CN109861992B - Information interaction method and cross-scene tracking method of monitoring terminal - Google Patents

Information interaction method and cross-scene tracking method of monitoring terminal Download PDF

Info

Publication number
CN109861992B
CN109861992B CN201910025767.2A CN201910025767A CN109861992B CN 109861992 B CN109861992 B CN 109861992B CN 201910025767 A CN201910025767 A CN 201910025767A CN 109861992 B CN109861992 B CN 109861992B
Authority
CN
China
Prior art keywords
tracking
data
instruction
data packet
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910025767.2A
Other languages
Chinese (zh)
Other versions
CN109861992A (en
Inventor
邓小铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Infinova Intelligent Technology Co Ltd
Original Assignee
Shenzhen Infinova Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Infinova Intelligent Technology Co Ltd filed Critical Shenzhen Infinova Intelligent Technology Co Ltd
Priority to CN201910025767.2A priority Critical patent/CN109861992B/en
Publication of CN109861992A publication Critical patent/CN109861992A/en
Application granted granted Critical
Publication of CN109861992B publication Critical patent/CN109861992B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application is applicable to the technical field of data interaction, and provides an information interaction method, a cross-scene tracking device and terminal equipment of a monitoring terminal, wherein the information interaction method of the monitoring terminal comprises the following steps: acquiring first data, and performing hash calculation on the first data to obtain a first hash value; and integrating the first data and the first hash value into a first data packet, encrypting the first data packet by using a first private key, and broadcasting the encrypted first data packet to a block chain. The method and the device can solve the problems that when the existing monitoring terminal carries out information interaction, information delay packet loss is easy to happen, and information cannot be guaranteed not to be maliciously tampered in the transmission process.

Description

Information interaction method and cross-scene tracking method of monitoring terminal
Technical Field
The application belongs to the technical field of data interaction, and particularly relates to an information interaction method, a cross-scene tracking method and device of a monitoring terminal and terminal equipment.
Background
Along with the construction and development of Internet of things projects such as smart cities, numerous monitoring terminals are distributed in the cities, and the monitoring terminals can monitor various information in the cities.
At present, the internet of things is constructed by adopting a centralized network topology structure for the monitoring terminals, different monitoring terminals need to transfer through an upper network center, the network topology structure becomes more and more complex along with the increase of the number of the monitoring terminals, information sharing and transmission among the monitoring terminals often need to penetrate through several layers of networks, information delay and packet loss are easy to occur, and the possibility that information is maliciously tampered in the transmission process exists.
In summary, when the existing monitoring terminal performs information interaction, information delay and packet loss easily occur, and it cannot be guaranteed that information is not maliciously tampered in the transmission process.
Disclosure of Invention
In view of this, embodiments of the present application provide an information interaction method, a cross-scene tracking method, an apparatus, and a terminal device for a monitoring terminal, so as to solve the problems that when an existing monitoring terminal performs information interaction, information is prone to be delayed and lost, and it cannot be guaranteed that information is not maliciously tampered in a transmission process.
A first aspect of an embodiment of the present application provides an information interaction method for a monitoring terminal, including:
acquiring first data, and performing hash calculation on the first data to obtain a first hash value;
and integrating the first data and the first hash value into a first data packet, encrypting the first data packet by using a first private key, and broadcasting the encrypted first data packet to a block chain.
A second aspect of the embodiments of the present application provides a cross-scene tracking method, where the method is based on the information interaction method of the monitoring terminal, and the cross-scene tracking method includes:
receiving a first tracking instruction, and acquiring tracking data of a tracking target according to the first tracking instruction;
when the tracking target leaves a monitoring range, generating a second tracking instruction, taking an analysis result corresponding to the second tracking instruction and the tracking data as first data, and broadcasting the first data to a block chain through an information interaction method of the monitoring terminal, wherein the second tracking instruction is used for controlling other monitoring terminals to track and monitor the tracking target.
A third aspect of the embodiments of the present application provides an information interaction apparatus for a monitoring terminal, including:
the first hash module is used for acquiring first data and carrying out hash calculation on the first data to obtain a first hash value;
and the data signature module is used for integrating the first data and the first hash value into a first data packet, encrypting the first data packet by using a first private key, and broadcasting the encrypted first data packet to a block chain.
A fourth aspect of the embodiments of the present application provides a cross-scene tracking apparatus, where the apparatus is based on the information interaction apparatus of the monitoring terminal, and the cross-scene tracking apparatus includes:
the tracking acquisition module is used for receiving a first tracking instruction and acquiring tracking data of a tracking target according to the first tracking instruction;
and the instruction transmission module is used for generating a second tracking instruction when the tracking target leaves a monitoring range, taking an analysis result corresponding to the second tracking instruction and the tracking data as first data, and broadcasting the first data to a block chain through an information interaction device of the monitoring terminal, wherein the second tracking instruction is used for controlling other monitoring terminals to track and monitor the tracking target.
A fifth aspect of embodiments of the present application provides a terminal device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the steps of the method when executing the computer program.
A sixth aspect of embodiments of the present application provides a computer-readable storage medium, in which a computer program is stored, which, when executed by a processor, implements the steps of the method as described above.
Compared with the prior art, the embodiment of the application has the advantages that:
according to the information interaction method of the monitoring terminal, the monitoring terminal conducts networking and data interaction in a block chain mode, the block chain is a decentralized data interaction and storage mode, any node can conduct data interaction directly, transfer through a multi-layer upper network center is not needed, the difficulty of interconnection and intercommunication resource sharing among different monitoring terminals is reduced, the occurrence of information delay packet loss is reduced, and when the block chain is used for conducting data interaction and recording, the block chain can guarantee that data are not tampered and not forged in a cryptographic mode, and the problems that when the existing monitoring terminal conducts information interaction, information delay packet loss is prone to occur, and information cannot be maliciously tampered in the transmission process are solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flow chart illustrating an implementation of an information interaction method of a monitoring terminal according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an implementation process of a cross-scene tracking method according to an embodiment of the present application;
fig. 3 is a schematic diagram of an information interaction apparatus of a monitoring terminal according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a cross-scene tracking device according to an embodiment of the present application;
