CN114298699B - Method for generating and acquiring non-homogeneous general evidence and device - Google Patents

Method for generating and acquiring non-homogeneous general evidence and device Download PDF

Info

Publication number
CN114298699B
CN114298699B CN202111629494.6A CN202111629494A CN114298699B CN 114298699 B CN114298699 B CN 114298699B CN 202111629494 A CN202111629494 A CN 202111629494A CN 114298699 B CN114298699 B CN 114298699B
Authority
CN
China
Prior art keywords
target picture
verification value
password verification
acquiring
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111629494.6A
Other languages
Chinese (zh)
Other versions
CN114298699A (en
Inventor
彭龙腾
黄曙光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Youzhuju Network Technology Co Ltd
Original Assignee
Beijing Youzhuju Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Youzhuju Network Technology Co Ltd filed Critical Beijing Youzhuju Network Technology Co Ltd
Priority to CN202111629494.6A priority Critical patent/CN114298699B/en
Publication of CN114298699A publication Critical patent/CN114298699A/en
Application granted granted Critical
Publication of CN114298699B publication Critical patent/CN114298699B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The disclosure provides a method for generating, acquiring and device for a non-homogeneous pass, wherein the method for generating the non-homogeneous pass comprises the following steps: acquiring a target picture and description information corresponding to the target picture; sending the target picture to a block chain system; the block chain system is used for generating and storing a password verification value corresponding to the target picture; receiving a first password verification value which is sent by the blockchain system and corresponds to the target picture, and generating a content description file which corresponds to the target picture based on the first password verification value and the description information; transmitting the content description file to the blockchain system; and receiving a second password verification value corresponding to the content description file sent by the blockchain system, and generating a non-homogeneous pass corresponding to the target picture based on the second password verification value.

Description

Method for generating and acquiring non-homogeneous general evidence and device
Technical Field
The disclosure relates to the technical field of blockchains, and in particular relates to a generation method, an acquisition method and a device of a non-homogeneous universal certificate.
Background
In recent years, the development of the blockchain technology is rapid and gradually becomes a popular research field, and the blockchain technology is based on a decentralised peer-to-peer network, and combines a cryptography principle, time sequence data and a consensus mechanism by using open source software to ensure the continuity and persistence of each node in a distributed database, so that information can be verified and traced in real time, but is difficult to tamper and cannot be shielded, thereby creating a set of privacy, high-efficiency and safe shared value system.
One application scenario of the blockchain system is that based on the blockchain system and open source software, a Non-homogeneous universal certificate (Non-Fungible Token, NFT) uniquely representing a personal digital asset (such as a picture, audio/video data, etc.) is generated, so how to improve the security of the Non-homogeneous universal certificate is one of the problems to be solved in the field.
Disclosure of Invention
The embodiment of the disclosure at least provides a generation method, an acquisition method and a device of a non-homogeneous pass.
In a first aspect, an embodiment of the present disclosure provides a method for generating a non-homogeneous pass, including:
acquiring a target picture and description information corresponding to the target picture;
sending the target picture to a block chain system; the block chain system is used for generating and storing a password verification value corresponding to the target picture;
Receiving a first password verification value which is sent by the blockchain system and corresponds to the target picture, and generating a content description file which corresponds to the target picture based on the first password verification value and the description information;
transmitting the content description file to the blockchain system;
And receiving a second password verification value corresponding to the content description file sent by the blockchain system, and generating a non-homogeneous pass corresponding to the target picture based on the second password verification value.
In a possible implementation manner, the description information corresponding to the target picture includes a structured attribute tag of a target object in the target picture, where the structured attribute tag includes at least one attribute tag, and is used to characterize class information of the target object.
In a possible implementation manner, the generating a content description file corresponding to the target picture based on the first password verification value and the description information includes:
And ordering the description information and the first password verification value based on a preset arrangement sequence, and generating a content description file corresponding to the target picture.
In a possible implementation manner, the generating, based on the second password verification value, a non-homogeneous pass corresponding to the target picture includes:
creating an intelligent contract corresponding to the target picture based on an Ethernet standard protocol and the second password verification value;
and after the intelligent contract is created, taking the second password verification value as a non-homogeneous pass corresponding to the target picture.
In a second aspect, an embodiment of the present disclosure provides a method for acquiring a heterogeneous communication certificate, including:
acquiring a second password verification value corresponding to the target picture;
Acquiring a content description file corresponding to the target picture stored in a blockchain system based on the second password verification value;
Analyzing the content description file to obtain a first password verification value corresponding to the target picture;
And acquiring the target picture stored in the blockchain system based on the first password verification value.
In a possible implementation manner, the obtaining the target picture stored in the blockchain system based on the first password verification value includes:
Determining a first target storage location of the target picture in the blockchain system based on the first password verification value;
The target picture is retrieved from the target storage location in the blockchain system.
In a third aspect, an embodiment of the present disclosure further provides a device for generating a non-homogeneous pass, including:
the acquisition module is used for acquiring a target picture and description information corresponding to the target picture;
The first sending module is used for sending the target picture to a block chain system; the block chain system is used for generating and storing a password verification value corresponding to the target picture;
The first receiving module is used for receiving a first password verification value which is sent by the blockchain system and corresponds to the target picture, and generating a content description file which corresponds to the target picture based on the first password verification value and the description information;
the second sending module is used for sending the content description file to the blockchain system;
And the second receiving module is used for receiving a second password verification value corresponding to the content description file, which is sent by the blockchain system, and generating a non-homogeneous pass corresponding to the target picture based on the second password verification value.
In a possible implementation manner, the description information corresponding to the target picture includes a structured attribute tag of a target object in the target picture, where the structured attribute tag includes at least one attribute tag, and is used to characterize class information of the target object.
In a possible implementation manner, the first receiving module is configured to, when generating a content description file corresponding to the target picture based on the first password verification value and the description information:
And ordering the description information and the first password verification value based on a preset arrangement sequence, and generating a content description file corresponding to the target picture.
In a possible implementation manner, the second receiving module is configured to, when generating a non-homogeneous pass corresponding to the target picture based on the second password authentication value:
creating an intelligent contract corresponding to the target picture based on an Ethernet standard protocol and the second password verification value;
and after the intelligent contract is created, taking the second password verification value as a non-homogeneous pass corresponding to the target picture.
In a fourth aspect, an embodiment of the present disclosure further provides an apparatus for acquiring a heterogeneous universal certificate, including:
The first acquisition module is used for acquiring a second password verification value corresponding to the target picture;
The second acquisition module is used for acquiring a content description file corresponding to the target picture, which is stored in the blockchain system, based on the second password verification value;
The analysis module is used for analyzing the content description file and acquiring a first password verification value corresponding to the target picture;
and the third acquisition module is used for acquiring the target picture stored in the blockchain system based on the first password verification value.
In a possible implementation manner, the third obtaining module is configured to, when obtaining the target picture stored in the blockchain system based on the first password verification value:
Determining a first target storage location of the target picture in the blockchain system based on the first password verification value;
The target picture is retrieved from the target storage location in the blockchain system.
In a fifth aspect, embodiments of the present disclosure further provide a computer device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory in communication via the bus when the computer device is running, the machine-readable instructions when executed by the processor performing the steps of any one of the possible implementations of the first or second aspects.
In a sixth aspect, the presently disclosed embodiments also provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of any one of the possible implementations of the first or second aspects described above.
According to the method, the device, the computer equipment and the storage medium for generating the non-homogeneous pass, which are provided by the embodiment of the disclosure, the block chain system is called twice to generate and store the password verification value, so that the finally generated non-homogeneous pass is more difficult to tamper, and the security of the non-homogeneous pass in the subsequent transaction process is improved; on the other hand, by introducing the description information corresponding to the target picture when the password verification value is generated, the finally generated non-homogeneous pass can be made to contain the description information corresponding to the target picture, so that the non-homogeneous pass corresponding to the target picture can be quickly retrieved based on the description information corresponding to the target picture.
The foregoing objects, features and advantages of the disclosure will be more readily apparent from the following detailed description of the preferred embodiments taken in conjunction with the accompanying drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings required for the embodiments are briefly described below, which are incorporated in and constitute a part of the specification, these drawings showing embodiments consistent with the present disclosure and together with the description serve to illustrate the technical solutions of the present disclosure. It is to be understood that the following drawings illustrate only certain embodiments of the present disclosure and are therefore not to be considered limiting of its scope, for the person of ordinary skill in the art may admit to other equally relevant drawings without inventive effort.
Fig. 1 shows a flowchart of a method for generating a non-homogeneous pass provided by an embodiment of the present disclosure;
Fig. 2 is a flowchart illustrating a specific method for generating a non-homogeneous pass NFT corresponding to a target picture in the generation method of the non-homogeneous pass provided in the embodiments of the present disclosure;
FIG. 3 is a flowchart of a method for acquiring a heterogeneous pass provided by an embodiment of the present disclosure;
fig. 4 illustrates an architecture diagram of a generation apparatus for a non-homogeneous pass provided by an embodiment of the present disclosure;
fig. 5 illustrates an architecture diagram of a heterogeneous certificate acquisition device provided by an embodiment of the present disclosure;
fig. 6 shows a schematic structural diagram of a computer device according to an embodiment of the disclosure.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, but not all embodiments. The components of the embodiments of the present disclosure, which are generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present disclosure provided in the accompanying drawings is not intended to limit the scope of the disclosure, as claimed, but is merely representative of selected embodiments of the disclosure. All other embodiments, which can be made by those skilled in the art based on the embodiments of this disclosure without making any inventive effort, are intended to be within the scope of this disclosure.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
The term "and/or" is used herein to describe only one relationship, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist together, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, may mean including any one or more elements selected from the group consisting of A, B and C.
According to research, the blockchain technology is based on a decentralised peer-to-peer network, and the cryptographic principle, time sequence data and a consensus mechanism are combined by using open source software to ensure continuity and persistence of each node in a distributed database, so that information can be verified and traced in real time, but is difficult to tamper and cannot be shielded, thereby creating a set of privacy, high-efficiency and safe shared value system. One application scenario of the blockchain system is that based on the blockchain system and open source software, a Non-homogeneous universal certificate (Non-Fungible Token, NFT) uniquely representing a personal digital asset (such as a picture, audio/video data, etc.) is generated, so how to improve the security of the Non-homogeneous universal certificate is one of the problems to be solved in the field.
Based on the above study, the present disclosure provides a method for generating a non-homogeneous pass, which generates and stores a password verification value by calling a blockchain system twice, so that the finally generated non-homogeneous pass is more difficult to be tampered, and the security of the non-homogeneous pass in a subsequent transaction process is improved; on the other hand, by introducing the description information corresponding to the target picture when the password verification value is generated, the finally generated non-homogeneous pass can be made to contain the description information corresponding to the target picture, so that the non-homogeneous pass corresponding to the target picture can be quickly retrieved based on the description information corresponding to the target picture.
For the sake of understanding the present embodiment, first, a detailed description will be given of a method for generating a non-homogeneous pass disclosed in the present embodiment, where an execution subject of the method for generating a non-homogeneous pass provided in the present embodiment is generally a computer device with a certain computing capability, and the computer device includes, for example: the terminal device or the server or other processing devices may be an intelligent terminal device with a display function, for example, may be a smart phone, a tablet computer, an intelligent wearable device, etc. In some possible implementations, the method of generating the non-homogenous pass may be implemented by a processor invoking computer readable instructions stored in a memory.
Referring to fig. 1, a flowchart of a method for generating a non-homogeneous pass according to an embodiment of the disclosure is shown, where the method includes S101 to S105, where:
s101: and acquiring a target picture and description information corresponding to the target picture.
S102: sending the target picture to a block chain system; the block chain system is used for generating and storing a password verification value corresponding to the target picture.
S103: and receiving a first password verification value which is sent by the blockchain system and corresponds to the target picture, and generating a content description file which corresponds to the target picture based on the first password verification value and the description information.
S104: and sending the content description file to the blockchain system.
S105: and receiving a second password verification value corresponding to the content description file sent by the blockchain system, and generating a non-homogeneous pass corresponding to the target picture based on the second password verification value.
The following is a detailed description of the above steps.
For S101, the description information corresponding to the target picture includes a structured attribute tag of a target object in the target picture, where the structured attribute tag includes at least one attribute tag, and is used to characterize class information of the target object, and the description information corresponding to the target picture input by the user may be obtained through an input page of the user terminal.
Illustratively, taking the zebra fish as an example of the target object in the target picture, the structural attribute tag of the zebra fish may include the species of the genus Cyprinus of the phylum Acetoidae, cyprinus of the kingdom, and may be obtained by biologically classifying the target object.
S102: sending the target picture to a block chain system; the block chain system is used for generating and storing a password verification value corresponding to the target picture.
Here, the blockchain system may be an interplanetary file system (INTER PLANETARY FILE SYSTEM, IPFS), and the storing of the target picture may be completed by sending the target picture to the IPFS system.
Specifically, a ipfs warehouse may be created in the IPFS system by executing ipfs init commands and the target tiles may be added to a ipfs warehouse in the IPFS system by executing ipfs add commands.
Further, after the target picture is sent to the IPFS system, the IPFS system may generate and return, to the sender of the target picture, a first password verification value corresponding to the target picture based on the pixel values of each pixel point in the target picture, where preferably, the first password verification value may be a hash value obtained after performing a hash operation on the target picture.
S103: and receiving a first password verification value which is sent by the blockchain system and corresponds to the target picture, and generating a content description file which corresponds to the target picture based on the first password verification value and the description information.
Here, the content description file may be a json data format file, and the content description file may be stored at the same location as the target picture, so as to facilitate searching of the target picture and the content description file corresponding to the target picture.
In a possible implementation manner, when the content description file corresponding to the target picture is generated, the description information and the first password verification value may be ordered based on a preset arrangement order, so as to generate the content description file corresponding to the target picture.
For example, still taking the zebra fish as the target object in the target picture as an example, the content in the json data format file may be:
{
"name": " Zebrafish",
"description": "A kind of ornamental fish",
"image": "https://ipfs.io/ipfs/HIA",
"attributes": [
{
"trait_type": "Kingdom",
"value": " Animal"
} ,
{
"trait_type": "Phylum",
"value": "chordate"
} ,
.....
]
}
Wherein, "" name ":" Zebrafish "" means that the name of the target object is zebra fish; "description" A kind of ornamental fish "means that zebra fish is an ornamental fish; "image": "https:// ipfs.io/ipfs/HIA" ", indicating the address of the target picture in the ipfs system, and HIA indicating the first password authentication value, i.e. the target picture can be obtained from the ipfs system through the first password authentication value; "attributes" indicates the properties of the target object, including "track_type": "Kingdom", "value": "Animal" indicates that the zebra fish is of the Kingdom of animals, and "track_type": "Phylum", "value": "chordate" indicates that the zebra fish is of the phylum of chordopoda, etc
Therefore, the attribute information of the target object in the target picture can be recorded in a standardized manner by generating the content description file, so that the non-homogeneous pass corresponding to the target picture can be conveniently searched based on the attribute information.
S104: and sending the content description file to the blockchain system.
Here, the content description file corresponding to the target picture may be added to the ipfs repository in the IPFS system by executing ipfs add nft.
Further, after the content description file corresponding to the target picture is sent to the IPFS system, the IPFS system may generate and return, to the sender of the content description file, a second password verification value corresponding to the content description file, where preferably, the second password verification value may be a hash value obtained by performing a hash operation on the content of the content description file.
S105: and receiving a second password verification value corresponding to the content description file sent by the blockchain system, and generating a non-homogeneous pass corresponding to the target picture based on the second password verification value.
Here, the non-homogeneous pass has the characteristics of being inseparable, irreplaceable, unique, etc., and is a unique cryptocurrency token for representing a digital asset.
In a possible implementation manner, as shown in fig. 2, the non-homogeneous certificate corresponding to the target picture may be generated by the following steps:
S201: and creating an intelligent contract corresponding to the target picture based on the Ethernet standard protocol and the second password verification value.
Here, the ethernet standard protocol may be ERC721 protocol, and the smart contract is a computer protocol intended to propagate, verify or execute contracts in an informative manner. The smart contracts allow trusted transactions to be made without third parties, which transactions are traceable and irreversible.
Specifically, by running Remix IDE software of the ethernet workshop, an intelligent contract corresponding to the target picture may be generated based on the ERC721 protocol and the second password authentication value.
S202: and after the intelligent contract is created, taking the second password verification value as a non-homogeneous pass corresponding to the target picture.
Here, after the smart contract is generated, the second password verification value is tokenURI (which is a digital asset identifier, that is, the non-homogeneous certificate NFT) corresponding to the smart contract.
The embodiment of the disclosure further provides a method for acquiring the non-homogeneous pass, which is shown in fig. 3, and includes steps S301 to S304, wherein:
S301: and obtaining a second password verification value corresponding to the target picture.
S302: and acquiring a content description file corresponding to the target picture, which is stored in a blockchain system, based on the second password verification value.
Here, when the content description file corresponding to the target picture is acquired, a second target storage position of the content description file corresponding to the target picture in the blockchain system may be determined based on the second password verification value; and acquiring a content description file corresponding to the target picture from the second target storage position in the blockchain system.
S303: and analyzing the content description file to obtain a first password verification value corresponding to the target picture.
Here, in parsing the content description file, the target field in the content description file may be parsed based on the target character, thereby obtaining the first password authentication value.
When the content description file is analyzed, the content containing the first password verification value can be determined to be 'https:// ipfs.io/ipfs/HIA', wherein HIA is the first password verification value, by locating the target character 'image'.
S304: and acquiring the target picture stored in the blockchain system based on the first password verification value.
Here, when the target picture is acquired, a first target storage location of the target picture in the blockchain system may be determined based on the first password verification value; the target picture is retrieved from the first target storage location in the blockchain system.
And receiving the above example, wherein https (i/ii/i pfs) i/ipfs/HIA consisting of the first password authentication value HIA is a resource link of the target picture in the blockchain system, and the target picture can be obtained by accessing the resource link.
According to the generation method of the non-homogeneous pass, the block chain system is called twice to generate and store the password verification value, so that the finally generated non-homogeneous pass is more difficult to tamper with, and the safety of the non-homogeneous pass in the subsequent transaction process is improved; on the other hand, by introducing the description information corresponding to the target picture when the password verification value is generated, the finally generated non-homogeneous pass can be made to contain the description information corresponding to the target picture, so that the non-homogeneous pass corresponding to the target picture can be quickly retrieved based on the description information corresponding to the target picture.
The following describes the overall flow of the method for generating the non-homogeneous universal certificate provided in the embodiment of the present disclosure, taking the target object as a zebra fish as an example:
Step 1, a user side obtains a target picture containing zebra fish and description information corresponding to the target picture.
And step 2, the user side sends the target picture to a block chain system.
And step 3, the blockchain system generates a first password verification value based on the received target picture and sends the first password verification value to the user terminal.
And 4, the user side generates a content description file corresponding to the target picture based on the received first password verification value and description information corresponding to the target picture, and sends the content description file to the blockchain system.
And step 5, the blockchain system generates a second password verification value based on the received content description file and sends the second password verification value to the user terminal.
And 6, the user side generates a non-homogeneous pass corresponding to the target picture based on the received second password verification value.
Specifically, the specific content of each step is referred to the above related description, and will not be described herein, so that a non-homogeneous pass corresponding to the zebra fish can be generated through the steps.
Further, when other user ends want to acquire the target picture containing the zebra fish, the method can be realized by the following steps:
step one, obtaining a second password verification value corresponding to the target picture.
And step two, based on the second password verification value, acquiring a content description file corresponding to the target picture, which is stored in a blockchain system.
And thirdly, analyzing the content description file, and acquiring a first password verification value corresponding to the target picture.
And step four, acquiring the target picture stored in the blockchain system based on the first password verification value.
Specifically, the specific content of each step is described in the above related description, and will not be described herein, and the target picture including the zebra fish can be obtained through the steps.
It will be appreciated by those skilled in the art that in the above-described method of the specific embodiments, the written order of steps is not meant to imply a strict order of execution but rather should be construed according to the function and possibly inherent logic of the steps.
Based on the same inventive concept, the embodiment of the disclosure further provides a device for generating a non-homogeneous pass corresponding to the method for generating a non-homogeneous pass, and since the principle of solving the problem by the device in the embodiment of the disclosure is similar to that of the method for generating a non-homogeneous pass in the embodiment of the disclosure, the implementation of the device can refer to the implementation of the method, and the repetition is omitted.
Referring to fig. 4, an architecture diagram of a device for generating a non-homogeneous pass according to an embodiment of the disclosure is shown, where the device includes: an acquisition module 401, a first sending module 402, a first receiving module 403, a second sending module 404, and a second receiving module 405; wherein,
An obtaining module 401, configured to obtain a target picture and description information corresponding to the target picture;
A first sending module 402, configured to send the target picture to a blockchain system; the block chain system is used for generating and storing a password verification value corresponding to the target picture;
a first receiving module 403, configured to receive a first password verification value corresponding to the target picture sent by the blockchain system, and generate a content description file corresponding to the target picture based on the first password verification value and the description information;
a second sending module 404, configured to send the content description file to the blockchain system;
and a second receiving module 405, configured to receive a second password verification value corresponding to the content description file sent by the blockchain system, and generate a non-homogeneous pass corresponding to the target picture based on the second password verification value.
In a possible implementation manner, the description information corresponding to the target picture includes a structured attribute tag of a target object in the target picture, where the structured attribute tag includes at least one attribute tag, and is used to characterize class information of the target object.
In a possible implementation manner, the first receiving module 403 is configured to, when generating a content description file corresponding to the target picture based on the first password verification value and the description information:
And ordering the description information and the first password verification value based on a preset arrangement sequence, and generating a content description file corresponding to the target picture.
In a possible implementation manner, the second receiving module 405 is configured to, when generating a non-homogeneous pass corresponding to the target picture based on the second password authentication value:
creating an intelligent contract corresponding to the target picture based on an Ethernet standard protocol and the second password verification value;
and after the intelligent contract is created, taking the second password verification value as a non-homogeneous pass corresponding to the target picture.
According to the generation device of the non-homogeneous pass, the block chain system is called twice to generate and store the password verification value, so that the finally generated non-homogeneous pass is more difficult to tamper, and the safety of the non-homogeneous pass in the subsequent transaction process is improved; on the other hand, by introducing the description information corresponding to the target picture when the password verification value is generated, the finally generated non-homogeneous pass can be made to contain the description information corresponding to the target picture, so that the non-homogeneous pass corresponding to the target picture can be quickly retrieved based on the description information corresponding to the target picture.
Referring to fig. 5, an architecture diagram of a heterogeneous certificate acquisition device according to an embodiment of the present disclosure is shown, where the device includes: a first obtaining module 501, a second obtaining module 502, an analyzing module 503, and a third obtaining module 504; wherein,
A first obtaining module 501, configured to obtain a second password verification value corresponding to the target picture;
A second obtaining module 502, configured to obtain, based on the second password verification value, a content description file corresponding to the target picture stored in a blockchain system;
the parsing module 503 is configured to parse the content description file, and obtain a first password verification value corresponding to the target picture;
A third obtaining module 504, configured to obtain the target picture stored in the blockchain system based on the first password verification value.
In a possible implementation manner, the third obtaining module 504 is configured to, when obtaining the target picture stored in the blockchain system based on the first password verification value:
Determining a first target storage location of the target picture in the blockchain system based on the first password verification value;
The target picture is retrieved from the target storage location in the blockchain system.
The process flow of each module in the apparatus and the interaction flow between the modules may be described with reference to the related descriptions in the above method embodiments, which are not described in detail herein.
Based on the same technical concept, the embodiment of the disclosure also provides computer equipment. Referring to fig. 6, a schematic diagram of a computer device 600 according to an embodiment of the disclosure includes a processor 601, a memory 602, and a bus 603. The memory 602 is used for storing execution instructions, including a memory 6021 and an external memory 6022; the memory 6021 is also referred to as an internal memory, and is used for temporarily storing operation data in the processor 601 and data exchanged with the external memory 6022 such as a hard disk, the processor 601 exchanges data with the external memory 6022 through the memory 6021, and when the computer device 600 operates, the processor 601 and the memory 602 communicate through the bus 603, so that the processor 601 executes the following instructions:
acquiring a target picture and description information corresponding to the target picture;
sending the target picture to a block chain system; the block chain system is used for generating and storing a password verification value corresponding to the target picture;
Receiving a first password verification value which is sent by the blockchain system and corresponds to the target picture, and generating a content description file which corresponds to the target picture based on the first password verification value and the description information;
transmitting the content description file to the blockchain system;
And receiving a second password verification value corresponding to the content description file sent by the blockchain system, and generating a non-homogeneous pass corresponding to the target picture based on the second password verification value.
In a possible implementation manner, in the instruction of the processor 601, the description information corresponding to the target picture includes a structured attribute tag of a target object in the target picture, where the structured attribute tag includes at least one attribute tag for characterizing category information of the target object.
In a possible implementation manner, in an instruction of the processor 601, the generating a content description file corresponding to the target picture based on the first password verification value and the description information includes:
And ordering the description information and the first password verification value based on a preset arrangement sequence, and generating a content description file corresponding to the target picture.
In a possible implementation manner, in the instruction of the processor 601, the generating, based on the second password verification value, a non-homogeneous certificate corresponding to the target picture includes:
creating an intelligent contract corresponding to the target picture based on an Ethernet standard protocol and the second password verification value;
and after the intelligent contract is created, taking the second password verification value as a non-homogeneous pass corresponding to the target picture.
Or cause the processor 601 to execute the following instructions:
acquiring a second password verification value corresponding to the target picture;
Acquiring a content description file corresponding to the target picture stored in a blockchain system based on the second password verification value;
Analyzing the content description file to obtain a first password verification value corresponding to the target picture;
And acquiring the target picture stored in the blockchain system based on the first password verification value.
In a possible implementation manner, in the instructions of the processor 601, the obtaining the target picture stored in the blockchain system based on the first password verification value includes:
Determining a first target storage location of the target picture in the blockchain system based on the first password verification value;
The target picture is retrieved from the target storage location in the blockchain system.
The disclosed embodiments also provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method for generating a non-homogeneous pass described in the method embodiments above. Wherein the storage medium may be a volatile or nonvolatile computer readable storage medium.
The embodiments of the present disclosure further provide a computer program product, where the computer program product carries program code, where instructions included in the program code may be used to perform the steps of the method for generating a non-homogeneous pass described in the foregoing method embodiments, and specifically reference may be made to the foregoing method embodiments, which are not described herein.
Wherein the above-mentioned computer program product may be realized in particular by means of hardware, software or a combination thereof. In an alternative embodiment, the computer program product is embodied as a computer storage medium, and in another alternative embodiment, the computer program product is embodied as a software product, such as a software development kit (Software Development Kit, SDK), or the like.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described system and apparatus may refer to corresponding procedures in the foregoing method embodiments, which are not described herein again. In the several embodiments provided in the present disclosure, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present disclosure may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer readable storage medium executable by a processor. Based on such understanding, the technical solution of the present disclosure may be embodied in essence or a part contributing to the prior art or a part of the technical solution, or in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present disclosure. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Finally, it should be noted that: the foregoing examples are merely specific embodiments of the present disclosure, and are not intended to limit the scope of the disclosure, but the present disclosure is not limited thereto, and those skilled in the art will appreciate that while the foregoing examples are described in detail, it is not limited to the disclosure: any person skilled in the art, within the technical scope of the disclosure of the present disclosure, may modify or easily conceive changes to the technical solutions described in the foregoing embodiments, or make equivalent substitutions for some of the technical features thereof; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the disclosure, and are intended to be included within the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (9)

1. A method for generating a non-homogeneous pass, comprising:
acquiring a target picture and description information corresponding to the target picture;
sending the target picture to a block chain system; the block chain system is used for generating and storing a password verification value corresponding to the target picture;
receiving a first password verification value corresponding to the target picture sent by the blockchain system, and sequencing the description information and the first password verification value based on a preset arrangement sequence to generate a content description file corresponding to the target picture;
transmitting the content description file to the blockchain system;
And receiving a second password verification value corresponding to the content description file sent by the blockchain system, and generating a non-homogeneous pass corresponding to the target picture based on the second password verification value.
2. The method according to claim 1, wherein the description information corresponding to the target picture includes a structured attribute tag of a target object in the target picture, and the structured attribute tag includes at least one attribute tag for characterizing category information of the target object.
3. The method of claim 1, wherein the generating a non-homogeneous pass corresponding to the target picture based on the second password authentication value comprises:
creating an intelligent contract corresponding to the target picture based on an Ethernet standard protocol and the second password verification value;
and after the intelligent contract is created, taking the second password verification value as a non-homogeneous pass corresponding to the target picture.
4. The method for acquiring the non-homogeneous pass is characterized by comprising the following steps:
acquiring a second password verification value corresponding to the target picture;
Acquiring a content description file corresponding to the target picture stored in a blockchain system based on the second password verification value, wherein the content description file is generated by description information and a first password verification value based on a preset ordering sequence, the description information corresponds to the target picture, the content description file corresponds to the second password verification value, and the first password verification value corresponds to the target picture;
Analyzing the content description file to obtain a first password verification value corresponding to the target picture;
Acquiring the target picture stored in the blockchain system based on the first password verification value;
And acquiring the non-homogeneous pass corresponding to the target picture based on the description information corresponding to the target picture.
5. The method of claim 4, wherein the obtaining the target picture stored in the blockchain system based on the first cryptographic verification value comprises:
Determining a first target storage location of the target picture in the blockchain system based on the first password verification value;
The target picture is retrieved from the target storage location in the blockchain system.
6. A generation apparatus for a non-homogeneous pass, comprising:
the acquisition module is used for acquiring a target picture and description information corresponding to the target picture;
The first sending module is used for sending the target picture to a block chain system; the block chain system is used for generating and storing a password verification value corresponding to the target picture;
The first receiving module is used for receiving a first password verification value corresponding to the target picture sent by the blockchain system, sequencing the description information and the first password verification value based on a preset arrangement sequence and generating a content description file corresponding to the target picture;
the second sending module is used for sending the content description file to the blockchain system;
And the second receiving module is used for receiving a second password verification value corresponding to the content description file, which is sent by the blockchain system, and generating a non-homogeneous pass corresponding to the target picture based on the second password verification value.
7. An acquisition device for a heterogeneous communication certificate, comprising:
The first acquisition module is used for acquiring a second password verification value corresponding to the target picture;
The second acquisition module is used for acquiring a content description file corresponding to the target picture stored in the blockchain system based on the second password verification value, wherein the content description file is generated by description information and a first password verification value based on a preset ordering sequence, the description information corresponds to the target picture, the content description file corresponds to the second password verification value, and the first password verification value corresponds to the target picture;
The analysis module is used for analyzing the content description file and acquiring a first password verification value corresponding to the target picture;
And the third acquisition module is used for acquiring the target picture stored in the blockchain system based on the first password verification value and acquiring the non-homogeneous pass corresponding to the target picture based on the description information corresponding to the target picture.
8. A computer device, comprising: a processor, a memory and a bus, said memory storing machine readable instructions executable by said processor, said processor and said memory communicating via the bus when the computer device is running, said machine readable instructions when executed by said processor performing the steps of the method of generating a non-homogenous pass according to any of claims 1 to 3 or the steps of the method of acquiring a non-homogenous pass according to any of claims 4 to 5.
9. A computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, performs the steps of the method for generating a heterogeneous pass according to any one of claims 1 to 3 or the steps of the method for acquiring a heterogeneous pass according to any one of claims 4 to 5.
CN202111629494.6A 2021-12-28 2021-12-28 Method for generating and acquiring non-homogeneous general evidence and device Active CN114298699B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111629494.6A CN114298699B (en) 2021-12-28 2021-12-28 Method for generating and acquiring non-homogeneous general evidence and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111629494.6A CN114298699B (en) 2021-12-28 2021-12-28 Method for generating and acquiring non-homogeneous general evidence and device

Publications (2)

Publication Number Publication Date
CN114298699A CN114298699A (en) 2022-04-08
CN114298699B true CN114298699B (en) 2024-05-07

Family

ID=80970819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111629494.6A Active CN114298699B (en) 2021-12-28 2021-12-28 Method for generating and acquiring non-homogeneous general evidence and device

Country Status (1)

Country Link
CN (1) CN114298699B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114968595A (en) * 2022-06-15 2022-08-30 网易(杭州)网络有限公司 NFT owner information processing method and device, computer equipment and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740317A (en) * 2018-12-29 2019-05-10 北京奇虎科技有限公司 A kind of digital finger-print based on block chain deposits card method and device
US10373129B1 (en) * 2018-03-05 2019-08-06 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
CN110175436A (en) * 2019-05-16 2019-08-27 中细软集团有限公司 The generation of block chain digital certificate, verification method, computer equipment and storage medium
CN110188515A (en) * 2019-05-16 2019-08-30 中细软集团有限公司 A kind of block chain network copyright register method and client
CN110197445A (en) * 2019-05-16 2019-09-03 中细软集团有限公司 Generation, querying method, computer equipment and the storage medium of intellectual property state
WO2019227225A1 (en) * 2018-05-30 2019-12-05 Skrumble Technologies Inc. Systems and methods for establishing communications via blockchain
CN110995670A (en) * 2019-11-20 2020-04-10 深圳市雄帝科技股份有限公司 Block chain-based digital identity information management method and system
CN112039675A (en) * 2020-08-28 2020-12-04 山东爱城市网信息技术有限公司 Token generation and authentication method based on block chain intelligent contract
CN112580073A (en) * 2020-12-17 2021-03-30 昆明理工大学 Evidence storing method and system based on block chain and IPFS
CN113159952A (en) * 2021-04-25 2021-07-23 平安科技(深圳)有限公司 Method, system, device and storage medium for storing digital assets based on block chain
CN113190609A (en) * 2021-05-28 2021-07-30 腾讯科技(深圳)有限公司 Data warehouse management method, system, device, storage medium and electronic equipment
CN113570387A (en) * 2021-07-29 2021-10-29 北京金玖银玖数字科技有限公司 Artwork tracing method based on block chain and electronic equipment

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10373129B1 (en) * 2018-03-05 2019-08-06 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
WO2019227225A1 (en) * 2018-05-30 2019-12-05 Skrumble Technologies Inc. Systems and methods for establishing communications via blockchain
CN109740317A (en) * 2018-12-29 2019-05-10 北京奇虎科技有限公司 A kind of digital finger-print based on block chain deposits card method and device
CN110175436A (en) * 2019-05-16 2019-08-27 中细软集团有限公司 The generation of block chain digital certificate, verification method, computer equipment and storage medium
CN110188515A (en) * 2019-05-16 2019-08-30 中细软集团有限公司 A kind of block chain network copyright register method and client
CN110197445A (en) * 2019-05-16 2019-09-03 中细软集团有限公司 Generation, querying method, computer equipment and the storage medium of intellectual property state
CN110995670A (en) * 2019-11-20 2020-04-10 深圳市雄帝科技股份有限公司 Block chain-based digital identity information management method and system
CN112039675A (en) * 2020-08-28 2020-12-04 山东爱城市网信息技术有限公司 Token generation and authentication method based on block chain intelligent contract
CN112580073A (en) * 2020-12-17 2021-03-30 昆明理工大学 Evidence storing method and system based on block chain and IPFS
CN113159952A (en) * 2021-04-25 2021-07-23 平安科技(深圳)有限公司 Method, system, device and storage medium for storing digital assets based on block chain
CN113190609A (en) * 2021-05-28 2021-07-30 腾讯科技(深圳)有限公司 Data warehouse management method, system, device, storage medium and electronic equipment
CN113570387A (en) * 2021-07-29 2021-10-29 北京金玖银玖数字科技有限公司 Artwork tracing method based on block chain and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A Blockchain based decentralized computing and NFT infrastructure for game networks;Khushboo Sharma等;《2020 second international conference on blockchain computing and applications》;20201203;1-9 *
基于区块链技术的遗嘱安全存证系统的研究与设计;王丽;《中国优秀硕士学位论文全文数据库 社会科学I辑》;20190815;G117-55 *

Also Published As

Publication number Publication date
CN114298699A (en) 2022-04-08

Similar Documents

Publication Publication Date Title
CN109067541B (en) Data verification method and device based on block chain and electronic equipment
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
KR102224390B1 (en) Data statistics method and apparatus
CN111316279A (en) Computer-implemented system and method for connecting a blockchain with a digital twin set
CN109951547B (en) Transaction request parallel processing method, device, equipment and medium
CN108897691A (en) Data processing method, device, server and medium based on interface analog service
CN108959430B (en) Advertisement promotion data acquisition method, device and equipment
CN110875850B (en) Firmware upgrading method and system, readable storage medium and terminal equipment
CN112101938B (en) Digital seal using method and device based on block chain and electronic equipment
CN113268336B (en) Service acquisition method, device, equipment and readable medium
CN112163412B (en) Data verification method and device, electronic equipment and storage medium
CN111782551B (en) Test method and device for block chain item and computer equipment
CN111488372A (en) Data processing method, device and storage medium
CN114298699B (en) Method for generating and acquiring non-homogeneous general evidence and device
CN111881209A (en) Data synchronization method and device for heterogeneous database, electronic equipment and medium
US9747448B2 (en) Cryptographic mechanisms to provide information privacy and integrity
CN112291321A (en) Service processing method, device and system
CN111178846A (en) Workflow file generation method, device, equipment and storage medium
CN108052842A (en) Storage, verification method and the device of signed data
CN110781523B (en) Method and apparatus for processing information
Moschoyiannis et al. Trace-based verification of rule-based service choreographies
CN112862648A (en) Block chain-based multi-department joint cooperation method, device, equipment and medium
CN110337074B (en) Interactive information transmission method, system and terminal equipment
CN112835901A (en) File storage method and device, computer equipment and computer readable storage medium
CN111291351B (en) Activity participation method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant