CN109033887A - A method of enclosing in block chain with having supervision can not tampered image - Google Patents

A method of enclosing in block chain with having supervision can not tampered image Download PDF

Info

Publication number
CN109033887A
CN109033887A CN201810814582.5A CN201810814582A CN109033887A CN 109033887 A CN109033887 A CN 109033887A CN 201810814582 A CN201810814582 A CN 201810814582A CN 109033887 A CN109033887 A CN 109033887A
Authority
CN
China
Prior art keywords
block chain
user
access
image
control data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810814582.5A
Other languages
Chinese (zh)
Other versions
CN109033887B (en
Inventor
程昔恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810814582.5A priority Critical patent/CN109033887B/en
Publication of CN109033887A publication Critical patent/CN109033887A/en
Application granted granted Critical
Publication of CN109033887B publication Critical patent/CN109033887B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention discloses it is a kind of have supervision in block chain enclose can not tampered image method, by the way that user images are uploaded control data corporation, control data corporation supervises image data, one access link is returned to legal data, access link is issued instruction access block chain as director data by user, block chain is after receiving instruction, according to the access links and accesses control data corporation in director data, obtain complete user image data, after the picture number that block chain will acquire encloses block chain, return to the unique access cryptographic Hash of user its image data in block chain, to enclose the image that can not be distorted in block chain with realizing supervision.

Description

A method of enclosing in block chain with having supervision can not tampered image
Technical field
The invention belongs to technical field of information processing more particularly to one kind to enclose and can not distort in block chain with having supervision The method of image.
Background technique
Block chain technology is the distributed account book technology occurred in recent years, is Distributed Storage, point-to-point transmission, common recognition The set of applications of the computer information technologies such as mechanism, Encryption Algorithm.From the point of view of data plane, block chain will count sequentially in time According to block in such a way that sequence is connected a kind of linked data structure for being combined into, its main feature is that decentralization, it is open and clear, can not Change can not forge.Block chain technology has wide practical use in product fidelity, traceability system.
According to the safety feature of block chain, the data being stored in block chain anyone can not all obtain permission to data into Row is distorted, and also unsuppressible-suppression, can not forge, this makes block chain can be the guarantors of a kind of ideal, safety, disclosed data Deposit technology, but this can not trace the source of bad data, can not delete umber of defectives simultaneously but also data supervision is difficult to realize According to.
Summary of the invention
It can not tampered image in order to solve the above technical problems, being enclosed in block chain with having supervision the present invention provides one kind Method, user images are uploaded into control data corporation first, control data corporation supervises image data, to legal Data return to an access link, access link are issued instruction access block chain as director data, block chain is receiving After instruction, according to the access links and accesses control data corporation in director data, complete user image data, block chain are obtained After the user images that will acquire enclose block chain, the unique access Hash of user its image data in block chain is returned to Value.
Further, it is described it is a kind of have supervision in block chain enclose can not tampered image method specific steps packet It includes:
1) user images are uploaded into control data corporation;
2) control data corporation is checked and is filtered to image after receiving the image data that user uploads, and is returned to legal image Return an access link;
3) user obtains user images and links in the access of control data corporation;
4) access link is issued into instruction access block chain as director data;
5) director data is decoded into access link, accesses control data corporation by block chain after receiving instruction;
6) control data corporation links the user images for extracting caching according to access, and complete image data is transferred to area Block chain;
7) image data received is enclosed block chain by block chain, and generates unique access of the image data in block chain Cryptographic Hash;
8) user obtains unique access cryptographic Hash of the user images in block chain, and accesses block chain with the cryptographic Hash, extracts User image data.
Further, the control data corporation presets image inspection and filtering function.
Further, the control data corporation calculates the cryptographic Hash for the user images that user uploads and makees the cryptographic Hash For user images control data corporation access key value, and according to the key assignments generate user images access link;
Optionally, the control data corporation calculates the cryptographic Hash of user images and particular key that user uploads.
Further, director data is construed to access link after receiving user instructions by the block chain, and extracts institute State the cryptographic Hash of control data corporation calculating.
Further, the block chain is when obtaining user images using access links and accesses control data corporation, data Complete user image data is transferred to block chain by administrative center.
Further, the block chain calculates the cryptographic Hash of the user image data got from control data corporation, and Judge the access of the cryptographic Hash and user images link in cryptographic Hash consistency;
Optionally, the block chain calculates the cryptographic Hash of user image data and an optional particular key.
Further, legal user image data is enclosed block chain by the block chain, returns to image data to user Unique access cryptographic Hash on block chain.
Optionally, image data can not only be enclosed block chain by user, can also be by other data such as text or audio Enclosed block chain.
The beneficial effect comprise that user, is transmitted directly to the finger of block chain by one, introducing control data corporation It enables data be construed to the link of access control data corporation, and obtains legal complete user images from control data corporation, The supervision and management for it is expected user the user image data of enclosed block chain is realized, the filtering of bad data is realized;Secondly, Block chain encloses block chain from the complete image data that control data corporation obtains user, realizes decentralization, the public affairs of data Open it is transparent, can not change, can not forge and store and access.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present invention, schematic reality of the invention It applies example and its explanation is used to explain the present invention, do not constitute improper limitations of the present invention.
Fig. 1 be embodiment described in it is a kind of have supervision in block chain enclose can not tampered image method structural representation Figure.
Fig. 2 be embodiment described in it is a kind of have supervision in block chain enclose can not tampered image method flow diagram.
Specific embodiment
Present embodiments provide it is a kind of have supervision in block chain enclose can not tampered image method, the method Flow chart combination Fig. 1 and Fig. 2 are described as follows:
Step S201, user's upload user image to control data corporation;
Wherein, the control data corporation is previously provided with image inspection and filtering function.
Step S202, the image that the control data corporation uploads user are checked and are filtered, and generate the figure The access of picture links;
Wherein, the control data corporation generates verification cryptographic Hash to legal data, using the cryptographic Hash as access link A part returns to user;
Wherein, the control data corporation calculates the Hash of legal data and an optional particular key that user uploads Value;
Wherein, the control data corporation returns to fixed error message to illegal data.
Step S203, user obtain the user images and link in the access of the control data corporation.
Step S204, user issue instruction access block chain;
Wherein, the instruction that the user images are instructed in the access link of the control data corporation as access block chain Data, such as using ether mill as block chain example, then the user instruction is to be designed as ether mill transaction transfer transaction instructions, transaction The amount of money (value field) is 0, data (data field) of the access link as the trading instruction of ether mill.
Step S205, block chain control data corporation according to the access links and accesses;
Wherein, the abuse for the director data that access block chain instructs in order to prevent, the block chain is without exception by described instruction data It is construed to access link, and with control data corporation described in the access links and accesses, such as using ether mill as block chain example, is then needed Corresponding function modification is made to the node in ether mill, be allowed to meet demand of the present invention.
Step S206, the block chain obtain the user images;
Wherein, the control data corporation is linked according to the access of the block chain, the user images of caching is obtained, by institute It states user images and is transferred to the block chain.
The user images are enclosed block chain by step S207, the block chain;
Wherein, the cryptographic Hash that the block chain calculates in the cryptographic Hash and the access link of the user images is compared To after verifying the correct user images, the user images block chain is enclosed, such as using ether mill as block chain example, It then needs the node to ether mill to make corresponding function modification, the user image data is converted to hexadecimal character string, It is included in block as transaction data, after digging mine confirmation via miner, encloses block chain.
Step S208, user obtain unique access cryptographic Hash of the user images in the block chain;
Wherein, the block chain using user image data as the data field of transaction after, calculate the cryptographic Hash entirely traded, will Unique identification of the cryptographic Hash of trading as the transaction comprising the user image data, can be in block chain with the transaction Hash Value finds the transaction comprising the user image data, thus extract the data field of transaction, i.e., the described user images.
In conclusion described in the present embodiment it is a kind of enclosed in block chain with having supervision can not tampered image method it is first First by user will be stored in the user images in block chain upload control data corporation, control data corporation to image data into Row supervision returns to an access link to legal data, and access link is issued instruction access as director data by user Block chain, block chain, according to the access links and accesses control data corporation in director data, obtain complete after receiving instruction User images after the user images that block chain will acquire enclose block chain, return to unique visit of the image data in block chain Cryptographic Hash is asked, so that enclosing in block chain with having realized supervision can not tampered image.
Technical solution provided by the present invention is described in detail above, for those of ordinary skill in the art, Thought according to an embodiment of the present invention, there will be changes in the specific implementation manner and application range, in conclusion this theory Bright book content should not be construed as limiting the invention.

Claims (5)

1. it is a kind of enclosed in block chain with having supervision can not tampered image method, which is characterized in that by by user images Control data corporation is uploaded, control data corporation supervises image data, an access link is returned to legal data, Access link is issued instruction access block chain as director data by user, and block chain is after receiving instruction, according to instruction number Access links and accesses control data corporation in obtains complete image data, and the image that block chain will acquire encloses block After chain, the unique access cryptographic Hash of user its image data in block chain is returned to.
2. it is according to claim 1 it is a kind of have supervision in block chain enclose can not tampered image method, feature It is, the specific steps of the method include:
1) user's upload user image is to control data corporation;
2) control data corporation is checked and is filtered to image after receiving the image data that user uploads, and is returned to legal picture Return an access link;
3) user obtains user images and links in the access of control data corporation;
4) access link is issued instruction access block chain as director data by user;
5) director data is decoded into access link, accesses control data corporation by block chain after receiving instruction;
6) control data corporation links the user images for extracting caching according to access, and complete image data is transferred to block Chain;
7) user images received are enclosed block chain by block chain, and generate unique access of the image data in block chain Cryptographic Hash;
8) user obtains unique access cryptographic Hash of its image in block chain, and accesses block chain with the cryptographic Hash, extracts and uses Family image data.
3. it is according to claim 2 it is a kind of have supervision in block chain enclose can not tampered image method, feature It is, the control data corporation presets image inspection and filtering function.
4. it is according to claim 2 it is a kind of have supervision in block chain enclose can not tampered image method, feature It is, the control data corporation calculates the cryptographic Hash for the image that user uploads and using the cryptographic Hash as user images in data The access key value of administrative center, and linked with the access that the key assignments generates user images.
5. it is according to claim 2 it is a kind of have supervision in block chain enclose can not tampered image method, feature It is, the block chain calculates the cryptographic Hash of user image data, and sentence after obtaining road user images from control data corporation The access of the cryptographic Hash of breaking and user images link in cryptographic Hash consistency.
CN201810814582.5A 2018-07-23 2018-07-23 Method for embedding non-falsifiable image in block chain under supervision Active CN109033887B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810814582.5A CN109033887B (en) 2018-07-23 2018-07-23 Method for embedding non-falsifiable image in block chain under supervision

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810814582.5A CN109033887B (en) 2018-07-23 2018-07-23 Method for embedding non-falsifiable image in block chain under supervision

Publications (2)

Publication Number Publication Date
CN109033887A true CN109033887A (en) 2018-12-18
CN109033887B CN109033887B (en) 2021-07-23

Family

ID=64645249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810814582.5A Active CN109033887B (en) 2018-07-23 2018-07-23 Method for embedding non-falsifiable image in block chain under supervision

Country Status (1)

Country Link
CN (1) CN109033887B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902080A (en) * 2019-01-24 2019-06-18 北京太一智源科技有限公司 The data monitoring and managing method of block chain

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892904A (en) * 1996-12-06 1999-04-06 Microsoft Corporation Code certification for network transmission
US20110040732A1 (en) * 2009-08-14 2011-02-17 International Business Machines Corporation Approach for securing distributed deduplication software
CN104410679A (en) * 2014-11-20 2015-03-11 北京奇虎科技有限公司 Method, client terminal, server and system of extracting shared file/file folder
CN104468640A (en) * 2013-09-13 2015-03-25 中国电信股份有限公司 Method and device for achieving sharing of cloud storage space
US9336394B2 (en) * 2007-01-07 2016-05-10 Apple Inc. Securely recovering a computing device
CN106549951A (en) * 2016-10-24 2017-03-29 北京奇虎科技有限公司 A kind of guard method for sharing file, device and mobile terminal
CN107145768A (en) * 2016-03-01 2017-09-08 华为技术有限公司 Copyright managing method and system
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892904A (en) * 1996-12-06 1999-04-06 Microsoft Corporation Code certification for network transmission
US9336394B2 (en) * 2007-01-07 2016-05-10 Apple Inc. Securely recovering a computing device
US20110040732A1 (en) * 2009-08-14 2011-02-17 International Business Machines Corporation Approach for securing distributed deduplication software
CN104468640A (en) * 2013-09-13 2015-03-25 中国电信股份有限公司 Method and device for achieving sharing of cloud storage space
CN104410679A (en) * 2014-11-20 2015-03-11 北京奇虎科技有限公司 Method, client terminal, server and system of extracting shared file/file folder
CN107145768A (en) * 2016-03-01 2017-09-08 华为技术有限公司 Copyright managing method and system
CN106549951A (en) * 2016-10-24 2017-03-29 北京奇虎科技有限公司 A kind of guard method for sharing file, device and mobile terminal
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902080A (en) * 2019-01-24 2019-06-18 北京太一智源科技有限公司 The data monitoring and managing method of block chain

Also Published As

Publication number Publication date
CN109033887B (en) 2021-07-23

Similar Documents

Publication Publication Date Title
CN108985100B (en) Block chain-based element security certification method, device, equipment and medium
CN110427774A (en) Data based on block chain deposit card method, data verification method and relevant apparatus
TW202037115A (en) Systems and methods for efficient and secure processing, accessing and transmission of data via a blockchain network
CN107171812A (en) It is a kind of based on block chain without key signature infrastructure construction method
CN106778343A (en) It is a kind of that the data sharing method of private data is related to based on block chain
EP3308280A2 (en) Making cryptographic claims about stored data using an anchoring system
CN109753817A (en) Medical information secure storage scheme based on block chain
CN109815051A (en) The data processing method and system of block chain
CN109543065A (en) A kind of video active identification method of combination block chain
CN112804218B (en) Block chain-based data processing method, device, equipment and storage medium
CN108197479A (en) The judgment method and system of electronic contract time of signature accuracy
CN107481140A (en) Voucher identification code processing method and system, server and storage medium
CN107871081A (en) A kind of computer information safe system
CN107688993A (en) A kind of credit information distribution account book system and record dissemination method
CN105765941A (en) Illegal access server prevention method and device
CN106557704A (en) Information and data framework in content center network
CN109785222A (en) A method of the information for webpage is quickly embedded in and extracts
CN104504507A (en) Network verification system with verification code seal and operation method of network verification system
CN103778353A (en) Method, device and system for signing electronic file
CN110909381A (en) Block chain-based user comment tamper-proof system and method
CN109831479A (en) The data processing method and system of block chain
CN114500093A (en) Safe interaction method and system for message information
CN110163750A (en) A kind of electronic evidence certification and exchange method and system based on block chain
CN109889343B (en) Electronic invoice circulation control method, device and system
CN109033887A (en) A method of enclosing in block chain with having supervision can not tampered image

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant