CN110336833A - Image content common recognition method, server based on block chain - Google Patents
Image content common recognition method, server based on block chain Download PDFInfo
- Publication number
- CN110336833A CN110336833A CN201910694624.0A CN201910694624A CN110336833A CN 110336833 A CN110336833 A CN 110336833A CN 201910694624 A CN201910694624 A CN 201910694624A CN 110336833 A CN110336833 A CN 110336833A
- Authority
- CN
- China
- Prior art keywords
- picture
- encryption
- original image
- block chain
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/20—Image preprocessing
- G06V10/22—Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
A kind of image content common recognition method, server based on block chain provided by the invention, on the one hand by using the mode encrypted symmetric key of asymmetric encryption, it in this way can will be on the cipher key broadcasting to the node of block chain that encrypt picture, when the verifying node of block chain needs to obtain symmetric key, node with permission can be decrypted using pre-stored private key, and then can decrypt encryption picture.On the other hand picture is not transmitted directly during cochain of block chain etc., but the hash of picture abstract and store path are transmitted, and then the data interaction amount between block chain node is small, it may be determined whether original image by hash abstract, encryption picture can be obtained by store path, and then decrypted symmetric key is combined to obtain original image, in order to execute subsequent image content common recognition operation.
Description
Technical field
The present invention relates to block chain technical fields, more particularly to a kind of image content common recognition side based on block chain
Method, server.
Background technique
With being widely used for block chain technology, more and more application scenarios needs store unstructured in block chain
Data (such as picture), such as supply chain finance in, business side wishes relevant order pictorial information to enter chain, thus may be used
To be consulted between node a certain range of on chain, to confirm the true and false of transaction and endorse for it.However current block catenary system
It does not support, main cause has several points:
1. since block chain technology is immature, such as receiving the limitation of common recognition algorithm and node number, transmit in a network
Biggish data are bound to cause effectiveness of performance decline, the response time increases, for this script TPS handling capacity just not high block
Chain network is sad news;
2. the system of block chain especially alliance's chain in mostly, using first knowing together, the mode for executing intelligent contract afterwards is run,
But it does the operation of signature and sign test to communication message only in common recognition process to ensure the safety of message, lacks the content to message
The verification of business is done, after only waiting until that common recognition passes through, the execution intelligent contract stage just carries out business verification, such as to picture
Middle customer information combines local blacklist system to do blacklist verification, this results in contingency obstructed to the business verifying of picture
It crosses, transaction executes failure will consume time and the resource of the cost of common recognition stage in vain.
Therefore, not yet occurs the technology of picture common recognition processing at present.
Summary of the invention
At least one of to solve the above-mentioned problems, the application provides a kind of image content common recognition side based on block chain
Method, comprising:
Original image is sent to picture storage server, so that the picture storage server is using symmetric key to described
Picture carries out encryption and generates encryption picture, and using pre-stored public key to the symmetric key encryption, then by the encryption
Picture and the symmetric key of encryption are sent on each node;
Obtain the store path of the encryption picture;
Cochain solicited message is sent to each node of block chain, the cochain solicited message includes the store path, with
All block chain verifying node servers for having access authority are made to obtain the encryption picture according to the store path, according to
The symmetric key is decrypted in the private key of the pre-stored correspondence public key, obtains the symmetric key, using described right
Claim encryption picture described in key pair to be decrypted, obtains original image, extract the image content in the original image, Jin Ergen
Common recognition operation is executed according to the image content.
In certain embodiments, further includes:
Original image is handled by digest algorithm, obtains the first Hash digest of original image;On wherein described
Chain request further include first Hash digest, and then make it is all have access authority block chains verifying node servers according to
Obtained original image generates the second Hash digest, is according to the determination of the comparison result of the first Hash digest and the second Hash digest
It is no to execute the step of extracting the image content in the original image.
In certain embodiments, the cochain solicited message further include: the authentication certificate of application server initiates to use
The identity information at family, the access authority for initiating user, so that all block chain verifying node servers pair for having access authority
The cochain request is authenticated.
The application also provides a kind of image content common recognition method based on block chain, comprising:
The original image that application layer services device is sent is received, the symmetric key for encrypting picture is generated;
Using the symmetric key original image is encrypted, generates encryption picture and the encryption picture is deposited
Store up path;
The symmetric key is encrypted using pre-stored public key;
The store path that the encryption picture is sent to the application layer services device, so that the application layer services device is by institute
It states store path to be added in cochain solicited message, so that the store path can be obtained in all nodes;
It receives the acquisition that block chain link point is sent and encrypts picture request, the return encryption picture is schemed to acquisition encryption is sent
The block chain node of piece request, the encryption picture that obtains request the hair for including the store path, obtaining encryption picture request
Play the identity information and operating right of node;
According to the identity information and the operating right for initiating node, the block chain verifying section for having access authority is filtered out
Point server, the block chain verifying node server that Xiang Suoyou has access authority send the described symmetrical close of the public key encryption
Key, so that private key pair of the block chain verifying node server for having access authority according to the pre-stored correspondence public key
The symmetric key is decrypted, and obtains the symmetric key, and the encryption picture is decrypted using the symmetric key,
Original image is obtained, extracts the image content in the original image, and then common recognition operation is executed according to the image content.
The application also provides a kind of image content common recognition method based on block chain, comprising:
The block chain verifying node server for having access authority obtains the cochain solicited message that application server is sent, institute
Stating cochain solicited message includes that picture storage server carries out the store path that symmetric cryptography obtains encrypting picture to original image;
Wherein the picture storage server further carries out the symmetric key for encrypting the original image using pre-stored public key
Encryption, the symmetric key encrypted;
It is sent to the picture storage server and obtains encryption picture request, the acquisition encryption picture request includes described
Store path, the identity information and operating right for initiating node for obtaining encryption picture request;
The symmetric key of the picture storage server encryption picture sent and the encryption is received, and then using pre-
The symmetric key of the encryption is decrypted in the private key corresponding with the public key of storage, obtains the symmetric key;
The encryption picture is decrypted using the symmetric key, obtains original image;
Extract the image content in the original image;
Common recognition operation is executed according to the image content.
In certain embodiments, the application server further passes through digest algorithm and handles original image, obtains
To the first Hash digest of original image;The cochain request further includes first Hash digest, the method also includes:
The second Hash digest is generated according to obtained original image;
Determine whether to execute according to the comparison result of the first Hash digest and the second Hash digest and extracts the original image
In image content the step of.
In certain embodiments, the comparison result according to the first Hash digest and the second Hash digest determines whether to hold
Row extracts the step of image content in the original image, comprising:
If the comparison result is consistent, it is determined that the original image is not tampered with, and then is determined and executed described in extraction
The step of image content in original image.
In certain embodiments, the image content extracted in the original image, comprising:
The field information in the original image is extracted by OCR identification.
In certain embodiments, common recognition operation is executed according to the image content, comprising:
The image content is verified according to pre-stored verification picture, the result of broadcast verification;
Common recognition operation is executed, determines whether all nodes have reached common understanding, the original image is executed if reaching common understanding
Corresponding intelligence contract.
The application also provides application server, comprising:
Sending module sends original image to picture storage server, so that the picture storage server is using symmetrical
Picture described in key pair carries out encryption and generates encryption picture, and using pre-stored public key to the symmetric key encryption, then
The symmetric key of the encryption picture and encryption is sent on each node;
Store path obtains module, obtains the store path of the encryption picture;
Cochain solicited message sending module sends cochain solicited message, the cochain request letter to each node of block chain
Breath includes the store path, so that all block chain verifying node servers for having access authority are according to the store path
The encryption picture is obtained, the symmetric key is decrypted according to the private key of the pre-stored correspondence public key, obtains institute
Symmetric key is stated, the encryption picture is decrypted using the symmetric key, original image is obtained, extracts the original graph
Image content in piece, and then common recognition operation is executed according to the image content.
In certain embodiments, further includes:
First Hash digest generation module is handled original image by digest algorithm, obtains the of original image
One Hash digest;Wherein the cochain request further includes first Hash digest, and then makes all areas for having access authority
Block chain verifies node server and generates the second Hash digest according to obtained original image, is breathed out according to the first Hash digest and second
The comparison result of uncommon abstract determines whether to execute the step of extracting the image content in the original image.
In certain embodiments, the cochain solicited message further include: the authentication certificate of application server initiates to use
The identity information at family, the access authority for initiating user, so that all block chain verifying node servers pair for having access authority
The cochain request is authenticated.
The application also provides picture storage server, comprising:
Original image receiving module receives the original image that application layer services device is sent, generates pair for encrypting picture
Claim key;
Original image encrypting module encrypts the original image using the symmetric key, generates encryption picture
With the store path of the encryption picture;
Symmetric key encryption module encrypts the symmetric key using pre-stored public key;
Store path sending module, Xiang Suoshu application layer services device sends the store path of the encryption picture, so that institute
It states application layer services device the store path is added in cochain solicited message, so that the storage can be obtained in all nodes
Path;
Encryption picture request receiving module is obtained, the acquisition encryption picture request that block chain link point is sent is received, returns to institute
Encryption picture is stated to the block chain node for obtaining encryption picture and requesting is sent, the acquisition encryption picture request includes the storage
Path, the identity information and operating right for initiating node for obtaining encryption picture request;
Encrypted symmetric key sending module filters out and has according to the identity information and the operating right for initiating node
The block chain of access authority verifies node server, and the block chain verifying node server that Xiang Suoyou has access authority sends institute
The symmetric key of public key encryption is stated, so that the block chain verifying node server for having access authority is according to pre-stored
The private key of the correspondence public key symmetric key is decrypted, the symmetric key is obtained, using the symmetric key
The encryption picture is decrypted, original image is obtained, extracts the image content in the original image, and then according to described
Image content executes common recognition operation.
The application also provides block chain verifying node server, comprising:
Cochain solicited message obtains module, obtains the cochain solicited message that application server is sent, the cochain request letter
Breath includes that picture storage server carries out the store path that symmetric cryptography obtains encrypting picture to original image;The wherein picture
Storage server further encrypts the symmetric key for encrypting the original image using pre-stored public key, is encrypted
Symmetric key;
Encryption picture request sending module is obtained, Xiang Suoshu picture storage server, which is sent, obtains encryption picture request, institute
Acquisition encryption picture request is stated to include the store path, obtain the identity information for encrypting the initiation node of picture request and behaviour
Make permission;
First deciphering module receives the symmetrical close of encryption picture that the picture storage server is sent and the encryption
Key, and then the symmetric key of the encryption is decrypted using pre-stored private key corresponding with the public key, it obtains described
Symmetric key;
Second deciphering module is decrypted the encryption picture using the symmetric key, obtains original image;
Image content extraction module extracts the image content in the original image;
Common recognition operation module executes common recognition operation according to the image content.
In certain embodiments, the application server further passes through digest algorithm and handles original image, obtains
To the first Hash digest of original image;The cochain request further includes first Hash digest, the block chain verifying section
Point server further include:
Second Hash digest generation module generates the second Hash digest according to obtained original image;
Comparison module determines whether to execute described in extraction according to the comparison result of the first Hash digest and the second Hash digest
The step of image content in original image.
In certain embodiments, if the comparison result is consistent, the image content extraction module extraction original image
In image content.
In certain embodiments, the image content extraction module extracts the word in the original image by OCR identification
Segment information.
In certain embodiments, the common recognition operation module includes:
Verification unit verifies the image content according to pre-stored verification picture, the result of broadcast verification;
Common recognition unit executes common recognition operation, determines whether all nodes have reached common understanding, if reaching common understanding described in execution
The corresponding intelligent contract of original image.
The application also provides a kind of computer equipment, including memory, processor and storage on a memory and can located
The step of computer program run on reason device, the processor realizes method as described above when executing described program.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer program
The step of method as described above is realized when being executed by processor.
The invention has the following beneficial effects:
A kind of image content common recognition method, server based on block chain provided by the invention, on the one hand by using non-
The mode encrypted symmetric key of symmetric cryptography can work as area on the cipher key broadcasting to the node of block chain for encrypting picture in this way
When the verifying node of block chain needs to obtain symmetric key, the node with permission can be decrypted using pre-stored private key,
And then encryption picture can be decrypted.On the other hand picture is not transmitted directly during cochain of block chain etc., but to picture
Hash abstract and store path transmitted, and then the data interaction amount between block chain node is small, is made a summary by hash
It may be determined whether original image, encryption picture can be obtained by store path, and then obtain in conjunction with decrypted symmetric key
Original image, in order to execute subsequent image content common recognition operation.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 shows the block catenary system schematic diagram for being adapted for carrying out the application.
Fig. 2 shows a kind of image content common recognition sides based on block chain provided by the present application implemented by application server
Method flow diagram.
Fig. 3 shows the concrete structure schematic diagram of application layer services device in the application.
Fig. 4 shows a kind of process for the image content common recognition method based on block chain implemented by picture storage server
Schematic diagram.
Fig. 5 shows the concrete structure schematic diagram of picture storage server in the application.
Fig. 6 shows a kind of image content common recognition based on block chain that the application block chain verifying node server is implemented
Method flow schematic diagram.
Fig. 7 shows the modular structure schematic diagram of block chain verifying node server in the application.
Fig. 8 shows the process steps schematic diagram of three end of the application interaction.
Fig. 9 a shows the interaction schematic diagram in the application execution common recognition operation between pre-prepare stage each node.
Fig. 9 b shows the interaction specific steps flow chart between each node of Fig. 9 a.
Fig. 9 c shows the interaction schematic diagram in the application execution common recognition operation between prepare stage each node.
Fig. 9 d shows the interaction specific steps flow chart between each node of Fig. 9 c.
Fig. 9 e shows the interaction schematic diagram in the application execution common recognition operation between commit stage each node.
Fig. 9 f shows the interaction specific steps flow chart between each node of Fig. 9 e.
Figure 10 shows the structural schematic diagram for being suitable for the computer equipment for being used to realize the embodiment of the present application.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Fig. 1 shows a kind of block chain network system and specifically includes incorporated by reference to shown in Fig. 1: the application layer services of front end
Device 1, verifying node 2, non-authentication node 3, certification node 4, picture memory node 5.Wherein, application layer services device 1 and block chain
Verifying node 2, non-authentication node 3, one or several connection in picture memory node 5 simultaneously carry out two-way data transmission.
It homogeneously connects and carries out two-way between block chain verifying node 2 and non-authentication node 3 and each node of picture memory node 5
Data transmission.Block chain certification node 4 and each verifying node 2 and non-authentication node 3 keep connecting and carry out two-way number
According to transmission.
By application layer services device transmission original image to picture storage server, and generate hash abstract, the picture
Storage server carries out encryption to the picture using symmetric key and generates encryption picture, and using pre-stored public key to described
Then the symmetric key of the encryption picture and encryption is sent on each node by symmetric key encryption, verifying node, which obtains, to be added
The store path and hash of close picture are made a summary, and symmetric key are decrypted using the private key of oneself, after obtaining symmetric key
Original image is obtained after encryption picture is decrypted, hash abstract is then generated according to original image, compares hash abstract, really
It surely is to carry out image content extraction and the operation of subsequent common recognition after the same picture.
Each node server and its method and step respectively implemented are described in detail one by one below.
Fig. 2 shows a kind of image content common recognition sides based on block chain provided by the present application implemented by application server
Method, comprising:
S11: sending original image to picture storage server, so that the picture storage server uses symmetric key pair
The picture carries out encryption and generates encryption picture, and using pre-stored public key to the symmetric key encryption, then will be described
Encryption picture and the symmetric key of encryption are sent on each node;
S12: the store path of the encryption picture is obtained;
S13: cochain solicited message is sent to each node of block chain, the cochain solicited message includes the storage road
Diameter, so that all block chain verifying node servers for having access authority obtain the encryption figure according to the store path
Piece is decrypted the symmetric key according to the private key of the pre-stored correspondence public key, obtains the symmetric key, uses
The encryption picture is decrypted in the symmetric key, obtains original image, extracts the image content in the original image,
And then common recognition operation is executed according to the image content.
In some embodiments, above-mentioned steps further include:
S14: being handled original image by digest algorithm, obtains the first Hash digest of original image;Wherein institute
Stating cochain request further includes first Hash digest, and then makes all block chain verifying node servers for having access authority
The second Hash digest is generated according to obtained original image, the comparison result according to the first Hash digest and the second Hash digest is true
It is fixed whether to execute the step of extracting the image content in the original image.
In certain embodiments, the cochain solicited message further include: the authentication certificate of application server initiates to use
The identity information at family, the access authority for initiating user, so that all block chain verifying node servers pair for having access authority
The cochain request is authenticated.
Application layer services device 1 can be the server cluster an of server or multiple servers composition, be mainly responsible for place
Manage the service logic other than block chain.In general, block chain verifying node 2 and non-authentication node 3 can provide service to application layer and connect
Mouthful.Application layer constructs request message according to specific service logic, sends to block chain and takes provided by request call block chain
Business interface continues to execute subsequent service logic after waiting block catenary system to execute transaction and return to transaction results.
In virtual bench level, the specific structure is shown in FIG. 3 for application layer services device, specifically includes:
Sending module 11 sends original image to picture storage server, so that picture storage server use pair
Claim picture described in key pair to carry out encryption and generate encryption picture, and using pre-stored public key to the symmetric key encryption, so
The symmetric key of the encryption picture and encryption is sent on each node afterwards;
Store path obtains module 12, obtains the store path of the encryption picture;
Cochain solicited message sending module 13 sends cochain solicited message, the cochain request to each node of block chain
Information includes the store path, so that all block chain verifying node servers for having access authority are according to the storage road
Diameter obtains the encryption picture, is decrypted, is obtained to the symmetric key according to the private key of the pre-stored correspondence public key
The symmetric key is decrypted the encryption picture using the symmetric key, obtains original image, extracts described original
Image content in picture, and then common recognition operation is executed according to the image content.
Based on identical inventive concept, in an embodiment, further includes:
First Hash digest generation module is handled original image by digest algorithm, obtains the of original image
One Hash digest;Wherein the cochain request further includes first Hash digest, and then makes all areas for having access authority
Block chain verifies node server and generates the second Hash digest according to obtained original image, is breathed out according to the first Hash digest and second
The comparison result of uncommon abstract determines whether to execute the step of extracting the image content in the original image.
Based on identical inventive concept, in an embodiment, the cochain solicited message further include: the identity of application server
Certificate, the identity information for initiating user, the access authority for initiating user are authenticated, so that all block chains for having access authority are tested
Card node server authenticates cochain request.
Fig. 4 shows a kind of image content common recognition method based on block chain implemented by picture storage server, comprising:
S21: the original image that application layer services device is sent is received, the symmetric key for encrypting picture is generated;
S22: encrypting the original image using the symmetric key, generates encryption picture and the encryption picture
Store path;
S23: the symmetric key is encrypted using pre-stored public key;
S24: Xiang Suoshu application layer services device sends the store path of the encryption picture, so that the application layer services device
The store path is added in cochain solicited message, so that the store path can be obtained in all nodes;
S25: the acquisition encryption picture for receiving the transmission of block chain link point is requested, and the return encryption picture is obtained to transmission to be added
The block chain node of close picture request, the acquisition encryption picture request include the store path, obtain encryption picture request
Initiation node identity information and operating right;
S26: it according to the identity information and the operating right for initiating node, filters out the block chain for having access authority and tests
Node server is demonstrate,proved, the block chain verifying node server that Xiang Suoyou has access authority sends the described right of the public key encryption
Claim key, so that private of the block chain verifying node server for having access authority according to the pre-stored correspondence public key
The symmetric key is decrypted in key, obtains the symmetric key, is carried out using the symmetric key to the encryption picture
Decryption, obtains original image, extracts the image content in the original image, and then execute common recognition behaviour according to the image content
Make.
Block chain picture memory node 5 can be a server or the more servers mutually backed up.Block chain picture
Memory node 5 is mainly that application layer services device 1 provides picture storage, image ciphering, key storage service, for block chain verifying section
Point 2 is provided in picture read requests and is serviced authentication, cipher key delivery of initiator etc..
In virtual bench level, the specific structure of picture storage server is as shown in figure 5, specifically include:
Original image receiving module 21 receives the original image that application layer services device is sent, and generates for encrypting picture
Symmetric key;
Original image encrypting module 22 encrypts the original image using the symmetric key, generates encryption figure
The store path of piece and the encryption picture;
Symmetric key encryption module 23 encrypts the symmetric key using pre-stored public key;
Store path sending module 24, Xiang Suoshu application layer services device send the store path of the encryption picture, so that
The store path is added in cochain solicited message the application layer services device, so that described deposit can be obtained in all nodes
Store up path;
Encryption picture request receiving module 25 is obtained, the acquisition encryption picture request that block chain link point is sent is received, returns
For the encryption picture to the block chain node for obtaining encryption picture and requesting is sent, the acquisition encryption picture request includes described deposits
Store up the identity information and operating right in path, the initiation node for obtaining encryption picture request;
Encrypted symmetric key sending module 26 is provided according to the identity information and the operating right, screening of initiating node
The block chain of standby access authority verifies node server, and the block chain verifying node server that Xiang Suoyou has access authority is sent
The symmetric key of the public key encryption, so that the block chain verifying node server for having access authority is according to prestoring
The symmetric key is decrypted in the private key of the correspondence of the storage public key, obtains the symmetric key, using described symmetrical close
The encryption picture is decrypted in key, obtains original image, extracts the image content in the original image, and then according to institute
It states image content and executes common recognition operation.
Fig. 6 shows a kind of image content common recognition method based on block chain that block chain verifying node server is implemented,
S31: the cochain solicited message that application server is sent is obtained, the cochain solicited message includes picture storage service
Device carries out symmetric cryptography to original image and obtains the store path of encryption picture;Wherein the picture storage server is further adopted
The symmetric key for encrypting the original image is encrypted with pre-stored public key, the symmetric key encrypted;
S32: Xiang Suoshu picture storage server, which is sent, obtains encryption picture request, and the acquisition encryption picture request includes
The store path, the identity information and operating right for initiating node for obtaining encryption picture request;
S33: the symmetric key of the picture storage server encryption picture sent and the encryption is received, and then is adopted
The symmetric key of the encryption is decrypted with pre-stored private key corresponding with the public key, obtains the symmetric key;
S34: the encryption picture is decrypted using the symmetric key, obtains original image;
S35: the image content in the original image is extracted;
S36: common recognition operation is executed according to the image content.
Based on identical inventive concept, in an embodiment, the application server further passes through digest algorithm to original
Picture is handled, and the first Hash digest of original image is obtained;The cochain request further includes first Hash digest, institute
State method further include:
The second Hash digest is generated according to obtained original image;
Determine whether to execute according to the comparison result of the first Hash digest and the second Hash digest and extracts the original image
In image content the step of.
Based on identical inventive concept, in an embodiment, the ratio according to the first Hash digest and the second Hash digest
Result is determined whether to execute the step of extracting the image content in the original image, comprising:
If the comparison result is consistent, it is determined that the original image is not tampered with, and then is determined and executed described in extraction
The step of image content in original image.
Based on identical inventive concept, in an embodiment, the image content extracted in the original image, comprising:
The field information in the original image is extracted by OCR identification.
Based on identical inventive concept, in an embodiment, common recognition operation is executed according to the image content, comprising:
The image content is verified according to pre-stored verification picture, the result of broadcast verification;
Common recognition operation is executed, determines whether all nodes have reached common understanding, the original image is executed if reaching common understanding
Corresponding intelligence contract.
Block chain verifying node 2 can be the server cluster an of server or multiple servers composition.Verify node 2
Request is sent to certification node 4 starting and block chain network Shi Zehui being added, obtains the certificate of fair that certification node 4 is signed and issued.
In order to guarantee anonymity and the safety of transaction, verifying node 2 will use certification 4 batch of node when sending transaction request and sign and issue
Certificate of fair sign to transaction, and using the symmetric cryptographic key generated by Diffie-Hellman to transaction data progress
Encryption.In general, there are several to verify node 2 in a block chain network, each verifying node 2 is responsible for receiving application layer
Server 1 sends the transaction request of (or block chain non-authentication node 3 forwards), is being signed and is being encrypted to transaction request
Afterwards, other verifying nodes of broadcast into block chain network.After other verifying nodes receive the transaction, transaction can be tested
Label.According to different scenes, verifying node can know together to transaction using different common recognition algorithms, the transaction reached common understanding
It can be performed, and transaction request can then be packaged write-in block in buffer some amount or after a period of time, carry out persistence
Storage.
In virtual bench level, block chain verifies the specific structure of node server as shown in fig. 7, specifically including:
Cochain solicited message obtains module 31, obtains the cochain solicited message that application server is sent, the cochain request
Information includes that picture storage server carries out the store path that symmetric cryptography obtains encrypting picture to original image;The wherein figure
Piece storage server further encrypts the symmetric key for encrypting the original image using pre-stored public key, is added
Close symmetric key;
Encryption picture request sending module 32 is obtained, Xiang Suoshu picture storage server, which is sent, obtains encryption picture request,
It is described obtain encryption picture request include the store path, obtain encryption picture request initiation node identity information and
Operating right;
First deciphering module 33 receives the symmetrical of encryption picture that the picture storage server is sent and the encryption
Key, and then the symmetric key of the encryption is decrypted using pre-stored private key corresponding with the public key, obtain institute
State symmetric key;
Second deciphering module 34 is decrypted the encryption picture using the symmetric key, obtains original image;
Image content extraction module extracts the image content in the original image;
Common recognition operation module 35 executes common recognition operation according to the image content.
Based on identical inventive concept, in an embodiment, the application server further passes through digest algorithm to original
Picture is handled, and the first Hash digest of original image is obtained;The cochain request further includes first Hash digest, institute
State block chain verifying node server further include:
Second Hash digest generation module generates the second Hash digest according to obtained original image;
Comparison module determines whether to execute described in extraction according to the comparison result of the first Hash digest and the second Hash digest
The step of image content in original image.
Based on identical inventive concept, in an embodiment, if the comparison result be it is consistent, image content extraction module mentions
Take the image content in the original image.
Based on identical inventive concept, in an embodiment, the image content extraction module passes through described in OCR identification extracts
Field information in original image.
Based on identical inventive concept, in an embodiment, the common recognition operation module includes:
Verification unit verifies the image content according to pre-stored verification picture, the result of broadcast verification;
Common recognition unit executes common recognition operation, determines whether all nodes have reached common understanding, if reaching common understanding described in execution
The corresponding intelligent contract of original image.
It further include block chain non-authentication node in block catenary system, block chain non-authentication node 3 can be a service
The server cluster of device or multiple servers composition.Non-authentication node 3 is starting and block chain network Shi Zehui is added to certification
Node 4 sends request, obtains the certificate of fair that certification node 4 is signed and issued.In order to guarantee anonymity and the safety of transaction, non-authentication
Node 3 will use the certificate of fair signed and issued of certification 4 batch of node when sending transaction request and sign to transaction, and use by
The symmetric cryptographic key that Diffie-Hellman generates encrypts transaction data.Block chain non-authentication node 3, which can receive, answers
The transaction request transmitted by stratum server 1, and transaction is packaged, add type of transaction, the field of timestamp and signature
Content, wherein type of transaction field is determined according to the type of message of application server, such as disposes intelligent contract/inquiry block chain number
Determined according to/modification block chain data etc. request types, when timestamp field takes current non-authentication node to receive request when
Between stab, signature field signs to transaction data using private key corresponding to certificate of fair, and by signature transaction it is attached
The upper certificate of fair, reuses symmetric key and encrypts to the transaction, and the transaction by encryption is finally transmitted to block chain
Verify node 2.Block chain non-authentication node 3 itself is simultaneously not involved in common recognition, will not execute transaction or save block data.
Block chain certification node 4 can be a server or the more servers mutually backed up.Block chain authenticates node 4
Predominantly block chain verifying node 2 and block chain non-authentication node 3 provide authentication and grant a certificate service.
Could be aware that by above description, it is provided by the invention it is a kind of based on block chain image content common recognition method, clothes
Business device can will encrypt the cipher key broadcasting of picture on the one hand by using the mode encrypted symmetric key of asymmetric encryption in this way
Onto the node of block chain, when the verifying node of block chain needs to obtain symmetric key, the node with permission can be used
Pre-stored private key is decrypted, and then can decrypt encryption picture.On the other hand not straight during cochain of block chain etc.
Transmission picture is connect, but the hash of picture abstract and store path are transmitted, and then the data between block chain node
Interactive quantity is small, may be determined whether original image by hash abstract, can obtain encryption picture by store path, in turn
Original image is obtained in conjunction with decrypted symmetric key, in order to execute subsequent image content common recognition operation.
The application is described in detail below with reference to concrete scene, Fig. 8 shows the flow diagram of three ends interaction.Such as
Shown in Fig. 8, specifically include:
Step S101: application layer services device 1 sends the request that picture stores to picture storage server 5, in solicited message
Including plaintext picture, whether encrypt the fields such as storage picture.
Step S102: picture storage server 5 receives application layer services device 1 and requests, and gets plaintext picture in request
Etc. information.
Step S103: picture storage server 5 is generated for encrypting the symmetric key of picture, and stores the symmetric key.
Step S104: picture storage server 5 adds plaintext picture using the symmetric key generated in step S103
It is close, it generates encryption picture and stores encryption picture to local, the URI store path of preservation encryption picture.
Step S105: picture storage server 5 returns to the URI store path of encryption picture to application server 1.
Step S106: application server 1 receives the URI store path of encryption picture.
Step S107: application server 1, by hash digest algorithm, generates original plaintext picture to original plaintext picture
Hash abstract, and the request of block chain on the hash abstract is sent, in request message other than including hash abstract, should also include
Encrypt the URI store path of picture, the TLS authentication certificate of application server, the information such as user name.
Step S108: the communication module 21 of block chain non-authentication node 3 receives the request, checks the legitimacy and group of transaction
Dress up transaction.
Step S109: the encrypting module 22 of block chain non-authentication node 3 will use private key corresponding to certificate of fair, right
Transaction is signed, and transmitted transaction is requested to verifying node 2 all in verifying node cluster.The transaction request of forwarding includes
The hash abstract of original plaintext picture, the encryption URI store path of picture, non-authentication node TLS authentication certificate, user
The information such as name.
Step S110: the communication module 21 that block chain verifies node 2 receives the request, checks the legitimacy of transaction, specifically
It whether is more than the threshold value of some setting, the identity information of current transaction initiator, current transaction initiation including transaction flow
The access authority of side, if current transaction flow is more than the threshold value of some setting, or transaction initiator does not have legal TLS
Authentication certificate, or transaction initiate user not to operating rights such as picture cochains, can all refuse to handle the transaction, if
It is legal to trade, then continues to handle in next step.
Step S111: block chain verifies node 2 and initiates picture read requests, includes the URI of encryption picture in request message
Store path.
Step S112: picture storage server 5 receives the picture read requests of verifying node 2, the initiator of checking request
Identity information and access authority.If transaction initiator does not have legal TLS authentication certificate, or transaction is initiated to use
Family to operating rights such as picture readings, can all not refuse to handle the transaction, if transaction is legal, continue in next step
Reason.
Step S113: the picture that picture storage server 5 returns to encryption gives verifying node 2.
Step S114: picture storage server 5 checks that the initiator of request is to verify whether node 2 has decryption picture
Access authority, if it has, then encrypted with symmetric key of the public key in the certificate of verifying node 2 to encryption picture, it is raw
At key ciphertext and return to verifying node 2.If not having the access authority of decryption picture, do not send the key of decryption to
Verify node 2.
Step S115: if verifying node 2 receives the key ciphertext of step S114 generation, with the private key of oneself to key
Ciphertext decryption obtains symmetric key in plain text, and the encryption picture of step S113 is decrypted in plain text using the symmetric key, obtains
To plaintext picture.
Step S116: verifying 2 pairs of plaintext pictures of node generate hash abstract 1 by hash digest algorithm, and verify hash
Abstract 1 and the hash abstract of plaintext picture in step S109 compare, if the two is consistent, illustrate that picture is not tampered with, solve
The close picture come out is consistent with the plaintext picture of original application server transmission.
Step S117: the access and the preparation before execution that block chain verifying node 2 starts common recognition algorithm, wherein can call altogether
Know message reception module, monitors and receive the message of common recognition algorithm interior joint intercommunication.
Step S118: block chain verifies node 2 and uses the key element in OCR extraction plaintext picture.
Step S119: block chain verifies node 2 and carries out business verifying to key element linkage local service system in picture,
Such as according to the identification card number in the picture of opening an account of extraction, whether the blacklist operation system for linking local verifies the identification card number
It is legal.
Step S120: in the execution of common recognition algorithm, using the picture check results of step S119, specific process of knowing together is detailed
See Fig. 9 a to Fig. 9 f.
Step S121: after having executed common recognition algorithm, all verifying nodes verified in node cluster should reach an agreement knot
Fruit executes common recognition commit module 2345 if all nodes are reached common understanding, and the behaviour of persistence processing is carried out to common recognition result
Make;If all nodes are not reached common understanding, common recognition rollback module 2346 is executed, to the common recognition knot of each verifying node
Fruit rollback, without persistence processing.
Step S122: block chain verifies node 2 and total intelligent contract processing module 235 is called to verify common recognition as a result, if testing
Card passes through, then executes intelligent contract, if verifying does not pass through, returns to specific common recognition error information.
Step S123: block chain verifying node 2 calls memory module 24 to write Transaction Information and intelligent contract implementing result
Enter block, and the relevant data persistence that process of exchange is generated is stored into database.
In above-mentioned concrete scene, as shown in Fig. 9 a to Fig. 9 f, wherein Fig. 9 b shows the interaction between each node of Fig. 9 a
Step, Fig. 9 d show the interactive step between each node of Fig. 9 c, and Fig. 9 f shows the interaction step between each node of Fig. 9 e
Suddenly.
Executing common recognition operation, specific step is as follows:
Step S201: after all verifying nodes receive the picture hash cochain request of non-authentication node forwarding, pass through choosing
Algorithm picks host node is taken, Algorithms of Selecting includes but is not limited to recycle the sequence from verifying node 0,1,2,3 successively as master
Node.
Step S202: according to the algorithm of selection, each verifying node judges whether oneself is host node, if not main section
Point, then exit, and if it is host node, then continues to handle in next step.
Step S203: host node checks the transaction request of non-authentication node forwarding, including non-authentication in visa transaction request
The signature of node, from the untreated transaction request to prevent reprocessing etc. before inspection.
Step S204: host node calls the key element in OCR and local service system check picture to carry out business
Property verification, save the business check results of picture.
Step S205: host node generates pre-prepare message information, and message information includes current primary node ID, transaction
Serial number n, transaction request abstract, the ID of sending node, picture hash abstract encrypt the store path of picture, the business school of picture
Test result etc..
Step S206: host node broadcasts pre-prepare message to all verifying nodes.
Step S207: host node persistence pre-prepare message information.
Step S208: after all verifying nodes receive the pre-prepare message of main verifying node, host node hair is checked
The pre-prepare message validity sent, it is consistent including the host node ID host node whether host node Algorithms of Selecting calculates,
Whether transaction serial number meets in specified interval, and whether transaction summarization is correct etc..
Step S209: each verifying node calls the key element in OCR and local service system check picture to carry out
Business verification, saves the business check results of picture.
Step S210: each verifying node checks that picture carries out business school in the pre-prepare message of host node transmission
It tests, it is consistent whether the hash including picture cochain transaction request makes a summary with the hash decrypted, other verifying nodes received
Whether the business check results to picture are to pass through, and whether local picture business check results are to pass through.
Step S211: each verifying node generates prepare message information, and message information includes current primary node ID, transaction
Serial number n, transaction request abstract, the ID of sending node, picture hash abstract encrypt the store path of picture, the industry of local picture
Check results of being engaged in etc..
Step S212: each verifying node broadcasts prepare message gives all verifying nodes.
Step S213: each verifying node persistence prepare message information.
Step S214: after all verifying nodes receive the prepare message of other verifying nodes, each verifying node is checked
The pre-prepare message validity of transmission, including the host node ID host node one whether host node Algorithms of Selecting calculates
It causes, whether transaction serial number meets in specified interval, and whether transaction summarization correct etc..
Step S215: all verifying nodes, which check whether, meets commit condition.
Step S216: the common recognition based on image content passes through, and executes the stage into intelligence.
Further, S215 is specifically included:
1. the transaction can be inquired in the prepared stage in local database.
2. receive the prepared message of all nodes in network, and picture business check results are all in prepared message
To pass through.
If above 2 conditions all meet, continues S216, otherwise just exit.
Those skilled in the art could be aware that the above method specifically has the advantages that
1, the common store framework of the cochain scheme of block chain image data is devised.By picture hash make a summary cochain and
Encryption storage, the picture of guarantee each nodes sharing in block chain network, but do not reduce the safety of picture again, it is ensured that picture
It is not tampered, and picture can believe part verifying node as it can be seen that avoiding sensitization picture by way of access control
Breath leakage.
2, it furthermore knows together in conjunction with service tests systems such as the local OCR of each node to image content in the common recognition stage
Verification can return to Fail Transaction in the common recognition stage for verifying unacceptable request, it is not necessary to wait until that intelligent contract executes rank again
Duan Caineng verifies picture, wastes the resource of common recognition communication, to reach shortening exchange hour, handles picture number for block chain
According to providing strong support, the effect of business processing efficiency is improved.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer equipment, specifically, computer is set
It is standby for example can for personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant,
Media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
In any equipment combination.
Computer equipment specifically includes memory, processor and storage on a memory simultaneously in a typical example
The computer program that can be run on a processor is realized when the processor executes described program and is held as described above by client
Capable method, alternatively, the processor realizes the method executed as described above by server when executing described program.
Below with reference to Figure 10, it illustrates the structures for the computer equipment 600 for being suitable for being used to realize the embodiment of the present application to show
It is intended to.
As shown in Figure 10, computer equipment 600 includes central processing unit (CPU) 601, can be read-only according to being stored in
Program in memory (ROM) 602 is loaded into random access storage device (RAM) from storage section 608) program in 603
And execute various work appropriate and processing.In RAM603, also it is stored with system 600 and operates required various program sum numbers
According to.CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to
Bus 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.;
And including such as LAN card, the communications portion 609 of the network interface card of modem etc..Communications portion 609 via such as because
The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 606 as needed.Detachable media 611, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon
Computer program be mounted as needed such as storage section 608.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart description
Software program.For example, the embodiment of the present invention includes a kind of computer program product comprising be tangibly embodied in machine readable
Computer program on medium, the computer program include the program code for method shown in execution flow chart.At this
In the embodiment of sample, which can be downloaded and installed from network by communications portion 609, and/or from removable
Medium 611 is unloaded to be mounted.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (20)
- A kind of method 1. image content based on block chain is known together characterized by comprisingOriginal image is sent to picture storage server, so that the picture storage server is using symmetric key to the picture It carries out encryption and generates encryption picture, and using pre-stored public key to the symmetric key encryption, then by the encryption picture It is sent on each node with the symmetric key of encryption;Obtain the store path of the encryption picture;Cochain solicited message is sent to each node of block chain, the cochain solicited message includes the store path, so that institute There is the block chain verifying node server for having access authority to obtain the encryption picture according to the store path, according to prestoring The symmetric key is decrypted in the private key of the correspondence of the storage public key, obtains the symmetric key, using described symmetrical close The encryption picture is decrypted in key, obtains original image, extracts the image content in the original image, and then according to institute It states image content and executes common recognition operation.
- The method 2. image content according to claim 1 is known together, which is characterized in that further include:Original image is handled by digest algorithm, obtains the first Hash digest of original image;Wherein the cochain is asked Asking further includes first Hash digest, and then makes all block chains verifying node servers for having access authority according to obtaining Original image generate the second Hash digest, determine whether to hold according to the comparison result of the first Hash digest and the second Hash digest Row extracts the step of image content in the original image.
- The method 3. image content according to claim 1 is known together, which is characterized in that the cochain solicited message further include: The authentication certificate of application server, the identity information for initiating user, the access authority for initiating user, so that all have visit Ask that the block chain verifying node server of permission authenticates cochain request.
- A kind of method 4. image content based on block chain is known together characterized by comprisingThe original image that application layer services device is sent is received, the symmetric key for encrypting picture is generated;The original image is encrypted using the symmetric key, generates the storage road of encryption picture and the encryption picture Diameter;The symmetric key is encrypted using pre-stored public key;The store path that the encryption picture is sent to the application layer services device, so that the application layer services device is deposited described It stores up path to be added in cochain solicited message, so that the store path can be obtained in all nodes;It receives the acquisition that block chain link point is sent and encrypts picture request, return to the encryption picture and asked to acquisition encryption picture is sent The block chain node asked, it is described to obtain the initiation section that encryption picture request includes the store path, acquisition encryption picture request The identity information and operating right of point;According to the identity information and the operating right for initiating node, the block chain verifying node clothes for having access authority are filtered out Business device, the block chain verifying node server that Xiang Suoyou has access authority send the symmetric key of the public key encryption, So that the block chain verifying node server for having access authority is according to the private key of the pre-stored correspondence public key to institute It states symmetric key to be decrypted, obtains the symmetric key, the encryption picture is decrypted using the symmetric key, is obtained To original image, the image content in the original image is extracted, and then common recognition operation is executed according to the image content.
- A kind of method 5. image content based on block chain is known together characterized by comprisingThe cochain solicited message that application server is sent is obtained, the cochain solicited message includes picture storage server to original Picture carries out symmetric cryptography and obtains the store path of encryption picture;Wherein the picture storage server is further using pre-stored Public key the symmetric key for encrypting the original image is encrypted, the symmetric key encrypted;It is sent to the picture storage server and obtains encryption picture request, the acquisition encryption picture request includes the storage Path, the identity information and operating right for initiating node for obtaining encryption picture request;The symmetric key of the picture storage server encryption picture sent and the encryption is received, and then using pre-stored Private key corresponding with the public key symmetric key of the encryption is decrypted, obtain the symmetric key;The encryption picture is decrypted using the symmetric key, obtains original image;Extract the image content in the original image;Common recognition operation is executed according to the image content.
- The method 6. image content according to claim 5 is known together, which is characterized in that the application server further passes through Digest algorithm handles original image, obtains the first Hash digest of original image;The cochain request further includes described First Hash digest, the method also includes:The second Hash digest is generated according to obtained original image;Determine whether to execute according to the comparison result of the first Hash digest and the second Hash digest and extract in the original image The step of image content.
- The method 7. image content according to claim 5 is known together, which is characterized in that described according to the first Hash digest and the The comparison result of two Hash digests determines whether to execute the step of extracting the image content in the original image, comprising:If the comparison result is consistent, it is determined that the original image is not tampered with, and then it is described original to determine that execution is extracted The step of image content in picture.
- The method 8. image content according to claim 5 is known together, which is characterized in that described to extract in the original image Image content, comprising:The field information in the original image is extracted by OCR identification.
- The method 9. image content according to claim 5 is known together, which is characterized in that common recognition is executed according to the image content Operation, comprising:The image content is verified according to pre-stored verification picture, the result of broadcast verification;Common recognition operation is executed, determines whether all nodes have reached common understanding, it is corresponding that the original image is executed if reaching common understanding Intelligent contract.
- 10. a kind of application server characterized by comprisingSending module sends original image to picture storage server, so that the picture storage server uses symmetric key Encryption is carried out to the picture and generates encryption picture, and using pre-stored public key to the symmetric key encryption, then by institute The symmetric key for stating encryption picture and encryption is sent on each node;Store path obtains module, obtains the store path of the encryption picture;Cochain solicited message sending module sends cochain solicited message, the cochain request packet to each node of block chain The store path is included, so that all block chain verifying node servers for having access authority are obtained according to the store path The encryption picture is decrypted the symmetric key according to the private key of the pre-stored correspondence public key, and it is described right to obtain Claim key, the encryption picture is decrypted using the symmetric key, original image is obtained, extracts in the original image Image content, and then according to the image content execute common recognition operation.
- 11. application server according to claim 10, which is characterized in that further include:First Hash digest generation module is handled original image by digest algorithm, and obtain original image first breathes out Uncommon abstract;Wherein the cochain request further includes first Hash digest, and then makes all block chains for having access authority Verifying node server generates the second Hash digest according to obtained original image, is plucked according to the first Hash digest and the second Hash The comparison result wanted determines whether to execute the step of extracting the image content in the original image.
- 12. application server according to claim 10, which is characterized in that the cochain solicited message further include: application The authentication certificate of server, the identity information for initiating user, the access authority for initiating user, so that all have access right The block chain verifying node server of limit authenticates cochain request.
- 13. a kind of picture storage server characterized by comprisingOriginal image receiving module receives the original image that application layer services device is sent, and generates for encrypting the symmetrical close of picture Key;Original image encrypting module encrypts the original image using the symmetric key, generates encryption picture and institute State the store path of encryption picture;Symmetric key encryption module encrypts the symmetric key using pre-stored public key;Store path sending module, Xiang Suoshu application layer services device sends the store path of the encryption picture, so that described answer The store path is added in cochain solicited message with stratum server, so that the storage road can be obtained in all nodes Diameter;Encryption picture request receiving module is obtained, the acquisition encryption picture request of block chain link point transmission is received, returns to described add For close picture to the block chain node for obtaining encryption picture and requesting is sent, the acquisition encryption picture request includes the storage road Diameter, the identity information and operating right for initiating node for obtaining encryption picture request;Encrypted symmetric key sending module filters out according to the identity information and the operating right for initiating node and has access The block chain of permission verifies node server, and the block chain verifying node server that Xiang Suoyou has access authority sends the public affairs The symmetric key of key encryption, so that the block chain verifying node server for having access authority is according to pre-stored pair It answers the private key of the public key that the symmetric key is decrypted, obtains the symmetric key, using the symmetric key to institute It states encryption picture to be decrypted, obtains original image, extract the image content in the original image, and then according to the picture Content executes common recognition operation.
- 14. a kind of block chain verifies node server characterized by comprisingCochain solicited message obtains module, obtains the cochain solicited message that application server is sent, the cochain request packet It includes picture storage server and the store path that symmetric cryptography obtains encrypting picture is carried out to original image;The wherein picture storage Server further encrypts the symmetric key for encrypting the original image using pre-stored public key, pair encrypted Claim key;Encryption picture request sending module is obtained, Xiang Suoshu picture storage server, which is sent, obtains encryption picture request, described to obtain Encryption picture request is taken to include the store path, obtain the identity information and operating rights for encrypting the initiation node of picture request Limit;First deciphering module receives the symmetric key of the picture storage server encryption picture sent and the encryption, And then the symmetric key of the encryption is decrypted using pre-stored private key corresponding with the public key, it obtains described symmetrical Key;Second deciphering module is decrypted the encryption picture using the symmetric key, obtains original image;Image content extraction module extracts the image content in the original image;Common recognition operation module executes common recognition operation according to the image content.
- 15. block chain according to claim 14 verifies node server, which is characterized in that the application server is into one Step is handled original image by digest algorithm, obtains the first Hash digest of original image;The cochain request is also wrapped First Hash digest is included, the block chain verifies node server further include:Second Hash digest generation module generates the second Hash digest according to obtained original image;It is described original to determine whether that execution is extracted according to the comparison result of the first Hash digest and the second Hash digest for comparison module The step of image content in picture.
- 16. block chain according to claim 14 verifies node server, which is characterized in that if comparison result be it is consistent, Image content extraction module extracts the image content in the original image.
- 17. block chain according to claim 14 verifies node server, which is characterized in that the image content extracts mould Block extracts the field information in the original image by OCR identification.
- 18. block chain according to claim 14 verifies node server, which is characterized in that the common recognition operation module packet It includes:Verification unit verifies the image content according to pre-stored verification picture, the result of broadcast verification;Common recognition unit executes common recognition operation, determines whether all nodes have reached common understanding, execute if reaching common understanding described original The corresponding intelligent contract of picture.
- 19. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes the described in any item methods of claim 1 to 9 when executing described program The step of.
- 20. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of claim 1 to 9 described in any item methods are realized when processor executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910694624.0A CN110336833B (en) | 2019-07-30 | 2019-07-30 | Picture content consensus method based on block chain and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910694624.0A CN110336833B (en) | 2019-07-30 | 2019-07-30 | Picture content consensus method based on block chain and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110336833A true CN110336833A (en) | 2019-10-15 |
CN110336833B CN110336833B (en) | 2022-06-21 |
Family
ID=68147977
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910694624.0A Active CN110336833B (en) | 2019-07-30 | 2019-07-30 | Picture content consensus method based on block chain and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110336833B (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110889137A (en) * | 2019-11-21 | 2020-03-17 | 云南群林科技有限公司 | Data exchange method based on block chain |
CN110933040A (en) * | 2019-11-05 | 2020-03-27 | 武汉菲旺软件技术有限责任公司 | Block chain based data uplink method, device, equipment and medium |
CN111191288A (en) * | 2019-12-30 | 2020-05-22 | 中电海康集团有限公司 | Block chain data access authority control method based on proxy re-encryption |
CN111343179A (en) * | 2020-02-25 | 2020-06-26 | 中国工商银行股份有限公司 | Real-time consensus method and device for authenticity of data on link |
CN111371796A (en) * | 2020-03-11 | 2020-07-03 | 腾讯科技(深圳)有限公司 | Data transmission system, data transmission method, medium, and electronic device |
CN111625231A (en) * | 2020-05-27 | 2020-09-04 | 哈尔滨云天智旅大数据有限公司 | Software development method based on data security |
CN112084521A (en) * | 2020-09-27 | 2020-12-15 | 中国建设银行股份有限公司 | Unstructured data processing method, device and system for block chain |
CN112187767A (en) * | 2020-09-23 | 2021-01-05 | 上海万向区块链股份公司 | Multi-party contract consensus system, method and medium based on block chain |
CN112911002A (en) * | 2021-02-02 | 2021-06-04 | 上海华盖科技发展股份有限公司 | Block chain data sharing encryption method |
CN113051625A (en) * | 2021-03-24 | 2021-06-29 | 中国工商银行股份有限公司 | Data evidence storing method and device based on block chain |
CN114205484A (en) * | 2021-12-15 | 2022-03-18 | 湖南快乐阳光互动娱乐传媒有限公司 | Picture processing method and device |
CN114285555A (en) * | 2021-12-15 | 2022-04-05 | 支付宝(杭州)信息技术有限公司 | Multicast method and device based on block chain |
WO2022120938A1 (en) * | 2020-12-09 | 2022-06-16 | 杭州趣链科技有限公司 | Data sharing method, system and apparatus, and device and storage medium |
CN116760651A (en) * | 2023-08-22 | 2023-09-15 | 中国航空结算有限责任公司 | Data encryption method and device, electronic equipment and readable storage medium |
CN116842573A (en) * | 2023-07-25 | 2023-10-03 | 南京理工大学 | Hierarchical encryption privacy protection method based on blockchain |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107426170A (en) * | 2017-05-24 | 2017-12-01 | 阿里巴巴集团控股有限公司 | A kind of data processing method and equipment based on block chain |
CN107846278A (en) * | 2017-10-30 | 2018-03-27 | 中国联合网络通信集团有限公司 | Intelligent contract processing method and processing device |
CN108055274A (en) * | 2017-12-22 | 2018-05-18 | 广东工业大学 | A kind of encryption based on alliance's chain storage data and shared method and system |
CN108345685A (en) * | 2018-03-07 | 2018-07-31 | 物数(上海)信息科技有限公司 | More granularity data processing methods, system, equipment and storage medium under block chain |
CN108537063A (en) * | 2018-02-26 | 2018-09-14 | 阿里巴巴集团控股有限公司 | A kind of method, apparatus and equipment of data storage |
CN108550226A (en) * | 2018-04-17 | 2018-09-18 | 暨南大学 | Based on block chain technology automotive system and its building method are shared without key |
CN108881262A (en) * | 2018-07-02 | 2018-11-23 | 北京市天元网络技术股份有限公司 | Restoring files methods, devices and systems based on block chain |
CN109040012A (en) * | 2018-06-19 | 2018-12-18 | 西安电子科技大学 | A kind of data security protecting and sharing method based on block chain and system and application |
CN109033475A (en) * | 2018-09-10 | 2018-12-18 | 湖南智慧政务区块链科技有限公司 | A kind of file memory method, device, equipment and storage medium |
CN109359206A (en) * | 2018-10-17 | 2019-02-19 | 郑称德 | Image processing method and system based on Internet of Things campus administration |
CN109583912A (en) * | 2018-11-14 | 2019-04-05 | 阿里巴巴集团控股有限公司 | Trade company's authentication method and device based on block chain |
CN109753817A (en) * | 2018-12-28 | 2019-05-14 | 全链通有限公司 | Medical information secure storage scheme based on block chain |
CN109768987A (en) * | 2019-02-26 | 2019-05-17 | 重庆邮电大学 | A kind of storage of data file security privacy and sharing method based on block chain |
CN109783447A (en) * | 2019-01-23 | 2019-05-21 | 北京邮电大学 | Electronics license deposits card method, acquisition methods, device, system and electronic equipment |
CN109858222A (en) * | 2019-01-18 | 2019-06-07 | 特斯联(北京)科技有限公司 | A kind of authentication block catenary system and its verification method based on face characteristic |
CN109951498A (en) * | 2019-04-18 | 2019-06-28 | 中央财经大学 | A kind of block chain access control method and device based on ciphertext policy ABE encryption |
-
2019
- 2019-07-30 CN CN201910694624.0A patent/CN110336833B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107426170A (en) * | 2017-05-24 | 2017-12-01 | 阿里巴巴集团控股有限公司 | A kind of data processing method and equipment based on block chain |
CN107846278A (en) * | 2017-10-30 | 2018-03-27 | 中国联合网络通信集团有限公司 | Intelligent contract processing method and processing device |
CN108055274A (en) * | 2017-12-22 | 2018-05-18 | 广东工业大学 | A kind of encryption based on alliance's chain storage data and shared method and system |
CN108537063A (en) * | 2018-02-26 | 2018-09-14 | 阿里巴巴集团控股有限公司 | A kind of method, apparatus and equipment of data storage |
CN108345685A (en) * | 2018-03-07 | 2018-07-31 | 物数(上海)信息科技有限公司 | More granularity data processing methods, system, equipment and storage medium under block chain |
CN108550226A (en) * | 2018-04-17 | 2018-09-18 | 暨南大学 | Based on block chain technology automotive system and its building method are shared without key |
CN109040012A (en) * | 2018-06-19 | 2018-12-18 | 西安电子科技大学 | A kind of data security protecting and sharing method based on block chain and system and application |
CN108881262A (en) * | 2018-07-02 | 2018-11-23 | 北京市天元网络技术股份有限公司 | Restoring files methods, devices and systems based on block chain |
CN109033475A (en) * | 2018-09-10 | 2018-12-18 | 湖南智慧政务区块链科技有限公司 | A kind of file memory method, device, equipment and storage medium |
CN109359206A (en) * | 2018-10-17 | 2019-02-19 | 郑称德 | Image processing method and system based on Internet of Things campus administration |
CN109583912A (en) * | 2018-11-14 | 2019-04-05 | 阿里巴巴集团控股有限公司 | Trade company's authentication method and device based on block chain |
CN109753817A (en) * | 2018-12-28 | 2019-05-14 | 全链通有限公司 | Medical information secure storage scheme based on block chain |
CN109858222A (en) * | 2019-01-18 | 2019-06-07 | 特斯联(北京)科技有限公司 | A kind of authentication block catenary system and its verification method based on face characteristic |
CN109783447A (en) * | 2019-01-23 | 2019-05-21 | 北京邮电大学 | Electronics license deposits card method, acquisition methods, device, system and electronic equipment |
CN109768987A (en) * | 2019-02-26 | 2019-05-17 | 重庆邮电大学 | A kind of storage of data file security privacy and sharing method based on block chain |
CN109951498A (en) * | 2019-04-18 | 2019-06-28 | 中央财经大学 | A kind of block chain access control method and device based on ciphertext policy ABE encryption |
Non-Patent Citations (1)
Title |
---|
币艾思维 : "区块链怎么确保文件(比如视频、图片)不被篡改 ", 《链节点 ,原文链接:HTTPS://WWW.CHAINNODE.COM/POST/285039#COMMEN》 * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110933040A (en) * | 2019-11-05 | 2020-03-27 | 武汉菲旺软件技术有限责任公司 | Block chain based data uplink method, device, equipment and medium |
CN110889137A (en) * | 2019-11-21 | 2020-03-17 | 云南群林科技有限公司 | Data exchange method based on block chain |
CN110889137B (en) * | 2019-11-21 | 2023-04-07 | 盛世智云(云南)软件有限公司 | Data exchange method based on block chain |
CN111191288A (en) * | 2019-12-30 | 2020-05-22 | 中电海康集团有限公司 | Block chain data access authority control method based on proxy re-encryption |
CN111191288B (en) * | 2019-12-30 | 2023-10-13 | 中电海康集团有限公司 | Block chain data access right control method based on proxy re-encryption |
CN111343179B (en) * | 2020-02-25 | 2023-04-07 | 中国工商银行股份有限公司 | Real-time consensus method and device for authenticity of data on link |
CN111343179A (en) * | 2020-02-25 | 2020-06-26 | 中国工商银行股份有限公司 | Real-time consensus method and device for authenticity of data on link |
CN111371796A (en) * | 2020-03-11 | 2020-07-03 | 腾讯科技(深圳)有限公司 | Data transmission system, data transmission method, medium, and electronic device |
CN111371796B (en) * | 2020-03-11 | 2023-05-26 | 腾讯科技(深圳)有限公司 | Data transmission system, data transmission method, medium and electronic device |
CN111625231A (en) * | 2020-05-27 | 2020-09-04 | 哈尔滨云天智旅大数据有限公司 | Software development method based on data security |
CN111625231B (en) * | 2020-05-27 | 2021-02-26 | 哈尔滨云天智旅大数据有限公司 | Software development method based on data security |
CN112187767A (en) * | 2020-09-23 | 2021-01-05 | 上海万向区块链股份公司 | Multi-party contract consensus system, method and medium based on block chain |
CN112084521A (en) * | 2020-09-27 | 2020-12-15 | 中国建设银行股份有限公司 | Unstructured data processing method, device and system for block chain |
CN112084521B (en) * | 2020-09-27 | 2024-02-09 | 中国建设银行股份有限公司 | Unstructured data processing method, device and system for block chain |
WO2022120938A1 (en) * | 2020-12-09 | 2022-06-16 | 杭州趣链科技有限公司 | Data sharing method, system and apparatus, and device and storage medium |
CN112911002A (en) * | 2021-02-02 | 2021-06-04 | 上海华盖科技发展股份有限公司 | Block chain data sharing encryption method |
CN113051625A (en) * | 2021-03-24 | 2021-06-29 | 中国工商银行股份有限公司 | Data evidence storing method and device based on block chain |
CN113051625B (en) * | 2021-03-24 | 2024-02-20 | 中国工商银行股份有限公司 | Data storage method and device based on blockchain |
CN114285555A (en) * | 2021-12-15 | 2022-04-05 | 支付宝(杭州)信息技术有限公司 | Multicast method and device based on block chain |
CN114205484A (en) * | 2021-12-15 | 2022-03-18 | 湖南快乐阳光互动娱乐传媒有限公司 | Picture processing method and device |
CN114205484B (en) * | 2021-12-15 | 2024-09-27 | 湖南快乐阳光互动娱乐传媒有限公司 | Picture processing method and device |
CN116842573A (en) * | 2023-07-25 | 2023-10-03 | 南京理工大学 | Hierarchical encryption privacy protection method based on blockchain |
CN116760651A (en) * | 2023-08-22 | 2023-09-15 | 中国航空结算有限责任公司 | Data encryption method and device, electronic equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110336833B (en) | 2022-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110336833A (en) | Image content common recognition method, server based on block chain | |
CN110602138B (en) | Data processing method and device for block chain network, electronic equipment and storage medium | |
CN105007279B (en) | Authentication method and Verification System | |
US20240187393A1 (en) | Network resource access control methods and systems using transactional artifacts | |
CN112333198A (en) | Secure cross-domain login method, system and server | |
CN110149323B (en) | Processing device with ten-million-level TPS (platform secure protocol) contract processing capacity | |
US11405216B2 (en) | System for authenticating verified personal credentials | |
CN109741068A (en) | Internetbank inter-bank contracting method, apparatus and system | |
CN111369236A (en) | Data management method and device applied to block chain | |
CN112422287B (en) | Multi-level role authority control method and device based on cryptography | |
CN112073196B (en) | Service data processing method and device, electronic equipment and storage medium | |
US11777745B2 (en) | Cloud-side collaborative multi-mode private data circulation method based on smart contract | |
CN107566393A (en) | A kind of dynamic rights checking system and method based on trust certificate | |
CN112560072A (en) | Key management method, device, medium and equipment based on block chain | |
CN112600830A (en) | Service data processing method and device, electronic equipment and storage medium | |
CN113328854B (en) | Service processing method and system based on block chain | |
CN112887087B (en) | Data management method and device, electronic equipment and readable storage medium | |
CN113746916A (en) | Block chain-based third-party service providing method, system and related node | |
CN115409511B (en) | Personal information protection system based on block chain | |
CN113129008A (en) | Data processing method and device, computer readable medium and electronic equipment | |
CN117150518A (en) | Communication carrier data security encryption method and system | |
Payeras-Capellà et al. | Design and performance evaluation of two approaches to obtain anonymity in transferable electronic ticketing schemes | |
CN115208642A (en) | Identity authentication method, device and system based on block chain | |
CN114676192A (en) | Electric energy metering data sharing method and device, storage medium and computer equipment | |
CN110381452A (en) | The anti-sniff method of GMS short message, terminal and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |