CN111400746A - Image management method, apparatus, device, and medium based on block chain - Google Patents

Image management method, apparatus, device, and medium based on block chain Download PDF

Info

Publication number
CN111400746A
CN111400746A CN202010096595.0A CN202010096595A CN111400746A CN 111400746 A CN111400746 A CN 111400746A CN 202010096595 A CN202010096595 A CN 202010096595A CN 111400746 A CN111400746 A CN 111400746A
Authority
CN
China
Prior art keywords
image
node
hidden
original image
image processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010096595.0A
Other languages
Chinese (zh)
Inventor
荆博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202010096595.0A priority Critical patent/CN111400746A/en
Publication of CN111400746A publication Critical patent/CN111400746A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The embodiment of the application discloses an image management method, device, equipment and medium based on a block chain, and relates to the block chain technology, wherein the method comprises the following steps: acquiring a hidden image of an original image after hiding, wherein the hidden image is hidden by an image processing node, and the characteristic information of the original image corresponding to the hidden image is stored in a block chain by the image processing node; acquiring an original image provided by an image processing node, and inquiring and acquiring the characteristic information of the original image from a block chain; and calculating characteristic information according to the acquired original image, and comparing the characteristic information with the characteristic information acquired from the block chain to verify the correctness of the original image. According to the image processing method and device, the image authority can be effectively controlled, and meanwhile the privacy of the user related to the image is protected.

Description

Image management method, apparatus, device, and medium based on block chain
Technical Field
The embodiment of the application relates to a computer technology, in particular to a block chain technology, and in particular relates to an image management method, device, equipment and medium based on a block chain.
Background
The development of network technology facilitates data communication and increases the risk of data leakage. For example, in the construction process of a smart city, monitoring videos or images of all regions of the city can be conveniently acquired through the internet of things technology, but if the monitoring videos or images leak, not only is social security maintenance not facilitated, but also sensitive information of related people is leaked. Therefore, how to effectively manage and control videos or images related to private information still remains a problem to be solved urgently.
Disclosure of Invention
The embodiment of the application discloses an image management method, device, equipment and medium based on a block chain, so that the image authority can be effectively controlled, and meanwhile, the privacy of a user related to an image is protected.
In a first aspect, an embodiment of the present application discloses an image management method based on a block chain, which is applied to an image data usage node, and the method includes:
acquiring a hidden image of an original image after hiding, wherein the hidden image is hidden by an image processing node, and the characteristic information of the original image corresponding to the hidden image is stored in a block chain by the image processing node;
acquiring the original image provided by the image processing node, and inquiring and acquiring the characteristic information of the original image from the block chain;
and calculating characteristic information according to the acquired original image, and comparing the characteristic information with the characteristic information acquired from the block chain to verify the correctness of the original image.
One embodiment in the above application has the following advantages or benefits: the method and the device realize effective management and control of the image authority, so that the use authority of the original image has constraint, the problem that the privacy of the masses is easily revealed through the image is solved, and the user privacy related to the image is protected.
Optionally, before acquiring the original image provided by the image processing node, the method further includes:
and initiating an acquisition request aiming at the original image based on the hidden image, and sending the acquisition request as a transaction request to a block chain network for uplink storage.
One embodiment in the above application has the following advantages or benefits: by storing the fetch request in the blockchain, traceability of the operation is ensured.
Optionally, the obtaining request includes at least one of the following information: the image data uses the identity information of the node, the reason for image acquisition, the time of request transmission, and the identity of the hidden image.
Optionally, after initiating an acquisition request for the original image based on the hidden image, the method further includes:
and sending the acquisition request to an audit node to request the audit node to verify the acquisition request.
One embodiment in the above application has the following advantages or benefits: due to the arrangement of the auditing nodes, the normative and authoritative properties of the image management process are increased.
Optionally, the image processing nodes include a first image processing node and a second image processing node, and the first image processing node and the second image processing node are deployed on different hardware devices;
the first image processing node is used for acquiring the original image, hiding the original image and storing the characteristic information of the original image in the block chain;
the second image processing node is configured to provide the original image to the image data usage node.
One embodiment in the above application has the following advantages or benefits: by means of the role distinguishing deployment of the image processing nodes, the method can flexibly adapt to different image use scenes, and the wide applicability of the scheme is improved.
Optionally, the type of the original image includes a monitoring image; the hiding process comprises a face hiding process; the image data usage node includes a blockchain node.
One embodiment in the above application has the following advantages or benefits: the privacy of the masses is protected while the social security is maintained.
In a second aspect, an embodiment of the present application further discloses an image management method based on a block chain, which is applied to an image processing node, and the method includes:
acquiring an original image and carrying out hiding processing to obtain a hidden image;
calculating the characteristic information of the original image, sending an uploading transaction request of the characteristic information to a block chain network, and storing the uploading transaction request in an uplink;
and providing the hidden image to an image data using node, and providing the original image to the image data using node according to an acquisition request of the image data using node.
One embodiment in the above application has the following advantages or benefits: the method and the device realize effective management and control of the image authority, so that the use authority of the original image has constraint, the problem that the privacy of the masses is easily revealed through the image is solved, and the user privacy related to the image is protected.
Optionally, providing the original image to the image data using node according to the request for obtaining the image data using node includes:
acquiring an image processing notification sent by an audit node, wherein the image processing notification is sent after an acquisition request of the audit node for the image data use node is verified;
according to the image processing notification, carrying out recovery processing on hidden information on the hidden image to obtain the original image;
and sending the original image to the image data using node.
Optionally, in the process of performing recovery processing on hidden information on the hidden image according to the image processing notification to obtain the original image, the method further includes:
and generating an operation transaction request according to the operation behavior and the associated data in the hidden information recovery processing process, transmitting the operation transaction request to the block chain network, and storing the operation transaction request in the chain.
One embodiment in the above application has the following advantages or benefits: by storing the operation uplink in the hidden information recovery process, the traceability of the operation is ensured.
Optionally, the obtaining of the image processing notification sent by the audit node includes:
obtaining the image processing notification through a notification processing contract deployed in a blockchain network, wherein the image processing notification is initiated by the audit node using the notification processing contract.
One embodiment in the above application has the following advantages or benefits: the image processing notice is obtained through the intelligent contract, the obtaining efficiency of the original image is improved, and the safety and the supervision performance of the original image in the using process are improved.
Optionally, the image processing nodes include a first image processing node and a second image processing node, and the first image processing node and the second image processing node are deployed on different hardware devices;
the first image processing node is used for acquiring the original image, hiding the original image and storing the characteristic information of the original image in the block chain;
the second image processing node is configured to provide the original image to the image data usage node.
Optionally, the type of the original image includes a monitoring image; the hiding process comprises a face hiding process; the image data usage node includes a blockchain node.
In a third aspect, an embodiment of the present application further discloses an image management apparatus based on a block chain, configured at an image data using node, where the apparatus includes:
the hidden image acquisition module is used for acquiring a hidden image of an original image after hidden processing, wherein the hidden image is hidden by an image processing node, and the characteristic information of the original image corresponding to the hidden image is stored in a block chain by the image processing node;
an original image obtaining module, configured to obtain the original image provided by the image processing node, and query and obtain feature information of the original image from the block chain;
and the image verification module is used for calculating characteristic information according to the acquired original image and comparing the characteristic information with the characteristic information acquired from the block chain so as to verify the correctness of the original image.
In a fourth aspect, an embodiment of the present application further discloses an image management apparatus based on a block chain, where the image management apparatus is configured at an image processing node, and the apparatus includes:
the hidden processing module is used for acquiring an original image and carrying out hidden processing to obtain a hidden image;
the image characteristic uplink module is used for calculating the characteristic information of the original image, sending an uploading transaction request of the characteristic information to a block chain network, and storing the uploading transaction request in an uplink;
and the image providing module is used for providing the hidden image for an image data using node and providing the original image for the image data using node according to the acquisition request of the image data using node.
In a fifth aspect, an embodiment of the present application further discloses an electronic device, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a blockchain based image management method applied to an image data usage node as described in any one of embodiments of the present application or to an image processing node as described in any one of embodiments of the present application.
Optionally, if the image management method based on the blockchain executed by the processor is applied to an image processing node, the electronic device further includes a camera for acquiring an original image.
In a sixth aspect, embodiments of the present application further disclose a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the method for blockchain-based image management applied to an image data usage node according to any of the embodiments of the present application or the method for blockchain-based image management applied to an image processing node according to any of the embodiments of the present application.
According to the technical scheme of the embodiment of the application, the hidden image is firstly provided for the image data using node through the image processing node, and the original image is provided for the image data using node when the original image obtaining requirement exists in the image data using node, so that the effective management and control of the image authority are realized, the use authority of the original image has constraint, the problem that the privacy of the masses is easily leaked through the image is solved, and the user privacy related to the image is protected; meanwhile, by benefiting from the advantages of the block chain, the traceability of each link in the image management process is ensured through the uplink storage of related data, and the data tampering or counterfeiting phenomenon is effectively prevented. Other effects of the above-described alternative will be described below with reference to specific embodiments.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
FIG. 1 is a flowchart of a block chain based image management method disclosed in an embodiment of the present application;
FIG. 2 is a flow chart of another block chain based image management method disclosed in an embodiment of the present application;
fig. 3 is a schematic diagram of an implementation architecture of an image management method based on a block chain according to an embodiment of the present application;
FIG. 4 is a flowchart of another block chain based image management method disclosed in an embodiment of the present application;
FIG. 5 is a schematic structural diagram of an image management apparatus based on a block chain according to an embodiment of the present disclosure;
FIG. 6 is a schematic structural diagram of another block chain-based image management apparatus according to an embodiment of the disclosure;
fig. 7 is a block diagram of an electronic device disclosed according to an embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a flowchart of an image management method based on a block chain according to an embodiment of the present application, where this embodiment may be applied to a block chain network, and an original image carrying privacy information is effectively managed through interaction between an image data using node and an image processing node, so as to reasonably control the use permission of the original image. The method of the embodiment may be performed by an image management apparatus based on a blockchain network, which may be implemented in software and/or hardware and may be configured in an image data usage node. The image data usage node may be deployed on an electronic device controlled by any entity or person having a demand for use of an image.
The image data using node and the image processing node may be used as a block link point to directly participate in the block link network, or may interact with the block link network through the trusted block link point, which is not specifically limited in this embodiment.
As shown in fig. 1, the image management method based on a block chain disclosed in this embodiment may include:
s101, acquiring a hidden image of an original image after hiding, wherein the hidden image is hidden by an image processing node, and the characteristic information of the original image corresponding to the hidden image is stored in a block chain by the image processing node.
In this example, the image processing node may simultaneously implement an image acquisition function and an image processing function, for example, a camera is installed on an electronic device on which the image processing node depends, and the image processing node may call the camera to acquire an original image, and then perform operations such as hiding, feature information calculation, uplink storage, and the like on the original image; the image processing node can only play an image processing function, and obtains an original image and performs related processing through communication interaction with the image acquisition equipment. The specific arrangement of the image processing nodes is not limited in this embodiment, and may be set according to actual situations.
After the image processing node acquires the original image, first, feature information of the original image is calculated, where the feature information may be used to uniquely characterize the original image, for example, a hash value of the original image may be calculated as feature information of the original image, and an upload transaction request of the feature information is sent to a blockchain network and stored in the blockchain. The stored characteristic information of the upper chain can be used for the verification of the original image by other block chain link points. Then, the image processing node performs hiding processing on the original image, and provides the obtained hidden image for the image data using node, that is, the image data using node has an image using requirement, and does not directly obtain the original image, but after obtaining the hidden image, if the obtaining requirement of the original image exists, the request needs to be sent to the image processing node again to obtain the required original image, so that the effective control on the original image is realized, and the risk of revealing user privacy in the image is reduced.
The image processing node is used for hiding the original image, namely hiding information related to user privacy on the image, wherein the privacy information comprises but is not limited to sensitive information such as face information, certificate information and license plate numbers. The concealment process may be implemented using any image processing technique available in the art, such as adding a mosaic to the original image to obscure the private information.
S102, acquiring an original image provided by the image processing node, and inquiring and acquiring the characteristic information of the original image from the block chain.
When the image data using node has an acquisition requirement for an original image corresponding to the hidden image, the acquisition request may be sent to the image processing node in a chain or downlink communication manner, for example, the acquisition request may be generated based on a viewing requirement of an image viewer. And the image processing node responds to the acquisition request, performs recovery processing on the hidden information of the corresponding hidden image to obtain an original image, and then provides the original image to the image data using node. The image data using node sends an acquisition request to the image processing node and can return the hidden image to the image processing node at the same time, so that the image processing node directly acquires the hidden image to be processed; or, the image data using node may carry the identification information of the hidden image in the acquisition request, so that the image processing node may obtain the hidden image according to the identification information. The identification information of the hidden image may include information having uniqueness, such as an image number, an image storage address, and the like, and is streamed as the hidden image is streamed between different nodes. For example, after the original image is subjected to the hiding processing, the image processing node may store the hidden images in a preset storage space according to the correspondence between the image numbers and the images, and allocate a unique storage address to each hidden image, so that after the image processing node obtains the image numbers or the image storage addresses, the hidden images themselves may be successfully acquired. The preset storage space of the hidden image is a storage space that the image data usage node and the image processing node can commonly access.
After the image data uses the node to obtain the original image, in order to ensure the authenticity or correctness of the original image, the feature information of the original image can be searched and obtained from the block chain, then the feature information is compared with the feature information of the original image calculated locally, if the comparison result is consistent, the original image is correct, and further the required user privacy information can be obtained from the original image; if the comparison result is inconsistent, the original image is incorrect, and the required user privacy information cannot be acquired from the original image.
S103, calculating characteristic information according to the acquired original image, and comparing the characteristic information with the characteristic information acquired from the block chain to verify the correctness of the original image.
Optionally, before the image data obtaining node obtains the original image provided by the image processing node, the method of this embodiment further includes: and based on the hidden image, initiating an acquisition request aiming at the original image, and sending the acquisition request as a transaction request to the block chain network for storing in the chain. The obtaining request may include at least one of the following information: identity information of the image data usage node, an image acquisition reason, a time of request transmission, and an identification of the hidden image, wherein the identity information of the image data usage node may include a digital signature of the image data usage node, and the like. By storing the fetch request in the blockchain, traceability of the operation can be ensured.
Optionally, after initiating an acquisition request for an original image based on the hidden image, the method of this embodiment further includes: and sending an acquisition request to the audit node to request the audit node to verify the acquisition request. For example, the auditing node may verify whether the identity of the image data using node is legal, whether the reason for image acquisition is appropriate, whether the identifier of the hidden image is compliant, and the like; further, the examination can also obtain the hidden image through the identifier of the hidden image so as to confirm whether the hidden image meets the condition of obtaining the corresponding original image; for an original image for which a usage time limit exists, it is also possible to verify the reasonableness of the acquisition request according to the transmission time of the acquisition request, for example, to confirm that the image data usage node transmits the request within the allowable usage time of the original image.
After the audit node verifies the acquisition request, the image processing node may be notified to provide the original image to the image data using node, for example, the audit node may send an image processing notification to the image processing node, so that the image processing node performs recovery processing of hidden information on the hidden image according to the image processing notification to obtain the original image, and then sends the original image to the image data using node. The image processing notification can carry identification information of the hidden image, and is used for the image processing node to obtain the hidden image again; of course, the image data using node may also send the hidden image to the image processing node through the auditing node. If the acquisition request fails to verify, the auditing node may notify the image processing node to deny providing the original image to the image data consuming node.
The verification result of the request obtained by the auditing node can also be subjected to uplink storage by initiating an uploading transaction request, so that auditing and counterfeiting can be prevented on one hand, and the traceability of the operation can be ensured on the other hand. For example, the auditing node may initiate an upload transaction request to the blockchain network based on its identity information, the time for performing verification, and the verification result.
Optionally, the type of the original image includes a monitoring image, and further, the monitoring image may be any frame image in the monitoring video; the hiding process comprises a face hiding process; the image data usage node includes a block chain node. Illustratively, the image data use node acquires a hidden monitoring image subjected to hiding processing by the image processing node for viewing by related personnel; after related personnel trigger the acquisition request of the original monitoring image through the image data using node, the image processing node can provide the original monitoring image, the use authority of the original monitoring image can be restrained and controlled through the whole process, the monitoring image is effectively managed, and the phenomenon that the privacy of a user is easily revealed is avoided.
According to the technical scheme of the embodiment, the hidden image is firstly provided for the image data using node through the image processing node, and the original image is provided for the image data using node when the original image obtaining requirement exists in the image data using node, so that the effective management and control of the image authority are realized, the use authority of the original image has constraint, the problem that the privacy of the masses is easily leaked through the image is solved, and the user privacy related to the image is protected; meanwhile, by benefiting from the advantages of the block chain, the traceability of each link in the image management process is ensured through the uplink storage of related data, and the data tampering or counterfeiting phenomenon is effectively prevented.
Fig. 2 is a flowchart of another block chain-based image management method disclosed in an embodiment of the present application, which is further optimized and expanded based on the above technical solution, and can be combined with the above optional embodiments.
Specifically, in this embodiment, the image processing nodes may include a first image processing node and a second image processing node, and the first image processing node and the second image processing node are disposed on different hardware devices. The first image processing node is used for acquiring an original image, performing hiding processing on the original image, and storing feature information of the original image in a block chain, and a camera can be mounted on an electronic device on which the first image processing node depends and used for acquiring the original image, for example, the first image processing node can be a monitoring device; the second image processing node is used for providing the original image to the image data using node, and can be deployed on an electronic device supporting responding to a large number of original image obtaining requests. The role distinction between the first image processing node and the second image processing node should not be construed as a specific limitation to the present embodiment.
Fig. 3 is a schematic diagram of an implementation architecture of an image management method based on a block chain according to an embodiment of the present application, and the present embodiment is exemplarily described below with reference to fig. 2 and fig. 3.
S201, acquiring a hidden image of the original image after the hidden processing, wherein the hidden image is hidden by a first image processing node, and the characteristic information of the original image corresponding to the hidden image is stored in a block chain by the first image processing node.
S202, based on the hidden image, initiating an acquisition request for the original image, sending the acquisition request as a transaction request to a block chain network, and storing the transaction request in an uplink.
Wherein, the obtaining request can be generated according to the viewing requirement of the image viewer. By storing the fetch request in the blockchain, traceability of the operation can be ensured.
S203, sending an acquisition request to the auditing node to request the auditing node to verify the acquisition request.
And after the audit node verifies the acquisition request, the second image processing node can be informed to provide the original image for the image data using node, otherwise, the second image processing node can be informed to refuse to provide the original image. The verification result of the request obtained by the auditing node can also be subjected to uplink storage by initiating an uploading transaction request, so that auditing and counterfeiting can be prevented on one hand, and the traceability of the operation can be ensured on the other hand. The arrangement of the auditing nodes can increase the normative and authoritative properties of the image management process. Of course, the image data using node may also directly send the acquisition request of the original image to the second image processing node.
And S204, acquiring the original image provided by the second image processing node, and inquiring and acquiring the characteristic information of the original image from the block chain.
And the second image processing node performs recovery processing on the hidden information of the corresponding hidden image according to the image processing notice of the auditing node to obtain an original image, and then provides the original image for the image data using node. The image processing notification carries identification information of the hidden image, and is used for the second image processing node to acquire the hidden image; of course, the image data using node may also send the hidden image to the second image processing node through the auditing node.
S205, calculating characteristic information according to the acquired original image, and comparing the characteristic information with the characteristic information acquired from the block chain to verify the correctness of the original image.
The present embodiment is exemplified below:
the first image processing node can be a monitoring device, acquires original monitoring videos by calling a camera, calculates characteristic information of each section of original monitoring video, carries the characteristic information in an uploading transaction request, and transmits the characteristic information to a block chain network to realize uplink storage. The monitoring device can be a lightweight blockchain node, and the characteristic information of each section of original monitoring video can be the integral hash value of the original monitoring video or the hash value of each frame image in the original monitoring video; then, after each frame of image in the original monitoring video is subjected to hiding processing, for example, face mosaicing and the like in the image are stored in a data center.
The image data using node can be a block chain node, a hidden monitoring video with a hidden face is obtained from the data center for relevant personnel to check, when the relevant personnel think that the hidden face information needs to be checked, an obtaining request about the original monitoring video is initiated through the image data using node, and the obtaining request is sent to an auditing node for auditing and verification.
The audit node may be an audit authority controlled blockchain node. And after the audit mechanism passes the verification of the acquisition request by the audit node, sending an image processing notification to the second image processing node, so that the second image processing node provides the original monitoring video with the recovered face information to the image data using node, and simultaneously, the second image processing node can store the operation of recovering the face information and the associated data in a chain.
And searching and acquiring the characteristic information of the original monitoring video from the block chain by using the image data through the node, comparing the characteristic information with the locally calculated characteristic information of the original monitoring video, and verifying the correctness of the acquired original monitoring video.
In addition, in order to further ensure the compliance of each link operation in the whole image management process and increase reliable supervision, the nodes participating in the blockchain network further comprise a block chain node (not shown in fig. 3) controlled by a supervision mechanism, and the block chain node is used for supervising the compliance of transaction requests initiated by other nodes and confirming the compliance of the flow of authorizing the original image or the original monitoring video use permission to the image data use node by the auditing node.
According to the technical scheme of the embodiment, the first image processing node firstly provides the hidden image for the image data using node, and when the image data using node has an original image acquisition requirement, the second image processing node provides the original image for the image data using node, so that the effective management and control of the image authority are realized, the use authority of the original image has constraint, the problem that the privacy of the masses is easily leaked through the image is solved, and the user privacy related to the image is protected; meanwhile, by benefiting from the advantages of the block chain, the traceability of each link in the image management process is ensured through the uplink storage of related data, and the data tampering or counterfeiting phenomenon is effectively prevented; in addition, different image use scenes can be flexibly adapted through the role distinguishing deployment of the image processing nodes, for example, in a city supervision scene, the first image processing nodes can be deployed in different monitoring areas in a distributed mode to achieve comprehensive monitoring, the second image processing nodes are deployed in a centralized mode to respond to the acquisition requirements of the original images in a centralized mode, and therefore the wide applicability of the scheme is improved.
Fig. 4 is a flowchart of another image management method based on a block chain according to an embodiment of the present disclosure, and this embodiment may be applied to a situation where an original image carrying privacy information is effectively managed and the usage right of the original image is reasonably controlled through interaction between an image data usage node and an image processing node based on a block chain network. The method of the embodiment may be performed by an image management apparatus based on a blockchain network, and the apparatus may be implemented in a software and/or hardware manner and may be configured in an image processing node.
In this embodiment, the image management method applied to the image processing node is executed in cooperation with any of the image management methods applied to the image data using node, and the details not described in detail in this embodiment may refer to the descriptions in any of the above embodiments.
As shown in fig. 4, the image management method based on a block chain disclosed in this embodiment may include:
s401, obtaining an original image and carrying out hiding processing to obtain a hidden image.
S402, calculating the characteristic information of the original image, sending an uploading transaction request of the characteristic information to the block chain network, and storing the transaction request in the above chain.
The uploading transaction request can carry a signature of the image processing node, the signature can be generated by using an account private key of the image processing node, and the signature can be used for verifying the credibility of the characteristic information of other block link points. Of course, in this embodiment, any blockchain node may carry its signature in the transaction request during the process of initiating the transaction request, so as to be used for verifying the relevant information in the transaction request.
And S403, providing the hidden image to the image data using node, and providing the original image to the image data using node according to the acquisition request of the image data using node.
Optionally, providing an original image to the image data using node according to the request for obtaining the image data using node includes:
acquiring an image processing notification sent by an audit node, wherein the image processing notification is sent after the audit node passes the verification of an acquisition request of an image data use node;
according to the image processing notification, carrying out recovery processing on hidden information on the hidden image to obtain an original image;
and sending the original image to the image data using node.
Further, acquiring an image processing notification sent by the audit node includes:
an image processing notification is obtained via a notification processing contract deployed in a blockchain network, wherein the image processing notification is initiated by an audit node using the notification processing contract. The pre-deployed notification processing contract is used for realizing the operations of initiating, receiving and the like of the image processing notification in the block chain network, so that the acquisition efficiency of the original image can be improved, and the safety and the supervision performance of the use process of the original image are improved.
Optionally, in the process of performing recovery processing on hidden information on the hidden image according to the image processing notification to obtain the original image, the method in this embodiment further includes:
and generating an operation transaction request according to the operation behavior and the associated data in the hidden information recovery processing process, transmitting the operation transaction request to the block chain network, and storing the operation transaction request in the chain, thereby ensuring the traceability of the operation.
Optionally, the image processing nodes include a first image processing node and a second image processing node, and the first image processing node and the second image processing node are deployed in different hardware devices;
the first image processing node is used for acquiring an original image, carrying out hiding processing on the original image and storing the characteristic information of the original image in a block chain;
the second image processing node is for providing the original image to the image data usage node.
Optionally, the type of the original image includes a monitoring image; the hiding process comprises a face hiding process; the image data usage node includes a block chain node.
According to the technical scheme of the embodiment, the hidden image is firstly provided for the image data using node through the image processing node, and the original image is provided for the image data using node when the original image obtaining requirement exists in the image data using node, so that the effective management and control of the image authority are realized, the use authority of the original image has constraint, the problem that the privacy of the masses is easily leaked through the image is solved, and the user privacy related to the image is protected; meanwhile, by benefiting from the advantages of the block chain, the traceability of each link in the image management process is ensured through the uplink storage of related data, and the data tampering or counterfeiting phenomenon is effectively prevented.
Fig. 5 is a schematic structural diagram of an image management apparatus based on a block chain according to an embodiment of the present application, where this embodiment may be applied to a block chain network, and through interaction between an image data using node and an image processing node, an original image carrying privacy information is effectively managed, and a use permission of the original image is reasonably controlled. The device of the embodiment can be realized in a software and/or hardware mode, and can be configured at an image data using node. The image data usage node may be deployed on an electronic device controlled by any entity or person having a demand for use of an image.
As shown in fig. 5, the block chain-based image management apparatus 500 disclosed in the present embodiment includes a hidden image acquisition module 501, an original image acquisition module 502, and an image verification module 503, where:
a hidden image obtaining module 501, configured to obtain a hidden image obtained by performing hidden processing on an original image, where the hidden image is subjected to hidden processing by an image processing node, and feature information of the original image corresponding to the hidden image is stored in a block chain by the image processing node;
an original image obtaining module 502, configured to obtain an original image provided by an image processing node, and query and obtain feature information of the original image from a block chain;
the image verification module 503 is configured to calculate feature information according to the obtained original image, and compare the feature information with the feature information obtained from the block chain to verify the correctness of the original image.
Optionally, the apparatus in this embodiment further includes a request initiating module, configured to initiate an obtaining request for the original image based on the hidden image before the original image obtaining module 502 performs an operation of obtaining the original image provided by the image processing node, and send the obtaining request as a transaction request to the blockchain network, where the transaction request is stored in the blockchain.
Optionally, the obtaining request includes at least one of the following information: the image data uses the identity information of the node, the reason for image acquisition, the time of request transmission, and the identity of the hidden image.
Optionally, the apparatus in this embodiment further includes a request verification module, configured to send an acquisition request to the audit node after the request initiation module performs an operation of initiating an acquisition request for the original image based on the hidden image, so as to request the audit node to verify the acquisition request.
Optionally, the image processing nodes include a first image processing node and a second image processing node, and the first image processing node and the second image processing node are deployed in different hardware devices;
the first image processing node is used for acquiring an original image, carrying out hiding processing on the original image and storing the characteristic information of the original image in a block chain;
the second image processing node is for providing the original image to the image data usage node.
Optionally, the type of the original image includes a monitoring image;
the hiding process comprises a face hiding process;
the image data usage node includes a block chain node.
The image management apparatus 500 based on the block chain and configurable in the image data using node disclosed in the embodiment of the present application can execute any image management method based on the block chain and applied to the image data using node disclosed in the embodiment of the present application, and has corresponding functional modules and beneficial effects of the execution method. Reference may be made to the description of any method embodiment of the present application for details not explicitly described in this embodiment.
Fig. 6 is a schematic structural diagram of another image management apparatus based on a block chain according to an embodiment of the present application, which may be applied to a block chain network, and perform effective management on an original image carrying private information through interaction between an image data using node and an image processing node, so as to reasonably control a use permission of the original image. The device of the embodiment can be realized in a software and/or hardware mode, and can be configured in an image processing node.
As shown in fig. 6, the image management apparatus 600 based on block chain according to the present embodiment includes a hiding processing module 601, an image feature chaining module 602, and an image providing module 603, wherein:
a hiding processing module 601, configured to obtain an original image and perform hiding processing to obtain a hidden image;
an image characteristic uplink module 602, configured to calculate characteristic information of an original image, and send an upload transaction request of the characteristic information to a blockchain network, where the upload transaction request is stored in an uplink;
an image providing module 603, configured to provide the hidden image to the image data using node, and provide the original image to the image data using node according to an acquisition request of the image data using node.
Optionally, the image providing module 603 includes:
a hidden image providing unit for providing a hidden image to the image data usage node;
the notification acquisition unit is used for acquiring an image processing notification sent by the audit node, wherein the image processing notification is sent after the audit node verifies the acquisition request of the image data using node;
the information recovery unit is used for recovering the hidden information of the hidden image according to the image processing notice to obtain an original image;
an original image providing unit for transmitting the original image to the image data using node.
Optionally, the image providing module 603 further includes an operation chaining unit, configured to perform, in the information recovery unit, recovery processing on the hidden information for the hidden image according to the image processing notification, and generate an operation transaction request according to an operation behavior and associated data in the recovery processing process for the hidden information in the process of obtaining the original image, and transmit the operation transaction request to the block chain network, where the operation transaction request is stored in the above chain.
Optionally, the notification obtaining unit is specifically configured to:
an image processing notification is obtained via a notification processing contract deployed in a blockchain network, wherein the image processing notification is initiated by an audit node using the notification processing contract.
Optionally, the image processing nodes include a first image processing node and a second image processing node, and the first image processing node and the second image processing node are deployed in different hardware devices;
the first image processing node is used for acquiring an original image, carrying out hiding processing on the original image and storing the characteristic information of the original image in a block chain;
the second image processing node is for providing the original image to the image data usage node.
Optionally, the type of the original image includes a monitoring image;
the hiding process comprises a face hiding process;
the image data usage node includes a block chain node.
The image management apparatus 600 based on a block chain and configurable in an image processing node disclosed in the embodiment of the present application can execute any image management method based on a block chain and applied to an image processing node disclosed in the embodiment of the present application, and has functional modules and beneficial effects corresponding to the execution method. Reference may be made to the description of any method embodiment of the present application for details not explicitly described in this embodiment.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided. The electronic device is used for exemplifying hardware devices on which the image data usage node or the image processing node depends.
As shown in fig. 7, fig. 7 is a block diagram of an electronic device for implementing an image management method based on a block chain in an embodiment of the present application, where the image management method based on a block chain includes: an image management method applied to an image data usage node or to an image processing node. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of embodiments of the present application described and/or claimed herein.
As shown in fig. 7, the electronic apparatus includes: one or more processors 701, a memory 702, and interfaces for connecting the various components, including a high-speed interface and a low-speed interface. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display Graphical information for a Graphical User Interface (GUI) on an external input/output device, such as a display device coupled to the Interface. In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations, e.g., as a server array, a group of blade servers, or a multi-processor system. In fig. 7, one processor 701 is taken as an example. In addition, for the electronic device for implementing the image management method applied to the image processing node in the embodiment of the present application, the electronic device may further include a camera for collecting an original image, where the original image carries the privacy information.
The memory 702 is a non-transitory computer readable storage medium provided by the embodiments of the present application. The memory stores instructions executable by at least one processor to cause the at least one processor to execute the method for block chain based image management provided by the embodiment of the application. The non-transitory computer-readable storage medium of the embodiments of the present application stores computer instructions for causing a computer to execute the block chain based image management method provided by the embodiments of the present application.
The memory 702 is a non-transitory computer readable storage medium, and can be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the block chain based image management method in the embodiment of the present application, for example, the hidden image acquisition module 501, the original image acquisition module 502, and the image verification module 503 shown in fig. 5, or for example, the hidden processing module 601, the image feature linking module 602, and the image providing module 603 shown in fig. 6. The processor 701 executes various functional applications and data processing of the electronic device by running non-transitory software programs, instructions and modules stored in the memory 702, that is, implements the block chain based image management method in the above-described method embodiment.
The memory 702 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the electronic device based on the image management method of the block chain, and the like. Further, the memory 702 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 702 may optionally include a memory remotely disposed from the processor 701, and these remote memories may be connected to an electronic device for implementing the block chain based image management method in the present embodiment through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device for implementing the image management method based on the block chain in the embodiment may further include: an input device 703 and an output device 704. The processor 701, the memory 702, the input device 703 and the output device 704 may be connected by a bus or other means, and fig. 7 illustrates an example of a connection by a bus.
The input device 703 may receive input numeric or character information and generate key signal inputs related to user settings and function controls of an electronic apparatus for implementing the blockchain-based image management method in the present embodiment, such as a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointer, one or more mouse buttons, a track ball, a joystick, and the like.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, Integrated circuitry, Application Specific Integrated Circuits (ASICs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or Device for providing machine instructions and/or data to a Programmable processor, such as a magnetic disk, optical disk, memory, Programmable logic Device (P L D), including a machine-readable medium that receives machine instructions as a machine-readable signal.
The systems and techniques described here can be implemented on a computer having a display device, e.g., a Cathode Ray Tube (CRT) or L CD monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer for providing interaction with the user.
The systems and techniques described here can be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., AN application server, or that includes a front-end component, e.g., a user computer having a graphical user interface or a web browser through which a user can interact with AN implementation of the systems and techniques described here, or any combination of such back-end, middleware, or front-end components.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
According to the technical scheme of the embodiment of the application, the hidden image is firstly provided for the image data using node through the image processing node, and the original image is provided for the image data using node when the original image obtaining requirement exists in the image data using node, so that the effective management and control of the image authority are realized, the use authority of the original image has constraint, the problem that the privacy of the masses is easily leaked through the image is solved, and the user privacy related to the image is protected; meanwhile, by benefiting from the advantages of the block chain, the traceability of each link in the image management process is ensured through the uplink storage of related data, and the data tampering or counterfeiting phenomenon is effectively prevented.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present application can be achieved, and the present invention is not limited herein.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (17)

1. An image management method based on a block chain, which is applied to an image data usage node, the method comprising:
acquiring a hidden image of an original image after hiding, wherein the hidden image is hidden by an image processing node, and the characteristic information of the original image corresponding to the hidden image is stored in a block chain by the image processing node;
acquiring the original image provided by the image processing node, and inquiring and acquiring the characteristic information of the original image from the block chain;
and calculating characteristic information according to the acquired original image, and comparing the characteristic information with the characteristic information acquired from the block chain to verify the correctness of the original image.
2. The method of claim 1, further comprising, prior to acquiring the raw image provided by the image processing node:
and initiating an acquisition request aiming at the original image based on the hidden image, and sending the acquisition request as a transaction request to a block chain network for uplink storage.
3. The method of claim 2, wherein the obtaining request comprises at least one of the following information: the image data uses the identity information of the node, the reason for image acquisition, the time of request transmission, and the identity of the hidden image.
4. The method of claim 2, after initiating an acquisition request for the original image based on the hidden image, further comprising:
and sending the acquisition request to an audit node to request the audit node to verify the acquisition request.
5. The method of claim 1, wherein the image processing nodes comprise a first image processing node and a second image processing node, the first image processing node and the second image processing node deployed on different hardware devices;
the first image processing node is used for acquiring the original image, hiding the original image and storing the characteristic information of the original image in the block chain;
the second image processing node is configured to provide the original image to the image data usage node.
6. The method of claim 1, wherein:
the type of the original image comprises a monitoring image;
the hiding process comprises a face hiding process;
the image data usage node includes a blockchain node.
7. An image management method based on a block chain is applied to an image processing node, and the method comprises the following steps:
acquiring an original image and carrying out hiding processing to obtain a hidden image;
calculating the characteristic information of the original image, sending an uploading transaction request of the characteristic information to a block chain network, and storing the uploading transaction request in an uplink;
and providing the hidden image to an image data using node, and providing the original image to the image data using node according to an acquisition request of the image data using node.
8. The method according to claim 7, wherein providing the original image to the image data usage node according to the acquisition request of the image data usage node comprises:
acquiring an image processing notification sent by an audit node, wherein the image processing notification is sent after an acquisition request of the audit node for the image data use node is verified;
according to the image processing notification, carrying out recovery processing on hidden information on the hidden image to obtain the original image;
and sending the original image to the image data using node.
9. The method according to claim 8, wherein, in the process of performing recovery processing of hidden information on the hidden image according to the image processing notification to obtain the original image, the method further comprises:
and generating an operation transaction request according to the operation behavior and the associated data in the hidden information recovery processing process, transmitting the operation transaction request to the block chain network, and storing the operation transaction request in the chain.
10. The method according to claim 8, wherein the obtaining of the image processing notification sent by the auditing node comprises:
obtaining the image processing notification through a notification processing contract deployed in a blockchain network, wherein the image processing notification is initiated by the audit node using the notification processing contract.
11. The method of claim 7, wherein the image processing nodes comprise a first image processing node and a second image processing node, the first image processing node and the second image processing node deployed on different hardware devices;
the first image processing node is used for acquiring the original image, hiding the original image and storing the characteristic information of the original image in the block chain;
the second image processing node is configured to provide the original image to the image data usage node.
12. The method of claim 7, wherein:
the type of the original image comprises a monitoring image;
the hiding process comprises a face hiding process;
the image data usage node includes a blockchain node.
13. An image management apparatus based on a block chain, configured at an image data usage node, the apparatus comprising:
the hidden image acquisition module is used for acquiring a hidden image of an original image after hidden processing, wherein the hidden image is hidden by an image processing node, and the characteristic information of the original image corresponding to the hidden image is stored in a block chain by the image processing node;
an original image obtaining module, configured to obtain the original image provided by the image processing node, and query and obtain feature information of the original image from the block chain;
and the image verification module is used for calculating characteristic information according to the acquired original image and comparing the characteristic information with the characteristic information acquired from the block chain so as to verify the correctness of the original image.
14. An image management apparatus based on a block chain, configured at an image processing node, the apparatus comprising:
the hidden processing module is used for acquiring an original image and carrying out hidden processing to obtain a hidden image;
the image characteristic uplink module is used for calculating the characteristic information of the original image, sending an uploading transaction request of the characteristic information to a block chain network, and storing the uploading transaction request in an uplink;
and the image providing module is used for providing the hidden image for an image data using node and providing the original image for the image data using node according to the acquisition request of the image data using node.
15. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the blockchain based image management method of any one of claims 1 to 6 or to perform the blockchain based image management method of any one of claims 7 to 12.
16. The electronic device of claim 15, wherein if the blockchain-based image management method executed by the processor is applied to an image processing node, the electronic device further comprises a camera for capturing an original image.
17. A non-transitory computer readable storage medium storing computer instructions for causing a computer to execute the blockchain-based image management method of any one of claims 1 to 6 or the blockchain-based image management method of any one of claims 7 to 12.
CN202010096595.0A 2020-02-17 2020-02-17 Image management method, apparatus, device, and medium based on block chain Pending CN111400746A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010096595.0A CN111400746A (en) 2020-02-17 2020-02-17 Image management method, apparatus, device, and medium based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010096595.0A CN111400746A (en) 2020-02-17 2020-02-17 Image management method, apparatus, device, and medium based on block chain

Publications (1)

Publication Number Publication Date
CN111400746A true CN111400746A (en) 2020-07-10

Family

ID=71430368

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010096595.0A Pending CN111400746A (en) 2020-02-17 2020-02-17 Image management method, apparatus, device, and medium based on block chain

Country Status (1)

Country Link
CN (1) CN111400746A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112784877A (en) * 2020-12-30 2021-05-11 杭州趣链科技有限公司 Large-scale image template matching method and device based on block chain

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296559A (en) * 2015-05-26 2017-01-04 中兴通讯股份有限公司 Image processing method and device
CN107180203A (en) * 2017-06-28 2017-09-19 维沃移动通信有限公司 Image encryption, decryption method, mobile terminal and computer-readable recording medium
CN109002487A (en) * 2018-06-25 2018-12-14 百度在线网络技术(北京)有限公司 A kind of post-processing approach based on copyright registration information, device, equipment and medium
CN109359206A (en) * 2018-10-17 2019-02-19 郑称德 Image processing method and system based on Internet of Things campus administration
CN109376504A (en) * 2018-09-26 2019-02-22 福州大学 A kind of picture method for secret protection based on block chain technology
CN109714348A (en) * 2018-12-29 2019-05-03 百度在线网络技术(北京)有限公司 Permission processing method, device, equipment and the medium realized based on block chain
CN110287724A (en) * 2019-05-23 2019-09-27 顺丰科技有限公司 Data storage and verification method and device
CN110309663A (en) * 2019-06-25 2019-10-08 湖南搜云网络科技股份有限公司 Privacy authenticating method and system based on block chain
CN110598474A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Data acquisition method, system, device and storage medium based on block chain
CN110610101A (en) * 2019-09-17 2019-12-24 北京百度网讯科技有限公司 Data storage method, device, equipment and storage medium
CN110688668A (en) * 2019-09-02 2020-01-14 平安普惠企业管理有限公司 Electronic contract storage method and device and electronic equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296559A (en) * 2015-05-26 2017-01-04 中兴通讯股份有限公司 Image processing method and device
CN107180203A (en) * 2017-06-28 2017-09-19 维沃移动通信有限公司 Image encryption, decryption method, mobile terminal and computer-readable recording medium
CN109002487A (en) * 2018-06-25 2018-12-14 百度在线网络技术(北京)有限公司 A kind of post-processing approach based on copyright registration information, device, equipment and medium
CN109376504A (en) * 2018-09-26 2019-02-22 福州大学 A kind of picture method for secret protection based on block chain technology
CN109359206A (en) * 2018-10-17 2019-02-19 郑称德 Image processing method and system based on Internet of Things campus administration
CN109714348A (en) * 2018-12-29 2019-05-03 百度在线网络技术(北京)有限公司 Permission processing method, device, equipment and the medium realized based on block chain
CN110287724A (en) * 2019-05-23 2019-09-27 顺丰科技有限公司 Data storage and verification method and device
CN110309663A (en) * 2019-06-25 2019-10-08 湖南搜云网络科技股份有限公司 Privacy authenticating method and system based on block chain
CN110688668A (en) * 2019-09-02 2020-01-14 平安普惠企业管理有限公司 Electronic contract storage method and device and electronic equipment
CN110610101A (en) * 2019-09-17 2019-12-24 北京百度网讯科技有限公司 Data storage method, device, equipment and storage medium
CN110598474A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Data acquisition method, system, device and storage medium based on block chain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112784877A (en) * 2020-12-30 2021-05-11 杭州趣链科技有限公司 Large-scale image template matching method and device based on block chain

Similar Documents

Publication Publication Date Title
CN111460429B (en) Task processing method, device, equipment and medium based on trusted execution environment
JP7069286B2 (en) Privacy data processing methods, privacy data processing devices, devices and media
CN111741026B (en) Cross-chain transaction request processing method, device, equipment and storage medium
US20210083856A1 (en) Improved hardware security module management
CN110535970B (en) Evidence storing and processing method, device, equipment and medium of judicial chain
CN110084600B (en) Processing and verifying method, device, equipment and medium for resolution transaction request
CN110602214B (en) Evidence storing and processing method, device, equipment and medium of judicial chain
CN111614761B (en) Block chain message transmission method, device, computer and readable storage medium
US20140223518A1 (en) Authentication and authorization method and system
US9973494B2 (en) Upload management system, method for controlling upload management system, and storage medium
CN111737365A (en) Storage certificate processing method, device, equipment and storage medium
CN110808839B (en) Processing method, device, equipment and medium for block chain abnormal data
CN110610101A (en) Data storage method, device, equipment and storage medium
CN111274596B (en) Device interaction method, authority management method, interaction device and user side
CN110636063B (en) Method and device for controlling secure interaction of equipment, electronic equipment and storage medium
CN111400746A (en) Image management method, apparatus, device, and medium based on block chain
CN111741012B (en) Authorization signature generation method, node management method, device, equipment and medium
CN112200680B (en) Block link point management method, device, computer and readable storage medium
US20150150143A1 (en) System and method for providing virtual desktop infrastructure (vdi) service
CN111682945A (en) Block chain authority control method, device, equipment and medium
CN110535842B (en) Mimic security system and method based on sampling detection
CN111541649B (en) Password resetting method and device, server and storage medium
CN112948499A (en) Information acquisition method and device, electronic equipment and storage medium
US20230092069A1 (en) Server apparatus
US20210044965A1 (en) Cloud controlled secure bluetooth pairing for network device management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination