CN110336833A - Image content common recognition method, server based on block chain - Google Patents

Image content common recognition method, server based on block chain Download PDF

Info

Publication number
CN110336833A
CN110336833A CN201910694624.0A CN201910694624A CN110336833A CN 110336833 A CN110336833 A CN 110336833A CN 201910694624 A CN201910694624 A CN 201910694624A CN 110336833 A CN110336833 A CN 110336833A
Authority
CN
China
Prior art keywords
picture
encryption
original image
block chain
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910694624.0A
Other languages
Chinese (zh)
Other versions
CN110336833B (en
Inventor
赖春晖
黄肇敏
刘朝伟
朱国平
曾雨峰
巨龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910694624.0A priority Critical patent/CN110336833B/en
Publication of CN110336833A publication Critical patent/CN110336833A/en
Application granted granted Critical
Publication of CN110336833B publication Critical patent/CN110336833B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/22Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of image content common recognition method, server based on block chain provided by the invention, on the one hand by using the mode encrypted symmetric key of asymmetric encryption, it in this way can will be on the cipher key broadcasting to the node of block chain that encrypt picture, when the verifying node of block chain needs to obtain symmetric key, node with permission can be decrypted using pre-stored private key, and then can decrypt encryption picture.On the other hand picture is not transmitted directly during cochain of block chain etc., but the hash of picture abstract and store path are transmitted, and then the data interaction amount between block chain node is small, it may be determined whether original image by hash abstract, encryption picture can be obtained by store path, and then decrypted symmetric key is combined to obtain original image, in order to execute subsequent image content common recognition operation.

Description

Image content common recognition method, server based on block chain
Technical field
The present invention relates to block chain technical fields, more particularly to a kind of image content common recognition side based on block chain Method, server.
Background technique
With being widely used for block chain technology, more and more application scenarios needs store unstructured in block chain Data (such as picture), such as supply chain finance in, business side wishes relevant order pictorial information to enter chain, thus may be used To be consulted between node a certain range of on chain, to confirm the true and false of transaction and endorse for it.However current block catenary system It does not support, main cause has several points:
1. since block chain technology is immature, such as receiving the limitation of common recognition algorithm and node number, transmit in a network Biggish data are bound to cause effectiveness of performance decline, the response time increases, for this script TPS handling capacity just not high block Chain network is sad news;
2. the system of block chain especially alliance's chain in mostly, using first knowing together, the mode for executing intelligent contract afterwards is run, But it does the operation of signature and sign test to communication message only in common recognition process to ensure the safety of message, lacks the content to message The verification of business is done, after only waiting until that common recognition passes through, the execution intelligent contract stage just carries out business verification, such as to picture Middle customer information combines local blacklist system to do blacklist verification, this results in contingency obstructed to the business verifying of picture It crosses, transaction executes failure will consume time and the resource of the cost of common recognition stage in vain.
Therefore, not yet occurs the technology of picture common recognition processing at present.
Summary of the invention
At least one of to solve the above-mentioned problems, the application provides a kind of image content common recognition side based on block chain Method, comprising:
Original image is sent to picture storage server, so that the picture storage server is using symmetric key to described Picture carries out encryption and generates encryption picture, and using pre-stored public key to the symmetric key encryption, then by the encryption Picture and the symmetric key of encryption are sent on each node;
Obtain the store path of the encryption picture;
Cochain solicited message is sent to each node of block chain, the cochain solicited message includes the store path, with All block chain verifying node servers for having access authority are made to obtain the encryption picture according to the store path, according to The symmetric key is decrypted in the private key of the pre-stored correspondence public key, obtains the symmetric key, using described right Claim encryption picture described in key pair to be decrypted, obtains original image, extract the image content in the original image, Jin Ergen Common recognition operation is executed according to the image content.
In certain embodiments, further includes:
Original image is handled by digest algorithm, obtains the first Hash digest of original image;On wherein described Chain request further include first Hash digest, and then make it is all have access authority block chains verifying node servers according to Obtained original image generates the second Hash digest, is according to the determination of the comparison result of the first Hash digest and the second Hash digest It is no to execute the step of extracting the image content in the original image.
In certain embodiments, the cochain solicited message further include: the authentication certificate of application server initiates to use The identity information at family, the access authority for initiating user, so that all block chain verifying node servers pair for having access authority The cochain request is authenticated.
The application also provides a kind of image content common recognition method based on block chain, comprising:
The original image that application layer services device is sent is received, the symmetric key for encrypting picture is generated;
Using the symmetric key original image is encrypted, generates encryption picture and the encryption picture is deposited Store up path;
The symmetric key is encrypted using pre-stored public key;
The store path that the encryption picture is sent to the application layer services device, so that the application layer services device is by institute It states store path to be added in cochain solicited message, so that the store path can be obtained in all nodes;
It receives the acquisition that block chain link point is sent and encrypts picture request, the return encryption picture is schemed to acquisition encryption is sent The block chain node of piece request, the encryption picture that obtains request the hair for including the store path, obtaining encryption picture request Play the identity information and operating right of node;
According to the identity information and the operating right for initiating node, the block chain verifying section for having access authority is filtered out Point server, the block chain verifying node server that Xiang Suoyou has access authority send the described symmetrical close of the public key encryption Key, so that private key pair of the block chain verifying node server for having access authority according to the pre-stored correspondence public key The symmetric key is decrypted, and obtains the symmetric key, and the encryption picture is decrypted using the symmetric key, Original image is obtained, extracts the image content in the original image, and then common recognition operation is executed according to the image content.
The application also provides a kind of image content common recognition method based on block chain, comprising:
The block chain verifying node server for having access authority obtains the cochain solicited message that application server is sent, institute Stating cochain solicited message includes that picture storage server carries out the store path that symmetric cryptography obtains encrypting picture to original image; Wherein the picture storage server further carries out the symmetric key for encrypting the original image using pre-stored public key Encryption, the symmetric key encrypted;
It is sent to the picture storage server and obtains encryption picture request, the acquisition encryption picture request includes described Store path, the identity information and operating right for initiating node for obtaining encryption picture request;
The symmetric key of the picture storage server encryption picture sent and the encryption is received, and then using pre- The symmetric key of the encryption is decrypted in the private key corresponding with the public key of storage, obtains the symmetric key;
The encryption picture is decrypted using the symmetric key, obtains original image;
Extract the image content in the original image;
Common recognition operation is executed according to the image content.
In certain embodiments, the application server further passes through digest algorithm and handles original image, obtains To the first Hash digest of original image;The cochain request further includes first Hash digest, the method also includes:
The second Hash digest is generated according to obtained original image;
Determine whether to execute according to the comparison result of the first Hash digest and the second Hash digest and extracts the original image In image content the step of.
In certain embodiments, the comparison result according to the first Hash digest and the second Hash digest determines whether to hold Row extracts the step of image content in the original image, comprising:
If the comparison result is consistent, it is determined that the original image is not tampered with, and then is determined and executed described in extraction The step of image content in original image.
In certain embodiments, the image content extracted in the original image, comprising:
The field information in the original image is extracted by OCR identification.
In certain embodiments, common recognition operation is executed according to the image content, comprising:
The image content is verified according to pre-stored verification picture, the result of broadcast verification;
Common recognition operation is executed, determines whether all nodes have reached common understanding, the original image is executed if reaching common understanding Corresponding intelligence contract.
The application also provides application server, comprising:
Sending module sends original image to picture storage server, so that the picture storage server is using symmetrical Picture described in key pair carries out encryption and generates encryption picture, and using pre-stored public key to the symmetric key encryption, then The symmetric key of the encryption picture and encryption is sent on each node;
Store path obtains module, obtains the store path of the encryption picture;
Cochain solicited message sending module sends cochain solicited message, the cochain request letter to each node of block chain Breath includes the store path, so that all block chain verifying node servers for having access authority are according to the store path The encryption picture is obtained, the symmetric key is decrypted according to the private key of the pre-stored correspondence public key, obtains institute Symmetric key is stated, the encryption picture is decrypted using the symmetric key, original image is obtained, extracts the original graph Image content in piece, and then common recognition operation is executed according to the image content.
In certain embodiments, further includes:
First Hash digest generation module is handled original image by digest algorithm, obtains the of original image One Hash digest;Wherein the cochain request further includes first Hash digest, and then makes all areas for having access authority Block chain verifies node server and generates the second Hash digest according to obtained original image, is breathed out according to the first Hash digest and second The comparison result of uncommon abstract determines whether to execute the step of extracting the image content in the original image.
In certain embodiments, the cochain solicited message further include: the authentication certificate of application server initiates to use The identity information at family, the access authority for initiating user, so that all block chain verifying node servers pair for having access authority The cochain request is authenticated.
The application also provides picture storage server, comprising:
Original image receiving module receives the original image that application layer services device is sent, generates pair for encrypting picture Claim key;
Original image encrypting module encrypts the original image using the symmetric key, generates encryption picture With the store path of the encryption picture;
Symmetric key encryption module encrypts the symmetric key using pre-stored public key;
Store path sending module, Xiang Suoshu application layer services device sends the store path of the encryption picture, so that institute It states application layer services device the store path is added in cochain solicited message, so that the storage can be obtained in all nodes Path;
Encryption picture request receiving module is obtained, the acquisition encryption picture request that block chain link point is sent is received, returns to institute Encryption picture is stated to the block chain node for obtaining encryption picture and requesting is sent, the acquisition encryption picture request includes the storage Path, the identity information and operating right for initiating node for obtaining encryption picture request;
Encrypted symmetric key sending module filters out and has according to the identity information and the operating right for initiating node The block chain of access authority verifies node server, and the block chain verifying node server that Xiang Suoyou has access authority sends institute The symmetric key of public key encryption is stated, so that the block chain verifying node server for having access authority is according to pre-stored The private key of the correspondence public key symmetric key is decrypted, the symmetric key is obtained, using the symmetric key The encryption picture is decrypted, original image is obtained, extracts the image content in the original image, and then according to described Image content executes common recognition operation.
The application also provides block chain verifying node server, comprising:
Cochain solicited message obtains module, obtains the cochain solicited message that application server is sent, the cochain request letter Breath includes that picture storage server carries out the store path that symmetric cryptography obtains encrypting picture to original image;The wherein picture Storage server further encrypts the symmetric key for encrypting the original image using pre-stored public key, is encrypted Symmetric key;
Encryption picture request sending module is obtained, Xiang Suoshu picture storage server, which is sent, obtains encryption picture request, institute Acquisition encryption picture request is stated to include the store path, obtain the identity information for encrypting the initiation node of picture request and behaviour Make permission;
First deciphering module receives the symmetrical close of encryption picture that the picture storage server is sent and the encryption Key, and then the symmetric key of the encryption is decrypted using pre-stored private key corresponding with the public key, it obtains described Symmetric key;
Second deciphering module is decrypted the encryption picture using the symmetric key, obtains original image;
Image content extraction module extracts the image content in the original image;
Common recognition operation module executes common recognition operation according to the image content.
In certain embodiments, the application server further passes through digest algorithm and handles original image, obtains To the first Hash digest of original image;The cochain request further includes first Hash digest, the block chain verifying section Point server further include:
Second Hash digest generation module generates the second Hash digest according to obtained original image;
Comparison module determines whether to execute described in extraction according to the comparison result of the first Hash digest and the second Hash digest The step of image content in original image.
In certain embodiments, if the comparison result is consistent, the image content extraction module extraction original image In image content.
In certain embodiments, the image content extraction module extracts the word in the original image by OCR identification Segment information.
In certain embodiments, the common recognition operation module includes:
Verification unit verifies the image content according to pre-stored verification picture, the result of broadcast verification;
Common recognition unit executes common recognition operation, determines whether all nodes have reached common understanding, if reaching common understanding described in execution The corresponding intelligent contract of original image.
The application also provides a kind of computer equipment, including memory, processor and storage on a memory and can located The step of computer program run on reason device, the processor realizes method as described above when executing described program.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer program The step of method as described above is realized when being executed by processor.
The invention has the following beneficial effects:
A kind of image content common recognition method, server based on block chain provided by the invention, on the one hand by using non- The mode encrypted symmetric key of symmetric cryptography can work as area on the cipher key broadcasting to the node of block chain for encrypting picture in this way When the verifying node of block chain needs to obtain symmetric key, the node with permission can be decrypted using pre-stored private key, And then encryption picture can be decrypted.On the other hand picture is not transmitted directly during cochain of block chain etc., but to picture Hash abstract and store path transmitted, and then the data interaction amount between block chain node is small, is made a summary by hash It may be determined whether original image, encryption picture can be obtained by store path, and then obtain in conjunction with decrypted symmetric key Original image, in order to execute subsequent image content common recognition operation.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 shows the block catenary system schematic diagram for being adapted for carrying out the application.
Fig. 2 shows a kind of image content common recognition sides based on block chain provided by the present application implemented by application server Method flow diagram.
Fig. 3 shows the concrete structure schematic diagram of application layer services device in the application.
Fig. 4 shows a kind of process for the image content common recognition method based on block chain implemented by picture storage server Schematic diagram.
Fig. 5 shows the concrete structure schematic diagram of picture storage server in the application.
Fig. 6 shows a kind of image content common recognition based on block chain that the application block chain verifying node server is implemented Method flow schematic diagram.
Fig. 7 shows the modular structure schematic diagram of block chain verifying node server in the application.
Fig. 8 shows the process steps schematic diagram of three end of the application interaction.
Fig. 9 a shows the interaction schematic diagram in the application execution common recognition operation between pre-prepare stage each node.
Fig. 9 b shows the interaction specific steps flow chart between each node of Fig. 9 a.
Fig. 9 c shows the interaction schematic diagram in the application execution common recognition operation between prepare stage each node.
Fig. 9 d shows the interaction specific steps flow chart between each node of Fig. 9 c.
Fig. 9 e shows the interaction schematic diagram in the application execution common recognition operation between commit stage each node.
Fig. 9 f shows the interaction specific steps flow chart between each node of Fig. 9 e.
Figure 10 shows the structural schematic diagram for being suitable for the computer equipment for being used to realize the embodiment of the present application.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1 shows a kind of block chain network system and specifically includes incorporated by reference to shown in Fig. 1: the application layer services of front end Device 1, verifying node 2, non-authentication node 3, certification node 4, picture memory node 5.Wherein, application layer services device 1 and block chain Verifying node 2, non-authentication node 3, one or several connection in picture memory node 5 simultaneously carry out two-way data transmission. It homogeneously connects and carries out two-way between block chain verifying node 2 and non-authentication node 3 and each node of picture memory node 5 Data transmission.Block chain certification node 4 and each verifying node 2 and non-authentication node 3 keep connecting and carry out two-way number According to transmission.
By application layer services device transmission original image to picture storage server, and generate hash abstract, the picture Storage server carries out encryption to the picture using symmetric key and generates encryption picture, and using pre-stored public key to described Then the symmetric key of the encryption picture and encryption is sent on each node by symmetric key encryption, verifying node, which obtains, to be added The store path and hash of close picture are made a summary, and symmetric key are decrypted using the private key of oneself, after obtaining symmetric key Original image is obtained after encryption picture is decrypted, hash abstract is then generated according to original image, compares hash abstract, really It surely is to carry out image content extraction and the operation of subsequent common recognition after the same picture.
Each node server and its method and step respectively implemented are described in detail one by one below.
Fig. 2 shows a kind of image content common recognition sides based on block chain provided by the present application implemented by application server Method, comprising:
S11: sending original image to picture storage server, so that the picture storage server uses symmetric key pair The picture carries out encryption and generates encryption picture, and using pre-stored public key to the symmetric key encryption, then will be described Encryption picture and the symmetric key of encryption are sent on each node;
S12: the store path of the encryption picture is obtained;
S13: cochain solicited message is sent to each node of block chain, the cochain solicited message includes the storage road Diameter, so that all block chain verifying node servers for having access authority obtain the encryption figure according to the store path Piece is decrypted the symmetric key according to the private key of the pre-stored correspondence public key, obtains the symmetric key, uses The encryption picture is decrypted in the symmetric key, obtains original image, extracts the image content in the original image, And then common recognition operation is executed according to the image content.
In some embodiments, above-mentioned steps further include:
S14: being handled original image by digest algorithm, obtains the first Hash digest of original image;Wherein institute Stating cochain request further includes first Hash digest, and then makes all block chain verifying node servers for having access authority The second Hash digest is generated according to obtained original image, the comparison result according to the first Hash digest and the second Hash digest is true It is fixed whether to execute the step of extracting the image content in the original image.
In certain embodiments, the cochain solicited message further include: the authentication certificate of application server initiates to use The identity information at family, the access authority for initiating user, so that all block chain verifying node servers pair for having access authority The cochain request is authenticated.
Application layer services device 1 can be the server cluster an of server or multiple servers composition, be mainly responsible for place Manage the service logic other than block chain.In general, block chain verifying node 2 and non-authentication node 3 can provide service to application layer and connect Mouthful.Application layer constructs request message according to specific service logic, sends to block chain and takes provided by request call block chain Business interface continues to execute subsequent service logic after waiting block catenary system to execute transaction and return to transaction results.
In virtual bench level, the specific structure is shown in FIG. 3 for application layer services device, specifically includes:
Sending module 11 sends original image to picture storage server, so that picture storage server use pair Claim picture described in key pair to carry out encryption and generate encryption picture, and using pre-stored public key to the symmetric key encryption, so The symmetric key of the encryption picture and encryption is sent on each node afterwards;
Store path obtains module 12, obtains the store path of the encryption picture;
Cochain solicited message sending module 13 sends cochain solicited message, the cochain request to each node of block chain Information includes the store path, so that all block chain verifying node servers for having access authority are according to the storage road Diameter obtains the encryption picture, is decrypted, is obtained to the symmetric key according to the private key of the pre-stored correspondence public key The symmetric key is decrypted the encryption picture using the symmetric key, obtains original image, extracts described original Image content in picture, and then common recognition operation is executed according to the image content.
Based on identical inventive concept, in an embodiment, further includes:
First Hash digest generation module is handled original image by digest algorithm, obtains the of original image One Hash digest;Wherein the cochain request further includes first Hash digest, and then makes all areas for having access authority Block chain verifies node server and generates the second Hash digest according to obtained original image, is breathed out according to the first Hash digest and second The comparison result of uncommon abstract determines whether to execute the step of extracting the image content in the original image.
Based on identical inventive concept, in an embodiment, the cochain solicited message further include: the identity of application server Certificate, the identity information for initiating user, the access authority for initiating user are authenticated, so that all block chains for having access authority are tested Card node server authenticates cochain request.
Fig. 4 shows a kind of image content common recognition method based on block chain implemented by picture storage server, comprising:
S21: the original image that application layer services device is sent is received, the symmetric key for encrypting picture is generated;
S22: encrypting the original image using the symmetric key, generates encryption picture and the encryption picture Store path;
S23: the symmetric key is encrypted using pre-stored public key;
S24: Xiang Suoshu application layer services device sends the store path of the encryption picture, so that the application layer services device The store path is added in cochain solicited message, so that the store path can be obtained in all nodes;
S25: the acquisition encryption picture for receiving the transmission of block chain link point is requested, and the return encryption picture is obtained to transmission to be added The block chain node of close picture request, the acquisition encryption picture request include the store path, obtain encryption picture request Initiation node identity information and operating right;
S26: it according to the identity information and the operating right for initiating node, filters out the block chain for having access authority and tests Node server is demonstrate,proved, the block chain verifying node server that Xiang Suoyou has access authority sends the described right of the public key encryption Claim key, so that private of the block chain verifying node server for having access authority according to the pre-stored correspondence public key The symmetric key is decrypted in key, obtains the symmetric key, is carried out using the symmetric key to the encryption picture Decryption, obtains original image, extracts the image content in the original image, and then execute common recognition behaviour according to the image content Make.
Block chain picture memory node 5 can be a server or the more servers mutually backed up.Block chain picture Memory node 5 is mainly that application layer services device 1 provides picture storage, image ciphering, key storage service, for block chain verifying section Point 2 is provided in picture read requests and is serviced authentication, cipher key delivery of initiator etc..
In virtual bench level, the specific structure of picture storage server is as shown in figure 5, specifically include:
Original image receiving module 21 receives the original image that application layer services device is sent, and generates for encrypting picture Symmetric key;
Original image encrypting module 22 encrypts the original image using the symmetric key, generates encryption figure The store path of piece and the encryption picture;
Symmetric key encryption module 23 encrypts the symmetric key using pre-stored public key;
Store path sending module 24, Xiang Suoshu application layer services device send the store path of the encryption picture, so that The store path is added in cochain solicited message the application layer services device, so that described deposit can be obtained in all nodes Store up path;
Encryption picture request receiving module 25 is obtained, the acquisition encryption picture request that block chain link point is sent is received, returns For the encryption picture to the block chain node for obtaining encryption picture and requesting is sent, the acquisition encryption picture request includes described deposits Store up the identity information and operating right in path, the initiation node for obtaining encryption picture request;
Encrypted symmetric key sending module 26 is provided according to the identity information and the operating right, screening of initiating node The block chain of standby access authority verifies node server, and the block chain verifying node server that Xiang Suoyou has access authority is sent The symmetric key of the public key encryption, so that the block chain verifying node server for having access authority is according to prestoring The symmetric key is decrypted in the private key of the correspondence of the storage public key, obtains the symmetric key, using described symmetrical close The encryption picture is decrypted in key, obtains original image, extracts the image content in the original image, and then according to institute It states image content and executes common recognition operation.
Fig. 6 shows a kind of image content common recognition method based on block chain that block chain verifying node server is implemented,
S31: the cochain solicited message that application server is sent is obtained, the cochain solicited message includes picture storage service Device carries out symmetric cryptography to original image and obtains the store path of encryption picture;Wherein the picture storage server is further adopted The symmetric key for encrypting the original image is encrypted with pre-stored public key, the symmetric key encrypted;
S32: Xiang Suoshu picture storage server, which is sent, obtains encryption picture request, and the acquisition encryption picture request includes The store path, the identity information and operating right for initiating node for obtaining encryption picture request;
S33: the symmetric key of the picture storage server encryption picture sent and the encryption is received, and then is adopted The symmetric key of the encryption is decrypted with pre-stored private key corresponding with the public key, obtains the symmetric key;
S34: the encryption picture is decrypted using the symmetric key, obtains original image;
S35: the image content in the original image is extracted;
S36: common recognition operation is executed according to the image content.
Based on identical inventive concept, in an embodiment, the application server further passes through digest algorithm to original Picture is handled, and the first Hash digest of original image is obtained;The cochain request further includes first Hash digest, institute State method further include:
The second Hash digest is generated according to obtained original image;
Determine whether to execute according to the comparison result of the first Hash digest and the second Hash digest and extracts the original image In image content the step of.
Based on identical inventive concept, in an embodiment, the ratio according to the first Hash digest and the second Hash digest Result is determined whether to execute the step of extracting the image content in the original image, comprising:
If the comparison result is consistent, it is determined that the original image is not tampered with, and then is determined and executed described in extraction The step of image content in original image.
Based on identical inventive concept, in an embodiment, the image content extracted in the original image, comprising:
The field information in the original image is extracted by OCR identification.
Based on identical inventive concept, in an embodiment, common recognition operation is executed according to the image content, comprising:
The image content is verified according to pre-stored verification picture, the result of broadcast verification;
Common recognition operation is executed, determines whether all nodes have reached common understanding, the original image is executed if reaching common understanding Corresponding intelligence contract.
Block chain verifying node 2 can be the server cluster an of server or multiple servers composition.Verify node 2 Request is sent to certification node 4 starting and block chain network Shi Zehui being added, obtains the certificate of fair that certification node 4 is signed and issued. In order to guarantee anonymity and the safety of transaction, verifying node 2 will use certification 4 batch of node when sending transaction request and sign and issue Certificate of fair sign to transaction, and using the symmetric cryptographic key generated by Diffie-Hellman to transaction data progress Encryption.In general, there are several to verify node 2 in a block chain network, each verifying node 2 is responsible for receiving application layer Server 1 sends the transaction request of (or block chain non-authentication node 3 forwards), is being signed and is being encrypted to transaction request Afterwards, other verifying nodes of broadcast into block chain network.After other verifying nodes receive the transaction, transaction can be tested Label.According to different scenes, verifying node can know together to transaction using different common recognition algorithms, the transaction reached common understanding It can be performed, and transaction request can then be packaged write-in block in buffer some amount or after a period of time, carry out persistence Storage.
In virtual bench level, block chain verifies the specific structure of node server as shown in fig. 7, specifically including:
Cochain solicited message obtains module 31, obtains the cochain solicited message that application server is sent, the cochain request Information includes that picture storage server carries out the store path that symmetric cryptography obtains encrypting picture to original image;The wherein figure Piece storage server further encrypts the symmetric key for encrypting the original image using pre-stored public key, is added Close symmetric key;
Encryption picture request sending module 32 is obtained, Xiang Suoshu picture storage server, which is sent, obtains encryption picture request, It is described obtain encryption picture request include the store path, obtain encryption picture request initiation node identity information and Operating right;
First deciphering module 33 receives the symmetrical of encryption picture that the picture storage server is sent and the encryption Key, and then the symmetric key of the encryption is decrypted using pre-stored private key corresponding with the public key, obtain institute State symmetric key;
Second deciphering module 34 is decrypted the encryption picture using the symmetric key, obtains original image;
Image content extraction module extracts the image content in the original image;
Common recognition operation module 35 executes common recognition operation according to the image content.
Based on identical inventive concept, in an embodiment, the application server further passes through digest algorithm to original Picture is handled, and the first Hash digest of original image is obtained;The cochain request further includes first Hash digest, institute State block chain verifying node server further include:
Second Hash digest generation module generates the second Hash digest according to obtained original image;
Comparison module determines whether to execute described in extraction according to the comparison result of the first Hash digest and the second Hash digest The step of image content in original image.
Based on identical inventive concept, in an embodiment, if the comparison result be it is consistent, image content extraction module mentions Take the image content in the original image.
Based on identical inventive concept, in an embodiment, the image content extraction module passes through described in OCR identification extracts Field information in original image.
Based on identical inventive concept, in an embodiment, the common recognition operation module includes:
Verification unit verifies the image content according to pre-stored verification picture, the result of broadcast verification;
Common recognition unit executes common recognition operation, determines whether all nodes have reached common understanding, if reaching common understanding described in execution The corresponding intelligent contract of original image.
It further include block chain non-authentication node in block catenary system, block chain non-authentication node 3 can be a service The server cluster of device or multiple servers composition.Non-authentication node 3 is starting and block chain network Shi Zehui is added to certification Node 4 sends request, obtains the certificate of fair that certification node 4 is signed and issued.In order to guarantee anonymity and the safety of transaction, non-authentication Node 3 will use the certificate of fair signed and issued of certification 4 batch of node when sending transaction request and sign to transaction, and use by The symmetric cryptographic key that Diffie-Hellman generates encrypts transaction data.Block chain non-authentication node 3, which can receive, answers The transaction request transmitted by stratum server 1, and transaction is packaged, add type of transaction, the field of timestamp and signature Content, wherein type of transaction field is determined according to the type of message of application server, such as disposes intelligent contract/inquiry block chain number Determined according to/modification block chain data etc. request types, when timestamp field takes current non-authentication node to receive request when Between stab, signature field signs to transaction data using private key corresponding to certificate of fair, and by signature transaction it is attached The upper certificate of fair, reuses symmetric key and encrypts to the transaction, and the transaction by encryption is finally transmitted to block chain Verify node 2.Block chain non-authentication node 3 itself is simultaneously not involved in common recognition, will not execute transaction or save block data.
Block chain certification node 4 can be a server or the more servers mutually backed up.Block chain authenticates node 4 Predominantly block chain verifying node 2 and block chain non-authentication node 3 provide authentication and grant a certificate service.
Could be aware that by above description, it is provided by the invention it is a kind of based on block chain image content common recognition method, clothes Business device can will encrypt the cipher key broadcasting of picture on the one hand by using the mode encrypted symmetric key of asymmetric encryption in this way Onto the node of block chain, when the verifying node of block chain needs to obtain symmetric key, the node with permission can be used Pre-stored private key is decrypted, and then can decrypt encryption picture.On the other hand not straight during cochain of block chain etc. Transmission picture is connect, but the hash of picture abstract and store path are transmitted, and then the data between block chain node Interactive quantity is small, may be determined whether original image by hash abstract, can obtain encryption picture by store path, in turn Original image is obtained in conjunction with decrypted symmetric key, in order to execute subsequent image content common recognition operation.
The application is described in detail below with reference to concrete scene, Fig. 8 shows the flow diagram of three ends interaction.Such as Shown in Fig. 8, specifically include:
Step S101: application layer services device 1 sends the request that picture stores to picture storage server 5, in solicited message Including plaintext picture, whether encrypt the fields such as storage picture.
Step S102: picture storage server 5 receives application layer services device 1 and requests, and gets plaintext picture in request Etc. information.
Step S103: picture storage server 5 is generated for encrypting the symmetric key of picture, and stores the symmetric key.
Step S104: picture storage server 5 adds plaintext picture using the symmetric key generated in step S103 It is close, it generates encryption picture and stores encryption picture to local, the URI store path of preservation encryption picture.
Step S105: picture storage server 5 returns to the URI store path of encryption picture to application server 1.
Step S106: application server 1 receives the URI store path of encryption picture.
Step S107: application server 1, by hash digest algorithm, generates original plaintext picture to original plaintext picture Hash abstract, and the request of block chain on the hash abstract is sent, in request message other than including hash abstract, should also include Encrypt the URI store path of picture, the TLS authentication certificate of application server, the information such as user name.
Step S108: the communication module 21 of block chain non-authentication node 3 receives the request, checks the legitimacy and group of transaction Dress up transaction.
Step S109: the encrypting module 22 of block chain non-authentication node 3 will use private key corresponding to certificate of fair, right Transaction is signed, and transmitted transaction is requested to verifying node 2 all in verifying node cluster.The transaction request of forwarding includes The hash abstract of original plaintext picture, the encryption URI store path of picture, non-authentication node TLS authentication certificate, user The information such as name.
Step S110: the communication module 21 that block chain verifies node 2 receives the request, checks the legitimacy of transaction, specifically It whether is more than the threshold value of some setting, the identity information of current transaction initiator, current transaction initiation including transaction flow The access authority of side, if current transaction flow is more than the threshold value of some setting, or transaction initiator does not have legal TLS Authentication certificate, or transaction initiate user not to operating rights such as picture cochains, can all refuse to handle the transaction, if It is legal to trade, then continues to handle in next step.
Step S111: block chain verifies node 2 and initiates picture read requests, includes the URI of encryption picture in request message Store path.
Step S112: picture storage server 5 receives the picture read requests of verifying node 2, the initiator of checking request Identity information and access authority.If transaction initiator does not have legal TLS authentication certificate, or transaction is initiated to use Family to operating rights such as picture readings, can all not refuse to handle the transaction, if transaction is legal, continue in next step Reason.
Step S113: the picture that picture storage server 5 returns to encryption gives verifying node 2.
Step S114: picture storage server 5 checks that the initiator of request is to verify whether node 2 has decryption picture Access authority, if it has, then encrypted with symmetric key of the public key in the certificate of verifying node 2 to encryption picture, it is raw At key ciphertext and return to verifying node 2.If not having the access authority of decryption picture, do not send the key of decryption to Verify node 2.
Step S115: if verifying node 2 receives the key ciphertext of step S114 generation, with the private key of oneself to key Ciphertext decryption obtains symmetric key in plain text, and the encryption picture of step S113 is decrypted in plain text using the symmetric key, obtains To plaintext picture.
Step S116: verifying 2 pairs of plaintext pictures of node generate hash abstract 1 by hash digest algorithm, and verify hash Abstract 1 and the hash abstract of plaintext picture in step S109 compare, if the two is consistent, illustrate that picture is not tampered with, solve The close picture come out is consistent with the plaintext picture of original application server transmission.
Step S117: the access and the preparation before execution that block chain verifying node 2 starts common recognition algorithm, wherein can call altogether Know message reception module, monitors and receive the message of common recognition algorithm interior joint intercommunication.
Step S118: block chain verifies node 2 and uses the key element in OCR extraction plaintext picture.
Step S119: block chain verifies node 2 and carries out business verifying to key element linkage local service system in picture, Such as according to the identification card number in the picture of opening an account of extraction, whether the blacklist operation system for linking local verifies the identification card number It is legal.
Step S120: in the execution of common recognition algorithm, using the picture check results of step S119, specific process of knowing together is detailed See Fig. 9 a to Fig. 9 f.
Step S121: after having executed common recognition algorithm, all verifying nodes verified in node cluster should reach an agreement knot Fruit executes common recognition commit module 2345 if all nodes are reached common understanding, and the behaviour of persistence processing is carried out to common recognition result Make;If all nodes are not reached common understanding, common recognition rollback module 2346 is executed, to the common recognition knot of each verifying node Fruit rollback, without persistence processing.
Step S122: block chain verifies node 2 and total intelligent contract processing module 235 is called to verify common recognition as a result, if testing Card passes through, then executes intelligent contract, if verifying does not pass through, returns to specific common recognition error information.
Step S123: block chain verifying node 2 calls memory module 24 to write Transaction Information and intelligent contract implementing result Enter block, and the relevant data persistence that process of exchange is generated is stored into database.
In above-mentioned concrete scene, as shown in Fig. 9 a to Fig. 9 f, wherein Fig. 9 b shows the interaction between each node of Fig. 9 a Step, Fig. 9 d show the interactive step between each node of Fig. 9 c, and Fig. 9 f shows the interaction step between each node of Fig. 9 e Suddenly.
Executing common recognition operation, specific step is as follows:
Step S201: after all verifying nodes receive the picture hash cochain request of non-authentication node forwarding, pass through choosing Algorithm picks host node is taken, Algorithms of Selecting includes but is not limited to recycle the sequence from verifying node 0,1,2,3 successively as master Node.
Step S202: according to the algorithm of selection, each verifying node judges whether oneself is host node, if not main section Point, then exit, and if it is host node, then continues to handle in next step.
Step S203: host node checks the transaction request of non-authentication node forwarding, including non-authentication in visa transaction request The signature of node, from the untreated transaction request to prevent reprocessing etc. before inspection.
Step S204: host node calls the key element in OCR and local service system check picture to carry out business Property verification, save the business check results of picture.
Step S205: host node generates pre-prepare message information, and message information includes current primary node ID, transaction Serial number n, transaction request abstract, the ID of sending node, picture hash abstract encrypt the store path of picture, the business school of picture Test result etc..
Step S206: host node broadcasts pre-prepare message to all verifying nodes.
Step S207: host node persistence pre-prepare message information.
Step S208: after all verifying nodes receive the pre-prepare message of main verifying node, host node hair is checked The pre-prepare message validity sent, it is consistent including the host node ID host node whether host node Algorithms of Selecting calculates, Whether transaction serial number meets in specified interval, and whether transaction summarization is correct etc..
Step S209: each verifying node calls the key element in OCR and local service system check picture to carry out Business verification, saves the business check results of picture.
Step S210: each verifying node checks that picture carries out business school in the pre-prepare message of host node transmission It tests, it is consistent whether the hash including picture cochain transaction request makes a summary with the hash decrypted, other verifying nodes received Whether the business check results to picture are to pass through, and whether local picture business check results are to pass through.
Step S211: each verifying node generates prepare message information, and message information includes current primary node ID, transaction Serial number n, transaction request abstract, the ID of sending node, picture hash abstract encrypt the store path of picture, the industry of local picture Check results of being engaged in etc..
Step S212: each verifying node broadcasts prepare message gives all verifying nodes.
Step S213: each verifying node persistence prepare message information.
Step S214: after all verifying nodes receive the prepare message of other verifying nodes, each verifying node is checked The pre-prepare message validity of transmission, including the host node ID host node one whether host node Algorithms of Selecting calculates It causes, whether transaction serial number meets in specified interval, and whether transaction summarization correct etc..
Step S215: all verifying nodes, which check whether, meets commit condition.
Step S216: the common recognition based on image content passes through, and executes the stage into intelligence.
Further, S215 is specifically included:
1. the transaction can be inquired in the prepared stage in local database.
2. receive the prepared message of all nodes in network, and picture business check results are all in prepared message To pass through.
If above 2 conditions all meet, continues S216, otherwise just exit.
Those skilled in the art could be aware that the above method specifically has the advantages that
1, the common store framework of the cochain scheme of block chain image data is devised.By picture hash make a summary cochain and Encryption storage, the picture of guarantee each nodes sharing in block chain network, but do not reduce the safety of picture again, it is ensured that picture It is not tampered, and picture can believe part verifying node as it can be seen that avoiding sensitization picture by way of access control Breath leakage.
2, it furthermore knows together in conjunction with service tests systems such as the local OCR of each node to image content in the common recognition stage Verification can return to Fail Transaction in the common recognition stage for verifying unacceptable request, it is not necessary to wait until that intelligent contract executes rank again Duan Caineng verifies picture, wastes the resource of common recognition communication, to reach shortening exchange hour, handles picture number for block chain According to providing strong support, the effect of business processing efficiency is improved.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer equipment, specifically, computer is set It is standby for example can for personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, Media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment In any equipment combination.
Computer equipment specifically includes memory, processor and storage on a memory simultaneously in a typical example The computer program that can be run on a processor is realized when the processor executes described program and is held as described above by client Capable method, alternatively, the processor realizes the method executed as described above by server when executing described program.
Below with reference to Figure 10, it illustrates the structures for the computer equipment 600 for being suitable for being used to realize the embodiment of the present application to show It is intended to.
As shown in Figure 10, computer equipment 600 includes central processing unit (CPU) 601, can be read-only according to being stored in Program in memory (ROM) 602 is loaded into random access storage device (RAM) from storage section 608) program in 603 And execute various work appropriate and processing.In RAM603, also it is stored with system 600 and operates required various program sum numbers According to.CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to Bus 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.; And including such as LAN card, the communications portion 609 of the network interface card of modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 606 as needed.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon Computer program be mounted as needed such as storage section 608.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart description Software program.For example, the embodiment of the present invention includes a kind of computer program product comprising be tangibly embodied in machine readable Computer program on medium, the computer program include the program code for method shown in execution flow chart.At this In the embodiment of sample, which can be downloaded and installed from network by communications portion 609, and/or from removable Medium 611 is unloaded to be mounted.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (20)

  1. A kind of method 1. image content based on block chain is known together characterized by comprising
    Original image is sent to picture storage server, so that the picture storage server is using symmetric key to the picture It carries out encryption and generates encryption picture, and using pre-stored public key to the symmetric key encryption, then by the encryption picture It is sent on each node with the symmetric key of encryption;
    Obtain the store path of the encryption picture;
    Cochain solicited message is sent to each node of block chain, the cochain solicited message includes the store path, so that institute There is the block chain verifying node server for having access authority to obtain the encryption picture according to the store path, according to prestoring The symmetric key is decrypted in the private key of the correspondence of the storage public key, obtains the symmetric key, using described symmetrical close The encryption picture is decrypted in key, obtains original image, extracts the image content in the original image, and then according to institute It states image content and executes common recognition operation.
  2. The method 2. image content according to claim 1 is known together, which is characterized in that further include:
    Original image is handled by digest algorithm, obtains the first Hash digest of original image;Wherein the cochain is asked Asking further includes first Hash digest, and then makes all block chains verifying node servers for having access authority according to obtaining Original image generate the second Hash digest, determine whether to hold according to the comparison result of the first Hash digest and the second Hash digest Row extracts the step of image content in the original image.
  3. The method 3. image content according to claim 1 is known together, which is characterized in that the cochain solicited message further include: The authentication certificate of application server, the identity information for initiating user, the access authority for initiating user, so that all have visit Ask that the block chain verifying node server of permission authenticates cochain request.
  4. A kind of method 4. image content based on block chain is known together characterized by comprising
    The original image that application layer services device is sent is received, the symmetric key for encrypting picture is generated;
    The original image is encrypted using the symmetric key, generates the storage road of encryption picture and the encryption picture Diameter;
    The symmetric key is encrypted using pre-stored public key;
    The store path that the encryption picture is sent to the application layer services device, so that the application layer services device is deposited described It stores up path to be added in cochain solicited message, so that the store path can be obtained in all nodes;
    It receives the acquisition that block chain link point is sent and encrypts picture request, return to the encryption picture and asked to acquisition encryption picture is sent The block chain node asked, it is described to obtain the initiation section that encryption picture request includes the store path, acquisition encryption picture request The identity information and operating right of point;
    According to the identity information and the operating right for initiating node, the block chain verifying node clothes for having access authority are filtered out Business device, the block chain verifying node server that Xiang Suoyou has access authority send the symmetric key of the public key encryption, So that the block chain verifying node server for having access authority is according to the private key of the pre-stored correspondence public key to institute It states symmetric key to be decrypted, obtains the symmetric key, the encryption picture is decrypted using the symmetric key, is obtained To original image, the image content in the original image is extracted, and then common recognition operation is executed according to the image content.
  5. A kind of method 5. image content based on block chain is known together characterized by comprising
    The cochain solicited message that application server is sent is obtained, the cochain solicited message includes picture storage server to original Picture carries out symmetric cryptography and obtains the store path of encryption picture;Wherein the picture storage server is further using pre-stored Public key the symmetric key for encrypting the original image is encrypted, the symmetric key encrypted;
    It is sent to the picture storage server and obtains encryption picture request, the acquisition encryption picture request includes the storage Path, the identity information and operating right for initiating node for obtaining encryption picture request;
    The symmetric key of the picture storage server encryption picture sent and the encryption is received, and then using pre-stored Private key corresponding with the public key symmetric key of the encryption is decrypted, obtain the symmetric key;
    The encryption picture is decrypted using the symmetric key, obtains original image;
    Extract the image content in the original image;
    Common recognition operation is executed according to the image content.
  6. The method 6. image content according to claim 5 is known together, which is characterized in that the application server further passes through Digest algorithm handles original image, obtains the first Hash digest of original image;The cochain request further includes described First Hash digest, the method also includes:
    The second Hash digest is generated according to obtained original image;
    Determine whether to execute according to the comparison result of the first Hash digest and the second Hash digest and extract in the original image The step of image content.
  7. The method 7. image content according to claim 5 is known together, which is characterized in that described according to the first Hash digest and the The comparison result of two Hash digests determines whether to execute the step of extracting the image content in the original image, comprising:
    If the comparison result is consistent, it is determined that the original image is not tampered with, and then it is described original to determine that execution is extracted The step of image content in picture.
  8. The method 8. image content according to claim 5 is known together, which is characterized in that described to extract in the original image Image content, comprising:
    The field information in the original image is extracted by OCR identification.
  9. The method 9. image content according to claim 5 is known together, which is characterized in that common recognition is executed according to the image content Operation, comprising:
    The image content is verified according to pre-stored verification picture, the result of broadcast verification;
    Common recognition operation is executed, determines whether all nodes have reached common understanding, it is corresponding that the original image is executed if reaching common understanding Intelligent contract.
  10. 10. a kind of application server characterized by comprising
    Sending module sends original image to picture storage server, so that the picture storage server uses symmetric key Encryption is carried out to the picture and generates encryption picture, and using pre-stored public key to the symmetric key encryption, then by institute The symmetric key for stating encryption picture and encryption is sent on each node;
    Store path obtains module, obtains the store path of the encryption picture;
    Cochain solicited message sending module sends cochain solicited message, the cochain request packet to each node of block chain The store path is included, so that all block chain verifying node servers for having access authority are obtained according to the store path The encryption picture is decrypted the symmetric key according to the private key of the pre-stored correspondence public key, and it is described right to obtain Claim key, the encryption picture is decrypted using the symmetric key, original image is obtained, extracts in the original image Image content, and then according to the image content execute common recognition operation.
  11. 11. application server according to claim 10, which is characterized in that further include:
    First Hash digest generation module is handled original image by digest algorithm, and obtain original image first breathes out Uncommon abstract;Wherein the cochain request further includes first Hash digest, and then makes all block chains for having access authority Verifying node server generates the second Hash digest according to obtained original image, is plucked according to the first Hash digest and the second Hash The comparison result wanted determines whether to execute the step of extracting the image content in the original image.
  12. 12. application server according to claim 10, which is characterized in that the cochain solicited message further include: application The authentication certificate of server, the identity information for initiating user, the access authority for initiating user, so that all have access right The block chain verifying node server of limit authenticates cochain request.
  13. 13. a kind of picture storage server characterized by comprising
    Original image receiving module receives the original image that application layer services device is sent, and generates for encrypting the symmetrical close of picture Key;
    Original image encrypting module encrypts the original image using the symmetric key, generates encryption picture and institute State the store path of encryption picture;
    Symmetric key encryption module encrypts the symmetric key using pre-stored public key;
    Store path sending module, Xiang Suoshu application layer services device sends the store path of the encryption picture, so that described answer The store path is added in cochain solicited message with stratum server, so that the storage road can be obtained in all nodes Diameter;
    Encryption picture request receiving module is obtained, the acquisition encryption picture request of block chain link point transmission is received, returns to described add For close picture to the block chain node for obtaining encryption picture and requesting is sent, the acquisition encryption picture request includes the storage road Diameter, the identity information and operating right for initiating node for obtaining encryption picture request;
    Encrypted symmetric key sending module filters out according to the identity information and the operating right for initiating node and has access The block chain of permission verifies node server, and the block chain verifying node server that Xiang Suoyou has access authority sends the public affairs The symmetric key of key encryption, so that the block chain verifying node server for having access authority is according to pre-stored pair It answers the private key of the public key that the symmetric key is decrypted, obtains the symmetric key, using the symmetric key to institute It states encryption picture to be decrypted, obtains original image, extract the image content in the original image, and then according to the picture Content executes common recognition operation.
  14. 14. a kind of block chain verifies node server characterized by comprising
    Cochain solicited message obtains module, obtains the cochain solicited message that application server is sent, the cochain request packet It includes picture storage server and the store path that symmetric cryptography obtains encrypting picture is carried out to original image;The wherein picture storage Server further encrypts the symmetric key for encrypting the original image using pre-stored public key, pair encrypted Claim key;
    Encryption picture request sending module is obtained, Xiang Suoshu picture storage server, which is sent, obtains encryption picture request, described to obtain Encryption picture request is taken to include the store path, obtain the identity information and operating rights for encrypting the initiation node of picture request Limit;
    First deciphering module receives the symmetric key of the picture storage server encryption picture sent and the encryption, And then the symmetric key of the encryption is decrypted using pre-stored private key corresponding with the public key, it obtains described symmetrical Key;
    Second deciphering module is decrypted the encryption picture using the symmetric key, obtains original image;
    Image content extraction module extracts the image content in the original image;
    Common recognition operation module executes common recognition operation according to the image content.
  15. 15. block chain according to claim 14 verifies node server, which is characterized in that the application server is into one Step is handled original image by digest algorithm, obtains the first Hash digest of original image;The cochain request is also wrapped First Hash digest is included, the block chain verifies node server further include:
    Second Hash digest generation module generates the second Hash digest according to obtained original image;
    It is described original to determine whether that execution is extracted according to the comparison result of the first Hash digest and the second Hash digest for comparison module The step of image content in picture.
  16. 16. block chain according to claim 14 verifies node server, which is characterized in that if comparison result be it is consistent, Image content extraction module extracts the image content in the original image.
  17. 17. block chain according to claim 14 verifies node server, which is characterized in that the image content extracts mould Block extracts the field information in the original image by OCR identification.
  18. 18. block chain according to claim 14 verifies node server, which is characterized in that the common recognition operation module packet It includes:
    Verification unit verifies the image content according to pre-stored verification picture, the result of broadcast verification;
    Common recognition unit executes common recognition operation, determines whether all nodes have reached common understanding, execute if reaching common understanding described original The corresponding intelligent contract of picture.
  19. 19. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes the described in any item methods of claim 1 to 9 when executing described program The step of.
  20. 20. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of claim 1 to 9 described in any item methods are realized when processor executes.
CN201910694624.0A 2019-07-30 2019-07-30 Picture content consensus method based on block chain and server Active CN110336833B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910694624.0A CN110336833B (en) 2019-07-30 2019-07-30 Picture content consensus method based on block chain and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910694624.0A CN110336833B (en) 2019-07-30 2019-07-30 Picture content consensus method based on block chain and server

Publications (2)

Publication Number Publication Date
CN110336833A true CN110336833A (en) 2019-10-15
CN110336833B CN110336833B (en) 2022-06-21

Family

ID=68147977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910694624.0A Active CN110336833B (en) 2019-07-30 2019-07-30 Picture content consensus method based on block chain and server

Country Status (1)

Country Link
CN (1) CN110336833B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889137A (en) * 2019-11-21 2020-03-17 云南群林科技有限公司 Data exchange method based on block chain
CN110933040A (en) * 2019-11-05 2020-03-27 武汉菲旺软件技术有限责任公司 Block chain based data uplink method, device, equipment and medium
CN111191288A (en) * 2019-12-30 2020-05-22 中电海康集团有限公司 Block chain data access authority control method based on proxy re-encryption
CN111343179A (en) * 2020-02-25 2020-06-26 中国工商银行股份有限公司 Real-time consensus method and device for authenticity of data on link
CN111371796A (en) * 2020-03-11 2020-07-03 腾讯科技(深圳)有限公司 Data transmission system, data transmission method, medium, and electronic device
CN111625231A (en) * 2020-05-27 2020-09-04 哈尔滨云天智旅大数据有限公司 Software development method based on data security
CN112084521A (en) * 2020-09-27 2020-12-15 中国建设银行股份有限公司 Unstructured data processing method, device and system for block chain
CN112187767A (en) * 2020-09-23 2021-01-05 上海万向区块链股份公司 Multi-party contract consensus system, method and medium based on block chain
CN112911002A (en) * 2021-02-02 2021-06-04 上海华盖科技发展股份有限公司 Block chain data sharing encryption method
CN113051625A (en) * 2021-03-24 2021-06-29 中国工商银行股份有限公司 Data evidence storing method and device based on block chain
CN114205484A (en) * 2021-12-15 2022-03-18 湖南快乐阳光互动娱乐传媒有限公司 Picture processing method and device
CN114285555A (en) * 2021-12-15 2022-04-05 支付宝(杭州)信息技术有限公司 Multicast method and device based on block chain
WO2022120938A1 (en) * 2020-12-09 2022-06-16 杭州趣链科技有限公司 Data sharing method, system and apparatus, and device and storage medium
CN116760651A (en) * 2023-08-22 2023-09-15 中国航空结算有限责任公司 Data encryption method and device, electronic equipment and readable storage medium
CN116842573A (en) * 2023-07-25 2023-10-03 南京理工大学 Hierarchical encryption privacy protection method based on blockchain

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426170A (en) * 2017-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107846278A (en) * 2017-10-30 2018-03-27 中国联合网络通信集团有限公司 Intelligent contract processing method and processing device
CN108055274A (en) * 2017-12-22 2018-05-18 广东工业大学 A kind of encryption based on alliance's chain storage data and shared method and system
CN108345685A (en) * 2018-03-07 2018-07-31 物数(上海)信息科技有限公司 More granularity data processing methods, system, equipment and storage medium under block chain
CN108537063A (en) * 2018-02-26 2018-09-14 阿里巴巴集团控股有限公司 A kind of method, apparatus and equipment of data storage
CN108550226A (en) * 2018-04-17 2018-09-18 暨南大学 Based on block chain technology automotive system and its building method are shared without key
CN108881262A (en) * 2018-07-02 2018-11-23 北京市天元网络技术股份有限公司 Restoring files methods, devices and systems based on block chain
CN109040012A (en) * 2018-06-19 2018-12-18 西安电子科技大学 A kind of data security protecting and sharing method based on block chain and system and application
CN109033475A (en) * 2018-09-10 2018-12-18 湖南智慧政务区块链科技有限公司 A kind of file memory method, device, equipment and storage medium
CN109359206A (en) * 2018-10-17 2019-02-19 郑称德 Image processing method and system based on Internet of Things campus administration
CN109583912A (en) * 2018-11-14 2019-04-05 阿里巴巴集团控股有限公司 Trade company's authentication method and device based on block chain
CN109753817A (en) * 2018-12-28 2019-05-14 全链通有限公司 Medical information secure storage scheme based on block chain
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain
CN109783447A (en) * 2019-01-23 2019-05-21 北京邮电大学 Electronics license deposits card method, acquisition methods, device, system and electronic equipment
CN109858222A (en) * 2019-01-18 2019-06-07 特斯联(北京)科技有限公司 A kind of authentication block catenary system and its verification method based on face characteristic
CN109951498A (en) * 2019-04-18 2019-06-28 中央财经大学 A kind of block chain access control method and device based on ciphertext policy ABE encryption

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426170A (en) * 2017-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107846278A (en) * 2017-10-30 2018-03-27 中国联合网络通信集团有限公司 Intelligent contract processing method and processing device
CN108055274A (en) * 2017-12-22 2018-05-18 广东工业大学 A kind of encryption based on alliance's chain storage data and shared method and system
CN108537063A (en) * 2018-02-26 2018-09-14 阿里巴巴集团控股有限公司 A kind of method, apparatus and equipment of data storage
CN108345685A (en) * 2018-03-07 2018-07-31 物数(上海)信息科技有限公司 More granularity data processing methods, system, equipment and storage medium under block chain
CN108550226A (en) * 2018-04-17 2018-09-18 暨南大学 Based on block chain technology automotive system and its building method are shared without key
CN109040012A (en) * 2018-06-19 2018-12-18 西安电子科技大学 A kind of data security protecting and sharing method based on block chain and system and application
CN108881262A (en) * 2018-07-02 2018-11-23 北京市天元网络技术股份有限公司 Restoring files methods, devices and systems based on block chain
CN109033475A (en) * 2018-09-10 2018-12-18 湖南智慧政务区块链科技有限公司 A kind of file memory method, device, equipment and storage medium
CN109359206A (en) * 2018-10-17 2019-02-19 郑称德 Image processing method and system based on Internet of Things campus administration
CN109583912A (en) * 2018-11-14 2019-04-05 阿里巴巴集团控股有限公司 Trade company's authentication method and device based on block chain
CN109753817A (en) * 2018-12-28 2019-05-14 全链通有限公司 Medical information secure storage scheme based on block chain
CN109858222A (en) * 2019-01-18 2019-06-07 特斯联(北京)科技有限公司 A kind of authentication block catenary system and its verification method based on face characteristic
CN109783447A (en) * 2019-01-23 2019-05-21 北京邮电大学 Electronics license deposits card method, acquisition methods, device, system and electronic equipment
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain
CN109951498A (en) * 2019-04-18 2019-06-28 中央财经大学 A kind of block chain access control method and device based on ciphertext policy ABE encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
币艾思维 : "区块链怎么确保文件(比如视频、图片)不被篡改 ", 《链节点 ,原文链接:HTTPS://WWW.CHAINNODE.COM/POST/285039#COMMEN》 *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933040A (en) * 2019-11-05 2020-03-27 武汉菲旺软件技术有限责任公司 Block chain based data uplink method, device, equipment and medium
CN110889137A (en) * 2019-11-21 2020-03-17 云南群林科技有限公司 Data exchange method based on block chain
CN110889137B (en) * 2019-11-21 2023-04-07 盛世智云(云南)软件有限公司 Data exchange method based on block chain
CN111191288A (en) * 2019-12-30 2020-05-22 中电海康集团有限公司 Block chain data access authority control method based on proxy re-encryption
CN111191288B (en) * 2019-12-30 2023-10-13 中电海康集团有限公司 Block chain data access right control method based on proxy re-encryption
CN111343179B (en) * 2020-02-25 2023-04-07 中国工商银行股份有限公司 Real-time consensus method and device for authenticity of data on link
CN111343179A (en) * 2020-02-25 2020-06-26 中国工商银行股份有限公司 Real-time consensus method and device for authenticity of data on link
CN111371796A (en) * 2020-03-11 2020-07-03 腾讯科技(深圳)有限公司 Data transmission system, data transmission method, medium, and electronic device
CN111371796B (en) * 2020-03-11 2023-05-26 腾讯科技(深圳)有限公司 Data transmission system, data transmission method, medium and electronic device
CN111625231A (en) * 2020-05-27 2020-09-04 哈尔滨云天智旅大数据有限公司 Software development method based on data security
CN111625231B (en) * 2020-05-27 2021-02-26 哈尔滨云天智旅大数据有限公司 Software development method based on data security
CN112187767A (en) * 2020-09-23 2021-01-05 上海万向区块链股份公司 Multi-party contract consensus system, method and medium based on block chain
CN112084521A (en) * 2020-09-27 2020-12-15 中国建设银行股份有限公司 Unstructured data processing method, device and system for block chain
CN112084521B (en) * 2020-09-27 2024-02-09 中国建设银行股份有限公司 Unstructured data processing method, device and system for block chain
WO2022120938A1 (en) * 2020-12-09 2022-06-16 杭州趣链科技有限公司 Data sharing method, system and apparatus, and device and storage medium
CN112911002A (en) * 2021-02-02 2021-06-04 上海华盖科技发展股份有限公司 Block chain data sharing encryption method
CN113051625A (en) * 2021-03-24 2021-06-29 中国工商银行股份有限公司 Data evidence storing method and device based on block chain
CN113051625B (en) * 2021-03-24 2024-02-20 中国工商银行股份有限公司 Data storage method and device based on blockchain
CN114285555A (en) * 2021-12-15 2022-04-05 支付宝(杭州)信息技术有限公司 Multicast method and device based on block chain
CN114205484A (en) * 2021-12-15 2022-03-18 湖南快乐阳光互动娱乐传媒有限公司 Picture processing method and device
CN114205484B (en) * 2021-12-15 2024-09-27 湖南快乐阳光互动娱乐传媒有限公司 Picture processing method and device
CN116842573A (en) * 2023-07-25 2023-10-03 南京理工大学 Hierarchical encryption privacy protection method based on blockchain
CN116760651A (en) * 2023-08-22 2023-09-15 中国航空结算有限责任公司 Data encryption method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN110336833B (en) 2022-06-21

Similar Documents

Publication Publication Date Title
CN110336833A (en) Image content common recognition method, server based on block chain
CN110602138B (en) Data processing method and device for block chain network, electronic equipment and storage medium
CN105007279B (en) Authentication method and Verification System
US20240187393A1 (en) Network resource access control methods and systems using transactional artifacts
CN112333198A (en) Secure cross-domain login method, system and server
CN110149323B (en) Processing device with ten-million-level TPS (platform secure protocol) contract processing capacity
US11405216B2 (en) System for authenticating verified personal credentials
CN109741068A (en) Internetbank inter-bank contracting method, apparatus and system
CN111369236A (en) Data management method and device applied to block chain
CN112422287B (en) Multi-level role authority control method and device based on cryptography
CN112073196B (en) Service data processing method and device, electronic equipment and storage medium
US11777745B2 (en) Cloud-side collaborative multi-mode private data circulation method based on smart contract
CN107566393A (en) A kind of dynamic rights checking system and method based on trust certificate
CN112560072A (en) Key management method, device, medium and equipment based on block chain
CN112600830A (en) Service data processing method and device, electronic equipment and storage medium
CN113328854B (en) Service processing method and system based on block chain
CN112887087B (en) Data management method and device, electronic equipment and readable storage medium
CN113746916A (en) Block chain-based third-party service providing method, system and related node
CN115409511B (en) Personal information protection system based on block chain
CN113129008A (en) Data processing method and device, computer readable medium and electronic equipment
CN117150518A (en) Communication carrier data security encryption method and system
Payeras-Capellà et al. Design and performance evaluation of two approaches to obtain anonymity in transferable electronic ticketing schemes
CN115208642A (en) Identity authentication method, device and system based on block chain
CN114676192A (en) Electric energy metering data sharing method and device, storage medium and computer equipment
CN110381452A (en) The anti-sniff method of GMS short message, terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant