CN109614766B - Method and device for carrying out block chaining and evidence saving on webpage through file acquisition - Google Patents

Method and device for carrying out block chaining and evidence saving on webpage through file acquisition Download PDF

Info

Publication number
CN109614766B
CN109614766B CN201811283682.6A CN201811283682A CN109614766B CN 109614766 B CN109614766 B CN 109614766B CN 201811283682 A CN201811283682 A CN 201811283682A CN 109614766 B CN109614766 B CN 109614766B
Authority
CN
China
Prior art keywords
target
file
hash
webpage
playable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811283682.6A
Other languages
Chinese (zh)
Other versions
CN109614766A (en
Inventor
杨新颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201811283682.6A priority Critical patent/CN109614766B/en
Priority to TW108110270A priority patent/TWI712907B/en
Publication of CN109614766A publication Critical patent/CN109614766A/en
Priority to PCT/CN2019/104926 priority patent/WO2020088104A1/en
Application granted granted Critical
Publication of CN109614766B publication Critical patent/CN109614766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Abstract

A method and device for block chain storage of web page through file acquisition are disclosed. For a target webpage which is associated with a playable file and does not contain the playable file, a block link evidence storing party captures the target webpage to obtain a webpage screenshot; and on the other hand, reading a file storage address associated with the target webpage, and acquiring a playable file from the file storage address. And then, carrying out hash operation on the webpage screenshot and the playable file to obtain a target hash, and further issuing the target hash to a block chain for storing the certificate.

Description

Method and device for carrying out block chaining and evidence saving on webpage through file acquisition
Technical Field
The embodiment of the specification relates to the technical field of information, in particular to a method and a device for performing block chaining evidence storage on a webpage through file acquisition.
Background
At present, for the requirement of network evidence preservation, the webpage presenting the network evidence can be stored by means of the block chain technology. For example, in the field of copyright protection, a block chain creditor may credit an infringement web page (a web page presenting infringement works) at the request of a copyright holder, thereby preserving evidence for a subsequent maintenance link.
Assuming that the network evidence is a text, picture, or other type of file and the presentation mode is static, the network evidence itself is a part of the web page content. At this time, at the request of the copyright owner, the server of the block chain evidence storing party can access the webpage presenting the network evidence, directly perform screenshot on the webpage and store the obtained webpage screenshot evidence. The web page screenshot directly shows the full appearance of the network evidence, and the network evidence preservation is realized.
However, if the network evidence is a file of audio, video, or other types, and the presentation manner is dynamic (usually, the network evidence can be presented in a full-view manner after playing for a period of time, which is referred to as a playable file), in this case, the web screenshot cannot present the full-view of the network evidence, and the network evidence cannot be preserved. Therefore, the server of the block chain evidence storing party often needs to trigger the playing of the network evidence after accessing the webpage, spend time recording the whole playing process on the webpage, and then store the obtained recording file.
Based on the prior art, a more efficient webpage evidence storing method is needed.
Disclosure of Invention
In order to solve the problem that the existing webpage evidence storing method is low in efficiency, embodiments of the present specification provide a method and an apparatus for performing block chaining evidence storage on a webpage through file acquisition, and the technical scheme is as follows:
according to the 1 st aspect of the embodiments of the present specification, there is provided a method for performing block chaining verification on a web page through file acquisition, including:
accessing a target webpage;
screenshot is carried out on the target webpage to obtain a webpage screenshot; reading a file storage address associated with the target webpage, and acquiring a playable file from the file storage address;
processing the webpage screenshot and the playable file into a target hash;
and carrying out block chain verification on the target hash.
According to the 2 nd aspect of the embodiments of the present specification, there is provided an apparatus for performing block chaining verification on a web page through file acquisition, including:
the access module accesses the target webpage;
the first processing module is used for carrying out screenshot on the target webpage to obtain a webpage screenshot; reading a file storage address associated with the target webpage, and acquiring a playable file from the file storage address;
the second processing module is used for processing the webpage screenshot and the playable file into a target hash;
and the evidence storing module is used for carrying out block chain evidence storing on the target hash.
According to the technical scheme provided by the embodiment of the specification, for a target webpage which is associated with a playable file and does not contain the playable file, a block link evidence storing party captures the target webpage to obtain a webpage screenshot; and on the other hand, reading a file storage address associated with the target webpage, and acquiring a playable file from the file storage address. And then, carrying out hash operation on the webpage screenshot and the playable file to obtain a target hash, and further issuing the target hash to a block chain for storing the certificate. This is equivalent to implementing a blockchain proof of a web page containing a playable file. Therefore, the server of the block chain evidence storing party does not need to spend time to record the playing process of the playable file, and the evidence storing efficiency is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of embodiments of the invention.
In addition, any one of the embodiments in the present specification is not required to achieve all of the effects described above.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present specification, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic flowchart of a method for performing block chaining verification on a web page through file acquisition according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a mekerr tree constructed based on a file hash sequence according to an embodiment of the present specification;
fig. 3 is a schematic diagram of updating a mekerr tree based on a new file hash sequence according to an embodiment of the present specification;
fig. 4 is a flowchart illustrating a method for performing block chaining verification on a web page through web page monitoring according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an apparatus for performing block chaining verification on a web page through web page monitoring in accordance with an embodiment of the present specification;
FIG. 6 is a schematic diagram of a computer device for configuring the methods of the embodiments of the present description.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the embodiments of the present specification, the technical solutions in the embodiments of the present specification will be described in detail below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of protection.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a method for performing block chaining verification on a web page through file acquisition according to an embodiment of the present specification, including the following steps:
s100: the target web page is accessed.
The main execution body of the method is generally a server of a blockchain depositor. Hereinafter, for convenience of description, the "certificate authority" is referred to as a "server of the blockchain certificate authority".
The blockchain creditor may be a mechanism that provides blockchain creditor services. The block chain evidence storing party can be a node in a block chain network, externally accepts a data evidence storing request, acquires data needing to be stored based on the data evidence storing request, and then constructs and broadcasts a data evidence storing transaction based on the data needing to be stored, and in addition, the data needing to be stored can participate in the consensus among all nodes in the block chain network so as to write the data needing to be stored into a self-maintained block chain (shared account book).
The block chain evidence storing party may also be responsible for processing the data to be stored with evidence by taking an agent to accept a data evidence storing request instead of a node in the block chain network, and submitting a processing result to the block chain network for evidence storage after certain processing is performed on the data to be stored with evidence (for example, screenshot and hashing are performed on a webpage to be stored with evidence).
The method shown in fig. 1 can be applied to the scenes of copyright infringement evidence preservation and can also be applied to scenes of evidence preservation in other fields. The following will describe the scheme by taking a scenario of copyright infringement evidence preservation as an example. Those skilled in the art should understand that in the scenario of evidence preservation in other fields, the block chain evidence of the web page may also be saved through file acquisition by the method flow shown in fig. 1.
S102: screenshot is carried out on the target webpage to obtain a webpage screenshot; and reading a file storage address associated with the target webpage, and acquiring a playable file from the file storage address.
In the embodiment of the specification, after the evidence storing server accesses the target webpage, screenshot can be performed on the target webpage on one hand to obtain a webpage screenshot; on the other hand, the file storage address associated with the target webpage is read, so that a playable file is obtained from the file storage address.
The file storage address associated with the target webpage refers to a file storage address of a playable file used for playing the target webpage. Generally, for a web page for playing a playable file, the storage size of the playable file is large, so that the web page does not contain the playable file itself, but only the file storage address of the playable file. When the playable file needs to be played, the browser needs to analyze the file storage address from the webpage, and acquire the playable file from the file storage address and play the playable file.
S104: and processing the webpage screenshot and the playable file into a target hash.
In the embodiments of the present description, processing data into a hash refers to performing hash calculation by using data as an input of a hash algorithm to obtain a corresponding hash value.
In step S104, the certificate storing server may directly perform hash calculation on the web page screenshot and the playable file to obtain a target hash. Or processing the web page screenshot into a screenshot hash on one hand, processing the playable file into a file hash on the other hand, and finally processing the screenshot hash and the file hash into a target hash.
S106: and carrying out block chain verification on the target hash.
As is well known, a hash value obtained after a data is subjected to a hash operation can uniquely identify the data, and can be regarded as a "fingerprint" of the data. Once the data is tampered, the hash value corresponding to the data is also changed. Therefore, the block chain verification of the webpage screenshot and the target hash corresponding to the playable file is equivalent to the block chain verification of the target webpage, the playable file used for playing the target webpage, and the corresponding relationship between the target webpage and the playable file, which proves the following facts:
1. the target web page is truly existing and not tampered;
2. playable files are authentic and have not been tampered with;
3. the target web page is a web page for playing the playable file.
Thus, by the method shown in fig. 1, it is achieved that the block chain of the web page associated with the playable file but not containing the playable file itself is certified.
In this embodiment of the present specification, if the credential server is not a node in the blockchain network, the credential server may submit the target hash to the blockchain network for credential storage.
If the evidence storing server is a blockchain node in the blockchain network, the evidence storing server can construct a target transaction based on the target hash, and then broadcast the target transaction to other blockchain nodes except the self so that each blockchain node stores the target transaction into the blockchain of the self based on a consensus mechanism.
It should be noted that the transaction (transaction) described in this specification refers to a piece of data that is created by a client of the blockchain and needs to be finally published to the distributed database of the blockchain.
That is, there are narrow and broad categories of transactions in the blockchain. A narrowly defined transaction refers to a transfer of value issued by a user to a blockchain; for example, in a conventional bitcoin blockchain network, the transaction may be a transfer initiated by the user in the blockchain. The broad transaction refers to a piece of business data with business intention, which is issued to the blockchain by a user; for example, an operator may build a federation chain based on actual business requirements, relying on the federation chain to deploy some other types of online business unrelated to value transfer (e.g., a rental house business, a vehicle dispatching business, an insurance claim settlement business, a credit service, a medical service, etc.), and in such federation chain, the transaction may be a business message or a business request with a business intent issued by a user in the federation chain.
By the method shown in fig. 1, for a target webpage which is associated with a playable file and does not contain the playable file, a block chaining evidence storing party captures a screenshot of the target webpage to obtain a webpage screenshot; and on the other hand, reading a file storage address associated with the target webpage, and acquiring a playable file from the file storage address. And then, carrying out hash operation on the webpage screenshot and the playable file to obtain a target hash, and further issuing the target hash to a block chain for storing the certificate. This is equivalent to implementing a blockchain proof of a web page containing a playable file. Therefore, the server of the block chain evidence storing party does not need to spend time to record the playing process of the playable file, and the evidence storing efficiency is improved.
In addition, in practical applications, the target web page may be used to play more than one playable file, which also means that more than one file storage address is associated with the target web page.
Therefore, the certification server may obtain, for each file storage address associated with the target web page, a playable file from the file storage address as a playable file corresponding to the file storage address. And then, processing playable files corresponding to the webpage screenshot and each file storage address associated with the target webpage into target hash.
Further, sometimes, the target web page may include more than one sub-web page link, and after the user clicks any sub-web page link, the user may enter a sub-web page corresponding to the sub-web page link, where the sub-web page is used to play a playable file.
In this case, the evidence server reads more than one file storage address associated with the target web page, specifically, may access each subnet page link included in the target web page, and then read the file storage address included in the subnet page corresponding to the subnet page link.
Moreover, since the sub-web links in the target web page are generally arranged in a certain order, in step S104, the playable files corresponding to the file storage addresses associated with the target web page respectively may be sorted according to the arrangement order of the sub-web links in the target web page, so as to obtain a playable file sequence; then, the webpage screenshot and the playable file sequence are processed into a target hash.
The playable files corresponding to the file storage addresses associated with the target web page may be sorted according to the arrangement order of the sub-web page links in the target web page, and specifically, the playable files corresponding to the sub-web page links may be sorted according to the arrangement order of the sub-web page links in the target web page; and then according to the arrangement sequence of the file storage addresses, sequencing playable files corresponding to the file storage addresses respectively.
Thus, once the arrangement order of the links of each sub-web page in the target web page changes, the target hash obtained based on the target web page changes. And performing block chain evidence storage on the target hash, which is equivalent to performing block chain evidence storage on the content of the target webpage and performing block chain evidence storage on the content layout of the target webpage.
Further, the certificate storing server processes the webpage screenshot and the playable file sequence into a target hash, specifically, the webpage screenshot can be processed into a screenshot hash; for each playable file in the sequence of playable files, processing the playable file into a file hash; sorting the file hashes corresponding to the playable files according to the arrangement sequence of the playable files to obtain a file hash sequence; constructing a Merkel tree based on the file hash sequence; and processing the screenshot hash and the root hash of the Meckel tree into a target hash.
Fig. 2 is a schematic diagram of a mekerr tree constructed based on a file hash sequence according to an embodiment of the present specification. As shown in fig. 2, the root hash of the merkel tree constructed based on the file hash sequence can uniquely identify the file hash sequence, which can be regarded as a "fingerprint" of the file hash sequence. The file hash sequence is actually a mapping of arrangement of sub-web links corresponding to the playable files in the target web page.
Once a sub-web link in the target web page is replaced, the target web page needs to be credited once again. Specifically, the new file hash sequence is obtained based on the current target webpage by adopting the method. And then, reconstructing the Meckel tree based on the new file hash sequence to obtain a new root hash for evidence storage.
It should be noted that, the advantage of storing the file hash sequence by using the merkel tree is that when the content of the target web page changes less, the corresponding file hash sequence also changes less, and at this time, the hash value on the path related to the change in the old merkel tree only needs to be recalculated to obtain the new merkel tree.
As shown in fig. 3, it is assumed that the web page sub-link 3 in the target web page is replaced by the web page sub-link 8, and the corresponding file hash 3 is also replaced by the file hash 8, so that when the mekerr tree is reconstructed, only the path of the file hash 3-hash 6-hash 7 in the old mekerr tree needs to be updated (to be the file hash 8-hash 9-hash 10). Finally, the root hash is updated to hash 10. Thus, the computing resources of the certificate storage server are saved.
Fig. 4 is a schematic flowchart of a method for performing block chaining verification on a web page through web page monitoring according to an embodiment of the present specification, where the method includes the following steps:
s400: and receiving the webpage address sent by the user.
Fig. 4 is a schematic flowchart of a method for performing block chaining verification on a web page through web page monitoring according to an embodiment of the present specification, where the method includes the following steps:
s400: and receiving a webpage address sent by a user, and accessing a target webpage corresponding to the webpage address.
The execution subject of the method can also be a certificate storing server.
The method shown in fig. 4 can be applied to the scenes of copyright infringement evidence preservation and also can be applied to scenes of evidence preservation in other fields. The following will describe the scheme by taking a scenario of copyright infringement evidence preservation as an example. Those skilled in the art should understand that in the scenario of evidence preservation in other fields, the block chain evidence of the web page may also be saved through web page monitoring by the method flow shown in fig. 4.
In the scenario of evidence of copyright infringement preservation, the user is typically a copyright holder holding the copyright of the work. When finding a certain webpage (target webpage) presenting infringement works, the user can access the evidence server through the browser and provide the webpage address of the target webpage to the evidence server.
S402: and extracting tags from the documents of the target webpage.
As is well known, a web page is actually loaded based on a hypertext Markup Language (HTML) document, and the document described herein generally refers to an HTML document of the web page. In an HTML document, several HTML tags are used to tag different portions of the document content. For each tag, the marked document content corresponds to an element of the target web page for loading the element.
In this specification, the certificate server may extract a tag of a target webpage from a document of the target webpage. Specifically, the certificate storing server may extract all tags of the target web page, or may extract a part of tags of the target web page.
Further, when the certification server extracts a part of the tags of the target webpage, the tags have the following properties for each tag extracted by the certification server: the content of the document marked by the tag is more likely to change over time (and thus monitoring is necessary).
For example, the label of the target web page used to label the website information (e.g., the website domain name) is generally not extracted by the vouching server, because the website information is typically fixed and unchangeable. The tags of the target web page for marking the article reading numbers are generally extracted by the evidence storage server, because the article reading numbers generally continuously increase.
S404: determining the label designated by the user from the extracted labels as a designated label; and acquiring the evidence storage triggering condition specified by the user.
S406: and monitoring the appointed tag, and performing block chain evidence storage on the target webpage when the document content marked by the appointed tag is monitored to meet the evidence storage triggering condition.
In this embodiment, the user may register with the certificate storing server in advance and designate a plurality of tags in advance. Then, the credentialing server can determine the label previously designated by the user as the designated label directly from the extracted labels in step S404. It should be noted that the number of designated tags may be greater than 1.
In addition, the certificate storing server can also provide the extracted tags for the user to select. Specifically, assuming that a user accesses a certificate storing server through a browser, the certificate storing server may provide a selection interface showing the extracted tag to the user, and monitor the selection interface; and for each label displayed in the selection interface, when the label is monitored to be selected, determining the label as the label specified by the user.
For example, in the selection interface, the extracted labels may be arranged in sequence, a corresponding check box is arranged beside each label, and the user selects the corresponding label by clicking the check box.
Further, the certificate storing server can deduce the label that the user has a high probability to select by analyzing the behavior data of the user on the internet. For example, if the certification server finds that the user is a novel author, it is presumed that the user is interested in tags for tagging article reading numbers on the target web page, i.e., the user has a greater probability of selecting tags for tagging article reading numbers. Thus, the credential server may highlight (e.g., highlight) the tab that the user has a greater probability of selecting in the provided selection interface to prompt the user to make a selection.
In this embodiment of the present specification, the certificate storing server further needs to acquire the certificate storing trigger condition specified by the user. Specifically, the certificate storing server may provide a condition setting interface to the user, and receive the certificate storing trigger condition input by the user through the condition setting interface.
In this embodiment of the present specification, when the number of the designated tags is 1, the evidence storing server may monitor the designated tags, and once the evidence storing triggering condition is satisfied, trigger a blockchain evidence storing operation on the target web page.
The work that the target web page uses for presentation is referred to herein as the associated work of the target web page. There may be more than one associated work of the target web page. And the work concerned by the user in the associated works of the target webpage is called as a designated associated work.
For example, the target webpage is a music list webpage of a certain music website, the associated works of the target webpage are music works a, music works B and music works C, and if found by a copyright owner of the music works B, the music website provides a downloading service of the music works B without authorization, the copyright owner of the music works B may request a evidence storage server to store evidence of the target webpage. The designated associated work of the target webpage is a musical piece B, and the copyright owner designates a label for marking the musical piece B in the document of the target webpage as a designated label.
Under the scene of copyright infringement evidence preservation, if the document content marked by the specified label comprises the relevant statistic corresponding to the specified associated works of the target webpage, when the relevant statistic corresponding to the specified associated works of the target webpage reaches any one alternative quantity in the alternative quantity set, the document content marked by the specified label meets the evidence trigger condition.
The document content of the target webpage refers to a work presented by the target webpage. The relevant statistics corresponding to the specified related work include, but are not limited to, the following: download amount, read amount, collection amount, play amount, praise amount, etc.
Each alternative quantity in the alternative quantity set can be specified according to actual needs. Further, assuming that the candidate amount set includes N candidate amounts, the N candidate amounts may be determined by:
setting the relevant statistic corresponding to the appointed relevant works of the target webpage as x at present and the appointed proportion as y (less than 1);
taking x (y +1) as a first candidate quantity;
will x (y +1)2As a second alternative amount;
……
will x (y +1)NAs the nth candidate amount.
Therefore, by determining the candidate quantity set in the above manner, it can be actually realized that the block chain evidence storage is performed on the target webpage once every time the relevant statistic quantity is increased by a specified proportion (for example, 20%).
For example, every 20% increase of the relevant statistics corresponding to the specified related works of the target web page triggers the evidence storing server to perform the block chain evidence storing operation on the target web page. In this way, the copyright owner can always verify the maximum relevant statistics of infringed works so as to require as much as possible a larger amount of infringement damage compensation, penalizing the owner of the target web page to the maximum extent.
Under the scene of copyright infringement evidence preservation, if the webpage related information marked by the designated label is the designated related works of the target webpage or the copyright related information corresponding to the designated related works, when the designated related works of the target webpage are changed or the copyright related information corresponding to the designated related works are changed, the document content marked by the designated label meets the evidence preservation triggering condition.
The copyright related information corresponding to the designated associated work is information for identifying the copyright state of the designated associated work, such as authorized validity period information, information on whether to authorize, work author information, and the like. Once the copyright-related information changes, the conclusion that whether the target webpage is infringed needs to be reevaluated, and at this time, the block chain verification needs to be conducted on the target webpage again.
If the designated associated works in the target webpage are changed, the fact that whether the target webpage is the infringing webpage or not needs to be evaluated again means that block link evidence storage needs to be carried out on the target webpage again.
Under the scene of copyright infringement evidence preservation, if the document content marked by the specified label comprises the webpage position information corresponding to the specified associated works of the target webpage, when the webpage position information corresponding to the specified associated works of the target webpage changes, the document content marked by the specified label is sufficient for the evidence triggering condition.
Further, the change of the webpage position information corresponding to the designated related work of the target webpage may specifically be: the webpage position information corresponding to the designated related work of the target webpage is changed, and the similarity degree of the first position and the reference position in the target webpage is lower than the similarity degree of the second position and the reference position. Wherein the first position is a position in the target webpage corresponding to the designated related work, which is determined according to the webpage position information before change; the second position is a position corresponding to the designated related work in the target webpage, which is determined according to the changed webpage position information. The reference position may be set as desired.
For example, assuming that the target web page is a leader board for presenting musical compositions on a music website loaded with top10, there is a possibility that the ranking of top10 musical compositions on the target web page may change over time. For the copyright owner, the name of the designated associated work (without authorization of the copyright owner) in the ranking list is concerned, and the higher the downloading amount of the designated associated work is, the higher the ranking is, the higher the infringement damage compensation claiming by the copyright owner can be. Therefore, the upper left corner of the target webpage can be set as the reference position, and the change of the position corresponding to the specified related work in the target webpage is monitored. And when the situation that the position corresponding to the appointed associated work is changed and is closer to the reference position (meaning that the rank of the appointed associated work is raised) is monitored, performing block chain evidence storage on the target webpage.
In addition, if the number of the designated tags is greater than 1, the certificate storing server can acquire the certificate storing triggering condition which is designated by the user and corresponds to the designated tags for each designated tag. The evidence storage server can monitor each appointed label, and once the appointed labels in the appointed number are monitored to meet the evidence storage triggering conditions corresponding to the appointed labels, block chain evidence storage operation of the target webpage is triggered. That is, if there are a specified number of specified tags that satisfy: aiming at each appointed label in the appointed quantity of appointed labels, the document content marked by the appointed label meets the corresponding evidence storage triggering condition; then a blockchain credentialing operation for the target web page is triggered.
Through the method shown in fig. 4, the server of the block chaining evidence storing party can determine the label specified by the copyright owner from the document of the target webpage for monitoring and acquire the evidence storing triggering condition specified by the copyright owner according to the request of the copyright owner. And when monitoring that the document content marked by the label specified by the copyright person meets the evidence storage triggering condition, the server of the block chain evidence storage party triggers the block chain evidence storage operation of the target webpage once. Therefore, the copyright owner sends the task of monitoring the target webpage to the server of the block chain evidence storing party to execute through the appointed label and the appointed evidence storing triggering condition. The copyright owner does not need to expend energy to continuously pay attention to the dynamic state of the target webpage, and the method is more convenient for the copyright owner.
In addition, in this embodiment of the present specification, the certificate storing server may further obtain at least one time point specified by the user, and for each time point, when the time passes through the time point, perform block chain certificate storing on the target web page. Therefore, the regular evidence storage of the target webpage is realized.
It should be noted that, if the user needs the evidence storing server to perform block chain evidence storing on the target web page once after a specified period, the above time points are actually specified by the user according to the specified period.
Furthermore, in embodiments of the present description, the user may reconfigure the credentialing policy for the target web page. Specifically, the certificate storing server may receive the reconfiguration instruction sent by the user, and in response to the reconfiguration instruction, re-extract the tag of the target web page corresponding to the web page address, so that the user re-specifies the tag and/or re-specifies the certificate storing trigger condition.
In addition, in the embodiment of the present specification, after obtaining the credential storage triggering condition specified by the user, the monitoring workload may also be determined according to the credential storage triggering condition; determining the payment amount according to the monitoring workload; providing a payment interface to the user for the user to pay the payment amount.
Wherein the monitoring workload is positively correlated with the payment amount. The criterion for determining the payment amount according to the monitoring workload may be set by the blockchain evidence depositor according to actual needs, which is not specifically limited in this specification.
Further, when an infringement work concerned by the user exists on the target webpage, the infringement work is a designated associated work of the target webpage. The user, regardless of which tags in the document of the designated target web page are designated tags, is in fact concerned with the need for attention to the designated associated work. For example, the document content marked by the specified tag may be related statistics corresponding to the specified related works, copyright status information, or the specified related works themselves. In practice, once the designated related works are removed from the target web page, it is not necessary to monitor the target web page. For the user, the period from the beginning of monitoring the specified tag in the target webpage to the time when the specified related work is removed can be actually considered as a provable period during which the specified related work is persistent on the target webpage, which is relatively important evidence.
For this reason, in the embodiment of the present specification, when the start monitoring is performed for the specified tag, the time at which the monitoring is started is recorded; and when the specified associated works of the target webpage are monitored to be deleted, finishing monitoring and recording the time for finishing monitoring. Furthermore, according to the recorded time for starting monitoring and the recorded time for finishing monitoring, a duration evidence corresponding to the target webpage can be generated, and the duration evidence is subjected to block chain evidence storage.
Further, in step S406, if the designated associated work of the target webpage is a playable work (such as a video, an audio, and the like), performing block chaining verification on the target webpage, which may specifically be:
screenshot is carried out on the target webpage to obtain a webpage screenshot; reading the work storage address of the appointed associated work from the target webpage, and acquiring a playable work from the work storage address; processing the webpage screenshot and the playable work into a target hash; and issuing the target hash to a block chain for evidence storage.
Based on the method shown in fig. 1, an embodiment of the present specification further provides an apparatus for performing block chaining verification on a web page through file acquisition, as shown in fig. 5, including:
an access module 501 for accessing a target web page;
the first processing module 502 captures the target webpage to obtain a webpage capture; reading a file storage address associated with the target webpage, and acquiring a playable file from the file storage address;
the second processing module 503 is configured to process the web page screenshot and the playable file into a target hash;
and the evidence storing module 504 is used for issuing the target hash to the block chain for evidence storage.
The second processing module 503 processes the web page screenshot into a screenshot hash, and processes the playable file into a file hash; and processing the screenshot hash and the file hash into a target hash.
The first processing module 501 reads more than one file storage address associated with the target webpage; aiming at each file storage address associated with the target webpage, acquiring a playable file from the file storage address as a playable file corresponding to the file storage address;
the second processing module 503 processes the playable files corresponding to the web page screenshot and the file storage addresses associated with the target web page into a target hash.
The target webpage comprises more than one sub-web page link;
the first processing module 502, for each sub-web link included in the target web page, accesses the sub-web link; reading a file storage address contained in a subnet page corresponding to the subnet page link;
the second processing module 503 is configured to sort, according to the arrangement order of the sub-web links in the target web page, the playable files corresponding to the file storage addresses associated with the target web page, so as to obtain a playable file sequence; and processing the webpage screenshot and the playable file sequence into a target hash.
The second processing module 503 is configured to process the webpage screenshot into a screenshot hash; for each playable file in the sequence of playable files, processing the playable file into a file hash; sorting the file hashes corresponding to the playable files according to the arrangement sequence of the playable files to obtain a file hash sequence; constructing a Merkel tree based on the file hash sequence; and processing the screenshot hash and the root hash of the Meckel tree into a target hash.
The evidence storage module 504 is used for constructing a target transaction based on the target hash; and broadcasting the target transaction to other block chain nodes except the target transaction to enable each block chain node to store the target transaction into the block chain of the target transaction based on a consensus mechanism.
Embodiments of the present specification also provide a computer device, which at least includes a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the functions of the method shown in fig. 1 and/or fig. 4 when executing the program.
Fig. 6 is a schematic diagram illustrating a more specific hardware structure of a computing device according to an embodiment of the present disclosure, where the computing device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 are communicatively coupled to each other within the device via bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 1020 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1020 and called to be executed by the processor 1010.
The input/output interface 1030 is used for connecting an input/output module to input and output information. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1050 includes a path that transfers information between various components of the device, such as processor 1010, memory 1020, input/output interface 1030, and communication interface 1040.
It should be noted that although the above-mentioned device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040 and the bus 1050, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
Embodiments of the present description also provide a computer-readable storage medium on which a computer program is stored, which when executed by a processor implements the functionality of the method shown in fig. 1 and/or fig. 4.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
From the above description of the embodiments, it is clear to those skilled in the art that the embodiments of the present disclosure can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the embodiments of the present specification may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments of the present specification.
The systems, methods, modules or units described in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus and device embodiments, since they are substantially similar to the method embodiments, they are described relatively simply, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described method embodiments are merely illustrative, wherein the modules described as separate components may or may not be physically separate, and the functions of the modules may be implemented in one or more software and/or hardware when implementing the embodiments of the present specification. And part or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is only a specific embodiment of the embodiments of the present disclosure, and it should be noted that, for those skilled in the art, a plurality of modifications and decorations can be made without departing from the principle of the embodiments of the present disclosure, and these modifications and decorations should also be regarded as the protection scope of the embodiments of the present disclosure.

Claims (13)

1. A method for obtaining block chaining evidence of a webpage through a file comprises the following steps:
accessing a target webpage;
screenshot is carried out on the target webpage to obtain a webpage screenshot; reading a file storage address associated with the target webpage, and acquiring a playable file from the file storage address;
processing all contents which can be acquired based on the target webpage into target hash; wherein, the whole content is the webpage screenshot and the playable file;
and carrying out block chain verification on the target hash.
2. The method of claim 1, wherein processing the web page screenshot and the playable file into a target hash specifically comprises:
processing the webpage screenshot into a screenshot hash, and processing the playable file into a file hash;
and processing the screenshot hash and the file hash into a target hash.
3. The method of claim 1, wherein reading the file storage address associated with the target webpage specifically comprises:
reading more than one file storage address associated with the target webpage;
obtaining a playable file from the file storage address, specifically comprising:
aiming at each file storage address associated with the target webpage, acquiring a playable file from the file storage address as a playable file corresponding to the file storage address;
processing all the contents that can be acquired based on the target webpage into a target hash, specifically comprising:
and processing playable files corresponding to the webpage screenshot and each file storage address associated with the target webpage into target hash.
4. The method of claim 3, wherein the target web page includes more than one sub-web page link;
reading more than one file storage address associated with the target webpage specifically comprises:
for each sub-web page link contained in the target web page, accessing the sub-web page link;
reading a file storage address contained in a subnet page corresponding to the subnet page link;
processing playable files corresponding to the webpage screenshot and the file storage addresses associated with the target webpage into a target hash, specifically comprising:
sorting playable files corresponding to the file storage addresses associated with the target webpage respectively according to the arrangement sequence of the sub-web links in the target webpage to obtain a playable file sequence;
and processing the webpage screenshot and the playable file sequence into a target hash.
5. The method of claim 4, wherein processing the web page screenshot and the playable file sequence into a target hash specifically comprises:
processing the webpage screenshot into a screenshot hash;
for each playable file in the sequence of playable files, processing the playable file into a file hash;
sorting the file hashes corresponding to the playable files according to the arrangement sequence of the playable files to obtain a file hash sequence;
constructing a Merkel tree based on the file hash sequence;
and processing the screenshot hash and the root hash of the Meckel tree into a target hash.
6. The method according to claim 1, wherein performing block chaining validation on the target hash specifically comprises:
constructing a target transaction based on the target hash;
and broadcasting the target transaction to other block chain nodes except the target transaction to enable each block chain node to store the target transaction into the block chain of the target transaction based on a consensus mechanism.
7. An apparatus for obtaining block chaining verification on a web page by a file, comprising:
the access module accesses the target webpage;
the first processing module is used for carrying out screenshot on the target webpage to obtain a webpage screenshot; reading a file storage address associated with the target webpage, and acquiring a playable file from the file storage address;
the second processing module is used for processing all the contents which can be acquired based on the target webpage into target hash; wherein, the whole content is the webpage screenshot and the playable file;
and the evidence storing module is used for carrying out block chain evidence storing on the target hash.
8. The apparatus of claim 7, said second processing module to process said web page screenshot into a screenshot hash and said playable file into a file hash; and processing the screenshot hash and the file hash into a target hash.
9. The apparatus of claim 7, the first processing module to read more than one file storage address associated with the target web page; aiming at each file storage address associated with the target webpage, acquiring a playable file from the file storage address as a playable file corresponding to the file storage address;
and the second processing module is used for processing the playable files corresponding to the webpage screenshot and the file storage addresses associated with the target webpage into target hash.
10. The apparatus of claim 9, wherein the target web page comprises more than one sub-web page link;
the first processing module accesses each sub-web page link contained in the target web page; reading a file storage address contained in a subnet page corresponding to the subnet page link;
the second processing module is used for sequencing playable files corresponding to the file storage addresses associated with the target webpage according to the arrangement sequence of the sub-web links in the target webpage to obtain a playable file sequence; and processing the webpage screenshot and the playable file sequence into a target hash.
11. The apparatus of claim 10, said second processing module to process said web page screenshot into a screenshot hash; for each playable file in the sequence of playable files, processing the playable file into a file hash; sorting the file hashes corresponding to the playable files according to the arrangement sequence of the playable files to obtain a file hash sequence; constructing a Merkel tree based on the file hash sequence; and processing the screenshot hash and the root hash of the Meckel tree into a target hash.
12. The apparatus of claim 7, the credentialing module to construct a target transaction based on the target hash; and broadcasting the target transaction to other block chain nodes except the target transaction to enable each block chain node to store the target transaction into the block chain of the target transaction based on a consensus mechanism.
13. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 6 when executing the program.
CN201811283682.6A 2018-10-31 2018-10-31 Method and device for carrying out block chaining and evidence saving on webpage through file acquisition Active CN109614766B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811283682.6A CN109614766B (en) 2018-10-31 2018-10-31 Method and device for carrying out block chaining and evidence saving on webpage through file acquisition
TW108110270A TWI712907B (en) 2018-10-31 2019-03-25 Method and device for obtaining blockchain certificate for webpage through file acquisition
PCT/CN2019/104926 WO2020088104A1 (en) 2018-10-31 2019-09-09 Method and apparatus for performing block chain record-keeping on webpage by means of file acquisition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811283682.6A CN109614766B (en) 2018-10-31 2018-10-31 Method and device for carrying out block chaining and evidence saving on webpage through file acquisition

Publications (2)

Publication Number Publication Date
CN109614766A CN109614766A (en) 2019-04-12
CN109614766B true CN109614766B (en) 2021-01-22

Family

ID=66002191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811283682.6A Active CN109614766B (en) 2018-10-31 2018-10-31 Method and device for carrying out block chaining and evidence saving on webpage through file acquisition

Country Status (3)

Country Link
CN (1) CN109614766B (en)
TW (1) TWI712907B (en)
WO (1) WO2020088104A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614766B (en) * 2018-10-31 2021-01-22 创新先进技术有限公司 Method and device for carrying out block chaining and evidence saving on webpage through file acquisition
CN110347645B (en) * 2019-06-19 2023-10-10 创新先进技术有限公司 Electronic file evidence storage method and device
CN110334542B (en) * 2019-06-20 2023-02-28 创新先进技术有限公司 Network evidence preservation and network evidence preservation verification method and device
CN110806913A (en) * 2019-10-30 2020-02-18 支付宝(杭州)信息技术有限公司 Webpage screenshot method, device and equipment
CN110851879B (en) * 2020-01-15 2023-03-21 蚂蚁区块链科技(上海)有限公司 Method, device and equipment for infringement and evidence preservation based on evidence preservation block chain
CN111079199B (en) * 2020-03-23 2020-07-28 杭州有数金融信息服务有限公司 Enterprise credit data screenshot tamper-proofing method based on block chain technology
CN112435030B (en) * 2021-01-27 2021-05-07 支付宝(杭州)信息技术有限公司 Data processing method and device based on block chain and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239332A (en) * 2013-06-18 2014-12-24 腾讯科技(深圳)有限公司 Webpage content processing method, webpage content processing device and browser client side
CN106815530A (en) * 2016-12-26 2017-06-09 北京爱接力科技发展有限公司 Data deposit card method, data verification method and device

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104143055B (en) * 2014-08-16 2017-02-15 合一网络技术(北京)有限公司 Pirated video monitoring method and system
CN104536984B (en) * 2014-12-08 2017-10-13 北京邮电大学 The verification method and system of a kind of space text Top k inquiries in Outsourced database
US20160321435A1 (en) * 2015-05-01 2016-11-03 Monegraph, Inc. Managing digital content via block chain registers
CN105611428A (en) * 2015-12-22 2016-05-25 北京安寻网络科技有限公司 Video evidence preserving and verifying method and device
EP3504835B1 (en) * 2016-08-24 2021-09-22 Upgraded Inc. Digital securitization, obfuscation, policy and commerce of event tickets
CN107818108A (en) * 2016-09-13 2018-03-20 阿里巴巴集团控股有限公司 A kind of webpage rendering intent, apparatus and system
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN107784604A (en) * 2017-10-28 2018-03-09 北京安妮全版权科技发展有限公司 Copyright deposits card method, apparatus, storage medium and electronic equipment
CN108550037B (en) * 2018-04-11 2022-05-17 北京知金链网络技术有限公司 File processing method and device based on block chain
CN108629038A (en) * 2018-05-11 2018-10-09 北京奇虎科技有限公司 Webpage based on block chain deposits card method and system
AU2018100999A4 (en) * 2018-07-17 2018-09-06 Cherkas, Ruslan Mr Integration of Cryptocurrency Splitting Technology, Highly Scalable Blockchain Network and Mirror Advertising Technology for transparency of Business Operations and Taxation
CN109614766B (en) * 2018-10-31 2021-01-22 创新先进技术有限公司 Method and device for carrying out block chaining and evidence saving on webpage through file acquisition

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239332A (en) * 2013-06-18 2014-12-24 腾讯科技(深圳)有限公司 Webpage content processing method, webpage content processing device and browser client side
CN106815530A (en) * 2016-12-26 2017-06-09 北京爱接力科技发展有限公司 Data deposit card method, data verification method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链存证的影响;乘法网;《https://www.rideip.com/article/view/id-60.html》;20180910;网页正文第三节 *

Also Published As

Publication number Publication date
CN109614766A (en) 2019-04-12
WO2020088104A1 (en) 2020-05-07
TW202018556A (en) 2020-05-16
TWI712907B (en) 2020-12-11

Similar Documents

Publication Publication Date Title
CN109614766B (en) Method and device for carrying out block chaining and evidence saving on webpage through file acquisition
CN109582885B (en) Method and device for carrying out block link evidence storage on webpage through webpage monitoring
CN112491551B (en) Data verification method and device based on block chain and electronic equipment
US8010674B2 (en) Learning and community-based web aggregation techniques
US10354314B1 (en) Ranking of items as a function of virtual shopping cart activity
US8375305B1 (en) Placement of user interface elements based on a window entry or exit point
US8306805B2 (en) Scenario generation method and scenario generation apparatus
JP2016129038A (en) Method and apparatus for processing multi-step authentication sequence
CN109345392B (en) Method and system for issuing programming question, issuing solution code and checking solution code
CA3024889C (en) Method and device for preventing server from being attacked
CN111539775A (en) Application program management method and device
US8515830B1 (en) Display of items from search
CN110751527A (en) Method and device for receiving points and storage medium
CN110197445B (en) Intellectual property state generation method, intellectual property state query method, computer device and storage medium
CN110738784B (en) Invoice management method, device, server and system
JP7393343B2 (en) Control method, content management system, and program
US8751508B1 (en) Contextual indexing of applications
CN116842106A (en) Resource clue generation method and device
US20220156779A1 (en) Method, apparatus, and computer device for calculating website user credit point
CN112529647B (en) Block chain-based commodity transaction method, device and computer equipment
US8612449B1 (en) Contributor-provided item attributes
CN111680066B (en) Information processing method, information processing device, storage medium and electronic equipment
CN114465926A (en) Recursive server monitoring method, device, equipment and storage medium
CN110138707B (en) Data interaction method, client, application and electronic equipment
CN112434237A (en) Page loading method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant