CN110247922A - By means of block chain from media data cochain method and its equipment - Google Patents

By means of block chain from media data cochain method and its equipment Download PDF

Info

Publication number
CN110247922A
CN110247922A CN201910547069.9A CN201910547069A CN110247922A CN 110247922 A CN110247922 A CN 110247922A CN 201910547069 A CN201910547069 A CN 201910547069A CN 110247922 A CN110247922 A CN 110247922A
Authority
CN
China
Prior art keywords
media data
client
public key
cochain
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910547069.9A
Other languages
Chinese (zh)
Inventor
杨慧
吉建勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ai Morui Strategic Technology Co Ltd
Original Assignee
Beijing Ai Morui Strategic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ai Morui Strategic Technology Co Ltd filed Critical Beijing Ai Morui Strategic Technology Co Ltd
Priority to CN201910547069.9A priority Critical patent/CN110247922A/en
Publication of CN110247922A publication Critical patent/CN110247922A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

This application discloses by means of block chain, from media data cochain method and its equipment, block chain node receives requesting from media data cochain for the first client transmission;Triggering verifies intelligent contract, the intelligent contract of the verification verifies the identity of first client, it after verification passes through, is encrypted to described from media data with first client public key, and executes the cochain process from media data of the first client public key encryption;The block chain node receives the inquiry request from media data of the second client, and the inquiry request from media data includes the second client public key;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client.The application can will disclose credible from media data cochain.

Description

By means of block chain from media data cochain method and its equipment
Technical field
This application involves block chain technical field, more particularly to by means of block chain from media data cochain method and its Equipment.
Background technique
Currently, block chain technology is the peer-to-peer network based on decentralization, with open source software Cryptography Principles, when ordinal number It is combined according to common recognition mechanism, to ensure the coherent of each node in distributed data base and continue, so that information is verified immediately, can Retrospect, but be difficult to tamper with and can not shield, to create a set of privacy, shareable value system efficiently, safe.
Existing is all the database using centralization from media platform (such as: microblogging, trill), saves commodity or service The contents such as user operation time, number of operations and the mobile phone of user used from media;However, from the data of media platform Library, there is data to be tampered, the authenticity of data cannot be guaranteed, and from the operation platform of media modify certain commodity from matchmaker Body display quantity.Especially to some small from media platform, cannot all be protected from media data safety and authenticity Card: and commodity or the quantity from display advertising of service are untrue, do not have reference value, consequently, it is possible to being generated to user It misleads, also influences the experience of user.
Therefore, how can not distort based on block chain, believable mode will be stored in block from the data of media platform On chain, become urgent problem to be solved.
Above content is only used for the technical solution that auxiliary understands the application, does not represent and recognizes that above content is existing skill Art.
Summary of the invention
To solve the above-mentioned problems, the application is provided by means of block chain from media data cochain method and its equipment, This method can allow the data cochain from media, so that it is credible from media data on chain, it is open and clear.
The application first aspect is provided by means of block chain from media data cochain method, which comprises
Block chain node receives requesting from media data cochain for the first client transmission, described to ask from media data cochain It asks including first client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, verifies It by rear, is encrypted to described from media data with first client public key, and executes first client public key The cochain process from media data of encryption;
The block chain node receives the inquiry request from media data of the second client, described from media data Inquiry request include the second client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client, verifies It by rear, is encrypted to described from media data with second client public key, and executes second client public key The cochain process from media data of encryption.
In a kind of possible embodiment, the method also includes: the block chain node receives second client End is sent from media data inquiry request;
The block chain node is sent from media data inquiry response to second client, described to look into from media data Asking response includes the encryption of the second client public key from media data, in order to which the second client own private key is to described The encryption of second client public key is decrypted from media data.
In a kind of possible embodiment, it is described from media data be the corresponding user of first client from matchmaker The operation data of body platform, including from media content, user operation time and user's operation number.
In a kind of possible embodiment, the first client own public key is encrypted to described from media data, Specifically: first client is with own public key to the encryption for carrying out preset ratio from media data.
In a kind of possible embodiment, it is described from media data include relating attribute and dereferenced attribute;Wherein, institute It states and is superimposed automatically from the attribute value of media data relating attribute.
The application second aspect is provided by means of block chain from media data cochain equipment, and the equipment is block chain link Point, the equipment include receiving unit and processing unit;Wherein,
The receiving unit receives requesting from media data cochain for the first client transmission, described from media data Chain request includes first client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client It is verified, after verification passes through, is encrypted to described from media data with first client public key, and execute described the The cochain process from media data of one client public key encryption;
The receiving unit receives the inquiry request from media data of the second client, described from media data Inquiry request include the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client It is verified, after verification passes through, is encrypted to described from media data with second client public key, and execute described the The cochain process from media data of two client public keys encryption.
In a kind of possible embodiment, the equipment includes transmission unit;The receiving unit receives described second Client is sent from media data inquiry request;
The transmission unit is sent from media data inquiry response to second client, described to look into from media data Asking response includes the encryption of the second client public key from media data, in order to which the second client own private key is to described The encryption of second client public key is decrypted from media data.
In a kind of possible embodiment, it is described from media data be the corresponding user of first client from matchmaker The operation data of body platform, including from media content, user operation time and user's operation number.
In a kind of possible embodiment, the first client own public key is encrypted to described from media data, Specifically: first client is with own public key to the encryption for carrying out preset ratio from media data.
In a kind of possible embodiment, it is described from media data include relating attribute and dereferenced attribute;Wherein, it states It is superimposed automatically from the attribute value of media data relating attribute.
The application can allow the data cochain from media, so that it is credible from media data on chain, it is open and clear.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 be it is provided by the embodiments of the present application by means of block chain from media data cochain method flow schematic diagram;
Fig. 2 is provided by the embodiments of the present application and by means of block chain from media data cochain method flow schematic diagram;
Fig. 3 be it is provided by the embodiments of the present application by means of block chain from media data cochain device structure schematic diagram.
Specific embodiment
For the clearer general idea for illustrating the application, carry out in an illustrative manner with reference to the accompanying drawings of the specification detailed It describes in detail bright.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Similar object, without being used to describe a particular order or precedence order.It should be understood that the sequence used in this way is in appropriate feelings It can be interchanged under condition, so that the embodiment of the present invention described herein can be other than those of illustrating or describing herein Sequence implement.
In addition, term " includes " and " having " and their any deformation, it is intended that covering non-exclusive includes example Such as, the process, method, system, product or equipment for containing a series of steps or units those of are not necessarily limited to be clearly listed Step or unit, but may include being not clearly listed or intrinsic for these process, methods, product or equipment other Step or unit.
So-called block chain node and client in the embodiment of the present application, it can be understood as respond extraneous certain trigger item Part, and the abstract machine that state is converted is done by certain rule, it can be mobile phone, tablet computer, palm PC, individual's PC computer etc. It can be according to application software and the equipment that can be networked.
As shown in Figure 1, the method includes the steps S101-S104 by means of block chain from media data cochain method.
S101, block chain node receives requesting from media data cochain for the first client transmission, described from media data Cochain request includes first client public key.
S102, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of first client, After verification passes through, encrypted to described from media data with first client public key, and execute first client The cochain process from media data of public key encryption.
S103, the block chain node receives the inquiry request from media data of the second client, described from matchmaker The inquiry request of volume data includes the second client public key.
S104, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of second client, After verification passes through, encrypted to described from media data with second client public key, and execute second client The cochain process from media data of public key encryption.
In one example, the method also includes: the block chain node receives second client and sends from matchmaker Volume data inquiry request;
The block chain node is sent from media data inquiry response to second client, described to look into from media data Asking response includes the encryption of the second client public key from media data, in order to which the second client own private key is to described The encryption of second client public key is decrypted from media data.
In one example, it is described from media data be the corresponding user of first client in the behaviour from media platform Make data, including from media content, user operation time and user's operation number.
In one example, the first client own public key is encrypted to described from media data, specifically: it is described First client is with own public key to the encryption for carrying out preset ratio from media data.
In one example, it is described from media data include relating attribute and dereferenced attribute;Wherein, described from media number It is superimposed automatically according to the attribute value of relating attribute.
In above-mentioned example, the first client is used as the operator from media data, the second client from media data Inquiry;To some specifically from media platform for, every user is also possible to either from the operator of media data From the inquiry of media data.
Below by taking Fig. 2 as an example, the cochain method flow from media data of the application being applied on block chain is carried out Illustrate, this method includes S201-S209.
S201, the transmission of the first client are requested to give block chain node from media data cochain, should be asked from media data cochain It include the first client public key in asking.
S202, triggers the verification intelligence contract on block chain, the verification intelligence contract to the identity of first client into Row verification, and this is encrypted from media data with first client public key, and first client public key is encrypted Cochain process is executed from media data.
Block chain node is encrypted with the first client public key to from media data, which can be will be from media number It is encrypted according to whole fields, is also possible to encrypt this from the part field of media data, such as: only to being related to privacy Content encrypted;It is also possible to not encrypt this from media data.
In addition, should include being divided into two attribute, relating attribute and dereferenced attribute from media data.Such as: user is from matchmaker The body operating time, belong to dereferenced attribute, every user's may be stored on block chain from the media manipulation time;Such as: It is exactly relating attribute from the displaying number of media data, includes from display advertising number, as long as having from the data format of media Other users see that this, from media data, can should be superimposed automatically from the attribute value of display advertising number from respective terminal.
The verification, which refers to, judges whether first client is the user from media platform, only should be from media platform User, which can just have permission, carries out cochain from media data for this.
It should be noted that upper chain process is the conventional process of this field, without being described in detail.Such as: in workload It proves to be packaged data under PoW common recognition mode, verify, the block chain node for getting book keeping operation power can be by the packing block It is placed on next block of current block, as new block cochain.
It include that user wants to show perhaps disclosed text, picture and small video or their times from medium type Meaning combined data, what user generated may be stored on chain from media data, and can not distort, and guarantee the true of data Property.And the case where can be avoided appearance, arbitrarily increasing from media platform from display advertising quantity;And then promote user experience.
S203, the block chain node send from media data cochain and respond to first client.
S204, the second client, which was sent, to give block chain node from media data inquiry request, should be inquired from media data Request includes second client public key.
At this point, the corresponding user of the second client can be see this from after media data, to this from media data into Row inquiry.The first client and the second client are all the terminal devices for being equipped with decentralization application software in the application, Row information directly can be clicked through with the block chain link on block chain to interact.
S205, triggers the verification intelligence contract on block chain, which carries out the identity of the second client Verification encrypts this from media data with second client public key after verification passes through, and by second client public key Encryption executes cochain process from media data.
After verification passes through, process is performed the next step;Verification does not pass through, Flow ends.
S206, the block chain node give the second client from media data inquiry response.
S207, the second client send from media data inquiry request and give block chain node.
S208, the block chain node send from media data inquiry response and give second client, should look into from media data Asking response includes the encryption of the second client public key from media data.
S209, the second client are decrypted to what second client public key encrypted from media data with own private key, This is obtained from media data.
The application can allow the data cochain from media, and the cochain process is open and clear, same from any of media platform User can check this from media data;It ensure that the authenticity from media data.
It should be noted that client is directly to carry out the interaction of information, block chain with the node of block chain in the application Information is stored directly on block chain by node, not the server of centralization, thus allow more disclosed from media data it is credible; Rather than existing client and the server of centralization interact.
As shown in figure 3, the equipment is block chain node, described by means of block chain from media data cochain equipment Equipment includes receiving unit and processing unit.
The receiving unit receives requesting from media data cochain for the first client transmission, described from media data Chain request includes first client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client It is verified, after verification passes through, is encrypted to described from media data with first client public key, and execute described the The cochain process from media data of one client public key encryption;
The receiving unit receives the inquiry request from media data of the second client, described from media data Inquiry request include the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client It is verified, after verification passes through, is encrypted to described from media data with second client public key, and execute described the The cochain process from media data of two client public keys encryption.
In one example, the equipment includes transmission unit;The receiving unit receives second client and sends From media data inquiry request;
The transmission unit is sent from media data inquiry response to second client, described to look into from media data Asking response includes the encryption of the second client public key from media data, in order to which the second client own private key is to described The encryption of second client public key is decrypted from media data.
In one example, it is described from media data be the corresponding user of first client in the behaviour from media platform Make data, including from media content, user operation time and user's operation number.
In one example, the first client own public key is encrypted to described from media data, specifically: it is described First client is with own public key to the encryption for carrying out preset ratio from media data.
In one example, it is described from media data include relating attribute and dereferenced attribute;Wherein, described from media number It is superimposed automatically according to the attribute value of relating attribute.
The application can allow the data cochain from media, and the cochain process is open and clear, same from any of media platform User can check this from media data;It ensure that the authenticity from media data.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution. Professional technician can use different methods to achieve the described function each specific application, but this realization It is not considered that exceeding scope of the present application.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (10)

1. by means of block chain from media data cochain method, which is characterized in that the described method includes:
Block chain node receives requesting from media data cochain for the first client transmission, described from media data cochain request packet Include first client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and verification passes through Afterwards, it is encrypted to described from media data with first client public key, and executes the first client public key encryption The cochain process from media data;
The block chain node receives the inquiry request from media data of the second client, the looking into from media data Asking request includes the second client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client, and verification passes through Afterwards, it is encrypted to described from media data with second client public key, and executes the second client public key encryption The cochain process from media data.
2. the method according to claim 1, wherein the method also includes:
The block chain node receives second client and sends from media data inquiry request;
The block chain node is sent from media data inquiry response to second client, and described inquire from media data is rung It should include the encryption of the second client public key from media data, in order to which the second client own private key is to described second Client public key encryption is decrypted from media data.
3. the method according to claim 1, wherein described corresponding for first client from media data User is in the operation data from media platform, including from media content, user operation time and user's operation number.
4. the method according to claim 1, wherein the first client own public key is to described from media Data encryption, specifically:
First client is with own public key to the encryption for carrying out preset ratio from media data.
5. the method according to claim 1, wherein it is described from media data include relating attribute and dereferenced category Property;Wherein,
The attribute value from media data relating attribute is superimposed automatically.
6. by means of block chain from media data cochain equipment, which is characterized in that the equipment is block chain node, described to set Standby includes receiving unit and processing unit;Wherein,
The receiving unit receives requesting from media data cochain for the first client transmission, described to ask from media data cochain It asks including first client public key;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of first client Verification is encrypted to described from media data after verification passes through with first client public key, and executes first visitor The cochain process from media data of family end public key encryption;
The receiving unit receives the inquiry request from media data of the second client, the looking into from media data Asking request includes the second client public key;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of second client Verification is encrypted to described from media data after verification passes through with second client public key, and executes second visitor The cochain process from media data of family end public key encryption.
7. equipment according to claim 6, which is characterized in that the equipment includes transmission unit;
The receiving unit receives second client and sends from media data inquiry request;
The transmission unit is sent from media data inquiry response to second client, and described inquire from media data is rung It should include the encryption of the second client public key from media data, in order to which the second client own private key is to described second Client public key encryption is decrypted from media data.
8. equipment according to claim 6, which is characterized in that described corresponding for first client from media data User is in the operation data from media platform, including from media content, user operation time and user's operation number.
9. equipment according to claim 6, which is characterized in that the first client own public key is to described from media Data encryption, specifically:
First client is with own public key to the encryption for carrying out preset ratio from media data.
10. equipment according to claim 6, which is characterized in that it is described from media data include relating attribute and dereferenced Attribute;Wherein,
The attribute value from media data relating attribute is superimposed automatically.
CN201910547069.9A 2019-06-24 2019-06-24 By means of block chain from media data cochain method and its equipment Pending CN110247922A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910547069.9A CN110247922A (en) 2019-06-24 2019-06-24 By means of block chain from media data cochain method and its equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910547069.9A CN110247922A (en) 2019-06-24 2019-06-24 By means of block chain from media data cochain method and its equipment

Publications (1)

Publication Number Publication Date
CN110247922A true CN110247922A (en) 2019-09-17

Family

ID=67888966

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910547069.9A Pending CN110247922A (en) 2019-06-24 2019-06-24 By means of block chain from media data cochain method and its equipment

Country Status (1)

Country Link
CN (1) CN110247922A (en)

Similar Documents

Publication Publication Date Title
CA3027741C (en) Blockchain systems and methods for user authentication
CN112039826A (en) Login method and device applied to applet terminal
CN105871805A (en) Anti-stealing-link method and device
CN110247918A (en) Number cochain method and its equipment are shaken applied to block chain
CN114598671B (en) Session message processing method, device, storage medium and electronic equipment
CN112422287A (en) Multi-level role authority control method and device based on cryptography
CN110247923A (en) Number cochain method and its equipment are shaken based on block chain
CN110232286A (en) A kind of electric quotient data cochain method and its equipment for applying intelligent contract
CN110266698A (en) Pass through the Knowledge Sharing data cochain method and its equipment of block chain
CN110263563A (en) By means of the ad click data cochain method and its equipment of block chain
CN110264206A (en) A kind of electric quotient data cochain method and its equipment based on block chain
CN110266696A (en) A kind of evaluation data cochain method and its equipment applied to block chain
CN110263529A (en) Number cochain method and its equipment are shaken using intelligent contract
CN110232287A (en) Pass through the shared economic data cochain method and its equipment of block chain
CN110263100A (en) Using the shared economic data cochain method and its equipment of intelligent contract
CN112685201A (en) Government affair service access control method and device
CN110247921A (en) A kind of polled data cochain method and its equipment for applying intelligent contract
CN110278270A (en) A kind of polled data cochain method and its equipment based on block chain
CN110266691A (en) Credit data cochain method and its equipment based on block chain
CN110213294A (en) By means of the community data cochain method and its equipment of block chain
CN110245512A (en) Lottery data cochain method and its equipment applied to block chain
CN110247922A (en) By means of block chain from media data cochain method and its equipment
CN110263562A (en) A kind of evaluation data cochain method and its equipment based on block chain
CN110266699A (en) Prize drawing data cochain method and its equipment applied to block chain
CN110225056A (en) A kind of evaluation data cochain method and its equipment for applying intelligent contract

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication