CN112000928A - Picture distributed infringement right confirming method, system, storage medium and computer equipment - Google Patents

Picture distributed infringement right confirming method, system, storage medium and computer equipment Download PDF

Info

Publication number
CN112000928A
CN112000928A CN202010682514.5A CN202010682514A CN112000928A CN 112000928 A CN112000928 A CN 112000928A CN 202010682514 A CN202010682514 A CN 202010682514A CN 112000928 A CN112000928 A CN 112000928A
Authority
CN
China
Prior art keywords
infringement
picture
distributed
block chain
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010682514.5A
Other languages
Chinese (zh)
Inventor
刘明哲
谢朝阳
马立川
付铭
张锐
袁昊
裴庆祺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Xidian Lianrong Technology Co ltd
Xidian University
Original Assignee
Xi'an Xidian Lianrong Technology Co ltd
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Xidian Lianrong Technology Co ltd, Xidian University filed Critical Xi'an Xidian Lianrong Technology Co ltd
Priority to CN202010682514.5A priority Critical patent/CN112000928A/en
Publication of CN112000928A publication Critical patent/CN112000928A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of block chain and crawler technology application, and discloses a picture distributed infringement authority confirming method, a picture distributed infringement authority confirming system, a storage medium and computer equipment, wherein picture copyright is stored, and picture information is stored on a block chain by the picture distributed infringement authority confirming system after the picture copyright is stored by the picture distributed infringement authority confirming system receiving a certificate storage request of a user; deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data; and returning the infringement proof on the block chain after receiving the confirmation request. The invention enlarges the monitoring range of the infringement behavior and finds the infringement behavior in time; finding suspected infringement behaviors by utilizing the technical characteristic that the block chain data cannot be tampered and through a characteristic value analysis and comparison algorithm; the method realizes online one-key evidence obtaining of suspected infringement behaviors and contents by means of webpage screen capturing, video screen recording and the like, records the suspected infringement behaviors and contents into a block chain, realizes judicial evidence obtaining means with high reliability and low evidence obtaining cost, and provides technical support and judicial evidence for subsequent right maintenance.

Description

Picture distributed infringement right confirming method, system, storage medium and computer equipment
Technical Field
The invention belongs to the technical field of block chain and crawler technology application, and particularly relates to a picture distributed infringement right confirming method, a picture distributed infringement right confirming system, a picture distributed infringement right confirming storage medium and a picture distributed infringement right confirming computer device.
Background
The internet technology is developed at a high speed, the network increasingly becomes a high-incidence and easy-to-develop field of infringement piracy, the copyright industry taking innovation as a core faces a serious challenge, and the picture works are rapidly increased. The size of picture copyrights has increased from 161 million RMB in 2015 to 240 million in 2019. At present, copyright protection mainly has the following problems in infringement monitoring and right-maintaining evidence obtaining:
(1) infringement monitoring is difficult. Firstly, manual monitoring cannot cope with massive data. In the face of mass data, the original owner can not judge whether the data is infringed at all. In addition, the infringement evidence of the digital work is easy to disappear, and the infringement behavior is not easy to be found in time; secondly, the monitoring range is small and the monitoring content is single. The network range of monitoring is limited to department websites, communities and self-media. It is difficult for infringement websites to continuously track and monitor. And the infringing website frequently changes the head and face for avoiding monitoring and pursuing.
(2) It is difficult to take evidence through right maintenance. Firstly, the evidence collection in the network environment is difficult. The virtuality, the imperceptibility and the non-space-time limitation of the network infringement behavior make the evidence collection more difficult. Secondly, judicial resources are limited, the right maintaining channel is deficient, the right maintaining program is complex, and the right maintaining cost is high. The right is maintained in a lawsuit mode, the procedure of judicial lawsuit is complex, the period is long, the whole process is nearly 6 months, time and labor are wasted, in addition, lawsuits need to bear thousands of yuan of lawyer fees, notary fees and the like, the right benefits of copyright owners are in direct proportion to the payment of the copyright owners, and the right maintaining effect is poor.
Through the above analysis, the problems and defects of the prior art are as follows:
(1) at present, mass data are difficult to deal with in copyright protection during infringement monitoring and right-maintaining evidence obtaining, and infringement behaviors are difficult to find in time.
(2) At present, copyright protection has the defects that infringement evidence is easy to disappear and is difficult to store in infringement monitoring and right-maintaining evidence obtaining.
(3) At present, copyright protection has the following difficulties in infringement and evidence collection in infringement monitoring and right collection: limited judicial resources, lack of right channels, long period and high cost.
The difficulty in solving the above problems and defects is: the key point of protecting the intellectual property of the picture lies in how to ensure that the right of infringement can be reliably carried out on the picture under various conditions, and meanwhile, the convenience of operation and the reliability of a platform are improved as much as possible. The difficulty to solve the above problems lies in how to get an optimal balance point between security and convenience, so that a user can conveniently complete an image infringement and right confirmation task on the premise of feeling reassurance.
The significance of solving the problems and the defects is as follows: in the current society, the scale of picture copyright rises year by year, and networks increasingly become the highly-prone field of infringement piracy. The problem is solved, the trust of the user on the platform can be enhanced, and more people are guided to join the queue for protecting intellectual property rights.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a picture distributed infringement right confirming method, a picture distributed infringement right confirming system, a storage medium and computer equipment.
The invention is realized in such a way that a picture distributed infringement authentication method comprises the following steps:
the picture distributed infringement authentication method comprises the following steps:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
Further, the picture distributed infringement authentication method comprises the following steps:
the picture content copyright storage module extracts RGB data of the structured picture from the external data layer, extracts characteristic information of the structured picture and embeds the watermark;
reading unstructured weblog data from a distributed file system by the distributed block chain network through an RPC port;
the Internet distributed crawler block chain network node extracts, converts and loads the picture characteristic information data and the weblog data from the distributed block chain network storage module, integrates the picture characteristic information data and the weblog data into a data tuple, and stores the data tuple in a star model;
the distributed crawler crawls picture data of specified classified webpages in real time, converts the picture data into structured RGB data, extracts structured picture characteristic information, compares the picture characteristic information with stored picture characteristic information, judges that the user is infringing if the similarity of the picture characteristic information and the stored picture characteristic information reaches a certain threshold value, and stores infringed user information, infringed websites and the block chains. And storing the infringement content screenshot in a distributed crawler cloud.
And after receiving the right confirmation request, providing a network query interface through the distributed crawler network node to return the infringement data screenshot stored in the cloud of the distributed crawler. And returning the stored infringing website and infringing page to the infringed user through the distributed blockchain network. A proof of infringement on the blockchain is returned.
Further, the picture distributed infringement authentication method, when the system receives a picture taken by the user, performs picture authentication including:
(1) a client of the system receives a picture shot by a user to obtain a shot original picture;
(2) extracting picture characteristic information;
(3) embedding watermark information into the picture by using a watermark technology to obtain the picture with the embedded watermark;
(4) uploading the characteristic information and the watermark information to a block chain;
(5) and returning the original picture, the picture embedded with the watermark and the certificate information certificate to the user after the certificate is successfully stored.
Further, the image distributed infringement authentication method infringement detection includes:
(1) adding a plurality of crawler network nodes into the block chain;
(2) the distributed crawler crawls pictures on each website and monitors suspicious infringement pictures;
(3) extracting characteristic information of the suspected infringement pictures, matching the characteristic information with the picture characteristic information stored on the block chain, and judging the suspected infringement pictures if certain similarity is achieved;
(4) and for the picture for judging the infringement, storing the infringement evidence on a block chain account book through communication with the block chain network.
Further, the distributed picture infringement authentication method infringement authentication comprises:
(1) the system receives an infringement evidence-obtaining request of a user;
(2) acquiring an address of a user on a block chain through a user module;
(3) and returning the authentication address, the authentication data and the infringement data information of the user from the blockchain.
It is a further object of the invention to provide a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
It is another object of the present invention to provide a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
Another object of the present invention is to provide a distributed image infringement authentication system operating the distributed image infringement authentication method, the distributed image infringement authentication system including:
the picture storing module is used for realizing the storage of the picture copyright, and the system receives a storage request of a user and stores the picture information on the block chain;
the image infringement detection module is used for deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and finding infringement behaviors in real time, and chaining infringement data;
and the picture right confirming module is used for returning an infringement certificate on the block chain after receiving the right confirming request.
Another object of the present invention is to provide an intelligent terminal, wherein the intelligent terminal is equipped with the picture distributed infringement authorization system.
By combining all the technical schemes, the invention has the advantages and positive effects that: the distributed crawler enlarges the monitoring range of the infringement behavior, and finds the infringement behavior in time; finding suspected infringement behaviors by utilizing the technical characteristic that the block chain data cannot be tampered and through a characteristic value analysis and comparison algorithm; and further, online one-key evidence obtaining is realized for suspected infringement behaviors and contents in modes of webpage screen capturing, video screen recording and the like, and the suspected infringement behaviors and contents are recorded into a block chain, so that a judicial evidence obtaining means with high reliability and low evidence obtaining cost is realized, and technical support and judicial evidence are provided for subsequent right maintenance.
The invention can greatly simplify the copyright certification application of the traditional copyright management department, namely the 'creation-application-registration' registration process by utilizing the block chain, shortens the registration certification time from 7 to 30 days to 5 to 10 minutes, and realizes the almost synchronous completion of the registration and completion of the creation of the works. Meanwhile, the registration cost is reduced from hundreds of yuan to tens of yuan or even lower. When the user submits the litigation, the court directly extracts related information such as copyright confirmation evidence source files and infringement evidence source files submitted by the user from the block chain according to the user information, and makes a decision whether to put up a case or whether to be adopted by the court. The whole process of proving the right to maintain and verifying the evidence by the judicial officer is convenient and quick, and the judicial efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained from the drawings without creative efforts.
Fig. 1 is a flowchart of a distributed infringement authentication method for pictures according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a picture distributed infringement authentication system according to an embodiment of the present invention;
in fig. 2: 1. a picture evidence storage module; 2. a picture infringement detection module; 3. and the picture right confirming module.
Fig. 3 is a schematic structural diagram of an infringement detection and picture evidence collection technique based on a blockchain and a distributed crawler according to an embodiment of the present invention.
Fig. 4 is a flowchart of an implementation of a method of a picture privacy protection and picture transaction system based on a blockchain according to an embodiment of the present invention.
Fig. 5 is a block chain-based implementation diagram of a copyright separation module of a picture privacy protection and picture transaction system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In view of the problems in the prior art, the present invention provides a method, a system, a storage medium, and a computer device for determining distributed infringement of pictures, which are described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the distributed image infringement authentication method provided by the present invention includes the following steps:
s101: storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
s102: deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
s103: and returning infringement proofs on the block chain and the crawler cloud after receiving the right confirmation request.
Persons of ordinary skill in the art can also use other steps to implement the distributed infringement determination method for pictures provided by the present invention, and the distributed infringement determination method for pictures provided by the present invention in fig. 1 is only one specific embodiment.
As shown in fig. 2, the picture distributed infringement authentication system provided by the present invention includes: the system comprises a picture evidence storage module 1, a picture infringement detection module 2 and a picture authority confirmation module 3.
And the picture certificate storage module 1 is used for realizing picture copyright certificate storage, and the system receives a certificate storage request of a user and stores the picture information in the block chain.
And the picture infringement detection module 2 is used for deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and finding infringement behaviors in real time, and chaining infringement data.
And the picture right confirming module 3 is used for returning an infringement certificate on the block chain after receiving the right confirming request.
The technical solution of the present invention is further described below with reference to the accompanying drawings.
Example 1
As shown in fig. 3, when the system receives a picture taken by the user, the system performs picture storage, and the method operates according to the following steps:
(1) the client of the system receives the picture shot by the user and obtains a shot original picture
(2) And extracting picture characteristic information.
(3) And embedding the watermark information into the picture by using a watermark technology to obtain the picture with the embedded watermark.
(4) Uploading feature information and watermark information to a blockchain
(5) And returning the original picture, the picture embedded with the watermark and the certificate information certificate to the user after the certificate is successfully stored.
Example 2
As shown in fig. 4, the infringement detection module performs the following steps:
(1) block chain adding multiple crawler network nodes
(2) And crawling pictures on each website by the distributed crawler, and monitoring suspicious infringement pictures.
(3) And extracting characteristic information of the suspected infringement picture, matching the characteristic information with the picture characteristic information stored on the block chain, and judging the picture as infringement if certain similarity is achieved.
(4) And for the picture for judging the infringement, storing the infringement evidence on a block chain account book through communication with the block chain network.
Example 3
As shown in fig. 5, the infringement confirmation module proceeds as follows:
(1) the system receives an infringement evidence-obtaining request of a user.
(2) Obtaining the address of the user on the block chain through the user module
(3) And returning information such as the authentication address, the authentication data and the infringement data of the user from the blockchain.
(4) Returning infringement screenshot evidence from crawler node cloud
It should be noted that the embodiments of the present invention can be realized by hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided on a carrier medium such as a disk, CD-or DVD-ROM, programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier, for example. The apparatus and its modules of the present invention may be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., or by software executed by various types of processors, or by a combination of hardware circuits and software, e.g., firmware.
The above description is only for the purpose of illustrating the present invention and the appended claims are not to be construed as limiting the scope of the invention, which is intended to cover all modifications, equivalents and improvements that are within the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A picture distributed infringement authentication method is characterized by comprising the following steps:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
2. The picture distributed infringement determination method of claim 1, wherein the picture distributed infringement determination method comprises:
the picture content copyright storage module extracts RGB data of the structured picture from the external data layer, extracts characteristic information of the structured picture and embeds the watermark;
reading unstructured weblog data from a distributed file system by the distributed block chain network through an RPC port;
the Internet distributed crawler block chain network node extracts, converts and loads the picture characteristic information data and the weblog data from the distributed block chain network storage module, integrates the picture characteristic information data and the weblog data into a data tuple, and stores the data tuple in a star model;
the distributed crawler crawls picture data of specified classified webpages in real time, converts the picture data into structured RGB data, extracts structured picture characteristic information, compares the picture characteristic information with stored picture characteristic information, judges that the user is infringing if the similarity of the picture characteristic information and the stored picture characteristic information reaches a certain threshold value, and stores infringed user information, infringed websites and the image on a block chain;
and storing the infringement content screenshot in a distributed crawler cloud.
3. The picture distributed infringement authentication method as claimed in claim 1, wherein after receiving the authentication request, a network query interface is provided by a distributed crawler network node to return an infringement data screenshot stored in a distributed crawler cloud, and a distributed blockchain network returns an infringement website and an infringement page stored in the distributed crawler cloud to an infringed user, and returns an infringement proof on the blockchain.
4. The picture distributed infringement authentication method as claimed in claim 1, wherein the picture distributed infringement authentication method, when the system receives a picture taken by a user, performs picture verification including:
(1) a client of the system receives a picture shot by a user to obtain a shot original picture;
(2) extracting picture characteristic information;
(3) embedding watermark information into the picture by using a watermark technology to obtain the picture with the embedded watermark;
(4) uploading the characteristic information and the watermark information to a block chain;
(5) and returning the original picture, the picture embedded with the watermark and the certificate information certificate to the user after the certificate is successfully stored.
5. The picture distributed infringement validation method of claim 1, wherein the picture distributed infringement validation method infringement detection comprises:
(1) adding a plurality of crawler network nodes into the block chain;
(2) the distributed crawler crawls pictures on each website and monitors suspicious infringement pictures;
(3) extracting characteristic information of the suspected infringement pictures, matching the characteristic information with the picture characteristic information stored on the block chain, and judging the suspected infringement pictures if certain similarity is achieved;
(4) and for the picture for judging the infringement, storing the infringement evidence on a block chain account book through communication with the block chain network.
6. The picture distributed infringement validation method of claim 1, wherein the picture distributed infringement validation method infringement validation comprises:
(1) the system receives an infringement evidence-obtaining request of a user;
(2) acquiring an address of a user on a block chain through a user module;
(3) and returning the authentication address, the authentication data and the infringement data information of the user from the blockchain.
7. A computer device, characterized in that the computer device comprises a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to carry out the steps of:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
8. A computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
9. A picture distributed infringement authentication system operating the picture distributed infringement authentication method according to any one of claims 1 to 6, the picture distributed infringement authentication system comprising:
the picture storing module is used for realizing the storage of the picture copyright, and the system receives a storage request of a user and stores the picture information on the block chain;
the image infringement detection module is used for deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and finding infringement behaviors in real time, and chaining infringement data;
and the picture right confirming module is used for returning an infringement certificate on the block chain after receiving the right confirming request.
10. An intelligent terminal, characterized in that the intelligent terminal is equipped with the picture distributed infringement authentication system of claim 9.
CN202010682514.5A 2020-07-15 2020-07-15 Picture distributed infringement right confirming method, system, storage medium and computer equipment Pending CN112000928A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010682514.5A CN112000928A (en) 2020-07-15 2020-07-15 Picture distributed infringement right confirming method, system, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010682514.5A CN112000928A (en) 2020-07-15 2020-07-15 Picture distributed infringement right confirming method, system, storage medium and computer equipment

Publications (1)

Publication Number Publication Date
CN112000928A true CN112000928A (en) 2020-11-27

Family

ID=73467998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010682514.5A Pending CN112000928A (en) 2020-07-15 2020-07-15 Picture distributed infringement right confirming method, system, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN112000928A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112685794A (en) * 2020-12-31 2021-04-20 树根互联技术有限公司 Online evidence obtaining method, evidence obtaining and right maintaining method, system and computer equipment
CN113691514A (en) * 2021-08-16 2021-11-23 重庆易保全网络科技有限公司 Internet data-based supervision and evidence-obtaining method
CN113837629A (en) * 2021-09-29 2021-12-24 土巴兔集团股份有限公司 Original content protection method, device and readable storage medium
CN114936354A (en) * 2022-05-20 2022-08-23 浙江云程信息科技有限公司 Information processing method and device for engineering supervision
CN117875989A (en) * 2024-03-13 2024-04-12 寰宇信任(北京)技术有限公司 3D asset right determining and maintaining platform and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013131134A2 (en) * 2012-03-07 2013-09-12 Peter Fox Ip infringement detection method, system and tool
CN107103087A (en) * 2017-05-02 2017-08-29 成都中远信电子科技有限公司 Block chain big data analysis of market conditions system
CN107832384A (en) * 2017-10-28 2018-03-23 北京安妮全版权科技发展有限公司 Infringement detection method, device, storage medium and electronic equipment
CN110008655A (en) * 2019-03-01 2019-07-12 北京数字融通科技有限公司 A kind of infringing information identification people's mark system and method based on distributed network
CN110598376A (en) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 Copyright authentication method, device and equipment based on block chain and storage medium
CN110851761A (en) * 2020-01-15 2020-02-28 支付宝(杭州)信息技术有限公司 Infringement detection method, device and equipment based on block chain and storage medium
CN110929232A (en) * 2019-10-30 2020-03-27 西安西电链融科技有限公司 System and method for protecting picture privacy information based on block chain and mobile device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013131134A2 (en) * 2012-03-07 2013-09-12 Peter Fox Ip infringement detection method, system and tool
CN107103087A (en) * 2017-05-02 2017-08-29 成都中远信电子科技有限公司 Block chain big data analysis of market conditions system
CN107832384A (en) * 2017-10-28 2018-03-23 北京安妮全版权科技发展有限公司 Infringement detection method, device, storage medium and electronic equipment
CN110008655A (en) * 2019-03-01 2019-07-12 北京数字融通科技有限公司 A kind of infringing information identification people's mark system and method based on distributed network
CN110598376A (en) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 Copyright authentication method, device and equipment based on block chain and storage medium
CN110929232A (en) * 2019-10-30 2020-03-27 西安西电链融科技有限公司 System and method for protecting picture privacy information based on block chain and mobile device
CN110851761A (en) * 2020-01-15 2020-02-28 支付宝(杭州)信息技术有限公司 Infringement detection method, device and equipment based on block chain and storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112685794A (en) * 2020-12-31 2021-04-20 树根互联技术有限公司 Online evidence obtaining method, evidence obtaining and right maintaining method, system and computer equipment
CN113691514A (en) * 2021-08-16 2021-11-23 重庆易保全网络科技有限公司 Internet data-based supervision and evidence-obtaining method
CN113837629A (en) * 2021-09-29 2021-12-24 土巴兔集团股份有限公司 Original content protection method, device and readable storage medium
CN113837629B (en) * 2021-09-29 2024-06-14 土巴兔集团股份有限公司 Original content protection method, device and readable storage medium
CN114936354A (en) * 2022-05-20 2022-08-23 浙江云程信息科技有限公司 Information processing method and device for engineering supervision
CN114936354B (en) * 2022-05-20 2023-02-17 浙江云程信息科技有限公司 Information processing method and device for engineering supervision
CN117875989A (en) * 2024-03-13 2024-04-12 寰宇信任(北京)技术有限公司 3D asset right determining and maintaining platform and method
CN117875989B (en) * 2024-03-13 2024-05-24 寰宇信任(北京)技术有限公司 3D asset right determining and maintaining platform and method

Similar Documents

Publication Publication Date Title
CN112000928A (en) Picture distributed infringement right confirming method, system, storage medium and computer equipment
CN110598376B (en) Copyright authentication method, device and equipment based on block chain and storage medium
US20090037975A1 (en) System and Method for Authenticating Content
CN110096639B (en) Method and device for monitoring and obtaining evidence of infringement and terminal equipment
CN102739774B (en) Method and system for obtaining evidence under cloud computing environment
CN108769753B (en) Network audio-visual management supporting copyright service subsystem based on block chain technology
CN112801827A (en) Intellectual property management system based on block chain
US20060195837A1 (en) Synchronized-download version manager (S-DVM)
CN111966968A (en) Copyright protection method and system based on block chain
CN111581659B (en) Method and device for calling electronic evidence
CN112395560A (en) Copyright data processing method and device
CN114722355A (en) Copyright protection system and method based on block chain and IPFS
CN117034305A (en) Sensitive information identification method, device, computer equipment and readable storage medium
CN110941845A (en) File acquisition method and device, computer equipment and storage medium
CN111339368B (en) Video retrieval method and device based on video fingerprint and electronic equipment
US20200278948A1 (en) Method, apparatus and system for managing electronic fingerprint of electronic file
CN112307440B (en) Method for protecting online education and teaching video property by using blockchain technology
US7987513B2 (en) Data-use restricting method and computer product
CN110929232A (en) System and method for protecting picture privacy information based on block chain and mobile device
CN114240314B (en) Administrative law enforcement case management method, device and system based on-cloud inspection
Patil et al. Blockchain Based Approach for Tackling Deepfake Videos
Ning et al. Research and development of copyright registration and monitoring system based on digital watermarking and fingerprint technology
CN115758291A (en) Public culture digital resource oriented block chain right confirming method and system
CN116340892A (en) Video infringement prevention method and system based on blockchain, storage medium and platform
Yang et al. Research on deep forgery data identification and traceability technology based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an

Applicant after: XIDIAN University

Applicant after: Xi'an Lianrong Technology Co.,Ltd.

Address before: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an

Applicant before: XIDIAN University

Applicant before: XI'AN XIDIAN LIANRONG TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20201127

RJ01 Rejection of invention patent application after publication