KR101634754B1 - Method and apparatus for monitoring for sharing of literary works - Google Patents
Method and apparatus for monitoring for sharing of literary works Download PDFInfo
- Publication number
- KR101634754B1 KR101634754B1 KR1020150143886A KR20150143886A KR101634754B1 KR 101634754 B1 KR101634754 B1 KR 101634754B1 KR 1020150143886 A KR1020150143886 A KR 1020150143886A KR 20150143886 A KR20150143886 A KR 20150143886A KR 101634754 B1 KR101634754 B1 KR 101634754B1
- Authority
- KR
- South Korea
- Prior art keywords
- file
- shared
- information
- pattern
- shared file
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000012544 monitoring process Methods 0.000 title claims abstract description 35
- 238000012217 deletion Methods 0.000 claims abstract description 12
- 230000037430 deletion Effects 0.000 claims abstract description 12
- 230000002547 anomalous effect Effects 0.000 claims description 12
- 230000001788 irregular Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 5
- 238000000605 extraction Methods 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 239000000470 constituent Substances 0.000 description 1
- 230000009193 crawling Effects 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012805 post-processing Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
- G06Q50/184—Intellectual property management
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- Human Resources & Organizations (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Multimedia (AREA)
- Operations Research (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a shooting method and apparatus, and more particularly, to a monitoring method and apparatus for sharing a work.
There are many discussions to solve copyright infringement problems on web hard and P2P sites due to copyright issues in web hard and peer to peer sites.
Article 30 of the Copyright Act states that "If a published work is not made for commercial purposes and is used for personal use or within a limited range of assumptions and equivalents, the user may reproduce it. Provided, however, that such copying by copying equipment installed to provide for the use of the public shall not be so. " It is a reproduction regulation for private use.
Originally, copying for private use is also infringed, but it is non-infringement because it is costly and cumbersome to enforce copyright against an end user in the personal domain, and infringement caused by it is negligible.
Copying CD music to a digital file and storing it on a PC, recording a TV broadcast program at home, copying a book for personal use, or downloading necessary data from a general Internet site is a copy for private use .
However, knowing that it is an illegal site, downloading a copyrighted work there is not a copy for private use. Our court ruled that "the copyrighted work on the internet site is obviously illegal to infringe copyright, and it is not a copy for private use."
Therefore, downloading a copyrighted work from a site such as a homepage, a café, or a blog is an excuse for private copying. However, you should be careful to download a copyrighted work from a P2P or web hard drive.
One aspect of the present invention provides a monitoring method for copyrighted work sharing.
Another aspect of the invention provides a monitoring device for asset sharing.
According to an aspect of the present invention, there is provided a method of monitoring a work sharing method, the method comprising: receiving first hash value information associated with a work, receiving first hash value information from the first shared web site, Determining whether the first shared file is a copyright-related file associated with the work based on a second hash value of the first shared file; if the first shared file is the copyright-related file, Extracting characteristic information of the first shared file and determining anomalous pattern information based on the characteristic information of the first shared file; Determining whether a second shared file uploaded on the web site is the copyright related file, determining whether the second shared file is the copyright related file , And requesting deletion of the second shared file.
Meanwhile, the characteristic information includes the post information of the first shared file and the file name information of the first shared file, and the anomaly pattern information includes the post information of the first shared file, And information on a change pattern in which the file name information of the first shared file is changed.
The change pattern may include consonant and vowel disassembly patterns included in the special character addition pattern, the post information, and the file name information included in the post information and the file name information, consonants included in the post information and file name information, . ≪ / RTI >
The step of determining whether the second shared file uploaded on the second shared web site based on the anomalous pattern information is the copyright related file may include determining a similarity degree between the second shared file and the copyright related file Determining the second shared file as the copyright-related file if the degree of similarity is equal to or greater than the first threshold value; and if the similarity is less than the second threshold value or less than the first threshold value, And determining that the second shared file is not the copyright related file if the degree of similarity is less than the second threshold value, And further determines a registration pattern on the second shared web site of the second shared file as the copyright related file .
The first shared web site is a site where a sharing service of the first shared file is performed by a plurality of users storing the first shared file, And may be a site where a sharing service of the second shared file is performed by a single user who stores the shared file.
