CN110334484A - A kind of copyright authentication method, apparatus, computer equipment and storage medium - Google Patents

A kind of copyright authentication method, apparatus, computer equipment and storage medium Download PDF

Info

Publication number
CN110334484A
CN110334484A CN201910570067.1A CN201910570067A CN110334484A CN 110334484 A CN110334484 A CN 110334484A CN 201910570067 A CN201910570067 A CN 201910570067A CN 110334484 A CN110334484 A CN 110334484A
Authority
CN
China
Prior art keywords
node
content
copyright authentication
submission
submission content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910570067.1A
Other languages
Chinese (zh)
Other versions
CN110334484B (en
Inventor
李东明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910570067.1A priority Critical patent/CN110334484B/en
Priority to CN201910866030.3A priority patent/CN110598373B/en
Publication of CN110334484A publication Critical patent/CN110334484A/en
Application granted granted Critical
Publication of CN110334484B publication Critical patent/CN110334484B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The embodiment of the invention discloses a kind of copyright authentication method, apparatus, computer equipment and storage mediums;The embodiment of the present invention can obtain submission content to be verified by first node in block chain;Feature extraction is carried out to submission content, obtains the target signature information of submission content;When characteristic information identical with target signature information is not present in the block data of first node, the copyright authentication request of the second node broadcast submission content into block chain, wherein second node is the node in block chain in addition to first node;Receive the copyright authentication result that second node is returned based on copyright authentication request;The copyright authentication returned based on second node is as a result, carry out copyright authentication to submission content.The program can promote the accuracy and confidence level of copyright authentication.

Description

A kind of copyright authentication method, apparatus, computer equipment and storage medium
Technical field
The present invention relates to field of computer technology, and in particular to a kind of copyright authentication method, apparatus, computer equipment and deposits Storage media.
Background technique
As Internet technology develops, UGC (User Generated Content, user-generated content) is more and more emerging It rises.More and more users to content industry platform contribute oneself create UGC, such as to video platform contribute oneself creation view Frequency etc..
Since submission content often refers to copyright problem, it is interior when user contributes UGC to content industry platform Holding manufacturer's platform needs the copyright to submission content to verify, to reduce dispute over copyright.Currently, the scheme of copyright authentication is main For independent construction scheme: content industry oneself independently builds copyright information database, and lane database stores the content of oneself, when When having the short-sighted frequency of new content such as UGC to contribute, the database of oneself is retrieved, if it is new content, then copyright inspection is by simultaneously It is added in database, if it is already present for example, refusal of then contributing.
Current independent construction scheme, copyright information and the not intercommunication of other content manufacturer, not can avoid multiple contribution and remove The content of other manufacturer's contents is transported come the phenomenon that submission, and manufacturer can also arbitrarily modify the database of oneself, therefore copyright The accuracy and Reliability ratio of verifying are lower.
Summary of the invention
The embodiment of the present invention provides a kind of copyright authentication method, apparatus, computer equipment and storage medium, can promote version Weigh the accuracy and confidence level of verifying.
The embodiment of the present invention provides a kind of copyright authentication method, is executed by the first node equipment in block chain, comprising:
Obtain submission content to be verified;
Feature extraction is carried out to the submission content, obtains the target signature information of the submission content;
When characteristic information identical with the target signature information is not present in the block data of the first node, to Second node in block chain broadcasts the copyright authentication request of the submission content, wherein the second node is in block chain Node in addition to first node, the block data include the characteristic information of existing copyright ownership content;
Receive the copyright authentication result that the second node is returned based on copyright authentication request;
The copyright authentication returned based on the second node is as a result, carry out copyright authentication to the submission content.
Correspondingly, the embodiment of the present invention also provides a kind of copyright authentication device, it is applied to first node, the first node For the arbitrary node in block chain, comprising:
Acquiring unit, for obtaining submission content to be verified;
Feature extraction unit, for carrying out feature extraction to the submission content, the target for obtaining the submission content is special Reference breath;
Radio unit, for when there is no characteristic informations identical with the target signature information in the block data When, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein the second node is block Node in chain in addition to first node, the block data include the characteristic information of existing copyright ownership content;
Receiving unit, the copyright authentication result returned for receiving the second node based on copyright authentication request;
Copyright authentication unit, copyright authentication for being returned based on the second node as a result, to the submission content into Row copyright authentication.
In one embodiment, the copyright authentication unit, comprising:
Subelement is counted, is the second node quantity being verified for counting the copyright authentication result returned;
Copyright authentication subelement, for carrying out copyright authentication to the submission content according to the second node quantity.
In one embodiment, the copyright authentication subelement, is used for: calculating second node quantity and accounts in the block chain the The quantitative proportion of two node total number amounts;When the quantitative proportion is greater than preset threshold, determine that the copyright of the submission content is tested Card passes through;When the quantitative proportion is not more than preset threshold, determine that the copyright authentication of the submission content does not pass through.
In one embodiment, the feature extraction unit obtains described for carrying out digest calculations to the submission content The cryptographic Hash for content of contributing;The target signature information of the submission content is constructed based on the cryptographic Hash.
In one embodiment, the copyright authentication unit, be also used to exist in the block data when the first node with When the identical characteristic information of the target signature information, determine that the copyright authentication of the submission content does not pass through.
In one embodiment, copyright authentication device can also include synchronization unit;The synchronization unit is used for: when the throwing When the copyright authentication of original text content passes through, by the characteristic information and copyright ownership information of the submission content, it is synchronized to the area In the block data of all nodes of block chain.
In one embodiment, copyright authentication device can also include modification authentication unit;The modification authentication unit is used In:
The copyright for receiving object content modifies request, and the copyright modification request carries the object content needs and is modified as Target copyright attaching information;
It is modified and is requested according to the copyright, the copyright modification that the second node into block chain broadcasts the object content is tested Card request;
It receives the copyright that the second node is returned based on copyright modification checking request and modifies verification result;According to institute Copyright modification verification result and the target copyright attaching information are stated, is modified to the copyright ownership information of object content.
In addition, the embodiment of the present invention also provides a kind of storage medium, it is stored thereon with computer program, wherein the meter It realizes when calculation machine program is executed by processor such as the step of any copyright authentication method provided in an embodiment of the present invention.
In addition, the embodiment of the present invention also provides a kind of computer equipment, including memory, processor and it is stored in memory Computer program that is upper and can running on a processor, wherein the processor is realized when executing described program as the present invention is real The step of any copyright authentication method of example offer is provided.
The embodiment of the invention provides by block chain first node execute copyright authentication method, specifically, obtain to The submission content of verifying;Feature extraction is carried out to the submission content, obtains the target signature information of the submission content;Work as institute When stating in the block data of first node there is no characteristic information identical with the target signature information, into block chain the Described in two node broadcasts contribute content copyright authentication request, wherein the second node be block chain in except first node with Outer node, the block data include the characteristic information of existing copyright ownership content;The second node is received based on described The copyright authentication result that copyright authentication request returns;Copyright authentication based on second node return is as a result, to the submission Content carries out copyright authentication.The program can realize the copyright authentication of decentralization based on block chain, can be effectively avoided one The problems such as original text is thrown more and carries submission, and the problem of copyright data is distorted can also be evaded, therefore, copyright authentication can be promoted Accuracy and confidence level.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 a is the schematic diagram of a scenario of copyright authentication method provided in an embodiment of the present invention;
Fig. 1 b is the flow chart of copyright authentication method provided in an embodiment of the present invention;
Fig. 1 c is the overall flow schematic diagram of copyright authentication provided in an embodiment of the present invention;
Fig. 2 a is the configuration diagram of copyright authentication provided in an embodiment of the present invention;
Fig. 2 b is another flow diagram of copyright authentication method provided in an embodiment of the present invention;
Fig. 2 c is another schematic diagram of a scenario of copyright authentication provided in an embodiment of the present invention;
Fig. 3 a is the structural schematic diagram of copyright authentication device provided in an embodiment of the present invention;
Fig. 3 b is another structural schematic diagram of copyright authentication device provided in an embodiment of the present invention;
Fig. 3 c is another structural schematic diagram of copyright authentication device provided in an embodiment of the present invention;
Fig. 3 d is another structural schematic diagram of copyright authentication device provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Before to the embodiment of the present invention carrying out that explanation is explained in detail, first to the present embodiments relate to some names arrived Word is explained.
Copyright authentication refers to: to the verification operation of the copyright of some contents in block catenary system, such as the version of original text content Power verifying, modification verifying of content copyright etc..
Block chain: block chain technology is derived from bit coin technology, is the Floor layer Technology of bit coin, is point of decentralization Cloth account book database.Block chain itself is a string using the associated data block (i.e. block) generated of cryptographic algorithm, each The information that multiple block chain network transaction effectively confirms is contained in a data block.It is based on this, so can not be by distorting Data on block are practised fraud, it can be ensured that the data on any block are open and clear, it is ensured that the peace of data Quan Xing.
Block chain can be divided into publicly-owned chain, privately owned chain, alliance's chain.Wherein, alliance's chain then between publicly-owned chain and privately owned chain it Between, cooperated to safeguard a block chain together by several tissues, the use of the block chain must be the management having permission, relevant information It can be protected, it is typical such as financial institution.In summary, block chain is the distributed data base system participated in by node, alternatively, The also referred to as one public account book of distribution based on P2P (point-to-point) network, its main feature is that can not change, can not forge, It can also be understood as account book system.
The node of block chain: the equipment for participating in building block chain, for example, participating in the meter of each content industry of building block chain Machine equipment is calculated, which can be single computer unit such as the single server of some content industry, or The computer equipment cluster such as server cluster of some content industry.The node of block chain can be the execution master of copyright authentication Business such as transaction etc. may be implemented in interaction between body, node.The node is stored with Correlation block data, for example, the block data It may include data such as transaction record etc..
A kind of copyright authentication method, apparatus, computer equipment and storage provided in an embodiment of the present invention will be introduced under connecing to be situated between Matter.Wherein, which can integrate in the node of block chain, which can be with individual server, or Server cluster.
With reference to Fig. 1 a, the embodiment of the invention provides the contribution system based on block chain, which may be implemented content throwing The business such as original text business, the copyright authentication business for content of contributing.The system may include multiple nodes 10, wherein multiple nodes it Between pass through network connection.
Each node device 10 can be used for contributing content copyright authentication, reward provide etc., can be used as block chain Accounting nodes, for the Transaction Information during store transaction, and timing is updated, so that other nodes in implementation environment Transaction Information can be shared, so that each node can provide compliance check for Transaction Information, improves Transaction Information Safety, e.g., when copyright authentication is completed, which can be according to node identification (such as network of each node Address) Transaction Information is shared into the block data of each node.
In content submission scene, the submission content that the available terminal of node such as mobile phone 11 or computer 12 are sent is right The submission content carries out feature extraction, obtains the target signature information of the submission content;According to the target signature information Characteristic query is carried out to the block data of this node 10 (i.e. first node), the block data includes existing copyright ownership content Characteristic information;When not inquiring in the block data in the presence of characteristic information identical with the target signature information, to The copyright authentication request of other nodes 10 (i.e. second node) broadcast submission content in block chain in addition to the node 10; Receive the copyright authentication result that other nodes 10 are returned based on the checking request;The copyright returned based on other described nodes 10 Verification result carries out copyright authentication to the submission content.
In addition, this node 10 is rewarded to terminal granting, when the version of submission content when the copyright authentication for content of contributing passes through When power verifying does not pass through, the refusal submission content of this node 10.
It is described in detail separately below.It should be noted that the following description sequence is not as excellent to embodiment The restriction of choosing sequence.
The embodiment of the present invention will be described from the angle of copyright authentication device, which can integrate in area In the arbitrary node of block chain, which can be individual server or server cluster.
Wherein, block chain can be alliance's chain (i.e. alliance's block chain), for example, can be to be closed together by several content industries Make the alliance's chain chain safeguarded, alliance's chain is by the equipment of multiple content industries by agreement building.Wherein, the node in alliance's chain can Think the single device or device clusters of content industry.The copyright authentication device of the embodiment of the present invention can integrate in alliance Arbitrary node in chain.In one embodiment, alliance's chain can also be by content monitoring part or third party's independence notary organization group At.
A kind of copyright authentication method provided in an embodiment of the present invention, this method can be by first in block chain such as alliance's chain The processor of node executes, which can be arbitrary node in block chain;As shown in Figure 1 b, the copyright authentication method Detailed process can be such that
101, submission content to be verified is obtained.
Wherein, the content that submission content can contribute for user to content industry, content service platform, the content can be User creates the content generated, i.e. UGC.
Wherein, the content type for content of contributing can there are many, for example, image, video (such as short-sighted frequency), article class Type.
For example, the available submission video to be verified of block chain interior joint.
Wherein, submission content can be sent by user terminal or other nodes, for example, terminal can in submission scene To send submission content to the node of block chain, which is submission content to be verified, at this point it is possible to obtain terminal The submission content to be verified sent.
102, feature extraction is carried out to submission content, obtains the target signature information of submission content.
Wherein, target signature information is the characteristic information of submission content, for uniquely characterizing content of contributing.
Wherein, the feature extraction mode for content of contributing can there are many, for example, can using deep learning network to submission Content carries out feature extraction;Specifically, feature can be carried out to submission content using convolutional layer in deep learning network model to mention It takes, obtains convolution characteristic information, which is target signature information.
For another example, digest calculations can be carried out to submission content using Message Digest 5, to obtain submission content Characteristic information.
Specifically, step " carrying out feature extraction to submission content, obtain the target signature information of submission content ", can wrap It includes:
Digest calculations are carried out to submission content, the cryptographic Hash of submission content are obtained, such as the cryptographic Hash of regular length;
The target signature information of submission content is constructed based on cryptographic Hash.
For example, in one embodiment, it can be by cryptographic Hash directly as the target signature information of submission content, for example, will It contributes characteristic information of the regular length cryptographic Hash as the short-sighted frequency of contributing of short-sighted frequency.
Wherein, Message Digest 5 can select according to actual needs, for example, can for SHA-512, MD5, SHA-1, The digest algorithms such as SHA-256.
For example, digest calculations can be carried out to submission content using SHA-512, obtains the HASH that length is 512 and (breathe out It is uncommon) value, using 512 HASH (Hash) value as the characteristic information of submission content.
103, when characteristic information identical with target signature information is not present in the block data of first node, to block In chain second node broadcast submission content copyright authentication request, wherein second node be block chain in except first node with Outer node, block data include the characteristic information of existing copyright ownership content.
Wherein, the block data in block chain such as alliance's chain can be the metadata in block chain such as alliance's chain, have recorded The characteristic information of existing copyright ownership content and the copyright ownership information of existing copyright ownership content;For example, block data can To include characteristic information and the copyright ownership information of short-sighted frequency etc. of short-sighted frequency.
For example, in one embodiment, block data may include a plurality of transaction record, every transaction record may include two A field (field length can be set according to actual needs, such as 512 fields), is characteristic information field one by one, deposits Substantial characteristic information (cryptographic Hash that such as length is 512) is stored up, for characterizing for example short-sighted frequency of only one content;Another It is copyright ownership information field, for characterizing the copyright ownership of for example short-sighted frequency of the content.Each transaction record all indicates one For example short-sighted frequency copyright information of content.
Wherein, having copyright ownership content is to have possessed the content of copyright ownership, can be the UGC of other users submission The content etc. of content, content industry oneself creation.Wherein, copyright ownership information may include user belonging to content copyright, The information such as manufacturer.
In one embodiment, it can be determined by way of inquiry in block data with the presence or absence of identical characteristic information; For example, characteristic query can be carried out to the block data of first node according to target signature information, when not inquiring first node Block data in exist characteristic information identical with target signature information when, determine and be not present in the block data of first node Characteristic information identical with target signature information.Conversely, determining there is feature identical with target signature information when inquiring Information.
For example, characteristic query can be carried out, in block data so as to interrogation zone using target signature information as query object Block number whether there is characteristic information identical with target signature information in, to realize the copyright inspection of submission content.
Wherein, copyright authentication request can initiate the transaction request of transaction broadcast for block chain interior joint, and copyright authentication is asked Ask the characteristic information (such as the cryptographic Hash for content of contributing) that can carry submission content and the copyright ownership information (identity of such as contributor Information, identity information of content industry etc.).
Copyright authentication request can serve to indicate that second node carries out copyright authentication to submission content, for example, instruction the With the presence or absence of characteristic information identical with the submission characteristic information of content in two querying node block datas, and if it exists, then return The unacceptable copyright authentication of copyright authentication is as a result, if it does not exist, then return to the copyright authentication result that copyright authentication passes through.
In one embodiment, the second node for participating in verifying copyright authentication can be selected from block chain according to actual needs It selects, can be the preparatory node in the common recognition mechanism of participation copyright authentication.
It,, can be in block data after the characteristic information for obtaining submission content in the embodiment of the present invention with reference to Fig. 1 c Inquiry whether there is same characteristic features information, realize the copyright inspection to submission content, when not inquiring same characteristic features information, tentatively Illustrate that submission content can also not have copyright ownership, it may be possible to which original content needs further to carry out copyright and deposits card operation.
Wherein, copyright deposits card operation i.e. are as follows: the copyright authentication request of the second node broadcast submission content into block chain, The copyright authentication returned based on second node is as a result, carry out copyright authentication to submission content;When copyright authentication passes through, i.e., copyright is deposited It demonstrate,proves successfully, otherwise copyright deposits card failure.
104, the copyright authentication result that second node is returned based on copyright authentication request is received.
Wherein, the copyright authentication result that second node returns includes that copyright authentication passes through or copyright authentication does not pass through.
Wherein, the second node in block chain can parse publishing right and test after the copyright authentication request for receiving broadcast Then the target signature information of submission content in card request is inquired in block data with the presence or absence of the feature with submission content The identical characteristic information of information, and if it exists, then return to the unacceptable copyright authentication of copyright authentication as a result, if it does not exist, then returning The copyright authentication result that copyright authentication passes through.
105, the copyright authentication based on second node return is as a result, carry out copyright authentication to submission content.
Wherein, based on copyright authentication result to there are many verification modes of submission content, for example, in one embodiment, when All copyright authentication results returned are to determine that the copyright authentication of submission content passes through when being verified, otherwise do not pass through.
For example, in one embodiment, in order to promote the success rate of copyright authentication, the copyright authentication knot of return can also be counted Fruit is the second node quantity being verified, and is verified based on the second node quantity.Specifically, step " is based on second node The copyright authentication that equipment returns is as a result, carry out copyright authentication to submission content ", may include:
The copyright authentication result that statistics returns is the second node quantity being verified;
Copyright authentication is carried out to submission content according to second node quantity.
In one embodiment, after first node receives the copyright authentication result that second node returns, first node can To count the quantity for the second node that copyright authentication result is " being verified ".For example, it is assumed that first node is into block chain 100 A second node broadcasting copyright checking request, this 100 second nodes respectively can request progress copyright to be tested according to copyright authentication Card, and return to copyright authentication result to first node (result includes " being verified " or " verifying does not pass through ");Assuming that wherein The copyright authentication result for having 80 second nodes to return is " being verified ".First node can count copyright authentication result The second node quantity of " being verified ", at this time as 80.
For example, in one embodiment, when second node quantity is greater than preset quantity, determining the copyright authentication of submission content Pass through, when second node data are not more than preset quantity, determines that the copyright authentication of submission content does not pass through.The preset quantity can To set according to actual needs, for example, can be set based on block chain interior joint total quantity.
For another example, in one embodiment, the quantitative proportion that can calculate the second node being verified is tested based on ratio Card.Specifically, step " according to second node quantity to submission content carry out copyright authentication ", may include:
Calculate the quantitative proportion of second node total quantity in the block chain of second node quantity occupied area;
When quantitative proportion is greater than preset threshold, determine that the copyright authentication of submission content passes through;
When quantitative proportion is not more than preset threshold, determine that the copyright authentication of submission content does not pass through.
Wherein, preset threshold can be set according to actual needs, for example, 80%, 90% etc..For example, working as verification result Second node quantity to be verified is more than 80%, determines that the copyright of submission content passes through, demonstrate,proves successfully at this point, copyright is deposited;If It is not above 80%, determines that the copyright of submission content does not pass through, at this point, copyright deposits card failure.
In the embodiment of the present invention, when the current copyright authentication for contributing for example short-sighted frequency of content passes through, then it can receive submission, and Submission reward is provided to contributor.
In one embodiment, when the copyright authentication for content of contributing passes through, by the characteristic information and copyright of content of contributing Attaching information is synchronized in the block data of all nodes of block chain, to guarantee the synchronism of data, promotes the following copyright authentication Efficiency, accuracy and confidence level.
In one embodiment, when inquiring in block data in the presence of characteristic information identical with target signature information, really Surely the copyright authentication for content of contributing does not pass through.
With reference to Fig. 1 c, in the embodiment of the present invention, after the characteristic information for obtaining submission content, can in block counts it is investigated that It askes and whether there is same characteristic features information, realize that the copyright inspection to submission content illustrates to throw when inquiring same characteristic features information Situations such as original text content has copyright ownership, which may be non-original works or there are multiple contributions, determines at this time The copyright inspection of submission content passes through, and refuses the submission.
According to foregoing description, with reference to Fig. 1 c, with content of contributing be short-sighted frequency, block chain is to be constructed jointly by short video producer Alliance's chain for, using present invention method, when the corresponding node of short video producer receives the submission of short video user, The characteristic information of short-sighted frequency can be calculated first, the block data of alliance's chain is then inquired, if identical feature can be inquired Information then illustrates that the short-sighted frequency has had copyright ownership, is non-original works or multiple contribution, can refuse the throwing at this time Original text.If not inquiring characteristic information, illustrate to be original works, then carries out copyright and deposit card operation, is i.e. node initiates transaction Broadcast, the number of nodes to be transacted having confirmed that are more than after 80%, then it is assumed that copyright, which is deposited, to be demonstrate,proved successfully, receives submission at this time, and to throwing Original text person provides submission reward.
On the basis of the above, in order to avoid content industry distorts copyright data, the confidence level of copyright authentication is promoted, this The common recognition mechanism that inventive embodiments are also based on block chain verifies copyright modification.Specifically, embodiment of the present invention side Method further include:
The copyright for receiving object content modifies request, and copyright modification request carries the target version that object content needs to be modified as Weigh attaching information;
It is modified and is requested according to copyright, the copyright of the second node broadcast target content into block chain modifies checking request;
It receives the copyright that second node is returned based on copyright modification checking request and modifies verification result;It is tested according to copyright modification Result and target copyright attaching information are demonstrate,proved, is modified to the copyright ownership information of object content.
Wherein, object content is the content for needing to modify copyright attaching information, such as needs the short of revision power attaching information Video etc..
Wherein, copyright modification request can be sent by the equipment such as server of content industry, for example, content industry needs are repaired When changing the copyright ownership information of some content, copyright modification can be sent to the node of block chain by the equipment of content industry and asked Ask, the copyright modification request can carry need by the content modification at copyright ownership information.
In implementing one, after the node of block chain receives copyright modification request, version can be triggered according to the request Weight update verifying, i.e., other node broadcasts copyrights modify checking request into block chain, which can carry the feature of content The copyright ownership information that information and needs are modified as.
Other nodes can carry out copyright authentication verifying, specifically, Ke Yigen after receiving copyright modification checking request Block data is inquired according to the characteristic information of content, obtains the corresponding copyright ownership information of this feature information;Then, it will inquire Copyright ownership information is compared with the copyright ownership information being modified as is needed, if inconsistent, returns to copyright modification verifying not By verification result initiate node to request, if unanimously, returning to verification result that the modification of determining copyright is verified to asking Seek initiation node.
Node is initiated in request, after receiving the copyright modification verification result of other nodes return,
It can determine that this modification copyright verifies whether to pass through based on the verification result of return, if passing through, according to target Copyright ownership information modifies to the copyright ownership information of object content, if not passing through, refuses to modify.In addition, at this In the case that modification copyright is verified, it is also necessary to the copyright after the modification of the synchronous object content of other block datas into block chain Attaching information.
Specifically, determine that this modification verifies whether that above-mentioned version can be referred to by way of based on the verification result of return Weigh verifying mode, for example, statistics copyright modification verification result be by second node quantity, it is true according to second node quantity The copyright modification for determining content verifies whether to pass through.
For example, when some short video producer needs the copyright ownership by some short-sighted frequency to distort for oneself, using this hair The method that bright embodiment provides can find this time to distort, while have rejected and this time distorting by the common recognition mechanism of block chain.
From the foregoing, it will be observed that the embodiment of the present invention obtains submission content to be verified by first node in block chain;To submission Content carries out feature extraction, obtains the target signature information of submission content;According to target signature information to the block of first node Data carry out characteristic query, and block data includes the characteristic information of existing copyright ownership content;When the block data of first node In be not present characteristic information identical with target signature information when, into block chain second node broadcast submission content copyright Checking request, wherein second node is the node in block chain in addition to first node, and block data includes existing copyright ownership The characteristic information of content;Receive the copyright authentication result that second node is returned based on copyright authentication request;It is returned based on second node The copyright authentication returned is as a result, carry out copyright authentication to submission content.The program can realize the version of decentralization based on block chain Power verifying the problems such as multiple contribution can be effectively avoided and carry submission, and can also evade the problem of copyright data is distorted, Therefore, the safety of the accuracy of copyright authentication, confidence level and copyright data can be promoted.
On the basis of above-described embodiment description, alliance's chain interior joint, content will be integrated in copyright authentication device below For the copyright authentication method of the embodiment of the present invention is discussed in detail for short-sighted frequency:
One, alliance's chain building:
Firstly the need of one alliance's chain of building, the node in alliance's chain corresponds to short video producer, for example, in alliance's chain Node can be realized by the server or server cluster of short video producer.Each short video producer is carrying out short video copy When inspection and copyright deposit card, operated by the node of oneself.Wherein, each node is corresponding with block data, block data In include transaction record, which includes the field that two length are 512, and one is characteristic information field, is stored short The characteristic information of video, for characterizing the short-sighted frequency of only one;The other is copyright ownership information field, is stored with short-sighted frequency Copyright ownership information, for characterizing the copyright ownership of the short-sighted frequency;Wherein, each transaction record all indicates a short-sighted frequency Copyright information.
It is the alliance's chain constructed by each short video producer with reference to Fig. 2 a, the node in alliance's chain corresponds to short-sighted frequency Manufacturer can be realized by the server of short video producer.For example, each node in alliance's chain corresponds respectively to short video producer 1、2、3、4、5。
Two, after constructing alliance's chain, copyright authentication can be carried out using alliance's chain:
As shown in Figure 2 b, a kind of copyright authentication method is provided, detailed process is as follows:
201, contributor's terminal short-sighted frequency of the short corresponding first node transmission submission of video producer into alliance's chain.
Wherein, first node is the corresponding node of short video producer currently contributed in alliance's chain about contributor.
It, can be by terminal to short when contributor contributes short-sighted frequency to short 5 platform of video producer for example, with reference to Fig. 2 a The corresponding alliance's chain node of video producer 5 sends short-sighted frequency of contributing.
202, first node carries out feature calculation to the short-sighted frequency of contributing, the target signature information for the short-sighted frequency that obtains contributing.
For example, the short video files data of submission can be carried out with digest calculations, digest algorithm selects SHA-512, obtains The HASH value that length is 512, which is the characteristic information of short-sighted frequency.
203, first node carries out characteristic query to block data according to target signature information.
Believe for example, second node can be inquired in block data with the presence or absence of feature identical with target signature information Breath.
204, when not inquiring characteristic information identical with target signature information, first node into alliance's chain second Node broadcasts carry the copyright authentication request of target signature information.
Wherein, second node is the arbitrary node in alliance's chain in addition to first node.For example, removing short-sighted frequency in alliance's chain Node other than the corresponding node of manufacturer 5, such as the corresponding node of short-sighted frequency 1,2,3,4.
For example, after the HASH value for calculating short-sighted frequency of contributing, can be being inquired in block data with reference to Fig. 2 b It is no that there is identical HASH value;If no, if not inquiring the record of identical HASH value, then it is assumed that be original works, send out at this time It plays copyright and deposits card.Copyright deposits card process with reference to step 204-207.
For example, the corresponding first node of short video producer 5, initiates transaction broadcast, the spy of transaction request in alliance's chain Sign information field fills the HASH value of the short-sighted frequency of the submission, and copyright ownership information field fills the identity information of oneself, such as factory Quotient's title etc..Based on common recognition mechanism, other nodes in alliance's chain will do it broadcast trade confirmation, true based on transaction to be broadcast Recognize number of nodes and determines whether to deposit end of certificate at for example, transaction to be broadcast has confirmed that number of nodes is more than after 80%, so that it may think Deposit end of certificate at, otherwise deposit card do not complete.
205, first node receives the copyright authentication result that second node is returned based on copyright authentication request.
Second node, can be according to the request after receiving the copyright authentication request of first node broadcast in alliance's chain Its corresponding block data is inquired, is determined in block data with the presence or absence of the same characteristic features information for short-sighted frequency of contributing, and if it exists, then The unacceptable copyright authentication result of copyright authentication is returned to first node, if it does not exist, then returns to the copyright that copyright authentication passes through Verification result is to first node.
206, the copyright authentication result that first node statistics returns is the second node quantity being verified.
207, first node determines whether the copyright authentication for short-sighted frequency of contributing passes through according to second node quantity.
For example, calculating the quantitative proportion of second node total quantity in the block chain of second node quantity occupied area;When quantitative proportion is big When preset ratio, determine that the copyright authentication for short-sighted frequency of contributing passes through;Otherwise determine that the copyright authentication for short-sighted frequency of contributing does not pass through.
When copyright authentication passes through, then it is assumed that copyright, which is deposited, to be demonstrate,proved successfully or complete, when copyright authentication does not pass through, then it is assumed that version Power is deposited card failure or is not completed.
208, when inquiring characteristic information identical with target signature information, first node determines the version for short-sighted frequency of contributing Power verifying does not pass through.
For example, after calculating HASH value, by the node of oneself, carrying out alliance's chain block Transaction Information with reference to Fig. 2 b and looking into It askes, if inquiring the record with identical HASH value, illustrates that the short-sighted frequency has had copyright ownership, user's submission is non- Original works either multiple contribution, contribution system refuses submission request at this time.
Alternatively, deposit card do not complete when, determine that copyright authentication does not pass through, at this time contribution system refuse the submission request.
With reference to Fig. 2 b, passes through in the copyright authentication for short-sighted frequency of contributing, determine after the completion of depositing card, contribution system receives the throwing Original text, and submission reward is provided to contributor.
Using copyright authentication method provided in an embodiment of the present invention, it can use the weak centerization of alliance's chain and can not distort Property, it by establishing the short video feature information of alliance, certification authority chained record, and is linked into the short-sighted frequency contribution system of UGC, to subtract The phenomenon that few multiple contribution and carrying submission, while reducing the probability of dispute over copyright.
For example, in alliance's chain, having accessed " short video producer 1 ", " short video producer 2 ", " short video producer with reference to Fig. 2 c 3 ", " short video producer 4 ", " short video producer 5 " five short video producers.
Normal submission scene:
A. contributor A has taken a short-sighted frequency VidA, and contributes and arrive short video producer platform 3.
B. after short video producer platform 3 receives submission, copyright inspection is carried out into alliance's chain.
C. alliance's chain copyright inspection passes through, and initiates alliance's chain copyright and deposits card.
D. alliance's chain copyright is deposited card and is passed through, and short video producer platform 3 receives submission.
E. contributor A receives the submission reward that short video producer platform 3 is provided.
Carry submission scene:
A. contributor B has downloaded a short-sighted frequency VidB from short video producer platform 4, and then submission is flat to short video producer Platform 1.
B. after short video producer platform 1 receives submission, copyright inspection is carried out into alliance's chain.
C. alliance's chain copyright inspection does not pass through, the short refusal of video producer platform 1 submission.
Multiple contribution scene:
A. short video producer platform 4 has taken a short-sighted frequency VidC, and then submission is " short to short video producer platform simultaneously Video producer platform 3 and short video producer platform 4.
B. after short video producer platform 3 and short video producer platform 4 receive submission, copyright inspection is carried out into alliance's chain respectively It looks into.
C. alliance's chain copyright inspection of the two passes through, and alliance's chain copyright is initiated with the latter two and deposits card.
D. the copyright of short video producer platform 4 deposits card and completes early, therefore short video producer platform 4 than short video producer platform 3 Copyright is deposited card and is passed through, and short 3 copyright of video producer platform deposits card failure.
E. short video producer platform 4 receives submission, the short refusal of video producer platform 3 submission.
F. contributor C receives the submission reward of short video producer platform 4.
Scene is distorted privately by manufacturer
A. the copyright ownership that short video producer 2 distorts short-sighted frequency VidD privately is oneself, and synchrodata is into alliance's chain.
B. the common recognition mechanism of alliance's chain, which has found, this time distorts, while having rejected and this time distorting.
From the foregoing, it will be observed that the embodiment of the invention provides a kind of short-sighted frequency contribution system of the UGC of weak center's copyright authentication, it should The problem of system can be effectively prevented from multiple contribution and carry submission improves short-sighted frequency submission reliability, to reduce nothing Effect submission expense expenditure, also reduce the probability of dispute over copyright, at the same have benefited from contribute reliability raising, submission audit and Submission reward provide can full-automatic process, optimization submission experience reduces artificial expenditure.In order to better implement with top Method, correspondingly, the embodiment of the present invention also provides a kind of copyright authentication device, which specifically be can integrate in block In the arbitrary node of chain, node can be individual server or server cluster.
For example, as shown in Figure 3a, which may include acquiring unit 301, feature extraction unit 302, wide Unit 303, receiving unit 304 and copyright authentication unit 305 are broadcast, as follows:
Acquiring unit 301, for obtaining submission content to be verified;
Feature extraction unit 302 obtains the target of the submission content for carrying out feature extraction to the submission content Characteristic information;
Radio unit 303, for when there is no identical with the target signature information in the block data of first node When characteristic information, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein second section Point is the node in block chain in addition to first node, and the block data includes the characteristic information of existing copyright ownership content;
Receiving unit 304, the copyright authentication knot returned for receiving the second node based on copyright authentication request Fruit;
Copyright authentication unit 305, the copyright authentication for being returned based on the second node is as a result, to the submission content Carry out copyright authentication.
In one embodiment, with reference to Fig. 3 b, the copyright authentication unit 305 may include:
Subelement 3051 is counted, is the second node quantity being verified for counting the copyright authentication result returned;
Copyright authentication subelement 3052 is tested for carrying out copyright to the submission content according to the second node quantity Card.
In one embodiment, the copyright authentication subelement 3052, is used for: calculating second node quantity and accounts for the block chain The quantitative proportion of middle second node total quantity;When the quantitative proportion is greater than preset threshold, the version of the submission content is determined Power is verified;When the quantitative proportion is not more than preset threshold, determine that the copyright authentication of the submission content does not pass through.
In one embodiment, the feature extraction unit 302 is obtained for carrying out digest calculations to the submission content The cryptographic Hash of the submission content;The target signature information of the submission content is constructed based on the cryptographic Hash.
In one embodiment, the copyright authentication unit 305 is also used to exist when in the block data of the first node When characteristic information identical with the target signature information, determine that the copyright authentication of the submission content does not pass through.
In one embodiment, with reference to Fig. 3 c, copyright authentication device can also include synchronization unit 306;The synchronization unit 306 are used for: when the copyright authentication of the submission content passes through, the characteristic information of the submission content and copyright ownership being believed Breath, is synchronized in the block data of all nodes of block chain.
In one embodiment, with reference to Fig. 3 d, copyright authentication device can also include modification authentication unit 307;The modification Authentication unit 307, is used for:
The copyright for receiving object content modifies request, and the copyright modification request carries the object content needs and is modified as Target copyright attaching information;
It is modified and is requested according to the copyright, the copyright modification that the second node into block chain broadcasts the object content is tested Card request;
It receives the copyright that the second node is returned based on copyright modification checking request and modifies verification result;According to institute Copyright modification verification result and the target copyright attaching information are stated, is modified to the copyright ownership information of object content.
When it is implemented, above each unit can be used as independent entity to realize, any combination can also be carried out, is made It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not It repeats again.
From the foregoing, it will be observed that the copyright authentication device of the present embodiment can be by acquiring unit 301 in obtaining submission to be verified Content;Then, feature extraction is carried out to the submission content by feature extraction unit 302, obtains the target of the submission content Characteristic information;When there is characteristic information identical with the target signature information in the block data of the first node, by Second node of the radio unit 303 into block chain broadcasts the copyright authentication request of the submission content, wherein second section Point is the node in block chain in addition to first node, and the block data includes the characteristic information of existing copyright ownership content; The copyright authentication result that the second node is returned based on copyright authentication request is received by receiving unit 304;It is tested by copyright The copyright authentication that card unit 305 is returned based on the second node is as a result, to submission content progress copyright authentication.The program The copyright authentication that decentralization can be realized based on block chain, the problems such as multiple contribution can be effectively avoided and carry submission, And the problem of copyright data is distorted can also be evaded, therefore, the accuracy and confidence level of copyright authentication can be promoted.
In addition, the embodiment of the present invention also provides a kind of computer equipment, as shown in figure 4, it illustrates the embodiment of the present invention The structural schematic diagram of related computer equipment, specifically:
The computer equipment may include the processor 401, one or one of one or more than one processing core with The components such as memory 402, power supply 403 and the input unit 404 of upper computer readable storage medium.Those skilled in the art can be with Understand, computer equipment structure shown in Fig. 4 does not constitute the restriction to computer equipment, may include than illustrate it is more or Less component perhaps combines certain components or different component layouts.Wherein:
Processor 401 is the control centre of the computer equipment, is set using various interfaces and the entire computer of connection Standby various pieces, by running or executing the software program and/or module that are stored in memory 402, and calling storage Data in memory 402 execute the various functions and processing data of computer equipment, to carry out to computer equipment whole Body monitoring.Optionally, processor 401 may include one or more processing cores;Preferably, processor 401 can integrate at Manage device and modem processor, wherein the main processing operation system of application processor, user interface and application program etc. are adjusted Demodulation processor processed mainly handles wireless communication.It is understood that above-mentioned modem processor can not also integrate everywhere It manages in device 401.
Memory 402 can be used for storing software program and module, and processor 401 is stored in memory 402 by operation Software program and module, thereby executing various function application and data processing.Memory 402 can mainly include storage journey Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function Such as sound-playing function, image player function) etc.;Storage data area can be stored to be created according to using for computer equipment Data etc..In addition, memory 402 may include high-speed random access memory, it can also include nonvolatile memory, such as At least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 402 can be with Including Memory Controller, to provide access of the processor 401 to memory 402.
Computer equipment further includes the power supply 403 powered to all parts, it is preferred that power supply 403 can pass through power supply pipe Reason system and processor 401 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.Power supply 403 can also include one or more direct current or AC power source, recharging system, power failure inspection The random components such as slowdown monitoring circuit, power adapter or inverter, power supply status indicator.
The computer equipment may also include input unit 404, which can be used for receiving the number or word of input Information is accorded with, and generates keyboard related with user setting and function control, mouse, operating stick, optics or trace ball letter Number input.
Although being not shown, computer equipment can also be including display unit etc., and details are not described herein.Specifically in the present embodiment In, computer equipment can be used as any node in block chain, such as first node.401 meeting of processor in computer equipment According to following instruction, the corresponding executable file of the process of one or more application program is loaded into memory In 402, and the application program being stored in memory 402 is run by processor 401, thus realize various functions, it is as follows:
Obtain submission content to be verified;Feature extraction is carried out to the submission content, obtains the mesh of the submission content Mark characteristic information;When there is no characteristic informations identical with the target signature information in the block data of the first node When, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein the second node is block Node in chain in addition to first node, the block data include the characteristic information of existing copyright ownership content;Described in reception The copyright authentication result that second node is returned based on copyright authentication request;The copyright authentication returned based on the second node As a result, carrying out copyright authentication to the submission content.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
From the foregoing, it will be observed that the computer equipment of the present embodiment can be used as the node such as first node in block chain, the calculating The available submission content to be verified of machine equipment;Feature extraction is carried out to the submission content, obtains the submission content Target signature information;When there is no characteristic informations identical with the target signature information in the block data of the first node When, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein the second node is block Node in chain in addition to first node;Receive the copyright authentication knot that the second node is returned based on copyright authentication request Fruit;The copyright authentication returned based on the second node is as a result, carry out copyright authentication to the submission content.The program can be with base The problems such as realizing the copyright authentication of decentralization in block chain, multiple contribution can be effectively avoided and carry submission, and may be used also To evade the problem of copyright data is distorted, therefore, the accuracy and confidence level of copyright authentication can be promoted.
It will appreciated by the skilled person that all or part of the steps in the various methods of above-described embodiment can be with It is completed by instructing, or relevant hardware is controlled by instruction to complete, which can store computer-readable deposits in one In storage media, and is loaded and executed by processor.
For this purpose, the embodiment of the present invention also provides a kind of storage medium, wherein being stored with a plurality of instruction, which can be located Reason device is loaded, to execute the step in any copyright authentication method provided by the embodiment of the present invention.For example, the instruction Following steps can be executed:
Obtain submission content to be verified;Feature extraction is carried out to the submission content, obtains the mesh of the submission content Mark characteristic information;When there is no characteristic informations identical with the target signature information in the block data of the first node When, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein the second node is block Node in chain in addition to first node, the block data include the characteristic information of existing copyright ownership content;Described in reception The copyright authentication result that second node is returned based on copyright authentication request;The copyright authentication returned based on the second node As a result, carrying out copyright authentication to the submission content.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
Wherein, which may include: read-only memory (ROM, Read Only Memory), random access memory Body (RAM, Random Access Memory), disk or CD etc..
By the instruction stored in the storage medium, any permission pipe provided by the embodiment of the present invention can be executed Step in reason method, it is thereby achieved that achieved by any copyright authentication method provided by the embodiment of the present invention Beneficial effect is detailed in the embodiment of front, and details are not described herein.
It is provided for the embodiments of the invention a kind of copyright authentication method, apparatus, computer equipment and storage medium above It is described in detail, used herein a specific example illustrates the principle and implementation of the invention, the above reality The explanation for applying example is merely used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art, According to the thought of the present invention, there will be changes in the specific implementation manner and application range, in conclusion in this specification Appearance should not be construed as limiting the invention.

Claims (10)

1. a kind of copyright authentication method, which is characterized in that be applied to first node, the first node is any in block chain Node, comprising:
Obtain submission content to be verified;
Feature extraction is carried out to the submission content, obtains the target signature information of the submission content;
When characteristic information identical with the target signature information is not present in the block data of the first node, to block Second node in chain broadcasts the copyright authentication request of the submission content, wherein the second node is in block chain except the Node other than one node, the block data include the characteristic information of existing copyright ownership content;
Receive the copyright authentication result that the second node is returned based on copyright authentication request;
The copyright authentication returned based on the second node is as a result, carry out copyright authentication to the submission content.
2. copyright authentication method as described in claim 1, which is characterized in that the copyright returned based on the second node equipment Verification result carries out copyright authentication to the submission content, comprising:
The copyright authentication result that statistics returns is the second node quantity being verified;
Copyright authentication is carried out to the submission content according to the second node quantity.
3. copyright authentication method as claimed in claim 2, which is characterized in that according to the second node quantity to the submission Content carries out copyright authentication, comprising:
Calculate the quantitative proportion that second node quantity accounts for second node total quantity in the block chain;
When the quantitative proportion is greater than preset threshold, determine that the copyright authentication of the submission content passes through;
When the quantitative proportion is not more than preset threshold, determine that the copyright authentication of the submission content does not pass through.
4. copyright authentication method as described in claim 1, which is characterized in that carry out feature extraction to the submission content, obtain To the target signature information of the submission content, comprising:
Digest calculations are carried out to the submission content, obtain the cryptographic Hash of the submission content;
The target signature information of the submission content is constructed based on the cryptographic Hash.
5. copyright authentication method as described in claim 1, which is characterized in that the method also includes:
When it is described submission content copyright authentication pass through when, by it is described submission content characteristic information and copyright ownership information, It is synchronized in the block data of all nodes of block chain.
6. copyright authentication method as described in claim 1, which is characterized in that further include:
When there is characteristic information identical with the target signature information in the block data of the first node, described in determination The copyright authentication of submission content does not pass through.
7. copyright authentication method as described in claim 1, which is characterized in that further include:
The copyright for receiving object content modifies request, and the copyright modification request carries the mesh that the object content needs to be modified as Mark copyright ownership information;
It is modified and is requested according to the copyright, the copyright modification verifying that the second node into block chain broadcasts the object content is asked It asks;
It receives the copyright that the second node is returned based on copyright modification checking request and modifies verification result;According to the version Weight update verification result and the target copyright attaching information, modify to the copyright ownership information of object content.
8. a kind of copyright authentication device, which is characterized in that be applied to first node, the first node is any in block chain Node, comprising:
Acquiring unit, for obtaining submission content to be verified;
Feature extraction unit obtains the target signature letter of the submission content for carrying out feature extraction to the submission content Breath;
Radio unit, for when there is no features identical with the target signature information in the block data of the first node When information, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein the second node is Node in block chain in addition to first node, the block data include the characteristic information of existing copyright ownership content;
Receiving unit, the copyright authentication result returned for receiving the second node based on copyright authentication request;
Copyright authentication unit, the copyright authentication for being returned based on the second node is as a result, carry out version to the submission content Power verifying.
9. a kind of storage medium, is stored thereon with computer program, wherein the realization when computer program is executed by processor Such as the step of any one of claim 1-7 the method.
10. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, wherein the processor is realized when executing described program such as the step of any one of claim 1-7 the method.
CN201910570067.1A 2019-06-27 2019-06-27 Copyright verification method and device, computer equipment and storage medium Active CN110334484B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910570067.1A CN110334484B (en) 2019-06-27 2019-06-27 Copyright verification method and device, computer equipment and storage medium
CN201910866030.3A CN110598373B (en) 2019-06-27 2019-06-27 Copyright verification method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910570067.1A CN110334484B (en) 2019-06-27 2019-06-27 Copyright verification method and device, computer equipment and storage medium

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201910866030.3A Division CN110598373B (en) 2019-06-27 2019-06-27 Copyright verification method, system and storage medium

Publications (2)

Publication Number Publication Date
CN110334484A true CN110334484A (en) 2019-10-15
CN110334484B CN110334484B (en) 2021-07-06

Family

ID=68143458

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201910570067.1A Active CN110334484B (en) 2019-06-27 2019-06-27 Copyright verification method and device, computer equipment and storage medium
CN201910866030.3A Active CN110598373B (en) 2019-06-27 2019-06-27 Copyright verification method, system and storage medium

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201910866030.3A Active CN110598373B (en) 2019-06-27 2019-06-27 Copyright verification method, system and storage medium

Country Status (1)

Country Link
CN (2) CN110334484B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111651171A (en) * 2020-06-05 2020-09-11 中国银行股份有限公司 Interface version deployment method and device, electronic equipment and storage medium
CN112887763A (en) * 2019-11-29 2021-06-01 中国电信股份有限公司 Information control method, information control system, information control device, and storage medium
WO2021135641A1 (en) * 2019-12-31 2021-07-08 支付宝(杭州)信息技术有限公司 Blockchain-based digital content evidence collection method, apparatus and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117035785A (en) * 2023-08-09 2023-11-10 云海链控股股份有限公司 Block chain consensus method, device, equipment and computer readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107967416A (en) * 2016-10-19 2018-04-27 华为技术有限公司 The methods, devices and systems of copyright right-safeguarding detection
CN108920908A (en) * 2018-06-28 2018-11-30 北京京东尚科信息技术有限公司 Date storage method, device and computer readable storage medium
CN108989288A (en) * 2018-06-20 2018-12-11 佛山科学技术学院 A kind of mobile digital literary property protection method and device based on block chain
KR101938878B1 (en) * 2018-06-14 2019-01-15 김보언 System for managing copyright based on blockchain
CN109582641A (en) * 2018-10-17 2019-04-05 北京瑞卓喜投科技发展有限公司 A kind of screening technique and screening system of the works typing based on block chain
CN109635521A (en) * 2018-12-06 2019-04-16 中链科技有限公司 A kind of copyright protection based on block chain, verification method and device
CN109684786A (en) * 2018-11-05 2019-04-26 深圳变设龙信息科技有限公司 A kind of copyright registration method, apparatus and terminal device based on block chain
CN109815647A (en) * 2019-01-30 2019-05-28 京东方科技集团股份有限公司 Management method, the management system of device, software server and software of software

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108334753B (en) * 2018-01-04 2020-09-11 中国银行股份有限公司 Pirate application verification method and distributed server node
CN109409136A (en) * 2018-11-08 2019-03-01 中链科技有限公司 Block chain deposits the verification method, device and calculating equipment of card content

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107967416A (en) * 2016-10-19 2018-04-27 华为技术有限公司 The methods, devices and systems of copyright right-safeguarding detection
KR101938878B1 (en) * 2018-06-14 2019-01-15 김보언 System for managing copyright based on blockchain
CN108989288A (en) * 2018-06-20 2018-12-11 佛山科学技术学院 A kind of mobile digital literary property protection method and device based on block chain
CN108920908A (en) * 2018-06-28 2018-11-30 北京京东尚科信息技术有限公司 Date storage method, device and computer readable storage medium
CN109582641A (en) * 2018-10-17 2019-04-05 北京瑞卓喜投科技发展有限公司 A kind of screening technique and screening system of the works typing based on block chain
CN109684786A (en) * 2018-11-05 2019-04-26 深圳变设龙信息科技有限公司 A kind of copyright registration method, apparatus and terminal device based on block chain
CN109635521A (en) * 2018-12-06 2019-04-16 中链科技有限公司 A kind of copyright protection based on block chain, verification method and device
CN109815647A (en) * 2019-01-30 2019-05-28 京东方科技集团股份有限公司 Management method, the management system of device, software server and software of software

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
聂静等: ""基于区块链的数字出版版权保护"", 《出版发行研究》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887763A (en) * 2019-11-29 2021-06-01 中国电信股份有限公司 Information control method, information control system, information control device, and storage medium
CN112887763B (en) * 2019-11-29 2022-12-20 中国电信股份有限公司 Information control method, information control system, information control device, and storage medium
WO2021135641A1 (en) * 2019-12-31 2021-07-08 支付宝(杭州)信息技术有限公司 Blockchain-based digital content evidence collection method, apparatus and device
CN111651171A (en) * 2020-06-05 2020-09-11 中国银行股份有限公司 Interface version deployment method and device, electronic equipment and storage medium
CN111651171B (en) * 2020-06-05 2023-03-31 中国银行股份有限公司 Interface version deployment method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110334484B (en) 2021-07-06
CN110598373B (en) 2021-07-06
CN110598373A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
TWI694390B (en) Blockchain-based transaction processing method and device, and electronic equipment
CN110334484A (en) A kind of copyright authentication method, apparatus, computer equipment and storage medium
CN110032865A (en) A kind of right management method, device and storage medium
TWI691919B (en) Blockchain-based transaction processing method and device, and electronic equipment
EP3655905B1 (en) Distributed ledger technology
JP2020522927A (en) Blockchain for general calculation
CN107679045A (en) Copyright authorization management method and system
JP7319961B2 (en) Computer-implemented systems and methods related to binary blockchains forming a pair of coupled blockchains
CN110537355A (en) Consensus based on secure blockchains
CN107909369A (en) Based on the common recognition method, apparatus merchandised across chain and storage medium
CN107967416A (en) The methods, devices and systems of copyright right-safeguarding detection
CN109190881A (en) A kind of data assets management method, system and equipment
CN109003185A (en) A kind of method for building up, device, calculating equipment and the storage medium of intelligence contract
CN107079041A (en) File credit assessment
CN110245843B (en) Information management method and related device based on blockchain
WO2020065242A1 (en) Method and system for transaction processing in decentralized network by network nodes in collaborative decision-making
WO2020118859A1 (en) Decentralized chip research and development transaction data storage method and system
WO2022206431A1 (en) Method and apparatus for querying ledger data of fabric blockchain
CN110278246B (en) Certificate storage service transfer method, device and equipment for alliance chain
CN113221191A (en) Block chain-based data evidence storage method, device, equipment and storage medium
CN110062044A (en) Distributed application program downloads verification method, equipment and storage medium
CN110225103B (en) Service recommendation method, device and equipment
CN112052033A (en) Power distribution automation master station version management method and system based on process and block chain
CN111797426A (en) Distrust notification service
WO2022206432A1 (en) Method and apparatus for querying ledger data in fabric blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40009327

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant