CN109002693A - A kind of contribution guard method based on block chain - Google Patents
A kind of contribution guard method based on block chain Download PDFInfo
- Publication number
- CN109002693A CN109002693A CN201810782985.6A CN201810782985A CN109002693A CN 109002693 A CN109002693 A CN 109002693A CN 201810782985 A CN201810782985 A CN 201810782985A CN 109002693 A CN109002693 A CN 109002693A
- Authority
- CN
- China
- Prior art keywords
- contribution
- block
- data
- periodical
- sharing network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000005516 engineering process Methods 0.000 claims abstract description 10
- 238000001514 detection method Methods 0.000 claims description 13
- 125000002015 acyclic group Chemical group 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 6
- 238000012360 testing method Methods 0.000 claims description 4
- 238000012856 packing Methods 0.000 claims description 3
- 230000001360 synchronised effect Effects 0.000 claims description 3
- 238000007689 inspection Methods 0.000 claims description 2
- 230000004888 barrier function Effects 0.000 abstract description 4
- 230000008901 benefit Effects 0.000 abstract description 2
- 230000006399 behavior Effects 0.000 description 7
- 238000007726 management method Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000003607 modifier Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Abstract
The invention belongs to academic pre- publication and the works right to use to protect field, be related to a kind of contribution guard method based on block chain.This method comprises the following steps: establishing data sharing network, establishes multicenter sync server, receive the external data submitted, data are compared, data are carried out with really power protection, is managed to copyright.The present invention is directed to the shared account book feature of block chain, and the anti-tamper characteristic of encryption, block chain technology is devised in a kind of application method of academic journal Publishing Industry, give full play to the technical advantage of block chain, break data barrier existing for academic publishing industry, it realizes and carries out credible reliable data sharing with block chain technology, make the sponsor of academic journal or meeting, the manuscript not yet delivered can be shared and be detected, even if two manuscripts are not all delivered, also it can detect in systems similar, to realize the protection to contribution and the strike to misbehavior in academy.
Description
Technical field
The invention belongs to academic pre- publication and the works right to use to protect field, be related to a kind of contribution protection based on block chain
Method.
Background technique
With information-based and internet development, in all trades and professions, information management system all has become important composition
Part.Contribution is managed using computer and network technologies, meets electronization, the demand of networking of the development of periodical Publishing Industry.
But periodical is published, especially academic journal publication period of going over a manuscript or draft is longer, within the period of going over a manuscript or draft, since works are in network
It is propagated, but is not done statement or the record of copyright protection, it is thus possible to it will appear misbehavior in academy, it is specific next
It says, especially colleague plagiarizes the generation with multiple contribution behavior.
It, can be to text for paper plagiarism and multiple contribution behavior, traditional crawler technology or database retrieval technology
It is matched and is detected, but detection range can only deliver contribution.If contribution is not yet delivered, between different periodicals for
Protection to copyright can only select to refuse shared contribution.The presence of this information barrier, so that colleague plagiarizes and multiple contribution
In the presence of being difficult to be timely detected, and until contribution is delivered, infringement has just been actually occurred.Plagiarization of such as going together, which is tried to be the first, to be delivered, original work
Person can not right-safeguarding;A certain periodical first include by determination in multiple contribution, and author is informed about other periodicals and sends back the manuscript, and leads to other periodicals
Effort waste.
And if it is intended to solving the problems, such as this, it is necessary to which a kind of contribution guard method enables contribution in shielded item
It is shared under part.If can be realized the good protection in shared procedure to contribution, by other periodicals or will not go over a manuscript or draft
Colleague plagiarizes, then more periodicals are just ready that the contribution that will not yet deliver in hand shares out, relies to eliminate abuse
With the information barrier of existence.
Summary of the invention
To solve the above problems, the invention proposes a kind of contribution guard methods based on block chain, all wait try
Contribution is stored in the network of decentralization, and each of network node all preserves identical record.The content packet of record
Original text containing contribution and manuscript information (author, delivery periodical etc.), record itself is also a kind of existence proof of more copies of independence.
If once generating abuse, all nodes all can serve as third party and provide the existence proof of original copy in a network,
To protect original author.If contribution is repeated submission to more periodicals by original author simultaneously, system can also be detected automatically not
With between periodical, there are similar contributions, and successively providing equity for periodical and prove according to block storage order.
Technical solution of the present invention is as follows:
A kind of contribution guard method based on block chain, the specific steps are as follows:
(1) it establishes data sharing network: inside academic governance and Publishing Industry, establishing data sharing network, each phase
Periodical is a node, the submission automatic synchronization that each periodical receives to other all nodes;Concurrent thing in data sharing network
Business request by administrator be ranked up with uniform packing become a block, in data sharing network using block chain technology into
Row record;
(2) it establishes multicenter sync server: in data sharing network, the synchronous clothes of multicenter being established by data service quotient
Business device, establishes block storage pool in multicenter sync server, and the block that administrator in step (1) is packaged is write in sequence
Enter into block storage pool;
(3) the external data submitted are received: in data sharing network, there are the periodical of multiple and different types, each phase
Periodical receives the submission from author according to respective trafficwise and range;
(4) data are compared: are receiving the submission of external submission and is completing preliminary integrality and Content inspection
Afterwards, contribution is carried out broadcast comparison in data sharing network by periodical, checks contribution with the presence or absence of academic improper problem;
(5) really weighed to data: after completing academic improper detection, administrator records contribution, then according to
Step (1) carries out data sharing network record, determines periodical to the ownership of contribution;
(6) be managed to copyright: after completing really power, periodical tries contribution;If produced in hearing process
Raw copyright change, including periodical is sent back the manuscript or author removes original text, rights management request can be initiated again, by administrator to copyright management
Request carries out data sharing network record.
There are four types of users involved in this method:
(1) administrator: the sequence ISP of data sharing network affairs handles the concurrent thing in data sharing network
Business problem is ranked up concurrent transaction and unifies to update;
(2) data service quotient: providing data publication and data service, establishes the server of storing data, and total to data
It enjoys and data service is provided in network;
(3) periodical: the person of accepting of contribution and the unit of going over a manuscript or draft of contribution copyright;Contribution is delivered, then periodical is the copyright of contribution
One of owner;
(4) author: the creator of contribution, for personal or R&D institution.
Concurrent request carries out unified sequence by administrator;Administrator cannot modify to data content, can only be to concurrent
Request under environment is ranked up and is packaged, and guarantees that the data of multicenter sync server storage are consistent.
In block storage pool, data are stored with the data block of regular length;All blocks generate one in sequence
The chain of directed acyclic, the whole hash value of each block, the block head as next block;If block content is repaired
Change, the chain of directed acyclic will be interrupted, to be detected, to guarantee that all records are not tampered.
When data are compared, if author shows as institute there are the misbehavior in academy that multiple contribution, contribution are plagiarized
Part of contributing is similar to having contribution in data sharing network or repeats, and multicenter sync server provides testing result.
For the contribution that academic improper detection passes through, it is packaged and is put into block, and be written in all block storage pools;Original text
The right information of part includes author information and the periodical information for possessing contribution copyright, and contribution right information is in data sharing network
It broadcasts and records, be to weigh statement operation really to contribution itself.
All historical operation records of contribution are all recorded within a block and can not be distorted, but the record of contribution is with contribution
State and update, inquiry when only match effective last state.
Beneficial effects of the present invention: the present invention provides a kind of to can be carried out the network for repeating to detect, solution before publication
The problem of this class behavior of multiple contribution can not be detected under traditional technology background of having determined.
The present invention is directed to the shared account book feature of block chain, and the anti-tamper characteristic of encryption, devises block chain technology and exists
A kind of contribution guard method of academic journal Publishing Industry, gives full play to the technical advantage of block chain, breaks academic publishing industry
Existing data barrier realizes the academic contribution protection based on block chain technology, so that the tradition such as multiple contribution, colleague's plagiarization
Insurmountable problem can be timely detected discovery in systems under scene.This achievement, in the application of block chain, science
There is stronger application value in the fields such as Publishing Industry.
Detailed description of the invention
Fig. 1 is to publish platform under the contribution protected mode of the invention based on block chain to build flow diagram.
Fig. 2 is guard method tortious under the contribution protected mode of the invention based on block chain (with multiple contribution
For).
Specific embodiment
Below in conjunction with attached drawing and technical solution, a specific embodiment of the invention is further illustrated.
That platform is published under the contribution protected mode based on block chain of the invention builds process, as shown in Figure 1.
A kind of contribution guard method based on block chain, the specific implementation process is as follows:
S1, based on workflow of the invention, contribution is delivered to the phase by network after completing contribution and writing by author
Periodical.
After S2, magazinist receive contribution, first trial can be carried out to contribution, analyze contribution quality itself and content, judgement
Whether contribution, which meets the current period, is published version content and basic demand.If do not met, contribution can be retracted, S1 step is repeated by author
Suddenly, it throws and gives other periodicals.
By after magazinist first trial, meeting publication content and the basic demand of periodical, magazinist can be with for S3, contribution
Academic improper detection is carried out to contribution.The improper detection of science mainly carries out in the data sharing network based on block chain, completely
Detection is executed by intelligent contract, judges whether there is similar contribution.If it does, returning to the letter of the repetition contribution to magazinist
Breath, is judged by magazinist, if is existed for same contribution repetition submission or similar contribution and is plagiarized, and compiles in periodical
It collects and thinks to send back the manuscript to contribution there are after misbehavior in academy, return to S1.
After S4, contribution are by academic improper detection, magazinist can carry out really power protection, concrete mode to contribution are as follows:
After being signed by magazinist to contribution, contribution is sent to data sharing network, data sharing network remembers contribution
Record, and record is distributed to all nodes, hereafter can all there be the content of the contribution in the block storage pool of all nodes.If
Author repeats submission in refereeing procedure later or responsible reader plagiarizes contribution, can be with original text already existing in data sharing network
Part repeats, to be detected.And when broadcasting the contribution in data sharing network, since the data consistency of block chain is set
Meter, all nodes all completely can truly record presence and the copyright signature of contribution, and periodical also needs not worry about contribution leakage and asks
Topic.
After S5, contribution carry out really power protection, magazinist can start according to the relevant regulations and workflow of periodical
Please expert and going together contribution is tried, may modify to contribution in hearing process, this process is in data sharing
It carries out outside network, is participated in jointly by magazinist, peer-reviewers, author.If peer-reviewers think that Article quality is unqualified,
This step can stop modifying, processing of sending back the manuscript.
S6, author carry out after modifying repeatedly contribution, give chief editor by magazinist according to step in S5, to contribution into
Row publishes typesetting, and finally confirms.The problems such as inadequate, content is finally undesirable if there is the space of a whole page, can move back copyright
It returns, that is, processing of sending back the manuscript.
In S6 and S5 step, if contribution eventually by the examination of chief editor, and is determined and is published, chief editor can to contribution into
Row delivers processing, i.e., original copy is replaced with final draft.Specifically, it in data sharing network, shows as, is recorded to where original copy
Status modifier is done, is revised as sending back the manuscript, and final draft is sent to data sharing network, state, which is denoted as, to be delivered.
According to the decentralization synchronizing network built in Fig. 1, it is seen that abuse is to be easily detected out
, by taking multiple contribution as an example, specific method is as shown in Figure 2:
(1) original author completes a contribution, and contribution is delivered to first hand periodical, first hand periodical by author's selection at this time
Selection is gone over a manuscript or draft by responsible reader A.
(2) during responsible reader A is gone over a manuscript or draft, contribution is delivered to second periodical, second periodical selection again by author
It is gone over a manuscript or draft by responsible reader B.
(3) under traditional network environment, first hand periodical and second periodical are will not to share the contribution that do not deliver to obtain,
Responsible reader A will not exchange the contribution that do not deliver in oneself hand with responsible reader B.So A and B can not mutually be learnt in other side's hand
Has similar contribution.Multiple contribution behavior at this time is generated and can not be detected.
(4) block chain network described in the invention is used, the memory mechanism for information of going over a manuscript or draft is changed.When the contribution of author
When being given responsible reader A and going over a manuscript or draft, responsible reader A stores contribution within a block, and block in the whole network be it is synchronous, i.e., it is all
Periodical can all synchronize additional block content at this time.And when author generates multiple contribution behavior, contribution is given responsible reader B progress
When going over a manuscript or draft, responsible reader B can carry out multiple contribution detection, and responsible reader B can be looked into the block of periodical where oneself at this time
It askes the contribution to have existed, and the sequence of block provides existence proof, i.e. someone first receives this contribution than oneself.This
When responsible reader B can find the contribution in oneself hand in time there are multiple contribution behaviors.
It is the contribution guard method for multiple contribution behavior above.Colleague is plagiarized, detection method is similar.When going over a manuscript or draft
People A deliberately delays contribution and not delivers, and tries to be the first to when the submission of another periodical, and the responsible reader B of the periodical is as block chain
The synchronization of data, and finding this contribution in responsible reader A goes over a manuscript or draft, to refuse the submission request of author, realizes contribution
Protection.
Claims (8)
1. a kind of contribution guard method based on block chain, which is characterized in that specific step is as follows:
(1) it establishes data sharing network: inside academic governance and Publishing Industry, establishing data sharing network, each periodical is
One node, the submission automatic synchronization that each periodical receives to other all nodes;Concurrent transaction in data sharing network is asked
It asks to be ranked up by administrator and becomes a block with uniform packing, remembered in data sharing network using block chain technology
Record;
(2) it establishes multicenter sync server: in data sharing network, multicenter synchronous service being established by data service quotient
Device establishes block storage pool in multicenter sync server, and the block that administrator in step (1) is packaged is written in sequence
Into block storage pool;
(3) receive the external data submitted: in data sharing network, there are the periodical of multiple and different types, each periodical is pressed
According to respective trafficwise and range, the submission from author is received;
(4) data are compared: after receiving the submission of external submission and completing preliminary integrality and Content inspection, the phase
Contribution is carried out broadcast comparison in data sharing network by periodical, checks contribution with the presence or absence of academic improper problem;
(5) really weighed to data: after completing academic improper detection, administrator records contribution, then according to step
(1) data sharing network record is carried out, determines periodical to the ownership of contribution;
(6) be managed to copyright: after completing really power, periodical tries contribution;If generating version in hearing process
More, including periodical is sent back the manuscript or author removes original text, rights management request can be initiated again, by administrator to rights management request for adaptability in tactics
Carry out data sharing network record.
2. a kind of contribution guard method based on block chain according to claim 1, which is characterized in that involved in this method
User there are four types of:
(1) administrator: the sequence ISP of data sharing network affairs, the concurrent transaction handled in data sharing network are asked
Topic is ranked up concurrent transaction and unifies to update;
(2) data service quotient: providing data and publish and data service, establish the server of storing data, and to Data Sharing Network
Data service is provided in network;
(3) periodical: the person of accepting of contribution and the unit of going over a manuscript or draft of contribution copyright;Contribution is delivered, then periodical is that all rights reserved for contribution
One of person;
(4) author: the creator of contribution, for personal or R&D institution.
3. a kind of contribution guard method based on block chain according to claim 1 or 2, which is characterized in that concurrent request
Unified sequence is carried out by administrator;Administrator cannot modify to data content, can only carry out to the request under concurrent environment
Sequence and packing guarantee that the data of multicenter sync server storage are consistent.
4. a kind of contribution guard method based on block chain according to claim 1 or 2, which is characterized in that block storage
Chi Zhong, data are stored with the data block of regular length;All blocks generate the chain of a directed acyclic in sequence, often
The whole hash value of one block, the block head as next block;If block content is modified, the chain of directed acyclic will
It is interrupted, to be detected, to guarantee that all records are not tampered.
5. a kind of contribution guard method based on block chain according to claim 3, which is characterized in that block storage pool
In, data are stored with the data block of regular length;All blocks generate the chain of a directed acyclic in sequence, each
The whole hash value of a block, the block head as next block;If block content is modified, the chain of directed acyclic will be by
It interrupts, to be detected, to guarantee that all records are not tampered.
6. a kind of according to claim 1, contribution guard method based on block chain described in 2 or 5, which is characterized in that
When data are compared, if author shows as being contributed there are the misbehavior in academy that multiple contribution, contribution are plagiarized
Part is similar to having contribution in data sharing network or repeats, and multicenter sync server provides testing result;
For the contribution that academic improper detection passes through, it is packaged and is put into block, and be written in all block storage pools;Contribution
Right information includes author information and the periodical information for possessing contribution copyright, and contribution right information is broadcasted in data sharing network
And record, it is to weigh statement operation really to contribution itself;
All historical operation records of contribution are all recorded within a block and can not be distorted, but the record of contribution is with the state of contribution
And update, effective last state is only matched in inquiry.
7. a kind of contribution guard method based on block chain according to claim 3, which is characterized in that
When data are compared, if author shows as being contributed there are the misbehavior in academy that multiple contribution, contribution are plagiarized
Part is similar to having contribution in data sharing network or repeats, and multicenter sync server provides testing result;
For the contribution that academic improper detection passes through, it is packaged and is put into block, and be written in all block storage pools;Contribution
Right information includes author information and the periodical information for possessing contribution copyright, and contribution right information is broadcasted in data sharing network
And record, it is to weigh statement operation really to contribution itself;
All historical operation records of contribution are all recorded within a block and can not be distorted, but the record of contribution is with the state of contribution
And update, effective last state is only matched in inquiry.
8. a kind of contribution guard method based on block chain according to claim 4, which is characterized in that
When data are compared, if author shows as being contributed there are the misbehavior in academy that multiple contribution, contribution are plagiarized
Part is similar to having contribution in data sharing network or repeats, and multicenter sync server provides testing result;
For the contribution that academic improper detection passes through, it is packaged and is put into block, and be written in all block storage pools;Contribution
Right information includes author information and the periodical information for possessing contribution copyright, and contribution right information is broadcasted in data sharing network
And record, it is to weigh statement operation really to contribution itself;
All historical operation records of contribution are all recorded within a block and can not be distorted, but the record of contribution is with the state of contribution
And update, effective last state is only matched in inquiry.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810782985.6A CN109002693B (en) | 2018-07-17 | 2018-07-17 | Manuscript protection method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810782985.6A CN109002693B (en) | 2018-07-17 | 2018-07-17 | Manuscript protection method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109002693A true CN109002693A (en) | 2018-12-14 |
CN109002693B CN109002693B (en) | 2021-03-26 |
Family
ID=64599469
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810782985.6A Active CN109002693B (en) | 2018-07-17 | 2018-07-17 | Manuscript protection method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109002693B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109582641A (en) * | 2018-10-17 | 2019-04-05 | 北京瑞卓喜投科技发展有限公司 | A kind of screening technique and screening system of the works typing based on block chain |
CN110008746A (en) * | 2019-04-01 | 2019-07-12 | 大连理工大学 | Medical records storage, shared and safety Claims Resolution model and method based on block chain |
CN110109888A (en) * | 2019-04-04 | 2019-08-09 | 深圳市元征科技股份有限公司 | A kind of document handling method and device |
CN110472201A (en) * | 2019-07-26 | 2019-11-19 | 阿里巴巴集团控股有限公司 | Based on the text similarity detection method and device of block chain, electronic equipment |
CN110598190A (en) * | 2019-09-06 | 2019-12-20 | 湖南天河国云科技有限公司 | Method for determining authority of text data on chain based on block chain |
CN111126962A (en) * | 2019-12-24 | 2020-05-08 | 南方电网科学研究院有限责任公司 | New energy grid-connected standard reporting system and method based on block chain |
CN111625627A (en) * | 2020-07-30 | 2020-09-04 | 卓尔智联(武汉)研究院有限公司 | Data right determining method and device based on block chain and computer equipment |
CN111966749A (en) * | 2020-08-04 | 2020-11-20 | 中国科学院上海微系统与信息技术研究所 | Data processing method and device, electronic equipment and storage medium |
US10909317B2 (en) | 2019-07-26 | 2021-02-02 | Advanced New Technologies Co., Ltd. | Blockchain-based text similarity detection method, apparatus and electronic device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107171785A (en) * | 2017-05-18 | 2017-09-15 | 电子科技大学 | A kind of digital copyright management method based on block chain technology |
CN107563905A (en) * | 2017-07-20 | 2018-01-09 | 西安电子科技大学 | A kind of academic platform service system and method for building up based on block chain |
CN107659610A (en) * | 2017-08-02 | 2018-02-02 | 北京瑞卓喜投科技发展有限公司 | Copyright protection methods, devices and systems based on block chain technology |
-
2018
- 2018-07-17 CN CN201810782985.6A patent/CN109002693B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107171785A (en) * | 2017-05-18 | 2017-09-15 | 电子科技大学 | A kind of digital copyright management method based on block chain technology |
CN107563905A (en) * | 2017-07-20 | 2018-01-09 | 西安电子科技大学 | A kind of academic platform service system and method for building up based on block chain |
CN107659610A (en) * | 2017-08-02 | 2018-02-02 | 北京瑞卓喜投科技发展有限公司 | Copyright protection methods, devices and systems based on block chain technology |
CN107659610B (en) * | 2017-08-02 | 2020-08-21 | 北京瑞卓喜投科技发展有限公司 | Copyright protection method, device and system based on block chain technology |
Non-Patent Citations (2)
Title |
---|
薛腾飞等: "基于区块链的医疗数据共享模型研究", 《自动化学报》 * |
陈晓峰等: "区块链在学术出版领域的创新应用及", 《情报工程》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109582641A (en) * | 2018-10-17 | 2019-04-05 | 北京瑞卓喜投科技发展有限公司 | A kind of screening technique and screening system of the works typing based on block chain |
CN110008746A (en) * | 2019-04-01 | 2019-07-12 | 大连理工大学 | Medical records storage, shared and safety Claims Resolution model and method based on block chain |
CN110109888A (en) * | 2019-04-04 | 2019-08-09 | 深圳市元征科技股份有限公司 | A kind of document handling method and device |
CN110472201B (en) * | 2019-07-26 | 2020-07-21 | 阿里巴巴集团控股有限公司 | Text similarity detection method and device based on block chain and electronic equipment |
CN110472201A (en) * | 2019-07-26 | 2019-11-19 | 阿里巴巴集团控股有限公司 | Based on the text similarity detection method and device of block chain, electronic equipment |
US10909317B2 (en) | 2019-07-26 | 2021-02-02 | Advanced New Technologies Co., Ltd. | Blockchain-based text similarity detection method, apparatus and electronic device |
WO2021017440A1 (en) * | 2019-07-26 | 2021-02-04 | 创新先进技术有限公司 | Blockchain-based text similarity detection method and apparatus, and electronic device |
US11100284B2 (en) | 2019-07-26 | 2021-08-24 | Advanced New Technologies Co., Ltd. | Blockchain-based text similarity detection method, apparatus and electronic device |
CN110598190A (en) * | 2019-09-06 | 2019-12-20 | 湖南天河国云科技有限公司 | Method for determining authority of text data on chain based on block chain |
CN110598190B (en) * | 2019-09-06 | 2024-03-08 | 湖南天河国云科技有限公司 | Method for determining right of text data on chain based on block chain |
CN111126962A (en) * | 2019-12-24 | 2020-05-08 | 南方电网科学研究院有限责任公司 | New energy grid-connected standard reporting system and method based on block chain |
CN111126962B (en) * | 2019-12-24 | 2024-03-12 | 南方电网科学研究院有限责任公司 | New energy grid-connected standard declaration system and method based on blockchain |
CN111625627A (en) * | 2020-07-30 | 2020-09-04 | 卓尔智联(武汉)研究院有限公司 | Data right determining method and device based on block chain and computer equipment |
CN111966749A (en) * | 2020-08-04 | 2020-11-20 | 中国科学院上海微系统与信息技术研究所 | Data processing method and device, electronic equipment and storage medium |
CN111966749B (en) * | 2020-08-04 | 2021-08-17 | 中国科学院上海微系统与信息技术研究所 | Data processing method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109002693B (en) | 2021-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109002693A (en) | A kind of contribution guard method based on block chain | |
Lynch | The integrity of digital information: Mechanics and definitional issues | |
US7949666B2 (en) | Synchronizing distributed work through document logs | |
RU2730899C1 (en) | Tracing objects between different parties | |
Tsai et al. | Intellectual-property blockchain-based protection model for microfilms | |
CN110771093B (en) | Method and system for proving existence of digital document | |
CN110674140B (en) | Block chain-based content processing method, device, equipment and storage medium | |
US20090228716A1 (en) | Method and system for distributed coordination of access to digital files | |
CN101689166B (en) | Processing write requests with server having global knowledge | |
CA2474752A1 (en) | Data replication based upon a non-destructive data model | |
US20190347660A1 (en) | System and method for protection of confidential information | |
JP2017123692A (en) | Existence proof device, existence proof method, and program therefor | |
CN110598373B (en) | Copyright verification method, system and storage medium | |
US11687904B2 (en) | Downstream tracking of content consumption | |
Onsrud et al. | Public commons of geographic data: Research and development challenges | |
Kleedorfer et al. | Verifiability and traceability in a linked data based messaging system | |
WO2020096109A1 (en) | Method, server, and system for managing distribution of business plan on basis of blockchain | |
JP2011524044A (en) | System and method for preventing duplicate investigation attempts | |
CN111797426A (en) | Distrust notification service | |
JP2008097301A (en) | File management server, program thereof and file management method | |
KR20210014278A (en) | Method and system for sharing data in block chain environment | |
Angelov et al. | Dynamic and secure B2B e-contract update management | |
Bradley | Digital authenticity and integrity: Digital cultural heritage documents as research resources | |
US10565167B2 (en) | Method and apparatus for peer-to-peer file authoring | |
JP2004133600A (en) | Electronic data sharing system and method using email and recording medium for achieving this method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |