CN113032735A - Digital asset evidence and infringement monitoring system and method based on block chain technology - Google Patents

Digital asset evidence and infringement monitoring system and method based on block chain technology Download PDF

Info

Publication number
CN113032735A
CN113032735A CN202110560465.2A CN202110560465A CN113032735A CN 113032735 A CN113032735 A CN 113032735A CN 202110560465 A CN202110560465 A CN 202110560465A CN 113032735 A CN113032735 A CN 113032735A
Authority
CN
China
Prior art keywords
digital asset
infringement
digital
evidence
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110560465.2A
Other languages
Chinese (zh)
Other versions
CN113032735B (en
Inventor
张金琳
高航
孙宽慰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Shuqin Technology Co Ltd
Original Assignee
Zhejiang Shuqin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Shuqin Technology Co Ltd filed Critical Zhejiang Shuqin Technology Co Ltd
Priority to CN202110560465.2A priority Critical patent/CN113032735B/en
Publication of CN113032735A publication Critical patent/CN113032735A/en
Application granted granted Critical
Publication of CN113032735B publication Critical patent/CN113032735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/31Indexing; Data structures therefor; Storage structures
    • G06F16/316Indexing structures
    • G06F16/325Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/53Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of computers, in particular to a digital asset evidence storage and infringement monitoring system and a method based on a block chain technology, which comprises the following steps: the digital asset receiving module is used for receiving the digital assets of the user and distributing unique identification; the digital asset evidence storing module is used for packaging the data into an evidence storing data packet, extracting the hash value of the evidence storing data packet, uploading the hash value to a block chain for storage, and encrypting and storing an evidence storing file; and the infringement monitoring module is used for periodically submitting the specimen of the digital assets to a search engine if the type of the digital assets is characters or pictures, comparing the similarity of the results obtained by the search engine and the digital assets, sending a suspected infringement alarm to the client if the similarity exceeds a set threshold, storing the infringement page, and sending the search results of the suspected infringement to the client. The substantial effects of the invention are as follows: the digital asset evidence can be effectively stored, the safety and integrity of the digital asset are ensured, the infringement behavior can be timely found, and the loss is reduced.

Description

Digital asset evidence and infringement monitoring system and method based on block chain technology
Technical Field
The invention relates to the technical field of computers, in particular to a digital asset evidence storage and infringement monitoring system and method based on a block chain technology.
Background
Digital assets refer to non-monetary assets owned or controlled by a business or person, in the form of electronic data, held in daily activities for sale or in the process of production. The digital assets formally include enterprise asset management information, construction/production management, project planning, material management information, project management information, layout design information, system design information, asset modification information, and the like. The digital assets are the most important carriers for enterprise management and technical creation through the whole process of enterprise production and operation. The digital carrier is easy to lose the digital assets due to storage device failure and other reasons. The technical creation or innovation made by the enterprise is called intellectual property of the enterprise, and is the most important digital asset with huge influence and loss caused by loss of defects. In this intellectual economic era today, the contribution of intellectual property as an important intangible asset in economic growth is rising year by year. The development and application of intellectual property are important components of the national overall development strategy. Intellectual property rights of enterprises often have very high economic value, so that the enterprises face the trouble of infringing the intellectual property rights. Intellectual property litigation is growing in number. How to help enterprises to improve the security of property rights in the form of digital assets and timely discover and stop infringement behaviors is a problem to be solved urgently at present.
For example, chinese patent CN112163243A, whose publication date is 2021, 1, discloses a block chain-based digital asset examination and verification method, right-confirming method and device, including the steps of: SS1, obtaining digital asset feature abstract through feature calculation, comparing the digital asset feature abstract with the certified feature abstract, and examining validity and originality of the digital asset; the SS2 is used for determining and storing the right and the certificate of the digital assets, and storing the digital assets, the digital asset description information and the like into a data center; the digital assets are not limited to valid information such as the content of the right confirmation, the valid information is stored in a block chain, and the like; it can protect the copyright of digital assets, and can effectively prove when infringement occurs. However, the mode of adopting the data center cannot ensure the safety of digital asset storage, cannot provide infringement monitoring and early warning service for enterprises, and is not beneficial to the enterprises to find infringement behaviors in time.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: at present, the digital asset storage security of enterprises is low, and the technical problem that the digital asset is infringed is difficult to find in time. The system and the method can provide safe and reliable digital asset storage service for enterprises, can discover infringement behaviors in time and provide reliable guarantee for enterprise users to maintain own asset rights and interests.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: a digital asset evidence and infringement monitoring system based on a block chain technology logs in the system through a client, and comprises: the system comprises a digital asset receiving module, a digital asset receiving module and a data processing module, wherein a user is connected with the digital asset receiving module through a client, and the digital asset receiving module receives the digital asset of the user and distributes a unique identifier for the digital asset of the user; the digital asset evidence storing module is connected with the digital asset receiving module, the digital asset of the user is packed into an evidence storing data packet after being associated with the user identification, the unique identification and the standard timestamp, the hash value of the evidence storing data packet is extracted and uploaded to a block chain for storage, the height of the corresponding block and the hash value are associated with the evidence storing data packet to serve as an evidence storing file, and the evidence storing file is encrypted and stored; and the infringement monitoring module is connected with the digital asset receiving module, judges the type of the digital asset, periodically submits the specimen piece of the digital asset to a search engine if the type of the digital asset is a character or a picture, compares the similarity of the result obtained by the search engine and the digital asset, sends a suspected infringement alarm to the client if the similarity exceeds a set threshold, saves the infringement page, and sends the suspected infringement search result to the client.
Preferably, if the type of the digital asset is a character or a picture, the infringement monitoring module first makes a plurality of specimen slices of the digital asset, and the infringement monitoring module periodically submits the specimen slices of the digital asset to a search engine.
Preferably, the sample slice of the digital asset of the character type is a keyword of characters in the digital asset, and the sample slice of the digital asset of the picture type is a thumbnail or a partial picture of the picture.
Preferably, the digital asset evidence storage module comprises a file receiving module, a hash value extraction module, a cochain monitoring module and an encryption storage module, wherein the file receiving module receives digital assets uploaded by a client and distributes unique identifiers to the digital assets, the hash value extraction module extracts the hash values of evidence storage data packets, the cochain monitoring module associates the hash values and the unique identifiers of the evidence storage data packets and uploads the hash values and the unique identifiers to a block chain, and the encryption storage module reads the digital assets of a user through the file receiving module, encrypts and stores the digital assets of the user, and associates the encrypted digital assets with the unique identifiers.
Preferably, the encryption storage module comprises an encryption module, a distributed storage module and a decryption module, the encryption module encrypts the digital assets, the distributed storage module dispersedly stores the encrypted digital assets, and the decryption module reads the encrypted digital assets from the distributed storage module and decrypts the digital assets after receiving a request of reading the digital assets from a user.
Preferably, the client includes a process recording module, the process recording module periodically records a production process of the digital asset, the record includes a copy of the current digital asset, a copy hash value and a cumulative hash value, the process recording module maintains a cumulative hash value, the cumulative hash value is obtained by performing hash operation after the current copy hash value and a previous cumulative hash value are spliced, and when the user sends the digital asset to the digital asset receiving module, the digital asset and the cumulative hash value are sent.
The digital asset evidence and infringement monitoring method based on the block chain technology uses the digital asset evidence and infringement monitoring system based on the block chain technology, and comprises the following steps: receiving digital assets uploaded by a user, and allocating unique identifiers for the digital assets of the user; packaging the digital asset associated user identification, the unique identification and the standard timestamp of the user into a certificate storing data packet, extracting the hash value of the certificate storing data packet and uploading the hash value to a block chain for storage; the hash value of the certificate storage data packet, the height of the corresponding block and the hash value are associated with the certificate storage data packet to serve as a certificate storage file, and the certificate storage file is encrypted and stored; judging the type of the digital assets uploaded by the user, and if the type of the digital assets is characters or pictures, making a specimen sheet of the digital assets; periodically submitting the specimen slices of the digital assets to a search engine, and carrying out similarity comparison on results obtained by the search engine and the digital assets; if the similarity exceeds a preset threshold, sending a suspected infringement alarm to the client, saving the suspected infringement page, and sending the search result of the suspected infringement to the client.
Preferably, HASH values of the evidence data packet are extracted by using HASH256 and SM3 respectively, the obtained two HASH values are stored in the conduction block chain, and at least one of the two HASH values is matched with the HASH value of the evidence data packet, so that the evidence data packet is proved to be unmodified.
Preferably, for a digital asset of a literal type, the method of making a specimen slice of the digital asset comprises: counting words appearing in the digital assets, and arranging the words in descending order according to the occurrence times; respectively submitting the words appearing in the digital assets to a search engine, counting the number of matching results given by the search engine, and arranging the words according to the ascending order of the number of the matching results; taking the words which are arranged at the top N bits in descending order arrangement of the occurrence times and ascending order arrangement of the matching result number as the meta-sample slice; counting the number of meta-specimen slices appearing in each paragraph in the digital asset; taking the first plurality of paragraphs with the largest number of appearing meta-specimen slices as the revealed specimen slices, and randomly selecting a plurality of paragraphs from the paragraphs with the number of appearing meta-specimen slices in a preset interval as the concealed specimen slices; respectively submitting the display specimen slices to a search engine, and listing web pages appearing in the search results of the display specimen slices as web pages to be screened; and judging whether the webpage to be screened contains any hidden sample, if so, listing the webpage as a suspected infringement webpage, sending a suspected infringement alarm to the client, and sending a suspected infringement search result to the client.
Preferably, for a digital asset of the picture type, the method of making a specimen slice of the digital asset comprises: scaling the picture to a preset size as a main sample picture; cutting out a plurality of local pictures on the basis of an original picture, and zooming the local pictures to a preset size to be used as an auxiliary sample picture; submitting the main sample piece to a search engine, if the result with the similarity higher than a preset threshold value with the main sample piece does not appear in the search result, submitting the auxiliary sample pieces to the search engine respectively, and judging whether the results with the similarity higher than the preset threshold value with the main sample piece exist in a plurality of previous pages in the search result or not; and if the result with the similarity higher than the preset threshold value with the main sample sheet exists, sending a suspected infringement alarm to the client, storing the suspected infringement page, and sending the web page address where the search result of the suspected infringement is located to the client.
The substantial effects of the invention are as follows: 1) the digital assets are packaged to form a data packet, and the hash value of the data packet is uploaded to a block chain for storage, so that the evidence of the digital assets can be effectively stored, and the digital assets are conveniently verified to be not changed; 2) the digital assets are stored on the distributed storage equipment in an encrypted manner, so that the safety and integrity of the digital assets are ensured, and enterprises cannot face the threat of loss of the digital assets; 3) the infringement monitoring module is used for periodically and actively searching and monitoring the infringement behaviors on the network, so that the infringement behaviors can be timely found, corresponding measures are timely found and taken before the infringement behaviors cause larger loss, and the loss is reduced.
Drawings
Fig. 1 is a schematic structural diagram of a digital asset credentialing and infringement monitoring system according to an embodiment.
Fig. 2 is a schematic flow chart of a digital asset evidence and infringement monitoring method according to an embodiment.
FIG. 3 is a flowchart illustrating a second exemplary embodiment of a method for preparing a specimen slice of a digital asset.
FIG. 4 is a flowchart illustrating a second embodiment of a method for preparing a specimen slice of a photo-based digital asset.
Wherein: 100. the system comprises a client, 200, a digital asset receiving module, 300, a digital asset evidence storage module, 301, a file receiving module, 302, a hash value extraction module, 303, a uplink monitoring module, 304, an encryption storage module, 400, an infringement monitoring module, 500 and a block chain.
Detailed Description
The following provides a more detailed description of the present invention, with reference to the accompanying drawings.
The first embodiment is as follows:
referring to fig. 1, a digital asset credentialing and infringement monitoring system based on a block chain technology logs in the system through a client 100, and the embodiment includes:
and the digital asset receiving module 200 is connected with the user through the client 100, and the digital asset receiving module 200 receives the digital asset of the user and allocates a unique identifier to the digital asset of the user.
The digital asset evidence storing module 300 is connected with the digital asset receiving module 200, packages the digital asset associated user identification, the unique identification and the standard timestamp of the user into an evidence storing data packet, extracts the hash value of the evidence storing data packet, uploads the hash value to the block chain 500 for storage, associates the height of the corresponding block and the hash value with the evidence storing data packet to be used as an evidence storing file, and encrypts and stores the evidence storing file. As shown in table 1, in this embodiment, a login name of a user is used as a user identifier in an evidence storage file, an allocated unique identifier of a digital asset is 908200298311, a standard timestamp is a UTC timestamp, the digital asset uploaded by the user is a document of a novel draft, the novel document, the user identifier, the unique identifier and the standard timestamp are packaged, a hash value is extracted, the hash value is stored in a chain manner, a corresponding block height is 3426816259, and the hash value of an evidence storage data packet can be found on the block. Provides a convenient way for verifying whether the evidence text is tampered or not at a later time.
TABLE 1 user digital asset corresponding certificate storage file structure table
User identification user_abc
Unique identification 908200298311
Standard time stamp 1620465137
Digital assets XXX novel chapter one, doc
Hash value of certificate storing data packet 7672f8be1225c3d…9e642d27f67
Height of block 3426816259
Hash value of a block 19c23c58964cb9e…0053d7117a
The infringement monitoring module 400 is connected with the digital asset receiving module 200, judges the type of the digital asset, periodically submits a specimen of the digital asset to a search engine if the type of the digital asset is a character or a picture, compares the similarity of the result obtained by the search engine and the digital asset, sends a suspected infringement alarm to the client 100 if the similarity exceeds a set threshold, saves the infringement page, and sends the suspected infringement search result to the client 100.
If the type of the digital asset is a character or a picture, the infringement monitoring module 400 first creates a plurality of specimen slices of the digital asset, and the infringement monitoring module 400 periodically submits the specimen slices of the digital asset to a search engine.
The specimen slice of the digital asset of the character type is a keyword of characters in the digital asset, and the specimen slice of the digital asset of the picture type is a thumbnail or a partial picture of the picture.
The digital asset evidence storage module 300 comprises a file receiving module 301, a hash value extraction module 302, a cochain monitoring module 303 and an encryption storage module 304, wherein the file receiving module 301 receives digital assets uploaded by the client 100 and allocates unique identifiers for the digital assets, the hash value extraction module 302 extracts hash values of evidence storage data packets, the cochain monitoring module 303 associates the hash values of the evidence storage data packets with the unique identifiers and uploads the hash values and the unique identifiers to the block chain 500, and the encryption storage module 304 reads digital assets of a user through the file receiving module 301, encrypts and stores the digital assets of the user, and associates the encrypted digital assets with the unique identifiers.
The encryption storage module 304 includes an encryption module, a distributed storage module and a decryption module, the encryption module encrypts the digital assets, the distributed storage module dispersedly stores the encrypted digital assets, and the decryption module reads the encrypted digital assets from the distributed storage module and decrypts the digital assets after receiving a request of reading the digital assets from a user. The encryption module and the decryption module use a conventional symmetric encryption and decryption algorithm. The encryption module firstly reads the hash value of the evidence storage data packet, the hash value is hexadecimal number, the hash value is converted by adopting a preset conversion function, the converted hash value is still hexadecimal number, and the converted hash value is used as an encrypted secret key. Several conversion functions are agreed between the encryption module and the decryption module. The decryption module reads the hash value of the evidence storage data packet, obtains a plurality of possible secret keys after conversion by using the conversion function in sequence, and can decrypt the digital assets by traversing the secret keys.
In this embodiment, each conversion function converts the hash value when the encryption module converts the hash value, and in the converted result, tries to find several combinations in the converted result that satisfy the condition that the last bit value after addition is zero, if such a combination exists, the combinations are arranged in descending order according to the value of the last bit, and multiple encryption is performed on the digital assets in order; and if the combination with the last bit value being zero after the addition does not exist, selecting the combination with the maximum value of the last bit after the addition, arranging the combinations in a descending order according to the value of the last bit, and performing multiple encryption on the digital assets in sequence.
The combination contains at least two transformed hash values. During decryption, the decryption module performs the same operation to find the key combination used by multiple encryption, the key combination is arranged according to the ascending order of the value of the last digit, and the digital assets can be obtained by sequentially decrypting the key combination.
Because the conversion function is agreed by the encryption module and the decryption module in advance, the transfer of the secret key is not carried out between the encryption module and the decryption module in the online use process, and the safety of the secret key is effectively protected. The agreed conversion function is not required to be transmitted on the network, so that the safety of the agreed conversion function is very high and is difficult to be known outside, and unless all the agreed conversion functions are leaked, the encrypted digital asset is difficult to crack. As shown in table 2, in this embodiment, the hash value of the certificate storing packet is 7672f8be1225c3d … 9e642d27f67, after conversion by the conversion function, 3 converted hash values are found, the last value of the 3 converted hash values is added to zero, that is, b +3+2=10H, and after descending order, the digital asset is triple-encrypted by using the converted hash value 1, the converted hash value 2, and the converted hash value n, respectively.
Table 2 encryption key used by the encryption module
Hash value of certificate storing data packet 7672f8be1225c3d…9e642d27f67
Converted hash value 1 5c3dd4c5f387df…b192b5e62bfb Sequence 1
The converted hash value 2 65c9ffe82ac25d…e2b2c3a02e29
The converted hash value 3 50c66255c93706…a5a70da11b63 Sorting 2
The converted hash value n 964cb9d3ed88e3…1b3641de26a2 Rank 3
In this embodiment, the client 100 includes a process recording module, the process recording module periodically records a production process of the digital asset, the record includes a copy of the current digital asset, a copy hash value, and a cumulative hash value, the process recording module maintains a cumulative hash value, the cumulative hash value is obtained by performing hash operation after the current copy hash value and a previous cumulative hash value are spliced, and when the user sends the digital asset to the digital asset receiving module 200, the user sends the digital asset and the cumulative hash value. The process recording module can keep an effective production process evidence chain of the digital assets, powerfully prove the attribution of the digital assets and help a user to determine the right of the original works.
Referring to fig. 2, a digital asset evidence and infringement monitoring method based on a blockchain technology, using the digital asset evidence and infringement monitoring system based on the blockchain technology, includes:
step A), receiving the digital assets uploaded by the user, and distributing unique identification for the digital assets of the user. The unique identifier is a positive integer which is added by 1 each time the digital asset uploaded by the user is received.
And step B), packaging the digital asset associated user identification, the unique identification and the standard timestamp of the user into a certificate storing data packet, extracting the hash value of the certificate storing data packet, and uploading the hash value to the block chain 500 for storage. In this embodiment, HASH256 and SM3 are respectively used to extract HASH values of the evidence data packet, and both obtained HASH values are stored in the conducting block chain 500, and if at least one of the two HASH values matches the HASH value of the evidence data packet, it is verified that the evidence data packet has not been modified. The hash values of the evidence storing data packets in this embodiment are respectively: HASH 256: 7672f8be1225c3dd4c5f387dfb192b5e62bf99baca24bb25312b99e642d27f67, the HASH of the national secret SM3 is: 399b3e465c9ffe82ac25de2b2c3a02e27950c66255c93706a5a70da11b 636183. And if one of the two hash values can be matched with the hash value of the file to be verified, the file to be verified is proved to be the digital asset file uploaded by the user, and the two hash values are matched at the same time or are not matched at the same time under the common condition.
And step C), associating the hash value of the certificate storage data packet, the height of the corresponding block and the hash value to the certificate storage data packet to be used as a certificate storage file, and encrypting and storing the certificate storage file. The structure of the deposit document is shown in table 1.
And D) judging the type of the digital assets uploaded by the user, and if the type of the digital assets is characters or pictures, making a specimen sheet of the digital assets. The specimen slice is used for expanding the monitoring range, so that the probability of monitoring the infringement behavior can be improved, and the rights and interests of users are effectively maintained.
And E) periodically submitting the specimen slices of the digital assets to a search engine, and comparing the similarity of the results obtained by the search engine and the digital assets.
And F) if the similarity exceeds a preset threshold, sending a suspected infringement alarm to the client 100, saving the suspected infringement page, and sending the search result of the suspected infringement to the client 100. The similarity comparison method adopted in this embodiment is a technology for comparing similarity of characters and pictures in the prior art, and there are a lot of mature technologies in the two technologies disclosed in the art, which are not described herein again.
The search engine of the embodiment adopts a hundred-degree search engine and a necessary search engine, and other search engines with the picture retrieval function can be used as alternatives. And after one search engine is used for searching, replacing the search engine and executing the step E) and the step F) again to improve the probability of timely discovering the infringement.
The beneficial technical effects of this embodiment are: the hash value with the data packet is uploaded to the block chain 500 for storage, so that the digital asset is conveniently verified to be unchanged, the safety and integrity of the digital asset are ensured, infringement behaviors can be timely found, and the loss of a user is reduced.
Example two:
in the digital asset evidence collection and infringement monitoring method based on the blockchain 500 technology, the infringement monitoring is further improved on the basis of the first embodiment. Referring to fig. 3, for a text-type digital asset, a method for making a specimen slice of the digital asset comprises: step D11) counting the words present in the digital asset in descending order of occurrence. The top ranked vocabulary is the keywords of the digital assets.
Step D12) the words appearing in the digital assets are respectively submitted to a search engine, the number of matching results given by the search engine is counted, and the words are arranged according to the ascending order of the number of matching results.
Step D13) arranges the words in the first N-digit order in descending order of occurrence number and in ascending order of the number of matching results as the meta-sample sheet.
Step D14) counts the number of meta-specimen pieces present in each paragraph in the digital asset.
Step D15) the first paragraphs with the largest number of appearing meta-specimen pieces are used as the revealed specimen pieces, and the paragraphs with the largest number of appearing meta-specimen pieces in the preset interval are randomly selected as the concealed specimen pieces.
And D16) respectively submitting the display sample slices to a search engine, and listing the web pages appearing in the search results of the display sample slices as web pages to be screened.
Step D17) judging whether the webpage to be screened contains any hidden sample, if so, listing the webpage as a suspected infringement webpage, sending a suspected infringement alarm to the client 100, and sending a suspected infringement search result to the client 100.
TABLE 3 Meta-specimen slice obtained by extracting novel of this example
Meta specimen slice Zhou X courage, Wang X tiger and Ju Zhang ya "
Digital assets [1]The northwest field army makes a sound … … on 8 months and 6 days, and falls to bloodpool. | | [2]They end up … … being happy very soon in week X. | | [3]8 months, northwest The war … … runs loose and runs away. | | [4 |)]The great march began. Week … … victoriously completed the task. | | [5 |)]… … after seven days and seven nights The skullet.
In the embodiment, the fiction fragments are used as shown in table 3, and the meta-sample fragments obtained from the meta-sample fragments are "zhou X courage", "wang X tiger" and "cliff jump", wherein although the occurrence frequency of the words such as "home force army", "battle", "mission" and the like in the fiction is high, the occurrence frequency of the words in other works is also high, which results in a large number of monitoring results and is not favorable for discovering infringement behavior in time. According to the method provided by the embodiment, the words can be screened out, and the meta-specimen slice which represents the digital asset more accurately is left. This example fuzzifies the novel fragment. The first 2 paragraphs with the largest number of appearing meta-specimen pieces are selected as the display specimen pieces, namely, the 1 st paragraph and the 2 nd paragraph. The hidden sample slice selects two paragraphs, namely the 3 rd paragraph and the 5 th paragraph, in the paragraphs of which the number of the appearing primitive sample slices is in the preset interval. If the continuous hidden sample film can be found in the webpage, the webpage is very likely to be an infringement webpage, the webpage is used as a suspected infringement webpage, a suspected infringement alarm is sent to the client, and the suspected infringement webpage is subjected to evidence obtaining and evidence saving treatment. The method for performing evidence-obtaining and evidence-storing processing on the suspected infringement webpage is a static webpage evidence-obtaining method in the prior art, and is not described herein again.
Referring to fig. 4, for a digital asset of picture type, a method of making a specimen slice of the digital asset comprises: step D21) scaling the picture to a preset size as a main sample picture; step D22) cutting out a plurality of local pictures on the basis of the original pictures, and zooming the local pictures to a preset size to be used as auxiliary sample pictures; step D23) submitting the main sample to a search engine, if the similarity of the main sample and the sub sample is higher than the preset threshold value, respectively submitting the sub sample to the search engine, and judging whether the similarity of the sub sample and the main sample is higher than the preset threshold value in the previous pages of the search result; step D24), if a result with the similarity higher than the preset threshold value with the main sample sheet exists, sending a suspected infringement alarm to the client 100, storing the suspected infringement page, and sending the web page address where the search result of the suspected infringement is located to the client 100. Compared with the first embodiment, the method and the device can find the potential infringement behavior more effectively and protect the rights and interests of the user more effectively.
The above embodiment is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and other variations and modifications may be made without departing from the technical scope of the claims.

Claims (9)

1. A digital asset evidence and infringement monitoring system based on a block chain technology logs in the system through a client, and is characterized by comprising:
the system comprises a digital asset receiving module, a digital asset receiving module and a data processing module, wherein a user is connected with the digital asset receiving module through a client, and the digital asset receiving module receives the digital asset of the user and distributes a unique identifier for the digital asset of the user;
the digital asset evidence storing module is connected with the digital asset receiving module, the digital asset of the user is packed into an evidence storing data packet after being associated with the user identification, the unique identification and the standard timestamp, the hash value of the evidence storing data packet is extracted and uploaded to a block chain for storage, the height of the corresponding block and the hash value are associated with the evidence storing data packet to serve as an evidence storing file, and the evidence storing file is encrypted and stored;
and the infringement monitoring module is connected with the digital asset receiving module, judges the type of the digital asset, periodically submits the specimen piece of the digital asset to a search engine if the type of the digital asset is a character or a picture, compares the similarity of the result obtained by the search engine and the digital asset, sends a suspected infringement alarm to the client if the similarity exceeds a set threshold, saves the infringement page, and sends the suspected infringement search result to the client.
2. The system for block chain technology based digital asset credentialing and infringement monitoring according to claim 1,
if the type of the digital assets is characters or pictures, the infringement monitoring module firstly makes a plurality of specimen slices of the digital assets, and the infringement monitoring module periodically submits the specimen slices of the digital assets to a search engine.
3. The system of claim 2, wherein the digital asset credentialing and infringement monitoring system based on blockchain technology,
the specimen slice of the digital asset of the character type is a keyword of characters in the digital asset, and the specimen slice of the digital asset of the picture type is a thumbnail or a partial picture of the picture.
4. The system for digital asset credentialing and infringement monitoring based on blockchain technology as claimed in any one of claims 1 to 3,
the digital asset evidence storage module comprises a file receiving module, a hash value extraction module, a cochain monitoring module and an encryption storage module, wherein the file receiving module receives digital assets uploaded by a client and distributes unique identifiers for the digital assets, the hash value extraction module extracts the hash values of evidence storage data packets, the cochain monitoring module associates the hash values and the unique identifiers of the evidence storage data packets and uploads the hash values and the unique identifiers to a block chain, and the encryption storage module reads the digital assets of a user through the file receiving module and encrypts and stores the digital assets of the user, and associates the encrypted digital assets with the unique identifiers.
5. The system for digital asset credentialing and infringement monitoring based on blockchain technology as claimed in any one of claims 1 to 3,
the client comprises a process recording module, the process recording module periodically records the production process of the digital assets, the record comprises a copy of the current digital assets, a copy hash value and a cumulative hash value, the process recording module maintains a cumulative hash value, the cumulative hash value is obtained by performing hash operation after the current copy hash value and the last cumulative hash value are spliced, and when a user sends the digital assets to the digital asset receiving module, the user sends the digital assets and the cumulative hash value.
6. A method for monitoring the digital asset deposit evidence and infringement based on the blockchain technology, which uses the digital asset deposit evidence and infringement monitoring system based on the blockchain technology as claimed in any one of claims 1 to 5,
the method comprises the following steps:
receiving digital assets uploaded by a user, and allocating unique identifiers for the digital assets of the user;
packaging the digital asset associated user identification, the unique identification and the standard timestamp of the user into a certificate storing data packet, extracting the hash value of the certificate storing data packet and uploading the hash value to a block chain for storage;
the hash value of the certificate storage data packet, the height of the corresponding block and the hash value are associated with the certificate storage data packet to serve as a certificate storage file, and the certificate storage file is encrypted and stored;
judging the type of the digital assets uploaded by the user, and if the type of the digital assets is characters or pictures, making a specimen sheet of the digital assets;
periodically submitting the specimen slices of the digital assets to a search engine, and carrying out similarity comparison on results obtained by the search engine and the digital assets;
and if the similarity exceeds a preset threshold, sending a suspected infringement alarm to the client, and sending a suspected infringement search result to the client.
7. The method for monitoring the existence and infringement of digital assets based on block chain technology according to claim 6,
and respectively extracting the HASH values of the evidence storage data packet by using HASH256 and SM3, storing the two obtained HASH values in a conduction block chain, and verifying that the evidence storage data packet is not changed if at least one of the two HASH values is matched with the HASH value of the evidence storage data packet.
8. The method for digital asset credentialing and infringement monitoring based on blockchain technology as claimed in claim 6 or 7,
for a literal type digital asset, a method of making a specimen slice of the digital asset comprises:
counting words appearing in the digital assets, and arranging the words in descending order according to the occurrence times;
respectively submitting the words appearing in the digital assets to a search engine, counting the number of matching results given by the search engine, and arranging the words according to the ascending order of the number of the matching results;
taking the words which are arranged at the top N bits in descending order arrangement of the occurrence times and ascending order arrangement of the matching result number as the meta-sample slice;
counting the number of meta-specimen slices appearing in each paragraph in the digital asset;
taking the first plurality of paragraphs with the largest number of appearing meta-specimen slices as the revealed specimen slices, and randomly selecting a plurality of paragraphs from the paragraphs with the number of appearing meta-specimen slices in a preset interval as the concealed specimen slices;
respectively submitting the display specimen slices to a search engine, and listing web pages appearing in the search results of the display specimen slices as web pages to be screened;
judging whether the webpage to be screened contains any hidden sample, if so, listing the webpage as a suspected infringement webpage, sending a suspected infringement alarm to the client, storing the suspected infringement webpage, and sending the suspected infringement search result to the client.
9. The method for digital asset credentialing and infringement monitoring based on blockchain technology as claimed in claim 6 or 7,
for a picture-type digital asset, a method of making a specimen slice of the digital asset comprises:
scaling the picture to a preset size as a main sample picture;
cutting out a plurality of local pictures on the basis of an original picture, and zooming the local pictures to a preset size to be used as an auxiliary sample picture;
submitting the main sample piece to a search engine, if the result with the similarity higher than a preset threshold value with the main sample piece does not appear in the search result, submitting the auxiliary sample pieces to the search engine respectively, and judging whether the results with the similarity higher than the preset threshold value with the main sample piece exist in a plurality of previous pages in the search result or not;
and if the result with the similarity higher than the preset threshold value with the main sample sheet exists, sending a suspected infringement alarm to the client, storing the suspected infringement page, and sending the web page address where the search result of the suspected infringement is located to the client.
CN202110560465.2A 2021-05-21 2021-05-21 Digital asset evidence and infringement monitoring system and method based on block chain technology Active CN113032735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110560465.2A CN113032735B (en) 2021-05-21 2021-05-21 Digital asset evidence and infringement monitoring system and method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110560465.2A CN113032735B (en) 2021-05-21 2021-05-21 Digital asset evidence and infringement monitoring system and method based on block chain technology

Publications (2)

Publication Number Publication Date
CN113032735A true CN113032735A (en) 2021-06-25
CN113032735B CN113032735B (en) 2021-08-17

Family

ID=76455520

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110560465.2A Active CN113032735B (en) 2021-05-21 2021-05-21 Digital asset evidence and infringement monitoring system and method based on block chain technology

Country Status (1)

Country Link
CN (1) CN113032735B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11366925B2 (en) * 2020-09-23 2022-06-21 Alipay (Hangzhou) Information Technology Co., Ltd. Methods and apparatuses for chaining service data
CN114756627A (en) * 2022-06-10 2022-07-15 杭州链城数字科技有限公司 Alliance-chain-based digital asset processing method, system and storage medium
CN114881615A (en) * 2022-06-06 2022-08-09 山东浪潮爱购云链信息科技有限公司 Forum data interaction method and device in purchasing platform
CN114978686A (en) * 2022-05-19 2022-08-30 中国银行股份有限公司 Digital asset chaining method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740384A (en) * 2019-01-11 2019-05-10 众安信息技术服务有限公司 Data based on block chain deposit card method and apparatus
CN110022345A (en) * 2018-12-28 2019-07-16 阿里巴巴集团控股有限公司 Request processing method, system, device and equipment in alliance's chain
CN110457434A (en) * 2019-07-19 2019-11-15 平安科技(深圳)有限公司 Webpage evidence collecting method, device, readable storage medium storing program for executing and server based on search
CN112149744A (en) * 2020-09-25 2020-12-29 浙江数秦科技有限公司 Rapid identification method for infringement picture
CN112685795A (en) * 2020-12-31 2021-04-20 树根互联技术有限公司 Digital deposit certificate creating method, digital deposit certificate verifying method and digital deposit certificate system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110022345A (en) * 2018-12-28 2019-07-16 阿里巴巴集团控股有限公司 Request processing method, system, device and equipment in alliance's chain
CN109740384A (en) * 2019-01-11 2019-05-10 众安信息技术服务有限公司 Data based on block chain deposit card method and apparatus
CN110457434A (en) * 2019-07-19 2019-11-15 平安科技(深圳)有限公司 Webpage evidence collecting method, device, readable storage medium storing program for executing and server based on search
CN112149744A (en) * 2020-09-25 2020-12-29 浙江数秦科技有限公司 Rapid identification method for infringement picture
CN112685795A (en) * 2020-12-31 2021-04-20 树根互联技术有限公司 Digital deposit certificate creating method, digital deposit certificate verifying method and digital deposit certificate system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11366925B2 (en) * 2020-09-23 2022-06-21 Alipay (Hangzhou) Information Technology Co., Ltd. Methods and apparatuses for chaining service data
CN114978686A (en) * 2022-05-19 2022-08-30 中国银行股份有限公司 Digital asset chaining method and device
CN114881615A (en) * 2022-06-06 2022-08-09 山东浪潮爱购云链信息科技有限公司 Forum data interaction method and device in purchasing platform
CN114756627A (en) * 2022-06-10 2022-07-15 杭州链城数字科技有限公司 Alliance-chain-based digital asset processing method, system and storage medium
CN114756627B (en) * 2022-06-10 2022-09-30 杭州链城数字科技有限公司 Alliance-chain-based digital asset processing method, system and storage medium

Also Published As

Publication number Publication date
CN113032735B (en) 2021-08-17

Similar Documents

Publication Publication Date Title
CN113032735B (en) Digital asset evidence and infringement monitoring system and method based on block chain technology
US8438174B2 (en) Automated forensic document signatures
US8280905B2 (en) Automated forensic document signatures
JP5165126B2 (en) Method and apparatus for handling messages containing preselected data
US8312553B2 (en) Mechanism to search information content for preselected data
US8041719B2 (en) Personal computing device-based mechanism to detect preselected data
Shields et al. A system for the proactive, continuous, and efficient collection of digital forensic evidence
EP2109248B1 (en) Method and device for testing consistency of numeric contents
CN105447113B (en) A kind of information analysis method based on big data
US8661498B2 (en) Secure and scalable detection of preselected data embedded in electronically transmitted messages
US20060184549A1 (en) Method and apparatus for modifying messages based on the presence of pre-selected data
WO2004027653A2 (en) Detection of preselected data
Moh et al. Efficient semantic search over encrypted data in cloud computing
Lee et al. Toward Semantic Assessment of Vulnerability Severity: A Text Mining Approach.
Hussain et al. A novel method for preserving privacy in big-data mining
CN104283930B (en) The keyword search system of Security Index and the method for setting up the system
CN111382394A (en) Picture infringement monitoring method and device
Wang et al. Collection and judgment of electronic data evidence in criminal cases: From the perspective of investigation and evidence collection by public security organs
Wang et al. Research on some relevant problems in computer forensics
Mahajan et al. Clustering based efficient privacy preserving multi keyword search over encrypted data
Montesano The Anti-forensics Tactics, Techniques, and Procedures (TTPs) Cybercriminals Use to Hide Electronic Evidence of Crimes
CN117556112B (en) Intelligent management system for electronic archive information
US10521397B2 (en) System and methods of proactively searching and continuously monitoring content from a plurality of data sources
Fu et al. Research on privacy protection scheme based on data fuzzy processing
Begum et al. An Efficient Phrase Search using Bloom Filters over Cloud Data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: System and method for digital asset storage and infringement monitoring based on blockchain technology

Effective date of registration: 20220825

Granted publication date: 20210817

Pledgee: Bank of Beijing Limited by Share Ltd. Hangzhou branch

Pledgor: ZHEJIANG SHUQIN TECHNOLOGY CO.,LTD.

Registration number: Y2022330001899