CN110334484A - A kind of copyright authentication method, apparatus, computer equipment and storage medium - Google Patents
A kind of copyright authentication method, apparatus, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110334484A CN110334484A CN201910570067.1A CN201910570067A CN110334484A CN 110334484 A CN110334484 A CN 110334484A CN 201910570067 A CN201910570067 A CN 201910570067A CN 110334484 A CN110334484 A CN 110334484A
- Authority
- CN
- China
- Prior art keywords
- node
- content
- copyright authentication
- submission
- submission content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000003860 storage Methods 0.000 title claims abstract description 18
- 238000000605 extraction Methods 0.000 claims abstract description 25
- 238000012986 modification Methods 0.000 claims description 35
- 230000004048 modification Effects 0.000 claims description 35
- 238000012795 verification Methods 0.000 claims description 19
- 238000004364 calculation method Methods 0.000 claims description 10
- 230000001360 synchronised effect Effects 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 4
- 208000001491 myopia Diseases 0.000 description 44
- 238000007689 inspection Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000004422 calculation algorithm Methods 0.000 description 3
- 235000013399 edible fruits Nutrition 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 241001269238 Data Species 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000013135 deep learning Methods 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Abstract
The embodiment of the invention discloses a kind of copyright authentication method, apparatus, computer equipment and storage mediums;The embodiment of the present invention can obtain submission content to be verified by first node in block chain;Feature extraction is carried out to submission content, obtains the target signature information of submission content;When characteristic information identical with target signature information is not present in the block data of first node, the copyright authentication request of the second node broadcast submission content into block chain, wherein second node is the node in block chain in addition to first node;Receive the copyright authentication result that second node is returned based on copyright authentication request;The copyright authentication returned based on second node is as a result, carry out copyright authentication to submission content.The program can promote the accuracy and confidence level of copyright authentication.
Description
Technical field
The present invention relates to field of computer technology, and in particular to a kind of copyright authentication method, apparatus, computer equipment and deposits
Storage media.
Background technique
As Internet technology develops, UGC (User Generated Content, user-generated content) is more and more emerging
It rises.More and more users to content industry platform contribute oneself create UGC, such as to video platform contribute oneself creation view
Frequency etc..
Since submission content often refers to copyright problem, it is interior when user contributes UGC to content industry platform
Holding manufacturer's platform needs the copyright to submission content to verify, to reduce dispute over copyright.Currently, the scheme of copyright authentication is main
For independent construction scheme: content industry oneself independently builds copyright information database, and lane database stores the content of oneself, when
When having the short-sighted frequency of new content such as UGC to contribute, the database of oneself is retrieved, if it is new content, then copyright inspection is by simultaneously
It is added in database, if it is already present for example, refusal of then contributing.
Current independent construction scheme, copyright information and the not intercommunication of other content manufacturer, not can avoid multiple contribution and remove
The content of other manufacturer's contents is transported come the phenomenon that submission, and manufacturer can also arbitrarily modify the database of oneself, therefore copyright
The accuracy and Reliability ratio of verifying are lower.
Summary of the invention
The embodiment of the present invention provides a kind of copyright authentication method, apparatus, computer equipment and storage medium, can promote version
Weigh the accuracy and confidence level of verifying.
The embodiment of the present invention provides a kind of copyright authentication method, is executed by the first node equipment in block chain, comprising:
Obtain submission content to be verified;
Feature extraction is carried out to the submission content, obtains the target signature information of the submission content;
When characteristic information identical with the target signature information is not present in the block data of the first node, to
Second node in block chain broadcasts the copyright authentication request of the submission content, wherein the second node is in block chain
Node in addition to first node, the block data include the characteristic information of existing copyright ownership content;
Receive the copyright authentication result that the second node is returned based on copyright authentication request;
The copyright authentication returned based on the second node is as a result, carry out copyright authentication to the submission content.
Correspondingly, the embodiment of the present invention also provides a kind of copyright authentication device, it is applied to first node, the first node
For the arbitrary node in block chain, comprising:
Acquiring unit, for obtaining submission content to be verified;
Feature extraction unit, for carrying out feature extraction to the submission content, the target for obtaining the submission content is special
Reference breath;
Radio unit, for when there is no characteristic informations identical with the target signature information in the block data
When, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein the second node is block
Node in chain in addition to first node, the block data include the characteristic information of existing copyright ownership content;
Receiving unit, the copyright authentication result returned for receiving the second node based on copyright authentication request;
Copyright authentication unit, copyright authentication for being returned based on the second node as a result, to the submission content into
Row copyright authentication.
In one embodiment, the copyright authentication unit, comprising:
Subelement is counted, is the second node quantity being verified for counting the copyright authentication result returned;
Copyright authentication subelement, for carrying out copyright authentication to the submission content according to the second node quantity.
In one embodiment, the copyright authentication subelement, is used for: calculating second node quantity and accounts in the block chain the
The quantitative proportion of two node total number amounts;When the quantitative proportion is greater than preset threshold, determine that the copyright of the submission content is tested
Card passes through;When the quantitative proportion is not more than preset threshold, determine that the copyright authentication of the submission content does not pass through.
In one embodiment, the feature extraction unit obtains described for carrying out digest calculations to the submission content
The cryptographic Hash for content of contributing;The target signature information of the submission content is constructed based on the cryptographic Hash.
In one embodiment, the copyright authentication unit, be also used to exist in the block data when the first node with
When the identical characteristic information of the target signature information, determine that the copyright authentication of the submission content does not pass through.
In one embodiment, copyright authentication device can also include synchronization unit;The synchronization unit is used for: when the throwing
When the copyright authentication of original text content passes through, by the characteristic information and copyright ownership information of the submission content, it is synchronized to the area
In the block data of all nodes of block chain.
In one embodiment, copyright authentication device can also include modification authentication unit;The modification authentication unit is used
In:
The copyright for receiving object content modifies request, and the copyright modification request carries the object content needs and is modified as
Target copyright attaching information;
It is modified and is requested according to the copyright, the copyright modification that the second node into block chain broadcasts the object content is tested
Card request;
It receives the copyright that the second node is returned based on copyright modification checking request and modifies verification result;According to institute
Copyright modification verification result and the target copyright attaching information are stated, is modified to the copyright ownership information of object content.
In addition, the embodiment of the present invention also provides a kind of storage medium, it is stored thereon with computer program, wherein the meter
It realizes when calculation machine program is executed by processor such as the step of any copyright authentication method provided in an embodiment of the present invention.
In addition, the embodiment of the present invention also provides a kind of computer equipment, including memory, processor and it is stored in memory
Computer program that is upper and can running on a processor, wherein the processor is realized when executing described program as the present invention is real
The step of any copyright authentication method of example offer is provided.
The embodiment of the invention provides by block chain first node execute copyright authentication method, specifically, obtain to
The submission content of verifying;Feature extraction is carried out to the submission content, obtains the target signature information of the submission content;Work as institute
When stating in the block data of first node there is no characteristic information identical with the target signature information, into block chain the
Described in two node broadcasts contribute content copyright authentication request, wherein the second node be block chain in except first node with
Outer node, the block data include the characteristic information of existing copyright ownership content;The second node is received based on described
The copyright authentication result that copyright authentication request returns;Copyright authentication based on second node return is as a result, to the submission
Content carries out copyright authentication.The program can realize the copyright authentication of decentralization based on block chain, can be effectively avoided one
The problems such as original text is thrown more and carries submission, and the problem of copyright data is distorted can also be evaded, therefore, copyright authentication can be promoted
Accuracy and confidence level.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 a is the schematic diagram of a scenario of copyright authentication method provided in an embodiment of the present invention;
Fig. 1 b is the flow chart of copyright authentication method provided in an embodiment of the present invention;
Fig. 1 c is the overall flow schematic diagram of copyright authentication provided in an embodiment of the present invention;
Fig. 2 a is the configuration diagram of copyright authentication provided in an embodiment of the present invention;
Fig. 2 b is another flow diagram of copyright authentication method provided in an embodiment of the present invention;
Fig. 2 c is another schematic diagram of a scenario of copyright authentication provided in an embodiment of the present invention;
Fig. 3 a is the structural schematic diagram of copyright authentication device provided in an embodiment of the present invention;
Fig. 3 b is another structural schematic diagram of copyright authentication device provided in an embodiment of the present invention;
Fig. 3 c is another structural schematic diagram of copyright authentication device provided in an embodiment of the present invention;
Fig. 3 d is another structural schematic diagram of copyright authentication device provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
Before to the embodiment of the present invention carrying out that explanation is explained in detail, first to the present embodiments relate to some names arrived
Word is explained.
Copyright authentication refers to: to the verification operation of the copyright of some contents in block catenary system, such as the version of original text content
Power verifying, modification verifying of content copyright etc..
Block chain: block chain technology is derived from bit coin technology, is the Floor layer Technology of bit coin, is point of decentralization
Cloth account book database.Block chain itself is a string using the associated data block (i.e. block) generated of cryptographic algorithm, each
The information that multiple block chain network transaction effectively confirms is contained in a data block.It is based on this, so can not be by distorting
Data on block are practised fraud, it can be ensured that the data on any block are open and clear, it is ensured that the peace of data
Quan Xing.
Block chain can be divided into publicly-owned chain, privately owned chain, alliance's chain.Wherein, alliance's chain then between publicly-owned chain and privately owned chain it
Between, cooperated to safeguard a block chain together by several tissues, the use of the block chain must be the management having permission, relevant information
It can be protected, it is typical such as financial institution.In summary, block chain is the distributed data base system participated in by node, alternatively,
The also referred to as one public account book of distribution based on P2P (point-to-point) network, its main feature is that can not change, can not forge,
It can also be understood as account book system.
The node of block chain: the equipment for participating in building block chain, for example, participating in the meter of each content industry of building block chain
Machine equipment is calculated, which can be single computer unit such as the single server of some content industry, or
The computer equipment cluster such as server cluster of some content industry.The node of block chain can be the execution master of copyright authentication
Business such as transaction etc. may be implemented in interaction between body, node.The node is stored with Correlation block data, for example, the block data
It may include data such as transaction record etc..
A kind of copyright authentication method, apparatus, computer equipment and storage provided in an embodiment of the present invention will be introduced under connecing to be situated between
Matter.Wherein, which can integrate in the node of block chain, which can be with individual server, or
Server cluster.
With reference to Fig. 1 a, the embodiment of the invention provides the contribution system based on block chain, which may be implemented content throwing
The business such as original text business, the copyright authentication business for content of contributing.The system may include multiple nodes 10, wherein multiple nodes it
Between pass through network connection.
Each node device 10 can be used for contributing content copyright authentication, reward provide etc., can be used as block chain
Accounting nodes, for the Transaction Information during store transaction, and timing is updated, so that other nodes in implementation environment
Transaction Information can be shared, so that each node can provide compliance check for Transaction Information, improves Transaction Information
Safety, e.g., when copyright authentication is completed, which can be according to node identification (such as network of each node
Address) Transaction Information is shared into the block data of each node.
In content submission scene, the submission content that the available terminal of node such as mobile phone 11 or computer 12 are sent is right
The submission content carries out feature extraction, obtains the target signature information of the submission content;According to the target signature information
Characteristic query is carried out to the block data of this node 10 (i.e. first node), the block data includes existing copyright ownership content
Characteristic information;When not inquiring in the block data in the presence of characteristic information identical with the target signature information, to
The copyright authentication request of other nodes 10 (i.e. second node) broadcast submission content in block chain in addition to the node 10;
Receive the copyright authentication result that other nodes 10 are returned based on the checking request;The copyright returned based on other described nodes 10
Verification result carries out copyright authentication to the submission content.
In addition, this node 10 is rewarded to terminal granting, when the version of submission content when the copyright authentication for content of contributing passes through
When power verifying does not pass through, the refusal submission content of this node 10.
It is described in detail separately below.It should be noted that the following description sequence is not as excellent to embodiment
The restriction of choosing sequence.
The embodiment of the present invention will be described from the angle of copyright authentication device, which can integrate in area
In the arbitrary node of block chain, which can be individual server or server cluster.
Wherein, block chain can be alliance's chain (i.e. alliance's block chain), for example, can be to be closed together by several content industries
Make the alliance's chain chain safeguarded, alliance's chain is by the equipment of multiple content industries by agreement building.Wherein, the node in alliance's chain can
Think the single device or device clusters of content industry.The copyright authentication device of the embodiment of the present invention can integrate in alliance
Arbitrary node in chain.In one embodiment, alliance's chain can also be by content monitoring part or third party's independence notary organization group
At.
A kind of copyright authentication method provided in an embodiment of the present invention, this method can be by first in block chain such as alliance's chain
The processor of node executes, which can be arbitrary node in block chain;As shown in Figure 1 b, the copyright authentication method
Detailed process can be such that
101, submission content to be verified is obtained.
Wherein, the content that submission content can contribute for user to content industry, content service platform, the content can be
User creates the content generated, i.e. UGC.
Wherein, the content type for content of contributing can there are many, for example, image, video (such as short-sighted frequency), article class
Type.
For example, the available submission video to be verified of block chain interior joint.
Wherein, submission content can be sent by user terminal or other nodes, for example, terminal can in submission scene
To send submission content to the node of block chain, which is submission content to be verified, at this point it is possible to obtain terminal
The submission content to be verified sent.
102, feature extraction is carried out to submission content, obtains the target signature information of submission content.
Wherein, target signature information is the characteristic information of submission content, for uniquely characterizing content of contributing.
Wherein, the feature extraction mode for content of contributing can there are many, for example, can using deep learning network to submission
Content carries out feature extraction;Specifically, feature can be carried out to submission content using convolutional layer in deep learning network model to mention
It takes, obtains convolution characteristic information, which is target signature information.
For another example, digest calculations can be carried out to submission content using Message Digest 5, to obtain submission content
Characteristic information.
Specifically, step " carrying out feature extraction to submission content, obtain the target signature information of submission content ", can wrap
It includes:
Digest calculations are carried out to submission content, the cryptographic Hash of submission content are obtained, such as the cryptographic Hash of regular length;
The target signature information of submission content is constructed based on cryptographic Hash.
For example, in one embodiment, it can be by cryptographic Hash directly as the target signature information of submission content, for example, will
It contributes characteristic information of the regular length cryptographic Hash as the short-sighted frequency of contributing of short-sighted frequency.
Wherein, Message Digest 5 can select according to actual needs, for example, can for SHA-512, MD5, SHA-1,
The digest algorithms such as SHA-256.
For example, digest calculations can be carried out to submission content using SHA-512, obtains the HASH that length is 512 and (breathe out
It is uncommon) value, using 512 HASH (Hash) value as the characteristic information of submission content.
103, when characteristic information identical with target signature information is not present in the block data of first node, to block
In chain second node broadcast submission content copyright authentication request, wherein second node be block chain in except first node with
Outer node, block data include the characteristic information of existing copyright ownership content.
Wherein, the block data in block chain such as alliance's chain can be the metadata in block chain such as alliance's chain, have recorded
The characteristic information of existing copyright ownership content and the copyright ownership information of existing copyright ownership content;For example, block data can
To include characteristic information and the copyright ownership information of short-sighted frequency etc. of short-sighted frequency.
For example, in one embodiment, block data may include a plurality of transaction record, every transaction record may include two
A field (field length can be set according to actual needs, such as 512 fields), is characteristic information field one by one, deposits
Substantial characteristic information (cryptographic Hash that such as length is 512) is stored up, for characterizing for example short-sighted frequency of only one content;Another
It is copyright ownership information field, for characterizing the copyright ownership of for example short-sighted frequency of the content.Each transaction record all indicates one
For example short-sighted frequency copyright information of content.
Wherein, having copyright ownership content is to have possessed the content of copyright ownership, can be the UGC of other users submission
The content etc. of content, content industry oneself creation.Wherein, copyright ownership information may include user belonging to content copyright,
The information such as manufacturer.
In one embodiment, it can be determined by way of inquiry in block data with the presence or absence of identical characteristic information;
For example, characteristic query can be carried out to the block data of first node according to target signature information, when not inquiring first node
Block data in exist characteristic information identical with target signature information when, determine and be not present in the block data of first node
Characteristic information identical with target signature information.Conversely, determining there is feature identical with target signature information when inquiring
Information.
For example, characteristic query can be carried out, in block data so as to interrogation zone using target signature information as query object
Block number whether there is characteristic information identical with target signature information in, to realize the copyright inspection of submission content.
Wherein, copyright authentication request can initiate the transaction request of transaction broadcast for block chain interior joint, and copyright authentication is asked
Ask the characteristic information (such as the cryptographic Hash for content of contributing) that can carry submission content and the copyright ownership information (identity of such as contributor
Information, identity information of content industry etc.).
Copyright authentication request can serve to indicate that second node carries out copyright authentication to submission content, for example, instruction the
With the presence or absence of characteristic information identical with the submission characteristic information of content in two querying node block datas, and if it exists, then return
The unacceptable copyright authentication of copyright authentication is as a result, if it does not exist, then return to the copyright authentication result that copyright authentication passes through.
In one embodiment, the second node for participating in verifying copyright authentication can be selected from block chain according to actual needs
It selects, can be the preparatory node in the common recognition mechanism of participation copyright authentication.
It,, can be in block data after the characteristic information for obtaining submission content in the embodiment of the present invention with reference to Fig. 1 c
Inquiry whether there is same characteristic features information, realize the copyright inspection to submission content, when not inquiring same characteristic features information, tentatively
Illustrate that submission content can also not have copyright ownership, it may be possible to which original content needs further to carry out copyright and deposits card operation.
Wherein, copyright deposits card operation i.e. are as follows: the copyright authentication request of the second node broadcast submission content into block chain,
The copyright authentication returned based on second node is as a result, carry out copyright authentication to submission content;When copyright authentication passes through, i.e., copyright is deposited
It demonstrate,proves successfully, otherwise copyright deposits card failure.
104, the copyright authentication result that second node is returned based on copyright authentication request is received.
Wherein, the copyright authentication result that second node returns includes that copyright authentication passes through or copyright authentication does not pass through.
Wherein, the second node in block chain can parse publishing right and test after the copyright authentication request for receiving broadcast
Then the target signature information of submission content in card request is inquired in block data with the presence or absence of the feature with submission content
The identical characteristic information of information, and if it exists, then return to the unacceptable copyright authentication of copyright authentication as a result, if it does not exist, then returning
The copyright authentication result that copyright authentication passes through.
105, the copyright authentication based on second node return is as a result, carry out copyright authentication to submission content.
Wherein, based on copyright authentication result to there are many verification modes of submission content, for example, in one embodiment, when
All copyright authentication results returned are to determine that the copyright authentication of submission content passes through when being verified, otherwise do not pass through.
For example, in one embodiment, in order to promote the success rate of copyright authentication, the copyright authentication knot of return can also be counted
Fruit is the second node quantity being verified, and is verified based on the second node quantity.Specifically, step " is based on second node
The copyright authentication that equipment returns is as a result, carry out copyright authentication to submission content ", may include:
The copyright authentication result that statistics returns is the second node quantity being verified;
Copyright authentication is carried out to submission content according to second node quantity.
In one embodiment, after first node receives the copyright authentication result that second node returns, first node can
To count the quantity for the second node that copyright authentication result is " being verified ".For example, it is assumed that first node is into block chain 100
A second node broadcasting copyright checking request, this 100 second nodes respectively can request progress copyright to be tested according to copyright authentication
Card, and return to copyright authentication result to first node (result includes " being verified " or " verifying does not pass through ");Assuming that wherein
The copyright authentication result for having 80 second nodes to return is " being verified ".First node can count copyright authentication result
The second node quantity of " being verified ", at this time as 80.
For example, in one embodiment, when second node quantity is greater than preset quantity, determining the copyright authentication of submission content
Pass through, when second node data are not more than preset quantity, determines that the copyright authentication of submission content does not pass through.The preset quantity can
To set according to actual needs, for example, can be set based on block chain interior joint total quantity.
For another example, in one embodiment, the quantitative proportion that can calculate the second node being verified is tested based on ratio
Card.Specifically, step " according to second node quantity to submission content carry out copyright authentication ", may include:
Calculate the quantitative proportion of second node total quantity in the block chain of second node quantity occupied area;
When quantitative proportion is greater than preset threshold, determine that the copyright authentication of submission content passes through;
When quantitative proportion is not more than preset threshold, determine that the copyright authentication of submission content does not pass through.
Wherein, preset threshold can be set according to actual needs, for example, 80%, 90% etc..For example, working as verification result
Second node quantity to be verified is more than 80%, determines that the copyright of submission content passes through, demonstrate,proves successfully at this point, copyright is deposited;If
It is not above 80%, determines that the copyright of submission content does not pass through, at this point, copyright deposits card failure.
In the embodiment of the present invention, when the current copyright authentication for contributing for example short-sighted frequency of content passes through, then it can receive submission, and
Submission reward is provided to contributor.
In one embodiment, when the copyright authentication for content of contributing passes through, by the characteristic information and copyright of content of contributing
Attaching information is synchronized in the block data of all nodes of block chain, to guarantee the synchronism of data, promotes the following copyright authentication
Efficiency, accuracy and confidence level.
In one embodiment, when inquiring in block data in the presence of characteristic information identical with target signature information, really
Surely the copyright authentication for content of contributing does not pass through.
With reference to Fig. 1 c, in the embodiment of the present invention, after the characteristic information for obtaining submission content, can in block counts it is investigated that
It askes and whether there is same characteristic features information, realize that the copyright inspection to submission content illustrates to throw when inquiring same characteristic features information
Situations such as original text content has copyright ownership, which may be non-original works or there are multiple contributions, determines at this time
The copyright inspection of submission content passes through, and refuses the submission.
According to foregoing description, with reference to Fig. 1 c, with content of contributing be short-sighted frequency, block chain is to be constructed jointly by short video producer
Alliance's chain for, using present invention method, when the corresponding node of short video producer receives the submission of short video user,
The characteristic information of short-sighted frequency can be calculated first, the block data of alliance's chain is then inquired, if identical feature can be inquired
Information then illustrates that the short-sighted frequency has had copyright ownership, is non-original works or multiple contribution, can refuse the throwing at this time
Original text.If not inquiring characteristic information, illustrate to be original works, then carries out copyright and deposit card operation, is i.e. node initiates transaction
Broadcast, the number of nodes to be transacted having confirmed that are more than after 80%, then it is assumed that copyright, which is deposited, to be demonstrate,proved successfully, receives submission at this time, and to throwing
Original text person provides submission reward.
On the basis of the above, in order to avoid content industry distorts copyright data, the confidence level of copyright authentication is promoted, this
The common recognition mechanism that inventive embodiments are also based on block chain verifies copyright modification.Specifically, embodiment of the present invention side
Method further include:
The copyright for receiving object content modifies request, and copyright modification request carries the target version that object content needs to be modified as
Weigh attaching information;
It is modified and is requested according to copyright, the copyright of the second node broadcast target content into block chain modifies checking request;
It receives the copyright that second node is returned based on copyright modification checking request and modifies verification result;It is tested according to copyright modification
Result and target copyright attaching information are demonstrate,proved, is modified to the copyright ownership information of object content.
Wherein, object content is the content for needing to modify copyright attaching information, such as needs the short of revision power attaching information
Video etc..
Wherein, copyright modification request can be sent by the equipment such as server of content industry, for example, content industry needs are repaired
When changing the copyright ownership information of some content, copyright modification can be sent to the node of block chain by the equipment of content industry and asked
Ask, the copyright modification request can carry need by the content modification at copyright ownership information.
In implementing one, after the node of block chain receives copyright modification request, version can be triggered according to the request
Weight update verifying, i.e., other node broadcasts copyrights modify checking request into block chain, which can carry the feature of content
The copyright ownership information that information and needs are modified as.
Other nodes can carry out copyright authentication verifying, specifically, Ke Yigen after receiving copyright modification checking request
Block data is inquired according to the characteristic information of content, obtains the corresponding copyright ownership information of this feature information;Then, it will inquire
Copyright ownership information is compared with the copyright ownership information being modified as is needed, if inconsistent, returns to copyright modification verifying not
By verification result initiate node to request, if unanimously, returning to verification result that the modification of determining copyright is verified to asking
Seek initiation node.
Node is initiated in request, after receiving the copyright modification verification result of other nodes return,
It can determine that this modification copyright verifies whether to pass through based on the verification result of return, if passing through, according to target
Copyright ownership information modifies to the copyright ownership information of object content, if not passing through, refuses to modify.In addition, at this
In the case that modification copyright is verified, it is also necessary to the copyright after the modification of the synchronous object content of other block datas into block chain
Attaching information.
Specifically, determine that this modification verifies whether that above-mentioned version can be referred to by way of based on the verification result of return
Weigh verifying mode, for example, statistics copyright modification verification result be by second node quantity, it is true according to second node quantity
The copyright modification for determining content verifies whether to pass through.
For example, when some short video producer needs the copyright ownership by some short-sighted frequency to distort for oneself, using this hair
The method that bright embodiment provides can find this time to distort, while have rejected and this time distorting by the common recognition mechanism of block chain.
From the foregoing, it will be observed that the embodiment of the present invention obtains submission content to be verified by first node in block chain;To submission
Content carries out feature extraction, obtains the target signature information of submission content;According to target signature information to the block of first node
Data carry out characteristic query, and block data includes the characteristic information of existing copyright ownership content;When the block data of first node
In be not present characteristic information identical with target signature information when, into block chain second node broadcast submission content copyright
Checking request, wherein second node is the node in block chain in addition to first node, and block data includes existing copyright ownership
The characteristic information of content;Receive the copyright authentication result that second node is returned based on copyright authentication request;It is returned based on second node
The copyright authentication returned is as a result, carry out copyright authentication to submission content.The program can realize the version of decentralization based on block chain
Power verifying the problems such as multiple contribution can be effectively avoided and carry submission, and can also evade the problem of copyright data is distorted,
Therefore, the safety of the accuracy of copyright authentication, confidence level and copyright data can be promoted.
On the basis of above-described embodiment description, alliance's chain interior joint, content will be integrated in copyright authentication device below
For the copyright authentication method of the embodiment of the present invention is discussed in detail for short-sighted frequency:
One, alliance's chain building:
Firstly the need of one alliance's chain of building, the node in alliance's chain corresponds to short video producer, for example, in alliance's chain
Node can be realized by the server or server cluster of short video producer.Each short video producer is carrying out short video copy
When inspection and copyright deposit card, operated by the node of oneself.Wherein, each node is corresponding with block data, block data
In include transaction record, which includes the field that two length are 512, and one is characteristic information field, is stored short
The characteristic information of video, for characterizing the short-sighted frequency of only one;The other is copyright ownership information field, is stored with short-sighted frequency
Copyright ownership information, for characterizing the copyright ownership of the short-sighted frequency;Wherein, each transaction record all indicates a short-sighted frequency
Copyright information.
It is the alliance's chain constructed by each short video producer with reference to Fig. 2 a, the node in alliance's chain corresponds to short-sighted frequency
Manufacturer can be realized by the server of short video producer.For example, each node in alliance's chain corresponds respectively to short video producer
1、2、3、4、5。
Two, after constructing alliance's chain, copyright authentication can be carried out using alliance's chain:
As shown in Figure 2 b, a kind of copyright authentication method is provided, detailed process is as follows:
201, contributor's terminal short-sighted frequency of the short corresponding first node transmission submission of video producer into alliance's chain.
Wherein, first node is the corresponding node of short video producer currently contributed in alliance's chain about contributor.
It, can be by terminal to short when contributor contributes short-sighted frequency to short 5 platform of video producer for example, with reference to Fig. 2 a
The corresponding alliance's chain node of video producer 5 sends short-sighted frequency of contributing.
202, first node carries out feature calculation to the short-sighted frequency of contributing, the target signature information for the short-sighted frequency that obtains contributing.
For example, the short video files data of submission can be carried out with digest calculations, digest algorithm selects SHA-512, obtains
The HASH value that length is 512, which is the characteristic information of short-sighted frequency.
203, first node carries out characteristic query to block data according to target signature information.
Believe for example, second node can be inquired in block data with the presence or absence of feature identical with target signature information
Breath.
204, when not inquiring characteristic information identical with target signature information, first node into alliance's chain second
Node broadcasts carry the copyright authentication request of target signature information.
Wherein, second node is the arbitrary node in alliance's chain in addition to first node.For example, removing short-sighted frequency in alliance's chain
Node other than the corresponding node of manufacturer 5, such as the corresponding node of short-sighted frequency 1,2,3,4.
For example, after the HASH value for calculating short-sighted frequency of contributing, can be being inquired in block data with reference to Fig. 2 b
It is no that there is identical HASH value;If no, if not inquiring the record of identical HASH value, then it is assumed that be original works, send out at this time
It plays copyright and deposits card.Copyright deposits card process with reference to step 204-207.
For example, the corresponding first node of short video producer 5, initiates transaction broadcast, the spy of transaction request in alliance's chain
Sign information field fills the HASH value of the short-sighted frequency of the submission, and copyright ownership information field fills the identity information of oneself, such as factory
Quotient's title etc..Based on common recognition mechanism, other nodes in alliance's chain will do it broadcast trade confirmation, true based on transaction to be broadcast
Recognize number of nodes and determines whether to deposit end of certificate at for example, transaction to be broadcast has confirmed that number of nodes is more than after 80%, so that it may think
Deposit end of certificate at, otherwise deposit card do not complete.
205, first node receives the copyright authentication result that second node is returned based on copyright authentication request.
Second node, can be according to the request after receiving the copyright authentication request of first node broadcast in alliance's chain
Its corresponding block data is inquired, is determined in block data with the presence or absence of the same characteristic features information for short-sighted frequency of contributing, and if it exists, then
The unacceptable copyright authentication result of copyright authentication is returned to first node, if it does not exist, then returns to the copyright that copyright authentication passes through
Verification result is to first node.
206, the copyright authentication result that first node statistics returns is the second node quantity being verified.
207, first node determines whether the copyright authentication for short-sighted frequency of contributing passes through according to second node quantity.
For example, calculating the quantitative proportion of second node total quantity in the block chain of second node quantity occupied area;When quantitative proportion is big
When preset ratio, determine that the copyright authentication for short-sighted frequency of contributing passes through;Otherwise determine that the copyright authentication for short-sighted frequency of contributing does not pass through.
When copyright authentication passes through, then it is assumed that copyright, which is deposited, to be demonstrate,proved successfully or complete, when copyright authentication does not pass through, then it is assumed that version
Power is deposited card failure or is not completed.
208, when inquiring characteristic information identical with target signature information, first node determines the version for short-sighted frequency of contributing
Power verifying does not pass through.
For example, after calculating HASH value, by the node of oneself, carrying out alliance's chain block Transaction Information with reference to Fig. 2 b and looking into
It askes, if inquiring the record with identical HASH value, illustrates that the short-sighted frequency has had copyright ownership, user's submission is non-
Original works either multiple contribution, contribution system refuses submission request at this time.
Alternatively, deposit card do not complete when, determine that copyright authentication does not pass through, at this time contribution system refuse the submission request.
With reference to Fig. 2 b, passes through in the copyright authentication for short-sighted frequency of contributing, determine after the completion of depositing card, contribution system receives the throwing
Original text, and submission reward is provided to contributor.
Using copyright authentication method provided in an embodiment of the present invention, it can use the weak centerization of alliance's chain and can not distort
Property, it by establishing the short video feature information of alliance, certification authority chained record, and is linked into the short-sighted frequency contribution system of UGC, to subtract
The phenomenon that few multiple contribution and carrying submission, while reducing the probability of dispute over copyright.
For example, in alliance's chain, having accessed " short video producer 1 ", " short video producer 2 ", " short video producer with reference to Fig. 2 c
3 ", " short video producer 4 ", " short video producer 5 " five short video producers.
Normal submission scene:
A. contributor A has taken a short-sighted frequency VidA, and contributes and arrive short video producer platform 3.
B. after short video producer platform 3 receives submission, copyright inspection is carried out into alliance's chain.
C. alliance's chain copyright inspection passes through, and initiates alliance's chain copyright and deposits card.
D. alliance's chain copyright is deposited card and is passed through, and short video producer platform 3 receives submission.
E. contributor A receives the submission reward that short video producer platform 3 is provided.
Carry submission scene:
A. contributor B has downloaded a short-sighted frequency VidB from short video producer platform 4, and then submission is flat to short video producer
Platform 1.
B. after short video producer platform 1 receives submission, copyright inspection is carried out into alliance's chain.
C. alliance's chain copyright inspection does not pass through, the short refusal of video producer platform 1 submission.
Multiple contribution scene:
A. short video producer platform 4 has taken a short-sighted frequency VidC, and then submission is " short to short video producer platform simultaneously
Video producer platform 3 and short video producer platform 4.
B. after short video producer platform 3 and short video producer platform 4 receive submission, copyright inspection is carried out into alliance's chain respectively
It looks into.
C. alliance's chain copyright inspection of the two passes through, and alliance's chain copyright is initiated with the latter two and deposits card.
D. the copyright of short video producer platform 4 deposits card and completes early, therefore short video producer platform 4 than short video producer platform 3
Copyright is deposited card and is passed through, and short 3 copyright of video producer platform deposits card failure.
E. short video producer platform 4 receives submission, the short refusal of video producer platform 3 submission.
F. contributor C receives the submission reward of short video producer platform 4.
Scene is distorted privately by manufacturer
A. the copyright ownership that short video producer 2 distorts short-sighted frequency VidD privately is oneself, and synchrodata is into alliance's chain.
B. the common recognition mechanism of alliance's chain, which has found, this time distorts, while having rejected and this time distorting.
From the foregoing, it will be observed that the embodiment of the invention provides a kind of short-sighted frequency contribution system of the UGC of weak center's copyright authentication, it should
The problem of system can be effectively prevented from multiple contribution and carry submission improves short-sighted frequency submission reliability, to reduce nothing
Effect submission expense expenditure, also reduce the probability of dispute over copyright, at the same have benefited from contribute reliability raising, submission audit and
Submission reward provide can full-automatic process, optimization submission experience reduces artificial expenditure.In order to better implement with top
Method, correspondingly, the embodiment of the present invention also provides a kind of copyright authentication device, which specifically be can integrate in block
In the arbitrary node of chain, node can be individual server or server cluster.
For example, as shown in Figure 3a, which may include acquiring unit 301, feature extraction unit 302, wide
Unit 303, receiving unit 304 and copyright authentication unit 305 are broadcast, as follows:
Acquiring unit 301, for obtaining submission content to be verified;
Feature extraction unit 302 obtains the target of the submission content for carrying out feature extraction to the submission content
Characteristic information;
Radio unit 303, for when there is no identical with the target signature information in the block data of first node
When characteristic information, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein second section
Point is the node in block chain in addition to first node, and the block data includes the characteristic information of existing copyright ownership content;
Receiving unit 304, the copyright authentication knot returned for receiving the second node based on copyright authentication request
Fruit;
Copyright authentication unit 305, the copyright authentication for being returned based on the second node is as a result, to the submission content
Carry out copyright authentication.
In one embodiment, with reference to Fig. 3 b, the copyright authentication unit 305 may include:
Subelement 3051 is counted, is the second node quantity being verified for counting the copyright authentication result returned;
Copyright authentication subelement 3052 is tested for carrying out copyright to the submission content according to the second node quantity
Card.
In one embodiment, the copyright authentication subelement 3052, is used for: calculating second node quantity and accounts for the block chain
The quantitative proportion of middle second node total quantity;When the quantitative proportion is greater than preset threshold, the version of the submission content is determined
Power is verified;When the quantitative proportion is not more than preset threshold, determine that the copyright authentication of the submission content does not pass through.
In one embodiment, the feature extraction unit 302 is obtained for carrying out digest calculations to the submission content
The cryptographic Hash of the submission content;The target signature information of the submission content is constructed based on the cryptographic Hash.
In one embodiment, the copyright authentication unit 305 is also used to exist when in the block data of the first node
When characteristic information identical with the target signature information, determine that the copyright authentication of the submission content does not pass through.
In one embodiment, with reference to Fig. 3 c, copyright authentication device can also include synchronization unit 306;The synchronization unit
306 are used for: when the copyright authentication of the submission content passes through, the characteristic information of the submission content and copyright ownership being believed
Breath, is synchronized in the block data of all nodes of block chain.
In one embodiment, with reference to Fig. 3 d, copyright authentication device can also include modification authentication unit 307;The modification
Authentication unit 307, is used for:
The copyright for receiving object content modifies request, and the copyright modification request carries the object content needs and is modified as
Target copyright attaching information;
It is modified and is requested according to the copyright, the copyright modification that the second node into block chain broadcasts the object content is tested
Card request;
It receives the copyright that the second node is returned based on copyright modification checking request and modifies verification result;According to institute
Copyright modification verification result and the target copyright attaching information are stated, is modified to the copyright ownership information of object content.
When it is implemented, above each unit can be used as independent entity to realize, any combination can also be carried out, is made
It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not
It repeats again.
From the foregoing, it will be observed that the copyright authentication device of the present embodiment can be by acquiring unit 301 in obtaining submission to be verified
Content;Then, feature extraction is carried out to the submission content by feature extraction unit 302, obtains the target of the submission content
Characteristic information;When there is characteristic information identical with the target signature information in the block data of the first node, by
Second node of the radio unit 303 into block chain broadcasts the copyright authentication request of the submission content, wherein second section
Point is the node in block chain in addition to first node, and the block data includes the characteristic information of existing copyright ownership content;
The copyright authentication result that the second node is returned based on copyright authentication request is received by receiving unit 304;It is tested by copyright
The copyright authentication that card unit 305 is returned based on the second node is as a result, to submission content progress copyright authentication.The program
The copyright authentication that decentralization can be realized based on block chain, the problems such as multiple contribution can be effectively avoided and carry submission,
And the problem of copyright data is distorted can also be evaded, therefore, the accuracy and confidence level of copyright authentication can be promoted.
In addition, the embodiment of the present invention also provides a kind of computer equipment, as shown in figure 4, it illustrates the embodiment of the present invention
The structural schematic diagram of related computer equipment, specifically:
The computer equipment may include the processor 401, one or one of one or more than one processing core with
The components such as memory 402, power supply 403 and the input unit 404 of upper computer readable storage medium.Those skilled in the art can be with
Understand, computer equipment structure shown in Fig. 4 does not constitute the restriction to computer equipment, may include than illustrate it is more or
Less component perhaps combines certain components or different component layouts.Wherein:
Processor 401 is the control centre of the computer equipment, is set using various interfaces and the entire computer of connection
Standby various pieces, by running or executing the software program and/or module that are stored in memory 402, and calling storage
Data in memory 402 execute the various functions and processing data of computer equipment, to carry out to computer equipment whole
Body monitoring.Optionally, processor 401 may include one or more processing cores;Preferably, processor 401 can integrate at
Manage device and modem processor, wherein the main processing operation system of application processor, user interface and application program etc. are adjusted
Demodulation processor processed mainly handles wireless communication.It is understood that above-mentioned modem processor can not also integrate everywhere
It manages in device 401.
Memory 402 can be used for storing software program and module, and processor 401 is stored in memory 402 by operation
Software program and module, thereby executing various function application and data processing.Memory 402 can mainly include storage journey
Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function
Such as sound-playing function, image player function) etc.;Storage data area can be stored to be created according to using for computer equipment
Data etc..In addition, memory 402 may include high-speed random access memory, it can also include nonvolatile memory, such as
At least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 402 can be with
Including Memory Controller, to provide access of the processor 401 to memory 402.
Computer equipment further includes the power supply 403 powered to all parts, it is preferred that power supply 403 can pass through power supply pipe
Reason system and processor 401 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.Power supply 403 can also include one or more direct current or AC power source, recharging system, power failure inspection
The random components such as slowdown monitoring circuit, power adapter or inverter, power supply status indicator.
The computer equipment may also include input unit 404, which can be used for receiving the number or word of input
Information is accorded with, and generates keyboard related with user setting and function control, mouse, operating stick, optics or trace ball letter
Number input.
Although being not shown, computer equipment can also be including display unit etc., and details are not described herein.Specifically in the present embodiment
In, computer equipment can be used as any node in block chain, such as first node.401 meeting of processor in computer equipment
According to following instruction, the corresponding executable file of the process of one or more application program is loaded into memory
In 402, and the application program being stored in memory 402 is run by processor 401, thus realize various functions, it is as follows:
Obtain submission content to be verified;Feature extraction is carried out to the submission content, obtains the mesh of the submission content
Mark characteristic information;When there is no characteristic informations identical with the target signature information in the block data of the first node
When, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein the second node is block
Node in chain in addition to first node, the block data include the characteristic information of existing copyright ownership content;Described in reception
The copyright authentication result that second node is returned based on copyright authentication request;The copyright authentication returned based on the second node
As a result, carrying out copyright authentication to the submission content.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
From the foregoing, it will be observed that the computer equipment of the present embodiment can be used as the node such as first node in block chain, the calculating
The available submission content to be verified of machine equipment;Feature extraction is carried out to the submission content, obtains the submission content
Target signature information;When there is no characteristic informations identical with the target signature information in the block data of the first node
When, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein the second node is block
Node in chain in addition to first node;Receive the copyright authentication knot that the second node is returned based on copyright authentication request
Fruit;The copyright authentication returned based on the second node is as a result, carry out copyright authentication to the submission content.The program can be with base
The problems such as realizing the copyright authentication of decentralization in block chain, multiple contribution can be effectively avoided and carry submission, and may be used also
To evade the problem of copyright data is distorted, therefore, the accuracy and confidence level of copyright authentication can be promoted.
It will appreciated by the skilled person that all or part of the steps in the various methods of above-described embodiment can be with
It is completed by instructing, or relevant hardware is controlled by instruction to complete, which can store computer-readable deposits in one
In storage media, and is loaded and executed by processor.
For this purpose, the embodiment of the present invention also provides a kind of storage medium, wherein being stored with a plurality of instruction, which can be located
Reason device is loaded, to execute the step in any copyright authentication method provided by the embodiment of the present invention.For example, the instruction
Following steps can be executed:
Obtain submission content to be verified;Feature extraction is carried out to the submission content, obtains the mesh of the submission content
Mark characteristic information;When there is no characteristic informations identical with the target signature information in the block data of the first node
When, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein the second node is block
Node in chain in addition to first node, the block data include the characteristic information of existing copyright ownership content;Described in reception
The copyright authentication result that second node is returned based on copyright authentication request;The copyright authentication returned based on the second node
As a result, carrying out copyright authentication to the submission content.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
Wherein, which may include: read-only memory (ROM, Read Only Memory), random access memory
Body (RAM, Random Access Memory), disk or CD etc..
By the instruction stored in the storage medium, any permission pipe provided by the embodiment of the present invention can be executed
Step in reason method, it is thereby achieved that achieved by any copyright authentication method provided by the embodiment of the present invention
Beneficial effect is detailed in the embodiment of front, and details are not described herein.
It is provided for the embodiments of the invention a kind of copyright authentication method, apparatus, computer equipment and storage medium above
It is described in detail, used herein a specific example illustrates the principle and implementation of the invention, the above reality
The explanation for applying example is merely used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art,
According to the thought of the present invention, there will be changes in the specific implementation manner and application range, in conclusion in this specification
Appearance should not be construed as limiting the invention.
Claims (10)
1. a kind of copyright authentication method, which is characterized in that be applied to first node, the first node is any in block chain
Node, comprising:
Obtain submission content to be verified;
Feature extraction is carried out to the submission content, obtains the target signature information of the submission content;
When characteristic information identical with the target signature information is not present in the block data of the first node, to block
Second node in chain broadcasts the copyright authentication request of the submission content, wherein the second node is in block chain except the
Node other than one node, the block data include the characteristic information of existing copyright ownership content;
Receive the copyright authentication result that the second node is returned based on copyright authentication request;
The copyright authentication returned based on the second node is as a result, carry out copyright authentication to the submission content.
2. copyright authentication method as described in claim 1, which is characterized in that the copyright returned based on the second node equipment
Verification result carries out copyright authentication to the submission content, comprising:
The copyright authentication result that statistics returns is the second node quantity being verified;
Copyright authentication is carried out to the submission content according to the second node quantity.
3. copyright authentication method as claimed in claim 2, which is characterized in that according to the second node quantity to the submission
Content carries out copyright authentication, comprising:
Calculate the quantitative proportion that second node quantity accounts for second node total quantity in the block chain;
When the quantitative proportion is greater than preset threshold, determine that the copyright authentication of the submission content passes through;
When the quantitative proportion is not more than preset threshold, determine that the copyright authentication of the submission content does not pass through.
4. copyright authentication method as described in claim 1, which is characterized in that carry out feature extraction to the submission content, obtain
To the target signature information of the submission content, comprising:
Digest calculations are carried out to the submission content, obtain the cryptographic Hash of the submission content;
The target signature information of the submission content is constructed based on the cryptographic Hash.
5. copyright authentication method as described in claim 1, which is characterized in that the method also includes:
When it is described submission content copyright authentication pass through when, by it is described submission content characteristic information and copyright ownership information,
It is synchronized in the block data of all nodes of block chain.
6. copyright authentication method as described in claim 1, which is characterized in that further include:
When there is characteristic information identical with the target signature information in the block data of the first node, described in determination
The copyright authentication of submission content does not pass through.
7. copyright authentication method as described in claim 1, which is characterized in that further include:
The copyright for receiving object content modifies request, and the copyright modification request carries the mesh that the object content needs to be modified as
Mark copyright ownership information;
It is modified and is requested according to the copyright, the copyright modification verifying that the second node into block chain broadcasts the object content is asked
It asks;
It receives the copyright that the second node is returned based on copyright modification checking request and modifies verification result;According to the version
Weight update verification result and the target copyright attaching information, modify to the copyright ownership information of object content.
8. a kind of copyright authentication device, which is characterized in that be applied to first node, the first node is any in block chain
Node, comprising:
Acquiring unit, for obtaining submission content to be verified;
Feature extraction unit obtains the target signature letter of the submission content for carrying out feature extraction to the submission content
Breath;
Radio unit, for when there is no features identical with the target signature information in the block data of the first node
When information, the second node into block chain broadcasts the copyright authentication request of the submission content, wherein the second node is
Node in block chain in addition to first node, the block data include the characteristic information of existing copyright ownership content;
Receiving unit, the copyright authentication result returned for receiving the second node based on copyright authentication request;
Copyright authentication unit, the copyright authentication for being returned based on the second node is as a result, carry out version to the submission content
Power verifying.
9. a kind of storage medium, is stored thereon with computer program, wherein the realization when computer program is executed by processor
Such as the step of any one of claim 1-7 the method.
10. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor
Calculation machine program, wherein the processor is realized when executing described program such as the step of any one of claim 1-7 the method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910570067.1A CN110334484B (en) | 2019-06-27 | 2019-06-27 | Copyright verification method and device, computer equipment and storage medium |
CN201910866030.3A CN110598373B (en) | 2019-06-27 | 2019-06-27 | Copyright verification method, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910570067.1A CN110334484B (en) | 2019-06-27 | 2019-06-27 | Copyright verification method and device, computer equipment and storage medium |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910866030.3A Division CN110598373B (en) | 2019-06-27 | 2019-06-27 | Copyright verification method, system and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110334484A true CN110334484A (en) | 2019-10-15 |
CN110334484B CN110334484B (en) | 2021-07-06 |
Family
ID=68143458
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910570067.1A Active CN110334484B (en) | 2019-06-27 | 2019-06-27 | Copyright verification method and device, computer equipment and storage medium |
CN201910866030.3A Active CN110598373B (en) | 2019-06-27 | 2019-06-27 | Copyright verification method, system and storage medium |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910866030.3A Active CN110598373B (en) | 2019-06-27 | 2019-06-27 | Copyright verification method, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN110334484B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111651171A (en) * | 2020-06-05 | 2020-09-11 | 中国银行股份有限公司 | Interface version deployment method and device, electronic equipment and storage medium |
CN112887763A (en) * | 2019-11-29 | 2021-06-01 | 中国电信股份有限公司 | Information control method, information control system, information control device, and storage medium |
WO2021135641A1 (en) * | 2019-12-31 | 2021-07-08 | 支付宝(杭州)信息技术有限公司 | Blockchain-based digital content evidence collection method, apparatus and device |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117035785A (en) * | 2023-08-09 | 2023-11-10 | 云海链控股股份有限公司 | Block chain consensus method, device, equipment and computer readable storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107967416A (en) * | 2016-10-19 | 2018-04-27 | 华为技术有限公司 | The methods, devices and systems of copyright right-safeguarding detection |
CN108920908A (en) * | 2018-06-28 | 2018-11-30 | 北京京东尚科信息技术有限公司 | Date storage method, device and computer readable storage medium |
CN108989288A (en) * | 2018-06-20 | 2018-12-11 | 佛山科学技术学院 | A kind of mobile digital literary property protection method and device based on block chain |
KR101938878B1 (en) * | 2018-06-14 | 2019-01-15 | 김보언 | System for managing copyright based on blockchain |
CN109582641A (en) * | 2018-10-17 | 2019-04-05 | 北京瑞卓喜投科技发展有限公司 | A kind of screening technique and screening system of the works typing based on block chain |
CN109635521A (en) * | 2018-12-06 | 2019-04-16 | 中链科技有限公司 | A kind of copyright protection based on block chain, verification method and device |
CN109684786A (en) * | 2018-11-05 | 2019-04-26 | 深圳变设龙信息科技有限公司 | A kind of copyright registration method, apparatus and terminal device based on block chain |
CN109815647A (en) * | 2019-01-30 | 2019-05-28 | 京东方科技集团股份有限公司 | Management method, the management system of device, software server and software of software |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108334753B (en) * | 2018-01-04 | 2020-09-11 | 中国银行股份有限公司 | Pirate application verification method and distributed server node |
CN109409136A (en) * | 2018-11-08 | 2019-03-01 | 中链科技有限公司 | Block chain deposits the verification method, device and calculating equipment of card content |
-
2019
- 2019-06-27 CN CN201910570067.1A patent/CN110334484B/en active Active
- 2019-06-27 CN CN201910866030.3A patent/CN110598373B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107967416A (en) * | 2016-10-19 | 2018-04-27 | 华为技术有限公司 | The methods, devices and systems of copyright right-safeguarding detection |
KR101938878B1 (en) * | 2018-06-14 | 2019-01-15 | 김보언 | System for managing copyright based on blockchain |
CN108989288A (en) * | 2018-06-20 | 2018-12-11 | 佛山科学技术学院 | A kind of mobile digital literary property protection method and device based on block chain |
CN108920908A (en) * | 2018-06-28 | 2018-11-30 | 北京京东尚科信息技术有限公司 | Date storage method, device and computer readable storage medium |
CN109582641A (en) * | 2018-10-17 | 2019-04-05 | 北京瑞卓喜投科技发展有限公司 | A kind of screening technique and screening system of the works typing based on block chain |
CN109684786A (en) * | 2018-11-05 | 2019-04-26 | 深圳变设龙信息科技有限公司 | A kind of copyright registration method, apparatus and terminal device based on block chain |
CN109635521A (en) * | 2018-12-06 | 2019-04-16 | 中链科技有限公司 | A kind of copyright protection based on block chain, verification method and device |
CN109815647A (en) * | 2019-01-30 | 2019-05-28 | 京东方科技集团股份有限公司 | Management method, the management system of device, software server and software of software |
Non-Patent Citations (1)
Title |
---|
聂静等: ""基于区块链的数字出版版权保护"", 《出版发行研究》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112887763A (en) * | 2019-11-29 | 2021-06-01 | 中国电信股份有限公司 | Information control method, information control system, information control device, and storage medium |
CN112887763B (en) * | 2019-11-29 | 2022-12-20 | 中国电信股份有限公司 | Information control method, information control system, information control device, and storage medium |
WO2021135641A1 (en) * | 2019-12-31 | 2021-07-08 | 支付宝(杭州)信息技术有限公司 | Blockchain-based digital content evidence collection method, apparatus and device |
CN111651171A (en) * | 2020-06-05 | 2020-09-11 | 中国银行股份有限公司 | Interface version deployment method and device, electronic equipment and storage medium |
CN111651171B (en) * | 2020-06-05 | 2023-03-31 | 中国银行股份有限公司 | Interface version deployment method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110334484B (en) | 2021-07-06 |
CN110598373B (en) | 2021-07-06 |
CN110598373A (en) | 2019-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI694390B (en) | Blockchain-based transaction processing method and device, and electronic equipment | |
CN110334484A (en) | A kind of copyright authentication method, apparatus, computer equipment and storage medium | |
CN110032865A (en) | A kind of right management method, device and storage medium | |
TWI691919B (en) | Blockchain-based transaction processing method and device, and electronic equipment | |
EP3655905B1 (en) | Distributed ledger technology | |
JP2020522927A (en) | Blockchain for general calculation | |
CN107679045A (en) | Copyright authorization management method and system | |
JP7319961B2 (en) | Computer-implemented systems and methods related to binary blockchains forming a pair of coupled blockchains | |
CN110537355A (en) | Consensus based on secure blockchains | |
CN107909369A (en) | Based on the common recognition method, apparatus merchandised across chain and storage medium | |
CN107967416A (en) | The methods, devices and systems of copyright right-safeguarding detection | |
CN109190881A (en) | A kind of data assets management method, system and equipment | |
CN109003185A (en) | A kind of method for building up, device, calculating equipment and the storage medium of intelligence contract | |
CN107079041A (en) | File credit assessment | |
CN110245843B (en) | Information management method and related device based on blockchain | |
WO2020065242A1 (en) | Method and system for transaction processing in decentralized network by network nodes in collaborative decision-making | |
WO2020118859A1 (en) | Decentralized chip research and development transaction data storage method and system | |
WO2022206431A1 (en) | Method and apparatus for querying ledger data of fabric blockchain | |
CN110278246B (en) | Certificate storage service transfer method, device and equipment for alliance chain | |
CN113221191A (en) | Block chain-based data evidence storage method, device, equipment and storage medium | |
CN110062044A (en) | Distributed application program downloads verification method, equipment and storage medium | |
CN110225103B (en) | Service recommendation method, device and equipment | |
CN112052033A (en) | Power distribution automation master station version management method and system based on process and block chain | |
CN111797426A (en) | Distrust notification service | |
WO2022206432A1 (en) | Method and apparatus for querying ledger data in fabric blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40009327 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant |