CN114598699B - File content auditing method and device and electronic equipment - Google Patents

File content auditing method and device and electronic equipment Download PDF

Info

Publication number
CN114598699B
CN114598699B CN202011435689.2A CN202011435689A CN114598699B CN 114598699 B CN114598699 B CN 114598699B CN 202011435689 A CN202011435689 A CN 202011435689A CN 114598699 B CN114598699 B CN 114598699B
Authority
CN
China
Prior art keywords
check
characteristic information
content characteristic
node
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011435689.2A
Other languages
Chinese (zh)
Other versions
CN114598699A (en
Inventor
张乃光
沈阳
王磊
郭沛宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Research Institute Of Radio And Television Science State Administration Of Radio And Television
Original Assignee
Research Institute Of Radio And Television Science State Administration Of Radio And Television
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research Institute Of Radio And Television Science State Administration Of Radio And Television filed Critical Research Institute Of Radio And Television Science State Administration Of Radio And Television
Publication of CN114598699A publication Critical patent/CN114598699A/en
Application granted granted Critical
Publication of CN114598699B publication Critical patent/CN114598699B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a file content auditing method, a device and electronic equipment, wherein the method is applied to a blockchain network, the blockchain network comprises auditing nodes, computing nodes and checking nodes, and the method comprises the following steps: under the condition that the first check node receives the file, extracting content characteristic information of the file and broadcasting a query message; wherein, the inquiry message at least carries content characteristic information; the first computing node receives the inquiry message, matches the content characteristic information, obtains target content characteristic information and broadcasts the check message; wherein, the checking information at least carries content characteristic information and target content characteristic information; the first check node receives the check message, and checks the target content characteristic information and the content characteristic information according to the set check item to obtain a check result; and the first check node determines that the content of the file is illegal under the condition that the check result indicates that the target content characteristic information and the content characteristic information pass through the check item.

Description

File content auditing method and device and electronic equipment
Technical Field
The disclosure relates to the field of distributed technologies, and in particular, to a file content auditing method, a file content auditing device and electronic equipment.
Background
At present, in the fields of broadcast television and network audio-visual, as the illegal contents found by each broadcast television and network audio-visual mechanism have differences in terms of content coding format, content style and the like under the condition of consistent content semantics, the broadcast television and the network audio-visual mechanism can have the condition of repeatedly auditing the illegal contents, and here, all parties in the industry are urgently required to commonly establish a trusted sharing mechanism for auditing the contents, so that industry co-control of the illegal contents is realized, the auditing cost is reduced, and the auditing efficiency of the illegal contents is improved.
Disclosure of Invention
An object of an embodiment of the present disclosure is to provide a new technical solution for auditing file contents.
According to a first aspect of the present disclosure, there is provided a file content auditing method applied to a blockchain network including an auditing node, a computing node, and a checking node, including:
under the condition that the first check node receives the file, extracting content characteristic information of the file and broadcasting a query message; wherein, the inquiry message at least carries the content characteristic information;
the first computing node receives the query message, matches the content characteristic information, obtains target content characteristic information, and broadcasts a check message; wherein, the verification message at least carries the content characteristic information and the target content characteristic information;
The first check node receives the check message, and checks the target content characteristic information and the content characteristic information according to a set check item to obtain a check result; the method comprises the steps of,
and the first check node determines that the content of the file is illegal content under the condition that the check result indicates that the target content characteristic information and the content characteristic information pass through the check item.
Optionally, the blockchain network further includes a management node,
the first audit node extracts content characteristic information of the file and broadcasts a query message under the condition that the file is received, and the method comprises the following steps:
acquiring a feature extraction algorithm and a first broadcast address configured by the management node;
extracting content characteristic information of the file based on the characteristic extraction algorithm;
and broadcasting a query message through the first broadcast address.
Optionally, the first computing node receives the query message, matches the content feature information, obtains target content feature information, and broadcasts a check message, including:
acquiring a feature matching algorithm and a second broadcast address configured by the management node;
Calculating the similarity of the content characteristic information and the content characteristic information stored locally by the first computing node based on the characteristic matching algorithm;
obtaining the target content feature information from the content feature information stored locally at the first computing node according to the descending order of the similarity;
broadcasting the check message through the second broadcast address.
Optionally, the set check item includes a check item on whether the target content feature information and the content feature information are authentic.
Optionally, the first check node receives the check message, and checks the target content feature information and the content feature information according to a set check item to obtain a check result, including:
the first check node executing the check item against the target content feature data and the content feature data upon receipt of the check message;
the first check node initiates a check request to other check nodes of the blockchain network under the condition that the target content feature and the content feature pass through the check item so as to execute the check item on the target feature information and the feature information by the other check nodes; wherein, the verification request at least carries the content characteristic information and the target content characteristic information;
And under the condition that the first check node receives check passing messages returned by at least two other check nodes in response to the check request, acquiring the target content characteristic information and a check result of the content characteristic information passing the check item.
Optionally, the method further comprises:
and the first check node checks whether the content of the file meets the set requirement or not by the first check node under the condition that the check result indicates that the target content characteristic information and the content characteristic information do not pass through the check item, and a content check result is obtained.
Optionally, the method further comprises:
the first audit node acquires a third broadcast address configured by the management node; the method comprises the steps of,
and the first auditing node broadcasts the content auditing result through the third broadcasting address.
Optionally, before said broadcasting the query message, further comprising:
the first audit node acquires a digital certificate of the first audit node configured by the management node;
and the first check node uses the digital certificate to digitally identify the query message and then broadcasts the query message.
According to a second aspect of the present disclosure, there is also provided a file content auditing apparatus applied to a blockchain network including an auditing node, a computing node, and a checking node, including:
the auditing module is used for extracting the content characteristic information of the file and broadcasting inquiry information under the condition that the first auditing node receives the file; wherein, the inquiry message at least carries the content characteristic information;
the matching module is used for receiving the query message by the first computing node, matching the content characteristic information, obtaining target content characteristic information and broadcasting a check message; wherein, the verification message at least carries the content characteristic information and the target content characteristic information;
the verification module is used for receiving the verification information by the first verification node, and verifying the target content characteristic information and the content characteristic information according to a set verification item to obtain a verification result; the method comprises the steps of,
and the determining module is used for determining that the content of the file is illegal when the first check node indicates that the target content characteristic information and the content characteristic information pass the check item.
According to a third aspect of the present disclosure, there is also provided an electronic device, which includes the document content auditing apparatus according to the second aspect of the present disclosure; alternatively, the system comprises a memory for storing executable instructions and a processor; the processor is configured to operate in accordance with control of the instructions to perform the method as described in the first aspect of the disclosure.
The method, the device and the electronic equipment have the advantages that according to the embodiment of the disclosure, the blockchain network comprises the auditing node, the checking node and the computing node, after the auditing node broadcasts the query message carrying the content characteristic information of the file, the computing node can search the target content characteristic information matched with the content characteristic information, and the checking node further checks the target content characteristic information and the content characteristic information, so that the content of the file is determined to be illegal content under the condition that the checking is passed, namely, the sharing of illegal content information which is audited and found by all auditing nodes is realized through the intelligent distributed auditing network, repeated auditing of illegal content by all auditing nodes is avoided, and auditing cost is reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a schematic diagram of a hardware architecture of an electronic device according to an embodiment of the present disclosure;
FIG. 2 is a flow diagram of a method for auditing content of a file according to an embodiment of the present disclosure;
FIG. 3 is a functional block diagram of a blockchain network in accordance with embodiments of the present disclosure;
FIG. 4 is a functional block diagram of a document content auditing apparatus according to an embodiment of the present disclosure;
FIG. 5 is a functional block diagram of an electronic device according to an embodiment of the present disclosure;
fig. 6 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless it is specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any specific values should be construed as merely illustrative, and not a limitation. Thus, other examples of exemplary embodiments may have different values.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further discussion thereof is necessary in subsequent figures.
< hardware configuration >
Fig. 1 illustrates a hardware configuration of an electronic device 1000 that may be used to implement embodiments of the present disclosure.
The electronic device 1000 may be a node in a blockchain network, such as a management node in a blockchain network, or may be an audit node, a check node, and a calculation node in a blockchain network. In addition, the node is typically a server. Wherein the server may be a virtual machine or a physical machine.
As shown in fig. 1, the electronic device 1000 may include a processor 1100, a memory 1200, an interface device 1300, a communication device 1400, a display device 1500, an input device 1600, a speaker 1700, a microphone 1800, and so forth. The processor 1100 may be a central processing unit CPU, a microprocessor MCU, or the like. The memory 1200 includes, for example, ROM (read only memory), RAM (random access memory), nonvolatile memory such as a hard disk, and the like. The interface device 1300 includes, for example, a USB interface, a headphone interface, and the like. The communication device 1400 can perform wired or wireless communication, for example. The display device 1500 is, for example, a liquid crystal display, a touch display, or the like. The input device 1600 may include, for example, a touch screen, keyboard, etc. A user may input/output voice information through the speaker 1700 and microphone 1800.
Although a plurality of devices are shown for the electronic apparatus 1000 in fig. 1, the present disclosure may relate to only some of the devices therein, for example, the electronic apparatus 1000 relates to only the memory 1200 and the processor 1100.
In an embodiment applied to the present disclosure, the memory 1200 of the electronic device 1000 is used to store instructions for controlling the processor 1100 to perform the methods provided by the embodiments of the present disclosure.
In the above description, a skilled person may design instructions according to the disclosed aspects of the present disclosure. How the instructions control the processor to operate is well known in the art and will not be described in detail here.
In an embodiment of the present disclosure, a blockchain network may include a plurality of nodes, where the plurality of nodes includes a management node, at least one audit node, a plurality of check management nodes, and at least one computing node, where the management node is used to manage other nodes in the blockchain network, and the audit node is typically deployed at an audit mechanism, for example, one audit node may be deployed at one audit mechanism.
< method example >
The embodiment provides a file content auditing method which is applied to a blockchain network.
In this embodiment, the blockchain network includes a management node, at least one audit node, a plurality of check nodes, and at least one computing node. In addition, as shown in fig. 3, the blockchain network provided in this embodiment may include a management node, an audit node 1, three check nodes, for example, a check node 1, a check node 2, and a check node 3, and three calculation nodes, for example, a calculation node 1, a calculation node 2, and a calculation node 3, and of course, other numbers of audit nodes, check nodes, and calculation nodes may be included in the blockchain network in this embodiment.
Fig. 2 is a flow chart of a method for auditing contents of a file according to an embodiment of the present disclosure, as shown in fig. 2, the method may include steps S2100 to S2400 as follows:
in step S2100, the first audit node extracts content feature information of the file and broadcasts a query message when receiving the file.
The first audit node may be audit node 1 in fig. 3, i.e. the audit node 1 may be deployed at audit authority a, i.e. the audit of the file content is completed by the audit authority a.
The files are typically media files such as, but not limited to, including video files, picture files, and audio files.
The content characteristic information of the file is information indicating the content characteristics of the file.
The query message at least carries content characteristic information of the file.
In this embodiment, when the first audit node in the step S2100 receives the file, the first audit node extracts the content feature information of the file, and broadcasts the query message may further include the following steps S2110 to S2120:
step S2110, a feature extraction algorithm configured by the management node and a first broadcast address are acquired.
In this step S2110, the management node configures a feature extraction algorithm list required for the auditing node, and the auditing result queries the broadcast address (first broadcast address), and after receiving the file, the auditing node may select a required feature extraction algorithm from the feature extraction list.
Illustratively, three feature extraction algorithms exist in the feature extraction algorithm list required by the management node to configure the auditing node 1, and the auditing node 1 may select one feature extraction algorithm from the three feature extraction algorithms for extracting content feature information of the file.
In step S2120, content feature information of the file is extracted based on the feature extraction algorithm.
In step S2130, the query message is broadcast via the first broadcast address.
In step S2130, after obtaining the content feature information of the file, the query message carrying the content feature information can be broadcast to the blockchain network through the first broadcast address.
The query message may carry content feature information of the file, may also carry file basic information of the file, and may of course also carry other information, for example, a feature extraction algorithm for extracting content feature information of the file, and the like.
In this embodiment, before the query message is broadcast by the first broadcast address in step S2130, the first audit node further obtains the digital certificate of the first audit node configured by the management node, and uses the digital certificate to digitally identify the query message, and then broadcasts the query message.
The digital certificate is a digital certificate for marking the identity information of each party in the communication of the blockchain network, and can be used for identifying the identity of the other party on the blockchain network.
The digital certificate of the first auditing node can be configured in advance by the management node so as to utilize the digital certificate to realize the identity authentication and mutual trust of all parties.
Here, the query message may carry content feature information of the file after the digital identifier, and may also carry basic information of the file after the digital identifier, and of course, may also carry other information, for example, a feature extraction algorithm for extracting content feature information of the file after the digital identifier.
Under the condition that the first check node receives the file, extracting the content characteristic information of the file, broadcasting the query message, and entering into:
step S2200, the first computing node receives the inquiry message, matches the content characteristic information, obtains the target content characteristic information, and broadcasts the verification message.
The first computing node may be any one of a plurality of computing nodes, for example, may be the computing node 1 in fig. 3, may be the computing node 2 shown in fig. 3, or may be the computing node 3 shown in fig. 3, that is, each computing node needs to match content feature information to obtain target content feature information matched with the content feature information.
In this embodiment, the first computing node in step S2200 receives the query message, matches the content feature information to obtain the target content feature information, and broadcasts the check message may further include steps S2210 to S2240 as follows:
step S2210, a feature matching algorithm configured by the management node and a second broadcast address are acquired.
In this step S2210, the management node configures a feature matching algorithm list required for the computing node, and verifies the broadcast address (the second broadcast address), and the computing node may select a required feature matching algorithm from the feature extraction list after receiving the query message.
The first broadcast address and the second broadcast address may be the same address or different addresses.
Illustratively, three feature matching algorithms exist in the feature matching algorithm list required by the management node to configure the computing node 1, and the computing node 1 may select one feature matching algorithm from the three feature matching algorithms for calculating the similarity between the content feature information and the content feature information stored locally by the computing node 1.
Three feature matching algorithms exist in the feature matching algorithm list required by the management node to configure the computing node 2, and the computing node 2 can select one feature matching algorithm from the three feature matching algorithms to be used for calculating the similarity between the content feature information and the content feature information stored locally by the computing node 2.
Three feature matching algorithms exist in the feature matching algorithm list required by the management node to configure the computing node 3, and the computing node 3 can select one feature matching algorithm from the three feature matching algorithms to be used for calculating the similarity between the content feature information and the content feature information stored locally by the computing node 3.
It will be appreciated that the feature matching algorithms selected by computing node 1, computing node 2 and computing node 3 may be the same or different.
It will be appreciated that the content characteristic information stored locally at computing node 1, the content characteristic information stored locally at computing node 2, and the content characteristic information stored locally at the computing node may be the same or different.
Step S2220 calculates the similarity between the content feature information and the content feature information stored locally at the first computing node, based on the feature matching algorithm.
Continuing with the example of step S2210 described above, the computing node 1 may calculate the similarity of the content feature information and the content feature information stored locally by the computing node 1. The computing node 2 may calculate the similarity of the content characteristic information and the content characteristic information stored locally at the computing node 2. The computing node 3 may calculate the similarity of the content characteristic information and the content characteristic information stored locally at the computing node 3.
Step S2230 obtains target content feature information from the content feature information stored locally at the first computing node according to the descending order of ordering for each similarity.
In this step S2230, the content feature information stored locally at the first computing node having a similarity with the content feature information exceeding the preset value may be used as the target content feature information. That is, the target feature information may be obtained in one or a plurality of pieces.
Continuing with the example of step S2220 described above, the target content feature information obtained by computing node 1, computing node 2, and computing node 3 may be the same or different.
The preset value may be a value set according to an actual application scenario and an actual requirement.
In step S2240, the check message is broadcast through the second broadcast address.
And the verification message at least carries the content characteristic information and the target content characteristic information.
Continuing with the example of step S2230 above, computing node 1 may broadcast a check message via the second broadcast address, computing node 2 may broadcast a check message via the second broadcast address, and computing node 3 may broadcast a check message via the second broadcast address.
Receiving the query message at the first computing node, matching the content characteristic information to obtain target content characteristic information, broadcasting the check message, and entering:
In step S2300, the first check node receives the check message, and checks the target content feature information and the content feature information according to the set check item, to obtain a check result.
The set check item may include a check item as to whether the target content feature information and the content feature information are authentic.
In this embodiment, the first check node in step S2300 receives the check message, and checks the target content feature information and the content feature information according to the set check item, and the obtaining of the check result may further include steps S2310 to S2330 as follows:
in step S2310, the first check node performs a check item on the target content feature data and the content feature data in case of receiving the check message.
Illustratively, the check node 1 performs a check item for the target content feature information and the content feature information in the check message in case of receiving the check message, i.e. checks whether the target content feature information and the content feature information are authentic, and performs step S2330 in case of passing the check.
In step S2320, the first check node initiates a check request to other check nodes of the blockchain network to execute check items on the target content feature information and the content feature information by the other check nodes if the target content feature and the content feature pass the check items.
And the verification request at least carries the content characteristic information and the target content characteristic information.
Illustratively, the check node 1 initiates a check request in the blockchain network in case the target content feature information and the content feature information are trusted. For example, after receiving the verification request, the verification node 2 may also perform a verification term on the target content feature information and the content feature information in the verification message, that is, verify whether the target content feature information and the content feature information are authentic, and in the case of verification passing, return a verification passing message to the verification node 1.
For another example, after receiving the verification request, the verification node 3 may also execute a verification term for the target content feature information and the content feature information in the verification message, that is, verify whether the target content feature information and the content feature information are trusted, and in the case of verification passing, return a verification passing message to the verification node 1.
In step S2230, the first check node obtains the target content feature information and the check result of the content feature information passing through the check item when receiving the check passing message returned by the at least two other check nodes in response to the check request.
Illustratively, check node 1 considers a pass setting check term if it receives a check pass message returned by check node 2 and check node 3.
Receiving a check message at a first check node, checking target content characteristic information and the content characteristic information according to a set check item, and entering after a check result is obtained:
in step S2400, if the verification result indicates that the target content feature information and the content feature information pass through the verification term, the first verification node determines that the content of the file is illegal content, and stores the illegal content in the blockchain network.
The illegal contents are contents which do not meet the set requirements, namely, the illegal contents are contents which are required to be removed by the auditing mechanism, and can be also understood as contents in a blacklist listed for the auditing mechanism.
In this embodiment, after the verification node verifies the target content feature information and the content feature information, the verification node determines that the content of the file is illegal after the verification is passed, so as to ensure that the data stored in the blockchain network is trusted.
According to the method, the blockchain network comprises the auditing node, the checking node and the calculating node, after the auditing node broadcasts the query message carrying the content characteristic information of the file, the calculating node searches the target content characteristic information matched with the content characteristic information, and the checking node further checks the target content characteristic information and the content characteristic information, so that the content of the file is determined to be illegal content under the condition that the checking is passed, namely, the sharing of the illegal content information which is audited and found by all auditing nodes is realized through the intelligent distributed auditing network, the fact that all auditing nodes repeatedly audit illegal content is avoided, and the auditing cost is reduced.
In one embodiment, the first check node checks whether the content of the file meets the set requirement or not by the first check node to obtain a content checking result under the condition that the check result indicates that the target content characteristic information and the content characteristic information do not pass through the check item.
The set requirement may be a requirement to meet offending content.
For example, when the verification result indicates that the target content feature information and the content feature information do not pass the verification term, the verification node 1 notifies the verification node 1, and after receiving a notification message indicating that the target content feature information and the content feature information do not pass the verification term, the verification node 1 verifies the content of the file, so as to obtain a content verification result, where the content verification result may be that the content of the file is illegal content or that the content of the file is not one of the illegal content.
In this embodiment, after obtaining the content auditing result, the method further includes: the first audit node acquires a third broadcast address configured by the management node; and broadcasting the content auditing result by the first auditing node through the third broadcasting address.
The broadcast address (third broadcast address) is typically uploaded by the management node for the audit result required by the audit node to be configured. The third broadcast address may be the same as or different from the first broadcast address and the second broadcast address.
Next, an example document content auditing method is shown, and referring to fig. 3, the document content auditing method may include the steps of:
step S1, an audit result query module of the audit node 1 extracts content characteristic information of the file, digital identification is carried out on the content characteristic information and the file basic information by using a digital certificate of the audit node 1, and a broadcast address broadcast query message is queried through the audit result.
And S2, after the computing node 1, the computing node 2 and the computing node 3 receive the query message, carrying out matching calculation on the content characteristic information and the content characteristic information locally stored in the computing node according to a characteristic matching algorithm.
Step S3, after any one of the computing nodes 1, 2 and 3 obtains the matched target content characteristic information, a verification message is broadcast through verification broadcast addresses, and the verification message carries the content characteristic information and the target content characteristic information.
Step S4, after receiving the verification message, the verification node 1 performs local verification on the content characteristic information and the target content characteristic information.
Step S5, the check node 1 sends a check request after the check is passed.
Step S6, after receiving the verification request, the verification node 2 performs local verification on the content characteristic information and the target content characteristic information.
Step S7, the check node 2 returns a message that the check passes after the check passes.
Step S8, after receiving the verification request, the verification node 3 performs local verification on the content characteristic information and the target content characteristic information.
Step S9, the check node 3 returns a check passing message when checking passing, and the check node 1 writes the verification result into the blockchain network when receiving the check passing messages returned by the check node 2 and the check node 3.
And step S10, the check node 1 informs the audit result inquiry module that the content of the file is illegal through the blockchain network, and the audit result inquiry is completed once.
< device example >
In this embodiment, a file content auditing apparatus 4000 is further provided, and the file content auditing apparatus 4000 is applied to a blockchain network, where the blockchain network includes an auditing node, a computing node and a checking node, as shown in fig. 4, where the file content auditing apparatus 4000 includes an auditing module 4100, a matching module 4200, a checking module 4300 and a determining module 4400, and is used for implementing the file content auditing method provided in this embodiment, and each module of the file content auditing apparatus 4000 may be implemented by software or hardware, and is not limited herein.
An auditing module 4100, configured to extract content feature information of the file and broadcast a query message when the first auditing node receives the file; wherein, the query message at least carries the content characteristic information.
A matching module 4200, configured to receive the query message and match the content feature information by the first computing node, obtain target content feature information, and broadcast a verification message; and the verification message at least carries the content characteristic information and the target content characteristic information.
And the verification module is used for receiving the verification message by the first verification node, and verifying the target content characteristic information and the content characteristic information according to a set verification item to obtain a verification result.
And the determining module is used for determining that the content of the file is illegal when the first check node indicates that the target content characteristic information and the content characteristic information pass the check item.
In one embodiment, the blockchain network further includes a management node, and the auditing module 4100 is specifically configured to obtain the feature extraction algorithm and the first broadcast address configured by the management node; extracting content characteristic information of the file based on the characteristic extraction algorithm; and broadcasting a query message through the first broadcast address.
In one embodiment, the matching module 4200 is specifically configured to obtain the feature matching algorithm and the second broadcast address configured by the management node; calculating the similarity of the content characteristic information and the content characteristic information stored locally by the first computing node based on the characteristic matching algorithm; obtaining the target content feature information from the content feature information stored locally at the first computing node according to the descending order of the similarity; broadcasting the check message through the second broadcast address.
In one embodiment, the set check item includes a check item as to whether the target content feature information and the content feature information are authentic.
In one embodiment, the verification module 4300 is specifically configured to, when the first verification node receives the verification message, execute the verification term on the target content feature data and the content feature data; the first check node initiates a check request to other check nodes of the blockchain network under the condition that the target content feature and the content feature pass through the check item so as to execute the check item on the target feature information and the feature information by the other check nodes; and under the condition that the first check node receives check passing messages returned by at least two other check nodes in response to the check request, acquiring the target content characteristic information and a check result of the content characteristic information passing the check item.
The verification request at least carries the content characteristic information and the target content characteristic information;
in one embodiment, the auditing module 4100 is further configured to, when the verification result indicates that the target content feature information and the content feature information do not pass the verification term, audit, by the first auditing node, whether the content of the file meets the set requirement, and obtain a content auditing result.
In one embodiment, the auditing module 4100 is further configured for the first auditing node to obtain a third broadcast address configured by the management node; and broadcasting the content auditing result by the first auditing node through the third broadcasting address.
In one embodiment, the auditing module 4100 is further configured for the first auditing node to obtain a digital certificate of the first auditing node configured by the management node; and the first check node uses the digital certificate to digitally identify the query message and then broadcasts the query message.
It is appreciated that the above auditing module 4100 may implement the functionality of auditing nodes, the above matching module 4200 may implement the functionality of computing nodes, and the above verification module 4300 and storage module 4400 may implement the functionality of verifying nodes.
< device example >
Corresponding to the above method embodiment, in this embodiment, an electronic device is further provided, as shown in fig. 5, which may include a file content auditing apparatus 4000 according to any embodiment of the disclosure, for implementing the file content auditing method according to any embodiment of the disclosure.
As shown in fig. 6, the electronic device 5000 may further include a processor 5200 and a memory 5100, the memory 5100 for storing executable instructions; the processor 5200 is configured to operate the electronic device according to control of the instructions to perform the document content auditing method according to any embodiment of the present disclosure.
The various modules of the apparatus 5000 above may be implemented by the processor 5200 executing the instructions to perform methods according to any of the embodiments of the present disclosure.
The present disclosure may be a system, method, and/or computer program product. The computer program product may include a computer readable storage medium having computer readable program instructions embodied thereon for causing a processor to implement aspects of the present disclosure.
The computer readable storage medium may be a tangible device that can hold and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: portable computer disks, hard disks, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), static Random Access Memory (SRAM), portable compact disk read-only memory (CD-ROM), digital Versatile Disks (DVD), memory sticks, floppy disks, mechanical coding devices, punch cards or in-groove structures such as punch cards or grooves having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media, as used herein, are not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., optical pulses through fiber optic cables), or electrical signals transmitted through wires.
The computer readable program instructions described herein may be downloaded from a computer readable storage medium to a respective computing/processing device or to an external computer or external storage device over a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmissions, wireless transmissions, routers, firewalls, switches, gateway computers and/or edge servers. The network interface card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium in the respective computing/processing device.
Computer program instructions for performing the operations of the present disclosure can be assembly instructions, instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, c++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer readable program instructions may be executed entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present disclosure are implemented by personalizing electronic circuitry, such as programmable logic circuitry, field Programmable Gate Arrays (FPGAs), or Programmable Logic Arrays (PLAs), with state information of computer readable program instructions, which can execute the computer readable program instructions.
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable medium having the instructions stored therein includes an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, implementation by software, and implementation by a combination of software and hardware are all equivalent.
The foregoing description of the embodiments of the present disclosure has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the technical improvements in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the present disclosure is defined by the appended claims.

Claims (8)

1. A file content auditing method applied to a blockchain network, the blockchain network comprising auditing nodes, computing nodes and checking nodes, the method comprising:
under the condition that the first check node receives the file, extracting content characteristic information of the file and broadcasting a query message; wherein, the inquiry message at least carries the content characteristic information;
the first computing node receives the query message, matches the content characteristic information, obtains target content characteristic information and broadcasts a check message; wherein, the verification message at least carries the content characteristic information and the target content characteristic information;
The first check node receives the check message, and checks the target content characteristic information and the content characteristic information according to a set check item to obtain a check result; the method comprises the steps of,
the first check node determines that the content of the file is illegal content under the condition that the check result indicates that the target content characteristic information and the content characteristic information pass through the check item;
wherein the set check item includes a check item as to whether the target content feature information and the content feature information are authentic;
the first check node receives the check message, checks the target content characteristic information and the content characteristic information according to a set check item to obtain a check result, and comprises the following steps:
the first check node executes the check item aiming at the target content characteristic information and the content characteristic information under the condition that the check message is received;
the first check node initiates a check request to other check nodes of the blockchain network under the condition that the target content characteristic information and the content characteristic information pass through the check item so as to execute the check item on the target content characteristic information and the content characteristic information by the other check nodes; wherein, the verification request at least carries the content characteristic information and the target content characteristic information;
And under the condition that the first check node receives check passing messages returned by at least two other check nodes in response to the check request, acquiring the target content characteristic information and a check result of the content characteristic information passing the check item.
2. The method of claim 1, wherein the blockchain network further includes a management node,
the first audit node extracts content characteristic information of the file and broadcasts a query message under the condition that the file is received, and the method comprises the following steps:
acquiring a feature extraction algorithm and a first broadcast address configured by the management node;
extracting content characteristic information of the file based on the characteristic extraction algorithm;
and broadcasting a query message through the first broadcast address.
3. The method of claim 2, wherein the first computing node receives the query message and matches the content characteristic information to obtain target content characteristic information and broadcasts a check message, comprising:
acquiring a feature matching algorithm and a second broadcast address configured by the management node;
calculating the similarity of the content characteristic information and the content characteristic information stored locally by the first computing node based on the characteristic matching algorithm;
Obtaining the target content feature information from the content feature information stored locally at the first computing node according to the descending order of the similarity;
broadcasting the check message through the second broadcast address.
4. The method of claim 1, wherein the method further comprises:
and the first check node checks whether the content of the file meets the set requirement or not by the first check node under the condition that the check result indicates that the target content characteristic information and the content characteristic information do not pass through the check item, and a content check result is obtained.
5. The method of claim 4, wherein the blockchain network further includes a management node, the method further comprising:
the first audit node acquires a third broadcast address configured by the management node; the method comprises the steps of,
and the first auditing node broadcasts the content auditing result through the third broadcasting address.
6. The method of claim 2, wherein prior to said broadcasting the query message, further comprising:
the first audit node acquires a digital certificate of the first audit node configured by the management node;
And the first check node uses the digital certificate to digitally identify the query message and then broadcasts the query message.
7. A file content auditing apparatus for use with a blockchain network, the blockchain network including auditing nodes, computing nodes, and verification nodes, the apparatus comprising:
the auditing module is used for extracting the content characteristic information of the file and broadcasting inquiry information under the condition that the first auditing node receives the file; wherein, the inquiry message at least carries the content characteristic information;
the matching module is used for receiving the query message by the first computing node, matching the content characteristic information, obtaining target content characteristic information and broadcasting a check message; wherein, the verification message at least carries the content characteristic information and the target content characteristic information;
the verification module is used for receiving the verification information by the first verification node, and verifying the target content characteristic information and the content characteristic information according to a set verification item to obtain a verification result; the method comprises the steps of,
the determining module is used for determining that the content of the file is illegal when the first check node indicates that the target content characteristic information and the content characteristic information pass through the check item;
Wherein the set check item includes a check item as to whether the target content feature information and the content feature information are authentic;
the verification module is specifically configured to execute the verification item with respect to the target content feature information and the content feature information when the first verification node receives the verification message;
the first check node initiates a check request to other check nodes of the blockchain network under the condition that the target content characteristic information and the content characteristic information pass through the check item so as to execute the check item on the target content characteristic information and the content characteristic information by the other check nodes; wherein, the verification request at least carries the content characteristic information and the target content characteristic information;
and under the condition that the first check node receives check passing messages returned by at least two other check nodes in response to the check request, acquiring the target content characteristic information and a check result of the content characteristic information passing the check item.
8. An electronic device, comprising:
the document content auditing apparatus of claim 7; or alternatively, the process may be performed,
A processor and a memory for storing instructions for controlling the processor to perform the method according to any one of claims 1 to 6.
CN202011435689.2A 2020-12-07 2020-12-10 File content auditing method and device and electronic equipment Active CN114598699B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011417449X 2020-12-07
CN202011417449 2020-12-07

Publications (2)

Publication Number Publication Date
CN114598699A CN114598699A (en) 2022-06-07
CN114598699B true CN114598699B (en) 2023-07-28

Family

ID=81813603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011435689.2A Active CN114598699B (en) 2020-12-07 2020-12-10 File content auditing method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN114598699B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446970A (en) * 2008-12-15 2009-06-03 腾讯科技(深圳)有限公司 Method for censoring and process text contents issued by user and device thereof
CN101540907A (en) * 2009-04-28 2009-09-23 无锡天脉聚源传媒科技有限公司 Method for auditing safety of internet video
CN108280628A (en) * 2018-02-01 2018-07-13 泰康保险集团股份有限公司 Core based on block chain technology pays for method, apparatus, medium and electronic equipment
CN110109888A (en) * 2019-04-04 2019-08-09 深圳市元征科技股份有限公司 A kind of document handling method and device
CN110321734A (en) * 2019-07-11 2019-10-11 政采云有限公司 A kind of file verification method and device
CN110457946A (en) * 2018-12-05 2019-11-15 腾讯科技(深圳)有限公司 Digital asset generation method, device, electronic equipment and storage medium
CN110675153A (en) * 2019-10-10 2020-01-10 北京京东振世信息技术有限公司 Block chain-based data verification method and device, storage medium and electronic equipment
CN110705998A (en) * 2019-09-02 2020-01-17 深圳壹账通智能科技有限公司 Block chain based information auditing method and device, electronic equipment and storage medium
CN110910138A (en) * 2019-12-04 2020-03-24 中科扶云(杭州)科技有限公司 Block chain data supervision method and device
WO2020073828A1 (en) * 2018-10-10 2020-04-16 腾讯科技(深圳)有限公司 Auditing result data storage and query method, and auditing item storage method and apparatus
CN111767422A (en) * 2020-06-30 2020-10-13 平安国际智慧城市科技股份有限公司 Data auditing method, device, terminal and storage medium
CN111797217A (en) * 2020-06-29 2020-10-20 中国平安财产保险股份有限公司 Information query method based on FAQ matching model and related equipment thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11086830B2 (en) * 2018-07-24 2021-08-10 Innoplexus Ag System and method for identifying duplicate document submission on a publishing platform
US11706280B2 (en) * 2019-03-18 2023-07-18 Red Hat, Inc. Methods and system for auditing batch jobs using blockchain

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446970A (en) * 2008-12-15 2009-06-03 腾讯科技(深圳)有限公司 Method for censoring and process text contents issued by user and device thereof
CN101540907A (en) * 2009-04-28 2009-09-23 无锡天脉聚源传媒科技有限公司 Method for auditing safety of internet video
CN108280628A (en) * 2018-02-01 2018-07-13 泰康保险集团股份有限公司 Core based on block chain technology pays for method, apparatus, medium and electronic equipment
WO2020073828A1 (en) * 2018-10-10 2020-04-16 腾讯科技(深圳)有限公司 Auditing result data storage and query method, and auditing item storage method and apparatus
CN110457946A (en) * 2018-12-05 2019-11-15 腾讯科技(深圳)有限公司 Digital asset generation method, device, electronic equipment and storage medium
CN110109888A (en) * 2019-04-04 2019-08-09 深圳市元征科技股份有限公司 A kind of document handling method and device
CN110321734A (en) * 2019-07-11 2019-10-11 政采云有限公司 A kind of file verification method and device
CN110705998A (en) * 2019-09-02 2020-01-17 深圳壹账通智能科技有限公司 Block chain based information auditing method and device, electronic equipment and storage medium
CN110675153A (en) * 2019-10-10 2020-01-10 北京京东振世信息技术有限公司 Block chain-based data verification method and device, storage medium and electronic equipment
CN110910138A (en) * 2019-12-04 2020-03-24 中科扶云(杭州)科技有限公司 Block chain data supervision method and device
CN111797217A (en) * 2020-06-29 2020-10-20 中国平安财产保险股份有限公司 Information query method based on FAQ matching model and related equipment thereof
CN111767422A (en) * 2020-06-30 2020-10-13 平安国际智慧城市科技股份有限公司 Data auditing method, device, terminal and storage medium

Also Published As

Publication number Publication date
CN114598699A (en) 2022-06-07

Similar Documents

Publication Publication Date Title
CN105518679B (en) Picture management method and picture synchronization method
CN109951435B (en) Equipment identifier providing method and device and risk control method and device
CN110598014A (en) Multimedia data processing method, device and storage medium
KR101800890B1 (en) Location-based communication method and system
WO2017113792A1 (en) Bluetooth automatic connection method, master device, slave device, and system
CN111611559A (en) Identity verification method and device
WO2015139539A1 (en) Video information push method and device
KR102110642B1 (en) Password protection question setting method and device
CN109995876B (en) File transmission method, device, system and computer storage medium
WO2017206524A1 (en) Electronic device control method, terminal and control system
WO2014111022A1 (en) Mobile terminal user information display method, mobile terminal, and service system
CN104202345A (en) Verification code generating method, device and system
CN108491715B (en) Terminal fingerprint database generation method and device and server
CN108280369B (en) Cloud document offline access system, intelligent terminal and method
CN110852193A (en) Face recognition method and device
US10951790B1 (en) Systems and methods for authenticating an image
CN113656713B (en) Network resource processing method, device and system
TW201837869A (en) Method, system and intelligent device for user side ticket verification
CN114598699B (en) File content auditing method and device and electronic equipment
CN111027065B (en) Leucavirus identification method and device, electronic equipment and storage medium
CN106599637B (en) Method and device for inputting verification code on verification interface
CN108734491B (en) Method and device for evaluating copyright value of multimedia data
CN114598693B (en) File content auditing method and device and electronic equipment
CN110875895A (en) Method, system, equipment and vehicle for realizing intelligent terminal software login
CN110930163B (en) Method, system and storage medium for implementing house source entrusting business

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant