CN112000928A - Picture distributed infringement right confirming method, system, storage medium and computer equipment - Google Patents
Picture distributed infringement right confirming method, system, storage medium and computer equipment Download PDFInfo
- Publication number
- CN112000928A CN112000928A CN202010682514.5A CN202010682514A CN112000928A CN 112000928 A CN112000928 A CN 112000928A CN 202010682514 A CN202010682514 A CN 202010682514A CN 112000928 A CN112000928 A CN 112000928A
- Authority
- CN
- China
- Prior art keywords
- infringement
- picture
- distributed
- block chain
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000006399 behavior Effects 0.000 claims abstract description 24
- 238000012790 confirmation Methods 0.000 claims abstract description 13
- 230000009193 crawling Effects 0.000 claims abstract description 12
- 238000005516 engineering process Methods 0.000 claims abstract description 6
- 238000001514 detection method Methods 0.000 claims description 9
- 239000000284 extract Substances 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 claims description 3
- 238000010200 validation analysis Methods 0.000 claims 5
- 238000012795 verification Methods 0.000 claims 1
- 238000012544 monitoring process Methods 0.000 abstract description 13
- 238000004458 analytical method Methods 0.000 abstract description 3
- 238000012423 maintenance Methods 0.000 abstract description 3
- 230000007547 defect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to the technical field of block chain and crawler technology application, and discloses a picture distributed infringement authority confirming method, a picture distributed infringement authority confirming system, a storage medium and computer equipment, wherein picture copyright is stored, and picture information is stored on a block chain by the picture distributed infringement authority confirming system after the picture copyright is stored by the picture distributed infringement authority confirming system receiving a certificate storage request of a user; deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data; and returning the infringement proof on the block chain after receiving the confirmation request. The invention enlarges the monitoring range of the infringement behavior and finds the infringement behavior in time; finding suspected infringement behaviors by utilizing the technical characteristic that the block chain data cannot be tampered and through a characteristic value analysis and comparison algorithm; the method realizes online one-key evidence obtaining of suspected infringement behaviors and contents by means of webpage screen capturing, video screen recording and the like, records the suspected infringement behaviors and contents into a block chain, realizes judicial evidence obtaining means with high reliability and low evidence obtaining cost, and provides technical support and judicial evidence for subsequent right maintenance.
Description
Technical Field
The invention belongs to the technical field of block chain and crawler technology application, and particularly relates to a picture distributed infringement right confirming method, a picture distributed infringement right confirming system, a picture distributed infringement right confirming storage medium and a picture distributed infringement right confirming computer device.
Background
The internet technology is developed at a high speed, the network increasingly becomes a high-incidence and easy-to-develop field of infringement piracy, the copyright industry taking innovation as a core faces a serious challenge, and the picture works are rapidly increased. The size of picture copyrights has increased from 161 million RMB in 2015 to 240 million in 2019. At present, copyright protection mainly has the following problems in infringement monitoring and right-maintaining evidence obtaining:
(1) infringement monitoring is difficult. Firstly, manual monitoring cannot cope with massive data. In the face of mass data, the original owner can not judge whether the data is infringed at all. In addition, the infringement evidence of the digital work is easy to disappear, and the infringement behavior is not easy to be found in time; secondly, the monitoring range is small and the monitoring content is single. The network range of monitoring is limited to department websites, communities and self-media. It is difficult for infringement websites to continuously track and monitor. And the infringing website frequently changes the head and face for avoiding monitoring and pursuing.
(2) It is difficult to take evidence through right maintenance. Firstly, the evidence collection in the network environment is difficult. The virtuality, the imperceptibility and the non-space-time limitation of the network infringement behavior make the evidence collection more difficult. Secondly, judicial resources are limited, the right maintaining channel is deficient, the right maintaining program is complex, and the right maintaining cost is high. The right is maintained in a lawsuit mode, the procedure of judicial lawsuit is complex, the period is long, the whole process is nearly 6 months, time and labor are wasted, in addition, lawsuits need to bear thousands of yuan of lawyer fees, notary fees and the like, the right benefits of copyright owners are in direct proportion to the payment of the copyright owners, and the right maintaining effect is poor.
Through the above analysis, the problems and defects of the prior art are as follows:
(1) at present, mass data are difficult to deal with in copyright protection during infringement monitoring and right-maintaining evidence obtaining, and infringement behaviors are difficult to find in time.
(2) At present, copyright protection has the defects that infringement evidence is easy to disappear and is difficult to store in infringement monitoring and right-maintaining evidence obtaining.
(3) At present, copyright protection has the following difficulties in infringement and evidence collection in infringement monitoring and right collection: limited judicial resources, lack of right channels, long period and high cost.
The difficulty in solving the above problems and defects is: the key point of protecting the intellectual property of the picture lies in how to ensure that the right of infringement can be reliably carried out on the picture under various conditions, and meanwhile, the convenience of operation and the reliability of a platform are improved as much as possible. The difficulty to solve the above problems lies in how to get an optimal balance point between security and convenience, so that a user can conveniently complete an image infringement and right confirmation task on the premise of feeling reassurance.
The significance of solving the problems and the defects is as follows: in the current society, the scale of picture copyright rises year by year, and networks increasingly become the highly-prone field of infringement piracy. The problem is solved, the trust of the user on the platform can be enhanced, and more people are guided to join the queue for protecting intellectual property rights.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a picture distributed infringement right confirming method, a picture distributed infringement right confirming system, a storage medium and computer equipment.
The invention is realized in such a way that a picture distributed infringement authentication method comprises the following steps:
the picture distributed infringement authentication method comprises the following steps:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
Further, the picture distributed infringement authentication method comprises the following steps:
the picture content copyright storage module extracts RGB data of the structured picture from the external data layer, extracts characteristic information of the structured picture and embeds the watermark;
reading unstructured weblog data from a distributed file system by the distributed block chain network through an RPC port;
the Internet distributed crawler block chain network node extracts, converts and loads the picture characteristic information data and the weblog data from the distributed block chain network storage module, integrates the picture characteristic information data and the weblog data into a data tuple, and stores the data tuple in a star model;
the distributed crawler crawls picture data of specified classified webpages in real time, converts the picture data into structured RGB data, extracts structured picture characteristic information, compares the picture characteristic information with stored picture characteristic information, judges that the user is infringing if the similarity of the picture characteristic information and the stored picture characteristic information reaches a certain threshold value, and stores infringed user information, infringed websites and the block chains. And storing the infringement content screenshot in a distributed crawler cloud.
And after receiving the right confirmation request, providing a network query interface through the distributed crawler network node to return the infringement data screenshot stored in the cloud of the distributed crawler. And returning the stored infringing website and infringing page to the infringed user through the distributed blockchain network. A proof of infringement on the blockchain is returned.
Further, the picture distributed infringement authentication method, when the system receives a picture taken by the user, performs picture authentication including:
(1) a client of the system receives a picture shot by a user to obtain a shot original picture;
(2) extracting picture characteristic information;
(3) embedding watermark information into the picture by using a watermark technology to obtain the picture with the embedded watermark;
(4) uploading the characteristic information and the watermark information to a block chain;
(5) and returning the original picture, the picture embedded with the watermark and the certificate information certificate to the user after the certificate is successfully stored.
Further, the image distributed infringement authentication method infringement detection includes:
(1) adding a plurality of crawler network nodes into the block chain;
(2) the distributed crawler crawls pictures on each website and monitors suspicious infringement pictures;
(3) extracting characteristic information of the suspected infringement pictures, matching the characteristic information with the picture characteristic information stored on the block chain, and judging the suspected infringement pictures if certain similarity is achieved;
(4) and for the picture for judging the infringement, storing the infringement evidence on a block chain account book through communication with the block chain network.
Further, the distributed picture infringement authentication method infringement authentication comprises:
(1) the system receives an infringement evidence-obtaining request of a user;
(2) acquiring an address of a user on a block chain through a user module;
(3) and returning the authentication address, the authentication data and the infringement data information of the user from the blockchain.
It is a further object of the invention to provide a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
It is another object of the present invention to provide a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
Another object of the present invention is to provide a distributed image infringement authentication system operating the distributed image infringement authentication method, the distributed image infringement authentication system including:
the picture storing module is used for realizing the storage of the picture copyright, and the system receives a storage request of a user and stores the picture information on the block chain;
the image infringement detection module is used for deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and finding infringement behaviors in real time, and chaining infringement data;
and the picture right confirming module is used for returning an infringement certificate on the block chain after receiving the right confirming request.
Another object of the present invention is to provide an intelligent terminal, wherein the intelligent terminal is equipped with the picture distributed infringement authorization system.
By combining all the technical schemes, the invention has the advantages and positive effects that: the distributed crawler enlarges the monitoring range of the infringement behavior, and finds the infringement behavior in time; finding suspected infringement behaviors by utilizing the technical characteristic that the block chain data cannot be tampered and through a characteristic value analysis and comparison algorithm; and further, online one-key evidence obtaining is realized for suspected infringement behaviors and contents in modes of webpage screen capturing, video screen recording and the like, and the suspected infringement behaviors and contents are recorded into a block chain, so that a judicial evidence obtaining means with high reliability and low evidence obtaining cost is realized, and technical support and judicial evidence are provided for subsequent right maintenance.
The invention can greatly simplify the copyright certification application of the traditional copyright management department, namely the 'creation-application-registration' registration process by utilizing the block chain, shortens the registration certification time from 7 to 30 days to 5 to 10 minutes, and realizes the almost synchronous completion of the registration and completion of the creation of the works. Meanwhile, the registration cost is reduced from hundreds of yuan to tens of yuan or even lower. When the user submits the litigation, the court directly extracts related information such as copyright confirmation evidence source files and infringement evidence source files submitted by the user from the block chain according to the user information, and makes a decision whether to put up a case or whether to be adopted by the court. The whole process of proving the right to maintain and verifying the evidence by the judicial officer is convenient and quick, and the judicial efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained from the drawings without creative efforts.
Fig. 1 is a flowchart of a distributed infringement authentication method for pictures according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a picture distributed infringement authentication system according to an embodiment of the present invention;
in fig. 2: 1. a picture evidence storage module; 2. a picture infringement detection module; 3. and the picture right confirming module.
Fig. 3 is a schematic structural diagram of an infringement detection and picture evidence collection technique based on a blockchain and a distributed crawler according to an embodiment of the present invention.
Fig. 4 is a flowchart of an implementation of a method of a picture privacy protection and picture transaction system based on a blockchain according to an embodiment of the present invention.
Fig. 5 is a block chain-based implementation diagram of a copyright separation module of a picture privacy protection and picture transaction system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In view of the problems in the prior art, the present invention provides a method, a system, a storage medium, and a computer device for determining distributed infringement of pictures, which are described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the distributed image infringement authentication method provided by the present invention includes the following steps:
s101: storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
s102: deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
s103: and returning infringement proofs on the block chain and the crawler cloud after receiving the right confirmation request.
Persons of ordinary skill in the art can also use other steps to implement the distributed infringement determination method for pictures provided by the present invention, and the distributed infringement determination method for pictures provided by the present invention in fig. 1 is only one specific embodiment.
As shown in fig. 2, the picture distributed infringement authentication system provided by the present invention includes: the system comprises a picture evidence storage module 1, a picture infringement detection module 2 and a picture authority confirmation module 3.
And the picture certificate storage module 1 is used for realizing picture copyright certificate storage, and the system receives a certificate storage request of a user and stores the picture information in the block chain.
And the picture infringement detection module 2 is used for deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and finding infringement behaviors in real time, and chaining infringement data.
And the picture right confirming module 3 is used for returning an infringement certificate on the block chain after receiving the right confirming request.
The technical solution of the present invention is further described below with reference to the accompanying drawings.
Example 1
As shown in fig. 3, when the system receives a picture taken by the user, the system performs picture storage, and the method operates according to the following steps:
(1) the client of the system receives the picture shot by the user and obtains a shot original picture
(2) And extracting picture characteristic information.
(3) And embedding the watermark information into the picture by using a watermark technology to obtain the picture with the embedded watermark.
(4) Uploading feature information and watermark information to a blockchain
(5) And returning the original picture, the picture embedded with the watermark and the certificate information certificate to the user after the certificate is successfully stored.
Example 2
As shown in fig. 4, the infringement detection module performs the following steps:
(1) block chain adding multiple crawler network nodes
(2) And crawling pictures on each website by the distributed crawler, and monitoring suspicious infringement pictures.
(3) And extracting characteristic information of the suspected infringement picture, matching the characteristic information with the picture characteristic information stored on the block chain, and judging the picture as infringement if certain similarity is achieved.
(4) And for the picture for judging the infringement, storing the infringement evidence on a block chain account book through communication with the block chain network.
Example 3
As shown in fig. 5, the infringement confirmation module proceeds as follows:
(1) the system receives an infringement evidence-obtaining request of a user.
(2) Obtaining the address of the user on the block chain through the user module
(3) And returning information such as the authentication address, the authentication data and the infringement data of the user from the blockchain.
(4) Returning infringement screenshot evidence from crawler node cloud
It should be noted that the embodiments of the present invention can be realized by hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided on a carrier medium such as a disk, CD-or DVD-ROM, programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier, for example. The apparatus and its modules of the present invention may be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., or by software executed by various types of processors, or by a combination of hardware circuits and software, e.g., firmware.
The above description is only for the purpose of illustrating the present invention and the appended claims are not to be construed as limiting the scope of the invention, which is intended to cover all modifications, equivalents and improvements that are within the spirit and scope of the invention as defined by the appended claims.
Claims (10)
1. A picture distributed infringement authentication method is characterized by comprising the following steps:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
2. The picture distributed infringement determination method of claim 1, wherein the picture distributed infringement determination method comprises:
the picture content copyright storage module extracts RGB data of the structured picture from the external data layer, extracts characteristic information of the structured picture and embeds the watermark;
reading unstructured weblog data from a distributed file system by the distributed block chain network through an RPC port;
the Internet distributed crawler block chain network node extracts, converts and loads the picture characteristic information data and the weblog data from the distributed block chain network storage module, integrates the picture characteristic information data and the weblog data into a data tuple, and stores the data tuple in a star model;
the distributed crawler crawls picture data of specified classified webpages in real time, converts the picture data into structured RGB data, extracts structured picture characteristic information, compares the picture characteristic information with stored picture characteristic information, judges that the user is infringing if the similarity of the picture characteristic information and the stored picture characteristic information reaches a certain threshold value, and stores infringed user information, infringed websites and the image on a block chain;
and storing the infringement content screenshot in a distributed crawler cloud.
3. The picture distributed infringement authentication method as claimed in claim 1, wherein after receiving the authentication request, a network query interface is provided by a distributed crawler network node to return an infringement data screenshot stored in a distributed crawler cloud, and a distributed blockchain network returns an infringement website and an infringement page stored in the distributed crawler cloud to an infringed user, and returns an infringement proof on the blockchain.
4. The picture distributed infringement authentication method as claimed in claim 1, wherein the picture distributed infringement authentication method, when the system receives a picture taken by a user, performs picture verification including:
(1) a client of the system receives a picture shot by a user to obtain a shot original picture;
(2) extracting picture characteristic information;
(3) embedding watermark information into the picture by using a watermark technology to obtain the picture with the embedded watermark;
(4) uploading the characteristic information and the watermark information to a block chain;
(5) and returning the original picture, the picture embedded with the watermark and the certificate information certificate to the user after the certificate is successfully stored.
5. The picture distributed infringement validation method of claim 1, wherein the picture distributed infringement validation method infringement detection comprises:
(1) adding a plurality of crawler network nodes into the block chain;
(2) the distributed crawler crawls pictures on each website and monitors suspicious infringement pictures;
(3) extracting characteristic information of the suspected infringement pictures, matching the characteristic information with the picture characteristic information stored on the block chain, and judging the suspected infringement pictures if certain similarity is achieved;
(4) and for the picture for judging the infringement, storing the infringement evidence on a block chain account book through communication with the block chain network.
6. The picture distributed infringement validation method of claim 1, wherein the picture distributed infringement validation method infringement validation comprises:
(1) the system receives an infringement evidence-obtaining request of a user;
(2) acquiring an address of a user on a block chain through a user module;
(3) and returning the authentication address, the authentication data and the infringement data information of the user from the blockchain.
7. A computer device, characterized in that the computer device comprises a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to carry out the steps of:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
8. A computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
storing the picture copyright in a block chain when the system receives a certificate storing request of a user;
deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and discovering infringement behaviors in real time, and chaining infringement data;
and returning the infringement proof on the block chain after receiving the confirmation request.
9. A picture distributed infringement authentication system operating the picture distributed infringement authentication method according to any one of claims 1 to 6, the picture distributed infringement authentication system comprising:
the picture storing module is used for realizing the storage of the picture copyright, and the system receives a storage request of a user and stores the picture information on the block chain;
the image infringement detection module is used for deploying a large number of crawler nodes in the core network management nodes of the Internet, crawling, analyzing and finding infringement behaviors in real time, and chaining infringement data;
and the picture right confirming module is used for returning an infringement certificate on the block chain after receiving the right confirming request.
10. An intelligent terminal, characterized in that the intelligent terminal is equipped with the picture distributed infringement authentication system of claim 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010682514.5A CN112000928A (en) | 2020-07-15 | 2020-07-15 | Picture distributed infringement right confirming method, system, storage medium and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010682514.5A CN112000928A (en) | 2020-07-15 | 2020-07-15 | Picture distributed infringement right confirming method, system, storage medium and computer equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112000928A true CN112000928A (en) | 2020-11-27 |
Family
ID=73467998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010682514.5A Pending CN112000928A (en) | 2020-07-15 | 2020-07-15 | Picture distributed infringement right confirming method, system, storage medium and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112000928A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112685794A (en) * | 2020-12-31 | 2021-04-20 | 树根互联技术有限公司 | Online evidence obtaining method, evidence obtaining and right maintaining method, system and computer equipment |
CN113691514A (en) * | 2021-08-16 | 2021-11-23 | 重庆易保全网络科技有限公司 | Internet data-based supervision and evidence-obtaining method |
CN113837629A (en) * | 2021-09-29 | 2021-12-24 | 土巴兔集团股份有限公司 | Original content protection method, device and readable storage medium |
CN114936354A (en) * | 2022-05-20 | 2022-08-23 | 浙江云程信息科技有限公司 | Information processing method and device for engineering supervision |
CN117875989A (en) * | 2024-03-13 | 2024-04-12 | 寰宇信任(北京)技术有限公司 | 3D asset right determining and maintaining platform and method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013131134A2 (en) * | 2012-03-07 | 2013-09-12 | Peter Fox | Ip infringement detection method, system and tool |
CN107103087A (en) * | 2017-05-02 | 2017-08-29 | 成都中远信电子科技有限公司 | Block chain big data analysis of market conditions system |
CN107832384A (en) * | 2017-10-28 | 2018-03-23 | 北京安妮全版权科技发展有限公司 | Infringement detection method, device, storage medium and electronic equipment |
CN110008655A (en) * | 2019-03-01 | 2019-07-12 | 北京数字融通科技有限公司 | A kind of infringing information identification people's mark system and method based on distributed network |
CN110598376A (en) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Copyright authentication method, device and equipment based on block chain and storage medium |
CN110851761A (en) * | 2020-01-15 | 2020-02-28 | 支付宝(杭州)信息技术有限公司 | Infringement detection method, device and equipment based on block chain and storage medium |
CN110929232A (en) * | 2019-10-30 | 2020-03-27 | 西安西电链融科技有限公司 | System and method for protecting picture privacy information based on block chain and mobile device |
-
2020
- 2020-07-15 CN CN202010682514.5A patent/CN112000928A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013131134A2 (en) * | 2012-03-07 | 2013-09-12 | Peter Fox | Ip infringement detection method, system and tool |
CN107103087A (en) * | 2017-05-02 | 2017-08-29 | 成都中远信电子科技有限公司 | Block chain big data analysis of market conditions system |
CN107832384A (en) * | 2017-10-28 | 2018-03-23 | 北京安妮全版权科技发展有限公司 | Infringement detection method, device, storage medium and electronic equipment |
CN110008655A (en) * | 2019-03-01 | 2019-07-12 | 北京数字融通科技有限公司 | A kind of infringing information identification people's mark system and method based on distributed network |
CN110598376A (en) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Copyright authentication method, device and equipment based on block chain and storage medium |
CN110929232A (en) * | 2019-10-30 | 2020-03-27 | 西安西电链融科技有限公司 | System and method for protecting picture privacy information based on block chain and mobile device |
CN110851761A (en) * | 2020-01-15 | 2020-02-28 | 支付宝(杭州)信息技术有限公司 | Infringement detection method, device and equipment based on block chain and storage medium |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112685794A (en) * | 2020-12-31 | 2021-04-20 | 树根互联技术有限公司 | Online evidence obtaining method, evidence obtaining and right maintaining method, system and computer equipment |
CN113691514A (en) * | 2021-08-16 | 2021-11-23 | 重庆易保全网络科技有限公司 | Internet data-based supervision and evidence-obtaining method |
CN113837629A (en) * | 2021-09-29 | 2021-12-24 | 土巴兔集团股份有限公司 | Original content protection method, device and readable storage medium |
CN113837629B (en) * | 2021-09-29 | 2024-06-14 | 土巴兔集团股份有限公司 | Original content protection method, device and readable storage medium |
CN114936354A (en) * | 2022-05-20 | 2022-08-23 | 浙江云程信息科技有限公司 | Information processing method and device for engineering supervision |
CN114936354B (en) * | 2022-05-20 | 2023-02-17 | 浙江云程信息科技有限公司 | Information processing method and device for engineering supervision |
CN117875989A (en) * | 2024-03-13 | 2024-04-12 | 寰宇信任(北京)技术有限公司 | 3D asset right determining and maintaining platform and method |
CN117875989B (en) * | 2024-03-13 | 2024-05-24 | 寰宇信任(北京)技术有限公司 | 3D asset right determining and maintaining platform and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112000928A (en) | Picture distributed infringement right confirming method, system, storage medium and computer equipment | |
CN110598376B (en) | Copyright authentication method, device and equipment based on block chain and storage medium | |
US20090037975A1 (en) | System and Method for Authenticating Content | |
CN110096639B (en) | Method and device for monitoring and obtaining evidence of infringement and terminal equipment | |
CN102739774B (en) | Method and system for obtaining evidence under cloud computing environment | |
CN108769753B (en) | Network audio-visual management supporting copyright service subsystem based on block chain technology | |
CN112801827A (en) | Intellectual property management system based on block chain | |
US20060195837A1 (en) | Synchronized-download version manager (S-DVM) | |
CN111966968A (en) | Copyright protection method and system based on block chain | |
CN111581659B (en) | Method and device for calling electronic evidence | |
CN112395560A (en) | Copyright data processing method and device | |
CN114722355A (en) | Copyright protection system and method based on block chain and IPFS | |
CN117034305A (en) | Sensitive information identification method, device, computer equipment and readable storage medium | |
CN110941845A (en) | File acquisition method and device, computer equipment and storage medium | |
CN111339368B (en) | Video retrieval method and device based on video fingerprint and electronic equipment | |
US20200278948A1 (en) | Method, apparatus and system for managing electronic fingerprint of electronic file | |
CN112307440B (en) | Method for protecting online education and teaching video property by using blockchain technology | |
US7987513B2 (en) | Data-use restricting method and computer product | |
CN110929232A (en) | System and method for protecting picture privacy information based on block chain and mobile device | |
CN114240314B (en) | Administrative law enforcement case management method, device and system based on-cloud inspection | |
Patil et al. | Blockchain Based Approach for Tackling Deepfake Videos | |
Ning et al. | Research and development of copyright registration and monitoring system based on digital watermarking and fingerprint technology | |
CN115758291A (en) | Public culture digital resource oriented block chain right confirming method and system | |
CN116340892A (en) | Video infringement prevention method and system based on blockchain, storage medium and platform | |
Yang et al. | Research on deep forgery data identification and traceability technology based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an Applicant after: XIDIAN University Applicant after: Xi'an Lianrong Technology Co.,Ltd. Address before: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an Applicant before: XIDIAN University Applicant before: XI'AN XIDIAN LIANRONG TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201127 |
|
RJ01 | Rejection of invention patent application after publication |