CN109684786A - A kind of copyright registration method, apparatus and terminal device based on block chain - Google Patents
A kind of copyright registration method, apparatus and terminal device based on block chain Download PDFInfo
- Publication number
- CN109684786A CN109684786A CN201811311791.4A CN201811311791A CN109684786A CN 109684786 A CN109684786 A CN 109684786A CN 201811311791 A CN201811311791 A CN 201811311791A CN 109684786 A CN109684786 A CN 109684786A
- Authority
- CN
- China
- Prior art keywords
- works
- block chain
- certified
- data library
- threshold value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000012550 audit Methods 0.000 claims description 39
- 238000004590 computer program Methods 0.000 claims description 19
- 238000012552 review Methods 0.000 claims description 13
- 238000003860 storage Methods 0.000 claims description 11
- 230000006870 function Effects 0.000 description 14
- 230000008569 process Effects 0.000 description 9
- 238000004422 calculation algorithm Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 238000010200 validation analysis Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005242 forging Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000007670 refining Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
Abstract
The application is suitable for block chain technical field, provide a kind of copyright registration method, apparatus and terminal device based on block chain, the described method includes: works to be certified are matched with the works in copyright data library, judge whether the matching degree of the works in the works to be certified and the copyright data library is respectively less than or is equal to preset threshold value;When the matching degree of the works in the works to be certified and the copyright data library is respectively less than or is equal to the preset threshold value, the works to be certified, copyright authentication information and applying date timestamp are broadcasted into block chain.The application can solve existing copyright authentication method and be difficult to take into account convenience and confidence level, and authentication mode with a high credibility examines that the period is long, and convenient and fast authentication mode is with a low credibility, there are problems that the content of works is modified the risk being modified with enrollment time.
Description
Technical field
The application belong to block chain technical field more particularly to a kind of copyright registration method, apparatus based on block chain and
Terminal device.
Background technique
With the development of society, people increasingly focus on the protection to copyright, copyright is also known as copyright, refer to author or
The right that other people (including legal persons) in accordance with the law enjoys a certain works.
Actual rights protection mainly authenticates copyright by copyright registration department or other third-party institutions, copyright
The copyright authentication of registration authorities has high confidence level, but examines that the period is longer, other third-party institution's copyright authentications
Process is relatively simple, but confidence level is lower, and there are the contents of works to be modified the risk being modified with enrollment time.
To sum up, existing copyright authentication method is difficult to take into account convenience and confidence level, and authentication mode with a high credibility examines
Period is long, and convenient and fast authentication mode is with a low credibility, and there are the contents of works to be modified the risk being modified with enrollment time.
Summary of the invention
It is set in view of this, the embodiment of the present application provides a kind of copyright registration method, apparatus and terminal based on block chain
It is standby, it is difficult to take into account convenience and confidence level to solve existing copyright authentication method, authentication mode with a high credibility examines the period
Long, convenient and fast authentication mode is with a low credibility, there are problems that the content of works is modified the risk being modified with enrollment time.
The first aspect of the embodiment of the present application provides a kind of copyright registration method based on block chain, comprising:
Works to be certified are matched with the works in copyright data library, judge the works to be certified
Preset threshold value whether is respectively less than or is equal to the matching degree of the works in the copyright data library;
When the matching degree of the works in the works to be certified and the copyright data library is respectively less than or is equal to institute
When stating preset threshold value, the works to be certified, copyright authentication information and applying date timestamp are broadcasted into block chain.
The second aspect of the embodiment of the present application provides a kind of copyright registration device based on block chain, comprising:
Works matching module judges for matching works to be certified with the works in copyright data library
Whether the matching degree of the works in the works to be certified and the copyright data library is respectively less than or is equal to preset threshold value;
Broadcast module is authenticated, for the matching when the works in the works to be certified and the copyright data library
When degree is respectively less than or is equal to the preset threshold value, by the works to be certified, copyright authentication information and applying date timestamp
Broadcast is into block chain.
The third aspect of the embodiment of the present application provides a kind of terminal device, including memory, processor and is stored in
In the memory and the computer program that can run on the processor, when the processor executes the computer program
It realizes such as the step of the above method.
The fourth aspect of the embodiment of the present application provides a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, realizes when the computer program is executed by processor such as the step of the above method.
Existing beneficial effect is the embodiment of the present application compared with prior art:
In the copyright registration method based on block chain of the application, by the work in works to be certified and copyright data library
Whether crop is matched, be respectively less than or be equal to according to the matching degree of works to be certified and the works in copyright data library
Preset threshold value judges whether to authenticate works to be certified, and verification process is simple and direct, after certification passes through, by work to be certified
Crop, copyright authentication information and applying date timestamp are broadcasted into block chain, can not be distorted and can not be pseudo- since block chain has
The characteristics of making, the risk that the content and enrollment time that can avoid works are modified, it is difficult to solve existing copyright authentication method
To take into account convenience and confidence level, authentication mode with a high credibility examines that the period is long, and convenient and fast authentication mode is with a low credibility, exists
The content of works is modified the problem of risk being modified with enrollment time.
Detailed description of the invention
It in order to more clearly explain the technical solutions in the embodiments of the present application, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only some of the application
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is a kind of implementation process schematic diagram of copyright registration method based on block chain provided by the embodiments of the present application;
Fig. 2 is a kind of schematic diagram of copyright registration device based on block chain provided by the embodiments of the present application;
Fig. 3 is the schematic diagram of terminal device provided by the embodiments of the present application.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, so as to provide a thorough understanding of the present application embodiment.However, it will be clear to one skilled in the art that there is no these specific
The application also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, so as not to obscure the description of the present application with unnecessary details.
In order to illustrate technical solution described herein, the following is a description of specific embodiments.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " instruction is described special
Sign, entirety, step, operation, the presence of element and/or component, but be not precluded one or more of the other feature, entirety, step,
Operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment
And be not intended to limit the application.As present specification and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, mobile terminal described in the embodiment of the present application is including but not limited to such as with the sensitive table of touch
Mobile phone, laptop computer or the tablet computer in face (for example, touch-screen display and/or touch tablet) etc it is other
Portable device.It is to be further understood that in certain embodiments, above equipment is not portable communication device, but is had
The desktop computer of touch sensitive surface (for example, touch-screen display and/or touch tablet).
In following discussion, the mobile terminal including display and touch sensitive surface is described.However, should manage
Solution, mobile terminal may include that one or more of the other physical User of such as physical keyboard, mouse and/or control-rod connects
Jaws equipment.
Mobile terminal supports various application programs, such as one of the following or multiple: drawing application program, demonstration application
Program, word-processing application, website creation application program, disk imprinting application program, spreadsheet applications, game are answered
With program, telephony application, videoconference application, email application, instant messaging applications, forging
Refining supports application program, photo management application program, digital camera application program, digital camera application program, web-browsing to answer
With program, digital music player application and/or video frequency player application program.
At least one of such as touch sensitive surface can be used in the various application programs that can be executed on mobile terminals
Public physical user-interface device.It can be adjusted among applications and/or in corresponding application programs and/or change touch is quick
Feel the corresponding information shown in the one or more functions and terminal on surface.In this way, terminal public physical structure (for example,
Touch sensitive surface) it can support the various application programs with user interface intuitive and transparent for a user.
Embodiment one:
A kind of copyright registration method based on block chain provided below the embodiment of the present application one is described, and please refers to
Attached drawing 1, the copyright registration method based on block chain in the embodiment of the present application one include:
Step S101, works to be certified are matched with the works in copyright data library, judgement is described wait recognize
Whether the matching degree of the works in the works of card and the copyright data library is respectively less than or is equal to preset threshold value;
When receiving the works to be certified of user's upload, by the work in works to be certified and copyright data library
Crop is matched, and works may include the works of the forms such as text, image and sound, and text can be taken during progress is matched
Word matching algorithm, image matching algorithm and Audio Matching algorithm scheduling algorithm carry out the similarity calculation of works.
Available work to be certified after works to be certified are matched with the works in copyright data library
The matching degree of works in crop and copyright data library, according to the works in works to be certified and copyright data library
Whether matching degree is respectively less than or judges whether to carry out copyright authentication to works to be certified equal to preset threshold value.
Step S102, when the matching degree of the works to be certified and the works in the copyright data library is respectively less than
Or when being equal to the preset threshold value, the works to be certified, copyright authentication information and applying date timestamp are broadcasted to area
In block chain.
If the matching degree of the works in works to be certified and copyright data library is respectively less than or is equal to preset threshold value,
It indicates that works to be certified have certain originality, copyright authentication can be carried out to it, works to be certified, copyright are recognized
Card information and applying date timestamp are broadcasted into block chain.
Applying date timestamp is chosen as the trusted timestamp issued by national time service center.
When works to be certified, copyright authentication information and applying date timestamp are recorded in block chain, if other people
The content of works, copyright authentication information or applying date timestamp are distorted or forged to desired malice, then must possess block chain
In 51% or more calculation power, when block chain it is larger when, it is extremely difficult for possessing in block chain 51% or more calculation power
Difficult, therefore, block chain has the characteristics of can not distorting and can not forging, and can avoid in the works being recorded in block chain
Hold, copyright authentication information and applying date timestamp are to the case where distorting and forging appearance.
Simultaneously as block chain is a kind of distributed account book, it is mainly responsible for record information, it can not resolution information source and letter
The true and false of breath, therefore, in order to avoid other people forge copyright authentication information and are published in block chain, copyright authentication side can incite somebody to action oneself
Oneself digital signature is also broadcasted into block chain, for example, in copyright authentication information can in addition to including copyright authentication by information,
It can also include the digital signature of copyright authentication side, copyright authentication side passes through information and application to works content, copyright authentication
Time of Day stamp carries out Hash operation and obtains digital digest, is encrypted to obtain version to digital digest using the private key of copyright authentication side
It weighs the digital signature of authenticating party and uses the public key of copyright publisher after other nodes receive copyright authentication information in block chain
Digital signature is decrypted to obtain digital digest, then judges to pass through information and the applying date to works content, copyright authentication
Whether the cryptographic Hash that timestamp carries out Hash operation is consistent with digital digest, if they are the same, then proves that digital signature is sent out by copyright
The publication of cloth side, this copyright authentication information is not that other people forge.
Further, it is described works to be certified are matched with the works in copyright data library before also wrap
It includes:
A1, the block chain data for obtaining each nodes records in block chain, are approved with the block chain node greater than 50%
Block chain data of the block chain data as standard construct the copyright data library according to the block chain data of the standard;
Alternatively, using local data base as copyright data library;
Alternatively, constructing copyright data library according to internet resource.
Copyright data library can be the local data base of copyright authentication side, by internet resource or can also be recorded in block
Data building in chain, such as usually can work as the data of local data base using local data base as copyright data library
When authenticity is under suspicion or needs to be updated the data in copyright data library at regular intervals, block chain can be used
In data rebuild copyright data library.
When copyright data library is constructed by the data being recorded in block chain, it is necessary first to ensure to be recorded in block chain
The confidence level of data can obtain the block chain data of each nodes records in block chain at this time, to be greater than 50% block chain link
Block chain data of the block chain data that point is approved as standard.
When obtaining the block chain data of standard, with works content, copyright information and the applying date in the block chain of standard
Timestamp constructs copyright data library.
Further, the method also includes:
B1, when the matching degree of the works to be certified and the works in the copyright data library be greater than it is described preset
It is described preset by being greater than in authentication failure message and the copyright data library with the works matching degree to be certified when threshold value
The works of threshold value are back to the user for uploading the works to be certified.
It, can the reason of in order to allow the user for uploading works to be certified to understand authentification failure when copyright authentication failure
The works for being greater than preset threshold value in authentication failure message and copyright data library with works matching degree to be certified to be returned
The user of works to be certified is uploaded, the reason of user can understand authentification failure according to this, avoids phase occur in next production process
Same problem.
Further, the method also includes:
C1, when receiving artificial reexamination, the works to appeal from drunk to Philip sober, the works to appeal from drunk to Philip sober are recognized
Demonstrate,prove the work for being greater than the preset threshold value in failure information and the copyright data library with the works matching degree to appeal from drunk to Philip sober
Crop is sent to auditor;
When user receives in authentication failure message and copyright data library with works matching degree to be certified greater than preset
The works of threshold value may think that the auditing result audited automatically is wrong by the comparison of oneself, can propose at this time artificial
Reexamination.
When receiving artificial reexamination, the certification of the works to appeal from drunk to Philip sober, the works to appeal from drunk to Philip sober can be lost
It loses in information and copyright data library and is sent to auditor greater than the works of preset threshold value with the works matching degree to appeal from drunk to Philip sober,
So that auditor judges the auditing result audited automatically with the presence or absence of biased.
C2, the audit report that the auditor uploads is received, if the auditing result in the audit report is that audit passes through,
Then the works to appeal from drunk to Philip sober, copyright authentication information and applying date timestamp are broadcasted into block chain.
Auditor's audit can upload audit report after finishing, after receiving audit report, if the audit of audit report
As a result pass through for audit, then broadcast the works to appeal from drunk to Philip sober, copyright authentication information and applying date timestamp into block chain.
Further, the method also includes:
If the auditing result in D1, the audit report is audit failure, the audit report is sent to review and is asked
Ask user.
If the auditing result of audit report is audit failure, audit report is sent to reexamination user, informs and uses
The specific examining content in family.
By way of first carrying out auditing automatically and carrying out artificial review further according to reexamination, it can avoid accidentally examining as far as possible
In the case where core, the workload of manual examination and verification is reduced, improves working efficiency.
Further, the method also includes:
E1, when authentification failure and when not proposing in preset time period reexamination or review audit failure, certification is lost
The works of failure, authentification failure label and applying date timestamp is lost or audits to broadcast into block chain.
The works of automated validation failure and review failure can also broadcast into block chain one as copyright data library
Part, for example, in the preset time period (such as three months) after automated validation failure, it, will certification if user does not propose review
Works, authentification failure label and the applying date timestamp of failure are broadcasted into block chain, if user proposes review, in review
The works of audit failure, authentification failure label and applying date timestamp are broadcasted into block chain again after audit failure, thus
The data volume for improving block chained record, improves the confidence level of copyright authentication.
Further, the method also includes:
F1, when receiving copyright inquiry instruction, obtained from the copyright data library according to the copyright inquiry instruction
The copyright authentication information and applying date timestamp of works to be checked;
F2, the copyright authentication information of the works to be checked and the applying date timestamp are sent to copyright inquiry use
Family.
As user because copyright inquiry instruction can be passed through when dispute over copyright or other reasons need copyright authentication information
The copyright authentication information and applying date timestamp that works to be checked are obtained from copyright data library, in this, as dispute over copyright
It handles evidence or is used for other purposes.
It copyright data library at this time can the local data base for copyright authentication side or the data by the building of block chain data
Library.
In the copyright registration method based on block chain that the present embodiment one provides, by works and copyright data to be certified
Works in library are matched, and whether the matching degree according to works to be certified and the works in copyright data library is small
Judge whether to authenticate works to be certified in or equal to preset threshold value, verification process is simple and direct, will be to after certification passes through
Works, copyright authentication information and the applying date timestamp of certification are broadcasted into block chain, can not be distorted since block chain has
The characteristics of with that can not forge, the risk that the content and enrollment time that can avoid works are modified solve existing copyright and recognize
Card method is difficult to take into account convenience and confidence level, and authentication mode with a high credibility examines that the period is long, and convenient and fast authentication mode is credible
It spends low, there are problems that the content of works is modified the risk being modified with enrollment time.
Copyright data library can be the local data base of copyright authentication side, can also be made of block chain data, work as copyright
It when database is made of block chain data, needs to verify block chain data, be approved with the block chain node greater than 50%
Block chain data of the block chain data as standard, construct copyright data library with the block chain data of standard.
It, can will be big with works matching degree to be certified in authentication failure message and copyright data library after copyright authentication failure
The reason of returning to the user for uploading works to be certified in the works of preset threshold value, understanding authentification failure so as to user, avoids
Occurs identical problem in next production process.
If user leaves a question open to the result of automated validation, artificial reexamination can be proposed, auditor is according to appealing from drunk to Philip sober
Works, the works to appeal from drunk to Philip sober authentication failure message and copyright data library in the works matching degree that appeals from drunk to Philip sober
Artificial review is carried out greater than the works of preset threshold value, if audit passes through, by the works to appeal from drunk to Philip sober, copyright authentication information
It broadcasts with applying date timestamp into block chain, if audit failure, audit report is sent to reexamination user, informs and uses
The specific examining content in family.
The works of automated validation failure and review failure can also broadcast into block chain one as copyright data library
Part broadcasts authentification failure or the works of audit failure, authentification failure label and applying date timestamp into block chain, from
And the data volume of block chained record is improved, improve the confidence level of copyright authentication.
As user because user can be looked by copyright when dispute over copyright or other reasons need to obtain copyright authentication information
Ask copyright authentication information and applying date timestamp that instructions query corresponds to works.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present application constitutes any limit
It is fixed.
Embodiment two:
The embodiment of the present application two provides a kind of copyright registration device based on block chain, for purposes of illustration only, only show with
The relevant part of the application, as shown in Fig. 2, the copyright registration device based on block chain includes,
Works matching module 201 is sentenced for matching works to be certified with the works in copyright data library
Whether the matching degree of the works in the works to be certified of breaking and the copyright data library is respectively less than or is equal to preset threshold
Value;
Broadcast module 202 is authenticated, for when the works in the works to be certified and the copyright data library
When matching degree is respectively less than or is equal to the preset threshold value, when by the works to be certified, copyright authentication information and the applying date
Between stamp broadcast into block chain.
Further, described device further include:
Data build library module, for obtaining the block chain data of each nodes records in block chain, to be greater than 50% area
Block chain data of the block chain data that block chain node is approved as standard, according to the building of the block chain data of the standard
Copyright data library;
Alternatively, for using local data base as copyright data library;
Alternatively, for constructing copyright data library according to internet resource.
Further, described device further include:
Failure return module, for the matching when the works in the works to be certified and the copyright data library
When degree is greater than the preset threshold value, it will be matched in authentication failure message and the copyright data library with the works to be certified
The works that degree is greater than the preset threshold value are back to the user for uploading the works to be certified.
Further, described device further include:
Reexamination module, for when receiving artificial reexamination, the works to appeal from drunk to Philip sober, the request to be answered
It is greater than institute with the works matching degree to appeal from drunk to Philip sober in the authentication failure message of careful works and the copyright data library
The works for stating preset threshold value are sent to auditor;
The audit report that review is uploaded by module, for receiving the auditor, if the audit in the audit report
As a result pass through for audit, then broadcast the works to appeal from drunk to Philip sober, copyright authentication information and applying date timestamp to block
In chain.
Further, described device further include:
Review failure module reports the audit if being audit failure for the auditing result in the audit report
Announcement is sent to reexamination user.
Further, described device further include:
Failure broadcast module, for not proposing that reexamination or review audit lose when authentification failure and in preset time period
When losing, authentification failure or the works of audit failure, authentification failure label and applying date timestamp are broadcasted into block chain.
Further, described device further include:
Copyright enquiry module, for when receiving copyright inquiry instruction, according to the copyright inquiry instruction from the version
The copyright authentication information and applying date timestamp of works to be checked are obtained in power database;
Query feedback module, for sending out the copyright authentication information of the works to be checked and the applying date timestamp
It send to copyright and inquires user.
It should be noted that the contents such as information exchange, implementation procedure between above-mentioned apparatus/unit, due to the application
Embodiment of the method is based on same design, concrete function and bring technical effect, for details, reference can be made to embodiment of the method part, this
Place repeats no more.
Embodiment three:
Fig. 3 is the schematic diagram for the terminal device that the embodiment of the present application three provides.As shown in figure 3, the terminal of the embodiment is set
Standby 3 include: processor 30, memory 31 and are stored in the meter that can be run in the memory 31 and on the processor 30
Calculation machine program 32.The processor 30 realizes the above-mentioned copyright registration method based on block chain when executing the computer program 32
Step in embodiment, such as step S101 to S102 shown in FIG. 1.Alternatively, the processor 30 executes the computer journey
The function of each module/unit in above-mentioned each Installation practice, such as the function of module 201 to 202 shown in Fig. 2 are realized when sequence 32.
Illustratively, the computer program 32 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 31, and are executed by the processor 30, to complete the application.Described one
A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for
Implementation procedure of the computer program 32 in the terminal device 3 is described.For example, the computer program 32 can be divided
It is cut into works matching module and certification broadcast module, each module concrete function is as follows:
Works to be certified are matched with the works in copyright data library, judge the works to be certified
Preset threshold value whether is respectively less than or is equal to the matching degree of the works in the copyright data library;
When the matching degree of the works in the works to be certified and the copyright data library is respectively less than or is equal to institute
When stating preset threshold value, the works to be certified, copyright authentication information and applying date timestamp are broadcasted into block chain.
The terminal device 3 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set
It is standby.The terminal device may include, but be not limited only to, processor 30, memory 31.It will be understood by those skilled in the art that Fig. 3
The only example of terminal device 3 does not constitute the restriction to terminal device 3, may include than illustrating more or fewer portions
Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net
Network access device, bus etc..
Alleged processor 30 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 31 can be the internal storage unit of the terminal device 3, such as the hard disk or interior of terminal device 3
It deposits.The memory 31 is also possible to the External memory equipment of the terminal device 3, such as be equipped on the terminal device 3
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge
Deposit card (Flash Card) etc..Further, the memory 31 can also both include the storage inside list of the terminal device 3
Member also includes External memory equipment.The memory 31 is for storing needed for the computer program and the terminal device
Other programs and data.The memory 31 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
Scope of the present application.
In embodiment provided herein, it should be understood that disclosed device/terminal device and method, it can be with
It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as
Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device
Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the application realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code
Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice
Subtract, such as does not include electric carrier signal and electricity according to legislation and patent practice, computer-readable medium in certain jurisdictions
Believe signal.
Embodiment described above is only to illustrate the technical solution of the application, rather than its limitations;Although referring to aforementioned reality
Example is applied the application is described in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution should all
Comprising within the scope of protection of this application.
Claims (10)
1. a kind of copyright registration method based on block chain characterized by comprising
Works to be certified are matched with the works in copyright data library, judge the works to be certified and institute
Whether the matching degree for stating the works in copyright data library is respectively less than or is equal to preset threshold value;
When the matching degree of the works to be certified and the works in the copyright data library is respectively less than or is equal to described pre-
When setting threshold value, the works to be certified, copyright authentication information and applying date timestamp are broadcasted into block chain.
2. as described in claim 1 based on the copyright registration method of block chain, which is characterized in that described by work to be certified
Before crop is matched with the works in copyright data library further include:
The block chain data of each nodes records in block chain are obtained, the block chain number approved with the block chain node greater than 50%
According to the block chain data as standard, the copyright data library is constructed according to the block chain data of the standard;
Alternatively, using local data base as copyright data library;
Alternatively, constructing copyright data library according to internet resource.
3. as described in claim 1 based on the copyright registration method of block chain, which is characterized in that the method also includes:
When the matching degree of the works in the works to be certified and the copyright data library is greater than the preset threshold value,
The preset threshold value will be greater than with the works matching degree to be certified in authentication failure message and the copyright data library
Works are back to the user for uploading the works to be certified.
4. as claimed in claim 3 based on the copyright registration method of block chain, which is characterized in that the method also includes:
When receiving artificial reexamination, by the authentification failure of the works to appeal from drunk to Philip sober, the works to appeal from drunk to Philip sober
The works for being greater than the preset threshold value with the works matching degree to appeal from drunk to Philip sober in information and the copyright data library are sent out
It send to auditor;
The audit report that the auditor uploads is received, if the auditing result in the audit report is that audit passes through, by institute
The works to appeal from drunk to Philip sober, copyright authentication information and applying date timestamp is stated to broadcast into block chain.
5. as claimed in claim 4 based on the copyright registration method of block chain, which is characterized in that the method also includes:
If the auditing result in the audit report is audit failure, the audit report is sent to reexamination user.
6. as claimed in claim 5 based on the copyright registration method of block chain, which is characterized in that the method also includes:
When authentification failure and by authentification failure or examine when not proposing in preset time period reexamination perhaps review audit failure
Works, authentification failure label and the applying date timestamp of core failure are broadcasted into block chain.
7. as described in claim 1 based on the copyright registration method of block chain, which is characterized in that the method also includes:
When receiving copyright inquiry instruction, work to be checked is obtained from the copyright data library according to the copyright inquiry instruction
The copyright authentication information and applying date timestamp of crop;
The copyright authentication information of the works to be checked and the applying date timestamp are sent to copyright inquiry user.
8. a kind of copyright registration device based on block chain characterized by comprising
Works matching module, for matching works to be certified with the works in copyright data library, described in judgement
Whether the matching degree of the works in works to be certified and the copyright data library is respectively less than or is equal to preset threshold value;
Broadcast module is authenticated, it is equal for the matching degree when the works to be certified and the works in the copyright data library
When less than or equal to the preset threshold value, the works to be certified, copyright authentication information and applying date timestamp are broadcasted
Into block chain.
9. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor
The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 7 when executing the computer program
The step of any one the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In when the computer program is executed by processor the step of any one of such as claim 1 to 7 of realization the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811311791.4A CN109684786A (en) | 2018-11-05 | 2018-11-05 | A kind of copyright registration method, apparatus and terminal device based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811311791.4A CN109684786A (en) | 2018-11-05 | 2018-11-05 | A kind of copyright registration method, apparatus and terminal device based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109684786A true CN109684786A (en) | 2019-04-26 |
Family
ID=66184657
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811311791.4A Pending CN109684786A (en) | 2018-11-05 | 2018-11-05 | A kind of copyright registration method, apparatus and terminal device based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109684786A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110334484A (en) * | 2019-06-27 | 2019-10-15 | 腾讯科技(深圳)有限公司 | A kind of copyright authentication method, apparatus, computer equipment and storage medium |
CN110489946A (en) * | 2019-08-15 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Copyright authentication method, apparatus, equipment and storage medium based on block chain |
CN110727927A (en) * | 2019-09-24 | 2020-01-24 | 上海大学 | Digital product protection system and method based on block chain technology |
CN111126962A (en) * | 2019-12-24 | 2020-05-08 | 南方电网科学研究院有限责任公司 | New energy grid-connected standard reporting system and method based on block chain |
CN111177661A (en) * | 2019-12-27 | 2020-05-19 | 万翼科技有限公司 | Copyright authentication method for building information model component and related product |
CN111538963A (en) * | 2020-04-29 | 2020-08-14 | 铭数科技(青岛)有限公司 | Block chain copyright protection system and method based on double chains |
CN112242983A (en) * | 2019-07-19 | 2021-01-19 | 傲为信息技术(江苏)有限公司 | Digital asset authentication processing system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017148245A1 (en) * | 2016-03-01 | 2017-09-08 | 华为技术有限公司 | Rights management method and system |
CN107832384A (en) * | 2017-10-28 | 2018-03-23 | 北京安妮全版权科技发展有限公司 | Infringement detection method, device, storage medium and electronic equipment |
CN105701076B (en) * | 2016-01-13 | 2018-05-22 | 湖南通远网络科技有限公司 | A kind of paper plagiarizes detection method and system |
CN108595607A (en) * | 2018-04-20 | 2018-09-28 | 百度在线网络技术(北京)有限公司 | Processing method, device, equipment, system and the storage medium of register information |
-
2018
- 2018-11-05 CN CN201811311791.4A patent/CN109684786A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701076B (en) * | 2016-01-13 | 2018-05-22 | 湖南通远网络科技有限公司 | A kind of paper plagiarizes detection method and system |
WO2017148245A1 (en) * | 2016-03-01 | 2017-09-08 | 华为技术有限公司 | Rights management method and system |
CN107832384A (en) * | 2017-10-28 | 2018-03-23 | 北京安妮全版权科技发展有限公司 | Infringement detection method, device, storage medium and electronic equipment |
CN108595607A (en) * | 2018-04-20 | 2018-09-28 | 百度在线网络技术(北京)有限公司 | Processing method, device, equipment, system and the storage medium of register information |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110334484A (en) * | 2019-06-27 | 2019-10-15 | 腾讯科技(深圳)有限公司 | A kind of copyright authentication method, apparatus, computer equipment and storage medium |
CN110334484B (en) * | 2019-06-27 | 2021-07-06 | 腾讯科技(深圳)有限公司 | Copyright verification method and device, computer equipment and storage medium |
CN112242983A (en) * | 2019-07-19 | 2021-01-19 | 傲为信息技术(江苏)有限公司 | Digital asset authentication processing system |
CN110489946A (en) * | 2019-08-15 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Copyright authentication method, apparatus, equipment and storage medium based on block chain |
CN110727927A (en) * | 2019-09-24 | 2020-01-24 | 上海大学 | Digital product protection system and method based on block chain technology |
CN110727927B (en) * | 2019-09-24 | 2023-10-20 | 上海大学 | Digital product protection system and method based on block chain technology |
CN111126962A (en) * | 2019-12-24 | 2020-05-08 | 南方电网科学研究院有限责任公司 | New energy grid-connected standard reporting system and method based on block chain |
CN111126962B (en) * | 2019-12-24 | 2024-03-12 | 南方电网科学研究院有限责任公司 | New energy grid-connected standard declaration system and method based on blockchain |
CN111177661A (en) * | 2019-12-27 | 2020-05-19 | 万翼科技有限公司 | Copyright authentication method for building information model component and related product |
CN111177661B (en) * | 2019-12-27 | 2023-04-18 | 万翼科技有限公司 | Copyright authentication method for building information model component and related product |
CN111538963A (en) * | 2020-04-29 | 2020-08-14 | 铭数科技(青岛)有限公司 | Block chain copyright protection system and method based on double chains |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109684786A (en) | A kind of copyright registration method, apparatus and terminal device based on block chain | |
US11431693B2 (en) | Systems, methods, and apparatuses for seeding community sidechains with consent written onto a blockchain interfaced with a cloud based computing environment | |
US20230342734A1 (en) | Systems, methods, and apparatuses for implementing smart flow contracts using distributed ledger technologies in a cloud based computing environment | |
US11257073B2 (en) | Systems, methods, and apparatuses for implementing machine learning models for smart contracts using distributed ledger technologies in a cloud based computing environment | |
Benchoufi et al. | Blockchain protocols in clinical trials: Transparency and traceability of consent | |
US11645632B2 (en) | System and method for a decentralized portable information container supporting privacy protected digital information credentialing, remote administration, local validation, access control and remote instruction signaling utilizing blockchain distributed ledger and container wallet technologies | |
US20190236562A1 (en) | Systems, methods, and apparatuses for implementing document interface and collaboration using quipchain in a cloud based computing environment | |
US20190238316A1 (en) | Systems, methods, and apparatuses for implementing intelligent consensus, smart consensus, and weighted consensus models for distributed ledger technologies in a cloud based computing environment | |
US20190236606A1 (en) | Systems, methods, and apparatuses for implementing a virtual chain model for distributed ledger technologies in a cloud based computing environment | |
WO2020108046A1 (en) | Cross-block chain interaction method and system, computer device, and storage medium | |
EP3429122B1 (en) | Method and apparatus for controlling electronic voting | |
US10410213B2 (en) | Encapsulated security tokens for electronic transactions | |
US10423952B2 (en) | Encapsulated security tokens for electronic transactions | |
CN109460966A (en) | Contract signing method, apparatus and terminal device based on requesting party's classification | |
CN109493047A (en) | A kind of commission settlement method, device and terminal device based on block chain | |
CN109635572A (en) | A kind of contract signing method, apparatus and terminal device based on block chain | |
CN111291394B (en) | False information management method, false information management device and storage medium | |
CN109660352A (en) | A kind of distribution relation record method, apparatus and terminal device based on block chain | |
CN109361697A (en) | The method for realizing trusted identity certification based on SIM card load PKI | |
CN114049096A (en) | Personalized customization system and method based on block chain | |
US11334884B2 (en) | Encapsulated security tokens for electronic transactions | |
EP3457622B1 (en) | Electronic voting system | |
CN117397205A (en) | Booting trust for a decentralised identifier | |
Van Wingerde | Blockchain-enabled self-sovereign identity | |
Angelov et al. | Dynamic and secure B2B e-contract update management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190426 |
|
RJ01 | Rejection of invention patent application after publication |