CN112989111A - Video storage management method and system based on block chain - Google Patents

Video storage management method and system based on block chain Download PDF

Info

Publication number
CN112989111A
CN112989111A CN202110423846.6A CN202110423846A CN112989111A CN 112989111 A CN112989111 A CN 112989111A CN 202110423846 A CN202110423846 A CN 202110423846A CN 112989111 A CN112989111 A CN 112989111A
Authority
CN
China
Prior art keywords
data
video data
video
information acquisition
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110423846.6A
Other languages
Chinese (zh)
Other versions
CN112989111B (en
Inventor
赵敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Bailence Intelligent Technology Co Ltd
Original Assignee
Nanjing Bailence Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Bailence Intelligent Technology Co Ltd filed Critical Nanjing Bailence Intelligent Technology Co Ltd
Priority to CN202110423846.6A priority Critical patent/CN112989111B/en
Publication of CN112989111A publication Critical patent/CN112989111A/en
Application granted granted Critical
Publication of CN112989111B publication Critical patent/CN112989111B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/71Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention provides a video storage management method and a video storage management system based on a block chain, wherein the method specifically comprises the following steps: receiving video data uploaded by a video information acquisition group; preprocessing the video data, storing the original video data to a cloud end, and storing the preprocessed video data to a block chain; when the video data is requested to be read, verifying the request information, and granting the read authority after the verification is successful. The video data is stored through the block chain with the distributed characteristic, the non-writable tamper property of the data is guaranteed, and the data security is realized. On the other hand, the calculation amount of the block chain in the process of updating the stored data is greatly reduced by combining with cloud storage, and meanwhile, the system breakdown phenomenon caused by damage of the central node is avoided due to the characteristics of the distributed block chain, so that the robustness of the system is improved.

Description

Video storage management method and system based on block chain
Technical Field
The invention relates to a video storage management method and a video storage management system based on a block chain, in particular to the field of H04B.
Background
With the development of computer technology, data storage brings great convenience for later-stage data search and evidence. However, in the prior art, the security of data backup becomes a primary problem, no matter the data backup is self-storage or cloud storage, the encryption is easy to crack, so that a hacker can easily crack the data backup, and meanwhile, the hidden danger of tampering of internal personnel can also occur for enterprise-type data backup, so that the difficulty is brought to later-stage data search.
Disclosure of Invention
The purpose of the invention is as follows: a video storage management method and system based on a block chain are provided to solve the above problems in the prior art.
The technical scheme is as follows: in a first aspect, a video storage management method based on a block chain is provided, where the method specifically includes the following steps:
receiving video data uploaded by a video information acquisition group;
preprocessing the video data, storing the original video data to a cloud end, and storing the preprocessed video data to a block chain;
when the video data is requested to be read, verifying the request information, and granting a reading permission after successful verification;
the method comprises the following steps that at least one information acquisition device forms a video information acquisition group, and acquired video data are transmitted to an edge node server through a base station;
the edge node server stores the video data to a local database, uploads the preprocessed video data to a cloud end according to bandwidth allocated according to needs, and deletes the data in the local database after receiving confirmation information that the cloud end confirms that the storage is finished.
In some implementation manners of the first aspect, according to the on-demand allocation manner, when the video data is transmitted to the cloud, the bandwidth allocation partitioning information acquisition device transmits the video data to the edge node server, and the edge node server transmits the video data to the cloud.
When the video data is transmitted from the information acquisition device to the edge node server, if the total bandwidth in the cloud is B, the bandwidth allocated to the ith edge node server according to the weight is:
Figure 100002_DEST_PATH_IMAGE002
in the formula, B represents the total bandwidth in the cloud;
Figure 100002_DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented; dig represents the total number of information collecting apparatuses.
According to the probability of successful transmission and the probability of transmission failure when the information acquisition equipment transmits data, the probability of successful transmission and the probability of transmission failure of all the information acquisition equipment of the edge node server, the probability of idle traditional channels between the information acquisition equipment and the cloud end, and the time consumed in the transmission process of video data, the proportion of the transmission medium occupied by the ith information acquisition equipment in the total transmission medium is obtained:
Figure 100002_DEST_PATH_IMAGE006
in the formula (I), the compound is shown in the specification,
Figure 354133DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented;
Figure 100002_DEST_PATH_IMAGE008
the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices is represented;
Figure 100002_DEST_PATH_IMAGE010
the transmission rate of a physical layer of the ith information acquisition device is represented;
Figure 100002_DEST_PATH_IMAGE012
representing header consumption of a physical layer connection protocol and events required by a previous connection; h denotes a header and acknowledgement frame sequence of the medium access control layer;
Figure 100002_DEST_PATH_IMAGE014
the length of a data packet transmitted by the ith information acquisition device is represented; ST represents the short interframe space in the transmission protocol; CT indicates the duration of time required to receive the acknowledgement frame; XT represents an inter-coordination gap;
Figure 100002_DEST_PATH_IMAGE016
represents the smallest transmission window;
Figure 100002_DEST_PATH_IMAGE018
a physical layer constant is represented by a physical layer constant,
Figure 100002_DEST_PATH_IMAGE020
indicating the time required for the i-th information collecting device to successfully transmit a data packet.
According to the proportion
Figure 100002_DEST_PATH_IMAGE022
The probability that the signal acquisition equipment occupies the transmission medium in proportion to the total transmission medium and only competes for the transmission medium can be obtained
Figure 691442DEST_PATH_IMAGE008
In connection with, due to
Figure 427317DEST_PATH_IMAGE008
The relationship with the contention window is:
Figure 100002_DEST_PATH_IMAGE024
the proportion of the transmission medium occupied by the information acquisition device in the total transmission medium can be obtained according to the contention window parameter, so that the effective bandwidth of the effective bandwidth value required by the connection of one edge node server with the information acquisition device is as follows:
Figure 100002_DEST_PATH_IMAGE026
introduced Lagrange non-negative multiplier
Figure 100002_DEST_PATH_IMAGE028
Obtaining the optimized bandwidth of any information acquisition equipment, namely the size of the optimal bandwidth of the information acquisition equipment
Figure 100002_DEST_PATH_IMAGE030
Figure 100002_DEST_PATH_IMAGE032
In the formula (I), the compound is shown in the specification,
Figure 100002_DEST_PATH_IMAGE034
Figure 100002_DEST_PATH_IMAGE036
Figure 100002_DEST_PATH_IMAGE038
is a predetermined constant, and
Figure 100002_DEST_PATH_IMAGE040
is a minimization distortion function;
Figure 814435DEST_PATH_IMAGE010
represents a coding rate;
Figure 100002_DEST_PATH_IMAGE042
representing the frame rate of the video file.
In some implementations of the first aspect, the video data is pre-processed into the block chain by: firstly, a video data storage interval is created in advance, and a cache address of the video data is read; secondly, acquiring and coding each frame according to the time sequence; thirdly, storing the coded video data into the video data storage interval; when the acquired video data meet the preset size of the video data storage interval, closing the current video data storage interval and creating a new video storage interval; finally, the video data storage intervals form a video data transmission queue according to the time sequence.
In the coding process, the depth is predicted through the correlation degree of the inter-layer, space and time, the coded depth is coded under the condition of removing the depth with low possibility, the intra-frame mode is skipped on the premise that whether the residual coefficient obeys Gaussian distribution or not is judged, the left and right or up and down division is carried out on the residual coefficient obtained by the depth coding, and whether the depth coding is terminated in advance is judged according to the significance of the difference.
In some implementations of the first aspect, the video data is pre-processed into a block chain by:
creating a video data storage interval;
reading a cache address of the video data;
acquiring and coding each frame according to the time sequence;
storing the encoded video data into the video data storage interval;
when the acquired video data meet the preset size of the video data storage interval, closing the current video data storage interval and creating a new video storage interval;
the video data storage intervals form a video data transmission queue according to a time sequence, and after hash encryption is carried out on each of the adjacent video data storage intervals, the hash encryption is carried out on every two adjacent video data storage intervals until a final hash value is obtained;
and storing the final hash value as a video abstract value into the block chain.
In some realizations of the first aspect, the block chain is formed of at least one block; the block comprises a block head and a block body; the block header comprises a hash value of a previous block, a timestamp, a Merkle root and a number of a current block; the block body includes detailed information of video data in the form of a Merkle tree. The purposes of 'compressing' and preventing falsification of transaction information are achieved while video data is verified and summarized quickly.
In some implementations of the first aspect, the video data request validation process is completed by the user node, the cloud storage node, the proxy node, and the blockchain; the user nodes are owners of original video data and are further divided into data request nodes and data response nodes; the cloud storage node is a node for realizing cloud data storage; the agent node is used for deploying intelligent contracts, maintaining data requests and responding to the data requests.
In some implementations of the first aspect, the process of requesting the video data to be read further comprises:
the data request node sends video data request information to a data response node through an intelligent contract deployed by the agent node;
the intelligent contract generates an identity certificate of the data request node and returns the identity certificate to the data request node;
the data request node applies for video data reading permission to the cloud storage node according to the identity certificate;
the cloud storage node verifies the identity certificate, and sends the video data requested by the data request node to the data request node after the verification is successful;
the data request node receives video data sent by the cloud storage node and verifies the validity, and when the verification result is valid, a successful downloading message is broadcast;
the implementation process is logged into the blockchain.
In some implementations of the first aspect, the data interaction between the nodes involves encryption and decryption of data, and data signing and signature verification during the process of the video data being requested to be read.
The encryption is to encrypt the data by using a public key; and the decryption is to decrypt the data by using a private key after receiving the encrypted data.
The signature is a data signature by using a private key; and the signature verification is to utilize the public key to verify the signature of the data after the signature is received.
The public key is set to correspond to the private key and is used for generating an address for data interaction and encrypting data in the data transmission process to finish the data interaction.
The private key is arranged in the data signature to verify the identity of the private key to nodes except the private key.
In some implementation manners of the first aspect, in a process that the video data is requested to be read, the cloud storage node verifies and signs the signed identification information in a block chain by using a public key of a data request node; the signed identification information is identification information formed by the data request node through self private key signature;
when the verification result is that the verification information is passed, the cloud storage node returns verification information carrying the cloud storage node signature to the data request node; otherwise, the data request fails;
the data request node verifies the received verification information;
when the verification passes, data interaction is carried out through a data transmission path; otherwise, the data request fails.
In a second aspect, there is provided a block link point, the node comprising:
a memory arranged to store a computer program;
a processor arranged to execute the computer program in the memory to implement any one of the method steps.
In a third aspect, a blockchain-based video storage management system is provided, which includes at least one blockchain node. The blockchain node is arranged to perform any one of the method steps.
Has the advantages that: the invention provides a video storage management method and system based on a block chain.A lightweight verifiable protection system based on the block chain is used for placing acquired data in cloud storage and placing a data abstract value in the block chain, so that the problem of small data storage space is solved; meanwhile, due to the characteristics of the distributed block chains, the system collapse phenomenon caused by the damage of the central node is avoided, and the robustness of the system is improved; the data covering the time stamp form a traceable data string after being encrypted by the hash function, and whether the data is tampered or not can be quickly verified by comparing hash values, so that the accuracy of the data is guaranteed. On the other hand, due to the realization of the decentralized blockchain, the data on the blockchain is more public and transparent, and the common management of multiple platforms and multiple units is more facilitated.
Drawings
FIG. 1 is a flow chart of data processing according to an embodiment of the present invention.
FIG. 2 is a block diagram of a block of a recording medium according to an embodiment of the present invention.
Detailed Description
According to the video storage management method and system based on the block chain, the video storage based on the block chain technology is realized, and the reliability, the automation and the convenience of a large amount of data in the transmission and storage process are ensured. In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In an embodiment, a video storage management method based on a block chain is provided, as shown in fig. 1, the method specifically includes the following steps:
receiving video data uploaded by a video information acquisition group;
preprocessing the video data, storing the original video data to a cloud end, and storing the preprocessed video data to a block chain;
when the video data is requested to be read, verifying the request information, and granting the read authority after the verification is successful.
In a further embodiment, at least one information acquisition device forms a video information acquisition group, and the information acquisition device records the corresponding surrounding environment in real time in a video data mode. Each information acquisition group is connected with one base station, and data interaction is carried out between the base station and the edge node server.
Specifically, the information acquisition device uploads the acquired video data to the edge node server through the base station, the edge node server is connected with the local database, and the received video data are stored in the local database.
Meanwhile, the edge node server preprocesses the video data and transmits the processed video data to the cloud and the block chain, and when the confirmation information of successful uploading of the cloud is received, the video data information stored in the local database is deleted. Therefore, the storage pressure of the local database is reduced while the video data is stored for a long time.
In a further embodiment, the video data is pre-processed into a block chain by: firstly, a video data storage interval is created in advance, and a cache address of the video data is read; secondly, acquiring and coding each frame according to the time sequence; thirdly, storing the coded video data into the video data storage interval; when the acquired video data meet the preset size of the video data storage interval, closing the current video data storage interval and creating a new video storage interval; finally, video data storage intervals form a video data transmission queue according to a time sequence, as shown in fig. 2, after hash encryption is respectively performed on adjacent video data storage intervals, hash encryption is performed on every two adjacent video data storage intervals until a final hash value is obtained, and the final hash value is stored in the block chain as a video digest value. By compression coding the video data, the method can weaken redundant information, and simultaneously achieve the purposes of occupying less resources and acquiring more data transmission quantity.
Specifically, on the premise that the quality of the reconstructed video can meet the requirement by using the visual retention, the video data is greatly compressed in the allowable minimum distortion range by using a lossy video compression mode, so that the condition that the frequency band is limited in the transmission process is relieved.
In the coding process, the depth is predicted through the correlation degree of the inter-layer, space and time, the coded depth is coded under the condition of removing the depth with low possibility, the intra-frame mode is skipped on the premise of judging whether the residual coefficient obeys Gaussian distribution, the residual coefficient obtained by depth coding is divided left and right or up and down, whether the depth coding is stopped in advance is judged according to the significance of the difference, and therefore the coding efficiency is improved and the rapid coding is realized.
Firstly, predicting the depth of a current coding unit; secondly, coding by adopting an interlayer mode; thirdly, judging whether the current interlayer mode is the optimal mode; if the judgment result is negative, adopting an intra-frame coding mode, and continuously judging whether the current depth is the optimal depth, otherwise, directly judging whether the current depth is the optimal depth; finally, when the judgment result is yes, stopping depth coding; otherwise, returning to the interlayer coding, and continuing the loop iteration.
When a large amount of video data are transmitted to the cloud, the data transmission delay or transmission failure problem is often caused due to the collision of the data in the transmission channel and the error of the transmission channel, and on the other hand, the possibility of data tampering is enhanced through long-time data processing, so that the reliability of the initial data is not high. The invention solves the problems by the way that the base station and the edge node server assist the user to transmit and process the video data and allocate the bandwidth according to the needs.
In a further embodiment, effective bandwidths required by all video information acquisition devices are estimated through an optimized bandwidth allocation method, and in practical application, according to the bandwidth size in a network, the optimal bandwidth size required by different information acquisition devices is obtained under the condition that the actual bandwidth is not exceeded.
Specifically, the bandwidth allocation includes the division between the cloud and the edge node server and the division between the edge node server and each information acquisition device. When there are N edge node servers, if the total bandwidth in the cloud is B, the bandwidth allocated to the ith edge node server according to the weight is:
Figure DEST_PATH_IMAGE002A
in the formula, B represents the total bandwidth in the cloud;
Figure 889838DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented; dig represents the total number of information collecting apparatuses.
When each edge node server distributes the acquired bandwidth to the information acquisition equipment connected with the edge node server, the bandwidth is reasonably distributed under the condition of ensuring the minimum loss of video image quality according to the performance of each information acquisition equipment. Dividing the data transmission in the information acquisition equipment into an application layer, a connection layer and a physical layer, and when the transmission rate of the physical layer of the ith information acquisition equipment is
Figure 601311DEST_PATH_IMAGE010
The video encoding rate of the application layer is
Figure DEST_PATH_IMAGE044
In time, the channel width occupied by the information acquisition equipment is:
Figure DEST_PATH_IMAGE046
then there are:
Figure DEST_PATH_IMAGE048
in the formula (I), the compound is shown in the specification,
Figure DEST_PATH_IMAGE050
the effective bandwidth value required by all information acquisition equipment connected with an edge node server is represented;
Figure 683536DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented;
Figure 889390DEST_PATH_IMAGE030
the channel width occupied by the ith information acquisition equipment is represented, and the value range is [0,1 ]]。
And optimizing the effective bandwidth value required by the information acquisition equipment according to the error rate of the transmission channel, the collision rate of a plurality of files in the transmission process and different file lengths. The reason for the transmission failure of the information acquisition equipment is mainly caused by channel errors, and when the probability that the ith information acquisition equipment competes for the transmission medium with other information acquisition equipment is
Figure 130884DEST_PATH_IMAGE008
When the probability of transmission failure is
Figure DEST_PATH_IMAGE052
The probability of successful transmission is
Figure DEST_PATH_IMAGE054
Namely:
Figure DEST_PATH_IMAGE056
Figure DEST_PATH_IMAGE058
in the formula (I), the compound is shown in the specification,
Figure 623045DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented;
Figure 333512DEST_PATH_IMAGE008
indicating the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices. Therefore, the probability of successful transmission of all the information acquisition devices in the ith edge node server is as follows:
Figure DEST_PATH_IMAGE060
in the formula (I), the compound is shown in the specification,
Figure 530007DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented;
Figure 376741DEST_PATH_IMAGE054
indicating the probability of successful transmission of the ith information acquisition device. When no file is uploaded in the edge node server, namely the transmission channel is idle, the probability is as follows:
Figure DEST_PATH_IMAGE062
in the formula (I), the compound is shown in the specification,
Figure 639138DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented;
Figure 102480DEST_PATH_IMAGE008
indicating the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices. Combining the idle probability and the successful transmission probability of the transmission channel, the probability of transmission failure of all the information acquisition devices connected with the ith edge node server is as follows:
Figure DEST_PATH_IMAGE064
in the formula (I), the compound is shown in the specification,
Figure 102666DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented;
Figure 69485DEST_PATH_IMAGE008
indicating the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices.
The time consumed for each information acquisition device to successfully transmit a data packet is
Figure DEST_PATH_IMAGE066
The time consumed for transmission failure is
Figure DEST_PATH_IMAGE068
When it is used, order
Figure DEST_PATH_IMAGE070
If the transmission time of all the information acquisition devices connected to the ith edge node server is successful, the time duration is:
Figure DEST_PATH_IMAGE072
in the formula (I), the compound is shown in the specification,
Figure 434607DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented;
Figure 854087DEST_PATH_IMAGE008
the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices is represented;
Figure DEST_PATH_IMAGE074
representing the successful transmission probability of all information acquisition equipment in the ith edge node server;
Figure 189123DEST_PATH_IMAGE010
the transmission rate of a physical layer of the ith information acquisition device is represented;
Figure 276027DEST_PATH_IMAGE012
representing header consumption of a physical layer connection protocol and events required by a previous connection; h denotes a header and acknowledgement frame sequence of the medium access control layer;
Figure 687417DEST_PATH_IMAGE014
the length of a data packet transmitted by the ith information acquisition device is represented; ST represents the short interframe space in the transmission protocol; CT meterIndicating the time length required for receiving the acknowledgement frame; XT represents an inter-coordination gap.
The duration of transmission failure of all the information acquisition devices connected with the ith edge node server is as follows:
Figure DEST_PATH_IMAGE076
in the formula (I), the compound is shown in the specification,
Figure 781144DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented; the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices is represented;
Figure DEST_PATH_IMAGE078
representing the probability of transmission failure of all information acquisition equipment connected with the ith edge node server;
Figure 405023DEST_PATH_IMAGE010
the transmission rate of a physical layer of the ith information acquisition device is represented;
Figure 595702DEST_PATH_IMAGE012
representing header consumption of a physical layer connection protocol and events required by a previous connection; h denotes a header and acknowledgement frame sequence of the medium access control layer;
Figure 177993DEST_PATH_IMAGE014
the length of a data packet transmitted by the ith information acquisition device is represented; ST represents the short interframe space in the transmission protocol; CT indicates the duration of time required to receive the acknowledgement frame; XT represents an inter-coordination gap;
Figure 572065DEST_PATH_IMAGE016
indicating the smallest transmission window.
To sum up, the ith information acquisition device occupies the proportion of the transmission medium in the total transmission medium
Figure 265215DEST_PATH_IMAGE022
Comprises the following steps:
Figure DEST_PATH_IMAGE080
namely:
Figure DEST_PATH_IMAGE006A
in the formula (I), the compound is shown in the specification,
Figure 169455DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented;
Figure 922647DEST_PATH_IMAGE008
the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices is represented;
Figure 69595DEST_PATH_IMAGE010
the transmission rate of a physical layer of the ith information acquisition device is represented;
Figure 566435DEST_PATH_IMAGE012
representing header consumption of a physical layer connection protocol and events required by a previous connection; h denotes a header and acknowledgement frame sequence of the medium access control layer;
Figure 482439DEST_PATH_IMAGE014
the length of a data packet transmitted by the ith information acquisition device is represented; ST represents the short interframe space in the transmission protocol; CT indicates the duration of time required to receive the acknowledgement frame; XT represents an inter-coordination gap;
Figure 384361DEST_PATH_IMAGE016
represents the smallest transmission window;
Figure 753026DEST_PATH_IMAGE018
a physical layer constant is represented by a physical layer constant,
Figure 53557DEST_PATH_IMAGE020
indicating the time required for the i-th information collecting device to successfully transmit a data packet.
According to the proportion
Figure 824067DEST_PATH_IMAGE022
The probability that the signal acquisition equipment occupies the transmission medium in proportion to the total transmission medium and only competes for the transmission medium can be obtained
Figure 653483DEST_PATH_IMAGE008
In connection with, due to
Figure 24290DEST_PATH_IMAGE008
The relationship with the contention window is:
Figure DEST_PATH_IMAGE024A
therefore, the proportion of the transmission medium occupied by the information acquisition device in the total transmission medium can be obtained according to the contention window parameter, so that the effective bandwidth of the effective bandwidth value required by the edge node server for connecting the information acquisition device is as follows:
Figure DEST_PATH_IMAGE026A
according to the introduced Lagrange non-negative multiplier
Figure 253146DEST_PATH_IMAGE028
Obtaining the optimized bandwidth of any information acquisition device, namely:
Figure DEST_PATH_IMAGE082
in the formula (I), the compound is shown in the specification,
Figure DEST_PATH_IMAGE084
representing post-optimization resultsTime with bandwidth occupied by information collecting equipment
Figure DEST_PATH_IMAGE086
) Gathering;
Figure 2796DEST_PATH_IMAGE050
the effective bandwidth represents the effective bandwidth value required by an edge node server for connecting the information acquisition equipment;
Figure 268692DEST_PATH_IMAGE030
the bandwidth required by the ith information acquisition device is represented;
Figure 611949DEST_PATH_IMAGE034
Figure 254283DEST_PATH_IMAGE036
Figure 983073DEST_PATH_IMAGE038
is a preset constant; n represents the number of edge node servers;
Figure 419871DEST_PATH_IMAGE010
represents a coding rate;
Figure 250424DEST_PATH_IMAGE042
representing the frame rate of the video file.
In the case of a distributed network, the network,
Figure 430869DEST_PATH_IMAGE028
corresponding to a fixed and unique
Figure 30478DEST_PATH_IMAGE086
Values, obtained from the partial derivatives:
Figure DEST_PATH_IMAGE088
according to
Figure DEST_PATH_IMAGE090
The optimal bandwidth of each information acquisition device can be obtained
Figure 559548DEST_PATH_IMAGE030
Figure DEST_PATH_IMAGE032A
In the formula (I), the compound is shown in the specification,
Figure 64348DEST_PATH_IMAGE034
Figure 782905DEST_PATH_IMAGE036
Figure 237020DEST_PATH_IMAGE038
is a predetermined constant, and
Figure 530467DEST_PATH_IMAGE040
is a minimization distortion function;
Figure 70033DEST_PATH_IMAGE010
represents a coding rate;
Figure 592281DEST_PATH_IMAGE042
representing the frame rate of the video file.
Under the limitation of limited network bandwidth, the problem that transmission occupied time is inconsistent with actual occupied time due to interference conditions in practical application can be better solved by distributing proper bandwidth for different information acquisition devices.
The block chain for storing the video summary data information further comprises a block head and a block body, wherein the block head comprises a hash value of a previous block, a time stamp, a Merkle root and the number of a current block; the block body comprises detailed video data information in a Merkle tree form, namely data information generated in the process of obtaining the video abstract value. Meanwhile, as shown in table 1, the block chain further includes a public key address of the video owner, a preset video name, a video number, a video date, a start time of the video, and an end time of the video end.
Table 1 data content in blockchain
Video owner address Video name Video summary value Video numbering Date of video Video start time Video end time
(32 bit address) Hebaodan (Hash value) 0001 20210406 123111 134111
In a further embodiment, the video data request validation process is completed by the user node, the cloud storage node, the proxy node, and the blockchain. The user nodes are owners of original video data and are further divided into data request nodes and data response nodes; the cloud storage node is a node for realizing cloud data storage; the agent node is used for deploying the intelligent contract, maintaining the data request and responding the data request. And according to the intelligent contract, the data request node and the cloud storage node carry out the identification of the video data reading authority through verification.
Specifically, in the process of requesting to read the video data, the agent node deploys an intelligent contract used as a basis for data interaction, and the data request node sends video data request information to the data response node through the intelligent contract deployed by the agent node.
And the intelligent contract generates the identification of the data request node and returns the identification to the data request node. After receiving the identification information, the data request node packs the data information by using the public key address of the data request node, signs the packed data by using the private key of the data request node, and sends the signed data information to the cloud storage node for verification.
And after receiving the signed data information, the cloud storage node decrypts the information by using the public key of the data request node, compares the information with the identification information stored in the block chain, and returns verification information containing the public key address of the cloud storage node and the public key address of the data request node to the data request node when the verification result is that the verification information passes.
And the data request node receives the verification information sent by the cloud storage node and verifies the validity, and when the verification result is valid, video data transmission is carried out through the data transmission channel.
And after the downloading transmission process is finished, the data request node broadcasts a downloading success message and records the realization process into the block chain.
The intelligent contract is used as a promise in an electronic form and is used for limiting between a data requester and a requested person, and when a preset starting condition is met, the intelligent contract is automatically started. The data interaction process recorded in the intelligent contract is recorded in the blockchain at the same time, so that the data generated in the data interaction process can be viewed in the blockchain. The intelligent contract has non-tamper property, and when a problem occurs, the intelligent contract is destroyed; meanwhile, the block chain has the characteristic of distribution, so that the intelligent contract has stability, and the condition that the intelligent contract fails can not be caused when a single node goes wrong.
In a further embodiment, the public key corresponds to the private key, and in the data transmission process, the public key is used for generating an address for data interaction and encrypting data to complete the data interaction; the private key is in the data signature and is set to verify the identity of itself to nodes other than itself. Since the generation process of the secret key is irreversible, the private key cannot be deduced through the public key, and thus the data is not usurgable and privacy is guaranteed.
In a further embodiment, in the process of interaction between the data request node and the cloud storage node, after the cloud storage node receives the identity information of the data request node, the public key of the data request node is used for verifying and signing the signed identity information in the block chain. The signed identification information is identification information formed by the data request node through self private key signature.
When the verification result is that the verification information is passed, the cloud storage node returns verification information carrying the cloud storage node signature to the data request node; otherwise, the data request fails.
Subsequently, the data request node verifies the received verification information; when the verification passes, data interaction is carried out through a data transmission path; otherwise, the data request fails.
In one embodiment, a block link point is provided, comprising:
a memory arranged to store a computer program;
a processor arranged to execute the computer program in the memory to implement any one of the method steps.
In one embodiment, a blockchain based video storage management system is provided, the system comprising at least one blockchain node; the blockchain node is arranged to perform any one of the method steps.
As noted above, while the present invention has been shown and described with reference to certain preferred embodiments, it is not to be construed as limited thereto. Various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A video storage management method based on a block chain is characterized by comprising the following steps:
receiving video data uploaded by a video information acquisition group;
preprocessing the video data, storing the original video data to a cloud end, and storing the preprocessed video data to a block chain;
when the video data is requested to be read, verifying the request information, and granting a reading permission after successful verification;
the method comprises the following steps that at least one information acquisition device forms a video information acquisition group, and acquired video data are transmitted to an edge node server through a base station;
the edge node server stores the video data to a local database, uploads the preprocessed video data to a cloud end according to bandwidth allocated according to needs, and deletes the data in the local database after receiving confirmation information that the cloud end confirms that the storage is finished.
2. The method according to claim 1, wherein the video storage management method based on block chain,
according to the mode of distribution according to needs, when the video data are transmitted to the cloud end, the bandwidth distribution division information acquisition equipment transmits the video data to the edge node server, and the edge node server transmits the video data to the cloud end;
when the video data is transmitted from the information acquisition device to the edge node server, if the total bandwidth in the cloud is B, the bandwidth allocated to the ith edge node server according to the weight is:
Figure DEST_PATH_IMAGE002
in the formula, B represents the total bandwidth in the cloud;
Figure DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented; dig represents the total number of information acquisition devices;
according to the probability of successful transmission and the probability of transmission failure when the information acquisition equipment transmits data, the probability of successful transmission and the probability of transmission failure of all the information acquisition equipment of the edge node server, the probability of idle traditional channels between the information acquisition equipment and the cloud end, and the time consumed in the transmission process of video data, the proportion of the transmission medium occupied by the ith information acquisition equipment in the total transmission medium is obtained:
Figure DEST_PATH_IMAGE006
in the formula (I), the compound is shown in the specification,
Figure 16384DEST_PATH_IMAGE004
the number of information acquisition equipment connected with the ith edge node server is represented;
Figure DEST_PATH_IMAGE008
the probability that the ith information acquisition device competes for the transmission medium with other information acquisition devices is represented;
Figure DEST_PATH_IMAGE010
the transmission rate of a physical layer of the ith information acquisition device is represented;
Figure DEST_PATH_IMAGE012
representing header consumption of a physical layer connection protocol and events required by a previous connection; h denotes a header and acknowledgement frame sequence of the medium access control layer;
Figure DEST_PATH_IMAGE014
the length of a data packet transmitted by the ith information acquisition device is represented; ST represents the short interframe space in the transmission protocol; CT indicates the duration of time required to receive the acknowledgement frame; XT represents an inter-coordination gap;
Figure DEST_PATH_IMAGE016
represents the smallest transmission window;
Figure DEST_PATH_IMAGE018
a physical layer constant is represented by a physical layer constant,
Figure DEST_PATH_IMAGE020
the time required for the ith information acquisition device to successfully transmit a data packet is represented;
according to the proportion
Figure DEST_PATH_IMAGE022
The probability that the signal acquisition equipment occupies the transmission medium in proportion to the total transmission medium and only competes for the transmission medium can be obtained
Figure 386055DEST_PATH_IMAGE008
In connection with, due to
Figure 634633DEST_PATH_IMAGE008
The relationship with the contention window is:
Figure DEST_PATH_IMAGE024
the proportion of the transmission medium occupied by the information acquisition device in the total transmission medium can be obtained according to the contention window parameter, so that the effective bandwidth of the effective bandwidth value required by the connection of one edge node server with the information acquisition device is as follows:
Figure DEST_PATH_IMAGE026
introduced Lagrange non-negative multiplier
Figure DEST_PATH_IMAGE028
Obtaining the optimized bandwidth of any information acquisition equipment, namely the size of the optimal bandwidth of the information acquisition equipment
Figure DEST_PATH_IMAGE030
Figure DEST_PATH_IMAGE032
In the formula (I), the compound is shown in the specification,
Figure DEST_PATH_IMAGE034
Figure DEST_PATH_IMAGE036
Figure DEST_PATH_IMAGE038
is a predetermined constant, and
Figure DEST_PATH_IMAGE040
is a minimization distortion function;
Figure 403744DEST_PATH_IMAGE010
represents a coding rate;
Figure DEST_PATH_IMAGE042
representing the frame rate of the video file.
3. The method according to claim 1, wherein the video storage management method based on block chain,
the video data is preprocessed and stored in a block chain, and the process comprises the following steps:
creating a video data storage interval;
reading a cache address of the video data;
acquiring and coding each frame according to the time sequence;
storing the encoded video data into the video data storage interval;
when the acquired video data meet the preset size of the video data storage interval, closing the current video data storage interval and creating a new video storage interval;
the video data storage intervals form a video data transmission queue according to a time sequence, and after hash encryption is carried out on each of the adjacent video data storage intervals, the hash encryption is carried out on every two adjacent video data storage intervals until a final hash value is obtained;
and storing the final hash value as a video abstract value into the block chain.
4. The method according to claim 1, wherein the video storage management method based on block chain,
the video data is stored in a block chain through preprocessing, and the process comprises the following steps: firstly, a video data storage interval is created in advance, and a cache address of the video data is read; secondly, acquiring and coding each frame according to the time sequence; thirdly, storing the coded video data into the video data storage interval; when the acquired video data meet the preset size of the video data storage interval, closing the current video data storage interval and creating a new video storage interval; finally, video data storage intervals form a video data transmission queue according to a time sequence;
in the coding process, the depth is predicted through the correlation degree of the inter-layer, space and time, the coded depth is coded under the condition of removing the depth with low possibility, the intra-frame mode is skipped on the premise that whether the residual coefficient obeys Gaussian distribution or not is judged, the left and right or up and down division is carried out on the residual coefficient obtained by the depth coding, and whether the depth coding is terminated in advance is judged according to the significance of the difference.
5. The method according to claim 1, wherein the video storage management method based on block chain,
completing a video data request verification process by a user node, a cloud storage node, a proxy node and a block chain; the user nodes are owners of original video data and are further divided into data request nodes and data response nodes; the cloud storage node is a node for realizing cloud data storage; the agent node is used for deploying intelligent contracts, maintaining data requests and responding to the data requests.
6. The method according to claim 5, wherein the video storage management method based on block chain,
the process of requesting to read the video data is further as follows:
the data request node sends video data request information to a data response node through an intelligent contract deployed by the agent node;
the intelligent contract generates an identity certificate of the data request node and returns the identity certificate to the data request node;
the data request node applies for video data reading permission to the cloud storage node according to the identity certificate;
the cloud storage node verifies the identity certificate, and sends the video data requested by the data request node to the data request node after the verification is successful;
the data request node receives video data sent by the cloud storage node and verifies the validity, and when the verification result is valid, a successful downloading message is broadcast;
the implementation process is logged into the blockchain.
7. The method according to claim 5, wherein the video storage management method based on block chain,
during the process that the video data is requested to be read, data interaction among nodes relates to encryption and decryption of the data, and data signing and signature verification;
the encryption is to encrypt the data by using a public key; the decryption is to decrypt the data by using a private key after receiving the encrypted data;
the signature is a data signature by using a private key; the verification is that after the signed data is received, the public key is used for verifying the data;
the public key is set to correspond to the private key and is used for generating an address for data interaction and encrypting data to finish the data interaction in the data transmission process;
the private key is arranged in the data signature to verify the identity of the private key to nodes except the private key.
8. The method according to claim 5, wherein the video storage management method based on block chain,
in the process that the video data is requested to be read, the cloud storage node checks and signs the signed identity information in a block chain by using a public key of the data request node; the signed identification information is identification information formed by the data request node through self private key signature;
when the verification result is that the verification information is passed, the cloud storage node returns verification information carrying the cloud storage node signature to the data request node; otherwise, the data request fails;
the data request node verifies the received verification information;
when the verification passes, data interaction is carried out through a data transmission path; otherwise, the data request fails.
9. A block link point, comprising:
a memory arranged to store a computer program;
a processor arranged to execute the computer program in the memory to carry out the method steps of any of claims 1 to 8.
10. A video storage management system based on a block chain is characterized by comprising at least one block chain node;
the blockchain node is arranged to perform the method steps of any one of claims 1 to 8.
CN202110423846.6A 2021-04-20 2021-04-20 Video storage management method and system based on block chain Active CN112989111B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110423846.6A CN112989111B (en) 2021-04-20 2021-04-20 Video storage management method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110423846.6A CN112989111B (en) 2021-04-20 2021-04-20 Video storage management method and system based on block chain

Publications (2)

Publication Number Publication Date
CN112989111A true CN112989111A (en) 2021-06-18
CN112989111B CN112989111B (en) 2021-09-10

Family

ID=76341323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110423846.6A Active CN112989111B (en) 2021-04-20 2021-04-20 Video storage management method and system based on block chain

Country Status (1)

Country Link
CN (1) CN112989111B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113556406A (en) * 2021-09-22 2021-10-26 深圳时空云科技有限公司 Distributed network communication method and device
CN113572790A (en) * 2021-09-18 2021-10-29 深圳时空云科技有限公司 Distributed processing method and device for private information
CN117728962A (en) * 2024-02-18 2024-03-19 深圳码隆智能科技有限公司 Signature transmission method for ensuring storage consistency of multi-level video data

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109326337A (en) * 2018-09-06 2019-02-12 西安电子科技大学 Electronic medical record storage and shared model and method based on block chain
CN110046649A (en) * 2019-03-12 2019-07-23 阿里巴巴集团控股有限公司 A kind of multimedia messages prison broadcasting method, apparatus and system based on block chain
CN110909143A (en) * 2019-11-26 2020-03-24 太平金融科技服务(上海)有限公司 Video frequency testament generation method, device, computer equipment and storage medium
CN111405241A (en) * 2020-02-21 2020-07-10 中国电子技术标准化研究院 Edge calculation method and system for video monitoring
CN111523133A (en) * 2020-04-24 2020-08-11 远光软件股份有限公司 Block chain and cloud data collaborative sharing method
KR102153673B1 (en) * 2019-12-18 2020-09-08 제주대학교 산학협력단 Method, system and recordable medium for storing and transmission processing of intelligent CCTV video data using the edge blockchain
CN111737762A (en) * 2020-06-28 2020-10-02 江苏恒宝智能系统技术有限公司 Data management method, device and system based on block chain technology
CN111901128A (en) * 2020-09-29 2020-11-06 成都清渟科技有限公司 Method and system for protecting data safety of water purification equipment based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109326337A (en) * 2018-09-06 2019-02-12 西安电子科技大学 Electronic medical record storage and shared model and method based on block chain
CN110046649A (en) * 2019-03-12 2019-07-23 阿里巴巴集团控股有限公司 A kind of multimedia messages prison broadcasting method, apparatus and system based on block chain
CN110909143A (en) * 2019-11-26 2020-03-24 太平金融科技服务(上海)有限公司 Video frequency testament generation method, device, computer equipment and storage medium
KR102153673B1 (en) * 2019-12-18 2020-09-08 제주대학교 산학협력단 Method, system and recordable medium for storing and transmission processing of intelligent CCTV video data using the edge blockchain
CN111405241A (en) * 2020-02-21 2020-07-10 中国电子技术标准化研究院 Edge calculation method and system for video monitoring
CN111523133A (en) * 2020-04-24 2020-08-11 远光软件股份有限公司 Block chain and cloud data collaborative sharing method
CN111737762A (en) * 2020-06-28 2020-10-02 江苏恒宝智能系统技术有限公司 Data management method, device and system based on block chain technology
CN111901128A (en) * 2020-09-29 2020-11-06 成都清渟科技有限公司 Method and system for protecting data safety of water purification equipment based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王倩: "面向监测领域的智能云存储网关系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572790A (en) * 2021-09-18 2021-10-29 深圳时空云科技有限公司 Distributed processing method and device for private information
CN113556406A (en) * 2021-09-22 2021-10-26 深圳时空云科技有限公司 Distributed network communication method and device
CN113556406B (en) * 2021-09-22 2021-12-07 深圳时空云科技有限公司 Distributed network communication method and device
CN117728962A (en) * 2024-02-18 2024-03-19 深圳码隆智能科技有限公司 Signature transmission method for ensuring storage consistency of multi-level video data

Also Published As

Publication number Publication date
CN112989111B (en) 2021-09-10

Similar Documents

Publication Publication Date Title
CN112989111B (en) Video storage management method and system based on block chain
CN109766673B (en) Alliance type audio and video copyright block chain system and audio and video copyright chaining method
CN112073379B (en) Lightweight Internet of things security key negotiation method based on edge calculation
CN106549933B (en) Data transmission system and method of block chain
CN102223374B (en) Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
CN108737071B (en) WLAN (Wireless local area network) mesh secure access method based on block chain
CN110784461B (en) Safe 6LoWPAN communication method and system based on block chain
CN103067363B (en) Index conversion method for public data integrity checking
CN111831974B (en) Interface protection method, device, electronic equipment and storage medium
Lu et al. A fine-grained IoT data access control scheme combining attribute-based encryption and blockchain
CN111371543B (en) Internet of things equipment access control method based on double-block chain structure
CN109104476B (en) Electric power information safety system based on block chain
CN114915805A (en) Video stream transmission method based on double encryption mechanism and security chip device
CN114254398B (en) Block chain-based federated learning system and parameter aggregation method
CN112035896A (en) Electronic contract deposit certificate system based on transaction mode
Na et al. Lightweight blockchain to solve forgery and privacy issues of vehicle image data
CN113596777A (en) Intelligent networking automobile anonymous identity authentication system and method based on block chain
CN112583772B (en) Data acquisition and storage platform
CN112733198A (en) Block chain light node data acquisition method and device
CN115484030B (en) Enterprise tax data sharing method and system based on Internet of things technology
CN114499894B (en) File storage and reading method and system in block chain network
CN113055160B (en) Intelligent education safety protection method and system based on Kerberos identity authentication protocol
CN111865601B (en) Internet of vehicles trust management method and system based on block chain
CN115038084A (en) Decentralized trusted access method for cellular base station
CN114422198A (en) Digital certificate processing method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A blockchain based video storage management method and system

Granted publication date: 20210910

Pledgee: Chengdong Branch of Nanjing Bank Co.,Ltd.

Pledgor: Nanjing bailence Intelligent Technology Co.,Ltd.

Registration number: Y2024980014845