CN113542191A - Block chain based data access and verification method and device - Google Patents

Block chain based data access and verification method and device Download PDF

Info

Publication number
CN113542191A
CN113542191A CN202010290864.7A CN202010290864A CN113542191A CN 113542191 A CN113542191 A CN 113542191A CN 202010290864 A CN202010290864 A CN 202010290864A CN 113542191 A CN113542191 A CN 113542191A
Authority
CN
China
Prior art keywords
data
user
hash value
data operation
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010290864.7A
Other languages
Chinese (zh)
Inventor
徐青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202010290864.7A priority Critical patent/CN113542191A/en
Publication of CN113542191A publication Critical patent/CN113542191A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

A data access method based on a block chain belongs to the technical field of block chains. According to the method, the user authority information of the user is stored in the block chain, when the user accesses the camera, identity verification and authority confirmation are carried out, and the data access range and data operation of the user are limited based on the user authority information on the block chain, so that the management of the access user of the camera is realized, and the data security of the camera is improved.

Description

Block chain based data access and verification method and device
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method and an apparatus for accessing and verifying data based on a blockchain, a computer device, and a storage medium.
Background
Cameras are widely used in various aspects of production and life as an important data recording tool, and therefore, the security of camera data is closely related to various aspects of production and life.
At present, data security of a camera is protected by means of an account and a password, the account, the password and multimedia data collected by the camera are usually stored in a fixed cloud platform server, and the account data of a user and other data of the camera are summarized, stored and managed in a cloud centralization manner. When accessing the camera data, a user can log in the camera system based on the account number and the password, and then the multimedia data collected by the camera is read from the cloud platform server.
However, the data access mode based on the account and the password is low in safety, on one hand, the account and the password are both stored in the cloud platform server, so that risks of password cracking and account stealing exist, and the condition of illegal access is easy to occur; on the other hand, centralized storage of data is easy to cause the situation of lack of supervision after data concentration, and by applying a centralized data management method, the risk of data loss and damage is greatly increased, and the data security of the camera is seriously influenced. Therefore, how to improve the security of the camera data is an important research direction.
Disclosure of Invention
The embodiment of the application provides a method and a device for accessing and verifying data based on a block chain, computer equipment and a storage medium, and the safety of camera data can be improved. The technical scheme is as follows:
in a first aspect, a method for accessing data based on a block chain is provided, where the method includes:
receiving an equipment access request of a terminal, wherein the equipment access request carries a public key and a digital certificate of a user;
performing identity authentication based on the public key of the user and the digital certificate;
responding to the identity authentication, and acquiring user authority information corresponding to the public key from the blockchain system according to the public key, wherein the user authority information is used for indicating data operation and an operable data range which can be performed by the user;
sending the user authority information to the terminal;
and if the data operation request of the terminal is received and the data operation request accords with the user permission information, responding to the data operation request.
In a normal situation, a user accesses a camera system based on an account and a password to read data of a camera, the account and the password of the user are stored in a cloud platform server in a unified manner, and an administrator manages information such as the account and the password of the user. In the method, different user authorities are distributed to different users, user authority information corresponding to each user is stored in a block chain of a block chain system, due to the characteristic that data stored in the block chain cannot be deleted and modified, the user authority information can be prevented from being lost or tampered, when a camera receives an access request of the user, the user can be authenticated based on a public key and a digital certificate of the user in the block chain system, and after the user passes the authentication, the user authority information corresponding to the user is obtained from the block chain, so that the user can perform data operation within a data range and an operation range defined by the user authority information. By applying the technical scheme provided by the application, on one hand, the user authority information is stored in the block chain, so that centralized data storage is avoided, and the safety and accuracy of the user authority information are ensured; on the other hand, based on the division of the user authority, the access users of the camera are managed, the data operation of each user is limited, the account password does not need to be verified, the condition that the account is stolen to cause illegal access can be avoided, and the data security of the camera is improved.
In one possible implementation, the performing authentication based on the public key of the user and the digital certificate includes:
sending the public key of the user and the digital certificate to a certificate authority; and receiving an authentication result generated by the certificate authority in response to the public key of the user and the digital certificate. In the method and the device, the identity of the user is verified through the certificate authority, so that the condition of illegal access is avoided.
In a possible implementation manner, before the receiving the device access request of the terminal, the method further includes:
responding to a user registration request, sending a public key and identity information of the user carried by the user registration request to a certificate authority, distributing user authority information and generating a digital certificate for the user by the certificate authority based on the public key and the identity information of the user, and storing the user authority information corresponding to the user and the digital certificate in the blockchain system. In the scheme, the identity authentication and the authority confirmation are carried out on the user through the certificate authority center, so that the access user of the camera and the authority range of each user are managed, the effectiveness of the camera user management is improved, and the safety of the camera system is further improved.
In a possible implementation manner, before responding to the data operation request if the data operation request of the terminal is received and the data operation request conforms to the user permission information, the method further includes:
based on a first storage address, storing any collected data to a blockchain system, generating a first hash value corresponding to any data by the blockchain system based on the any data and the first storage address, and storing the first hash value corresponding to the any data in a blockchain, wherein the first hash value is used for verifying the validity of the any data; acquiring a second storage address of the first hash value sent by the blockchain system in the blockchain; if the data operation request of the terminal is received and the data operation request conforms to the user permission information, responding to the data operation request, including: and responding to a data operation request of the terminal to any data in the data range, and sending a first storage address of the any data and a second storage address of the first hash value to the terminal. In the application, the multimedia data and the hash value corresponding to the storage address thereof are stored on the block chain, so that the hash value can be prevented from being tampered, and when data operation is performed subsequently, the hash value stored on the block chain is applied to perform data verification, so that the accuracy and the validity of a verification result can be ensured.
In a possible implementation manner, after the receiving a data operation request of the terminal and the data operation request conforms to the user permission information, responding to the data operation request, the method further includes:
generating a data operation record based on the data operation of the terminal on the data in the data range; and storing the data operation record into a block chain of the block chain system. In the method and the device, the user operation records are stored in the block chain, so that the data operation executed by each user can be checked conveniently, the traceability of the user operation is improved, and the safety of the camera system is further improved.
In a possible implementation manner, the generating a data operation record based on the data operation of the terminal on the data in the data range includes:
identifying, in response to the data operation, whether the data operation is a critical data operation; if the data operation is a critical data operation, generating the data operation record based on the data operation. In the method and the device, the key data operation is recorded on the block chain, so that the key data operation can be traced, and the safety of the camera system is improved.
In a second aspect, a data verification method based on a blockchain is provided, the method including:
sending a data operation request for target data to a target camera;
acquiring a first storage address of the target data in the blockchain system and a second storage address of a first hash value in the blockchain system, wherein the first storage address is provided by the target camera based on the data operation request;
acquiring the target data and the first hash value from the blockchain system based on the first storage address and the second storage address;
generating a second hash value based on the target data and the first storage address;
and verifying the validity of the target data based on the first hash value and the second hash value.
In the application, a user can verify the acquired multimedia data by using the hash value stored in the blockchain, judge whether the multimedia data is tampered or moved, and ensure the accuracy and the effectiveness of the acquired multimedia data.
In a possible implementation manner, the verifying the validity of the target data based on the first hash value and the second hash value includes:
judging whether the first hash value is the same as the second hash value; if the second hash value is the same as the first hash value, the target data is valid data; and if the second hash value is different from the first hash value, the target data is invalid data. In the method, the newly generated hash value is compared with the hash value stored in the block chain, and when the data is tampered or moved, the hash value is inevitably changed.
In a third aspect, a block chain based data access apparatus is provided, configured to execute the above block chain based data access method. Specifically, the device for accessing data based on a blockchain includes a functional module configured to execute the method for accessing data based on a blockchain provided in the first aspect or any one of the alternatives of the first aspect.
In a fourth aspect, a block chain-based data verification apparatus is provided for executing the block chain-based data verification method. Specifically, the device for data verification based on blockchain includes a functional module for executing the method for data verification based on blockchain provided by the second aspect or any one of the alternatives of the second aspect.
In a fifth aspect, a computer device is provided, which includes a processor and a memory, where at least one instruction is stored, and the instruction is loaded and executed by the processor to implement the operations performed by the above block chain based data access method.
In a sixth aspect, a computer device is provided, which includes a processor and a memory, where the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the operations performed by the block chain based data verification method as described above.
In a seventh aspect, a computer-readable storage medium is provided, in which at least one instruction is stored, and the instruction is loaded and executed by a processor to implement the operations performed by the above block chain-based data access method.
In an eighth aspect, a computer-readable storage medium is provided, in which at least one instruction is stored, and the instruction is loaded and executed by a processor to implement the operations performed by the above block chain-based data verification method.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of a camera security system provided in an embodiment of the present application;
fig. 2 is a schematic structural diagram of a node device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a camera provided in an embodiment of the present application;
fig. 4 is a flowchart of a method for user registration and camera data access according to an embodiment of the present disclosure;
fig. 5 is a flowchart of a data storage and verification method based on a blockchain according to an embodiment of the present application;
fig. 6 is a schematic data interaction diagram of a camera security system based on a blockchain according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a data access device based on a block chain according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a data verification apparatus based on a block chain according to an embodiment of the present application.
Detailed Description
Embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 is a schematic diagram of a camera security system provided in an embodiment of the present application, and referring to fig. 1, the camera security system may include a target camera 101, a blockchain system 102, and a Certificate Authority (CA) 103.
The target camera 101 may be any device having a multimedia data acquisition function, the target camera 101 may be one camera device or multiple camera devices, the number and the device type of the target camera are not limited in the embodiment of the present application, and in the embodiment of the present application, only the target camera 101 is taken as one camera device for description. This target camera 101 can gather multimedia data in real time, stores the multimedia data who gathers, for example, this target camera 101 can carry out local storage to the multimedia data who gathers, also can save to the high in the clouds data storage platform of block chain system, and this application embodiment does not limit to this.
The blockchain system 102 may include a plurality of node devices, and the plurality of node devices may be configured with the same blockchain, and the blockchain may be a public chain, a federation chain, or a private chain. The plurality of node devices may be a plurality of devices of the same organization, a plurality of devices belonging to different organizations, or a terminal of a common user, that is, a user node device, which is not limited in this embodiment of the present application. In this embodiment, the blockchain system 102 may further include another data storage device for storing the multimedia data collected by each camera, for example, the other data storage device may be a cloud-end data storage platform. In this embodiment, the target camera may also be registered in the blockchain system to become a node device in the blockchain system, and the target camera may store information such as an access record of a user and a hash value of acquired multimedia data in a blockchain of the blockchain system.
The certificate authority 103 may authenticate a user and issue a digital certificate, and may also be used to confirm the user's rights, so that the user has the user's rights to access the target camera.
Certainly, the implementation environment may further include a computer device 104 corresponding to a monitoring authority, and the monitoring authority may monitor each node device in the certificate authority 103 and the blockchain system 102, that is, monitor links such as user registration, user right authentication, and device access, so as to ensure that each link can be normally executed.
The camera system 101, the blockchain system 102, the certificate authority 103, and the computer device 104 corresponding to the monitoring authority may be directly or indirectly connected through wired or wireless communication, which is not limited in the embodiment of the present application.
The camera security system provided by the embodiment of the application relates to the aspects of storage and access of camera data, user authority management and the like, and is combined with a block chain technology to improve the security of the camera data. The camera safety system provided by the embodiment of the application can be applied to various scenes such as safety protection, road traffic management and the like. For example, a camera can be used as a monitoring device to acquire images of a monitored field, and by applying the technical scheme provided by the embodiment of the application, a camera system is combined with a blockchain technology, multimedia data acquired by the camera is stored in a blockchain in a hash value form to ensure that the multimedia data cannot be tampered, and a user needs to perform identity authentication and authority confirmation through a certificate authority and the blockchain system when accessing the camera, so that the situation that the user illegally accesses the camera data is avoided. The safety system of the camera can effectively improve the safety of the camera system and ensure the reality and the effectiveness of the data of the camera.
Fig. 2 is a schematic structural diagram of a node device in a blockchain system according to an embodiment of the present disclosure. In a possible implementation manner, the node device may be a terminal used by any user, that is, the node device may be any user node device. The node apparatus 200 includes a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 201 and one or more memories 202, wherein the memory 202 stores at least one instruction, and the at least one instruction is loaded and executed by the processor 201 to implement the methods provided by the method embodiments described below. Certainly, the node device 200 may further have components such as a wired or wireless network interface, a keyboard, and an input/output interface, so as to perform input and output, and the node device 200 may further include other components for implementing device functions, which are not described herein again.
Fig. 3 is a schematic structural diagram of a camera according to an embodiment of the present disclosure, where the camera 300 may include one or more processors (CPUs) 301, one or more memories 302 and a camera assembly 303, where the memory 302 stores at least one instruction, and the at least one instruction is loaded and executed by the processor 301 to implement the method provided by the following method embodiments, and the camera assembly 303 is used to capture an image or a video. Certainly, the camera 300 may further have components such as a wired or wireless network interface, an input/output interface, and the like, so as to perform input and output, and the camera 300 may further include other components for implementing functions of the device, which is not described herein again.
In an exemplary embodiment, a computer-readable storage medium, such as a memory, is also provided that includes instructions executable by a processor in a node device or a camera to perform a blockchain based data access method or a blockchain based data verification method in the embodiments described below. For example, the computer-readable storage medium may be a read-only memory (ROM), a Random Access Memory (RAM), a compact disc-read-only memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
In order to further embody the fact that the security of camera data access can be effectively improved based on the camera security system, the above is described with reference to a user registration and camera data access process as an example, and refer to fig. 4, where fig. 4 is a flowchart of a method for user registration and camera data access provided in an embodiment of the present application, and the method specifically includes the following steps:
401. the user node device sends a user registration request to a certificate authority.
The user node device may be a terminal used by any user, and a target application program may be installed and run in the user node device, and the target application program may provide a function of accessing a target camera. The user can register with the target application program to acquire user rights for data operations on the target camera or the plurality of cameras in the camera system. The user registration request may carry a public key and identity information of the user, where the identity information may be a name, a certificate number, and the like, and this is not limited in this embodiment of the application.
In a possible implementation manner, the user node device may display a registration page, where the registration page may include an information input area, a camera selection area, and a registration confirmation control, and the user may input own identity information, a public key, and the like in the information input area, and select at least one camera in the camera selection area to register, so as to obtain a user right for operating multimedia data in each camera. When the user node device detects the triggering operation of the user on the registration confirmation control, a user registration request can be generated, the user registration request is sent to a certificate authority, and the certificate authority executes subsequent permission confirmation and certificate generation steps. It should be noted that the above description of the method for generating the user registration request is only an exemplary description, and the embodiment of the present application does not limit the specific method for generating the user registration request.
402. The certificate authority allocates user rights to the user and generates a digital certificate based on the user registration request.
The certificate authority is a trusted third party in the electronic commerce transaction, undertakes the responsibility of validity check of the public key in the public key system, and can generate a digital certificate after confirming that the public key is legal, wherein the digital certificate can be used for identity verification of the user.
In this embodiment of the present application, the certificate authority may authenticate the public key and the identity information of the user, and in response to the public key and the identity information passing the authentication, the certificate authority may generate a digital certificate based on the public key and the identity information provided by the user, and the valid time of the public key, the user information, and the digital certificate may be recorded in the digital certificate. It should be noted that the above description of the digital certificate generation method is only an exemplary description, and the embodiments of the present application do not limit which method is specifically adopted by the certificate authority center for user authentication and digital certificate generation.
In the embodiment of the application, the certificate authority completes the identity authentication of the user, and after the digital certificate is generated, the user can be confirmed to have the user right for performing data operation on the target camera. The user right may specifically include an access right, an editing right, a downloading right, and the like, which is not limited in the embodiment of the present application, and the specific content of the user right may be determined by any one of the following possible implementation manners:
and in the first mode, acquiring the default authority set by the target camera as the user authority. In one possible implementation, each camera corresponds to a different default permission, which default permission or permissions each camera specifically corresponds to may be set by a developer. For example, different default permissions may be set for each camera according to the position of each camera, taking each camera as a monitoring device of a certain organization as an example, for a camera set in an important department, the default permission may be set as an access permission, and for a camera set in a non-important department, the default permission may be set as an access permission and a download permission. In a possible implementation manner, the user registration request received by the certificate authority may carry the device identifier of the target camera, and the certificate authority may determine which camera the user applies for registration based on the device identifier, and further obtain a default right corresponding to the camera, as the user right of the user.
And secondly, acquiring the user right provided by the user. In a possible implementation manner, a user right selection control may be displayed on the registration page, the user node device may obtain at least one user right selected by the user, add information of the at least one user right to the user registration request, and when the certificate authority receives the user registration request, the certificate authority may obtain the user right provided by the user. In a possible implementation manner, the certificate authority may further filter the user right provided by the user based on the identity information of the user, and obtain only a part of the user right therein to authorize the user. It should be noted that, in the embodiment of the present application, the method for screening the user right is not limited.
403. The certificate authority stores user authority information corresponding to the user and the digital certificate in the blockchain system.
In a possible implementation manner, the certificate authority may use the user right information and the digital certificate as a transaction data, and broadcast the transaction data in the blockchain system, and of course, the certificate authority may also send the transaction data to a certain node device in the blockchain system for performing transaction data verification, and broadcast the transaction data to other node devices in the blockchain system by the node device, which is not limited in this embodiment of the present application. And each node device in the blockchain system verifies the transaction data, and after the transaction data is verified, each node device can store the transaction data in a local transaction pool. The node device in the blockchain system can pack the data in the transaction pool according to the target period to generate a new block, and then broadcast the new block, and each node device or common node device in the blockchain system can commonly identify the new block. If the new block consensus passes, the new block may be added to the tail of the target block chain, that is, the user right information and the digital certificate are stored in the block chain; if the consensus fails, the new block addition step need not be performed. Wherein the transaction pool may be a database maintained locally for each node device, and the transaction pool may be used to store transaction data not yet linked. The target period may be set by a developer, which is not limited in the embodiment of the present application, for example, in a bitcoin system, the target period may be set to 10 minutes.
In the embodiment of the application, the certificate authority stores the user right and the digital certificate corresponding to the user in the block chain, so that the user right and the digital certificate can be checked conveniently, and the user right information and the digital certificate of the user are stored in the block chain.
In one possible implementation, the block chain may send a block index of a block in which the user authority of the user is stored to the target camera after the data storage is completed, and may also send a transaction index of transaction data in the block, which includes the authority information, to the target camera. The block index may be used to indicate location information of a block in a block chain, for example, the block index may be a block number, and the block number may be used to indicate a block height; the transaction index may indicate the position information of the transaction data in the block by the user, for example, the transaction index may be a transaction number, i.e., the arrangement order of the transaction data in the block, and the like. The target camera may store the public key or other identity information of the user in association with the block index and the transaction index, specifically, a user information table may be maintained in the target camera, the user information table may be used to store the above information, and the target camera may perform a subsequent user permission checking step based on the user information table.
404. The certificate authority sends the digital certificate to the user node device.
In a possible implementation manner, after the certificate authority stores the digital certificate in the blockchain, the digital certificate needs to be sent to the user node device to prompt that the user is registered, and when the user subsequently accesses the camera data, the user needs to provide the digital certificate to the accessed camera or certificate authority so that the camera or certificate authority can authenticate the user.
405. The user node device sends a device access request to the target camera, where the device access request may carry a public key and a digital certificate of the user.
In a possible implementation manner, a device access page may be displayed in the user node device corresponding to the user, the device access page may display a device selection area and a confirmation selection control, and the user may select a certain device in the device selection area to apply for accessing the device. Taking the example that the user selects the target camera as an example, when the user node device detects the trigger operation of the user on the confirmation selection control, the user node device may obtain the public key and the digital certificate of the user, and certainly, the user node device also needs to obtain device information of the device selected by the user, for example, a device identifier of the target camera, and generate a device access request based on the information, and send the device access request to the target camera.
It should be noted that the above description of the device access request generation method is only an exemplary description, and the embodiment of the present application does not limit which device access request generation method is specifically adopted. In a possible implementation manner, the user node device may also send the device access request to a data processing platform corresponding to the target camera, and the data processing platform processes the device access requests of the devices in a unified manner.
406. And the target camera and the certificate authority perform identity verification based on the public key of the user in the equipment access request and the digital certificate.
In one possible implementation, the target camera may send the user's public key and digital certificate to a certificate authority, which may verify the public key and digital certificate. Specifically, the validity of the digital certificate may be verified based on a public key of a certificate authority and a digital signature carried by the digital certificate. If the public key of the certificate authority is successfully matched with the digital signature carried by the digital certificate, the digital certificate can be determined to be valid; otherwise, the digital certificate is invalid. In response to the validity of the digital certificate, the user may be authenticated based on the public key included in the digital certificate and the public key provided by the user, if the public key included in the digital certificate is the same as the public key provided by the user, the authentication is passed, and if the public key included in the digital certificate is different from the public key of the user, the authentication fails. After the certificate authority completes the verification step, the public key and the verification result of the digital certificate, that is, the authentication result of the user, can be sent to the target camera.
Of course, the above steps may also be executed by the target camera, that is, the target camera acquires the public key of the certificate authority, and then verifies the digital certificate and the public key provided by the user by using the public key of the certificate authority, which is not limited in this embodiment of the present application.
407. And the target camera responds to the passing of the identity verification, and acquires the user authority information corresponding to the public key from the blockchain system according to the public key.
The user authority information may be used to indicate data operations that the user can perform and operable data ranges.
In a possible implementation manner, a user information table may be maintained in the target camera, and the user information table may store information such as a storage address of the user right information on the blockchain, and associate the information with the public key of the user, where the storage address may be represented as a block index, a transaction index, and the like. The target camera may query the user authority information corresponding to the user from the block chain based on the information stored in the user information table. For example, the target camera may obtain a block index and a transaction index associated with the public key from a user information table based on the public key of the user, locate a target block storing user right information of the user based on the block index, and search transaction data containing the user right information of the user from the target block based on the transaction index, thereby determining the user right information corresponding to the user.
It should be noted that the above description of the method for acquiring the user right from the blockchain is only an exemplary description, and the embodiment of the present application does not limit which method is specifically adopted to acquire the user right.
408. And the target camera sends the user authority information to the user node equipment.
In a possible implementation manner, the user permission information may be represented in the form of a token, the token may include account information of the user and user permission corresponding to the user, and a copy of the token is owned in processes running in the account of the user, so that which data the user may access and which operations are performed on accessible data are controlled by the token. Of course, the user right information may also be expressed in other forms, which is not limited in this embodiment of the application.
In a possible implementation manner, after the target camera acquires the user permission information corresponding to the user, the user permission information may be sent to the user node device, and the user node device displays each multimedia data based on the user permission information. In a possible implementation manner, the user node device may display only the multimedia data that the user has access to based on the user permission information, may not display the multimedia data that the user does not have access to, and may display the multimedia data that the user does not have access to in an inaccessible state, and control the data range of the user operable data by controlling the display of the multimedia data. In a possible implementation manner, the user node device may further limit the operation that can be performed by the user based on the user permission information, for example, when only the access permission is included in the user permission information, each multimedia data may be displayed in a read-only mode; when the user authority information only includes the access authority, the download authority and the editing authority, the user node device can display each multimedia data as an editable mode and can also display a data download control corresponding to each multimedia data. The user can perform data operation based on the multimedia data displayed by the user node device, that is, the user can perform data operation on the multimedia data based on the user authority, and the risk that the data is illegally accessed is reduced.
409. And the user node equipment sends a data operation request to the target camera, and the target camera responds to the data operation request.
In a possible implementation manner, the user node device may display only data in the data range indicated by the user authority information, and the user may perform data operation based on the data displayed by the user node device, that is, perform data operation on the data in the data range indicated by the user authority information. When the user node device detects that a user operates data on certain data, whether the user has the right to perform the data operation can be judged based on the user right information. If the user does not have the right to perform the data operation, the user node device may display a prompt message that the user does not have the right to perform the current operation. If the user has the right to perform the data operation, the user node device may send a data operation request to the target camera. For example, the user node device may display a playing page with multimedia data, when receiving a data playing instruction, the user node device may send a data playing request to a target camera, where the data playing request may carry user permission information of the user and may also carry a data identifier of the multimedia data to be played, the target camera may send a storage address of the multimedia data to the user node device based on the data playing request, and the user node device obtains the multimedia data based on the storage address to play the multimedia data. Of course, the user node device may also display all data collected by the target camera, and when detecting a data operation of a user on any data, determine whether the user has the right to operate the data based on the user permission information, and further determine whether to respond to the data operation of the user.
In a possible implementation manner, when the target camera receives a data operation request of a user for certain data, which is sent by a terminal, the target camera may verify the data operation request again based on user authority information of the user, and determine whether to respond to the data operation request based on a verification result, so as to ensure security of the camera data and avoid an illegal access. It should be noted that, the specific method for verifying the data operation in the embodiment of the present application is not limited.
410. And the target camera generates a data operation record of the user based on the data operation of the user on any data.
In this embodiment of the application, the target camera may record data operation performed by the user, that is, the target camera may generate a data operation record based on data operation performed by the user node device on any data in the data range indicated by the user authority information.
In one possible implementation, the target camera may filter the user's data operations, recording only critical data operations. Specifically, the target camera identifies whether the data operation is a critical data operation in response to the data operation by the user. And if the data operation is the key data operation, generating the data operation record based on the data operation, otherwise, not recording the data operation. In one possible implementation, the target camera may identify whether the type of the data operation is a key data operation type, which may be set by a developer, for example, the key data operation type may be an editing operation, a deleting operation, or the like. It should be noted that the above description of the identification method of the critical data operation is only an exemplary description, and the embodiment of the present application does not limit which identification method of the critical data operation is specifically adopted.
411. The target camera stores the data operation record into a blockchain of the blockchain system.
In this embodiment, the target camera may store the data operation record in the block chain, so as to trace back the data operation condition of each user. The storage manner of the data operation record is the same as the process of storing the user right information and the digital certificate in the block chain in step 403, and details are not described here.
According to the technical scheme provided by the embodiment of the application, when a user accesses the camera data, a public key and a digital certificate need to be provided, the target camera and the certificate authority perform identity verification based on the public key and the digital certificate of the user, the user passes the identity verification response, and the operable data range and the data operation which can be performed by the user are limited based on the user authority information stored in the block chain. By applying the scheme, the user authority information of the user is stored on the block chain, the authority information of the user can be prevented from being illegally tampered due to the characteristic that the data stored in the block chain cannot be deleted and cannot be modified, when the user accesses the camera, identity verification and authority confirmation are carried out, the data access range and data operation of the user are limited based on the user authority information on the block chain, the access user of the camera is managed, the condition of illegal access is avoided, and the data security of the camera is further improved.
In the embodiment of the application, on one hand, through links of user registration and authority confirmation, the user authority is restricted for the user, different user operations and access ranges are defined for different users, for example, operations executable by the user, including data viewing, data modification and the like, can be defined, and the camera range accessed by the user can also be defined, so that the effectiveness of user management of a camera system is improved, and the safety of camera data is improved. On the other hand, the camera system is combined with the block chain technology, the user authority basis and the data operation record of each user can be stored in the block chain, so that the traceability and the query of data are ensured, the data accuracy is ensured, and the data stored in the block chain can be used as the verification basis.
In the embodiment of the present application, the security of multimedia data storage can be effectively improved by applying the camera security system. Fig. 5 is a flowchart of a data storage and verification method based on a block chain according to an embodiment of the present application, and referring to fig. 5, the embodiment may specifically include the following steps:
501. and the target camera stores any collected data to the block chain system based on the first storage address.
The first storage address may indicate a fixed storage space, and the fixed storage space may be preset by a developer; the fixed storage space can be one or more; this fixed memory space can set up in this target camera, and this fixed memory space is a certain local memory space in this target camera promptly, also can set up in block chain system's high in the clouds data storage platform, and this fixed memory space is a certain local memory space in this high in the clouds data storage platform promptly, and this high in the clouds data storage platform can be used for storing the multimedia data that each camera gathered. In this embodiment of the present application, the number and the specific location of the storage space indicated by the first storage address are not limited, and in this embodiment of the present application, only an example in which the first storage address points to a certain memory space of a cloud-side storage platform in a blockchain system is taken as an example for description.
In this embodiment, the data collected by the target camera may be multimedia data, and the multimedia data may be a video, a still image, a dynamic image, and the like, which is not limited in this embodiment. The target camera can store all the collected multimedia data, namely all the multimedia data are stored in the storage space indicated by the first storage address; or, the key data can be screened from each multimedia data, and only the key data is stored. In a possible implementation manner, the target camera may screen each collected multimedia data based on a data screening condition, obtain multimedia data meeting the data screening condition as the key data, and perform data storage and subsequent steps of generating a first hash value based on the key data, that is, any multimedia data meeting the data screening condition. The multimedia data filtering process is described by taking an example that the data filtering condition is set to include a target person in the multimedia data, a trained target recognition model may be loaded in the target camera or a data processing platform corresponding to the target camera, the target camera may input the collected multimedia data into the target recognition model, the target recognition model performs data processing on each piece of multimedia data to recognize whether each piece of multimedia data includes the target person, the target recognition model may use the multimedia data including the target person as the multimedia data meeting the data filtering condition, or may intercept a piece of multimedia data including the target person from a certain piece of multimedia data as the multimedia data meeting the data filtering condition, which is not limited in the embodiments of the present application. The specific content of the data filtering condition may be set by a developer, for example, the data filtering condition may also be set to include any target object in a blacklist in the multimedia data, or include a violation phenomenon, and the like, which is not limited in the embodiment of the present application. It should be noted that the above description of the multimedia data filtering method is only an exemplary description, and the embodiment of the present application does not limit which data filtering method is specifically adopted. By applying the scheme, the multimedia data are screened, and only the key data are acquired for storage, so that redundant data in a storage space can be reduced, and the storage space is saved.
502. The blockchain system generates a first hash value corresponding to any data based on the data and the first storage address.
Wherein the first hash value can be used for verifying the validity of the data. When a certain source data changes, the hash value generated based on the certain source data also changes, the hash value is closely related to each byte in the source data, and the source data cannot be reversely deduced through the hash value.
In a possible implementation manner, after the cloud data storage platform in the block chain system finishes storing any multimedia data, a storage address of the any multimedia data, that is, the first storage address, is obtained, the first storage address and the any multimedia data are compressed and mapped based on a Hash (Hash) algorithm to obtain a Hash value, and the cloud data storage platform can use the Hash value as a first Hash value corresponding to the any multimedia data. It should be noted that the above description of the first hash value obtaining method is only an exemplary description, and the embodiment of the present application does not limit which method is specifically used to calculate the first hash value. The step of generating the first hash value may be executed by the cloud data storage platform, or may be executed by other node devices in the blockchain system, where the other node devices are used to process a multimedia data storage task, that is, after the cloud data storage platform completes multimedia data storage, the cloud data storage platform sends information of the completed multimedia data storage to the other node devices, and the other node devices generate the first hash value.
In the embodiment of the application, a hash value is generated based on the multimedia data and the storage address thereof, the specific content and the storage position of the multimedia data can be marked through the hash value, when the multimedia data is tampered or the storage position is changed, the hash value cannot be obtained, and the data can be effectively prevented from being tampered and moved.
503. The blockchain system stores a first hash value corresponding to any one data in the blockchain.
In this embodiment of the application, the first hash value may be stored in the blockchain in a manner similar to that of the process of storing the user right information and the digital certificate in the blockchain in step 403, which is not described herein again. Storing the first hash value in the blockchain may prevent the first hash value from being lost or tampered due to the property that data stored in the blockchain may not be modified.
504. The blockchain system sends the second storage address of the first hash value in the blockchain to the target camera.
In one possible implementation, after the first hash value is stored, the blockchain system may send a block index corresponding to a block where the first hash value is stored and a transaction index corresponding to the first hash value to the target camera. The block index can be used for uniquely indicating a block in the block chain, and the block index can contain position information of the block, so that the block in the block chain can be accurately positioned through the block index. The transaction index may be used to uniquely indicate a transaction datum, and may take the form of a transaction number. The block index and the exchange index may form a second storage address corresponding to the first hash value.
In a possible implementation manner, a data information table may be maintained in the target camera, and the data information table may be used to store data information of each multimedia data, including information such as a data identifier of each multimedia data, a first storage address, and a second storage address of a first hash value corresponding to the multimedia data. The target camera may store the acquired second storage address in the data information table, and associate the second storage address with a data identifier of the multimedia data, so as to perform subsequent data search.
In the data storage process provided in the above steps 501 to 504, the specific content and storage location of the multimedia data are recorded in the form of a hash value, and the hash value is stored on the block chain. On one hand, due to the characteristics that the data stored on the block chain cannot be deleted and tampered, the state of the multimedia data during initial storage can be accurately recorded, and a basis is provided for a subsequent data verification process; on the other hand, the hash value corresponding to the multimedia data is stored on the block chain instead of the multimedia data chaining is directly performed, so that the storage space can be saved, the time consumption of the processes of data verification, block consensus and the like can be reduced, and the data storage efficiency can be improved.
505. And the user node equipment sends a data operation request for the target data to the target camera.
The target data may be any data collected by the target camera, and the data operation request may be a data reading request, a data editing request, and the like.
In a possible implementation manner, the user node device may display a data preview page, where the data preview page may display an access control corresponding to the target data, and when the user node device detects a trigger operation of a user on the access control, the user node device may generate a data reading request for the target data, where the data reading request may carry information such as a data identifier of the target data. Wherein the data identifier can be used to uniquely indicate a multimedia data. It should be noted that the above description of the method for generating the target data acquisition request is only an exemplary description, and the embodiment of the present application does not limit which method is specifically used to generate the target data acquisition request.
506. And the target camera sends a first storage address of the target data in the blockchain system and a second storage address of the first hash value in the blockchain system to the user node equipment based on the data operation request.
In a possible implementation manner, after receiving the target data acquisition request, the target camera may query, in a data information table, a first storage address of the target data and a second storage address of a first hash value corresponding to the target data based on a data identifier carried in the target data acquisition request, and send the first storage address and the second storage address to the user.
507. And the user node equipment acquires the target data and the first hash value from the blockchain system based on the first storage address and the second storage address.
In one possible implementation manner, the user node device may determine, based on the first storage address, a storage location of the target data in a cloud data storage platform of the blockchain system, so as to obtain the target data. The user node device may determine a storage location of the first hash value in the blockchain of the blockchain system based on the second storage address, and further obtain the first hash value.
508. The user node device generates a second hash value based on the target data and the first storage address.
In this embodiment, after the user node finishes reading the target data, a hash value, that is, the second hash value, may be regenerated based on the target data and the first storage address. The process of generating the second hash value is the same as the process of generating the first hash value in step 502, and is not described herein again.
509. And the user node equipment verifies the validity of the target data based on the first hash value and the second hash value.
In this embodiment, the user node device may determine whether the first hash value is the same as the second hash value; if the second hash value is the same as the first hash value, determining that the data content and the storage position of the target data are not modified, and the target data passes verification, namely the target data is valid data; and if the second hash value is different from the first hash value, determining that the data content of the target data is modified, the target data fails to be verified, and the target data is invalid data.
By applying the technical scheme, the hash value of the multimedia data acquired by the camera is stored in the blockchain, and when the multimedia data is read subsequently, data verification can be performed through the hash value stored in the blockchain, so that the data is not modified, the data safety of the camera is further ensured, and the multimedia data acquired by a user is real and reliable.
The foregoing embodiment mainly introduces a process of a user performing device access on a camera and verifying read multimedia data, where the process may be a related implementation process, as shown in fig. 6, fig. 6 is a data interaction schematic diagram of a camera security system based on a blockchain provided in an embodiment of the present application, fig. 6 shows a data interaction process among a blockchain system, a target camera, a certificate authority and a user node device in a process of device access and multimedia data verification by the user, and specifically, the data interaction process of the camera security system is described in combination with the camera data access method, the camera data verification method and fig. 6. Referring to fig. 6, in the camera security system, the user information registration, the authority authentication of the user 601 and the device registration of the camera 602 all need to be confirmed by a key in the blockchain system 603 and the certificate authority 604, that is, the schemes provided in the above steps 401 to 404 are executed, so as to implement distributed authentication and management of the user and the camera registration; in the device access link, an access mechanism according to the authority is implemented, the user authority of the cameras is confirmed based on the block chain, and the access records of each camera are stored by applying the block chain technology, that is, the schemes provided in the steps 405 to 411 are executed, so that the records are ensured not to be falsified, and the device access in each time is ensured to be traceable and traceable; for the data storage link of the camera, the content information and the hash digest of the storage location of the multimedia data may be stored in the block chain, that is, the key information is reported, that is, the schemes provided in the above steps 501 to 504 are executed; each time the user accesses and reads the multimedia data, the hash value may be checked, that is, the scheme provided in steps 505 to 509 is executed, so as to provide security for a part of important data and ensure that the data is not tampered. In the embodiment of the present application, the above process may also be supervised by the supervision agency 605. According to the technical scheme provided by the embodiment of the application, a block chain technology is combined with a camera, the processes of equipment registration, user authority authorization and the like are confirmed and verified through the block chain, and all equipment access information is stored in a distributed account book of the block chain, so that real-time storage and non-tampering of equipment access records are guaranteed. And storing the multimedia data in a corresponding storage space, and storing the hash value of the multimedia data on the blockchain to ensure the storage safety of the multimedia data. The scheme can effectively improve the overall security of the camera, including the security of each link such as user registration, equipment access, data storage, access record storage and the like.
Fig. 7 is a schematic structural diagram of a data access device based on a block chain according to an embodiment of the present application, where the device includes:
a receiving module 701, configured to receive an equipment access request of a terminal, where the equipment access request carries a public key of a user and a digital certificate;
a verification module 702, configured to perform identity verification based on the public key of the user and the digital certificate;
an obtaining module 703, configured to, in response to the identity authentication passing, obtain, according to the public key, user right information corresponding to the public key from the blockchain system, where the user right information is used to indicate a data operation that can be performed by the user and an operable data range;
a sending module 704, configured to send the user right information to the terminal;
the response module 705 is configured to respond to the data operation request if the data operation request of the terminal is received and the data operation request conforms to the user permission information.
In one possible implementation, the verification module 702 is configured to:
sending the public key of the user and the digital certificate to a certificate authority;
and receiving an authentication result generated by the certificate authority in response to the public key of the user and the digital certificate.
In one possible implementation, the sending module 704 is further configured to:
responding to a user registration request, sending a public key and identity information of the user carried by the user registration request to a certificate authority, distributing user authority information and generating a digital certificate for the user by the certificate authority based on the public key and the identity information of the user, and storing the user authority information corresponding to the user and the digital certificate in the blockchain system.
In one possible implementation, the apparatus further includes:
the storage module is used for storing any collected data to the blockchain system based on a first storage address, generating a first hash value corresponding to any data by the blockchain system based on the any data and the first storage address, and storing the first hash value corresponding to the any data in a blockchain, wherein the first hash value is used for verifying the validity of the any data;
the obtaining module 703 is further configured to obtain a second storage address of the first hash value in the blockchain sent by the blockchain system.
The response module 705 is configured to:
and responding to the data operation of the terminal on any data in the data range, and sending a first storage address of the any data and a second storage address of the first hash value to the terminal.
In a possible implementation manner, the generating module is further configured to generate a data operation record based on a data operation of the terminal on data within the data range;
the storage module is further configured to store the data operation record into a blockchain of the blockchain system.
In one possible implementation, the generating module is configured to:
identifying, in response to the data operation, whether the data operation is a critical data operation;
if the data operation is a critical data operation, generating the data operation record based on the data operation.
According to the device provided by the embodiment of the application, when a user accesses the camera data, a public key and a digital certificate need to be provided, the target camera and the certificate authority perform identity verification based on the public key and the digital certificate of the user, the user passes the identity verification response, and the operable data range and the data operation which can be performed by the user are limited based on the user authority information stored in the block chain. By applying the device, the user authority information of the user is stored on the block chain, so that the illegal tampering of the authority information of the user is avoided, when the user accesses the camera, the identity verification and the authority confirmation are carried out, the data access range and the data operation of the user are limited based on the user authority information on the block chain, the access user of the camera is managed, and the data security of the camera is further improved.
It should be noted that: in the data access device based on the block chain according to the above embodiment, when accessing the camera data, only the division of the above functional modules is used as an example, in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the above described functions. In addition, the embodiments of the data access method based on the block chain provided in the foregoing embodiments belong to the same concept, and specific implementation processes thereof are described in the embodiments of the method and are not described herein again.
Fig. 8 is a schematic structural diagram of a data verification apparatus based on a blockchain according to an embodiment of the present application, where the apparatus includes:
a sending module 801, configured to send a data operation request for target data to a target camera;
an obtaining module 802, configured to obtain a first storage address of the target data in the blockchain system and a second storage address of a first hash value in the blockchain system, where the first storage address is provided by the target camera based on the data operation request; acquiring the target data and the first hash value from the blockchain system based on the first storage address and the second storage address;
a generating module 803, configured to generate a second hash value based on the target data and the first storage address;
a verification module 804 configured to verify the validity of the target data based on the first hash value and the second hash value.
In one possible implementation, the verification module 804 is configured to:
judging whether the first hash value is the same as the second hash value;
if the second hash value is the same as the first hash value, the target data is valid data;
and if the second hash value is different from the first hash value, the target data is invalid data.
According to the device provided by the embodiment of the application, when a user reads multimedia data, the read multimedia data can be verified by using the hash value stored in the block chain, whether the multimedia data is tampered or moved is judged, and the accuracy and the effectiveness of the obtained multimedia data are ensured.
All the above optional technical solutions may be combined arbitrarily to form the optional embodiments of the present disclosure, and are not described herein again.
It should be noted that: in the data verification device based on the block chain according to the embodiment, when the camera data is verified, only the division of the functional modules is illustrated, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the embodiments of the method for data verification based on a block chain provided in the foregoing embodiments belong to the same concept, and specific implementation processes thereof are described in detail in the embodiments of the method and are not described herein again.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (12)

1. A method for accessing data based on a blockchain, the method comprising:
receiving an equipment access request of a terminal, wherein the equipment access request carries a public key and a digital certificate of a user;
performing identity verification based on the public key of the user and the digital certificate;
responding to the identity authentication, and acquiring user authority information corresponding to the public key from a blockchain system according to the public key, wherein the user authority information is used for indicating data operation and an operable data range which can be performed by the user;
sending the user permission information to the terminal;
and if the data operation request of the terminal is received and the data operation request conforms to the user permission information, responding to the data operation request.
2. The method of claim 1, wherein the authenticating based on the public key of the user and a digital certificate comprises:
sending the public key of the user and the digital certificate to a certificate authority;
and receiving an authentication result generated by the certificate authority in response to the public key of the user and the digital certificate.
3. The method of claim 1, wherein prior to receiving the device access request of the terminal, the method further comprises:
responding to a user registration request, sending a public key and identity information of the user carried by the user registration request to a certificate authority, distributing user authority information and generating a digital certificate for the user by the certificate authority based on the public key and the identity information of the user, and storing the user authority information corresponding to the user and the digital certificate in the block chain system.
4. The method according to claim 1, wherein before the data operation request is responded to if the data operation request of the terminal is received and the data operation request conforms to the user permission information, the method further comprises:
storing any collected data to a blockchain system based on a first storage address, generating a first hash value corresponding to any data by the blockchain system based on the any data and the first storage address, and storing the first hash value corresponding to the any data in a blockchain, wherein the first hash value is used for verifying the validity of the any data;
acquiring a second storage address of the first hash value sent by the blockchain system in the blockchain;
if the data operation request of the terminal is received and the data operation request conforms to the user permission information, responding to the data operation request, wherein the data operation request comprises the following steps:
and responding to a data operation request of the terminal for any data in the data range, and sending a first storage address of any data and a second storage address of the first hash value to the terminal.
5. The method according to claim 1, wherein if a data operation request of the terminal is received and the data operation request conforms to the user permission information, after responding to the data operation request, the method further comprises:
generating a data operation record based on the data operation of the terminal on the data in the data range;
and storing the data operation record into a block chain of the block chain system.
6. The method of claim 5, wherein generating a record of data operations based on the data operations by the terminal on the data within the data range comprises:
identifying, in response to the data operation, whether the data operation is a critical data operation;
and if the data operation is a key data operation, generating the data operation record based on the data operation.
7. A data verification method based on a block chain is characterized by comprising the following steps:
sending a data operation request for target data to a target camera;
acquiring a first storage address of the target data provided by the target camera based on the data operation request in the blockchain system and a second storage address of a first hash value in the blockchain system;
acquiring the target data and the first hash value from the blockchain system based on the first storage address and the second storage address;
generating a second hash value based on the target data and the first storage address;
verifying the validity of the target data based on the first hash value and the second hash value.
8. The method of claim 7, wherein verifying the validity of the target data based on the first hash value and the second hash value comprises:
judging whether the first hash value is the same as the second hash value;
if the second hash value is the same as the first hash value, the target data is valid data;
and if the second hash value is different from the first hash value, the target data is invalid data.
9. An apparatus for block chain based data access, the apparatus comprising:
the terminal comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving an equipment access request of the terminal, and the equipment access request carries a public key and a digital certificate of a user;
the verification module is used for performing identity verification based on the public key of the user and the digital certificate;
the obtaining module is used for responding to the passing of the identity authentication, obtaining user authority information corresponding to the public key from a block chain system according to the public key, wherein the user authority information is used for indicating data operation and an operable data range which can be carried out by the user;
the sending module is used for sending the user permission information to the terminal;
and the response module is used for responding to the data operation request if the data operation request of the terminal is received and the data operation request conforms to the user permission information.
10. A data verification device based on block chains is applied to user node equipment in a block chain system, and the device comprises:
the sending module is used for sending a data operation request for target data to the target camera;
an obtaining module, configured to obtain a first storage address of the target data in the blockchain system and a second storage address of a first hash value in the blockchain system, where the first storage address is provided by the target camera based on the data operation request; acquiring the target data and the first hash value from the blockchain system based on the first storage address and the second storage address;
a generating module, configured to generate a second hash value based on the target data and the first storage address;
a verification module configured to verify validity of the target data based on the first hash value and the second hash value.
11. A computer device comprising a processor and a memory, the memory having stored therein at least one instruction loaded and executed by the processor to perform operations performed by the blockchain based data access method of any one of claims 1 to 6 or the operations performed by the blockchain based data authentication method of any one of claims 7 to 8.
12. A computer-readable storage medium having stored therein at least one instruction which is loaded and executed by a processor to perform operations performed by the blockchain-based data access method of any one of claims 1 to 6 or the operations performed by the blockchain-based data verification method of any one of claims 7 to 8.
CN202010290864.7A 2020-04-14 2020-04-14 Block chain based data access and verification method and device Pending CN113542191A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010290864.7A CN113542191A (en) 2020-04-14 2020-04-14 Block chain based data access and verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010290864.7A CN113542191A (en) 2020-04-14 2020-04-14 Block chain based data access and verification method and device

Publications (1)

Publication Number Publication Date
CN113542191A true CN113542191A (en) 2021-10-22

Family

ID=78088081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010290864.7A Pending CN113542191A (en) 2020-04-14 2020-04-14 Block chain based data access and verification method and device

Country Status (1)

Country Link
CN (1) CN113542191A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114629684A (en) * 2022-02-16 2022-06-14 深圳番多拉信息科技有限公司 Permission token processing method, system, device and storage medium based on block chain
CN116684207A (en) * 2023-08-03 2023-09-01 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114629684A (en) * 2022-02-16 2022-06-14 深圳番多拉信息科技有限公司 Permission token processing method, system, device and storage medium based on block chain
CN116684207A (en) * 2023-08-03 2023-09-01 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain
CN116684207B (en) * 2023-08-03 2023-10-20 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain

Similar Documents

Publication Publication Date Title
CN107480555B (en) Database access authority control method and device based on block chain
US20200285978A1 (en) Model training system and method, and storage medium
JP2022000757A5 (en)
JP4939851B2 (en) Information processing terminal, secure device, and state processing method
CA3087297A1 (en) Blockchain-based data verification method and apparatus, and electronic device
TW202018571A (en) Data storage method and device based on block chain and electronic equipment
CN106991298B (en) Access method of application program to interface, authorization request method and device
TW201733304A (en) Agent-based Turing complete transactions integrating feedback within a blockchain system
WO2020092094A1 (en) Method, apparatus, and electronic device for blockchain-based recordkeeping
CN113656780B (en) Cross-chain access control method and device
CN110268406B (en) Password security
US20220329446A1 (en) Enhanced asset management using an electronic ledger
CN112818328A (en) Multi-system authority management method, device, equipment and storage medium
CN110826111A (en) Test supervision method, device, equipment and storage medium
JP2007529056A5 (en)
CN114925141B (en) Cloud primary automation deployment management system and method based on block chain
CN112448946A (en) Log auditing method and device based on block chain
CN111460400A (en) Data processing method and device and computer readable storage medium
CN111414612A (en) Security protection method and device for operating system mirror image and electronic equipment
CN107948235A (en) Cloud data safety management and audit device based on JAR
CN113542191A (en) Block chain based data access and verification method and device
CN114138590A (en) Operation and maintenance processing method and device for Kubernetes cluster and electronic equipment
CN115242546A (en) Industrial control system access control method based on zero trust architecture
CN113364744A (en) Method and system for detecting domain user login authentication abnormity based on windows log
CN109033882A (en) A kind of safe dissemination method of retrospective big data and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination