KR101634754B1 - Method and apparatus for monitoring for sharing of literary works - Google Patents

Method and apparatus for monitoring for sharing of literary works Download PDF

Info

Publication number
KR101634754B1
KR101634754B1 KR1020150143886A KR20150143886A KR101634754B1 KR 101634754 B1 KR101634754 B1 KR 101634754B1 KR 1020150143886 A KR1020150143886 A KR 1020150143886A KR 20150143886 A KR20150143886 A KR 20150143886A KR 101634754 B1 KR101634754 B1 KR 101634754B1
Authority
KR
South Korea
Prior art keywords
file
shared
information
pattern
shared file
Prior art date
Application number
KR1020150143886A
Other languages
Korean (ko)
Inventor
정두선
이한동
Original Assignee
(주)여섯번째데이터
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)여섯번째데이터 filed Critical (주)여섯번째데이터
Priority to KR1020150143886A priority Critical patent/KR101634754B1/en
Application granted granted Critical
Publication of KR101634754B1 publication Critical patent/KR101634754B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Multimedia (AREA)
  • Operations Research (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Disclosed are a monitoring method and apparatus for sharing literary works. The monitoring method for sharing literary works comprises the following steps of: receiving first hash value information related to literary works; determining whether a first sharing file is a copyright-related file related to the literary works based on the first hash value information in a first sharing web site and a second hash value of a first sharing file uploaded to the first sharing web site; requesting deletion of the first sharing file if the first sharing file is the copyright-related file; extracting characteristic information of the first sharing file, and determining irregular pattern information based on the characteristic information of the first sharing file; determining whether a second sharing file uploaded to a second sharing web site is the copyright-related file based on the irregular pattern information; and requesting deletion of the second sharing file if the second sharing file is the copyright-related file.

Description

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a monitoring method and apparatus for asset sharing,

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a shooting method and apparatus, and more particularly, to a monitoring method and apparatus for sharing a work.

There are many discussions to solve copyright infringement problems on web hard and P2P sites due to copyright issues in web hard and peer to peer sites.

Article 30 of the Copyright Act states that "If a published work is not made for commercial purposes and is used for personal use or within a limited range of assumptions and equivalents, the user may reproduce it. Provided, however, that such copying by copying equipment installed to provide for the use of the public shall not be so. " It is a reproduction regulation for private use.

Originally, copying for private use is also infringed, but it is non-infringement because it is costly and cumbersome to enforce copyright against an end user in the personal domain, and infringement caused by it is negligible.

Copying CD music to a digital file and storing it on a PC, recording a TV broadcast program at home, copying a book for personal use, or downloading necessary data from a general Internet site is a copy for private use .

However, knowing that it is an illegal site, downloading a copyrighted work there is not a copy for private use. Our court ruled that "the copyrighted work on the internet site is obviously illegal to infringe copyright, and it is not a copy for private use."

Therefore, downloading a copyrighted work from a site such as a homepage, a café, or a blog is an excuse for private copying. However, you should be careful to download a copyrighted work from a P2P or web hard drive.

Patent Document 1: KR10-2004-0111109

One aspect of the present invention provides a monitoring method for copyrighted work sharing.

Another aspect of the invention provides a monitoring device for asset sharing.

According to an aspect of the present invention, there is provided a method of monitoring a work sharing method, the method comprising: receiving first hash value information associated with a work, receiving first hash value information from the first shared web site, Determining whether the first shared file is a copyright-related file associated with the work based on a second hash value of the first shared file; if the first shared file is the copyright-related file, Extracting characteristic information of the first shared file and determining anomalous pattern information based on the characteristic information of the first shared file; Determining whether a second shared file uploaded on the web site is the copyright related file, determining whether the second shared file is the copyright related file , And requesting deletion of the second shared file.

Meanwhile, the characteristic information includes the post information of the first shared file and the file name information of the first shared file, and the anomaly pattern information includes the post information of the first shared file, And information on a change pattern in which the file name information of the first shared file is changed.

The change pattern may include consonant and vowel disassembly patterns included in the special character addition pattern, the post information, and the file name information included in the post information and the file name information, consonants included in the post information and file name information, . ≪ / RTI >

The step of determining whether the second shared file uploaded on the second shared web site based on the anomalous pattern information is the copyright related file may include determining a similarity degree between the second shared file and the copyright related file Determining the second shared file as the copyright-related file if the degree of similarity is equal to or greater than the first threshold value; and if the similarity is less than the second threshold value or less than the first threshold value, And determining that the second shared file is not the copyright related file if the degree of similarity is less than the second threshold value, And further determines a registration pattern on the second shared web site of the second shared file as the copyright related file .

The first shared web site is a site where a sharing service of the first shared file is performed by a plurality of users storing the first shared file, And may be a site where a sharing service of the second shared file is performed by a single user who stores the shared file.

A work sharing monitoring apparatus for monitoring a work sharing according to another aspect of the present invention includes a processor for receiving first hash value information related to a work and for receiving first hash value information at a first shared web site, Determining whether the first shared file is a copyright related file related to the work based on the first hash value of the first shared file uploaded on the first shared web site, Requesting deletion of the first shared file, extracting the characteristic information of the first shared file, determining anomaly pattern information based on the characteristic information of the first shared file, Determining whether a second shared file uploaded on the second shared web site is the copyright-related file based on the anomaly pattern information, And request deletion of the second shared file when the second shared file is the copyright-related file.

The attribute information includes the post information of the first shared file and the file name information of the first shared file, and the anomaly pattern information includes the post information of the first shared file, And information on a change pattern in which the file name information of the first shared file is changed.

The change pattern may include consonant and vowel disassembly patterns included in the special character addition pattern, the post information, and the file name information included in the post information and the file name information, consonants included in the post information and file name information, . ≪ / RTI >

The processor may determine the degree of similarity between the second shared file and the copyright-related file, determine the second shared file as the copyright-related file if the degree of similarity is equal to or greater than the first threshold value, Determining that the second shared file is an illegal sharing suspicious file if the second shared file is not less than the threshold value or less than the first threshold value and that the second shared file is not the copyright related file if the similarity is less than the second threshold value The illegal sharing suspicion file may be determined as the copyright related file by further considering the registration pattern on the second shared web site of the second shared file.

The first shared web site is a site where a sharing service of the first shared file is performed by a plurality of users storing the first shared file, And may be a site where a sharing service of the second shared file is performed by a single user who stores the shared file.

According to the monitoring method and apparatus for sharing a copyrighted work according to the embodiment of the present invention, illegal upload files in violation of copyright uploaded to various shared web sites can be monitored to protect the rights of the copyright owners.

FIG. 1 is a flowchart illustrating a method of searching for illegal sharing of a copyright-related file related to an original work in a shared web site according to an embodiment of the present invention.
FIG. 2 is a conceptual diagram illustrating a method of searching for an asset-related file on a P2P site by additionally considering an anomaly pattern for a shared file according to an embodiment of the present invention.
FIG. 3 is a conceptual diagram illustrating a method of searching for a work-related file based on anomalous word pattern information of a work sharing monitoring apparatus according to an embodiment of the present invention.
4 is a conceptual diagram illustrating a method of searching for a work related file according to an embodiment of the present invention.
5 is a conceptual diagram illustrating a method of searching for a work related file according to an embodiment of the present invention.
6 is a conceptual diagram illustrating a work sharing monitoring apparatus according to an embodiment of the present invention.

The following detailed description of the invention refers to the accompanying drawings, which illustrate, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It should be understood that the various embodiments of the present invention are different, but need not be mutually exclusive. For example, certain features, structures, and characteristics described herein may be implemented in other embodiments without departing from the spirit and scope of the invention in connection with an embodiment. It is also to be understood that the position or arrangement of the individual components within each disclosed embodiment may be varied without departing from the spirit and scope of the invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is to be limited only by the appended claims, along with the full scope of equivalents to which such claims are entitled, if properly explained. In the drawings, like reference numerals refer to the same or similar functions throughout the several views.

Hereinafter, preferred embodiments of the present invention will be described in more detail with reference to the drawings.

Sharing illegally through torrents and peer-to-peer (P2P) is a natural part of many Internet network users who are unaware of the illegal nature.

In the embodiment of the present invention, based on the original author's request, based on the information of the original work (hash value, original name, capacity, producer, cast (if any), and public date To search for illegal sharing of files related to the original work on a file sharing website such as a torrent service providing site and a P2P service providing site, and to request deletion of a file related to an asset shared with a file sharing web site .

In addition to this, by analyzing the illegal sharing pattern of the work related file, information about the anomalous pattern for the sharing of the work related file is acquired, and the information about the anomalous pattern is considered, , A search can be performed for a file associated with an anomalously shared work.

Hereinafter, a method for searching for illegal sharing of a work related file related to a original work in a specific shared web site according to an embodiment of the present invention is disclosed.

FIG. 1 is a flowchart illustrating a method of searching for illegal sharing of a copyright-related file related to an original work in a shared web site according to an embodiment of the present invention.

FIG. 1 illustrates a method of monitoring a copyright-related file shared on a shared web site by an asset-sharing monitoring apparatus.

Referring to FIG. 1, a copyright-related information (for example, a hash value) is obtained from a shared file (step S100).

In order to determine whether a copyright-related file is shared by a shared web site (e.g., a torrent site), information related to the copyright of the shared file (e.g., hash value, original name, capacity, producer, ), And a public date (such as the opening date, etc.).

For example, if a hash value is information including a property of a work, and the file has the same hash value as the work, the file can be determined as a work related file. The information on the hash value of the file shared through the torrent site can be acquired even when the file is not downloaded as all of the information related to the work. Thus, a hash value of a file shared through a torrent site can be obtained.

A file having a hash value that matches the hash value of the copyrighted work among the shared files is determined as the copyright-related file based on the hash value of the copyrighted work, and the deletion procedure for the copyright-related file is performed (step S110).

The hash value is information containing the characteristics of the work, and if the file having the same hash value of the work exists, the file can be determined as the work related file.

If the hash value of the shared file acquired on the basis of step S100 is compared with the hash value of the copyrighted work and has the same value, the shared file can be estimated as a copyright-related file and requested to be deleted.

And collects file name information / bulletin information and capacity information of a copyright-related file (step S120).

File name information / bulletin information and capacity information of a work related file searched on a torrent site. For example, the file name of the copyright-related file, the bulletin information of the copyright-related file, and the capacity information may be collected using the crawling technology. In the case of a file shared through a peer-to-peer (P2P) site, it may be difficult to judge whether a file is a work-related file based on a hash value if the file is not completely downloaded. Accordingly, the P2P site can determine whether or not the copyright-related file is shared based on the file name information / the bulletin information and the capacity information of the copyright-related file searched on the torrent site.

Related file in the P2P site based on the file name information / post information and the capacity information of the work related file collected on the torrent site (step S130).

The file information / post information and the capacity information of the shared file shared on the P2P site are compared with the file name information / the post information and the capacity information of the copyright related files collected on the torrent site, and if the similarity is high, File. The work sharing monitoring apparatus can delete the files related to the remaining works excluding the files associated with the copyright holder among the work related files.

For example, file information / post information of a shared file shared by a P2P site can be modified to avoid filtering by the copyright holder. Therefore, the work sharing monitoring apparatus can search the work related file on the P2P site by additionally considering an anomaly pattern of the file information / post information of the shared file.

Hereinafter, an embodiment of the present invention discloses a method for searching a copyright-related file on a P2P site by further considering an anomaly pattern for a file name of a shared file.

FIG. 2 is a conceptual diagram illustrating a method of searching for an asset-related file on a P2P site by additionally considering an anomaly pattern for a shared file according to an embodiment of the present invention.

Referring to FIG. 2, the work sharing monitoring apparatus determines the anomaly pattern information 200, and generates an anomaly pattern information 200 based on the anomaly pattern information 200 and information related to the work (title, opening date, Post information / modified file name information 220 can be determined. The work sharing monitoring apparatus compares the modified bulletin information / modified file name information 220 associated with the work and the bulletin information / file name information 240 of the shared file uploaded on the P2P site to search for the work related file on the P2P site .

File sharers can modify the posting information / filenames of shared files in various ways to avoid filtering related to the work. Therefore, the modified post information / file name information 220 related to the work is determined in consideration of the deformation pattern information 200, and based on the modified post information / file name information 220 related to the work, . ≪ / RTI > Hereinafter, a method for searching a work related file on a P2P site based on modified posting information for convenience of explanation is disclosed.

As a specific example, the work sharing monitoring apparatus can determine the anomaly pattern information 200 based on the post information of the work related file having the same hash value as the work at the torrent site.

The title, user ID, date, and number of a post of a work related file are collected in the database while the deletion request process for the work related file is performed in the torrent site, and the anomaly pattern information 200 Can be determined. The modified post information of the work related file is determined based on the anomaly pattern information 200 determined through the torrent site, and the work related file can be extracted on the P2P site in consideration of the transformed post information of the work related file.

Table 1 below shows modified post information of a work related file.

<Table 1>

Figure 112015099606516-pat00001

Referring to Table 1, an irregularity that can be included in the modified post information of the work related file based on various deformation methods is disclosed.

For example, you can insert special characters between titles, consonants, and vowels, change the order of letters, remove letters from the base by writing them separately, how to write them down, And the way in which the work can be identified by the name of the cast).

The work sharing monitoring apparatus determines the anomaly pattern information 200 in consideration of the modified post information of various work related files searched on the shared web site, and the anomaly pattern information 200 detects the anomaly pattern information . &Lt; / RTI &gt;

According to the embodiment of the present invention, the anomaly pattern information 200 may be considered for searching for other work-related files. In other words, the work sharing monitoring apparatus accumulates various anomaly pattern information 200 as it searches for a work related file, stores it in a database, and can utilize it to search for a work related file in a P2P site.

According to an embodiment of the present invention, in another method, on the contrary, it is possible to transform a post of a shared file of a P2P site on the basis of the anomaly pattern information 200, and to transmit postings of the modified shared file and information (title, Cast, etc.) to determine whether the shared file is an asset-related file.

FIG. 3 is a conceptual diagram illustrating a method of searching for a work-related file based on anomalous word pattern information of a work sharing monitoring apparatus according to an embodiment of the present invention.

3, the post of the shared file of the P2P site is transformed based on the anomaly pattern information and the information related to the work (title, release date, cast) is compared with the post of the transformed shared file, Or &lt; / RTI &gt;

Referring to FIG. 3, all the special characters are removed from the post information of the shared file on the P2P site, and the processed post information 320 is compared with the work related information to determine whether the shared file is a work related file.

For example, when a pattern in which a special character is included in a title of a work on a post is included in the anomaly pattern information 300, after removing the special character included in the post information, the processed post information 320 and the content 340) to determine whether the shared file is an asset-related file.

Such. Based on the elimination of special characters, a pattern including special characters such as No. 1/3 anomalous words (polar, non-numeric, hypothetical, rhetorical) in Table 1 can be resolved.

In the case where a pattern in which the title of the work is listed as a consonant / vowel on the post is included in the anomaly pattern information 300 and a consonant / vowel sequence exists in the post information of the shared file on the P2P site, It is determined whether the shared file is a work related file by comparing the processing post information 320 and the work related information 340 with each other.

For example, if there is a list of consonants / vowels in the post information such as the 5th post (a. ㅡ. A. ㅋ ㅋ. ㅜ. ㅜ a. , It is possible to determine whether or not the shared file is a work related file by comparing the processing post information (the most probable verb) 320 and the work related information 340 after performing a combination of consonants / vowels.

In this case, there can be a combination ('ㄳ', 'ㅄ', 'ㄵ', 'ㄺ', 'ㄻ', 'ㄼ', 'ㄾ', etc.) A comparison with the information can be performed. This method can detect anomalous words in the same pattern as the ninth sentence.

In addition, in the case where a pattern generated as a title (twin consonant) of a work on a post is included in the anomaly pattern information 300 and a sound (twin consonant) exists in the post information of the shared file on the P2P site, It is possible to determine whether or not the shared file is a work related file by comparing the processing post information 320 and the work related information 340 after performing post processing to transform it into a possible consonant.

In the case where a pattern including additional copyright information (release date, lead, etc.) other than the title of the work on the post is included in the anomaly pattern information 300 and additional information is included in the post information of the shared file on the P2P site, It may be determined whether the shared file is an asset-related file in consideration of whether the information is additional work information.

In the case of 2 (Yoon Seok, Yu Hae Jin), 4 (Yoon Seok, Hae Jin), 6 (Yoon Se Jin) and 6 (Yoon Se Jin release) in Table 1 are included in the post of the shared file, File.

As an example, the anomaly pattern information 300 may be accumulated and utilized in the asset sharing monitoring apparatus, and various anomaly pattern information 300 may be used in combination.

4 is a conceptual diagram illustrating a method of searching for a work related file according to an embodiment of the present invention.

4 illustrates a method of searching for a work related file in a shared web site in consideration of a registration pattern of a work related file of a illegal uploader.

The illegal content distribution on the existing P2P site is mainly performed by the power up loader, and the trend content posting can be repeatedly re-registered in the existing P2P site. Many peer-to-peer sites appear to be actively registering, and are regularly re-registering the same postings to encourage file sharing, in order to increase the exposure of posts of interest.

As described above, in consideration of the post information / file information, capacity information, and anomaly pattern information of the shared file 400 acquired on the torrent site, when the P2P site is searched, the attribute information (e.g., post information, The file name information, the capacity information, and the like) is equal to or greater than the first threshold value, the shared file 400 is stored in the asset related file (410). For example, the degree of similarity may be calculated in consideration of the similarity between the characteristic information of the shared file 400 and the characteristic information related to the work. Specifically, weights are assigned to each sub-property information, the degree of similarity between the sub-property information is calculated, and the similarity of the shared file can be calculated by multiplying the weight by the weight.

When the similarity degree of the shared file calculated based on the characteristic information of the shared file and the characteristic information related to the copyrighted work is less than the second threshold value, the copyrighted file (non-copyright related file) It can be decided not.

However, when the similarity degree of the shared file is less than the first threshold value and is equal to or greater than the second threshold value, it may be difficult to determine the shared file as the copyright-related file 410 without an additional judgment process. Therefore, according to the embodiment of the present invention, when the similarity degree of the shared file is less than the first threshold value and is equal to or greater than the second threshold value, it may be determined whether or not the corresponding shared file is the asset- have.

Hereinafter, a shared file whose similarity degree is less than the first threshold value and equal to or greater than the second threshold value is expressed with the term illegal sharing doubt file 420. [

When the illegal sharing suspicion file 420 is found, the number of registered contents of the registrant (or uploader) who registered the illegal sharing suspicion file 420 can be confirmed. If the number of registered contents is equal to or larger than the threshold registration number, the illegal sharing suspicion file 420 may be determined as a copyright related file.

Or the number of times the illegal sharing suspicion file 420 is registered within a predetermined period is equal to or greater than the critical registration number, the illegal sharing doubt file 420 may be determined as a copyright related file. If the registration period of the illegal sharing suspicion file 420 is not known, if the degree of repetitive registration of the post number range (for example, registration of three or more identical contents among 400 posts) is equal to or greater than the threshold number, ) Can be determined as a copyright-related file.

If both of the above threshold number of registration and threshold number of times of registration are satisfied, the illegal sharing doubt file 420 may be determined as a copyright related file.

5 is a conceptual diagram illustrating a method of searching for a work related file according to an embodiment of the present invention.

FIG. 5 discloses a method of searching for a work related file on a shared web site in consideration of the degree of association between shared web sites.

File sharing can be performed between shared Web sites. For example, in the case of the P2P site B, it can be operated by mirroring the P2P site A. Alternatively, the P2P site C can be operated using the same part of the shared files of the P2P site A.

That is, there may exist shared files which are repeatedly uploaded among the shared web sites, and it is necessary to search for the files related to the works considering the relationship between the shared web sites.

Referring to FIG. 5, the work sharing monitoring apparatus can receive information about a shared web site and analyze a shared file registered in the shared web site to determine a relationship between the shared web sites.

First, if the degree of similarity between the first P2P site and the second P2P site is equal to or greater than the first threshold value, the relationship between the first P2P site and the second P2P site can be determined as the mirroring relation (500).

For example, whether or not the identities of the shared files are identical can be analyzed by category. Many P2P sites share files based on similar categories (movies, dramas, entertainment, music, etc.). Therefore, the work sharing monitoring apparatus can calculate the similarity degree for each category and determine the similarity degree between the P2P sites based on the similarity degree for each category.

When the relationship between the plurality of P2P sites is the mirroring relation 500, the plurality of P2P sites can perform the search based on the same anomaly pattern information. For example, when there are a plurality of P2P sites having the mirroring relationship 500, the anomaly pattern information is determined based on one P2P site of the plurality of P2P sites, To the plurality of P2P sites having the copyright-related files. When this method is used, the processing speed for extracting the copyright-related file can be improved because an anomaly pattern information determination procedure for all of a plurality of P2P sites having the mirroring relation 500 is not performed.

In addition, by analyzing the degree of similarity between the shared files, the degree of similarity between the first P2P site and the second P2P site is equal to or greater than the second threshold value. If less than the first threshold, the relationship between the first P2P site and the second P2P site may be determined by some mirroring relationship 520. [ For a P2P site with some mirroring relationships 520, some of the shared files may be the same, while the remaining shared files may be different.

If the relationship between the plurality of P2P sites is a part of the mirroring relationship 520, the plurality of P2P sites may classify the shared file as a mirroring shared file and a non-mirroring shared file. The classification of the mirrored shared file and the non-mirrored shared file can be performed simply based on the post information of the shared file. For example, if the post information is the same in the first P2P site and the second P2P site, the shared file having the corresponding post information can be classified as the mirroring shared file. The remaining shared files that can not be classified as mirroring shared files in each P2P site can be classified as non-mirroring shared files.

As described above, when the relation between the first P2P site and the second P2P site is the partial mirror relation 500, the search can be performed based on the same anomaly pattern information for the shared file having the mirroring relationship 500 . That is, the anomaly pattern information determined in one P2P site can be used to search for copyright-related files in the remaining P2P sites having a part of the mirroring relationship 520. [

For an unmirrored shared file that does not have the mirroring relationship 500, a different anomaly pattern information determination procedure may be performed. That is, a separate pattern information determination procedure may be performed to search for a non-mirrored shared file in each of a plurality of P2P sites having some mirroring relationship 520, The copyright-related file can be searched in consideration of the individual pattern information.

Also, if the degree of similarity between the first P2P site and the second P2P site is less than the second threshold by analyzing the similarity between the shared files, the relationship between the first P2P site and the second P2P site is a non-mirroring relationship 530 ). A plurality of P2P sites having the non-mirroring relation 530 can perform the individual pattern information determination procedure, and the copyright related file can be searched by considering the individual pattern information determined based on the individual pattern information determination procedure.

6 is a conceptual diagram illustrating a work sharing monitoring apparatus according to an embodiment of the present invention.

Fig. 6 shows an arrangement of a work sharing monitoring apparatus. The constituent unit of the work sharing monitoring apparatus can perform the work sharing monitoring procedure described above with reference to FIGS. 1 to 5. For example, each component can perform the following operations.

6, the work sharing monitoring apparatus includes a work related information obtaining unit 600, a first work related file extracting unit 610, an anomaly pattern information determining unit 620, a second work related file extracting unit 630, A supplementary work related file determination unit 640, a shared web site relationship determination unit 650, and a processor 660.

The asset-related information obtaining unit 600 obtains asset-related information (e.g., a hash value, an original name, a capacity, and the like) of a shared file for determining whether or not the asset-related file is shared on a shared web site (e.g., a torrent site) , Producer (s), cast (if applicable), publication date (date of distribution, such as date of opening), etc.).

The first work related file extraction unit 610 can be implemented to extract a work related file based on the hash value. For example, the first work related file extracting unit 610 may be implemented to extract a work related file on the torrent site by comparing the hash value of the work related file with the hash value of the shared file on the torrent site.

The anomaly pattern information determination unit 620 can determine an anomalous pattern, which is an irregular pattern of the shared file, based on the file name information, the post information, and the like of the shared file determined by the work related file extracted by the first work related file extraction unit.

The second work related file extracting unit 630 can be implemented to extract the work related file on the shared web site in consideration of the file name information / post information and the anomaly pattern information of the shared file. Also, the second work related file extracting unit 630 may be implemented to determine whether the shared file is a work related file by comparing the additional information added to the shared file with the supplementary information of the work related file.

The additional work related file determination unit 640 may be implemented to determine whether an illegal sharing suspicion file is an asset related file. As described above, an illegal sharing suspicious file whose similarity to a copyright-related file is less than a first threshold value and equal to or larger than a second threshold value is an asset-related file based on consideration of an upload pattern of an illegal sharing suspicious file of the additional copyright- Can be determined.

The shared web site relationship determination unit 650 may be implemented to determine a relationship between shared web sites. As described above, it may be determined whether the shared file is a work related file in consideration of the relationship between the shared web sites.

The processor 660 includes a work related information obtaining unit 600, a first work related file extracting unit 610, an anomaly pattern information determining unit 620, a second work related file extracting unit 630, (640), and a shared web site relationship determination unit (650).

Such a monitoring method for copyright sharing may be implemented in an application or in the form of program instructions that can be executed through various computer components and recorded on a computer-readable recording medium. The computer-readable recording medium may include program commands, data files, data structures, and the like, alone or in combination.

The program instructions recorded on the computer-readable recording medium may be ones that are specially designed and configured for the present invention and are known and available to those skilled in the art of computer software.

Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks and magnetic tape, optical recording media such as CD-ROMs and DVDs, magneto-optical media such as floptical disks, media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like.

Examples of program instructions include machine language code such as those generated by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware device may be configured to operate as one or more software modules for performing the processing according to the present invention, and vice versa.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those skilled in the art that various changes and modifications may be made therein without departing from the spirit and scope of the invention as defined in the appended claims. It will be possible.

Claims (10)

The monitoring method for asset sharing,
Receiving first hash value information associated with a work;
Based on the first hash value information and the second hash value of the first shared file uploaded on the first shared website, whether the first shared file is a copyright-related file related to the copyrighted work ;
Requesting deletion of the first shared file if the first shared file is the copyright related file;
Extracting characteristic information of the first shared file and determining anomalous pattern information based on characteristic information of the first shared file;
Determining whether a second shared file uploaded on a second shared web site based on the anomalous pattern information is the copyright related file; And
Requesting deletion of the second shared file when the second shared file is the copyright related file,
Wherein the characteristic information includes post information of the first shared file and file name information of the first shared file,
Wherein the anomaly pattern information includes information on a change pattern in which the file name information of the first shared file is changed based on information related to the work,
The change pattern includes a consonant and a vowel disassembly pattern included in the special character addition pattern, the post information, and the file name information included in the post information and the file name information, the consonant included in the post information and the file name information, and,
The consonant and vowel disassembly pattern may include a pattern arranged in consonant and vowel and a pattern in which the consonant and the vowel are eliminated and the consonant and the vowel variation pattern include a pattern for changing the order of the letters and a consonant And a pattern to be created by the user.
delete delete 2. The method of claim 1, wherein the step of determining whether the second shared file uploaded on the second shared web site based on the anomaly pattern information is the copyright-
Determining a degree of similarity between the second shared file and the copyright related file;
Determining the second shared file as the copyright-related file when the similarity degree is equal to or greater than the first threshold value;
Determining the second shared file as an illegal sharing suspicion file if the similarity degree is greater than or equal to a second threshold value and less than the first threshold value; And
Determining that the second shared file is not the copyright related file if the similarity is less than the second threshold,
Wherein the illegal sharing suspicion file further includes a registration pattern on the second shared web site of the second shared file to further determine the copyright related file.
The method according to claim 1,
Wherein the first shared web site is a site where a sharing service of the first shared file is performed by a plurality of users storing the first shared file,
Wherein the second shared web site is a site where a sharing service of the second shared file is performed by one user storing the second shared file.
A work sharing monitoring apparatus for monitoring a work sharing, the apparatus comprising:
The work sharing monitoring apparatus includes a processor,
The processor receives first hash value information associated with the work,
Based on the first hash value information and the second hash value of the first shared file uploaded on the first shared website, whether the first shared file is a copyright-related file related to the copyrighted work Lt; / RTI &gt;
Requesting deletion of the first shared file if the first shared file is the copyright-related file,
Extracting characteristic information of the first shared file, determining anomalous pattern information based on characteristic information of the first shared file,
Determining whether or not a second shared file uploaded on the second shared web site based on the anomaly pattern information is the copyright related file,
If the second shared file is the copyright-related file, requesting deletion of the second shared file,
Wherein the characteristic information includes post information of the first shared file and file name information of the first shared file,
Wherein the anomaly pattern information includes information on a change pattern in which the file name information of the first shared file is changed based on information related to the work,
The change pattern includes a consonant and a vowel disassembly pattern included in the special character addition pattern, the post information, and the file name information included in the post information and the file name information, the consonant included in the post information and the file name information, and,
The consonant and vowel disassembly pattern includes a pattern arranged in consonant and vowel, and a pattern in which the consensus is removed and separately prepared. The consonant and vowel variation patterns are patterns in which the order of the letters is changed and consonants are separated And a pattern for creating a copyrighted work.
delete delete The method according to claim 6,
Wherein the processor determines a degree of similarity between the second shared file and the copyright-related file,
Determining the second shared file as the copyright-related file when the similarity degree is equal to or greater than the first threshold value,
Determining the second shared file as an illegal sharing suspicion file if the similarity degree is not less than the second threshold value or less than the first threshold value,
And determines that the second shared file is not the copyright related file if the similarity is less than the second threshold,
Wherein the illegal sharing suspicion file is determined as the copyright related file by further considering a registration pattern on the second shared web site of the second shared file.
The method according to claim 6,
Wherein the first shared web site is a site where a sharing service of the first shared file is performed by a plurality of users storing the first shared file,
Wherein the second shared website is a site where a sharing service of the second shared file is performed by one user storing the second shared file.
KR1020150143886A 2015-10-15 2015-10-15 Method and apparatus for monitoring for sharing of literary works KR101634754B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150143886A KR101634754B1 (en) 2015-10-15 2015-10-15 Method and apparatus for monitoring for sharing of literary works

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150143886A KR101634754B1 (en) 2015-10-15 2015-10-15 Method and apparatus for monitoring for sharing of literary works

Publications (1)

Publication Number Publication Date
KR101634754B1 true KR101634754B1 (en) 2016-07-22

Family

ID=56681378

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150143886A KR101634754B1 (en) 2015-10-15 2015-10-15 Method and apparatus for monitoring for sharing of literary works

Country Status (1)

Country Link
KR (1) KR101634754B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180083800A (en) 2017-01-13 2018-07-23 (주)엠더블유스토리 Monitoring system and method for detect changes in web page by comparing tree structures
CN112651836A (en) * 2019-05-15 2021-04-13 创新先进技术有限公司 Copyright distribution method and device based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040111109A (en) 2003-06-18 2004-12-31 세이코 엡슨 가부시키가이샤 Game machine
KR20100105983A (en) * 2009-03-23 2010-10-01 (주) 컨텐츠로드 Method for protecting copy right of video contents uploaded on internet by using hash code
KR20150086958A (en) * 2014-01-21 2015-07-29 (주) 아워텍 System and method for determining infringement of copyright based on the text reference point

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040111109A (en) 2003-06-18 2004-12-31 세이코 엡슨 가부시키가이샤 Game machine
KR20100105983A (en) * 2009-03-23 2010-10-01 (주) 컨텐츠로드 Method for protecting copy right of video contents uploaded on internet by using hash code
KR20150086958A (en) * 2014-01-21 2015-07-29 (주) 아워텍 System and method for determining infringement of copyright based on the text reference point

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180083800A (en) 2017-01-13 2018-07-23 (주)엠더블유스토리 Monitoring system and method for detect changes in web page by comparing tree structures
CN112651836A (en) * 2019-05-15 2021-04-13 创新先进技术有限公司 Copyright distribution method and device based on block chain

Similar Documents

Publication Publication Date Title
US7610382B1 (en) System and method for marking content
US10762352B2 (en) Method and system for the automatic identification of fuzzy copies of video content
US20080040807A1 (en) Systems and methods of fingerprinting and identifying digital versatile disc
US20140280272A1 (en) Media content substitution
KR101800373B1 (en) System for searching illegal contents and method of thereof
KR20100134610A (en) Annotating video intervals
JP2013543178A (en) Publication fingerprint extraction method, publication fingerprint extraction device, publication identification system using fingerprint, and publication identification method using fingerprint
KR100930077B1 (en) Watermark Tracking System for Digital Rights Management
JP5181691B2 (en) Information processing apparatus, information processing method, computer program, and recording medium
KR101634754B1 (en) Method and apparatus for monitoring for sharing of literary works
JP2011180801A (en) Video search apparatus, program and method for searching through many reference videos on search key video
Marcelino et al. A benchmark of visual storytelling in social media
CA2413808A1 (en) Method and system for protection against unauthorized distribution of copyrighted computer files over peer-to-peer networks
US20170293803A1 (en) Method and a system for comparing video files
KR101027502B1 (en) System and Method for Managing of Contents
JP6760987B2 (en) Illegal content search device, illegal content search method and program
KR20130082879A (en) A method of providing integrated music service by matching music to posted article through meta information posted on social network service
JP2004023247A (en) Copyright management system
KR102423636B1 (en) Method of managing copyright of content
JP6632564B2 (en) Illegal content search device, illegal content search method, and program
KR101545273B1 (en) Apparaus and method for detecting dupulicated document of big data text using clustering and hashing
JP4990823B2 (en) Illegal content determination support system and control program for illegal content determination support system
Agrawal et al. Copyright infringement detection of music videos on YouTube by mining video and uploader meta-data
JP6530002B2 (en) CONTENT SEARCH DEVICE, CONTENT SEARCH METHOD, PROGRAM
JP6762678B2 (en) Illegal content search device, illegal content search method and program

Legal Events

Date Code Title Description
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20190625

Year of fee payment: 4