A work sharing monitoring apparatus for monitoring a work sharing according to another aspect of the present invention includes a processor for receiving first hash value information related to a work and for receiving first hash value information at a first shared web site, Determining whether the first shared file is a copyright related file related to the work based on the first hash value of the first shared file uploaded on the first shared web site, Requesting deletion of the first shared file, extracting the characteristic information of the first shared file, determining anomaly pattern information based on the characteristic information of the first shared file, Determining whether a second shared file uploaded on the second shared web site is the copyright-related file based on the anomaly pattern information, And request deletion of the second shared file when the second shared file is the copyright-related file.
The attribute information includes the post information of the first shared file and the file name information of the first shared file, and the anomaly pattern information includes the post information of the first shared file, And information on a change pattern in which the file name information of the first shared file is changed.
The change pattern may include consonant and vowel disassembly patterns included in the special character addition pattern, the post information, and the file name information included in the post information and the file name information, consonants included in the post information and file name information, . ≪ / RTI >
The processor may determine the degree of similarity between the second shared file and the copyright-related file, determine the second shared file as the copyright-related file if the degree of similarity is equal to or greater than the first threshold value, Determining that the second shared file is an illegal sharing suspicious file if the second shared file is not less than the threshold value or less than the first threshold value and that the second shared file is not the copyright related file if the similarity is less than the second threshold value The illegal sharing suspicion file may be determined as the copyright related file by further considering the registration pattern on the second shared web site of the second shared file.
The first shared web site is a site where a sharing service of the first shared file is performed by a plurality of users storing the first shared file, And may be a site where a sharing service of the second shared file is performed by a single user who stores the shared file.
According to the monitoring method and apparatus for sharing a copyrighted work according to the embodiment of the present invention, illegal upload files in violation of copyright uploaded to various shared web sites can be monitored to protect the rights of the copyright owners.
FIG. 1 is a flowchart illustrating a method of searching for illegal sharing of a copyright-related file related to an original work in a shared web site according to an embodiment of the present invention.
FIG. 2 is a conceptual diagram illustrating a method of searching for an asset-related file on a P2P site by additionally considering an anomaly pattern for a shared file according to an embodiment of the present invention.
FIG. 3 is a conceptual diagram illustrating a method of searching for a work-related file based on anomalous word pattern information of a work sharing monitoring apparatus according to an embodiment of the present invention.
4 is a conceptual diagram illustrating a method of searching for a work related file according to an embodiment of the present invention.
5 is a conceptual diagram illustrating a method of searching for a work related file according to an embodiment of the present invention.
6 is a conceptual diagram illustrating a work sharing monitoring apparatus according to an embodiment of the present invention.
The following detailed description of the invention refers to the accompanying drawings, which illustrate, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It should be understood that the various embodiments of the present invention are different, but need not be mutually exclusive. For example, certain features, structures, and characteristics described herein may be implemented in other embodiments without departing from the spirit and scope of the invention in connection with an embodiment. It is also to be understood that the position or arrangement of the individual components within each disclosed embodiment may be varied without departing from the spirit and scope of the invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is to be limited only by the appended claims, along with the full scope of equivalents to which such claims are entitled, if properly explained. In the drawings, like reference numerals refer to the same or similar functions throughout the several views.
Hereinafter, preferred embodiments of the present invention will be described in more detail with reference to the drawings.
Sharing illegally through torrents and peer-to-peer (P2P) is a natural part of many Internet network users who are unaware of the illegal nature.
In the embodiment of the present invention, based on the original author's request, based on the information of the original work (hash value, original name, capacity, producer, cast (if any), and public date To search for illegal sharing of files related to the original work on a file sharing website such as a torrent service providing site and a P2P service providing site, and to request deletion of a file related to an asset shared with a file sharing web site .
In addition to this, by analyzing the illegal sharing pattern of the work related file, information about the anomalous pattern for the sharing of the work related file is acquired, and the information about the anomalous pattern is considered, , A search can be performed for a file associated with an anomalously shared work.
Hereinafter, a method for searching for illegal sharing of a work related file related to a original work in a specific shared web site according to an embodiment of the present invention is disclosed.
FIG. 1 is a flowchart illustrating a method of searching for illegal sharing of a copyright-related file related to an original work in a shared web site according to an embodiment of the present invention.
FIG. 1 illustrates a method of monitoring a copyright-related file shared on a shared web site by an asset-sharing monitoring apparatus.
Referring to FIG. 1, a copyright-related information (for example, a hash value) is obtained from a shared file (step S100).
In order to determine whether a copyright-related file is shared by a shared web site (e.g., a torrent site), information related to the copyright of the shared file (e.g., hash value, original name, capacity, producer, ), And a public date (such as the opening date, etc.).
For example, if a hash value is information including a property of a work, and the file has the same hash value as the work, the file can be determined as a work related file. The information on the hash value of the file shared through the torrent site can be acquired even when the file is not downloaded as all of the information related to the work. Thus, a hash value of a file shared through a torrent site can be obtained.
A file having a hash value that matches the hash value of the copyrighted work among the shared files is determined as the copyright-related file based on the hash value of the copyrighted work, and the deletion procedure for the copyright-related file is performed (step S110).
The hash value is information containing the characteristics of the work, and if the file having the same hash value of the work exists, the file can be determined as the work related file.
If the hash value of the shared file acquired on the basis of step S100 is compared with the hash value of the copyrighted work and has the same value, the shared file can be estimated as a copyright-related file and requested to be deleted.
And collects file name information / bulletin information and capacity information of a copyright-related file (step S120).
File name information / bulletin information and capacity information of a work related file searched on a torrent site. For example, the file name of the copyright-related file, the bulletin information of the copyright-related file, and the capacity information may be collected using the crawling technology. In the case of a file shared through a peer-to-peer (P2P) site, it may be difficult to judge whether a file is a work-related file based on a hash value if the file is not completely downloaded. Accordingly, the P2P site can determine whether or not the copyright-related file is shared based on the file name information / the bulletin information and the capacity information of the copyright-related file searched on the torrent site.
Related file in the P2P site based on the file name information / post information and the capacity information of the work related file collected on the torrent site (step S130).
The file information / post information and the capacity information of the shared file shared on the P2P site are compared with the file name information / the post information and the capacity information of the copyright related files collected on the torrent site, and if the similarity is high, File. The work sharing monitoring apparatus can delete the files related to the remaining works excluding the files associated with the copyright holder among the work related files.
For example, file information / post information of a shared file shared by a P2P site can be modified to avoid filtering by the copyright holder. Therefore, the work sharing monitoring apparatus can search the work related file on the P2P site by additionally considering an anomaly pattern of the file information / post information of the shared file.
Hereinafter, an embodiment of the present invention discloses a method for searching a copyright-related file on a P2P site by further considering an anomaly pattern for a file name of a shared file.
FIG. 2 is a conceptual diagram illustrating a method of searching for an asset-related file on a P2P site by additionally considering an anomaly pattern for a shared file according to an embodiment of the present invention.
Referring to FIG. 2, the work sharing monitoring apparatus determines the anomaly pattern information 200, and generates an anomaly pattern information 200 based on the anomaly pattern information 200 and information related to the work (title, opening date, Post information / modified file name information 220 can be determined. The work sharing monitoring apparatus compares the modified bulletin information / modified file name information 220 associated with the work and the bulletin information / file name information 240 of the shared file uploaded on the P2P site to search for the work related file on the P2P site .
File sharers can modify the posting information / filenames of shared files in various ways to avoid filtering related to the work. Therefore, the modified post information / file name information 220 related to the work is determined in consideration of the deformation pattern information 200, and based on the modified post information / file name information 220 related to the work, . ≪ / RTI > Hereinafter, a method for searching a work related file on a P2P site based on modified posting information for convenience of explanation is disclosed.
As a specific example, the work sharing monitoring apparatus can determine the anomaly pattern information 200 based on the post information of the work related file having the same hash value as the work at the torrent site.
The title, user ID, date, and number of a post of a work related file are collected in the database while the deletion request process for the work related file is performed in the torrent site, and the anomaly pattern information 200 Can be determined. The modified post information of the work related file is determined based on the anomaly pattern information 200 determined through the torrent site, and the work related file can be extracted on the P2P site in consideration of the transformed post information of the work related file.
Table 1 below shows modified post information of a work related file.
<Table 1>
Referring to Table 1, an irregularity that can be included in the modified post information of the work related file based on various deformation methods is disclosed.
For example, you can insert special characters between titles, consonants, and vowels, change the order of letters, remove letters from the base by writing them separately, how to write them down, And the way in which the work can be identified by the name of the cast).
The work sharing monitoring apparatus determines the anomaly pattern information 200 in consideration of the modified post information of various work related files searched on the shared web site, and the anomaly pattern information 200 detects the anomaly pattern information . ≪ / RTI >
According to the embodiment of the present invention, the anomaly pattern information 200 may be considered for searching for other work-related files. In other words, the work sharing monitoring apparatus accumulates various anomaly pattern information 200 as it searches for a work related file, stores it in a database, and can utilize it to search for a work related file in a P2P site.
According to an embodiment of the present invention, in another method, on the contrary, it is possible to transform a post of a shared file of a P2P site on the basis of the anomaly pattern information 200, and to transmit postings of the modified shared file and information (title, Cast, etc.) to determine whether the shared file is an asset-related file.
FIG. 3 is a conceptual diagram illustrating a method of searching for a work-related file based on anomalous word pattern information of a work sharing monitoring apparatus according to an embodiment of the present invention.
3, the post of the shared file of the P2P site is transformed based on the anomaly pattern information and the information related to the work (title, release date, cast) is compared with the post of the transformed shared file, Or < / RTI >
Referring to FIG. 3, all the special characters are removed from the post information of the shared file on the P2P site, and the processed post information 320 is compared with the work related information to determine whether the shared file is a work related file.
For example, when a pattern in which a special character is included in a title of a work on a post is included in the anomaly pattern information 300, after removing the special character included in the post information, the processed post information 320 and the content 340) to determine whether the shared file is an asset-related file.
Such. Based on the elimination of special characters, a pattern including special characters such as No. 1/3 anomalous words (polar, non-numeric, hypothetical, rhetorical) in Table 1 can be resolved.
In the case where a pattern in which the title of the work is listed as a consonant / vowel on the post is included in the anomaly pattern information 300 and a consonant / vowel sequence exists in the post information of the shared file on the P2P site, It is determined whether the shared file is a work related file by comparing the processing post information 320 and the work related information 340 with each other.
For example, if there is a list of consonants / vowels in the post information such as the 5th post (a. ㅡ. A. ㅋ ㅋ. ㅜ. ㅜ a. , It is possible to determine whether or not the shared file is a work related file by comparing the processing post information (the most probable verb) 320 and the work related information 340 after performing a combination of consonants / vowels.
In this case, there can be a combination ('ㄳ', 'ㅄ', 'ㄵ', 'ㄺ', 'ㄻ', 'ㄼ', 'ㄾ', etc.) A comparison with the information can be performed. This method can detect anomalous words in the same pattern as the ninth sentence.
In addition, in the case where a pattern generated as a title (twin consonant) of a work on a post is included in the anomaly pattern information 300 and a sound (twin consonant) exists in the post information of the shared file on the P2P site, It is possible to determine whether or not the shared file is a work related file by comparing the processing post information 320 and the work related information 340 after performing post processing to transform it into a possible consonant.
In the case where a pattern including additional copyright information (release date, lead, etc.) other than the title of the work on the post is included in the anomaly pattern information 300 and additional information is included in the post information of the shared file on the P2P site, It may be determined whether the shared file is an asset-related file in consideration of whether the information is additional work information.
In the case of 2 (Yoon Seok, Yu Hae Jin), 4 (Yoon Seok, Hae Jin), 6 (Yoon Se Jin) and 6 (Yoon Se Jin release) in Table 1 are included in the post of the shared file, File.
As an example, the anomaly pattern information 300 may be accumulated and utilized in the asset sharing monitoring apparatus, and various anomaly pattern information 300 may be used in combination.
4 is a conceptual diagram illustrating a method of searching for a work related file according to an embodiment of the present invention.
4 illustrates a method of searching for a work related file in a shared web site in consideration of a registration pattern of a work related file of a illegal uploader.
The illegal content distribution on the existing P2P site is mainly performed by the power up loader, and the trend content posting can be repeatedly re-registered in the existing P2P site. Many peer-to-peer sites appear to be actively registering, and are regularly re-registering the same postings to encourage file sharing, in order to increase the exposure of posts of interest.
As described above, in consideration of the post information / file information, capacity information, and anomaly pattern information of the shared file 400 acquired on the torrent site, when the P2P site is searched, the attribute information (e.g., post information, The file name information, the capacity information, and the like) is equal to or greater than the first threshold value, the shared file 400 is stored in the asset related file (410). For example, the degree of similarity may be calculated in consideration of the similarity between the characteristic information of the shared file 400 and the characteristic information related to the work. Specifically, weights are assigned to each sub-property information, the degree of similarity between the sub-property information is calculated, and the similarity of the shared file can be calculated by multiplying the weight by the weight.
When the similarity degree of the shared file calculated based on the characteristic information of the shared file and the characteristic information related to the copyrighted work is less than the second threshold value, the copyrighted file (non-copyright related file) It can be decided not.
However, when the similarity degree of the shared file is less than the first threshold value and is equal to or greater than the second threshold value, it may be difficult to determine the shared file as the copyright-related file 410 without an additional judgment process. Therefore, according to the embodiment of the present invention, when the similarity degree of the shared file is less than the first threshold value and is equal to or greater than the second threshold value, it may be determined whether or not the corresponding shared file is the asset- have.
Hereinafter, a shared file whose similarity degree is less than the first threshold value and equal to or greater than the second threshold value is expressed with the term illegal sharing doubt file 420. [
When the illegal sharing suspicion file 420 is found, the number of registered contents of the registrant (or uploader) who registered the illegal sharing suspicion file 420 can be confirmed. If the number of registered contents is equal to or larger than the threshold registration number, the illegal sharing suspicion file 420 may be determined as a copyright related file.
Or the number of times the illegal sharing suspicion file 420 is registered within a predetermined period is equal to or greater than the critical registration number, the illegal sharing doubt file 420 may be determined as a copyright related file. If the registration period of the illegal sharing suspicion file 420 is not known, if the degree of repetitive registration of the post number range (for example, registration of three or more identical contents among 400 posts) is equal to or greater than the threshold number, ) Can be determined as a copyright-related file.
If both of the above threshold number of registration and threshold number of times of registration are satisfied, the illegal sharing doubt file 420 may be determined as a copyright related file.
5 is a conceptual diagram illustrating a method of searching for a work related file according to an embodiment of the present invention.
FIG. 5 discloses a method of searching for a work related file on a shared web site in consideration of the degree of association between shared web sites.
File sharing can be performed between shared Web sites. For example, in the case of the P2P site B, it can be operated by mirroring the P2P site A. Alternatively, the P2P site C can be operated using the same part of the shared files of the P2P site A.
That is, there may exist shared files which are repeatedly uploaded among the shared web sites, and it is necessary to search for the files related to the works considering the relationship between the shared web sites.
Referring to FIG. 5, the work sharing monitoring apparatus can receive information about a shared web site and analyze a shared file registered in the shared web site to determine a relationship between the shared web sites.
First, if the degree of similarity between the first P2P site and the second P2P site is equal to or greater than the first threshold value, the relationship between the first P2P site and the second P2P site can be determined as the mirroring relation (500).
For example, whether or not the identities of the shared files are identical can be analyzed by category. Many P2P sites share files based on similar categories (movies, dramas, entertainment, music, etc.). Therefore, the work sharing monitoring apparatus can calculate the similarity degree for each category and determine the similarity degree between the P2P sites based on the similarity degree for each category.
When the relationship between the plurality of P2P sites is the
In addition, by analyzing the degree of similarity between the shared files, the degree of similarity between the first P2P site and the second P2P site is equal to or greater than the second threshold value. If less than the first threshold, the relationship between the first P2P site and the second P2P site may be determined by some mirroring relationship 520. [ For a P2P site with some mirroring relationships 520, some of the shared files may be the same, while the remaining shared files may be different.
If the relationship between the plurality of P2P sites is a part of the mirroring relationship 520, the plurality of P2P sites may classify the shared file as a mirroring shared file and a non-mirroring shared file. The classification of the mirrored shared file and the non-mirrored shared file can be performed simply based on the post information of the shared file. For example, if the post information is the same in the first P2P site and the second P2P site, the shared file having the corresponding post information can be classified as the mirroring shared file. The remaining shared files that can not be classified as mirroring shared files in each P2P site can be classified as non-mirroring shared files.
As described above, when the relation between the first P2P site and the second P2P site is the
For an unmirrored shared file that does not have the
Also, if the degree of similarity between the first P2P site and the second P2P site is less than the second threshold by analyzing the similarity between the shared files, the relationship between the first P2P site and the second P2P site is a non-mirroring relationship 530 ). A plurality of P2P sites having the non-mirroring relation 530 can perform the individual pattern information determination procedure, and the copyright related file can be searched by considering the individual pattern information determined based on the individual pattern information determination procedure.
6 is a conceptual diagram illustrating a work sharing monitoring apparatus according to an embodiment of the present invention.
Fig. 6 shows an arrangement of a work sharing monitoring apparatus. The constituent unit of the work sharing monitoring apparatus can perform the work sharing monitoring procedure described above with reference to FIGS. 1 to 5. For example, each component can perform the following operations.
6, the work sharing monitoring apparatus includes a work related information obtaining unit 600, a first work related file extracting unit 610, an anomaly pattern information determining unit 620, a second work related file extracting unit 630, A supplementary work related file determination unit 640, a shared web site relationship determination unit 650, and a processor 660.
The asset-related information obtaining unit 600 obtains asset-related information (e.g., a hash value, an original name, a capacity, and the like) of a shared file for determining whether or not the asset-related file is shared on a shared web site (e.g., a torrent site) , Producer (s), cast (if applicable), publication date (date of distribution, such as date of opening), etc.).
The first work related file extraction unit 610 can be implemented to extract a work related file based on the hash value. For example, the first work related file extracting unit 610 may be implemented to extract a work related file on the torrent site by comparing the hash value of the work related file with the hash value of the shared file on the torrent site.
The anomaly pattern information determination unit 620 can determine an anomalous pattern, which is an irregular pattern of the shared file, based on the file name information, the post information, and the like of the shared file determined by the work related file extracted by the first work related file extraction unit.
The second work related file extracting unit 630 can be implemented to extract the work related file on the shared web site in consideration of the file name information / post information and the anomaly pattern information of the shared file. Also, the second work related file extracting unit 630 may be implemented to determine whether the shared file is a work related file by comparing the additional information added to the shared file with the supplementary information of the work related file.
The additional work related file determination unit 640 may be implemented to determine whether an illegal sharing suspicion file is an asset related file. As described above, an illegal sharing suspicious file whose similarity to a copyright-related file is less than a first threshold value and equal to or larger than a second threshold value is an asset-related file based on consideration of an upload pattern of an illegal sharing suspicious file of the additional copyright- Can be determined.
The shared web site relationship determination unit 650 may be implemented to determine a relationship between shared web sites. As described above, it may be determined whether the shared file is a work related file in consideration of the relationship between the shared web sites.
The processor 660 includes a work related information obtaining unit 600, a first work related file extracting unit 610, an anomaly pattern information determining unit 620, a second work related file extracting unit 630, (640), and a shared web site relationship determination unit (650).
Such a monitoring method for copyright sharing may be implemented in an application or in the form of program instructions that can be executed through various computer components and recorded on a computer-readable recording medium. The computer-readable recording medium may include program commands, data files, data structures, and the like, alone or in combination.
The program instructions recorded on the computer-readable recording medium may be ones that are specially designed and configured for the present invention and are known and available to those skilled in the art of computer software.
Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks and magnetic tape, optical recording media such as CD-ROMs and DVDs, magneto-optical media such as floptical disks, media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like.
Examples of program instructions include machine language code such as those generated by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware device may be configured to operate as one or more software modules for performing the processing according to the present invention, and vice versa.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those skilled in the art that various changes and modifications may be made therein without departing from the spirit and scope of the invention as defined in the appended claims. It will be possible.
Claims (10)
Receiving first hash value information associated with a work;
Based on the first hash value information and the second hash value of the first shared file uploaded on the first shared website, whether the first shared file is a copyright-related file related to the copyrighted work ;
Requesting deletion of the first shared file if the first shared file is the copyright related file;
Extracting characteristic information of the first shared file and determining anomalous pattern information based on characteristic information of the first shared file;
Determining whether a second shared file uploaded on a second shared web site based on the anomalous pattern information is the copyright related file; And
Requesting deletion of the second shared file when the second shared file is the copyright related file,
Wherein the characteristic information includes post information of the first shared file and file name information of the first shared file,
Wherein the anomaly pattern information includes information on a change pattern in which the file name information of the first shared file is changed based on information related to the work,
The change pattern includes a consonant and a vowel disassembly pattern included in the special character addition pattern, the post information, and the file name information included in the post information and the file name information, the consonant included in the post information and the file name information, and,
The consonant and vowel disassembly pattern may include a pattern arranged in consonant and vowel and a pattern in which the consonant and the vowel are eliminated and the consonant and the vowel variation pattern include a pattern for changing the order of the letters and a consonant And a pattern to be created by the user.
Determining a degree of similarity between the second shared file and the copyright related file;
Determining the second shared file as the copyright-related file when the similarity degree is equal to or greater than the first threshold value;
Determining the second shared file as an illegal sharing suspicion file if the similarity degree is greater than or equal to a second threshold value and less than the first threshold value; And
Determining that the second shared file is not the copyright related file if the similarity is less than the second threshold,
Wherein the illegal sharing suspicion file further includes a registration pattern on the second shared web site of the second shared file to further determine the copyright related file.
Wherein the first shared web site is a site where a sharing service of the first shared file is performed by a plurality of users storing the first shared file,
Wherein the second shared web site is a site where a sharing service of the second shared file is performed by one user storing the second shared file.
The work sharing monitoring apparatus includes a processor,
The processor receives first hash value information associated with the work,
Based on the first hash value information and the second hash value of the first shared file uploaded on the first shared website, whether the first shared file is a copyright-related file related to the copyrighted work Lt; / RTI >
Requesting deletion of the first shared file if the first shared file is the copyright-related file,
Extracting characteristic information of the first shared file, determining anomalous pattern information based on characteristic information of the first shared file,
Determining whether or not a second shared file uploaded on the second shared web site based on the anomaly pattern information is the copyright related file,
If the second shared file is the copyright-related file, requesting deletion of the second shared file,
Wherein the characteristic information includes post information of the first shared file and file name information of the first shared file,
Wherein the anomaly pattern information includes information on a change pattern in which the file name information of the first shared file is changed based on information related to the work,
The change pattern includes a consonant and a vowel disassembly pattern included in the special character addition pattern, the post information, and the file name information included in the post information and the file name information, the consonant included in the post information and the file name information, and,
The consonant and vowel disassembly pattern includes a pattern arranged in consonant and vowel, and a pattern in which the consensus is removed and separately prepared. The consonant and vowel variation patterns are patterns in which the order of the letters is changed and consonants are separated And a pattern for creating a copyrighted work.
Wherein the processor determines a degree of similarity between the second shared file and the copyright-related file,
Determining the second shared file as the copyright-related file when the similarity degree is equal to or greater than the first threshold value,
Determining the second shared file as an illegal sharing suspicion file if the similarity degree is not less than the second threshold value or less than the first threshold value,
And determines that the second shared file is not the copyright related file if the similarity is less than the second threshold,
Wherein the illegal sharing suspicion file is determined as the copyright related file by further considering a registration pattern on the second shared web site of the second shared file.
Wherein the first shared web site is a site where a sharing service of the first shared file is performed by a plurality of users storing the first shared file,
Wherein the second shared website is a site where a sharing service of the second shared file is performed by one user storing the second shared file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150143886A KR101634754B1 (en) | 2015-10-15 | 2015-10-15 | Method and apparatus for monitoring for sharing of literary works |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150143886A KR101634754B1 (en) | 2015-10-15 | 2015-10-15 | Method and apparatus for monitoring for sharing of literary works |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101634754B1 true KR101634754B1 (en) | 2016-07-22 |
Family
ID=56681378
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150143886A KR101634754B1 (en) | 2015-10-15 | 2015-10-15 | Method and apparatus for monitoring for sharing of literary works |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101634754B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20180083800A (en) | 2017-01-13 | 2018-07-23 | (주)엠더블유스토리 | Monitoring system and method for detect changes in web page by comparing tree structures |
CN112651836A (en) * | 2019-05-15 | 2021-04-13 | 创新先进技术有限公司 | Copyright distribution method and device based on block chain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040111109A (en) | 2003-06-18 | 2004-12-31 | 세이코 엡슨 가부시키가이샤 | Game machine |
KR20100105983A (en) * | 2009-03-23 | 2010-10-01 | (주) 컨텐츠로드 | Method for protecting copy right of video contents uploaded on internet by using hash code |
KR20150086958A (en) * | 2014-01-21 | 2015-07-29 | (주) 아워텍 | System and method for determining infringement of copyright based on the text reference point |
-
2015
- 2015-10-15 KR KR1020150143886A patent/KR101634754B1/en active IP Right Grant
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040111109A (en) | 2003-06-18 | 2004-12-31 | 세이코 엡슨 가부시키가이샤 | Game machine |
KR20100105983A (en) * | 2009-03-23 | 2010-10-01 | (주) 컨텐츠로드 | Method for protecting copy right of video contents uploaded on internet by using hash code |
KR20150086958A (en) * | 2014-01-21 | 2015-07-29 | (주) 아워텍 | System and method for determining infringement of copyright based on the text reference point |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20180083800A (en) | 2017-01-13 | 2018-07-23 | (주)엠더블유스토리 | Monitoring system and method for detect changes in web page by comparing tree structures |
CN112651836A (en) * | 2019-05-15 | 2021-04-13 | 创新先进技术有限公司 | Copyright distribution method and device based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7610382B1 (en) | System and method for marking content | |
US10762352B2 (en) | Method and system for the automatic identification of fuzzy copies of video content | |
US20080040807A1 (en) | Systems and methods of fingerprinting and identifying digital versatile disc | |
US20140280272A1 (en) | Media content substitution | |
KR101800373B1 (en) | System for searching illegal contents and method of thereof | |
KR20100134610A (en) | Annotating video intervals | |
JP2013543178A (en) | Publication fingerprint extraction method, publication fingerprint extraction device, publication identification system using fingerprint, and publication identification method using fingerprint | |
KR100930077B1 (en) | Watermark Tracking System for Digital Rights Management | |
JP5181691B2 (en) | Information processing apparatus, information processing method, computer program, and recording medium | |
KR101634754B1 (en) | Method and apparatus for monitoring for sharing of literary works | |
JP2011180801A (en) | Video search apparatus, program and method for searching through many reference videos on search key video | |
Marcelino et al. | A benchmark of visual storytelling in social media | |
CA2413808A1 (en) | Method and system for protection against unauthorized distribution of copyrighted computer files over peer-to-peer networks | |
US20170293803A1 (en) | Method and a system for comparing video files | |
KR101027502B1 (en) | System and Method for Managing of Contents | |
JP6760987B2 (en) | Illegal content search device, illegal content search method and program | |
KR20130082879A (en) | A method of providing integrated music service by matching music to posted article through meta information posted on social network service | |
JP2004023247A (en) | Copyright management system | |
KR102423636B1 (en) | Method of managing copyright of content | |
JP6632564B2 (en) | Illegal content search device, illegal content search method, and program | |
KR101545273B1 (en) | Apparaus and method for detecting dupulicated document of big data text using clustering and hashing | |
JP4990823B2 (en) | Illegal content determination support system and control program for illegal content determination support system | |
Agrawal et al. | Copyright infringement detection of music videos on YouTube by mining video and uploader meta-data | |
JP6530002B2 (en) | CONTENT SEARCH DEVICE, CONTENT SEARCH METHOD, PROGRAM | |
JP6762678B2 (en) | Illegal content search device, illegal content search method and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20190625 Year of fee payment: 4 |