CN110096639B - Method and device for monitoring and obtaining evidence of infringement and terminal equipment - Google Patents

Method and device for monitoring and obtaining evidence of infringement and terminal equipment Download PDF

Info

Publication number
CN110096639B
CN110096639B CN201910073179.6A CN201910073179A CN110096639B CN 110096639 B CN110096639 B CN 110096639B CN 201910073179 A CN201910073179 A CN 201910073179A CN 110096639 B CN110096639 B CN 110096639B
Authority
CN
China
Prior art keywords
data
infringement
monitored
information
unique feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910073179.6A
Other languages
Chinese (zh)
Other versions
CN110096639A (en
Inventor
刘刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Ebaoquan Network Technology Co ltd
Original Assignee
Chongqing Ebaoquan Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Ebaoquan Network Technology Co ltd filed Critical Chongqing Ebaoquan Network Technology Co ltd
Priority to CN201910073179.6A priority Critical patent/CN110096639B/en
Publication of CN110096639A publication Critical patent/CN110096639A/en
Application granted granted Critical
Publication of CN110096639B publication Critical patent/CN110096639B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an infringement monitoring and evidence obtaining method, a device and terminal equipment, which are suitable for the technical field of data processing, wherein the method comprises the following steps: acquiring data to be monitored and corresponding data types; searching resource data of data types in the monitoring area, and calculating the similarity between the resource data and the data to be monitored; screening infringement data with similarity higher than a preset threshold value from the resource data, and carrying out curing treatment on the infringement data, infringement information corresponding to the infringement data and a timestamp to obtain a corresponding unique feature code; and storing the infringement data and the infringement information, and sending the unique feature code of the infringement data to a preset data interface. The embodiment of the invention prevents the evidence of infringement data and the like from being modified, and also realizes evidence persistence with judicial effectiveness, so that a resource holder can effectively maintain right in the follow-up process, thereby realizing infringement monitoring and effective evidence collection of the resource data.

Description

Method and device for monitoring and obtaining evidence of infringement and terminal equipment
Technical Field
The invention belongs to the technical field of data processing, and particularly relates to an infringement monitoring and evidence obtaining method and terminal equipment.
Background
With the continuous development and popularization of the internet, the internet becomes more and more convenient, people can publish articles, release photographic works or share other resources and the like on the internet at any time and any place, but the problem of infringement caused by the problems of non-standardization and the like of internet management is more and more serious while the internet is more and more convenient, more and more people spread articles, audio-visual works or other resources of other people on the internet without authorization, and therefore great economic loss is caused to a resource holder.
In order to solve the problem of serious internet infringement, in the prior art, a resource holder generally finds an infringement website manually and performs manual evidence collection after knowing that an infringement behavior of another person exists, but in actual situations, the internet evidence collection difficulty is very high, and evidence obtained by a user in the form of screenshot or offline webpage storage does not always have judicial effectiveness and cannot be used for maintaining right at last, so that an infringement monitoring and evidence collection method capable of providing the user for the user is urgently needed in the prior art to help the resource holder perform legal right protection on resources.
Disclosure of Invention
In view of this, embodiments of the present invention provide an infringement monitoring and forensics method and a terminal device, so as to solve the problem that in the prior art, infringement monitoring and forensics cannot be performed on resource data.
A first aspect of an embodiment of the present invention provides an infringement monitoring and forensics method, including:
acquiring data to be monitored and corresponding data types;
searching the resource data of the data type in the monitoring area, and calculating the similarity between the resource data and the data to be monitored;
screening infringement data with the similarity higher than a preset threshold value from the resource data, and carrying out curing treatment on the infringement data and infringement information and timestamps corresponding to the infringement data to obtain corresponding unique feature codes, wherein the infringement information comprises webpage addresses of the infringement data;
and storing the infringement data and the infringement information, and sending the unique feature code of the infringement data to a preset data interface, wherein the preset data interface is a data transmission interface for infringement authentication and record provided by a judicial institution.
A second aspect of an embodiment of the present invention provides an infringement monitoring and forensics apparatus, including:
the data acquisition module is used for acquiring data to be monitored and corresponding data types;
the data searching module is used for searching the resource data of the data type in the monitoring area and calculating the similarity between the resource data and the data to be monitored;
the evidence curing module is used for screening the infringement data with the similarity higher than a preset threshold value from the resource data, and curing the infringement data, infringement information corresponding to the infringement data and a timestamp to obtain a corresponding unique feature code, wherein the infringement information comprises a webpage address of the infringement data;
and the evidence obtaining module is used for storing the infringement data and the infringement information and sending the unique feature code of the infringement data to a preset data interface, and the preset data interface is a data transmission interface which is provided by a judicial institution and used for infringement authentication and record.
A third aspect of the embodiments of the present invention provides a terminal device, where the terminal device includes a memory and a processor, where the memory stores a computer program that is executable on the processor, and the processor implements the steps of the method for forensics for infringement monitoring when executing the computer program.
A fourth aspect of an embodiment of the present invention provides a computer-readable storage medium, including: there is stored a computer program, characterized in that it implements the steps of the infringement monitoring forensic method as described above when executed by a processor.
Compared with the prior art, the embodiment of the invention has the following beneficial effects: the method comprises the steps of monitoring resource data of a website in a monitoring area, matching similarity of the resource data with the same type of data to be monitored, determining infringement data with high similarity and possibly infringement behavior, solidifying the infringement data, infringement information of the infringement data and a timestamp generated in real time to generate a unique feature code, storing the infringement data and the infringement information, and sending the unique feature code to a judicial institution with judicial effectiveness for evidence retention, so that the modification of the evidence of the infringement data and the like is prevented, the evidence of the law persistence is realized, and a resource holder can perform effective right maintenance subsequently, therefore, the method and the system realize the infringement monitoring and the effective evidence obtaining of the resource data.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart illustrating an implementation of an infringement monitoring and forensics method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart illustrating an implementation of an infringement monitoring and forensics method according to a second embodiment of the present invention;
fig. 3 is a schematic flow chart illustrating an implementation of an infringement monitoring and forensics method according to a third embodiment of the present invention;
fig. 4 is a schematic flow chart illustrating an implementation of an infringement monitoring and forensics method according to a fourth embodiment of the present invention;
fig. 5 is a schematic flow chart illustrating an implementation of an infringement monitoring and forensics method according to a fifth embodiment of the present invention;
fig. 6 is a schematic structural diagram of an infringement monitoring and forensics apparatus according to a sixth embodiment of the present invention;
fig. 7 is a schematic diagram of a terminal device according to a seventh embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
In order to facilitate understanding of the present invention, an embodiment of the present invention is briefly described, and in order to implement monitoring and evidence obtaining of infringement of resource data, in the embodiment of the present invention, data to be monitored (i.e., resource data required by a user to perform infringement monitoring, in which the user is a resource holder), user information, and a timestamp are solidified and left to provide evidence for subsequent authorization, all resource data in a monitored area are searched based on the data to be monitored, at the same time, similarity detection is performed on resource data of the same kind, whether infringement is possible is determined, when the similarity is too high and the infringement data is highly likely to belong to the infringement data, the infringement data and the infringement information are solidified, and an unique feature code is sent to a data interface of an authority to perform infringement authentication and record, so that subsequently when a jurisdictional is required, evidence of infringement with judicial effectiveness can be obtained, as detailed below:
fig. 1 shows a flowchart of an implementation of an infringement monitoring and forensics method according to an embodiment of the present invention, which is detailed as follows:
s101, acquiring data to be monitored and corresponding data types.
The data to be monitored can be uploaded by the user on line or can be stored in advance. Data categories include, but are not limited to, such as pictures, text, video, and audio.
S102, searching the resource data of the data types in the monitoring area, and calculating the similarity between the resource data and the data to be monitored.
The monitoring area refers to a monitoring website set by a technician, and may include only one designated website or a plurality of designated websites, for example, the entire network may be monitored, and the monitoring area is the entire network website.
In order to monitor data to be monitored, the embodiment of the present invention performs detection and type identification on resource data included in a web page of each website in a monitoring area, and finds out resource data of the same type as the data to be monitored, for example, when the data to be monitored is a picture, the picture included in the web page in the monitoring area is screened out. In the embodiment of the present invention, after the resource data of the same kind as the data to be monitored is searched, similarity matching and other operations are performed on the searched resource data, so that the data size of the resource data searched each time will cause great difference in actual data processing workload, and in order to adapt to different actual requirements, the resource data size of the resource data searched each time and subjected to subsequent similarity matching and other operations in the embodiment of the present invention can be set by a technician according to the actual requirements, including but not limited to: 1. and searching all resource data of the same kind, and then performing similarity matching and other operations. 2. Each time a resource data of the same kind is found, similarity matching and other operations are performed. 3. After all the resource data of the same type contained in one webpage are searched each time, similarity matching operation is performed again.
After the resource data of the same kind are found, the embodiment of the present invention performs data matching on each resource data with the data to be monitored, and calculates the one-to-one correspondence similarity between each resource data, wherein for each resource data, different data matching methods can be set by technicians in a targeted manner, so that a specific matching algorithm is not limited here, including but not limited to: for the pictures, the feature points in the pictures can be extracted, the feature points of the two pictures are matched to determine the similarity of the feature points and the two pictures, for the videos, the key frame extraction can be performed, and then the similarity of the key frame pictures of the two videos is compared to obtain the video similarity.
S103, infringement data with the similarity higher than a preset threshold value is screened out from the resource data, and the infringement data, infringement information corresponding to the infringement data and a timestamp are solidified to obtain a corresponding unique feature code, wherein the infringement information comprises a webpage address of the infringement data.
When the similarity between one resource data and the data to be monitored is larger than a preset threshold value, namely the similarity is too high, the resource data is proved to be illegal infringement data, therefore, after the similarity between the resource data and the data to be monitored is calculated, the embodiment of the invention can judge whether the similarity is too high and screen out the infringement data with the too high similarity, and therefore, the automatic identification of the infringement behavior and the infringement data is realized. The specific size of the threshold value can be set by a technician.
After determining the infringement data, the embodiment of the invention starts to verify the infringement data, and as the infringement data is only reserved, whether the infringement data is possibly modified and has no public trust cannot be proved, in order to ensure the validity of the infringement data, the embodiment of the invention can cure the infringement data, the infringement information of the infringement data and the real-time timestamp together to obtain the corresponding unique feature code, only the infringement data, the infringement information and the timestamp need to be cured again to obtain the corresponding unique feature code in the subsequent infringement authentication, and then the two feature codes are compared to determine whether the infringement data is modified. The infringement information refers to relevant information of infringement data, and on the basis of a website containing the infringement information, other information can be included at the same time, such as: the method comprises the following steps of capturing an infringement page, recording a video of the infringement page, recording a domain name of an infringement website, an IP address of a server, routing information, a website use development language, website use frame information, website page source code information and website public information, wherein the infringement page is a video obtained by recording a screen of the infringement page. Through recording the infringement information, relevant evidence can be provided for subsequent right maintenance, and an actual infringement subject can be located, such as specific website where infringement behavior occurs.
And S104, storing the infringement data and the infringement information, and sending the unique feature code of the infringement data to a preset data interface, wherein the preset data interface is a data transmission interface for infringement authentication and record keeping provided by a judicial institution.
After obtaining the unique feature code, the embodiment of the present invention sends the unique feature code of the infringement data to a data interface provided by a judicial organization with public trust, such as an arbitration committee, a notarization department, a judicial certification center, and the like, and records the infringement data by the judicial organizations, so that the judicial organizations can confirm the infringement behavior in the form of comparing the data with the unique feature code and issue a certification with the judicial effectiveness in subsequent right maintenance.
As an embodiment of the present invention, in practical applications, when crawling resource data, a workload of crawling is very large, and probabilities of different websites infringing a user in practical situations are very different, for example, when data to be monitored of a user is a picture, probability of infringing a user by some picture material providing websites is significantly higher than that of some novel reading websites, and when parsing and crawling websites with low infringing probability, a lot of time is consumed, so that efficiency of crawling becomes lower, in order to improve the problem, in an embodiment of the present invention, a distributed crawler algorithm is used to perform analysis and crawling of resource data on websites in a monitoring area, and corresponding priorities are set for different types of websites according to practical situations of data to be monitored, and when analyzing and crawling, websites with higher priorities are crawled preferentially, to improve the efficiency of the analytical crawling.
As the second embodiment of the present invention, considering that only the relevant data and the unique feature code of the infringement data exist, it can only be stated that the resource data of the user whose data to be monitored is extremely similar exists at the time corresponding to the unique feature code of the uploading judicial structure, but the infringement must satisfy another condition: the time that the user holds the data to be monitored must be earlier than the time that the infringement data appears, for example, assuming that the time stamp recording time corresponding to the unique feature code is 12/3/12: 00 in 2018, it indicates that resource data with extremely high similarity to the data to be monitored is found at this time, but at this time, we still need to prove that the time that the user holds the data to be monitored is earlier than this time, therefore, in the embodiment of the present invention, the data to be monitored uploaded by the user is stored in a solidified manner, and the unique feature code is uploaded to a judicial institution for electronic evidence storage at the same time, so that the holding time of the data to be monitored with judicial effectiveness can be obtained subsequently, as shown in fig. 2, the method includes:
s201, receiving data to be monitored and user information uploaded by a user side, and performing information verification on the user information.
In the embodiment of the invention, in order to ensure the validity of the user identity, when the user uploads the data to be monitored through the user terminal, the user is also required to upload personal information of the user and the identity of the user is verified. The information content specifically contained in the user information can be set by technical personnel according to actual requirements, for example, when identity authentication needs to be performed by using a face recognition technology, the user information can be set as a user face image, the user face image can be acquired by a camera device at a user end, and when identity authentication needs to be performed by CA authentication, the user information can be set as a CA certificate of the user.
S202, if the information is verified, acquiring a timestamp corresponding to the data to be monitored, and performing curing processing on the data to be monitored, the timestamp corresponding to the data to be monitored and the user information to obtain a corresponding unique feature code.
When the user information passes the verification, namely the user identity is confirmed to be correct, the embodiment of the invention can acquire the real-time timestamp, and carry out curing treatment on the information to be monitored, the timestamp and the user information to obtain a corresponding unique feature code, thereby ensuring that the three parameters cannot be tampered after being subjected to curing and storing.
And S203, storing the data to be monitored and the user information, and sending the unique feature code of the data to be monitored to a preset data interface.
After the unique feature code corresponding to the data to be monitored is obtained, the data to be monitored and the user information are stored, and the unique feature code is uploaded to a judicial institution for evidence storage.
As an embodiment of the present invention, when the first and second embodiments of the present invention perform real-time timestamp acquisition, timestamp data acquisition and generation may be performed by passing through a standard time of time service of a Beidou satellite.
As a specific implementation manner of the solidification processing in the first embodiment of the present invention, in consideration of some existing solidification encryption algorithms, such as a common hash algorithm, etc., although the solidification encryption of data can be implemented, there are many targeted cracking algorithms, and data forgery can be performed under the condition that an lawless person takes original data, so that the security and reliability of the unique feature code generated in the first embodiment of the present invention are difficult to be ensured, and in order to ensure the safety and reliability of solidification, as shown in fig. 3, the third embodiment of the present invention includes:
s301, the infringement data and infringement information and time stamps corresponding to the infringement data are converted into binary data and data are merged.
S302, a plurality of preset binary character strings are respectively added to a plurality of positions in the binary data obtained by combination so as to update the binary data.
In order to prevent a lawbreaker from forging infringement data under the condition of taking the infringement data, so that the lawbreaker cannot influence the corresponding unique feature code content even if modifying the infringement data, in the embodiment of the invention, a technician presets several binary character strings, such as 10000000100000001, and adds the binary character strings at several fixed positions in the merged binary data, for example, a preset binary character string can be set to be respectively added at the head and tail of the binary data, so that the data subjected to solidified encryption is not direct original infringement data, and the lawbreaker cannot forge the data through the original data. The specific addition position and number of the binary string and the content of the preset binary string may be set by a technician, which is not limited herein.
By way of example, assume that infringement data is a, infringement information is b, and a timestamp c, binary character strings are respectively added at the beginning and the end of the data, and the added preset binary character strings are 10000000100000001 and 11100000100000001, at this time, the ASCII codes of query a, b, and c are 97, 98, and 99, binary data obtained by binary conversion and merging is "011000010110001001100011", at this time, corresponding preset binary character strings are respectively added at the beginning and the end of the data, and the obtained binary character string is "1000000010000000101100001011000100110001111100000100000001", so as to obtain updated binary data.
And S303, performing feature code calculation on the updated binary data to obtain a corresponding unique feature code.
After obtaining the updated binary data that is clearly different from the original binary data, the embodiment of the present invention performs a fixed encryption calculation on the updated binary data to obtain the unique feature code, where a specific fixed encryption algorithm is not limited herein, and includes, but is not limited to, using the SHA-2 algorithm or other algorithms by a technician.
As another embodiment of the present invention, when the data to be monitored, the user information, and the timestamp of the user are solidified and encrypted in the embodiment of the present invention, reference may also be made to the method in the third embodiment of the present invention, that is, the data binary system is performed on the data to be monitored, the user information, and the timestamp, and the data binary system is merged, and then corresponding preset binary character strings are added to a plurality of positions of the merged binary data, and then the solidified and encrypted data is solidified and encrypted, so as to ensure the safety and reliability of the solidified and encrypted data.
As a fourth embodiment of the present invention, after finding that infringement data exists, the embodiment of the present invention actively prompts a user that the data to be monitored of the user has infringement behavior, and sends the infringement data to the user for reference, and details are as follows:
s401, the infringement data is sent to a user side uploading data to be monitored so as to prompt the user that the data to be monitored has infringement behavior.
When it is monitored that the infringement behavior exists, the embodiment of the invention actively sends the infringement data to the user, and the user confirms whether the infringement behavior exists again for the infringement data.
As another embodiment of the present invention, the infringement data may also be sent to the user through some contact means reserved by the user, for example, through a mobile phone number, an email box, or a social account reserved by the user.
As an embodiment of the present invention, after the infringement data is sent to the user and the user confirms that there is an infringement behavior, the user may choose to send an infringement notice letter like an infringer, specifically as follows:
and if an infringement confirmation instruction input by the user is received, generating infringement notification information, and judging whether the infringement confirmation instruction contains an infringement party contact way.
If the infringement confirmation instruction contains the infringement party contact way, the infringement notification information is sent to the infringement party according to the infringement party contact way, if the infringement party contact way is not contained, the infringement information is analyzed, and the infringement notification information is sent to the infringement party based on the found infringement party contact way contained in the infringement party contact way.
As a fifth embodiment of the present invention, when determining that the monitored data has an infringement behavior, the fifth embodiment of the present invention may generate relevant data to a judicial authority, and the judicial authority generates an infringement authentication certificate with credibility and judicial effectiveness, so that the user performs subsequent right maintenance, as shown in fig. 5, where the method includes:
s501, sending the data to be monitored, the unique feature code of the data to be monitored, the infringement data and the unique feature code of the infringement data to a preset data interface, so that a judicial organization conducts infringement verification on the infringement data, and produces a corresponding infringement authentication certificate after the infringement verification is passed.
In the embodiment of the invention, in order to provide effective guarantee with judicial effectiveness for subsequent rights maintenance of a user, data such as data to be monitored, a unique feature code of the data to be monitored, infringement data, a unique feature code of the infringement data and the like are actively generated to a judicial organization when the user needs the data, the data and the reserved unique feature code are compared by the judicial organization, and an infringement authentication certificate with public trust and judicial effectiveness is provided.
S502, receiving the infringement authentication certificate sent by the preset data interface, and sending the infringement authentication certificate to the user side.
After receiving the infringement authentication certificate generated by the judicial institution, the embodiment of the invention forwards the infringement authentication certificate to the user side for the user to use.
In the embodiment of the invention, the user is subjected to identity verification, the data to be monitored, the user information and the real-time timestamp uploaded by the user are subjected to solidified encryption, and the obtained unique feature code is uploaded to a judicial organization for filing, so that the holding time of the data to be monitored by the user is definite, the reliability of the data to be monitored is ensured, the data to be monitored is subjected to infringement monitoring and evidence obtaining in a monitoring area, the unique feature code is filed in the judicial organization, infringement authentication and authentication can be relied on, infringement data is actively pushed to the user to prompt infringement behavior, and finally, when the user needs the infringement, the infringement notice is sent to the infringement party, and an infringement authentication certificate is actively requested to the judicial organization, thereby the notice before the user carries out the authentication and the guarantee of the judicial effect when the user carries out the authentication to the maximum extent, the actual benefit of the user is guaranteed.
Fig. 6 shows a block diagram of an infringement monitoring and forensics apparatus provided by the embodiment of the present invention, which only shows the relevant parts of the embodiment of the present invention for convenience of explanation. The infringement monitoring and forensics device illustrated in fig. 6 may be an execution subject of the infringement monitoring and forensics method provided in the first embodiment.
Referring to fig. 6, the infringement monitoring and forensics apparatus includes:
and the data acquisition module 61 is used for acquiring the data to be monitored and the corresponding data types.
And a data searching module 62, configured to search the resource data of the data type in the monitoring area, and calculate a similarity between the resource data and the data to be monitored.
And the evidence curing module 63 is configured to screen infringement data with the similarity higher than a preset threshold from the resource data, and perform curing processing on the infringement data and infringement information and a timestamp corresponding to the infringement data to obtain a corresponding unique feature code, where the infringement information includes a web address of the infringement data.
And the evidence obtaining module 64 is configured to store the infringement data and the infringement information, and send the unique feature code of the infringement data to a preset data interface, where the preset data interface is a data transmission interface provided by a judicial institution and used for infringement authentication and record keeping.
Further, this infringement monitoring forensics device still includes:
and the data receiving module is used for receiving the data to be monitored and the user information uploaded by the user side and carrying out information verification on the user information.
And the data curing module is used for acquiring the timestamp corresponding to the data to be monitored if the information passes the verification, and curing the data to be monitored, the timestamp corresponding to the data to be monitored and the user information to obtain the corresponding unique feature code.
And the data storage module is used for storing the data to be monitored and the user information and sending the unique feature code of the data to be monitored to the preset data interface.
Further, the evidence curing module 63 includes:
and converting the infringement data and infringement information and a timestamp corresponding to the infringement data into binary data and merging the data.
And respectively adding a plurality of preset binary character strings at a plurality of positions in the binary data obtained by combination so as to update the binary data.
And performing feature code calculation on the updated binary data to obtain a corresponding unique feature code.
Further, this infringement monitoring forensics device still includes:
and sending the data to be monitored, the unique feature code of the data to be monitored, the infringement data and the unique feature code of the infringement data to the preset data interface, so that a judicial organization carries out infringement verification on the infringement data, and generates a corresponding infringement authentication certificate after the infringement verification is passed.
And receiving the infringement authentication certificate sent by the preset data interface, and sending the infringement authentication certificate to the user side.
Further, this infringement monitoring forensics device still includes:
and sending the infringement data to a user side uploading the data to be monitored so as to prompt a user that the data to be monitored has infringement behavior.
The process of implementing each function by each module in the infringement monitoring and forensics device provided by the embodiment of the present invention may specifically refer to the description of the first embodiment shown in fig. 1, and is not described herein again.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements in some embodiments of the invention, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first table may be named a second table, and similarly, a second table may be named a first table, without departing from the scope of various described embodiments. The first table and the second table are both tables, but they are not the same table.
Fig. 7 is a schematic diagram of a terminal device according to an embodiment of the present invention. As shown in fig. 7, the terminal device 7 of this embodiment includes: a processor 70, a memory 71, said memory 71 having stored therein a computer program 72 operable on said processor 70. The processor 70, when executing the computer program 72, implements the steps in the various embodiments of the piracy monitoring and forensics method described above, such as steps 101-106 shown in fig. 1. Alternatively, the processor 70, when executing the computer program 72, implements the functions of the modules/units in the above-described device embodiments, such as the functions of the modules 61 to 66 shown in fig. 6.
The terminal device 7 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 70, a memory 71. It will be appreciated by those skilled in the art that fig. 7 is merely an example of a terminal device 7 and does not constitute a limitation of the terminal device 7 and may comprise more or less components than shown, or some components may be combined, or different components, e.g. the terminal device may further comprise an input transmitting device, a network access device, a bus, etc.
The Processor 70 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 71 may be an internal storage unit of the terminal device 7, such as a hard disk or a memory of the terminal device 7. The memory 71 may also be an external storage device of the terminal device 7, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 7. Further, the memory 71 may also include both an internal storage unit and an external storage device of the terminal device 7. The memory 71 is used for storing the computer program and other programs and data required by the terminal device. The memory 71 may also be used to temporarily store data that has been transmitted or is to be transmitted.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. An infringement monitoring and forensics method, comprising:
acquiring data to be monitored and corresponding data types;
searching the resource data of the data type in the monitoring area, and calculating the similarity between the resource data and the data to be monitored; when the websites in the monitoring area are analyzed and crawled for resource data, corresponding priorities are set for the websites of different types, and when the websites are analyzed and crawled, the websites with higher priorities are preferentially crawled;
screening infringement data with the similarity higher than a preset threshold value from the resource data, and carrying out curing treatment on the infringement data and infringement information and timestamps corresponding to the infringement data to obtain corresponding unique feature codes, wherein the infringement information comprises webpage addresses of the infringement data;
storing the infringement data and the infringement information, and sending the unique feature code of the infringement data to a preset data interface, wherein the preset data interface is a data transmission interface for infringement authentication and record keeping provided by a judicial institution; and during subsequent infringement authentication, curing the infringement data, the infringement information and the timestamp again to obtain corresponding unique feature codes, and comparing the two unique feature codes to determine whether the infringement data is changed.
2. The method of claim 1, wherein prior to the obtaining the data to be monitored and the corresponding data type, further comprising:
receiving the data to be monitored and the user information uploaded by a user side, and carrying out information verification on the user information;
if the information is verified, acquiring a timestamp corresponding to the data to be monitored, and carrying out curing treatment on the data to be monitored, the timestamp corresponding to the data to be monitored and the user information to obtain a corresponding unique feature code;
and storing the data to be monitored and the user information, and sending the unique feature code of the data to be monitored to the preset data interface.
3. The method for monitoring and forensics according to claim 1, wherein the solidifying the infringement data and the infringement information and the timestamp corresponding to the infringement data to obtain the corresponding unique feature code includes:
converting the infringement data and infringement information and a timestamp corresponding to the infringement data into binary data and merging the data;
adding a plurality of preset binary character strings at a plurality of positions in the binary data obtained by combination respectively to update the binary data;
and performing feature code calculation on the updated binary data to obtain a corresponding unique feature code.
4. The method of claim 2, wherein after sending the unique signature of the infringement data to a predetermined data interface, the method further comprises:
sending the data to be monitored, the unique feature code of the data to be monitored, the infringement data and the unique feature code of the infringement data to the preset data interface, so that a judicial organization conducts infringement verification on the infringement data and produces a corresponding infringement authentication certificate after the infringement verification is passed;
and receiving the infringement authentication certificate sent by the preset data interface, and sending the infringement authentication certificate to the user side.
5. The method for infringement monitoring and forensics according to claim 1, wherein after the step of sending the unique feature code of the infringement data to a preset data interface, the method further comprises the steps of:
and sending the infringement data to a user side uploading the data to be monitored so as to prompt a user that the data to be monitored has infringement behavior.
6. An infringement monitoring and forensics device, comprising:
the data acquisition module is used for acquiring data to be monitored and corresponding data types;
the data searching module is used for searching the resource data of the data type in the monitoring area and calculating the similarity between the resource data and the data to be monitored; when the websites in the monitoring area are analyzed and crawled for resource data, corresponding priorities are set for the websites of different types, and when the websites are analyzed and crawled, the websites with higher priorities are preferentially crawled;
the evidence curing module is used for screening the infringement data with the similarity higher than a preset threshold value from the resource data, and curing the infringement data, infringement information corresponding to the infringement data and a timestamp to obtain a corresponding unique feature code, wherein the infringement information comprises a webpage address of the infringement data;
the evidence obtaining module is used for storing the infringement data and the infringement information and sending the unique feature code of the infringement data to a preset data interface, and the preset data interface is a data transmission interface which is provided by a judicial institution and used for infringement authentication and record keeping; and during subsequent infringement authentication, curing the infringement data, the infringement information and the timestamp again to obtain corresponding unique feature codes, and comparing the two unique feature codes to determine whether the infringement data is changed.
7. The infringement monitoring and forensics device of claim 6, further comprising:
the data receiving module is used for receiving the data to be monitored and the user information uploaded by the user side and carrying out information verification on the user information;
the data curing module is used for acquiring the timestamp corresponding to the data to be monitored if the information is verified to be passed, and curing the data to be monitored, the timestamp corresponding to the data to be monitored and the user information to obtain a corresponding unique feature code;
and the data storage module is used for storing the data to be monitored and the user information and sending the unique feature code of the data to be monitored to the preset data interface.
8. The infringement-monitoring-forensics device of claim 6, wherein the evidence-curing module comprises:
converting the infringement data and infringement information and a timestamp corresponding to the infringement data into binary data and merging the data;
adding a plurality of preset binary character strings at a plurality of positions in the binary data obtained by combination respectively to update the binary data;
and performing feature code calculation on the updated binary data to obtain a corresponding unique feature code.
9. A terminal device, characterized in that the terminal device comprises a memory, a processor, a computer program being stored on the memory and being executable on the processor, the processor implementing the steps of the method according to any of claims 1 to 5 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN201910073179.6A 2019-01-25 2019-01-25 Method and device for monitoring and obtaining evidence of infringement and terminal equipment Active CN110096639B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910073179.6A CN110096639B (en) 2019-01-25 2019-01-25 Method and device for monitoring and obtaining evidence of infringement and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910073179.6A CN110096639B (en) 2019-01-25 2019-01-25 Method and device for monitoring and obtaining evidence of infringement and terminal equipment

Publications (2)

Publication Number Publication Date
CN110096639A CN110096639A (en) 2019-08-06
CN110096639B true CN110096639B (en) 2021-04-06

Family

ID=67443762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910073179.6A Active CN110096639B (en) 2019-01-25 2019-01-25 Method and device for monitoring and obtaining evidence of infringement and terminal equipment

Country Status (1)

Country Link
CN (1) CN110096639B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866224A (en) * 2019-11-15 2020-03-06 支付宝(杭州)信息技术有限公司 Picture right determining method and system based on block chain
CN111815486A (en) * 2020-06-03 2020-10-23 兰州集智信息技术有限公司 Service platform and method for searching clues of infringing products
CN112149063B (en) * 2020-09-14 2022-06-24 浙江数秦科技有限公司 Online monitoring method for network picture infringement
CN111814141B (en) * 2020-09-15 2020-12-18 浙江数秦科技有限公司 Off-line process evidence obtaining and storing method based on block chain
CN112711741A (en) * 2021-01-05 2021-04-27 天津证好在数据科技有限公司 Method for solidifying infringement evidence of live broadcasting
CN114359590A (en) * 2021-12-06 2022-04-15 支付宝(杭州)信息技术有限公司 NFT image work infringement detection method and device and computer storage medium
CN114428798A (en) * 2021-12-27 2022-05-03 广州盖盟达工业品有限公司 Shopping data pushing method and device
CN115358895B (en) * 2022-10-20 2023-02-03 点击律(上海)网络科技有限公司 Evidence obtaining management system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104112093A (en) * 2014-06-25 2014-10-22 北京天威诚信电子商务服务有限公司 Evidence obtaining method and system based on electronic signature data
CN105930495A (en) * 2016-05-06 2016-09-07 长沙市麓智信息科技有限公司 Product tort monitoring system and monitoring method therefor
CN107707610A (en) * 2017-08-04 2018-02-16 真相网络科技(北京)有限公司 A kind of data Right protection method and system based on cloud platform
CN108959416A (en) * 2018-06-08 2018-12-07 浙江数秦科技有限公司 A kind of web data automatic evidence-collecting based on block chain and deposit card method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080098219A1 (en) * 2006-10-19 2008-04-24 Df Labs Method and apparatus for controlling digital evidence

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104112093A (en) * 2014-06-25 2014-10-22 北京天威诚信电子商务服务有限公司 Evidence obtaining method and system based on electronic signature data
CN105930495A (en) * 2016-05-06 2016-09-07 长沙市麓智信息科技有限公司 Product tort monitoring system and monitoring method therefor
CN107707610A (en) * 2017-08-04 2018-02-16 真相网络科技(北京)有限公司 A kind of data Right protection method and system based on cloud platform
CN108959416A (en) * 2018-06-08 2018-12-07 浙江数秦科技有限公司 A kind of web data automatic evidence-collecting based on block chain and deposit card method

Also Published As

Publication number Publication date
CN110096639A (en) 2019-08-06

Similar Documents

Publication Publication Date Title
CN110096639B (en) Method and device for monitoring and obtaining evidence of infringement and terminal equipment
CN110879903B (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification equipment and evidence verification medium
US9875374B2 (en) System and method for collecting, storing, and securing data
Gipp et al. Securing video integrity using decentralized trusted timestamping on the bitcoin blockchain
CN103391196A (en) Asset digital authentication method and device
CN112950415B (en) Judicial evidence fixing method, platform and system based on blockchain
US20230074748A1 (en) Digital forensic image verification system
CN110958319A (en) Method and device for managing infringement and evidence-based block chain
US20200278948A1 (en) Method, apparatus and system for managing electronic fingerprint of electronic file
CN112069465A (en) Manuscript intellectual property protection method and system based on block chain
CN110266653B (en) Authentication method, system and terminal equipment
CN108900472B (en) Information transmission method and device
CN112685795B (en) Digital certificate creation method, digital certificate verification method and digital certificate system
CN110381114B (en) Interface request parameter processing method and device, terminal equipment and medium
CN106713224B (en) Document authority control method
US9904661B2 (en) Real-time agreement analysis
CN112910883B (en) Data transmission method and device and electronic equipment
CN108965939B (en) Media data processing method, device and system and readable storage medium
CN114172689B (en) Information processing method and equipment
KR20200069034A (en) Method for preventing falsification data from being stored in network and system performing the method
CN114022116A (en) On-cloud inspection law enforcement evidence collection method and device based on browser
CN114240314A (en) Administrative law enforcement case management method and system based on-cloud inspection
CN107809424B (en) On-site certificate storing method and device and related certificate storing system
CN107707630B (en) Method and device for file transmission
US11244415B2 (en) Personal IP protection system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant