CN108600180B - Image verification method and device based on block chain - Google Patents

Image verification method and device based on block chain Download PDF

Info

Publication number
CN108600180B
CN108600180B CN201810264446.3A CN201810264446A CN108600180B CN 108600180 B CN108600180 B CN 108600180B CN 201810264446 A CN201810264446 A CN 201810264446A CN 108600180 B CN108600180 B CN 108600180B
Authority
CN
China
Prior art keywords
image
verification code
network system
verification
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810264446.3A
Other languages
Chinese (zh)
Other versions
CN108600180A (en
Inventor
符博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201810264446.3A priority Critical patent/CN108600180B/en
Publication of CN108600180A publication Critical patent/CN108600180A/en
Application granted granted Critical
Publication of CN108600180B publication Critical patent/CN108600180B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention discloses an image verification method and device based on a block chain, wherein the method comprises the following steps: uploading a first verification code generated based on a first application program to a network system established based on a block chain so as to verify the first application program, wherein the first application program is used for generating an image; and uploading a second verification code related to the image after the first verification code is approved by the network system, so that the network system performs first verification on the image by using the second verification code, wherein the second verification code comprises the characteristic information of the image. The method can judge whether the application program for acquiring the image is modified or not based on the block chain technology, can also judge whether the image acquired by the application program is modified or not, has high judgment accuracy, does not need to upload the image to a network system, saves system resources and reduces cost.

Description

Image verification method and device based on block chain
Technical Field
The present invention relates to the field of data processing, and in particular, to an image verification method and apparatus based on a block chain.
Background
With the progress of science and technology, the processing capability of images such as photos and videos is more and more powerful, and illegally modified images often have bad influence, such as modifying original images or modifying images not according to regulations, and especially modifying original images often confuses others, but it is more and more difficult to judge whether images are modified, so the reality degree of images is often questioned, and conversely, if the reality of images can be ensured, the pragmatic persuasion can be increased. However, to verify whether an image such as a photograph is modified, complicated image analysis needs to be performed to identify the image based on the image itself, which results in high technical threshold and high identification cost.
Disclosure of Invention
The embodiment of the invention aims to provide an image verification method and device based on a block chain, the method can accurately judge whether an image is modified or not when the image is not uploaded to the block chain, and the realization cost is low.
In order to solve the technical problem, the embodiment of the invention adopts the following technical scheme: an image verification method based on a block chain comprises the following steps:
uploading a first verification code generated based on a first application program to a network system established based on a block chain so as to verify the first application program, wherein the first application program is used for generating an image;
and uploading a second verification code related to the image after the first verification code is approved by the network system, so that the network system performs first verification on the image by using the second verification code, wherein the second verification code comprises the characteristic information of the image.
Preferably, the first verification of the image by the network system using the second verification code includes:
and uploading the current verification code related to the image so that the network system compares the second verification code with the current verification code to judge whether the image is an original image.
Preferably, the first verification code includes current code information of the first application program, and the uploading the first verification code generated based on the first application program to the network system established based on the blockchain to verify the first application program itself includes:
and uploading the current code information to enable the network system to judge whether the current code information has a program segment for modifying the image or not according to an original program of the first application program, wherein the original program is prestored in the network system.
Preferably, the method further comprises:
uploading the third verification code;
and after receiving a response that the network system judges that the third verification code is legal, starting the first application program to acquire the image, wherein the uploaded third verification code is associated with the verification result of the first verification code.
Preferably, the feature information of the image is asymmetric encryption information of the image, and the uploading of the current verification code related to the image makes the network system compare the second verification code with the current verification code to determine whether the image is an original image includes:
and generating current encryption information of the current verification code by using the same encryption mode as the asymmetric encryption information, so that the network system compares the current encryption information with the asymmetric encryption information to verify whether the image is an original image.
The embodiment of the application also provides an image verification device based on the block chain, which comprises a communication module and a processing module;
the communication module is configured to upload a first verification code generated based on a first application program to a network system established based on a block chain so as to verify the first application program, wherein the first application program is used for generating an image;
the processing module is configured to upload a second verification code related to the image after the first verification code is approved by the network system, so that the network system performs first verification on the image by using the second verification code, wherein the second verification code includes feature information of the image.
Preferably, the processing module is further configured to upload a current verification code associated with the image, so that the network system compares the second verification code with the current verification code to determine whether the image is an original image.
Preferably, the first verification code includes current code information of a first application program, and the processing module is further configured to upload the current code information, so that the network system determines whether the current code information has a program segment for modifying the image according to an original program of the first application program, where the original program is pre-stored in the network system.
Preferably, the apparatus further includes an obtaining module, where the obtaining module is configured to start the first application program to obtain the image after the communication module uploads a third verification code and receives a response that the network system determines that the third verification code is legal, where the third verification code uploaded by the communication module is associated with a result of checking the first verification code by the processing module.
Preferably, the encryption information of the image is asymmetric encryption information of the image, and the processing module is further configured to: and generating current encryption information of the current verification code by using the same encryption mode as the asymmetric encryption information, so that the network system compares the current encryption information with the asymmetric encryption information to verify whether the image is an original image.
The embodiment of the invention has the beneficial effects that: the method can judge whether the application program for acquiring the image is modified or not based on the block chain technology, can also judge whether the image acquired by the application program is modified or not, has high judgment accuracy, does not need to upload the image to a network system, saves system resources and reduces cost.
Drawings
FIG. 1 is a flowchart illustrating a block chain based image verification method according to an embodiment of the present invention;
FIG. 2 is a flowchart of an embodiment of an image verification method according to the present invention;
FIG. 3 is a flowchart illustrating an image verification method according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of an image verification apparatus based on a block chain according to an embodiment of the present invention.
Detailed Description
Various aspects and features of the present invention are described herein with reference to the drawings.
It will be understood that various modifications may be made to the embodiments of the invention herein. Accordingly, the foregoing description should not be construed as limiting, but merely as exemplifications of embodiments. Other modifications will occur to those skilled in the art which are within the scope and spirit of the invention.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and, together with a general description of the invention given above, and the detailed description of the embodiments given below, serve to explain the principles of the invention.
These and other characteristics of the invention will become apparent from the following description of a preferred form of embodiment, given as a non-limiting example, with reference to the accompanying drawings.
It should also be understood that, although the invention has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of the invention, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present invention will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present invention are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which can be embodied in various forms. Well-known and/or repeated functions and constructions are not described in detail to avoid obscuring the invention in unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present invention in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the invention.
The image verification method based on the block chain can be applied to terminal equipment such as a mobile phone, images acquired by the terminal equipment, such as pictures shot by the mobile phone, can be judged whether the images are original images or not by combining a block chain technology, and is safe, reliable and high in accuracy. As shown in fig. 1 in conjunction with fig. 3, the method comprises the steps of:
s1, uploading the first verification code generated based on the first application to the network system established based on the blockchain, so as to verify the first application itself, wherein the first application is used to generate the image. The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm, the consensus mechanism is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes in a block chain system, the block chain is a decentralized database in essence, and meanwhile, as a bottom layer technology, the block chain is also a string of data blocks which are generated by correlation of a cryptography method, and related data processing can be verified. The first application may be an application loaded on the terminal device, which is capable of generating a video, which is capable of being used to draw an image, take a video, or take a photograph, etc. The first verification code can represent information of the application program itself, such as an IMEI number of a mobile phone, current time information, an application program code, and the like, and is encrypted and encoded to prevent hijacking or cracking. In another embodiment, when the first application program is started to acquire the image, the first verification code is generated accordingly, so as to ensure that the generated first verification code is the application program corresponding to the image. In addition, in this embodiment, the network system using the block chain technology acquires the first verification code uploaded by the terminal, and analyzes the first verification code, so as to determine whether the first application program itself is modified. If the first application itself is modified then it is likely that the image it acquired will also be modified. A subsequent determination may be made if the first application itself has not been modified.
And S2, uploading a second verification code related to the image after the first verification code is approved by the network system, so that the network system performs the first verification on the image by using the second verification code, wherein the second verification code includes characteristic information of the image. In one embodiment, when the first verification code is approved by the network system, the first application itself is considered to be unmodified, and then the terminal device uploads a second verification code to the network system established based on the block chain, where the second verification code includes characteristic information of the acquired image, for example, the first verification code may include image encryption information, an IMEI number (device number) of the terminal acquiring the image, time information of uploading the image, and image-related code information, and the image encryption information may be encrypted by using an asymmetric encryption means to ensure the authenticity of the image. In one embodiment, the first application generates the second verification code when acquiring the image, and generates the second verification code when taking a picture, for example, to ensure that the generated second verification code is the verification code corresponding to the image. The network system may perform the first verification on the image by using the second verification code, such as verifying whether the image is the original image, modified or not, or if the modified image is modified according to a prescribed manner (if modified by an official party), and the like, and the manner of using the second verification code may be various, such as comparing the current verification code uploaded again by using the second verification code, and the like. It should be noted that, in this embodiment, the image itself does not need to be uploaded to the network system, and the second verification code is uploaded, so that system resources are effectively saved, and the verification cost is extremely low.
In an embodiment of the present application, with reference to fig. 3, the performing, by the network system, the first verification on the image by using the second verification code includes: and uploading the current verification code related to the image so that the network system compares the second verification code with the current verification code to judge whether the image is an original image. Specifically, if it is necessary to verify the current image, for example, whether a certain photo is a modified photo needs to be verified, the current verification code associated with the original photo may be uploaded, and the current verification code may be generated in the same manner as the second verification code, for example, in the same encryption manner (e.g., encryption using a hash algorithm), so as to facilitate comparison. In one embodiment, since the second verification code may be generated when the first application program acquires an image, and the current verification code is a verification code generated when a certain image needs to be verified, the network system may acquire the second verification code, store the second verification code, call the second verification code when the network system is used, compare the second verification code with the current verification code, and if the second verification code is the same as the current verification code, the image may be regarded as an original image.
In an embodiment of the present application, the first verification code includes current code information of the first application, and uploading the first verification code generated based on the first application to the network system established based on the blockchain to verify the first application itself includes the following steps: and uploading the current code information so that the network system judges whether the current code information has a program segment for modifying the image according to an original program of the first application program, wherein the original program is prestored in the network system. Specifically, the current code information corresponds to the whole or part of the program segment of the first application program when the first verification code is uploaded, and it can be determined whether the first application program meets the preset specification, specifically, whether the first application program has a program segment with an image modified or not, if the first application program has a modified portion, the first application program is likely to modify the image, of course, if the first application program has a modified portion, the preset specification may also be whether the modified portion of the first application program meets the requirement, and if the modified portion is not for modifying the image, but a patch of the first application program makes the first application program more perfect, the first application program may be considered to meet the preset specification. In one embodiment, the original program of the first application program is pre-stored in the network system, so that the network system can better use the original program to judge the first application program under the current condition, that is, the network system can make an accurate judgment according to the original basis when judging.
In an embodiment of the present application, as shown in fig. 2, the image verification method based on blockchain further includes the following steps: s3, uploading the third verification code; and S4, after receiving a response that the network system judges the third verification code to be legal, starting the first application program to acquire the image, wherein the uploaded third verification code is associated with the verification result of the first verification code. Specifically, after the first verification code is approved by the network system based on the block chain technology, the terminal device such as the mobile phone can upload the third verification code to the network system, and the network system sends a signal to the terminal device such as the mobile phone after judging that the third verification code is legal, so that the terminal device starts the first application program to acquire the image. And when the network system receives the third verification code and judges that the third verification code is legal, the network system sends a corresponding feedback signal to the terminal equipment so as to inform the terminal equipment that the terminal equipment can start working after receiving the request.
In an embodiment of the present application, the feature information of the image is asymmetric encryption information of the image, and the step of uploading the current verification code related to the image so that the network system compares the second verification code with the current verification code to determine whether the image is an original image includes the following steps: and generating current encryption information of the current verification code by using the same encryption mode as the asymmetric encryption information, so that the network system compares the current encryption information with the asymmetric encryption information to verify whether the image is an original image. In contrast, a symmetric encryption algorithm uses the same key for encryption and decryption, and a non-symmetric encryption algorithm requires two keys for encryption and decryption, namely a public key and a private key. The public key and the private key are corresponding, if the data is encrypted by the public key, only the corresponding private key can be used for decryption, and if the data is encrypted by the private key, only the corresponding public key can be used for decryption, so that the security is higher. In this embodiment, the asymmetric encryption is performed on the feature information of the image to obtain asymmetric encryption information of the image, and when the network system verifies whether the image is modified or not, or verifies whether the image is modified according to a specified manner or not, the current encryption information and the asymmetric encryption information can be compared, so that the correctness of the verification is ensured.
In another embodiment, the feature information of the image may be encrypted by using a one-way encryption method to generate one-way encryption information, and when comparing the second verification code with the current verification code, the current encryption information of the current verification code may be generated by using the same encryption method as the one-way encryption, so that the network system compares the current encryption information with the one-way encryption information to verify whether the image is the original image.
The embodiment of the application also provides an image verification device based on the block chain, the image verification device can be applied to terminal equipment such as a mobile phone, images acquired by the terminal equipment, such as pictures shot by the mobile phone, can be judged whether the images are original images or not by combining the block chain technology, and the verification method is safe and reliable and has high accuracy. As shown in fig. 4 in combination with fig. 3, the image verification apparatus includes a communication module and a processing module;
the communication module is configured to upload a first verification code generated based on a first application program to a network system established based on a block chain so as to verify the first application program, wherein the first application program is used for generating an image. The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm, the consensus mechanism is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes in a block chain system, the block chain is a decentralized database in essence, and meanwhile, as a bottom layer technology, the block chain is also a string of data blocks which are generated by correlation of a cryptography method, and related data processing can be verified. The first application may be an application loaded on the terminal device, which is capable of generating a video, which is capable of being used to draw an image, take a video, or take a photograph, etc. The first verification code can represent information of the application program itself, such as an IMEI number of a mobile phone, current time information, an application program code, and the like, and is encrypted and encoded to prevent hijacking or cracking. In another embodiment, when the first application program is started to acquire the image, the first verification code is generated accordingly, so as to ensure that the generated first verification code is the application program corresponding to the image. In addition, in this embodiment, the network system using the blockchain technology acquires the first verification code uploaded by the communication module, and analyzes the first verification code, so as to determine whether the first application program itself is modified. If the first application itself is modified then it is likely that the image it acquired will also be modified. A subsequent determination may be made if the first application itself has not been modified.
The processing module is configured to upload a second verification code related to the image after the first verification code is approved by the network system, so that the network system performs first verification on the image by using the second verification code, wherein the second verification code includes feature information of the image. In one embodiment, when the first verification code is approved by the network system, the first application itself is considered to be unmodified, and then the terminal device uploads a second verification code to the network system established based on the block chain, where the second verification code includes characteristic information of the acquired image, for example, the first verification code may include image encryption information, an IMEI number (device number) of the terminal acquiring the image, time information of uploading the image, and image-related code information, and the image encryption information may be encrypted by using an asymmetric encryption means to ensure the authenticity of the image. In one embodiment, the processing module generates the second verification code when the first application program obtains the image, and generates the second verification code when the photo is taken, so as to ensure that the generated second verification code is the verification code corresponding to the image. The network system may perform the first verification on the image by using the second verification code, such as verifying whether the image is the original image, modified or not, or if the modified image is modified according to a prescribed manner (if modified by an official party), and the like, and the manner of using the second verification code may be various, such as comparing the current verification code uploaded again by using the second verification code, and the like. It should be noted that, in this embodiment, the image itself does not need to be uploaded to the network system, and the second verification code is uploaded, so that system resources are effectively saved, and the verification cost is extremely low.
In an embodiment of the present application, with reference to fig. 3, the processing module is further configured to upload a current verification code associated with the image, so that the network system compares the second verification code with the current verification code to determine whether the image is an original image. Specifically, if it is necessary to verify the current image, for example, whether a certain photo is a modified photo needs to be verified, the current verification code related to the original photo may be uploaded, and the processing module may generate the current verification code in the same manner as the second verification code, for example, in the same encryption manner (for example, encryption using a hash algorithm), so as to facilitate comparison. In one embodiment, since the second verification code may be generated when the first application program acquires an image, and the current verification code is a verification code generated when a certain image needs to be verified, the network system may acquire the second verification code, store the second verification code, call the second verification code when the network system is used, compare the second verification code with the current verification code, and if the second verification code is the same as the current verification code, the image may be regarded as an original image.
In an embodiment of the application, the first verification code includes current code information of the first application program, and the processing module is further configured to upload the current code information, so that the network system determines whether the current code information has a program segment for modifying an image according to an original program of the first application program, where the original program is pre-stored in the network system. Specifically, the current code information corresponds to the whole or part of the program segment of the first application program when the first verification code is uploaded, and it can be determined whether the first application program meets the preset specification, specifically, whether the first application program has a program segment with an image modified or not, if the first application program has a modified portion, the first application program is likely to modify the image, of course, if the first application program has a modified portion, the preset specification may also be whether the modified portion of the first application program meets the requirement, and if the modified portion is not for modifying the image, but a patch of the first application program makes the first application program more perfect, the first application program may be considered to meet the preset specification. In one embodiment, the original program of the first application program is pre-stored in the network system, so that the network system can better use the original program to judge the first application program under the current condition, that is, the network system can make an accurate judgment according to the original basis when judging.
In an embodiment of the application, the image verification apparatus further includes an obtaining module, where the obtaining module is configured to start the first application program to obtain the image after the communication module uploads the third verification code and receives a response that the network system determines that the third verification code is legal, where the communication module uploads the third verification code and is associated with an audit result of the processing module on the first verification code. Specifically, after the first verification code is approved by the network system based on the block chain technology, the terminal device such as the mobile phone can upload the third verification code to the network system, and the network system sends a signal to the terminal device such as the mobile phone to be acquired by the acquisition module after judging that the third verification code is legal, so that the terminal device starts the first application program to acquire the image. And when the network system receives the third verification code and judges that the third verification code is legal, the network system sends a corresponding feedback signal to the terminal equipment so as to inform the terminal equipment that the terminal equipment can start working after receiving the request.
In an embodiment of the application, the encryption information of the image is asymmetric encryption information of the image, and the processing module is further configured to: and generating current encryption information of the current verification code by using the same encryption mode as the asymmetric encryption information, so that the network system compares the current encryption information with the asymmetric encryption information to verify whether the image is an original image. In contrast, a symmetric encryption algorithm uses the same key for encryption and decryption, and a non-symmetric encryption algorithm requires two keys for encryption and decryption, namely a public key and a private key. The public key and the private key are corresponding, if the data is encrypted by the public key, only the corresponding private key can be used for decryption, and if the data is encrypted by the private key, only the corresponding public key can be used for decryption, so that the security is higher. In this embodiment, the processing module performs asymmetric encryption on the feature information of the image to obtain asymmetric encryption information of the image, and when the network system verifies whether the image is modified or not, or verifies whether the image is modified according to a specified manner or not, the current encryption information and the asymmetric encryption information can be compared, so that the correctness of the verification is ensured.
In another embodiment, the image feature information processing module may encrypt unidirectional encryption information generated by using a unidirectional encryption method, and when the network system compares the second verification code with the current verification code, the network system may generate the current encryption information of the current verification code in the same encryption manner as the unidirectional encryption, so that the network system compares the current encryption information with the unidirectional encryption information to verify whether the image is the original image.
The above embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and the scope of the present invention is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present invention, and such modifications and equivalents should also be considered as falling within the scope of the present invention.

Claims (10)

1. An image verification method based on a block chain comprises the following steps:
uploading a first verification code generated based on a first application program to a network system established based on a block chain so as to verify the first application program, wherein the first application program is used for generating an image;
uploading a second verification code related to the image after the first verification code is approved by the network system, so that the network system performs first verification on the image by using the second verification code, wherein the second verification code includes feature information of the image, the image is not uploaded to the network system, and the first verification includes: verifying whether the image was modified or if the image was modified in a prescribed manner.
2. The method of claim 1, wherein the network system performing a first verification on the image using the second verification code comprises:
and uploading the current verification code related to the image so that the network system compares the second verification code with the current verification code to judge whether the image is an original image.
3. The method of claim 1, wherein the first verification code comprises current code information of the first application, and the uploading of the first verification code generated based on the first application to the network system established based on the blockchain to verify the first application comprises:
and uploading the current code information to enable the network system to judge whether the current code information has a program segment for modifying the image or not according to an original program of the first application program, wherein the original program is prestored in the network system.
4. The method of claim 1, further comprising:
uploading the third verification code;
and after receiving a response that the network system judges that the third verification code is legal, starting the first application program to acquire the image, wherein the uploaded third verification code is associated with the verification result of the first verification code.
5. The method of claim 2, wherein the feature information of the image is asymmetric encryption information of the image, and the uploading a current verification code associated with the image to enable the network system to compare the second verification code with the current verification code to determine whether the image is an original image comprises:
and generating current encryption information of the current verification code by using the same encryption mode as the asymmetric encryption information, so that the network system compares the current encryption information with the asymmetric encryption information to verify whether the image is an original image.
6. An image verification device based on a block chain comprises a communication module and a processing module;
the communication module is configured to upload a first verification code generated based on a first application program to a network system established based on a block chain so as to verify the first application program, wherein the first application program is used for generating an image;
the processing module is configured to upload a second verification code related to the image after the first verification code is approved by the network system, so that the network system performs a first verification on the image by using the second verification code, wherein the second verification code includes feature information of the image, the image itself is not uploaded to the network system, and the first verification includes: verifying whether the image was modified or if the image was modified in a prescribed manner.
7. The apparatus of claim 6, wherein the processing module is further configured to upload a current verification code associated with the image, so that the network system compares the second verification code with the current verification code to determine whether the image is an original image.
8. The apparatus of claim 6, wherein the first verification code comprises current code information of a first application program, and the processing module is further configured to upload the current code information, so that the network system determines whether there is a program segment in the current code information for modifying the image according to an original program of the first application program, wherein the original program is pre-stored in the network system.
9. The apparatus according to claim 6, further comprising an obtaining module configured to start the first application to obtain the image after the communication module uploads a third verification code and receives a response that the network system determines that the third verification code is valid, wherein the third verification code uploaded by the communication module is associated with a result of the processing module examining the first verification code.
10. The apparatus of claim 7, the encrypted information of the image being asymmetric encrypted information of the image, the processing module further configured to: and generating current encryption information of the current verification code by using the same encryption mode as the asymmetric encryption information, so that the network system compares the current encryption information with the asymmetric encryption information to verify whether the image is an original image.
CN201810264446.3A 2018-03-28 2018-03-28 Image verification method and device based on block chain Active CN108600180B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810264446.3A CN108600180B (en) 2018-03-28 2018-03-28 Image verification method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810264446.3A CN108600180B (en) 2018-03-28 2018-03-28 Image verification method and device based on block chain

Publications (2)

Publication Number Publication Date
CN108600180A CN108600180A (en) 2018-09-28
CN108600180B true CN108600180B (en) 2020-11-20

Family

ID=63624806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810264446.3A Active CN108600180B (en) 2018-03-28 2018-03-28 Image verification method and device based on block chain

Country Status (1)

Country Link
CN (1) CN108600180B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110460445B (en) * 2019-07-10 2022-04-26 南京邮电大学 Vulnerability processing chain network architecture based on information security industry yield and benefit
CN112309525B (en) * 2020-11-09 2022-01-25 南通市第一人民医院 Refractive development file management method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN106792267A (en) * 2016-12-28 2017-05-31 北京真信网络科技有限公司 A kind of picture and video information authenticity mark and the system and method for differentiating
CN106815526A (en) * 2016-12-27 2017-06-09 苏州春禄电子科技有限公司 A kind of safety-type database storage system based on block chain technology
CN107077557A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 The method and device that software application is issued and verified
CA2931469A1 (en) * 2016-03-27 2017-09-27 Sal Khan Portable verifiable credentials and methods thereof
CN107332900A (en) * 2017-06-27 2017-11-07 山东浪潮商用系统有限公司 A kind of privately owned block chain management platform of support Internet of Things fused business
CN107395360A (en) * 2017-07-23 2017-11-24 刘志强 The method that a kind of historical relic and art work numeral based on block chain technology deposit card

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2931469A1 (en) * 2016-03-27 2017-09-27 Sal Khan Portable verifiable credentials and methods thereof
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN106815526A (en) * 2016-12-27 2017-06-09 苏州春禄电子科技有限公司 A kind of safety-type database storage system based on block chain technology
CN106792267A (en) * 2016-12-28 2017-05-31 北京真信网络科技有限公司 A kind of picture and video information authenticity mark and the system and method for differentiating
CN107077557A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 The method and device that software application is issued and verified
CN107332900A (en) * 2017-06-27 2017-11-07 山东浪潮商用系统有限公司 A kind of privately owned block chain management platform of support Internet of Things fused business
CN107395360A (en) * 2017-07-23 2017-11-24 刘志强 The method that a kind of historical relic and art work numeral based on block chain technology deposit card

Also Published As

Publication number Publication date
CN108600180A (en) 2018-09-28

Similar Documents

Publication Publication Date Title
US10313338B2 (en) Authentication method and device using a single-use password including biometric image information
US10454913B2 (en) Device authentication agent
CN107864115B (en) Method for user account login verification by using portable terminal
KR102115641B1 (en) Method and apparatus of verifying usability of biological characteristic image
US8689300B2 (en) Method and system for generating digital fingerprint
CN108234442B (en) Method, system and readable storage medium for acquiring contract
US10298565B2 (en) Method and apparatus for user identity authentication
CN110351089B (en) Data signature authentication method and device
US20080189772A1 (en) Method for generating digital fingerprint using pseudo random number code
CN112953707A (en) Key encryption method, decryption method, data encryption method and decryption method
CN108600180B (en) Image verification method and device based on block chain
CN112995144A (en) File processing method and system, readable storage medium and electronic device
CN111163164B (en) Cloud desktop secure transmission method and device based on Roc chip
KR101338341B1 (en) Cctv media secure transmission system and method thereof
Buhan et al. Secure ad-hoc pairing with biometrics: SAfE
JP7250960B2 (en) User authentication and signature device using user biometrics, and method thereof
KR101927336B1 (en) APPARATUS AND METHOD FOR IDENTIFY TERMINAL DEVICE USER and FALSIFICATION OR TEMPERING
KR101912403B1 (en) Method for security authentication between equipment
KR20180116628A (en) User access authentication system based on personal image
CN109214425B (en) Picture verification method, picture processing method, equipment and system
KR101607234B1 (en) System and method for user authentication
JP7388588B1 (en) Authentication system
Buhan et al. Feeling is believing: a secure template exchange protocol
JP7343680B2 (en) Authentication device, authentication support method, and program
KR20190013153A (en) Authentication system and method of photographic informaton

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant