CN109033887A - A method of enclosing in block chain with having supervision can not tampered image - Google Patents
A method of enclosing in block chain with having supervision can not tampered image Download PDFInfo
- Publication number
- CN109033887A CN109033887A CN201810814582.5A CN201810814582A CN109033887A CN 109033887 A CN109033887 A CN 109033887A CN 201810814582 A CN201810814582 A CN 201810814582A CN 109033887 A CN109033887 A CN 109033887A
- Authority
- CN
- China
- Prior art keywords
- block chain
- user
- access
- image
- control data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Abstract
The invention discloses it is a kind of have supervision in block chain enclose can not tampered image method, by the way that user images are uploaded control data corporation, control data corporation supervises image data, one access link is returned to legal data, access link is issued instruction access block chain as director data by user, block chain is after receiving instruction, according to the access links and accesses control data corporation in director data, obtain complete user image data, after the picture number that block chain will acquire encloses block chain, return to the unique access cryptographic Hash of user its image data in block chain, to enclose the image that can not be distorted in block chain with realizing supervision.
Description
Technical field
The invention belongs to technical field of information processing more particularly to one kind to enclose and can not distort in block chain with having supervision
The method of image.
Background technique
Block chain technology is the distributed account book technology occurred in recent years, is Distributed Storage, point-to-point transmission, common recognition
The set of applications of the computer information technologies such as mechanism, Encryption Algorithm.From the point of view of data plane, block chain will count sequentially in time
According to block in such a way that sequence is connected a kind of linked data structure for being combined into, its main feature is that decentralization, it is open and clear, can not
Change can not forge.Block chain technology has wide practical use in product fidelity, traceability system.
According to the safety feature of block chain, the data being stored in block chain anyone can not all obtain permission to data into
Row is distorted, and also unsuppressible-suppression, can not forge, this makes block chain can be the guarantors of a kind of ideal, safety, disclosed data
Deposit technology, but this can not trace the source of bad data, can not delete umber of defectives simultaneously but also data supervision is difficult to realize
According to.
Summary of the invention
It can not tampered image in order to solve the above technical problems, being enclosed in block chain with having supervision the present invention provides one kind
Method, user images are uploaded into control data corporation first, control data corporation supervises image data, to legal
Data return to an access link, access link are issued instruction access block chain as director data, block chain is receiving
After instruction, according to the access links and accesses control data corporation in director data, complete user image data, block chain are obtained
After the user images that will acquire enclose block chain, the unique access Hash of user its image data in block chain is returned to
Value.
Further, it is described it is a kind of have supervision in block chain enclose can not tampered image method specific steps packet
It includes:
1) user images are uploaded into control data corporation;
2) control data corporation is checked and is filtered to image after receiving the image data that user uploads, and is returned to legal image
Return an access link;
3) user obtains user images and links in the access of control data corporation;
4) access link is issued into instruction access block chain as director data;
5) director data is decoded into access link, accesses control data corporation by block chain after receiving instruction;
6) control data corporation links the user images for extracting caching according to access, and complete image data is transferred to area
Block chain;
7) image data received is enclosed block chain by block chain, and generates unique access of the image data in block chain
Cryptographic Hash;
8) user obtains unique access cryptographic Hash of the user images in block chain, and accesses block chain with the cryptographic Hash, extracts
User image data.
Further, the control data corporation presets image inspection and filtering function.
Further, the control data corporation calculates the cryptographic Hash for the user images that user uploads and makees the cryptographic Hash
For user images control data corporation access key value, and according to the key assignments generate user images access link;
Optionally, the control data corporation calculates the cryptographic Hash of user images and particular key that user uploads.
Further, director data is construed to access link after receiving user instructions by the block chain, and extracts institute
State the cryptographic Hash of control data corporation calculating.
Further, the block chain is when obtaining user images using access links and accesses control data corporation, data
Complete user image data is transferred to block chain by administrative center.
Further, the block chain calculates the cryptographic Hash of the user image data got from control data corporation, and
Judge the access of the cryptographic Hash and user images link in cryptographic Hash consistency;
Optionally, the block chain calculates the cryptographic Hash of user image data and an optional particular key.
Further, legal user image data is enclosed block chain by the block chain, returns to image data to user
Unique access cryptographic Hash on block chain.
Optionally, image data can not only be enclosed block chain by user, can also be by other data such as text or audio
Enclosed block chain.
The beneficial effect comprise that user, is transmitted directly to the finger of block chain by one, introducing control data corporation
It enables data be construed to the link of access control data corporation, and obtains legal complete user images from control data corporation,
The supervision and management for it is expected user the user image data of enclosed block chain is realized, the filtering of bad data is realized;Secondly,
Block chain encloses block chain from the complete image data that control data corporation obtains user, realizes decentralization, the public affairs of data
Open it is transparent, can not change, can not forge and store and access.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present invention, schematic reality of the invention
It applies example and its explanation is used to explain the present invention, do not constitute improper limitations of the present invention.
Fig. 1 be embodiment described in it is a kind of have supervision in block chain enclose can not tampered image method structural representation
Figure.
Fig. 2 be embodiment described in it is a kind of have supervision in block chain enclose can not tampered image method flow diagram.
Specific embodiment
Present embodiments provide it is a kind of have supervision in block chain enclose can not tampered image method, the method
Flow chart combination Fig. 1 and Fig. 2 are described as follows:
Step S201, user's upload user image to control data corporation;
Wherein, the control data corporation is previously provided with image inspection and filtering function.
Step S202, the image that the control data corporation uploads user are checked and are filtered, and generate the figure
The access of picture links;
Wherein, the control data corporation generates verification cryptographic Hash to legal data, using the cryptographic Hash as access link
A part returns to user;
Wherein, the control data corporation calculates the Hash of legal data and an optional particular key that user uploads
Value;
Wherein, the control data corporation returns to fixed error message to illegal data.
Step S203, user obtain the user images and link in the access of the control data corporation.
Step S204, user issue instruction access block chain;
Wherein, the instruction that the user images are instructed in the access link of the control data corporation as access block chain
Data, such as using ether mill as block chain example, then the user instruction is to be designed as ether mill transaction transfer transaction instructions, transaction
The amount of money (value field) is 0, data (data field) of the access link as the trading instruction of ether mill.
Step S205, block chain control data corporation according to the access links and accesses;
Wherein, the abuse for the director data that access block chain instructs in order to prevent, the block chain is without exception by described instruction data
It is construed to access link, and with control data corporation described in the access links and accesses, such as using ether mill as block chain example, is then needed
Corresponding function modification is made to the node in ether mill, be allowed to meet demand of the present invention.
Step S206, the block chain obtain the user images;
Wherein, the control data corporation is linked according to the access of the block chain, the user images of caching is obtained, by institute
It states user images and is transferred to the block chain.
The user images are enclosed block chain by step S207, the block chain;
Wherein, the cryptographic Hash that the block chain calculates in the cryptographic Hash and the access link of the user images is compared
To after verifying the correct user images, the user images block chain is enclosed, such as using ether mill as block chain example,
It then needs the node to ether mill to make corresponding function modification, the user image data is converted to hexadecimal character string,
It is included in block as transaction data, after digging mine confirmation via miner, encloses block chain.
Step S208, user obtain unique access cryptographic Hash of the user images in the block chain;
Wherein, the block chain using user image data as the data field of transaction after, calculate the cryptographic Hash entirely traded, will
Unique identification of the cryptographic Hash of trading as the transaction comprising the user image data, can be in block chain with the transaction Hash
Value finds the transaction comprising the user image data, thus extract the data field of transaction, i.e., the described user images.
In conclusion described in the present embodiment it is a kind of enclosed in block chain with having supervision can not tampered image method it is first
First by user will be stored in the user images in block chain upload control data corporation, control data corporation to image data into
Row supervision returns to an access link to legal data, and access link is issued instruction access as director data by user
Block chain, block chain, according to the access links and accesses control data corporation in director data, obtain complete after receiving instruction
User images after the user images that block chain will acquire enclose block chain, return to unique visit of the image data in block chain
Cryptographic Hash is asked, so that enclosing in block chain with having realized supervision can not tampered image.
Technical solution provided by the present invention is described in detail above, for those of ordinary skill in the art,
Thought according to an embodiment of the present invention, there will be changes in the specific implementation manner and application range, in conclusion this theory
Bright book content should not be construed as limiting the invention.
Claims (5)
1. it is a kind of enclosed in block chain with having supervision can not tampered image method, which is characterized in that by by user images
Control data corporation is uploaded, control data corporation supervises image data, an access link is returned to legal data,
Access link is issued instruction access block chain as director data by user, and block chain is after receiving instruction, according to instruction number
Access links and accesses control data corporation in obtains complete image data, and the image that block chain will acquire encloses block
After chain, the unique access cryptographic Hash of user its image data in block chain is returned to.
2. it is according to claim 1 it is a kind of have supervision in block chain enclose can not tampered image method, feature
It is, the specific steps of the method include:
1) user's upload user image is to control data corporation;
2) control data corporation is checked and is filtered to image after receiving the image data that user uploads, and is returned to legal picture
Return an access link;
3) user obtains user images and links in the access of control data corporation;
4) access link is issued instruction access block chain as director data by user;
5) director data is decoded into access link, accesses control data corporation by block chain after receiving instruction;
6) control data corporation links the user images for extracting caching according to access, and complete image data is transferred to block
Chain;
7) user images received are enclosed block chain by block chain, and generate unique access of the image data in block chain
Cryptographic Hash;
8) user obtains unique access cryptographic Hash of its image in block chain, and accesses block chain with the cryptographic Hash, extracts and uses
Family image data.
3. it is according to claim 2 it is a kind of have supervision in block chain enclose can not tampered image method, feature
It is, the control data corporation presets image inspection and filtering function.
4. it is according to claim 2 it is a kind of have supervision in block chain enclose can not tampered image method, feature
It is, the control data corporation calculates the cryptographic Hash for the image that user uploads and using the cryptographic Hash as user images in data
The access key value of administrative center, and linked with the access that the key assignments generates user images.
5. it is according to claim 2 it is a kind of have supervision in block chain enclose can not tampered image method, feature
It is, the block chain calculates the cryptographic Hash of user image data, and sentence after obtaining road user images from control data corporation
The access of the cryptographic Hash of breaking and user images link in cryptographic Hash consistency.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810814582.5A CN109033887B (en) | 2018-07-23 | 2018-07-23 | Method for embedding non-falsifiable image in block chain under supervision |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810814582.5A CN109033887B (en) | 2018-07-23 | 2018-07-23 | Method for embedding non-falsifiable image in block chain under supervision |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109033887A true CN109033887A (en) | 2018-12-18 |
CN109033887B CN109033887B (en) | 2021-07-23 |
Family
ID=64645249
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810814582.5A Active CN109033887B (en) | 2018-07-23 | 2018-07-23 | Method for embedding non-falsifiable image in block chain under supervision |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109033887B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902080A (en) * | 2019-01-24 | 2019-06-18 | 北京太一智源科技有限公司 | The data monitoring and managing method of block chain |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5892904A (en) * | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
US20110040732A1 (en) * | 2009-08-14 | 2011-02-17 | International Business Machines Corporation | Approach for securing distributed deduplication software |
CN104410679A (en) * | 2014-11-20 | 2015-03-11 | 北京奇虎科技有限公司 | Method, client terminal, server and system of extracting shared file/file folder |
CN104468640A (en) * | 2013-09-13 | 2015-03-25 | 中国电信股份有限公司 | Method and device for achieving sharing of cloud storage space |
US9336394B2 (en) * | 2007-01-07 | 2016-05-10 | Apple Inc. | Securely recovering a computing device |
CN106549951A (en) * | 2016-10-24 | 2017-03-29 | 北京奇虎科技有限公司 | A kind of guard method for sharing file, device and mobile terminal |
CN107145768A (en) * | 2016-03-01 | 2017-09-08 | 华为技术有限公司 | Copyright managing method and system |
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
-
2018
- 2018-07-23 CN CN201810814582.5A patent/CN109033887B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5892904A (en) * | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
US9336394B2 (en) * | 2007-01-07 | 2016-05-10 | Apple Inc. | Securely recovering a computing device |
US20110040732A1 (en) * | 2009-08-14 | 2011-02-17 | International Business Machines Corporation | Approach for securing distributed deduplication software |
CN104468640A (en) * | 2013-09-13 | 2015-03-25 | 中国电信股份有限公司 | Method and device for achieving sharing of cloud storage space |
CN104410679A (en) * | 2014-11-20 | 2015-03-11 | 北京奇虎科技有限公司 | Method, client terminal, server and system of extracting shared file/file folder |
CN107145768A (en) * | 2016-03-01 | 2017-09-08 | 华为技术有限公司 | Copyright managing method and system |
CN106549951A (en) * | 2016-10-24 | 2017-03-29 | 北京奇虎科技有限公司 | A kind of guard method for sharing file, device and mobile terminal |
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902080A (en) * | 2019-01-24 | 2019-06-18 | 北京太一智源科技有限公司 | The data monitoring and managing method of block chain |
Also Published As
Publication number | Publication date |
---|---|
CN109033887B (en) | 2021-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108985100B (en) | Block chain-based element security certification method, device, equipment and medium | |
CN110427774A (en) | Data based on block chain deposit card method, data verification method and relevant apparatus | |
TW202037115A (en) | Systems and methods for efficient and secure processing, accessing and transmission of data via a blockchain network | |
CN107171812A (en) | It is a kind of based on block chain without key signature infrastructure construction method | |
CN106778343A (en) | It is a kind of that the data sharing method of private data is related to based on block chain | |
EP3308280A2 (en) | Making cryptographic claims about stored data using an anchoring system | |
CN109753817A (en) | Medical information secure storage scheme based on block chain | |
CN109815051A (en) | The data processing method and system of block chain | |
CN109543065A (en) | A kind of video active identification method of combination block chain | |
CN112804218B (en) | Block chain-based data processing method, device, equipment and storage medium | |
CN108197479A (en) | The judgment method and system of electronic contract time of signature accuracy | |
CN107481140A (en) | Voucher identification code processing method and system, server and storage medium | |
CN107871081A (en) | A kind of computer information safe system | |
CN107688993A (en) | A kind of credit information distribution account book system and record dissemination method | |
CN105765941A (en) | Illegal access server prevention method and device | |
CN106557704A (en) | Information and data framework in content center network | |
CN109785222A (en) | A method of the information for webpage is quickly embedded in and extracts | |
CN104504507A (en) | Network verification system with verification code seal and operation method of network verification system | |
CN103778353A (en) | Method, device and system for signing electronic file | |
CN110909381A (en) | Block chain-based user comment tamper-proof system and method | |
CN109831479A (en) | The data processing method and system of block chain | |
CN114500093A (en) | Safe interaction method and system for message information | |
CN110163750A (en) | A kind of electronic evidence certification and exchange method and system based on block chain | |
CN109889343B (en) | Electronic invoice circulation control method, device and system | |
CN109033887A (en) | A method of enclosing in block chain with having supervision can not tampered image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |