CN112434264A - Infringement processing method and device based on block chain and electronic equipment - Google Patents

Infringement processing method and device based on block chain and electronic equipment Download PDF

Info

Publication number
CN112434264A
CN112434264A CN202110113242.1A CN202110113242A CN112434264A CN 112434264 A CN112434264 A CN 112434264A CN 202110113242 A CN202110113242 A CN 202110113242A CN 112434264 A CN112434264 A CN 112434264A
Authority
CN
China
Prior art keywords
work
original
infringement
block chain
authenticated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110113242.1A
Other languages
Chinese (zh)
Inventor
徐惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Ant Blockchain Technology Shanghai Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Ant Blockchain Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd, Ant Blockchain Technology Shanghai Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202110113242.1A priority Critical patent/CN112434264A/en
Publication of CN112434264A publication Critical patent/CN112434264A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The embodiment of the specification provides an infringement processing method and device based on a block chain and electronic equipment. The method comprises the following steps: receiving a first invoked transaction for an infringing work; the first calling transaction comprises a first identification of original works subjected to original authentication, a second identification of infringement works and a third identification of a work platform for issuing infringement works; responding to the first calling transaction, calling infringement identification logic declared in an intelligent contract issued in the block chain, acquiring original works corresponding to the first identification from the block chain, and acquiring infringement works corresponding to the second identification from a work platform corresponding to the third identification; determining whether the infringed work infringes the original work; if so, further calling an infringement processing logic of the intelligent contract, and generating an infringement processing instruction for the work platform corresponding to the third identification, so that the author information of the original work is displayed on a page of the infringement work after the work platform acquires the infringement processing instruction.

Description

Infringement processing method and device based on block chain and electronic equipment
Technical Field
One or more embodiments of the present disclosure relate to the field of block chain technologies, and in particular, to an infringement processing method and apparatus based on a block chain, and an electronic device.
Background
With the development of the internet, more and more works are spread on the basis of the internet. Although the internet facilitates the creation of authors and the dissemination of works, there are increasing circumstances in which creative works are infringed.
Especially, the infringement behaviors such as carrying, plagiarism, forwarding, transshipment and the like often exist among a plurality of work platforms. The work platform may also include, for example, short video platforms, picture platforms, graphics platforms, video platforms, music platforms, and other types of work platforms.
The infringement works generated by the infringement behaviors do not only do not indicate the names of the original authors, but also sign the names of other authors. This obviously infringes the rights (e.g., copyright, signature, etc.) of the original author.
Disclosure of Invention
The embodiment of the specification provides an infringement processing method and device based on a block chain and an electronic device.
According to a first aspect of embodiments of the present specification, there is provided an infringement processing method based on a blockchain, where the blockchain is constructed by using different work platforms as blockchain nodes, and a creative work authenticated by a creative certificate is stored in the blockchain; the method comprises the following steps:
receiving a first invoked transaction for an infringing work; the first calling transaction comprises a first identification of a creative work of original authentication, a second identification of the infringing work and a third identification of a work platform for issuing the infringing work;
responding to the first calling transaction, calling infringement identification logic declared in an intelligent contract issued in the block chain, and acquiring a creative work corresponding to the first identifier from the block chain and acquiring an infringement work corresponding to the second identifier from a work platform corresponding to a third identifier; determining whether the infringing work infringes the original work;
if the infringement works infringe the original works, further calling infringement processing logic of the intelligent contract, and generating infringement processing instructions aiming at the work platform corresponding to the third identification, so that after the work platform obtains the infringement processing instructions, author information of the original works is displayed on a page of the infringement works.
Optionally, the original work is authenticated by the following method:
receiving a second calling transaction initiated by the original author; wherein the second invoking transaction comprises a work to be authenticated;
responding to the second calling transaction, calling original authentication logic declared in an intelligent contract issued in the block chain, and determining whether the works to be authenticated are original works;
and if the work to be authenticated is the original work, determining the work to be authenticated as the authenticated original work and storing the authenticated original work in the block chain.
Optionally, the original authentication logic further includes:
and generating a copyright certificate with a unique identifier aiming at the authenticated original works.
Optionally, the unique identifier includes a hash value calculated based on the content of the authenticated original work.
Optionally, the original authentication logic further includes:
and generating an original instruction aiming at a work platform for issuing the authenticated original work, so that after the work platform acquires the original instruction, the page of the authenticated original work displays block chain authentication information on the work platform.
Optionally, the determining whether the infringing work infringes the creative work includes:
calculating the similarity between the infringed work and the original work;
and when the similarity exceeds a threshold value, determining that the infringing work infringes the original work.
Optionally, the displaying the author information of the original work on the page of the infringement work includes:
and displaying the similarity of the infringed work and the original work on a page of the infringed work.
Optionally, the method further includes:
and responding to a deletion transaction initiated by an original author, calling an infringement processing logic declared in an intelligent contract issued in the block chain, and generating a deletion instruction aiming at the work platform corresponding to the third identifier, so that the work platform deletes the infringed work issued on the platform after acquiring the deletion instruction.
Optionally, the author information includes a link to the creative work.
Optionally, the blockchain is a federation chain constructed by using different work platforms as blockchain nodes.
According to a second aspect of embodiments herein, there is provided a block chain-based infringement processing apparatus, the apparatus including:
the block chain is constructed by taking different work platforms as block chain nodes together, and original works which are subjected to original certification are stored in the block chain; the device comprises:
the transaction receiving unit is used for receiving a first calling transaction aiming at infringing works; the first calling transaction comprises a first identification of a creative work of original authentication, a second identification of the infringing work and a third identification of a work platform for issuing the infringing work;
the infringement identification unit is used for responding to the first calling transaction, calling an infringement identification logic declared in an intelligent contract issued in the block chain, acquiring the original works corresponding to the first identification from the block chain, and acquiring the infringement works corresponding to the second identification from a work platform corresponding to a third identification; determining whether the infringing work infringes the original work;
and the infringement processing unit is used for further calling the infringement processing logic of the intelligent contract to generate an infringement processing instruction aiming at the work platform corresponding to the third identifier if the infringed work infringes the original work, so that the author information of the original work is displayed on a page of the infringement work after the work platform acquires the infringement processing instruction.
Optionally, the creative work is subjected to creative authentication through the following subunits:
the receiving subunit receives a second call transaction initiated by the user; wherein the second invoking transaction comprises a creative work to be authenticated;
the authentication subunit is used for responding to the second calling transaction, calling the original authentication logic declared in the intelligent contract issued in the block chain, and determining whether the work to be authenticated is the original work; and if the work to be authenticated is the original work, determining the work to be authenticated as the authenticated original work and storing the authenticated original work in the block chain.
Optionally, the original authentication logic further includes:
and generating a copyright certificate with a unique identifier aiming at the authenticated original works.
Optionally, the unique identifier includes a hash value calculated based on the content of the authenticated original work.
Optionally, the original authentication logic further includes:
and generating an original instruction aiming at a work platform for issuing the authenticated original work, so that after the work platform acquires the original instruction, the page of the authenticated original work displays block chain authentication information on the work platform.
Optionally, the determining whether the infringing work infringes the creative work includes:
calculating the similarity between the infringed work and the original work; and when the similarity exceeds a threshold value, determining that the infringing work infringes the original work.
Optionally, the displaying the author information of the original work on the page of the infringement work includes:
and displaying the similarity of the infringed work and the original work on a page of the infringed work.
Optionally, the apparatus further comprises:
and the work deleting subunit is used for responding to a deleting transaction initiated by an original author, calling an infringement processing logic declared in the intelligent contract issued in the block chain, and generating a deleting instruction aiming at the work platform corresponding to the third identifier, so that the work platform deletes the infringement work issued on the platform after acquiring the deleting instruction.
Optionally, the author information includes a link to the creative work.
Optionally, the blockchain is a federation chain constructed by using different work platforms as blockchain nodes.
According to a third aspect of embodiments herein, there is provided an electronic apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured as any one of the above block chain-based infringement processing methods.
The embodiment of the specification provides an infringement processing scheme based on a block chain. Based on the block chain technology, different work platforms are used as block chain nodes to jointly construct a block chain, and original works issued by the work platforms are stored in the block chain. After the original author finds the infringing work, the right-maintaining can be initiated to the block chain; and judging whether the infringement work is infringed or not by the block chain based on the certified original work, and generating an infringement processing instruction aiming at a work platform for issuing the infringement work so that the work platform displays author information of the original work on a page of the infringement work.
Drawings
FIG. 1 is a flow diagram of creating an intelligent contract provided by an exemplary embodiment;
FIG. 2 is a schematic diagram of invoking an intelligent contract provided by an exemplary embodiment;
FIG. 3 is a flowchart of a block chain-based infringement handling method according to an example embodiment;
FIG. 4 is a schematic diagram of multi-party interaction provided by an exemplary embodiment;
FIG. 5 is a schematic diagram of an electronic device according to an exemplary embodiment;
fig. 6 is a block diagram of an infringement processing apparatus based on a block chain according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below do not represent all implementations consistent with one or more embodiments of the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of one or more embodiments of the specification, as detailed in the claims which follow.
It should be noted that: in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein. In some other embodiments, the method may include more or fewer steps than those described herein. Moreover, a single step described in this specification may be broken down into multiple steps for description in other embodiments; multiple steps described in this specification may be combined into a single step in other embodiments.
With the development of the internet, more and more works are spread on the basis of the internet. Although the internet facilitates the creation of authors and the dissemination of works, there are increasing circumstances in which creative works are infringed.
Especially, the infringement behaviors such as carrying, plagiarism, forwarding, transshipment and the like often exist among a plurality of work platforms. The work platform may also include, for example, short video platforms, picture platforms, graphics platforms, video platforms, music platforms, and other types of work platforms.
The infringement works generated by the infringement behaviors do not only do not indicate the names of the original authors, but also sign the names of other authors. This obviously infringes the rights (e.g., copyright, signature, etc.) of the original author.
Generally, work data is not shared among different work platforms, so that information islands can be formed. Therefore, the platform can hardly find cross-platform infringement works based on the own work database, so that cross-platform infringement behaviors are aggravated.
Nowadays, cross-platform infringement tracing difficulty is large, an original author not only needs to prove that the author is the original author, but also has a long right maintaining period.
In view of the above problems, the present specification aims to provide a cross-platform scheme for original work authentication, infringement determination, and infringement processing. Based on the block chain technology, different work platforms are used as block chain nodes to jointly construct a block chain, and original works issued by the work platforms are stored in the block chain. After the original author finds the infringing work, the right-maintaining can be initiated to the block chain; and judging whether the infringement work is infringed or not by the block chain based on the certified original work, and generating an infringement processing instruction aiming at a work platform for issuing the infringement work so that the work platform displays author information of the original work on a page of the infringement work.
And the block chain is constructed by taking different work platforms as block chain nodes together.
Blockchains are generally divided into three types: public chain (Public Blockchain), Private chain (Private Blockchain) and alliance chain (Consortium Blockchain). Furthermore, there may be a combination of the above types, such as private chain + federation chain, federation chain + public chain, and so on.
Among them, the most decentralized is the public chain. The public chain is represented by bitcoin and ether house, and participants (also called nodes in the block chain) joining the public chain can read data records on the chain, participate in transactions, compete for accounting rights of new blocks, and the like. Moreover, each node can freely join or leave the network and perform related operations.
Private chains are the opposite, with the network's write rights controlled by an organization or organization and the data read rights specified by the organization. Briefly, a private chain may be a weakly centralized system with strict restrictions on nodes and a small number of nodes. This type of blockchain is more suitable for use within a particular establishment.
A federation chain is a block chain between a public chain and a private chain, and "partial decentralization" can be achieved. Each node in a federation chain typically has a physical organization or organization corresponding to it; the nodes are authorized to join the network and form a benefit-related alliance, and block chain operation is maintained together.
Based on the basic characteristics of a blockchain, a blockchain is usually composed of several blocks. The time stamps corresponding to the creation time of the block are recorded in the blocks respectively, and all the blocks form a time-ordered data chain according to the time stamps recorded in the blocks strictly.
In the field of blockchain, an important concept is Account (Account); taking an ether house as an example, the ether house generally divides an account into an external account and a contract account; the external account is an account directly controlled by the user and is also called as a user account; the contract account is created by the user through an external account, and the account containing the contract code is a Smart contract (Smart contract).
In practical applications, an intelligent contract on a blockchain is a contract that can be executed on the blockchain triggered by a transaction. An intelligent contract may be defined in the form of code.
Taking an Etherhouse as an example, a user is supported to create and call some complex logic in the Etherhouse network. The ethernet workshop is used as a programmable block chain, and the core of the ethernet workshop is an ethernet workshop virtual machine (EVM), and each ethernet workshop node can run the EVM. The EVM is a well-behaved virtual machine through which various complex logic can be implemented. The user issuing and invoking smart contracts in the etherhouse is running on the EVM. In fact, the EVM directly runs virtual machine code (virtual machine bytecode, hereinafter referred to as "bytecode"), so the intelligent contract deployed on the blockchain may be bytecode. After Bob sends a Transaction (Transaction) containing information to create a smart contract to the ethernet network, each node can execute the Transaction in the EVM, as shown in fig. 1. In fig. 1, the From field of the transaction is used To record the address of the account initiating the creation of the intelligent contract, the contract code stored in the field value of the Data field of the transaction may be byte code, and the field value of the To field of the transaction is a null account. After the nodes reach the agreement through the consensus mechanism, the intelligent contract is successfully created, and the follow-up user can call the intelligent contract.
After the intelligent contract is established, a contract account corresponding to the intelligent contract appears on the block chain, and the block chain has a specific contract address; the contract Code (Code) and account store (Storage) will be maintained in the account store for that contract account. The behavior of the intelligent contract is controlled by the contract code, while the account storage of the intelligent contract preserves the state of the contract. In other words, the intelligent contract causes a virtual account to be generated on the blockchain that contains the contract code and account storage.
As shown in FIG. 2, still taking the Etherhouse as an example, after Bob sends a transaction containing the information of the calling intelligent contract to the Etherhouse network, each node can execute the transaction in the EVM. In fig. 2, the From field of the transaction is used To record the address of the account initiating the intelligent contract invocation, the To field is used To record the address of the intelligent contract invocation, and the Data field of the transaction is used To record the method and parameters of the intelligent contract invocation. The intelligent contract can be independently executed at each node in the blockchain network in a specified mode, and all execution records and data are stored on the blockchain, so that after the transaction is executed, transaction certificates which cannot be tampered and lost are stored on the blockchain.
The intelligent contracts deployed on the blockchains can only reference data contents stored on the blockchains generally; in practical applications, for some complex business scenarios implemented based on the intelligent contract technology, the intelligent contract may need to refer to some external data on the data entities outside the chain.
The event mechanism of the intelligent contract is a mode for the interaction between the intelligent contract and the out-of-chain entity. For intelligent contracts deployed on blockchains, direct interaction with out-of-chain entities is generally not possible; for example, the intelligent contract cannot generally send the call result of the intelligent contract to the call initiator of the intelligent contract point to point after the call is completed.
The call results (including intermediate results and final call results) generated during the call of the intelligent contract are usually recorded in the form of events (events) to the transaction log (transactions logs) of the transaction that called the intelligent contract, and stored in the memory space of the node device. The entity outside the chain which needs to interact with the intelligent contract can acquire the calling result of the intelligent contract by monitoring the transaction log stored in the storage space of the node equipment;
for example, in the case of an Etherhouse, the transaction log will eventually be stored in the MPT receipt tree described above as part of the receipt (receipt) of the transaction pen transaction that invoked the smart contract. And the entity outside the chain interacting with the intelligent contract can monitor the transaction receipts stored in the storage space of the node device on the MPT receipt tree and acquire the events generated by the intelligent contract from the monitored transaction receipts.
Referring to fig. 3, fig. 3 is a flowchart illustrating a method for handling block chain-based infringement according to an exemplary embodiment. The blockchain may be a federation chain constructed together of different work platforms as blockchain nodes. In particular, the method may comprise the steps of:
step 310, receiving a first call transaction aiming at infringing works; the first calling transaction comprises a first identification of a creative work of original authentication, a second identification of the infringing work and a third identification of a work platform for issuing the infringing work.
When an original author or any user finds that a certain original work is suspected of infringing, a first calling transaction can be initiated to the blockchain through respective clients, and the first calling transaction can comprise a first identifier of the original work, a second identifier of the suspected infringing work (called infringing work) and a third identifier of a work platform where the infringing work is located.
The real data generated by the physical world can be constructed into a standard transaction (transaction) format supported by a block chain, then is issued to the block chain, the node equipment in the block chain performs consensus processing on the received transaction, and after the consensus is achieved, the node equipment serving as an accounting node in the block chain packs the transaction into a block and performs persistent evidence storage in the block chain.
When the block chain adopts a consensus algorithm, the accounting nodes of the round can pack the received transactions to generate candidate blocks, and send the generated candidate blocks or block headers of the candidate blocks to other node devices for consensus verification. If no problem is verified after the other node device receives the candidate block or the block header of the candidate block, the candidate block can be added to the end of the original block chain as the latest block, thereby completing the accounting process of the block chain. The transaction contained in the block may also be performed by other nodes in verifying the new block or block header sent by the accounting node.
Step 320, in response to the first invoking transaction, invoking infringement identification logic declared in an intelligent contract issued in the blockchain, obtaining a creative work corresponding to the first identifier from the blockchain, and obtaining an infringement work corresponding to the second identifier from a work platform corresponding to a third identifier; and determining whether the infringing work infringes the creative work.
After receiving a first call transaction, a node device of a blockchain responds to the first call transaction and calls infringement identification logic declared in an intelligent contract issued in the blockchain: it is first necessary to acquire these two pieces of works and then judge whether or not infringement is made based on the contents of the two pieces of works.
Since the block chain has the original works, the node device can directly inquire the original works corresponding to the first identifier from the block chain. If not, a message that the original work cannot be inquired is returned to the initiator of the first invoking transaction so that the initiator can provide the correct first identification again.
In addition, the node device may further determine a corresponding work platform based on the third identifier, so as to obtain an infringement work corresponding to the second identifier from the work platform. Similarly, if the corresponding work platform or infringed work cannot be inquired by the third identifier or the second identifier, a message that the work platform or the infringed work cannot be inquired is returned to the initiator of the first invoking transaction, so that the initiator provides the correct second identifier or third identifier again.
After the original work and the infringement work are obtained, the node equipment can judge whether the infringement work infringes the original work or not. Specifically, it is first necessary to determine whether the release date of the creative work is earlier than the release date of the infringing work; if not, the infringing work is released earlier than the original work, and the infringing behavior is not possible.
If yes, showing that the infringed work is released later than the original work, and further calculating the similarity between the infringed work and the original work; and when the similarity exceeds a threshold value, determining that the infringing work infringes the original work.
In this embodiment, the blockchain may perform duplication checking to calculate the similarity between the infringed work and the original work. In addition, the block chain can also calculate the similarity by means of a third-party organization or a manual review mode. If the similarity exceeds the threshold value, the infringing work infringes the right of the original work; if the similarity does not exceed the threshold, the infringing work is not infringed on the original work.
Step 330, if the infringing work infringes the original work, further invoking an infringing processing logic of the intelligent contract to generate an infringing processing instruction for the work platform corresponding to the third identifier, so that the work platform displays author information of the original work on a page of the infringing work after acquiring the infringing processing instruction.
And aiming at the identified infringement works, the intelligent contract can generate infringement processing, and after the work platform corresponding to the third identification obtains the infringement processing instruction, the author information of the original works is displayed on the page of the infringement works.
The author information here may include various information that can identify the original author or the original work, such as the name of the original author, the homepage of the original author, a link of the original work, and the like, and this specification does not limit it.
In an embodiment, the node device of the blockchain may further include the calculated similarity in generating the creative instruction for the work platform issuing the authenticated creative work; correspondingly, the similarity with the original works can be displayed on the page of the infringed works. Thus, the infringement degree of the infringed work is visually displayed.
Through the embodiment, based on the block chain technology, different work platforms are used as block chain nodes to jointly construct the block chain, and original works issued by the work platforms are stored in the block chain. After the original author finds the infringing work, the right-maintaining can be initiated to the block chain; and judging whether the infringement work is infringed or not by the block chain based on the certified original work, and generating an infringement processing instruction aiming at a work platform for issuing the infringement work so that the work platform displays author information of the original work on a page of the infringement work. Therefore, cross-platform infringement tracing and quick right maintenance can be realized. The method is beneficial to protecting the rights and interests of original authors and attacking cross-platform infringement behaviors.
It is worth mentioning that the method further comprises:
further calling an infringement processing logic of the intelligent contract to generate an infringement processing event aiming at the work platform corresponding to the third identifier, so that the server side sends an infringement processing instruction to the work platform corresponding to the third identifier when acquiring the infringement processing event; or when the infringement processing event is acquired, an event notification program carried by the block chain node equipment sends an infringement processing instruction to a work platform corresponding to the third identifier.
The service end comprises a block chain as a service (BaaS) platform; the event notification program comprises the SDK loaded by the block chain node equipment.
In an implementation manner, the BaaS platform may synchronize blocks of the block chain in a block pulling obtaining manner to obtain an infringement processing event recorded in the block, and then send an infringement processing instruction to the work platform corresponding to the third identifier. In another mode, the node device is based on a mounted event notification program, and after monitoring an infringement processing event, the event notification program sends an infringement processing instruction to a work platform corresponding to the third identifier.
In this embodiment, the BaaS platform is an intermediate system located between the client and the blockchain, and the client is not directly connected to the blockchain or directly interacts with the blockchain, but implements data interaction through the BaaS platform.
In this specification, the block chain has a creative work certified by the original. As previously mentioned, the blockchain of the present specification also has the capability of cross-platform certification of creative works.
The following describes an example of authentication of a creative work:
receiving a second calling transaction initiated by the original author; wherein the second invoking transaction comprises a work to be authenticated;
responding to the second calling transaction, calling original authentication logic declared in an intelligent contract issued in the block chain, and determining whether the works to be authenticated are original works;
and if the work to be authenticated is the original work, determining the work to be authenticated as the authenticated original work and storing the authenticated original work in the block chain.
In this embodiment, after the creative author has created the work, the work may be published to the blockchain in the form of a second call transaction.
After receiving the second call transaction, the node device of the blockchain may call an original authentication logic declared in an intelligent contract issued with the blockchain, and determine whether the work to be authenticated is original. And if the authentication is passed (the work to be authenticated is determined to be original), storing the work to be authenticated as the original work to the block chain. In addition, when the original creation is authenticated, a certain authentication deposit can be charged to the author. If the authentication passes, returning the authentication deposit; and if the authentication is not passed, the deposit is withheld.
In an embodiment, the originality authentication logic further comprises:
and generating a copyright certificate with a unique identifier aiming at the authenticated original works.
In this embodiment, for a work authenticated by originality, a copyright certificate having a unique identifier may be generated for the work.
The unique identification comprises a hash value calculated based on the content of the authenticated original works.
The content of the work can refer to keyword information, subject names and the like of original works or characteristic values extracted based on the content of the work; such as picture features, video features, music features, etc., which are not limited by this specification.
And calculating the content of the work by using a preset hash algorithm (hash algorithm) so as to obtain a hash value. The hash algorithm can map the input data with any length to output a hash value with a fixed length, and the calculated output data has a large difference according to different input data, so that the hash value can be considered to have uniqueness.
In an embodiment, the originality authentication logic further comprises:
and generating an original instruction aiming at a work platform for issuing the authenticated original work, so that after the work platform acquires the original instruction, the page of the authenticated original work displays block chain authentication information on the work platform.
In this embodiment, after the blockchain authenticates the creative work, the work platform that issues the creative work may display blockchain authentication information on a page of the creative work at the first time. The blockchain authentication information may refer to an identifier indicating an original; such as an icon representing the original. Alternatively, the authentication information may carry an identification of the originator's name.
In addition, the blockchain authentication information may also carry a blockchain query link (the link includes a first identifier of the creative work), and when the browser clicks the blockchain authentication information, a request for querying the blockchain may be triggered, so as to obtain the corresponding creative information of the creative work (queried by the first identifier) that is certified on the blockchain from the blockchain. The originality information may include originality author information, release date, copyright certificate, and the like.
In this specification, in the original authentication logic, determining whether the work to be authenticated is an original work may specifically include:
calculating the similarity between the work to be authenticated and the original work with the evidence stored in the block chain;
when the similarity is smaller than the threshold value, determining the works to be authenticated as original works;
and when any similarity reaches a threshold value, determining that the work to be authenticated is not the original work.
In this embodiment, the blockchain may perform duplication checking to calculate similarities between the works to be authenticated and all creative works. In addition, the block chain can also calculate the similarity by means of a third-party organization or a manual review mode. If the similarity exceeds the threshold value, the infringing work infringes the right of the original work; if the similarity does not exceed the threshold, the infringing work is not infringed on the original work.
Through the embodiment, the block chain can authenticate the original works and verify the original works; for subsequent use as evidence in infringement determination.
The specification also provides a punishment mechanism on the basis of the figure 3, wherein the punishment mechanism comprises punishment requirements initiated by an original author or punishment rules automatically triggered by a platform.
The following introduces an embodiment of the penalty requirement initiated by the originator:
after the blockchain determines that the infringing work infringes the original work, an original author can further initiate a deletion transaction aiming at the infringing work to the blockchain;
after receiving the deletion transaction, the node device of the block chain may respond to the deletion transaction initiated by the original author, invoke infringement processing logic declared in the intelligent contract issued in the block chain, and generate a deletion instruction for the work platform corresponding to the third identifier, so that the work platform deletes the infringement work issued on the platform after acquiring the deletion instruction.
The embodiment provides a condition of deleting the infringed work initiated by an original author so as to realize cross-platform maintenance and delete the infringed work from the platform.
The following introduces the punishment rule embodiment of the automatic triggering of the production platform:
after the work platform obtains the infringement processing instruction, the infringement work can be automatically processed based on the punishment rule defined by the platform. Such as deleting an infringing work, adding a fine to an infringing author corresponding to the infringing work, short-term cover numbers (making an infringing author account unavailable in a short term), shielding works (shielding all works of the infringing author within a preset time period), logging off the infringing author account, and the like. Thus, the warning function is achieved through the punishment rule.
Please refer to fig. 4 for a schematic diagram of a multi-party interaction combining the above embodiments. The multiple parties include a client, a server, a blockchain, and a production platform. And examples such as original work authentication, infringement processing, infringement punishment and the like are realized through the multi-party interaction.
Firstly, original work authentication is introduced:
step 1.1: the client initiates an original authentication request.
After the original author creates the works, the original authentication request carrying the works can be sent to the server side through the client side.
Step 1.2: the server initiates a second invocation transaction to the blockchain based on the original authentication request.
The server (e.g., the aforementioned BaaS platform) publishes the work to the blockchain in the form of a second invocation transaction.
Step 1.3: and after receiving a second call transaction, the node equipment of the block chain responds to the second call transaction, calls an original authentication logic declared in the intelligent contract issued in the block chain, and determines whether the work to be authenticated is the original work.
After receiving the second call transaction, the node device of the blockchain may call an original authentication logic declared in an intelligent contract issued with the blockchain, and determine whether the work to be authenticated is original.
Step 1.4.1: and if the work to be authenticated is the original work, the node equipment determines the work to be authenticated as the authenticated original work and verifies the authenticated original work in the block chain.
And if the authentication is passed (the work to be authenticated is determined to be original), storing the work to be authenticated as the original work to the block chain.
Step 1.4.2: and generating a copyright certificate with a unique identifier aiming at the authenticated original works.
Step 1.4.3: generating creative instructions for a work platform that issues the authenticated creative work.
And step 1.5, displaying the block chain authentication information on the page of the original work by the work platform after the original instruction is obtained.
And performing original authentication on the original works through the block chain, and storing the original works passing the original authentication into the block chain. The certified original work can be used as evidence for subsequent infringement judgment.
Infringement processing is next introduced:
and 2.1, the client initiates an infringement processing request.
When an original author or any user finds that a certain original work is suspected of infringing, an infringing processing request can be sent to a server side through respective client sides. The request carries a first identifier of a creative work, a second identifier of a suspected infringement work (called an infringement work) and a third identifier of a work platform where the infringement work is located.
And 2.2, the server initiates a first calling transaction to the block chain based on the infringement processing request.
And the server side issues the first identifier, the second identifier and the third identifier to the blockchain in the form of the first call transaction.
Step 2.3, after receiving a first calling transaction, the node equipment of the block chain responds to the first calling transaction, calls infringement identification logic declared in an intelligent contract issued in the block chain, acquires original works corresponding to the first identifier from the block chain, and acquires infringement works corresponding to the second identifier from a work platform corresponding to a third identifier; and determining whether the infringing work infringes the creative work.
And 2.4, if the infringing works infringe the original works, the node equipment further calls an infringing processing logic of an intelligent contract to generate an infringing processing instruction aiming at the work platform corresponding to the third identification.
And 2.5, after the work platform obtains the infringement processing instruction, displaying author information of the original work on a page of the infringement work.
Judging whether the infringement work is infringed or not based on the credited original work through the block chain, and generating an infringement processing instruction aiming at a work platform for issuing the infringement work so that the work platform displays author information of the original work on a page of the infringement work. Therefore, cross-platform infringement tracing and quick right maintenance can be realized. The method is beneficial to protecting the rights and interests of original authors and attacking cross-platform infringement behaviors.
The infringement penalty is further introduced below:
and 3.1, the client side initiates a deletion request.
The original author can send a deletion request for the infringing work to the server side through the client side.
And 3.2, the server initiates a third calling transaction to the block chain based on the deletion request.
And the server side issues the second identification of the infringing work to the blockchain in the form of a third call transaction.
And 3.3, after receiving a third calling transaction, the node equipment of the block chain responds to the third calling transaction, calls infringement processing logic declared in the intelligent contract, and generates a deletion instruction aiming at the work platform corresponding to the third identification.
And 3.4, deleting the infringement work issued on the platform after the work platform obtains the deletion instruction.
And generating a deletion instruction aiming at the work platform corresponding to the third identifier through a block chain, so that the work platform deletes the infringement operation issued on the platform after acquiring the deletion instruction. Therefore, cross-platform right maintenance can be realized, and infringement works can be deleted from the platform.
Corresponding to the above method embodiments, the present specification further provides an embodiment of an infringement processing apparatus based on a block chain.
The embodiment of the block chain-based infringement processing apparatus according to the present specification may be applied to an electronic device. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. Taking a software implementation as an example, as a logical device, the device is formed by reading, by a processor of the electronic device where the device is located, a corresponding computer program instruction in the nonvolatile memory into the memory for operation.
From a hardware aspect, as shown in fig. 5, the hardware structure diagram of an electronic device in which an infringement processing apparatus based on a block chain according to this specification is located is shown, except for the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 5, the electronic device in which the apparatus is located in the embodiment may also include other hardware according to an actual function of the electronic device, which is not described again.
Fig. 6 is a block diagram of an infringement processing apparatus based on a block chain according to an exemplary embodiment of the present disclosure, where the infringement processing apparatus based on a block chain may be applied to the electronic device shown in fig. 5.
The block chain is constructed by taking different work platforms as block chain nodes together, and original works which are subjected to original authentication are stored in the block chain. Specifically, the apparatus comprises:
a transaction receiving unit 410 that receives a first invoked transaction for an infringing work; the first calling transaction comprises a first identification of a creative work of original authentication, a second identification of the infringing work and a third identification of a work platform for issuing the infringing work;
the infringement identification unit 420 is used for responding to the first calling transaction, calling infringement identification logic declared in an intelligent contract issued in the block chain, acquiring original works corresponding to the first identifier from the block chain, and acquiring infringement works corresponding to the second identifier from a work platform corresponding to a third identifier; determining whether the infringing work infringes the original work;
and an infringement processing unit 430, if the infringed work infringes the original work, further calling an infringement processing logic of the intelligent contract, and generating an infringement processing instruction for the work platform corresponding to the third identifier, so that after the work platform acquires the infringement processing instruction, the author information of the original work is displayed on a page of the infringed work.
Optionally, the creative work is subjected to creative authentication through the following subunits:
the receiving subunit receives a second call transaction initiated by the user; wherein the second invoking transaction comprises a creative work to be authenticated;
the authentication subunit is used for responding to the second calling transaction, calling the original authentication logic declared in the intelligent contract issued in the block chain, and determining whether the work to be authenticated is the original work; and if the work to be authenticated is the original work, determining the work to be authenticated as the authenticated original work and storing the authenticated original work in the block chain.
Optionally, the original authentication logic in the authentication subunit further includes:
and generating a copyright certificate with a unique identifier aiming at the authenticated original works.
Optionally, the unique identifier includes a hash value calculated based on the content of the authenticated original work.
Optionally, the original authentication logic in the authentication subunit further includes:
and generating an original instruction aiming at a work platform for issuing the authenticated original work, so that after the work platform acquires the original instruction, the page of the authenticated original work displays block chain authentication information on the work platform.
Optionally, in the infringement identification unit 420, determining whether the infringed work infringes the creative work includes:
calculating the similarity between the infringed work and the original work; and when the similarity exceeds a threshold value, determining that the infringing work infringes the original work.
Optionally, in the infringement processing unit 430, displaying the author information of the creative work on a page of the infringement work, where the displaying includes:
and displaying the similarity of the infringed work and the original work on a page of the infringed work.
Optionally, the apparatus further comprises:
and the work deleting subunit is used for responding to a deleting transaction initiated by an original author, calling an infringement processing logic declared in the intelligent contract issued in the block chain, and generating a deleting instruction aiming at the work platform corresponding to the third identifier, so that the work platform deletes the infringement work issued on the platform after acquiring the deleting instruction.
Optionally, the author information includes a link to the creative work.
Optionally, the blockchain is a federation chain constructed by using different work platforms as blockchain nodes.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
In a typical configuration, a computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic disk storage, quantum memory, graphene-based storage media or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may also be possible or may be advantageous.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in one or more embodiments of the present description to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of one or more embodiments herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The above description is only for the purpose of illustrating the preferred embodiments of the one or more embodiments of the present disclosure, and is not intended to limit the scope of the one or more embodiments of the present disclosure, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the one or more embodiments of the present disclosure should be included in the scope of the one or more embodiments of the present disclosure.

Claims (21)

1. An infringement processing method based on a block chain is characterized in that the block chain is constructed by taking different work platforms as block chain nodes together, and original works subjected to original authentication are stored in the block chain; the method comprises the following steps:
receiving a first invoked transaction for an infringing work; the first calling transaction comprises a first identification of a creative work of original authentication, a second identification of the infringing work and a third identification of a work platform for issuing the infringing work;
responding to the first calling transaction, calling infringement identification logic declared in an intelligent contract issued in the block chain, and acquiring a creative work corresponding to the first identifier from the block chain and acquiring an infringement work corresponding to the second identifier from a work platform corresponding to a third identifier; determining whether the infringing work infringes the original work;
if the infringement works infringe the original works, further calling infringement processing logic of the intelligent contract, and generating infringement processing instructions aiming at the work platform corresponding to the third identification, so that after the work platform obtains the infringement processing instructions, author information of the original works is displayed on a page of the infringement works.
2. The method of claim 1, the creative work being originatively authenticated by:
receiving a second calling transaction initiated by the original author; wherein the second invoking transaction comprises a work to be authenticated;
responding to the second calling transaction, calling original authentication logic declared in an intelligent contract issued in the block chain, and determining whether the works to be authenticated are original works;
and if the work to be authenticated is the original work, determining the work to be authenticated as the authenticated original work and storing the authenticated original work in the block chain.
3. The method of claim 2, the originality authentication logic further comprising:
and generating a copyright certificate with a unique identifier aiming at the authenticated original works.
4. The method of claim 3, the unique identification comprising a hash value calculated based on the content of the work of the authenticated creative work.
5. The method of claim 1, the originality authentication logic further comprising:
and generating an original instruction aiming at a work platform for issuing the authenticated original work, so that after the work platform acquires the original instruction, the page of the authenticated original work displays block chain authentication information on the work platform.
6. The method of claim 1, the determining whether the infringing work infringes the creative work, comprising:
calculating the similarity between the infringed work and the original work;
and when the similarity exceeds a threshold value, determining that the infringing work infringes the original work.
7. The method of claim 6, the displaying author information of the creative work on a page of the infringing work, comprising:
and displaying the similarity of the infringed work and the original work on a page of the infringed work.
8. The method of claim 1, further comprising:
and responding to a deletion transaction initiated by an original author, calling an infringement processing logic declared in an intelligent contract issued in the block chain, and generating a deletion instruction aiming at the work platform corresponding to the third identifier, so that the work platform deletes the infringed work issued on the platform after acquiring the deletion instruction.
9. The method of claim 1, the author information comprising a link to a creative work.
10. The method of claim 1, the blockchain being a federation chain constructed together as blockchain nodes for different work platforms.
11. An infringement processing device based on a block chain is characterized in that the block chain is constructed by taking different work platforms as block chain nodes together, and original works subjected to original authentication are stored in the block chain; the device comprises:
the transaction receiving unit is used for receiving a first calling transaction aiming at infringing works; the first calling transaction comprises a first identification of a creative work of original authentication, a second identification of the infringing work and a third identification of a work platform for issuing the infringing work;
the infringement identification unit is used for responding to the first calling transaction, calling an infringement identification logic declared in an intelligent contract issued in the block chain, acquiring the original works corresponding to the first identification from the block chain, and acquiring the infringement works corresponding to the second identification from a work platform corresponding to a third identification; determining whether the infringing work infringes the original work;
and the infringement processing unit is used for further calling the infringement processing logic of the intelligent contract to generate an infringement processing instruction aiming at the work platform corresponding to the third identifier if the infringed work infringes the original work, so that the author information of the original work is displayed on a page of the infringement work after the work platform acquires the infringement processing instruction.
12. The apparatus of claim 11, said creative work being originatively authenticated by the following subunits:
the receiving subunit receives a second call transaction initiated by the user; wherein the second invoking transaction comprises a creative work to be authenticated;
the authentication subunit is used for responding to the second calling transaction, calling the original authentication logic declared in the intelligent contract issued in the block chain, and determining whether the work to be authenticated is the original work; and if the work to be authenticated is the original work, determining the work to be authenticated as the authenticated original work and storing the authenticated original work in the block chain.
13. The apparatus of claim 12, the originality authentication logic further comprising:
and generating a copyright certificate with a unique identifier aiming at the authenticated original works.
14. The apparatus of claim 13, the unique identification comprising a hash value calculated based on the content of the work of the authenticated creative work.
15. The apparatus of claim 11, the originality authentication logic further comprising:
and generating an original instruction aiming at a work platform for issuing the authenticated original work, so that after the work platform acquires the original instruction, the page of the authenticated original work displays block chain authentication information on the work platform.
16. The apparatus of claim 11, the determining whether the infringing work infringes the creative work, comprising:
calculating the similarity between the infringed work and the original work; and when the similarity exceeds a threshold value, determining that the infringing work infringes the original work.
17. The apparatus of claim 16, the displaying author information of the creative work on a page of the infringing work, comprising:
and displaying the similarity of the infringed work and the original work on a page of the infringed work.
18. The apparatus of claim 11, the apparatus further comprising:
and the work deleting subunit is used for responding to a deleting transaction initiated by an original author, calling an infringement processing logic declared in the intelligent contract issued in the block chain, and generating a deleting instruction aiming at the work platform corresponding to the third identifier, so that the work platform deletes the infringement work issued on the platform after acquiring the deleting instruction.
19. The apparatus of claim 11, the author information comprising a link to a creative work.
20. The apparatus of claim 11, the blockchain is a federation chain constructed together as blockchain nodes for different work platforms.
21. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor implements the method of any one of claims 1-10 by executing the executable instructions.
CN202110113242.1A 2021-01-27 2021-01-27 Infringement processing method and device based on block chain and electronic equipment Pending CN112434264A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110113242.1A CN112434264A (en) 2021-01-27 2021-01-27 Infringement processing method and device based on block chain and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110113242.1A CN112434264A (en) 2021-01-27 2021-01-27 Infringement processing method and device based on block chain and electronic equipment

Publications (1)

Publication Number Publication Date
CN112434264A true CN112434264A (en) 2021-03-02

Family

ID=74697323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110113242.1A Pending CN112434264A (en) 2021-01-27 2021-01-27 Infringement processing method and device based on block chain and electronic equipment

Country Status (1)

Country Link
CN (1) CN112434264A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114492373A (en) * 2022-04-07 2022-05-13 中国信息通信研究院 Method and device for judging infringement of works based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110728592A (en) * 2018-07-17 2020-01-24 阿里巴巴集团控股有限公司 Copyright monitoring method, copyright query method, system and equipment
CN111476667A (en) * 2020-06-24 2020-07-31 支付宝(杭州)信息技术有限公司 Block chain-based original work transaction method and device and electronic equipment
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110728592A (en) * 2018-07-17 2020-01-24 阿里巴巴集团控股有限公司 Copyright monitoring method, copyright query method, system and equipment
CN111476667A (en) * 2020-06-24 2020-07-31 支付宝(杭州)信息技术有限公司 Block chain-based original work transaction method and device and electronic equipment
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114492373A (en) * 2022-04-07 2022-05-13 中国信息通信研究院 Method and device for judging infringement of works based on block chain

Similar Documents

Publication Publication Date Title
TWI762818B (en) Blockchain-based invoice creation method and device, electronic device
CN112491551B (en) Data verification method and device based on block chain and electronic equipment
CN110059495B (en) Data sharing method, device and system and electronic equipment
CN108848119B (en) Cross-block-chain interaction method, device, system and electronic equipment
CN108182581B (en) Accounting method and device for block chain
CN110472201B (en) Text similarity detection method and device based on block chain and electronic equipment
CN110046998B (en) Cross-chain right using system, method, device, electronic equipment and storage medium
WO2021143497A1 (en) Infringement evidence storage method, apparatus, and device based on evidence storage blockchain
US20190207770A1 (en) Methods for access control of contract data in a distributed system with distributed consensus and contract generator and validation server thereof
TWI706282B (en) Method and device for concealing transactions written in blockchain, blockchain system, and computer equipment
CN112101938B (en) Digital seal using method and device based on block chain and electronic equipment
CN111079101B (en) Method and device for obtaining evidence of infringement based on block chain, electronic equipment and storage medium
CN110569281A (en) Block chain transaction query method and system
CN110020854B (en) Data evidence storage method and system based on multiple block chain networks
CN110020945B (en) Data reading method and system based on multiple block chain networks
EP3812997B1 (en) Blockchain-based data processing method and apparatus, and server
CN110060153B (en) Data evidence storage method and system based on multiple block chain networks
CN113327165A (en) Transaction method based on block chain
TW202018620A (en) Method and device for reading blockchain data
CN110032846B (en) Identity data anti-misuse method and device and electronic equipment
CN112446450A (en) Entity article ownership management method and device based on block chain and electronic equipment
CN113220717B (en) Block chain-based data verification method and device and electronic equipment
CN112434264A (en) Infringement processing method and device based on block chain and electronic equipment
CN110033367A (en) Based on the contract record method and device of block chain, electronic equipment
CN113542405A (en) Block chain-based network communication system, method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210302

RJ01 Rejection of invention patent application after publication