CN110929230B - Work management method, device, equipment and storage medium - Google Patents

Work management method, device, equipment and storage medium Download PDF

Info

Publication number
CN110929230B
CN110929230B CN201911227978.0A CN201911227978A CN110929230B CN 110929230 B CN110929230 B CN 110929230B CN 201911227978 A CN201911227978 A CN 201911227978A CN 110929230 B CN110929230 B CN 110929230B
Authority
CN
China
Prior art keywords
work
distribution
target
authorization
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911227978.0A
Other languages
Chinese (zh)
Other versions
CN110929230A (en
Inventor
蔡弋戈
秦青
杨晨
王乐庆
李琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911227978.0A priority Critical patent/CN110929230B/en
Publication of CN110929230A publication Critical patent/CN110929230A/en
Application granted granted Critical
Publication of CN110929230B publication Critical patent/CN110929230B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses a work management method, a device, equipment and a storage medium, wherein the method is applied to a blockchain and comprises the following steps: receiving a work release request submitted by a first release platform; acquiring first authorization information of an creator of the target work and determining a hash value of the target work; acquiring a first work distribution image of a first distribution platform, and sending the first work distribution image to an creator so that the creator signs the first work distribution image based on a private key of the creator to obtain a first distribution information ciphertext; the first authorization information is sent to a first distribution platform so that the first distribution platform signs the first authorization information based on a private key of the first distribution platform to obtain a first authorization information ciphertext; and storing the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work into the blockchain. By adopting the embodiment of the application, the copyright confirmation efficiency can be improved, the infringement of works can be prevented, and the applicability is high.

Description

Work management method, device, equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for managing works.
Background
With the rapid development of information technology, more and more works are released on the Internet by people, and copyright awareness is stronger. However, the conventional copyright application process is complicated, the waiting date is long, and the related departments only carry out formal examination on the works, so that the copyright registration requirements of a large number of diversified digital copyright works cannot be met. On the other hand, the existing copyright validation method has heavy workload, manual searching for validation work becomes very heavy and unreliable, and has huge cost. Thus, one may not know that infringement has been constituted once the work is published.
Therefore, how to improve the copyright confirmation efficiency and effectively prevent the infringement of works is a problem to be solved.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment and a storage medium for managing works, which can improve the efficiency of confirming the copyright of the works, prevent the infringement of the works and have high applicability.
In a first aspect, an embodiment of the present application provides a work management method applied to a blockchain, the method including:
receiving a work release request submitted by a first release platform, wherein the work release request carries a target work;
acquiring first authorization information of an creator of the target work, and determining whether the work release request is a valid request based on the first authorization information;
If the work release request is a valid request, determining a hash value of the target work, and returning a confirmation message allowing release to the first release platform;
acquiring a first work distribution image generated by the first distribution platform when the target work is distributed, and sending the first work distribution image to the creator so that the creator signs the first work distribution image based on a private key of the creator to obtain a first distribution information ciphertext;
the first authorization information is sent to the first distribution platform so that the first distribution platform signs the first authorization information based on a private key of the first distribution platform to obtain a first authorization information ciphertext;
acquiring the first authorization information ciphertext and a first public key of the first distribution platform, acquiring the first distribution information ciphertext and a second public key of the creator, transmitting the first authorization information ciphertext, the first public key, the first distribution information ciphertext and the second public key to a consensus node so that the consensus node verifies the validity of the first authorization information ciphertext and the first distribution information ciphertext, and transmitting a signature confirmation message after verification is passed;
And when the signature confirmation message meets a preset consensus strategy, storing the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work into a blockchain, and returning a target block height to the first distribution platform and the creator, wherein the target block height is used for marking a target block in the blockchain, in which the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work are stored.
With reference to the first aspect, in one possible implementation manner, the first authorization information includes a first authorized work, first authorization object information, and a first authorization period; the determining whether the work distribution request is a valid request based on the first authorization information includes:
determining platform information of the first distribution platform and submitting time of the work distribution request;
and if the target work is consistent with the first authorized work, the platform information of the first distribution platform is consistent with the first authorized object information, and the submitting time of the work distribution request is within the first authorized period, determining that the work distribution request is a valid request.
With reference to the first aspect, in one possible implementation manner, the target work is an image work, and the determining a hash value of the target work includes:
scaling the target works to obtain scaled images with preset sizes;
calculating the gray value of each pixel point of the scaling characteristic image to obtain a gray image;
determining a hash value of the target work based on the gray value of each pixel point of the gray image, or,
and performing discrete cosine transform on the gray level image to obtain a discrete image, and determining the hash value of the target work based on the frequency domain value of each pixel point of the discrete image.
With reference to the first aspect, in one possible implementation manner, the target work is a video work, and the determining a hash value of the target work includes:
acquiring binary data corresponding to the video work;
determining a hash value of the binary data, and determining the hash value of the binary data as the hash value of the target work.
With reference to the first aspect, in a possible implementation manner, after the determining a hash value of the target work, the method further includes:
determining whether a target hash value which is consistent with the hash value of the target work or has a Hamming distance smaller than a preset Hamming distance from the hash value of the target work exists in the block chain;
If the target hash value does not exist in the blockchain, determining that the same or similar work as the target work does not exist in the blockchain, and returning a confirmation message allowing release to the first release platform.
With reference to the first aspect, in a possible implementation manner, the method further includes:
receiving an authorization change request submitted by the creator, wherein the authorization change request carries second authorization information and the target block height, and the authorization information comprises the target work, second authorization object information and a second authorization period;
determining the target block from the block chain based on the block height, and acquiring the first authorization information ciphertext corresponding to the target work and the hash value of the target work from the target block;
decrypting the first authorization information ciphertext based on the first public key to obtain first authorization information;
when the second authorization period is after a first authorization period in the first authorization information and the submitting time of the authorization change request is outside the first authorization period, acquiring a second work release image of the target work on a second release platform corresponding to the second authorization object information;
Determining a second release information ciphertext based on the second work release image, and determining a second authorization information ciphertext based on the second authorization information;
deleting the first distribution information ciphertext, the first authorization information ciphertext and the hash value of the target work from the target block, and storing the second distribution information ciphertext, the second authorization information ciphertext and the hash value of the target block in a new block of the blockchain.
With reference to the first aspect, in a possible implementation manner, the method further includes:
receiving an infringement determination request of the first distribution platform, wherein the infringement determination request carries infringement works, platform information of the infringement works, the target works and the target block heights;
determining the target block from the block chain based on the target block height, and acquiring the first distribution information ciphertext corresponding to the target work and the hash value of the target work from the target block;
and when the hash value of the infringing work is consistent with or similar to the hash value of the target work, decrypting the first distribution information ciphertext based on the second public key to obtain the first work distribution image, generating infringement notification information based on the first work distribution image, and transmitting the infringement notification information to a third distribution platform corresponding to the platform information of the infringement work.
In a second aspect, an embodiment of the present application provides a work management apparatus, including:
the first receiving module is used for receiving a work release request submitted by the first release platform, wherein the work release request carries a target work;
the first acquisition module is used for acquiring first authorization information of the creator of the target work and determining whether the work release request is a valid request or not based on the first authorization information;
the first determining module is used for determining the hash value of the target work and returning a confirmation message allowing release to the first release platform if the work release request is a valid request;
the first sending module is used for obtaining a first work distribution image generated by the first distribution platform when the target work is distributed, and sending the first work distribution image to the creator so that the creator signs the first work distribution image based on a private key of the creator to obtain a first distribution information ciphertext;
the second sending module is used for sending the first authorization information to the first distribution platform so that the first distribution platform signs the first authorization information based on a private key of the first distribution platform to obtain a first authorization information ciphertext;
The verification module is used for acquiring the first authorization information ciphertext and the first public key of the first distribution platform, acquiring the first distribution information ciphertext and the second public key of the creator, transmitting the first authorization information ciphertext, the first public key, the first distribution information ciphertext and the second public key to a consensus node so that the consensus node verifies the validity of the first authorization information ciphertext and the first distribution information ciphertext, and transmitting a signature confirmation message after verification is passed;
and the storage module is used for receiving the signature confirmation message, storing the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work into a blockchain when the signature confirmation message meets a preset consensus strategy, and returning a target block height to the first distribution platform and the creator, wherein the target block height is used for marking a target block in the blockchain, in which the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work are stored.
With reference to the second aspect, in one possible implementation manner, the first authorization information includes a first authorized work, first authorization object information, and a first authorization period; the first acquisition module includes:
A first determining unit configured to determine platform information of the first distribution platform and a time of submission of the work distribution request;
and the second determining unit is used for determining that the work release request is a valid request if the target work is consistent with the first authorized work, the platform information of the first release platform is consistent with the first authorized object information and the submitting time of the work release request is within the first authorization period.
With reference to the second aspect, in one possible implementation manner, the target work is an image work, and the first determining module includes:
the first processing unit is used for scaling the target works to obtain scaled images with preset sizes;
the second processing unit is used for calculating the gray value of each pixel point of the zooming characteristic image to obtain a gray image;
a third determining unit configured to determine a hash value of the target work based on a gray value of each pixel of the gray image;
and a fourth determining unit, configured to perform discrete cosine transform on the gray-scale image to obtain a discrete image, and determine a hash value of the target work based on a frequency domain value of each pixel point of the discrete image.
With reference to the second aspect, in one possible implementation manner, the target work is a video work, and the first determining module includes:
an acquisition unit, configured to acquire binary data corresponding to the video work;
a fifth determining unit configured to determine a hash value of the binary data and determine the hash value of the binary data as the hash value of the target work.
With reference to the second aspect, in a possible implementation manner, the apparatus further includes:
the second determining module is further configured to determine whether a target hash value consistent with the hash value of the target work or having a hamming distance from the hash value of the target work smaller than a preset hamming distance exists in the blockchain;
and the return module is further used for determining that the work which is the same as or similar to the target work does not exist in the blockchain if the target hash value does not exist in the blockchain, and returning a confirmation message which allows the release to the first release platform.
With reference to the second aspect, in a possible implementation manner, the apparatus further includes:
the second receiving module is further configured to receive an authorization change request submitted by the creator, where the authorization change request carries second authorization information and the target block height, and the authorization information includes the target work, second authorization object information and a second authorization period;
The third determining module is further configured to determine the target block from the blockchain based on the block height, and obtain the first authorization information ciphertext corresponding to the target work and a hash value of the target work from the target block;
the processing module is further used for decrypting the first authorization information ciphertext based on the first public key to obtain first authorization information;
the second acquisition module is further configured to acquire a second work distribution image of the target work on a second distribution platform corresponding to the second authorization object information when the second authorization period is after a first authorization period in the first authorization information and the time of submitting the authorization change request is outside the first authorization period;
the fourth determining module is further configured to determine a second release information ciphertext based on the second work release image, and determine a second authorization information ciphertext based on the second authorization information;
and the second storage module is further used for deleting the first release information ciphertext, the first authorization information ciphertext and the hash value of the target work from the target block, and storing the second release information ciphertext, the second authorization information ciphertext and the hash value of the target block into a new block of the blockchain.
With reference to the second aspect, in a possible implementation manner, the apparatus further includes:
the third receiving module is further configured to receive an infringement determination request of the first distribution platform, where the infringement determination request carries an infringement work, platform information of the infringement work, the target work, and the target block height;
the fifth determining module is further configured to determine the target block from the blockchain based on the target block height, and obtain the first distribution information ciphertext corresponding to the target work and a hash value of the target work from the target block;
and the sixth determining module is further configured to determine a hash value of the infringing article, decrypt the first distribution information ciphertext based on the second public key to obtain the first article distribution image when the hash value of the infringing article is identical to or similar to the hash value of the target article, generate infringement notification information based on the first article distribution image, and send the infringement notification information to a third distribution platform corresponding to the platform information of the infringement article.
In a third aspect, an embodiment of the present application provides an apparatus, including a processor and a memory, the processor and the memory being interconnected. The memory is configured to store a computer program supporting the terminal device to perform the method provided by the first aspect and/or any of the possible implementation manners of the first aspect, the computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method provided by the first aspect and/or any of the possible implementation manners of the first aspect.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium storing a computer program for execution by a processor to implement the method provided by the first aspect and/or any one of the possible implementation manners of the first aspect.
In the embodiment of the application, the work release request of the release platform is verified based on the authorization information of the creator, so that whether the release platform has the work release right can be determined, and the creator work can be released by the release platform under the condition of being authorized. On the other hand, by acquiring and storing the work release image generated by the release platform when releasing the work, the behavior of the release platform for releasing the work can be stored as a release certificate of the release platform. In addition, the private key of the creator is used for signing the work release image, so that the creator can further confirm the release work behavior of the release platform, the private key of the release platform is used for signing the authorization information, the release platform can further confirm the creation information of the creator, and the copyright of the work and release content are ensured to be correct. And meanwhile, the release information ciphertext, the authorization information ciphertext and the hash value of the work are stored in a uplink mode, so that the storage safety of the release image and the authorization information of the work can be improved, the query efficiency is improved, and the applicability is high.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a network architecture diagram of a work management method provided by an embodiment of the present application;
FIG. 2 is a schematic flow chart of a work management method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of authorization information provided by an embodiment of the present application;
FIG. 4 is a schematic diagram of a scenario for determining hash values of a target work according to an embodiment of the present application;
FIG. 5 is another schematic diagram of a scenario for determining hash values of a target work provided by an embodiment of the present application;
FIG. 6 is a schematic view of a scene of a determined similar work provided by an embodiment of the present application;
FIG. 7 is another flow chart of a work management method provided by an embodiment of the present application;
FIG. 8 is a schematic flow chart of a work management method according to an embodiment of the present application;
fig. 9 is a schematic structural view of a device-type work management apparatus provided by an embodiment of the present application;
Fig. 10 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, fig. 1 is a network architecture diagram of a work management method according to an embodiment of the present application. In fig. 1, when the publishing platform 10 needs to publish a new work, a work publication request needs to be sent to the blockchain 20, where the new work is carried in the work publication request (for convenience of description, hereinafter referred to as a target work), and the blockchain 20 may determine the creator 30 of the target work based on the internal node and obtain authorization information of the creator 30. While determining whether the work distribution request submitted by the distribution platform 10 is a valid request based on the authorized work, the authorized object information, and the authorized period information in the authorization information, the blockchain 20 may determine whether to allow the distribution platform 10 to distribute the target work based on the authorization information of the creator 30. When the work distribution request submitted by the distribution platform 10 is a valid request, a confirmation message for allowing distribution may be returned to the distribution platform 10 to enable the distribution platform 10 to distribute the target work and determine the hash value of the target work. Further, after the target work is distributed by the distribution platform 10, a work distribution image (such as a distribution page screenshot) generated by the distribution platform 10 when the target work is distributed may be acquired and transmitted to the creator 30, so that the creator 30 signs the work distribution image by using its own private key to obtain a distribution information ciphertext. Alternatively, blockchain 20 may send the authorization information of creator 30 to distribution platform 10 such that distribution platform 10 signs the authorization information with its own private key to obtain the authorization information ciphertext. Further, the blockchain 20 may acquire the authorization information ciphertext generated by the distribution platform 10, the public key of the distribution platform 10, the distribution information ciphertext generated by the creator 30, and the public key of the creator 30, and send the authorization information ciphertext generated by the distribution platform 10, the public key of the distribution platform 10, the distribution information ciphertext generated by the creator 30, and the public key of the creator 30 to the consensus node to enable the consensus node to verify the validity of the authorization information ciphertext and the distribution information ciphertext, and send a signature confirmation message after the verification passes. When the signature confirmation message sent by the consensus node meets a preset consensus policy, it may be explained that the authorization information ciphertext and the release information ciphertext are valid ciphertexts, at this time, the authorization information ciphertext, the release information ciphertext, and the hash value of the target work may be stored in the blockchain, and the creator 30 and the release platform 10 may be returned to the target block height, so that the creator 30 views the release information ciphertext and the hash value of the target block from the blockchain 20 based on the target block height, and the release platform 10 views the authorization information ciphertext and the hash value of the target work from the blockchain 20 based on the target block height.
Referring to fig. 2, fig. 2 is a flow chart of a work management method according to an embodiment of the present application. The work management method shown in fig. 2 may include the following steps S101 to S107.
S101, receiving a work release request submitted by a first release platform.
In some possible embodiments, when the first distribution platform needs to distribute the target work, a work distribution request may be submitted to determine whether the target work can be distributed, and the work distribution request carries the target work, so that after receiving the work distribution request carrying the target work, the blockchain may determine whether to allow the distribution platform to distribute the target work based on the target work. The target works include, but are not limited to, a written work, an image work, a video work, etc., and may be specifically determined based on an actual application scenario, which is not limited herein.
S102, acquiring first authorization information of an author of the target work, and determining whether the work release request is a valid request based on the first authorization information.
In some possible embodiments, after the work release request of the first release platform is acquired, an creator of the target work may be determined, and first authorization information of the creator for the target work may be acquired, so as to determine whether the work release request submitted by the first release platform is a valid request based on the first authorization information of the target work. Specifically, the first authorization information includes information such as the first authorized work, the first authorization object information, and the first authorization, so that platform information of the first distribution platform and a time of submitting the work distribution request can be obtained, the first authorized work and the target work can be compared, and if the first authorized work is consistent with the target work, the first authorization information obtained from the creator can be described as effective authorization information. The platform information of the first distribution platform may be further compared with the first authorization object in the first authorization information, and the commit time of the work distribution request may be compared with the first authorization period at the same time. If the platform information of the first distribution platform is consistent with the first authorization object information, the first distribution platform is informed of the distribution authorization of the creator to the target works, and if the submitting time of the work distribution request is within the first authorization period, the first distribution platform is informed of the distribution period allowed by the creator when the work distribution request is submitted. Therefore, only when the target work is consistent with the first authorized work, the platform information of the publishing platform is consistent with the first authorized object information, and the submitting time of the work publishing request is within the first authorized period, the work publishing request submitted by the first publishing platform can be determined to be a valid request, otherwise, the work publishing request submitted by the first publishing platform can be described as an invalid request, and the publishing platform is not allowed to publish the target work at the moment.
For example, referring to fig. 3, fig. 3 is a schematic diagram of authorization information provided by an embodiment of the present application. The authorization information shown in fig. 3 is an authorization of the creator "Zhang Sano". Wherein, the first party (i.e. the creator) is Zhang Sanand the second party (i.e. the authorized object information) is the self-media platform of XX limited company, and the first party prescribes the obligation of the rights of the two parties, the illegal contents, the condition of ending the authorization and the like for the authorized matters of the work (i.e. the authorized works). It is not difficult to see from fig. 3 that the authorization time of the creator for the target works is from 2013, 07, 18 to 2014, 07, 18, so it is assumed that when a work distribution request submitted by a distribution platform is received at this time, only if the target works carried by the work distribution request are consistent with "person eating potatoes" in the authorization, and the distribution platform is a "XX limited company self-media platform" in the authorization, and the submission time of the work distribution request is from 2013, 07, 18 to 2014, 07, 18, the distribution platform can be allowed to distribute works "person eating potatoes".
S103, if the work release request is an effective request, determining a hash value of the target work, and returning a confirmation message allowing release to the first release platform.
In some possible embodiments, when the product release request is a valid request, a confirmation message that allows release may be returned to the first release platform to cause the first release platform to release the target product. Meanwhile, as the first distribution platform is about to distribute the target work, the hash value of the target work can be determined at the moment so as to store the hash value of the target work into the blockchain after the first distribution platform distributes the target work. When the hash value of the target work is determined, different types of hash determination modes can be adopted according to different types of the target work. Specifically, when the target work is a written work, a hash calculation can be performed on the target work by adopting a message digest algorithm to obtain a hash value of the target work. The hash values obtained by different information summarization algorithms are different in length, form of expression and the like, and specific information summarization algorithms can be determined based on actual application scenes and are not limited herein. For example, a hash value expressed in 8-bit hexadecimal numbers can be obtained based on CRC32, a hash value expressed in 32-bit hexadecimal numbers can be obtained based on MD5, and a hash value of 32 bytes (256 bits) in length can be obtained based on SHA 256.
Optionally, when the target work is an image work, scaling the target work to obtain a gray image with a preset size, and calculating gray values of each pixel point of the scaled image to obtain the gray image of the target work. Therefore, the hash value of the target work can be determined based on the gray value of each pixel point of the gray image of the target work, or the gray image of the target work can be further subjected to discrete pre-change to obtain a discrete image of the target work, and the hash value of the target work is determined based on the frequency domain value of each pixel point of the discrete image. The preset size is a size capable of highlighting the image features of the target work, and specifically may be determined based on the actual size of the target graphic and the actual application scenario, which is not limited herein. When calculating the Gray value of each pixel of the scaled image, the Gray value corresponding to each pixel may be obtained based on any one of a floating point algorithm (gray=r×0.3+g×0.59+b×0.112), an integer method (gray= (r×30+g×59+b×11)/100), a shift method (gray= (r×76+g×151+b×28) > > 8), and an average method (gray= (r+g+b)/3), where Gray represents the Gray value, R represents the red value, G represents the green value, and B represents the blue value. Optionally, the green value corresponding to each pixel point may be determined as the gray value corresponding to the pixel point, and the specific implementation manner may be determined based on the actual application scenario, which is not limited herein.
Specifically, when the hash value of the target work is determined based on the gray value of each pixel of the gray image, the gray average value of all the gray values of the gray image may be obtained, each gray value of the gray image may be traversed to compare each gray value of the gray image with the gray average value, the gray value greater than the gray average value may be recorded as 1, the gray value not greater than the gray average value may be recorded as 0, and a data sequence composed of 0 and 1 may be obtained, and at this time, the data sequence may be determined as the hash value of the target work. The number of bits of the hash value (data sequence) of the target work is consistent with the number of gray values in the gray level image, for example, the size of the gray level image is 8×8, the gray level image contains 64 gray level values, and the hash value of the corresponding target work is a data sequence consisting of 64 0 or 1. It should be noted that, the order of traversing each gray value to compare it with the gray average value may be determined based on the actual application scenario, each gray value is compared only once, and the order of 1 or 0 corresponding to each gray value in the data sequence coincides with the traversed order of the gray value.
For example, referring to fig. 4, fig. 4 is a schematic diagram of a scenario for determining a hash value of a target work according to an embodiment of the present application. Suppose that the target work is scaled to obtain a scaled image of 8×8, and the scaled image is converted into a gray image to obtain the gray image of the target work in fig. 4. At this time, the sequence from the first gray value of the first line to the last gray value of the last line in the gray image of the target work can be compared with the gray average value of 5.73 to obtain a 64 data sequence. Taking the gray value of the last line of the gray image of the target work as an example, the gray values of 11, 2, 10, 4, 15, 4, 6 and 3"8 can be compared with the gray average value of 5.73 to obtain a data sequence of 10101010 according to the comparison sequence, wherein the data sequence is the last 8 data sequences of the hash value of the target work.
Specifically, when determining the hash value of the target work based on the frequency domain value of each pixel point of the discrete image of the target work, the frequency domain average value of the frequency domain values of all the pixel points can be first obtained, each frequency domain value of the discrete image is traversed to compare each frequency domain value in the discrete image with the frequency domain average value, the frequency domain value greater than the frequency domain average value is recorded as 1, the frequency domain value not greater than the frequency domain average value is recorded as 0, and then a data sequence consisting of 0 and 1 can be obtained, and at this time, the data sequence can be determined as the hash value of the target work. The number of bits of the hash value (data sequence) of the target work is consistent with the number of frequency domain values in the discrete image, for example, the size of the discrete image is 8×8, the discrete image contains 64 frequency domain values, and the hash value of the corresponding target work is a data sequence consisting of 64 0 or 1. It should be noted that, the order of traversing each frequency domain value to compare it with the frequency domain average value may be determined based on the actual application scenario, each frequency domain value is compared only once, and the order of 1 or 0 corresponding to each frequency domain value in the data sequence is consistent with the traversed order of the frequency domain value. Optionally, after the gray-scale image is subjected to discrete cosine transform to obtain a discrete image, in order to reduce the comparison frequency of the frequency domain values and obtain the hash value of the target work at last, the hash value of the target work can be represented by the same, at this time, a part of the discrete image with a lower frequency domain value (low frequency part) can be taken from the discrete image, and a data sequence which is also composed of 0 or 1 is determined as the hash value of the target work by adopting the manner of determining the hash value of the target work based on the discrete image. The number of the longitudinal pixels and the number of the transverse pixels of the partial discrete image are consistent, and the specific selection mode is not limited herein.
For example, as shown in fig. 5, fig. 5 is another schematic view of determining a hash value of a target work according to an embodiment of the present application. As shown in fig. 5, it is assumed that the target work is scaled to a scaled image with a size of 32×32 and converted to a gray image, and then the gray image with a size of 32×32 is obtained, and further the discrete image in fig. 5 is obtained after the discrete cosine transform. At this time, a first pixel point at the upper left corner of the discrete image may be selected to select a discrete image with a size of 3*3, where the low-frequency part of the discrete image with 32×32 gray values in the discrete image 3*3 is the frequency domain mean value of the frequency domain values of the discrete image 3*3 is not difficult to obtain at this time. At this time, the frequency domain values of 3*3 are arranged according to a certain sequence to obtain a frequency domain value sequence of '0.1, 0.3, 0.2, 0.3, 0.1, 0.3, 0.2', and each frequency domain value in the frequency domain value sequence is compared with a frequency domain mean value of 0.21 (more than the frequency domain mean value is recorded as 1 and less than the frequency domain mean value is recorded as 0.21), so as to obtain a data sequence '010101010', and the data sequence '010101010' is the hash value of the target work.
Optionally, when the target work is a video work, binary data of the video work can be determined, and hash calculation is performed on the binary data by adopting a message digest algorithm to obtain a hash value of the target work. The hash calculation of the information summary algorithm can refer to the calculation mode of the written works, and is not repeated here.
In some possible embodiments, the instant first distribution platform is authorized by the creator, but because the creator's work itself has the potential for infringement, i.e., the target work may be the same or similar to other works, it is necessary to determine whether there is a target hash value in the blockchain that is consistent with or has a hamming distance from the hash value of the target work that is less than a preset hamming distance before returning a confirmation message to the first distribution platform that allows distribution. If the target hash value consistent with the hash value of the target work or the Hamming distance smaller than the preset Hamming distance exists in the blockchain, the target work is identical or similar to the work corresponding to the target hash value, and at the moment, the relevant information of the identical work or similar work can be returned to the first distribution platform and the creator so that the first distribution platform and the creator can determine whether the target work is an infringement work. If the target hash value consistent with the hash value of the target work or the Hamming distance smaller than the preset Hamming distance does not exist in the blockchain, the fact that the work identical or similar to the target work does not exist in the blockchain is indicated, the fact that the target work authored by the creator does not have infringement is indicated, and at the moment, a confirmation message allowing release can be returned to the first release platform. The preset hamming distance may be determined based on the actual application scenario, which is not limited herein. It should be noted that, because the hash value of the target work is determined by adopting the information abstraction algorithm, when a bit of data in a word or binary data in the target work is changed, the hash value of the target work will have a large difference from the hash value before the change, so when the target work is a word or video work, it is only necessary to determine whether the target hash value consistent with the hash value of the target work exists in the blockchain. When the target work is an image work, it may be determined whether there is a target hash value in the blockchain that is consistent with the hash value of the target work or that has a hamming distance that is less than a preset hamming distance.
For example, referring to fig. 6, fig. 6 is a schematic view of a scene of a determined similar work provided by an embodiment of the present application. In fig. 6, it is assumed that the target work is a picture, the hash value of the target work is 01110000 00011000 10101000, the hash value of one work in the blockchain is 01110110 00011010 10101011, and it is not difficult to find out after the hash value of the target work is compared with the hash value of another work in a para-position, and the data corresponding to the 6 th, 7 th, 15 th, 23 rd and 24 th bits are different, so that it can be determined that the hamming distance between the hash value of the target work and the hash value of another work is 5. If the preset Hamming distance is 6 at this time, since the Hamming distance between the Hamming value of the target work and the Hamming value of another work is smaller than 6, it can be determined that the Hamming value of the work is similar to the Hamming value of the target work, that is, the work is similar to the target work.
S104, acquiring a first work release image generated by the first release platform when the target work is released, and sending the first work release image to the creator so that the creator signs the first work release image based on a private key of the creator to obtain a first release information ciphertext.
In some possible embodiments, when the first distribution platform distributes the target work, a first work distribution image generated when the first distribution platform distributes the target work may be acquired, where the first work distribution image may include related information of the first distribution platform, related content of the target work, distribution time, related information of an creator, and the like, so as to be used as a distribution certificate of the first distribution platform corresponding to the target work. The first work release image may be a web page screenshot, a public number screenshot, a publishing cover, etc., and may be specifically determined based on an actual application scenario, which is not limited herein. Further, the first work distribution image may be sent to the creator to cause the creator to sign the first work distribution image based on its own private key, and while encrypting the first work distribution image, once the creator signs the first work distribution image, the caption creator approves various information in the first work distribution image, i.e., the creator approves the distribution of the target work by the first distribution platform.
And S105, the first authorization information is sent to the first distribution platform so that the first distribution platform signs the first authorization information based on a private key of the first distribution platform to obtain a first authorization information ciphertext.
In some possible implementations, the first authorization information of the creator may be sent to the first distribution platform to cause the first distribution platform to sign the first authorization information based on its private key, while the first work distribution image is sent to and signed by the creator. The first authorization information is signed, and the first issuing platform approves the relevant regulations of the first authorization information of the creator, so that after both parties approve the relevant information of the other party, authorization confirmation of the first work is completed.
S106, acquiring a first authorization information ciphertext and a first public key of a first distribution platform, acquiring a first distribution information ciphertext and a second public key of an creator, transmitting the first authorization information ciphertext, the first public key, the first distribution information ciphertext and the second public key to a consensus node so that the consensus node verifies the validity of the first authorization information ciphertext and the first distribution information ciphertext, and transmitting a signature confirmation message after verification is passed.
In some possible embodiments, after the signing of the first distribution platform and the creator is completed, an authorization information ciphertext obtained by the first distribution platform after signing the first authorization information and a public key of the first distribution platform may be obtained, and after signing the first work distribution image by the creator is obtained at the same time, the first distribution information ciphertext and the public key of the creator may be obtained. In order to further ensure that the acquired first authorization information ciphertext and the first distribution information ciphertext are valid ciphertexts, and prevent serious influence caused by storing invalid ciphertexts, the authorization information ciphertext, the public key of the first distribution platform, the distribution information ciphertext and the public key of the creator can be sent to the consensus node at the moment, so that the consensus node can verify the validity of the first authorization information ciphertext based on the public key of the first distribution platform and verify the validity of the first distribution information ciphertext based on the public key of the creator respectively. The common node may send a signature confirmation message when the first issuing information ciphertext and the first authorization information ciphertext are both valid ciphertexts, where the signature confirmation message may be any form of information for explaining that the common node considers that the first issuing information ciphertext and the first authorization information ciphertext are both valid ciphertexts, and specific information content is not limited herein. And the signature confirmation message generated by each consensus node can represent the generation node of the signature confirmation message, so that the consensus node sending the signature confirmation message can be determined according to the signature confirmation message after the signature confirmation message of each consensus node is received. Optionally, after generating the signature confirmation message, each consensus node may generate a digest on the signature confirmation message through hash calculation, and encrypt the digest by using its private key to prevent the signature confirmation message from being tampered with.
And S107, receiving the signature confirmation message, storing the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work to the blockchain when the signature confirmation message meets a preset consensus strategy, and returning the target block height to the first distribution platform and the creator.
In some possible embodiments, signature verification messages sent by a plurality of consensus nodes in the blockchain may be received, and when each received signature verification message meets a preset consensus policy, it may be determined that both the first distribution information ciphertext and the first authorization information ciphertext are valid ciphertexts. The preset consensus strategy may be that when a certain proportion of consensus nodes in all the consensus nodes in the blockchain confirm that the hash value of the first electronic evidence of the same type is consistent with the hash value of the second electronic evidence, for example, after receiving a signature confirmation message sent by ninety-five percent of the consensus nodes, the first sending information ciphertext and the first authorization information ciphertext may be considered to be valid ciphertexts. Or, the preset consensus strategy may also be that when receiving signature confirmation messages sent by a plurality of consensus nodes in the blockchain, whether the consensus node sending the signature confirmation message belongs to the preset consensus node is determined based on the signature in the signature confirmation message, and/or after the consensus node sending the signature confirmation message is the preset consensus node and/or the consensus node sending the signature confirmation message exceeds all the consensus nodes in the blockchain by a certain proportion, the first distribution information ciphertext and the first authorization information ciphertext are considered to be valid ciphertexts. It should be specifically noted that the preset consensus policy may further include, but is not limited to, a Proof of Work (PoW), a Proof of equity (PoS), a share authorization (Delegated Proof of Stake, DPoS) and a practical barking mechanism (Practical Byzantine Fault Tolerance, PBFT), and a risple consensus algorithm, which may be specifically determined based on the actual application scenario, and is not limited herein.
Further, the first authorization information ciphertext, the first distribution information ciphertext, and the hash value of the target work may be packaged into a block, and the block height of the block may be used as a target block height to be sent to the first distribution platform and the creator, so that the first distribution platform and the creator determine a target block storing the first authorization information ciphertext, the first distribution information ciphertext, and the hash value of the target work from the blockchain based on the target block height. The specific implementation manner in which the first authorization information ciphertext, the first distribution information ciphertext, and the hash value of the target work are included in the block may be determined based on an actual application scenario, which is not limited herein.
Referring to fig. 7, fig. 7 is another flow chart of a work management method according to an embodiment of the present application. The work management method shown in fig. 7 may include the following steps S201 to S206.
S201, receiving an authorization change request submitted by an creator.
In some possible implementations, when the creator wants to terminate the publication rights of the first publication platform to the target work and give the second publication platform publication rights to the target work, the creator may submit an authorization change request to change the authorization object. The authorization change request submitted by the creator may carry second authorization information and a target block height, where the second authorization information includes a target work, a second authorization object, and a second authorization period. Further, the blockchain may receive an authorization change request submitted by an author and determine whether to complete the authorization change based on the authorization change request.
S202, determining a target block from a block chain based on the block height, and acquiring a first authorization information ciphertext corresponding to the target work and a hash value of the target work from the target block.
In some possible embodiments, when the authorization change request carries the target block height, a target block corresponding to the target block height may be determined from the blockchain, and the first authorization information ciphertext corresponding to the target work and the hash value of the target work may be obtained from the target block. Specifically, the block body of the target block may be parsed to determine the hash value of the target block and the first authorization information ciphertext from the hash value of the root node of the obtained merck tree, the block body of the target block may be parsed to determine the hash value of the target block and the first authorization information ciphertext from the merck tree of the block body, the determination mode of the hash value stored in the target block may be determined, and the hash value of the target work may be obtained by performing hash calculation on the target work in the same hash determination mode, where the specific acquisition mode may be determined based on the actual application scenario, and the present invention is not limited thereto.
S203, decrypting the first authorization information ciphertext based on the first public key to obtain the first authorization information.
In some possible embodiments, since the first authorization information ciphertext is obtained by signing the first authorization information by the first distribution platform and the first authorization information is already approved by the first distribution platform, in order to determine the validity of the second authorization information carried in the authorization change request, the first authorization information that has been signed by the first distribution platform needs to be compared with the second authorization information, so as to avoid unfairness caused by comparing the first authorization information that is retransmitted by the creator. Therefore, the public key of the first distribution platform can be obtained, the first authorization information can be obtained by decrypting the first authorization information based on the public key of the first distribution platform, and the authorization change request of the creator is allowed by the first distribution platform in a lateral description.
S204, when the second authorization period is after the first authorization period in the first authorization information and the submitting time of the authorization change request is outside the first authorization period, acquiring a second work release image of the target work on a second release platform corresponding to the second authorization object information.
In some possible embodiments, the first authorization period in the first authorization information is compared with the second authorization information in the second authorization information, if the second authorization period is before the first authorization period, the second authorization period is indicated as an error period or an expiration period, and then the second authorization information is determined as invalid information, and then the authorization change request of the response creator is refused. On the other hand, if the first authorization period and the second authorization period have time intersection, the first distribution platform still has the distribution right of the target work at the moment, an authorization change notification can be sent to the first distribution platform at the moment, the second work distribution image of the second distribution platform is determined after the first distribution platform agrees to the authorization change, and otherwise, the authorization change request of the creator is refused. If the second authorization period is after the first authorization period and the second authorization period and the first authorization period have no time intersection, the first distribution platform is not entitled to the distribution right of the target work, and the first distribution platform can be not required to be notified to directly determine the second work distribution image of the second distribution platform.
S205, determining a second release information ciphertext based on the second work release image, and determining a second authorization information ciphertext based on the second authorization information.
In some possible embodiments, after determining the second work distribution image generated by the second distribution platform when the target work is distributed, determining the second distribution information ciphertext based on the second work distribution image, and further determining the specific implementation manner of the second authorization information ciphertext based on the second authorization information may refer to the implementation manner shown in step S104 and step S105 in fig. 2, which is not described herein again.
S206, deleting the first release information ciphertext, the first authorization information ciphertext and the hash value of the target block from the target block, and storing the second release information ciphertext, the second authorization information ciphertext and the hash value of the target block into a new block of the blockchain.
In some possible embodiments, since the creator changes the publishing rights of the target work from the first publishing platform to the second publishing platform, it is necessary to delete the first publishing information ciphertext, the first authorization information ciphertext, and the hash value of the target work generated when the first publishing platform publishes the target work from the target block. And storing the hash value, the second release information ciphertext and the second release information ciphertext of the target work into a new block in the block chain after the second release platform releases the target work, and simultaneously returning the block height of the new block to the second release platform and the creator.
Referring to fig. 8, fig. 8 is a schematic flow chart of a work management method according to an embodiment of the present application. The work management method shown in fig. 8 may include the following steps S301 to S303.
S301, receiving an infringement determination request of the first distribution platform.
In some possible implementations, when the first distribution platform finds that other works may be similar or identical to the target work that it distributes, the infringing determination request may be submitted to cause the blockchain to determine whether infringing work information included in the infringing determination request is identical or similar to the target work. It should be noted that, the infringing composition carried in the infringing determination request is a composition considered as suspected infringing by the first distribution platform, and the type and content of the specific composition are not limited herein.
S302, determining a target block from a block chain based on the height of the target block, and acquiring a first distribution information ciphertext corresponding to the target work and a hash value of the target work from the target block.
In some possible embodiments, the specific implementation manner of determining the first distribution information ciphertext corresponding to the target work and the hash value of the target work may refer to the implementation manner shown in step S202 in fig. 7, which is not described herein again.
S303, determining the hash value of the infringing work, decrypting the first distribution information ciphertext based on the second public key to obtain a first work distribution image and generating infringement notification information based on the first work distribution image when the hash value of the infringement work is consistent with or similar to the hash value of the target work, and sending the infringement notification information to a third distribution platform corresponding to the platform information of the infringement work.
In some possible embodiments, after the hash value of the target work is determined from the target block, hash calculation may be performed on the infringement work by using a hash determination method adopted when the hash value of the target work is stored in the target block, so as to obtain the hash value of the infringement work. If both the infringing article and the target article are image articles, it may be determined whether the infringing article is identical or similar to the target article by determining a similarity of the hash value of the infringing article to the hash value of the target article. Specifically, the number of bits of the hash value of the infringing article and the hash value of the target article that are the same may be determined, and the duty ratio of the same number of bits in the hash value of the infringing article or the hash value of the target article may be determined. When the duty cycle exceeds a preset duty cycle, it may be determined that the infringing article is similar to or the same as the target article. Alternatively, when the infringing composition and the target composition are both a written composition or a video composition, an intelligent contract may be invoked to cause a third party accredited to determine whether the infringing composition is the same as or similar to the target composition.
Further, if the infringing article is the same as or similar to the target article, the first distribution information may be decrypted based on the public key of the creator to obtain a first article distribution image, and infringing notification information may be generated based on the first article distribution image. And meanwhile, the third release platform can be determined based on the platform information of the infringing works carried in the infringing determination request submitted by the first release platform, and infringing notification information is sent to the third release platform. The infringement notification information is any form of notification information for notifying the third distribution platform that the third distribution platform has infringed and includes information related to the infringed work (target work) (related information of the creator, related information of the first distribution platform, distribution time of the target work, etc.), and may be specifically determined based on the actual application scenario, and is not limited herein.
In the embodiment of the application, the work release request of the release platform is verified based on the authorization information of the creator, so that whether the release platform has the work release right can be determined, and the creator work can be released by the release platform under the condition of being authorized. On the other hand, by acquiring and storing the work release image generated by the release platform when releasing the work, the behavior of the release platform for releasing the work can be stored as a release certificate of the release platform. In addition, the private key of the creator is used for signing the work release image, so that the creator can further confirm the release work behavior of the release platform, the private key of the release platform is used for signing the authorization information, the release platform can further confirm the creation information of the creator, and the copyright of the work and release content are ensured to be correct. And meanwhile, the release information ciphertext, the authorization information ciphertext and the hash value of the work are stored in a uplink mode, so that the storage safety of the release image and the authorization information of the work can be improved, the query efficiency is improved, and the applicability is high.
Referring to fig. 9, fig. 9 is a schematic structural diagram of a device for determining a device type according to an embodiment of the present application. The device 1 provided by the embodiment of the application comprises:
the first receiving module 10 is configured to receive a work distribution request submitted by a first distribution platform, where the work distribution request carries a target work;
a first obtaining module 11, configured to obtain first authorization information of an creator of the target work, and determine whether the work distribution request is a valid request based on the first authorization information;
a first determining module 12, configured to determine a hash value of the target work and return a confirmation message for allowing publication to the first distribution platform if the work publication request is a valid request;
a first sending module 13, configured to obtain a first work distribution image generated by the first distribution platform when the target work is distributed, and send the first work distribution image to the creator, so that the creator signs the first work distribution image based on a private key of the creator, to obtain a first distribution information ciphertext;
a second sending module 14, configured to send the first authorization information to the first distribution platform, so that the first distribution platform signs the first authorization information based on a private key of the first distribution platform, to obtain a first authorization information ciphertext;
A verification module 15, configured to obtain the first authorization information ciphertext and a first public key of the first distribution platform, obtain the first distribution information ciphertext and a second public key of the creator, send the first authorization information ciphertext, the first public key, the first distribution information ciphertext, and the second public key to a consensus node, so that the consensus node verifies the validity of the first authorization information ciphertext and the first distribution information ciphertext, and send a signature confirmation message after verification is passed;
the storage module 16 is configured to receive the signature verification message, store the first authorization information ciphertext, the first distribution information ciphertext, and the hash value of the target work in a blockchain when the signature verification message satisfies a preset consensus policy, and return a target block height to the first distribution platform and the creator, where the target block height is used to mark a target block in the blockchain in which the first authorization information ciphertext, the first distribution information ciphertext, and the hash value of the target work are stored.
In some possible embodiments, the first authorization information includes a first authorized work, first authorization object information, and a first authorization period; the first acquisition module 11 includes:
A first determining unit 111 configured to determine platform information of the first distribution platform and a time of submission of the work distribution request;
a second determining unit 112, configured to determine that the work distribution request is a valid request if the target work is consistent with the first authorized work, the platform information of the first distribution platform is consistent with the first authorized object information, and the time of submission of the work distribution request is within the first authorization period.
In some possible embodiments, the target work is an image work, and the first determining module 12 includes:
a first processing unit 121, configured to scale the target work to obtain a scaled image with a preset size;
a second processing unit 122, configured to calculate a gray value of each pixel of the scaled feature image to obtain a gray image;
a third determining unit 123 configured to determine a hash value of the target work based on a gray value of each pixel of the gray image;
a fourth determining unit 124, configured to perform discrete cosine transform on the gray-scale image to obtain a discrete image, and determine a hash value of the target work based on a frequency domain value of each pixel of the discrete image.
In some possible embodiments, the target work is a video work, and the first determining module 12 includes:
an acquisition unit 125, configured to acquire binary data corresponding to the video work;
a fifth determining unit 126 for determining the hash value of the binary data and determining the hash value of the binary data as the hash value of the target work.
In some possible embodiments, the above-mentioned device 1 further comprises:
a second determining module 17, configured to determine whether a target hash value that is consistent with the hash value of the target work or has a hamming distance from the hash value of the target work that is smaller than a preset hamming distance exists in the blockchain;
the return module 18 is further configured to determine that a work identical or similar to the target work does not exist in the blockchain if the target hash value does not exist in the blockchain, and return a confirmation message for allowing the publication to the first distribution platform.
In some possible embodiments, the above-mentioned device 1 further comprises:
the second receiving module 19 is further configured to receive an authorization change request submitted by the creator, where the authorization change request carries second authorization information and the target block height, and the authorization information includes the target work, second authorization object information and a second authorization period;
The third determining module 20 is further configured to determine the target block from the blockchain based on the block height, and obtain the first authorization information ciphertext corresponding to the target work and the hash value of the target work from the target block;
the processing module 21 is further configured to decrypt the first authorization information ciphertext based on the first public key to obtain first authorization information;
the second obtaining module 22 is further configured to obtain a second work distribution image of the target work on a second distribution platform corresponding to the second authorization object information when the second authorization period is after a first authorization period in the first authorization information and the time of submitting the authorization change request is outside the first authorization period;
the fourth determining module 23 is further configured to determine a second release information ciphertext based on the second work release image, and determine a second authorization information ciphertext based on the second authorization information;
the second storage module 24 is further configured to delete the first distribution information ciphertext, the first authorization information ciphertext, and the hash value of the target work from the target block, and store the second distribution information ciphertext, the second authorization information ciphertext, and the hash value of the target block in a new block of the blockchain.
In some possible embodiments, the above-mentioned device 1 further comprises:
the third receiving module 25 is further configured to receive an infringement determination request of the first distribution platform, where the infringement determination request carries an infringement work, platform information of the infringement work, the target work, and the target block height;
the fifth determining module 26 is further configured to determine the target block from the blockchain based on the target block height, and obtain the first distribution information ciphertext corresponding to the target work and the hash value of the target work from the target block;
the sixth determining module 27 is further configured to determine a hash value of the infringing article, decrypt the first distribution information ciphertext based on the second public key to obtain the first article distribution image and generate infringement notification information based on the first article distribution image when the hash value of the infringement article is identical to or similar to the hash value of the target article, and send the infringement notification information to a third distribution platform corresponding to the platform information of the infringement article.
In a specific implementation, the device 1 may execute, through each functional module built in the device, an implementation manner provided by each step in fig. 2, fig. 7, and/or fig. 8, and specifically, the implementation manner provided by each step may be referred to, which is not described herein again.
In the embodiment of the application, the work release request of the release platform is verified based on the authorization information of the creator, so that whether the release platform has the work release right can be determined, and the creator work can be released by the release platform under the condition of being authorized. On the other hand, by acquiring and storing the work release image generated by the release platform when releasing the work, the behavior of the release platform for releasing the work can be stored as a release certificate of the release platform. In addition, the private key of the creator is used for signing the work release image, so that the creator can further confirm the release work behavior of the release platform, the private key of the release platform is used for signing the authorization information, the release platform can further confirm the creation information of the creator, and the copyright of the work and release content are ensured to be correct. And meanwhile, the release information ciphertext, the authorization information ciphertext and the hash value of the work are stored in a uplink mode, so that the storage safety of the release image and the authorization information of the work can be improved, the query efficiency is improved, and the applicability is high.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an apparatus according to an embodiment of the present application. As shown in fig. 10, the apparatus 1000 in this embodiment may include: processor 1001, network interface 1004, and memory 1005, and in addition, the above device 1000 may further include: a user interface 1003, and at least one communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display (Display), a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface, among others. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1004 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005 may also optionally be at least one storage device located remotely from the processor 1001. As shown in fig. 10, an operating system, a network communication module, a user interface module, and a device control application program may be included in the memory 1005, which is one type of computer-readable storage medium.
In the apparatus 1000 shown in fig. 10, the network interface 1004 may provide a network communication function; while user interface 1003 is primarily used as an interface for providing input to a user; and the processor 1001 may be used to invoke a device control application stored in the memory 1005 to implement:
receiving a work release request submitted by a first release platform, wherein the work release request carries a target work;
acquiring first authorization information of an creator of the target work, and determining whether the work release request is a valid request based on the first authorization information;
if the work release request is a valid request, determining a hash value of the target work, and returning a confirmation message allowing release to the first release platform;
acquiring a first work distribution image generated by the first distribution platform when the target work is distributed, and sending the first work distribution image to the creator so that the creator signs the first work distribution image based on a private key of the creator to obtain a first distribution information ciphertext;
the first authorization information is sent to the first distribution platform so that the first distribution platform signs the first authorization information based on a private key of the first distribution platform to obtain a first authorization information ciphertext;
Acquiring the first authorization information ciphertext and a first public key of the first distribution platform, acquiring the first distribution information ciphertext and a second public key of the creator, transmitting the first authorization information ciphertext, the first public key, the first distribution information ciphertext and the second public key to a consensus node so that the consensus node verifies the validity of the first authorization information ciphertext and the first distribution information ciphertext, and transmitting a signature confirmation message after verification is passed;
and when the signature confirmation message meets a preset consensus strategy, storing the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work into a blockchain, and returning a target block height to the first distribution platform and the creator, wherein the target block height is used for marking a target block in the blockchain, in which the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work are stored.
In some possible embodiments, the first authorization information includes a first authorized work, first authorization object information, and a first authorization period; the processor 1001 is configured to:
Determining platform information of the first distribution platform and submitting time of the work distribution request;
and if the target work is consistent with the first authorized work, the platform information of the first distribution platform is consistent with the first authorized object information, and the submitting time of the work distribution request is within the first authorized period, determining that the work distribution request is a valid request.
In some possible embodiments, the target work is an image work, and the processor 1001 is configured to:
scaling the target works to obtain scaled images with preset sizes;
calculating the gray value of each pixel point of the scaling characteristic image to obtain a gray image;
determining a hash value of the target work based on the gray value of each pixel point of the gray image, or,
and performing discrete cosine transform on the gray level image to obtain a discrete image, and determining the hash value of the target work based on the frequency domain value of each pixel point of the discrete image.
In some possible implementations, the target work is a video work, and the processor 1001 is configured to:
acquiring binary data corresponding to the video work;
Determining a hash value of the binary data, and determining the hash value of the binary data as the hash value of the target work.
In some possible embodiments, the processor 1001 is further configured to:
determining whether a target hash value which is consistent with the hash value of the target work or has a Hamming distance smaller than a preset Hamming distance from the hash value of the target work exists in the block chain;
if the target hash value does not exist in the blockchain, determining that the same or similar work as the target work does not exist in the blockchain, and returning a confirmation message allowing release to the first release platform.
In some possible embodiments, the processor 1001 is further configured to:
receiving an authorization change request submitted by the creator, wherein the authorization change request carries second authorization information and the target block height, and the authorization information comprises the target work, second authorization object information and a second authorization period;
determining the target block from the block chain based on the block height, and acquiring the first authorization information ciphertext corresponding to the target work and the hash value of the target work from the target block;
Decrypting the first authorization information ciphertext based on the first public key to obtain first authorization information;
when the second authorization period is after a first authorization period in the first authorization information and the submitting time of the authorization change request is outside the first authorization period, acquiring a second work release image of the target work on a second release platform corresponding to the second authorization object information;
determining a second release information ciphertext based on the second work release image, and determining a second authorization information ciphertext based on the second authorization information;
deleting the first distribution information ciphertext, the first authorization information ciphertext and the hash value of the target work from the target block, and storing the second distribution information ciphertext, the second authorization information ciphertext and the hash value of the target block in a new block of the blockchain.
In some possible embodiments, the processor 1001 is further configured to:
receiving an infringement determination request of the first distribution platform, wherein the infringement determination request carries infringement works, platform information of the infringement works, the target works and the target block heights;
Determining the target block from the block chain based on the target block height, and acquiring the first distribution information ciphertext corresponding to the target work and the hash value of the target work from the target block;
and when the hash value of the infringing work is consistent with or similar to the hash value of the target work, decrypting the first distribution information ciphertext based on the second public key to obtain the first work distribution image, generating infringement notification information based on the first work distribution image, and transmitting the infringement notification information to a third distribution platform corresponding to the platform information of the infringement work.
It should be appreciated that in some possible embodiments, the processor 1001 may be a central processing unit (central processing unit, CPU), which may also be other general purpose processors, digital signal processors (digital signal processor, DSP), application specific integrated circuits (application specific integrated circuit, ASIC), off-the-shelf programmable gate arrays (field-programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The memory may include read only memory and random access memory and provide instructions and data to the processor. A portion of the memory may also include non-volatile random access memory. For example, the memory may also store information of the device type.
In a specific implementation, the device 1000 may execute, through each functional module built in the device, an implementation provided by each step in fig. 2, fig. 7, and/or fig. 8, and specifically, the implementation provided by each step may be referred to, which is not described herein again.
In the embodiment of the application, the work release request of the release platform is verified based on the authorization information of the creator, so that whether the release platform has the work release right can be determined, and the creator work can be released by the release platform under the condition of being authorized. On the other hand, by acquiring and storing the work release image generated by the release platform when releasing the work, the behavior of the release platform for releasing the work can be stored as a release certificate of the release platform. In addition, the private key of the creator is used for signing the work release image, so that the creator can further confirm the release work behavior of the release platform, the private key of the release platform is used for signing the authorization information, the release platform can further confirm the creation information of the creator, and the copyright of the work and release content are ensured to be correct. And meanwhile, the release information ciphertext, the authorization information ciphertext and the hash value of the work are stored in a uplink mode, so that the storage safety of the release image and the authorization information of the work can be improved, the query efficiency is improved, and the applicability is high.
The embodiment of the present application further provides a computer readable storage medium, where a computer program is stored and executed by a processor to implement the method provided by each step in fig. 2, fig. 7, and/or fig. 8, and specifically refer to the implementation manner provided by each step, which is not described herein.
The computer readable storage medium may be an internal storage unit of the task processing device provided in any one of the foregoing embodiments, for example, a hard disk or a memory of an electronic device. The computer readable storage medium may also be an external storage device of the electronic device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) card, a flash card (flash card) or the like, which are provided on the electronic device. The computer readable storage medium may also include a magnetic disk, an optical disk, a read-only memory (ROM), a random access memory (randomaccess memory, RAM), or the like. Further, the computer-readable storage medium may also include both an internal storage unit and an external storage device of the electronic device. The computer-readable storage medium is used to store the computer program and other programs and data required by the electronic device. The computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
The terms first, second and the like in the claims and in the description and drawings are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus. Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments. The term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The foregoing disclosure is illustrative of the present application and is not to be construed as limiting the scope of the application, which is defined by the appended claims.

Claims (10)

1. A method of work management, for use with a blockchain, the method comprising:
receiving a work release request submitted by a first release platform, wherein the work release request carries a target work;
acquiring first authorization information of an creator of the target work, and determining whether the work release request is a valid request based on the first authorization information;
If the work release request is a valid request, determining a hash value of the target work, and returning a confirmation message allowing release to the first release platform;
acquiring a first work distribution image generated by the first distribution platform when the target work is distributed, and sending the first work distribution image to the creator so that the creator signs the first work distribution image based on a private key of the creator to obtain a first distribution information ciphertext;
the first authorization information is sent to the first distribution platform so that the first distribution platform signs the first authorization information based on a private key of the first distribution platform to obtain a first authorization information ciphertext;
acquiring the first authorization information ciphertext and a first public key of the first distribution platform, acquiring the first distribution information ciphertext and a second public key of the creator, transmitting the first authorization information ciphertext, the first public key, the first distribution information ciphertext and the second public key to a consensus node so that the consensus node verifies the validity of the first authorization information ciphertext and the first distribution information ciphertext, and transmitting a signature confirmation message after verification is passed;
And when the signature confirmation message meets a preset consensus strategy, storing the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work into a blockchain, and returning a target block height to the first distribution platform and the creator, wherein the target block height is used for marking a target block in the blockchain, in which the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work are stored.
2. The method of claim 1, wherein the first authorization information includes a first authorized work, first authorization object information, and a first authorization period; the determining, based on the first authorization information, whether the work distribution request is a valid request includes:
determining platform information of the first distribution platform and the submitting time of the work distribution request;
and if the target work is consistent with the first authorized work, the platform information of the first distribution platform is consistent with the first authorized object information, and the submitting time of the work distribution request is within the first authorized period, determining that the work distribution request is an effective request.
3. The method of claim 1, wherein the target work is an image work, and wherein determining the hash value of the target work comprises:
scaling the target work to obtain a scaled image with a preset size;
calculating the gray value of each pixel point of the scaled image to obtain a gray image;
determining a hash value of the target work based on the gray value of each pixel point of the gray image, or,
and performing discrete cosine transform on the gray level image to obtain a discrete image, and determining the hash value of the target work based on the frequency domain value of each pixel point of the discrete image.
4. The method of claim 1, wherein the target work is a video work, and wherein determining the hash value of the target work comprises:
acquiring binary data corresponding to the video work;
determining a hash value of the binary data, and determining the hash value of the binary data as the hash value of the target work.
5. The method of claim 3, wherein after the determining the hash value of the target work, the method further comprises:
determining whether a target hash value consistent with the hash value of the target work or having a hamming distance smaller than a preset hamming distance exists in the blockchain;
If the target hash value does not exist in the blockchain, determining that the same or similar work as the target work does not exist in the blockchain, and returning a confirmation message allowing release to the first release platform.
6. The method according to claim 1, wherein the method further comprises:
receiving an authorization change request submitted by the creator, wherein the authorization change request carries second authorization information and the target block height, and the authorization information comprises the target work, second authorization object information and a second authorization period;
determining the target block from the block chain based on the block height, and acquiring the first authorization information ciphertext corresponding to the target work and the hash value of the target work from the target block;
decrypting the first authorization information ciphertext based on the first public key to obtain first authorization information;
when the second authorization period is after a first authorization period in the first authorization information and the submitting time of the authorization change request is outside the first authorization period, acquiring a second work release image of the target work on a second release platform corresponding to the second authorization object information;
Determining a second release information ciphertext based on the second work release image, and determining a second authorization information ciphertext based on the second authorization information;
deleting the first release information ciphertext, the first authorization information ciphertext and the hash value of the target work from the target block, and storing the second release information ciphertext, the second authorization information ciphertext and the hash value of the target block into a new block of the blockchain.
7. The method according to claim 1, wherein the method further comprises:
receiving an infringement determination request of the first distribution platform, wherein the infringement determination request carries infringement works, platform information of the infringement works, the target works and the target block heights;
determining the target block from the block chain based on the target block height, and acquiring the first distribution information ciphertext corresponding to the target work and the hash value of the target work from the target block;
determining the hash value of the infringing work, decrypting the first distribution information ciphertext based on the second public key to obtain a first work distribution image and generating infringement notification information based on the first work distribution image when the hash value of the infringing work is consistent with or similar to the hash value of the target work, and sending the infringement notification information to a third distribution platform corresponding to the platform information of the infringement work.
8. A work management apparatus, characterized by comprising:
the first receiving module is used for receiving a work release request submitted by the first release platform, wherein the work release request carries a target work;
the first acquisition module is used for acquiring first authorization information of an author of the target work and determining whether the work release request is a valid request or not based on the first authorization information;
the first determining module is used for determining the hash value of the target work and returning a confirmation message allowing release to the first release platform if the work release request is a valid request;
the first sending module is used for obtaining a first work distribution image generated by the first distribution platform when the target work is distributed, and sending the first work distribution image to the creator so that the creator signs the first work distribution image based on a private key of the creator to obtain a first distribution information ciphertext;
the second sending module is used for sending the first authorization information to the first distribution platform so that the first distribution platform signs the first authorization information based on a private key of the first distribution platform to obtain a first authorization information ciphertext;
The verification module is used for acquiring the first authorization information ciphertext and a first public key of the first distribution platform, acquiring the first distribution information ciphertext and a second public key of the creator, transmitting the first authorization information ciphertext, the first public key, the first distribution information ciphertext and the second public key to a consensus node so that the consensus node verifies the validity of the first authorization information ciphertext and the first distribution information ciphertext, and transmitting a signature confirmation message after verification is passed;
the storage module is used for receiving the signature confirmation message, storing the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work to a blockchain when the signature confirmation message meets a preset consensus strategy, and returning target block heights to the first distribution platform and the creator, wherein the target block heights are used for marking target blocks in the blockchain, in which the first authorization information ciphertext, the first distribution information ciphertext and the hash value of the target work are stored.
9. An apparatus for work management comprising a processor and a memory, the processor and the memory being interconnected;
The memory is for storing a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method of any of claims 1 to 7.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program, which is executed by a processor to implement the method of any one of claims 1 to 7.
CN201911227978.0A 2019-12-04 2019-12-04 Work management method, device, equipment and storage medium Active CN110929230B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911227978.0A CN110929230B (en) 2019-12-04 2019-12-04 Work management method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911227978.0A CN110929230B (en) 2019-12-04 2019-12-04 Work management method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110929230A CN110929230A (en) 2020-03-27
CN110929230B true CN110929230B (en) 2023-11-24

Family

ID=69856630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911227978.0A Active CN110929230B (en) 2019-12-04 2019-12-04 Work management method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110929230B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552829B (en) * 2020-05-07 2023-06-27 京东科技信息技术有限公司 Method and apparatus for analyzing image material
CN114401092A (en) * 2021-12-17 2022-04-26 浙江工商大学 Image file sharing platform infringement protection method based on block chain and IPFS
CN115391751A (en) * 2022-10-31 2022-11-25 知安视娱(北京)科技有限公司 Infringement determination method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
WO2018119892A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Method and device for publishing and validating software application program
CN108280328A (en) * 2018-01-31 2018-07-13 北京安妮全版权科技发展有限公司 Method and device is really weighed based on digital signature and the copyright of time service
CN110519297A (en) * 2019-09-17 2019-11-29 腾讯科技(深圳)有限公司 A kind of data processing method and equipment based on block chain private key

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679045B (en) * 2016-08-01 2021-08-31 华为技术有限公司 Copyright authorization management method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018119892A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Method and device for publishing and validating software application program
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
CN108280328A (en) * 2018-01-31 2018-07-13 北京安妮全版权科技发展有限公司 Method and device is really weighed based on digital signature and the copyright of time service
CN110519297A (en) * 2019-09-17 2019-11-29 腾讯科技(深圳)有限公司 A kind of data processing method and equipment based on block chain private key

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链中的隐私保护技术;翟社平;杨媛媛;张海燕;赵江明;;西安邮电大学学报(第05期);全文 *

Also Published As

Publication number Publication date
CN110929230A (en) 2020-03-27

Similar Documents

Publication Publication Date Title
CN110929230B (en) Work management method, device, equipment and storage medium
US11233657B2 (en) Method and system for registering digital documents
JP4622811B2 (en) Electronic document authenticity guarantee system
CN110969207B (en) Electronic evidence processing method, device, equipment and storage medium
WO2020233373A1 (en) Application configuration file management method and device
CN109376504A (en) A kind of picture method for secret protection based on block chain technology
TWI718567B (en) Two-dimensional code generation method, data processing method, device, server and computer readable storage medium
US20080083039A1 (en) Method for integrity attestation of a computing platform hiding its configuration information
US20220086005A1 (en) System and method for decentralized digital structured data storage, management, and authentication using blockchain
JP2005051734A (en) Electronic document authenticity assurance method and electronic document disclosure system
CN110601848B (en) Appointment information processing method, device and system based on block chain and electronic equipment
JP2004364070A (en) System for managing electronic document by utilizing maskable signature technology
CN109493054B (en) Multi-chain information management method, device, storage medium and block chain identity analyzer
US20080010468A1 (en) Method and technique for enforcing transience and propagation constraints on data transmitted by one entity to another entity by means of data division and retention
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
RU2010105036A (en) MAS CODE CHECK WITHOUT ITS DISCLOSURE
CN114448605A (en) Encrypted ciphertext verification method, system, equipment and computer readable storage medium
CN112613747A (en) Building information management method, device, equipment and storage medium
CN114915809A (en) Video file copyright protection method and transaction method based on block chain
WO2020057389A1 (en) Signature verification method and apparatus, electronic device and readable storage medium
US12019788B2 (en) Method and system for registering digital documents
CN114363068B (en) Picture and text issuing method and device, electronic equipment and storage medium
CN114240399A (en) Government affair data processing method and system based on block chain platform
CN114547562A (en) Method and device for adding and applying text watermark
CN111369332A (en) Data processing method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant