CN110866224A - Picture right determining method and system based on block chain - Google Patents

Picture right determining method and system based on block chain Download PDF

Info

Publication number
CN110866224A
CN110866224A CN201911132865.2A CN201911132865A CN110866224A CN 110866224 A CN110866224 A CN 110866224A CN 201911132865 A CN201911132865 A CN 201911132865A CN 110866224 A CN110866224 A CN 110866224A
Authority
CN
China
Prior art keywords
picture
data
block chain
encrypted data
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911132865.2A
Other languages
Chinese (zh)
Inventor
徐惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN201911132865.2A priority Critical patent/CN110866224A/en
Publication of CN110866224A publication Critical patent/CN110866224A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The embodiment of the application discloses a picture right confirming method and system based on a block chain. The picture right determining method based on the block chain comprises the following steps: acquiring picture data and copyright data of the picture, wherein the picture data comprises original data of the picture and/or first encrypted data of the picture; writing at least a portion of the picture data and the copyright data to the block chain such that the copyright of the picture can be determined based on three data: the picture data, the copyright data and a first timestamp in a block header of a block where the picture data and the copyright data are located are obtained from the block chain.

Description

Picture right determining method and system based on block chain
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method and a system for determining rights to pictures based on blockchains.
Background
With the development of network information technology, an individual user or an organization can conveniently acquire data information from a network. For some data information, such as pictures, an individual user or organization may not use it without permission of its copyright owner, thereby compromising the interests of the copyright owner.
Therefore, it is necessary to provide a picture right confirming method and system based on a block chain.
Disclosure of Invention
One embodiment of the present application provides a method for determining rights to pictures based on a block chain. The picture right determining method based on the block chain comprises the following steps: acquiring picture data and copyright data of the picture, wherein the picture data comprises original data of the picture and/or first encrypted data of the picture; writing at least a portion of the picture data and the copyright data to the block chain such that the copyright of the picture can be determined based on three data: the picture data, the copyright data and a first timestamp in a block header of a block where the picture data and the copyright data are located are obtained from the block chain.
In some embodiments, before writing the picture data and the copyright data to the block chain, the method further comprises: comparing the picture data with network data in a network platform to determine that the network data same as the picture data does not exist in the network platform, or determining that copyright owners of pictures respectively corresponding to the network data and the picture data are the same when the network data same as the picture data exists; wherein the network platform comprises the blockchain and/or the internet.
In some embodiments, the method for picture right determination based on block chains further comprises: acquiring an instruction for trading the copyright of the picture; trading the copyright of the picture based on the instruction; and writing the copyright transaction information of the picture into the block chain.
In some embodiments, the method for picture right determination based on block chains further comprises: encrypting the selected target picture based on the encryption algorithm of the obtained first encrypted data to obtain second encrypted data of the target picture; comparing the first encrypted data with the second encrypted data; and judging whether the target picture infringes relative to the picture based on the comparison result of the first encrypted data and the second encrypted data.
In some embodiments, the determining whether the target picture is infringing the picture with respect to the picture based on the comparison result of the first encrypted data and the second encrypted data includes: and if the comparison result represents that the first encrypted data is the same as the second encrypted data and it is judged that the authorization time of the target picture is later than the authorization time of the picture based on the first timestamp and/or the second timestamp, determining that the target picture is infringed relative to the picture.
One embodiment of the present application provides a picture right confirming system based on a block chain. The picture right confirming system based on the block chain comprises: the data acquisition module is used for acquiring picture data and copyright data of the picture, wherein the picture data comprises original data of the picture and/or first encrypted data of the picture; a data writing module for writing at least a portion of the picture data and the copyright data into the block chain, so that the copyright of the picture can be determined based on the following three data: the picture data, the copyright data and a first timestamp in a block header of a block where the picture data and the copyright data are located are obtained from the block chain.
In some embodiments, the picture right confirming system based on block chains further comprises: the first comparison module is used for comparing the picture data with network data in a network platform before the picture data and the copyright data are written into the block chain by the data writing module so as to determine that the network data which are the same as the picture data do not exist in the network platform, or when the network data which are the same as the picture data exist, determining that copyright owners of pictures respectively corresponding to the network data and the picture data are the same; wherein the network platform comprises the blockchain and/or the internet.
In some embodiments, the picture right confirming system based on block chains further comprises: the instruction acquisition module is used for acquiring an instruction for trading the copyright of the picture; the trading module is used for trading the copyright of the picture based on the instruction; and the transaction information writing module is used for writing the copyright transaction information of the picture into the block chain.
In some embodiments, the picture right confirming system based on block chains further comprises: the encryption module is used for encrypting the selected target picture based on the encryption algorithm of the obtained first encrypted data to obtain second encrypted data of the target picture; the second comparison module is used for comparing the first encrypted data with the second encrypted data; and the judging module is used for judging whether the target picture infringes relative to the picture based on the comparison result of the first encrypted data and the second encrypted data.
In some embodiments, the copyright data includes a second timestamp for characterizing the copyright time of the picture, and when the copyright owner of the target picture is different from the copyright owner of the picture, the determining module is configured to: and when the comparison result represents that the first encrypted data is the same as the second encrypted data and the right time of the target picture is judged to be later than the right time of the picture based on the first time stamp and/or the second time stamp, determining that the target picture infringes relative to the picture.
One of the embodiments of the present application provides a picture right confirming device based on a block chain, including a processor, where the processor is configured to execute a picture right confirming method based on a block chain.
One of the embodiments of the present application provides a computer-readable storage medium, where the storage medium stores computer instructions, and after the computer reads the computer instructions in the storage medium, the computer executes a picture right determining method based on a block chain.
Drawings
The present application will be further explained by way of exemplary embodiments, which will be described in detail by way of the accompanying drawings. These embodiments are not intended to be limiting, and in these embodiments like numerals are used to indicate like structures, wherein:
fig. 1 is a schematic view of an application scenario of a picture authorization system based on a block chain according to some embodiments of the present application;
FIG. 2 is a block diagram of a block chain based picture entitlement system in accordance with some embodiments of the present application;
fig. 3 is an exemplary flowchart of a picture right determination method based on a block chain according to some embodiments of the present application;
fig. 4 is another exemplary flowchart of a method for determining picture right based on a block chain according to some embodiments of the present application;
fig. 5 is another exemplary flowchart of a method for determining picture right based on a block chain according to some embodiments of the present application;
fig. 6 is another exemplary flowchart of a picture right determination method based on a block chain according to some embodiments of the present application.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments will be briefly introduced below. It is obvious that the drawings in the following description are only examples or embodiments of the application, from which the application can also be applied to other similar scenarios without inventive effort for a person skilled in the art. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "device", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this application and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used herein to illustrate operations performed by systems according to embodiments of the present application. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Fig. 1 is a schematic view of an application scenario of a picture authorization system based on a block chain according to some embodiments of the present application.
As shown in fig. 1, the picture authorization system 100 based on a blockchain may include a terminal 110, a server 120, a blockchain system 130, a network 140, and a storage device 150. The terminal 110 may be configured to obtain a picture uploaded by a user and transmit the picture to the server 120, and the user may browse the uploaded picture through the terminal 110. The server 120 may be configured to calculate a hash value or a digital signature of the obtained picture, and upload the hash value or the digital signature to the blockchain system 130 to write the hash value or the digital signature into the blockchain, or recommend the picture to a user of a different terminal 110. The server 120 may also transmit the picture to the storage device 150 for storage. The server 120 may also implement processes related to picture copyright transactions, transaction fund transfers, and the like, based on instructions sent by the user through the terminal 110.
In some embodiments, terminal 110 refers to a terminal device or software used by a user. The terminal devices may include various types of devices having information receiving and/or transmitting functions. In some embodiments, the terminal 110 may include one or any combination of a mobile device that the user carries with him while traveling, an in-vehicle device, and the like. In some embodiments, the mobile device may comprise a wearable device, a smart mobile device, or the like, or any combination thereof. In some embodiments, the wearable device may include a smart bracelet, a smart watch, a smart backpack, a smart accessory, a bluetooth headset, or the like, or any combination thereof. In some embodiments, the smart mobile device may include a smart phone, a Personal Digital Assistant (PDA), or the like, or any combination thereof. In some embodiments, the in-vehicle device may include an in-vehicle device, a navigation device, or the like, or any combination thereof. The above examples are intended to illustrate the broad scope of the device and not to limit its scope.
In some embodiments, the server 120 may be a stand-alone server or a group of servers, which may be centralized or distributed. In some embodiments, the server 120 may be regional or remote. In some embodiments, server 120 may access information and/or data stored in terminal 110, storage device 140, through network 120. In some embodiments, server 120 may be directly connected to terminal 110, storage device 140 to access information and/or material stored therein. In some embodiments, the server 120 may execute on a cloud platform. For example, the cloud platform may include one or any combination of a private cloud, a public cloud, a hybrid cloud, a community cloud, a decentralized cloud, an internal cloud, and the like.
The blockchain system 130 includes a plurality of blockchain nodes, and both the terminal 110 and the server 120 can join the blockchain system 130 as blockchain nodes through the network 140, i.e., communicate with one or more other blockchain nodes in the blockchain system 130. In particular, reference may be made to the previous description of the terminal 110 and the server 120. Taking the picture uploading as an example, the user uploads the picture to the terminal 110, the terminal 110 uploads the picture to the server 120, the server 120 stores the picture to the storage device 150, and the server 120 may also upload the picture to the blockchain system 130 to write the picture into the blockchain, of course, the server 120 may also calculate a hash value or a digital signature of the picture and upload the hash value or the digital signature to the blockchain system 130.
Network 140 may facilitate the exchange of data and/or information. In some embodiments, one or more components of the blockchain based picture authorization system 100 (e.g., the terminal 110, the server 120, the blockchain system 130, the storage device 150) may send data and/or information to other components of the blockchain based picture authorization system 100 via the network 140. In some embodiments, the network 140 may be any type of wired or wireless network. For example, network 140 may include a cable network, a wired network, a fiber optic network, a telecommunications network, an intranet, the internet, a Local Area Network (LAN), a Wide Area Network (WAN), a Wireless Local Area Network (WLAN), a Metropolitan Area Network (MAN), a Public Switched Telephone Network (PSTN), a bluetooth network, a ZigBee network, a Near Field Communication (NFC) network, the like, or any combination thereof. In some embodiments, network 140 may include one or more network access points. For example, the network 140 may include wired and/or wireless network access points, such as a base station and/or a plurality of internet switching points, through which one or more components of the blockchain based picture authorization system 100 may connect to the network 140 to exchange data and/or information.
Storage device 150 may store data, instructions, and/or any other information such as pictures taken by storage server 120. In some embodiments, the storage device 150 may store data obtained from the terminal 110 and/or the server 120. In some embodiments, storage device 150 may store data and/or instructions that server 120 or terminal 110 may perform or be used to perform the exemplary methods described herein. In some embodiments, storage device 150 may include mass storage, removable storage, volatile read-write memory, read-only memory (ROM), and the like, or any combination thereof. Exemplary mass storage devices may include magnetic disks, optical disks, solid state drives, and the like. Exemplary removable memory may include flash drives, floppy disks, optical disks, memory cards, compact disks, magnetic tape, and the like. Exemplary volatile read and write memory may include Random Access Memory (RAM). Exemplary RAM may include Dynamic RAM (DRAM), Double Data Rate Synchronous Dynamic RAM (DDRSDRAM), Static RAM (SRAM), thyristor RAM (T-RAM), and zero capacitance RAM (Z-RAM). Exemplary ROMs may include Mask ROM (MROM), Programmable ROM (PROM), Erasable Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), compact disk ROM (CD-ROM), and digital versatile disk ROM, among others. In some embodiments, the storage device 150 may be implemented on a cloud platform. By way of example only, the cloud platform may include a private cloud, a public cloud, a hybrid cloud, a community cloud, a distributed cloud, an internal cloud, a multi-tiered cloud, and the like, or any combination thereof.
In some embodiments, storage device 150 may be connected to network 140 to communicate with one or more other components of system 100 (e.g., server 120, terminal 110, etc.). One or more components of system 100 may access data or instructions stored in storage device 150 via network 140. In some embodiments, the storage device 150 may be directly connected to or in communication with one or more other components of the system 100 (e.g., the server 120, the terminal 110, etc.). In some embodiments, the storage device 150 may be part of the server 120.
Fig. 2 is a block diagram of a picture authorization system based on a block chain according to some embodiments of the present application. As shown in fig. 2, the picture authorization system 200 based on block chains may include a data acquisition module 202 and a data writing module 204.
The data obtaining module 202 may be configured to obtain picture data and copyright data of the picture, where the picture data includes original data of the picture and/or first encrypted data of the picture.
The data writing module 204 may be configured to write at least a portion of the picture data and the copyright data into the block chain, so that the copyright of the picture can be determined based on the following three data: the picture data, the copyright data and a first timestamp in a block header of a block where the picture data and the copyright data are located are obtained from the block chain.
In some embodiments, the picture authorization system 200 based on block chain further includes: a first comparing module, configured to compare the picture data with network data in a network platform before the data writing module 204 writes the picture data and the copyright data into the block chain, so as to determine that network data that is the same as the picture data does not exist in the network platform, or determine that copyright owners of pictures respectively corresponding to the network data and the picture data are the same when network data that is the same as the picture data exists; wherein the network platform comprises the blockchain and/or the internet.
In some embodiments, the picture authorization system 200 based on block chain further includes: the instruction acquisition module is used for acquiring an instruction for trading the copyright of the picture; the trading module is used for trading the copyright of the picture based on the instruction; and the transaction information writing module is used for writing the copyright transaction information of the picture into the block chain.
In some embodiments, the picture authorization system 200 based on block chain further includes: the encryption module is used for encrypting the selected target picture based on the encryption algorithm of the obtained first encrypted data to obtain second encrypted data of the target picture; the second comparison module is used for comparing the first encrypted data with the second encrypted data; and the judging module is used for judging whether the target picture infringes relative to the picture based on the comparison result of the first encrypted data and the second encrypted data.
In some embodiments, the copyright data includes a second timestamp for characterizing the copyright time of the picture, and when the copyright owner of the target picture is different from the copyright owner of the picture, the determining module is configured to: and when the comparison result represents that the first encrypted data is the same as the second encrypted data and the right time of the target picture is judged to be later than the right time of the picture based on the first time stamp and/or the second time stamp, determining that the target picture infringes relative to the picture.
It should be understood that the system and its modules shown in FIG. 2 may be implemented in a variety of ways. For example, in some embodiments, the system and its modules may be implemented in hardware, software, or a combination of software and hardware. Wherein the hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory for execution by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the methods and systems described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided, for example, on a carrier medium such as a diskette, CD-or DVD-ROM, a programmable memory such as read-only memory (firmware), or a data carrier such as an optical or electronic signal carrier. The system and its modules of the present application may be implemented not only by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., but also by software executed by various types of processors, for example, or by a combination of the above hardware circuits and software (e.g., firmware).
It should be noted that the above descriptions of the candidate item display and determination system and the modules thereof are only for convenience of description, and are not intended to limit the present application within the scope of the illustrated embodiments. It will be appreciated by those skilled in the art that, given the teachings of the present system, any combination of modules or sub-system configurations may be used to connect to other modules without departing from such teachings. For example, in some embodiments, the data acquisition module 202 and the data writing module 204 disclosed in fig. 2 may be different modules in a system, or may be a module that implements the functions of two or more modules described above. For example, the data acquisition module 202 and the data writing module 204 may be two modules, or one module may have both the data acquisition and data writing functions. For example, each module may share one memory module, and each module may have its own memory module. Such variations are within the scope of the present application.
Fig. 3 is an exemplary flowchart of a picture right determination method based on a block chain according to some embodiments of the present application. As shown in fig. 3, the method includes:
step 302, obtaining picture data and copyright data of the picture, where the picture data includes original data of the picture and/or first encrypted data of the picture.
In particular, step 302 may be performed by the data acquisition module 202.
In some embodiments, the pictures may be pictures taken by an e-commerce for advertising purposes, such as a model showing a new dress, or pictures taken by an individual user about a news event, such as a natural disaster scene. The pictures may be in JPEG format, BMP format, PNG format, etc. The present specification is not particularly limited as to the content and format of the picture, and the picture may be a landscape picture, for example.
In some embodiments, the original data is data corresponding to a picture without any change, and the corresponding original data may be obtained from the picture, or may be obtained from the original data, for example, the original data may be binary coding or hexadecimal coding corresponding to the picture. Of course, the original data of the picture may be the picture itself. The first encrypted data may be a hash value or a digital signature of the original data of the picture, and may be any one of hash values obtained based on the MD2, MD4, MD5, SHA-1, SHA-256, SHA-512, and SM3 algorithms, or a digital signature obtained based on the SM2 algorithm. The first encrypted data such as the hash value and the digital signature cannot show the information of the picture, so that the content of the picture can be hidden, and the privacy of the picture is enhanced. The first encrypted data may be obtained by calculating the picture by the server 120 in fig. 1, or of course, the first encrypted data may be obtained by calculating by the terminal 110 and then transmitted to the server 120, which is not limited in this specification.
In some embodiments, the copyright data is data related to the copyright of the picture, and may include, for example, one or more of the author name, the author identification number, the copyright owner, the picture right confirmation time, and the like of the picture, which may be determined according to the actual situation. In some embodiments, the picture entitlement time may be a timestamp characterizing the current time obtained from a rights third party, such as a national astronomical stage, when the user requests to write the copyright data to the blockchain.
In some embodiments, the picture data and the copyright data sent by the terminal may be obtained by the server, for example, the user uploads the taken news picture to the computer and inputs the author name, the author identification number and the copyright owner information of the news picture, and the computer sends the news picture and the input author name, author identification number and copyright owner information to the server. The user can browse the pictures on the server through the computer, delete and download the pictures with the related rights, the server can recommend the pictures to the target user, and the Recommendation method can adopt algorithms in the prior art, such as Content-based Recommendation algorithm (Content-based Recommendation), Collaborative Filtering-based Recommendation algorithm (Collaborative Filtering) and the like.
Step 304, writing at least a portion of the picture data and the copyright data into the block chain, so that the copyright of the picture can be determined based on the following three data: the picture data, the copyright data and a first timestamp in a block header of a block where the picture data and the copyright data are located are obtained from the block chain.
In particular, step 304 may be performed by data writing module 204.
In some embodiments, the first timestamp is time information at the time of generating the tile, and is present in a tile header of the tile, and due to the characteristics of the tile chain, it is almost impossible to modify the first timestamp, and of course, in practice, the copyright generation time of the picture may be different from the first timestamp, but it is difficult to determine authenticity due to the copyright generation time, and the mechanism of the tile chain ensures authenticity of the first timestamp, so that the first timestamp can be used as the copyright generation time for determining the copyright of the picture. It should be noted that, when a block is generated, a first timestamp must be written in the block header, and therefore, the corresponding first timestamp may be necessarily obtained from the block chain for determining the copyright generation time, but when the block is authorized, the first timestamp in the block does not necessarily need to be used, and the authorized time of a picture may also be written in the block for determining the copyright generation time, for example, the timestamp provided by the national astronomical stage is written in the block of the block as a part of the copyright data.
In some embodiments, a part of the picture data or all of the picture data and the copyright data may be written into a block chain, for example, into a block of a newly generated block, when the copyright of the picture needs to be determined, the picture data, the copyright data and the first time stamp may be obtained from the block chain, the picture data and the picture to be authorized are compared based on the same format data obtained in the same manner, if the picture data and the picture to be authorized are consistent, the copyright related information of the picture may be determined according to the copyright data, and the authorization time of the picture may be determined according to the first time stamp. For example, the picture data in the blockchain is a hash value obtained by binary coding of a picture based on the SHA-1 algorithm, when the picture is authorized, the hash value of the binary coding of the picture is calculated based on the SHA-1 algorithm, then the calculated hash value is compared with the hash value obtained from the blockchain, if the calculated hash value is consistent with the hash value obtained from the blockchain, the copyright related information of the picture can be obtained from the copyright data belonging to the same picture as the hash value in the blockchain, and the first timestamp belonging to the same block as the hash value in the blockchain is used as the authorization time of the picture. Of course, the right of the picture can also be taken by other methods, and the description does not limit the right.
It should be noted that the above description related to the flow 300 is only for illustration and explanation, and does not limit the applicable scope of the present application. Various modifications and changes to flow 300 will be apparent to those skilled in the art in light of this disclosure. However, such modifications and variations are intended to be within the scope of the present application.
Fig. 4 is another exemplary flowchart of a picture right determination method based on a block chain according to some embodiments of the present application. The operation of the process shown below is for illustration purposes only. In some embodiments, process 400 may, when implemented, add one or more additional operations not described in one or more embodiments herein, and/or subtract one or more operations described herein. Additionally, the order in which the process operations are illustrated in FIG. 4 and described below is not intended to be limiting. As shown in fig. 4, the method includes:
step 402, obtaining picture data and copyright data of the picture, wherein the picture data comprises original data of the picture and/or first encrypted data of the picture.
Specifically, step 402 may refer to the related description of step 302.
Step 404, comparing the picture data with network data in a network platform to determine that the network data same as the picture data does not exist in the network platform, or when the network data same as the picture data exists, determining that copyright owners of pictures respectively corresponding to the network data and the picture data are the same; wherein the network platform comprises the blockchain and/or the internet.
Specifically, step 404 may be performed by a first comparison module.
In some embodiments, before writing the picture data and the copyright data of the picture into the block chain, the picture data may be compared with the network data, for example, whether the network data identical to the picture data exists may be searched in a network platform, and according to different actual situations, the search may be performed only on the block chain, only on the internet, or both the block chain and the internet. If the network platform does not have the network data which is the same as the picture data, it can be shown that the network platform does not have the picture which is the same as the picture to which the picture data belongs, and therefore it is determined that the picture to be written into the block chain does not infringe the copyright of other pictures. If the network data identical to the picture data exists on the network platform, whether the copyright owner of the picture to which the network data belongs is identical to the copyright owner of the picture to which the picture data belongs can be further judged, specifically, judgment can be performed through copyright related information of the picture, such as the identity number of the copyright owner, if the copyright related information of the picture is identical to the copyright owner, the picture can also be determined not to infringe the copyright of other pictures, and then step 406 can be executed, so that the legal risk possibly involved in the picture can be reduced. If it is determined that the same picture exists on the network platform and the copyright owners of the picture and the copyright owner are different, step 406 cannot be executed, and the user can be notified by outputting a relevant prompt through the terminal.
In some embodiments, the picture data may be a hash value or a digital signature of the picture, and since the data size of the hash value and the digital signature is smaller than that of the corresponding picture, the comparison speed may be increased in the comparison process.
Step 406, writing at least a portion of the picture data and the copyright data into the block chain, so that the copyright of the picture can be determined based on the following three data: the picture data, the copyright data and a first timestamp in a block header of a block where the picture data and the copyright data are located are obtained from the block chain.
In particular, step 406 may refer to the associated description of step 304.
Fig. 5 is another exemplary flowchart of a picture right determination method based on a block chain according to some embodiments of the present application.
The operation of the process shown below is for illustration purposes only. In some embodiments, process 500 may be implemented with one or more additional operations not described in one or more embodiments herein, and/or with one or more operations described herein. Additionally, the order in which the process operations are illustrated in FIG. 5 and described below is not intended to be limiting. As shown in fig. 5, the method includes:
step 502, obtaining picture data and copyright data of the picture, wherein the picture data comprises original data of the picture and/or first encrypted data of the picture.
Step 504, writing at least a portion of the picture data and the copyright data into the block chain, so that the copyright of the picture can be determined based on the following three data: the picture data, the copyright data and a first timestamp in a block header of a block where the picture data and the copyright data are located are obtained from the block chain.
Specifically, the steps 502-504 can refer to the descriptions of the steps 302-304.
Step 506, an instruction for trading the copyright of the picture is obtained.
Specifically, step 506 may be performed by the instruction fetch module.
In some embodiments, the copyright of the trading picture may be the transfer or the possible use of the picture copyright, and the picture copyright used for trading may be all the copyright allowed to be traded by law or part of the copyright allowed to be traded by law. In some embodiments, the server may receive an instruction sent by the terminal to receive the instruction, for example, the user presses a virtual key on the computer to generate an instruction to transfer the copyright of the picture, and the computer sends the generated instruction to the server.
And step 508, trading the copyright of the picture based on the instruction.
In particular, step 508 may be performed by the transaction module.
In some embodiments, the database may store a related program for controlling the picture to perform a transaction in advance, and then the server triggers the program to automatically run after acquiring the instruction sent by the terminal, so as to achieve a transaction of the copyright of the picture. The form of the transaction can be based on auction, third party pricing, and AI algorithm valuation to improve the reasonability of the transaction price as much as possible, and the description does not limit the form of the transaction. It should be noted that the AI algorithm estimation may adopt a technical scheme in the prior art, and this description is not repeated herein.
Step 510, writing the copyright transaction information of the picture into the block chain.
Specifically, step 510 may be performed by the transaction information writing module.
In some embodiments, the copyright transaction information may include information of both parties of the transaction, a copyright category of the transaction, a transaction amount, and the like, for example, after the transaction is completed, information of the copyright owner after the transaction is written into the block chain, so as to update the copyright information of the picture, and when the user needs to perform picture authorization, the copyright transaction information on the block chain may be acquired, and the current copyright owner of the picture is confirmed. Because the data on the blockchain has the characteristic of being not falsifiable, the authenticity of the copyright transaction information can be ensured after the copyright transaction information is written into the blockchain.
Fig. 6 is another exemplary flowchart of a picture right determination method based on a block chain according to some embodiments of the present application.
The operation of the process shown below is for illustration purposes only. In some embodiments, process 600 may be implemented with one or more additional operations not described in one or more embodiments herein, and/or with one or more deletions described herein. Additionally, the order in which the process operations are illustrated in FIG. 6 and described below is not intended to be limiting. As shown, the method includes:
step 602, obtaining picture data and copyright data of the picture, where the picture data includes first encrypted data of the picture.
Step 604, writing at least a portion of the picture data and the copyright data into the block chain, so that the copyright of the picture can be determined based on the following three data: the picture data, the copyright data and a first timestamp in a block header of a block where the picture data and the copyright data are located are obtained from the block chain.
Specifically, the steps 602-604 can refer to the descriptions of the steps 302-304.
Step 606, encrypting the selected target picture based on the encryption algorithm of the first encrypted data to obtain second encrypted data of the target picture.
In particular, step 606 may be performed by an encryption module.
Specifically, the encryption algorithm is not limited to a narrow encryption algorithm for converting a plaintext into a ciphertext, and any algorithm that can convert the original data of the picture to obtain encrypted data that can be used for comparison in step 608 may be considered as an encryption algorithm, such as the aforementioned hash algorithm or signature algorithm, and correspondingly, encrypting the picture, that is, performing a hash operation or signature operation on the original data of the picture to obtain a corresponding hash value or digital signature.
In some embodiments, the selected target picture is a picture with a possibility of infringement, and the server may monitor the picture in the network, and when the picture with the possibility of infringement is monitored, take the picture as the selected target picture. For example, when a picture identical to the original picture or a compressed picture obtained by compressing the original picture is monitored, the monitored pictures may be used as target pictures.
In some embodiments, the algorithm for obtaining the first encrypted data is the same as the algorithm for obtaining the second encrypted data, for example, the first encrypted data of a picture is obtained based on the SHA-1 algorithm, and when a target picture that may infringe with respect to the picture is detected, the target picture is also encrypted based on the SHA-1 algorithm to obtain the second encrypted data.
Step 608, comparing the first encrypted data with the second encrypted data.
Specifically, step 608 can be performed by the second comparing module.
In some embodiments, each character of the first encrypted data may be compared with a character at the same position on the second encrypted data, and if the characters at the same position of the two are the same, the first encrypted data and the second encrypted data are determined to be the same. The specification is not particularly limited as to how the comparison is performed, and other technical schemes in the prior art can be adopted.
Step 610, based on the comparison result between the first encrypted data and the second encrypted data, determining whether the target picture infringes the picture.
Specifically, step 610 may be performed by the determining module.
In some embodiments, the comparison result may be a result representing that the first encrypted data is the same as the second encrypted data, or a result representing that the first encrypted data and the second encrypted data are different, for example, a comparison result of 0 indicates that the first encrypted data and the second encrypted data are different, and a comparison result of 1 indicates that the first encrypted data and the second encrypted data are the same, and when the comparison result is 1, it may be determined that the target picture infringes with respect to the original picture, and when the comparison result is 0, a further determination may be performed, for example, when it is determined that the target picture is a compressed picture obtained based on the original picture, it may be determined that. The description is not limited as to how to judge infringement, and related methods in the prior art can be adopted.
In some embodiments, the determining whether the target picture is infringing the picture with respect to the picture based on the comparison result of the first encrypted data and the second encrypted data includes: and if the comparison result represents that the first encrypted data is the same as the second encrypted data and it is judged that the authorization time of the target picture is later than the authorization time of the picture based on the first timestamp and/or the second timestamp, determining that the target picture is infringed relative to the picture.
In some embodiments, the second timestamp is written as copyright data in the block of the block, and the second timestamp can be obtained by an authoritative third party, such as a national astronomical desk, as described above, to ensure the authenticity of the second timestamp.
In some embodiments, the copyright owner of the target picture may be determined to be different from the original picture by the copyright data, for example, the copyright owner of the target picture may be determined to be different from the copyright owner of the original picture by an identification number of the copyright owner recorded in the copyright data. In some embodiments, if it is determined that the first encrypted data is the same as the second encrypted data according to the comparison result, it is determined that the picture corresponding to the first encrypted data is the same as the target picture corresponding to the second encrypted data, and the first encrypted data and the second encrypted data are the same, the authorization time of the first encrypted data and the second encrypted data may be further determined, for example, the authorization time corresponding to the first timestamp is 13:00:00 in 1 month 1 and 1 day 13 in 2018 beijing, the authorization time corresponding to the second timestamp is 14:00:00 in 1 month 2 and 1 month 1 day 2 in 2018 in beijing, and the timestamp of the target picture is obtained, where the timestamp indicates that the authorization time of the target picture is 13 in 1 month 1 and 1 day in 2019: 00:00, judging the infringement of the target picture relative to the original picture.
The beneficial effects that may be brought by the embodiments of the present application include, but are not limited to:
(1) in one or more embodiments of the present description, the obtained picture data and the obtained copyright data are written into the block chain, so that the picture data and the copyright data cannot be changed, and further, the picture data and the copyright data can be used for determining the right of the picture, so that a copyright owner, especially an individual copyright owner, has a relatively convenient and fast right determining channel;
(2) one or more embodiments of the present specification ensure that, by comparing the picture data with the network data in the network, the picture has no infringement before the picture data and the copyright data are written into the block chain, and reduce the legal risk related to the picture;
(3) in one or more embodiments of the present description, by writing the copyright transaction information of the picture into the block chain, the user can know the transaction condition of the copyright based on the copyright transaction information, and can determine the current copyright owner of the picture according to the transaction information, so that the user can conveniently perform copyright transaction with the current copyright owner;
(4) one or more embodiments of the present specification determine whether the target picture is infringed based on the comparison result of the first encrypted data and the second encrypted data and the corresponding authorization time of the relevant timestamp, so as to accelerate the comparison speed and improve the accuracy of infringement determination.
It is to be noted that different embodiments may produce different advantages, and in different embodiments, any one or combination of the above advantages may be produced, or any other advantages may be obtained.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be considered merely illustrative and not restrictive of the broad application. Various modifications, improvements and adaptations to the present application may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present application and thus fall within the spirit and scope of the exemplary embodiments of the present application.
Also, this application uses specific language to describe embodiments of the application. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the present application is included in at least one embodiment of the present application. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the present application may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present application may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereon. Accordingly, various aspects of the present application may be embodied entirely in hardware, entirely in software (including firmware, resident software, micro-code, etc.) or in a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present application may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the operation of various portions of the present application may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages, and the like. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which elements and sequences of the processes described herein are processed, the use of alphanumeric characters, or the use of other designations, is not intended to limit the order of the processes and methods described herein, unless explicitly claimed. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the application, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to require more features than are expressly recited in the claims. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Numerals describing the number of components, attributes, etc. are used in some embodiments, it being understood that such numerals used in the description of the embodiments are modified in some instances by the use of the modifier "about", "approximately" or "substantially". Unless otherwise indicated, "about", "approximately" or "substantially" indicates that the number allows a variation of ± 20%. Accordingly, in some embodiments, the numerical parameters used in the specification and claims are approximations that may vary depending upon the desired properties of the individual embodiments. In some embodiments, the numerical parameter should take into account the specified significant digits and employ a general digit preserving approach. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of the range are approximations, in the specific examples, such numerical values are set forth as precisely as possible within the scope of the application.
The entire contents of each patent, patent application publication, and other material cited in this application, such as articles, books, specifications, publications, documents, and the like, are hereby incorporated by reference into this application. Except where the application is filed in a manner inconsistent or contrary to the present disclosure, and except where the claim is filed in its broadest scope (whether present or later appended to the application) as well. It is noted that the descriptions, definitions and/or use of terms in this application shall control if they are inconsistent or contrary to the statements and/or uses of the present application in the material attached to this application.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present application. Other variations are also possible within the scope of the present application. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the present application can be viewed as being consistent with the teachings of the present application. Accordingly, the embodiments of the present application are not limited to only those embodiments explicitly described and depicted herein.

Claims (11)

1. A picture right confirming method based on a block chain comprises the following steps:
acquiring picture data and copyright data of the picture, wherein the picture data comprises original data of the picture and/or first encrypted data of the picture;
writing at least a portion of the picture data and the copyright data to the block chain such that the copyright of the picture can be determined based on three data:
the picture data, the copyright data and a first timestamp in a block header of a block where the picture data and the copyright data are located are obtained from the block chain.
2. The method of claim 1, prior to writing the picture data and the copyright data to the block chain, the method further comprising:
comparing the picture data with network data in a network platform to determine that the network data same as the picture data does not exist in the network platform, or determining that copyright owners of pictures respectively corresponding to the network data and the picture data are the same when the network data same as the picture data exists; wherein the network platform comprises the blockchain and/or the internet.
3. The method of claim 1, further comprising:
acquiring an instruction for trading the copyright of the picture;
trading the copyright of the picture based on the instruction;
and writing the copyright transaction information of the picture into the block chain.
4. The method of claim 1, further comprising:
encrypting the selected target picture based on the encryption algorithm of the obtained first encrypted data to obtain second encrypted data of the target picture;
comparing the first encrypted data with the second encrypted data;
and judging whether the target picture infringes relative to the picture based on the comparison result of the first encrypted data and the second encrypted data.
5. The method of claim 4, wherein the copyright data includes a second timestamp for characterizing an authorized time of the picture, and when the copyright owner of the target picture is different from the copyright owner of the picture, the determining whether the target picture is infringed with respect to the picture based on the comparison of the first encrypted data and the second encrypted data comprises:
and if the comparison result represents that the first encrypted data is the same as the second encrypted data and it is judged that the authorization time of the target picture is later than the authorization time of the picture based on the first timestamp and/or the second timestamp, determining that the target picture is infringed relative to the picture.
6. A picture right confirming system based on a block chain comprises:
the data acquisition module is used for acquiring picture data and copyright data of the picture, wherein the picture data comprises original data of the picture and/or first encrypted data of the picture;
a data writing module for writing at least a portion of the picture data and the copyright data into the block chain, so that the copyright of the picture can be determined based on the following three data:
the picture data, the copyright data and a first timestamp in a block header of a block where the picture data and the copyright data are located are obtained from the block chain.
7. The system of claim 6, further comprising:
the first comparison module is used for comparing the picture data with network data in a network platform before the picture data and the copyright data are written into the block chain by the data writing module so as to determine that the network data which are the same as the picture data do not exist in the network platform, or when the network data which are the same as the picture data exist, determining that copyright owners of pictures respectively corresponding to the network data and the picture data are the same; wherein the network platform comprises the blockchain and/or the internet.
8. The system of claim 6, further comprising:
the instruction acquisition module is used for acquiring an instruction for trading the copyright of the picture;
the trading module is used for trading the copyright of the picture based on the instruction;
and the transaction information writing module is used for writing the copyright transaction information of the picture into the block chain.
9. The system of claim 6, further comprising:
the encryption module is used for encrypting the selected target picture based on the encryption algorithm of the obtained first encrypted data to obtain second encrypted data of the target picture;
the second comparison module is used for comparing the first encrypted data with the second encrypted data;
and the judging module is used for judging whether the target picture infringes relative to the picture based on the comparison result of the first encrypted data and the second encrypted data.
10. The system of claim 9, wherein the copyright data includes a second timestamp characterizing a time of ownership of the picture, and when the copyright owner of the target picture is different from the copyright owner of the picture, the determining module is configured to:
and when the comparison result represents that the first encrypted data is the same as the second encrypted data and the right time of the target picture is judged to be later than the right time of the picture based on the first time stamp and/or the second time stamp, determining that the target picture infringes relative to the picture.
11. A device for determining right of picture based on block chain comprises a processor, wherein the processor is used for executing the method for determining right of picture based on block chain as claimed in any claim 1-5.
CN201911132865.2A 2019-11-15 2019-11-15 Picture right determining method and system based on block chain Pending CN110866224A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911132865.2A CN110866224A (en) 2019-11-15 2019-11-15 Picture right determining method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911132865.2A CN110866224A (en) 2019-11-15 2019-11-15 Picture right determining method and system based on block chain

Publications (1)

Publication Number Publication Date
CN110866224A true CN110866224A (en) 2020-03-06

Family

ID=69655176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911132865.2A Pending CN110866224A (en) 2019-11-15 2019-11-15 Picture right determining method and system based on block chain

Country Status (1)

Country Link
CN (1) CN110866224A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073807A (en) * 2020-11-11 2020-12-11 支付宝(杭州)信息技术有限公司 Video data processing method and device based on block chain
US11468198B2 (en) * 2020-04-01 2022-10-11 ImageKeeper LLC Secure digital media authentication and analysis
US11481854B1 (en) 2015-02-23 2022-10-25 ImageKeeper LLC Property measurement with automated document production
US11550960B2 (en) 2015-02-24 2023-01-10 ImageKeeper LLC Secure digital data collection
US11553105B2 (en) 2020-08-31 2023-01-10 ImageKeeper, LLC Secure document certification and execution system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250721A (en) * 2016-07-28 2016-12-21 杭州云象网络技术有限公司 A kind of electronic copyright protection method based on block chain
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN109635521A (en) * 2018-12-06 2019-04-16 中链科技有限公司 A kind of copyright protection based on block chain, verification method and device
CN109711120A (en) * 2018-12-17 2019-05-03 浙江大学 A kind of digital resource infringement method for tracing and system based on block chain digital watermarking
CN110096639A (en) * 2019-01-25 2019-08-06 重庆易保全网络科技有限公司 A kind of infringement monitoring evidence collecting method, device and terminal device
CN110263502A (en) * 2019-05-13 2019-09-20 阿里巴巴集团控股有限公司 Image processing method and device based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250721A (en) * 2016-07-28 2016-12-21 杭州云象网络技术有限公司 A kind of electronic copyright protection method based on block chain
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN109635521A (en) * 2018-12-06 2019-04-16 中链科技有限公司 A kind of copyright protection based on block chain, verification method and device
CN109711120A (en) * 2018-12-17 2019-05-03 浙江大学 A kind of digital resource infringement method for tracing and system based on block chain digital watermarking
CN110096639A (en) * 2019-01-25 2019-08-06 重庆易保全网络科技有限公司 A kind of infringement monitoring evidence collecting method, device and terminal device
CN110263502A (en) * 2019-05-13 2019-09-20 阿里巴巴集团控股有限公司 Image processing method and device based on block chain

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11481854B1 (en) 2015-02-23 2022-10-25 ImageKeeper LLC Property measurement with automated document production
US11550960B2 (en) 2015-02-24 2023-01-10 ImageKeeper LLC Secure digital data collection
US11468198B2 (en) * 2020-04-01 2022-10-11 ImageKeeper LLC Secure digital media authentication and analysis
US11553105B2 (en) 2020-08-31 2023-01-10 ImageKeeper, LLC Secure document certification and execution system
US11838475B2 (en) 2020-08-31 2023-12-05 ImageKeeper LLC Secure document certification and execution system
CN112073807A (en) * 2020-11-11 2020-12-11 支付宝(杭州)信息技术有限公司 Video data processing method and device based on block chain
CN112073807B (en) * 2020-11-11 2021-02-09 支付宝(杭州)信息技术有限公司 Video data processing method and device based on block chain

Similar Documents

Publication Publication Date Title
CN110866224A (en) Picture right determining method and system based on block chain
US11902601B2 (en) System and techniques for digital data lineage verification
CN109690589B (en) Safely traceable manufactured part
CN108197891B (en) Electronic signing device and method based on block chain
CN111931238B (en) Block chain-based data asset transfer method, device and equipment
CN113193965B (en) Digital content materialization display system based on NFT
US9911098B2 (en) Dynamic notary system
US9251320B2 (en) Matched content use restriction system
CN105701367A (en) Security system for Internet original commercial works
CN111814156B (en) Data acquisition method, device and equipment based on trusted equipment
CN104796412B (en) End-to-end cloud service system and access method to its sensitive data
CN111656344A (en) Rights management method, device and system, and storage medium
EP3851991B1 (en) System, device, and method of providing authenticity and rights verification mechanism for media content and for its derived versions
CN107294955B (en) Electronic file encryption middleware control system and method
CN111914029A (en) Block chain-based medical data calling method and device, electronic equipment and medium
KR20200085095A (en) Electronic apparatus and method for managing data based on block chain
CN113076527A (en) Block chain-based digital asset processing method and device
CN116226289A (en) Electronic certificate management method, device, equipment and storage medium based on blockchain
CN112395560A (en) Copyright data processing method and device
CN106603244B (en) A kind of digital literary property protection method and device
US11347885B2 (en) Verified templates
CN114398678A (en) Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium
CN114528532A (en) Supply chain data evidence storing method and device, computer equipment and storage medium
CN111984631A (en) Production data migration method and device, computer equipment and storage medium
CN112766755A (en) Service processing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40024792

Country of ref document: HK

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200306