CN110728592A - Copyright monitoring method, copyright query method, system and equipment - Google Patents

Copyright monitoring method, copyright query method, system and equipment Download PDF

Info

Publication number
CN110728592A
CN110728592A CN201810782324.3A CN201810782324A CN110728592A CN 110728592 A CN110728592 A CN 110728592A CN 201810782324 A CN201810782324 A CN 201810782324A CN 110728592 A CN110728592 A CN 110728592A
Authority
CN
China
Prior art keywords
node
block chain
audio
monitoring
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810782324.3A
Other languages
Chinese (zh)
Inventor
孙浩华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810782324.3A priority Critical patent/CN110728592A/en
Publication of CN110728592A publication Critical patent/CN110728592A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/184Intellectual property management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Abstract

The application provides a copyright monitoring method, a copyright query system and a copyright monitoring device, wherein the copyright monitoring method comprises the following steps: monitoring a target source, and determining whether an application object matched with a copyright object stored in a node of a block chain exists in the target source; in the event that it is determined that there is an application object that matches a rights object stored in a node of a blockchain, synchronizing a matching result to each node on the blockchain, wherein each node on the blockchain includes at least one of: a copyright object affiliated side node and an application object using side node. The technical problem that the existing infringement monitoring is difficult is solved through the scheme, and the technical effects of simply and efficiently realizing right confirmation and right maintenance are achieved.

Description

Copyright monitoring method, copyright query method, system and equipment
Technical Field
The present application belongs to the field of internet technologies, and in particular, to a copyright monitoring method, a copyright query system, and a copyright query device.
Background
With the increasing attention paid to intellectual property rights, the right-confirming and right-maintaining become more and more important. However, the existing right confirming and right maintaining method generally adopts a centralized right confirming and right maintaining method. Taking music copyright as an example, the current right exercise system architecture is shown in fig. 1, in which a piece of music is related to a plurality of nodes (e.g., word writer, song writer, singer, agent, etc.), and there is no information on the traffic and the association between the nodes.
The centralized management mode has the problems of unequal information, complex structure, large personnel quantity, fine labor division and low efficiency for different nodes. This directly results in difficulties in determining and maintaining the right.
Aiming at the problems in the prior right confirming and right maintaining, no effective solution is provided at present.
Disclosure of Invention
The application aims to provide a copyright monitoring method, a copyright query system and copyright verification equipment, which can simply and efficiently realize right confirmation and right maintenance.
The application provides a copyright monitoring method, a copyright query system and a copyright query device, which are realized as follows:
in one aspect, a copyright monitoring method is provided, including:
monitoring a target source, and determining whether an application object matched with a copyright object stored in a node of a block chain exists in the target source;
in the event that it is determined that there is an application object that matches a rights object stored in a node of a blockchain, synchronizing a matching result to each node on the blockchain, wherein each node on the blockchain includes at least one of: a copyright object affiliated side node and an application object using side node.
In another aspect, a music copyright monitoring method is provided, including:
acquiring an audio and video file released by an audio and video application;
determining whether the audio and video files carry audio files stored by nodes in a block chain, wherein the audio files stored by the nodes in the block chain are audio files which pass copyright authentication;
under the condition that the audio file stored by the node in the block chain is determined to be carried, synchronizing the data of the determination result to each node on the block chain so as to carry out early warning of infringement, wherein each node on the block chain comprises at least one of the following nodes: a music copyright owner node and an audio and video application node.
In another aspect, a method for querying copyright is provided, including:
acquiring a starting request for starting an infringement inquiry application by a user;
calling and monitoring infringement monitoring information on the copyright object of the user from a blockchain in response to the starting request;
and providing a display interface, and displaying the monitoring information on the display interface.
In another aspect, a copyright monitoring system is provided, including: the system comprises a copyright object affiliated party node, an application object using party node and a monitoring party node, wherein:
the node of the copyright object, the node of the application object user and the node of the monitoring party are used as nodes in a block chain to be accessed into the block chain;
the monitoring side node is used for monitoring a target source and determining whether an application object matched with the copyright object stored by the node in the block chain exists in the target source; and under the condition that the application object matched with the copyright object stored in the node in the block chain exists, synchronizing the matching result to the node to which the copyright object belongs and the node of the user of the application object.
In yet another aspect, a copyright monitoring device is provided, comprising a processor and a memory for storing processor-executable instructions, which when executed by the processor implement the steps of the above-described method.
In yet another aspect, a copyright monitoring device is provided, comprising a processor and a memory for storing processor-executable instructions, which when executed by the processor implement the steps of the above-described method.
In yet another aspect, a computer-readable storage medium is provided having stored thereon computer instructions which, when executed, implement the steps of the above-described method.
In yet another aspect, a computer-readable storage medium is provided having stored thereon computer instructions which, when executed, implement the steps of the above-described method.
The copyright monitoring method, the copyright query system and the copyright query device provided by the application determine whether an application object matched with the copyright object stored by the node in the block chain exists in the target source by monitoring the target source, that is, determine whether an application object infringing the copyright object in the block chain exists, and if so, synchronize the determination result to each node in the block chain: the node of the copyright object and the node of the application object user can know that the copyright object is infringed, the node of the application object user can know the infringement risk of the application object user, and meanwhile, the node of the copyright object user is recorded in the block chain system, so that follow-up tracing can be carried out. The technical problem that the existing infringement monitoring is difficult is solved through the scheme, and the technical effects of simply and efficiently realizing right confirmation and right maintenance are achieved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
FIG. 1 is a schematic diagram of a conventional copyright monitoring system;
FIG. 2 is a schematic diagram of an architecture of a copyright monitoring system according to an embodiment of the present application;
FIG. 3 is a method flow diagram of a copyright monitoring method of an embodiment of the present application;
FIG. 4 is a block diagram of a decentralized copyright monitoring system according to an embodiment of the present application;
FIG. 5 is an interface diagram of a terminal application according to an embodiment of the present application;
fig. 6 is a timing chart of a copyright monitoring method of the embodiment of the present application;
FIG. 7 is a schematic diagram of an architecture of a server according to an embodiment of the present application;
fig. 8 is a block diagram of a copyright monitoring apparatus according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It is considered that there is no effective way to monitor and warn the copyright. For example, with the development of digital music and the like, digitization facilitates unauthorized pirated music and illegal distribution and use of copyrighted music through networks, thus infringing the interests of musicians and music creators. However, there is no good way to perform early warning and monitoring of infringement.
For this reason, it is considered in this example that if copyrighted content can be added to the blockchain system in combination with the blockchain technique, and the copyright owner, the copyright user, and the monitoring early-warning party are all connected to the blockchain system as nodes, then early warning and monitoring of infringement can be achieved through the blockchain system, and effective right can be maintained for the copyright owner.
As shown in fig. 2, in this example, there is provided a copyright monitoring system, which may include: a rights object owner node 101, an application object user node 102, and a monitor node 103, wherein the rights object owner node 101, the application object user node 102, and the monitor node 103 are all accessed into the block chain as nodes in the block chain;
for the monitoring party 103, the target source may be monitored, and whether an application object matching the rights object stored by the node in the block chain exists in the target source is determined; in the case where it is determined that there is an application object matching the rights object stored by the node in the blockchain, the matching result is synchronized to the rights object belonging node 101 and the application object consumer node 102.
That is, the monitoring node may monitor a target source that needs to perform copyright monitoring, perform infringement analysis on resource objects in the target source, determine whether an infringed object exists in the resource objects, and if so, write the infringed object into a block chain and synchronize the infringed object with an rights holder.
This allows the infringer (application object consumer node 102) to know that it is infringed, and the rights holder (i.e., rights object owner node 101) to know that its copyright product is infringed, and the specific infringement situation. Meanwhile, since the matching result is written into the block chain, the matching result can be used as evidence in an infringing lawsuit subsequently.
The rights object owner node 101 may be a company to which the rights belong, or an individual to which the rights belong, or the like. For example, if the rights object is a musical piece, the rights object belonging party node 101 may be a record company, a word author, a song author, a singer, or the like. If the rights object is a written work, the node 101 to which the rights object belongs may be the author, publisher, etc. of the written work. Specifically, which one or more objects the rights object owner node 101 belongs to may be set according to actual needs.
Specifically, for the target source, if the rights object is a musical piece, the target source may be a live video application, a video playing application, a music playing application, a radio station, or the like, or may be a database for storing resources, or the like. If the rights object is a written work, the target source may be a blog, a forum, a news client, a journal platform, a paper platform, and so forth. Specifically, which one or more objects the target source may be set according to actual needs.
For the monitoring side node, after it is determined that the infringement behavior exists, the monitoring information can be transmitted to each node in the block chain in an encryption mode, so that the monitoring information can be checked by the nodes which are in need and have the checking authority.
Specifically, in this example, a block chain-based copyright monitoring system is provided, which may include: the system comprises a copyright object affiliated side node, an application object user node and a monitoring side node, wherein the copyright object affiliated side node, the application object user node and the monitoring side node are added into a block chain under the premise of complying with a node service protocol of the running block chain.
For the monitoring side node, the target source (which may be an application object user node) may be monitored, and whether an application object matching the rights object stored in the blockchain exists in the target source is determined; and under the condition that the application object matched with the copyright object stored in the block chain is determined to exist, the application object is pushed to the node of the copyright object and the node of the application object user or is recorded in the account book, and the node of the copyright object and the node of the application object user can check the account book.
That is, the monitoring party node may monitor the application object user node that needs to perform the copyright monitoring, perform the infringement analysis on the resource object in the application object user node, determine whether an infringement object exists in the resource object, if so, write the infringement object into the block chain ledger, and synchronize to the application object user node and the node to which the copyright object belongs.
The node to which the rights object belongs may be a company to which the rights belong, or an individual to which the rights belong, or the like. For example, if the rights object is a musical piece, the party node to which the rights object belongs may be a record company, a word author, a song author, a singer, and the like. If the rights object is a written work, the node to which the rights object belongs may be the author, publisher, etc. of the written work. Specifically, which one or more objects the node to which the rights object belongs may be set according to actual needs.
As for the application object user node described above, if the rights object is a musical piece, the application object user node may be a live video platform, a video playing platform, a music playing platform, a radio station, or the like. If the rights object is a written work, the application object consumer node may be a blog, a forum, a news client, a journal platform, a paper platform, and so on. Specifically, which one or more objects the application object user node may be set according to actual needs.
For the monitoring side node, after it is determined that the infringement behavior exists, the monitoring information can be transmitted to each node in the block chain in an encryption mode, so that the monitoring information can be checked by the nodes which are in need and have the checking authority.
The "block chain" described in the embodiments provided herein may specifically refer to a P2P network system having a distributed data storage structure, where each node is achieved through a consensus mechanism, and data in the block chain is distributed in temporally consecutive individual "blocks" (where the latter block contains a data summary of the former block, and full backup of data of all or part of the nodes is achieved according to different specific consensus mechanisms (such as POW, POS, DPOS, PBFT, etc.). It is well known to those skilled in the art that, since the blockchain system operates under a corresponding consensus mechanism, data that has been included in the blockchain database is difficult to be tampered with by any node, for example, a blockchain that adopts POW consensus requires at least 51% of effort of the whole network to tamper with existing data, so that the blockchain system has the characteristics of guaranteeing data security and tamper resistance compared with other centralized database systems. The infringement events identified by the embodiment can be inquired and processed after being recorded into the block chain, for the application object user, self-check can be performed, for the copyright object user, the infringement or use condition of the works can be known, the responsibility of the infringement user can be traced within the law principle, and the infringement event information recorded in the block chain can be used as the basis for infringement judgment.
In the embodiment described in the present specification, under the cooperative trust system of the intelligent contract, the consumer can pay according to the agreed charging standard by paying, rewarding or trading on the chain when using the work, and transfer the paid fee to the producer of the work. Specifically, an intelligent contract corresponding to the distribution of the copyright revenue of the rights object may be generated based on the copyright information of the rights object, and the intelligent contract may be deployed and linked. The intelligent contract declares the copyright profit distribution logic corresponding to various possible copyright use events, namely the profit obtained based on each copyright use event and the profit proportion to be obtained by the party to which each copyright object belongs. When any one of the above copyright use events occurs, if a user downloads a piece of music work for payment, a target transaction is initiated to the intelligent contract by the member node device in the block chain corresponding to the copyright use event, and the target transaction may include the content or type and cost of the current copyright use event, the address and API interface of the intelligent contract, so as to invoke the intelligent contract to execute the copyright profit allocation logic declared by the intelligent contract and corresponding to the copyright use event of the music work for payment downloading, and allocate the profits obtained by the corresponding copyright object parties to the copyright object parties in a transaction form, that is, in a form of transfer of the intelligent contract to the account of the copyright object parties.
The application object user 102 may be a computer device that executes a behavior of initiating a pay-for-download of the rights object from the user side, a service terminal device on which an online platform providing the rights download is located, or another device communicatively connected to the user side or the service side, and the device needs to follow a node service protocol of the running block chain, and add the node service protocol into the block chain to become a node of the block chain.
In the above embodiments provided in this specification, application objects of multiple target sources are detected to determine whether to infringe, and meanwhile, revenue distribution logic is executed based on an intelligent contract run on a block chain triggered by an actual copyright usage event of a work, and copyright usage revenue is automatically distributed to the infringed copyright object owner 101, so that revenue of the copyright object owner 101 can be effectively guaranteed, and situations of stealing copyright objects of other people are reduced; the intelligent contract is generated based on the copyright state information of the works which are certified on the block chain, and the common identification mechanism, the tamper-proof and masquerading-proof mechanism and the like of the block chain ensure that no default behaviors such as copyright default assignment, illegal grant of the works, multiple grants of exclusive permissions and the like exist in the copyright state information, so that the legal and effective execution of the intelligent contract is ensured.
In one embodiment illustrated herein, to reduce the acknowledgement time of data on the chain, improve transaction throughput, and meet security and performance requirements, a federation chain architecture may be selected to construct the blockchain. For example, in a federation chain based on music copyright usage, an authority with higher credit, such as a large record publishing company, an online music platform with larger user traffic, etc., may be selected as a monitoring party node of the federation chain to participate in block billing. The alliance chain can determine the degree of openness to the public according to application scenarios, and the openness authority can be given to access the alliance chain, for example, in this embodiment, a large record issuing company and a transfer authorization issuing company can participate in accounting for nodes of alliance member parties, and each target source and the party to which the rights object belongs can be a general node with the authority of accessing the alliance chain.
It should be noted that, when the member node devices in the federation chain perform consensus processing on the intelligent contract issued to the blockchain, details of the consensus algorithm and the specific consensus process used in the consensus processing are not described in detail in this specification, and those skilled in the art may refer to records in related arts when implementing the technical solution described in this specification.
The target transaction (transfer) described in this specification refers to a piece of data that a user creates through a client of a blockchain and needs to be finally published to a distributed database of the blockchain. The transactions in the blockchain are classified into narrow transactions and broad transactions. A narrowly defined transaction refers to a transfer of value issued by a user to a blockchain; for example, in a conventional bitcoin blockchain network, the transaction may be a transfer initiated by the user in the blockchain. The broad transaction refers to a piece of business data with business intention, which is issued to the blockchain by a user; for example, an operator may build a federation chain based on actual business requirements, relying on the federation chain to deploy some other types of online business unrelated to value transfer (e.g., a rental house business, a vehicle dispatching business, an insurance claim settlement business, a credit service, a medical service, etc.), and in such federation chain, the transaction may be a business message or a business request with a business intent issued by a user in the federation chain. In the embodiments described in this specification, any event that involves the infringement of the actual rights object may be within the scope of protection of this specification.
In this example, a copyright monitoring method is provided, as shown in fig. 3, which may include the following steps:
step 301: monitoring a target source, and determining whether an application object matched with a copyright object stored by a node in a block chain exists in the target source;
specifically, each application object on the target source may be traversed in a crawler manner as follows:
s1: comparing the current application object with the copyright objects stored by the nodes in the block chain one by one;
during comparison, a feature comparison mode may be adopted to determine whether the current application object includes the rights object existing in the block chain by determining whether the similarity exceeds a preset threshold, that is, determining whether an infringing application object exists.
S2: under the condition that the current application object comprises the copyright object existing in the node in the block chain, determining that an application object matched with the copyright object stored in the node in the block chain exists in the current application object;
s3: and under the condition that the current application object does not comprise the copyright object existing in the node in the block chain, determining that the application object matched with the copyright object stored in the node in the block chain does not exist in the current application object.
For example, if an audio file that has acquired a copyright is stored in the block chain, the application object of the target source may be compared with the audio file in the block chain by using an audio fingerprint, so as to determine whether the application object in the target source carries the audio file that has acquired the copyright, that is, determine whether the application object has an infringement.
Step 302: in the event that it is determined that there is an application object that matches a rights object stored by a node in a blockchain, synchronizing a matching result to each node on the blockchain, wherein each node on the blockchain comprises at least one of: a copyright object affiliated side node and an application object using side node.
It should be noted that the above example is described by taking an audio file as an example, however, in practical implementation, the rights object may also be: musical works with music copyright, written works with copyright, image works with appearance patent, and the like. That is, any copyrighted object may be used as the rights object, and specifically, which kind of object is used as the rights object, and the application is not limited thereto.
In implementation, the current application object is compared with the rights objects stored in the block chain one by one, specifically, feature information of the current application object is extracted, and the feature information is compared with fingerprint information of the rights objects stored in the block chain one by one, so as to determine whether an application object matched with the rights object stored in the block chain exists in the current application object.
In consideration of copyright payment, the blockchain system can set a collaborative trust system of an intelligent contract, under the collaborative trust system of the intelligent contract, when a consumer consumes the content of a music content user, or pays or rewards, transactions on the chain can be automatically and timely distributed to the related music content producers according to the corresponding agreed proportion. For example, in the case where it is determined that there is an application object that matches a rights object stored in a node of a blockchain, the matching result is synchronized to each node on the blockchain, and then it may be determined whether the matched application object has paid a fee to the node to which the rights object belongs; and under the condition that the unpaid fee is determined, controlling the application object user node to automatically and real-timely distribute the use fee to each subordinate node of the copyright object according to the proportion predetermined by the intelligent contract.
The nodes in the block chain may further store, but are not limited to, at least one of the following information of the rights object: copyright owner, copyright passing time, copyright description information, copyright valid time and copyright charging information.
Considering that for the node of the right object, if an identity confirmation can be performed, the right confirmation and the right maintenance can be better realized, for this reason, the identity verification information of the node of the right object can be obtained, and then the identity verification information is verified; and after the verification is passed, adding the party to which the rights object belongs as a node into the block chain.
Taking a copyright object as an audio file for example for explanation, a music copyright monitoring method is provided, and may include:
s1: acquiring an audio and video file issued by an audio and video platform;
s2: determining whether the audio and video files carry audio files stored by nodes in a block chain, wherein the audio files stored by the nodes in the block chain are audio files which pass copyright authentication;
for example, the audio features in the audio/video file may be extracted, and then the audio features are compared with the audio fingerprints of each audio file stored by the nodes in the block chain; and if the matched audio fingerprint exists, determining that the audio and video file carries the audio file stored by the node in the block chain.
S3: under the condition that the audio file stored by the node in the block chain is determined to be carried, synchronizing the data of the determination result to each node on the block chain to perform early warning of infringement, wherein the node on the block chain may include at least one of the following: a music copyright owner node and an audio and video application node.
The block chain may store at least one of the following information of the audio file: associated artist, lyrics, composition, song album information, copyright information.
Specifically, after the determination result data is synchronized to each node on the block chain to perform early warning of infringement, the determination result data may be pushed to the node of the music copyright owner in a manner of application message.
The copyright monitoring method is described with reference to a specific scenario, however, it should be noted that the specific scenario is only for better illustration of the present application and does not constitute a limitation to the present application.
As shown in fig. 4, there is provided a decentralized blockchain system, comprising the following nodes: brokers, release new media, independent musicians, brands, singers, producers, word authors, and song authors.
In this example, each song registered on the blockchain network, and all related information such as artist, lyrics, composition, introduction of album, cover, copyright, etc. associated with the song are completely recorded by means of Hash (Hash) storage using distributed accounting provided in the blockchain. By recording a large amount of song information in the block chain, the operation of authentication and authorization can be carried out so as to realize the monitoring and early warning related to the music copyright.
Further, the monitored information can be transmitted to all node related parties in an encrypted mode, for example, as shown in fig. 5, pushing is performed in a smart phone side APP mode, and the user can check copyright related information and income conditions through the smart phone side APP.
For example, background music used by a short video with a play amount exceeding millions is music A sung by a small C artist, a brand of the short video platform belongs to company H, and audio fingerprint comparison shows that the background music A is authorized to a related music producer, but the short video user or the short video platform is not authorized by a copyright party, so that the generated early warning information can carry all related monitoring detail information and synchronize the detail information to all nodes on a block chain. These synchronized details can serve as evidence that the copyright owner subsequently underwent lawsuits to safeguard legitimate rights. Meanwhile, the content use platform side can also carry out self-checking, so that legal risks caused by infringement are avoided, and consumption contents such as music copyright content creation and the like can be legally and actively used through copyright authorization.
Meanwhile, under the cooperative trust system of the intelligent contract, the consumer can pay according to the agreed charging standard by paying, rewarding or trading on the chain when using the music content, and transfer the paid fee to the music content producer.
In this example, an identification mechanism may also be provided to determine the identity information of the copyright owner. Specifically, the node identity can be identified and verified through the basic information of the music library and the node identity declared by the obligee, and the node identity can also be verified through biological identification modes such as voiceprint comparison, face identification and the like. For example: the right-claimant inputs his own voice according to the requirement of the client, reads or sings the predefined content, and then confirms the identity according to the fingerprint of the music library.
As shown in fig. 6, the copyright monitoring system may include: consumer, transaction ledger, music user, copyright monitoring, and music producer. Wherein, the music producer is as music producer node, specifically, the music producer node can include: word song authors, musicians, singers, brokers, producers, and brands.
The consumer node may be a new media platform that generates the music consumption content. For a copyright monitoring party, daily monitoring can be performed on a new media platform of a contract through copyright monitoring and weight judgment, audio and video files on the platform are obtained, audio fingerprint fragments are extracted and decomposed, then audio fingerprint comparison is performed, comparison result information is returned, and a music hit result set is output, so that monitoring and early warning are performed.
For a music user, the transaction of music copyright content can be realized by means of token payment and the like, and the transaction result enters a distributed gate. Further, for the whole business system, the identity recognition verification can be carried out on the consumer, the music user and the music producer. All the information in the block chain can be written into all the nodes on the chain by means of substantial synchronization.
Because the distributed accounts in the block chain exist independently, the accounts can not be tampered theoretically, namely, decentralization is realized through the block chain technology, and monitoring, early warning, transaction and accounting of the music copyright are achieved.
For a terminal, a copyright query method is provided, which may include the following steps:
s1: acquiring a starting request for starting an infringement inquiry application by a user;
s2: calling and monitoring infringement monitoring information on the copyright object of the user from a blockchain in response to the starting request;
wherein the monitoring information may include, but is not limited to, at least one of: infringement platform, infringement times and copyright revenue.
S3: and providing a display interface, and displaying the monitoring information on the display interface.
The method provided by the embodiment of the application can be executed in a mobile terminal, a computer terminal or a similar operation device. Taking the example of running on a server, fig. 7 is a hardware structure block diagram of a computer terminal of a copyright monitoring method according to an embodiment of the present invention. As shown in fig. 7, the server 10 may include one or more (only one shown) processors 102 (the processors 102 may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), a memory 104 for storing data, and a transmission module 106 for communication functions. It will be understood by those skilled in the art that the structure shown in fig. 7 is only an illustration and is not intended to limit the structure of the electronic device. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 7, or have a different configuration than shown in FIG. 7.
The memory 104 may be used to store software programs and modules of application software, such as program instructions/modules corresponding to the copyright monitoring method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the software programs and modules stored in the memory 104, that is, implements the aforementioned copyright monitoring method of the application program. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission module 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission module 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission module 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
At a software level, as shown in fig. 8, the copyright monitoring apparatus may include: monitoring module 801, synchronization module 802, wherein:
a monitoring module 801, configured to monitor a target source, and determine whether an application object matching a rights object stored by a node in a block chain exists in the target source;
a synchronization module 802, configured to synchronize a matching result to each node on a blockchain if it is determined that there is an application object that matches a rights object stored by the node in the blockchain, where each node on the blockchain includes at least one of: a copyright object affiliated side node and an application object using side node.
In one embodiment, the rights object may include, but is not limited to, at least one of: musical works with music copyright, written works with copyright, and image works with appearance patent.
In one embodiment, the monitoring module 801 may be specifically configured to: traversing each application object on the target source in a crawler mode according to the following modes: comparing the current application object with the copyright objects stored by the nodes in the block chain one by one; under the condition that the current application object comprises the copyright object existing in the node in the block chain, determining that an application object matched with the copyright object stored in the node in the block chain exists in the current application object; and under the condition that the current application object does not comprise the copyright object existing in the node in the block chain, determining that the application object matched with the copyright object stored in the node in the block chain does not exist in the current application object.
In one embodiment, comparing the current application object with the rights objects stored by the nodes in the block chain one by one may include: and extracting the characteristic information of the current application object, and comparing the characteristic information with the fingerprint information of the copyright object stored by the node in the block chain one by one.
In one embodiment, the node in the block chain further stores at least one of the following information of the rights object: copyright owner, copyright passing time, copyright description information, copyright valid time and copyright charging information.
In one embodiment, the above-mentioned rights monitoring apparatus may further obtain authentication information of a party to which the rights object belongs; verifying the identity verification information; and after the verification is passed, adding the party to which the rights object belongs as a node into the block chain.
In a software aspect, there is also provided a music copyright monitoring apparatus, which may include: the device comprises an acquisition module, a determination module and a synchronization module, wherein:
the acquisition module is used for acquiring audio and video files released by audio and video applications;
the determining module is used for determining whether the audio and video files carry audio files stored by nodes in a block chain, wherein the audio files stored by the nodes in the block chain are audio files which pass copyright authentication;
a synchronization module, configured to synchronize, when it is determined that the audio file is stored by a node in a block chain, determination result data to each node in the block chain, so as to perform early warning of infringement, where each node in the block chain includes at least one of the following: a music copyright owner node and an audio and video application node.
In one embodiment, the block chain may store at least one of the following information of an audio file: associated artist, lyrics, composition, song album information, copyright information.
In an embodiment, after the copyright monitoring apparatus synchronizes the determination result data to each node on the block chain to perform early warning of infringement, the copyright monitoring apparatus may further push the determination result data to the music copyright owner by using a message.
In one embodiment, the determining module may specifically extract audio features in the audio/video file; comparing the audio features with the audio fingerprints of the audio files stored by the nodes in the block chain; and if the matched audio fingerprint exists, determining that the audio and video file carries the audio file stored by the node in the block chain.
In the foregoing embodiments, the copyright monitoring method, the copyright query system, and the copyright query device provided in the embodiments determine whether an application object matching a copyright object stored in a blockchain exists in a target source, that is, determine whether an application object infringing the copyright object in the blockchain exists, and if so, synchronize the determination result to a node on the blockchain: the copyright object owner and the application object user can know that the copyright object owner is infringed, the application object user can know the infringement risk of the application object owner, and the application object owner is recorded in the block chain system, so that follow-up tracing can be performed. The technical problem that the existing infringement monitoring is difficult is solved through the scheme, and the technical effects of simply and efficiently realizing right confirmation and right maintenance are achieved.
Although the present application provides method steps as described in an embodiment or flowchart, additional or fewer steps may be included based on conventional or non-inventive efforts. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or client product executes, it may execute sequentially or in parallel (e.g., in the context of parallel processors or multi-threaded processing) according to the embodiments or methods shown in the figures.
The apparatuses or modules illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. The functionality of the modules may be implemented in the same one or more software and/or hardware implementations of the present application. Of course, a module that implements a certain function may be implemented by a plurality of sub-modules or sub-units in combination.
The methods, apparatus or modules described herein may be implemented in computer readable program code to a controller implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, Application Specific Integrated Circuits (ASICs), programmable logic controllers and embedded microcontrollers, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
Some of the modules in the apparatus described herein may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, classes, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary hardware. Based on such understanding, the technical solutions of the present application may be embodied in the form of software products or in the implementation process of data migration, which essentially or partially contributes to the prior art. The computer software product may be stored in a storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, mobile terminal, server, or network device, etc.) to perform the methods described in the various embodiments or portions of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same or similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. All or portions of the present application are operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, mobile communication terminals, multiprocessor systems, microprocessor-based systems, programmable electronic devices, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
While the present application has been described with examples, those of ordinary skill in the art will appreciate that there are numerous variations and permutations of the present application without departing from the spirit of the application, and it is intended that the appended claims encompass such variations and permutations without departing from the spirit of the application.

Claims (19)

1. A copyright monitoring method, comprising:
monitoring a target source, and determining whether an application object matched with a copyright object stored in a node of a block chain exists in the target source;
in the event that it is determined that there is an application object that matches a rights object stored in a node of a blockchain, synchronizing a matching result to each node on the blockchain, wherein each node on the blockchain includes at least one of: a copyright object affiliated side node and an application object using side node.
2. The method of claim 1, wherein the rights object comprises at least one of: musical works with music copyright, written works with copyright, and image works with appearance patent.
3. The method of claim 1, wherein determining whether an application object exists in the target source that matches a rights object stored in a node of a blockchain comprises:
traversing each application object on the target source in a crawler mode according to the following modes:
comparing the current application object with the copyright objects stored in the nodes of the block chain one by one;
under the condition that the current application object comprises the copyright object existing in the node of the block chain, determining that an application object matched with the copyright object stored in the node of the block chain exists in the current application object;
and under the condition that the current application object does not comprise the copyright object existing in the node of the block chain, determining that no application object which is matched with the copyright object stored in the node of the block chain exists in the current application object.
4. The method of claim 3, wherein comparing the current application object with the stored rights objects in the blockchain one by one comprises:
and extracting the characteristic information of the current application object, and comparing the characteristic information with the fingerprint information of the copyright object stored in the node of the block chain one by one.
5. The method according to claim 1, wherein the nodes of the block chain further store at least one of the following information of the rights object: copyright owner, copyright passing time, copyright description information, copyright valid time and copyright charging information.
6. The method of claim 1, further comprising:
acquiring the identity verification information of the party to which the copyright object belongs;
verifying the identity verification information;
and after the verification is passed, adding the party to which the rights object belongs as a node into the block chain.
7. The method of claim 1, wherein in the event that it is determined that there is an application object that matches a rights object stored in a node of a blockchain, synchronizing the matching results to the respective nodes on the blockchain, the method further comprising, after:
determining whether the matched application object pays the expense to the node of the copyright object;
and under the condition that the unpaid fee is determined, controlling the application object user node to automatically and real-timely distribute the use fee to each subordinate node of the copyright object according to the proportion predetermined by the intelligent contract.
8. A music copyright monitoring method is characterized by comprising the following steps:
acquiring an audio and video file released by an audio and video application;
determining whether the audio and video files carry audio files stored by nodes in a block chain, wherein the audio files stored by the nodes in the block chain are audio files which pass copyright authentication;
under the condition that the audio file stored by the node in the block chain is determined to be carried, synchronizing the data of the determination result to each node on the block chain so as to carry out early warning of infringement, wherein each node on the block chain comprises at least one of the following nodes: a music copyright owner node and an audio and video application node.
9. The method of claim 8, wherein a node in the blockchain stores at least one of the following information for an audio file: associated artist, lyrics, composition, song album information, copyright information.
10. The method of claim 8, wherein after synchronizing the determination data to each node on the blockchain for infringement warning, the method further comprises:
and pushing the determined result data to the music copyright owner in an application message mode.
11. The method according to claim 8, wherein determining whether the audio/video file carries an audio file stored by a node in a block chain comprises:
extracting audio features in the audio and video file;
comparing the audio features with the audio fingerprints of the audio files stored by the nodes in the block chain;
and if the matched audio fingerprint exists, determining that the audio and video file carries the audio file stored by the node in the block chain.
12. The method according to claim 8, wherein in a case where it is determined that the audio file stored in the node carrying the block chain is carried, the determination result data is synchronized to each node on the block chain to perform early warning of infringement, and thereafter, the method further comprises:
determining whether an audio and video application node of the audio and video file pays a fee to a music copyright owner node;
and under the condition that the unpaid fee is determined, controlling the audio and video application node to automatically and real-timely distribute the use fee to each owner node of the music copyright according to the proportion preset by an intelligent contract.
13. A method for querying copyright, comprising:
acquiring a starting request for starting an infringement inquiry application by a user;
calling and monitoring infringement monitoring information on the copyright object of the user from a blockchain in response to the starting request;
and providing a display interface, and displaying the monitoring information on the display interface.
14. The method of claim 13, wherein the monitoring information comprises at least one of: infringement platform, infringement times and copyright revenue.
15. A copyright monitoring system, comprising: the system comprises a copyright object affiliated party node, an application object using party node and a monitoring party node, wherein:
the node of the copyright object, the node of the application object user and the node of the monitoring party are used as nodes in a block chain to be accessed into the block chain;
the monitoring side node is used for monitoring a target source and determining whether an application object matched with the copyright object stored by the node in the block chain exists in the target source; and under the condition that the application object matched with the copyright object stored in the node in the block chain exists, synchronizing the matching result to the node to which the copyright object belongs and the node of the user of the application object.
16. A copyright monitoring device comprising a processor and a memory for storing processor-executable instructions which, when executed by the processor, implement the steps of the method of any one of claims 1 to 7.
17. A copyright monitoring device comprising a processor and a memory for storing processor-executable instructions which, when executed by the processor, implement the steps of the method of any one of claims 8 to 12.
18. A computer readable storage medium having stored thereon computer instructions which, when executed, implement the steps of the method of any one of claims 1 to 7.
19. A computer readable storage medium having stored thereon computer instructions which, when executed, implement the steps of the method of any one of claims 8 to 12.
CN201810782324.3A 2018-07-17 2018-07-17 Copyright monitoring method, copyright query method, system and equipment Pending CN110728592A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810782324.3A CN110728592A (en) 2018-07-17 2018-07-17 Copyright monitoring method, copyright query method, system and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810782324.3A CN110728592A (en) 2018-07-17 2018-07-17 Copyright monitoring method, copyright query method, system and equipment

Publications (1)

Publication Number Publication Date
CN110728592A true CN110728592A (en) 2020-01-24

Family

ID=69217404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810782324.3A Pending CN110728592A (en) 2018-07-17 2018-07-17 Copyright monitoring method, copyright query method, system and equipment

Country Status (1)

Country Link
CN (1) CN110728592A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112434264A (en) * 2021-01-27 2021-03-02 支付宝(杭州)信息技术有限公司 Infringement processing method and device based on block chain and electronic equipment
CN112711741A (en) * 2021-01-05 2021-04-27 天津证好在数据科技有限公司 Method for solidifying infringement evidence of live broadcasting
CN114666613A (en) * 2020-12-22 2022-06-24 华为终端有限公司 Network live broadcast method and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101493918A (en) * 2008-10-21 2009-07-29 深圳市牧笛科技有限公司 On-line music pirate monitoring method and system
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method
CN107798650A (en) * 2017-09-18 2018-03-13 众安信息技术服务有限公司 A kind of digital asset infringement decision method and device based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101493918A (en) * 2008-10-21 2009-07-29 深圳市牧笛科技有限公司 On-line music pirate monitoring method and system
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method
CN107798650A (en) * 2017-09-18 2018-03-13 众安信息技术服务有限公司 A kind of digital asset infringement decision method and device based on block chain

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114666613A (en) * 2020-12-22 2022-06-24 华为终端有限公司 Network live broadcast method and electronic equipment
CN114666613B (en) * 2020-12-22 2024-01-05 华为终端有限公司 Network live broadcast method and electronic equipment
CN112711741A (en) * 2021-01-05 2021-04-27 天津证好在数据科技有限公司 Method for solidifying infringement evidence of live broadcasting
CN112434264A (en) * 2021-01-27 2021-03-02 支付宝(杭州)信息技术有限公司 Infringement processing method and device based on block chain and electronic equipment

Similar Documents

Publication Publication Date Title
TWI701619B (en) Block chain-based method and device for distributing copyright income of works
KR100671073B1 (en) Rights management system using legality expression language
US7370017B1 (en) Redistribution of rights-managed content and technique for encouraging same
US8117094B2 (en) Distribution channels and monetizing
WO2018031409A1 (en) Distributed data store for managing media
CN111027028A (en) Copyright data processing method and device based on intelligent contract
US20040267552A1 (en) System and method for controlling rights expressions by stakeholders of an item
CN101196970A (en) Digital copyright management system based on digital watermarking and mobile proxy
JP2007525725A (en) Content regulation system and apparatus
CN111656344A (en) Rights management method, device and system, and storage medium
CN110728592A (en) Copyright monitoring method, copyright query method, system and equipment
CN111815420B (en) Matching method, device and equipment based on trusted asset data
Guo et al. A blockchain-driven electronic contract management system for commodity procurement in electronic power industry
WO2020103565A1 (en) Block chain-based method and device for taxi operation
KR20210037274A (en) Apparatus and method for managing contents
US20230100422A1 (en) Systems and Methods for Transaction Management in NFT-Directed Environments
WO2021090120A1 (en) Downstream tracking of content consumption
US20130067602A1 (en) Copyrights with Post-Payments for P2P File Sharing
Kumar et al. An approach to Open-Source Software License Management using Blockchain-based Smart-Contracts
CN112470150A (en) Control method, content management system, program, and data structure
KR101327530B1 (en) Apparatus and method for blocking illegal uploading in intermediate server
CN116028982A (en) Processing method, device and system based on non-homogeneous general evidence
Zhang Piracy or Fair Use? Evaluating the Welfare of Software Copyright Takedowns: Theory and Evidence from GitHub
KR101302609B1 (en) Apparatus and method for judging illegal upload digital contents
Beelen How Can Blockchain Improve the Functioning of the Collective Management Organisations?

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40021660

Country of ref document: HK