CN112003888A - Block chain-based certificate management method, device, equipment and readable medium - Google Patents

Block chain-based certificate management method, device, equipment and readable medium Download PDF

Info

Publication number
CN112003888A
CN112003888A CN202010657334.1A CN202010657334A CN112003888A CN 112003888 A CN112003888 A CN 112003888A CN 202010657334 A CN202010657334 A CN 202010657334A CN 112003888 A CN112003888 A CN 112003888A
Authority
CN
China
Prior art keywords
certificate photo
photo
read
certificate
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010657334.1A
Other languages
Chinese (zh)
Other versions
CN112003888B (en
Inventor
郑嵩
韩家伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Emperor Technology Co Ltd
Original Assignee
Shenzhen Emperor Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Emperor Technology Co Ltd filed Critical Shenzhen Emperor Technology Co Ltd
Priority to CN202010657334.1A priority Critical patent/CN112003888B/en
Publication of CN112003888A publication Critical patent/CN112003888A/en
Application granted granted Critical
Publication of CN112003888B publication Critical patent/CN112003888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Abstract

The embodiment of the invention discloses a block chain-based certificate management method, a block chain-based certificate management device, computer equipment and a computer-readable storage medium, wherein the method comprises the following steps: acquiring a target certificate photo to be processed; determining identification information corresponding to the target certificate photo, and generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information; and determining certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code, and uploading the certificate photo uploading data to a preset storage node in a block chain. By adopting the invention, the safety of certificate photo management can be improved.

Description

Block chain-based certificate management method, device, equipment and readable medium
Technical Field
The invention relates to the technical field of computers, in particular to a block chain-based certificate management method and device, computer equipment and a computer readable medium.
Background
In the document handling scene such as identity cards, passports, and hong Kong and Macau passes, electronic documents are increasingly popular among people because of the convenience of using the electronic documents. However, the electronic certificate photo is stored and processed in a centralized storage mode at present, and data is centralized, so that the electronic certificate photo is conveniently and uniformly managed; moreover, whether the shooting time of each certificate photo is within a certain period is not considered, so that the shooting time cannot be judged in the certificate handling process.
In summary, in the centralized storage and management of the electronic certificate photo, the shooting time of the certificate photo cannot be determined, and the centralized storage method is also easy to cause loss or falsification of the electronic certificate photo, resulting in low security of certificate photo management.
Disclosure of Invention
In view of the above, it is necessary to provide a block chain based certificate management method, apparatus, computer device and computer readable medium.
A blockchain based method of credential management, the method comprising:
acquiring a target certificate photo to be processed;
determining identification information corresponding to the target certificate photo, and generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information;
and determining certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code, and uploading the certificate photo uploading data to a preset storage node in a block chain.
The identification information further comprises one or more of certificate photo categories, user identity information, digital receipt, photographing equipment information, photographing dates and reference certificate photo data corresponding to the target certificate photo;
the identity information comprises one or more of a name, a certificate identification code, a gender and an address;
the reference identification photo data comprises one or more of reference image data and image characteristic reference data corresponding to the target identification photo.
After the step of determining the identification information corresponding to the target certificate photo, the method further comprises the following steps:
according to a preset watermarking algorithm, the identification information is used as watermarking information and is written into the target certificate photo in a watermarking photo mode; the identification information includes at least the photographing date.
After the step of acquiring the target certificate photo to be processed, the method further comprises the following steps:
extracting image characteristic data in the target certificate photo;
and writing the image characteristic data into the target certificate photo in a watermark photo mode according to the preset watermark processing algorithm.
After the step of using the identification information as watermark information and writing the watermark information into the target certificate photo in the form of a watermark photo, the method further comprises the following steps:
according to a preset encryption algorithm, carrying out encryption processing on the watermark information, carrying out encryption processing on the image characteristic data, and carrying out encryption processing on the identification information;
calculating abstract information corresponding to the encrypted watermark information, the encrypted identification information and/or the encrypted image characteristic data as target abstract information;
the step of generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information further includes:
and generating the identification code according to the target abstract information.
Before the step of uploading the certificate photo uploading data to a preset storage node in a block chain, the method further includes:
and encrypting the target certificate photo according to a preset encryption algorithm to generate an encrypted certificate photo corresponding to the target certificate photo, and adding the encrypted certificate photo to the certificate photo uploading data.
After the step of acquiring the target certificate photo to be processed, the method further comprises the following steps:
acquiring standard data of a certificate photo, and judging whether the target certificate photo is matched with the standard data of the certificate photo;
under the condition that the target certificate photo is matched with the certificate photo standard data, the step of determining the identification information corresponding to the target certificate photo is executed;
and generating prompt information to prompt the user that the target certificate photo does not meet the requirement under the condition that the target certificate photo does not match the standard data of the certificate photo.
After the step of acquiring the target certificate photo to be processed, the method further comprises the following steps:
and cutting the target certificate photo according to preset size information.
Before the step of uploading the certificate photo uploading data to a preset storage node in a block chain, the method further includes:
acquiring a current uploading node identifier, wherein the current uploading node identifier comprises a user identifier and/or an equipment identifier;
judging whether a user or equipment corresponding to the current uploading node has certificate photo uploading authority or not according to the current uploading node identification based on the node of the block chain;
under the condition that the certificate photo uploading authority is possessed, the step of uploading the certificate photo uploading data to a preset storage node in a block chain is executed;
and generating prompt information to prompt that the current user does not have the operation authority under the condition that the certificate photo uploading authority is not provided.
Wherein the method further comprises:
receiving a certificate photo reading request, and determining a reading identifier included in the certificate photo reading request;
searching a target certificate photo corresponding to the reading identifier and a corresponding identification code in a storage node preset in the block chain according to the reading identifier to respectively serve as the certificate photo to be read and the identification code to be read;
judging whether the certificate photo to be read is matched with the identification code to be read;
under the condition that the certificate photo to be read is matched with the identification code to be read, acquiring the certificate photo to be read as a target reading certificate photo and returning;
and generating prompt information under the condition that the certificate photo to be read is not matched with the identification code to be read so as to prompt a user that the current certificate photo is unavailable.
Wherein, the step of judging whether the certificate photo to be read is matched with the identification code to be read further comprises:
according to the identification code to be read, determining contrast identification photo data corresponding to the identification code to be read, wherein the contrast identification photo data comprises one or more of the reference image data, the image characteristic reference data and the image characteristic data;
judging whether the certificate photo to be read is matched with the certificate photo comparison data;
under the condition that the certificate photo to be read is matched with the certificate photo comparison data, judging that the certificate photo to be read is matched with the identification code to be read;
and under the condition that the certificate photo to be read is not matched with the comparison certificate photo data, judging that the certificate photo to be read is not matched with the identification code to be read.
Wherein, the step of judging whether the certificate photo to be read is matched with the identification code to be read further comprises:
determining identification information and summary information corresponding to the identification code to be read as the identification information and the summary information to be read according to the identification code to be read;
calculating corresponding abstract comparison information according to the certificate photo to be read and the identification information to be read;
judging whether the summary comparison information is matched with the summary information to be read;
under the condition that the abstract comparison information is matched with the abstract information to be read, judging that the certificate photo to be read is matched with the identification code to be read;
and under the condition that the abstract comparison information is not matched with the abstract information to be read, judging that the certificate photo to be read is not matched with the identification code to be read.
Wherein, after the step of judging whether the certificate photo to be read is matched with the identification code to be read, the method further comprises the following steps:
determining a target photographing date corresponding to the identification code to be read and/or the watermark photo according to the identification code to be read and/or the watermark photo;
judging whether the certificate photo to be read is valid or not according to the target photographing date;
under the condition that the certificate photo to be read is valid, the step of obtaining the certificate photo to be read as a target reading certificate photo and returning is executed;
and under the condition that the certificate photo to be read is invalid, executing the step of generating prompt information to prompt a user that the current certificate photo is unavailable.
A block chain based certificate photo management apparatus, the apparatus comprising:
the certificate photo data acquisition module is used for acquiring a target certificate photo to be processed;
the identification code generation module is used for determining identification information corresponding to the target certificate photo and generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information;
and the certificate photo uplink module is used for determining the certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code, and uploading the certificate photo uploading data to a preset storage node in the block chain.
Wherein the apparatus further comprises:
the reading request receiving module is used for receiving a certificate photo reading request and determining a reading identifier included in the certificate photo reading request;
the data searching module is used for searching a target certificate photo corresponding to the reading identifier and a corresponding identification code in a preset storage node in the block chain according to the reading identifier to respectively serve as the certificate photo to be read and the identification code to be read;
the judging module is used for judging whether the certificate photo to be read is matched with the identification code to be read;
the certificate photo acquisition module is used for acquiring the certificate photo to be read as a target reading certificate photo and returning the target reading certificate photo under the condition that the certificate photo to be read is matched with the identification code to be read;
and the second prompting module is used for generating prompting information under the condition that the certificate photo to be read is not matched with the identification code to be read so as to prompt a user that the current certificate photo is unavailable.
A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of:
acquiring a target certificate photo to be processed;
determining identification information corresponding to the target certificate photo, and generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information;
and determining certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code, and uploading the certificate photo uploading data to a preset storage node in a block chain.
A computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
acquiring a target certificate photo to be processed;
determining identification information corresponding to the target certificate photo, and generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information;
and determining certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code, and uploading the certificate photo uploading data to a preset storage node in a block chain. The embodiment of the invention has the following beneficial effects:
after the block chain-based certificate license management method, device, computer equipment and computer readable medium are adopted, after a target certificate license needing to be stored and managed is obtained, an identification code is generated according to identification information and the like corresponding to the target certificate license, and then the target certificate license and the identification code are uploaded to nodes in the block chain together for storage. Namely, the identification information is written into the identification code, so that the possibility of tampering the identification code is reduced, and in the subsequent process of using the certificate photo, whether the target certificate photo is tampered or not can be verified through the identification code, so that the safety of certificate photo management is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
FIG. 1 is a schematic flow chart diagram illustrating a blockchain-based credential management method in one embodiment;
FIG. 2A is a schematic diagram of a target identification photo and an identification code in one embodiment;
FIG. 2B is a diagram illustrating an embodiment of a target identification photo and an identification code;
FIG. 2C is a schematic view of an embodiment of a target identification photo and an identification code;
FIG. 3 is a schematic flow diagram of a block chain-based credential management method in one embodiment;
FIG. 4 is a schematic flow diagram of a block chain-based credential management method in one embodiment;
FIG. 5 is a schematic flow chart diagram illustrating a block chain-based credential management method in one embodiment;
FIG. 6 is a flowchart illustrating a certificate copy reading process corresponding to a block chain-based certificate copy management method according to an embodiment of the present invention;
FIG. 7 is a flowchart illustrating a certificate copy reading process corresponding to a block chain-based certificate copy management method according to an embodiment of the present invention;
FIG. 8 is a flowchart illustrating a credential reading process corresponding to a block chain-based credential management method in an embodiment;
fig. 9 is a flowchart illustrating a certificate photo reading process corresponding to a block chain-based certificate photo management method according to an embodiment of the present invention;
FIG. 10 is a block diagram of an embodiment of a blockchain-based credential management device;
FIG. 11 is a block diagram of an embodiment of a blockchain-based credential management device;
fig. 12 is a block diagram illustrating a computer device for executing the above-described block chain-based certificate photo management method according to an embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to improve the security of electronic certificate photo management and reduce the possibility of tampering with the electronic certificate photo, in this embodiment, a block chain-based certificate photo management method is provided for improving the security of electronic certificate photo management.
The block chain-based certificate photo management method is used for a certificate photo management system for managing and storing electronic certificate photos, and can also be used for reading and using the electronic certificate photos under the condition that the electronic certificate photos need to be called.
Specifically, as shown in fig. 1, a block chain-based certificate management method is provided, which includes steps S102-S108 shown in fig. 1:
step S102: and acquiring the target certificate photo to be processed.
The target certificate photo to be processed is an electronic certificate photo uploaded by a user or acquired by preset certificate photo shooting equipment, for example, a person needing to be certified can shoot the certificate photo at the photographing equipment of a photo studio or a working hall, then the corresponding certificate photo is uploaded to a certificate photo management system or a preset storage area or a preset storage node (for example, a preset storage node in a block chain) by the corresponding photographing equipment or a certificate photo management system corresponding to the photographing equipment, and the subsequent confirmation, uploading, management and certification are performed by the certificate photo management system.
Step S104: and determining identification information corresponding to the target certificate photo, and generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information.
In this embodiment, when the target certificate photo to be processed is stored, information corresponding to the target certificate photo, such as a user name and identification card information, needs to be acquired and stored together.
In specific implementation, identification information corresponding to the target certificate photo is determined, wherein the identification information includes one or more of user identity information, digital receipt, photographing equipment information, certificate photo category, photographing date, reference certificate photo data and other identification information corresponding to the target certificate photo and a corresponding user.
The user identity information includes one or more of a plurality of information such as a name, a certificate identification code (identification information such as an identification number and a passport number), a gender, a nationality, an address and the like. The digital receipt is the receipt information corresponding to the shot target certificate photo. The photographing device information is information (such as a device number) of a photographing cabinet corresponding to the photographing of the target certificate or mechanism information corresponding to a photographing mechanism corresponding to the photographing of the target certificate. The certificate photo category refers to a certificate category for which photographing of a certificate photo is currently performed, for example, an identification card, a passport, a driver's license, and the like. The shooting date is date information corresponding to the shooting of the target certificate photo, and the shooting date can be obtained by obtaining the current date, wherein the current date is preferably the standard time of the national time service center.
In this embodiment, the reference identification photo data may be reference image data corresponding to the target identification photo (for example, the target identification photo), or may be image feature data (that is, image feature reference data) extracted from the target identification photo, and is used to compare the reference image data or the image feature reference data in the identification information in the process of using the photo in the future to determine whether the target identification photo is tampered.
In this embodiment, in order to ensure that the identification information corresponding to the photo is not tampered, the identification information needs to be stored in the form of an identification code. Specifically, in this embodiment, the identification code carrying the identification information may be an optical code, such as a multi-dimensional code, a two-dimensional code, etc., where the two-dimensional code is shown in fig. 2A and 2B, and may be an optical code including a biometric image, and the biometric image may be combined with the two-dimensional code (optical code) in an embedded manner or an externally-embedded manner, where fig. 2A shows the embedded manner and fig. 2B shows the externally-embedded manner. Specifically, an identification code corresponding to the target certificate photo is generated according to the target certificate photo and the corresponding identification information. Subsequently, corresponding identification information can be acquired by identifying the identification code; in the case where the identification information includes reference image data or image feature reference data corresponding to the target certificate photo, image data corresponding to the target certificate photo may also be acquired.
In other embodiments, the identification code may be in other display forms besides the multi-dimensional code, or the identification code may include other identification codes (i.e., include multiple identification codes) besides the multi-dimensional code.
Step S106: and determining the certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code.
After the target certificate photo and the corresponding identification code are determined, the data which are corresponding to the target certificate photo and need to be uploaded to a system can be determined, namely the data which are uploaded to the corresponding certificate photo are determined.
In one embodiment, the license photograph upload data includes the target license photograph, the corresponding identification code, and/or the corresponding identification information.
In another embodiment, the certificate photograph upload data may further include the target certificate photograph, identification information, and watermark information corresponding to the identification information.
The identification information is described by taking a photographing date as an example, the photographing date can be stored in the certificate photo uploading data in a plaintext manner, and the watermark information corresponding to the identification information can be obtained by processing the photographing date in a preset manner (such as an encryption means) and stored in the certificate photo uploading data in a non-plaintext manner. When the certificate photo is needed to be used for manufacturing the certificate in the later period, the non-plaintext watermark information can be changed into the plaintext photo taking date in a preset mode (such as a decryption means) and the photo taking date in the plaintext is compared with the photo taking date in the certificate photo uploading data to determine whether the certificate photo and the photo taking date are changed or not.
In another embodiment, the license upload data includes data generated from the target license, the identification information, and/or the identification code. And generating a corresponding synthetic photo according to the target certificate photo and the identification code, namely synthesizing the target certificate photo and the identification code into a picture. As shown in fig. 2C, in the example shown in fig. 2C, an identification code is stored in a blank area added to one side of the target certificate photo, and the identification code includes identification information corresponding to the target certificate photo. Further, in an embodiment, the blank area on one side of the target identification photo may further include a display of other data corresponding to the target identification photo. In other embodiments, the certificate photo uploading data further includes identification information uploaded together for comparison with identification information obtained by analyzing the identification code.
Step S108: and uploading the certificate photo uploading data to a preset storage node in a block chain.
In this step, the data uploaded by the certificate photo is uploaded to a preset storage node in the block chain, so as to realize storage and management of the target certificate photo to be processed. It should be noted that, in the certificate photo uploading data, under the condition that the target certificate photo, the identification information and the identification code pair are separated or combined, the target certificate photo, the identification information and the identification code are respectively uploaded to the block chain to respectively store the storage nodes corresponding to the target certificate photo, the identification information and the identification code, so as to respectively store the target certificate photo, the identification information and the identification code, and further reduce the possibility of tampering the target certificate photo.
It should be noted that, in this embodiment, the certificate photo management system is not necessarily connected to the block chain in real time, that is, if the current system is in a networking state, the certificate photo upload data is directly uploaded to a preset storage node in the block chain; otherwise, if the current system is in the state of disconnection without networking, the certificate photo uploading data is stored in a preset temporary storage area, and then the certificate photo uploading data is automatically uploaded to a preset storage node in the block chain under the condition of networking.
It should be noted that, in this embodiment, in order to ensure that the target certificate photo uploaded to the blockchain is not tampered, in this embodiment, before step S108, verification of the certificate photo upload data is also required. Specifically, the target certificate photo data are verified according to the identification code, so that the target certificate photo is not tampered before uploading. For example, before winding, image characteristic data is acquired through the optical code, and then the image characteristic data is compared with the image characteristic data of the target identification photo to confirm whether the target identification photo is modified.
In this embodiment, the chain is not modified after the control of the target credential chain by the blockchain. In addition, in this embodiment, before chaining the target certificate photo, the identification information corresponding to the target certificate photo is stored through the identification code, and is used for subsequently verifying the target certificate photo in the management and use processes of the target certificate photo, so that the possibility that the electronic certificate photo is tampered is further reduced, and the security of electronic certificate photo management is improved.
Furthermore, the blockchain also needs to perform authorization management on each node, and manages the authority of uploading, inquiring, reading and the like of equipment or users corresponding to the certificate photo management system connected to the blockchain, so as to further guarantee the authenticity and the safety of the certificate photo in the blockchain.
Therefore, before step S108, it is also necessary to verify whether or not the node (upload node) that uploads the target certificate photograph has the corresponding authority.
Specifically, as shown in fig. 3, the step S108: before uploading the certificate photo uploading data to a preset storage node in a block chain, the method further comprises the following steps:
step S1071: acquiring a current uploading node identifier, wherein the current uploading node identifier comprises a user identifier and/or an equipment identifier;
step S1072: judging whether a user or equipment corresponding to the current uploading node has certificate photo uploading authority or not according to the current uploading node identification based on the node of the block chain;
if yes, go to step S108;
if not, executing step S1073: and generating prompt information to prompt that the current user does not have the operation authority.
The current uploading node identification is an identification corresponding to the uploading node which uploads the certificate photo data currently and is used for identifying the identity of the current uploading node. Specifically, the current uploading node identifier may be a current user identifier, or may be an identifier of a current device (for example, a device identifier of a camera device) that uploads current certificate photo data. The current user is a user who logs in the equipment corresponding to the current target certificate photo or a user who logs in the certificate photo management system, the current user identification is the corresponding user identification, the current equipment is the equipment corresponding to the current target certificate photo, and the current equipment identification is the identification of the corresponding equipment. According to the current user identifier or the current device identifier, whether the corresponding device or user (i.e., the corresponding current uploading node) has the corresponding block chain operation authority or not can be determined. In this embodiment, based on authorization management of the block chain, it is determined whether the current uploading node has the certificate photo uploading authority. That is, in this embodiment, only when the current upload node has the certificate photo upload authority, the step S108 is executed to perform the uplink of the certificate photo upload data. Otherwise, the current uploading node does not have the certificate photo uploading authority, the fact that the chaining of the certificate photo uploading data cannot be executed is judged, and a corresponding prompt message is generated to prompt that the current user does not have the operation authority and cannot carry out the chaining of the target certificate photo.
In this embodiment, the block chain can not only upload and manage the target certificate photo, but also further store the reading or use records of the target certificate photo, which are not easy to be tampered because of being stored in the block chain, and can know which nodes the target certificate photo uses or prepares which certificates by virtue of the traceability characteristic of the data of the block chain, so as to further improve the security of electronic certificate photo management.
Further, in this embodiment, in order to further improve the security of electronic certificate photo management, before linking the target certificate photo, a data security encryption process corresponding to the target certificate photo and the identification code is also required, so as to reduce the possibility of tampering with data such as the target certificate photo.
Specifically, referring to fig. 4, the proposed block chain-based certificate management method further includes steps S102 to S1042 shown in fig. 4:
step S102: acquiring a target certificate photo to be processed;
step S1041: determining identification information corresponding to the target certificate photo;
step S1052: and according to a preset watermarking algorithm, the identification information is used as watermarking information and is written into the target certificate photo in a watermarking photo mode.
In this embodiment, it is also necessary to write the relevant information into the watermark photo through an information hiding technique. Specifically, according to a preset watermark processing algorithm, one or more items of identification information are used as watermark information, a watermark photo is written in, and the target certificate photo is processed according to the watermark photo.
In the present embodiment, for example, the photographing date is written in the watermark photo as watermark information by an information hiding technique, so that the photographing date is hidden in the watermark photo. In the subsequent process, the photo taking date of the written watermark photo can be acquired through the identification of the watermark photo so as to carry out the verification of the certificate photo.
Step S1053: extracting image characteristic data in the target certificate photo;
step S1054: and writing the image characteristic data into the target certificate photo in a watermark photo mode according to the preset watermark processing algorithm.
In this embodiment, the watermark photo may include the target certificate photo and/or image characteristic data corresponding to the target certificate photo, as well as the identification information written in the watermark photo. In specific implementation, one or more image characteristic data in the target certificate photo are extracted according to a preset characteristic extraction algorithm, then the image characteristic data are written into the watermark photo, and the target certificate photo is processed according to the watermark photo. In the subsequent process, the image characteristic data written into the watermark photo can be acquired through the identification of the watermark photo so as to carry out the verification of the certificate photo.
And performing digital watermarking processing by adopting algorithms such as a DC coefficient self-adaptive watermarking algorithm based on a Harris characteristic region, a digital watermarking algorithm based on Tchebichef moment and Logistic chaotic encryption and the like, and writing identification information, image characteristic data and the like into a watermark photo through an information hiding technology. And protecting the privacy information of the photo by using the identification information and the target certificate photo based on a photo privacy protection algorithm for generating a countermeasure network, and finally writing the related data into a block chain for storage.
In specific implementation, based on a DC coefficient self-adaptive watermarking algorithm of a Harris characteristic region, a Harris angular point weight is calculated through a weighted Harris angular point detection algorithm, and the Harris characteristic region is constructed according to the weight and the radius of the region, so that the geometric resistance of the algorithm is ensured; the self-adaptive strength embedding of the watermark is completed by comparing the DC coefficients of the B component and the G component of the local embedding region, and the robustness of the watermark algorithm to the conventional image attack is improved by the embedding algorithm in the frequency domain. The preset watermark processing algorithm ensures the invisibility of the watermark and the robustness to the conventional image attack, and simultaneously improves the geometric attack resistance of the watermark algorithm.
On the other hand, for the photo (target certificate photo) subjected to the watermarking, the watermarking data and the target certificate photo subjected to the watermarking can be respectively linked, and after the linking is completed or when the photo is used subsequently, the watermarking data corresponding to the target certificate photo needing to be used can be extracted and compared to confirm whether the target certificate photo is tampered. The uplink target certificate photo can comprise a certificate identification code, a digital receipt and the like in the identity information, so that the target certificate photo and the identity information can be associated with each other.
Step S1055: according to a preset encryption algorithm, carrying out encryption processing on the watermark information, carrying out encryption processing on the image characteristic data, and carrying out encryption processing on the identification information;
step S1056: and calculating abstract information corresponding to the encrypted watermark information, the encrypted identification information and/or the encrypted image characteristic data as target abstract information.
Step S1042: and generating the identification code according to the target identification photo and/or the identification information and the target abstract information.
Further, in this embodiment, not only the identification information and the like need to be protected by means of the watermark information, but also the watermark information and the feature value of the watermark photo need to be encrypted. Specifically, watermark information is extracted from the watermark photo, characteristic values (descriptive information of the photo, such as portrait position, hidden watermark position, pixel values and saturation of certain specific areas of the photo) in the watermark photo are extracted, the watermark information, identification information, photo description information, image characteristic data and the like are encrypted through national encryption including SM1, SM2 and the like or international encryption algorithms including AES, RSA and the like, abstract values are calculated through abstract algorithms including MD5, SHA-256 and the like, and the corresponding identification code is generated by the ciphertext and the abstract values through a preset identification code generation algorithm. During the encryption process, a corresponding public key or a corresponding secret key is set in an uploading node (equipment or a user) for uploading the current certificate photo data, and the encryption process is performed on the related data according to the public key or the secret key. That is to say, different public keys or secret keys are adopted for the certificate photo data uploaded by different uploading nodes, so that the corresponding certificate photo data can be traced according to the public keys or the secret keys, the historical processing flow and the like of the target certificate photo can be traced, and the possibility that the certificate photo data is tampered is further reduced.
In other embodiments, the identification code may be the aforementioned multi-dimensional code or two-dimensional code, and may also be other identification codes. For example, in this embodiment, an improved code system based on the QR code may be used to generate a comparison code surrounded by the optical graphic code and centered on the identification photo, and the comparison code is used as the identification code. The comparison code is separated from the certificate photo, and the comparison code and the certificate photo can be related through data in the comparison code and also can be related through the certificate photo in the comparison code.
A digital watermarking algorithm based on Tchebichef moment and Logistic chaotic encryption is provided, a new preset watermarking algorithm capable of resisting rotation and scaling attack is provided by taking NSCT transformation and SVD as theoretical bases and combining the geometric invariant characteristic of Tchebichef moment. The watermark is encrypted by using the Logistic chaotic encryption algorithm, so that the safety of the algorithm is improved. The preset watermarking algorithm and the preset encryption algorithm have good invisibility, can effectively resist rotation, scaling and other signal attacks, and show good robustness.
In this embodiment, in addition to performing watermark encryption on the identification information and the like, encryption processing may be performed on the target certificate photo itself to further reduce the possibility that the target certificate photo is tampered with. Specifically, in step S108, before uploading the certificate photo upload data to a preset storage node in the block chain, the method further includes: and encrypting the target certificate photo according to a preset encryption algorithm to generate an encrypted certificate photo corresponding to the target certificate photo, and adding the encrypted certificate photo to the certificate photo uploading data. That is, in the certificate photo uploading data, the encrypted certificate photo is used for replacing the target certificate photo as the certificate photo uploading data, so that the safety of certificate photo management is further improved.
Further, the requirements and standards of the electronic certificate photo for different purposes are different, in this embodiment, it is also necessary to check whether the target certificate photo to be processed has imaging quality, and the like, and then the qualified target certificate photo can enter the next link to continue the encryption and chain process of the certificate photo.
In this embodiment, according to the type of the target certificate photo corresponding to the current to-be-processed target certificate photo, corresponding certificate photo standard data related to the imaging quality, the image size parameter and the like are determined, and then whether the target certificate photo meets the certificate photo standard data is determined.
Specifically, in this embodiment, after the target identification photo is acquired in step S102, steps S1031 to S1033 shown in fig. 5 are further included:
step S1031: acquiring standard data of the certificate photo;
step S1032: judging whether the target certificate photo is matched with the certificate photo standard data;
if yes, go to step S104;
if not, step S1033 is executed: and generating prompt information to prompt the user that the target certificate photo does not meet the requirement.
The photo standards of different identification photos are different, for example, the requirements and standards of the identification photo and the passport photo for the electronic identification photo are different, and in the embodiment, the corresponding identification photo standard data is determined according to the identification photo type corresponding to the current target identification photo to be processed. Then, whether the target certificate photo is matched with the certificate photo standard data or not is judged according to the certificate photo standard data. If the target certificate photo is matched with the certificate photo standard data, the management of the electronic certificate photo can be continued, otherwise, if the target certificate photo is not matched with the certificate photo standard data, the current target certificate photo can not be used for subsequent certificate production, because corresponding prompt information needs to be generated to remind a user that the current target certificate photo does not meet the requirement, can not be used for certificate production, and needs to be shot again.
In another embodiment, not only is it necessary to determine whether the target certificate photograph complies with the certificate photograph standard data, but also pre-processing, such as trimming and cutting, is required on the original target certificate photograph to obtain the target certificate photograph which complies with the certificate production conditions. Specifically, after step S1032, if the target certificate photo matches the certificate photo standard data, before step S104, the method further includes step S1034 shown in fig. 5: and cutting the target certificate photo according to preset size information. That is, according to the type of the target certificate photo corresponding to the current target certificate photo to be processed, the corresponding size information (namely the preset size information) is obtained, and then the target certificate photo is cut according to the size information, so that the target certificate photo is cut into the electronic certificate photo matched with the preset size information.
In the embodiment, a related method and a flow for using the identification photo based on the block chain-based identification photo management method are also provided. In a specific application scenario, the certificate photo management system is a system corresponding to a certificate photo, and a certificate maker (e.g., a policeman) can acquire the certificate photo of a crowd to be certified through the certificate photo management system and then make a certificate (e.g., an identity card, a passport, etc.) according to the corresponding certificate photo.
Specifically, referring to fig. 6, the block chain-based certificate management method further includes steps S202 to S210 shown in fig. 6:
step S202: receiving a certificate photo reading request, and determining a reading identifier included in the certificate photo reading request.
When the certificate photo needs to be acquired, for example, the certificate photo is verified or the certificate photo needs to be acquired to be manufactured, the user can input a corresponding certificate photo reading request through the certificate photo management system. The certificate photo reading request includes identity information or other identifiers corresponding to the certificate photo to be read, for example, an identity card number or a name, which is the reading identifier. In this embodiment, the corresponding certificate photo can be searched and determined by reading the identifier.
Step S204: and searching a target certificate photo corresponding to the reading identifier and a corresponding identification code in a preset storage node in the block chain according to the reading identifier to respectively serve as the certificate photo to be read and the identification code to be read.
And sending a corresponding certificate photo reading request to the block chain network according to the identity information or other identification (reading identification) corresponding to the certificate photo to be read to acquire the corresponding certificate photo. Specifically, data corresponding to the reading identifier, including the target certificate photo and the corresponding identification code, is searched for in a storage node preset in the block chain according to the reading identifier, and the obtained data is used as the certificate photo to be read and the identification code to be read.
Step S206: judging whether the certificate photo to be read is matched with the identification code to be read;
if yes, go to step S208: acquiring the certificate photo to be read as a target reading certificate photo and returning;
if not, go to step S210: and generating prompt information to prompt the user that the current certificate photo is unavailable.
In this embodiment, the obtained certificate photo to be read cannot be directly used, and the certificate photo to be read needs to be verified according to the identification code to be read.
In this step, it is necessary to verify whether the certificate photo to be read is tampered, and if the certificate photo to be read is tampered, the current certificate photo to be read cannot be used for certificate production or other functions, whereas if the certificate photo to be read is not tampered, the certificate photo to be read can be used.
In specific implementation, the certificate photo to be read is verified according to the identification code to be read so as to judge whether the certificate photo to be read is matched with the identification code to be read, and whether the current certificate photo to be read is available is determined according to the judgment.
In a specific embodiment, when the identification code includes one or more identification information of user identity information, digital receipt, photographing device information, photographing date, reference certificate photo data, and the like, the identification information corresponding to the identification code to be read is acquired as the identification information to be read by identifying the identification code to be read, and then the certificate photo to be read is verified according to the identification information to be read. For example, it is determined whether the identification photo to be read matches reference identification photo data identified from the identification code to be read.
And under the condition that the certificate photo to be read is matched with the identification code to be read, judging that the certificate photo to be read passes verification and is not tampered, and under the condition, sending the certificate photo to be read to a user as a target reading certificate photo so that the user can use the target reading certificate photo to manufacture the certificate. On the contrary, if the certificate photo to be read is not matched with the identification code to be read, the certificate photo to be read is possibly tampered, and potential safety hazards exist in certificate manufacturing by using the certificate photo, so that in this case, prompt information is generated and returned to a corresponding user to prompt the user that the current certificate photo is unavailable.
In a specific embodiment, the process of verifying the certificate photo to be read according to the information identified by the identification code can be as shown in fig. 7. Specifically, the step of determining whether the certificate photo to be read matches the identification code to be read in step S206 further includes steps S601-S602 shown in fig. 7:
step S601: according to the identification code to be read, determining contrast identification photo data corresponding to the identification code to be read, wherein the contrast identification photo data comprises one or more of the reference image data, the image characteristic reference data and the image characteristic data;
step S602: judging whether the certificate photo to be read is matched with the certificate photo comparison data;
under the condition that the certificate photo to be read is matched with the certificate photo comparison data, judging that the certificate photo to be read is matched with the identification code to be read, and executing the step S208;
and under the condition that the certificate photo to be read is not matched with the comparison certificate photo data, judging that the certificate photo to be read is not matched with the identification code to be read, and executing the step S210.
The identification code comprises image characteristic data such as reference image data, image characteristic reference data or the image characteristic data added with identification information, or encrypted information or watermark information, in this case, the identification code to be read is identified and decrypted to obtain the image data in the information such as the identification information, abstract information and the like in the identification code, wherein the image data comprises one or more of the reference image data, the image characteristic reference data and the image characteristic data and is used as contrast identification photo data. And then verifying the certificate photo to be read according to the comparison certificate photo data. If the certificate photo to be read is matched with the certificate photo contrast data, the certificate photo to be read is judged to pass verification and is not tampered, and under the condition, the certificate photo to be read is taken as a target reading certificate photo and is sent to a user, so that the user can use the target reading certificate photo to manufacture the certificate. Correspondingly, if the certificate photo to be read is not matched with the certificate photo comparison data, the certificate photo to be read is possibly tampered, and potential safety hazards exist when the certificate photo is used for manufacturing the certificate, so that prompt information is generated and returned to a corresponding user to prompt the user that the current certificate photo is unavailable.
In other embodiments, in the case that the data corresponding to the target certificate photo in the certificate photo management system includes a watermark photo or encrypted information, further comparison and verification should be performed according to the corresponding data.
In a specific embodiment, a flow diagram of a process for verifying a certificate photo to be read is shown in FIG. 8. Specifically, the step of determining whether the certificate photo to be read matches the identification code to be read in step S206 further includes steps S603-S605 shown in fig. 8:
step S603: determining identification information and summary information corresponding to the identification code to be read as the identification information and the summary information to be read according to the identification code to be read;
step S604: calculating corresponding abstract comparison information according to the certificate photo to be read and the identification information to be read;
step S605: judging whether the summary comparison information is matched with the summary information to be read;
under the condition that the abstract comparison information is matched with the abstract information to be read, judging that the certificate photo to be read is matched with the identification code to be read, and executing the step S208;
and under the condition that the abstract comparison information is not matched with the abstract information to be read, judging that the certificate photo to be read is not matched with the identification code to be read, and executing the step S210.
As described above, before the uplink storage of the target certificate, data such as watermark information, identification information, image characteristic data, and the like need to be encrypted, corresponding target abstract information is determined according to a preset abstract algorithm, and the target abstract information is written into the identification code. In the process of obtaining the target certificate photo, whether the certificate photo to be read is tampered or not needs to be verified through the target abstract information. Specifically, the identification code to be read is identified to determine corresponding summary information therein as summary information to be read, and corresponding identification information is acquired as identification information to be read. And then, according to the certificate photo to be read and the identification information to be read, calculating corresponding abstract information as abstract comparison information according to the same processing method before performing uplink storage on the target certificate photo. And then, judging whether the summary information is falsified or not by judging whether the summary comparison information obtained by calculation is consistent with the summary information to be read identified from the identification code or not. That is, if the digest comparison information is matched or consistent with the digest information to be read, it is determined that the certificate photo to be read passes verification and is not tampered, and in this case, the certificate photo to be read is sent to the user as the target reading certificate photo, so that the user can use the target reading certificate photo to make the certificate. Correspondingly, if the abstract comparison information is not matched or consistent with the abstract information to be read, the certificate photo to be read is possibly tampered, and potential safety hazards exist when the certificate photo is used for manufacturing the certificate, so that prompt information is generated and returned to a corresponding user to prompt the user that the current certificate photo is unavailable.
In specific implementation, it is necessary to verify whether the certificate photo to be read is tampered or not, and to verify the timeliness of the certificate photo to be read. Generally, the certificate photo for handling certificates is required to be shot within half a year, and if the shooting time is too long, the certificate photo is considered to have great difference with the user, so that the certificate photo is not suitable for handling certificates. Therefore, in this embodiment, further verification of the timeliness of the certificate photo to be read is also required.
Specifically, as shown in fig. 9, a flow chart of a process of verifying the certificate photo to be read is shown. Specifically, after the step of determining whether the certificate photo to be read matches the identification code to be read in step S206, steps S702 to 704 shown in fig. 9 are further included:
step S702: determining a target photographing date corresponding to the identification code to be read and/or the watermark photo according to the identification code to be read and/or the watermark photo;
step S704: judging whether the certificate photo to be read is valid or not according to the target photographing date;
if the certificate photo to be read is valid, executing step S208: acquiring the certificate photo to be read as a target reading certificate photo and returning;
if the certificate photo to be read is invalid, executing step S210: and generating prompt information to prompt the user that the current certificate photo is unavailable.
As described above, the identification information may include a photographing date, or may include a photographing date in the watermark picture. Therefore, in the embodiment, the shooting date of the identification photo to be read can be determined by identifying the corresponding identification code to be read or the watermark photo and the like, so as to determine the corresponding shooting date, i.e. the target shooting date.
And then determining whether the current certificate photo to be read is valid according to whether the difference value between the target photographing date and the current date of the system is within a preset time length threshold value. For example, whether the target photographing date is within half a year of the current date of the system is judged to judge whether the certificate photo to be read is valid, if the target photographing date is before half a year of the current date of the system, the certificate photo to be read is considered to be invalid, otherwise, if the target photographing date is within half a year of the current date of the system, the certificate photo to be read is considered to be valid. In this embodiment, the preset time threshold may be specifically determined according to the type of the certificate and the certificate transaction requirement.
Specifically, if the difference between the target photographing date and the current date of the system is within a preset time threshold, it is determined that the current certificate photo to be read is valid, and in this case, the certificate photo to be read is sent to the user as the target reading certificate photo, so that the user can use the target reading certificate photo to make the certificate. On the contrary, if the difference between the target photographing date and the current date of the system exceeds the preset time length threshold, the current certificate photo to be read is determined to be invalid, and potential safety hazards exist when the certificate photo is used for manufacturing the certificate, so that in this case, prompt information is generated and returned to the corresponding user to prompt the user that the current certificate photo is unavailable.
Further, before whether the certificate photo to be read is valid or not according to the target photographing date, the authenticity of the target photographing date needs to be verified. Specifically, identification information (namely identification information corresponding to the certificate photo to be read) uploaded in the target certificate photo data uploading process is acquired, the photographing date in the identification information is acquired, and then the acquired photographing date is compared with the target photographing date to judge whether the target photographing date is tampered. It should be noted that the information for performing the re-comparison confirmation may not be limited to the photographing date, but may include other identification information.
That is to say, in this embodiment, identification information such as a photographing date is written into target identification photo data in an encrypted form for uploading through an identification code and/or a watermark photo, and the identification information is written into the target identification photo data in a plaintext form (that is, corresponding identification information is directly uploaded) for uploading, and finally, whether the identification information such as the photographing date is tampered or not is judged through comparison between the plaintext and the ciphertext in the process of using the identification photo, so that the use safety of the identification photo is further improved.
It should be noted that, in this embodiment, the node and the user that upload the target certificate photo, and the node and the user and the device that subsequently use the target certificate photo can also be recorded through the data traceability feature of the block chain, so that it is possible to subsequently check which nodes the corresponding target certificate photo uses or which certificates are prepared at.
In addition, the underlying platform of the blockchain corresponding to the blockchain applied in all the embodiments described above may adopt a hyper-ridger Fabric (one of the items of hyper-ridger (hyper-ledger) dominated by the Linux foundation) blockchain technology platform or other platform capable of implementing the blockchain technology of the embodiments described above.
The block chain bottom platform Hyperridge rFabric, the P2P protocol (point-to-point technical protocol) used by the network layer realizes the identity information transmission between the nodes based on HTTP/2 protocol (hypertext transfer protocol 2.0); the consensus layer combines a PBFT algorithm (practical Byzantine fault tolerance, which is an algorithm subject to majority in a small number) with an SBFT algorithm (a new Byzantine fault tolerance algorithm), so that highly dispersed nodes can efficiently achieve consensus on the validity of block data in a decentralized block chain network while malicious behaviors can be tolerated; the data layer adopts an account-based model, and index data is stored in a levelDB4 database (C/C + + programming language database), so that the storage speed can be increased; the intelligent contract layer selects a Docker container (open source application container engine) as a sandbox environment, when a node master application deploys an intelligent contract, a socket is connected with a Docker of a node host, a Docker container capable of executing an intelligent contract language is dynamically generated, the Docker container is provided with a group of signed basic disk images, Go (static strong type, compiled language) and Java language (object-oriented programming language) runtime and SDK (software development kit), so as to run the Chaincode (implementation code of an interface) compiled by Go and Java language, and the Docker container can improve the performance of cross-platform support and the utilization rate of resources; the application layer mainly faces to enterprise-level block chain application, member management service and transaction management service are introduced, members are effectively managed, and the storage and use processes of digital identity information are managed and recorded.
In this embodiment, a block chain-based certificate photo management device is also provided. Specifically, as shown in fig. 10, the block chain-based certificate management apparatus includes:
the certificate photo data acquisition module 102 is used for acquiring a target certificate photo to be processed;
an identification code generation module 104, configured to determine identification information corresponding to the target certificate photo, and generate an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information;
and the certificate photo uplink module 106 is used for determining the certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code, and uploading the certificate photo uploading data to a preset storage node in the block chain.
In one embodiment, the identification information further includes one or more of a certificate photo category, user identity information, digital receipt, certificate category, photographing device information, photographing date, and reference certificate photo data corresponding to the target certificate photo; the identity information comprises one or more of a name, a certificate identification code, a gender and an address; the reference identification photo data comprises one or more of reference image data and image characteristic reference data corresponding to the target identification photo.
In one embodiment, as shown in fig. 10, the block chain-based certificate management apparatus further includes a watermark processing module 108, configured to use the identification information as watermark information according to a preset watermark processing algorithm, and write the watermark information into the target certificate in the form of a watermark photo; the identification information includes at least the photographing date.
In one embodiment, the watermarking module 108 is further configured to extract image feature data in the target certificate photo; and writing the image characteristic data into the target certificate photo in a watermark photo mode according to the preset watermark processing algorithm.
In one embodiment, as shown in fig. 10, the block chain-based certificate management apparatus further includes an encryption processing module 110, configured to encrypt the watermark information according to a preset encryption algorithm, encrypt the image feature data, and encrypt the identification information; calculating abstract information corresponding to the encrypted watermark information, the encrypted identification information and/or the encrypted image characteristic data as target abstract information;
the identification code generation module 104 is further configured to generate the identification code according to the target summary information.
In one embodiment, the encryption processing module 110 is further configured to encrypt the target certificate photo according to a preset encryption algorithm, generate an encrypted certificate photo corresponding to the target certificate photo, and add the encrypted certificate photo to the certificate photo upload data.
In one embodiment, as shown in fig. 10, the block chain based certificate management apparatus further includes a certificate photo primary verification module 112, configured to acquire certificate photo standard data and determine whether the target certificate photo matches the certificate photo standard data; under the condition that the target certificate photo is matched with the certificate photo standard data, the identification code generation module 104 is called; and under the condition that the target certificate photo is not matched with the standard data of the certificate photo, calling a prompt module 114, wherein the first prompt module 114 is used for generating prompt information to prompt a user that the target certificate photo does not meet the requirement.
In one embodiment, as shown in fig. 10, the block chain based certificate management apparatus further includes a certificate photo preprocessing module 116, configured to perform a cropping process on the target certificate photo according to the preset size information.
In one embodiment, as shown in fig. 10, the block chain based certificate management apparatus further includes a rights management module 118 configured to obtain a current uploading node identifier, where the current uploading node identifier includes a user identifier and/or a device identifier; judging whether a user or equipment corresponding to the current uploading node has certificate photo uploading authority or not according to the current uploading node identification based on the node of the block chain; the method comprises the steps of calling a certificate photo uplink module 106 under the condition that the certificate photo uploading authority is possessed, calling a prompt module 114 under the condition that the certificate photo uploading authority is not possessed, wherein the first prompt module 114 is used for generating prompt information to prompt that a current user does not possess the operation authority.
In one embodiment, as shown in fig. 11, the block chain-based certificate management apparatus further includes:
a reading request receiving module 202, configured to receive a certificate photo reading request, and determine a reading identifier included in the certificate photo reading request;
the data searching module 204 is configured to search, according to the reading identifier, a target certificate photo corresponding to the reading identifier and a corresponding identification code in a storage node preset in the block chain, and use the target certificate photo and the corresponding identification code as a certificate photo to be read and an identification code to be read, respectively;
the judging module 206 is configured to judge whether the certificate photo to be read matches the identification code to be read;
the certificate photo acquisition module 208 is used for acquiring the certificate photo to be read as a target reading certificate photo and returning the target reading certificate photo under the condition that the certificate photo to be read is matched with the identification code to be read;
and the second prompting module 210 is configured to generate a prompting message to prompt a user that the current certificate photo is unavailable when the certificate photo to be read is not matched with the identification code to be read.
In one embodiment, the determining module 206 is further configured to determine, according to the identification code to be read, comparison certificate photo data corresponding to the identification code to be read, where the comparison certificate photo data includes one or more of the reference image data, the image feature reference data, and the image feature data; judging whether the certificate photo to be read is matched with the certificate photo comparison data;
under the condition that the certificate photo to be read is matched with the certificate photo comparison data, judging that the certificate photo to be read is matched with the identification code to be read, and calling a certificate photo acquisition module 208;
and under the condition that the certificate photo to be read is not matched with the comparison certificate photo data, judging that the certificate photo to be read is not matched with the identification code to be read, and calling a second prompt module 210.
In one embodiment, the determining module 206 is further configured to determine, according to the identification code to be read, identification information and summary information corresponding to the identification code to be read as identification information to be read and summary information to be read; calculating corresponding abstract comparison information according to the certificate photo to be read and the identification information to be read; judging whether the summary comparison information is matched with the summary information to be read;
under the condition that the abstract comparison information is matched with the abstract information to be read, judging that the certificate photo to be read is matched with the identification code to be read, and calling a certificate photo acquisition module 208;
under the condition that the abstract comparison information is not matched with the abstract information to be read, judging that the certificate photo to be read is not matched with the identification code to be read, and calling a second prompt module 210.
In one embodiment, the determining module 206 is further configured to determine, according to the identification code to be read and/or the watermark photo, a target photographing date corresponding to the certificate photo to be read; judging whether the certificate photo to be read is valid or not according to the target photographing date;
calling the certificate photo obtaining module 208 under the condition that the certificate photo to be read is valid;
and calling a second prompting module 210 under the condition that the certificate photo to be read is invalid.
FIG. 12 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be a terminal, and may also be a server. As shown in fig. 12, the computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a blockchain based certification management method. The internal memory may also have stored therein a computer program that, when executed by the processor, causes the processor to perform a blockchain based credential management method. Those skilled in the art will appreciate that the architecture shown in fig. 12 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is proposed, comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
acquiring a target certificate photo to be processed;
determining identification information corresponding to the target certificate photo, and generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information;
and determining certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code, and uploading the certificate photo uploading data to a preset storage node in a block chain.
In one embodiment, a computer-readable storage medium is proposed, in which a computer program is stored which, when executed by a processor, causes the processor to carry out the steps of:
acquiring a target certificate photo to be processed;
determining identification information corresponding to the target certificate photo, and generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information;
and determining certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code, and uploading the certificate photo uploading data to a preset storage node in a block chain.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (14)

1. A block chain-based credential management method, the method comprising:
acquiring a target certificate photo to be processed;
determining identification information corresponding to the target certificate photo, and generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information;
and determining certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code, and uploading the certificate photo uploading data to a preset storage node in a block chain.
2. The blockchain-based certificate picture management method according to claim 1, wherein the identification information further includes one or more of a certificate picture category, user identity information, a digital receipt, photographing device information, a photographing date, reference certificate picture data corresponding to the target certificate picture;
the identity information comprises one or more of a name, a certificate identification code, a gender and an address;
the reference identification photo data comprises one or more of reference image data and image characteristic reference data corresponding to the target identification photo.
3. The blockchain-based credential management method of claim 2, further comprising, after the step of determining identification information corresponding to the target credential,:
according to a preset watermarking algorithm, the identification information is used as watermarking information and is written into the target certificate photo in a watermarking photo mode; the identification information includes at least the photographing date.
4. The blockchain-based credential management method of claim 3, further comprising, after the step of obtaining the target credential to be processed:
extracting image characteristic data in the target certificate photo;
and writing the image characteristic data into the target certificate photo in a watermark photo mode according to the preset watermark processing algorithm.
5. The blockchain-based certification management method according to claim 4, wherein after the step of writing the identification information as watermark information into the target certificate photo in the form of a watermark photo, the method further comprises:
according to a preset encryption algorithm, carrying out encryption processing on the watermark information, carrying out encryption processing on the image characteristic data, and carrying out encryption processing on the identification information;
calculating abstract information corresponding to the encrypted watermark information, the encrypted identification information and/or the encrypted image characteristic data as target abstract information;
the step of generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information further includes:
and generating the identification code according to the target abstract information.
6. The blockchain-based certificate management method according to claim 1, wherein before the step of uploading the certificate photograph upload data to a storage node preset in a blockchain, the method further comprises:
acquiring a current uploading node identifier, wherein the current uploading node identifier comprises a user identifier and/or an equipment identifier;
judging whether a user or equipment corresponding to the current uploading node has certificate photo uploading authority or not according to the current uploading node identification based on the node of the block chain;
and under the condition of having the certificate photo uploading authority, executing the step of uploading the certificate photo uploading data to a preset storage node in the block chain.
7. The blockchain-based certification management method according to claim 5, wherein the method further comprises:
receiving a certificate photo reading request, and determining a reading identifier included in the certificate photo reading request;
searching a target certificate photo corresponding to the reading identifier and a corresponding identification code in a storage node preset in the block chain according to the reading identifier to respectively serve as the certificate photo to be read and the identification code to be read;
judging whether the certificate photo to be read is matched with the identification code to be read;
and under the condition that the certificate photo to be read is matched with the identification code to be read, acquiring the certificate photo to be read as a target reading certificate photo and returning.
8. The blockchain-based certificate management method according to claim 7, wherein the step of determining whether the certificate photo to be read matches the identification code to be read further comprises:
according to the identification code to be read, determining contrast identification photo data corresponding to the identification code to be read, wherein the contrast identification photo data comprises one or more of the reference image data, the image characteristic reference data and the image characteristic data;
judging whether the certificate photo to be read is matched with the certificate photo comparison data;
and under the condition that the certificate photo to be read is matched with the certificate photo comparison data, judging that the certificate photo to be read is matched with the identification code to be read.
9. The blockchain-based certificate management method according to claim 7, wherein the step of determining whether the certificate photo to be read matches the identification code to be read further comprises:
determining identification information and summary information corresponding to the identification code to be read as the identification information and the summary information to be read according to the identification code to be read;
calculating corresponding abstract comparison information according to the certificate photo to be read and the identification information to be read;
judging whether the summary comparison information is matched with the summary information to be read;
and under the condition that the abstract comparison information is matched with the abstract information to be read, judging that the certificate photo to be read is matched with the identification code to be read.
10. The blockchain-based certificate management method according to claim 7, wherein after the step of determining whether the certificate photo to be read matches the identification code to be read, the method further comprises:
determining a target photographing date corresponding to the identification code to be read and/or the watermark photo according to the identification code to be read and/or the watermark photo;
judging whether the certificate photo to be read is valid or not according to the target photographing date;
and under the condition that the certificate photo to be read is valid, executing the step of obtaining the certificate photo to be read as a target to read the certificate photo and returning.
11. A block chain-based certificate photo management apparatus, comprising:
the certificate photo data acquisition module is used for acquiring a target certificate photo to be processed;
the identification code generation module is used for determining identification information corresponding to the target certificate photo and generating an identification code corresponding to the target certificate photo according to the target certificate photo and/or the identification information;
and the certificate photo uplink module is used for determining the certificate photo uploading data corresponding to the target certificate photo according to the target certificate photo and the corresponding identification code, and uploading the certificate photo uploading data to a preset storage node in the block chain.
12. The block chain-based certificate photograph management apparatus as claimed in claim 11, further comprising:
the reading request receiving module is used for receiving a certificate photo reading request and determining a reading identifier included in the certificate photo reading request;
the data searching module is used for searching a target certificate photo corresponding to the reading identifier and a corresponding identification code in a preset storage node in the block chain according to the reading identifier to respectively serve as the certificate photo to be read and the identification code to be read;
the judging module is used for judging whether the certificate photo to be read is matched with the identification code to be read;
the certificate photo acquisition module is used for acquiring the certificate photo to be read as a target reading certificate photo and returning the target reading certificate photo under the condition that the certificate photo to be read is matched with the identification code to be read;
and the second prompting module is used for generating prompting information under the condition that the certificate photo to be read is not matched with the identification code to be read so as to prompt a user that the current certificate photo is unavailable.
13. A computer-readable storage medium, storing a computer program which, when executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 10.
14. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method according to any one of claims 1 to 10.
CN202010657334.1A 2020-07-09 2020-07-09 Blockchain-based certificate management method, device, equipment and readable medium Active CN112003888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010657334.1A CN112003888B (en) 2020-07-09 2020-07-09 Blockchain-based certificate management method, device, equipment and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010657334.1A CN112003888B (en) 2020-07-09 2020-07-09 Blockchain-based certificate management method, device, equipment and readable medium

Publications (2)

Publication Number Publication Date
CN112003888A true CN112003888A (en) 2020-11-27
CN112003888B CN112003888B (en) 2023-08-15

Family

ID=73467355

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010657334.1A Active CN112003888B (en) 2020-07-09 2020-07-09 Blockchain-based certificate management method, device, equipment and readable medium

Country Status (1)

Country Link
CN (1) CN112003888B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112579994A (en) * 2020-12-23 2021-03-30 陈子祺 Digital product content protection system and method based on artificial intelligence
CN112801134A (en) * 2020-12-30 2021-05-14 杭州趣链科技有限公司 Gesture recognition model training and distributing method and device based on block chain and image
CN112988148A (en) * 2021-04-15 2021-06-18 上海简苏网络科技有限公司 SDK generation method and device supporting multi-block chain and cross-platform
CN113052157A (en) * 2021-03-16 2021-06-29 广东核电合营有限公司 Label detection method, label detection device, computer equipment and storage medium
CN113052157B (en) * 2021-03-16 2024-05-14 广东核电合营有限公司 Label detection method, apparatus, computer device and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194666A (en) * 2017-05-19 2017-09-22 中链科技有限公司 Report Server Management method and terminal device based on block chain technology
CN108989337A (en) * 2018-08-19 2018-12-11 北京元链科技有限公司 A kind of electronics license shared platform design method based on block chain technology
CN109190329A (en) * 2018-08-14 2019-01-11 深圳市元征科技股份有限公司 Certificate information management method, system and block chain node device and storage medium
CN109522330A (en) * 2018-10-18 2019-03-26 上海达家迎信息科技有限公司 Cloud platform data processing method, device, equipment and medium based on block chain
CN109783447A (en) * 2019-01-23 2019-05-21 北京邮电大学 Electronics license deposits card method, acquisition methods, device, system and electronic equipment
CN109800598A (en) * 2018-12-29 2019-05-24 中链科技有限公司 Certificate administration method, apparatus, electronic equipment and storage medium based on block chain
US20190303951A1 (en) * 2018-03-28 2019-10-03 Konstantinos Bakalis Systems and methods for using codes and images within a blockchain
CN110503373A (en) * 2019-08-21 2019-11-26 腾讯云计算(北京)有限责任公司 A kind of material-flow method and device based on block chain network
CN111339036A (en) * 2020-02-24 2020-06-26 国网山西省电力公司信息通信分公司 Block chain-based electronic license full life cycle management method and device
CN111368324A (en) * 2018-12-25 2020-07-03 北京思源政通科技集团有限公司 Credible electronic license platform system based on block chain and authentication method thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194666A (en) * 2017-05-19 2017-09-22 中链科技有限公司 Report Server Management method and terminal device based on block chain technology
US20190303951A1 (en) * 2018-03-28 2019-10-03 Konstantinos Bakalis Systems and methods for using codes and images within a blockchain
CN109190329A (en) * 2018-08-14 2019-01-11 深圳市元征科技股份有限公司 Certificate information management method, system and block chain node device and storage medium
CN108989337A (en) * 2018-08-19 2018-12-11 北京元链科技有限公司 A kind of electronics license shared platform design method based on block chain technology
CN109522330A (en) * 2018-10-18 2019-03-26 上海达家迎信息科技有限公司 Cloud platform data processing method, device, equipment and medium based on block chain
CN111368324A (en) * 2018-12-25 2020-07-03 北京思源政通科技集团有限公司 Credible electronic license platform system based on block chain and authentication method thereof
CN109800598A (en) * 2018-12-29 2019-05-24 中链科技有限公司 Certificate administration method, apparatus, electronic equipment and storage medium based on block chain
CN109783447A (en) * 2019-01-23 2019-05-21 北京邮电大学 Electronics license deposits card method, acquisition methods, device, system and electronic equipment
CN110503373A (en) * 2019-08-21 2019-11-26 腾讯云计算(北京)有限责任公司 A kind of material-flow method and device based on block chain network
CN111339036A (en) * 2020-02-24 2020-06-26 国网山西省电力公司信息通信分公司 Block chain-based electronic license full life cycle management method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112579994A (en) * 2020-12-23 2021-03-30 陈子祺 Digital product content protection system and method based on artificial intelligence
CN112801134A (en) * 2020-12-30 2021-05-14 杭州趣链科技有限公司 Gesture recognition model training and distributing method and device based on block chain and image
CN113052157A (en) * 2021-03-16 2021-06-29 广东核电合营有限公司 Label detection method, label detection device, computer equipment and storage medium
CN113052157B (en) * 2021-03-16 2024-05-14 广东核电合营有限公司 Label detection method, apparatus, computer device and storage medium
CN112988148A (en) * 2021-04-15 2021-06-18 上海简苏网络科技有限公司 SDK generation method and device supporting multi-block chain and cross-platform
CN112988148B (en) * 2021-04-15 2023-11-17 上海简苏网络科技有限公司 Multi-block-chain and cross-platform supporting SDK generation method and device

Also Published As

Publication number Publication date
CN112003888B (en) 2023-08-15

Similar Documents

Publication Publication Date Title
US11907406B2 (en) Computer-implemented method and system of tamper-evident recording of a plurality of service data items
US11868509B2 (en) Method and arrangement for detecting digital content tampering
CN112003888B (en) Blockchain-based certificate management method, device, equipment and readable medium
WO2018187408A1 (en) System for recording ownership of digital works and providing backup copies
US20210194699A1 (en) Blockchain-embedded secure digital camera system to verify audiovisual authenticity
Sajjad et al. Robust image hashing based efficient authentication for smart industrial environment
CN103391196A (en) Asset digital authentication method and device
CN103415856A (en) Device and method for online storage, transmission device and method, and receiving device and method
CN110958319A (en) Method and device for managing infringement and evidence-based block chain
CN103678960A (en) Method and device for adding digital copyright information to data file
Zou et al. Blockchain-based photo forensics with permissible transformations
KR20200094956A (en) Electronic document service platform using block chain
WO2019114614A1 (en) Original photo identification method and system
KR20200018159A (en) Method of prevention of forgery and theft of photo
CN113077264A (en) Copyright protection method and system based on block chain and timestamp technology
CN112800477A (en) Data encryption and decryption system and method based on biological characteristic value
CN115861020A (en) Image processing method and device
Chen et al. Image authentication for permissible cropping
KR101727582B1 (en) Evidence system and method to determine whether digital file is forged or falsified by using smart phone
TWI735373B (en) Safekeeping apparatus with image capturing device
CN109509095B (en) Video active identification method combined with block chain
Vivek et al. Enhancing the Security of Aadhar Cards using Blockchain and Steganography
TWI693816B (en) Digital data anti-counterfeiting device and method
US20230410072A1 (en) Systems and methods for enhanced non-fungible tokens
Thakkar et al. A Review on Verifiable Image Licensing Approaches

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zheng Song

Inventor after: Han Jiawei

Inventor after: Li Yuwen

Inventor before: Zheng Song

Inventor before: Han Jiawei

GR01 Patent grant
GR01 Patent grant