CN116684207B - Method, device, equipment and medium for processing monitoring data based on blockchain - Google Patents

Method, device, equipment and medium for processing monitoring data based on blockchain Download PDF

Info

Publication number
CN116684207B
CN116684207B CN202310971749.XA CN202310971749A CN116684207B CN 116684207 B CN116684207 B CN 116684207B CN 202310971749 A CN202310971749 A CN 202310971749A CN 116684207 B CN116684207 B CN 116684207B
Authority
CN
China
Prior art keywords
information
monitoring
identity
blockchain
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310971749.XA
Other languages
Chinese (zh)
Other versions
CN116684207A (en
Inventor
李浩天
郝增
杨海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fangzhou Technology Co ltd
Original Assignee
Hangzhou Fangzhou Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fangzhou Technology Co ltd filed Critical Hangzhou Fangzhou Technology Co ltd
Priority to CN202310971749.XA priority Critical patent/CN116684207B/en
Publication of CN116684207A publication Critical patent/CN116684207A/en
Application granted granted Critical
Publication of CN116684207B publication Critical patent/CN116684207B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/94Hardware or software architectures specially adapted for image or video understanding
    • G06V10/95Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/44Event detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application relates to the technical field of computers, in particular to a blockchain-based monitoring data processing method, a blockchain-based monitoring data processing device, blockchain-based monitoring data processing equipment and a blockchain-based monitoring data processing medium, wherein the method comprises the following steps: acquiring monitoring information and a first identity identifier corresponding to monitoring equipment, wherein the monitoring information is information obtained after analysis based on a monitoring image acquired by the monitoring equipment, the monitoring information comprises a monitoring image and a corresponding analysis result, and the monitoring image is an image of a person or an image with environmental variation; based on the first identity, determining a plurality of second identities corresponding to the first identity, wherein the second identities are identities of terminal equipment with reference rights corresponding to the first identity; establishing the monitoring information, the first identity identification and the association information of a plurality of second identity identifications; encrypting the associated information to obtain encrypted associated information; and uploading the monitoring information and the encrypted associated information to the blockchain node. The application effectively reduces the risk of monitoring data leakage.

Description

Method, device, equipment and medium for processing monitoring data based on blockchain
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a medium for processing monitoring data based on a blockchain.
Background
In the security system, a monitoring system is an important component, a camera and a sensor perform data acquisition work, the acquired information is analyzed, and the analyzed monitoring information is stored.
Generally, when monitoring information is queried, only correct login information is needed to query the monitoring information on a plurality of different terminal devices, namely, the login of an account number and a password is input on the terminal device, after the account number and the password are verified to be correct, the terminal device can read a monitoring information storage library and query related monitoring information, however, when the account number and the password are stolen, the related monitoring information can still be queried, and the monitoring information in the related technology has a larger leakage risk.
Thus, how to reduce the risk of monitoring information leakage is a problem that needs to be solved by those skilled in the art.
Disclosure of Invention
In order to reduce the risk of monitoring information leakage, the application provides a blockchain-based monitoring data processing method, a blockchain-based monitoring data processing device, blockchain-based monitoring data processing equipment and a blockchain-based monitoring data processing medium.
In a first aspect, the present application provides a blockchain-based monitoring data processing method, which adopts the following technical scheme:
a blockchain-based monitoring data processing method, comprising:
acquiring monitoring information and a first identity identifier corresponding to monitoring equipment, wherein the monitoring information is information obtained after analysis based on a monitoring image acquired by the monitoring equipment, the monitoring information comprises a monitoring image and a corresponding analysis result, and the monitoring image is an image of a person or an image with environmental variation;
determining a plurality of second identity marks corresponding to the first identity marks based on the first identity marks, wherein the second identity marks are the identity marks of the terminal equipment with the reference authority corresponding to the first identity marks;
establishing the monitoring information, the first identity identification and the association information of the plurality of second identity identifications;
encrypting the associated information to obtain encrypted associated information; and uploading the monitoring information and the encrypted associated information to a blockchain node.
In a possible implementation manner, the monitoring information includes at least: text information, wherein the determining, based on the first identity, a plurality of second identities corresponding to the first identity includes:
Acquiring network information corresponding to the first identity;
determining a plurality of devices to be determined using the same network corresponding to the first identity based on the network information;
acquiring history reference information corresponding to each of the plurality of devices to be determined;
carrying out information category identification on the text information to determine the category to which the information of the monitoring information belongs;
selecting a plurality of target devices with the same category of the reference information as the category of the information from the plurality of devices to be determined, wherein the category of the reference information is obtained by identifying historical reference information;
and acquiring the equipment identifiers corresponding to the target equipment respectively, and determining the equipment identifiers corresponding to the target equipment respectively as a plurality of second identifiers corresponding to the first identifiers.
In one possible implementation manner, encrypting the association information to obtain encrypted association information includes:
acquiring the position information of the monitoring equipment, and determining the privacy class corresponding to the installation position information of the monitoring equipment based on the corresponding relation between the preset position information and the privacy class and the installation position information of the monitoring equipment;
Determining a target information encryption strategy based on the privacy class and a preset information encryption strategy;
and encrypting the associated information by using the target information encryption strategy to obtain the encrypted associated information.
In one possible implementation, obtaining the monitoring information includes:
acquiring a plurality of continuous monitoring images within a preset duration;
determining whether there is an image variation based on the plurality of continuous monitoring images;
if yes, carrying out image recognition on the change image to determine the category to which the change image belongs, wherein the category to which the change image belongs comprises: personnel changes, and/or environmental changes;
if the category to which the change image belongs changes, determining personnel identification information based on the change image, wherein the personnel identification information at least comprises personnel identification marks and personnel action events;
if the category of the change image is environmental change, acquiring environmental change data, and determining environmental security risk assessment information based on the environmental change data;
determining the plurality of continuous monitoring images and image variation information as monitoring information, the image variation information including: personnel identification information and/or environmental security risk assessment information.
In one possible implementation manner, the uploading the monitoring information and the encrypted associated information to a blockchain node includes:
acquiring data bearing capacity information corresponding to each block link point;
determining target block chain nodes which are not smaller than the information of the bearing capacity to be determined from all the block chain nodes based on the data bearing capacity information and the information of the bearing capacity to be respectively corresponding to all the block chain link points, wherein the information of the bearing capacity to be determined is based on the monitoring information and the encrypted association information;
and uploading the monitoring information and the encrypted associated information to a target blockchain node.
In one possible implementation manner, after the uploading the monitoring information and the encrypted association information to a block link point, the method further includes:
and acquiring rewards corresponding to the information of the to-be-supported capacity based on the information of the to-be-supported capacity, and sending the rewards to a target blockchain node, wherein the target blockchain node is a blockchain node uploaded by the monitoring information and the encrypted associated information.
In one possible implementation manner, before the establishing the association information of the monitoring information, the first identity identifier and the plurality of second identities, the method further includes:
Acquiring an information format corresponding to the monitoring information, and judging whether the information format is a preset standard format or not;
if not, converting the information format corresponding to the monitoring information into a preset standard format to obtain the monitoring information after format conversion;
correspondingly, the establishing the monitoring information, the first identity identifier and the association information of the plurality of second identities includes:
and establishing the monitoring information after format conversion, the first identity identification and the association information of the plurality of second identity identifications.
In a second aspect, the present application provides a blockchain-based monitoring data processing apparatus, which adopts the following technical scheme:
a blockchain-based monitoring data processing device, comprising:
the system comprises an acquisition module, a display module and a display module, wherein the acquisition module is used for acquiring monitoring information and a first identity identifier corresponding to monitoring equipment, the monitoring information is information obtained after analysis based on a monitoring image acquired by the monitoring equipment, the monitoring information comprises a monitoring image and a corresponding analysis result, and the monitoring image is an image of a person or an image with environmental variation;
the second identity identification module is used for determining a plurality of second identity identifications corresponding to the first identity identification based on the first identity identification, wherein the second identity identifications are the identity identifications of the terminal equipment with the reference authority corresponding to the first identity identification;
The associated information establishing module is used for establishing the associated information of the monitoring information, the first identity identification and the plurality of second identity identifications;
the storage module is used for encrypting the associated information to obtain the encrypted associated information; and uploading the monitoring information and the encrypted associated information to a blockchain node.
Third, the application provides an electronic device, which adopts the following technical scheme:
at least one processor;
a memory;
at least one application program, wherein the at least one application program is stored in the memory and configured to be executed by the at least one processor, the at least one application program configured to: a blockchain-based monitoring data processing method as in any of the first aspects is performed.
In a fourth aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
a computer readable storage medium having stored thereon a computer program which, when executed in a computer, causes the computer to perform the blockchain-based monitoring data processing method of any of the first aspects.
In summary, the application has the following beneficial technical effects:
Acquiring monitoring information and first identity identifiers corresponding to the monitoring equipment, and determining a plurality of corresponding second identity identifiers according to the first identity identifiers so as to determine the reference authority of the monitoring information, so that the identity identifiers of terminal equipment outside the reference authority are prevented from acquiring the monitoring information, and the occurrence probability of the leakage problem of the monitoring information is reduced; and then the monitoring information, the first identity mark and the second identity mark are encrypted after being correlated to avoid the second identity information with the reference authority from being tampered, and the encrypted correlated information is stored in the blockchain node with good data confidentiality. The association relation among the monitoring information, the first identity mark and the second identity mark is constructed, encrypted and uploaded to the blockchain, and then the monitoring data to be queried can be obtained only when the identity mark is any second identity mark during the reading of the monitoring data. Compared with the prior art, the method and the device for uploading the monitoring information to the blockchain after encrypting the monitoring information, the first identity mark and the plurality of second identity marks strengthen the protection of the monitoring information, and solve the technical problem that the monitoring information has higher leakage risk in the prior art.
Drawings
Fig. 1 is a schematic diagram of a block-based link point connection according to an embodiment of the present application.
Fig. 2 is a flowchart of a blockchain-based monitoring data processing method according to an embodiment of the present application.
Fig. 3 is a schematic structural diagram of a blockchain-based monitoring data processing device according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The application is described in further detail below in connection with fig. 1 to 4.
The present embodiment is merely illustrative of the present application and is not intended to limit the present application, and those skilled in the art, after having read the present specification, may make modifications to the present embodiment without creative contribution as necessary, but are protected by patent laws within the scope of the present application.
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In addition, the term "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In this context, unless otherwise specified, the term "/" generally indicates that the associated object is an "or" relationship.
For ease of understanding, the following terms are explained.
Blockchain: blockchains are novel application modes of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms, and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
In the embodiment of the application, the blockchains are blockchain networks, each blockchain network comprises a plurality of blockchain nodes, and when the monitoring information and the encrypted associated information are successfully uplink on any blockchain node, the monitoring information and the encrypted associated information are quickly transmitted to other blockchain nodes for storage within a second-level time period, and the blockchain nodes cooperate with each other. Fig. 1 is a schematic block link point connection diagram according to an embodiment of the present application.
In addition, each blockchain node corresponds to a node identifier, and each blockchain node of the blockchain network may store node identifiers of other blockchain nodes in the data sharing system, so that the generated block is broadcast to other blockchain nodes according to the node identifiers of the other blockchain nodes. The node identifier may be an IP (Internet Protocol, protocol interconnecting between networks) address, or any other information that can be used to identify the node.
The embodiment of the application provides a blockchain-based monitoring data processing method which is executed by electronic equipment, wherein the electronic equipment can be a server, the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and a cloud server for providing cloud computing service. The servers may be directly or indirectly connected via wired or wireless communication, and embodiments of the present application are not limited in this regard. The embodiment of the application does not limit the scene suitable for the block chain-based monitoring data processing, and can be applied to enterprise scenes.
Referring to fig. 2, fig. 2 is a flowchart of a blockchain-based monitoring data processing method according to an embodiment of the present application, where the method includes steps S101, S102, S103 and S104, where:
Step S101, acquiring monitoring information and a first identity identifier corresponding to the monitoring equipment, wherein the monitoring information is information obtained after analysis based on a monitoring image acquired by the monitoring equipment, the monitoring information comprises a monitoring image and a corresponding analysis result, and the monitoring image is an image of a person or an image with environmental change.
Specifically, after receiving the data processing request, a monitoring program is integrated in the electronic device in advance, and the monitoring program is used for monitoring the triggering behavior of the processing request, and once the processing request is monitored to be triggered, the monitoring information and the first identity identifier of the monitoring device are obtained.
The monitoring information comprises a monitoring image and a corresponding analysis result. The monitoring image may be an image of a person or an image corresponding to an environmental change, where the environmental change may be: a change in the location of a document in the room. The types of the monitoring images are different, and the analysis methods are different, for example, when the types of the monitoring images are images of people, the analysis modes comprise personnel change analysis and identity recognition of change personnel; when the monitoring image type is an image of the environment, the analysis modes include: environmental change analysis and environmental risk assessment analysis.
In the embodiment of the application, the first identity identifier corresponding to the monitoring device can be a factory number of the monitoring device, or can be a monitoring number set manually, for example, a 001-number monitoring device, a 020-number monitoring device or a 013-number monitoring device, and the first identity identifiers corresponding to each monitoring device are different and are all stored in the electronic device by a technician.
Step S102, based on the first identity, a plurality of second identities corresponding to the first identity are determined, wherein the second identities are identities of terminal equipment with reference authority corresponding to the first identity.
Specifically, the terminal equipment with the consulting authority is determined, so that the limit of the terminal equipment with the consulting authority is realized, the equipment without the consulting authority can be prevented from consulting the monitoring information, and the risk of monitoring information leakage is effectively reduced.
In the embodiment of the application, in order to improve the accuracy of confirming the terminal equipment with the reference authority, the second identity identifier may be a factory number corresponding to the terminal equipment with the reference authority, or may be a position where the terminal equipment with the reference authority is located, for example, the first terminal equipment with the reference authority in the financial room and the second terminal equipment with the reference authority in the financial room.
Step S103, establishing the monitoring information, the first identity identification and the association information of a plurality of second identity identifications.
Specifically, the establishment of the association relation can be realized in the form of a working list, the monitoring information, the first identity and the second identity are stored in the list, the identity of the terminal equipment with the authority of referring to the monitoring equipment can be definitely determined through the establishment of the association relation, and the terminal equipment without the authority of referring to the monitoring information is prevented from being queried. It can be understood that the storage location of the associated information is a blockchain network, which means that after the associated information is uplink, the monitoring information, the first identity and the plurality of second identities cannot be tampered, and whether the monitoring information can be referred to can be directly determined according to the second identities stored in the blockchain network when the monitoring information is referred to later. As shown in Table 1, a schematic table of related information is provided for an embodiment of the present application, taking monitoring equipment of a financial room in an enterprise as an example.
TABLE 1
Step S104, encrypting the associated information to obtain the encrypted associated information; and uploading the monitoring information and the encrypted associated information to the blockchain node.
Specifically, in the embodiment of the present application, the associated information may be encrypted using an asymmetric encryption method or an encryption method based on a privacy class. Preferably, the related information is encrypted by using a privacy class-based encryption mode, so that the monitoring information can be encrypted in a targeted manner, and the protection degree of important encrypted information can be effectively improved by setting stronger encryption degree for data with higher importance; the blockchain network has the characteristics of tamper resistance and high confidentiality, so that the protection of the monitoring information and the encrypted associated information can be effectively improved by uploading the blockchain network to the blockchain node, and the risk of leakage of the monitoring information is reduced. And then, the block chain network can respectively send the newly generated blocks to other block chain nodes, the other block chain nodes verify the newly generated blocks, and after the verification is completed, the newly generated blocks are added into the stored block chain so as to complete the storage of the monitoring information and the encrypted associated information.
Based on the embodiment, the monitoring information and the first identity identifiers corresponding to the monitoring equipment are obtained, and then a plurality of corresponding second identity identifiers are determined according to the first identity identifiers so as to determine the consulting authority of the monitoring information, so that the identity identifiers of the terminal equipment outside the consulting authority are prevented from obtaining the monitoring information, and the occurrence probability of the leakage problem of the monitoring information is reduced; and then the monitoring information, the first identity mark and the second identity mark are encrypted after being correlated to avoid the second identity information with the reference authority from being tampered, and the encrypted correlated information is stored in the blockchain node with good data confidentiality. The association relation among the monitoring information, the first identity mark and the second identity mark is constructed, encrypted and uploaded to the blockchain, and then the monitoring data to be queried can be obtained only when the identity mark is any second identity mark during the reading of the monitoring data. Compared with the prior art, the method and the device for uploading the monitoring information to the blockchain after encrypting the monitoring information, the first identity mark and the plurality of second identity marks strengthen the protection of the monitoring information, and solve the technical problem that the monitoring information has higher leakage risk in the prior art.
Further, when a certain device needs to review monitoring information from the blockchain network, the review device sends a review request, wherein the review request comprises the monitoring information to be reviewed and the identification of the review device, the electronic device sends the review request to the blockchain network, the electronic device acquires association information corresponding to the review request from the blockchain network after receiving the review request, and matches the identification of the review device with a second identification in the association information one by one so as to determine whether the review device has review authority, and if any second identification in the association information is the same as the identification of the review device, the review device can be determined to have review authority, and the monitoring information in the association information is sent to the review device; otherwise, determining that the consulting equipment does not have the consulting authority, and generating a refusing consulting reminding signal.
Further, in the embodiment of the present application, in order to accurately determine the second identity, the monitoring information at least includes: the text information, step S102 determines, based on the first identity, a plurality of second identities corresponding to the first identity, including steps S102A to S102F (not shown in the drawings), wherein:
Step S102A, network information corresponding to the first identity is acquired.
Specifically, the network information may be a network code or a network identifier corresponding to a wireless network or a wired network used by the monitoring device.
Step S102B, a plurality of devices to be determined using the same network corresponding to the first identity are determined based on the network information.
Specifically, the electronic device may determine other devices using the network, i.e., devices to be determined, except the monitoring device, by referring to network addresses of all devices within a preset location range. The embodiment of the application does not limit the preset position range, and can be input into the electronic equipment in advance by a technician, and it can be understood that when the installation position of the monitoring equipment is an enterprise, the preset position range at least covers the floor where the enterprise is located, so that a plurality of equipment to be determined, which use the same network with the monitoring equipment, can be determined.
Step S102C, acquiring history reference information corresponding to each of a plurality of devices to be determined.
Specifically, the history reference information may be information input at the time of reference monitoring, for example, monitoring of a financial room requiring inquiry of 2022, 1 month and 3 days, and the reference content information is automatically uploaded to the electronic device every time the reference device performs a reference operation.
Step S102D, information category identification is carried out on the text information so as to determine the category to which the information of the monitoring information belongs.
Specifically, the classification tree may be used to identify a key field in the text information to determine the information category, for example, if the position of the financial document No. 01, which is 2023, 5, 15, is moved, then the key field "financial document" may be input into a preset classification tree to determine the information category as the financial category. The classification tree is obtained based on a plurality of training key fields and corresponding class labels, the training process of the classification tree is not limited, and a user can set the classification tree by himself.
Step S102E, selecting a plurality of target devices with the same category of the reference information from a plurality of devices to be determined, wherein the category of the reference information is obtained by identifying historical reference information.
Step S102F, obtaining device identifiers corresponding to the target devices, and determining the device identifiers corresponding to the target devices as second identifiers corresponding to the first identifiers.
Specifically, the electronic device identifies key fields in the historical reference information, and the identification process is the same as that of step S102D, which is not described in detail in the embodiment of the present application, so that a plurality of reference information categories can be determined, and then the plurality of reference information categories are matched with the category to which the information belongs one by one, so as to determine the target device; and acquiring the equipment identifier corresponding to the target equipment, and determining the equipment identifier corresponding to the target equipment as a plurality of second identity identifiers corresponding to the first identity identifiers.
Based on the above embodiment, the network information corresponding to the first identity is obtained, and the monitoring device and the reference device are generally set to use the same network for improving the network protection, so that a plurality of devices to be determined can be accurately determined according to the network information; acquiring historical reference information, carrying out information identification on text information to determine the category to which the information belongs, and selecting a plurality of target devices of which the reference information category is the same as the category to which the information belongs from a plurality of devices to be determined so as to obtain a plurality of accurate target devices; and then the equipment identifier of the target equipment is acquired, and the target equipment identifier is determined to be the second identity identifier, so that the accuracy of determining the second identity identifier is effectively improved.
Further, in the embodiment of the present application, step S104 encrypts the associated information to obtain encrypted associated information, including steps SA1 to SA3 (not shown in the drawings), where:
step SA1, acquiring the position information of the monitoring equipment, and determining the privacy level corresponding to the installation position information of the monitoring equipment based on the corresponding relation between the preset position information and the privacy level and the installation position information of the monitoring equipment.
Specifically, the position information of the monitoring device is input into the electronic device in advance. In the embodiment of the application, the privacy classes can be divided into a first class and a second class; the privacy levels of the monitoring information corresponding to different monitoring device installation positions are different, for example, when the monitoring device installation position is a financial room of an enterprise, the corresponding privacy level may be a first level, and when the monitoring device installation position is a public area of the enterprise, the corresponding privacy level may be a second level, and the monitoring information corresponding to the first level is more important than the monitoring information corresponding to the second level. The corresponding relation between the preset installation position of the monitoring equipment and the privacy class is stored in the electronic equipment in advance by a technician, so that the privacy class can be determined. It can be understood that the monitoring information can be processed in a targeted manner by classifying the privacy classes of the monitoring information, so that the accurate processing of the monitoring information is realized.
And step SA2, determining a target information encryption strategy based on the privacy class and a preset information encryption strategy.
And step SA3, encrypting the associated information by using the target information encryption strategy to obtain the encrypted associated information.
Specifically, the preset information encryption policy may be input into the electronic device in advance by a technician, where the preset information encryption policy specifically may include: when the privacy class is the first class, the corresponding information encryption strategy can be two times of hash operation, and by performing the hash operation twice, not only the length of the hash value can be increased, but also the complexity of the interior of the hash can be improved, further the attack capability can be effectively improved, and the monitoring information is prevented from being revealed. The embodiment of the application does not limit the specific process of carrying out hash operation on the third generation secure hash algorithm, wherein the preferred use of the third generation secure hash algorithm in the embodiment of the application carries out hash operation, compared with the first generation secure hash algorithm and the second generation secure hash algorithm, the algorithm mechanism of the third generation secure hash algorithm is completely different, and the third generation secure hash algorithm can carry out data input and output in a random permutation and combination mode in the operation process; when the privacy level data is the second level, carrying out hash operation on the associated information once to obtain encrypted associated information.
Further, in one implementation manner, step SA3 may be correspondingly performed once for each time of receiving the association information, so as to effectively improve the processing efficiency of the association information; step SA3 may also be executed when the association information after the preset times is received, which is to be understood that the privacy classes corresponding to the association information after the preset times are the same, that is, the association information with the same privacy class after the preset times is received is encrypted, so as to obtain the encrypted association information, so that the calculation amount of the association information is effectively reduced.
Based on the above embodiment, the privacy class corresponding to the monitoring equipment installation position information is determined according to the monitoring equipment installation position information and the privacy class, and then the target information encryption strategy is determined according to the privacy class and the preset information encryption strategy, so that corresponding encryption processing is performed according to the importance of the monitoring information, the importance of the monitoring information is different under different scene categories, the monitoring information can be processed in a targeted manner by determining the privacy class, the encryption strength of the privacy data with higher importance is higher, the protection strength of the encryption information is effectively improved, and the leaked risk is reduced.
Further, in the embodiment of the present application, the monitoring information is acquired, including step SB1 to step SB6 (not shown in the drawings), in which:
step SB1, a plurality of continuous monitoring images within a preset time period are acquired.
Specifically, when the electronic device detects a monitoring information processing request, a monitoring image is acquired from the monitoring device. The embodiment of the application does not limit the preset time length, can default the preset time length set by the monitoring equipment, and can also be the preset time length after the user changes by himself. It is understood that the plurality of continuous monitoring images may be a plurality of frames of continuous monitoring images corresponding to the monitoring video.
Step SB2, it is determined whether or not there is an image variation based on a plurality of continuous monitor images.
Step SB3, if yes, image recognition is performed on the change image to determine the category to which the change image belongs, and the category to which the change image belongs includes: personnel changes, and/or environmental changes.
Specifically, for the same image, whether any object has position change or not can be determined according to a start image and an end image in a plurality of continuous monitoring images or according to any two continuous images so as to determine whether image change exists or not; if yes, step SB3 is executed to identify the variation image to determine the category to which the variation image belongs, where the variation image may be at least two monitoring images with variation. The electronic device performs image extraction on the image with the variation, and identifies based on the extracted image to determine as personnel variation, and/or environmental variation. It will be appreciated that when there is a change in the position of the person and a change in the limb in the monitored image, then a person change may be determined; the environmental change may be a change in the location of a document.
Step SB4, if the category to which the change image belongs is a person change, determining person identification information based on the change image, wherein the person identification information includes a person identification and a person action event.
Specifically, when the category to which the change image belongs is a person change, the change image is a person image in which there is a person limb change among a plurality of continuous monitor images. The method comprises the steps of determining personnel identification information in a face identification mode, extracting personnel face images, and identifying the personnel face images to determine personnel identification, wherein the personnel face images and the corresponding personnel identification are input into electronic equipment in advance; and determining the moving limb of the person based on the multiple person change images, and identifying the change track of the moving limb so as to determine the moving information of the moving limb, wherein the moving information of the moving limb is the action event of the person. For example, corresponding person identification information may be determined based on face recognition and changes in moving limbs, zhang Sanzheng talking on meals, four-of-us, and Wang Wuzheng.
Furthermore, the personnel identity mark can be used for determining whether the personnel is a legal personnel, if so, whether the personnel identity mark corresponds to a preset compliance personnel identity mark is judged, if so, the risk is determined to be absent, otherwise, the risk is determined to be present, and early warning is carried out, wherein the preset compliance personnel identity mark can be defined according to a scene; if the public place is aimed at, judging whether the personnel identity mark corresponds to the dangerous personnel identity mark, if so, determining that the risk exists and carrying out early warning, wherein the dangerous personnel identity mark is determined based on a police database or a security database, and the database can be a network database and can update data corresponding to criminals and suspects in real time.
Step SB5, if the type to which the change image belongs is environmental change, environmental change data is acquired, and environmental security risk assessment information is determined based on the environmental change data.
Specifically, when the category to which the change image belongs is environmental change, for example, when the document position of the financial room changes, the corresponding environmental change data may be a position difference value between a first position before the document changes and a second position after the document changes, and it is determined whether the position difference value is not greater than a preset position difference value threshold, if so, the corresponding environmental security risk assessment information may be: the document is within a secure location range; otherwise, the corresponding environmental security risk assessment information is: the document is in a dangerous location range. The three-dimensional coordinates of the financial room can be established through the monitoring image so as to obtain a first position and a second position of the document; the embodiment of the application does not limit the preset position difference threshold value, and can be understood that the protection force for documents with higher importance degree is higher, and even if the documents are referred, the documents need to be referred in a specified range, for example, the documents in a financial room are only allowed to be referred in the financial room, and the documents are not allowed to be taken out of the financial room for reference.
Step SB6 of determining a plurality of continuous monitor images and image change information as monitor information, the image change information including: personnel identification information and/or environmental security risk assessment information.
Specifically, the image variation information may be converted into text content corresponding to the monitoring image so as to determine the above text content and the corresponding monitoring image as the monitoring information.
Based on the embodiment, a plurality of continuous monitoring images within a preset time period are obtained to determine whether image variation exists, if yes, image recognition is carried out to determine the category of the variation image so as to accurately record image variation information; when the category of the change image is personnel change, determining personnel identity and personnel action event based on the personnel change image so as to realize accurate record of personnel change information; if the category of the change image is environmental change, environmental change data are determined based on the environmental change image, the environmental change data are input into an environmental safety risk assessment model to obtain environmental safety risk assessment information so as to accurately record the current environmental safety risk, and then a plurality of continuous monitoring images and the image change information are determined as monitoring information, so that the accuracy of monitoring information recording is effectively improved.
Further, in the embodiment of the present application, step S104 uploads the monitoring information and the encrypted associated information to the blockchain node, including steps SC1 to SC3 (not shown in the drawings), wherein:
and step SC1, acquiring data bearing capacity information corresponding to each block chain node.
Specifically, the data carrying capacity information corresponding to each of all the blockchain nodes is updated in real time, and the data carrying capacity information corresponding to each of the blockchain nodes can be the same or different in real time and uploaded to the electronic device.
And step SC2, determining target blockchain nodes which are not smaller than the information of the bearing capacity from all the blockchain nodes based on the data bearing capacity information and the information of the bearing capacity, which are respectively corresponding to all the blockchain nodes, wherein the information of the bearing capacity is determined based on the monitoring information and the encrypted association information.
And step SC3, uploading the monitoring information and the encrypted associated information to the target blockchain node.
Specifically, the data carrying capacity information may be current actual carrying capacity information of each blockchain node, and the data carrying capacity information and the to-be-carried capacity information corresponding to each of all the blockchain nodes are compared one by one to determine a target blockchain node not smaller than the to-be-carried capacity information; the information of the load to be carried can be obtained through calculation of a byte calculation method, and the embodiment of the application does not limit the specific calculation process of the byte calculation method. Further, after the target blockchain nodes are determined, the target blockchain nodes can be sequentially arranged according to the sequence from large to small of the data bearing capacity, and the blockchain node with the largest data bearing capacity can be selected as the target blockchain node, or the blockchain node with the data bearing capacity identical to the information of the bearing capacity to be selected as the target blockchain node.
Based on the above embodiment, the data carrying capacity information corresponding to all the blockchain nodes is obtained, and based on the data carrying capacity information and the to-be-carried capacity information corresponding to all the blockchain nodes, the target blockchain node which is not smaller than the carrying information is determined from all the blockchain nodes, so that the monitoring information and the encrypted associated information are stored in the target blockchain node with a larger storage space, and meanwhile, the situation that the workload of some blockchain nodes is overlarge or is idle for a long time can be avoided, and the effective utilization of the blockchain nodes is realized.
Further, in the embodiment of the present application, after uploading the monitoring information and the encrypted association information to the block link point, the method further includes:
based on the information of the to-be-supported capacity, acquiring rewards corresponding to the information of the to-be-supported capacity, and sending the rewards to a target blockchain node, wherein the target blockchain node is a blockchain node uploaded by monitoring information and encrypted associated information.
Specifically, rewards may be obtained in real time, or periodically.
In one implementation, obtaining rewards in real time may specifically include: each time the monitoring information and the encrypted associated information are transmitted, corresponding rewards can be obtained from the blockchain network;
In another implementation, the timing of the acquisition of the reward may specifically include: the electronic equipment counts the monitoring information and the encrypted associated information at regular time to obtain a statistics value, and obtains corresponding rewards according to the statistics value.
Further, transmitting rewards to target blockchain link points may increase the aggressiveness of blockchain node participation by a rewards mechanism.
Based on the embodiment, corresponding rewards are acquired according to the information of the to-be-supported capacity, so that the participation enthusiasm of each blockchain node in the blockchain network is improved, and the participants with different dimensions can participate in the processing of the data information.
Further, in the embodiment of the present application, step S103 further includes, before establishing the association information of the monitoring information, the first identity, and the plurality of second identities:
and acquiring an information format corresponding to the monitoring information, and judging whether the information format is a preset standard format or not.
Specifically, the information format of the monitoring information can be obtained by calling the suffix name through a suffix name calling formula, wherein the suffix name calling function can be as follows: the embodiment of the application does not limit the specific content of the suffix name calling function as long as the calling of the suffix name of the application can be realized. In the embodiment of the present application, for convenience of storage, a preferred preset standard format may be: JSON or XML format.
If not, converting the information format corresponding to the monitoring information into a preset standard format to obtain the monitoring information after format conversion;
correspondingly, establishing the monitoring information, the first identity identifier and the association information of a plurality of second identities, including:
and establishing the monitoring information, the first identity identification and the association information of a plurality of second identity identifications after format conversion.
Specifically, if it is determined that the information format of the monitoring information is not the preset standard format, format conversion can be performed through the expression editor so as to convert the format of the monitoring information into the preset standard format, wherein the format conversion process of the expression editor is not limited, and a user can set the format conversion process. Further, the monitoring information after format conversion, the first identity identification and the plurality of second identity identifications are established to be related to the information, so that the data can be stored conveniently.
Based on the embodiment, the information format corresponding to the monitoring information is obtained, whether the information format is a preset standard format is judged, if not, the information format is converted into the preset standard format, the monitoring information, the first identity identifier and the second identity identifier after format conversion are associated, and the associated information in the standard format is stored, so that the data storage efficiency can be effectively improved.
The above embodiment describes a blockchain-based monitoring data processing method from the viewpoint of a method flow, and the following embodiment describes a blockchain-based monitoring data processing device from the viewpoint of a virtual module or a virtual unit, and specifically the following embodiment is described in detail.
An embodiment of the present application provides a blockchain-based monitoring data processing device, as shown in fig. 3, where the blockchain-based monitoring data processing device specifically may include:
the obtaining module 210 is configured to obtain monitoring information and a first identity identifier corresponding to the monitoring device, where the monitoring information is information obtained after analysis based on a monitoring image collected by the monitoring device, the monitoring information includes a monitoring image and a corresponding analysis result, and the monitoring image is an image of a person or an image of an environmental variation;
a second identity determining module 220, configured to determine, based on the first identities, a plurality of second identities corresponding to the first identities, where the second identities are identities of terminal devices with reference rights corresponding to the first identities;
the association information establishing module 230 is configured to establish association information of the monitoring information, the first identity identifier, and the plurality of second identity identifiers;
The storage module 240 is configured to encrypt the associated information to obtain encrypted associated information; and uploading the monitoring information and the encrypted associated information to the blockchain node.
In one possible implementation manner of the embodiment of the present application, when the second identity determining module 220 determines, based on the first identity, a plurality of second identities corresponding to the first identity, the second identity determining module is configured to:
acquiring network information corresponding to the first identity;
determining a plurality of devices to be determined using the same network corresponding to the first identity based on the network information;
acquiring historical reference information corresponding to each of a plurality of devices to be determined;
carrying out information category identification on the text information to determine the category to which the information of the monitoring information belongs;
selecting a plurality of target devices with the same category of the reference information as the category to which the information belongs from a plurality of devices to be determined, wherein the category of the reference information is obtained by identifying historical reference information;
and acquiring the equipment identifiers corresponding to the target equipment respectively, and determining the equipment identifiers corresponding to the target equipment respectively as the second identifiers corresponding to the first identifiers.
In one possible implementation manner of the embodiment of the present application, when the storage module 240 encrypts the association information to obtain the encrypted association information, the storage module is configured to:
Acquiring position information of monitoring equipment, and determining a privacy class corresponding to the monitoring equipment installation position information based on a corresponding relation between preset position information and privacy class and the monitoring equipment installation position information;
determining a target information encryption strategy based on the privacy class and a preset information encryption strategy;
and encrypting the associated information by using the target information encryption strategy to obtain the encrypted associated information.
One possible implementation manner of the embodiment of the present application is a monitoring data processing device based on a blockchain, which further includes:
the monitoring information acquisition module is used for:
acquiring a plurality of continuous monitoring images within a preset duration;
determining whether there is an image variation based on the plurality of continuous monitoring images;
if yes, image recognition is carried out on the change image so as to determine the category of the change image, wherein the category of the change image comprises the following steps: personnel changes, and/or environmental changes;
if the category of the change image is personnel change, determining personnel identification information based on the change image, wherein the personnel identification information at least comprises personnel identification and personnel action events;
if the category of the change image is environmental change, acquiring environmental change data, and determining environmental security risk assessment information based on the environmental change data;
Determining a plurality of consecutive monitoring images and image variation information as monitoring information, the image variation information including: personnel identification information and/or environmental security risk assessment information.
In one possible implementation manner of the embodiment of the present application, when the storage module 240 performs uploading of the monitoring information and the encrypted associated information to the blockchain node, the storage module is configured to:
acquiring data bearing capacity information corresponding to each block link point;
determining target block chain nodes which are not smaller than the information of the bearing capacity to be determined from all the block chain nodes based on the data bearing capacity information and the information of the bearing capacity to be respectively corresponding to all the block chain link points, wherein the information of the bearing capacity to be determined is based on the monitoring information and the encrypted association information;
and uploading the monitoring information and the encrypted associated information to the target blockchain node.
One possible implementation manner of the embodiment of the present application is a monitoring data processing device based on a blockchain, which further includes:
a rewarding module for:
based on the information of the to-be-supported capacity, acquiring rewards corresponding to the information of the to-be-supported capacity, and sending the rewards to a target blockchain node, wherein the target blockchain node is a blockchain node uploaded by monitoring information and encrypted associated information.
One possible implementation manner of the embodiment of the present application is a monitoring data processing device based on a blockchain, which further includes:
the information format judging module is used for:
acquiring an information format corresponding to the monitoring information, and judging whether the information format is a preset standard format or not;
if not, converting the information format corresponding to the monitoring information into a preset standard format to obtain the monitoring information after format conversion;
accordingly, the association information establishing module 230 is configured to, when executing the establishment of the association information of the monitoring information, the first identity, and the plurality of second identities:
and establishing the monitoring information, the first identity identification and the association information of a plurality of second identity identifications after format conversion.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, a specific working process of the blockchain-based monitoring data processing device described above may refer to a corresponding process in the foregoing method embodiment, which is not described herein again.
An embodiment of the present application provides an electronic device, as shown in fig. 4, fig. 4 is a schematic structural diagram of the electronic device provided in the embodiment of the present application, and an electronic device 300 shown in fig. 4 includes: a processor 301 and a memory 303. Wherein the processor 301 is coupled to the memory 303, such as via a bus 302. Optionally, the electronic device 300 may also include a transceiver 304. It should be noted that, in practical applications, the transceiver 304 is not limited to one, and the structure of the electronic device 300 is not limited to the embodiment of the present application.
The processor 301 may be a CPU (Central Processing Unit ), general purpose processor, DSP (Digital Signal Processor, data signal processor), ASIC (Application Specific Integrated Circuit ), FPGA (Field Programmabl eGate Array, field programmable gate array) or other programmable logic device, transistor logic device, hardware components, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with the disclosure of embodiments of the application. Processor 301 may also be a combination that implements computing functionality, e.g., comprising one or more microprocessor combinations, a combination of a DSP and a microprocessor, etc.
Bus 302 may include a path to transfer information between the components. Bus 302 may be a PCI (Peripheral Component Interconnect, peripheral component interconnect Standard) bus or an EISA (Extended Industry Standard Architecture ) bus, or the like. Bus 302 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 4, but not only one bus or one type of bus.
The Memory 303 may be, but is not limited to, a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory ) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory ), a CD-ROM (Compact Disc Read Only Memory, compact disc Read Only Memory) or other optical disk storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 303 is used for storing application program codes for executing embodiments of the present application and is controlled to be executed by the processor 301. The processor 301 is configured to execute the application code stored in the memory 303 to implement what is shown in the foregoing method embodiments.
Among them, electronic devices include, but are not limited to: mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 4 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the application.
Embodiments of the present application provide a computer-readable storage medium having a computer program stored thereon, which when run on a computer, causes the computer to perform the corresponding method embodiments described above.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
The foregoing is only a partial embodiment of the present application, and it should be noted that it will be apparent to those skilled in the art that modifications and adaptations can be made without departing from the principles of the present application, and such modifications and adaptations should and are intended to be comprehended within the scope of the present application.

Claims (9)

1. A blockchain-based monitoring data processing method, comprising:
acquiring monitoring information and a first identity identifier corresponding to monitoring equipment, wherein the monitoring information is information obtained after analysis based on a monitoring image acquired by the monitoring equipment, the monitoring information comprises a monitoring image and a corresponding analysis result, and the monitoring image is an image of a person or an image with environmental variation;
determining a plurality of second identity marks corresponding to the first identity marks based on the first identity marks, wherein the second identity marks are the identity marks of the terminal equipment with the reference authority corresponding to the first identity marks;
establishing the monitoring information, the first identity identification and the association information of the plurality of second identity identifications;
encrypting the associated information to obtain encrypted associated information; and uploading the monitoring information and the encrypted associated information to a blockchain node,
the monitoring information at least comprises: the text information is provided with a list of information,
the determining, based on the first identity, a plurality of second identities corresponding to the first identity includes:
acquiring network information corresponding to the first identity;
Determining a plurality of devices to be determined using the same network corresponding to the first identity based on the network information;
acquiring history reference information corresponding to each of the plurality of devices to be determined;
carrying out information category identification on the text information to determine the category to which the information of the monitoring information belongs;
selecting a plurality of target devices with the same category of the reference information as the category of the information from the plurality of devices to be determined, wherein the category of the reference information is obtained by identifying historical reference information;
and acquiring the equipment identifiers corresponding to the target equipment respectively, and determining the equipment identifiers corresponding to the target equipment respectively as a plurality of second identifiers corresponding to the first identifiers.
2. The blockchain-based monitoring data processing method of claim 1, wherein encrypting the association information to obtain encrypted association information includes:
acquiring the position information of the monitoring equipment, and determining the privacy class corresponding to the installation position information of the monitoring equipment based on the corresponding relation between the preset position information and the privacy class and the installation position information of the monitoring equipment;
Determining a target information encryption strategy based on the privacy class and a preset information encryption strategy;
and encrypting the associated information by using the target information encryption strategy to obtain the encrypted associated information.
3. The blockchain-based monitoring data processing method of claim 1, wherein obtaining monitoring information includes:
acquiring a plurality of continuous monitoring images within a preset duration;
determining whether there is an image variation based on the plurality of continuous monitoring images;
if yes, carrying out image recognition on the change image to determine the category to which the change image belongs, wherein the category to which the change image belongs comprises: personnel changes, and/or environmental changes;
if the category to which the change image belongs changes, determining personnel identification information based on the change image, wherein the personnel identification information at least comprises personnel identification marks and personnel action events;
if the category of the change image is environmental change, acquiring environmental change data, and determining environmental security risk assessment information based on the environmental change data;
determining the plurality of continuous monitoring images and image variation information as monitoring information, the image variation information including: personnel identification information and/or environmental security risk assessment information.
4. The blockchain-based monitoring data processing method of claim 1, wherein the uploading the monitoring information and the encrypted association information into a blockchain node includes:
acquiring data bearing capacity information corresponding to each block link point;
determining target block chain nodes which are not smaller than the information of the bearing capacity to be determined from all the block chain nodes based on the data bearing capacity information and the information of the bearing capacity to be respectively corresponding to all the block chain link points, wherein the information of the bearing capacity to be determined is based on the monitoring information and the encrypted association information;
and uploading the monitoring information and the encrypted associated information to a target blockchain node.
5. The blockchain-based monitoring data processing method of claim 4, further comprising, after uploading the monitoring information and the encrypted association information to a blockchain point:
and acquiring rewards corresponding to the information of the to-be-supported capacity based on the information of the to-be-supported capacity, and sending the rewards to a target blockchain node, wherein the target blockchain node is a blockchain node uploaded by the monitoring information and the encrypted associated information.
6. The blockchain-based monitoring data processing method of claim 1, further comprising, prior to establishing the association information of the monitoring information, the first identity, and the plurality of second identities:
acquiring an information format corresponding to the monitoring information, and judging whether the information format is a preset standard format or not;
if not, converting the information format corresponding to the monitoring information into a preset standard format to obtain the monitoring information after format conversion;
correspondingly, the establishing the monitoring information, the first identity identifier and the association information of the plurality of second identities includes:
and establishing the monitoring information after format conversion, the first identity identification and the association information of the plurality of second identity identifications.
7. A blockchain-based monitoring data processing device, comprising:
the acquisition module is used for acquiring monitoring information and a first identity identifier corresponding to the monitoring equipment, wherein the monitoring information is obtained after analysis based on a monitoring image acquired by the monitoring equipment;
the second identity identification module is used for determining a plurality of second identity identifications corresponding to the first identity identification based on the first identity identification, wherein the second identity identifications are the identity identifications of the terminal equipment with the reference authority corresponding to the first identity identification;
The associated information establishing module is used for establishing the associated information of the monitoring information, the first identity identification and the plurality of second identity identifications;
the storage module is used for encrypting the associated information to obtain the encrypted associated information; and uploading the monitoring information and the encrypted associated information to a blockchain node,
the monitoring information at least comprises: the text information is provided with a list of information,
the second identity identification module is used for:
acquiring network information corresponding to the first identity;
determining a plurality of devices to be determined using the same network corresponding to the first identity based on the network information;
acquiring history reference information corresponding to each of the plurality of devices to be determined;
carrying out information category identification on the text information to determine the category to which the information of the monitoring information belongs;
selecting a plurality of target devices with the same category of the reference information as the category of the information from the plurality of devices to be determined, wherein the category of the reference information is obtained by identifying historical reference information;
and acquiring the equipment identifiers corresponding to the target equipment respectively, and determining the equipment identifiers corresponding to the target equipment respectively as a plurality of second identifiers corresponding to the first identifiers.
8. An electronic device, comprising:
at least one processor;
a memory;
at least one application program, wherein the at least one application program is stored in the memory and configured to be executed by the at least one processor, the at least one application program configured to: performing the blockchain-based monitoring data processing method of any of claims 1-6.
9. A computer readable storage medium, having stored thereon a computer program which, when executed in a computer, causes the computer to perform the blockchain-based monitoring data processing method of any of claims 1 to 6.
CN202310971749.XA 2023-08-03 2023-08-03 Method, device, equipment and medium for processing monitoring data based on blockchain Active CN116684207B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310971749.XA CN116684207B (en) 2023-08-03 2023-08-03 Method, device, equipment and medium for processing monitoring data based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310971749.XA CN116684207B (en) 2023-08-03 2023-08-03 Method, device, equipment and medium for processing monitoring data based on blockchain

Publications (2)

Publication Number Publication Date
CN116684207A CN116684207A (en) 2023-09-01
CN116684207B true CN116684207B (en) 2023-10-20

Family

ID=87787738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310971749.XA Active CN116684207B (en) 2023-08-03 2023-08-03 Method, device, equipment and medium for processing monitoring data based on blockchain

Country Status (1)

Country Link
CN (1) CN116684207B (en)

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107948603A (en) * 2017-12-07 2018-04-20 北海市天硌打印耗材有限公司 A kind of production monitoring video sharing method
CN108848063A (en) * 2018-05-24 2018-11-20 中链科技有限公司 Data processing method, system and computer readable storage medium based on block chain
CN109242261A (en) * 2018-08-14 2019-01-18 中国平安人寿保险股份有限公司 Save the method and terminal device of risk from damage based on big data assessment
CN109360029A (en) * 2018-10-30 2019-02-19 深圳市亿晟科技有限公司 A kind of Self-management approach of remote terminal advertisement machine
CN110414268A (en) * 2019-07-23 2019-11-05 北京启迪区块链科技发展有限公司 Access control method, device, equipment and storage medium
KR102057622B1 (en) * 2019-04-30 2019-12-19 조형기 Contents management system
CN110826111A (en) * 2019-06-26 2020-02-21 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium
CN110889710A (en) * 2019-12-04 2020-03-17 腾讯科技(深圳)有限公司 Device information management method, server, and storage medium
CN111241569A (en) * 2020-04-24 2020-06-05 支付宝(杭州)信息技术有限公司 Information processing method, device and equipment
CN111737323A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Information query method and device based on block chain and electronic equipment
CN113542191A (en) * 2020-04-14 2021-10-22 华为技术有限公司 Block chain based data access and verification method and device
WO2022001786A1 (en) * 2020-06-30 2022-01-06 京东科技信息技术有限公司 Blockchain-based data processing method, system, processing device and authentication device
CN114840387A (en) * 2022-05-10 2022-08-02 中国平安财产保险股份有限公司 Micro-service monitoring method and device, computer equipment and storage medium
WO2022199246A1 (en) * 2021-03-26 2022-09-29 中兴通讯股份有限公司 Data processing method, device and storage medium
CN115134150A (en) * 2022-06-29 2022-09-30 中国工商银行股份有限公司 Block chain-based data acquisition method and system, storage medium and electronic device
US11552799B1 (en) * 2018-11-05 2023-01-10 Player Tokens, Inc. Storage architecture providing improved modification of access rights for stored data
CN115687432A (en) * 2022-10-19 2023-02-03 中国建设银行股份有限公司上海市分行 Method, apparatus, and medium for monitoring anomalous transaction data
CN116070294A (en) * 2023-03-07 2023-05-05 浪潮电子信息产业股份有限公司 Authority management method, system, device, server and storage medium
CN116070191A (en) * 2021-11-01 2023-05-05 腾讯科技(深圳)有限公司 Information processing method and device, storage medium, and program product
CN116187879A (en) * 2021-11-25 2023-05-30 腾讯科技(深圳)有限公司 Cold chain data processing method and device, equipment and cold chain transportation information system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11282017B2 (en) * 2015-07-11 2022-03-22 RiskRecon Inc. Systems and methods for monitoring information security effectiveness

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107948603A (en) * 2017-12-07 2018-04-20 北海市天硌打印耗材有限公司 A kind of production monitoring video sharing method
CN108848063A (en) * 2018-05-24 2018-11-20 中链科技有限公司 Data processing method, system and computer readable storage medium based on block chain
CN109242261A (en) * 2018-08-14 2019-01-18 中国平安人寿保险股份有限公司 Save the method and terminal device of risk from damage based on big data assessment
CN109360029A (en) * 2018-10-30 2019-02-19 深圳市亿晟科技有限公司 A kind of Self-management approach of remote terminal advertisement machine
US11552799B1 (en) * 2018-11-05 2023-01-10 Player Tokens, Inc. Storage architecture providing improved modification of access rights for stored data
KR102057622B1 (en) * 2019-04-30 2019-12-19 조형기 Contents management system
CN110826111A (en) * 2019-06-26 2020-02-21 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium
CN110414268A (en) * 2019-07-23 2019-11-05 北京启迪区块链科技发展有限公司 Access control method, device, equipment and storage medium
CN110889710A (en) * 2019-12-04 2020-03-17 腾讯科技(深圳)有限公司 Device information management method, server, and storage medium
CN113542191A (en) * 2020-04-14 2021-10-22 华为技术有限公司 Block chain based data access and verification method and device
CN111241569A (en) * 2020-04-24 2020-06-05 支付宝(杭州)信息技术有限公司 Information processing method, device and equipment
WO2022001786A1 (en) * 2020-06-30 2022-01-06 京东科技信息技术有限公司 Blockchain-based data processing method, system, processing device and authentication device
CN111737323A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Information query method and device based on block chain and electronic equipment
WO2022199246A1 (en) * 2021-03-26 2022-09-29 中兴通讯股份有限公司 Data processing method, device and storage medium
CN116070191A (en) * 2021-11-01 2023-05-05 腾讯科技(深圳)有限公司 Information processing method and device, storage medium, and program product
CN116187879A (en) * 2021-11-25 2023-05-30 腾讯科技(深圳)有限公司 Cold chain data processing method and device, equipment and cold chain transportation information system
CN114840387A (en) * 2022-05-10 2022-08-02 中国平安财产保险股份有限公司 Micro-service monitoring method and device, computer equipment and storage medium
CN115134150A (en) * 2022-06-29 2022-09-30 中国工商银行股份有限公司 Block chain-based data acquisition method and system, storage medium and electronic device
CN115687432A (en) * 2022-10-19 2023-02-03 中国建设银行股份有限公司上海市分行 Method, apparatus, and medium for monitoring anomalous transaction data
CN116070294A (en) * 2023-03-07 2023-05-05 浪潮电子信息产业股份有限公司 Authority management method, system, device, server and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于区块链的数据管理方案;周艺华;李洪明;;信息安全研究(01);全文 *
混合P2P环境下有效的访问控制机制;张骞;张霞;刘积仁;;东北大学学报(自然科学版)(05);全文 *

Also Published As

Publication number Publication date
CN116684207A (en) 2023-09-01

Similar Documents

Publication Publication Date Title
CN102414689B (en) For improvement of the method and apparatus of code and data signing
CN116432247A (en) Infringement evidence method and device based on blockchain
CN111291394B (en) False information management method, false information management device and storage medium
CN108924109B (en) Data transmission method and device and processing equipment
CN110866265A (en) Data storage method, device and storage medium based on block chain
CN112822239A (en) Block chain consensus method, block chain consensus device, electronic equipment and storage medium
CN111367923A (en) Data processing method, data processing device, node equipment and storage medium
US20200327251A1 (en) Media content privacy control
Trček et al. Advanced framework for digital forensic technologies and procedures
Mercan et al. Blockchain‐based video forensics and integrity verification framework for wireless Internet‐of‐Things devices
CN112200680B (en) Block link point management method, device, computer and readable storage medium
CN111147235B (en) Object access method and device, electronic equipment and machine-readable storage medium
WO2019118294A1 (en) Securing digital data transmission in a communication network
US7987513B2 (en) Data-use restricting method and computer product
CN116684207B (en) Method, device, equipment and medium for processing monitoring data based on blockchain
CN112469034B (en) Internet of things gateway device capable of safely authenticating physical sensing equipment and access method thereof
KR102357595B1 (en) Blockchain-based authentication system and method for preventing interception hacking attacks
CN116070191A (en) Information processing method and device, storage medium, and program product
KR101978898B1 (en) Web scraping prevention system using characteristic value of user device and the method thereof
Wei et al. An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things
Tharani et al. A blockchain-based database management system
CN117118750B (en) Data sharing method and device based on white-box password, electronic equipment and medium
CN110659476A (en) Method and apparatus for resetting password
CN113949508B (en) Process data processing method and device based on random number consensus mechanism
Gao et al. Location proof via passive RFID tags

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant