Method, apparatus, and electronic device for blockchain-based infringement evidence storage

ABSTRACT

Methods, systems, and apparatus, including computer programs encoded on computer storage media are provided. One of the methods include: obtaining a request for collecting information associated with an Internet address; obtaining, in response to the request, the information from the Internet address; encrypting the information to obtain a digest; storing the digest in a block on a blockchain and the information in a cloud storage space associated with an access address; and sending, to a sender of the request, the digest and the access address associated with the cloud storage space.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation application of U.S. patentapplication Ser. No. 16/870,410, filed May 8, 2020, which is acontinuation application of International Patent Application No.PCT/CN2020/071148, filed with the China National Intellectual PropertyAdministration (CNIPA) of People's Republic of China on Jan. 9, 2020.International Patent Application No. PCT/CN2020/071148 is based on andclaims priority to and benefit of Chinese Patent Application No.201910414160.3, filed with the CNIPA on May 17, 2019. The entirecontents of all of the above-identified applications are incorporatedherein by reference.

TECHNICAL FIELD

The specification relates to the field of computer technologies, and inparticular, to a method and an apparatus for blockchain-basedinfringement evidence storage, and an electronic device thereof.

BACKGROUND

Along with the rapid development of mobile Internet technologiesnowadays, there are more and more Internet infringement activities. Forexample, it may be possible that original works such as articlespublished by original authors on the Internet are infringed, includingplagiarized, stolen, or misused.

To safeguard his/her interests, an infringed party or right owner mayinitiate an infringement lawsuit against an infringer when finding thatthe original works published by the infringed party on the Internet areinfringed by the infringer. A court and other judicial agencies thataccept and hear infringement actions need to determine whetherinfringement activities of infringers are established based on relevantinfringement evidence. Therefore, an infringed party is required toprovide judicial agencies with reliable evidence regarding the relevantinfringement activities of an infringer.

However, since the relevant infringement activities of an infringer takeplace on the Internet, it is possible that some infringement recordscollected by an infringed party are altered. Therefore, solutions arestill needed to ensure that an infringed party collects reliableevidence regarding the relevant infringement activities of an infringerand then to safeguard the infringed party's interests.

SUMMARY

Embodiments of the specification provide a method and an apparatus forblockchain-based infringement evidence storage, and an electronic devicethereof, so as to solve the existing problem that it is possible thatsome infringement records collected by an infringed party may bealtered.

To solve the above-described technical problem, the embodiments of thespecification are implemented as follows.

According to a first aspect, a method for blockchain-based infringementevidence storage is provided. The method comprises: obtaining aninfringement evidence collection request for an Internet infringingresource, the infringement evidence collection request carrying aninfringement address of the Internet infringing resource; obtaining,based on the infringement evidence collection request, infringementevidence of the Internet infringing resource from the infringementaddress; and uploading irreversible verification information of theinfringement evidence to a blockchain.

According to a second aspect, an apparatus for blockchain-basedinfringement evidence storage is provided. The apparatus comprises: afirst obtaining unit configured to obtain an infringement evidencecollection request for an Internet infringing resource, the infringementevidence collection request carrying an infringement address of theInternet infringing resource; a second obtaining unit configured toobtain, based on the infringement evidence collection request,infringement evidence of the Internet infringing resource from theinfringement address; and an uploading unit configured to uploadirreversible verification information of the infringement evidence to ablockchain.

According to a third aspect, an electronic device is provided,comprising: a processor; and a memory configured to store a computerexecutable instruction, wherein the executable instruction, when beingexecuted, causes the processor to execute the following operations:obtaining an infringement evidence collection request for an Internetinfringing resource, the infringement evidence collection requestcarrying an infringement address of the Internet infringing resource;obtaining, based on the infringement evidence collection request,infringement evidence of the Internet infringing resource from theinfringement address; and uploading irreversible verificationinformation of the infringement evidence to a blockchain.

According to a fourth aspect, a computer readable storage medium isprovided, wherein the computer readable storage medium stores one ormore programs, and the one or more programs, when being executed by anelectronic device comprising a plurality of applications, cause theelectronic device to execute the following operations: obtaining aninfringement evidence collection request for an Internet infringingresource, the infringement evidence collection request carrying aninfringement address of the Internet infringing resource; obtaining,based on the infringement evidence collection request, infringementevidence of the Internet infringing resource from the infringementaddress; uploading irreversible verification information of theinfringement evidence to a blockchain; and storing the infringementevidence in a cloud storage space.

The above technical solutions adopted by the embodiments of thespecification at least can achieve the following technical effects.

According to another aspect, a method for blockchain-based evidencestorage is provided. The method may comprise: obtaining a request forcollecting evidence of infringement by an online resource, wherein therequest comprises an address of the online resource; obtaining theevidence of infringement from the address of the online resource;storing verification information of the evidence of infringement on ablockchain; and storing the evidence of infringement in a cloud storagespace.

In an embodiment, the obtaining the evidence of infringement from theaddress of the online resource may comprise: creating, based on therequest for collecting evidence of infringement, an infringementevidence collection task, the infringement evidence collection taskcomprising the evidence of infringement from the address of the onlineresource; and executing the infringement evidence collection task in atrusted environment.

In an embodiment, after storing verification information of the evidenceof infringement on a blockchain, the method may further compriseobtaining, from the blockchain, a certificate of trusted evidence forthe infringement evidence, the certificate comprising the address of theonline resource, an address of a block on the blockchain storing theverification information, or identity information of a sender of therequest for collecting evidence of infringement.

In an embodiment, the storing the evidence of infringement in a cloudstorage space may comprise: obtaining a packaged file comprising theinfringement evidence; storing the packaged file in the cloud storagespace; and obtaining an access address of the packaged file in the cloudstorage space.

In an embodiment, the method may further comprise sending, to a senderof the request for collecting evidence of infringement, the verificationinformation, the packaged file, the access address of the packaged file,and the certificate of trusted evidence.

In an embodiment, the infringement evidence may comprise a routingprocess associated with the address of the online resource, aresponsiveness status associated with the address of the onlineresource, content associated with the address of the online resource, ascreenshot image associated with the address of the online resource, ora video record associated with the address of the online resource.

In an embodiment, the verification information of the evidence ofinfringement may comprise a digest of the infringement evidence, or asignature by a node associated with the blockchain on the digest of theinfringement evidence.

According to another aspect, a system for blockchain-based evidencestorage is provided. The system may comprise a processor and anon-transitory computer-readable storage medium storing instructionsexecutable by the processor to cause the system to perform operationscomprising: obtaining a request for collecting evidence of infringementby an online resource, wherein the request comprises an address of theonline resource; obtaining the evidence of infringement from the addressof the online resource; storing verification information of the evidenceof infringement on a blockchain; and storing the evidence ofinfringement in a cloud storage space.

According to another aspect, a non-transitory computer-readable storagemedium for blockchain-based evidence storage is provided. The storagemedium may be configured with instructions executable by one or moreprocessors to cause the one or more processors to perform operationscomprising: obtaining a request for collecting evidence of infringementby an online resource, wherein the request comprises an address of theonline resource; obtaining the evidence of infringement from the addressof the online resource; storing verification information of the evidenceof infringement on a blockchain; and storing the evidence ofinfringement in a cloud storage space.

When obtaining the infringement evidence against the Internet infringingresource, an infringement evidence collection request for the Internetinfringing resource can be obtained, and the infringement evidencecollection request carries an infringement address of the Internetinfringing resource. Based on the infringement evidence collectionrequest, the infringement evidence of the Internet infringing resourceis obtained from the infringement address, and irreversible verificationinformation of the infringement evidence is then uploaded to ablockchain. Due to the characteristic that information recorded in ablockchain is immutable and the characteristic that a method forgenerating the irreversible verification information is irreversible,uploading the irreversible verification information of the infringementevidence to the blockchain may enable the verifications of authenticityand validity of the infringement evidence for future uses of theinfringement evidence, and improve the trustworthiness of the obtainedinfringement evidence.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings described in the specification are used toprovide a further understanding of the specification and constitute apart of the specification. The embodiments of the specification anddescription of the embodiments are used to explain the specification,and do not constitute limitations to the specification.

FIG. 1 is a flow chart of a method for blockchain-based infringementevidence storage according to some embodiments of the specification.

FIG. 2 is a schematic diagram of an application of the method forblockchain-based infringement evidence storage in a scenario accordingto some embodiments of the specification.

FIG. 3 is a schematic structural diagram of an apparatus forblockchain-based infringement evidence storage according to someembodiments of the specification.

FIG. 4 is a schematic structural diagram of an electronic deviceaccording to some embodiments of the specification.

DETAILED DESCRIPTION

To make objectives, technical solutions, and advantages of thespecification clearer, the technical solutions of the specification willbe clearly and completely described below with reference to theembodiments and the accompanying drawings of the specification. Thedescribed embodiments merely include some, but not all, embodiments ofthe specification. Based on the embodiments of the specification, allother embodiments obtainable by one of ordinary skill in the art withoutcreative effort shall fall within the scope of the specification.

The technical solutions provided in the embodiments of the specificationwill be described in detail below with reference to the accompanyingdrawings.

To solve the existing problem that it is possible that some infringementrecords collected by an infringed party are be altered, the embodimentsof the specification provide a method for blockchain-based infringementevidence storage. Entities to execute the method provided by theembodiments of the specification may include, but are not limited to, atleast one of apparatuses including a content capture platform andothers, which can be configured to execute the method provided by theembodiments of the specification.

For ease of description, a content capture platform capable of executingthe method is used as an example as an entity to execute the method todescribe implementation of the method. The entity executes the methodmay include, but not limited to, a content capture platform.

According to one or more embodiments of the specification, a flow chartof a method for blockchain-based infringement evidence storage is shownin FIG. 1. The method comprises the following steps.

In Step 110, a request for collecting evidence of infringement (i.e., aninfringement evidence collection request) by an online resource (i.e.,an Internet infringing resource) is obtained, wherein the requestcomprises an address of the online resource (i.e., an infringementaddress of the Internet infringing resource.)

An Internet infringing resource may include original works, such as anoriginal novel, an original essay, and the like, of an original author.An infringer forwards, cites, or even plagiarizes the Internetinfringing resource on a website without an authorization by theoriginal author. In other words, an Internet infringing resource mayoften correspond to one or more infringement addresses. In order toobtain infringement evidence of the Internet infringing resource, aninfringement address of the Internet infringing resource needs to beobtained, and the infringement evidence of the Internet infringingresource is obtained from the infringement address.

In an embodiment, an infringement address of the Internet infringingresource may often be in a form of Uniform Resource Locator (URL). TheURL is a concise representation of locations and access methods ofresources that may be obtained from the Internet, and is an address ofstandard resources on the Internet. Each file on the Internet has aunique URL, and the information comprised in the URL indicates alocation of the corresponding file and how a browser should process theURL.

In an embodiment, if an infringed party (such as an original author ofan article A) finds, while browsing a webpage a, that the interfacedisplayed by the webpage comprises a large portion and amount of textsof the article A, without referring to the reference source or beingauthorized by the infringed party, then, the content displayed by thewebpage may constitute an infringement action against the infringedparty. To safeguard his/her own rights and interests, the infringedparty may initiate an infringement evidence collection request forcollecting evidence of infringement for the Internet infringing resourceto an infringement evidence collection platform, and incorporate the URLof the webpage a in the infringement evidence collection request. Theinfringement evidence collection platform obtains, based on theinfringement evidence collection request, the infringement evidence ofthe webpage a from the URL of the webpage a.

In Step 120, based on the infringement evidence collection request, theevidence of infringement is obtained from the address of the onlineresource.

In some embodiments of the specification, to prevent the evidencecollection process from being affected by external factors which makesthe obtained infringement evidence lack trustworthiness, theinfringement evidence collection platform may complete the entireevidence collection process in a trusted environment, which may be aportable container isolated from the external environment.

Then, based on the infringement evidence collection request, obtainingthe infringement evidence of the Internet infringing resource from theinfringement address comprises: creating, based on the infringementevidence collection request, an infringement evidence collection task,the infringement evidence collection task comprising obtaininginfringement evidence of the Internet infringing resource from theinfringement address; and activating a trusted environment and executingthe infringement evidence collection task in the trusted environment.

In an embodiment, the trusted environment may be realized through aDocker container. The Docker container is an open-source applicationcontainer engine. Developers may package applications and dependentpackages that they have developed into a portable Docker container, andthen publish them to any popular Linux machines. Alternatively,virtualization may be achieved. Moreover, the Docker container fullyadopts the sandbox mechanism. There is no interface nor mutual impactbetween Docker containers. With the trusted environment realized by theDocker container, it can be ensured that the execution of aninfringement evidence collection task in the Docker container will notbe affected by the external environment, such that the obtainedinfringement evidence of the Internet infringing resource has highertrustworthiness.

There is no mutual impact between Docker containers due to the absenceof any interface between the Docker containers. Therefore, in one ormore embodiments of the specification, a terminal infringement evidencecollection platform may receive a plurality of infringement evidencecollection requests from a plurality of infringed parties, wherein eachinfringement evidence collection task may carry an infringement addressof a corresponding Internet infringing resource. Based on the pluralityof infringement evidence collection requests, a plurality ofcorresponding infringement evidence collection tasks are created. Eachinfringement evidence collection task may comprise obtaininginfringement evidence of the corresponding Internet infringing resourcefrom the corresponding infringement address. Finally, a plurality ofcorresponding trusted environments, i.e., a plurality of Dockercontainers, are activated to execute, in parallel, respectiveinfringement evidence collection tasks in the plurality of Dockercontainers.

In one or more embodiments of the specification, after the infringementevidence of the Internet infringing resource is obtained from theinfringement address based on the infringement evidence collectionrequest, to facilitate courts and other relevant judicial agencies tosearch for the infringement evidence of the Internet infringing resourcewhen safeguarding the infringed party's interests at a later time, theinfringement evidence may be packaged, uploaded, and stored in a presetcloud storage space, and an access address of the infringement evidencereturned by the preset cloud storage space may be obtained.

After the infringement evidence of the Internet infringing resource isobtained from the infringement address based on the infringementevidence collection request, the method further comprises: packaging theinfringement evidence to obtain a packaged file of the infringementevidence; and uploading and storing the packaged file of theinfringement evidence to the preset cloud storage space, and obtainingan access address of the packaged file of the infringement evidencereturned by the preset cloud storage space.

In one or more embodiments of the specification, the access address ofthe infringement evidence returned by the preset cloud storage space maybe effective only for a period of time, to prevent the infringementevidence from being disseminated with no restriction. In other words,the access address of the infringement evidence can be accessed only ina preset effective period of time, such as 3 days or 7 days. Afterobtaining the access address of the infringement evidence, the infringedparty or a court and other relevant judicial agencies can only accessthe access address of the infringement evidence within the preseteffective period of time from the day when the access address isobtained. After the preset effective period of time expires, the accessaddress of the infringement evidence becomes invalid.

In one or more embodiments of the specification, to ensure the legaleffect of the infringement evidence, the infringement evidence maycomprise at least one piece of the following information: a routingprocess of the infringement address; a response state or aresponsiveness status obtained after the infringement address isaccessed; response content associated with the infringement addressobtained after the infringement address is accessed; a screenshot imageof a page after the infringement address is accessed; and a video recordof a page after the infringement address is accessed.

Herein, the routing process of the infringement address is a requestprocess of the infringement evidence collection platform for accessingthe infringement address via a browser. The responsiveness statusassociated with the infringement address may comprise a responding stateand a non-responding state. The responding state indicates that theinfringement address can be normally accessed by a browser. Thenon-responding state indicates that the infringement address cannot benormally accessed by a browser, such that the infringement address maybe invalid, incorrect, or have other issues. The response contentassociated with the infringement address may comprise the contentdisplayed after the infringement address is accessed by a browser, suchas text information, image information, or video information. Thescreenshot image associated with the infringement address may comprise ascreenshot image of an interface displayed after the infringementaddress is accessed and rendered by a browser.

To better present evidence for some Internet infringing resourcesrelated to video resources in a later judicial procedure, a video recordassociated with the infringement address may also be obtained as theinfringement evidence of the Internet infringing resources.

In Step 130, verification information (i.e., irreversible verificationinformation) of the evidence of infringement is stored on a blockchain.

Because of the limited storage space of each block in a blockchain, datathat takes up a large space may not be suitable for storage. Theinfringement evidence often comprises images and even videos. If theentire infringement evidence is uploaded to the blockchain, it mayimpose a storage burden on the storage space of the blockchain. In thiscase, an irreversible encryption algorithm, such as a digest algorithm,may be used to encrypt the original content (i.e., the originalinfringement evidence) to obtain the irreversible verificationinformation of the original content. Then, the irreversible verificationinformation of the original infringement evidence is stored in theblockchain.

In some embodiments, the irreversible verification information of theinfringement evidence comprises at least one of the following: a digestof the infringement evidence; and a signature by an infringementevidence collection node in the blockchain on the digest of theinfringement evidence.

Herein, the irreversible encryption algorithm is a one-way encryptionalgorithm, which can process an original file (i.e., the originalinfringement evidence) into characters of a fixed length. Commonirreversible encryption algorithms may include MD5, SHA series, and thelike. In the embodiments of the specification, the infringement evidencemay be encrypted using an irreversible encryption algorithm to obtain adigest of the infringement evidence, and the digest of the infringementevidence may be uploaded to the blockchain. Alternatively, the digest ofthe infringement evidence may be signed through a private key of aninfringement evidence collection node, and the signature may be uploadedto the blockchain.

In one or more embodiments of the specification, to confirm that theirreversible verification information of the infringement evidence hasbeen uploaded to the blockchain and to ensure that the infringementevidence is trustworthy, after the irreversible verification informationof the infringement evidence is uploaded to the blockchain, the methodfurther comprises obtaining a certificate of trusted evidence for theinfringement evidence that is returned by the blockchain.

Herein, to ensure the traceability after the irreversible verificationinformation of the infringement evidence is uploaded to the blockchain,the certificate of trusted evidence for the infringement evidencecomprises at least one of the following: an infringement address of theInternet infringing resource; a block address on the blockchain wherethe irreversible verification information of the infringement evidenceis stored; and identity information of a requester, such as a sender, ofthe infringement evidence collection request.

For example, the identity information of a requester corresponding tothe infringement evidence collection request may include identityinformation like names and contact information of the requester.

It is very difficult to tamper with data in a blockchain due to thestorage mechanism of the blockchain, thus, the data is substantiallyimmutable. Based on this characteristic of the blockchain, data in ablockchain may be considered as immutable and trustworthy data.

To improve the trustworthiness of the infringement evidence, thecertificate of trusted evidence for the infringement evidence may bepre-authenticated uniformly by courts and other relevant judicialagencies. In other words, certain consensus is reached among courts andother relevant judicial agencies that the legal effect of thecertificate of trusted evidence for the infringement evidence isunanimously recognized.

In one or more embodiments of the specification, to enable a requestercorresponding to the infringement evidence collection request, such asan infringed party or a court and other relevant judicial agencies, toobtain the infringement evidence and to verify the trustworthiness ofthe infringement evidence, after the access address of the infringementevidence returned by the preset cloud storage space is obtained, themethod further comprises receiving a request of obtaining theinfringement evidence from the requester corresponding to theinfringement evidence collection request, and sending a digest of theinfringement evidence, the packaged file of the infringement evidence,the access address of the infringement evidence, and the certificate oftrusted evidence of the infringement evidence to the requestercorresponding to the infringement evidence collection request.

For example, the irreversible verification information of theinfringement evidence may comprise a digest of the infringementevidence. After obtaining the digest of the infringement evidence andthe access address of the infringement evidence, the requestercorresponding to the infringement evidence collection request maycalculate a digest of the infringement evidence based on the fullinfringement evidence, and compare the calculated digest of theinfringement evidence with the obtained digest of the infringementevidence. If the calculated digest of the infringement evidence is thesame as the obtained digest of the infringement evidence, it indicatesthat the infringement evidence has not been tampered with and istrustworthy. At the same time, the certificate of trusted evidence forthe infringement evidence further enhances the trustworthiness of theinfringement evidence.

For another example, the irreversible verification information of theinfringement evidence may comprise a signature by an infringementevidence collection node on the digest of the infringement evidence.After obtaining the signature by an infringement evidence collectionnode on the digest of the infringement evidence and the access addressof the infringement evidence, the requester corresponding to theinfringement evidence collection request may calculate a digest of theinfringement evidence based on the full infringement evidence, decryptthe obtained signature by an infringement evidence collection node onthe digest of the infringement evidence using a public key to obtain adecrypted digest, and compare the decrypted digest with the obtaineddigest of the infringement evidence. If the calculated digest of theinfringement evidence is the same as the obtained digest of theinfringement evidence, it indicates that the infringement evidence hasnot been tampered with and is trustworthy. At the same time, thecertificate of trusted evidence for the infringement evidence furtherenhances the trustworthiness of the infringement evidence.

The method provided in the embodiments of the specification will bedescribed in detail below with the flow chart of an application of themethod for blockchain-based infringement evidence storage in a scenarioas shown in FIG. 2. As shown in FIG. 2, the implementation process ofthe method for blockchain-based infringement evidence storage involvesan infringed party, an infringement evidence collection platform, acloud storage space, and a blockchain, and the method may comprise, thefollowing main steps.

In S21, an infringed party submits an infringement address of anInternet infringing resource to an infringement evidence collectionplatform, wherein the infringement address may include a URL of theInternet infringing resource.

In S22, the infringement evidence collection platform creates, based onthe infringement address of the Internet infringing resource submittedby the infringed party, an infringement evidence collection task,wherein the infringement evidence collection task comprises obtainingthe infringement evidence of the Internet infringing resource from theinfringement address of the Internet infringing resource.

To facilitate a relevant judicial agency to enter an infringementjudgment at a later time against an infringer of the Internet infringingresource, the infringement evidence may comprise a routing responseprocess, a request header, a responsiveness status, and response contentof the infringement address of the Internet infringing resource, ascreenshot image and/or screen video of a page after the infringementaddress of the Internet infringing resource is opened and rendered by abrowser, and the like.

In S23, the infringement evidence collection platform activates atrusted environment, for example, a Docker container having an isolationfunction, to execute the infringement evidence collection task in thetrusted environment (e.g., a Docker container).

In S24, the infringement evidence collection platform activates abrowser in the trusted environment, and accesses the infringementaddress of the Internet infringing resource via the browser, to obtaininfringement evidence of the Internet infringing resource.

In S25, the infringement evidence collection platform determines whetherinfringement evidence of the Internet infringing resource may beobtained in the trusted environment.

If the infringement evidence of the Internet infringing resource issuccessfully obtained, the method proceeds to S26. If the infringementevidence of the Internet infringing resource is not successfullyobtained, the entire process flow is ended.

In S26, the infringement evidence collection platform packages andstores the obtained infringement evidence of the Internet infringingresource into the cloud storage space, and an access address of theinfringement evidence returned by the cloud storage space is obtained.The cloud storage space may include Object Storage Service (OSS).

In S27, the infringement evidence collection platform calculates andobtains a digest of the infringement evidence of the Internet infringingresource.

In S28, the infringement evidence collection platform uploads the digestof the Internet infringing evidence to the blockchain.

In S29, the infringement evidence collection platform receives acertificate of trusted evidence issued by the blockchain on the digestof the infringement evidence of the Internet infringing resource.

In S210, the infringement evidence collection platform returns thedigest and packaged file of the infringement evidence of the Internetinfringing resource, the access address of the infringement evidence ofthe Internet infringing resource, and the certificate of trustedevidence for the infringement evidence to the infringed party.

When obtaining the infringement evidence against the Internet infringingresource, an infringement evidence collection request for the Internetinfringing resource can be obtained, and the infringement evidencecollection request may carry an infringement address of the Internetinfringing resource. Based on the infringement evidence collectionrequest, the infringement evidence of the Internet infringing resourceis obtained from the infringement address, and irreversible verificationinformation of the infringement evidence is then uploaded to ablockchain. Due to the characteristic that information recorded in ablockchain is immutable and the characteristic that a method forgenerating the irreversible verification information is irreversible,uploading the irreversible verification information of the infringementevidence to the blockchain may enable the verifications of authenticityand validity of the infringement evidence for future uses of theinfringement evidence, and improve the trustworthiness of the obtainedinfringement evidence.

FIG. 3 is a schematic structural diagram of an apparatus 300 forblockchain-based infringement evidence storage according to someembodiments of the specification. Referring to FIG. 3, in a softwareimplementation, the apparatus 300 for blockchain-based infringementevidence storage may comprise a first obtaining unit 301, a secondobtaining unit 302, and an uploading unit 303.

The first obtaining unit 301 is configured to obtain an infringementevidence collection request for an Internet infringing resource, and theinfringement evidence collection request may include an infringementaddress of the Internet infringing resource.

The second obtaining unit 302 is configured to obtain, based on theinfringement evidence collection request, infringement evidence of theInternet infringing resource from the infringement address.

The uploading unit 303 is configured to upload irreversible verificationinformation of the infringement evidence to a blockchain.

According to some embodiments of the specification, when obtaining theinfringement evidence against the Internet infringing resource, theapparatus 300 for blockchain-based infringement evidence storage canobtain an infringement evidence collection request for the Internetinfringing resource through the first obtaining unit 301, and theinfringement evidence collection request may carry an infringementaddress of the Internet infringing resource. Based on the infringementevidence collection request, the infringement evidence of the Internetinfringing resource from the infringement address may be obtainedthrough the second obtaining unit 302, and then irreversibleverification information of the infringement evidence is uploaded to ablockchain through the uploading unit 303. Due to the characteristicthat information recorded in a blockchain is immutable and thecharacteristic that a method for generating the irreversibleverification information is irreversible, uploading the irreversibleverification information of the infringement evidence to the blockchainmay enable the verifications of authenticity and validity of theinfringement evidence for future uses of the infringement evidence, andimprove the trustworthiness of the obtained infringement evidence.

In one embodiment, the second obtaining unit 302 is configured tocreate, based on the infringement evidence collection request, aninfringement evidence collection task, the infringement evidencecollection task may comprise obtaining infringement evidence of theInternet infringing resource from the infringement address, activating atrusted environment, and executing the infringement evidence collectiontask in the trusted environment.

In one embodiment, after the uploading unit 303 uploads irreversibleverification information of the infringement evidence to the blockchain,the apparatus further comprises a third obtaining unit (not shown)configured to obtain a certificate of trusted evidence for theinfringement evidence that is returned by the blockchain.

In one embodiment, after the second obtaining unit 302 obtains, based onthe infringement evidence collection request, the infringement evidenceof the Internet infringing resource from the infringement address, theapparatus further comprises an evidence packaging unit (not shown)configured to package the infringement evidence to obtain a packagedfile of the infringement evidence, and a first uploading unit (notshown) configured to upload the packaged file of the infringementevidence to a preset cloud storage space and obtain an access address ofthe infringement evidence returned by the preset cloud storage space.

In one embodiment, after the first uploading unit obtains an accessaddress of the infringement evidence returned by the preset cloudstorage space, the apparatus further comprises a receiving unit (notshown) configured to receive an request of obtaining the infringementevidence from a requester corresponding to the infringement evidencecollection request, and a sending unit (not shown) configured to send adigest of the infringement evidence, the packaged file of theinfringement evidence, the access address of the infringement evidence,and the certificate of trusted evidence for the infringement evidence tothe requester corresponding to the infringement evidence collectionrequest.

In one embodiment, the certificate of trusted evidence of theinfringement evidence comprises at least one of the following: aninfringement address of the Internet infringing resource; a blockaddress on the blockchain where the irreversible verificationinformation of the infringement evidence is stored; and identityinformation of the requester or sender of the infringement evidencecollection request.

In one embodiment, the infringement evidence comprises at least onepiece of the following information: a routing process of theinfringement address; a response state or responsiveness status afterthe infringement address is accessed; response content after theinfringement address is accessed; a screenshot image after theinfringement address is accessed; and a video after the infringementaddress is accessed.

In one embodiment, the irreversible verification information of theinfringement evidence comprises at least one of a digest of theinfringement evidence and a signature by an infringement evidencecollection node in the blockchain on the digest of the infringementevidence.

The apparatus 300 for blockchain-based infringement evidence storage canimplement the methods in the method embodiments shown in FIG. 1 to FIG.2. Reference may be made to the method for blockchain-based infringementevidence storage of the embodiments shown in FIG. 1 to FIG. 2, whichwill not be elaborated herein.

FIG. 4 is a schematic structural diagram of an electronic deviceaccording to some embodiments of the specification. Referring to FIG. 4,on a hardware level, the electronic device comprises a processor, andmay further comprise an internal bus, a network interface, and a storagedevice, wherein the storage device may comprise a memory, such as aRandom-Access Memory (RAM) and may further comprise a non-volatilememory, such as at least one magnetic disk. The electronic device mayfurther comprise hardware required by other transactions.

The processor, the network interface, and the storage device may beconnected to each other via the internal bus. The internal bus may be anIndustry Standard Architecture (ISA) bus, a Peripheral ComponentInterconnect (PCI) bus, or an Extended Industry Standard Architecture(EISA) bus. The bus may be divided into an address bus, a data bus, or acontrol bus. For ease of presentation, only one two-way arrow is used inFIG. 4, which does not indicate only one bus or one type of buses isused.

The storage device is configured to store a program. For example, theprogram may comprise program codes, and the program codes comprisecomputer operation instructions. The storage device may comprise amemory and a non-volatile memory, and provide instructions and data tothe processor.

The processor reads a corresponding computer program into the memoryfrom the non-volatile memory and then runs the computer program to formthe apparatus for blockchain-based infringement evidence storage on thelogic level. The processor executes the program stored in the memory andis configured, for example, to execute the following operations:obtaining an infringement evidence collection request for an Internetinfringing resource, the infringement evidence collection requestcomprising an infringement address of the Internet infringing resource;obtaining, based on the infringement evidence collection request,infringement evidence of the Internet infringing resource from theinfringement address; uploading irreversible verification information ofthe infringement evidence to a blockchain; and storing the infringementevidence in a cloud storage space.

When obtaining the infringement evidence against the Internet infringingresource, an infringement evidence collection request for the Internetinfringing resource can be obtained, and the infringement evidencecollection request may carry an infringement address of the Internetinfringing resource. Based on the infringement evidence collectionrequest, the infringement evidence of the Internet infringing resourceis obtained from the infringement address, and irreversible verificationinformation of the infringement evidence is then uploaded to ablockchain. Due to the characteristic that information recorded in ablockchain is immutable and the characteristic that a method forgenerating the irreversible verification information is irreversible,uploading the irreversible verification information of the infringementevidence to the blockchain may enable the verifications of authenticityand validity of the infringement evidence for future uses of theinfringement evidence, and improve the trustworthiness of the obtainedinfringement evidence.

The above-described method for blockchain-based infringement evidencestorage disclosed by the embodiments shown in FIG. 1 to FIG. 2 of thespecification may be applied to the processor or implemented by theprocessor. The processor may be an integrated circuit chip and hassignal processing capabilities. In an embodiment, steps of theabove-described method may be completed by a hardware integrated logiccircuit or an instruction in the form of software in the processor. Theabove-described processor may be a general-purpose processor, includinga Central Processing Unit (CPU), a Network Processor (NP) and the like,and may also be a Digital Signal Processor (DSP), an ApplicationSpecific Integrated Circuit (ASIC), a Field-Programmable Gate Array(FPGA) or other programmable logic devices, discrete gates, transistorlogic devices, and discrete hardware components, which can implement orexecute various methods, steps and logic block diagrams disclosed in oneor more embodiments of the specification. The general-purpose processormay be a micro-processor, or the processor may be any conventionalprocessor. Steps of the method disclosed in combination with one or moreembodiments of the specification may be directly embodied as beingexecuted and completed by a hardware decoding processor or by acombination of hardware and software modules in a decoding processor.The software modules may be located in a mature storage medium in theart, such as a random-access memory, a flash memory, a read-only memory,a programmable read-only memory or an electrically erasable programmablememory, a register, and the like. The storage medium is located in thestorage device, and the processor reads information in the storagedevice and completes steps of the above-described method in combinationwith the hardware of the processor.

When the functions disclosed herein are implemented in the form ofsoftware functional units and sold or used as independent products, theycan be stored in a processor executable non-volatile computer readablestorage medium. Particular technical solutions disclosed herein (inwhole or in part) or aspects that contributes to current technologiesmay be embodied in the form of a software product. The software productmay be stored in a storage medium, comprising a number of instructionsto cause a computing device (which may be a personal computer, a server,a network device, and the like) to execute all or some steps of themethods of the embodiments. The storage medium may comprise a flashdrive, a portable hard drive, ROM, RAM, a magnetic disk, an opticaldisc, another medium operable to store program code, or any combinationthereof.

Particular embodiments further provide a system comprising a processorand a non-transitory computer-readable storage medium storinginstructions executable by the processor to cause the system to performoperations corresponding to steps in any method of the embodimentsdisclosed above. Particular embodiments further provide a non-transitorycomputer-readable storage medium configured with instructions executableby one or more processors to cause the one or more processors to performoperations corresponding to steps in any method of the embodimentsdisclosed above.

The electronic device may be further configured to implement the methodfor blockchain-based infringement evidence storage shown in FIG. 1 toFIG. 2, which will not be elaborated herein.

In addition to the software implementation, the electronic deviceaccording to the specification does not exclude other implementations,such as logic devices or a combination of software and hardware. Inother words, the execution entities of the following processing flow arenot limited to various logic units, but may also be hardware or logicdevices.

In summary, the above description includes only some embodiments of thespecification, which do not limit the scope of the specification. Anymodifications, equivalent substitutions, improvements, etc. made withinthe spirit and principle of one or more embodiments of the specificationshall fall within the scope of one or more embodiments of thespecification.

The system, device, module, or unit elaborated in the embodiments may beachieved by a computer chip or entity or by a product having a function.One typical implementation apparatus is a computer, and a form of thecomputer may be a personal computer, a laptop computer, a cellulartelephone, a camera phone, a smart phone, a personal digital assistant,a media player, a navigation device, an email device, a game console, atablet computer, a wearable device, or a combination of any of the aboveapparatuses.

Computer readable media include both permanent and non-permanent, mobileand non-mobile media and may store information by any method ortechnology. The information may be a computer readable instruction, adata structure, a module of a program or other data. Examples ofcomputer storage media include, but are not limited to, a phase changememory (PRAM), a static random access memory (SRAM), a dynamic randomaccess memory (DRAM), other types of random access memory (RAM), a readonly memory (ROM), an electrically erasable programmable read-onlymemory (EEPROM), a flash memory or other memory technologies, aread-only optical disk read-only memory (CD-ROM), a digital versatiledisc (DVD) or other optical storages, a magnetic tape cassette, amagnetic disk storage or other magnetic storage devices or any othernon-transmission medium for storing information that may be accessed bycomputing devices. As defined in the specification, the computerreadable media do not include non-transitory media, such as modulateddata signals and carriers.

It should be further noted that the terms of “including,” “comprising,”or any other variants of the terms are intended to encompass anon-exclusive inclusion, causing a process, method, product, or devicecomprising a series of elements to not only comprise these elements, butalso comprise other elements that are not clearly listed, or furthercomprise elements that are inherent to the process, method, product, ordevice. When there is no further restriction, elements defined by thestatement “comprising one . . . ” does not exclude that a process,method, product, or device comprising the above elements furthercomprises additional identical elements.

The various embodiments in the specification are described in aprogressive manner, the same or similar parts between the variousembodiments may refer to each other, and each embodiment focuses on thedifferences from the other embodiments. In particular, since the systemembodiments are substantially similar to the method embodiments, thesystem embodiments are described in a relatively simple manner, and thedescription of relevant parts of the method embodiments may bereferenced.

What is claimed is:
 1. A computer-implemented method, comprising:obtaining a request for collecting information associated with anInternet address; obtaining, in response to the request, the informationfrom the Internet address; encrypting the information to obtain adigest; storing the digest in a block on a blockchain and theinformation in a cloud storage space associated with an access address;and sending, to a sender of the request, the digest and the accessaddress associated with the cloud storage space.
 2. The method of claim1, wherein the information associated with the Internet addresscomprises: a routing process associated with the Internet address; aresponsiveness status associated with the Internet address; contentassociated with the Internet address; a screenshot image associated withthe Internet address; or a video record associated with the Internetaddress.
 3. The method of claim 1, further comprising: obtaining adigital signature by a node associated with the blockchain on thedigest; and storing the digital signature on the blockchain.
 4. Themethod of claim 1, wherein the obtaining the information from theInternet address comprises: obtaining the information in a trustedenvironment comprising a portable container isolated from an externalenvironment.
 5. The method of claim 4, wherein the portable containercomprises a Docker container.
 6. The method of claim 1, furthercomprising: obtaining, from the blockchain, a certificate of trustedevidence, the certificate comprising the Internet address, an address ofthe block on the blockchain storing the digest, or identity informationof the sender of the request.
 7. The method of claim 6, wherein thestoring the information in a cloud storage space comprises: obtaining apackaged file comprising the information; storing the packaged file inthe cloud storage space; and obtaining the access address, according towhich the packaged file in the cloud storage space is accessible.
 8. Themethod of claim 7, further comprising: sending, to the sender of therequest, the packaged file and the certificate of trusted evidence. 9.One or more non-transitory computer-readable storage media, configuredwith instructions executable by one or more processors to cause the oneor more processors to perform operations comprising: obtaining a requestfor collecting information associated with an Internet address;obtaining, in response to the request, the information from the Internetaddress; encrypting the information to obtain a digest; storing thedigest in a block on a blockchain and the information in a cloud storagespace associated with an access address; and sending, to a sender of therequest, the digest and the access address associated with the cloudstorage space.
 10. The media of claim 9, wherein the informationassociated with the Internet address comprises: a routing processassociated with the Internet address; a responsiveness status associatedwith the Internet address; content associated with the Internet address;a screenshot image associated with the Internet address; or a videorecord associated with the Internet address.
 11. The media of claim 9,wherein the operations further comprise: obtaining a digital signatureby a node associated with the blockchain on the digest; and storing thedigital signature on the blockchain.
 12. The media of claim 9, whereinthe obtaining the information from the Internet address comprises:obtaining the information in a trusted environment comprising a portablecontainer isolated from an external environment.
 13. The media of claim12, wherein the portable container comprises a Docker container.
 14. Themedia of claim 9, wherein the operations further comprise: obtaining,from the blockchain, a certificate of trusted evidence, the certificatecomprising the Internet address, an address of the block on theblockchain storing the digest, or identity information of the sender ofthe request.
 15. The media of claim 14, wherein the storing theinformation in a cloud storage space comprises: obtaining a packagedfile comprising the information; storing the packaged file in the cloudstorage space; and obtaining the access address, according to which thepackaged file in the cloud storage space is accessible.
 16. The media ofclaim 15, wherein the operations further comprise: sending, to thesender of the request, the packaged file and the certificate of trustedevidence.
 17. A system, comprising a processor and a non-transitorycomputer-readable storage medium storing instructions executable by theprocessor to cause the system to: obtain a request for collectinginformation associated with an Internet address; obtain, in response tothe request, the information from the Internet address; encrypt theinformation to obtain a digest; store the digest in a block on ablockchain and the information in a cloud storage space associated withan access address; and send, to a sender of the request, the digest andthe access address associated with the cloud storage space.
 18. Thesystem of claim 17, wherein the information associated with the Internetaddress comprises: a routing process associated with the Internetaddress; a responsiveness status associated with the Internet address;content associated with the Internet address; a screenshot imageassociated with the Internet address; or a video record associated withthe Internet address.
 19. The system of claim 17, wherein theinstructions are further executable by the processor to cause the systemto: obtain a digital signature by a node associated with the blockchainon the digest; and store the digital signature on the blockchain. 20.The system of claim 17, wherein the obtaining the information from theInternet address comprises: obtaining the information in a trustedenvironment comprising a portable container isolated from an externalenvironment.