CN111382414A - Information processing method and platform based on block chain and electronic equipment - Google Patents

Information processing method and platform based on block chain and electronic equipment Download PDF

Info

Publication number
CN111382414A
CN111382414A CN202010093382.2A CN202010093382A CN111382414A CN 111382414 A CN111382414 A CN 111382414A CN 202010093382 A CN202010093382 A CN 202010093382A CN 111382414 A CN111382414 A CN 111382414A
Authority
CN
China
Prior art keywords
hash value
picture
information
sub
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010093382.2A
Other languages
Chinese (zh)
Inventor
林凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN202010093382.2A priority Critical patent/CN111382414A/en
Priority to PCT/CN2020/088012 priority patent/WO2021159617A1/en
Publication of CN111382414A publication Critical patent/CN111382414A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The application discloses an information processing method based on a block chain, a platform and electronic equipment, wherein the method comprises the following steps: receiving a message sent by a message sending end; analyzing the message to obtain an identity picture and specified information; verifying the identity of a message sending end by using the identity picture; if the identity verification of the message sending end passes, performing hash calculation on the specified information to obtain a second hash value, storing the second hash value to the block chain, and acquiring a first hash value from the block chain; if the first hash value is the same as the second hash value, dividing the specified information into a plurality of pieces of sub information; performing hash calculation on the plurality of pieces of sub information respectively to obtain a plurality of sub hash values, and storing the plurality of sub hash values to the block chain; and correspondingly sending the sub information to a plurality of user terminals. Therefore, the communication pressure of the message sending end is reduced, the file is easy to trace when the file has errors, and the information reliability is improved.

Description

Information processing method and platform based on block chain and electronic equipment
Technical Field
The present application relates to the field of computers, and in particular, to an information processing method and platform based on a block chain, an electronic device, and a computer-readable storage medium.
Background
Electronic delivery refers to the use of a network to deliver a document to a notified party, where documents in electronic delivery include documents with legal effects, such as litigation documents, legal documents, and the like. In electronic delivery, the security and integrity of the file need to be guaranteed, and the sending date of the file and the receiving date of the file received by the notified party need to be accurately determined. Electronic delivery in the traditional technology only utilizes a sending terminal to send a file and records sending time; and receiving the file by using the receiving terminal, and recording the receiving time. This delivery method has disadvantages that the communication pressure of the transmitting terminal is too high (when n files need to be transmitted, n communication connections need to be established with different terminals, so that the communication pressure of the transmitting terminal is greatly increased when a large number of files need to be transmitted simultaneously when the expiration date is up), the file is difficult to trace back when the file is wrong, and the transmission time and the reception time are easily tampered.
Disclosure of Invention
The application mainly aims to provide an information processing method and platform based on a block chain, electronic equipment and a computer readable storage medium, and aims to reduce communication pressure of a message sending end, enable files to be easily traced when the files are in error and improve information reliability.
In order to achieve the above object, the present application provides an information processing method based on a block chain, in which a first hash value obtained by hash calculation of specific information is stored in advance, the method including:
receiving a message sent by a message sending end, wherein the message comprises an identity picture and specified information, and a plurality of division points are marked in the specified information;
analyzing the message according to the format of the message, thereby obtaining the identity picture and the designated information;
according to a preset identity authentication method, the identity of the message sending end is authenticated by using the identity picture, and whether the identity authentication of the message sending end passes or not is judged;
if the identity verification of the message sending end passes, performing hash calculation on the specified information to obtain a second hash value, storing the second hash value to the block chain, and acquiring the first hash value from the block chain;
judging whether the first hash value is the same as the second hash value;
if the first hash value is the same as the second hash value, dividing the designated information into a plurality of pieces of sub information according to the plurality of division points;
performing hash calculation on the plurality of pieces of sub information respectively to obtain a plurality of sub hash values, and storing the plurality of sub hash values to the block chain;
and respectively and correspondingly sending the sub information to a plurality of user terminals according to the corresponding relation between the preset sub information and the user terminals.
Further, the step of verifying the identity of the message sending end by using the identity picture according to a preset identity verification method and judging whether the identity verification of the message sending end passes or not includes:
cutting off the identity picture to cut off a preset circular area in the identity picture so as to obtain a circular hole picture;
introducing the circular hole picture into a preset virtual three-dimensional space, and arranging a preset cylinder in the circular hole, wherein the radius of the cylinder is equal to that of the circular area, the virtual three-dimensional space conforms to the light linear propagation principle, the surface of the cylinder is smooth, and the surface of the cylinder is used for mapping the image of the circular hole picture;
acquiring a specified positioning position outside the cylinder according to a preset positioning method, and carrying out image acquisition on the cylinder at the specified positioning position so as to obtain a mapping picture mapped with a part of patterns of the round hole picture;
calculating the similarity value of the mapping picture and a preset contrast picture, and judging whether the similarity value is greater than a preset similarity threshold value or not;
and if the similarity value is larger than a preset similarity threshold value, judging that the identity verification of the message sending end is passed.
Further, the message sent by the message sending end is received, the message has an identity picture and specified information, and the specified information is marked with a plurality of division points; and the message sending end stores a first hash value to a preset block chain, where the first hash value is obtained by performing hash calculation on the specified information in the message sending end, and the method includes:
calling four different rectangular pictures from a preset picture library, and arranging and splicing the four different rectangular pictures in an upper left mode, an upper right mode, a lower left mode and a lower right mode to obtain a rectangular identity picture, wherein the four different rectangular pictures have the same length and width;
cutting off the identity picture to cut off a preset circular area in the identity picture so as to obtain a reference circular hole picture;
introducing the reference circular hole picture into a preset virtual three-dimensional space, and arranging a preset cylinder in the circular hole, wherein the radius of the cylinder is equal to that of the circular area, the virtual three-dimensional space conforms to the light linear propagation principle, and the surface of the cylinder is smooth, so that the surface of the cylinder can map an image of the reference circular hole picture;
acquiring a reference positioning position outside the cylinder according to a preset positioning method, and carrying out image acquisition on the cylinder at the reference positioning position so as to obtain a contrast picture mapped with a part of patterns of the reference round hole picture;
and sending the identity picture to the message sending end, and deleting the identity picture and the reference round hole picture.
Further, the step of calculating the similarity value between the mapping picture and a preset comparison picture, and determining whether the similarity value is greater than a preset similarity threshold value includes:
according to a preset pixel modification method, modifying the color value of the pixel point of the mapping picture into a first color value or a second color value, and modifying the color value of the pixel point of the contrast picture into the first color value or the second color value; the pixel modification method comprises the steps of setting pixel points with color values larger than a preset numerical value as a first color value, and setting pixel points with color values smaller than or equal to the preset numerical value as a second color value;
obtaining the contour line of the mapping picture and the contour line of the contrast picture; the contour line refers to a dividing line of a first block and a second block, the first block refers to a block formed by pixel points with a first color value, and the second block refers to a block formed by pixel points with a second color value;
generating a first minimum circumscribed rectangle of the contour line of the mapping picture and a second minimum circumscribed rectangle of the contour line of the comparison picture, and acquiring a first area A of the first minimum circumscribed rectangle and a second area B of the second minimum circumscribed rectangle;
according to the formula:
Figure BDA0002384458910000031
and calculating the similarity value M of the mapping picture and a preset contrast picture.
Further, the step of storing the second hash value to the block chain and obtaining the first hash value from the block chain includes:
acquiring a plurality of first geographical positions corresponding to a plurality of block chain nodes in the block chain respectively, acquiring a second geographical position of the second terminal, and calculating a plurality of distances between the plurality of first geographical positions and the second geographical position respectively;
selecting a minimum distance from the distances, and acquiring a first block chain node corresponding to the minimum distance;
sending the second hash value to the first blockchain node and requiring the first blockchain node to store the second hash value into the blockchain;
receiving storage confirmation information returned by the first block chain link point, wherein the storage confirmation information is information for confirming that the second hash value is stored in the block chain;
sending a first hash value acquisition request to the first blockchain node, and receiving the first hash value sent by the first blockchain node.
The application provides a processing method based on a block chain, which is applied to a user terminal, wherein the user terminal receives corresponding sub-information sent by any one of the information processing methods based on the block chain, and the method comprises the following steps:
receiving an auditing instruction for auditing the sub information;
according to the audit instruction, sending a hash value acquisition request to corresponding block chain nodes in the block chain, wherein the hash value acquisition request is used for requesting to acquire the first hash value, the second hash value and a reference sub-hash value, and the reference sub-hash value refers to a sub-hash value corresponding to the user terminal in the plurality of sub-hash values;
receiving the first hash value, the second hash value and a reference sub-hash value sent by the corresponding blockchain node;
judging whether the first hash value and the second hash value are the same;
if the first hash value is the same as the second hash value, performing hash calculation on the corresponding sub-information according to a preset hash algorithm, so as to obtain an appointed sub-hash value;
judging whether the designated sub-hash value is the same as the reference sub-hash value;
and if the designated sub-hash value is the same as the reference sub-hash value, judging that the sub-information is approved.
Further, after the step of determining whether the designated sub-hash value and the reference sub-hash value are the same, the method includes:
if the designated sub-hash value is different from the reference sub-hash value, disconnecting all communication connections with the second terminal;
and sending an information retransmission request and a terminal replacement request to the message sending end, wherein the information retransmission request is used for requesting to retransmit the specified information, and the terminal audit request is used for requesting to replace the second terminal.
The application provides an information processing platform based on a block chain, wherein a first hash value is prestored in the block chain, and the first hash value is obtained by performing hash calculation on specified information and comprises the following steps:
the message receiving unit is used for receiving a message sent by a message sending end, wherein the message comprises an identity picture and specified information, and the specified information is marked with a plurality of division points;
the message analyzing unit is used for analyzing the message according to the format of the message so as to obtain the identity picture and the specified information;
the identity authentication unit is used for authenticating the identity of the message sending end by using the identity picture according to a preset identity authentication method and judging whether the identity authentication of the message sending end passes or not;
a second hash value storage unit, configured to perform hash calculation on the specified information to obtain a second hash value if the identity verification of the message sending end passes, store the second hash value to the block chain, and obtain the first hash value from the block chain;
a second hash value determination unit configured to determine whether the first hash value is the same as the second hash value;
a designated information dividing unit configured to divide the designated information into a plurality of pieces of sub information according to the plurality of division points if the first hash value is the same as the second hash value;
a sub-hash value obtaining unit, configured to perform hash calculation on the plurality of pieces of sub-information, respectively, so as to obtain a plurality of sub-hash values, and store the plurality of sub-hash values to the block chain;
and the sub information sending unit is used for correspondingly sending the sub information to the user terminals according to the preset corresponding relation between the sub information and the user terminals.
The present application provides an electronic device comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of any of the above methods when executing the computer program.
The present application provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of any of the above.
The block chain-based information processing method, device, electronic equipment and storage medium receive a message sent by a message sending end; the message sending end stores the first hash value to a preset block chain; analyzing the message to obtain the identity picture and the specified information; verifying the identity of the message sending end by using the identity picture; if the identity verification of the message sending end passes, performing hash calculation on the specified information to obtain a second hash value, storing the second hash value to the block chain, and acquiring the first hash value from the block chain; if the first hash value is the same as the second hash value, dividing the designated information into a plurality of pieces of sub information according to the plurality of division points; performing hash calculation on the plurality of pieces of sub information respectively to obtain a plurality of sub hash values, and storing the plurality of sub hash values to the block chain; and correspondingly sending the sub information to a plurality of user terminals. Therefore, the communication pressure of the message sending end is reduced, the file is easy to trace when the file has errors, and the information reliability is improved.
Drawings
Fig. 1 is a schematic flowchart of an information processing method based on a blockchain according to an embodiment of the present application;
FIG. 2 is a block diagram illustrating an exemplary architecture of a blockchain-based information processing platform according to an embodiment of the present disclosure;
fig. 3 is a block diagram illustrating a structure of an electronic device according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, an embodiment of the present application provides an information processing method based on a block chain, where a first hash value is stored in advance in the block chain, where the first hash value is obtained by performing a hash calculation on specified information, and the method includes:
s1, receiving a message sent by a message sending end, wherein the message comprises an identity picture and specified information, and the specified information is marked with a plurality of division points;
s2, analyzing the message according to the format of the message, thereby obtaining the identity picture and the designated information;
s3, according to a preset identity authentication method, using the identity picture to authenticate the identity of the message sending end, and judging whether the identity authentication of the message sending end passes or not;
s4, if the identity verification of the message sending end passes, performing hash calculation on the specified information to obtain a second hash value, storing the second hash value to the block chain, and acquiring the first hash value from the block chain;
s5, judging whether the first hash value is the same as the second hash value;
s6, if the first hash value is the same as the second hash value, dividing the designated information into a plurality of pieces of sub information according to the plurality of division points;
s7, performing hash calculation on the sub information respectively to obtain a plurality of sub hash values, and storing the sub hash values to the block chain;
and S8, correspondingly sending the sub information to a plurality of user terminals respectively according to the preset corresponding relation between the sub information and the user terminals.
The block chain-based information processing method adopts a mode of setting a special second terminal between a message sending terminal (namely, a terminal for sending information) and a user terminal (namely, a terminal for receiving information) so as to relieve the communication pressure of the message sending terminal (the message sending terminal only needs to be concentrated on generation of files or information and does not need to pay attention to the problem in the aspect of communication, and the second terminal only needs to consider splitting and sending information, so that the technical effect of pressure sharing is realized). Meanwhile, in the information processing process, the message sending end stores the first hash value into the block chain, and the second terminal stores the second hash value and the sub-hash value into the block chain. And the block chain stores the corresponding hash value, wherein the storage time is the corresponding date (for example, the storage time of the first hash value is the sending date). Furthermore, a special identity authentication method and a block chain information authentication method are adopted, so that the information security is improved.
As described in the step S1, a message sent by a message sending end is received, where the message includes an identity picture and specifying information, and the specifying information is marked with a plurality of division points; and the message sending end stores a first hash value to a preset block chain, wherein the first hash value is obtained by performing hash calculation on the specified information in the message sending end. The message is a carrier for exchanging and transmitting communication in the network and is used for bearing the identity picture and the designated information. The specified information may be any feasible information, such as a file composed of multiple litigation notes that need to be issued at the same time, etc. The identity picture is used for verifying the identity. Wherein the specified information is combined from a plurality of pieces of sub information, and a combination point thereof is marked as the division point. Therefore, the message sending end does not need to consider how to send the specific sub-information, and only needs to send the specified information to the second terminal. In addition, in order to prevent data forgery, the method and the device ensure the information security by the way that the message sending end stores the first hash value to the preset block chain.
As described in step S2, the message is parsed according to the format of the message, so as to obtain the identity picture and the specific information. The message may be any structure of message, including, for example, a message header, a message body, etc. Therefore, according to the format of the message, the positions of the identity picture and the designated information can be obtained, and the identity picture and the designated information can be extracted.
As described in the step S3, according to a preset authentication method, the identity of the message sending end is authenticated by using the identity picture, and whether the authentication of the message sending end passes or not is determined. The identity authentication method adopted by the application comprises the following steps: cutting off the identity picture to cut off a preset circular area in the identity picture so as to obtain a circular hole picture; introducing the circular hole picture into a preset virtual three-dimensional space, and arranging a preset cylinder in the circular hole, wherein the radius of the cylinder is equal to that of the circular area, the virtual three-dimensional space conforms to the light linear propagation principle, the surface of the cylinder is smooth, and the surface of the cylinder is used for mapping the image of the circular hole picture; acquiring a specified positioning position outside the cylinder according to a preset positioning method, and carrying out image acquisition on the cylinder at the specified positioning position so as to obtain a mapping picture mapped with a part of patterns of the round hole picture; calculating the similarity value of the mapping picture and a preset contrast picture, and judging whether the similarity value is greater than a preset similarity threshold value or not; and if the similarity value is larger than a preset similarity threshold value, judging that the identity verification of the message sending end is passed. Therefore, as long as the message sending end ensures that the stored identity picture is not stolen, the identity of the message sending end can be ensured not to be stolen (because the second terminal only stores the mapping picture which cannot be used as the basis for identity verification, the second terminal has no possibility of information leakage).
As described in step S4, if the identity verification of the message sending end passes, hash calculation is performed on the specified information to obtain a second hash value, the second hash value is stored in the block chain, and the first hash value is obtained from the block chain. The hash algorithm adopted by the hash calculation is the same as the hash algorithm adopted by the message sending end, so that the hash values can be compared. Wherein the step of obtaining the first hash value from the blockchain is not prior to the step of storing the second hash value to the blockchain, so as to avoid the possibility of stealing the first hash value. Moreover, since the hash value is smaller than the data itself to be hash-calculated, storing the hash value in the blockchain instead of the data itself helps to keep information secret on one hand and to reduce the storage pressure of the blockchain on the other hand.
As described in step S5 above, it is determined whether the first hash value and the second hash value are the same. Since the hash calculation is a compression mapping implemented by a one-way algorithm, the calculated hash value will be obviously different if the calculated data is slightly different. Therefore, only the exact same data, the calculated hash value can be the same. Therefore, whether the electronic delivery process has problems or not is determined in a mode of judging whether the first hash value is the same as the second hash value.
As described in step S6, if the first hash value is the same as the second hash value, the specific information is divided into a plurality of pieces of sub information according to the plurality of division points. Since the specific information is a set of a plurality of sub information and different sub information is to be transmitted to different terminals, it is necessary to divide the specific information into a plurality of sub information according to the plurality of division points. Wherein the first hash value is the same as the second hash value, indicating that no problem occurred in the current step of electronic delivery. If the first hash value is different from the second hash value, an error is indicated, and the error is in the process of sending a message by a message sending end or a message sending end, so that the reason can be quickly traced. The message sending end is, for example, a terminal corresponding to a court, the message is, for example, an HTTP protocol message, the message is, for example, a message in which a litigation document is recorded, and the message is used as a carrier for sending the litigation document to be electronically delivered, the second terminal may be any feasible terminal (which may be a terminal owned by the court and specially used for communication, or a terminal owned by a third party, and preferably a terminal owned by the third party), and the user terminal is, for example, a terminal corresponding to an object to which the litigation document is to be delivered. Therefore, the block chain-based information processing method adopts a mode of setting a special second terminal between the message sending terminal (namely, the terminal for sending the information) and the user terminal (namely, the terminal for receiving the information) so as to relieve the communication pressure of the message sending terminal (the message sending terminal only needs to be concentrated on the generation of files or information and does not need to pay attention to the problem in the aspect of communication, and the second terminal only needs to consider to disassemble and send the information, thereby realizing the technical effect of pressure sharing). And meanwhile, in the process of sending the information, the message sending end stores the first hash value into the block chain, and the second terminal stores the second hash value and the sub-hash value into the block chain. And the block chain stores the corresponding hash value, wherein the storage time is the corresponding date (for example, the storage time of the first hash value is the sending date). Furthermore, a special identity authentication method and a block chain information authentication method are adopted, so that the information security is improved. When the method is applied to the case that the court terminal is used as the message sending end and the litigation documents are recorded in the message, the pressure of the court terminal is relieved because the court terminal does not need to consider the problem in the aspect of communication; and when the court terminal and the second terminal send the litigation documents, the first hash value is respectively stored in the block chain, and the second hash value and the sub-hash value are stored in the block chain, so that the delivery time is saved, the delivery content is also saved, and the error part can be accurately traced in time when the litigation documents are wrong (for example, when the litigation documents are maliciously forged midway).
As described in step S7, the sub-information is respectively subjected to hash calculation to obtain a plurality of sub-hash values, and the sub-hash values are stored in the block chain. The sub-hash values represent sub-information, and the sub-hash values are stored in the block chain, so that error tracing is facilitated, that is, when the sub-information sent and received by the user terminal is wrong, whether the second terminal has errors or not can be known through the sub-hash values of the block chain.
As described in step S8, the sub information is correspondingly sent to the user terminals according to the preset corresponding relationship between the sub information and the user terminals. The process of correspondingly sending the sub-information to the user terminals is set to be sent by the second terminal instead of the message sending terminal, so that the pressure sharing is realized. Furthermore, a plurality of second terminals can exist, so that the possibility that information cannot be sent out timely due to overlarge pressure is further avoided. The preset corresponding relationship between the sub information and the user terminal is preset, for example, the sub information and the corresponding terminal to which the sub information is expected to be sent are recorded in a specified data table in advance, and the corresponding relationship can be obtained by inquiring the specified data table. More specific examples are: the sub-information is, for example, a litigation document a (and accordingly, the specific information is, for example, an aggregate of a plurality of litigation documents), and if the corresponding terminal to which the litigation document a is expected to be sent is the client a, the corresponding relationship between the litigation document a and the client a may be written in the specific data table in advance.
In one embodiment, the step S3 of verifying the identity of the message sending end by using the identity picture according to a preset identity verification method, and determining whether the identity verification of the message sending end passes includes:
s301, cutting off the identity picture to cut off a preset circular area in the identity picture so as to obtain a circular hole picture;
s302, introducing the round hole picture into a preset virtual three-dimensional space, and arranging a preset cylinder in the round hole, wherein the radius of the cylinder is equal to that of the circular area, the virtual three-dimensional space conforms to the light linear propagation principle, the surface of the cylinder is smooth, and the surface of the cylinder is used for mapping an image of the round hole picture;
s303, acquiring a specified positioning position outside the cylinder according to a preset positioning method, and carrying out image acquisition on the cylinder at the specified positioning position to obtain a mapping picture mapped with a part of patterns of the round hole picture;
s304, calculating the similarity value of the mapping picture and a preset contrast picture, and judging whether the similarity value is greater than a preset similarity threshold value;
s305, if the similarity value is larger than a preset similarity threshold, determining that the identity verification of the message sending end is passed.
As described above, the identity of the message sending end is verified by using the identity picture, and whether the identity verification of the message sending end is passed or not is judged. The method adopts the mode of converting the circular hole picture-the pattern on the surface of the cylinder-the mapping picture into the two-dimensional-three-dimensional pattern to realize the identity authentication and improve the information security (namely, the mapping picture cannot be used as the standard of the identity authentication, so that the problem of information leakage of the second terminal cannot occur). And because the two-dimensional-three-dimensional-two-dimensional graph conversion is adopted, the difference part in the picture is possibly amplified, so that the similarity calculation is more accurate, and the identity recognition is safer.
In one embodiment, the method includes that a message sent by a message sending end is received, the message has an identity picture and specified information, and the specified information is marked with a plurality of division points; and the message sending end has stored a first hash value to a preset blockchain, where the first hash value is obtained by performing a hash calculation on the specified information in the message sending end before step S1, the method includes:
s001, calling four different rectangular pictures from a preset picture library, and arranging and splicing the four different rectangular pictures in an upper left mode, an upper right mode, a lower left mode and a lower right mode to obtain a rectangular identity picture, wherein the four different rectangular pictures have the same length and width;
s002, carrying out cutting processing on the identity picture to cut a preset circular area in the identity picture, so as to obtain a reference circular hole picture;
s003, introducing the reference round hole picture into a preset virtual three-dimensional space, and arranging a preset cylinder in the round hole, wherein the radius of the cylinder is equal to that of the circular area, the virtual three-dimensional space conforms to the light linear propagation principle, and the surface of the cylinder is smooth, so that the surface of the cylinder can map an image of the reference round hole picture;
s004, acquiring a reference positioning position outside the cylinder according to a preset positioning method, and carrying out image acquisition on the cylinder at the reference positioning position to obtain a contrast image mapped with partial patterns of the reference circular hole image;
s005, sending the identity picture to the message sending end, and deleting the identity picture and the reference round hole picture.
As described above, the sending of the identity picture to the message sending terminal is realized. This application is through calling out four different rectangle pictures from the picture storehouse of predetermineeing, and will four different rectangle pictures arrange the concatenation with upper left, upper right, lower left and lower right mode to obtain the identity picture that is the rectangle. So that the identity picture has at least four different patterns. Because the cylinder can only map out partial patterns of the round hole picture, at least four different patterns can be mapped out by utilizing the identity picture, so that the identity is more difficult to forge. And the acquisition mode of the comparison picture is completely the same as that of the mapping picture so as to ensure the feasibility of similarity comparison. And then sending the identity picture to the message sending end, and deleting the identity picture and the reference round hole picture so that the second terminal only stores a comparison picture, so that the identity picture only exists in the message sending end, and information leakage in the second terminal is prevented.
In an embodiment, the step S304 of calculating a similarity value between the mapping picture and a preset comparison picture, and determining whether the similarity value is greater than a preset similarity threshold value includes:
s501, according to a preset pixel modification method, modifying the color value of the pixel point of the mapping picture into a first color value or a second color value, and modifying the color value of the pixel point of the contrast picture into the first color value or the second color value; the pixel modification method comprises the steps of setting pixel points with color values larger than a preset numerical value as a first color value, and setting pixel points with color values smaller than or equal to the preset numerical value as a second color value;
s502, obtaining the contour line of the mapping picture and the contour line of the contrast picture; the contour line refers to a dividing line of a first block and a second block, the first block refers to a block formed by pixel points with a first color value, and the second block refers to a block formed by pixel points with a second color value;
s503, generating a first minimum circumscribed rectangle of the contour line of the mapping picture, generating a second minimum circumscribed rectangle of the contour line of the comparison picture, and acquiring a first area A of the first minimum circumscribed rectangle and a second area B of the second minimum circumscribed rectangle;
s504, according to a formula:
Figure BDA0002384458910000131
and calculating the similarity value M of the mapping picture and a preset contrast picture.
As described above, calculating the similarity value M of the mapping picture and the preset comparison picture is achieved. According to the two-dimensional-three-dimensional-two-dimensional image conversion method, the dependency of the complexity of the image is low, and therefore in order to reduce the calculation pressure, the pixel modification method is used for setting the pixel points with the color values larger than the preset numerical value as the first color values and setting the pixel points with the color values smaller than or equal to the preset numerical value as the second color values. Then obtaining the contour line of the mapping picture and the contour line of the contrast picture; generating a first minimum circumscribed rectangle of the contour line of the mapping picture and a second minimum circumscribed rectangle of the contour line of the comparison picture, and acquiring a first area A of the first minimum circumscribed rectangle and a second area B of the second minimum circumscribed rectangle; according to the formula:
Figure BDA0002384458910000132
and calculating the similarity value M of the mapping picture and a preset contrast picture. Therefore, the similarity of the pictures is converted into the similarity of the areas, and the calculation speed is improved.
In one embodiment, the step S4 of storing the second hash value to the blockchain and acquiring the first hash value from the blockchain includes:
s401, acquiring a plurality of first geographical positions corresponding to a plurality of block chain nodes in the block chain respectively, acquiring a second geographical position of the second terminal, and calculating a plurality of distances between the plurality of first geographical positions and the second geographical position respectively;
s402, selecting a minimum distance from the distances, and acquiring a first block chain node corresponding to the minimum distance;
s403, sending the second hash value to the first blockchain node, and requiring the first blockchain node to store the second hash value into the blockchain;
s404, receiving storage confirmation information returned by the first block chain link point, wherein the storage confirmation information is information for confirming that the second Hash value is stored in the block chain;
s405, sending a first hash value acquisition request to the first block chain node, and receiving the first hash value sent by the first block chain node.
As described above, storing the second hash value to the blockchain and obtaining the first hash value from the blockchain is implemented. The method includes selecting the minimum distance from the distances and obtaining the first block chain node corresponding to the minimum distance, and selecting the block chain node closest to the second terminal to improve communication speed. And to send the second hash value to the first blockchain node and to require the first blockchain node to store the second hash value into the blockchain; receiving storage confirmation information returned by the first block chain link point, wherein the storage confirmation information is information for confirming that the second hash value is stored in the block chain; and sending a first hash value acquisition request to the first block chain node, receiving the first hash value sent by the first block chain node, and realizing storage of a second hash value and acquisition of the first hash value by means of the first block chain node. And the storage of said second hash value is prior to the acquisition of the first hash value, so as to avoid the possibility of the second terminal forging the first hash value.
An embodiment of the present application provides a processing method based on a block chain, which is applied to a user terminal, where the user terminal receives corresponding sub-information sent by any one of the above information processing methods based on the block chain, and the method includes:
ST1, receiving an auditing instruction for auditing the sub information;
ST2, sending a hash value obtaining request to a corresponding block link node in the block chain according to the audit instruction, where the hash value obtaining request is used to request to obtain the first hash value, the second hash value, and a reference sub-hash value, where the reference sub-hash value refers to a sub-hash value corresponding to the user terminal in the plurality of sub-hash values;
ST3, receiving the first hash value, the second hash value and the reference sub-hash value sent by the corresponding block chain node;
ST4, judging whether the first hash value and the second hash value are the same;
ST5, if the first hash value and the second hash value are the same, performing hash calculation on the corresponding sub information according to a preset hash algorithm to obtain an appointed sub hash value;
ST6, determining whether the designated sub-hash value and the reference sub-hash value are the same;
ST7, if the designated sub-hash value is the same as the reference sub-hash value, determining that the sub-information is verified.
As described above, the corresponding sub information is verified by using the user terminal as an execution subject. Due to the fact that the block chain mode is adopted, error traceability is achieved. Namely, the first hash value, the second hash value and the reference sub-hash value sent by the corresponding blockchain node are received; judging whether the first hash value and the second hash value are the same; if the first hash value is the same as the second hash value, performing hash calculation on the corresponding sub-information according to a preset hash algorithm, so as to obtain an appointed sub-hash value; judging whether the designated sub-hash value is the same as the reference sub-hash value; and if the designated sub-hash value is the same as the reference sub-hash value, judging the way that the sub-information is approved to determine whether the phenomena of information forgery and the like exist in the electronic delivery process. If the first hash value is the same as the second hash value, and the designated sub-hash value is the same as the reference sub-hash value, it indicates that no error occurs in the electronic delivery process, and therefore it is determined that the sub-information is approved.
In one embodiment, the step ST6 of determining whether the specified sub-hash value and the reference sub-hash value are the same includes:
ST61, if the designated sub-hash value is not the same as the reference sub-hash value, disconnecting all communication connections with the second terminal;
ST62, sending an information resending request and a terminal replacing request to the message sending end, wherein the information resending request is used for requesting to resend the specified information, and the terminal auditing request is used for requesting to replace the second terminal.
As described above, the sending of the information retransmission request and the terminal replacement request to the message sending end is realized. If the designated sub-hash value is different from the reference sub-hash value, it indicates that an error has occurred in the second terminal, and therefore the second terminal is not trusted, and accordingly all communication connections with the second terminal are disconnected. Since the second terminal is not trusted and the corresponding sub information received by the user terminal is erroneous, it is necessary to acquire accurate corresponding sub information. Therefore, an information retransmission request and a terminal replacement request are sent to the message sending end, the information retransmission request is used for requesting to retransmit the specified information, and the terminal audit request is used for requesting to replace the second terminal. Further, after sending an information retransmission request and a terminal replacement request to the message sending end, the method further includes: and sending a terminal checking request to the message sending end to check the error reason of the second terminal.
The block chain-based information processing method receives a message sent by a message sending end; the message sending end stores the first hash value to a preset block chain; analyzing the message to obtain the identity picture and the specified information; verifying the identity of the message sending end by using the identity picture; if the identity verification of the message sending end passes, performing hash calculation on the specified information to obtain a second hash value, storing the second hash value to the block chain, and acquiring the first hash value from the block chain; if the first hash value is the same as the second hash value, dividing the designated information into a plurality of pieces of sub information according to the plurality of division points; performing hash calculation on the plurality of pieces of sub information respectively to obtain a plurality of sub hash values, and storing the plurality of sub hash values to the block chain; and correspondingly sending the sub information to a plurality of user terminals. Therefore, the communication pressure of the message sending end is reduced, the file is easy to trace when the file has errors, and the information reliability is improved.
Referring to fig. 2, an embodiment of the present application provides an information processing platform based on a block chain, where the block chain stores a first hash value in advance, and the first hash value is a hash value obtained by performing a hash calculation on specified information, and the information processing platform includes:
a message receiving unit 10, configured to receive a message sent by a message sending end, where the message includes an identity picture and specific information, and the specific information is marked with multiple division points;
a message parsing unit 20, configured to parse the message according to the format of the message, so as to obtain the identity picture and the specific information;
the identity authentication unit 30 is configured to authenticate the identity of the message sending end by using the identity picture according to a preset identity authentication method, and determine whether the identity authentication of the message sending end passes;
a second hash value storage unit 40, configured to perform hash calculation on the specified information to obtain a second hash value if the identity authentication of the message sending end passes, store the second hash value to the block chain, and obtain the first hash value from the block chain;
a second hash value determination unit 50 configured to determine whether the first hash value is the same as the second hash value;
a designated information dividing unit 60 configured to divide the designated information into a plurality of pieces of sub information according to the plurality of division points if the first hash value is the same as the second hash value;
a sub-hash value obtaining unit 70, configured to perform hash calculation on the multiple pieces of sub-information respectively, so as to obtain multiple sub-hash values, and store the multiple sub-hash values into the block chain;
and a sub information sending unit 80, configured to correspondingly send the plurality of pieces of sub information to a plurality of user terminals respectively according to a preset correspondence between the sub information and the user terminals.
The operations performed by the units are respectively corresponding to the steps of the information processing method based on the block chain in the foregoing embodiment one by one, and are not described herein again.
In one embodiment, the identity verification unit 30 includes:
the cutting processing subunit is used for cutting the identity picture so as to cut a preset circular area in the identity picture, so as to obtain a circular hole picture;
the circular hole picture processing unit is used for processing a circular hole picture, and comprises a circular hole setting subunit and a circular hole processing subunit, wherein the circular hole picture is introduced into a preset virtual three-dimensional space, a preset cylinder is arranged in the circular hole, the radius of the cylinder is equal to the radius of the circular area, the virtual three-dimensional space accords with the light linear propagation principle, the surface of the cylinder is smooth, and the surface of the cylinder is used for mapping the image of the circular hole picture;
the mapping image obtaining subunit is configured to obtain a specified positioning position outside the cylinder according to a preset positioning method, and perform image acquisition on the cylinder at the specified positioning position, so as to obtain a mapping image on which a part of the pattern of the circular hole image is mapped;
the similarity value judging subunit is used for calculating the similarity values of the mapping picture and a preset comparison picture and judging whether the similarity values are greater than a preset similarity threshold value or not;
and the identity authentication passing judgment subunit is used for judging that the identity authentication of the message sending end passes if the similarity value is greater than a preset similarity threshold value.
The operations performed by the sub-units correspond to the steps of the block chain-based information processing method in the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the apparatus comprises:
the rectangular picture splicing unit is used for calling four different rectangular pictures from a preset picture library, and arranging and splicing the four different rectangular pictures in an upper left mode, an upper right mode, a lower left mode and a lower right mode so as to obtain a rectangular identity picture, wherein the four different rectangular pictures have the same length and width;
a reference circular hole picture acquiring unit, configured to perform removal processing on the identity picture to remove a preset circular region in the identity picture, so as to obtain a reference circular hole picture;
the reference circular hole picture introducing unit is used for introducing a reference circular hole picture into a preset virtual three-dimensional space, and a preset cylinder is arranged in the circular hole, wherein the radius of the cylinder is equal to that of the circular area, the virtual three-dimensional space accords with the light linear propagation principle, and the surface of the cylinder is smooth, so that the surface of the cylinder can map an image of the reference circular hole picture;
the comparison picture acquisition unit is used for acquiring a reference positioning position outside the cylinder according to a preset positioning method and acquiring an image of the cylinder at the reference positioning position so as to obtain a comparison picture mapped with a part of patterns of the reference circular hole picture;
and the identity picture sending unit is used for sending the identity picture to the message sending end and deleting the identity picture and the reference round hole picture.
The operations performed by the units are respectively corresponding to the steps of the information processing method based on the block chain in the foregoing embodiment one by one, and are not described herein again.
In one embodiment, the similarity value determination subunit includes:
the pixel modification module is used for modifying the color value of the pixel point of the mapping picture into a first color value or a second color value according to a preset pixel modification method, and modifying the color value of the pixel point of the contrast picture into the first color value or the second color value; the pixel modification method comprises the steps of setting pixel points with color values larger than a preset numerical value as a first color value, and setting pixel points with color values smaller than or equal to the preset numerical value as a second color value;
the contour line acquisition module is used for acquiring the contour line of the mapping picture and the contour line of the contrast picture; the contour line refers to a dividing line of a first block and a second block, the first block refers to a block formed by pixel points with a first color value, and the second block refers to a block formed by pixel points with a second color value;
the minimum circumscribed rectangle generating module is used for generating a first minimum circumscribed rectangle of the contour line of the mapping picture and a second minimum circumscribed rectangle of the contour line of the comparison picture, and acquiring a first area A of the first minimum circumscribed rectangle and a second area B of the second minimum circumscribed rectangle;
a similarity value M calculation module for calculating the similarity value M according to the formula:
Figure BDA0002384458910000181
and calculating the similarity value M of the mapping picture and a preset contrast picture.
The operations executed by the modules correspond to the steps of the information processing method based on the block chain in the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the second hash value storage unit 40 includes:
the distance calculation subunits are used for acquiring a plurality of first geographical positions corresponding to a plurality of block chain nodes in the block chain respectively, acquiring a second geographical position of the second terminal, and calculating a plurality of distances between the first geographical positions and the second geographical position respectively;
the minimum distance selecting subunit is used for selecting a minimum distance from the plurality of distances and acquiring a first block chain node corresponding to the minimum distance;
a second hash value sending subunit, configured to send the second hash value to the first blockchain node, and request the first blockchain node to store the second hash value into the blockchain;
a storage confirmation information receiving subunit, configured to receive storage confirmation information returned by the first block link point, where the storage confirmation information is information for confirming that the second hash value is stored in the block chain;
and the first hash value receiving subunit is configured to send a first hash value obtaining request to the first blockchain node, and receive the first hash value sent by the first blockchain node.
The operations performed by the sub-units correspond to the steps of the block chain-based information processing method in the foregoing embodiment one to one, and are not described herein again.
An embodiment of the present application provides a processing apparatus based on a block chain, which is applied to a user terminal, where the user terminal receives corresponding sub-information sent by any one of the above information processing methods based on the block chain, and the method includes:
the auditing instruction receiving unit is used for receiving an auditing instruction for auditing the corresponding sub information;
a hash value obtaining request sending unit, configured to send a hash value obtaining request to a corresponding block link point in the block chain according to the audit instruction, where the hash value obtaining request is used to request to obtain the first hash value, the second hash value, and a reference sub-hash value, where the reference sub-hash value refers to a sub-hash value corresponding to the user terminal in the plurality of sub-hash values;
a hash value receiving unit, configured to receive the first hash value, the second hash value, and a reference sub-hash value sent by the corresponding blockchain node;
a hash value identity determination unit configured to determine whether the first hash value and the second hash value are identical;
a designated sub-hash value obtaining unit, configured to perform hash calculation on the corresponding sub-information according to a preset hash algorithm if the first hash value is the same as the second hash value, so as to obtain a designated sub-hash value;
an assigned sub-hash value determination unit configured to determine whether the assigned sub-hash value and the reference sub-hash value are the same;
and the sub-information auditing pass judging unit is used for judging that the sub-information auditing pass if the specified sub-hash value is the same as the reference sub-hash value.
The operations performed by the units are respectively corresponding to the steps of the processing method based on the block chain in the foregoing embodiment one by one, and are not described herein again.
In one embodiment, the apparatus comprises:
a communication connection disconnection unit configured to disconnect all communication connections with the second terminal if the designated sub-hash value is different from the reference sub-hash value;
and the terminal replacement request sending unit is used for sending an information retransmission request and a terminal replacement request to the message sending end, wherein the information retransmission request is used for requesting to retransmit the specified information, and the terminal audit request is used for requesting to replace the second terminal.
The operations performed by the units are respectively corresponding to the steps of the processing method based on the block chain in the foregoing embodiment one by one, and are not described herein again.
The information processing platform based on the block chain receives a message sent by a message sending end; the message sending end stores the first hash value to a preset block chain; analyzing the message to obtain the identity picture and the specified information; verifying the identity of the message sending end by using the identity picture; if the identity verification of the message sending end passes, performing hash calculation on the specified information to obtain a second hash value, storing the second hash value to the block chain, and acquiring the first hash value from the block chain; if the first hash value is the same as the second hash value, dividing the designated information into a plurality of pieces of sub information according to the plurality of division points; performing hash calculation on the plurality of pieces of sub information respectively to obtain a plurality of sub hash values, and storing the plurality of sub hash values to the block chain; and correspondingly sending the sub information to a plurality of user terminals. Therefore, the communication pressure of the message sending end is reduced, the file is easy to trace when the file has errors, and the information reliability is improved.
Referring to fig. 3, an embodiment of the present invention further provides an electronic device, where the electronic device may be a server, and an internal structure of the electronic device may be as shown in the figure. The electronic device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the electronic equipment comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The memory provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium. The database of the electronic device is used for storing data used by the information processing method based on the block chain. The network interface of the electronic device is used for connecting and communicating with an external terminal through a network. The computer program is executed by a processor to implement a blockchain-based information processing method or a blockchain-based processing method.
The processor executes the above information processing method based on the block chain or the processing method based on the block chain, wherein the steps included in the method correspond to the steps of executing the information processing method based on the block chain or the processing method based on the block chain in the foregoing embodiment one to one, and are not described herein again.
It will be understood by those skilled in the art that the structures shown in the drawings are only block diagrams of some of the structures related to the present application, and do not constitute a limitation on the electronic devices to which the present application is applied.
The electronic equipment receives the message sent by the message sending end; the message sending end stores the first hash value to a preset block chain; analyzing the message to obtain the identity picture and the specified information; verifying the identity of the message sending end by using the identity picture; if the identity verification of the message sending end passes, performing hash calculation on the specified information to obtain a second hash value, storing the second hash value to the block chain, and acquiring the first hash value from the block chain; if the first hash value is the same as the second hash value, dividing the designated information into a plurality of pieces of sub information according to the plurality of division points; performing hash calculation on the plurality of pieces of sub information respectively to obtain a plurality of sub hash values, and storing the plurality of sub hash values to the block chain; and correspondingly sending the sub information to a plurality of user terminals. Therefore, the communication pressure of the message sending end is reduced, the file is easy to trace when the file has errors, and the information reliability is improved.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored thereon, and when the computer program is executed by a processor, the method for processing information based on a block chain or the method for processing based on a block chain is implemented, where steps included in the method correspond to steps of executing the method for processing information based on a block chain or the method for processing based on a block chain in the foregoing embodiment one to one, and are not described herein again.
The computer-readable storage medium of the application receives a message sent by a message sending end; the message sending end stores the first hash value to a preset block chain; analyzing the message to obtain the identity picture and the specified information; verifying the identity of the message sending end by using the identity picture; if the identity verification of the message sending end passes, performing hash calculation on the specified information to obtain a second hash value, storing the second hash value to the block chain, and acquiring the first hash value from the block chain; if the first hash value is the same as the second hash value, dividing the designated information into a plurality of pieces of sub information according to the plurality of division points; performing hash calculation on the plurality of pieces of sub information respectively to obtain a plurality of sub hash values, and storing the plurality of sub hash values to the block chain; and correspondingly sending the sub information to a plurality of user terminals. Therefore, the communication pressure of the message sending end is reduced, the file is easy to trace when the file has errors, and the information reliability is improved.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double-rate SDRAM (SSRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. An information processing method based on a block chain, wherein a first hash value obtained by hash calculation of specified information is stored in advance in the block chain, the method comprising:
receiving a message sent by a message sending end, wherein the message comprises an identity picture and the specified information, and the specified information is marked with a plurality of division points;
analyzing the message according to the format of the message, thereby obtaining the identity picture and the designated information;
according to a preset identity authentication method, the identity of the message sending end is authenticated by using the identity picture, and whether the identity authentication of the message sending end passes or not is judged;
if the identity verification of the message sending end passes, performing hash calculation on the specified information to obtain a second hash value, storing the second hash value to the block chain, and acquiring the first hash value from the block chain;
judging whether the first hash value is the same as the second hash value;
if the first hash value is the same as the second hash value, dividing the designated information into a plurality of pieces of sub information according to the plurality of division points;
performing hash calculation on the plurality of pieces of sub information respectively to obtain a plurality of sub hash values, and storing the plurality of sub hash values to the block chain;
and respectively and correspondingly sending the sub information to a plurality of user terminals according to the corresponding relation between the preset sub information and the user terminals.
2. The block chain-based information processing method according to claim 1, wherein the step of verifying the identity of the message sending end by using the identity picture according to a preset identity verification method and judging whether the identity verification of the message sending end passes includes:
cutting off the identity picture to cut off a preset circular area in the identity picture so as to obtain a circular hole picture;
introducing the circular hole picture into a preset virtual three-dimensional space, and arranging a preset cylinder in the circular hole, wherein the radius of the cylinder is equal to that of the circular area, the virtual three-dimensional space conforms to the light linear propagation principle, the surface of the cylinder is smooth, and the surface of the cylinder is used for mapping the image of the circular hole picture;
acquiring a specified positioning position outside the cylinder according to a preset positioning method, and carrying out image acquisition on the cylinder at the specified positioning position so as to obtain a mapping picture mapped with a part of patterns of the round hole picture;
calculating the similarity value of the mapping picture and a preset contrast picture, and judging whether the similarity value is greater than a preset similarity threshold value or not;
and if the similarity value is larger than a preset similarity threshold value, judging that the identity verification of the message sending end is passed.
3. The method according to claim 2, wherein the step of receiving the packet sent by the packet sending end comprises:
calling four different rectangular pictures from a preset picture library, and arranging and splicing the four different rectangular pictures in an upper left mode, an upper right mode, a lower left mode and a lower right mode to obtain a rectangular identity picture, wherein the four different rectangular pictures have the same length and width;
cutting off the identity picture to cut off a preset circular area in the identity picture so as to obtain a reference circular hole picture;
introducing the reference circular hole picture into a preset virtual three-dimensional space, and arranging a preset cylinder in the circular hole, wherein the radius of the cylinder is equal to that of the circular area, the virtual three-dimensional space conforms to the light linear propagation principle, the surface of the cylinder is smooth, and the surface of the cylinder is used for mapping an image of the reference circular hole picture;
acquiring a reference positioning position outside the cylinder according to a preset positioning method, and carrying out image acquisition on the cylinder at the reference positioning position so as to obtain a contrast picture mapped with a part of patterns of the reference round hole picture;
and sending the identity picture to the message sending end, and deleting the identity picture and the reference round hole picture.
4. The method according to claim 2, wherein the step of calculating the similarity between the mapping picture and a preset comparison picture and determining whether the similarity is greater than a preset similarity threshold value comprises:
according to a preset pixel modification method, modifying the color value of the pixel point of the mapping picture into a first color value or a second color value, and modifying the color value of the pixel point of the contrast picture into the first color value or the second color value; the pixel modification method comprises the steps of setting pixel points with color values larger than a preset numerical value as a first color value, and setting pixel points with color values smaller than or equal to the preset numerical value as a second color value;
obtaining the contour line of the mapping picture and the contour line of the contrast picture; the contour line refers to a dividing line of a first block and a second block, the first block refers to a block formed by pixel points with a first color value, and the second block refers to a block formed by pixel points with a second color value;
generating a first minimum circumscribed rectangle of the contour line of the mapping picture and a second minimum circumscribed rectangle of the contour line of the comparison picture, and acquiring a first area A of the first minimum circumscribed rectangle and a second area B of the second minimum circumscribed rectangle;
according to the formula:
Figure FDA0002384458900000031
and calculating the similarity value M of the mapping picture and a preset contrast picture.
5. The method according to claim 1, wherein the step of storing the second hash value to the blockchain and obtaining the first hash value from the blockchain includes:
acquiring a plurality of first geographical positions corresponding to a plurality of block chain nodes in the block chain respectively, acquiring a second geographical position of the second terminal, and calculating a plurality of distances between the plurality of first geographical positions and the second geographical position respectively;
selecting a minimum distance from the distances, and acquiring a first block chain node corresponding to the minimum distance;
sending the second hash value to the first blockchain node and requiring the first blockchain node to store the second hash value into the blockchain;
receiving storage confirmation information returned by the first block chain link point, wherein the storage confirmation information is information for confirming that the second hash value is stored in the block chain;
sending a first hash value acquisition request to the first blockchain node, and receiving the first hash value sent by the first blockchain node.
6. A processing method based on a block chain, which is applied to a user terminal, and the user terminal receives corresponding sub-information sent by the block chain based information processing method of any one of claims 1 to 5, and the method comprises:
receiving an auditing instruction for auditing the sub information;
according to the audit instruction, sending a hash value acquisition request to corresponding block chain nodes in the block chain, wherein the hash value acquisition request is used for requesting to acquire the first hash value, the second hash value and a reference sub-hash value, and the reference sub-hash value refers to a sub-hash value corresponding to the user terminal in the plurality of sub-hash values;
receiving the first hash value, the second hash value and a reference sub-hash value sent by the blockchain node;
judging whether the first hash value and the second hash value are the same;
if the first hash value is the same as the second hash value, performing hash calculation on the corresponding sub-information according to a preset hash algorithm, so as to obtain an appointed sub-hash value;
judging whether the designated sub-hash value is the same as the reference sub-hash value;
and if the designated sub-hash value is the same as the reference sub-hash value, judging that the sub-information is approved.
7. The blockchain-based processing method according to claim 6, wherein the step of determining whether the specific sub-hash value and the reference sub-hash value are the same includes:
if the designated sub-hash value is different from the reference sub-hash value, disconnecting all communication connections with the second terminal;
and sending an information retransmission request and a terminal replacement request to the message sending end, wherein the information retransmission request is used for requesting to retransmit the corresponding sub-information, and the terminal audit request is used for requesting to replace the second terminal.
8. An information processing platform based on a block chain, wherein a first hash value is stored in the block chain in advance, and the first hash value is obtained by performing hash calculation on specified information, and the platform comprises:
the message receiving unit is used for receiving a message sent by a message sending end, wherein the message comprises an identity picture and specified information, and the specified information is marked with a plurality of division points;
the message analyzing unit is used for analyzing the message according to the format of the message so as to obtain the identity picture and the specified information;
the identity authentication unit is used for authenticating the identity of the message sending end by using the identity picture according to a preset identity authentication method and judging whether the identity authentication of the message sending end passes or not;
a second hash value storage unit, configured to perform hash calculation on the specified information to obtain a second hash value if the identity verification of the message sending end passes, store the second hash value to the block chain, and obtain the first hash value from the block chain;
a second hash value determination unit configured to determine whether the first hash value is the same as the second hash value;
a designated information dividing unit configured to divide the designated information into a plurality of pieces of sub information according to the plurality of division points if the first hash value is the same as the second hash value;
a sub-hash value obtaining unit, configured to perform hash calculation on the plurality of pieces of sub-information, respectively, so as to obtain a plurality of sub-hash values, and store the plurality of sub-hash values to the block chain;
and the sub information sending unit is used for correspondingly sending the sub information to the user terminals according to the preset corresponding relation between the sub information and the user terminals.
9. An electronic device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202010093382.2A 2020-02-14 2020-02-14 Information processing method and platform based on block chain and electronic equipment Pending CN111382414A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010093382.2A CN111382414A (en) 2020-02-14 2020-02-14 Information processing method and platform based on block chain and electronic equipment
PCT/CN2020/088012 WO2021159617A1 (en) 2020-02-14 2020-04-30 Blockchain-based information processing method and platform, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010093382.2A CN111382414A (en) 2020-02-14 2020-02-14 Information processing method and platform based on block chain and electronic equipment

Publications (1)

Publication Number Publication Date
CN111382414A true CN111382414A (en) 2020-07-07

Family

ID=71215194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010093382.2A Pending CN111382414A (en) 2020-02-14 2020-02-14 Information processing method and platform based on block chain and electronic equipment

Country Status (2)

Country Link
CN (1) CN111382414A (en)
WO (1) WO2021159617A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865612A (en) * 2020-07-17 2020-10-30 国网北京市电力公司 Identity authentication method and device for power Internet of things terminal
CN112801867A (en) * 2020-12-30 2021-05-14 杭州趣链科技有限公司 Satellite remote sensing image splicing method, device and equipment based on block chain
CN113627561A (en) * 2021-08-20 2021-11-09 北京软通智慧科技有限公司 Data fusion method and device, electronic equipment and storage medium
CN114564446A (en) * 2022-03-01 2022-05-31 清华大学 File storage method, device, system and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10157295B2 (en) * 2016-10-07 2018-12-18 Acronis International Gmbh System and method for file authenticity certification using blockchain network
CN108777691B (en) * 2018-06-12 2022-04-15 山东智慧云链网络科技有限公司 Network security protection method and device
CN110535654B (en) * 2019-07-23 2021-09-14 平安科技(深圳)有限公司 Block chain based parallel system deployment method and device and computer equipment
CN110599180B (en) * 2019-09-26 2023-06-27 腾讯科技(深圳)有限公司 Vaccine circulation management method and device based on blockchain

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865612A (en) * 2020-07-17 2020-10-30 国网北京市电力公司 Identity authentication method and device for power Internet of things terminal
CN112801867A (en) * 2020-12-30 2021-05-14 杭州趣链科技有限公司 Satellite remote sensing image splicing method, device and equipment based on block chain
CN112801867B (en) * 2020-12-30 2023-10-31 杭州趣链科技有限公司 Satellite remote sensing image splicing method, device and equipment based on block chain
CN113627561A (en) * 2021-08-20 2021-11-09 北京软通智慧科技有限公司 Data fusion method and device, electronic equipment and storage medium
CN114564446A (en) * 2022-03-01 2022-05-31 清华大学 File storage method, device, system and storage medium
CN114564446B (en) * 2022-03-01 2022-12-27 清华大学 File storage method, device, system and storage medium

Also Published As

Publication number Publication date
WO2021159617A1 (en) 2021-08-19

Similar Documents

Publication Publication Date Title
CN111382414A (en) Information processing method and platform based on block chain and electronic equipment
CN112446785B (en) Cross-chain transaction method, system, device, equipment and storage medium
CN112487011B (en) Block chain-based Internet of things terminal data uplink method and system
WO2018026727A1 (en) Computer-implemented method and system of tamper-evident recording of a plurality of service data items
CN112367164B (en) Service request processing method and device, computer equipment and storage medium
CN113037493B (en) DID identity-based blockchain zero knowledge proof anonymous credential verification method and system
CN109861996B (en) Block chain-based relationship proving method, device, equipment and storage medium
CN112015769A (en) Data processing method and device, computer equipment and storage medium
CN114500690B (en) Interface data processing method and device, electronic equipment and storage medium
CN110851877B (en) Data processing method and device, block chain node equipment and storage medium
CN112165448B (en) Service processing method, device, system, computer equipment and storage medium
CN111367923A (en) Data processing method, data processing device, node equipment and storage medium
CN112035896A (en) Electronic contract deposit certificate system based on transaction mode
CN110351254B (en) Access operation execution method and device
CN113221188B (en) AIS data evidence storage method, evidence obtaining method, device and storage medium
CN110958266A (en) Data processing method, system, computer device and storage medium
CN112651044B (en) Business transaction method, system and storage medium based on block chain technology
CN112667743B (en) Data uplink method, system, equipment and storage medium applied to transmission terminal
CN111327680B (en) Authentication data synchronization method, device, system, computer equipment and storage medium
CN110598452B (en) Evidence information processing method, device, storage medium and equipment based on blockchain
CN114830572A (en) Data transmission method, device, equipment, system and storage medium
CN112003704A (en) Electronic evidence processing method and device and computer equipment
CN111211902A (en) Digital signature method and device based on enterprise browser
CN113873518A (en) Credible Internet of things equipment and system based on SIM card and working method thereof
CN116633698B (en) Data transmission method, apparatus, computer device, storage medium, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination