CN110598376B - Copyright authentication method, device and equipment based on block chain and storage medium - Google Patents

Copyright authentication method, device and equipment based on block chain and storage medium Download PDF

Info

Publication number
CN110598376B
CN110598376B CN201910917288.1A CN201910917288A CN110598376B CN 110598376 B CN110598376 B CN 110598376B CN 201910917288 A CN201910917288 A CN 201910917288A CN 110598376 B CN110598376 B CN 110598376B
Authority
CN
China
Prior art keywords
information processing
processing node
node
copyright authentication
digital work
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910917288.1A
Other languages
Chinese (zh)
Other versions
CN110598376A (en
Inventor
吴楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910917288.1A priority Critical patent/CN110598376B/en
Publication of CN110598376A publication Critical patent/CN110598376A/en
Application granted granted Critical
Publication of CN110598376B publication Critical patent/CN110598376B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The embodiment of the invention discloses a copyright authentication method, a device, equipment and a storage medium based on a block chain, and the embodiment of the invention obtains a copyright authentication request through an information processing node; the information processing node carries out user identity verification according to the copyright authentication request; when the user identity passes verification, the information processing node acquires the digital works corresponding to the copyright authentication request; the information processing node analyzes and confirms the right of the digital work and the digital work with the confirmed right, and confirms the original attribute of the digital work; and the copyright authentication node is used for linking the authentication right-confirming parameters of the digital works and the digital works, authorizing the copyright certificate of the digital works to a user corresponding to the copyright authentication request, and storing and tracing the copyright certificate of the digital works through the source storing and tracing node. The scheme can improve the copyright authentication efficiency and the safety.

Description

Copyright authentication method, device and equipment based on block chain and storage medium
Technical Field
The invention relates to the technical field of block chains, in particular to a copyright authentication method, a copyright authentication device, copyright authentication equipment and a copyright authentication storage medium based on a block chain.
Background
With the development of society, the digital publishing industry has gradually become the mainstream of the publishing industry, the proportion of traditional media is continuously reduced, the new network publishing industry is increasingly strengthened, people pay more and more attention to the protection of copyright, also called copyright, which means the right of an author or other people (including legal people) to enjoy a certain copyright by law. However, the related industry protection measures and technologies do not keep pace with the development of the industry in time. Piracy makes the entire industry costly.
In a traditional copyright registration mode, registration authentication is carried out through a plurality of programs, and the examination period is often long. However, the digital works in the network era have the characteristics of fast propagation and high yield, and the timeliness of the contents can be seriously reduced through long registration link and reissue. Meanwhile, the conventional copyright registration has a high cost, resulting in a low rate of copyright registration and protection.
Namely, the conventional copyright authentication method is difficult to consider both convenience and credibility, the high-credibility authentication mode has long audit period and low credibility, the risks of changing the contents of the works and the registration time exist, and the authentication cost is high.
Disclosure of Invention
Embodiments of the present invention provide a block chain-based copyright authentication method, apparatus, device, and storage medium, which can improve reliability and efficiency of copyright authentication and reduce copyright authentication cost.
In order to solve the above technical problems, embodiments of the present invention provide the following technical solutions:
the information processing node acquires a copyright authentication request;
the information processing node carries out user identity verification according to the copyright authentication request;
the information processing node acquires the digital works corresponding to the copyright authentication request when the user identity authentication passes;
the information processing node analyzes and confirms the digital works and the digital works with the confirmed rights, and confirms the original attributes of the digital works;
and the copyright authentication node is used for carrying out cochain on the authentication right-determining parameters of the digital works and the digital works, and authorizing the copyright certificate of the digital works to a user corresponding to the copyright authentication request, and the copyright certificate of the digital works is subjected to evidence storage and source tracing through the evidence storage and source tracing node.
Optionally, in some embodiments, the analyzing and the determining the right of the digital work and the digital work with the determined right by the information processing node, and determining the originality attribute of the digital work includes:
the information processing node identifies the content of the digital work;
the information processing node judges whether the digital work is illegal according to the identified content of the digital work;
if the information processing node determines that the digital work is not in violation, comparing the digital work with the determined weight to obtain the similarity between the digital work and the digital work with the determined weight;
and the information processing node analyzes and confirms the right according to the similarity and confirms the original attribute of the digital work.
Optionally, in some embodiments, the method includes the steps of performing uplink on the authentication right-determining parameter of the digital work and the digital work through the copyright authentication node, and authorizing the digital work copyright certificate to the user corresponding to the copyright authentication request, and performing certification traceability on the digital work copyright certificate through the certification traceability node, including:
the information processing node sends the name, the size, the completion time and the corresponding user identity information of the digital works to the copyright authentication node so that the copyright authentication node can carry out chain linking and authorize a digital work copyright certificate to a user corresponding to the copyright authentication request;
the information processing node acquires the identifier and the public key of the digital work copyright certificate sent by the copyright authentication node;
the information processing node creates a user account according to the copyright authentication request;
the information processing node calculates the hash value of the digital work and the hash value of the public key of the digital work copyright certificate;
the information processing node associates the name, size, completion time, identification, hash value of the digital work and the hash value of the public key of the digital work copyright certificate to generate a two-dimensional code of the digital work;
the information processing node acquires user private key signature information corresponding to the copyright authentication request;
and the information processing node associates the two-dimension code of the digital work with the signature information of the user private key and then performs evidence storage and source tracing through the evidence storage and source tracing node.
Optionally, in some embodiments, the copyright authentication request includes user identity information, and the information processing node performs user identity verification according to the copyright authentication request, including:
the information processing node legally verifies the user identity information;
and when the legal verification passes, the information processing node acquires the user living body detection video data and carries out identity verification on the user according to the user living body detection video data.
Optionally, in some embodiments, the user identity information includes a user identity document image, and the information processing node performs legal verification on the user identity information, including:
the information processing node preprocesses the user identity document image to obtain a preprocessed user identity document image;
the information processing node carries out segmentation interception on the preprocessed user identity document image to generate a corresponding image segment;
the information processing node carries out vector recognition on the characters in the image segment to obtain the character content of the image segment;
the information processing node integrates the character content to obtain user identity information;
the information processing node sends the user identity information to a verification system for validity verification;
and the information processing node receives a legal verification result fed back by the verification system.
Optionally, in some embodiments, the authenticating, by the information processing node, the user according to the user living body detection video data includes:
the information processing node sends a preset instruction based on the user living body detection video data;
and when receiving the operation corresponding to the preset instruction, the information processing node confirms that the user identity authentication is passed.
Optionally, in some embodiments, the performing cochain on the authentication right-determining parameter of the digital work and the digital work through the copyright authentication node, authorizing a digital work copyright certificate to a user corresponding to the copyright authentication request, and performing certification traceability on the digital work copyright certificate through the certification traceability node further includes:
the information processing node carries out crawler monitoring on a preset website according to the digital works;
when the information processing node monitors pirated works, the monitored pages are subjected to storage chaining through the storage node to obtain solidified evidence pages;
the storage node sends the stored solidified evidence page identification, the path, the page, the evidence obtaining time and the evidence obtaining size to the evidence storing and tracing node, and evidence is stored through the evidence storing and tracing node.
Correspondingly, an embodiment of the present invention further provides a block chain-based copyright authentication apparatus, including:
a first obtaining unit, configured to obtain, by the information processing node, a copyright authentication request;
the identity verification unit is used for verifying the identity of the user by the information processing node according to the copyright authentication request;
the second obtaining unit is used for obtaining the digital works corresponding to the copyright authentication request by the information processing node when the user identity verification passes;
the analysis and right-confirming unit is used for the information processing node to analyze and confirm the digital works and the digital works with the confirmed rights and confirm the original attributes of the digital works;
and the uplink unit is used for passing through the copyright authentication node to ensure the authentication of the digital works and the digital works are uplinked, and the copyright certificate of the digital works is authorized by the user corresponding to the copyright authentication request and passes through the copyright certificate traceability node to store the certificate and trace to the source.
Optionally, in some embodiments, the analysis and weight determination unit includes:
the identification subunit is used for the information processing node to identify the content of the digital work;
the judging subunit is used for judging whether the digital work is illegal or not by the information processing node according to the identified content of the digital work;
the comparison subunit is used for comparing the digital work with the determined weight if the information processing node determines that the digital work is not in violation, so as to obtain the similarity between the digital work and the digital work with the determined weight;
and the analysis and right-confirming subunit is used for analyzing and confirming the right of the information processing node according to the similarity and confirming the original attribute of the digital work.
Optionally, in some embodiments, the uplink unit includes:
a sending subunit, configured to send, by the information processing node, the name, size, completion time, and corresponding user identity information of the digital work to the copyright authentication node, so that the copyright authentication node performs uplink and authorizes a digital work copyright certificate to a user corresponding to the copyright authentication request;
the first acquisition subunit is used for acquiring the identifier and the public key of the digital work copyright certificate sent by the copyright authentication node by the information processing node;
a creating subunit, configured to create, by the information processing node, a user account according to the copyright authentication request;
the calculation subunit is used for calculating the hash value of the digital work and the hash value of the public key of the digital work copyright certificate by the information processing node;
the association subunit is used for the information processing node to associate the name, the size, the completion time, the identifier and the hash value of the digital work copyright certificate with the hash value of the public key of the digital work copyright certificate to generate a two-dimensional code of the digital work;
the second acquisition subunit is used for acquiring the user private key signature information corresponding to the copyright authentication request by the information processing node;
and the evidence storing and tracing subunit is used for associating the two-dimensional code of the digital work with the signature information of the user private key by the information processing node and then performing evidence storing and tracing through the evidence storing and tracing node.
Optionally, in some embodiments, the identity verification unit includes:
a legal verification subunit, configured to, by the information processing node, perform legal verification on the user identity information;
and the third acquiring subunit is used for acquiring the user living body detection video data by the information processing node when the legal verification passes, and authenticating the identity of the user according to the user living body detection video data.
Optionally, in some embodiments, the legal verification subunit includes:
the information processing node is used for preprocessing the user identity document image to obtain a preprocessed user identity document image;
the segmentation intercepting module is used for carrying out segmentation intercepting on the preprocessed user identity document image by the information processing node to generate a corresponding image segment;
the vector identification module is used for carrying out vector identification on the characters in the image segment by the information processing node to obtain the character content of the image segment;
the integration module is used for integrating the character content by the information processing node to obtain user identity information;
the validity verification module is used for sending the user identity information to a verification system by the information processing node for validity verification;
and the receiving module is used for receiving the legal verification result fed back by the verification system by the information processing node.
Optionally, in some embodiments, the third obtaining subunit includes:
the sending module is used for sending a preset instruction by the information processing node based on the user living body detection video data;
and the confirmation module is used for confirming that the user identity authentication is passed when the information processing node receives the operation corresponding to the preset instruction.
Optionally, in some embodiments, the apparatus for block chain-based copyright authentication further includes:
the monitoring unit is used for the information processing node to perform crawler monitoring on a preset website according to the digital works;
the storage unit is used for storing and chaining the monitored page through the storage node when the information processing node monitors the pirated works to obtain a solidified evidence page;
and the sending unit is used for sending the solidified evidence page identification, the path, the page, the evidence obtaining time and the evidence obtaining size which are stored to the evidence storing and tracing node by the storage node, and storing evidence by the evidence storing and tracing node.
In addition, an embodiment of the present invention further provides a block chain-based copyright authentication device, including: a processor and a memory; the memory stores a plurality of instructions, and the processor loads the instructions stored in the memory to execute any one of the block chain-based copyright authentication methods provided by the embodiments of the present invention.
In addition, an embodiment of the present invention further provides a storage medium, where the storage medium stores a plurality of instructions, and the instructions are suitable for being loaded by a processor to execute any one of the block chain-based copyright authentication methods provided in the embodiment of the present invention.
The embodiment of the invention obtains the copyright authentication request through the information processing center; performing user identity verification according to the copyright authentication request; when the user identity verification passes, acquiring a digital work corresponding to the copyright authentication request; analyzing and determining the right of the digital work and the digital work with the determined right, and determining the original attribute of the digital work; will through copyright authentication node digital works's authentication affirmation right parameter and digital works carry out the cochain, and to the user authorization digital works copyright certificate that copyright authentication request corresponds will digital works copyright certificate keeps the certificate through keeping the certificate and tracing to the source node and trace to the source, carries out copyright authentication through block chain link point, prevents that digital works from being tampered, has improved digital works copyright authentication's security, carries out copyright authentication on the block chain line simultaneously, has shortened the authentication time, has improved authentication efficiency to do not need the manual work to carry out copyright authentication, reduced copyright authentication cost.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a block chain-based copyright authentication system according to an embodiment of the present invention;
fig. 2 is a flowchart of a block chain-based copyright authentication method according to an embodiment of the present invention;
fig. 3 is an evidence solidification diagram of a block chain-based copyright authentication method according to an embodiment of the present invention;
fig. 4 is another flowchart of a block chain-based copyright authentication method according to an embodiment of the present invention;
fig. 5a is a schematic diagram of a first structure of a block chain-based copyright authentication apparatus according to an embodiment of the present invention;
fig. 5b is a schematic diagram of a second structure of a block chain-based copyright authentication apparatus according to an embodiment of the present invention
Fig. 5c is a schematic diagram of a third structure of a block chain-based copyright authentication apparatus according to an embodiment of the present invention;
fig. 5d is a schematic diagram of a fourth structure of a block chain-based copyright authentication apparatus according to an embodiment of the present invention;
fig. 5e is a schematic diagram of a fifth structure of a block chain-based copyright authentication apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Before explaining the embodiments of the present invention in detail, some terms related to the embodiments of the present invention are explained.
Block chains: the block chain technique is a low-level technique of bit currency, which is a decentralized distributed account book database. The blockchain itself is a series of data blocks (i.e., blocks) that are generated using a cryptographic algorithm, and each data block contains information that identifies the validity of multiple blockchain network transactions. Based on the above, the data on the block cannot be tampered to cheat, and the data on any block can be ensured to be transparent and transparent, so that the security of the data is ensured.
Block chains can be classified as public, private, or federation chains. The federation chain is between the public chain and the private chain, and several organizations cooperate to maintain a blockchain, the use of the blockchain must be managed with authority, and related information can be protected, such as a financial organization.
To summarize, a blockchain is a distributed database system participated by nodes, or may also be referred to as a distributed public ledger based on P2P (peer-to-peer) network, and is characterized by being unalterable, and can also be understood as an ledger system.
Block chain chaining: and the contents recorded by the block chain are subjected to signature and encryption technologies, and a block chain intelligent contract is called to realize block chain data chaining, so that the block chain data security is ensured.
Node of blockchain: the nodes participating in building the block chain may be an execution subject of copyright authentication based on the block chain, and the interaction between the nodes may implement services such as transaction, etc., such as an information processing node, a copyright authentication node, a storage certificate tracing node, etc. The node stores the related block data.
Next, a copyright authentication method, device and computer-readable storage medium based on a block chain provided in an embodiment of the present application will be described. The node can be a network device such as a smart phone, a smart watch, a tablet personal computer, a vehicle-mounted computer and a server. The following are detailed below.
Referring to fig. 1, fig. 1 is a schematic view of a block chain system according to an embodiment of the present disclosure.
In the embodiment of the present application, the blockchain system includes at least three nodes (the blockchain system includes three nodes in fig. 1 for illustration). The at least three nodes are connected through a network, and the connection mode can be wireless connection or wired connection. Specifically, the at least three nodes are dynamically networked through a peer-to-peer network to form a "decentralized" system, and the at least three nodes are peer-to-peer nodes, that is, each node is the same for the whole blockchain system. It is to be understood that the number of nodes in the blockchain system may be N, where N is a positive integer and N is not less than 3 (e.g., N ═ 4), that is, it only needs to be satisfied that the blockchain system includes at least three nodes connected to each other, and the present application is not limited thereto.
In this embodiment of the present application, the blockchain system includes an information processing node, a copyright authentication node, and a storage traceability node, as shown in fig. 1, it should be noted that the information processing node, the copyright authentication node, and the storage traceability node are equal in status, and the numbering nomenclature of the information processing node, the copyright authentication node, and the storage traceability node is not limited thereto, and the numbering nomenclature is only for convenience of describing information interaction occurring between the nodes.
It should be noted that the scenario diagram of the blockchain system shown in fig. 1 is merely an example, and the blockchain system and the scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation to the technical solution provided in the embodiment of the present application, and as a person having ordinary skill in the art knows, with the evolution of the blockchain system and the occurrence of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
In the embodiment of the present application, the information processing node, the copyright authentication node, and the verification tracing node of the block chain link point are described, and the block chain-based copyright authentication method of the present application can also be executed from the perspective of other nodes in the block chain system.
The application provides a copyright authentication method based on a block chain, which is applied to a block chain system, wherein the block chain system comprises at least three nodes which are connected with each other, namely an information processing node, a copyright authentication node and a storage evidence tracing node, and the copyright authentication method comprises the following steps: the information processing node acquires a copyright authentication request; performing user identity verification according to the copyright authentication request; when the user identity verification passes, acquiring the digital works corresponding to the copyright authentication request; analyzing and determining the right of the digital work and the digital work with the determined right, and determining the original attribute of the digital work; and the copyright authentication node is used for linking the authentication right-confirming parameters of the digital works and the digital works, authorizing the copyright certificate of the digital works to a user corresponding to the copyright authentication request, and storing and tracing the copyright certificate of the digital works through the source storing and tracing node.
As shown in fig. 2, a specific process of the block chain-based copyright authentication apparatus may be as follows:
201, the information processing node acquires a copyright authentication request.
In the specific implementation process, in the case that the digital works are not subjected to copyright registration and protection, a copyright authentication request can be sent to the information processing node, the digital works refer to works existing in a digital form at the time of creation, such as articles, paintings directly created on a computer, a coding instruction program automatically converted from a symbolization instruction or a sentence sequence in a computer program, and a designed webpage, wherein the copyright authentication request comprises user identity information, such as a user identity certificate image and the like.
202, the information processing node performs user identity verification according to the copyright authentication request.
In an embodiment, the information processing node performs user identity verification according to the copyright authentication request, which specifically includes a legal verification of the user identity document image and a user living body detection after the legal verification is passed. Specifically, step 202 includes:
a1, the information processing node legally verifies the user identity information;
a2, when the legal verification is passed, the information processing node acquires the user living body detection video data, and the identity of the user is verified according to the user living body detection video data.
The information processing node carries out legal verification on the user identity information, specifically, the user identity information can be sent to a verification system for verification, such as a public security system, before sending, a verification request can be sent, after the information which is sent by the public security system and agrees to verification is received, the user identity information is sent to the public security system, so that the public security system can verify the authenticity and the legality of the identity information, and after the verification is passed, the verified information is fed back. And after the information processing node receives the passing of the legal verification, acquiring the live body detection video data of the user, verifying the identity of the user according to the live body detection video data of the user, and determining that the copyright authentication request is initiated by the real user, but not initiated by a user of which the identity information of the user is forged by others or a virtual user.
Specifically, when the user identification information is a user identification document image, in order to improve the accuracy of identifying the user identification document image, step a1 may include:
the information processing node preprocesses the user identity document image to obtain a preprocessed user identity document image;
the information processing node carries out segmentation interception on the preprocessed user identity document image to generate a corresponding image segment;
the information processing node carries out vector recognition on the characters in the image segment to obtain the character content of the image segment;
the information processing node integrates the character content to obtain user identity information;
the information processing node sends the user identity information to a verification system for validity verification;
and the information processing node receives a legal verification result fed back by the verification system.
Firstly, an information processing node carries out preprocessing on a user identity document image, wherein the preprocessing can comprise image binarization processing, image enhancement, noise processing and image filtering. The image binarization processing adopts a threshold segmentation technology, and non-overlapping areas are distinguished through boundaries obtained by segmentation. Segmenting and intercepting a preprocessed user identity document image to generate a corresponding image segment, specifically segmenting the image according to a boundary obtained by image binarization processing to obtain the image segment, then performing vector recognition on characters in the image segment to obtain character contents of the image segment, specifically performing Chinese character vector recognition in the horizontal direction, the vertical direction, the 45-degree direction and the reverse 45-degree direction on the image segment, performing recognition according to character recognition rules of alphanumeric characteristics to obtain character contents of the image segment, integrating the character contents to obtain user identity information, for example, splicing the character contents according to the sequence of the image segment to obtain user identity information, and sending the user identity information to a verification system for legality verification; and receiving a legal verification result fed back by the verification system.
Further, step a2 may include:
the information processing node sends a preset instruction based on the user living body detection video data;
and when receiving the operation corresponding to the preset instruction, the information processing node confirms that the user identity authentication is passed.
When receiving user living body detection video data, the information processing node can confirm whether a user is a living body or not by sending a preset instruction, specifically, sending a preset instruction, such as 'please blink', when receiving blink operation of the user, determining that the user is the living body, namely, the user passes identity verification, and otherwise, determining that the user is a non-living body.
203, when the user identity passes the verification, the information processing node obtains the digital works corresponding to the copyright authentication request.
And 204, the information processing node analyzes and confirms the digital works and the digital works with the confirmed rights, and confirms the original attributes of the digital works.
When the user identity verification passes, an instruction is sent to the display page, for example, an instruction of "please upload digital works" is sent to the display page, so that the user uploads the digital works according to the instruction, thereby obtaining the digital works corresponding to the copyright authentication request, and the digital works with the determined rights are analyzed and determined, thereby determining the original attributes of the digital works. After the content of the digital work is determined not to involve violation, the digital work is determined, and specifically, the digital work and the digital work which is determined to be authorized are compared, so that whether the digital work corresponding to the copyright authentication request is the original work or not is determined.
Specifically, step 204 may include:
b1, the information processing node identifies the content of the digital work;
b2, the information processing node judges whether the digital work is illegal according to the identified content of the digital work;
b3, if the information processing node determines that the digital work is not illegal, comparing the digital work with the determined weight to obtain the similarity between the digital work and the digital work with the determined weight;
b4, the information processing node analyzes and confirms the right according to the similarity and confirms the original attribute of the digital work.
Specifically, the information processing node performs content identification on the digital work, and when the digital work is an image work, the content of the digital work can be obtained through the image identification. The image recognition and analysis process generally includes image sensor input and image segmentation, and the image content can be obtained through the image sensor input and the image segmentation, wherein the sensor input refers to converting an actual object scene into an expression form suitable for computer processing, and for a three-dimensional object scene, the three-dimensional object scene is also converted into a two-dimensional plane image for processing and analysis, for example, a stereogram in a digital work image is converted into a two-dimensional plane image. Image segmentation refers to the decomposition of an object and its components from an image of a scene. The components are in turn made up of image primitives. Decomposing a scene into such a hierarchical structure requires applying knowledge about the objects in the scene. Segmentation can be generally regarded as a decision process, and its algorithms can be divided into two categories, namely pixel technology and area technology. The dot technique is to classify each dot by a threshold method, for example, to obtain the strokes in the character image by comparing the gray level of the dot with the threshold, so as to obtain the specific character and graphic content in the digital work image, and then to analyze the attribute of the digital work image according to the character and graphic content. The region technique is to detect a boundary, a line, a region, and the like using characteristics such as texture, local area gray scale contrast, and the like, and find each component of an image by using techniques such as region growing, merging, and decomposition.
When the digital works are written works, the content of the written works can be directly identified. And then judging whether the digital work is illegal according to the identified content of the digital work, such as whether violence is involved, yellow vulgar content is involved, and the like. The specific judgment method can be carried out through a database of a professional judgment system related to yellow and violence, for example, the contents of the digital works are sent to the database for comparison, and if the contents are compared in the database to be consistent or have similarity larger than a preset value, the digital works are determined to be related to violation. Otherwise, the digital work is determined not to be illegal.
When the digital work is determined not to be illegal, comparing the digital work with the determined weight to obtain the similarity between the digital work and the digital work with the determined weight; and analyzing and determining the right according to the similarity, if the similarity is greater than the preset similarity, determining that the digital work is not the original work, if the similarity is less than or equal to the preset similarity, determining that the digital work is the original work, and setting the specific preset similarity according to the specific type of the digital work so as to confirm the original attribute of the digital work.
205, the copyright authentication node links the authentication right-determining parameter of the digital work and the digital work, authorizes the copyright certificate of the digital work to the user corresponding to the copyright authentication request, and passes the copyright certificate of the digital work through the evidence storing and tracing node to perform evidence storing and tracing.
Further, after the digital works are determined to be original works, the digital works and authentication right-confirming parameters of the digital works are linked up through a copyright authentication node, the authentication right-confirming parameters can comprise names, sizes, completion time, corresponding user identity information and the like of the digital works, a user corresponding to a copyright authentication request authorizes a copyright certificate of the digital works, and the copyright certificate of the digital works is subjected to evidence storage and tracing through an evidence storage and tracing node.
Step 205 may specifically include:
c1, the information processing node sends the digital work name, size, completion time and corresponding user identity information to the copyright authentication block chain node, so that the copyright authentication block chain node can carry out chain linking and authorize a digital work copyright certificate for a user corresponding to the copyright authentication request;
c2, the information processing node acquires the identifier and the public key of the digital work copyright certificate sent by the copyright authentication block chain node;
c3, the information processing node creates a user account according to the copyright authentication request;
c4, the information processing node calculates the hash value of the digital work and the hash value of the public key of the digital work copyright certificate;
c5, the information processing node associates the name, size, completion time, identification, hash value of the digital work and the hash value of the public key of the digital work copyright certificate to generate a two-dimensional code of the digital work;
c6, the information processing node acquires the user private key signature information corresponding to the copyright authentication request;
and C7, performing evidence storage and source tracing through the evidence storage and source tracing node after the two-dimensional code of the digital work is associated with the signature information of the user private key.
The information processing node sends the name, the size, the completion time and the corresponding user identity information of the digital work to a copyright authentication block chain node so as to facilitate chain linking of the copyright authentication block chain node, authorizes a digital work copyright certificate to a user corresponding to a copyright authentication request, obtains an identifier and a public key of the digital work copyright certificate sent by the copyright authentication block chain node, creates a user account according to the copyright authentication request, calculates the hash value of the digital work and the hash value of the public key of the digital work copyright certificate through a hash algorithm, and generates a two-dimensional code of the digital work after associating the name, the size, the completion time, the identifier, the hash value of the digital work and the hash value of the public key of the digital work copyright certificate, and obtains private key signature information of the user corresponding to the copyright authentication request; and associating the two-dimension code of the digital work with the signature information of the private key of the user, and then performing evidence storage and source tracing through the block chain evidence storage and source tracing node. Therefore, the original user can obtain the unique identification ID of the original works after the verification is stored on the block chain through the intelligent contract of the block chain verification source tracing node, the ID of the original works is the unique index value on the block chain, and meanwhile, related paper files can be printed out so that the user can check the original works conveniently. When a user needs to verify the hash value of the certificate, the block chain system provides a query interface, the intelligent contract confirms whether the signature is correct according to original user information on the chain, the certificate information is queried by using a unique index value (namely, a work ID), and comparison can be carried out, so that the digital work of the user is guaranteed not to be tampered. Further, after the block link node of the copyright certification authority, such as a background audit file of the block link point of the copyright bureau, confirms that the digital copyright can be given, the block link node can be used as an original work evidence, additionally marked with a copyright bureau signature, registered with the copyright, and solidified with the evidence, so that the reliability of the digital copyright is further improved, and a specific storage mode can refer to fig. 3.
Further, after the digital work copyright certificate is subjected to evidence tracing through the block chain evidence tracing node, whether an infringement behavior exists can be monitored in real time or at regular time, and specifically, after step 205, the method further includes:
d1, the information processing node monitors the crawler of the preset website according to the digital works;
d2, when the information processing node monitors pirate works, storing and chaining the monitored pages through the block chain link points to obtain solidified evidence pages;
d3, the storage node sends the solidification evidence page identification, path, page, evidence obtaining time and evidence obtaining size of storage to the evidence obtaining source node, through evidence obtaining source node deposits evidence.
The information processing node carries out crawler monitoring on a preset website according to digital works, wherein the preset website can be specifically set according to the type of the digital works, when pirate works are monitored, monitored pages are stored and linked up through block chain link points to obtain solidified evidence pages, the stored solidified evidence page marks, paths, pages, evidence obtaining time and evidence obtaining size are sent to block chain evidence tracing nodes, the block chain evidence tracing nodes can be stored conveniently, the difficulty of follow-up evidence obtaining is reduced, the evidence obtaining period is shortened, the evidence obtaining efficiency is improved, and the authenticity of evidence is improved. Further, when an infringement report of a user is received, the monitored page is stored and linked up through the block chain link points to obtain a solidified evidence page, the storage node sends the stored solidified evidence page identification, the path, the page, the evidence obtaining time and the evidence obtaining size to the evidence obtaining source node, and evidence is obtained through the evidence obtaining source node.
In the copyright authentication method based on the block chain provided by the embodiment, a copyright authentication request is acquired through an information processing center; performing user identity verification according to the copyright authentication request; when the user identity verification passes, acquiring a digital work corresponding to the copyright authentication request; analyzing and determining the right of the digital work and the digital work with the determined right, and determining the original attribute of the digital work; will through copyright authentication node digital works's authentication affirmation right parameter and digital works carry out the cochain, and to the user authorization digital works copyright certificate that copyright authentication request corresponds will digital works copyright certificate keeps the certificate through keeping the certificate and tracing to the source node and trace to the source, carries out copyright authentication through block chain link point, prevents that digital works from being tampered, has improved digital works copyright authentication's security, carries out copyright authentication on the block chain line simultaneously, has shortened the authentication time, has improved authentication efficiency to do not need the manual work to carry out copyright authentication, reduced copyright authentication cost.
The method according to the preceding embodiment is illustrated in further detail below by way of example.
In this embodiment, a description will be given taking an example in which the block chain-based copyright authentication apparatus is specifically integrated in a server. The server may include multiple types of block link points, and the number of each type of block link node may be determined according to a specific application scenario. For example, as shown in fig. 1, taking as an example that at least one information processing node, at least one copyright authentication node, and at least one attestation traceability node are included, the functions of various types of blockchain nodes may be as follows:
(1) an information processing node;
the information processing node mainly undertakes an information processing function and is used for processing a digital work authentication request, user identity information and the like, for example, verifying the user identity information, performing living body detection and the like, and performing original verification on the digital work.
(2) A copyright authentication node;
the copyright authentication node is mainly used for carrying out copyright authentication on the digital works.
(3) Storing evidence and tracing the source node;
the evidence storing and tracing node is mainly used for storing and tracing the copyright authentication strategy based on the block chain corresponding to the digital work copyright certificate content key words and then extracting the copyright authentication based on the block chain.
As shown in fig. 4, a block chain-based copyright authentication method may specifically include the following steps:
401, the information processing node obtains a copyright authentication request.
In the specific implementation process, in the case that the digital works are not subjected to copyright registration and protection, a copyright authentication request can be sent to the information processing node, the digital works refer to works existing in a digital form at the time of creation, such as articles, paintings directly created on a computer, a coding instruction program automatically converted from a symbolization instruction or a sentence sequence in a computer program, and a designed webpage, wherein the copyright authentication request comprises user identity information, such as a user identity certificate image and the like.
And 402, the information processing node carries out user identity verification according to the copyright authentication request.
In an embodiment, the information processing node performs user identity verification according to the copyright authentication request, which specifically includes a legal verification of the user identity document image and a user living body detection after the legal verification is passed.
And 403, when the user identity verification passes, the information processing node acquires the digital works corresponding to the copyright authentication request.
404, the information processing node analyzes and authorizes the digital work and the authorized digital work, and confirms the original attribute of the digital work.
When the user identity verification passes, an instruction is sent to the display page, for example, an instruction of "please upload digital works" is sent to the display page, so that the user uploads the digital works according to the instruction, thereby obtaining the digital works corresponding to the copyright authentication request, and the digital works with the determined rights are analyzed and determined, thereby determining the original attributes of the digital works. After the content of the digital work is determined not to involve violation, the digital work is determined, and specifically, the digital work and the digital work which is determined to be authorized are compared, so that whether the digital work corresponding to the copyright authentication request is the original work or not is determined.
405, the copyright authentication node uplinks the authentication and authorization parameters of the digital works and the digital works, and authorizes the copyright certificate of the digital works to the user corresponding to the copyright authentication request.
406, performing certification storage and tracing on the digital work copyright certificate through a certification storage and tracing node.
Further, after the digital works are determined to be original works, the digital works and authentication right-confirming parameters of the digital works are linked up through a copyright authentication node, the authentication right-confirming parameters can comprise names, sizes, completion time, corresponding user identity information and the like of the digital works, a user corresponding to a copyright authentication request authorizes a copyright certificate of the digital works, and the copyright certificate of the digital works is subjected to evidence storage and tracing through an evidence storage and tracing node.
407, the information processing node performs crawler monitoring on a preset website according to the digital works.
408. When the information processing node monitors pirated works, the monitored pages are stored and linked up through the block chain link points to obtain a solidified evidence page.
409. And the storage node sends the stored solidified evidence page identification, the path, the page, the evidence obtaining time and the evidence obtaining size to the evidence storing and tracing node, and the evidence is stored by the evidence storing and tracing node.
The information processing node carries out crawler monitoring on a preset website according to digital works, wherein the preset website can be specifically set according to the type of the digital works, when pirate works are monitored, monitored pages are stored and linked up through block chain link points to obtain solidified evidence pages, the stored solidified evidence page marks, paths, pages, evidence obtaining time and evidence obtaining size are sent to block chain evidence tracing nodes, the block chain evidence tracing nodes can be stored conveniently, the difficulty of follow-up evidence obtaining is reduced, the evidence obtaining period is shortened, the evidence obtaining efficiency is improved, and the authenticity of evidence is improved. Further, when an infringement report of a user is received, the monitored page is stored and linked up through the block chain link points to obtain a solidified evidence page, the storage node sends the stored solidified evidence page identification, the path, the page, the evidence obtaining time and the evidence obtaining size to the evidence obtaining source node, and evidence is obtained through the evidence obtaining source node.
As can be seen from the above, the present embodiment obtains the copyright authentication request; performing user identity verification according to the copyright authentication request; when the user identity verification passes, acquiring a digital work corresponding to the copyright authentication request; analyzing and determining the right of the digital work and the digital work with the determined right, and determining the original attribute of the digital work; will through copyright authentication node digital works's authentication affirmation right parameter and digital works carry out the cochain, and to the user authorization digital works copyright certificate that copyright authentication request corresponds will digital works copyright certificate deposits the certificate through depositing the certificate and traces to the source node, carries out copyright authentication through copyright authentication node, prevents that digital works from being tampered, has improved digital works copyright authentication's security, carries out copyright authentication on the block chain line simultaneously, has shortened the authentication time, has improved authentication efficiency to do not need the manual work to carry out copyright authentication, reduced copyright authentication cost.
In order to better implement the above method, an embodiment of the present invention may further provide a block chain-based copyright authentication apparatus, where the block chain-based copyright authentication apparatus may be specifically integrated in a network device, and the network device may be a terminal or a server, and the like.
For example, as shown in fig. 5a, the block chain-based copyright authentication apparatus may include a first obtaining unit 501, an identity verification unit 502, a second obtaining unit 503, an analysis and authorization unit 504, and an uplink unit 505, as follows:
(1) a first acquisition unit 501;
a first obtaining unit 501, configured to obtain the copyright authentication request by the information processing node.
In the specific implementation process, in the case that the digital works are not subjected to copyright registration and protection, a copyright authentication request can be sent to the information processing node, the digital works refer to works existing in a digital form at the time of creation, such as articles, paintings directly created on a computer, a coding instruction program automatically converted from a symbolization instruction or a sentence sequence in a computer program, and a designed webpage, wherein the copyright authentication request comprises user identity information, such as a user identity certificate image and the like.
(2) An identity verification unit 502;
and an identity verification unit 502, configured to perform user identity verification according to the copyright authentication request by the information processing node.
In an embodiment, the information processing node performs user identity verification according to the copyright authentication request, which specifically includes a legal verification of the user identity document image and a user living body detection after the legal verification is passed. (3) A second acquisition unit 503;
a second obtaining unit 503, configured to, when the user identity verification passes, the information processing node obtains the digital work corresponding to the copyright authentication request.
(4) An analysis and weight determination unit 504;
and the analysis and right-confirming unit 504 is used for analyzing and right-confirming the digital work and the digital work with the confirmed right by the information processing node, and confirming the original attribute of the digital work.
When the user identity verification passes, an instruction is sent to the display page, for example, an instruction of "please upload digital works" is sent to the display page, so that the user uploads the digital works according to the instruction, thereby obtaining the digital works corresponding to the copyright authentication request, and the digital works with the determined rights are analyzed and determined, thereby determining the original attributes of the digital works. After the content of the digital work is determined not to involve violation, the digital work is determined, and specifically, the digital work and the digital work which is determined to be authorized are compared, so that whether the digital work corresponding to the copyright authentication request is the original work or not is determined.
(5) An uplink unit 505;
and an uplink unit 505, configured to perform uplink transmission on the authentication authorization parameter of the digital work and the digital work through a copyright authentication node, and authorize a digital work copyright certificate corresponding to the copyright authentication request, and perform evidence storage and traceability on the digital work copyright certificate through an evidence storage and traceability node.
Further, after the digital works are determined to be original works, the digital works and authentication right-confirming parameters of the digital works are linked up through a copyright authentication node, the authentication right-confirming parameters can comprise names, sizes, completion time, corresponding user identity information and the like of the digital works, a user corresponding to a copyright authentication request authorizes a copyright certificate of the digital works, and the copyright certificate of the digital works is subjected to evidence storage and tracing through an evidence storage and tracing node.
Specifically, as shown in fig. 5b, the analysis weighting unit 504 includes an identification sub-unit 5041, a judgment sub-unit 5042, a comparison sub-unit 5043, and an analysis weighting sub-unit 5044;
an identifying subunit 5041, configured to perform content identification on the digital work by the information processing node;
a judging subunit 5042, configured to, by the information processing node, judge, according to the identified content of the digital work, whether the digital work is illegal;
a comparison subunit 5043, configured to, if the information processing node determines that the digital work is not in violation, compare the digital work with a right, and obtain a similarity between the digital work and the digital work with the right;
and the analysis and right confirming subunit 5044 is configured to, by the information processing node, perform analysis and right confirmation according to the similarity, and confirm the original attribute of the digital work.
Specifically, the information processing node performs content identification on the digital work, and when the digital work is an image work, the content of the digital work can be obtained through the image identification. The image recognition and analysis process generally includes image sensor input and image segmentation, and the image content can be obtained through the image sensor input and the image segmentation, wherein the sensor input refers to converting an actual object scene into an expression form suitable for computer processing, and for a three-dimensional object scene, the three-dimensional object scene is also converted into a two-dimensional plane image for processing and analysis, for example, a stereogram in a digital work image is converted into a two-dimensional plane image. Image segmentation refers to the decomposition of an object and its components from an image of a scene. The components are in turn made up of image primitives. Decomposing a scene into such a hierarchical structure requires applying knowledge about the objects in the scene. Segmentation can be generally regarded as a decision process, and its algorithms can be divided into two categories, namely pixel technology and area technology. The dot technique is to classify each dot by a threshold method, for example, to obtain the strokes in the character image by comparing the gray level of the dot with the threshold, so as to obtain the specific character and graphic content in the digital work image, and then to analyze the attribute of the digital work image according to the character and graphic content. The region technique is to detect a boundary, a line, a region, and the like using characteristics such as texture, local area gray scale contrast, and the like, and find each component of an image by using techniques such as region growing, merging, and decomposition.
When the digital works are written works, the content of the written works can be directly identified. And then judging whether the digital work is illegal according to the identified content of the digital work, such as whether violence is involved, yellow vulgar content is involved, and the like. The specific judgment method can be carried out through a database of a professional judgment system related to yellow and violence, for example, the contents of the digital works are sent to the database for comparison, and if the contents are compared in the database to be consistent or have similarity larger than a preset value, the digital works are determined to be related to violation. Otherwise, the digital work is determined not to be illegal.
When the digital work is determined not to be illegal, comparing the digital work with the determined weight to obtain the similarity between the digital work and the digital work with the determined weight; and analyzing and determining the right according to the similarity, if the similarity is greater than the preset similarity, determining that the digital work is not the original work, if the similarity is less than or equal to the preset similarity, determining that the digital work is the original work, and setting the specific preset similarity according to the specific type of the digital work so as to confirm the original attribute of the digital work.
Specifically, as shown in FIG. 5c, the uplink unit 505 includes a sending sub-unit 5051, a first acquiring sub-unit 5052, a creating sub-unit 5053, a calculating sub-unit 5054, an associating sub-unit 5055, a second acquiring sub-unit 5056, and a credentialing tracing sub-unit 5057:
a sending subunit 5051, configured to send, by the information processing node, the name, size, completion time, and corresponding user identity information of the digital work to the copyright authentication node, so that the copyright authentication node performs uplink and authorizes a digital work copyright certificate to a user corresponding to the copyright authentication request;
a first obtaining sub-unit 5052, configured to enable the information processing node to obtain an identifier and a public key of a digital work copyright certificate sent by the copyright authentication node;
a creating sub-unit 5053 configured to create a user account by the information processing node according to the copyright authentication request;
a calculation subunit 5054, configured to calculate, by the information processing node, the hash value of the digital work and the hash value of the public key of the digital work copyright certificate;
an association subunit 5055, configured to associate, by the information processing node, the name, size, completion time, identifier, and hash value of the digital work with the hash value of the public key of the digital work copyright certificate, and then generate a two-dimensional code of the digital work;
a second obtaining sub-unit 5056, configured to enable the information processing node to obtain user private key signature information corresponding to the copyright authentication request;
and a certificate storing and tracing subunit 5057, configured to associate the two-dimensional code of the digital work with the user private key signature information by the information processing node, and perform certificate storing and tracing through the block chain certificate storing and tracing node.
The information processing node sends the name, the size, the completion time and the corresponding user identity information of the digital work to a copyright authentication block chain node so as to facilitate chain linking of the copyright authentication block chain node, authorizes a digital work copyright certificate to a user corresponding to a copyright authentication request, obtains an identifier and a public key of the digital work copyright certificate sent by the copyright authentication block chain node, creates a user account according to the copyright authentication request, calculates the hash value of the digital work and the hash value of the public key of the digital work copyright certificate through a hash algorithm, and generates a two-dimensional code of the digital work after associating the name, the size, the completion time, the identifier, the hash value of the digital work and the hash value of the public key of the digital work copyright certificate, and obtains private key signature information of the user corresponding to the copyright authentication request; and associating the two-dimension code of the digital work with the signature information of the private key of the user, and then performing evidence storage and source tracing through the block chain evidence storage and source tracing node. Therefore, the original user can obtain the unique identification ID of the original works after the verification is stored on the block chain through the intelligent contract of the block chain verification source tracing node, the ID of the original works is the unique index value on the block chain, and meanwhile, related paper files can be printed out so that the user can check the original works conveniently. When a user needs to verify the hash value of the certificate, the block chain system provides a query interface, the intelligent contract confirms whether the signature is correct according to original user information on the chain, the certificate information is queried by using a unique index value (namely, a work ID), and comparison can be carried out, so that the digital work of the user is guaranteed not to be tampered. Further, after the block link node of the copyright certification authority, such as a background audit file of the block link point of the copyright bureau, confirms that the digital copyright can be given, the block link node can be used as an original work evidence, additionally marked with a copyright bureau signature, registered with the copyright, and solidified with the evidence, so that the reliability of the digital copyright is further improved, and a specific storage mode can refer to fig. 3.
Specifically, as shown in fig. 5d, the identity verification unit 502 may include a legal verification subunit 5021 and a third obtaining subunit 5022:
a legal verification subunit 5021, configured to perform legal verification on the user identity information by the information processing node;
and a third acquiring subunit 5022, configured to, when the legal authentication passes, the information processing node acquires user living body detection video data, and performs identity authentication on the user according to the user living body detection video data.
The information processing node carries out legal verification on the user identity information, specifically, the user identity information can be sent to a verification system for verification, such as a public security system, before sending, a verification request can be sent, after the information which is sent by the public security system and agrees to verification is received, the user identity information is sent to the public security system, so that the public security system can verify the authenticity and the legality of the identity information, and after the verification is passed, the verified information is fed back. And after the information processing node receives the passing of the legal verification, acquiring the live body detection video data of the user, verifying the identity of the user according to the live body detection video data of the user, and determining that the copyright authentication request is initiated by the real user, but not initiated by a user of which the identity information of the user is forged by others or a virtual user.
Specifically, as shown in fig. 5e, the block chain-based copyright authentication apparatus further includes a monitoring unit 506, a storage unit 507, and a sending unit 508:
the monitoring unit 506 is used for the information processing node to perform crawler monitoring on a preset website according to the digital works;
the storage unit 507 is configured to, when the information processing node monitors a pirated work, perform storage chaining on the monitored page through the storage node to obtain a solidified evidence page;
and the sending unit 508 is used for sending the stored solidified evidence page identifier, the path, the page, the evidence obtaining time and the evidence obtaining size to the evidence obtaining source node by the storage node, and performing evidence obtaining through the evidence obtaining source node.
The information processing node carries out crawler monitoring on a preset website according to digital works, wherein the preset website can be specifically set according to the type of the digital works, when pirate works are monitored, monitored pages are stored and linked up through block chain link points to obtain solidified evidence pages, the stored solidified evidence page marks, paths, pages, evidence obtaining time and evidence obtaining size are sent to block chain evidence tracing nodes, the block chain evidence tracing nodes can be stored conveniently, the difficulty of follow-up evidence obtaining is reduced, the evidence obtaining period is shortened, the evidence obtaining efficiency is improved, and the authenticity of evidence is improved. Further, when an infringement report of a user is received, the monitored page is stored and linked up through the block chain link points to obtain a solidified evidence page, the storage node sends the stored solidified evidence page identification, the path, the page, the evidence obtaining time and the evidence obtaining size to the evidence obtaining source node, and evidence is obtained through the evidence obtaining source node.
As can be seen from the above, the first obtaining unit 501 of the block chain-based copyright authentication apparatus of the present embodiment obtains the copyright authentication request; the identity verification unit 502 performs user identity verification according to the copyright authentication request; when the user identity verification passes, the second obtaining unit 503 obtains the digital work corresponding to the copyright authentication request; the analysis and right-determining unit 504 analyzes and determines the right of the digital work and the digital work with the determined right, and confirms the original attribute of the digital work; cochain unit 505 will through copyright authentication node the authentication of digital work confirm the right parameter and digital work carries out the cochain, and to the user that copyright authentication request corresponds authorizes digital work copyright certificate, will digital work copyright certificate deposits the certificate through depositing the certificate and traces to the source node, carries out copyright authentication through block chain link point, prevents that digital work from being tampered, has improved the security of digital work copyright authentication, carries out copyright authentication on the block chain line simultaneously, has shortened the authentication time, has improved authentication efficiency to do not need the manual work to carry out copyright authentication, reduced copyright authentication cost.
An embodiment of the present invention further provides a server, as shown in fig. 6, which shows a schematic structural diagram of the server according to the embodiment of the present invention, specifically:
the server may include components such as a processor 701 of one or more processing cores, memory 702 of one or more computer-readable storage media, a power supply 703, and an input unit 704. Those skilled in the art will appreciate that the server architecture shown in FIG. 6 is not meant to be limiting, and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
Wherein:
the processor 701 is a control center of the server, connects various parts of the entire server using various interfaces and lines, and performs various functions of the server and processes data by running or executing software programs and/or modules stored in the memory 702 and calling data stored in the memory 702, thereby performing overall monitoring of the server. Optionally, processor 701 may include one or more processing cores; preferably, the processor 701 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 701.
The memory 702 may be used to store software programs and modules, and the processor 701 executes various functional applications and data processing by operating the software programs and modules stored in the memory 702. The memory 702 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to the use of the server, and the like. Further, the memory 702 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 702 may also include a memory controller to provide the processor 701 with access to the memory 702.
The server further includes a power source 703 for supplying power to each component, and preferably, the power source 703 may be logically connected to the processor 701 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The power supply 703 may also include any component including one or more of a dc or ac power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
The server may also include an input unit 704, and the input unit 704 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the server may further include a display unit and the like, which will not be described in detail herein. Specifically, in this embodiment, the processor 701 in the server loads the executable file corresponding to the process of one or more application programs into the memory 702 according to the following instructions, and the processor 701 runs the application program stored in the memory 702, thereby implementing various functions as follows:
the information processing node acquires a copyright authentication request;
the information processing node carries out user identity verification according to the copyright authentication request;
when the user identity passes verification, the information processing node acquires the digital works corresponding to the copyright authentication request;
the information processing node analyzes and confirms the right of the digital work and the digital work with the confirmed right, and confirms the original attribute of the digital work;
and the copyright authentication node is used for linking the authentication right-confirming parameters of the digital works and the digital works, authorizing the copyright certificate of the digital works to a user corresponding to the copyright authentication request, and storing and tracing the copyright certificate of the digital works through the source storing and tracing node.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, the present invention provides a storage medium, in which a plurality of instructions are stored, where the instructions can be loaded by a processor to execute the steps in any one of the block chain based copyright authentication methods provided by the embodiments of the present invention. For example, the instructions may perform the steps of:
the information processing node acquires a copyright authentication request;
the information processing node carries out user identity verification according to the copyright authentication request;
when the user identity passes verification, the information processing node acquires the digital works corresponding to the copyright authentication request;
the information processing node analyzes and confirms the right of the digital work and the digital work with the confirmed right, and confirms the original attribute of the digital work;
and the copyright authentication node is used for linking the authentication right-confirming parameters of the digital works and the digital works, authorizing the copyright certificate of the digital works to a user corresponding to the copyright authentication request, and storing and tracing the copyright certificate of the digital works through the source storing and tracing node.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
Wherein the computer storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
Since the instructions stored in the computer storage medium may execute the steps in any block chain-based copyright authentication method provided in the embodiment of the present invention, beneficial effects that can be achieved by any block chain-based copyright authentication method provided in the embodiment of the present invention may be achieved, which are detailed in the foregoing embodiments and will not be described herein again.
The block chain-based copyright authentication method, device, equipment and storage medium provided by the embodiment of the invention are described in detail, a specific example is applied in the text to explain the principle and the implementation of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for those skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (9)

1. The utility model provides a copyright authentication method based on block chain, is applied to block chain system, block chain system includes information processing node, copyright authentication node and deposit certificate traceability node, information processing node is used for assuming the information processing function, copyright authentication node is used for carrying out the copyright authentication to digital works, deposit certificate traceability node is used for depositing certificate traceability, its characterized in that includes:
the information processing node acquires a copyright authentication request;
the information processing node carries out user identity verification according to the copyright authentication request;
the information processing node acquires the digital works corresponding to the copyright authentication request when the user identity authentication passes;
the information processing node analyzes and confirms the digital works and the digital works with the confirmed rights, and confirms the original attributes of the digital works;
the information processing node sends the name, the size, the completion time and the corresponding user identity information of the digital works to the copyright authentication node so that the copyright authentication node can carry out chain linking and authorize a digital work copyright certificate to a user corresponding to the copyright authentication request;
the information processing node acquires the identifier and the public key of the digital work copyright certificate sent by the copyright authentication node;
the information processing node creates a user account according to the copyright authentication request;
the information processing node calculates the hash value of the digital work and the hash value of the public key of the digital work copyright certificate;
the information processing node associates the name, size, completion time, identification, hash value of the digital work and the hash value of the public key of the digital work copyright certificate to generate a two-dimensional code of the digital work;
the information processing node acquires user private key signature information corresponding to the copyright authentication request;
and the information processing node associates the two-dimension code of the digital work with the signature information of the user private key and then stores and traces the source through the block chain storing and tracing node.
2. The block chain-based copyright authentication method of claim 1, wherein the information processing node analyzes and authorizes the digital work and the authorized digital work to confirm the original property of the digital work, comprising:
the information processing node identifies the content of the digital work;
the information processing node judges whether the digital work is illegal according to the identified content of the digital work;
if the information processing node determines that the digital work is not in violation, comparing the digital work with the determined weight to obtain the similarity between the digital work and the digital work with the determined weight;
and the information processing node analyzes and confirms the right according to the similarity and confirms the original attribute of the digital work.
3. The block chain-based copyright authentication method of claim 1, wherein the copyright authentication request includes user identity information, and the information processing node performs user identity verification according to the copyright authentication request, comprising:
the information processing node legally verifies the user identity information;
and when the legal verification passes, the information processing node acquires the user living body detection video data and carries out identity verification on the user according to the user living body detection video data.
4. The method for block chain-based copyright authentication of claim 3, wherein the user identity information comprises a user identity document image, and the information processing node legally verifies the user identity information, comprising:
the information processing node preprocesses the user identity document image to obtain a preprocessed user identity document image;
the information processing node carries out segmentation interception on the preprocessed user identity document image to generate a corresponding image segment;
the information processing node carries out vector recognition on the characters in the image segment to obtain the character content of the image segment;
the information processing node integrates the character content to obtain user identity information;
the information processing node sends the user identity information to a verification system for validity verification;
and the information processing node receives a legal verification result fed back by the verification system.
5. The block chain-based copyright authentication method according to claim 3, wherein the information processing node performs authentication on the user according to the user live body detection video data, and comprises:
the information processing node sends a preset instruction based on the user living body detection video data;
and when receiving the operation corresponding to the preset instruction, the information processing node confirms that the user identity authentication is passed.
6. The method for block chain-based copyright authentication according to any one of claims 1-5, wherein the steps of uploading the authentication and authorization parameters of the digital works and the digital works through the copyright authentication node, authorizing the digital works copyright certificate to the user corresponding to the copyright authentication request, and tracing the digital works copyright certificate through the certification tracing node further comprise:
the information processing node carries out crawler monitoring on a preset website according to the digital works;
when the information processing node monitors pirated works, the monitored pages are subjected to storage chaining through the storage node to obtain solidified evidence pages;
the storage node sends the stored solidified evidence page identification, the path, the page, the evidence obtaining time and the evidence obtaining size to the evidence storing and tracing node, and evidence is stored through the evidence storing and tracing node.
7. The utility model provides a copyright authentication device based on blockchain is applied to blockchain system, blockchain system includes information processing node, copyright authentication node and deposit certificate traceability node, information processing node is used for assuming the information processing function, copyright authentication node is used for carrying out the copyright authentication to digital works, deposit certificate traceability node is used for depositing certificate traceability, a serial communication port, include:
a first obtaining unit, configured to obtain, by the information processing node, a copyright authentication request;
the identity verification unit is used for verifying the identity of the user by the information processing node according to the copyright authentication request;
the second obtaining unit is used for obtaining the digital works corresponding to the copyright authentication request by the information processing node when the user identity verification passes;
the analysis and right-confirming unit is used for the information processing node to analyze and confirm the digital works and the digital works with the confirmed rights and confirm the original attributes of the digital works;
the information processing node is used for sending the name, the size, the completion time and the corresponding user identity information of the digital works to the copyright authentication node so as to facilitate the copyright authentication node to carry out uplink and authorize the copyright certificate of the digital works to the user corresponding to the copyright authentication request; the information processing node acquires the identifier and the public key of the digital work copyright certificate sent by the copyright authentication node; the information processing node creates a user account according to the copyright authentication request; the information processing node calculates the hash value of the digital work and the hash value of the public key of the digital work copyright certificate; the information processing node associates the name, size, completion time, identification, hash value of the digital work and the hash value of the public key of the digital work copyright certificate to generate a two-dimensional code of the digital work; the information processing node acquires user private key signature information corresponding to the copyright authentication request; and the information processing node associates the two-dimension code of the digital work with the signature information of the user private key and then stores and traces the source through the block chain storing and tracing node.
8. A block chain-based copyright authentication apparatus, comprising: a processor and a memory; the memory stores a plurality of instructions, and the processor loads the instructions stored in the memory to execute the block chain-based copyright authentication method according to any one of claims 1 to 6.
9. A computer-readable storage medium storing instructions adapted to be loaded by a processor to perform the method for block chain based rights authentication of any one of claims 1 to 6.
CN201910917288.1A 2019-09-26 2019-09-26 Copyright authentication method, device and equipment based on block chain and storage medium Active CN110598376B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910917288.1A CN110598376B (en) 2019-09-26 2019-09-26 Copyright authentication method, device and equipment based on block chain and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910917288.1A CN110598376B (en) 2019-09-26 2019-09-26 Copyright authentication method, device and equipment based on block chain and storage medium

Publications (2)

Publication Number Publication Date
CN110598376A CN110598376A (en) 2019-12-20
CN110598376B true CN110598376B (en) 2021-06-22

Family

ID=68863689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910917288.1A Active CN110598376B (en) 2019-09-26 2019-09-26 Copyright authentication method, device and equipment based on block chain and storage medium

Country Status (1)

Country Link
CN (1) CN110598376B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230153397A1 (en) * 2021-11-17 2023-05-18 Sawgrass Technologies, Inc. Digital imaging production management devices and processes

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177661B (en) * 2019-12-27 2023-04-18 万翼科技有限公司 Copyright authentication method for building information model component and related product
CN110851879B (en) * 2020-01-15 2023-03-21 蚂蚁区块链科技(上海)有限公司 Method, device and equipment for infringement and evidence preservation based on evidence preservation block chain
CN111339501B (en) * 2020-02-20 2022-10-14 百度在线网络技术(北京)有限公司 Copyright protection method, device, equipment and medium based on block chain
CN111538963A (en) * 2020-04-29 2020-08-14 铭数科技(青岛)有限公司 Block chain copyright protection system and method based on double chains
CN111581293B (en) * 2020-06-23 2021-06-04 腾讯科技(深圳)有限公司 Block chain-based user content processing method, device, system and equipment
CN112819616A (en) * 2020-06-24 2021-05-18 支付宝(杭州)信息技术有限公司 Block chain-based original work transaction method and device and electronic equipment
CN112000928A (en) * 2020-07-15 2020-11-27 西安电子科技大学 Picture distributed infringement right confirming method, system, storage medium and computer equipment
CN112069465A (en) * 2020-09-23 2020-12-11 山东舜网传媒股份有限公司 Manuscript intellectual property protection method and system based on block chain
CN112163243A (en) * 2020-10-09 2021-01-01 成都乐链科技有限公司 Block chain-based digital asset examination and storage method, and block chain-based digital asset examination and storage device, and block chain-based digital asset authorization method and device
CN112149187B (en) * 2020-11-25 2024-04-05 支付宝(杭州)信息技术有限公司 Method and device for processing traceability information based on blockchain
CN113255008B (en) * 2021-07-01 2021-10-22 支付宝(杭州)信息技术有限公司 Method and system for outputting multimedia file
CN113949515A (en) * 2021-09-09 2022-01-18 卓尔智联(武汉)研究院有限公司 Digital copyright information processing method and device and storage medium
CN113704704B (en) * 2021-10-28 2022-03-15 湖南草根文化传媒有限公司 Collaborative work ownership confirmation method and system based on block chain and computer equipment
CN114726554B (en) * 2022-06-08 2022-09-20 青岛理工大学 Copyright authentication system and method based on alliance chain and NFT
CN115080925B (en) * 2022-08-19 2022-11-11 北京数慧时空信息技术有限公司 Remote sensing achievement intellectual property management method and system based on block chain
CN115578780B (en) * 2022-12-07 2023-04-07 广东省科学院江门产业技术研究院有限公司 Agricultural product and food cold chain traceability management system based on big data
CN116522289B (en) * 2023-01-17 2024-03-08 山东青橙数字科技有限公司 Multi-view image copyright protection method, device and medium based on blockchain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method
CN108268755A (en) * 2016-12-31 2018-07-10 北京版银科技有限责任公司 The copyright data processing method of original works
CN109472118A (en) * 2018-11-23 2019-03-15 北京奇眸科技有限公司 A kind of copy-right protection method based on block chain
CN110110498A (en) * 2019-05-10 2019-08-09 中南大学 A kind of digital publishing rights based on alliance's chain really weigh method and system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009169489A (en) * 2008-01-11 2009-07-30 Oki Electric Ind Co Ltd Encryption method, decryption method, encryption device, and decryption device
CN101917432A (en) * 2010-08-13 2010-12-15 北京握奇数据系统有限公司 Business processing method, information processing platform equipment and business platform equipment
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
US20190155997A1 (en) * 2017-11-17 2019-05-23 1969329 Ontario Inc. Content licensing platform, system, and method
CN110362969A (en) * 2018-06-12 2019-10-22 腾讯科技(深圳)有限公司 A kind of resource rights check method, apparatus and equipment
CN110188515A (en) * 2019-05-16 2019-08-30 中细软集团有限公司 A kind of block chain network copyright register method and client

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108268755A (en) * 2016-12-31 2018-07-10 北京版银科技有限责任公司 The copyright data processing method of original works
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method
CN109472118A (en) * 2018-11-23 2019-03-15 北京奇眸科技有限公司 A kind of copy-right protection method based on block chain
CN110110498A (en) * 2019-05-10 2019-08-09 中南大学 A kind of digital publishing rights based on alliance's chain really weigh method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230153397A1 (en) * 2021-11-17 2023-05-18 Sawgrass Technologies, Inc. Digital imaging production management devices and processes

Also Published As

Publication number Publication date
CN110598376A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
CN110598376B (en) Copyright authentication method, device and equipment based on block chain and storage medium
Fraga-Lamas et al. Fake news, disinformation, and deepfakes: Leveraging distributed ledger technologies and blockchain to combat digital deception and counterfeit reality
DE112004002470B4 (en) Certificate-based Digital Rights Management
CN109948320B (en) Block chain-based identity recognition management method, device, medium and electronic equipment
CN110458662B (en) Anti-fraud wind control method and device
CN115270193B (en) Data file secure sharing method and device based on block chain and collaborative synchronization
CN110909082A (en) Method and device for generating block chain certificate of works
CN112036995A (en) Large-scale enterprise financial data management method and system based on block chain and readable storage medium
Motwani et al. A proposed digital rights management system for 3d graphics using biometric watermarks
CN114722355A (en) Copyright protection system and method based on block chain and IPFS
WO2021137753A1 (en) Electronic authentication system and process using the same
CN114782022B (en) Construction digital monitoring method and equipment based on identity authentication and storage medium
CN110381037A (en) A kind of security protection system based on e-bidding purchase transaction platform
CN115660903A (en) Intellectual property achievement sharing management system and method based on block chain
CN110992219A (en) Intellectual property protection method and system based on block chain technology
Yi et al. Digital rights management scheme based on redactable blockchain and perceptual hash
CN111061695B (en) File sharing method and system based on block chain
CN116244725A (en) File processing method and device based on block chain, equipment and file contribution system
CN114205088A (en) Intelligent traffic facility management method and system based on double block chains
CN112863652A (en) Medical image data storage system
Yao et al. A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments
CN112559974A (en) Picture copyright protection method, equipment and medium based on block chain
CN112383737A (en) Multi-user online content same-screen video processing verification method and device and electronic equipment
Wei Enhancing Copyright Protection of Online Literature using Intelligent Decision Support Systems and Blockchain Technology
CN113779173B (en) Heterogeneous digital token system for geospatial data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant