compare, can specifically include:
The key frame picture similar to key frame picture in target works content in S102i, search audio visual work content;
Specifically, after finding and downloading by crawler algorithm in the presence of possible audio frequency and video of encroaching right, carried from audio frequency and video Take out key frame.Then the key frame of the audio frequency and video in key frame and the target works content being stored in Lucene is compared It is right, reuse LIRe technologies and search key frame picture similar or identical in target audio frequency and video, it is determined that the similarity of the two.
S102ii, comparison result determined according to the similarity of key frame picture.
Specifically, can be according to default similarity threshold to determine comparison result, such as be more than in the two similarity Think that the web page audio/video there may be the behavior of infringement during threshold value.
Different infringement detection operations is carried out so as to which different works contents can be directed to by mode described above, is obtained Must be encroached right the result of detection.
And in a practical situation, the result for only obtaining infringement detection is merely able to so that copyright user knows the work of oneself The right of product is invaded, but further the right of oneself can not be safeguarded, therefore the embodiment of the present disclosure is according to above-mentioned side After the works content that formula determines to get invades the copyright of target works content, it can also include:
S104, determine webpage provider electronic address information;
For example, the contact mailbox of the web page providers is determined, or instant messaging chat account, or be short message address.
S105, to electronic address information send notice of infringement message.
After address is determined, notice of infringement message is sent to the address.This notice of infringement message is specifically as follows Lawyer's letter with set form, so as to inform that the copyright of copyright user has been invaded in the behavior of the web page providers.
In order to provide the evidence of its infringement in follow-up safeguarding-rights act, the method that the embodiment of the present disclosure provides may be used also With including:
S106, generation infringement evidence simultaneously save as the form that can be predetermined interface interchange.
After infringement evidence is generated, infringement evidence can also also be stored in block chain and be set to can quilt The form that preset interface is called, and the interface of evidence submission is provided the user with, so as to call the infringement evidence when user needs.
In addition, reading the result of this infringement detection in order to facilitate copyright user, and clearly know tool tortious Body details, the method that the embodiment of the present disclosure provides can also include:
S107, generation Surveillance simultaneously export;The Surveillance is used to indicate following one or several kinds of information:Infringing party Web site name, infringement quantity, infringement webpage network address.
It is, of course, also possible to indicate other contents about this infringement event, the disclosure is not specifically limited to this.
Fig. 3 shows a kind of complete flow for the method that the embodiment of the present disclosure provides, due to above to each The individual specific implementation detail of step is described, and will not be repeated here.
Second aspect, the embodiment of the disclosure one additionally provide a kind of device for detection of encroaching right.Fig. 4 shows the master of the device Structure is wanted, including:
Acquiring unit 201, for obtaining works content from webpage;
Comparing unit 202, for the works content got to be compared with target works content;
Processing unit 203, for when the similarity of comparison result is more than default similarity threshold, it is determined that get Works content invades the copyright of target works content.
In certain embodiments, the works content includes textual work content;
The works content got is compared the comparing unit 202 with target works content, can include:
It is determined that the hamming of the simhash values of the simhash values of the textual work content got and target works content away from From;And/or the hash values of sentence and the hash values of sentence in target works content are in the textual work content for judging to get It is no identical;
Comparison result is determined according to Hamming distances and/or judged result.
In certain embodiments, the works content includes picture works content;
The works content got is compared the comparing unit 202 with target works content, can include:
Search for the similar picture to the picture in target works content in the works content got;
Comparison result is determined according to the similarity of picture.
In certain embodiments, the works content includes sound audio visual work content;
The works content got is compared the comparing unit 202 with target works content, can include:
Search for key frame picture similar to key frame picture in target works content in audio visual work content;
Comparison result is determined according to the similarity of key frame picture.
In certain embodiments, it is described the works content got is compared with target works content before, The acquiring unit 201 can be also used for:
Target works content is obtained from block chain.
In certain embodiments, after it is determined that the works content that gets invades the copyright of target works content, institute Stating device can also include:
Address determination unit 204, the electronic address information of the provider for determining webpage;
Message sending unit 205, for sending notice of infringement message to the electronic address information.
In certain embodiments, the notice of infringement message is the lawyer's letter with set form.
In certain embodiments, the acquiring unit 201 obtains works content from webpage, including:
Works content is obtained from the webpage of particular type website;
Or obtain works content from the webpage of the website in default list of websites.
In certain embodiments, after it is determined that the works content that gets invades the copyright of target works content, institute Stating device can also include:
Evidence generation unit 206, the form of interface interchange can be predetermined for generating infringement evidence and saving as.
In certain embodiments, described device can also include:
Report generation unit 207, for generating Surveillance and exporting;The Surveillance be used to indicating it is following a kind of or Several information of person:Infringing party web site name, infringement quantity, infringement webpage network address.
By the infringement detection means that the present embodiment is introduced is that can perform the infringement detection side in the embodiment of the present invention The device of method, so the method based on the infringement detection described in the embodiment of the present invention, those skilled in the art can The embodiment and its various change form of the infringement detection means of the present embodiment are understood, so herein for the infringement How detection means realizes that the infringement detection method in the embodiment of the present invention is no longer discussed in detail.As long as the affiliated technology people in this area Device used by infringement detection method, belongs to the scope to be protected of the application in member's implementation embodiment of the present invention.
The third aspect, embodiment of the disclosure additionally provide a kind of computer-readable storage medium, in the computer-readable storage medium Computer instruction code is stored with, the computer instruction code performs any one of first aspect institute when being performed by computer equipment The method stated.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments Including some features rather than further feature, but the combination of the feature of different embodiments means to be in the scope of the present invention Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it One mode can use in any combination.
Some unit embodiments of the present invention can be realized with hardware, or to be run on one or more processor Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice Microprocessor or digital signal processor (DSP) are realized in gateway according to embodiments of the present invention, proxy server, system Some or all parts some or all functions.The present invention is also implemented as being used to perform side as described herein The some or all equipment or program of device (for example, computer program and computer program product) of method.It is such Realizing the program of the present invention can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from internet website and obtained, and either be provided or with any other shape on carrier signal Formula provides.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.

Claims (22)

  1. A kind of 1. infringement detection method, it is characterised in that including:At electronic equipment,
    Works content is obtained from webpage;
    The works content got is compared with target works content;
    When the similarity of comparison result is more than default similarity threshold, it is determined that the works content got invades target works The copyright of content.
  2. 2. according to the method for claim 1, it is characterised in that the works content includes textual work content;
    It is described that the works content got is compared with target works content, including:
    It is determined that the Hamming distances of the simhash values of the textual work content got and the simhash values of target works content; And/or judge the hash values of sentence and sentence in target works content in the textual work content that gets hash values whether It is identical;
    Comparison result is determined according to Hamming distances and/or judged result.
  3. 3. according to the method for claim 1, it is characterised in that the works content includes picture works content;
    It is described that the works content got is compared with target works content, including:
    Search for the similar picture to the picture in target works content in the works content got;
    Comparison result is determined according to the similarity of picture.
  4. 4. according to the method for claim 1, it is characterised in that the works content includes audio visual work content;
    It is described that the works content got is compared with target works content, including:
    Search for key frame picture similar to key frame picture in target works content in audio visual work content;
    Comparison result is determined according to the similarity of key frame picture.
  5. 5. according to the method for claim 1, it is characterised in that described by the works content got and target works content Before being compared, methods described includes:
    Target works content is obtained from block chain.
  6. 6. according to the method for claim 1, it is characterised in that it is determined that the works content got is invaded in target works After the copyright of appearance, methods described also includes:
    Determine the electronic address information of the provider of webpage;
    Notice of infringement message is sent to the electronic address information.
  7. 7. according to the method for claim 6, it is characterised in that the notice of infringement message is the lawyer with set form Letter.
  8. 8. according to the method for claim 1, it is characterised in that it is described to obtain works content from webpage, including:
    Works content is obtained from the webpage of particular type website;
    Or obtain works content from the webpage of the website in default list of websites.
  9. 9. according to the method for claim 1, it is characterised in that it is determined that the works content got is invaded in target works After the copyright of appearance, methods described also includes:
    Generation infringement evidence simultaneously saves as the form that can be predetermined interface interchange.
  10. 10. according to the method for claim 1, it is characterised in that methods described also includes:
    Generation Surveillance simultaneously exports;The Surveillance is used to indicate following one or several kinds of information:Infringing party website name Claim, infringement quantity, infringement webpage network address.
  11. 11. one kind infringement detection means, at electronic equipment, it is characterised in that including:,
    Acquiring unit, for obtaining works content from webpage;
    Comparing unit, for the works content got to be compared with target works content;
    Processing unit, for when the similarity of comparison result is more than default similarity threshold, it is determined that in the works got Hold the copyright for invading target works content.
  12. 12. device according to claim 11, it is characterised in that the works content includes textual work content;
    The works content got is compared the comparing unit with target works content, including:
    It is determined that the Hamming distances of the simhash values of the textual work content got and the simhash values of target works content; And/or judge the hash values of sentence and sentence in target works content in the textual work content that gets hash values whether It is identical;
    Comparison result is determined according to Hamming distances and/or judged result.
  13. 13. device according to claim 11, it is characterised in that the works content includes picture works content;
    The works content got is compared the comparing unit with target works content, including:
    Search for the similar picture to the picture in target works content in the works content got;
    Comparison result is determined according to the similarity of picture.
  14. 14. device according to claim 11, it is characterised in that the works content includes audio visual work content;
    The works content got is compared the comparing unit with target works content, including:
    Search for key frame picture similar to key frame picture in target works content in audio visual work content;
    Comparison result is determined according to the similarity of key frame picture.
  15. 15. device according to claim 11, it is characterised in that described by the works content got and target works Before appearance is compared, the acquiring unit is additionally operable to:
    Target works content is obtained from block chain.
  16. 16. device according to claim 11, it is characterised in that it is determined that the works content got invades target works After the copyright of content, described device also includes:
    Address determination unit, the electronic address information of the provider for determining webpage;
    Message sending unit, for sending notice of infringement message to the electronic address information.
  17. 17. device according to claim 16, it is characterised in that the notice of infringement message is the rule with set form Shi Han.
  18. 18. device according to claim 11, it is characterised in that the acquiring unit obtains works content from webpage, Including:
    Works content is obtained from the webpage of particular type website;
    Or obtain works content from the webpage of the website in default list of websites.
  19. 19. device according to claim 11, it is characterised in that it is determined that the works content got invades target works After the copyright of content, described device also includes:
    Evidence generation unit, the form of interface interchange can be predetermined for generating infringement evidence and saving as.
  20. 20. device according to claim 11, it is characterised in that described device also includes:
    Report generation unit, for generating Surveillance and exporting;The Surveillance is used to indicate following one or several kinds Information:Infringing party web site name, infringement quantity, infringement webpage network address.
  21. 21. a kind of electronic equipment, it is characterised in that including:Processor and it is coupled to the display of the processor, memory And communication module;Store instruction code in the memory;The instruction code is used for when by the computing device, performs The step of method as described in claim 1-10 is any.
  22. 22. a kind of computer-readable storage medium, it is characterised in that be stored with computer program in the computer-readable storage medium;Institute Computer program is stated to be used for the method being executed by processor as described in claim 1-10 is any the step of.
CN201711039307.2A 2017-10-28 2017-10-28 Infringement detection method, device, storage medium and electronic equipment Pending CN107832384A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711039307.2A CN107832384A (en) 2017-10-28 2017-10-28 Infringement detection method, device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711039307.2A CN107832384A (en) 2017-10-28 2017-10-28 Infringement detection method, device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN107832384A true CN107832384A (en) 2018-03-23

Family

ID=61651118

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711039307.2A Pending CN107832384A (en) 2017-10-28 2017-10-28 Infringement detection method, device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN107832384A (en)

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667811A (en) * 2018-04-18 2018-10-16 成都零光量子科技有限公司 A kind of method and monitoring device of autonomous structure electronic evidence
CN108881244A (en) * 2018-06-27 2018-11-23 中国人民解放军国防科技大学 Intellectual property protection method for network short texts based on block chains
CN109002487A (en) * 2018-06-25 2018-12-14 百度在线网络技术(北京)有限公司 A kind of post-processing approach based on copyright registration information, device, equipment and medium
CN109033760A (en) * 2018-08-27 2018-12-18 北京奥曼特奇科技有限公司 A kind of music copyright identification authentication method and Verification System based on block chain
CN109040781A (en) * 2018-08-27 2018-12-18 北京京东尚科信息技术有限公司 Video authentication method, device, system, electronic equipment and readable medium
CN109325765A (en) * 2018-09-30 2019-02-12 真相网络科技(北京)有限公司 A kind of intelligence really weighs method and intelligent contract system
CN109493259A (en) * 2018-10-18 2019-03-19 上海右上角文化传媒有限公司 A kind of method and apparatus for by calculating equipment processing case of encroachment of right
CN109614775A (en) * 2018-11-20 2019-04-12 安徽大学 A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source
CN109684786A (en) * 2018-11-05 2019-04-26 深圳变设龙信息科技有限公司 A kind of copyright registration method, apparatus and terminal device based on block chain
CN109788309A (en) * 2018-12-25 2019-05-21 陕西优米数据技术有限公司 Video file piracy detection method and system based on block chain technology
CN110008655A (en) * 2019-03-01 2019-07-12 北京数字融通科技有限公司 A kind of infringing information identification people's mark system and method based on distributed network
CN110175276A (en) * 2019-04-15 2019-08-27 平安科技(深圳)有限公司 Infringing information acquisition methods, device, computer equipment and storage medium
CN110188117A (en) * 2019-04-15 2019-08-30 平安科技(深圳)有限公司 Right-safeguarding strategy matching method, apparatus, computer equipment and storage medium
CN110324729A (en) * 2019-07-18 2019-10-11 北京奇艺世纪科技有限公司 A kind of method, apparatus, electronic equipment and the medium of identification infringement video link
CN110457434A (en) * 2019-07-19 2019-11-15 平安科技(深圳)有限公司 Webpage evidence collecting method, device, readable storage medium storing program for executing and server based on search
CN110472201A (en) * 2019-07-26 2019-11-19 阿里巴巴集团控股有限公司 Based on the text similarity detection method and device of block chain, electronic equipment
CN110704811A (en) * 2019-09-03 2020-01-17 特赞(上海)信息科技有限公司 Picture infringement detection method and device and storage medium
CN110851608A (en) * 2020-01-15 2020-02-28 支付宝(杭州)信息技术有限公司 Infringement detection method, device and equipment based on block chain and storage medium
CN110851879A (en) * 2020-01-15 2020-02-28 支付宝(杭州)信息技术有限公司 Method, device and equipment for infringement and evidence preservation based on evidence preservation block chain
CN110851761A (en) * 2020-01-15 2020-02-28 支付宝(杭州)信息技术有限公司 Infringement detection method, device and equipment based on block chain and storage medium
WO2020052083A1 (en) * 2018-09-13 2020-03-19 北京字节跳动网络技术有限公司 Infringing picture recognition method and device, and computer readable storage medium
CN111159474A (en) * 2020-04-03 2020-05-15 腾讯科技(深圳)有限公司 Multi-line evidence obtaining method, device and equipment based on block chain and storage medium
CN111382394A (en) * 2018-12-29 2020-07-07 北京奇虎科技有限公司 Picture infringement monitoring method and device
TWI705342B (en) * 2018-10-31 2020-09-21 香港商阿里巴巴集團服務有限公司 Method and device for performing blockchain certificate deposit on webpage through webpage monitoring
CN111815486A (en) * 2020-06-03 2020-10-23 兰州集智信息技术有限公司 Service platform and method for searching clues of infringing products
CN111930809A (en) * 2020-09-17 2020-11-13 支付宝(杭州)信息技术有限公司 Data processing method, device and equipment
CN112000928A (en) * 2020-07-15 2020-11-27 西安电子科技大学 Picture distributed infringement right confirming method, system, storage medium and computer equipment
CN112149063A (en) * 2020-09-14 2020-12-29 浙江数秦科技有限公司 Online monitoring method for network picture infringement
WO2021012522A1 (en) * 2019-07-19 2021-01-28 平安科技(深圳)有限公司 Image recognition-based webpage evidence obtaining method and apparatus, storage medium, and server
US10909317B2 (en) 2019-07-26 2021-02-02 Advanced New Technologies Co., Ltd. Blockchain-based text similarity detection method, apparatus and electronic device
CN112395560A (en) * 2020-11-20 2021-02-23 京东数科海益信息科技有限公司 Copyright data processing method and device
CN112579986A (en) * 2020-12-25 2021-03-30 特赞(上海)信息科技有限公司 Image infringement detection method, device and system
WO2021093643A1 (en) * 2019-11-11 2021-05-20 深圳前海微众银行股份有限公司 Copyright authentication method, device, apparatus and system and computer readable storage medium
CN113011342A (en) * 2021-03-22 2021-06-22 支付宝(杭州)信息技术有限公司 Feature extraction and processing method and system for copyright infringement retrieval
CN113268504A (en) * 2021-04-27 2021-08-17 上海右云信息技术有限公司 Method, apparatus, medium, and program product for determining authorization information
CN113435391A (en) * 2021-07-09 2021-09-24 支付宝(杭州)信息技术有限公司 Method and device for identifying infringement video
WO2021223629A1 (en) * 2020-05-07 2021-11-11 京东数科海益信息科技有限公司 Method and device for analyzing image material

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462873A (en) * 2013-09-13 2015-03-25 北大方正集团有限公司 Picture processing method and picture processing device
CN104504307A (en) * 2015-01-08 2015-04-08 北京大学 Method and device for detecting audio/video copy based on copy cells
US20150206101A1 (en) * 2014-01-21 2015-07-23 Our Tech Co., Ltd. System for determining infringement of copyright based on the text reference point and method thereof
CN105657547A (en) * 2015-12-31 2016-06-08 北京奇艺世纪科技有限公司 Detection method and device for similar video and pirated video
CN106126617A (en) * 2016-06-22 2016-11-16 腾讯科技(深圳)有限公司 A kind of video detecting method and server
WO2017049045A1 (en) * 2015-09-16 2017-03-23 RiskIQ, Inc. Using hash signatures of dom objects to identify website similarity
CN106649757A (en) * 2016-12-27 2017-05-10 安徽维智知识产权代理有限公司 Infringement reminding system for intellectual properties
CN107066547A (en) * 2017-03-20 2017-08-18 天津大学 A kind of method for searching three-dimension model based on LIRE
CN107204183A (en) * 2016-03-18 2017-09-26 百度在线网络技术(北京)有限公司 A kind of audio file detection method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462873A (en) * 2013-09-13 2015-03-25 北大方正集团有限公司 Picture processing method and picture processing device
US20150206101A1 (en) * 2014-01-21 2015-07-23 Our Tech Co., Ltd. System for determining infringement of copyright based on the text reference point and method thereof
CN104504307A (en) * 2015-01-08 2015-04-08 北京大学 Method and device for detecting audio/video copy based on copy cells
WO2017049045A1 (en) * 2015-09-16 2017-03-23 RiskIQ, Inc. Using hash signatures of dom objects to identify website similarity
CN105657547A (en) * 2015-12-31 2016-06-08 北京奇艺世纪科技有限公司 Detection method and device for similar video and pirated video
CN107204183A (en) * 2016-03-18 2017-09-26 百度在线网络技术(北京)有限公司 A kind of audio file detection method and device
CN106126617A (en) * 2016-06-22 2016-11-16 腾讯科技(深圳)有限公司 A kind of video detecting method and server
CN106649757A (en) * 2016-12-27 2017-05-10 安徽维智知识产权代理有限公司 Infringement reminding system for intellectual properties
CN107066547A (en) * 2017-03-20 2017-08-18 天津大学 A kind of method for searching three-dimension model based on LIRE

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王格等: ""基于全文检索的文本相似度算法应用研究"", 《计算机与数字工程》 *

Cited By (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667811A (en) * 2018-04-18 2018-10-16 成都零光量子科技有限公司 A kind of method and monitoring device of autonomous structure electronic evidence
CN109002487A (en) * 2018-06-25 2018-12-14 百度在线网络技术(北京)有限公司 A kind of post-processing approach based on copyright registration information, device, equipment and medium
JP2021500811A (en) * 2018-06-25 2021-01-07 バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド Post-processing methods, devices, equipment and media based on copyright registration information
WO2020001019A1 (en) * 2018-06-25 2020-01-02 百度在线网络技术(北京)有限公司 Post-processing method and device based on copyright registration information, apparatus and medium
JP7063991B2 (en) 2018-06-25 2022-05-09 バイドゥ オンライン ネットワーク テクノロジー(ペキン) カンパニー リミテッド Post-processing methods, devices, equipment and media based on copyright registration information
CN108881244A (en) * 2018-06-27 2018-11-23 中国人民解放军国防科技大学 Intellectual property protection method for network short texts based on block chains
CN109033760A (en) * 2018-08-27 2018-12-18 北京奥曼特奇科技有限公司 A kind of music copyright identification authentication method and Verification System based on block chain
CN109040781A (en) * 2018-08-27 2018-12-18 北京京东尚科信息技术有限公司 Video authentication method, device, system, electronic equipment and readable medium
CN109040781B (en) * 2018-08-27 2021-04-30 北京京东尚科信息技术有限公司 Video authentication method, device, system, electronic equipment and readable medium
CN109033760B (en) * 2018-08-27 2021-10-19 北京创声者文化传媒有限公司 Music copyright identification and authentication method based on block chain
WO2020052083A1 (en) * 2018-09-13 2020-03-19 北京字节跳动网络技术有限公司 Infringing picture recognition method and device, and computer readable storage medium
CN109325765A (en) * 2018-09-30 2019-02-12 真相网络科技(北京)有限公司 A kind of intelligence really weighs method and intelligent contract system
CN109493259B (en) * 2018-10-18 2024-03-05 上海右云信息技术有限公司 Method and device for processing infringement cases through computing device
CN109493259A (en) * 2018-10-18 2019-03-19 上海右上角文化传媒有限公司 A kind of method and apparatus for by calculating equipment processing case of encroachment of right
TWI705342B (en) * 2018-10-31 2020-09-21 香港商阿里巴巴集團服務有限公司 Method and device for performing blockchain certificate deposit on webpage through webpage monitoring
CN109684786A (en) * 2018-11-05 2019-04-26 深圳变设龙信息科技有限公司 A kind of copyright registration method, apparatus and terminal device based on block chain
CN109614775A (en) * 2018-11-20 2019-04-12 安徽大学 A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source
CN109788309A (en) * 2018-12-25 2019-05-21 陕西优米数据技术有限公司 Video file piracy detection method and system based on block chain technology
CN111382394A (en) * 2018-12-29 2020-07-07 北京奇虎科技有限公司 Picture infringement monitoring method and device
CN110008655A (en) * 2019-03-01 2019-07-12 北京数字融通科技有限公司 A kind of infringing information identification people's mark system and method based on distributed network
CN110008655B (en) * 2019-03-01 2020-11-17 北京数字融通科技有限公司 Infringement information identification system and method based on distributed network
CN110188117A (en) * 2019-04-15 2019-08-30 平安科技(深圳)有限公司 Right-safeguarding strategy matching method, apparatus, computer equipment and storage medium
CN110175276A (en) * 2019-04-15 2019-08-27 平安科技(深圳)有限公司 Infringing information acquisition methods, device, computer equipment and storage medium
CN110324729A (en) * 2019-07-18 2019-10-11 北京奇艺世纪科技有限公司 A kind of method, apparatus, electronic equipment and the medium of identification infringement video link
CN110324729B (en) * 2019-07-18 2021-08-27 北京奇艺世纪科技有限公司 Method, device, electronic equipment and medium for identifying infringement video link
WO2021012522A1 (en) * 2019-07-19 2021-01-28 平安科技(深圳)有限公司 Image recognition-based webpage evidence obtaining method and apparatus, storage medium, and server
CN110457434B (en) * 2019-07-19 2023-10-27 平安科技(深圳)有限公司 Webpage evidence obtaining method and device based on search, readable storage medium and server
CN110457434A (en) * 2019-07-19 2019-11-15 平安科技(深圳)有限公司 Webpage evidence collecting method, device, readable storage medium storing program for executing and server based on search
WO2021012521A1 (en) * 2019-07-19 2021-01-28 平安科技(深圳)有限公司 Search-based webpage forensics method and device, readable storage medium and server
CN110472201A (en) * 2019-07-26 2019-11-19 阿里巴巴集团控股有限公司 Based on the text similarity detection method and device of block chain, electronic equipment
US11100284B2 (en) 2019-07-26 2021-08-24 Advanced New Technologies Co., Ltd. Blockchain-based text similarity detection method, apparatus and electronic device
US10909317B2 (en) 2019-07-26 2021-02-02 Advanced New Technologies Co., Ltd. Blockchain-based text similarity detection method, apparatus and electronic device
CN110704811A (en) * 2019-09-03 2020-01-17 特赞(上海)信息科技有限公司 Picture infringement detection method and device and storage medium
WO2021093643A1 (en) * 2019-11-11 2021-05-20 深圳前海微众银行股份有限公司 Copyright authentication method, device, apparatus and system and computer readable storage medium
CN110851761A (en) * 2020-01-15 2020-02-28 支付宝(杭州)信息技术有限公司 Infringement detection method, device and equipment based on block chain and storage medium
CN110851879A (en) * 2020-01-15 2020-02-28 支付宝(杭州)信息技术有限公司 Method, device and equipment for infringement and evidence preservation based on evidence preservation block chain
CN110851608A (en) * 2020-01-15 2020-02-28 支付宝(杭州)信息技术有限公司 Infringement detection method, device and equipment based on block chain and storage medium
CN111159474A (en) * 2020-04-03 2020-05-15 腾讯科技(深圳)有限公司 Multi-line evidence obtaining method, device and equipment based on block chain and storage medium
WO2021223629A1 (en) * 2020-05-07 2021-11-11 京东数科海益信息科技有限公司 Method and device for analyzing image material
CN111815486A (en) * 2020-06-03 2020-10-23 兰州集智信息技术有限公司 Service platform and method for searching clues of infringing products
CN112000928A (en) * 2020-07-15 2020-11-27 西安电子科技大学 Picture distributed infringement right confirming method, system, storage medium and computer equipment
CN112149063A (en) * 2020-09-14 2020-12-29 浙江数秦科技有限公司 Online monitoring method for network picture infringement
CN111930809A (en) * 2020-09-17 2020-11-13 支付宝(杭州)信息技术有限公司 Data processing method, device and equipment
US11436252B2 (en) 2020-09-17 2022-09-06 Alipay (Hangzhou) Information Technology Co., Ltd. Data processing methods, apparatuses, and devices
CN112395560A (en) * 2020-11-20 2021-02-23 京东数科海益信息科技有限公司 Copyright data processing method and device
CN112579986A (en) * 2020-12-25 2021-03-30 特赞(上海)信息科技有限公司 Image infringement detection method, device and system
CN113011342A (en) * 2021-03-22 2021-06-22 支付宝(杭州)信息技术有限公司 Feature extraction and processing method and system for copyright infringement retrieval
CN113011342B (en) * 2021-03-22 2022-06-14 支付宝(杭州)信息技术有限公司 Feature extraction and processing method and system for copyright infringement retrieval
CN113268504A (en) * 2021-04-27 2021-08-17 上海右云信息技术有限公司 Method, apparatus, medium, and program product for determining authorization information
CN113435391A (en) * 2021-07-09 2021-09-24 支付宝(杭州)信息技术有限公司 Method and device for identifying infringement video

Similar Documents

Publication Publication Date Title
CN107832384A (en) Infringement detection method, device, storage medium and electronic equipment
US10164988B2 (en) External link processing
US10484424B2 (en) Method and system for security protection of account information
US9245007B2 (en) Dynamically detecting near-duplicate documents
US9436463B2 (en) System and method for checking open source usage
US8788925B1 (en) Authorized syndicated descriptions of linked web content displayed with links in user-generated content
US20110119293A1 (en) Method And System For Reverse Pattern Recognition Matching
US7895515B1 (en) Detecting indicators of misleading content in markup language coded documents using the formatting of the document
US9886711B2 (en) Product recommendations over multiple stores
CN108769070A (en) One kind is gone beyond one's commission leak detection method and device
JP4903386B2 (en) Searchable information content for pre-selected data
US10671686B2 (en) Processing webpage data
CN107742065A (en) infringement processing method, device, storage medium and electronic equipment
CN104462940A (en) Monitoring method and device for computer USB interface
CN110929185A (en) Website directory detection method and device, computer equipment and computer storage medium
US9361210B2 (en) Capturing domain validations and domain element initializations
CN107844550A (en) infringement processing method, device, storage medium and electronic equipment
JP4807364B2 (en) Information management device
US8800033B2 (en) Rotation of web site content to prevent E-mail spam/phishing attacks
JP6631091B2 (en) Information processing apparatus and information processing program
US20100031133A1 (en) System and Methods for Dynamic Creation of Symptom Databases from Social Bookmarks
Galushka et al. Dynamic document object model formation technique for corporate website protection against automatic coping of information
EP3232361B1 (en) A method, computer program and filter for protecting a computer device against malicious rdf content in linked data
US20130007010A1 (en) Requirements extraction from external sources for software lifecycle management
CN115422242A (en) Information query method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180323