CN109167961A - Security protection video backup method and system, ordinary node - Google Patents

Security protection video backup method and system, ordinary node Download PDF

Info

Publication number
CN109167961A
CN109167961A CN201811109979.0A CN201811109979A CN109167961A CN 109167961 A CN109167961 A CN 109167961A CN 201811109979 A CN201811109979 A CN 201811109979A CN 109167961 A CN109167961 A CN 109167961A
Authority
CN
China
Prior art keywords
security protection
backup
protection video
node
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811109979.0A
Other languages
Chinese (zh)
Inventor
张平
陈浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jiuzhou Electric Appliance Co Ltd
Original Assignee
Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiuzhou Electric Appliance Co Ltd filed Critical Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority to CN201811109979.0A priority Critical patent/CN109167961A/en
Publication of CN109167961A publication Critical patent/CN109167961A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The present invention relates to field of security technologies, more particularly to a kind of security protection video backup method and system, ordinary node.Method includes: the backup request for receiving client and sending, and backup request includes the download address of backup security protection video, and client has been stored with backup security protection video;According to the download address of backup security protection video, backup security protection video is downloaded;Backup security protection video is packaged into block data, and the block data is sent to miner's node, so that block data after common recognition is verified block data, is packaged into block and be written in block chain by miner's node.On the one hand, since block chain node each in block chain can back up security protection video, to reduce the single probability for being stored in specific cloud server and being easily lost security protection video, the safety of backup security protection video is further increased.On the other hand, since block chain has the characteristics that can not to distort, decentralization and highly transparent, it being capable of reliable security protection video.

Description

Security protection video backup method and system, ordinary node
Technical field
The present invention relates to field of security technologies, more particularly to a kind of security protection video backup method and system, ordinary node.
Background technique
With the development of information technology, the safety of information is more and more important, especially in safety-security area, the view of safety monitoring Frequency solves a case for the police, understands some material facts and plays key effect.
When traditional approach backup security protection video, security protection video is uploaded to cloud server by local server, however, cloud Server is easy to be interfered by network attack or other emergency events, causes to lose some important security protection videos.
Summary of the invention
One purpose of the embodiment of the present invention is intended to provide a kind of security protection video backup method and system, ordinary node, energy Enough safeties for improving backup security protection video.
In order to solve the above technical problems, the embodiment of the present invention the following technical schemes are provided:
In a first aspect, the embodiment of the present invention provides a kind of security protection video backup method, applied to ordinary node, the side Method includes:
The backup request that client is sent is received, the backup request includes the download address of backup security protection video, described Client has been stored with the backup security protection video;
According to the download address of the backup security protection video, the backup security protection video is downloaded;
The backup security protection video is packaged into block data, and the block data is sent to miner's node, so that The block data is packaged into block and the area is written by miner's node after common recognition is verified the block data In block chain.
Optionally, the backup request further includes the signature and identity information of the client, and the client is configured with The private key of private key and public key, the client is saved by the client, and the public key broadcasts of the client are in the block chain In;
The backup request for receiving client and sending, comprising:
According to the public key of the client, judge whether the signature is legal;
If the signature is legal, the backup request that the client is sent is responded;
If the signature is illegal, it is not responding to the backup request that the client is sent.
Optionally, the ordinary node is configured with private key and public key, and the private key of the ordinary node is by the ordinary node It saves, for the public key broadcasts of the ordinary node in the block chain, the ordinary node is also corresponding with the node address of itself;
It is described that the backup security protection video is packaged into block data, and the block data is sent to miner's node, So that the block data after common recognition is verified the block data, is packaged into block and institute is written by miner's node It states in block chain, comprising:
According to it is described itself node address and the ordinary node private key, generate block signature;
Block signature is packaged into block data with the backup security protection video, and the block data is sent to Miner's node so that miner's node when it is legal for verifying the block signature, remakes common recognition verifying, and is verified in common recognition After the block data, the block data is packaged into block and is written in the block chain, wherein the block Block head record has the node address of the block signature and the ordinary node.
Optionally, the method also includes:
After downloading the backup security protection video, the intelligent contract of the ordinary node is triggered, so that the ordinary node Verify whether the backup security protection video is damaged;
It is described that the backup security protection video is packaged into block data, comprising:
According to check results, the backup security protection video is packaged into block data.
Optionally, described according to check results, the backup security protection video is packaged into block data, comprising:
If the backup security protection video is damaged, each video frame of the backup security protection video is converted into security protection figure Piece, and each security protection picture is packaged into block data;
If the backup security protection video is not damaged, the backup security protection video is packaged into block data.
In second aspect, the embodiment of the present invention provides a kind of security protection video back-up device, is applied to ordinary node, the dress It sets and includes:
Receiving module, for receiving the backup request of client transmission, the backup request includes backup security protection video Download address, the client have been stored with the backup security protection video;
Download module downloads the backup security protection video for the download address according to the backup security protection video;
Sending module for the backup security protection video to be packaged into block data, and the block data is sent to Miner's node, so that miner's node is packaged into area after common recognition is verified the block data, by the block data Block is simultaneously written in the block chain.
Optionally, the backup request further includes the signature and identity information of the client, and the client is configured with The private key of private key and public key, the client is saved by the client, and the public key broadcasts of the client are in the block chain In;The receiving module is specifically used for:
According to the public key of the client, judge whether the signature is legal;
If the signature is legal, the backup request that the client is sent is responded;
If the signature is illegal, it is not responding to the backup request that the client is sent.
In the third aspect, the embodiment of the present invention provides a kind of ordinary node, comprising:
At least one processor;And
The memory being connect at least one described processor communication;Wherein, the memory be stored with can by it is described extremely The instruction that a few processor executes, described instruction are executed by least one described processor, so that at least one described processing Device can be used in executing described in any item security protection video backup methods.
In fourth aspect, the embodiment of the present invention provides a kind of security protection video standby system, comprising:
Several video cameras;
Several clients, the client and the video camera communicate;
Several ordinary nodes, the ordinary node and the user client communication;And
Miner's node, miner's node and the ordinary node communicate.
At the 5th aspect, the embodiment of the present invention provides a kind of non-transient computer readable storage medium, the non-transient meter Calculation machine readable storage medium storing program for executing is stored with computer executable instructions, and the computer executable instructions are for executing ordinary node Described in any item security protection video backup methods.
At the 6th aspect, the embodiment of the present invention provides a kind of computer program product, and the computer program product includes The computer program being stored on non-volatile computer readable storage medium storing program for executing, the computer program include program instruction, when When described program instruction is executed by ordinary node, the ordinary node is made to execute described in any item security protection video backup methods.
In the security protection video backup method and system, ordinary node that each embodiment of the present invention provides, firstly, receiving visitor The backup request that family end is sent, backup request includes the download address of backup security protection video, and client has been stored with backup security protection Video.Secondly, downloading backup security protection video according to the download address of backup security protection video.Again, backup security protection video is packaged It is sent to miner's node at block data, and by block data, so that miner's node after common recognition is verified block data, is incited somebody to action Block data is packaged into block and is written in block chain.On the one hand, since block chain node each in block chain can back up Security protection video further increases standby to reduce the single probability for being stored in specific cloud server and being easily lost security protection video The safety of part security protection video.On the other hand, it can not be distorted since block chain has, the spy of decentralization and highly transparent Point therefore being capable of reliable security protection video.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these exemplary theorys The bright restriction not constituted to embodiment, the element in attached drawing with same reference numbers label are expressed as similar element, remove Non- to have special statement, composition does not limit the figure in attached drawing.
Fig. 1 is that the embodiment of the present invention provides a kind of framework model schematic diagram of block chain network;
Fig. 2 is that the embodiment of the present invention provides a kind of structural schematic diagram of security protection video standby system;
Fig. 3 is that the embodiment of the present invention provides a kind of flow diagram of security protection video backup method;
Fig. 4 is that the embodiment of the present invention provides a kind of structural schematic diagram of security protection video back-up device;
Fig. 5 is that the embodiment of the present invention provides a kind of structural schematic diagram of ordinary node.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.
Block chain technology is also known as distributed account book technology, is a kind of distributed interconnection database technology.Based on block The network of chain technology building can be referred to as block chain network, and block chain network includes multiple block chain nodes, each node At least one block chain is corresponded to, contains at least one block on each block chain.Block chain technology has decentralization, openly It is transparent, can not distort, trusted the features such as, therefore, block chain technical applications are more and more extensive.
Referring to Fig. 1, Fig. 1 is that the embodiment of the present invention provides a kind of framework model schematic diagram of block chain network.Such as Fig. 1 institute Show, which includes data Layer 11, network layer 12, common recognition layer 13 and intelligent contract layer 14.
Data Layer 11 encapsulates bottom data block and the basic datas such as relevant data encryption and timestamp and basic Algorithm.Network layer 12 includes distributed networking mechanism, data dissemination mechanism and data authentication mechanism etc..Layer 13 of knowing together encapsulates net All kinds of common recognition algorithms of network node.Intelligent contract layer 14 encapsulates all kinds of scripts, algorithm and intelligent contract.
The security protection video backup method of the embodiment of the present invention, can in any suitable type, with the block of operational capability It is executed in chain node, such as in server, desktop computer, smart phone, tablet computer and other electronic products.Wherein, Server herein can be a physical server or multiple physical servers it is virtual made of a logical server.Clothes Business device be also possible to it is multiple can interconnected communication server composition server zone, and each functional module can be respectively distributed to take It is engaged on each server in device group.
The security protection video back-up device of the embodiment of the present invention can be used as software systems, be independently arranged at above-mentioned block chain link In point, the one of functional module of integration in the processor can also be used as, the security protection video for executing the embodiment of the present invention is standby Part method.
Block chain provided in an embodiment of the present invention includes such as publicly-owned block chain (Public Block Chains), joint Block chain (Consortium Block Chains) and privately owned block chain (Private Block Chains).
Referring to Fig. 2, Fig. 2 is that the embodiment of the present invention provides a kind of structural schematic diagram of security protection video standby system.Such as Fig. 2 Shown, security protection video standby system 200 includes video camera 20, client 21, ordinary node 22 and miner's node 23.
Video camera 20 is arranged at safety monitoring, for acquiring security protection video.The security protection video of 20, video camera acquisitions It is uploaded to client 21.
Client 21 is communicated with 22 communication connection of video camera 20 and ordinary node, ordinary node 22 and miner's node 23 respectively Connection.Wherein, ordinary node 22 and agent node 23 are used as block chain node, and point is supported in the communication between block chain node two-by-two To a communication modes (Point to point communication, P2P), each block chain node is all stored with comprising security protection The block of data.
Client 21 can connect multiple video cameras 20, summarize the security protection video that each video camera 20 uploads.Wherein, client 21 can be any one following electronic equipment: television set, smart phone, computer, palm PC (Personal Digital Assistant, PDA), tablet computer, e-book etc..
Client 11 has display screen, and display screen can be Touch Screen or non-touch-control screen, can be TFT screen Curtain (Thin Film Transistor, TFT thin film transistor), TFD screen (Thin Film Diode, TFD film Diode), UFB screen (Ultra Fine Bright, UFB), STN screen (Super Twisted Nematic, STN), OLED screen curtain (Organic Light-Emitting Diode, OLED Organic Light Emitting Diode), AMOLED screen (Active Matrix/Organic Light Emitting Diode, AMOLED active matrix organic light emitting diode panel), and wait Deng.
Monitor can check the case where each video camera 20 shooting by client 11.
Client 11 supports the installation of various application programs, one or more desktop in such as following application program is answered With program: drawing application program, demonstration applications, word-processing application, spreadsheet applications, game application journey Sequence, telephony application, videoconference application, email application, instant message application program, training are supported to answer With program, photo application, digital camera application program, digital video recorder application program, web page browsing application program, number Music player application program, video frequency player application program and etc..In some embodiments, some application programs It include contact person, such as: telephony application, email application, instant message application program etc..
Ordinary node 22 holds the electronic money of circulation, and the right of vote by ballot is possessed in block catenary system.Common section Point 22 can carry out relationship trading operation, but the not packing book keeping operation power of block, can only be from the miner for possessing packing book keeping operation power Synchronous recording block data at node 23.
When ordinary node 22 receives backup security protection video, backup security protection video is packaged into block by ordinary node 22 Data, and block data is sent to miner's node 23.
Ordinary node 22 is encoded with intelligent contract code, wherein the maintenance of ordinary node 22 has intelligent contract list, the intelligence Contract list records are able to carry out each miner's list node of intelligent contract.Ordinary node 22 transfers intelligent contract list, from Each miner address of node is found out in intelligent contract list, and sends security protection data to each agent node.
In the present embodiment, ordinary node 22 can prestore multiple types intelligence contract, can be sent out according to client 21 The trigger request sent parses the execution type of intelligent contract.Execution of the ordinary node 22 further according to the intelligent contract parsed Type executes corresponding intelligent contract.
Ordinary node 22 handles backup security protection video according to intelligent contract, for example, ordinary node 22 will back up security protection video It is packaged into block data, and is signed to the block data, and the block data after signature is transmitted to miner's node 23. Miner's node 23 is using the block data after the public key verifications signature of ordinary node 22, if being proved to be successful, then it is assumed that after the signature Block data be that legal ordinary node 22 is sent, it is subsequent that common recognition processing then is carried out to the block data.If verifying not at Function, then it is assumed that the block data after the signature is that illegal ordinary node is sent.For example, ordinary node 22 uses own private key pair The Hash content of current block makees signature operation, obtains the signature.
Miner's node 23, which is used to know together, verifies the block data that ordinary node 22 uploads.Wherein, miner's node 23 can prop up Hold it is following any one common recognition algorithm: proof of work (Proof of Work, PoW), equity prove (Proof of Stake, POS), share authorisation verification (Delegate proof of Stake, DPoS), practical Byzantine failure tolerance (practical Byzantine Fault Tolerance, PBFT), authorization Byzantine failure tolerance (Delegated Byzantine FaultTolerance, DBFT) etc..
Block is the carrier for storing security protection video, and each block all includes block head and block body, and block head is recorded Information for identifying the position of block itself, the informative abstract of previous block and block in entire account book.Block body It is not tampered for storing security protection video and verifying security protection video and save security protection video.
Block chain is to connect each block one by one according to the sequence for generating the time, just forms the number of a chain type According to storage organization.In entire block chain, first block is known as creating generation block, and block height is 0, each block later Block height successively add 1, and the cryptographic Hash of previous block head is written in block head.Each block on block chain it Between linked by the upper block head cryptographic Hash on each block.
Therefore, block chain have can not tamper.Based on this, the embodiment of the present invention provides a kind of security protection video backup side Method.
Referring to Fig. 3, Fig. 3 is that the embodiment of the present invention provides a kind of flow diagram of security protection video backup method.Such as Fig. 3 Shown, security protection video backup method S300 includes:
S31, the backup request that client is sent is received, backup request includes the download address of backup security protection video, client End has been stored with backup security protection video;
In some embodiments, client receives the security protection video of video camera shooting, at this point, client is to the security protection video It detects, if detecting, the security protection video includes important picture, and client selects the security protection video to make back-up processing, then, visitor The download address of the security protection video is packaged into backup request by family end, and sends backup request to ordinary node.If detecting this Security protection video does not include important picture, and only the security protection video is locally stored for client.
In some embodiments, backup request further includes the signature and identity information of client, and client is configured with private key It is saved with the private key of public key, client by client, the public key broadcasts of client are in block chain.Ordinary node receives client When the backup request of transmission, ordinary node judges whether signature is legal according to the public key of client first;It is general if signature is legal The backup request that logical node customer in response end is sent;If the signature is illegal, ordinary node is not responding to the backup of client transmission Request.
In this manner, it can prevent illegitimate client from arbitrarily backing up security protection video.
S32, according to the download address of backup security protection video, download backup security protection video;
In the present embodiment, ordinary node is according to the download address of backup security protection video, directly and quickly from client pair Path is answered to download the backup security protection video.
S33, backup security protection video is packaged into block data, and block data is sent to miner's node, so that miner Block data is packaged into block and is written in block chain by node after common recognition is verified block data.
On the one hand, since block chain node each in block chain can back up security protection video, to reduce single storage It is easily lost the probability of security protection video in specific cloud server, further increases the safety of backup security protection video.Another party Face, since block chain has the characteristics that can not to distort, decentralization and highly transparent, being capable of reliable security protection view Frequently.
In some embodiments, ordinary node is configured with private key and public key, and the private key of ordinary node is saved by ordinary node, For the public key broadcasts of ordinary node in block chain, ordinary node is also corresponding with the node address of itself.Ordinary node pacifies backup Anti- video is packaged into block data, and when block data is sent to miner's node, firstly, node of the ordinary node according to itself The private key of address and ordinary node generates block signature.It is packaged into secondly, ordinary node signs block with backup security protection video Block data, and block data is sent to miner's node, so that miner's node remakes altogether when it is legal for verifying block signature Know verifying, and after common recognition is verified block data, block data is packaged into block and is written in block chain.When miner saves When point verifying block signature is illegal, the block data is abandoned.
In the present embodiment, the block head record of block has the node address of block signature and ordinary node.It is subsequent, it is other The legitimacy that block chain node can be signed according to block with the node address of ordinary node verifying block, to improve block chain Safety.
In some embodiments, ordinary node triggers the intelligent contract of ordinary node after downloading backup security protection video, with Make whether ordinary node verification backup security protection video is damaged.Secondly, ordinary node will back up security protection video according to check results It is packaged into block data.For example, ordinary node judges whether backup security protection video is damaged, if the backup security protection video is damaged It is bad, each video frame for backing up security protection video is converted into security protection picture, and each security protection picture is packaged into block data, because This, although ordinary node has not been able to be saved in complete video pictures, its video frame that can skip damage is saved big absolutely Partial video frame, further possibly to save the most information of security protection video.It, will be standby if backup security protection video is not damaged Part security protection video is packaged into block data.
In some embodiments, miner's node is using share authorisation verification algorithm as common recognition mechanism.
Some miners fall into failure or do evil and (do not sign verifying new block chain data), in order to guarantee block catenary system energy Enough normally to go out block, remaining miner can make view update, stop failure or the common recognition right for the miner that does evil.Therefore, in some realities It applying in example, miner knows together during verifying block data, when detecting that the number of common recognition authentication failed is greater than preset threshold, The common recognition server zone of miner's composition determines that malice miner, malice miner are not sign verifying block data and common recognition is caused to be verified The most node of the frequency of failure.The common recognition server zone of miner's composition forbids malice miner to participate in common recognition verifying, and remaining Miner, which redistributes share and knows together, verifies block data, for example, the miner A that accounting is 10% does evil, then, common recognition is taken first Business device group stops the ballot right of miner A, secondly, common recognition server distributes to the accounting 10% of miner A according to preset rules Remaining miner, for example, giving remaining miner, alternatively, distributing to remaining node according to the work age of miner, the work age is got over Long, distribution accounting is higher, and the work age is shorter, and distribution accounting is lower.
Again, common recognition server zone continues common recognition and tests when the number for detecting common recognition authentication failed is less than preset threshold Demonstrate,prove block data.
Using such mode, guarantee that block catenary system can smoothly go out block.
It should be noted that not necessarily there is centainly successive between above steps in above-mentioned each embodiment Sequentially, those of ordinary skill in the art, according to an embodiment of the present invention to describe to be appreciated that in different embodiments, above-mentioned each step Suddenly there can be the different sequences that executes, also i.e., it is possible to execute parallel, execution etc. can also be exchanged.
As the another aspect of the embodiment of the present invention, the embodiment of the present invention provides a kind of security protection video back-up device.This hair The security protection video back-up device of bright embodiment can be used as one of SFU software functional unit, if security protection video back-up device includes Dry instruction, some instructions are stored in memory, and the accessible memory of processor, call instruction is executed, with complete At above-mentioned security protection video backup method.
Referring to Fig. 4, Fig. 4 is that the embodiment of the present invention provides a kind of structural schematic diagram of security protection video back-up device, security protection Video backup device 400 is applied to ordinary node.As shown in figure 4, security protection video back-up device 400 include: receiving module 41, under Carry module 42 and sending module 43.
Receiving module 41 is used to receive the backup request of client transmission, and the backup request includes backup security protection video Download address, the client have been stored with the backup security protection video;
Download module 42 is used for the download address according to the backup security protection video, downloads the backup security protection video;
Sending module 43 is used to the backup security protection video being packaged into block data, and the block data is sent to Miner's node, so that miner's node is packaged into area after common recognition is verified the block data, by the block data Block is simultaneously written in the block chain.
On the one hand, since block chain node each in block chain can back up security protection video, to reduce single storage It is easily lost the probability of security protection video in specific cloud server, further increases the safety of backup security protection video.Another party Face, since block chain has the characteristics that can not to distort, decentralization and highly transparent, being capable of reliable security protection view Frequently.
In some embodiments, backup request further includes the signature and identity information of the client, and the client is matched It is equipped with private key and public key, the private key of the client is saved by the client, and the public key broadcasts of the client are in the area In block chain;The receiving module 41 is specifically used for: according to the public key of the client, judging whether the signature is legal;If institute It states that signature is legal, responds the backup request that the client is sent;If the signature is illegal, it is not responding to what the client was sent Backup request.
It should be noted that security protection video provided by the executable embodiment of the present invention of above-mentioned security protection video back-up device is standby Part method, has the corresponding functional module of execution method and beneficial effect.It is not detailed in security protection video back-up device embodiment The technical detail of description, reference can be made to security protection video backup method provided by the embodiment of the present invention.
As the another aspect of the embodiment of the present invention, the embodiment of the present invention provides a kind of ordinary node.As shown in figure 5, The ordinary node 500 includes: one or more processors 51 and memory 52.Wherein, it is with a processor 51 in Fig. 5 Example.
Processor 51 can be connected with memory 52 by bus or other modes, to be connected as by bus in Fig. 5 Example.
Memory 52 is used as a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software journey Sequence, non-volatile computer executable program and module, such as the Document Editing side based on block chain in the embodiment of the present invention Corresponding program instruction/the module of method.Processor 51 is by running the non-volatile software program being stored in memory 52, instruction And module, thereby executing the various function application and data processing of security protection video back-up device, i.e. the realization above method is real Apply the function of the modules of a security protection video backup method and above-mentioned apparatus embodiment.
Memory 52 may include high-speed random access memory, can also include nonvolatile memory, for example, at least One disk memory, flush memory device or other non-volatile solid state memory parts.In some embodiments, memory 52 Optional includes the memory remotely located relative to processor 51, these remote memories can pass through network connection to processor 51.The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Described program instruction/module is stored in the memory 52, is held when by one or more of processors 51 When row, the security protection video backup method in above-mentioned any means embodiment is executed, for example, executing each step of Fig. 3 described above Suddenly;It can also realize the function of modules described in attached drawing 4.
The embodiment of the invention also provides a kind of nonvolatile computer storage media, the computer storage medium storage There are computer executable instructions, which is executed by one or more processors, such as at one in Fig. 5 Device 51 is managed, may make said one or multiple processors that the security protection video backup side in above-mentioned any means embodiment can be performed Method, for example, execute the security protection video backup method in above-mentioned any means embodiment, for example, execute execution described above with The execution of upper description each step shown in Fig. 3 described above;It can also realize the function of modules described in attached drawing 4.
Device or apparatus embodiments described above is only schematical, wherein it is described as illustrated by the separation member Unit module may or may not be physically separated, and the component shown as modular unit can be or can also Not to be physical unit, it can it is in one place, or may be distributed on multiple network module units.It can basis It is actual to need that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It is realized by the mode of software plus general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, above-mentioned technology Scheme substantially in other words can be embodied in the form of software products the part that the relevant technologies contribute, the computer Software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are with directly To computer equipment (can be personal computer, server or the network equipment etc.) execute each embodiment or Method described in certain parts of embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;At this It under the thinking of invention, can also be combined between the technical characteristic in above embodiments or different embodiment, step can be with It is realized with random order, and there are many other variations of different aspect present invention as described above, for simplicity, they do not have Have and is provided in details;Although the present invention is described in detail referring to the foregoing embodiments, the ordinary skill people of this field Member is it is understood that it is still possible to modify the technical solutions described in the foregoing embodiments, or to part of skill Art feature is equivalently replaced;And these are modified or replaceed, each reality of the application that it does not separate the essence of the corresponding technical solution Apply the range of a technical solution.

Claims (10)

1. a kind of security protection video backup method is applied to ordinary node, which is characterized in that the described method includes:
The backup request that client is sent is received, the backup request includes the download address of backup security protection video, the client End has been stored with the backup security protection video;
According to the download address of the backup security protection video, the backup security protection video is downloaded;
The backup security protection video is packaged into block data, and the block data is sent to miner's node, so that described The block data is packaged into block and the block chain is written by miner's node after common recognition is verified the block data In.
2. the method according to claim 1, wherein the backup request further include the client signature with Identity information, the client are configured with private key and public key, and the private key of the client is saved by the client, the client The public key broadcasts at end are in the block chain;
The backup request for receiving client and sending, comprising:
According to the public key of the client, judge whether the signature is legal;
If the signature is legal, the backup request that the client is sent is responded;
If the signature is illegal, it is not responding to the backup request that the client is sent.
3. the method according to claim 1, wherein the ordinary node be configured with private key and public key, it is described general The private key of logical node is saved by the ordinary node, and the public key broadcasts of the ordinary node are described common in the block chain Node is also corresponding with the node address of itself;
It is described that the backup security protection video is packaged into block data, and the block data is sent to miner's node, so that The block data is packaged into block and the area is written by miner's node after common recognition is verified the block data In block chain, comprising:
According to it is described itself node address and the ordinary node private key, generate block signature;
Block signature is packaged into block data with the backup security protection video, and the block data is sent to miner Node, so that miner's node remakes common recognition verifying, and be verified in common recognition when it is legal for verifying the block signature After the block data, the block data is packaged into block and is written in the block chain, wherein the block of the block Head record has the node address of the block signature and the ordinary node.
4. method according to any one of claims 1 to 3, which is characterized in that
The method also includes:
After downloading the backup security protection video, the intelligent contract of the ordinary node is triggered, so that the ordinary node verifies Whether the backup security protection video is damaged;
It is described that the backup security protection video is packaged into block data, comprising:
According to check results, the backup security protection video is packaged into block data.
5. according to the method described in claim 4, it is characterized in that, described according to check results, by the backup security protection video It is packaged into block data, comprising:
If the backup security protection video is damaged, each video frame of the backup security protection video is converted into security protection picture, and Each security protection picture is packaged into block data;
If the backup security protection video is not damaged, the backup security protection video is packaged into block data.
6. a kind of security protection video back-up device, it is applied to ordinary node, which is characterized in that described device includes:
Receiving module, for receiving the backup request of client transmission, the backup request includes the downloading of backup security protection video Address, the client have been stored with the backup security protection video;
Download module downloads the backup security protection video for the download address according to the backup security protection video;
The block data for the backup security protection video to be packaged into block data, and is sent to miner by sending module Node, so that miner's node is packaged into block simultaneously after common recognition is verified the block data, by the block data It is written in the block chain.
7. device according to claim 6, which is characterized in that the backup request further include the client signature with Identity information, the client are configured with private key and public key, and the private key of the client is saved by the client, the client The public key broadcasts at end are in the block chain;The receiving module is specifically used for:
According to the public key of the client, judge whether the signature is legal;
If the signature is legal, the backup request that the client is sent is responded;
If the signature is illegal, it is not responding to the backup request that the client is sent.
8. a kind of ordinary node characterized by comprising
At least one processor;And
The memory being connect at least one described processor communication;Wherein, be stored with can be by described at least one for the memory The instruction that a processor executes, described instruction is executed by least one described processor, so that at least one described processor energy It is enough in execution such as security protection video backup method described in any one of claim 1 to 5.
9. a kind of security protection video standby system characterized by comprising
Several video cameras;
Several clients, the client and the video camera communicate;
Several ordinary nodes as claimed in claim 8, the ordinary node and the user client communication;And
Miner's node, miner's node and the ordinary node communicate.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited Computer executable instructions are contained, the computer executable instructions are for executing ordinary node as claim 1 to 5 is any Security protection video backup method described in.
CN201811109979.0A 2018-09-21 2018-09-21 Security protection video backup method and system, ordinary node Pending CN109167961A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811109979.0A CN109167961A (en) 2018-09-21 2018-09-21 Security protection video backup method and system, ordinary node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811109979.0A CN109167961A (en) 2018-09-21 2018-09-21 Security protection video backup method and system, ordinary node

Publications (1)

Publication Number Publication Date
CN109167961A true CN109167961A (en) 2019-01-08

Family

ID=64879940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811109979.0A Pending CN109167961A (en) 2018-09-21 2018-09-21 Security protection video backup method and system, ordinary node

Country Status (1)

Country Link
CN (1) CN109167961A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138861A (en) * 2019-05-15 2019-08-16 北京中星微人工智能芯片技术有限公司 A kind of security protection Intelligentized method and device
CN111212276A (en) * 2020-04-22 2020-05-29 杭州趣链科技有限公司 Monitoring method, system, equipment and storage medium based on camera module
CN112235543A (en) * 2020-10-14 2021-01-15 重庆紫光华山智安科技有限公司 Video encryption method and system based on block chain
CN112365268A (en) * 2020-11-10 2021-02-12 深圳易派支付科技有限公司 Internet payment information system and method based on block chain architecture

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138861A (en) * 2019-05-15 2019-08-16 北京中星微人工智能芯片技术有限公司 A kind of security protection Intelligentized method and device
CN111212276A (en) * 2020-04-22 2020-05-29 杭州趣链科技有限公司 Monitoring method, system, equipment and storage medium based on camera module
CN112235543A (en) * 2020-10-14 2021-01-15 重庆紫光华山智安科技有限公司 Video encryption method and system based on block chain
CN112235543B (en) * 2020-10-14 2023-02-17 重庆紫光华山智安科技有限公司 Video encryption method and system based on block chain
CN112365268A (en) * 2020-11-10 2021-02-12 深圳易派支付科技有限公司 Internet payment information system and method based on block chain architecture

Similar Documents

Publication Publication Date Title
CN109167961A (en) Security protection video backup method and system, ordinary node
Campanile et al. Designing a GDPR compliant blockchain-based IoV distributed information tracking system
CN104520869B (en) Credible performing environment virtual machine clone
Rabai et al. A cybersecurity model in cloud computing environments
CN109117097A (en) A kind of date storage method and system based on block chain
CN102394887B (en) OAuth protocol-based safety certificate method of open platform and system thereof
Sang A log based approach to make digital forensics easier on cloud computing
CN105184154B (en) A kind of system and method that crypto-operation service is provided in virtualized environment
CN109472696A (en) Transaction in assets method, apparatus, storage medium and computer equipment
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
CN109376528A (en) A kind of trusted identity management system and method based on block chain
US20200344290A1 (en) Systems and methods for microservice execution load balancing in virtual distributed ledger networks
CN103023993A (en) Enterprise information system based on cloud computing
US9565562B1 (en) Knowledge based authentication using mobile devices
CN110061887B (en) Block chain-based traffic statistical method, device and equipment
US11763009B2 (en) Systems and methods for distributed complaint addressing ledger in virtual distributed ledger networks
Vacca Cyber security and IT infrastructure protection
CN109951490A (en) Webpage integrity assurance, system and electronic equipment based on block chain
CN104657887A (en) Network invoice management method based on tax control server
CN109194651A (en) A kind of identity identifying method, device, equipment and storage medium
Caballero Information security essentials for information technology managers: Protecting mission-critical systems
CN109408463A (en) Distributive file storage method and device, node server
CN109284630A (en) File editing method and system, agent node
CN109284191A (en) Security protection data balancing method and its system
CN109120714A (en) Security protection data reconstruction method and system, node server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190108

RJ01 Rejection of invention patent application after publication