為了使本領域技術人員更好地理解本說明書實施例中的技術方案,下面將結合本說明書實施例中的圖式,對本說明書實施例中的技術方案進行詳細地描述,顯然,所描述的實施例僅僅是本說明書的一部分實施例,而不是全部的實施例。基於本說明書中的實施例,本領域普通技術人員所獲得的所有其他實施例,都應當屬於保護的範圍。
以下結合圖式,詳細說明本說明書各實施例提供的技術方案。
圖1是本說明書實施例提供的一種透過網頁監測對網頁進行區塊鏈存證的方法的流程示意圖,包括以下步驟:
S100:接收使用者發送的網頁位址,並存取所述網頁位址對應的目標網頁。
本方法的執行主體一般是區塊鏈存證方的伺服器。在後文中,為了描述的方便,以“存證伺服器”代指“區塊鏈存證方的伺服器”。
所述區塊鏈存證方可以是提供區塊鏈存證服務的機構。所述區塊鏈存證方可以是區塊鏈網路中的節點,對外受理資料存證請求,基於資料存證請求獲取需要存證的資料,然後基於需要存證的資料構建資料存證交易並廣播,此外,還會參與區塊鏈網路中的各節點間的共識,以便將需要存證的資料寫入自身維護的區塊鏈(共用帳本)中。
所述區塊鏈存證方也可以是不是區塊鏈網路中的節點,而是負責代理受理資料存證請求,對需要存證的資料進行一定的處理(如對需要存證的網頁進行截圖並雜湊化)後,將處理結果提交給區塊鏈網路進行存證。
圖1所示的方法可以應用於版權侵權證據保全的場景,也可以應用於其他領域的證據保全的場景。下文將以版權侵權證據保全的場景為例,對本方案進行說明。本領域技術人員應當理解,在其他領域的證據保全的場景下,也可以透過圖1所示的方法流程,透過網頁監測實現對網頁的區塊鏈存證。
在版權侵權證據保全的場景下,所述使用者一般是持有作品版權的版權人。所述使用者當發現某個呈現了侵權作品的網頁(目標網頁)時,可以透過瀏覽器存取存證伺服器,並將目標網頁的網頁位址提供給存證伺服器,由存證伺服器對目標網頁進行存取。
S102:從所述目標網頁的文檔中提取標籤。
眾所周知,網頁實際上是基於超文字標記語言(Hyper Text Markup Language,HTML)文檔進行載入的,本文中所述的文檔一般是指網頁的HTML文檔。在HTML文檔中,使用若干HTML標籤對不同部分的文檔內容進行標記。針對每個標籤,該標記所標記的文檔內容對應於目標網頁的一個元素,用於對該元素進行載入。
在本說明書實施例中,存證伺服器可以從目標網頁的文檔中,提取所述目標網頁的標籤。具體地,存證伺服器可以提取所述目標網頁的全部標籤,也可以提取所述目標網頁的部分標籤。
進一步地,當存證伺服器提取的是所述目標網頁的部分標籤時,針對存證伺服器提取的每個標籤,該標籤具有如下性質:該標籤所標記的文檔內容有較大可能隨著時間的推移而發生變化(因而有監測的必要)。
例如,目標網頁的用於標記網站資訊(如網站功能變數名稱)的標籤一般不會被存證伺服器提取,因為網站資訊通常是固定不變的。而目標網頁的用於標記文章閱讀數的標籤一般會被存證伺服器提取,因為文章閱讀數通常會持續增加。
S104:從提取的標籤中判定所述使用者指定的標籤,作為指定標籤;以及獲取所述使用者指定的存證觸發條件。
S106:針對所述指定標籤進行監測,並當監測到所述指定標籤所標記的文檔內容滿足所述存證觸發條件時,對所述目標網頁進行區塊鏈存證。
在本說明書實施例中,所述使用者可以預先在存證伺服器上進行註冊,並預先指定若干標籤。於是,存證伺服器在步驟S104中,可以直接從提取的標籤中判定所述使用者預先指定的標籤,作為指定標籤。需要說明的是,指定標籤的數量可以大於1。
此外,存證伺服器也可以將提取的標籤提供給所述使用者進行選擇。具體地,假設使用者透過瀏覽器存取存證伺服器,存證伺服器可以將展示有提取的標籤的選擇介面提供給所述使用者,並對所述選擇介面進行監測;針對所述選擇介面中展示的每個標籤,當監測到該標籤被選擇時,將該標籤判定為所述使用者指定的標籤。
例如,在所述選擇介面中,提取的各標籤可以順序排列,每個標籤的旁邊有相應的核取方塊,所述使用者透過點擊核取方塊的方式,選擇相應的標籤。
進一步地,所述存證伺服器可以透過分析所述使用者在網際網路上產生的行為資料,推測出所述使用者有較大機率會選擇的標籤。例如,所述存證伺服器發現所述使用者是一位小說作者,那麼,推測所述使用者對目標網頁的用於標記文章閱讀數的標籤感興趣,也就是說,所述使用者有較大機率會選擇用於標記文章閱讀數的標籤。於是,存證伺服器在提供的選擇介面中,可以將所述使用者有較大機率會選擇的標籤進行突出顯示(如高亮顯示),以提示所述使用者進行選擇。
在本說明書實施例中,存證伺服器還需要獲取所述使用者指定的存證觸發條件。具體地,存證伺服器可以將條件設置介面提供給所述使用者,透過所述條件設置介面,接收所述使用者輸入的存證觸發條件。
在本說明書實施例中,當指定標籤的數量為1時,存證伺服器可以針對所述指定標籤進行監測,一旦存證觸發條件滿足,就觸發對目標網頁的區塊鏈存證操作。
在本文中,將所述目標網頁用於呈現的作品稱為所述目標網頁的關聯作品。所述目標網頁的關聯作品可以有不止一個。並且,將所述目標網頁的關聯作品中所述使用者所關注的作品,稱為指定關聯作品。
例如,所述目標網頁是某個音樂網站的音樂清單網頁,所述目標網頁的關聯作品為音樂作品A、音樂作品B、音樂作品C,音樂作品B的版權人發現,該音樂網站未經授權提供了音樂作品B的下載服務,那麼,音樂作品B的版權人可以請求存證伺服器對目標網頁進行存證。所述目標網頁的指定關聯作品就是音樂作品B,該版權人會指定目標網頁的文檔中用於標記音樂作品B的標籤,作為指定標籤。
在版權侵權證據保全的場景下,如果所述指定標籤所標記的文檔內容包括所述目標網頁的指定關聯作品所對應的相關統計量,那麼,當所述目標網頁的指定關聯作品所對應的相關統計量達到備選量集合中的任一備選量時,意味著所述指定標籤所標記的文檔內容滿足所述存證觸發條件。
其中,所述目標網頁的文檔內容是指所述目標網頁所呈現的作品。所述指定關聯作品對應的相關統計量包括但不限於以下:下載量、閱讀量、收藏量、播放量、點讚量等。
所述備選量集合中的各備選量可以根據實際需要指定。進一步地,假設所述備選量集合中包含N個備選量,這N個備選量可以透過以下方式判定:
設所述目標網頁的指定關聯作品所對應的相關統計量當前為x,指定比例為y(小於1);
將x*(y+1)作為第一個備選量;
將x*(y+1)2
作為第二個備選量;
……
將x(y+1)N
作為第N個備選量。
可見,透過上述方式判定備選量集合,實際上可以實現所述相關統計量每增加指定比例(如20%),就及時對目標網頁進行一次區塊鏈存證。
例如,目標網頁的指定關聯作品對應的相關統計量每增加20%,就會觸發存證伺服器對目標網頁執行一次區塊鏈存證操作。如此,版權人總是可以對侵權作品的最大相關統計量進行存證,以便盡可能要求更大數額的侵權損害賠償,最大程度地懲罰目標網頁的所有者。
版權侵權證據保全的場景下,如果所述指定標籤所標記的網頁相關資訊為,所述目標網頁的指定關聯作品或所述指定關聯作品對應的版權相關資訊,那麼,當所述目標網頁的指定關聯作品發生改變時,或,當所述指定關聯作品對應的版權相關資訊發生改變時,意味著所述指定標籤所標記的文檔內容滿足所述存證觸發條件。
其中,所述指定關聯作品對應的版權相關資訊,是指標識所述指定關聯作品的版權狀態的資訊,如授權有效期資訊、是否授權的資訊、作品作者資訊等。一旦版權相關資訊發生變化,就意味著目標網頁是否侵權的結論需要重新評估,此時,需要重新對目標網頁進行區塊鏈存證。
所述目標網頁中的指定關聯作品如果發生變化,也意味著目標網頁是否還是侵權網頁需要重新評估,此時,需要重新對目標網頁進行區塊鏈存證。
在版權侵權證據保全的場景下,如果所述指定標籤所標記的文檔內容包括所述目標網頁的指定關聯作品對應的網頁位置資訊,那麼當所述目標網頁的指定關聯作品對應的網頁位置資訊發生改變時,意味著所述指定標籤所標記的文檔內容足所述存證觸發條件。
進一步地,所述目標網頁的指定關聯作品對應的網頁位置資訊發生改變,具體可以是:所述目標網頁的指定關聯作品對應的網頁位置資訊發生改變,並且,第一位置與所述目標網頁中的參考位置的相近程度低於第二位置與所述參考位置的相近程度。其中,所述第一位置是根據改變前的所述網頁位置資訊判定的、所述目標網頁中對應於所述指定關聯作品的位置;所述第二位置是根據改變後的所述網頁位置資訊判定的、所述目標網頁中對應於所述指定關聯作品的位置。所述參考位置可以根據需要進行設定。
舉例來說,假設目標網頁是用於呈現某音樂網站上下載量top10的音樂作品的排行榜,那麼,隨著時間的推移,所述目標網頁上,top10音樂作品的排名情況有可能發生改變。對於版權人而言,其關注指定關聯作品(未經版權人授權)在排行榜中的名次,指定關聯作品的下載量越高,排名越靠前,版權人可訴求的侵權損害賠償越高。於是,可以將目標網頁的左上角設定為參考位置,並監測指定關聯作品對應的位置在目標網頁中的變化。當監測到指定關聯作品對應的位置發生變化,且距離參考位置更近時(意味著指定關聯作品排名上升),對目標網頁進行一次區塊鏈存證。
此外,如果指定標籤的數量大於1,則存證伺服器可以針對每個指定標籤,獲取所述使用者指定的對應於該指定標籤的存證觸發條件。存證伺服器可以針對每個指定標籤進行監測,一旦監測到指定數量的指定標籤滿足自身對應的存證觸發條件,就觸發對目標網頁的區塊鏈存證操作。也就是說,若存在指定數量的指定標籤滿足:針對所述指定數量的指定標籤中的每個指定標籤,該指定標籤所標記的文檔內容滿足自身對應的存證觸發條件;則觸發對目標網頁的區塊鏈存證操作。
透過圖1所示的方法,區塊鏈存證方的伺服器可以應版權人的請求,一態樣從目標網頁的文檔中判定出版權人指定的標籤進行監測,另一態樣獲取版權人指定的存證觸發條件。區塊鏈存證方的伺服器當監測到版權人指定的標籤所標記的文檔內容滿足所述存證觸發條件時,就會觸發一次對目標網頁的區塊鏈存證操作。如此,版權人透過指定標籤與指定存證觸發條件,將監測目標網頁的任務交由區塊鏈存證方的伺服器執行。版權人不需要耗費精力持續關注目標網頁的動態,對版權人而言更為便利。
另外,在本說明書實施例中,存證伺服器還可以獲取所述使用者指定至少一個時間點,並針對每個時間點,當時間經過該時間點時,對所述目標網頁進行區塊鏈存證。如此,就實現了對所述目標網頁的定時存證。
需要說明的是,如果使用者需要存證伺服器每當經過指定週期對目標網頁進行一次區塊鏈存證,那麼,上述的各時間點實際上是使用者根據指定週期指定的。
此外,在本說明書實施例中,所述使用者可以重新配置對目標網頁的存證策略。具體地,存證伺服器可以接收所述使用者發送的重配置指令,並回應於所述重配置指令,重新提取所述網頁位址對應的目標網頁的標籤,以便所述使用者重新指定標籤和/或重新指定存證觸發條件。
還有,在本說明書實施例中,在獲取所述使用者指定的存證觸發條件之後,還可以根據所述存證觸發條件,判定監測工作量;根據所述監測工作量,判定付費金額;將付費介面提供給所述使用者,以便所述使用者支付所述付費金額。
其中,所述監測工作量與所述付費金額正相關。根據所述監測工作量判定付費金額的標準可以由區塊鏈存證方根據實際需要進行設置,本說明書對此不做具體限定。
進一步地,當目標網頁上存在使用者關注的侵權作品時,該侵權作品就是目標網頁的指定關聯作品。使用者不論指定目標網頁的文檔中的哪些標籤為指定標籤,事實上都是與對指定關聯作品的關注需求有關。例如,所述指定標籤所標記的文檔內容可以是指定關聯作品對應的相關統計量、版權狀態資訊或指定關聯作品本身。實踐中,一旦所述指定關聯作品被從目標網頁中撤下之後,也就沒必要對目標網頁進行監測了。對使用者而言,從對目標網頁中的指定標籤開始監測起,直至指定關聯作品被撤下,所經過的期間實際上可以認為是可證明的、指定關聯作品在目標網頁上存續的期間,這是比較重要的證據。
為此,在本說明書實施例中,當針對所述指定標籤進行開始監測時,記錄開始監測的時間;以及,當監測到所述目標網頁的指定關聯作品被刪除時,結束監測,並記錄結束監測的時間。進而,可以根據記錄的開始監測的時間與結束監測的時間,產生所述目標網頁對應的存續期間證據,並對所述存續期間證據進行區塊鏈存證。
進一步地,在步驟S106中,若所述目標網頁的指定關聯作品為可播放作品(如視訊、音訊等),則對目標網頁進行區塊鏈存證,具體可以是:
對所述目標網頁進行截圖,得到網頁截圖;從所述目標網頁中讀取所述指定關聯作品的作品儲存位址,並從所述作品儲存位址獲取可播放作品;將所述網頁截圖與所述可播放作品處理成目標雜湊;將所述目標雜湊發佈至區塊鏈進行存證。
圖2是本說明書實施例提供的一種透過文件獲取對網頁進行區塊鏈存證的方法的流程示意圖,包括以下步驟:
S200:存取目標網頁。
本方法的執行主體也可以是存證伺服器。
S202:對所述目標網頁進行截圖,得到網頁截圖;以及,讀取所述目標網頁關聯的文件儲存位址,並從所述文件儲存位址獲取可播放文件。
在本說明書實施例中,存證伺服器在存取目標網頁之後,可以一態樣對目標網頁進行截圖,得到網頁截圖;另一態樣,讀取所述目標網頁關聯的文件儲存位址,以便從所述文件儲存位址獲取可播放文件。
其中,所述目標網頁關聯的文件儲存位址,是指所述目標網頁用於播放的可播放文件的文件儲存位址。一般而言,對於用於播放可播放文件的網頁而言,由於可播放文件的儲存大小較大,因此該網頁並不包含可播放文件本身,而是僅包含可播放文件的文件儲存位址。當需要播放可播放文件時,瀏覽器需要從該網頁中解析出文件儲存位址,從文件儲存位址獲取可播放文件並播放。
S204:將所述網頁截圖與所述可播放文件處理成目標雜湊。
在本說明書實施例中,將資料處理成雜湊,是指以資料為雜湊演算法的輸入,進行雜湊計算,得到相應的雜湊值。
在步驟S204中,存證伺服器可以直接對所述網頁截圖與所述可播放文件進行雜湊計算,得到目標雜湊。也可以一態樣將所述網頁截圖處理成截圖雜湊,另一態樣將所述可播放文件處理成文件雜湊,最後,將所述截圖雜湊與所述文件雜湊處理成目標雜湊。
S206:對所述目標雜湊進行區塊鏈存證。
眾所周知,資料經過雜湊運算之後得到的雜湊值,可以唯一標識該資料,可以視為該資料的“指紋”。該資料一旦被篡改,該資料對應的雜湊值也會發生改變。因此,將所述網頁截圖與所述可播放文件對應的目標雜湊進行區塊鏈存證,相當於對所述目標網頁、所述目標網頁所用於播放的可播放文件以及所述目標網頁與所述可播放文件的對應關係進行了區塊鏈存證,可證明以下事實:
1、目標網頁是真實存在且未經篡改的;
2、可播放文件是真實存在且未經篡改的;
3、目標網頁是用於播放所述可播放文件的網頁。
於是,透過圖1所示的方法,就實現了對關聯有可播放文件,卻並未包含可播放文件本身的網頁的區塊鏈存證。
在本說明書實施例中,如果存證伺服器不是區塊鏈網路中的節點,那麼存證伺服器可以將所述目標雜湊提交給區塊鏈網路進行存證。
如果存證伺服器是區塊鏈網路中的一個區塊鏈節點,那麼,存證伺服器可以基於所述目標雜湊,構建目標交易,然後將所述目標交易廣播給除自身之外的其他區塊鏈節點,以使各區塊鏈節點基於共識機制,將所述目標交易存入自身的區塊鏈。
需要說明的是,在本說明書中所描述的交易(transaction),是指使用者透過區塊鏈的使用者端建立,並需要最終發佈至區塊鏈的分散式資料庫中的一筆資料。
也就是說,區塊鏈中的交易,存在狹義的交易以及廣義的交易之分。狹義的交易是指使用者向區塊鏈發佈的一筆價值轉移;例如,在傳統的比特幣區塊鏈網路中,交易可以是使用者在區塊鏈中發起的一筆轉帳。而廣義的交易是指使用者向區塊鏈發佈的一筆具有業務意圖的業務資料;例如,運營方可以基於實際的業務需求搭建一個聯盟鏈,依託於聯盟鏈部署一些與價值轉移無關的其它類型的線上業務(比如,租房業務、車輛調度業務、保險理賠業務、信用服務、醫療服務等),而在這類聯盟鏈中,交易可以是使用者在聯盟鏈中發佈的一筆具有業務意圖的業務消息或者業務請求。
透過圖2所示方法,對於關聯有可播放文件,卻並未包含可播放文件本身的目標網頁,區塊鏈存證方一態樣對所述目標網頁進行截圖,得到網頁截圖;另一態樣讀取所述目標網頁關聯的文件儲存位址,從所述文件儲存位址獲取可播放文件。隨後,對所述網頁截圖與所述可播放文件進行雜湊運算,得到目標雜湊,進而將所述目標雜湊發佈至區塊鏈進行存證。這相當於實現了對包含可播放文件的網頁的區塊鏈存證。如此,區塊鏈存證方的伺服器不需要耗費時間對可播放文件的播放過程進行記錄,提升了存證效率。
此外,實際應用中,所述目標網頁可以用於播放不止一個可播放文件,這也意味著,所述目標網頁關聯有不止一個文件儲存位址。
於是,存證伺服器可以針對所述目標網頁關聯的每個文件儲存位址,從該文件儲存位址獲取可播放文件,作為該文件儲存位址對應的可播放文件。然後,將所述網頁截圖與所述目標網頁關聯的各文件儲存位址分別對應的可播放文件處理成目標雜湊。
進一步地,有時,所述目標網頁可以包含不止一個子網頁連結,使用者點擊任一子網頁連結後,可以進入該子網頁連結對應的子網頁,該子網頁用於播放一個可播放文件。
這種情況下,存證伺服器讀取所述目標網頁關聯的不止一個文件儲存位址,具體可以是針對所述目標網頁中包含的每個子網頁連結,存取該子網頁連結,然後讀取該子網頁連結對應的子網頁中包含的文件儲存位址。
並且,由於目標網頁中各子網頁連結一般是按一定順序進行排列的,因此,在上述的步驟S204中,具體可以是根據所述目標網頁中各子網頁連結的排列順序,對各子網頁連結分別對應的文件儲存位址進行排序;根據各文件儲存位址的排列順序,各文件儲存位址分別對應的可播放文件進行排序,得到可播放文件序列;將所述網頁截圖與所述可播放文件序列處理成目標雜湊。
如此,一旦目標網頁中各子網頁連結的排列順序發生變化,就會導致基於目標網頁得到的目標雜湊發生變化。將所述目標雜湊進行區塊鏈存證,不僅相當於將所述目標網頁的內容進行了區塊鏈存證,還相當於將所述目標網頁的內容佈局進行了區塊鏈存證。
更進一步地,存證伺服器將所述網頁截圖與所述可播放文件序列處理成目標雜湊,具體可以是將所述網頁截圖處理成截圖雜湊;針對所述可播放文件序列中的每個可播放文件,將該可播放文件處理成文件雜湊;根據各可播放文件的排列順序,對各可播放文件對應的文件雜湊進行排序,得到文件雜湊序列;基於所述文件雜湊序列,構建梅克爾樹;將所述截圖雜湊與所述梅克爾樹的根雜湊處理成目標雜湊。
圖3是本說明書實施例提供的基於文件雜湊序列構建的梅克爾樹示意圖。如圖3所示,基於所述文件雜湊序列構建的梅克爾樹的根雜湊可以唯一標識所述文件雜湊序列,可以視為所述文件雜湊序列的“指紋”。而所述文件雜湊序列,實際上是所述目標網頁中,各可播放文件分別對應的子網頁連結的排列情況的映射。
一旦所述目標網頁中某個子網頁連結被更換,就需要對所述目標網頁重新進行一次存證。具體地,仍然會採用上述方式,基於當前的目標網頁得到新的文件雜湊序列。然後,基於新的文件雜湊序列重新構建梅克爾樹得到新的根雜湊進行存證。
需要說明的是,採用梅克爾樹的方式對文件雜湊序列進行儲存的優勢在於,當目標網頁的內容變動較少時,相應的文件雜湊序列的變動也會較少,此時,只需要將舊的梅克爾樹中與變動相關的路徑上的雜湊值重新計算即可得到新的梅克爾樹。
如圖4所示,假設目標網頁中網頁子連結3被更換網頁子連結8,相應的文件雜湊3也就被更換為文件雜湊8,於是,再重新構建梅克爾樹時,只需要將舊的梅克爾樹中文件雜湊3-雜湊6-雜湊7這一路徑進行更新即可(更新為文件雜湊8-雜湊9-雜湊10)。最終,將根雜湊更新為雜湊10。如此,節省了存證伺服器的計算資源。
基於圖1所示方法,本說明書實施例還對應提供了一種透過網頁監測對網頁進行區塊鏈存證的裝置,如圖5所示,包括:
接收模組501,接收使用者發送的網頁位址,並存取所述網頁位址對應的目標網頁;
提取模組502,從所述目標網頁的文檔中提取標籤;
判定獲取模組503,從提取的標籤中判定所述使用者指定的標籤,作為指定標籤;以及獲取所述使用者指定的存證觸發條件;
監測存證模組504,針對所述指定標籤進行監測,並當監測到所述指定標籤所標記的文檔內容滿足所述存證觸發條件時,對所述目標網頁進行區塊鏈存證。
所述判定獲取模組503,將展示有提取的標籤的選擇介面提供給所述使用者,並對所述選擇介面進行監測;針對所述選擇介面中展示的每個標籤,當監測到該標籤被選擇時,將該標籤判定為所述使用者指定的標籤。
所述判定獲取模組503,將條件設置介面提供給所述使用者;透過所述條件設置介面,接收所述使用者輸入的存證觸發條件。
指定標籤的數量大於1;
所述判定獲取模組503,針對每個指定標籤,獲取所述使用者指定的對應於該指定標籤的存證觸發條件。
所述指定標籤所標記的文檔內容滿足所述存證觸發條件,具體包括:
存在指定數量的指定標籤滿足:
針對所述指定數量的指定標籤中的每個指定標籤,該指定標籤所標記的文檔內容滿足該指定標籤對應的存證觸發條件。
所述指定標籤所標記的文檔內容包括:所述目標網頁的指定關聯作品所對應的相關統計量;
所述指定標籤所標記的文檔內容滿足所述存證觸發條件,具體包括:
所述目標網頁的指定關聯作品所對應的相關統計量達到備選量集合中的任一備選量。
所述指定標籤所標記的文檔內容包括:所述目標網頁的指定關聯作品或所述指定關聯作品對應的版權相關資訊;
所述指定標籤所標記的文檔內容滿足所述存證觸發條件,具體包括:
所述目標網頁的指定關聯作品發生改變,或,所述指定關聯作品對應的版權相關資訊發生改變。
所述指定標籤所標記的文檔內容包括:所述目標網頁的指定關聯作品對應的網頁位置資訊;
所述指定標籤所標記的文檔內容滿足所述存證觸發條件,具體包括:
所述目標網頁的指定關聯作品對應的網頁位置資訊發生改變。
所述目標網頁的指定關聯作品對應的網頁位置資訊發生改變,具體包括:
所述目標網頁的指定關聯作品對應的網頁位置資訊發生改變,並且,第一位置與所述目標網頁中的參考位置的相近程度低於第二位置與所述參考位置的相近程度;
其中,所述第一位置是根據改變前的所述網頁位置資訊判定的、所述目標網頁中對應於所述指定關聯作品的位置;所述第二位置是根據改變後的所述網頁位置資訊判定的、所述目標網頁中對應於所述指定關聯作品的位置。
所述裝置還包括:
計費模組505,在獲取所述使用者指定的存證觸發條件之後,根據所述存證觸發條件,判定監測工作量;根據所述監測工作量,判定付費金額;所述監測工作量與所述付費金額正相關;將付費介面提供給所述使用者,以便所述使用者支付所述付費金額。
所述監測存證模組504,若所述目標網頁的指定關聯作品為可播放作品,則對所述目標網頁進行截圖,得到網頁截圖;從所述目標網頁中讀取所述指定關聯作品的作品儲存位址,並從所述作品儲存位址獲取可播放作品;將所述網頁截圖與所述可播放作品處理成目標雜湊;將所述目標雜湊發佈至區塊鏈進行存證。
所述裝置還包括:
存取期間證據產生模組506,當針對所述指定標籤進行開始監測時,記錄開始監測的時間;以及,當監測到所述目標網頁的指定關聯作品被刪除時,結束監測,並記錄結束監測的時間;根據記錄的開始監測的時間與結束監測的時間,產生所述目標網頁對應的存續期間證據,並對所述存續期間證據進行區塊鏈存證。
所述裝置還包括:定時處理模組507,獲取所述使用者指定的至少一個時間點;針對每個時間點,當時間經過該時間點時,對所述目標網頁進行區塊鏈存證。
所述裝置還包括:重配置模組508,接收所述使用者發送的重配置指令;回應於所述重配置指令,重新從所述目標網頁的文檔中提取標籤,以便所述使用者重新指定標籤和/或重新指定存證觸發條件。
本說明書實施例還提供一種電腦設備,其至少包括記憶體、處理器及儲存在記憶體上並可在處理器上運行的電腦程式,其中,處理器執行所述程式時實現圖1所示方法的功能。
圖6示出了本說明書實施例所提供的一種更為具體的計算設備硬體結構示意圖,該設備可以包括:處理器1010、記憶體1020、輸入/輸出介面1030、通信介面1040和匯流排1050。其中處理器1010、記憶體1020、輸入/輸出介面1030和通信介面1040透過匯流排1050實現彼此之間在設備內部的通信連接。
處理器1010可以採用通用的CPU(Central Processing Unit,中央處理器)、微處理器、應用專用積體電路(Application Specific Integrated Circuit,ASIC)、或者一個或多個積體電路等方式實現,用於執行相關程式,以實現本說明書實施例所提供的技術方案。
記憶體1020可以採用ROM(Read Only Memory,唯讀記憶體)、RAM(Random Access Memory,隨機存取記憶體)、靜態存放裝置,動態儲存裝置設備等形式實現。記憶體1020可以儲存作業系統和其他應用程式,在透過軟體或者韌體來實現本說明書實施例所提供的技術方案時,相關的程式碼保存在記憶體1020中,並由處理器1010來調用執行。
輸入/輸出介面1030用於連接輸入/輸出模組,以實現資訊輸入及輸出。輸入輸出/模組可以作為元件配置在設備中(圖中未示出),也可以外接於設備以提供相應功能。其中輸入裝置可以包括鍵盤、滑鼠、觸控式螢幕、麥克風、各類感測器等,輸出設備可以包括顯示器、揚聲器、振動器、指示燈等。
通信介面1040用於連接通信模組(圖中未示出),以實現本設備與其他設備的通信互動。其中通信模組可以透過有線方式(例如USB、網線等)實現通信,也可以透過無線方式(例如行動網路、WIFI、藍牙等)實現通信。
匯流排1050包括一通路,在設備的各個元件(例如處理器1010、記憶體1020、輸入/輸出介面1030和通信介面1040)之間傳輸資訊。
需要說明的是,儘管上述設備僅示出了處理器1010、記憶體1020、輸入/輸出介面1030、通信介面1040以及匯流排1050,但是在具體實施過程中,該設備還可以包括實現正常運行所必需的其他元件。此外,本領域的技術人員可以理解的是,上述設備中也可以僅包含實現本說明書實施例方案所必需的組件,而不必包含圖中所示的全部元件。
本說明書實施例還提供一種電腦可讀儲存媒體,其上儲存有電腦程式,該程式被處理器執行時實現圖1所示方法的功能。
電腦可讀媒體包括永久性和非永久性、可移除和非可移除媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可程式設計唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁片儲存或其他磁性存放裝置或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信號和載波。
透過以上的實施方式的描述可知,本領域的技術人員可以清楚地瞭解到本說明書實施例可借助軟體加必需的通用硬體平臺的方式來實現。基於這樣的理解,本說明書實施例的技術方案本質上或者說對現有技術做出貢獻的部分可以以軟體產品的形式體現出來,該電腦軟體產品可以儲存在儲存媒體中,如ROM/RAM、磁碟、光碟等,包括若干指令用以使得一台電腦設備(可以是個人電腦,伺服器,或者網路設備等)執行本說明書實施例各個實施例或者實施例的某些部分所述的方法。
上述實施例闡明的系統、方法、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦,電腦的具體形式可以是個人電腦、膝上型電腦、蜂巢式電話、相機電話、智慧型電話、個人數位助理、媒體播放機、導航設備、電子郵件收發設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任意幾種設備的組合。
本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於裝置和設備實施例而言,由於其基本相似於方法實施例,所以描述得比較簡單,相關之處參見方法實施例的部分說明即可。以上所描述的方法實施例僅僅是示意性的,其中所述作為分離部件說明的模組可以是或者也可以不是物理上分開的,在實施本說明書實施例方案時可以把各模組的功能在同一個或多個軟體和/或硬體中實現。也可以根據實際的需要選擇其中的部分或者全部模組來實現本實施例方案的目的。本領域普通技術人員在不付出創造性勞動的情況下,即可以理解並實施。
以上所述僅是本說明書實施例的具體實施方式,應當指出,對於本技術領域的普通技術人員來說,在不脫離本說明書實施例原理的前提下,還可以做出若干改進和潤飾,這些改進和潤飾也應視為本說明書實施例的保護範圍。In order to enable those skilled in the art to better understand the technical solutions in the embodiments of this specification, the technical solutions in the embodiments of this specification will be described in detail below in conjunction with the drawings in the embodiments of this specification. Obviously, the described implementation The examples are only a part of the embodiments of this specification, not all the embodiments. Based on the embodiments in this specification, all other embodiments obtained by a person of ordinary skill in the art should fall within the scope of protection. The following describes in detail the technical solutions provided by the embodiments of this specification in conjunction with the drawings. Fig. 1 is a schematic flow chart of a method for performing blockchain certification on webpages through webpage monitoring according to an embodiment of this specification, including the following steps: S100: receiving a webpage address sent by a user, and accessing the webpage address The corresponding landing page. The execution subject of this method is generally the server of the blockchain depositor. In the following text, for the convenience of description, "the depository server" is used to refer to the "blockchain depositor's server". The blockchain certificate depositor may be an institution that provides blockchain certificate deposit services. The blockchain depositor may be a node in the blockchain network, accepts data deposit requests externally, obtains the data that needs to be deposited based on the data deposit request, and then constructs a data deposit transaction based on the data that needs to be deposited And broadcast, in addition, will participate in the consensus between the nodes in the blockchain network, in order to write the data that needs to be deposited into the blockchain (shared ledger) maintained by itself. The blockchain depositor may also be not a node in the blockchain network, but is responsible for accepting data deposit requests as an agent, and perform certain processing on the data that needs to be deposited (such as the After taking screenshots and hashing them), submit the processing results to the blockchain network for storage. The method shown in FIG. 1 can be applied to the scenario of copyright infringement evidence preservation, and can also be applied to the scenario of evidence preservation in other fields. The following will take the scenario of the preservation of copyright infringement evidence as an example to illustrate this solution. Those skilled in the art should understand that in the case of evidence preservation in other fields, the method flow shown in FIG. 1 can also be used to realize the blockchain deposit of the webpage through webpage monitoring. In the scenario of preservation of copyright infringement evidence, the user is generally the copyright owner who holds the copyright of the work. When the user finds a webpage (target webpage) that presents infringing works, he can access the deposit server through the browser, and provide the web address of the target webpage to the deposit server, and the deposit server To access the landing page. S102: Extract tags from the document of the target webpage. As we all know, web pages are actually loaded based on Hyper Text Markup Language (HTML) documents. The documents described in this article generally refer to HTML documents of web pages. In HTML documents, several HTML tags are used to mark different parts of the document content. For each tag, the document content marked by the tag corresponds to an element of the target webpage, and is used to load the element. In this embodiment of the specification, the deposit server may extract the tag of the target webpage from the document of the target webpage. Specifically, the deposit server may extract all tags of the target webpage, or may extract some tags of the target webpage. Further, when the deposit server extracts part of the tags of the target webpage, for each tag extracted by the deposit server, the tag has the following properties: the content of the document marked by the tag is more likely to follow Changes occur over time (hence the need for monitoring). For example, tags used to mark website information (such as the names of website function variables) on the landing page are generally not retrieved by the storage server because the website information is usually fixed. The tags used to mark the number of article readings on the landing page are generally retrieved by the storage server, because the article readings usually continue to increase. S104: Determine the label specified by the user from the extracted labels as the specified label; and obtain the deposit trigger condition specified by the user. S106: Monitor the designated tag, and when it is monitored that the content of the document marked by the designated tag meets the deposit trigger condition, perform blockchain deposit for the target webpage. In the embodiment of this specification, the user can register on the deposit server in advance and designate several tags in advance. Therefore, in step S104, the deposit server can directly determine the label previously designated by the user from the extracted labels as the designated label. It should be noted that the number of designated tags can be greater than one. In addition, the deposit server may also provide the extracted tags to the user for selection. Specifically, assuming that the user accesses the deposit server through a browser, the deposit server can provide the user with a selection interface displaying the extracted tags, and monitor the selection interface; for the selection For each label displayed in the interface, when it is detected that the label is selected, the label is determined as the label designated by the user. For example, in the selection interface, the extracted tags can be arranged in order, and each tag has a corresponding check box next to it, and the user selects the corresponding tag by clicking the check box. Further, the deposit server may analyze the behavior data generated by the user on the Internet, and infer the label that the user has a higher probability of selecting. For example, if the deposit server finds that the user is a novel author, it is speculated that the user is interested in the tag used to mark the number of articles read on the target webpage, that is, the user has A higher probability will choose the label used to mark the number of articles read. Therefore, in the selection interface provided by the deposit server, the tags that the user has a greater chance of selecting can be highlighted (for example, highlighted) to prompt the user to make a selection. In the embodiment of this specification, the deposit certificate server also needs to obtain the deposit trigger condition specified by the user. Specifically, the deposit server may provide a condition setting interface to the user, and receive the deposit trigger condition input by the user through the condition setting interface. In this embodiment of the specification, when the number of designated tags is 1, the deposit server can monitor the designated tags, and once the deposit trigger condition is met, it triggers the blockchain deposit operation of the target webpage. In this article, the works used for presentation by the target webpage are referred to as related works of the target webpage. There may be more than one related works of the target webpage. In addition, the works that the user is concerned about in the related works of the target webpage are referred to as designated related works. For example, the target webpage is a music list webpage of a certain music website, and the related works of the target webpage are Music Work A, Music Work B, Music Work C, and the copyright owner of Music Work B finds that the music website is unauthorized A download service of musical work B is provided, so the copyright owner of musical work B can request the deposit server to deposit the target webpage. The designated associated work of the target webpage is the musical work B, and the copyright owner will designate the label for marking the musical work B in the document of the target webpage as the designated label. In the scenario of preservation of copyright infringement evidence, if the content of the document marked by the designated tag includes the relevant statistics corresponding to the designated related work of the target webpage, then when the relevant related work of the target webpage corresponds to When the statistical quantity reaches any candidate quantity in the candidate quantity set, it means that the content of the document marked by the designated tag meets the deposit trigger condition. Wherein, the document content of the target webpage refers to the work presented on the target webpage. The relevant statistics corresponding to the designated related works include but are not limited to the following: downloads, readings, collections, playbacks, likes, etc. Each candidate quantity in the candidate quantity set can be designated according to actual needs. Further, assuming that the set of candidate quantities contains N candidate quantities, these N candidate quantities can be determined in the following manner: Assuming that the relevant statistics corresponding to the specified associated work of the target webpage is currently x, specify The ratio is y (less than 1); x*(y+1) is used as the first candidate; x*(y+1) 2 is used as the second candidate; …… x(y+1) N is the Nth candidate quantity. It can be seen that by judging the candidate quantity set by the above method, in fact, it can be realized that every time the relevant statistical quantity increases by a specified proportion (such as 20%), the target webpage will be recorded on the blockchain in time. For example, every 20% increase in the relevant statistics corresponding to the specified associated works of the target page will trigger the deposit server to perform a blockchain deposit operation on the target page. In this way, the copyright owner can always record the maximum relevant statistics of the infringing works in order to demand a larger amount of compensation for infringement damages as much as possible, and to punish the owner of the target webpage to the greatest extent. In the scenario of copyright infringement evidence preservation, if the webpage related information marked by the designated tag is the designated related work of the target webpage or the copyright related information corresponding to the designated related work, then when the designated webpage When the associated work changes, or when the copyright related information corresponding to the designated associated work changes, it means that the content of the document marked by the designated tag meets the deposit trigger condition. Wherein, the copyright-related information corresponding to the designated associated work refers to information that identifies the copyright status of the designated associated work, such as authorization validity period information, authorization information, work author information, etc. Once the copyright-related information changes, it means that the conclusion of whether the landing page is infringing or not needs to be reassessed. At this time, it is necessary to re-certify the landing page on the blockchain. If the designated associated work in the target webpage changes, it also means that whether the target webpage is still an infringing webpage needs to be reassessed. At this time, the target webpage needs to be re-certified on the blockchain. In a scenario where evidence of copyright infringement is preserved, if the content of the document marked by the designated tag includes the web page location information corresponding to the designated associated work of the target web page, then the web page location information corresponding to the designated associated work of the target web page When it is changed, it means that the content of the document marked by the designated tag meets the trigger condition for deposit. Further, the web page location information corresponding to the specified associated work of the target webpage changes, which may specifically be: the web page location information corresponding to the specified associated work of the target webpage changes, and the first location is different from the target webpage. The similarity of the reference position is lower than that of the second position and the reference position. Wherein, the first position is determined according to the position information of the webpage before the change, and the position in the target webpage corresponding to the specified associated work; the second position is determined according to the position information of the webpage after the change The determined location in the target webpage corresponding to the designated associated work. The reference position can be set as required. For example, suppose that the target webpage is used to present a ranking list of top 10 music works downloaded on a certain music website. Then, as time goes by, the ranking of the top 10 music works on the target webpage may change. For copyright owners, they are concerned about the ranking of designated related works (not authorized by the copyright owner) in the ranking. The higher the number of downloads of designated related works, the higher the ranking, and the higher the copyright owner can claim for infringement damages. Therefore, the upper left corner of the target webpage can be set as the reference position, and the change of the position corresponding to the designated associated work in the target webpage can be monitored. When it is monitored that the location corresponding to the designated related work has changed and is closer to the reference location (meaning that the ranking of the designated related work has risen), a blockchain deposit is performed on the target webpage. In addition, if the number of designated tags is greater than 1, the deposit certificate server may obtain, for each designated tag, the deposit trigger condition corresponding to the designated tag designated by the user. The deposit certificate server can monitor each designated tag. Once it detects that the specified number of designated tags meets its own corresponding deposit trigger conditions, it triggers the blockchain deposit operation of the target webpage. That is to say, if there are a specified number of specified tags that satisfy: for each specified tag in the specified number of specified tags, the content of the document marked by the specified tag meets its own corresponding deposit trigger condition; triggering the target webpage The blockchain deposit operation. Through the method shown in Figure 1, the server of the blockchain depositor can, at the request of the copyright owner, determine the label specified by the copyright owner from the document of the target web page for monitoring, and obtain the copyright owner in the other mode The specified trigger condition for deposit. When the server of the blockchain depositor detects that the content of the document marked by the tag specified by the copyright owner meets the deposit trigger condition, it will trigger a blockchain deposit operation of the target webpage. In this way, the copyright owner assigns the task of monitoring the target webpage to the server of the blockchain depositor to perform the task of monitoring the target webpage through the designated label and designated deposit trigger condition. The copyright owner does not need to expend energy to continuously pay attention to the dynamics of the landing page, which is more convenient for the copyright owner. In addition, in the embodiment of the present specification, the deposit server can also obtain at least one time point designated by the user, and for each time point, when the time passes by the time point, perform blockchain on the target webpage Deposit evidence. In this way, the timing deposit of the target webpage is realized. It should be noted that if the user needs the storage server to perform blockchain storage on the target webpage every time a specified period has elapsed, then the aforementioned time points are actually specified by the user according to the specified period. In addition, in the embodiment of this specification, the user can reconfigure the deposit strategy for the target webpage. Specifically, the deposit server may receive the reconfiguration instruction sent by the user, and in response to the reconfiguration instruction, re-extract the tag of the target webpage corresponding to the webpage address, so that the user can re-designate the tag And/or re-specify the trigger conditions for deposit. Furthermore, in the embodiment of this specification, after obtaining the deposit trigger condition specified by the user, the monitoring workload can also be determined according to the deposit trigger condition; and the payment amount can be determined according to the monitoring workload; The payment interface is provided to the user so that the user can pay the payment amount. Wherein, the monitoring workload is positively correlated with the payment amount. The standard for determining the payment amount based on the monitoring workload can be set by the blockchain depositor according to actual needs, and this specification does not specifically limit this. Further, when there is an infringing work that the user pays attention to on the target webpage, the infringing work is the designated related work of the target webpage. Regardless of which tags in the document of the designated target webpage are designated by the user, it is actually related to the need to pay attention to the designated related works. For example, the content of the document marked by the designated tag may be related statistics corresponding to the designated related work, copyright status information, or the designated related work itself. In practice, once the designated associated works are removed from the target webpage, there is no need to monitor the target webpage. For users, the period from the beginning of monitoring the designated tags in the target webpage until the removal of the designated related works can actually be regarded as the provable period during which the designated related works survive on the target webpage. This is more important evidence. For this reason, in the embodiment of this specification, when monitoring is started for the designated tag, the time when the monitoring is started is recorded; and when it is detected that the designated related work of the target webpage is deleted, the monitoring is ended, and the recording ends Monitoring time. Furthermore, the duration evidence corresponding to the target webpage can be generated according to the recorded time when the monitoring is started and the time when the monitoring is ended, and the evidence of the duration is deposited on the blockchain. Further, in step S106, if the specified associated work of the target webpage is a playable work (such as video, audio, etc.), the target webpage is certified on the blockchain, which may specifically be: Take a screenshot to obtain a screenshot of the webpage; read the work storage address of the designated associated work from the target webpage, and obtain a playable work from the work storage address; process the screenshot of the webpage with the playable work Into a target hash; publish the target hash to the blockchain for storage. Fig. 2 is a schematic flow chart of a method for blockchain depositing a webpage through file acquisition according to an embodiment of this specification, which includes the following steps: S200: accessing a target webpage. The execution subject of this method can also be the deposit server. S202: Take a screenshot of the target webpage to obtain a screenshot of the webpage; and read a file storage address associated with the target webpage, and obtain a playable file from the file storage address. In the embodiment of this specification, after accessing the target webpage, the deposit server can take a screenshot of the target webpage in one aspect to obtain a screenshot of the webpage; in another aspect, read the file storage address associated with the target webpage, In order to obtain a playable file from the file storage address. Wherein, the file storage address associated with the target webpage refers to the file storage address of the playable file used for playing the target webpage. Generally speaking, for a web page used to play playable files, since the storage size of the playable file is large, the web page does not include the playable file itself, but only the file storage address of the playable file. When a playable file needs to be played, the browser needs to parse the file storage address from the web page, obtain the playable file from the file storage address and play it. S204: Process the screenshot of the webpage and the playable file into a target hash. In the embodiments of this specification, processing data into a hash refers to using the data as the input of the hash algorithm to perform hash calculation to obtain the corresponding hash value. In step S204, the storage certificate server may directly perform hash calculation on the screenshot of the webpage and the playable file to obtain a target hash. It is also possible to process the screenshot of the webpage into a screenshot hash in one aspect, and process the playable file into a file hash in another aspect, and finally, process the screenshot hash and the file hash into a target hash. S206: Perform a blockchain deposit certificate on the target hash. As we all know, the hash value obtained after the data is hashed can uniquely identify the data and can be regarded as the "fingerprint" of the data. Once the data is tampered with, the hash value corresponding to the data will also change. Therefore, the target hash corresponding to the screenshot of the webpage and the playable file is stored on the blockchain, which is equivalent to checking the target webpage, the playable file used for the target webpage, and the target webpage and all The corresponding relationship of the playable files mentioned above is certified on the blockchain, which can prove the following facts: 1. The target webpage is real and has not been tampered with; 2. The playable file is real and has not been tampered with; 3. The goal The web page is a web page used to play the playable file. Therefore, through the method shown in FIG. 1, a blockchain certificate of a web page that is associated with a playable file but does not contain the playable file itself is realized. In the embodiment of this specification, if the deposit server is not a node in the blockchain network, the deposit server can submit the target hash to the blockchain network for deposit. If the deposit certificate server is a blockchain node in the blockchain network, then the deposit certificate server can construct a target transaction based on the target hash, and then broadcast the target transaction to others except itself Block chain nodes, so that each block chain node stores the target transaction in its own block chain based on a consensus mechanism. It should be noted that the transaction described in this manual refers to a piece of data created by the user through the user end of the blockchain and needs to be finally released to the distributed database of the blockchain. In other words, transactions in the blockchain are divided into narrow transactions and broad transactions. A transaction in a narrow sense refers to a transfer of value issued by a user to the blockchain; for example, in a traditional Bitcoin blockchain network, a transaction can be a transfer initiated by the user in the blockchain. In a broad sense, a transaction refers to a piece of business data with business intentions released by users to the blockchain; for example, the operator can build a consortium chain based on actual business needs, and rely on the consortium chain to deploy other types that are not related to value transfer Online business (for example, renting business, vehicle dispatching business, insurance claims business, credit service, medical service, etc.), and in this kind of alliance chain, the transaction can be a business with business intent issued by the user in the alliance chain Message or business request. Through the method shown in Figure 2, for the target webpage associated with a playable file, but does not include the playable file itself, the blockchain depositor takes a screenshot of the target webpage in the same manner to obtain a screenshot of the webpage; In this way, the file storage address associated with the target webpage is read, and a playable file is obtained from the file storage address. Subsequently, a hash operation is performed on the screenshot of the webpage and the playable file to obtain a target hash, and then the target hash is published to the blockchain for storage. This is equivalent to the realization of blockchain storage of web pages containing playable files. In this way, the server of the blockchain depositor does not need to spend time recording the playback process of the playable file, which improves the deposit efficiency. In addition, in practical applications, the target webpage can be used to play more than one playable file, which also means that the target webpage is associated with more than one file storage address. Therefore, the storage certificate server can obtain a playable file from the file storage address for each file storage address associated with the target webpage, as the playable file corresponding to the file storage address. Then, the playable files corresponding to each file storage address associated with the webpage screenshot and the target webpage are processed into a target hash. Further, sometimes, the target webpage may include more than one sub-page link. After clicking any sub-page link, the user can enter the sub-page corresponding to the sub-page link, and the sub-page is used to play a playable file. In this case, the attestation server reads more than one file storage address associated with the target webpage, which can be specifically for each sub-page link contained in the target webpage, access the sub-page link, and then read The storage address of the document contained in the sub-page corresponding to the sub-page link. Moreover, since the links of the sub-pages in the target webpage are generally arranged in a certain order, in the above step S204, it may be specifically linked to the sub-pages according to the order of the sub-page links in the target webpage. Sort the corresponding file storage addresses; according to the order of the file storage addresses, sort the playable files corresponding to each file storage address to obtain the playable file sequence; compare the screenshots of the webpage and the playable files The file sequence is processed into a target hash. In this way, once the order of the sub-page links in the landing page changes, the target hash obtained based on the landing page will change. Using the target hash for blockchain certification is not only equivalent to performing blockchain certification on the content of the target webpage, but also equivalent to performing blockchain certification on the content layout of the target webpage. Further, the deposit server processes the web page screenshot and the playable file sequence into a target hash, which can specifically be processed into a screenshot hash; for each of the playable file sequences Play a file, process the playable file into a file hash; sort the file hash corresponding to each playable file according to the sequence of each playable file to obtain a file hash sequence; based on the file hash sequence, construct a Merkle tree ; Process the screenshot hash and the root hash of the Merkel tree into a target hash. Fig. 3 is a schematic diagram of a Merkle tree constructed based on a file hash sequence provided by an embodiment of the present specification. As shown in FIG. 3, the root hash of the Merkle tree constructed based on the file hash sequence can uniquely identify the file hash sequence and can be regarded as the "fingerprint" of the file hash sequence. The file hash sequence is actually a mapping of the arrangement of the sub-webpage links corresponding to each playable file in the target webpage. Once a sub-webpage link in the target webpage is changed, the target webpage needs to be re-certified. Specifically, the above method is still used to obtain a new file hash sequence based on the current target webpage. Then, based on the new file hash sequence, the Merkle tree is reconstructed to obtain a new root hash for storage. It should be noted that the advantage of using the Merkle tree method to store the file hash sequence is that when the content of the target web page changes less, the corresponding file hash sequence changes less. In this case, only the old The new Merkle tree can be obtained by recalculating the hash value on the path related to the change in the Merkle tree. As shown in Figure 4, assuming that the webpage sublink 3 in the target webpage is replaced by the webpage sublink 8, the corresponding file hash 3 is also replaced by the file hash 8. Therefore, when rebuilding the Merkle tree, only the old The path of file hash3-hash6-hash7 in the Merkle tree can be updated (updated to file hash 8-hash 9-hash 10). Finally, update the root hash to hash 10. In this way, the computing resources of the deposit server are saved. Based on the method shown in FIG. 1, the embodiment of this specification also correspondingly provides a device for performing blockchain certification on webpages through webpage monitoring, as shown in FIG. 5, including: a receiving module 501, which receives webpage bits sent by a user And access the target webpage corresponding to the webpage address; extracting module 502, extracting tags from the document of the target webpage; determining and acquiring module 503, determining the tag specified by the user from the extracted tags , As a designated label; and obtain the deposit trigger condition designated by the user; the monitoring deposit module 504, monitors the designated label, and when it is monitored that the content of the document marked by the designated label satisfies the deposit When the condition is triggered, the target webpage is deposited on the blockchain. The judgment acquisition module 503 provides the user with a selection interface displaying the extracted tags, and monitors the selection interface; for each tag displayed in the selection interface, when the tag is detected When selected, the tag is determined as the tag designated by the user. The judgment acquisition module 503 provides a condition setting interface to the user; through the condition setting interface, it receives the deposit trigger condition input by the user. The number of designated tags is greater than one; the determination acquisition module 503, for each designated tag, acquires the deposit trigger condition designated by the user corresponding to the designated tag. The content of the document marked by the designated label satisfies the deposit trigger condition, which specifically includes: the existence of a designated number of designated labels satisfies: For each designated label in the designated number of designated labels, the document marked by the designated label The content satisfies the deposit trigger condition corresponding to the specified label. The content of the document marked by the designated tag includes: relevant statistics corresponding to the designated associated work of the target webpage; the content of the document marked by the designated tag meets the attestation trigger condition, specifically including: the target webpage The relevant statistics corresponding to the designated related works of, reach any candidate in the candidate set. The content of the document marked by the designated tag includes: the designated associated work of the target webpage or the copyright related information corresponding to the designated associated work; the content of the document marked by the designated tag satisfies the deposit trigger condition, which specifically includes : The designated associated work of the target webpage changes, or the copyright-related information corresponding to the designated associated work changes. The content of the document marked by the designated tag includes: webpage location information corresponding to the designated associated work of the target webpage; the content of the document marked by the designated tag meets the attestation trigger condition, specifically including: The location information of the webpage corresponding to the specified associated work has changed. The change of the location information of the webpage corresponding to the specified associated work of the target webpage specifically includes: the location information of the webpage corresponding to the specified associated work of the target webpage changes, and the difference between the first location and the reference location in the target webpage The degree of similarity is lower than the degree of similarity between the second location and the reference location; wherein, the first location is determined according to the location information of the webpage before the change, and the location on the target webpage corresponding to the specified associated work ; The second location is determined according to the changed web page location information, and the location in the target web page corresponding to the designated associated work. The device further includes: a billing module 505, after obtaining the deposit trigger condition specified by the user, determine the monitoring workload according to the deposit trigger condition; determine the payment amount according to the monitoring workload; The monitoring workload is positively correlated with the payment amount; a payment interface is provided to the user so that the user can pay the payment amount. The monitoring and depositing module 504, if the specified associated work of the target webpage is a playable work, screenshots the target webpage to obtain a screenshot of the webpage; reads the information of the specified associated work from the target webpage The work storage address, and the playable work is obtained from the work storage address; the webpage screenshot and the playable work are processed into a target hash; the target hash is published to the blockchain for storage. The device further includes: an access period evidence generation module 506, when monitoring is started for the designated tag, recording the time when the monitoring is started; and when it is detected that the designated associated work of the target webpage is deleted, ending Monitor and record the time when the monitoring is ended; according to the recorded time when the monitoring is started and when the monitoring is ended, the duration evidence corresponding to the target webpage is generated, and the evidence during the duration is stored on the blockchain. The device further includes: a timing processing module 507, which obtains at least one time point designated by the user; for each time point, when the time passes the time point, the target webpage is blockchain-certified. The device further includes: a reconfiguration module 508, which receives a reconfiguration instruction sent by the user; in response to the reconfiguration instruction, re-extracts tags from the target webpage document so that the user can re-designate Label and/or re-assign the trigger conditions for deposit. The embodiment of this specification also provides a computer device, which at least includes a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the processor executes the program to implement the method shown in FIG. 1 Function. 6 shows a more specific hardware structure diagram of a computing device provided by an embodiment of this specification. The device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050 . The processor 1010, the memory 1020, the input/output interface 1030 and the communication interface 1040 realize the communication connection between each other in the device through the bus 1050. The processor 1010 may be implemented by a general CPU (Central Processing Unit, central processing unit), a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc., for Execute related programs to realize the technical solutions provided in the embodiments of this specification. The memory 1020 can be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory), static storage device, dynamic storage device, etc. The memory 1020 can store the operating system and other application programs. When the technical solutions provided in the embodiments of this specification are implemented through software or firmware, the related program codes are stored in the memory 1020 and called and executed by the processor 1010. . The input/output interface 1030 is used for connecting input/output modules to realize information input and output. The input/output/module can be configured in the device as a component (not shown in the figure), or can be connected to the device to provide corresponding functions. The input device may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and an output device may include a display, a speaker, a vibrator, an indicator light, and so on. The communication interface 1040 is used to connect a communication module (not shown in the figure) to realize the communication interaction between the device and other devices. The communication module can realize communication through wired means (such as USB, network cable, etc.), or through wireless means (such as mobile network, WIFI, Bluetooth, etc.). The bus 1050 includes a path for transmitting information between various components of the device (such as the processor 1010, the memory 1020, the input/output interface 1030, and the communication interface 1040). It should be noted that although the above device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040, and the bus 1050, in the specific implementation process, the device may also include a device for normal operation. Other necessary components. In addition, those skilled in the art can understand that the above-mentioned equipment may also include only the components necessary to implement the solutions of the embodiments of the specification, and not necessarily include all the elements shown in the figures. The embodiment of the specification also provides a computer-readable storage medium on which a computer program is stored, and the program is executed by a processor to realize the functions of the method shown in FIG. 1. Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. Information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, read-only CD-ROM (CD-ROM), digital multi-function Optical discs (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices, or any other non-transmission media, can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves. From the description of the above embodiments, those skilled in the art can clearly understand that the embodiments of this specification can be implemented by means of software plus a necessary general hardware platform. Based on this understanding, the technical solutions of the embodiments of this specification can be embodied in the form of software products, which can be stored in storage media, such as ROM/RAM, magnetic A disc, an optical disc, etc., include a number of instructions to make a computer device (which can be a personal computer, a server, or a network device, etc.) execute the methods described in the various embodiments or some parts of the embodiments of this specification. The systems, methods, modules, or units explained in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. The specific form of the computer can be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game. Console, tablet, wearable device, or a combination of any of these devices. The various embodiments in this specification are described in a progressive manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the device and equipment embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and for related parts, please refer to the part of the description of the method embodiments. The method embodiments described above are merely illustrative. The modules described as separate components may or may not be physically separated. When implementing the solutions of the embodiments of this specification, the functions of the modules can be Implemented in the same one or more software and/or hardware. It is also possible to select some or all of the modules according to actual needs to achieve the objectives of the solutions of the embodiments. Those of ordinary skill in the art can understand and implement it without creative work. The above are only specific implementations of the embodiments of this specification. It should be pointed out that for those of ordinary skill in the art, without departing from the principle of the embodiments of this specification, several improvements and modifications can be made. These Improvements and modifications should also be regarded as the protection scope of the embodiments of this specification.