CN107832384A - Infringement detection method, device, storage medium and electronic equipment - Google Patents
Infringement detection method, device, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN107832384A CN107832384A CN201711039307.2A CN201711039307A CN107832384A CN 107832384 A CN107832384 A CN 107832384A CN 201711039307 A CN201711039307 A CN 201711039307A CN 107832384 A CN107832384 A CN 107832384A
- Authority
- CN
- China
- Prior art keywords
- content
- works
- works content
- target
- webpage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 31
- 238000000034 method Methods 0.000 claims abstract description 40
- 238000004590 computer program Methods 0.000 claims description 8
- 230000000007 visual effect Effects 0.000 claims description 8
- 238000004891 communication Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 description 9
- 230000006399 behavior Effects 0.000 description 3
- 241000270322 Lepidosauria Species 0.000 description 2
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000001035 drying Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000005406 washing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
- G06Q50/184—Intellectual property management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Technology Law (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Evolutionary Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioinformatics & Computational Biology (AREA)
- Operations Research (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Artificial Intelligence (AREA)
- Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Life Sciences & Earth Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the present disclosure is related to a kind of infringement detection method and device, electronic equipment and computer-readable storage medium, this method can obtain the content of works from webpage and is compared with target works automatically, determine that the works in the webpage have the abuse for invading target works when the similarity of comparison is more than default similarity threshold, the abuse so as to find and count to oneself from the magnanimity information of internet for common copyright user provides facility.
Description
Technical field
Embodiment of the disclosure is related to field of computer technology, more particularly to infringement detection method, device, storage medium and
Electronic equipment.
Background technology
At present, attention degree of the intellectual property in the minds of enterprise and individual increasingly improves.And with the rise of network application,
Emerging in multitude for numerous new digital works such as web documents, picture, video display, animation proposes new problem to copyright protection.
By taking web documents as an example, because the wind of network plagiarism is serious, an exclusive text for taking considerable time that painstaking effort are interviewed and write
Chapter issue moment just by illegal reprinting to other websites, or even hidden plagiarism by way of adapting " washing original text " escape
Liability for tort, the loss on spirit and property is caused to the copyright side of article.
However, during innovation and creation are realized, inventor has found, although consciousness of the user for copyright protection at present
Gradually step up, but because internet information is huge numerous and diverse, common copyright user is want to find and unite from the magnanimity information of internet
The abuse counted to oneself is extremely difficult thing.
The content of the invention
The main purpose of at least one embodiment of the disclosure is that providing one kind can be carried out automatically on the internet
The method and device of infringement detection.
In a first aspect, the embodiment of the present disclosure provides a kind of infringement detection method, including:At electronic equipment,
Works content is obtained from webpage;
The works content got is compared with target works content;
When the similarity of comparison result is more than default similarity threshold, it is determined that the works content got invades target
The copyright of works content.
Second aspect, the embodiment of the present disclosure provides a kind of infringement detection means, at electronic equipment, including:
Acquiring unit, for obtaining works content from webpage;
Comparing unit, for the works content got to be compared with target works content;
Processing unit, for when the similarity of comparison result is more than default similarity threshold, it is determined that the work got
Product content invades the copyright of target works content.
The third aspect, the disclosure are implemented to provide a kind of electronic equipment, including:Processor and it is coupled to the processor
Display, memory and communication module;Store instruction code in the memory;The instruction code is used for by the place
When managing device and performing, the step of performing method as described in relation to the first aspect.
Fourth aspect, the disclosure are implemented to provide a kind of computer-readable storage medium, stored in the computer-readable storage medium
There is computer program;The computer program is used for be executed by processor method as described in relation to the first aspect the step of
In at least one embodiment of the disclosure, the content of works can be obtained from webpage automatically and is carried out with target works
Compare, determine that the works in the webpage have the abuse of infringement target works when comparing consistent, so as to be general
The abuse that logical copyright user found and counted to oneself from the magnanimity information of internet provides facility.
Brief description of the drawings
Fig. 1 shows the structural representation for the infringement detection electronic equipment that the embodiment of the disclosure one provides;
Fig. 2 shows the main flow for the infringement detection method that one embodiment of the disclosure provides;
Fig. 3 shows the infringement detection method entire flow figure that one embodiment of the disclosure provides;
Fig. 4 is the structural representation for the device for showing the infringement detection that the embodiment of the disclosure one provides.
Embodiment
It should be appreciated that specific embodiment described herein is not used to limit the disclosure only to explain the disclosure.
Fig. 1 shows the schematic diagram of the structure of the electronic equipment for the infringement detection that the embodiment of the disclosure one provides, and shows in Fig. 1
The scene gone out is the typical case scene for the infringement detection method that the embodiment of the disclosure one provides.Fig. 1 is refer to, the electronic equipment
Including processor 110, memory 120 and communication module 130.Wherein, memory 120, communication module 130 are each coupled to processing
In device 110, memory 120 can store the computer program that can be executed by processor, and communication module 130 can be set with the external world
Standby to carry out information exchange, processor 110 can perform corresponding method flow to realize corresponding work(when performing computer program
Energy.
Unless otherwise specified, " coupling " in each embodiment of the disclosure refers to communication connection between component and can handed over
A kind of state of mutual data, it is not required that two components are joined directly together.
In a first aspect, the embodiment of the disclosure one provides a kind of method for detection of encroaching right, this method can be by showing in Fig. 1
The electronic equipment that goes out performs.Fig. 2 shows that the embodiment of the disclosure one provides a kind of main flow of the method for detection of encroaching right,
Specifically include:
S101, works content is obtained from webpage;
S102, the works content got is compared with target works content;
S103, when the similarity of comparison result is more than default similarity threshold, it is determined that the works content got is invaded
Violate the copyright of target works content.
In the infringement detection method that the embodiment of the present disclosure provides, the content and and mesh of works can be obtained from webpage automatically
The product of being denoted as are compared, and determine that the works in the webpage are deposited when the similarity of comparison result is more than default similarity threshold
The abuse of target works is being invaded, so as to find and count from the magnanimity information of internet for common copyright user
Abuse to oneself provides facility.
It is understood that the premise that can carry out infringement comparison is to be stored with target works, namely copyright user creation
Works in the disclosed embodiments, this target works is stored in block chain, so as to ensure storage target
The authenticity and accuracy of works, therefore in the method for embodiment of the present disclosure offer, in the works content and target got
Before works content is compared, methods described can also include:
S100, target works content is obtained from block chain.
And then after the target works of the copyright user obtained from block chain, you can according to target works in webpage
Works content carry out infringement detection.
In the specific implementation, obtaining works content from webpage in the step S101 in above method embodiment can be by more
Kind mode, the optional mode of one of which are that qualified webpage is crawled from internet to originally by distributed reptile technology
Ground, other embodiments can also be passed through certainly.
In order to further improve the speed of acquisition, step S101 can also obtain works from the webpage of particular type website
Content, such as textual work content is obtained from major literature website, obtain audio-video frequency content from major audio frequency and video class website.Or
Person, works content can also be obtained from the webpage of the website in default list of websites, this default list of websites can root
Set according to actual conditions, such as to think that the larger website of platform has a possibility tortious more by user, therefore arranging
What is set in table is the larger website of platform.So as to can further reduce the model that crawler algorithm crawls by such mode
Enclose, improve the speed of webpage works content obtaining.
In the specific implementation, understandable is that the form of the works content obtained in webpage can have many kinds, for
There can be different modes from the comparison process that target works compare in various forms of works content step S102, below to several
Kind can the alignments of works content of preferred form of this be specifically described.
(1) works content is textual work
When works content is textual work, the works content got and target works content are carried out in step S102
Compare, can specifically include:
The simhash values for the textual work content that S1021, determination are got and the simhash values of target works content
Hamming distances;And/or the hash values of sentence and sentence in target works content in the textual work content for judging to get
Whether hash values are identical;
Specifically, qualified webpage is crawled to local, Ran Houke from internet by distributed reptile technology
To extract the information such as the text of webpage, title, author, some unrelated symbols are removed, for example, the words such as " ground obtain ", generation text
The simhash values of this works body matter.Then the simhash values and target works of the textual work body matter of generation are determined
Body matter simhash values Hamming distances.
And/or to the one hash value of every generation of qualified sentence in content of text, then judge each of generation
Whether the hash values of sentence are identical with the hash values of each sentence of target works.
S1022, according to Hamming distances and/or judged result determine comparison result.
If the Hamming distances that judgment step S1021 is obtained are less than default distance threshold, then it is assumed that crawl obtained webpage
Textual work it is consistent with the comparison result of target works, the webpage text content there may be abuse.Wherein, here
Distance threshold can be set according to actual conditions.
And/or if the sentence hash values and target works sentence for the textual work that webpage obtains are crawled in step S1021
Hash value identicals ratio is more than default rate threshold, then it is considered that webpage text content there may be abuse.Its
In, rate threshold here can also be set according to actual conditions.
(2) works content is picture works
When works content is picture works, the works content got and target works content are carried out in step S102
Compare, can specifically include:
Similar picture in the works content that S102a, search are got to the picture in target works content;
Specifically, phase Sihe identical picture can be searched out using LIRe technologies by using Lucene instruments, and
The picture searched out is compared with the picture in target works content, provides the similarity of two width pictures.
Wherein, Lucene instruments are the full-text search engine kits of an open source code, i.e., it is not one complete
Full-text search engine, but the framework of a full-text search engine, there is provided complete query engine and index engine, part
Text analyzing engine.And LIRe technologies are then picture retrieval platform LIRe (the Lucene Image based on Lucene
REtrieval) Lucene image indexing systems.
S102b, comparison result determined according to the similarity of picture.
Specifically, can be according to default similarity threshold to determine comparison result, such as be more than in the two similarity
Think that the Web page picture there may be the behavior of infringement during threshold value.
(3) works content is audio visual work
When works content is picture works, the works content got and target works content are carried out in step S102
Compare, can specifically include:
The key frame picture similar to key frame picture in target works content in S102i, search audio visual work content;
Specifically, after finding and downloading by crawler algorithm in the presence of possible audio frequency and video of encroaching right, carried from audio frequency and video
Take out key frame.Then the key frame of the audio frequency and video in key frame and the target works content being stored in Lucene is compared
It is right, reuse LIRe technologies and search key frame picture similar or identical in target audio frequency and video, it is determined that the similarity of the two.
S102ii, comparison result determined according to the similarity of key frame picture.
Specifically, can be according to default similarity threshold to determine comparison result, such as be more than in the two similarity
Think that the web page audio/video there may be the behavior of infringement during threshold value.
Different infringement detection operations is carried out so as to which different works contents can be directed to by mode described above, is obtained
Must be encroached right the result of detection.
And in a practical situation, the result for only obtaining infringement detection is merely able to so that copyright user knows the work of oneself
The right of product is invaded, but further the right of oneself can not be safeguarded, therefore the embodiment of the present disclosure is according to above-mentioned side
After the works content that formula determines to get invades the copyright of target works content, it can also include:
S104, determine webpage provider electronic address information;
For example, the contact mailbox of the web page providers is determined, or instant messaging chat account, or be short message address.
S105, to electronic address information send notice of infringement message.
After address is determined, notice of infringement message is sent to the address.This notice of infringement message is specifically as follows
Lawyer's letter with set form, so as to inform that the copyright of copyright user has been invaded in the behavior of the web page providers.
In order to provide the evidence of its infringement in follow-up safeguarding-rights act, the method that the embodiment of the present disclosure provides may be used also
With including:
S106, generation infringement evidence simultaneously save as the form that can be predetermined interface interchange.
After infringement evidence is generated, infringement evidence can also also be stored in block chain and be set to can quilt
The form that preset interface is called, and the interface of evidence submission is provided the user with, so as to call the infringement evidence when user needs.
In addition, reading the result of this infringement detection in order to facilitate copyright user, and clearly know tool tortious
Body details, the method that the embodiment of the present disclosure provides can also include:
S107, generation Surveillance simultaneously export;The Surveillance is used to indicate following one or several kinds of information:Infringing party
Web site name, infringement quantity, infringement webpage network address.
It is, of course, also possible to indicate other contents about this infringement event, the disclosure is not specifically limited to this.
Fig. 3 shows a kind of complete flow for the method that the embodiment of the present disclosure provides, due to above to each
The individual specific implementation detail of step is described, and will not be repeated here.
Second aspect, the embodiment of the disclosure one additionally provide a kind of device for detection of encroaching right.Fig. 4 shows the master of the device
Structure is wanted, including:
Acquiring unit 201, for obtaining works content from webpage;
Comparing unit 202, for the works content got to be compared with target works content;
Processing unit 203, for when the similarity of comparison result is more than default similarity threshold, it is determined that get
Works content invades the copyright of target works content.
In certain embodiments, the works content includes textual work content;
The works content got is compared the comparing unit 202 with target works content, can include:
It is determined that the hamming of the simhash values of the simhash values of the textual work content got and target works content away from
From;And/or the hash values of sentence and the hash values of sentence in target works content are in the textual work content for judging to get
It is no identical;
Comparison result is determined according to Hamming distances and/or judged result.
In certain embodiments, the works content includes picture works content;
The works content got is compared the comparing unit 202 with target works content, can include:
Search for the similar picture to the picture in target works content in the works content got;
Comparison result is determined according to the similarity of picture.
In certain embodiments, the works content includes sound audio visual work content;
The works content got is compared the comparing unit 202 with target works content, can include:
Search for key frame picture similar to key frame picture in target works content in audio visual work content;
Comparison result is determined according to the similarity of key frame picture.
In certain embodiments, it is described the works content got is compared with target works content before,
The acquiring unit 201 can be also used for:
Target works content is obtained from block chain.
In certain embodiments, after it is determined that the works content that gets invades the copyright of target works content, institute
Stating device can also include:
Address determination unit 204, the electronic address information of the provider for determining webpage;
Message sending unit 205, for sending notice of infringement message to the electronic address information.
In certain embodiments, the notice of infringement message is the lawyer's letter with set form.
In certain embodiments, the acquiring unit 201 obtains works content from webpage, including:
Works content is obtained from the webpage of particular type website;
Or obtain works content from the webpage of the website in default list of websites.
In certain embodiments, after it is determined that the works content that gets invades the copyright of target works content, institute
Stating device can also include:
Evidence generation unit 206, the form of interface interchange can be predetermined for generating infringement evidence and saving as.
In certain embodiments, described device can also include:
Report generation unit 207, for generating Surveillance and exporting;The Surveillance be used to indicating it is following a kind of or
Several information of person:Infringing party web site name, infringement quantity, infringement webpage network address.
By the infringement detection means that the present embodiment is introduced is that can perform the infringement detection side in the embodiment of the present invention
The device of method, so the method based on the infringement detection described in the embodiment of the present invention, those skilled in the art can
The embodiment and its various change form of the infringement detection means of the present embodiment are understood, so herein for the infringement
How detection means realizes that the infringement detection method in the embodiment of the present invention is no longer discussed in detail.As long as the affiliated technology people in this area
Device used by infringement detection method, belongs to the scope to be protected of the application in member's implementation embodiment of the present invention.
The third aspect, embodiment of the disclosure additionally provide a kind of computer-readable storage medium, in the computer-readable storage medium
Computer instruction code is stored with, the computer instruction code performs any one of first aspect institute when being performed by computer equipment
The method stated.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention
Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect,
Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself
Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any
Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power
Profit requires, summary and accompanying drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation
Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments
Including some features rather than further feature, but the combination of the feature of different embodiments means to be in the scope of the present invention
Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it
One mode can use in any combination.
Some unit embodiments of the present invention can be realized with hardware, or to be run on one or more processor
Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice
Microprocessor or digital signal processor (DSP) are realized in gateway according to embodiments of the present invention, proxy server, system
Some or all parts some or all functions.The present invention is also implemented as being used to perform side as described herein
The some or all equipment or program of device (for example, computer program and computer program product) of method.It is such
Realizing the program of the present invention can store on a computer-readable medium, or can have the shape of one or more signal
Formula.Such signal can be downloaded from internet website and obtained, and either be provided or with any other shape on carrier signal
Formula provides.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real
It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
Claims (22)
- A kind of 1. infringement detection method, it is characterised in that including:At electronic equipment,Works content is obtained from webpage;The works content got is compared with target works content;When the similarity of comparison result is more than default similarity threshold, it is determined that the works content got invades target works The copyright of content.
- 2. according to the method for claim 1, it is characterised in that the works content includes textual work content;It is described that the works content got is compared with target works content, including:It is determined that the Hamming distances of the simhash values of the textual work content got and the simhash values of target works content; And/or judge the hash values of sentence and sentence in target works content in the textual work content that gets hash values whether It is identical;Comparison result is determined according to Hamming distances and/or judged result.
- 3. according to the method for claim 1, it is characterised in that the works content includes picture works content;It is described that the works content got is compared with target works content, including:Search for the similar picture to the picture in target works content in the works content got;Comparison result is determined according to the similarity of picture.
- 4. according to the method for claim 1, it is characterised in that the works content includes audio visual work content;It is described that the works content got is compared with target works content, including:Search for key frame picture similar to key frame picture in target works content in audio visual work content;Comparison result is determined according to the similarity of key frame picture.
- 5. according to the method for claim 1, it is characterised in that described by the works content got and target works content Before being compared, methods described includes:Target works content is obtained from block chain.
- 6. according to the method for claim 1, it is characterised in that it is determined that the works content got is invaded in target works After the copyright of appearance, methods described also includes:Determine the electronic address information of the provider of webpage;Notice of infringement message is sent to the electronic address information.
- 7. according to the method for claim 6, it is characterised in that the notice of infringement message is the lawyer with set form Letter.
- 8. according to the method for claim 1, it is characterised in that it is described to obtain works content from webpage, including:Works content is obtained from the webpage of particular type website;Or obtain works content from the webpage of the website in default list of websites.
- 9. according to the method for claim 1, it is characterised in that it is determined that the works content got is invaded in target works After the copyright of appearance, methods described also includes:Generation infringement evidence simultaneously saves as the form that can be predetermined interface interchange.
- 10. according to the method for claim 1, it is characterised in that methods described also includes:Generation Surveillance simultaneously exports;The Surveillance is used to indicate following one or several kinds of information:Infringing party website name Claim, infringement quantity, infringement webpage network address.
- 11. one kind infringement detection means, at electronic equipment, it is characterised in that including:,Acquiring unit, for obtaining works content from webpage;Comparing unit, for the works content got to be compared with target works content;Processing unit, for when the similarity of comparison result is more than default similarity threshold, it is determined that in the works got Hold the copyright for invading target works content.
- 12. device according to claim 11, it is characterised in that the works content includes textual work content;The works content got is compared the comparing unit with target works content, including:It is determined that the Hamming distances of the simhash values of the textual work content got and the simhash values of target works content; And/or judge the hash values of sentence and sentence in target works content in the textual work content that gets hash values whether It is identical;Comparison result is determined according to Hamming distances and/or judged result.
- 13. device according to claim 11, it is characterised in that the works content includes picture works content;The works content got is compared the comparing unit with target works content, including:Search for the similar picture to the picture in target works content in the works content got;Comparison result is determined according to the similarity of picture.
- 14. device according to claim 11, it is characterised in that the works content includes audio visual work content;The works content got is compared the comparing unit with target works content, including:Search for key frame picture similar to key frame picture in target works content in audio visual work content;Comparison result is determined according to the similarity of key frame picture.
- 15. device according to claim 11, it is characterised in that described by the works content got and target works Before appearance is compared, the acquiring unit is additionally operable to:Target works content is obtained from block chain.
- 16. device according to claim 11, it is characterised in that it is determined that the works content got invades target works After the copyright of content, described device also includes:Address determination unit, the electronic address information of the provider for determining webpage;Message sending unit, for sending notice of infringement message to the electronic address information.
- 17. device according to claim 16, it is characterised in that the notice of infringement message is the rule with set form Shi Han.
- 18. device according to claim 11, it is characterised in that the acquiring unit obtains works content from webpage, Including:Works content is obtained from the webpage of particular type website;Or obtain works content from the webpage of the website in default list of websites.
- 19. device according to claim 11, it is characterised in that it is determined that the works content got invades target works After the copyright of content, described device also includes:Evidence generation unit, the form of interface interchange can be predetermined for generating infringement evidence and saving as.
- 20. device according to claim 11, it is characterised in that described device also includes:Report generation unit, for generating Surveillance and exporting;The Surveillance is used to indicate following one or several kinds Information:Infringing party web site name, infringement quantity, infringement webpage network address.
- 21. a kind of electronic equipment, it is characterised in that including:Processor and it is coupled to the display of the processor, memory And communication module;Store instruction code in the memory;The instruction code is used for when by the computing device, performs The step of method as described in claim 1-10 is any.
- 22. a kind of computer-readable storage medium, it is characterised in that be stored with computer program in the computer-readable storage medium;Institute Computer program is stated to be used for the method being executed by processor as described in claim 1-10 is any the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711039307.2A CN107832384A (en) | 2017-10-28 | 2017-10-28 | Infringement detection method, device, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711039307.2A CN107832384A (en) | 2017-10-28 | 2017-10-28 | Infringement detection method, device, storage medium and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107832384A true CN107832384A (en) | 2018-03-23 |
Family
ID=61651118
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711039307.2A Pending CN107832384A (en) | 2017-10-28 | 2017-10-28 | Infringement detection method, device, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107832384A (en) |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108667811A (en) * | 2018-04-18 | 2018-10-16 | 成都零光量子科技有限公司 | A kind of method and monitoring device of autonomous structure electronic evidence |
CN108881244A (en) * | 2018-06-27 | 2018-11-23 | 中国人民解放军国防科技大学 | Intellectual property protection method for network short texts based on block chains |
CN109002487A (en) * | 2018-06-25 | 2018-12-14 | 百度在线网络技术(北京)有限公司 | A kind of post-processing approach based on copyright registration information, device, equipment and medium |
CN109033760A (en) * | 2018-08-27 | 2018-12-18 | 北京奥曼特奇科技有限公司 | A kind of music copyright identification authentication method and Verification System based on block chain |
CN109040781A (en) * | 2018-08-27 | 2018-12-18 | 北京京东尚科信息技术有限公司 | Video authentication method, device, system, electronic equipment and readable medium |
CN109325765A (en) * | 2018-09-30 | 2019-02-12 | 真相网络科技(北京)有限公司 | A kind of intelligence really weighs method and intelligent contract system |
CN109493259A (en) * | 2018-10-18 | 2019-03-19 | 上海右上角文化传媒有限公司 | A kind of method and apparatus for by calculating equipment processing case of encroachment of right |
CN109614775A (en) * | 2018-11-20 | 2019-04-12 | 安徽大学 | A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source |
CN109684786A (en) * | 2018-11-05 | 2019-04-26 | 深圳变设龙信息科技有限公司 | A kind of copyright registration method, apparatus and terminal device based on block chain |
CN109788309A (en) * | 2018-12-25 | 2019-05-21 | 陕西优米数据技术有限公司 | Video file piracy detection method and system based on block chain technology |
CN110008655A (en) * | 2019-03-01 | 2019-07-12 | 北京数字融通科技有限公司 | A kind of infringing information identification people's mark system and method based on distributed network |
CN110175276A (en) * | 2019-04-15 | 2019-08-27 | 平安科技(深圳)有限公司 | Infringing information acquisition methods, device, computer equipment and storage medium |
CN110188117A (en) * | 2019-04-15 | 2019-08-30 | 平安科技(深圳)有限公司 | Right-safeguarding strategy matching method, apparatus, computer equipment and storage medium |
CN110324729A (en) * | 2019-07-18 | 2019-10-11 | 北京奇艺世纪科技有限公司 | A kind of method, apparatus, electronic equipment and the medium of identification infringement video link |
CN110457434A (en) * | 2019-07-19 | 2019-11-15 | 平安科技(深圳)有限公司 | Webpage evidence collecting method, device, readable storage medium storing program for executing and server based on search |
CN110472201A (en) * | 2019-07-26 | 2019-11-19 | 阿里巴巴集团控股有限公司 | Based on the text similarity detection method and device of block chain, electronic equipment |
CN110704811A (en) * | 2019-09-03 | 2020-01-17 | 特赞(上海)信息科技有限公司 | Picture infringement detection method and device and storage medium |
CN110851608A (en) * | 2020-01-15 | 2020-02-28 | 支付宝(杭州)信息技术有限公司 | Infringement detection method, device and equipment based on block chain and storage medium |
CN110851879A (en) * | 2020-01-15 | 2020-02-28 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for infringement and evidence preservation based on evidence preservation block chain |
CN110851761A (en) * | 2020-01-15 | 2020-02-28 | 支付宝(杭州)信息技术有限公司 | Infringement detection method, device and equipment based on block chain and storage medium |
WO2020052083A1 (en) * | 2018-09-13 | 2020-03-19 | 北京字节跳动网络技术有限公司 | Infringing picture recognition method and device, and computer readable storage medium |
CN111159474A (en) * | 2020-04-03 | 2020-05-15 | 腾讯科技(深圳)有限公司 | Multi-line evidence obtaining method, device and equipment based on block chain and storage medium |
CN111382394A (en) * | 2018-12-29 | 2020-07-07 | 北京奇虎科技有限公司 | Picture infringement monitoring method and device |
TWI705342B (en) * | 2018-10-31 | 2020-09-21 | 香港商阿里巴巴集團服務有限公司 | Method and device for performing blockchain certificate deposit on webpage through webpage monitoring |
CN111815486A (en) * | 2020-06-03 | 2020-10-23 | 兰州集智信息技术有限公司 | Service platform and method for searching clues of infringing products |
CN111930809A (en) * | 2020-09-17 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
CN112000928A (en) * | 2020-07-15 | 2020-11-27 | 西安电子科技大学 | Picture distributed infringement right confirming method, system, storage medium and computer equipment |
CN112149063A (en) * | 2020-09-14 | 2020-12-29 | 浙江数秦科技有限公司 | Online monitoring method for network picture infringement |
WO2021012522A1 (en) * | 2019-07-19 | 2021-01-28 | 平安科技(深圳)有限公司 | Image recognition-based webpage evidence obtaining method and apparatus, storage medium, and server |
US10909317B2 (en) | 2019-07-26 | 2021-02-02 | Advanced New Technologies Co., Ltd. | Blockchain-based text similarity detection method, apparatus and electronic device |
CN112395560A (en) * | 2020-11-20 | 2021-02-23 | 京东数科海益信息科技有限公司 | Copyright data processing method and device |
CN112579986A (en) * | 2020-12-25 | 2021-03-30 | 特赞(上海)信息科技有限公司 | Image infringement detection method, device and system |
WO2021093643A1 (en) * | 2019-11-11 | 2021-05-20 | 深圳前海微众银行股份有限公司 | Copyright authentication method, device, apparatus and system and computer readable storage medium |
CN113011342A (en) * | 2021-03-22 | 2021-06-22 | 支付宝(杭州)信息技术有限公司 | Feature extraction and processing method and system for copyright infringement retrieval |
CN113268504A (en) * | 2021-04-27 | 2021-08-17 | 上海右云信息技术有限公司 | Method, apparatus, medium, and program product for determining authorization information |
CN113435391A (en) * | 2021-07-09 | 2021-09-24 | 支付宝(杭州)信息技术有限公司 | Method and device for identifying infringement video |
WO2021223629A1 (en) * | 2020-05-07 | 2021-11-11 | 京东数科海益信息科技有限公司 | Method and device for analyzing image material |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462873A (en) * | 2013-09-13 | 2015-03-25 | 北大方正集团有限公司 | Picture processing method and picture processing device |
CN104504307A (en) * | 2015-01-08 | 2015-04-08 | 北京大学 | Method and device for detecting audio/video copy based on copy cells |
US20150206101A1 (en) * | 2014-01-21 | 2015-07-23 | Our Tech Co., Ltd. | System for determining infringement of copyright based on the text reference point and method thereof |
CN105657547A (en) * | 2015-12-31 | 2016-06-08 | 北京奇艺世纪科技有限公司 | Detection method and device for similar video and pirated video |
CN106126617A (en) * | 2016-06-22 | 2016-11-16 | 腾讯科技(深圳)有限公司 | A kind of video detecting method and server |
WO2017049045A1 (en) * | 2015-09-16 | 2017-03-23 | RiskIQ, Inc. | Using hash signatures of dom objects to identify website similarity |
CN106649757A (en) * | 2016-12-27 | 2017-05-10 | 安徽维智知识产权代理有限公司 | Infringement reminding system for intellectual properties |
CN107066547A (en) * | 2017-03-20 | 2017-08-18 | 天津大学 | A kind of method for searching three-dimension model based on LIRE |
CN107204183A (en) * | 2016-03-18 | 2017-09-26 | 百度在线网络技术(北京)有限公司 | A kind of audio file detection method and device |
-
2017
- 2017-10-28 CN CN201711039307.2A patent/CN107832384A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462873A (en) * | 2013-09-13 | 2015-03-25 | 北大方正集团有限公司 | Picture processing method and picture processing device |
US20150206101A1 (en) * | 2014-01-21 | 2015-07-23 | Our Tech Co., Ltd. | System for determining infringement of copyright based on the text reference point and method thereof |
CN104504307A (en) * | 2015-01-08 | 2015-04-08 | 北京大学 | Method and device for detecting audio/video copy based on copy cells |
WO2017049045A1 (en) * | 2015-09-16 | 2017-03-23 | RiskIQ, Inc. | Using hash signatures of dom objects to identify website similarity |
CN105657547A (en) * | 2015-12-31 | 2016-06-08 | 北京奇艺世纪科技有限公司 | Detection method and device for similar video and pirated video |
CN107204183A (en) * | 2016-03-18 | 2017-09-26 | 百度在线网络技术(北京)有限公司 | A kind of audio file detection method and device |
CN106126617A (en) * | 2016-06-22 | 2016-11-16 | 腾讯科技(深圳)有限公司 | A kind of video detecting method and server |
CN106649757A (en) * | 2016-12-27 | 2017-05-10 | 安徽维智知识产权代理有限公司 | Infringement reminding system for intellectual properties |
CN107066547A (en) * | 2017-03-20 | 2017-08-18 | 天津大学 | A kind of method for searching three-dimension model based on LIRE |
Non-Patent Citations (1)
Title |
---|
王格等: ""基于全文检索的文本相似度算法应用研究"", 《计算机与数字工程》 * |
Cited By (50)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108667811A (en) * | 2018-04-18 | 2018-10-16 | 成都零光量子科技有限公司 | A kind of method and monitoring device of autonomous structure electronic evidence |
CN109002487A (en) * | 2018-06-25 | 2018-12-14 | 百度在线网络技术(北京)有限公司 | A kind of post-processing approach based on copyright registration information, device, equipment and medium |
JP2021500811A (en) * | 2018-06-25 | 2021-01-07 | バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド | Post-processing methods, devices, equipment and media based on copyright registration information |
WO2020001019A1 (en) * | 2018-06-25 | 2020-01-02 | 百度在线网络技术(北京)有限公司 | Post-processing method and device based on copyright registration information, apparatus and medium |
JP7063991B2 (en) | 2018-06-25 | 2022-05-09 | バイドゥ オンライン ネットワーク テクノロジー(ペキン) カンパニー リミテッド | Post-processing methods, devices, equipment and media based on copyright registration information |
CN108881244A (en) * | 2018-06-27 | 2018-11-23 | 中国人民解放军国防科技大学 | Intellectual property protection method for network short texts based on block chains |
CN109033760A (en) * | 2018-08-27 | 2018-12-18 | 北京奥曼特奇科技有限公司 | A kind of music copyright identification authentication method and Verification System based on block chain |
CN109040781A (en) * | 2018-08-27 | 2018-12-18 | 北京京东尚科信息技术有限公司 | Video authentication method, device, system, electronic equipment and readable medium |
CN109040781B (en) * | 2018-08-27 | 2021-04-30 | 北京京东尚科信息技术有限公司 | Video authentication method, device, system, electronic equipment and readable medium |
CN109033760B (en) * | 2018-08-27 | 2021-10-19 | 北京创声者文化传媒有限公司 | Music copyright identification and authentication method based on block chain |
WO2020052083A1 (en) * | 2018-09-13 | 2020-03-19 | 北京字节跳动网络技术有限公司 | Infringing picture recognition method and device, and computer readable storage medium |
CN109325765A (en) * | 2018-09-30 | 2019-02-12 | 真相网络科技(北京)有限公司 | A kind of intelligence really weighs method and intelligent contract system |
CN109493259B (en) * | 2018-10-18 | 2024-03-05 | 上海右云信息技术有限公司 | Method and device for processing infringement cases through computing device |
CN109493259A (en) * | 2018-10-18 | 2019-03-19 | 上海右上角文化传媒有限公司 | A kind of method and apparatus for by calculating equipment processing case of encroachment of right |
TWI705342B (en) * | 2018-10-31 | 2020-09-21 | 香港商阿里巴巴集團服務有限公司 | Method and device for performing blockchain certificate deposit on webpage through webpage monitoring |
CN109684786A (en) * | 2018-11-05 | 2019-04-26 | 深圳变设龙信息科技有限公司 | A kind of copyright registration method, apparatus and terminal device based on block chain |
CN109614775A (en) * | 2018-11-20 | 2019-04-12 | 安徽大学 | A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source |
CN109788309A (en) * | 2018-12-25 | 2019-05-21 | 陕西优米数据技术有限公司 | Video file piracy detection method and system based on block chain technology |
CN111382394A (en) * | 2018-12-29 | 2020-07-07 | 北京奇虎科技有限公司 | Picture infringement monitoring method and device |
CN110008655A (en) * | 2019-03-01 | 2019-07-12 | 北京数字融通科技有限公司 | A kind of infringing information identification people's mark system and method based on distributed network |
CN110008655B (en) * | 2019-03-01 | 2020-11-17 | 北京数字融通科技有限公司 | Infringement information identification system and method based on distributed network |
CN110188117A (en) * | 2019-04-15 | 2019-08-30 | 平安科技(深圳)有限公司 | Right-safeguarding strategy matching method, apparatus, computer equipment and storage medium |
CN110175276A (en) * | 2019-04-15 | 2019-08-27 | 平安科技(深圳)有限公司 | Infringing information acquisition methods, device, computer equipment and storage medium |
CN110324729A (en) * | 2019-07-18 | 2019-10-11 | 北京奇艺世纪科技有限公司 | A kind of method, apparatus, electronic equipment and the medium of identification infringement video link |
CN110324729B (en) * | 2019-07-18 | 2021-08-27 | 北京奇艺世纪科技有限公司 | Method, device, electronic equipment and medium for identifying infringement video link |
WO2021012522A1 (en) * | 2019-07-19 | 2021-01-28 | 平安科技(深圳)有限公司 | Image recognition-based webpage evidence obtaining method and apparatus, storage medium, and server |
CN110457434B (en) * | 2019-07-19 | 2023-10-27 | 平安科技(深圳)有限公司 | Webpage evidence obtaining method and device based on search, readable storage medium and server |
CN110457434A (en) * | 2019-07-19 | 2019-11-15 | 平安科技(深圳)有限公司 | Webpage evidence collecting method, device, readable storage medium storing program for executing and server based on search |
WO2021012521A1 (en) * | 2019-07-19 | 2021-01-28 | 平安科技(深圳)有限公司 | Search-based webpage forensics method and device, readable storage medium and server |
CN110472201A (en) * | 2019-07-26 | 2019-11-19 | 阿里巴巴集团控股有限公司 | Based on the text similarity detection method and device of block chain, electronic equipment |
US11100284B2 (en) | 2019-07-26 | 2021-08-24 | Advanced New Technologies Co., Ltd. | Blockchain-based text similarity detection method, apparatus and electronic device |
US10909317B2 (en) | 2019-07-26 | 2021-02-02 | Advanced New Technologies Co., Ltd. | Blockchain-based text similarity detection method, apparatus and electronic device |
CN110704811A (en) * | 2019-09-03 | 2020-01-17 | 特赞(上海)信息科技有限公司 | Picture infringement detection method and device and storage medium |
WO2021093643A1 (en) * | 2019-11-11 | 2021-05-20 | 深圳前海微众银行股份有限公司 | Copyright authentication method, device, apparatus and system and computer readable storage medium |
CN110851761A (en) * | 2020-01-15 | 2020-02-28 | 支付宝(杭州)信息技术有限公司 | Infringement detection method, device and equipment based on block chain and storage medium |
CN110851879A (en) * | 2020-01-15 | 2020-02-28 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for infringement and evidence preservation based on evidence preservation block chain |
CN110851608A (en) * | 2020-01-15 | 2020-02-28 | 支付宝(杭州)信息技术有限公司 | Infringement detection method, device and equipment based on block chain and storage medium |
CN111159474A (en) * | 2020-04-03 | 2020-05-15 | 腾讯科技(深圳)有限公司 | Multi-line evidence obtaining method, device and equipment based on block chain and storage medium |
WO2021223629A1 (en) * | 2020-05-07 | 2021-11-11 | 京东数科海益信息科技有限公司 | Method and device for analyzing image material |
CN111815486A (en) * | 2020-06-03 | 2020-10-23 | 兰州集智信息技术有限公司 | Service platform and method for searching clues of infringing products |
CN112000928A (en) * | 2020-07-15 | 2020-11-27 | 西安电子科技大学 | Picture distributed infringement right confirming method, system, storage medium and computer equipment |
CN112149063A (en) * | 2020-09-14 | 2020-12-29 | 浙江数秦科技有限公司 | Online monitoring method for network picture infringement |
CN111930809A (en) * | 2020-09-17 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
US11436252B2 (en) | 2020-09-17 | 2022-09-06 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, and devices |
CN112395560A (en) * | 2020-11-20 | 2021-02-23 | 京东数科海益信息科技有限公司 | Copyright data processing method and device |
CN112579986A (en) * | 2020-12-25 | 2021-03-30 | 特赞(上海)信息科技有限公司 | Image infringement detection method, device and system |
CN113011342A (en) * | 2021-03-22 | 2021-06-22 | 支付宝(杭州)信息技术有限公司 | Feature extraction and processing method and system for copyright infringement retrieval |
CN113011342B (en) * | 2021-03-22 | 2022-06-14 | 支付宝(杭州)信息技术有限公司 | Feature extraction and processing method and system for copyright infringement retrieval |
CN113268504A (en) * | 2021-04-27 | 2021-08-17 | 上海右云信息技术有限公司 | Method, apparatus, medium, and program product for determining authorization information |
CN113435391A (en) * | 2021-07-09 | 2021-09-24 | 支付宝(杭州)信息技术有限公司 | Method and device for identifying infringement video |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107832384A (en) | Infringement detection method, device, storage medium and electronic equipment | |
US10164988B2 (en) | External link processing | |
US10484424B2 (en) | Method and system for security protection of account information | |
US9245007B2 (en) | Dynamically detecting near-duplicate documents | |
US9436463B2 (en) | System and method for checking open source usage | |
US8788925B1 (en) | Authorized syndicated descriptions of linked web content displayed with links in user-generated content | |
US20110119293A1 (en) | Method And System For Reverse Pattern Recognition Matching | |
US7895515B1 (en) | Detecting indicators of misleading content in markup language coded documents using the formatting of the document | |
US9886711B2 (en) | Product recommendations over multiple stores | |
CN108769070A (en) | One kind is gone beyond one's commission leak detection method and device | |
JP4903386B2 (en) | Searchable information content for pre-selected data | |
US10671686B2 (en) | Processing webpage data | |
CN107742065A (en) | infringement processing method, device, storage medium and electronic equipment | |
CN104462940A (en) | Monitoring method and device for computer USB interface | |
CN110929185A (en) | Website directory detection method and device, computer equipment and computer storage medium | |
US9361210B2 (en) | Capturing domain validations and domain element initializations | |
CN107844550A (en) | infringement processing method, device, storage medium and electronic equipment | |
JP4807364B2 (en) | Information management device | |
US8800033B2 (en) | Rotation of web site content to prevent E-mail spam/phishing attacks | |
JP6631091B2 (en) | Information processing apparatus and information processing program | |
US20100031133A1 (en) | System and Methods for Dynamic Creation of Symptom Databases from Social Bookmarks | |
Galushka et al. | Dynamic document object model formation technique for corporate website protection against automatic coping of information | |
EP3232361B1 (en) | A method, computer program and filter for protecting a computer device against malicious rdf content in linked data | |
US20130007010A1 (en) | Requirements extraction from external sources for software lifecycle management | |
CN115422242A (en) | Information query method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180323 |