fig. 5 is a schematic diagram of a terminal device provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In addition, in the description of the present application, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
The first embodiment is as follows:
referring to fig. 1, an information interaction method of a monitoring terminal according to an embodiment of the present application is described below, where the information interaction method of the monitoring terminal according to the embodiment of the present application includes:
s101, acquiring first data, and performing hash calculation on the first data to obtain a first hash value;
the network topology structure of the internet of things of the traditional monitoring equipment is a centralized network topology structure, information interaction cannot be directly carried out among all the monitoring equipment, the monitoring equipment must transfer information through an upper network center, information delay and packet loss easily occur, access between the monitoring terminals is difficult abnormally, interconnection and intercommunication information sharing among the monitoring terminals is hindered, the resource utilization rate is reduced, and because the information needs to penetrate through a multilayer network in the transfer process, data cannot be guaranteed not to be maliciously tampered, and once the upper network center breaks down, all the monitoring equipment become independent information islands, and information interaction cannot be carried out with other monitoring equipment completely.
Therefore, in the information interaction method for the monitoring terminal in this embodiment, each monitoring device establishes a decentralized blockchain network, and performs information interaction through the blockchain network, and a node in the blockchain may be a monitoring terminal or an upper network device (such as a backend or a cloud server, a database), that is, the monitoring terminal may register on other monitoring terminals or an upper network center, and each node has an equal status, and each node may directly send data to the blockchain network to perform data interaction with other nodes, so that occurrence of information delay and packet loss is reduced, and even if part of the nodes are broken down, other nodes may also perform information interaction normally.
In addition, the blockchain is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, and is a distributed account book which is guaranteed to be not falsifiable and counterfeitable in a cryptographic mode, so that once the data is linked up, the data recorded by the blockchain can be guaranteed to be not falsified.
In a block chain network, the validity and authenticity of first data need to be verified through public and private keys of data publishing nodes and hash values, so that when a monitoring terminal needs to publish the data, hash calculation needs to be performed on the first data to be published first to obtain the first hash value.
The hash calculation can compress a message with any length into a hash value (message digest) with a certain fixed length, when the compressed message slightly changes, the hash value greatly changes, and the hash value cannot be reversely deduced and restored into the compressed message, so that the first hash value can be used for verifying the authenticity of the first data.
Step S102, integrating the first data and the first hash value into a first data packet, encrypting the first data packet by using a first private key, and broadcasting the encrypted first data packet to a block chain.
In addition, besides verifying the authenticity of the first data and avoiding the first data from being tampered, the identity of the first data issuer needs to be verified, so as to determine the validity of the first data, therefore, the monitoring terminal can integrate the first data and the first hash value into a first data packet, the first data packet is encrypted by using a first private key, the encryption process is the signature process of the monitoring terminal, and if other nodes can decrypt by using the public key of the monitoring terminal and successfully verify the signature, the authenticity of the identity of the data issuer can be verified, so as to determine the validity of the first data.
The first data packet can be broadcasted to the blockchain after being encrypted, other nodes can directly acquire the encrypted first data packet from the blockchain network without being transferred through centralization, and even if part of the nodes are broken down, other nodes can normally perform information interaction, so that the stability and reliability of the network topology structure are enhanced.
Further, the method further comprises:
a1, receiving an encrypted second data packet broadcasted into the block chain, and decrypting the encrypted second data packet by using a second public key to obtain a decrypted second data packet;
when the monitoring terminal receives the encrypted second data packet broadcast to the block chain by other nodes, the encrypted second data packet can be decrypted by using a second public key to obtain a decrypted second data packet, wherein the second public key is the public key of the node issuing the encrypted second data packet.
A2, performing hash calculation on the second data in the decrypted second data packet to obtain a verification hash value, and judging whether the verification hash value is consistent with the second hash value in the decrypted second data packet;
and performing hash calculation on the decrypted second data in the second data packet to obtain a verification hash value, verifying the authenticity of the second data in the second data packet according to the verification hash value, and judging whether the verification hash value is consistent with the second hash value.
A3, when the verification hash value is consistent with the second hash value, the encrypted second data packet is verified.
When the verification hash value is consistent with the second hash value, the encrypted second data packet passes verification, and the second data can be recorded in a local block chain, wherein the second data is real and reliable.
When the verification hash value is inconsistent with the second hash value, the second data in the encrypted second data packet is changed, and at the moment, the encrypted second data packet fails to be verified and is not recorded or stored.
Meanwhile, each node stores a complete blockchain, so that even if part of nodes fail or cannot receive data offline, when the node breaks down or goes online again, corresponding blockchain data can be synchronized from other nodes.
In the information interaction method for the monitoring terminal provided in this embodiment, the monitoring terminal performs networking and data interaction in the form of a blockchain, the blockchain is a decentralized data interaction and storage mode, any node can directly perform data interaction without transferring through a multi-layer upper network center, difficulty in sharing interconnection and intercommunication resources between different monitoring terminals is reduced, occurrence of information delay packet loss is reduced, and when the blockchain is used for performing data interaction and recording, the blockchain can ensure that data is not tampered and not forged in a cryptographic manner, and the problems that when the existing monitoring terminal performs information interaction, information delay packet loss is easy to occur, and malicious tampering of information in a transmission process cannot be ensured are solved.
When the monitoring terminal receives the second data packet issued by other nodes, the validity and the authenticity of the second data can be verified according to the second public key and the verification hash value corresponding to the data issuing node, so that the data recorded in the block chain are ensured to be real and reliable data.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Example two:
referring to fig. 2, the cross-scene tracking method in the second embodiment of the present application is based on the information interaction method of the monitoring terminal in the first embodiment, and the cross-scene tracking method includes:
step S201, receiving a first tracking instruction, and acquiring tracking data of a tracking target according to the first tracking instruction;
the network topology structure of the internet of things of the traditional monitoring equipment is a centralized network topology structure, the information delay is large, and the cross-scene tracking of the same target by each monitoring equipment is difficult to coordinate quickly.
When each monitoring device adopts a decentralized network topology structure of the block chain network to carry out information interaction, each monitoring device can carry out information interaction and cooperation rapidly, and a foundation is laid for cross-scene tracking.
The first tracking instruction can be an instruction sent by an upper network center or an instruction sent by other monitoring terminals, when the monitoring terminal receives the first tracking instruction, tracking data (such as video audio information, GPS (global positioning system) Beidou positioning information, temperature and humidity information, infrared sensing information, wireless probe information, high air pressure sensing information, wind speed and wind direction sensing information, ambient illumination sensing information, smoke combustible explosive gas sensing information, atmospheric aerosol concentration sensing information and the like) of a tracking target can be acquired according to the first tracking instruction, the tracking target is analyzed according to the tracking data, and a corresponding analysis result is obtained.
Step S202, when the tracking target leaves a monitoring range, generating a second tracking instruction, taking an analysis result corresponding to the second tracking instruction and the tracking data as first data, and broadcasting the first data to a block chain through an information interaction method of the monitoring terminal, wherein the second tracking instruction is used for controlling other monitoring terminals to track and monitor the tracking target.
When the tracking target leaves the monitoring range, a second tracking instruction can be generated, the second tracking instruction and the analysis result are used as first data, the first data are broadcasted to the block chain by the information interaction method of the monitoring terminal, other monitoring terminals are instructed to continuously track the tracking target in time, and cross-scene tracking and full-life-cycle analysis of the tracking target are achieved.
Further, when the tracking target leaves the monitoring range, generating a second tracking instruction, and broadcasting an analysis result corresponding to the second tracking instruction and the tracking data to a block chain specifically includes:
b1, when the tracked target leaves the monitoring range, acquiring a terminal number of the monitoring terminal within a preset distance range, and generating a second tracking instruction according to the terminal number, wherein the second tracking instruction is used for controlling the monitoring terminal corresponding to the terminal number to track and monitor the tracked target;
when the tracking target leaves the monitoring range, the terminal number of the monitoring terminal within the preset distance range can be inquired and obtained, the inquiry process can be inquired and determined through the GPS Beidou positioning information of each monitoring terminal, then a second tracking instruction is generated according to the terminal number, and the second tracking instruction is used for controlling the monitoring terminal corresponding to the terminal number to track and monitor the tracking target.
And B2, taking the second tracking instruction and the analysis result corresponding to the tracking data as first data, and broadcasting the first data to a block chain through an information interaction method of the monitoring terminal.
And then, the second tracking instruction and the analysis result can be used as first data, the first data is broadcasted to the block chain by using the information interaction method of the monitoring terminal, the surrounding monitoring terminals are timely instructed to probe the tracking target, and continuous tracking is carried out if the tracking target is found, so that cross-scene tracking and analysis of the tracking target are realized.
In the information interaction method of the monitoring terminal provided in this embodiment two, the monitoring terminal may perform data acquisition and analysis on the tracked target according to the first tracking instruction, and when the tracked target leaves the monitoring range, the monitoring terminal broadcasts the second tracking instruction and the analysis result to the block chain in time, and controls other monitoring terminals to continuously track the tracked target, thereby implementing cross-scene tracking and full-life-cycle analysis of the tracked target.
The sent second tracking instruction can be a non-directional tracking instruction, any monitoring terminal receives the second tracking instruction to search and confirm the tracking target, if the tracking target is found, the tracking is carried out, the second tracking instruction can also be a directional tracking instruction, the monitoring terminal obtains the terminal numbers of other monitoring terminals within a preset distance range, the second tracking instruction is generated according to the terminal numbers, and only the monitoring terminal corresponding to the tracking number needs to search, confirm and track the tracking target according to the second tracking instruction.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Example three:
in the third embodiment of the present application, an information interaction apparatus of a monitoring terminal is provided, and for convenience of description, only the relevant portions of the present application are shown, as shown in fig. 3, the information interaction apparatus of the monitoring terminal includes,
the first hash module 301 is configured to obtain first data, and perform hash calculation on the first data to obtain a first hash value;
a data signature module 302, configured to integrate the first data and the first hash value into a first data packet, encrypt the first data packet using a first private key, and broadcast the encrypted first data packet to a block chain.
Further, the apparatus further comprises:
the data verification module is used for receiving the encrypted second data packet broadcasted into the block chain, and decrypting the encrypted second data packet by using a second public key to obtain a decrypted second data packet;
the hash verification module is used for performing hash calculation on the second data in the decrypted second data packet to obtain a verification hash value, and judging whether the verification hash value is consistent with the second hash value in the decrypted second data packet;
and the verification passing module is used for passing the verification of the encrypted second data packet when the verification hash value is consistent with the second hash value.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
Example four:
a fourth embodiment of the present application provides a cross-scene tracking device, which, for convenience of description, only shows a part related to the present application, and as shown in fig. 4, the cross-scene tracking device is based on the information interaction device of the monitoring terminal according to the third embodiment, and the cross-scene tracking device includes:
the tracking acquisition module 401 is configured to receive a first tracking instruction, and acquire tracking data of a tracking target according to the first tracking instruction;
the instruction transmitting module 402 is configured to generate a second tracking instruction when the tracking target leaves a monitoring range, use an analysis result corresponding to the second tracking instruction and the tracking data as first data, and broadcast the first data to a block chain through an information interaction device of the monitoring terminal, where the second tracking instruction is used to control other monitoring terminals to perform tracking monitoring on the tracking target.
Further, the instruction transmission module specifically includes:
the instruction submodule is used for acquiring a terminal number of a monitoring terminal within a preset distance range when the tracking target leaves the monitoring range, and generating a second tracking instruction according to the terminal number, wherein the second tracking instruction is used for controlling the monitoring terminal corresponding to the terminal number to track and monitor the tracking target;
and the transmission submodule is used for taking the second tracking instruction and the analysis result corresponding to the tracking data as first data and broadcasting the first data to a block chain through an information interaction device of the monitoring terminal.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
Example five:
fig. 5 is a schematic diagram of a terminal device provided in the fifth embodiment of the present application. As shown in fig. 5, the terminal device 5 of this embodiment includes: a processor 50, a memory 51 and a computer program 52 stored in said memory 51 and executable on said processor 50. When the processor 50 executes the computer program 52, the steps in the above-mentioned information interaction method embodiment of the monitoring terminal or the steps in the above-mentioned cross-scene tracking method embodiment, such as steps S101 to S102 shown in fig. 1, are implemented. Alternatively, the processor 50, when executing the computer program 52, implements the functions of each module/unit in the above-mentioned device embodiments, for example, the functions of the modules 201 to 202 shown in fig. 2.
Illustratively, the computer program 52 may be partitioned into one or more modules/units, which are stored in the memory 51 and executed by the processor 50 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 52 in the terminal device 5. For example, the computer program 52 may be divided into a first hash module and a data signature module, and each module specifically functions as follows:
the first hash module is used for acquiring first data and carrying out hash calculation on the first data to obtain a first hash value;
and the data signature module is used for integrating the first data and the first hash value into a first data packet, encrypting the first data packet by using a first private key, and broadcasting the encrypted first data packet to a block chain.
The terminal device 5 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 50, a memory 51. Those skilled in the art will appreciate that fig. 5 is merely an example of a terminal device 5 and does not constitute a limitation of terminal device 5 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the terminal device may also include input-output devices, network access devices, buses, etc.
The Processor 50 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 51 may be an internal storage unit of the terminal device 5, such as a hard disk or a memory of the terminal device 5. The memory 51 may also be an external storage device of the terminal device 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 5. Further, the memory 51 may also include both an internal storage unit and an external storage device of the terminal device 5. The memory 51 is used for storing the computer program and other programs and data required by the terminal device. The memory 51 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (6)

1. A cross-scene tracking method, comprising:
receiving a first tracking instruction, and acquiring tracking data of a tracking target according to the first tracking instruction;
when the tracking target leaves a monitoring range, generating a second tracking instruction, taking an analysis result corresponding to the second tracking instruction and the tracking data as first data, performing hash calculation on the first data to obtain a first hash value, integrating the first data and the first hash value into a first data packet, encrypting the first data packet by using a first private key, and broadcasting the encrypted first data packet to a block chain, wherein the second tracking instruction is used for controlling other monitoring terminals to perform tracking monitoring on the tracking target.
2. The cross-scene tracking method according to claim 1, wherein when the tracking target leaves the monitoring range, generating a second tracking instruction, taking an analysis result corresponding to the second tracking instruction and the tracking data as first data, performing hash calculation on the first data to obtain a first hash value, integrating the first data and the first hash value into a first data packet, encrypting the first data packet by using a first private key, and broadcasting the encrypted first data packet into the block chain specifically includes:
when the tracking target leaves the monitoring range, acquiring a terminal number of a monitoring terminal within a preset distance range, and generating a second tracking instruction according to the terminal number, wherein the second tracking instruction is used for controlling the monitoring terminal corresponding to the terminal number to track and monitor the tracking target;
taking the second tracking instruction and an analysis result corresponding to the tracking data as first data, performing hash calculation on the first data to obtain a first hash value, integrating the first data and the first hash value into a first data packet, encrypting the first data packet by using a first private key, and broadcasting the encrypted first data packet to a block chain.
3. A cross-scene tracking device, comprising:
the tracking acquisition module is used for receiving a first tracking instruction and acquiring tracking data of a tracking target according to the first tracking instruction;
the instruction transmission module is configured to generate a second tracking instruction when the tracked target leaves a monitoring range, use an analysis result corresponding to the second tracking instruction and the tracking data as first data, perform hash calculation on the first data to obtain a first hash value, integrate the first data and the first hash value into a first data packet, encrypt the first data packet by using a first private key, and broadcast the encrypted first data packet to a block chain, where the second tracking instruction is used to control other monitoring terminals to perform tracking monitoring on the tracked target.
4. The cross-scene tracking device according to claim 3, wherein the instruction transmitting module specifically comprises:
the instruction submodule is used for acquiring a terminal number of a monitoring terminal within a preset distance range when the tracking target leaves the monitoring range, and generating a second tracking instruction according to the terminal number, wherein the second tracking instruction is used for controlling the monitoring terminal corresponding to the terminal number to track and monitor the tracking target;
and the transmission submodule is used for taking the second tracking instruction and the analysis result corresponding to the tracking data as first data, performing hash calculation on the first data to obtain a first hash value, integrating the first data and the first hash value into a first data packet, encrypting the first data packet by using a first private key, and broadcasting the encrypted first data packet to a block chain.
5. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 2 when executing the computer program.
6. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 2.
CN201910025767.2A 2019-01-10 2019-01-10 Information interaction method and cross-scene tracking method of monitoring terminal Active CN109861992B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910025767.2A CN109861992B (en) 2019-01-10 2019-01-10 Information interaction method and cross-scene tracking method of monitoring terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910025767.2A CN109861992B (en) 2019-01-10 2019-01-10 Information interaction method and cross-scene tracking method of monitoring terminal

Publications (2)

Publication Number Publication Date
CN109861992A CN109861992A (en) 2019-06-07
CN109861992B true CN109861992B (en) 2021-09-07

Family

ID=66894468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910025767.2A Active CN109861992B (en) 2019-01-10 2019-01-10 Information interaction method and cross-scene tracking method of monitoring terminal

Country Status (1)

Country Link
CN (1) CN109861992B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110278208A (en) * 2019-06-21 2019-09-24 南京物联传感技术有限公司 Intelligent home information exchange system and working method based on block chain
CN110278090B (en) * 2019-06-27 2021-05-04 尚菊红 Environment-friendly monitoring data monitoring system, processing method, computer equipment and storage medium
CN110602222B (en) * 2019-09-18 2022-06-28 腾讯科技(深圳)有限公司 Joint monitoring method and device based on block chain and computer storage medium
CN111259413A (en) * 2020-01-10 2020-06-09 上海旺链信息科技有限公司 Data management method and device based on block chain
CN111769954A (en) * 2020-06-30 2020-10-13 山东浪潮通软信息科技有限公司 Data acquisition method, data acquisition server, client and electronic equipment
CN111935289B (en) * 2020-08-14 2022-10-18 中国工商银行股份有限公司 Dynamic monitoring method and device based on block chain
CN112312396B (en) * 2020-11-05 2023-02-24 山东云海国创云计算装备产业创新中心有限公司 NoC tracking data generation method and related device
CN113010792A (en) * 2021-04-09 2021-06-22 北京明略软件系统有限公司 Authentication data information construction method, system, storage medium and electronic equipment
CN114547641B (en) * 2022-01-05 2024-04-26 浪潮工业互联网股份有限公司 Industrial data tracking method, device, equipment and medium based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607576A (en) * 2013-11-28 2014-02-26 北京航空航天大学深圳研究院 Traffic video monitoring system oriented to cross camera tracking relay
CN106506203A (en) * 2016-10-25 2017-03-15 杭州云象网络技术有限公司 A kind of monitoring nodes system for being applied to block chain
CN108632293A (en) * 2018-05-16 2018-10-09 山东建筑大学 Architectural Equipment Internet of things system based on block chain technology and method
CN108667811A (en) * 2018-04-18 2018-10-16 成都零光量子科技有限公司 A kind of method and monitoring device of autonomous structure electronic evidence
CN109086622A (en) * 2018-07-25 2018-12-25 深圳慧安康科技有限公司 A kind of implementation method and node device of intelligence community

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10637720B2 (en) * 2017-02-28 2020-04-28 International Business Machines Corporation Predictive analytics and device tracking to facilitate minimization of alert events

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607576A (en) * 2013-11-28 2014-02-26 北京航空航天大学深圳研究院 Traffic video monitoring system oriented to cross camera tracking relay
CN106506203A (en) * 2016-10-25 2017-03-15 杭州云象网络技术有限公司 A kind of monitoring nodes system for being applied to block chain
CN108667811A (en) * 2018-04-18 2018-10-16 成都零光量子科技有限公司 A kind of method and monitoring device of autonomous structure electronic evidence
CN108632293A (en) * 2018-05-16 2018-10-09 山东建筑大学 Architectural Equipment Internet of things system based on block chain technology and method
CN109086622A (en) * 2018-07-25 2018-12-25 深圳慧安康科技有限公司 A kind of implementation method and node device of intelligence community

Also Published As

Publication number Publication date
CN109861992A (en) 2019-06-07

Similar Documents

Publication Publication Date Title
CN109861992B (en) Information interaction method and cross-scene tracking method of monitoring terminal
CN112214780B (en) Data processing method and device, intelligent equipment and storage medium
CN109409122B (en) File storage method, electronic device and storage medium
CN108197891B (en) Electronic signing device and method based on block chain
CN108924130B (en) Block data verification method, device, equipment and storage medium
JP2021523490A (en) Reliable contextual content
CN111079136B (en) Fog computing intrusion detection feature sharing system based on block chain technology
KR20220134570A (en) Storage and communication environment for cryptographic tags
EP3537684B1 (en) Apparatus, method, and program for managing data
CN109634615B (en) Issuing method, verification method and device of application installation package
CN110598456B (en) Data storage method and device, electronic equipment and storage medium
US20220269754A1 (en) Decentralized system and method for asset registry and authentication
CN101189633A (en) Method and apparatus for authorizing rights issuers in a content distribution system
CN112134883B (en) Method, device and related product for carrying out rapid authentication on trust relationship between nodes based on trusted computing
CN111367923A (en) Data processing method, data processing device, node equipment and storage medium
CN115694949A (en) Private data sharing method and system based on block chain
US20230198771A1 (en) Systems and methods for providing secure internet of things data notifications using blockchain
CN111654375A (en) Block chain-based edge calculation security encryption method, device and system
CN116662452B (en) Unmanned bee colony data storage method and system based on block chain and IPFS
CN113783685A (en) System for protecting Internet of vehicles data by using block chain
Xiao et al. A novel blockchain-based digital forensics framework for preserving evidence and enabling investigation in industrial Internet of Things
WO2022135032A1 (en) Method and apparatus for managing detection information
CN113010604B (en) Map data synchronization method, system, cloud server and storage medium
CN114710796A (en) Sensor abnormity detection method, device and system based on block chain
CN116028982A (en) Processing method, device and system based on non-homogeneous general evidence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant