CN115130139A - Digital asset examination method, device, system and storage medium - Google Patents
Digital asset examination method, device, system and storage medium Download PDFInfo
- Publication number
- CN115130139A CN115130139A CN202211057000.6A CN202211057000A CN115130139A CN 115130139 A CN115130139 A CN 115130139A CN 202211057000 A CN202211057000 A CN 202211057000A CN 115130139 A CN115130139 A CN 115130139A
- Authority
- CN
- China
- Prior art keywords
- compliance
- image
- text
- value
- digital asset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000005266 casting Methods 0.000 claims abstract description 48
- 238000012795 verification Methods 0.000 claims description 53
- 238000012552 review Methods 0.000 claims description 33
- 238000004364 calculation method Methods 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 8
- 238000012550 audit Methods 0.000 claims description 3
- 239000013598 vector Substances 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 230000011218 segmentation Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 108010001267 Protein Subunits Proteins 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000002538 fungal effect Effects 0.000 description 1
- 238000010191 image analysis Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000010422 painting Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/74—Image or video pattern matching; Proximity measures in feature spaces
- G06V10/761—Proximity, similarity or dissimilarity measures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Computing Systems (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Multimedia (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The application relates to a digital asset examination method, a device, a system and a storage medium, by acquiring casting information of a digital asset, wherein the casting information comprises casting description data and a source file to be cast; configuring a text compliance factor and an image compliance factor according to the casting description data and/or the source file to be cast; extracting text data and image data in a source file to be cast, acquiring a text compliance threshold value and an image compliance threshold value, determining a text compliance value according to the text data and the text compliance threshold value, and determining an image compliance value according to the image data and the image compliance threshold value; and according to the text compliance factor and the image compliance factor, performing weighted summation on the text compliance value and the image compliance value, and determining the total compliance value of the digital asset according to the weighted summation result, so that the problem of high difficulty in compliance examination of the digital asset in the related art is solved, and efficient and accurate examination is realized.
Description
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method, an apparatus, a system, and a storage medium for digital asset review.
Background
NFT (Non fungal Token, Non-homogeneous certificate) is a trusted digital rights voucher with a unique feature in a blockchain network, and is a data object that can be recorded and processed on a blockchain. NFT-based digital assets need to be qualitatively and quantitatively reviewed for compliance and the degree of compliance before being released on the blockchain platform. The method is limited by the unique technical characteristics of NFT and the wide application prospect of digital assets, the problems of low efficiency, insufficient examination precision and the like can be caused by manual or semi-automatic labeling examination, and along with the explosive increase of the number of digital assets based on block chains, more practical technical problems still face to the efficient and accurate automatic combination rule examination. For example, digital assets are varied in content format, often containing text and images, and are difficult to review for compliance.
Aiming at the problem that the compliance examination of digital assets is difficult in the related art, no effective solution is provided at present.
Disclosure of Invention
In the present embodiment, a digital asset examination method, apparatus, system, and storage medium are provided to solve the problems in the related art.
In a first aspect, there is provided in this embodiment a method of digital asset review, comprising
Obtaining casting information of the digital asset, wherein the casting information comprises casting description data and a source file to be cast;
configuring a text compliance factor and an image compliance factor according to the casting description data and/or the source file to be cast;
extracting text data and image data in the source file to be cast, acquiring a text compliance threshold value and an image compliance threshold value, determining a text compliance value according to the text data and the text compliance threshold value, and determining an image compliance value according to the image data and the image compliance threshold value;
and according to the text compliance factor and the image compliance factor, performing weighted summation on the text compliance value and the image compliance value, and determining a total compliance value of the digital asset according to a weighted summation result.
In some of these embodiments, configuring a text compliance factor and an image compliance factor based on the foundry description data includes:
analyzing the casting description data, determining a generation source of the digital asset, respectively determining the proportion of text data and image data in the source file to be cast according to the generation source, taking the proportion of the text data in the source file to be cast as the text compliance factor, and taking the proportion of the image data in the source file to be cast as the image compliance factor; or,
analyzing the casting description data, determining the issue type of the digital asset, respectively determining the proportion of text data and image data in the source file to be cast according to the issue type, taking the proportion of the text data in the source file to be cast as the text compliance factor, and taking the proportion of the image data in the source file to be cast as the image compliance factor.
In some of these embodiments, determining a text compliance value based on the text data and the text compliance threshold value comprises:
analyzing the text data to obtain a text violation value comprises:
performing sensitive word collision on the text data based on a sensitive word bank to obtain a collision ratio corresponding to each type of sensitive words, wherein the sensitive word bank contains multiple types of sensitive words;
carrying out weighted summation on the collision ratio of the multiple types of sensitive words according to a preset weight to obtain a text violation value;
and determining the text compliance value according to the text compliance threshold value and the text violation value.
In some of these embodiments, and determining an image compliance value from the image data and the image compliance threshold value comprises:
comparing the similarity of the image data based on a copyright file library to obtain the similarity corresponding to each type of image characteristics, wherein the copyright file library comprises a plurality of types of image characteristics;
determining an image violation value according to the maximum similarity value in the multi-class image characteristics;
and determining the image compliance value according to the image compliance threshold value and the image violation value.
In some of these embodiments, the foundry information further includes a foundry signature, and prior to determining the total compliance value for the digital asset, the method further includes:
according to the founder signature, founder signature verification and blacklist verification are carried out on the digital asset, and copyright uniqueness verification is carried out on the digital asset according to the source file to be cast;
if the digital assets are detected to pass the foundry signature verification, the blacklist verification and the copyright uniqueness verification, the digital assets are judged to be in compliance, and the calculation of the total compliance value of the digital assets is started.
In some embodiments, the copyright uniqueness checking the digital asset against the source file to be casted includes:
and acquiring a file hash value of the source file to be cast, and performing hash collision on the file hash value based on a copyright file library to obtain a result of whether the file hash value is overlapped with the hash value in the copyright file library.
In a second aspect, there is provided in this embodiment a digital asset review device, comprising: a compliance value calculation module, comprising:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring casting information of the digital asset, and the casting information comprises casting description data and a source file to be cast;
the configuration unit is used for configuring a text compliance factor and an image compliance factor according to the casting description data and/or the source file to be cast;
the determining unit is used for extracting text data and image data in the source file to be cast, acquiring a text compliance threshold value and an image compliance threshold value, determining a text compliance value according to the text data and the text compliance threshold value, and determining an image compliance value according to the image data and the image compliance threshold value; and according to the text compliance factor and the image compliance factor, performing weighted summation on the text compliance value and the image compliance value, and determining a total compliance value of the digital asset according to a weighted summation result.
In some of these embodiments, further comprising: a preliminary review module, coupled to the compliance value calculation module, including: the system comprises a founder signature verification unit, a blacklist verification unit and a copyright uniqueness verification unit.
In a third aspect, there is provided in this embodiment a digital asset issuance system comprising: a digital asset issuing device for providing casting information and a digital asset examination device according to the second aspect, wherein the digital asset issuing device is provided with an interface for receiving a compliance examination request from the digital asset issuing device.
In a fourth aspect, there is provided in this embodiment a storage medium having stored thereon a computer program that, when executed by a processor, performs the steps of the digital asset examination method of the first aspect.
Compared with the related art, the digital asset examination method, the device, the system and the storage medium provided in the embodiment acquire the casting information of the digital asset, wherein the casting information comprises the casting description data and the source file to be cast; configuring a text compliance factor and an image compliance factor according to the casting description data and/or a source file to be cast; extracting text data and image data in a source file to be cast, acquiring a text compliance threshold value and an image compliance threshold value, determining a text compliance value according to the text data and the text compliance threshold value, and determining an image compliance value according to the image data and the image compliance threshold value; and according to the text compliance factor and the image compliance factor, performing weighted summation on the text compliance value and the image compliance value, and determining the total compliance value of the digital asset according to the weighted summation result, so that the problem of high difficulty in compliance examination of the digital asset in the related art is solved, and efficient and accurate examination is realized.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more concise and understandable description of the application, and features, objects, and advantages of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a block diagram of a hardware configuration of a terminal of a digital asset review method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram illustrating a digital asset review method in one embodiment of the present application;
FIG. 3 is a schematic diagram of the structure of a digital asset review device in one embodiment of the present application;
fig. 4 is a schematic diagram of the structure of a digital asset issuing system according to an embodiment of the present application.
Detailed Description
For a clearer understanding of the objects, aspects and advantages of the present application, reference is made to the following description and accompanying drawings.
Unless defined otherwise, technical or scientific terms used herein shall have the same general meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The use of the terms "a" and "an" and "the" and similar referents in the context of this application do not denote a limitation of quantity, either in the singular or the plural. The terms "comprises," "comprising," "has," "having" and any variations thereof, as referred to in this application, are intended to cover non-exclusive inclusions; for example, a process, method, and system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or modules, but may include other steps or modules (elements) not listed or inherent to such process, method, article, or apparatus. Reference throughout this application to "connected," "coupled," and the like is not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference to "a plurality" in this application means two or more. "and/or" describes the association relationship of the associated object, indicating that there may be three relationships, for example, "a and/or B" may indicate: a exists alone, A and B exist simultaneously, and B exists alone. In general, the character "/" indicates a relationship in which the objects associated before and after are an "or". The terms "first," "second," "third," and the like in this application are used for distinguishing between similar items and not necessarily for describing a particular sequential or chronological order.
The method embodiments provided in the present embodiment may be executed in a terminal, a computer, or a similar computing device. Such as a terminal, and fig. 1 is a block diagram of a hardware structure of a terminal of a digital asset examination method according to an embodiment of the present application. As shown in fig. 1, the terminal may include one or more processors 102 (only one shown in fig. 1) and a memory 104 for storing data, wherein the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA. The terminal may also include a transmission device 106 for communication functions and an input-output device 108. It will be understood by those of ordinary skill in the art that the structure shown in fig. 1 is merely an illustration and is not intended to limit the structure of the terminal described above. For example, the terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store computer programs, for example, software programs and modules of application software, such as a computer program corresponding to the digital asset examination method in the present embodiment, and the processor 102 executes various functional applications and data processing by running the computer programs stored in the memory 104, so as to implement the above-mentioned method. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. The network described above includes a wireless network provided by a communication provider of the terminal. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
In one embodiment, as shown in fig. 2, a digital asset examination method is provided, which is illustrated by taking the method as an example applied to the terminal in fig. 1, and comprises the following steps:
step S201, obtaining casting information of the digital asset, wherein the casting information comprises casting description data and a source file to be cast.
Digital assets, including but not limited to digital collections, digital certificates generated with NFT technology. And casting description data, which refers to the asset name, the foundry name and the asset description. The source file to be casted refers to a file itself, such as text data and image data, and one source file to be casted may only contain text data, may only contain image data, and may contain both text data and image data. Specifically, the terminal may extract the casting information of the digital asset based on an audit request initiated by the receiving client.
Step S202, configuring text compliance factors and image compliance factors according to the casting description data and/or the source file to be cast.
And the casting description data comprises an asset name, a foundry name and an asset description, and can determine the field of the digital asset by analyzing the asset name, the foundry name and the asset description in the casting description data, and then configure a text compliance factor and an image compliance factor corresponding to the field, wherein the sum of the text compliance factor and the image compliance factor is 1. The field of digital assets is embodied as the type of generation source or release of the digital asset.
In some embodiments, the text compliance factor and the image compliance factor may be configured according to the foundry description data. This approach allows simple and fast configuration of text and image compliance factors. Optionally, the asset name, the name of the foundry and the asset description are analyzed to determine a generation source of the digital asset, the occupation ratios of the text data and the image data in the source file to be cast are respectively determined according to the generation source, the occupation ratio of the text data in the source file to be cast is used as a text compliance factor, and the occupation ratio of the image data in the source file to be cast is used as an image compliance factor. Wherein, the generating source includes but is not limited to academic journal source, new media source, and painting art source. Or, optionally, the asset name, the foundry name and the asset description are analyzed to determine the issuance type of the digital asset, the occupation ratios of the text data and the image data in the source file to be casted are respectively determined according to the issuance type, the occupation ratio of the text data in the source file to be casted is used as a text compliance factor, and the occupation ratio of the image data in the source file to be casted is used as an image compliance factor. The issue types include, but are not limited to, academic journal types, new media types, and graphic art types.
The above-described embodiments configure the text compliance factor and the image compliance factor based on the generation source or the distribution type of the digital asset, which has the advantages of simplicity and rapidness. In some scenarios, even if different digital assets belong to the same field, the proportions of text data and image data in the source file to be casted are very different, and the final inspection result will not be accurate enough if the factors are configured based on the generation source or the release type. To address this issue, in some embodiments, text compliance factors and image compliance factors may be configured according to the source file to be casted. The hit rates of the text data and the image data in the sample library are respectively analyzed, and the text compliance factor and the image compliance factor are respectively determined according to the hit rate of the text data in the sample library and the hit rate of the image data in the sample library. Specifically, the formulas for determining the text compliance factor and the image compliance factor are as follows:
wherein,represents a text compliance factor and a text-to-standard factor,representing the image compliance factor, a representing the number of sensitive words in the sensitive word bank, b representing the number of images in the copyright file bank,representing the number of sensitive words in the source file currently to be casted,representing the number of similar images in the source file currently to be cast,the hit rate of the table text data in the sensitive thesaurus,representing the hit rate of the image data in the copyright file repository. Wherein, the extraction of the sensitive words and the similar images can be referred to the following description. In this embodiment, the numerators and denominators are all dynamically changed and can be dynamically changedThe method adapts to the characteristics of the subdivided fields in a certain field, and adjusts the text compliance factor and the image compliance factor more accurately.
In some scenarios, for a domain, if each review is based on the current source file to be casted configuration text compliance factor and image compliance factor, this will result in a reduced stability of the domain's compliance review criteria. To solve the problem, in some embodiments, in a stage of performing compliance review on a digital asset in a certain field for the first time, an initial text compliance factor and an initial image compliance factor are configured based on foundry description data, and in each subsequent compliance review on the digital asset in the field, a candidate text compliance factor and a candidate image compliance factor are configured based on a source file to be casted, the initial text compliance factor and the candidate text compliance factor are compared, if a difference between the initial text compliance factor and the candidate text compliance factor is lower than a preset value (for example, 5%), the initial text compliance factor is retained, a total compliance value is calculated by using the initial compliance factor, otherwise, the candidate text compliance factor is used to replace the initial text compliance factor, the total compliance value is calculated by using the candidate text compliance factor, and based on a principle corresponding to the text compliance factor, the image compliance factor is also processed in the same way. By the arrangement, not only can the stability of the compliance audit standard of each field be ensured, but also the text compliance factor and the image compliance factor can be iterated under appropriate conditions.
Step S203, extracting text data and image data in a source file to be casted, obtaining a text compliance threshold value and an image compliance threshold value, determining a text compliance value according to the text data and the text compliance threshold value, and determining an image compliance value according to the image data and the image compliance threshold value.
The text compliance threshold refers to an early warning value used for judging whether texts are the same or not, and the image compliance threshold refers to an early warning value used for judging whether images are similar or not.
The text compliance value represents the compliance degree of the text data in the source file to be casted, the text violation value can be obtained by performing data analysis on the text data, and the text compliance value is obtained based on the text compliance threshold value and the text violation value. Wherein the text violation value represents a degree of violation of the text data in the source file to be casted. Illustratively, text data is disassembled and analyzed to obtain text disassembling scores, sensitive word collision is carried out on the text data on the basis of a sensitive word bank, namely the proportion of the number of times of collision of each type of sensitive words in the text disassembling scores is calculated and is used as the collision ratio corresponding to each type of sensitive words, wherein the sensitive word bank comprises multiple types of sensitive words; after the collision ratio corresponding to each type of sensitive words is obtained, carrying out weighted summation on the collision ratios of the multiple types of sensitive words according to preset weights to obtain a text violation value; and determining a text compliance value according to the text compliance threshold value and the text violation value. Specifically, a text compliance value = (text compliance threshold-text violation value)/text compliance threshold.
The image compliance value represents the compliance degree of the image data in the source file to be cast, the image data can be subjected to image analysis to obtain an image violation value, and the image compliance value is obtained based on the image compliance threshold value and the image violation value. Wherein the image violation value represents a degree of violation of the image data in the source file to be casted. Exemplarily, extracting features of image data to obtain feature vectors, comparing the feature vectors of a source file to be cast with the similarity of the image data based on a copyright file library, namely performing cosine similarity calculation of the feature vectors one by one on a plurality of extracted feature vectors and the feature vectors of each image in the copyright file library to obtain the similarity corresponding to each type of image features, wherein the copyright file library comprises a plurality of types of image features; determining an image violation value according to the maximum similarity value in the multi-class image characteristics; and determining an image compliance value according to the image compliance threshold value and the image violation value. Specifically, the image compliance value = (image compliance threshold value-image violation value)/image compliance threshold value.
And S204, carrying out weighted summation on the text compliance value and the image compliance value according to the text compliance factor and the image compliance factor, and determining a total compliance value of the digital assets according to a weighted summation result.
Specifically, total compliance value = text compliance value x text compliance factor + image compliance value x image compliance factor. And adding the text compliance value and the image compliance value to obtain a total compliance value of the digital asset, wherein if the total compliance value is larger, the compliance is stronger, and otherwise, the opposite is true. The total compliance value may be embodied in a percentage form, a threshold value may be set according to a user requirement, and the digital asset may be allowed to perform uplink casting only when the total compliance value reaches the threshold value.
In the above steps S201 to S204, the content formats of the digital assets are diversified, the digital assets in different fields have different proportions of the generated text data and the generated image data in the source file to be cast, and the review result is not accurate enough if the same set of review standards is used for review. For example, the fields of academic journals, new media, and graphic arts, and the digital assets in these fields have a large difference in the aspect ratio of text data and image data. Therefore, in the embodiment, the examination of the digital assets is divided into two dimensions of texts and images, and the text compliance factors and the image compliance factors are configured according to the casting description data and/or the source file to be cast so as to flexibly adapt to the examination of the digital assets in different fields, so that the degree of the text and image compliance verification in the casting of the digital assets is controllable, and a quantitative and accurate examination result is obtained.
In one embodiment, the foundry information further includes a foundry signature, and prior to determining the total compliance value for the digital asset, the digital asset is subjected to a preliminary review, and if the preliminary review passes, a subsequent review is performed; otherwise, the digital asset is directly determined to be non-compliant and the digital asset is refused to be chain cast. Wherein the preliminary examination includes: according to the signer signature, performing the signer signature verification and the blacklist verification on the digital asset, and according to the source file to be casted, performing the copyright uniqueness verification on the digital asset; and if the digital assets are detected to pass the signer signature verification, the blacklist verification and the copyright uniqueness verification, judging the compliance of the digital assets, and starting the calculation of the total compliance value of the digital assets.
And (3) verifying the signature of the founder, namely decrypting and verifying the signature information by using the public key of the founder to obtain verification result data Q1, wherein the value range of Q1 is {0,1}, 0 is verification pass, and 1 is verification fail.
And (3) blacklist verification, namely judging whether the founder exists in a blacklist catalogue of the terminal to obtain verification result data Q2, wherein the value range of Q2 is {0,1}, 0 is not in a blacklist, and 1 is in the blacklist.
And the copyright uniqueness check refers to performing hash collision on the file hash value of the source file to be cast based on the copyright file library and judging whether the source file to be cast is overlapped. Specifically, text data and/or image data in a source file to be casted are extracted and subjected to hash calculation to obtain a file hash value D0, D0 is collided with hash values corresponding to all copyright files in a copyright file library to obtain verification result data Q3, wherein the hash values corresponding to the copyright files are { D1, D2, D3 and D4 … Dn }, the value range of Q3 is {0,1}, 0 is collision absence, and 1 is collision presence.
After obtaining Q1, Q2, and Q3, the constructor f (Q1, Q2, Q3) = Bool (Q1) + Bool (Q2) + Bool (Q3), where Bool (Qi) is a boolean function of Qi, if Qi is equal to 1, Bool Qi (Qi) = 1; if Qi equals 0, then bool (Qi) = 0.
Calculating the value of f (Q1, Q2, Q3), and if f (Q1, Q2, Q3) is equal to 1, the preliminary examination is not passed; if f (Q1, Q2, Q3) is equal to 0, then the preliminary examination is passed.
With reference to the digital asset examination method of the foregoing embodiment, in an embodiment, please refer to fig. 3, further providing a digital asset examination apparatus, which includes a compliance value calculation module, including:
the system comprises an acquisition unit, a storage unit and a processing unit, wherein the acquisition unit is used for acquiring casting information of the digital asset, and the casting information comprises casting description data and a source file to be cast;
a configuration unit for configuring a text compliance factor and an image compliance factor according to the casting description data;
the determining unit is used for extracting text data and image data in a source file to be cast, acquiring a text compliance threshold value and an image compliance threshold value, determining a text compliance value according to the text data and the text compliance threshold value, and determining an image compliance value according to the image data and the image compliance threshold value; and according to the text compliance factor and the image compliance factor, performing weighted summation on the text compliance value and the image compliance value, and determining a total compliance value of the digital asset according to a weighted summation result.
It should be noted that, for specific examples in this embodiment, reference may be made to the examples described in the foregoing embodiment and optional implementation manners, and details of the examples that have been already described are not repeated. The terms "module," "unit," "sub-unit," and the like as used below may implement a combination of software and/or hardware of predetermined functions. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
In one embodiment, there is further provided a preliminary review module, coupled to the compliance value calculation module, including: the system comprises a founder signature verification unit, a blacklist verification unit and a copyright uniqueness verification unit.
The founder signature verification unit can decrypt and verify the signature information by using the public key of the founder to obtain verification result data Q1, wherein the value range of Q1 is {0,1}, 0 is verification pass, and 1 is verification fail.
And the blacklist checking unit can judge whether the caster exists in a blacklist directory of the terminal or not to obtain verification result data Q2, wherein the value range of Q2 is {0,1}, 0 is not in a blacklist, and 1 is in the blacklist.
The copyright uniqueness checking unit can perform hash collision on the file hash value of the source file to be cast based on the copyright file library, and judge whether the source file to be cast is overlapped. Specifically, text data and/or image data in a source file to be casted are extracted and subjected to hash calculation to obtain a file hash value D0, D0 is collided with hash values corresponding to all copyright files in a copyright file library to obtain verification result data Q3, wherein the hash values corresponding to the copyright files are { D1, D2, D3 and D4 … Dn }, the value range of Q3 is {0,1}, 0 is collision absence, and 1 is collision presence.
In one embodiment, the preliminary review module further includes a decision unit capable of constructing a function f (Q1, Q2, Q3) = Bool (Q1) + Bool (Q2) + Bool (Q3), where Bool (Qi) is a boolean function of Qi, and if Qi is equal to 1, Bool (Qi) = 1; if Qi equals 0, then bool (Qi) = 0. Calculating the value of f (Q1, Q2, Q3), and if f (Q1, Q2, Q3) is equal to 1, the preliminary examination is not passed; if f (Q1, Q2, Q3) is equal to 0, then the preliminary examination is passed.
In one embodiment, there is provided a digital asset issuance system comprising: the digital asset examination device is provided with an interface for receiving a compliance examination request initiated by the digital asset issuing device. It should be noted that, for specific examples in this embodiment, reference may be made to the examples described in the foregoing embodiments and optional implementations, and details are not described again in this embodiment.
The digital asset issuing system of the present application will be described below by way of preferred embodiments. In one embodiment, referring to fig. 4, a digital asset issuance system comprises: a digital asset issuing apparatus and a digital asset examination apparatus.
The digital asset issuing device signs the casting information of the digital asset by a private key in an API interface mode and submits the casting information to the digital asset examination device for examination. The foundry information includes foundry description data, a source file to be foundry, and a foundry signature, wherein the foundry description data includes an asset name, a foundry name, and an asset description, the source file to be foundry includes text data and/or image data, and the foundry signature includes a foundry private key signature.
The digital asset examination device comprises a preliminary examination module and a compliance value calculation module. Firstly, performing preliminary examination on the digital assets based on a preliminary examination module, and if the preliminary examination is passed, handing the digital assets to a compliance value calculation module to calculate a total compliance value; otherwise, the digital asset is directly determined to be non-compliant and the digital asset is refused to be chain cast.
The preliminary examination module is used for carrying out foundry signature verification and blacklist verification on the digital assets according to the foundry signature and carrying out copyright uniqueness verification on the digital assets according to the source files to be casted; and if the digital assets are detected to pass the signer signature verification, the blacklist verification and the copyright uniqueness verification, judging the compliance of the digital assets, and starting the calculation of the total compliance value of the digital assets. Otherwise, if the digital asset is detected not to pass any one of the signer signature verification, the blacklist verification and the copyright uniqueness verification, the digital asset is judged to be not qualified.
The compliance value calculation module works according to the following principle:
step S1, extracting the text in the source file to be cast, utilizing word segmentation technology to perform word segmentation and word segmentation of the text, performing collision check on the word segmentation result and a sensitive word bank containing k-class sensitive words, and calculating a collision ratio:
Step S2, constructing a loop function, and setting a text compliance thresholdTraversing to check whether the collision ratio of the sensitive thesaurus is lower than a text compliance threshold:
step S3, if the collision ratio of any sensitive word exceeds the text compliance threshold, stopping calculation, and informing the digital asset issuing device that the digital asset examination is not passed; otherwise, the next step is continued. According to the arrangement, all sensitive words do not need to be traversed, and compliance examination is stopped as long as one type of sensitive words is involved in the verification process, so that the processing efficiency is improved. The following are examples of sensitive thesaurus:
step S3, extracting the image in the source file to be cast, carrying out gray level processing on the image, extracting the image characteristics, and constructing a characteristic vector:
acquiring a feature vector of each image in the copyright file library:
and (3) calculating the cosine similarity of the feature vector of the source file to be cast and the feature vector of each image in the copyright file library one by one:
step S4, constructing a loop function, setting an image compliance threshold value, traversing the source file to be cast and the images in the copyright file library one by one in similarity calculation, and judging whether the similarity is lower than the image compliance threshold value:
step S5, if the similarity of any image exceeds the image compliance threshold, stopping calculating, and informing the digital asset issuing device that the digital asset examination is not passed; otherwise, the next step is continued. By the arrangement, all similarity calculation does not need to be traversed, and the compliance review is stopped as long as the similarity of one type of images exceeds the image compliance threshold value in the verification process, so that the processing efficiency is improved.
Step S6, calculating the total compliance value of the digital assets, wherein the calculation formula is as follows:
wherein,representing a value of a textual compliance to the user,a representative image compliance value is used to represent the image compliance value,representing a value of a violation of the text,representing the value of the violation of the image,representing a text compliance threshold value for the text,representative of the image compliance threshold value(s),represents a text compliance factor and a text-to-standard factor,representing a compliance factor of the image,representing the weight of the class k sensitive word. The value range of the total compliance value is [1,100 ]]If the total compliance value is closer to 100, namely the average value is higher, the digital asset is represented to have stronger compliance; the closer the total compliance value is to 0, i.e., the lower the mean value, the worse the compliance of the digital asset is represented.
In the embodiment, a compliance value calculation module is constructed by text word segmentation, sensitive word collision and image vector cosine similarity verification; sensitive words and image features are traversed one by utilizing a loop function, and a suspended review node is triggered in time according to a traversal result, so that the compliance review efficiency is improved; meanwhile, flexible setting of compliance factors is supported, and the degree of text and image compliance verification in digital asset casting is controllable.
It should be noted that the steps illustrated in the above-described flow diagrams or in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and that, although a logical order is illustrated in the flow diagrams, in some cases, the steps illustrated or described may be performed in an order different than here. For example, steps S1 through S2 may be exchanged with steps S3 through S5.
It should be noted that the above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
In addition, in combination with the digital asset examination method provided in the above embodiments, a storage medium may also be provided to implement in the present embodiment. The storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements any of the digital asset review methods of the above embodiments.
The digital assets according to the present application are distributed only in the local area network and are not distributed to the public. The user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in this application are information and data that are authorized by the user or sufficiently authorized by various parties.
It should be understood that the specific embodiments described herein are merely illustrative of this application and are not intended to be limiting. All other embodiments, which can be derived by a person skilled in the art from the examples provided herein without any inventive step, shall fall within the scope of protection of the present application.
It is obvious that the drawings are only examples or embodiments of the present application, and it is obvious to those skilled in the art that the present application can be applied to other similar cases according to the drawings without creative efforts. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference throughout this application to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly or implicitly understood by one of ordinary skill in the art that the embodiments described in this application may be combined with other embodiments without conflict.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the patent protection. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, and these are all within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.
Claims (10)
1. A digital asset review method, comprising:
obtaining casting information of the digital asset, wherein the casting information comprises casting description data and a source file to be cast;
configuring a text compliance factor and an image compliance factor according to the casting description data and/or the source file to be cast;
extracting text data and image data in the source file to be cast, acquiring a text compliance threshold value and an image compliance threshold value, determining a text compliance value according to the text data and the text compliance threshold value, and determining an image compliance value according to the image data and the image compliance threshold value;
and according to the text compliance factor and the image compliance factor, performing weighted summation on the text compliance value and the image compliance value, and determining a total compliance value of the digital asset according to a weighted summation result.
2. The digital asset review method of claim 1, wherein configuring a text compliance factor and an image compliance factor based on the foundry description data comprises:
analyzing the casting description data, determining a generation source of the digital asset, respectively determining the proportion of text data and image data in the source file to be cast according to the generation source, taking the proportion of the text data in the source file to be cast as the text compliance factor, and taking the proportion of the image data in the source file to be cast as the image compliance factor; or,
analyzing the casting description data, determining the issue type of the digital asset, respectively determining the proportion of text data and image data in the source file to be cast according to the issue type, taking the proportion of the text data in the source file to be cast as the text compliance factor, and taking the proportion of the image data in the source file to be cast as the image compliance factor.
3. The digital asset review method of claim 1, wherein determining a textual compliance value based on the textual data and the textual compliance threshold comprises:
performing sensitive word collision on the text data based on a sensitive word bank to obtain a collision ratio corresponding to each type of sensitive words, wherein the sensitive word bank comprises a plurality of types of sensitive words;
carrying out weighted summation on the collision ratio of the multiple types of sensitive words according to a preset weight to obtain a text violation value;
and determining the text compliance value according to the text compliance threshold value and the text violation value.
4. The digital asset review method of claim 1 and determining an image compliance value based on the image data and the image compliance threshold value comprises:
comparing the similarity of the image data based on a copyright file library to obtain the similarity corresponding to each type of image characteristics, wherein the copyright file library comprises a plurality of types of image characteristics;
determining an image violation value according to the maximum similarity value in the multi-class image characteristics;
and determining the image compliance value according to the image compliance threshold value and the image violation value.
5. The digital asset audit method of claim 1 wherein the foundry information further includes a foundry signature, prior to determining the total compliance value for the digital asset, the method further comprising:
according to the signer signature, performing signer signature verification and blacklist verification on the digital asset, and according to the source file to be casted, performing copyright uniqueness verification on the digital asset;
and if the digital assets are detected to pass the founder signature verification, the blacklist verification and the copyright uniqueness verification, judging the digital assets are in compliance, and starting to calculate the total compliance value of the digital assets.
6. The digital asset examination method according to claim 1, wherein performing a copyright uniqueness check on the digital asset based on the source file to be casted comprises: and acquiring a file hash value of the source file to be cast, and performing hash collision on the file hash value based on a copyright file library to obtain a result of whether the file hash value is superposed with the hash value in the copyright file library.
7. A digital asset review device, comprising: a compliance value calculation module, comprising:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring casting information of the digital asset, and the casting information comprises casting description data and a source file to be cast;
the configuration unit is used for configuring a text compliance factor and an image compliance factor according to the casting description data and/or the source file to be cast;
the determining unit is used for extracting text data and image data in the source file to be cast, acquiring a text compliance threshold value and an image compliance threshold value, determining a text compliance value according to the text data and the text compliance threshold value, and determining an image compliance value according to the image data and the image compliance threshold value; and according to the text compliance factor and the image compliance factor, performing weighted summation on the text compliance value and the image compliance value, and determining a total compliance value of the digital asset according to a weighted summation result.
8. The digital asset review device of claim 7, further comprising: a preliminary review module, coupled to the compliance value calculation module, including: the system comprises a caster signature verification unit, a blacklist verification unit and a copyright uniqueness verification unit.
9. A digital asset distribution system, comprising: a digital asset issuing apparatus for providing casting information and a digital asset examination apparatus as claimed in claim 7 or claim 8, wherein the digital asset examination apparatus is provided with an interface to receive a compliance examination request issued by the digital asset issuing apparatus.
10. A computer-readable storage medium on which a computer program is stored, the computer program, when executed by a processor, implementing the steps of the digital asset review method of any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211057000.6A CN115130139B (en) | 2022-08-31 | 2022-08-31 | Digital asset review method, apparatus, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211057000.6A CN115130139B (en) | 2022-08-31 | 2022-08-31 | Digital asset review method, apparatus, system and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115130139A true CN115130139A (en) | 2022-09-30 |
CN115130139B CN115130139B (en) | 2022-12-02 |
Family
ID=83387271
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211057000.6A Active CN115130139B (en) | 2022-08-31 | 2022-08-31 | Digital asset review method, apparatus, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115130139B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117710112A (en) * | 2024-02-02 | 2024-03-15 | 湖南马兰数字教育科技有限公司 | NFT generation method and system based on blockchain |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080235223A1 (en) * | 2007-03-19 | 2008-09-25 | Donald Douglas | Online compliance document management system |
CN106445998A (en) * | 2016-05-26 | 2017-02-22 | 达而观信息科技(上海)有限公司 | Text content auditing method and system based on sensitive word |
CN111382605A (en) * | 2018-12-28 | 2020-07-07 | 广州市百果园信息技术有限公司 | Video content auditing method and device, storage medium and computer equipment |
CN111861465A (en) * | 2020-07-21 | 2020-10-30 | 国家计算机网络与信息安全管理中心 | Detection method and device based on intelligent contract, storage medium and electronic device |
CN112749608A (en) * | 2020-06-08 | 2021-05-04 | 腾讯科技(深圳)有限公司 | Video auditing method and device, computer equipment and storage medium |
CN113010637A (en) * | 2021-02-24 | 2021-06-22 | 世纪龙信息网络有限责任公司 | Text auditing method and device |
WO2021169208A1 (en) * | 2020-02-25 | 2021-09-02 | 平安科技(深圳)有限公司 | Text review method and apparatus, and computer device, and readable storage medium |
CN114722323A (en) * | 2022-01-25 | 2022-07-08 | 上海博弋信息科技有限公司 | System and method for safety examination based on webpage content |
CN114925674A (en) * | 2022-05-27 | 2022-08-19 | 平安银行股份有限公司 | File compliance checking method and device, electronic equipment and storage medium |
-
2022
- 2022-08-31 CN CN202211057000.6A patent/CN115130139B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080235223A1 (en) * | 2007-03-19 | 2008-09-25 | Donald Douglas | Online compliance document management system |
CN106445998A (en) * | 2016-05-26 | 2017-02-22 | 达而观信息科技(上海)有限公司 | Text content auditing method and system based on sensitive word |
CN111382605A (en) * | 2018-12-28 | 2020-07-07 | 广州市百果园信息技术有限公司 | Video content auditing method and device, storage medium and computer equipment |
WO2021169208A1 (en) * | 2020-02-25 | 2021-09-02 | 平安科技(深圳)有限公司 | Text review method and apparatus, and computer device, and readable storage medium |
CN112749608A (en) * | 2020-06-08 | 2021-05-04 | 腾讯科技(深圳)有限公司 | Video auditing method and device, computer equipment and storage medium |
CN111861465A (en) * | 2020-07-21 | 2020-10-30 | 国家计算机网络与信息安全管理中心 | Detection method and device based on intelligent contract, storage medium and electronic device |
CN113010637A (en) * | 2021-02-24 | 2021-06-22 | 世纪龙信息网络有限责任公司 | Text auditing method and device |
CN114722323A (en) * | 2022-01-25 | 2022-07-08 | 上海博弋信息科技有限公司 | System and method for safety examination based on webpage content |
CN114925674A (en) * | 2022-05-27 | 2022-08-19 | 平安银行股份有限公司 | File compliance checking method and device, electronic equipment and storage medium |
Non-Patent Citations (2)
Title |
---|
中国贸易报: "NFT数字资产的合规发展与应用论坛:探索NFT本土化合规发展路径", 《HTTPS://WWW.CHINATRADENEWS.COM.CN/M/202112/27/C142578.HTML》 * |
张纪臣: "加强数字资产的管理与审计", 《数字图书馆论坛》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117710112A (en) * | 2024-02-02 | 2024-03-15 | 湖南马兰数字教育科技有限公司 | NFT generation method and system based on blockchain |
CN117710112B (en) * | 2024-02-02 | 2024-06-04 | 湖南马兰数字科技有限公司 | NFT generation method and system based on blockchain |
Also Published As
Publication number | Publication date |
---|---|
CN115130139B (en) | 2022-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8311907B2 (en) | System and method for detecting fraudulent transactions | |
KR101948721B1 (en) | Method and apparatus for examining forgery of file by using file hash value | |
CN106682906B (en) | Risk identification and service processing method and equipment | |
CN108351932A (en) | CAPTCHA challenges based on image | |
CN103443800A (en) | Network rating | |
EP2693356A2 (en) | Detecting pirated applications | |
CN110503434A (en) | Data verification method, device, equipment and storage medium based on hash algorithm | |
CN107809371A (en) | Shared resource display methods and device | |
CN111723159A (en) | Data verification method and device based on block chain | |
CN115130139B (en) | Digital asset review method, apparatus, system and storage medium | |
US20180322901A1 (en) | Copyright checking for uploaded media | |
CN112862589A (en) | Identity verification method, device and system in financial scene | |
KR20200093262A (en) | Method for proving original contents of knowledge sharing service using blockchain technology and system thereof | |
CN112099870B (en) | Document processing method, device, electronic equipment and computer readable storage medium | |
CN114338102B (en) | Security detection method, security detection device, electronic equipment and storage medium | |
CN113656497A (en) | Data verification method and device based on block chain | |
CN111027065B (en) | Leucavirus identification method and device, electronic equipment and storage medium | |
CN111563254B (en) | Threat risk processing method and apparatus for product, computer system, and medium | |
CN111209577B (en) | Method and device for adding watermark data, storage medium and electronic equipment | |
WO2024169388A1 (en) | Security requirement generation method and apparatus based on stride model, electronic device and medium | |
CN110381114B (en) | Interface request parameter processing method and device, terminal equipment and medium | |
US9904662B2 (en) | Real-time agreement analysis | |
TWI242963B (en) | Dynamically variable security protocol | |
CN111311179A (en) | Object processing method and device, electronic equipment and computer readable storage medium | |
CN110866069B (en) | Identity management metadata processing method and system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |