WO2020100326A1 - Système de traitement d'informations - Google Patents

Système de traitement d'informations Download PDF

Info

Publication number
WO2020100326A1
WO2020100326A1 PCT/JP2019/017547 JP2019017547W WO2020100326A1 WO 2020100326 A1 WO2020100326 A1 WO 2020100326A1 JP 2019017547 W JP2019017547 W JP 2019017547W WO 2020100326 A1 WO2020100326 A1 WO 2020100326A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
data
file
hash value
block chain
Prior art date
Application number
PCT/JP2019/017547
Other languages
English (en)
Japanese (ja)
Inventor
昭弘 佐久間
Original Assignee
株式会社Nexpoint
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社Nexpoint filed Critical 株式会社Nexpoint
Publication of WO2020100326A1 publication Critical patent/WO2020100326A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present disclosure relates to an information processing system.
  • the recording data of surveillance cameras is used as evidence for criminal investigation, is the recording data submitted as evidence really the raw state (unedited state) recorded by the recording device? If it is not possible to judge whether it is possible, the evidence ability may be judged to be low.
  • Japanese Unexamined Patent Application Publication No. 2018-151825 does not have a mechanism for guaranteeing that the evidence data has not been modified.
  • the server administrator and the service provider are the same, and there is an interest in both parties. If there is, there is an undeniable possibility that the evidence data may be modified conveniently on the server side.
  • a recording device for generating recording data in which the image of the surveillance camera is recorded, A determination device for determining whether or not the recorded data is modified, Equipped with The recording device is An alteration prevention data transmission unit that transmits a transaction storing alteration prevention data including a hash value of the recorded data to a block chain network at a timing when the recorded data is saved as a file, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data, Have The determination device, An alteration prevention data acquisition unit that identifies the transaction on the block chain based on the transaction identification information extracted from the file property or file name, and obtains the alteration prevention data from the identified transaction. A hash value of the recorded data is compared with a hash value included in the alteration prevention data acquired from the transaction on the block chain, and a modification determination unit that determines whether or not the recorded data is modified, Have.
  • An information processing system is A recording device that generates recording data of the operation screen of the monitored computer, A determination device for determining whether or not the recorded data is modified, Equipped with The recording device is An alteration prevention data transmission unit that transmits a transaction storing alteration prevention data including a hash value of the recorded data to a block chain network at a timing when the recorded data is saved as a file, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data, Have The determination device, An alteration prevention data acquisition unit that identifies the transaction on the block chain based on the transaction identification information extracted from the file property or file name, and obtains the alteration prevention data from the identified transaction. A hash value of the recorded data is compared with a hash value included in the alteration prevention data acquired from the transaction on the block chain, and a modification determination unit that determines whether or not the recorded data is modified, Have.
  • An information processing system is An image capturing device that uploads captured image data to the Internet, A determination device for determining whether or not the image data uploaded on the Internet has been modified, Equipped with The photographing device is An alteration prevention data transmission unit that transmits a transaction in which alteration prevention data including a hash value of the image data is stored to a block chain network at a timing when the image data is saved as a file, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect the hash value of the image data, An upload unit for uploading image data, in which the transaction specific information is stored in the file property or file name, on the Internet; Have The determination device, The transaction on the block chain is identified based on the transaction identification information extracted from the file property or file name of the image data uploaded on the Internet, and the alteration prevention data is acquired from the identified transaction. An alteration prevention data acquisition unit that A hash value of the image data is compared with a hash
  • An information processing system is A file generation / editing device for generating or editing a file, A determination device for determining whether or not the file has been modified, Equipped with The file generating / editing device, An alteration prevention data transmission unit that transmits a transaction in which alteration prevention data including a hash value of the file is stored to a network of a block chain at a timing when the file is saved, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or a file name that does not affect the hash value of the file, Have The determination device, An alteration prevention data acquisition unit that identifies the transaction on the block chain based on the transaction identification information extracted from the file property or file name, and obtains the alteration prevention data from the identified transaction. A hash value of the file is compared with a hash value included in the tampering prevention data acquired from the transaction on the block chain, and a modification determination unit that determines whether the file has been modified, Have.
  • FIG. 1 is a diagram showing a schematic configuration of an information processing system according to the first embodiment.
  • FIG. 2 is a diagram showing a schematic configuration of the recording device according to the first embodiment.
  • FIG. 3 is a diagram showing a schematic configuration of the determination device according to the first embodiment.
  • FIG. 4 is a flowchart showing an example of the recording method according to the first embodiment.
  • FIG. 5A is a flowchart showing an example of the determination method according to the first embodiment.
  • FIG. 5B is a flowchart showing an example of the determination method according to the first embodiment.
  • FIG. 6A is a conceptual diagram for explaining an example of the recording method according to the first embodiment.
  • FIG. 6B is a conceptual diagram for explaining an example of the determination method according to the first embodiment.
  • FIG. 6C is a conceptual diagram for explaining an example of the determination method according to the first embodiment.
  • FIG. 7 is a diagram showing a schematic configuration of the information processing system according to the second embodiment.
  • FIG. 8 is a diagram showing a schematic configuration of a recording device according to the second embodiment.
  • FIG. 9 is a diagram showing a schematic configuration of the determination device according to the second embodiment.
  • FIG. 10 is a flowchart showing an example of the recording method according to the second embodiment.
  • FIG. 11A is a flowchart showing an example of the determination method according to the second embodiment.
  • FIG. 11B is a flowchart showing an example of the determination method according to the second embodiment.
  • FIG. 12A is a conceptual diagram for explaining an example of the recording method according to the second embodiment.
  • FIG. 12B is a conceptual diagram for explaining an example of the determination method according to the second embodiment.
  • FIG. 12C is a conceptual diagram for explaining an example of the determination method according to the second embodiment.
  • FIG. 13 is a diagram showing a schematic configuration of the information processing system according to the third embodiment.
  • FIG. 14 is a diagram showing a schematic configuration of a recording device according to the third embodiment.
  • FIG. 15 is a diagram showing a schematic configuration of the determination device according to the third embodiment.
  • FIG. 16 is a flowchart showing an example of the recording method according to the third embodiment.
  • FIG. 17A is a flowchart showing an example of the determination method according to the third embodiment.
  • FIG. 17B is a flowchart showing an example of the determination method according to the third embodiment.
  • FIG. 18A is a conceptual diagram for explaining an example of the recording method according to the third embodiment.
  • FIG. 18B is a conceptual diagram for explaining an example of the determination method according to the third embodiment.
  • FIG. 18C is a conceptual diagram for explaining an example of the determination method according to the third embodiment.
  • FIG. 19 is a diagram showing a schematic configuration of the information processing system according to the fourth embodiment.
  • FIG. 20 is a diagram showing a schematic configuration of a recording device according to the fourth embodiment.
  • FIG. 21 is a diagram showing a schematic configuration of the determination device according to the fourth embodiment.
  • FIG. 22 is a flowchart showing an example of the recording method according to the fourth embodiment.
  • FIG. 23A is a flowchart showing an example of the determination method according to the fourth embodiment.
  • FIG. 23B is a flowchart showing an example of the determination method according to the fourth embodiment.
  • FIG. 24A is a conceptual diagram for explaining an example of the recording method according to the fourth embodiment.
  • FIG. 24B is a conceptual diagram for explaining an example of the determination method according to the fourth embodiment.
  • FIG. 24C is a conceptual diagram for explaining an example of the determination method according to the fourth embodiment.
  • the information processing system is A recording device for generating recording data in which the image of the surveillance camera is recorded, A determination device for determining whether or not the recorded data is modified, Equipped with The recording device is An alteration prevention data transmission unit that transmits a transaction storing alteration prevention data including a hash value of the recorded data to a block chain network at a timing when the recorded data is saved as a file, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data, Have The determination device, An alteration prevention data acquisition unit that identifies the transaction on the block chain based on the transaction identification information extracted from the file property or file name, and obtains the alteration prevention data from the identified transaction. A hash value of the recorded data is compared with a hash value included in the alteration prevention data acquired from the transaction on the block chain, and a modification determination unit that determines whether or not the recorded data is modified, Have.
  • the transaction in which the modification prevention data including the hash value of the (raw) recorded data immediately after recording is stored is registered in the blockchain.
  • the transaction identification information is stored in the file property or file name of the recorded data, the recorded data and the transaction identification information can be easily associated and managed. Then, by confirming that the hash value of the target recorded data matches the hash value included in the modification prevention data acquired from the transaction registered on the blockchain, the target recorded data is modified. Can be guaranteed not to.
  • An information processing system is the information processing system according to the first aspect,
  • the tampering prevention data transmission unit includes at least one of auxiliary information of the shooting location of the surveillance camera, shooting date, identification information of the surveillance camera, and identification information of the recording device, or a hash value of the auxiliary information, and the alteration determination.
  • the modification prevention data is acquired from the hit transaction, and the auxiliary information included in the modification prevention data or the hash value of the auxiliary information, Whether or not the recorded data has been modified is determined by comparing the auxiliary information acquired through the check information included in the modification prevention data or the hash value of the auxiliary information.
  • the auxiliary information of the recorded data is obtained.
  • OS operating system
  • An information processing system is the information processing system according to the first or second aspect,
  • the recording device has a secret key
  • the determination device has a public key corresponding to the secret key
  • the tamper proof data transmission unit transmits a transaction storing the tamper proof data encoded with the secret key to a block chain network
  • the alteration protection data acquisition unit decrypts and obtains the alteration protection data stored in the transaction on the block chain with the public key.
  • the browsing of the alteration prevention data registered on the blockchain can be limited to only a specific browsing person who has the public key. .
  • An information processing system is the information processing system according to any one of the first to third aspects,
  • the recording device has a secret key
  • the determination device has a public key corresponding to the secret key
  • the specific information storage unit encodes the specific information of the transaction with the secret key and stores it in the property of the file or the file name
  • the alteration prevention data acquisition unit decrypts the transaction identification information stored in the file property or file name with the public key and extracts the transaction specific information.
  • An information processing system is the information processing system according to the first or second aspect,
  • the determination device has a secret key
  • the recording device has a public key corresponding to the secret key
  • the tampering prevention data transmission unit transmits a transaction storing the tampering prevention data encoded with the public key to a blockchain network
  • the alteration protection data acquisition unit decrypts and obtains the alteration protection data stored in the transaction on the block chain with the secret key.
  • An information processing system is the information processing system according to the first, second and fifth aspects,
  • the determination device has a secret key
  • the recording device has a public key corresponding to the secret key
  • the specific information storage unit encodes the specific information of the transaction with the public key and stores it in the property or file name of the file
  • the alteration prevention data acquisition unit decrypts the transaction identification information stored in the file property or file name with the secret key and extracts the transaction specific information.
  • a recording device is A recording device for generating recording data in which an image of a surveillance camera is recorded, An alteration prevention data transmission unit that transmits a transaction storing alteration prevention data including a hash value of the recorded data to a block chain network at a timing when the recorded data is saved as a file, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data, Equipped with.
  • the determination device is A determination device for determining whether or not there is a change in recorded data obtained by recording an image of a surveillance camera,
  • the transaction on the block chain is identified based on the identification information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the recorded data, and the alteration prevention data is acquired from the identified transaction.
  • An alteration prevention data acquisition unit A hash value of the recorded data is compared with a hash value included in the alteration prevention data acquired from the transaction on the block chain, and a modification determination unit that determines whether or not the recorded data is modified, Equipped with.
  • a retrofit kit that is retrofitted to a recording device that generates recording data in which the image of the surveillance camera is recorded,
  • An alteration prevention data transmission unit that transmits a transaction storing alteration prevention data including a hash value of the recorded data to a block chain network at a timing when the recorded data is saved as a file,
  • a specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data, Equipped with.
  • the recording method is A recording method for generating recording data in which an image of a surveillance camera is recorded, Tamper proof data transmitting step of transmitting a transaction in which tamper proof data including a hash value of the record data is stored to a block chain network at a timing when the record data is saved as a file, Specific information storing step of storing specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data; Equipped with.
  • the determination method is A determination method for determining whether or not there is alteration in recorded data obtained by recording an image of a surveillance camera, The transaction on the block chain is identified based on the identification information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the recorded data, and the alteration prevention data is acquired from the identified transaction. Tamper proof data acquisition step, A modification determination step of determining a modification of the recorded data by comparing a hash value of the recorded data with a hash value included in the modification prevention data acquired from the transaction on the block chain, Equipped with.
  • a program according to a twelfth aspect of the embodiment is On the computer, An alteration prevention data transmitting step of transmitting a transaction in which alteration prevention data including a hash value of the recorded data is stored to a block chain network at a timing at which the recorded data obtained by recording the image of the surveillance camera is saved as a file, Specific information storing step of storing specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data; To run.
  • a program is On the computer, The transaction on the blockchain is identified based on the identification information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the recorded data that recorded the image of the surveillance camera, and from the identified transaction A modification prevention data acquisition step of acquiring modification protection data, A modification determination step of determining a modification of the recorded data by comparing a hash value of the recorded data with a hash value included in the modification prevention data acquired from the transaction on the block chain, To run.
  • a computer-readable recording medium On the computer, An alteration prevention data transmitting step of transmitting a transaction in which alteration prevention data including a hash value of the recorded data is stored to a block chain network at a timing at which the recorded data obtained by recording the image of the surveillance camera is saved as a file, A specific information storing step of storing specific information for identifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data; It records a program characterized by executing.
  • a computer-readable recording medium On the computer, The transaction on the blockchain is identified based on the identification information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the recorded data that recorded the image of the surveillance camera, and from the identified transaction A modification prevention data acquisition step of acquiring modification protection data, A modification determination step of determining a modification of the recorded data by comparing a hash value of the recorded data with a hash value included in the modification prevention data acquired from the transaction on the block chain, It records a program characterized by executing.
  • An information processing system is A recording device that generates recording data of the operation screen of the monitored computer, A determination device for determining whether or not the recorded data is modified, Equipped with The recording device is An alteration prevention data transmission unit that transmits a transaction storing alteration prevention data including a hash value of the recorded data to a block chain network at a timing when the recorded data is saved as a file, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data, Have The determination device, An alteration prevention data acquisition unit that identifies the transaction on the block chain based on the transaction identification information extracted from the file property or file name, and obtains the alteration prevention data from the identified transaction. A hash value of the recorded data is compared with a hash value included in the alteration prevention data acquired from the transaction on the block chain, and a modification determination unit that determines whether or not the recorded data is modified, Have.
  • a recording device is A recording device for generating recording data of an operation screen of a monitored computer, An alteration prevention data transmission unit that transmits a transaction storing alteration prevention data including a hash value of the recorded data to a block chain network at a timing when the recorded data is saved as a file, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data, Equipped with.
  • the determination device is A determination device for determining whether or not there is a change in recorded data obtained by recording an operation screen of a monitored computer,
  • the transaction on the block chain is identified based on the identification information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the recorded data, and the alteration prevention data is acquired from the identified transaction.
  • An alteration prevention data acquisition unit A hash value of the recorded data is compared with a hash value included in the alteration prevention data acquired from the transaction on the block chain, and a modification determination unit that determines whether or not the recorded data is modified, Equipped with.
  • a retrofit kit that is retrofitted to a recording device that generates recording data that records the operation screen of the monitored computer,
  • An alteration prevention data transmission unit that transmits a transaction storing alteration prevention data including a hash value of the recorded data to a block chain network at a timing when the recorded data is saved as a file,
  • a specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data, Equipped with.
  • the recording method is A recording method for generating recording data of an operation screen of a monitored computer, Tamper proof data transmitting step of transmitting a transaction in which tamper proof data including a hash value of the record data is stored to a block chain network at a timing when the record data is saved as a file, Specific information storing step of storing specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data; Equipped with.
  • the determination method is A determination method for determining whether or not the recorded data of the operation screen of the monitored computer is modified,
  • the transaction on the block chain is identified based on the identification information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the recorded data, and the alteration prevention data is acquired from the identified transaction.
  • Tamper proof data acquisition step A modification determination step of determining a modification of the recorded data by comparing a hash value of the recorded data with a hash value included in the modification prevention data acquired from the transaction on the block chain, Equipped with.
  • a program according to the twenty-second aspect of the embodiment is On the computer, Tamper proof data for transmitting a transaction in which tamper proof data including a hash value of the record data is stored to a block chain network at the timing when the record data of the operation screen of the second computer to be monitored is saved as a file
  • a send step A specific information storing step of storing specific information for identifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data; To run.
  • a program according to the 23rd aspect of the embodiment is On the computer,
  • the transaction on the blockchain is identified based on the specific information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the recorded data of the operation screen of the second computer to be monitored, Tamper proof data acquisition step of acquiring tamper proof data from the identified transaction,
  • a modification determination step of determining a modification of the recorded data by comparing a hash value of the recorded data with a hash value included in the modification prevention data acquired from the transaction on the block chain, To run.
  • a computer-readable recording medium On the computer, Tamper proof data for transmitting a transaction in which tamper proof data including a hash value of the recorded data is stored to a block chain network at the timing when the recorded data of the operation screen of the second computer to be monitored is saved as a file
  • a send step Specific information storing step of storing specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the recorded data; It records a program characterized by executing.
  • a computer-readable recording medium On the computer, The transaction on the blockchain is identified based on the specific information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the recorded data of the operation screen of the second computer to be monitored, Tamper proof data acquisition step of acquiring tamper proof data from the identified transaction, A modification determination step of comparing the hash value of the recorded data with a hash value included in the modification prevention data acquired from the transaction on the block chain to determine whether or not the recorded data is modified, It records a program characterized by executing.
  • An information processing system is An image capturing device that uploads captured image data to the Internet, A determination device for determining whether or not the image data uploaded on the Internet has been modified, Equipped with The photographing device is An alteration prevention data transmission unit that transmits a transaction in which alteration prevention data including a hash value of the image data is stored to a block chain network at a timing when the image data is saved as a file, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect the hash value of the image data, An upload unit for uploading image data, in which the transaction specific information is stored in the file property or file name, on the Internet; Have The determination device, The transaction on the block chain is identified based on the transaction identification information extracted from the file property or file name of the image data uploaded on the Internet, and the alteration prevention data is acquired from the identified transaction. An alteration prevention data acquisition unit that A hash value of the image data is compared with
  • the imaging device is A photographing device for uploading photographed image data on the Internet, An alteration prevention data transmission unit that transmits a transaction in which alteration prevention data including a hash value of the image data is stored to a block chain network at a timing when the image data is saved as a file, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or file name of a file that does not affect the hash value of the image data, An upload unit for uploading image data, in which the transaction specific information is stored in the file property or file name, on the Internet; Equipped with.
  • the determination device is A determination device for determining whether or not the image data uploaded on the Internet has been modified, A transaction on the blockchain is identified based on identification information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the image data, and the alteration prevention data is acquired from the identified transaction.
  • An alteration prevention data acquisition unit A hash value of the image data is compared with a hash value included in the alteration prevention data acquired from the transaction on the block chain, and a alteration determination unit that determines whether or not the image data is altered, Equipped with.
  • the imaging method is A shooting method for uploading shot image data on the Internet, Tamper proof data transmission step of transmitting a transaction in which tamper proof data including a hash value of the image data is stored to a block chain network at a timing when the image data is saved as a file, Specific information storing step of storing specific information for identifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the image data; An upload step of uploading image data, in which the transaction specific information is stored in the file property or file name, onto the Internet; Equipped with.
  • the determination method is A determination method for determining whether or not the image data uploaded on the Internet has been modified, A transaction on the blockchain is identified based on identification information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the image data, and the alteration prevention data is acquired from the identified transaction. Tamper proof data acquisition step, A hash value of the image data is compared with a hash value included in the tampering prevention data acquired from the transaction on the block chain, and a modification determination step of determining whether the image data has been modified, Equipped with.
  • a program according to the 31st aspect of the embodiment is On the computer, Tamper proof data transmitting step of transmitting a transaction in which tamper proof data including a hash value of the image data is stored to a block chain network at a timing when the captured image data is saved as a file, Specific information storing step of storing specific information for identifying the transaction registered in the block chain in a property or file name of a file that does not affect a hash value of the image data; An upload step of uploading image data, in which the transaction specific information is stored in the file property or file name, onto the Internet; To run.
  • a program is On the computer, Identify the transaction on the blockchain based on the specific information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the image data uploaded on the Internet, and modify from the identified transaction
  • Modification prevention data acquisition step of acquiring prevention data A hash value of the image data is compared with a hash value included in the tampering prevention data acquired from the transaction on the block chain, and a modification determination step of determining whether the image data has been modified, To run.
  • a computer-readable record On the computer, Identify the transaction on the blockchain based on the specific information for identifying the transaction extracted from the property of the file or the file name that does not affect the hash value of the image data uploaded on the Internet, and modify from the identified transaction
  • Modification prevention data acquisition step of acquiring prevention data A hash value of the image data is compared with a hash value included in the tampering prevention data acquired from the transaction on the block chain, and a modification determination step of determining whether the image data has been modified, It records a program characterized by executing.
  • An information processing system is A file generation / editing device for generating or editing a file, A determination device for determining whether or not the file has been modified, Equipped with The file generating / editing device, An alteration prevention data transmission unit that transmits a transaction in which alteration prevention data including a hash value of the file is stored to a network of a block chain at a timing when the file is saved, A specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or a file name that does not affect the hash value of the file, Have The determination device, An alteration prevention data acquisition unit that identifies the transaction on the block chain based on the transaction identification information extracted from the file property or file name, and obtains the alteration prevention data from the identified transaction. A hash value of the file is compared with a hash value included in the tampering prevention data acquired from the transaction on the block chain, and a modification determination unit that determines whether the file has been modified, Have.
  • a file generation / editing apparatus is A file generation / editing device for generating or editing a file
  • An alteration prevention data transmission unit that transmits a transaction in which alteration prevention data including a hash value of the file is stored to a network of a block chain at a timing when the file is saved
  • a specific information storage unit that stores specific information for specifying the transaction registered in the block chain in a property or a file name that does not affect the hash value of the file, Equipped with.
  • a determination device is A determination device for determining whether or not a file has been modified, Tamper proof data that identifies the transaction on the blockchain based on the specific information for identifying the transaction extracted from the property that does not affect the hash value of the file or the file name, and acquires the tamper proof data from the identified transaction
  • the acquisition part, A hash value of the file is compared with a hash value included in the tampering prevention data acquired from the transaction on the block chain, and a modification determination unit that determines whether the file has been modified, Equipped with.
  • a file generation / editing method is A file generation and editing method for generating or editing a file, Tamper proof data transmitting step of transmitting a transaction storing tamper proof data including a hash value of the file to a block chain network at a timing when the file is saved, A specific information storage step of storing specific information for specifying the transaction registered in the block chain in a property or a file name that does not affect a hash value of the file; Equipped with.
  • the determination method is A determination method for determining whether a file has been modified, Tamper proof data that identifies the transaction on the blockchain based on the specific information for identifying the transaction extracted from the property that does not affect the hash value of the file or the file name, and acquires the tamper proof data from the identified transaction Acquisition step, A hash value of the file is compared with a hash value included in the tampering prevention data acquired from the transaction on the block chain, and a modification determination step of determining whether the file has been modified, Equipped with.
  • a program according to the 40th aspect of the embodiment is On the computer, Tamper proof data transmitting step of transmitting a transaction in which tamper proof data including a hash value of the file is stored to a block chain network at a timing when the generated or edited file is saved, A specific information storage step of storing specific information for specifying the transaction registered in the block chain in a property or a file name that does not affect a hash value of the file; To run.
  • a program according to the 41st aspect of the embodiment is On the computer, Tamper proof data acquisition that identifies the transaction on the blockchain based on the property that does not affect the hash value of the file or the specific information for identifying the transaction extracted from the file name and acquires the tamper proof data from the identified transaction Steps, A hash value of the file is compared with a hash value included in the tampering prevention data acquired from the transaction on the block chain, and a modification determination step of determining whether the file has been modified, To run.
  • a computer-readable recording medium On the computer, Tamper proof data acquisition that identifies the transaction on the blockchain based on the property that does not affect the hash value of the file or the specific information for identifying the transaction extracted from the file name and acquires the tamper proof data from the identified transaction Steps, A hash value of the file is compared with a hash value included in the tampering prevention data acquired from the transaction on the block chain, and a modification determination step of determining whether the file has been modified, It records a program characterized by executing.
  • FIG. 1 is a diagram showing a schematic configuration of an information processing system 1 according to the first embodiment.
  • the information processing system 1 has a recording device 2 and a determination device 3. At least a part of the recording device 2 and the determination device 3 is realized by a computer.
  • each of the recording device 2 and the determination device 3 is configured to function as a node that configures a block chain network, and Peer to Peer ( P2P) connection.
  • the network between the nodes 2 to 6 may be either a wired line or a wireless line, and the type and form of the line does not matter.
  • the node with code 4 is a minor node, and unprocessed transactions are bundled to generate a new block (mining is performed). Further, at least one of the nodes 2 to 6 is a full node and stores the entire block chain data.
  • the block chain network an existing block chain network such as the Ethereum network can be used.
  • one or more monitoring cameras 71 and 72 are connected to the recording device 2, and the recording device 2 generates recording data 23a in which images of the monitoring cameras 71 and 72 are recorded. ..
  • FIG. 2 is a diagram showing a schematic configuration of the recording device 2.
  • the recording device 2 has a communication unit 21, a control unit 22, and a storage unit 23.
  • the units are connected to each other via a bus or a network so that they can communicate with each other.
  • the communication unit 21 is a communication interface between the recording device 2 and the block chain network.
  • the communication unit 21 transmits and receives information between the recording device 2 and the other nodes 3 to 6 via the block chain network.
  • the storage unit 23 is, for example, a magnetic data storage such as a hard disk.
  • the storage unit 23 stores various data handled by the control unit 22.
  • the storage unit 23 has recorded data 23a in which images of the surveillance cameras 71 and 72 are recorded and a secret key 23b.
  • the recording data 23a may be either still image data or moving image data.
  • the secret key 23b can be created by, for example, the RSA cryptosystem.
  • control unit 22 has a recording data generation unit 22a, a tampering prevention data transmission unit 22b, and a specific information storage unit 22c.
  • Each of these units may be implemented by a processor in the recording device 2 executing a predetermined program, or may be implemented by hardware.
  • the recorded data generation unit 22a generates recorded data 23a in which the images of the surveillance cameras 71 and 72 are recorded.
  • the recording data generation unit 22a may generate recording data 23a composed of one file of moving image data for each predetermined recording time length (for example, 10 minutes, 60 minutes, etc.).
  • the generated recording data 23a is stored in the storage unit 23.
  • the recorded data generation unit 22a for the generated recorded data 23a, shooting locations of the monitoring cameras 71 and 72, shooting date and time, identification information of the monitoring cameras 71 and 72 (for example, license information), identification information of the recording device 2 (for example, license information).
  • identification information of the monitoring cameras 71 and 72 for example, license information
  • identification information of the recording device 2 for example, license information
  • the determination device 3 described later causes the recording device 2 or an external database or block chain to add the auxiliary information or Even if the check information (for example, access URL) for inquiring the information hash is generated and the auxiliary information or the information hash and the check information are associated with each other, the check information is stored in the storage unit 23 or an external database or block chain. Good.
  • the determination device 3 does not want to include the auxiliary information in the response result when the recording device 2 or the external database or block chain is inquired via the check information, only the information hash is associated with the check information. It may be stored in the storage unit 23 or an external database or block chain.
  • the tampering prevention data transmission unit 22b has a hash value (hereinafter, may be referred to as “data hash”) of the (raw) recorded data 23a immediately after recording at the timing when the recorded data 23a is stored as a file in the storage unit 23. ) Is generated, a transaction in which the alteration prevention data is stored is generated.
  • the tampering prevention data transmitter 22b may store the auxiliary information or information hash about the recorded data 23a and the check information (access URL etc.) in the transaction as a part of the tampering prevention data.
  • the tampering prevention data transmitter 22b may store the file size of the recorded data 23a in the transaction as a part of the tampering prevention data.
  • the alteration prevention data is stored in the transaction as information that cannot be rewritten (read only).
  • the tampering prevention data transmission unit 22b may encode the tampering prevention data with the secret key 23b and generate a transaction in which the encoded tampering prevention data is stored.
  • the tampering prevention data transmission unit 22b transmits the generated transaction to the block chain network via the communication unit 21.
  • the transaction transmitted to the blockchain network is registered in the blockchain by mining a block including the transaction in the minor node 4, and specific information for identifying the transaction on the blockchain (for example, Transaction hash value and address value) are added.
  • the specific information storage unit 22c acquires the specific information of the transaction registered in the block chain and stores it in the file property or file name that does not affect the hash value of the recorded data 23a stored in the storage unit 23 (for example, the file Add to the end of the name).
  • the specific information storage unit 22c may encode the transaction specific information with the secret key 23b, and store the encoded transaction specific information in the file property or file name of the recorded data 23a.
  • the specific information storage unit 22c generates a hash value (hereinafter, also referred to as “specific hash”) from the property or file name of the file of the recorded data 23a in which the specific information of the transaction is stored, and the transaction on the block chain. It may be stored in.
  • a hash value hereinafter, also referred to as “specific hash”
  • the recording device 2 described above is a commercially available recorder having a communication unit 21, a recording data generation unit 22a, and a storage unit 23 that stores the recording data 23a, a modification prevention data transmission unit 22b, a specific information storage unit 22c, and a secret. It may be realized by incorporating a retrofit kit 29 having a key 23b.
  • FIG. 3 is a diagram showing a schematic configuration of the determination device 3.
  • the determination device 3 includes a communication unit 31, a control unit 32, and a storage unit 33.
  • the units are connected to each other via a bus or a network so that they can communicate with each other.
  • the communication unit 31 is a communication interface between the determination device 3 and the block chain network.
  • the communication unit 31 transmits and receives information between the determination device 3 and the other nodes 2, 4 to 6 via the block chain network.
  • the storage unit 33 is a magnetic data storage such as a hard disk.
  • the storage unit 33 stores various data handled by the control unit 32.
  • the storage unit 33 has a public key 33a corresponding to the secret key 23b stored in the recording device 2.
  • the public key 33a can be created based on the secret key 23b by, for example, the RSA cryptosystem.
  • control unit 32 has a tampering prevention data acquisition unit 32a and a tampering determination unit 32b.
  • Each of these units may be implemented by a processor in the determination device 3 executing a predetermined program, or may be implemented by hardware.
  • the tampering prevention data acquisition unit 32a acquires the transaction specific information extracted from the file property or file name of the target recorded data. Even if the modification prevention data acquisition unit 32a acquires the transaction identification information extracted from another device (for example, the recording device 2) from the property or file name of the file of the target recording data from the other device. Alternatively, the target recording data may be acquired from another device (for example, the recording device 2), and the transaction specific information may be extracted by itself from the property or file name of the acquired recording data file.
  • the alteration prevention data acquisition unit 32a identifies the encoded transaction.
  • the information is decrypted and acquired with the public key 33a stored in the storage unit 33.
  • the alteration prevention data acquisition unit 32a identifies the transaction on the block chain based on the acquired transaction identification information. , From the identified transaction, obtain the tampering prevention data stored in the transaction.
  • the alteration prevention data acquisition unit 32a stores the encoded alteration prevention data in the storage unit 33. It is obtained by decrypting with the public key 33a.
  • the alteration determination unit 32b acquires the hash value (data hash) of the target recorded data.
  • the tampering determination unit 32b may obtain a data hash calculated by another device (for example, the recording device 2) from the target recorded data from the other device, or may change the target recorded data to another.
  • the data hash may be acquired from a device (for example, the recording device 2) and the data hash may be calculated by itself from the acquired recorded data.
  • the modification determination unit 32b determines the hash value (specific hash) of the property or file name of the target recorded data file. Is compared with the specific hash included in the tamperproof data obtained from the transaction on the blockchain to determine whether the file property or file name is correct, that is, the transaction specific information extracted from it is Determine if it was correct. More specifically, when the specific hash of the target recorded data matches the specific hash included in the modification prevention data acquired from the transaction on the block chain, the modification determination unit 32b determines that the target recorded data of the target recorded data is It is determined that the property or file name of the file is correct, that is, the specific information of the transaction extracted from that is correct.
  • the alteration determination unit 32b determines that the property or file name of the target recorded data file is incorrect (altered), that is, identifies the transaction extracted therefrom. Determine that the information was incorrect. Further, the tampering determination unit 32b compares the hash value (data hash) of the target recorded data with the data hash included in the tampering prevention data acquired from the transaction on the block chain to determine the target recorded data. Determine if there is any modification. More specifically, if the data hash of the target recording data matches the data hash included in the modification prevention data acquired from the transaction on the block chain, the modification determining unit 32b determines that the target recording data is Judge that it has not been modified. If the data hashes do not match, the alteration determination unit 32b determines that the target recorded data has been altered.
  • the alteration determination unit 32b uses the data hash of the target recorded data as a search key to search for the transaction on the block chain. If no hit is found, it is determined that the target recorded data has been modified, and if a hit is found, the auxiliary information or information hash included in the modification prevention data acquired from the hit transaction and the hit Of the target recorded data by comparing the auxiliary information or the information hash acquired by inquiring of the recording device 2 or an external database or block chain via the check information included in the alteration prevention data acquired from the transaction. Determine if there is any modification.
  • the transaction on the block chain may be searched again using the data hash of the target recording data as a search key. ..
  • the alteration determination unit 32b compares the file size included in the alteration prevention data acquired from the hit transaction with the file size of the target recorded data, If the file sizes are the same, it may be judged that the possibility of modification is low.
  • the modification determination unit 32b determines that another transaction of the recorded data happens to hit, and re-searches the transaction on the block chain using the data hash of the target recorded data as a search key. Alternatively, it may be determined that the target recorded data has been modified.
  • the alteration determination unit 32b may output the determination result to an output unit (display or speaker) not shown.
  • the output unit that outputs the determination result may be provided in the computer itself that configures the determination device 3, or may be provided in another device (for example, a user's mobile terminal) communicably connected to the determination device 3. May be.
  • FIG. 4 is a flowchart showing an example of the recording method by the recording device 2
  • FIGS. 5A and 5B are flowcharts showing an example of the determination method by the determination device 3.
  • FIG. 6A is a conceptual diagram for explaining an example of a recording method by the recording device 2
  • FIGS. 6B and 6C are conceptual diagrams for explaining an example of a determination method by the determination device 3.
  • the recording data generation unit 22a of the recording device 2 generates recording data 23a in which the images of the surveillance cameras 71 and 72 are recorded (step S11).
  • the recording data generation unit 22a may generate recording data 23a composed of one file of moving image data for each predetermined recording time length (for example, 10 minutes, 60 minutes, etc.).
  • the generated recording data 23a is stored in the storage unit 23.
  • the alteration prevention data transmission unit 22b stores the alteration prevention data including the data hash of the (raw) recorded data 23a immediately after recording.
  • a transaction is generated (step S12).
  • the tampering prevention data transmitter 22b includes at least one of the shooting location of the monitoring cameras 71 and 72, the shooting date and time, the identification information of the monitoring cameras 71 and 72, and the identification information of the recording device 2.
  • a transaction in which the tamperproof data further including one piece of auxiliary information or information hash and check information is stored may be generated.
  • the tampering prevention data transmission unit 22b may encode the tampering prevention data with the secret key 23b and generate a transaction in which the encoded tampering prevention data is stored.
  • the tampering prevention data transmitter 22b transmits the generated transaction to the blockchain network (step S13).
  • the transaction transmitted to the blockchain network is registered in the blockchain by mining a block including the transaction in the minor node 4, and specific information for identifying the transaction on the blockchain (for example, Transaction hash value and address value) are added.
  • the specific information storage unit 22c acquires the specific information added to the transaction (step S14).
  • the specific information storage unit 22c stores the acquired transaction specific information in the property or file name of the file that does not affect the hash value of the recorded data 23a stored in the storage unit 23 (step S15).
  • the specific information storage unit 22c may encode the transaction specific information with the secret key 23b, and store the encoded transaction specific information in the file property or file name of the recorded data 23a.
  • the specific information storage unit 22c generates a specific hash from the property or file name of the file of the recorded data 23a in which the transaction specific information is stored, and uses the generated specific hash as part of the alteration prevention data on the block chain. Stored in the transaction (step S16).
  • the alteration prevention data acquisition unit 32a extracts the transaction identification information from the file property or file name of the target recorded data (step S21).
  • the alteration prevention data acquisition unit 32a identifies the encoded transaction.
  • the information is decrypted and extracted with the public key 33a corresponding to the secret key 23b.
  • the modification prevention data acquisition unit 32a identifies the transaction on the block chain based on the extracted transaction identification information, and selects the transaction from the identified transaction.
  • the tampering prevention data stored in the transaction is acquired (step S23).
  • the alteration prevention data acquisition unit 32a corresponds the encoded alteration prevention data to the secret key 23b. It is obtained by decrypting with the public key 33a.
  • the alteration determination unit 32b generates a specific hash from the property or file name of the file of the target recorded data, and identifies the generated specific hash included in the alteration prevention data acquired from the transaction on the block chain.
  • the hash value is compared (step S24).
  • step S25 If the specific hashes match (step S25: YES), the alteration determination unit 32b determines that the property or file name of the file of the target recorded data is correct, that is, the specific information of the transaction extracted from it. Determined to be correct. Then, the alteration determination unit 32b generates a data hash from the target recorded data and compares the generated data hash with the data hash included in the alteration prevention data acquired from the transaction on the block chain (step S26). ..
  • step S27 If the data hashes match (step S27: YES), the alteration determination unit 32b determines that the target recorded data has not been altered immediately after recording (step S28).
  • step S28 determines that the target recorded data has been altered after recording.
  • step S21 if the transaction specific information cannot be extracted from the file property or file name of the target recorded data (step S22: NO), as shown in FIGS. 5B and 6C, the alteration determination unit 32b. Searches for transactions on the block chain using the hash value of the target recorded data as a search key (step S31).
  • step S25: NO the alteration determination unit 32b determines that the property or file name of the target recorded data file is incorrect (altered). That is, it is determined that the specific information of the transaction extracted from it is incorrect. Then, as shown in FIG. 5B and FIG. 6C, the alteration determination unit 32b, like the case where the transaction specific information cannot be extracted from the file property or file name (step S22: NO), the data of the target recorded data is acquired. A transaction on the block chain is searched using the hash as a search key (step S31).
  • the alteration determination unit 32b acquires the auxiliary information or information hash of the recorded data by inquiring the recording device 2 or an external database or block chain. (Step S33). Specifically, for example, the tampering determination unit 32b acquires the tampering prevention data stored in the transaction from the hit transaction, and checks the recording device via the check information (access URL) included in the acquired tampering prevention data. 2 or an external database or block chain is accessed to obtain auxiliary information or an information hash stored in the recording device 2 or an external database or block chain in association with the check information.
  • the tampering determination unit 32b receives the auxiliary information or the information hash included in the tampering prevention data acquired from the hit transaction as auxiliary information acquired from the recording device 2 or an external database or block chain via the check information. Alternatively, it is compared with the information hash (step S34).
  • step S35 YES
  • the alteration determination unit 32b determines that the transaction hit in the search of step S31 is correct, and the target recorded data is immediately after recording. It is determined that the data has not been modified (step S28).
  • step S35 NO
  • the modification determination unit 32b determines that the transaction hit in the search of step S31 is wrong (because it handles a large amount of data, it happens that It collides with the data hash of the transaction No.)), the process returns to Step S31, and the transaction on the block chain is searched again.
  • step S32: NO the alteration determination unit 32b determines that the target recorded data has been altered after recording (step S29).
  • the recorded data 23a is saved as a file
  • the transaction on the block chain is searched by using the data hash of the target recorded data as a search key and hit. If not, it is determined that the target recorded data has been modified, and if there is a hit, the modification protection data is acquired from the hit transaction and the auxiliary information or information hash stored in the modification protection data is acquired.
  • the alteration prevention data transmission unit 22b transmits the transaction storing the alteration prevention data encoded by the secret key 23b to the block chain network, and the alteration prevention data acquisition unit 32a
  • the tamperproof data stored in the transaction on the blockchain with the public key 33a and acquiring the tamperproof data By decrypting the tamperproof data stored in the transaction on the blockchain with the public key 33a and acquiring the tamperproof data, the tamperproof data of the tamperproof data registered on the blockchain can be used even when the public blockchain is used. Browsing can be limited to only specific viewers having the public key 33a.
  • the specific information storage unit 22c encodes the transaction specific information with the secret key 23b and stores it in the file property or file name of the recorded data 23a, and the alteration prevention data acquisition unit 32a.
  • the transaction identification information stored in the file property or file name of the target recorded data is decrypted and extracted by the public key 33a to identify the transaction registered on the blockchain. It is possible to limit the browsing of the alteration prevention data stored in the transaction to only the specific viewer having the above.
  • the recording device 2 has the secret key 23b and the determining device 3 has the public key 33a corresponding to the secret key 23b in the above-described embodiment, the present invention is not limited to this, and the determining process is not limited to this.
  • the device 3 may have a private key and the recording device 2 may have a public key corresponding to the private key.
  • the tampering prevention data transmission unit 22b of the recording device 2 transmits the transaction storing the tampering prevention data encoded with the public key to the network of the block chain, and the tampering prevention data acquisition unit 32a of the determination device 3
  • the tamperproof data stored in the transaction on the blockchain may be decrypted with the private key to be acquired.
  • the specific information storage unit 22c of the recording device 2 encodes the transaction specific information with the public key and stores it in the file property or file name of the recorded data 23a, and the alteration prevention data acquisition unit 32a of the determination device 3
  • the transaction identification information stored in the file property or file name of the target recorded data may be decrypted and extracted with the private key.
  • FIG. 7 is a diagram showing a schematic configuration of the information processing system 101 according to the second embodiment.
  • the information processing system 101 has a recording device 102 and a determination device 103. At least a part of the recording device 102 and the determination device 103 is realized by a computer.
  • the recording device 102 and the determination device 103 are each configured to function as a node configuring a block chain network, and Peer to Peer ( P2P) connection.
  • the network between the nodes 102 to 106 may be either a wired line or a wireless line, and the type or form of the line does not matter.
  • the node denoted by reference numeral 104 is a minor node, and unprocessed transactions are bundled to generate a new block (mining is performed). Further, at least one of the nodes 102 to 106 is a full node and stores the entire block chain data.
  • the block chain network an existing block chain network such as the Ethereum network can be used.
  • one or more computers 171 and 172 to be monitored are connected to the recording device 102, and the recording device 102 records the recorded data 123a obtained by recording the operation screens of the computers 171 and 172. To generate.
  • FIG. 8 is a diagram showing a schematic configuration of the recording device 102.
  • the recording device 102 includes a communication unit 121, a control unit 122, and a storage unit 123.
  • the units are connected to each other via a bus or a network so that they can communicate with each other.
  • the communication unit 121 is a communication interface between the recording device 102 and the block chain network.
  • the communication unit 121 transmits / receives information between the recording device 102 and the other nodes 103 to 106 via the block chain network.
  • the storage unit 123 is a magnetic data storage such as a hard disk.
  • the storage unit 123 stores various data handled by the control unit 122.
  • the storage unit 123 has recorded data 123a in which operation screens of the computers 171 and 172 to be monitored are recorded, and a secret key 123b.
  • the recording data 123a may be either still image data or moving image data.
  • the private key 123b can be created by, for example, the RSA cryptosystem.
  • control unit 122 includes a recorded data generation unit 122a, a modification prevention data transmission unit 122b, and a specific information storage unit 122c. Each of these units may be implemented by a processor in the recording device 102 executing a predetermined program, or may be implemented by hardware.
  • the recorded data generation unit 122a generates recorded data 123a in which the operation screens of the computers 171 and 172 to be monitored are recorded.
  • the recording data generation unit 122a may generate recording data 123a composed of one file of moving image data for each predetermined recording time length (for example, 10 minutes, 60 minutes, etc.).
  • the generated recording data 123a is stored in the storage unit 123.
  • the recorded data generation unit 122a with respect to the generated recorded data 123a, the installation location of the computers 171 and 172 to be monitored, the operation date and time, the identification information (for example, IP address or user ID) of the computers 171 and 172 to be monitored, and the recording device 102.
  • the identification information for example, license information
  • the determination device 103 to be described later is used by the recording device 102 or an external database.
  • check information for example, access URL
  • the storage unit 123 or an external database or It may be stored in the blockchain.
  • the determination device 103 does not want to include the auxiliary information in the response result when the recording device 102 or the external database or block chain is inquired via the check information, only the information hash is associated with the check information. It may be stored in the storage unit 123 or an external database or block chain.
  • the tampering prevention data transmission unit 122b has a hash value (hereinafter, may be referred to as a “data hash”) of the (raw) recorded data 123a immediately after recording at the timing when the recorded data 123a is stored in the storage unit 123 as a file. ) Is generated, a transaction in which the alteration prevention data is stored is generated.
  • the tampering prevention data transmitting unit 122b may store the auxiliary information or the information hash of the recorded data 23a and the check information (access URL or the like) in the transaction as a part of the tampering prevention data.
  • the tampering prevention data transmission unit 122b may store the file size of the recorded data 123a in the transaction as a part of the tampering prevention data.
  • the alteration prevention data is stored in the transaction as information that cannot be rewritten (read only).
  • the tampering prevention data transmission unit 122b may encode the tampering prevention data with the secret key 123b and generate a transaction in which the encoded tampering prevention data is stored.
  • the tampering prevention data transmission unit 122b transmits the generated transaction to the block chain network via the communication unit 121.
  • the transaction transmitted to the blockchain network is registered in the blockchain by mining the block including the transaction in the minor node 104, and specific information for identifying the transaction on the blockchain (for example, Transaction hash value and address value) are added.
  • the specific information storage unit 122c acquires the specific information of the transaction registered in the block chain and stores it in the file property or file name that does not affect the hash value of the recorded data 123a stored in the storage unit 123 (for example, the file Add to the end of the name).
  • the specific information storage unit 122c may encode the transaction specific information with the secret key 123b and store the encoded transaction specific information in the file property or file name of the recorded data 123a.
  • the specific information storage unit 122c generates a hash value (hereinafter, may be referred to as “specific hash”) from the property or file name of the file of the recorded data 123a in which the specific information of the transaction is stored, and the transaction on the block chain. May be stored in.
  • a hash value hereinafter, may be referred to as “specific hash”
  • the above-described recording device 102 is a commercially available recorder having a communication unit 121, a recording data generation unit 122a, and a storage unit 123 that stores recording data 123a, a modification prevention data transmission unit 122b, a specific information storage unit 122c, and a secret. It may be realized by incorporating a retrofit kit 129 having a key 123b.
  • FIG. 9 is a diagram showing a schematic configuration of the determination device 103.
  • the determination device 103 includes a communication unit 131, a control unit 132, and a storage unit 133.
  • the units are connected to each other via a bus or a network so that they can communicate with each other.
  • the communication unit 131 is a communication interface between the determination device 103 and the block chain network.
  • the communication unit 131 transmits / receives information between the determination device 103 and the other nodes 102, 104 to 106 via the block chain network.
  • the storage unit 133 is, for example, a magnetic data storage such as a hard disk.
  • the storage unit 133 stores various data handled by the control unit 132.
  • the storage unit 133 has a public key 133a corresponding to the private key 123b stored in the recording device 102.
  • the public key 133a can be created based on the secret key 123b in the RSA cryptosystem, for example.
  • control unit 132 has a tampering prevention data acquisition unit 132a and a tampering determination unit 132b. Each of these units may be realized by the processor in the determination device 103 executing a predetermined program, or may be implemented by hardware.
  • the tampering prevention data acquisition unit 132a acquires the transaction specific information extracted from the file property or file name of the target recorded data. Even if the modification prevention data acquisition unit 132a acquires the transaction identification information extracted by the other device (for example, the recording device 102) from the property or file name of the file of the target recording data from the other device. Alternatively, the target recording data may be acquired from another device (for example, the recording device 102), and the transaction specific information may be extracted by itself from the property or file name of the file of the acquired recording data.
  • the alteration prevention data acquisition unit 132a identifies the encoded transaction.
  • the information is decrypted and acquired with the public key 133a stored in the storage unit 133.
  • the modification prevention data acquisition unit 132a identifies the transaction on the block chain based on the acquired transaction identification information. , From the identified transaction, obtain the tampering prevention data stored in the transaction.
  • the alteration prevention data acquisition unit 132a stores the encoded alteration prevention data in the storage unit 133.
  • the public key 133a is decrypted and acquired.
  • the alteration determination unit 132b acquires the hash value (data hash) of the target recorded data.
  • the tampering determination unit 132b may obtain a data hash calculated by another device (for example, the recording device 102) from the target recorded data from the other device, or may change the target recorded data to another.
  • the data hash may be acquired from a device (for example, the recording device 102) and the data hash may be calculated by itself from the acquired recorded data.
  • the alteration determination unit 132b determines the hash value (specific hash) of the property or file name of the target recorded data file. Is compared with the specific hash included in the tamperproof data obtained from the transaction on the blockchain to determine whether the file property or file name is correct, that is, the transaction specific information extracted from it is Determine if it was correct. More specifically, if the specific hash of the target recorded data matches the specific hash included in the modification prevention data acquired from the transaction on the block chain, the modification determination unit 132b determines that the target recorded data is It is determined that the property or file name of the file is correct, that is, the specific information of the transaction extracted from that is correct.
  • the modification determination unit 132b determines that the property or file name of the target recorded data file is incorrect (modified), that is, the transaction extracted from that is specified. Determine that the information was incorrect. Further, the alteration determination unit 132b compares the hash value (data hash) of the target recorded data with the data hash included in the alteration prevention data acquired from the transaction on the block chain, and compares the target recorded data with the hash value. Determine if there is any modification. More specifically, when the data hash of the target recording data matches the data hash included in the modification preventing data acquired from the transaction on the block chain, the modification determining unit 132b determines that the target recording data is Judge that it has not been modified. If the data hashes do not match, the alteration determination unit 132b determines that the target recorded data has been altered.
  • the alteration determination unit 132b uses the data hash of the target recorded data as a search key to identify the transaction on the block chain. If no hit is found, it is determined that the target recorded data has been modified, and if a hit is found, the auxiliary information or information hash included in the modification prevention data acquired from the hit transaction and the hit Of the target recording data by comparing the auxiliary information or the information hash acquired by inquiring of the recording device 102 or an external database or block chain via the check information included in the alteration prevention data acquired from the transaction. Determine if there is any modification.
  • the transaction on the block chain may be searched again using the data hash of the target recording data as a search key. ..
  • the alteration determination unit 132b compares the file size included in the alteration prevention data acquired from the hit transaction with the file size of the target recorded data, If the file sizes are the same, it may be judged that the possibility of modification is low.
  • the alteration determination unit 132b determines that another transaction of recorded data happens to hit, and re-searches the transaction on the block chain using the data hash of the target recorded data as a search key. Alternatively, it may be determined that the target recorded data has been modified.
  • the alteration determination unit 132b may output the determination result to an output unit (display or speaker) not shown.
  • the output unit that outputs the determination result may be provided in the computer itself that constitutes the determination device 103, or may be provided in another device (for example, a user's mobile terminal) communicatively connected to the determination device 103. May be.
  • FIG. 10 is a flowchart showing an example of a recording method by the recording device 102
  • FIGS. 11A and 11B are flowcharts showing an example of a determination method by the determination device 103.
  • 12A is a conceptual diagram for explaining an example of a recording method by the recording device 102
  • FIGS. 12B and 12C are conceptual diagrams for explaining an example of a determination method by the determination device 103.
  • the recording data generation unit 122a of the recording device 102 generates recording data 123a in which the operation screens of the computers 171 and 172 to be monitored are recorded (step S111).
  • the recording data generation unit 122a may generate recording data 123a composed of one file of moving image data for each predetermined recording time length (for example, 10 minutes, 60 minutes, etc.).
  • the generated recording data 123a is stored in the storage unit 123.
  • the alteration prevention data transmission unit 122b stores the alteration prevention data including the data hash of the (raw) recorded data 123a immediately after recording.
  • a transaction is generated (step S112).
  • the tampering prevention data transmission unit 122b stores the installation location of the monitored computers 171, 172, the operation date and time, the identification information of the monitored computers 171, 172, and the identification information of the recording device 102.
  • the transaction in which the tampering prevention data further including at least one of the auxiliary information or the information hash and the check information are stored may be generated.
  • the tampering prevention data transmission unit 122b may encode the tampering prevention data with the secret key 123b and generate a transaction in which the encoded tampering prevention data is stored.
  • the tampering prevention data transmission unit 122b transmits the generated transaction to the block chain network (step S113).
  • the transaction transmitted to the blockchain network is registered in the blockchain by mining the block including the transaction in the minor node 104, and specific information for identifying the transaction on the blockchain (for example, Transaction hash value and address value) are added.
  • the specific information storage unit 122c acquires the specific information added to the transaction (step S114).
  • the specific information storage unit 122c stores the acquired specific information of the transaction in the property or file name of the file that does not affect the hash value of the recorded data 123a stored in the storage unit 123 (step S115).
  • the specific information storage unit 122c may encode the transaction specific information with the secret key 123b and store the encoded transaction specific information in the file property or file name of the recorded data 123a.
  • the specific information storage unit 122c generates a specific hash from the file property or file name of the recorded data 123a in which the transaction specific information is stored, and uses the generated specific hash as part of the alteration prevention data on the block chain. Stored in the transaction (step S116).
  • the alteration prevention data acquisition unit 132a extracts the transaction identification information from the file property or file name of the target recorded data (step S121).
  • the alteration prevention data acquisition unit 132a identifies the encoded transaction.
  • the information is decrypted and extracted with the public key 133a corresponding to the secret key 123b.
  • the modification prevention data acquisition unit 132a identifies the transaction on the block chain based on the extracted transaction identification information, and selects the transaction from the identified transaction.
  • the tampering prevention data stored in the transaction is acquired (step S123).
  • the alteration prevention data acquisition unit 132a corresponds the encoded alteration prevention data to the secret key 123b. It is obtained by decrypting with the public key 133a.
  • the alteration determination unit 132b generates a specific hash from the property or file name of the file of the target recorded data, and identifies the generated specific hash in the alteration prevention data acquired from the transaction on the block chain.
  • the hash value is compared (step S124).
  • step S125 YES
  • the alteration determination unit 132b determines that the property or file name of the file of the target recorded data is correct, that is, the transaction specific information extracted from the file is correct. Determined to be correct. Then, the alteration determination unit 132b generates a data hash from the target recorded data, and compares the generated data hash with the data hash included in the alteration prevention data acquired from the transaction on the block chain (step S126). ..
  • step S127 If the data hashes match (step S127: YES), the alteration determination unit 132b determines that the target recorded data has not been altered immediately after recording (step S128).
  • step S127 determines that the target recorded data has been altered after recording (step S129).
  • step S121 if the transaction specific information cannot be extracted from the file property or file name of the target recorded data (step S122: NO), as shown in FIGS. 11B and 12C, the alteration determination unit 132b. Searches for a transaction on the block chain using the data hash of the target recorded data as a search key (step S131).
  • step S125 the alteration determination unit 132b determines that the file property or file name of the target recorded data is incorrect (altered). That is, it is determined that the specific information of the transaction extracted from it is incorrect. Then, as shown in FIGS. 11B and 12C, the alteration determination unit 132b, as in the case where the transaction specific information cannot be extracted from the file property or file name (step S122: NO), the data of the target recorded data is acquired. A transaction on the block chain is searched using the hash as a search key (step S131).
  • the alteration determination unit 132b inquires the recording device 102 or an external database or block chain to obtain auxiliary information or information hash of the recorded data. (Step S133). Specifically, for example, the tampering determination unit 132b acquires the tampering prevention data stored in the transaction from the hit transaction, and the recording device via the check information (access URL) included in the acquired tampering prevention data. By accessing 102 or an external database or block chain, the auxiliary information or information hash stored in the recording device 102 or external database or block chain in association with the check information is acquired.
  • the tampering determination unit 132b receives the auxiliary information or the information hash included in the tampering prevention data acquired from the hit transaction as auxiliary information acquired from the recording device 102 or an external database or block chain via the check information. Alternatively, it is compared with the information hash (step S134).
  • step S135 YES
  • the alteration determination unit 132b determines that the transaction hit in the search of step S131 is correct, and the target recorded data is immediately after recording. It is determined that the data has not been modified (step S128).
  • step S135 NO
  • the modification determination unit 132b determines that the transaction hit in the search of step S131 is wrong (because it handles a large amount of data, it happens to be different). It collides with the data hash of the transaction No.)), the process returns to step S131 and the transaction on the block chain is searched again.
  • step S132 determines that the target recorded data has been altered after recording (step S129). ..
  • the transaction in which the alteration prevention data including the data hash of the (raw) recorded data 123a immediately after recording is stored is Since it is registered in the blockchain, it is practically impossible to modify the modification prevention data afterwards. Further, since the transaction identification information is stored in the file property or file name of the recorded data 123a, the recorded data 123a and the transaction identification information can be easily associated and managed. Then, by confirming that the data hash of the target recorded data matches the data hash included in the modification prevention data acquired from the transaction registered on the blockchain, the target recorded data is modified. Can be guaranteed not to.
  • a transaction having a small size in which the modification prevention data including the data hash of the recorded data 123a is stored is not a transaction in which the recorded data 123a itself is stored in a large size, but a transaction of the block chain as a transaction. Since it is transmitted to the network, transactions can be continuously and stably transmitted even when the bandwidth of the network is narrow or the speed is slow. Further, even a block chain in which a fee according to the data size is generated when a transaction is registered can be used at low cost.
  • the transaction on the block chain is searched by using the data hash of the target recorded data as a search key and hit. If not, it is determined that the target recorded data has been modified, and if there is a hit, the modification protection data is acquired from the hit transaction and the auxiliary information or information hash stored in the modification protection data is acquired.
  • the alteration prevention data transmission unit 122b transmits the transaction storing the alteration prevention data encoded by the secret key 123b to the block chain network, and the alteration prevention data acquisition unit 132a
  • the alteration prevention data acquisition unit 132a By decrypting the tamperproof data stored in the transaction on the blockchain with the public key 133a and acquiring the tamperproofdata, even if the public blockchain is used, the tamperproof data registered on the blockchain can be changed. Browsing can be limited to specific viewers who have the public key 133a.
  • the specific information storage unit 122c encodes the transaction specific information with the secret key 123b and stores it in the file property or file name of the recorded data 123a.
  • the transaction identification information stored in the file property or file name of the target recorded data is decrypted and extracted by the public key 133a to identify the transaction registered on the blockchain. It is possible to limit the browsing of the alteration prevention data stored in the transaction to only the specific viewer having the above.
  • the recording device 102 has the secret key 123b and the determination device 103 has the public key 133a corresponding to the secret key 123b, but the invention is not limited to this.
  • the device 103 may have a private key and the recording device 102 may have a public key corresponding to the private key.
  • the tampering prevention data transmission unit 122b of the recording device 102 transmits the transaction storing the tampering prevention data encoded with the public key to the network of the block chain, and the tampering prevention data acquisition unit 132a of the determination device 103
  • the tamperproof data stored in the transaction on the blockchain may be decrypted with the private key to be acquired.
  • the specific information storage unit 122c of the recording device 102 encodes the transaction specific information with the public key and stores it in the file property or file name of the recorded data 123a, and the alteration prevention data acquisition unit 132a of the determination device 103
  • the transaction identification information stored in the file property or file name of the target recorded data may be decrypted and extracted with the private key.
  • FIG. 13 is a diagram showing a schematic configuration of the information processing system 201 according to the third embodiment.
  • the information processing system 201 includes a photographing device 202 and a determination device 203. At least a part of the imaging device 202 and the determination device 203 is realized by a computer.
  • the imaging device 202 and the determination device 203 are each configured to function as a node that constitutes a block chain network, and Peer to Peer ( P2P) connection.
  • the network between the nodes 202 to 206 may be a wired line or a wireless line, and the type and form of the line are not limited.
  • the node denoted by reference numeral 204 is a minor node, and unprocessed transactions are bundled to generate a new block (mining is performed). Further, at least one of the nodes 202 to 206 is a full node, and stores the entire block chain data.
  • the block chain network an existing block chain network such as the Ethereum network can be used.
  • the image capturing device 202 is, for example, a mobile terminal such as a smartphone or a tablet terminal with a camera function, and uploads image data captured by the camera function to the external server 209 via the Internet.
  • FIG. 14 is a diagram showing a schematic configuration of the photographing device 202.
  • the recording device 202 has a communication unit 221, a control unit 222, and a storage unit 223.
  • the units are connected to each other via a bus or a network so that they can communicate with each other.
  • the communication unit 221 is a communication interface between the imaging device 202 and the block chain network or the Internet.
  • the communication unit 221 transmits / receives information between the image capturing apparatus 202 and the other nodes 203 to 206 via the block chain network, and transmits / receives information between the image capturing apparatus 202 and the determination apparatus 203 via the Internet. To do.
  • the storage unit 223 is, for example, a magnetic data storage such as a hard disk.
  • the storage unit 223 stores various data handled by the control unit 222.
  • the storage unit 223 has image data 223a taken by the camera function and a secret key 223b.
  • the image data 223a may be either still image data or moving image data.
  • the secret key 223b can be created by, for example, the RSA cryptosystem.
  • control unit 222 includes an image data generation unit 222a, a modification prevention data transmission unit 222b, a specific information storage unit 222c, and an upload unit 222d.
  • image data generation unit 222a a modification prevention data transmission unit 222b
  • a specific information storage unit 222c a specific information storage unit 222c
  • an upload unit 222d a processor in the recording device 202 executing a predetermined program, or may be implemented by hardware.
  • the image data generation unit 222a generates image data 223a taken by the camera function.
  • the generated image data 223a is stored in the storage unit 223.
  • the image data generation unit 222a for the generated image data 223a, at least one auxiliary information of the shooting location, the shooting date and time, and the identification information of the imaging apparatus 202 (for example, license information or user ID of the photographer) or a hash of the auxiliary information.
  • a value hereinafter, also referred to as “information hash”
  • check information for example, access URL
  • the determination device 203 does not want to include the auxiliary information in the response result when the imaging device 202 or the external database or block chain is inquired via the check information, only the information hash is associated with the check information. It may be stored in the storage unit 223 or an external database or block chain.
  • the tampering prevention data transmission unit 222b has a hash value of the (unprocessed) image data 223a immediately after the image capturing (hereinafter, may be referred to as "data hash") at the timing when the image data 223a is stored as a file in the storage unit 223. ) Is generated, a transaction in which the alteration prevention data is stored is generated.
  • the tampering prevention data transmission unit 222b may store the auxiliary information or information hash of the image data 223a and the check information (access URL or the like) in the transaction as a part of the tampering prevention data.
  • the tampering prevention data transmission unit 222b may store the file size of the image data 223a in the transaction as a part of the tampering prevention data.
  • the alteration prevention data is stored in the transaction as information that cannot be rewritten (read only).
  • the tampering prevention data transmission unit 222b may encode the tampering prevention data with the secret key 223b and generate a transaction in which the encoded tampering prevention data is stored.
  • the alteration prevention data transmission unit 222b transmits the generated transaction to the block chain network via the communication unit 221.
  • the transaction sent to the blockchain network is registered in the blockchain by mining the block including the transaction in the minor node 204, and specific information for identifying the transaction on the blockchain (for example, Transaction hash value and address value) are added.
  • the specific information storage unit 222c acquires the specific information of the transaction registered in the block chain and stores it in the file property or file name that does not affect the hash value of the image data 223a stored in the storage unit 223 (for example, the file Add to the end of the name).
  • the specific information storage unit 222c may encode the transaction specific information with the secret key 223b, and store the encoded transaction specific information in the file property or file name of the image data 223a.
  • the specific information storage unit 222c generates a hash value (hereinafter, also referred to as a “specific hash”) from the property or file name of the file of the image data 223a in which the specific information of the transaction is stored, and the transaction on the block chain. May be stored in.
  • a hash value hereinafter, also referred to as a “specific hash”
  • the upload unit 222d uploads the image data 223a in which the transaction identification information is stored in the file property or file name to the determination device 203 via the Internet.
  • the uploaded image data 223a is stored in the storage unit 223 of the determination device 203.
  • FIG. 15 is a diagram showing a schematic configuration of the determination device 203.
  • the determination device 203 includes a communication unit 231, a control unit 232, and a storage unit 233.
  • the units are connected to each other via a bus or a network so that they can communicate with each other.
  • the communication unit 231 is a communication interface between the determination device 203 and the block chain network or the Internet.
  • the communication unit 231 transmits / receives information between the determination device 203 and the other nodes 202, 204 to 206 via the block chain network, and transmits information between the determination device 203 and the image capturing device 202 via the Internet. Send and receive.
  • the storage unit 233 is a magnetic data storage such as a hard disk.
  • the storage unit 233 stores various data handled by the control unit 232.
  • the storage unit 233 has a public key 233a corresponding to the secret key 223b stored in the image capturing apparatus 202, and image data 233b uploaded from the image capturing apparatus 202.
  • the public key 233a can be created based on the secret key 223b by, for example, the RSA cryptosystem.
  • control unit 232 has a tampering prevention data acquisition unit 232a and a tampering determination unit 232b.
  • Each of these units may be realized by the processor in the determination device 203 executing a predetermined program, or may be implemented by hardware.
  • the tampering prevention data acquisition unit 232a extracts and acquires the transaction specific information from the file property or file name of the image data 233b uploaded from the image capturing apparatus 202.
  • the alteration prevention data acquisition unit 232a determines that the encoded transaction The specific information is decrypted and acquired by the public key 233a stored in the storage unit 233.
  • the modification prevention data acquisition unit 232a identifies the transaction on the block chain based on the acquired transaction identification information. Then, the alteration prevention data stored in the transaction is acquired from the identified transaction.
  • the alteration prevention data acquisition unit 232a stores the encoded alteration prevention data in the storage unit 233. It is obtained by decrypting with the public key 233a.
  • the alteration determination unit 232b calculates and acquires a hash value (data hash) from the downloaded image data 233b.
  • the modification determination unit 232b determines the property or file hash value of the file of the uploaded image data 233b (specific (Hash) with the specific hash contained in the tamperproof data obtained from the transaction on the blockchain to determine if the file's properties or file name are correct, ie to identify the transaction extracted from it. Determine if the information was correct. More specifically, when the specific hash of the uploaded image data 233b matches the specific hash included in the alteration prevention data acquired from the transaction on the block chain, the alteration determination unit 232b determines that the uploaded image data is uploaded.
  • the alteration determination unit 232b determines that the properties or file name of the file of the uploaded image data 233b is incorrect (altered), that is, the transaction extracted therefrom. It is determined that the specific information was incorrect. Further, the alteration determination unit 232b compares the hash value (data hash) of the uploaded image data 233b with the data hash included in the alteration prevention data acquired from the transaction on the block chain, and uploads the image data. The presence or absence of modification of 233b is determined.
  • the alteration determination unit 232b determines that the uploaded image data 233b has been uploaded. It is determined that 233b has not been modified immediately after shooting. If the data hashes do not match, the alteration determination unit 232b determines that the uploaded image data 233b has been altered after shooting.
  • the alteration determination unit 232b uses the data hash of the uploaded image data 233b as a search key on the block chain.
  • the transaction is searched, and if there is no hit, it is determined that the uploaded image data 233b has been modified, and if there is a hit, the auxiliary information or information hash included in the modification prevention data acquired from the hit transaction.
  • the auxiliary information or the information hash of the image data acquired by inquiring of the imaging device 202 or an external database or block chain via the check information included in the modification prevention data acquired from the hit transaction, Whether or not the uploaded image data 233b has been modified is determined.
  • the transaction on the block chain is re-executed using the data hash of the uploaded image data 233b as a search key. You may search. If the inquiry cannot be made via the check information, the alteration determination unit 232b compares the file size included in the alteration prevention data acquired from the hit transaction with the file size of the uploaded image data 233b. If the file sizes are the same, it may be judged that the possibility of modification is low.
  • the alteration determination unit 232b determines that another transaction of the image data happens to hit, and re-executes the transaction on the block chain by using the data hash of the uploaded image data 233b as a search key.
  • the search may be performed, or it may be determined that the target recorded data has been modified.
  • the alteration determination section 232b may output the determination result to an output section (display or speaker) not shown.
  • an output section display or speaker
  • the alteration determination unit 232b displays the uploaded image data 233b on the display and a determination result that there is no alteration is obtained
  • the alteration determination unit 232b specially proves that the alteration has not been performed immediately after shooting.
  • a mark may be displayed so as to be superimposed on the image data.
  • the output unit that outputs the determination result may be provided in the computer itself that configures the determination device 203, or may be provided in another device (for example, a user's mobile terminal) communicatively connected to the determination device 203. May be.
  • FIG. 16 is a flow chart showing an example of a photographing method by the photographing device 202
  • FIGS. 17A and 17B are flow charts showing an example of a judging method by the judging device 203.
  • 18A is a conceptual diagram for explaining an example of a recording method by the image capturing apparatus 202
  • FIGS. 18B and 18C are conceptual diagrams for explaining an example of a determination method by the determination apparatus 203.
  • the image data generation unit 222a of the image capturing device 202 generates image data 223a captured by the camera function (step S211).
  • the generated image data 223a is stored in the storage unit 223.
  • the alteration prevention data transmission unit 222b stores the alteration prevention data including the data hash of the (raw) image data 223a immediately after the shooting.
  • a transaction is generated (step S212).
  • the alteration prevention data transmission unit 222b further includes, in addition to the data hash of the image data 223a, alteration information that further includes at least one of auxiliary information or information hash of the photographing location, photographing date, and identification information of the photographing apparatus 202, and check information.
  • a transaction that stores data may be generated.
  • the tampering prevention data transmission unit 222b may encode the tampering prevention data with the secret key 223b and generate a transaction in which the encoded tampering prevention data is stored.
  • the tampering prevention data transmission unit 222b transmits the generated transaction to the block chain network (step S213).
  • the transaction transmitted to the blockchain network is registered in the blockchain by mining a block including the transaction in the minor node 204, and specific information for identifying the transaction on the blockchain (for example, Transaction hash value and address value) are added.
  • the specific information storage unit 222c acquires the specific information added to the transaction (step S214).
  • the specific information storage unit 222c stores the acquired specific information of the transaction in the property or file name of the file that does not affect the hash value of the image data 223a stored in the storage unit 223 (step S215).
  • the specific information storage unit 222c may encode the transaction specific information with the secret key 223b, and store the encoded transaction specific information in the file property or file name of the image data 223a.
  • the specific information storage unit 222c generates a specific hash from the property or file name of the file of the image data 223a in which the transaction specific information is stored, and uses the generated specific hash as part of the alteration prevention data on the block chain. Stored in the transaction (step S216).
  • the upload unit 222d uploads the image data 223a in which the transaction identification information is stored in the file property or file name to the determination device 203 via the Internet (step S217).
  • the uploaded image data 223a is stored in the storage unit 233 of the determination device 203.
  • the alteration prevention data acquisition unit 232a extracts transaction specific information from the file property or file name of the image data 233b uploaded from the image capturing apparatus 202 (step S221).
  • the alteration prevention data acquisition unit 232a determines that the encoded transaction The specific information is decrypted and extracted with the public key 233a corresponding to the secret key 223b.
  • the modification prevention data acquisition unit 232a identifies the transaction on the block chain based on the extracted transaction identification information, and selects the transaction from the identified transaction.
  • the tampering prevention data stored in is acquired (step S223).
  • the alteration prevention data acquisition unit 232a corresponds the encoded alteration prevention data to the secret key 223b. It is obtained by decrypting with the public key 233a.
  • the alteration determination unit 232b generates a specific hash from the file property or file name of the uploaded image data 233b, and includes the generated specific hash in the alteration prevention data acquired from the transaction on the block chain. It is compared with the specific hash (step S224).
  • step S225 YES
  • the alteration determination unit 232b determines that the file property or file name of the uploaded image data 233b is correct, that is, the transaction specific information extracted from the property. Is determined to be correct. Then, the alteration determination unit 232b generates a data hash from the uploaded image data 233b, and compares the generated data hash with the data hash included in the alteration prevention data acquired from the transaction on the block chain (step S226). ).
  • step S227 If the data hashes match (step S227: YES), the alteration determination unit 232b determines that the uploaded image data 233b has not been altered immediately after shooting (step S228).
  • step S227 determines that the uploaded image data 233b has been altered after shooting (step S229).
  • step S22 when the transaction specific information cannot be extracted from the file property or file name of the uploaded image data 233b (step S222: NO), as shown in FIGS. 17B and 18C, the alteration determination unit 232b searches for a transaction on the block chain using the data hash of the uploaded image data 233b as a search key (step S231).
  • step S224 the alteration determination unit 232b has an incorrect property or filename of the file of the uploaded image data 233b (altered). That is, it is determined that the specific information of the transaction extracted from it is incorrect. Then, as shown in FIGS. 17B and 18C, the alteration determination unit 232b does not extract the transaction specific information from the file property or the file name (step S222: NO), similarly to the uploaded image data 233b. A transaction on the block chain is searched using the data hash as a search key (step S231).
  • the alteration determination unit 232b acquires the auxiliary information or information hash of the image data by inquiring of the image capturing device 202 or an external database or block chain.
  • Step S233 the tampering determination unit 232b acquires the tampering prevention data stored in the transaction from the hit transaction, and uses the check information (access URL) included in the acquired tampering prevention data to acquire the tampering device.
  • the check information access URL
  • the auxiliary information or information hash stored in the image capturing apparatus 202 or external database or block chain in association with the check information is acquired.
  • the alteration determination unit 232b uses the check information to extract the auxiliary information or the information hash included in the alteration prevention data acquired from the hit transaction from the image capturing apparatus 202 or an external database or block chain. Alternatively, it is compared with the information hash (step S234).
  • step S235 If the auxiliary information or the information hash match (step S235: YES), the alteration determination unit 232b determines that the transaction hit in the search of step S231 is correct, and the uploaded image data 233b is captured. Immediately after that, it is determined that the data has not been modified (step S228).
  • step S235 determines that the transaction hit in the search of step S231 is wrong (because it handles a large amount of data, it happens that It collides with the data hash of the transaction of) and returns to step S231 to redo the transaction search on the block chain.
  • step S232 determines that the uploaded image data 233b has been altered after shooting (step S229).
  • the alteration prevention data including the data hash of the (raw) image data 223a immediately after the shooting is stored at the timing when the shot image data 223a is saved as a file. Since the transaction is registered in the blockchain, it is virtually impossible to modify the tamperproof data afterwards. Further, since the transaction identification information is stored in the file property or file name of the image data 223a uploaded on the Internet, the image data 223a and the transaction identification information can be easily associated and managed. .. Then, by confirming that the data hash of the image data 233b uploaded on the Internet matches the data hash included in the alteration prevention data acquired from the transaction registered on the blockchain, the uploaded image is confirmed. It can be guaranteed that the data 233b has not been modified immediately after shooting.
  • a small-sized transaction in which modification prevention data including a data hash of the image data 223a is stored is a block chain. Therefore, even if the network bandwidth is narrow or the speed is slow, transactions can be continuously and stably transmitted. Further, even a block chain in which a fee according to the data size is generated when a transaction is registered can be used at low cost.
  • the transaction on the block chain is searched using the data hash of the uploaded image data 233b as a search key, If there is no hit, it is determined that the uploaded image data 233b has been modified, and if there is a hit, modification prevention data is acquired from the hit transaction, and auxiliary information or information stored in the modification protection data is acquired.
  • an operating system OS
  • the uploaded image data 233b is modified by comparing the auxiliary information or the information hash of the image data 233b. Can be guaranteed not to.
  • the alteration prevention data transmission unit 222b transmits the transaction storing the alteration prevention data encoded with the secret key 223b to the block chain network, and the alteration prevention data acquisition unit 232a
  • the tamperproof data of the tamperproof data registered on the blockchain can be used even when the public blockchain is used. Browsing can be restricted to only specific viewers who have the public key 233a.
  • the specific information storage unit 222c stores the transaction specific information in the property or file name of the file of the image data 223a that is uploaded by encoding with the private key 223b, and obtains the alteration prevention data.
  • the unit 232a decrypts the transaction identification information stored in the file property or file name of the uploaded image data 233b with the public key 233a and extracts the transaction identification information to identify the transaction registered on the blockchain. , It is possible to limit the browsing to the modification preventing data stored in the transaction only to the specific viewer having the public key 233a.
  • the image capturing device 202 has the secret key 223b and the determining device 203 has the public key 233a corresponding to the secret key 223b.
  • the present invention is not limited to this.
  • the device 203 may have a private key, and the imaging device 202 may have a public key corresponding to the private key.
  • the alteration prevention data transmission unit 222b of the image capturing apparatus 202 transmits the transaction storing the alteration prevention data encoded with the public key to the block chain network, and the alteration prevention data acquisition unit 232a of the determination apparatus 203
  • the tamperproof data stored in the transaction on the blockchain may be decrypted with the private key to be acquired.
  • the specific information storage unit 222c of the image capturing device 202 stores the transaction specific information in the file property or file name of the image data 223a that is uploaded by encoding the public key, and the alteration prevention data acquisition unit of the determination device 203 is stored.
  • 232a may decrypt the specific information of the transaction stored in the property or file name of the file of the downloaded image data 233b with the private key and extract it.
  • FIG. 19 is a diagram showing a schematic configuration of the information processing system 301 according to the fourth embodiment.
  • the information processing system 301 includes a file generation / editing device 302 and a determination device 303. At least a part of the file generation / editing apparatus 302 and the determination apparatus 303 is realized by a computer.
  • each of the file generation / editing apparatus 302 and the determination apparatus 303 is configured to function as a node that constitutes a block chain network, and peers to a plurality of nodes 302 to 306 other than itself. It is connected by the Peer (P2P) system.
  • the network between the nodes 302 to 306 may be a wired line or a wireless line, and the type and form of the line does not matter.
  • the node indicated by reference numeral 304 is a minor node, and unprocessed transactions are bundled to generate a new block (mining is performed). Further, at least one of the nodes 302 to 306 is a full node and stores the entire block chain data.
  • the block chain network an existing block chain network such as the Ethereum network can be used.
  • FIG. 20 is a diagram showing a schematic configuration of the file generation / editing apparatus 302.
  • the file generation / editing apparatus 302 includes a communication unit 321, a control unit 322, and a storage unit 323.
  • the units are connected to each other via a bus or a network so that they can communicate with each other.
  • the communication unit 321 is a communication interface between the file generation / editing apparatus 302 and the block chain network.
  • the communication unit 321 transmits and receives information between the file generation / editing apparatus 302 and the other nodes 303 to 306 via the block chain network.
  • the storage unit 323 is a magnetic data storage such as a hard disk.
  • the storage unit 323 stores various data handled by the control unit 322.
  • the storage unit 323 has a file 323a generated or edited by a file generation / editing unit 322a, which will be described later, and a secret key 323b.
  • the type of the file 323a is not particularly limited, and may be, for example, a document file, a spreadsheet file, a music file, an image file, a web page, or an electronic mail.
  • control unit 322 includes a file generation / editing unit 322a, a tampering prevention data transmission unit 322b, and a specific information storage unit 322c.
  • Each of these units may be implemented by a processor in the file generation / editing apparatus 302 executing a predetermined program, or may be implemented by hardware.
  • the file generation / editing unit 322a generates (newly creates) a new file or edits an existing file.
  • "editing” includes data compression / decompression (including bit rate conversion and resolution change) and file format (extension) conversion.
  • the generated or edited file 323a is stored in the storage unit 323.
  • the file creation / editing unit 322a for the created or edited file 323a, the creation date / time or the edit date / time of the file 323a, the auxiliary information of at least one of the identification information (for example, license information) of the file creation / editing device 302, or a hash of the auxiliary information.
  • a value hereinafter, also referred to as “information hash”
  • check information for example, access URL
  • Is generated, and the auxiliary information or the information hash and the check information are associated with each other, and may be stored in the storage unit 323 or an external database or block chain.
  • the determination device 303 does not want to include auxiliary information in the response result when the file generation / editing device 302 or the external database or block chain is inquired via the check information, only the information hash is associated with the check information. In this state, it may be stored in the storage unit 323 or an external database or block chain.
  • the tampering prevention data transmitting unit 322b receives the tampering prevention data including the hash value (hereinafter, may be referred to as “data hash”) of the file 323a immediately after being generated or edited at the timing when the file 323a is stored in the storage unit 323. Create a stored transaction.
  • the tamper proof data transmission unit 322b may store the auxiliary information or information hash about the file 323a and the check information (access URL etc.) in the transaction as a part of the tamper proof data. Generation date / time or edit date / time, file generation / editing device.
  • the tampering prevention data transmission unit 322b may store the file size of the file 323a in the transaction as a part of the tampering prevention data.
  • the alteration prevention data is stored in the transaction as information that cannot be rewritten (read only).
  • the tampering prevention data transmission unit 322b may encode the tampering prevention data with the secret key 323b and generate a transaction in which the encoded tampering prevention data is stored.
  • the modification prevention data transmission unit 322b transmits the generated transaction to the block chain network via the communication unit 321.
  • the transaction transmitted to the blockchain network is registered in the blockchain by mining the block including the transaction in the minor node 304, and specific information for identifying the transaction on the blockchain (for example, Transaction hash value and address value) are added.
  • the specific information storage unit 322c acquires the specific information of the transaction registered in the block chain and stores it in a property or file name that does not affect the hash value of the file 323a stored in the storage unit 323 (for example, at the end of the file name). Added to).
  • the specific information storage unit 322c may encode the transaction specific information with the secret key 323b, and store the encoded transaction specific information in the property or file name of the file 323a.
  • the specific information storage unit 322c generates a hash value (hereinafter, also referred to as “specific hash”) from the property or file name of the file 323a in which the specific information of the transaction is stored, and stores it in the transaction on the block chain. You may.
  • a hash value hereinafter, also referred to as “specific hash”
  • FIG. 21 is a diagram showing a schematic configuration of the determination device 303.
  • the determination device 303 includes a communication unit 331, a control unit 332, and a storage unit 333.
  • the units are connected to each other via a bus or a network so that they can communicate with each other.
  • the communication unit 331 is a communication interface between the determination device 303 and the block chain network.
  • the communication unit 331 transmits / receives information between the determination device 303 and the other nodes 302, 304 to 306 via the block chain network.
  • the storage unit 333 is magnetic data storage such as a hard disk.
  • the storage unit 333 stores various data handled by the control unit 332.
  • the storage unit 333 has a public key 333a corresponding to the private key 323b stored in the file generation / editing apparatus 302.
  • the public key 333a can be created based on the secret key 323b by, for example, the RSA cryptosystem.
  • control unit 332 includes a modification prevention data acquisition unit 332a and a modification determination unit 332b. Each of these units may be realized by the processor in the determination device 303 executing a predetermined program, or may be implemented by hardware.
  • the modification prevention data acquisition unit 332a acquires the transaction specific information extracted from the property or file name of the target file.
  • the tampering prevention data acquisition unit 332a may acquire, from the other device, the transaction identification information extracted by the other device (for example, the file generation / editing device 302) from the property or file name of the target file.
  • the target file may be acquired from another device (for example, the file generation / editing device 302), and the transaction specific information may be extracted by itself from the property or file name of the acquired file.
  • the alteration prevention data acquisition unit 332a changes the encoded transaction identification information to The public key 333a stored in the storage unit 333 is decrypted and acquired.
  • the modification prevention data acquisition unit 332a identifies the transaction on the block chain based on the acquired transaction identification information and is identified.
  • the modification prevention data stored in the transaction is acquired from the transaction.
  • the alteration prevention data acquisition unit 332a stores the encoded alteration prevention data in the storage unit 333.
  • the public key 333a is decrypted and acquired.
  • the modification determination unit 332b acquires the hash value of the target file.
  • the modification determination unit 332b may obtain the hash value calculated by the other device (for example, the file generation / editing device 302) from the target file from the other device, or may change the target file to another file.
  • the hash value may be acquired from a device (for example, the file generation / editing device 302) and the hash value may be calculated by itself from the acquired file.
  • the alteration determination unit 332b determines the hash value (specific hash) of the property or file name of the target file on the block chain. Compare with the specific hash included in the tamperproof data obtained from the transaction to determine whether the property or file name of the file is correct, that is, whether the specific information of the transaction extracted from it is correct To do. More specifically, if the specific hash of the target file matches the specific hash included in the modification prevention data acquired from the transaction on the blockchain, the modification determination unit 332b determines whether the property of the target file or It is determined that the file name is correct, that is, the transaction identification information extracted from the file name is correct.
  • the alteration determination unit 332b determines that the property or file name of the target file is incorrect (altered), that is, the transaction specific information extracted therefrom is correct. It is determined that there was not. Further, the alteration determination unit 332b compares the hash value (data hash) of the target file with the data hash included in the alteration prevention data acquired from the transaction on the block chain to determine whether the target file has been altered. Determine the presence or absence. More specifically, when the data hash of the target file matches the data hash included in the modification prevention data acquired from the transaction on the block chain, the modification determination unit 332b determines that the target file has been modified. Determine not. If the data hashes do not match, the alteration determination unit 332b determines that the target file has been altered.
  • the modification determination unit 332b searches for a transaction on the block chain using the data hash of the target file as a search key and hits. If not, it is determined that the target file has been modified, and if there is a hit, the auxiliary information or information hash included in the modification prevention data acquired from the hit transaction and the information acquired from the hit transaction. By comparing with the auxiliary information or information hash obtained by inquiring the file generation / editing apparatus 302 or an external database or block chain via the check information included in the alteration prevention data, the presence or absence of alteration of the target file is checked. judge.
  • the alteration determination unit 332b compares the file size included in the alteration prevention data acquired from the hit transaction with the file size of the target file, If the sizes are the same, it may be judged that the possibility of modification is low.
  • the modification determining unit 332b determines that the transaction of another file has hit by chance, and re-searches the transaction on the block chain using the data hash of the target file as the search key. Alternatively, it may be determined that the target file has been modified.
  • the alteration determination unit 332b may output the determination result to an output unit (display or speaker) not shown.
  • the output unit that outputs the determination result may be provided in the computer itself that constitutes the determination device 303, or may be provided in another device (for example, a user's mobile terminal) communicably connected to the determination device 303. May be.
  • FIG. 22 is a flowchart showing an example of the file creating / editing method by the file creating / editing apparatus 302
  • FIGS. 23A and 23B are flowcharts showing an example of the judging method by the judging apparatus 303.
  • 24A is a conceptual diagram for explaining an example of the file generation / editing method by the file generation / editing apparatus 302
  • FIGS. 24B and 24C are conceptual diagrams for explaining an example of the determination method by the determination apparatus 303. .
  • the file generation / editing unit 322a of the file generation / editing apparatus 302 generates (newly creates) a new file or edits an existing file (step S311).
  • the generated or edited file 323a is stored in the storage unit 323.
  • the modification prevention data transmission unit 322b executes the transaction in which the modification protection data including the data hash of the file 323a immediately after generation or editing is stored. It is generated (step S312).
  • the tampering prevention data transmission unit 322b generates at least one auxiliary information or information hash or check information of the creation date or the edit date of the file 323a and the identification information of the file creating / editing device 302. You may generate the transaction in which the alteration protection data which further contains is stored.
  • the tampering prevention data transmission unit 322b may encode the tampering prevention data with the secret key 323b and generate a transaction in which the encoded tampering prevention data is stored.
  • the tampering prevention data transmission unit 322b transmits the generated transaction to the block chain network (step S313).
  • the transaction transmitted to the blockchain network is registered in the blockchain by mining the block including the transaction in the minor node 304, and specific information for identifying the transaction on the blockchain (for example, Transaction hash value and address value) are added.
  • the specific information storage unit 322c acquires the specific information added to the transaction (step S314).
  • the specific information storage unit 322c stores the acquired transaction specific information in a property or file name that does not affect the hash value of the file 323a stored in the storage unit 323 (step S315).
  • the specific information storage unit 322c may encode the transaction specific information with the secret key 323b and store the encoded transaction specific information in the file property or file name of the file 323a.
  • the specific information storage unit 322c generates a specific hash from the property or file name of the file 323a in which the transaction specific information is stored, and converts the generated specific hash into a transaction on the block chain as a part of the alteration prevention data. It is stored (step S316).
  • the modification prevention data acquisition unit 332a extracts transaction specific information from the property or file name of the target file (step S321).
  • the alteration prevention data acquisition unit 332a changes the encoded transaction identification information to It is decrypted and extracted with the public key 333a corresponding to the secret key 323b.
  • step S322 If the transaction identification information can be extracted (step S322: YES), the alteration prevention data acquisition unit 332a identifies the transaction on the block chain based on the extracted transaction identification information, and selects the transaction from the identified transaction. The alteration prevention data stored in is acquired (step S323).
  • the alteration prevention data acquisition unit 332a corresponds the encoded alteration prevention data to the secret key 323b. It is obtained by decrypting with the public key 333a.
  • the alteration determination unit 332b generates a specific hash from the property or file name of the target file, and compares the generated specific hash with the specific hash included in the alteration prevention data acquired from the transaction on the block chain. Yes (step S324).
  • step S325 YES
  • the alteration determination unit 332b determines that the property or file name of the target file is correct, that is, the transaction specific information extracted from that is correct. To do. Then, the alteration determination unit 332b compares the data hash of the target file with the data hash included in the alteration prevention data acquired from the transaction on the block chain (step S326).
  • step S327 If the data hashes match (step S327: YES), the alteration determination unit 332b determines that the target file has not been altered immediately after being generated or edited (step S328).
  • step S327: NO the alteration determination unit 332b determines that the target file has been altered after being generated or edited (step S329).
  • step S322 if the transaction specific information cannot be extracted from the property or file name of the target file (step S322: NO), the modification determination unit 332b determines that the target The transaction on the block chain is searched using the data hash of the file as a search key (step S331).
  • step S324 If the specific hashes do not match in step S324 (step S325: NO), the alteration determination unit 332b determines that the property or file name of the target file is incorrect (altered), That is, it is determined that the transaction identification information extracted from it is incorrect. Then, as shown in FIG. 23B and FIG. 24C, the modification determination unit 332b does not extract the transaction specific information from the file property or file name (step S322: NO), similarly to the data hash of the target file. Is used as a search key to search for transactions on the block chain (step S331).
  • step S332 When the transaction hits in the search in step S331 (step S332: YES), the alteration determination unit 332b acquires the auxiliary information or information hash of the file by inquiring of the file generation / editing device 322a or an external database or block chain. Yes (step S333). Specifically, for example, the alteration determination unit 332b acquires the alteration prevention data stored in the transaction from the hit transaction, and generates a file via the check information (access URL) included in the obtained alteration prevention data. By accessing the editing device 302 or the external database or block chain, the auxiliary information or the information hash stored in the file generating / editing device 302 or the external database or block chain in association with the check information is acquired.
  • the alteration determination unit 332b obtains the auxiliary information or the information hash included in the alteration prevention data obtained from the hit transaction from the file creation / editing apparatus 302 or an external database or block chain via the check information. It is compared with the auxiliary information or the information hash (step S334).
  • step S335 YES
  • the alteration determination unit 332b determines that the transaction hit in the search of step S331 is correct, and the target file is created or edited. Immediately after that, it is determined that the data has not been modified (step S328).
  • step S335 NO
  • the modification determination unit 332b determines that the transaction hit in the search in step S331 is incorrect (because it handles a large amount of data, it happens that It collides with the data hash of the transaction No.)), the process returns to step S331, and the transaction on the block chain is searched again.
  • step S332 determines that the target file has been modified after being created or edited (step S329).
  • the transaction in which the modification prevention data including the data hash of the file 323a immediately after being generated or edited is stored is the blockchain. Since it is registered in, it is virtually impossible to modify the alteration prevention data afterwards. Further, since the transaction identification information is stored in the property or file name of the file 323a, the file 323a and the transaction identification information can be easily associated and managed. Then, by confirming that the hash value of the target file matches the data hash included in the modification prevention data acquired from the transaction registered on the blockchain, the target file has not been modified. Can be guaranteed.
  • the transaction on the block chain is searched using the data hash of the target file as a search key, and no hit occurs.
  • the modification protection data is acquired from the hit transaction, and the auxiliary information or information hash stored in the modification protection data and In order to determine the presence or absence of alteration by comparing with the auxiliary information or information hash obtained through the check information included in the alteration prevention data, for example, when copying the file, the operation system (OS), etc.
  • OS operation system
  • the alteration prevention data transmission unit 322b transmits the transaction storing the alteration prevention data encoded by the secret key 323b to the block chain network, and the alteration prevention data acquisition unit 332a
  • the tamperproof data of the tamperproof data registered on the blockchain can be used even when the public blockchain is used. Browsing can be limited to specific viewers with the public key 333a.
  • the specific information storage unit 322c encodes the transaction specific information with the secret key 323b and stores it in the property or file name of the file 323a, and the alteration prevention data acquisition unit 332a targets it.
  • the specific information of the transaction stored in the property of the file or the file name to be decrypted is extracted by decrypting with the public key 333a, thereby identifying the transaction registered on the block chain to the specific viewer having the public key 333a. It is possible to limit the access to the modification prevention data stored in the transaction to only the specific viewer.
  • the file generation / editing apparatus 302 has the private key 323b and the determination apparatus 303 has the public key 333a corresponding to the private key 323b in the above-described embodiment, the invention is not limited to this.
  • the determination device 303 may have a private key, and the file generation / editing device 302 may have a public key corresponding to the private key.
  • the tampering prevention data transmission unit 322b of the file generation / editing apparatus 302 transmits the transaction storing the tampering prevention data encoded with the public key to the block chain network, and the tampering prevention data acquisition unit 332a of the determination apparatus 303.
  • the tampering prevention data stored in the transaction on the block chain may be decrypted and acquired with the private key.
  • the specific information storage unit 322c of the file generation / editing apparatus 302 encodes the transaction specific information with the public key and stores it in the property or file name of the file 323a.
  • the transaction specific information stored in the property of the file or the file name may be decrypted and extracted with the private key.
  • the recording device and the determination device may be configured by a computer system.
  • a program for realizing the recording device and the determination device in the computer system and the program are non-transitory.
  • the recorded computer-readable recording medium is also covered by the present protection.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Library & Information Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

La présente invention concerne un dispositif d'enregistrement d'image comprenant : une unité de transmission qui transmet une transaction dans laquelle une valeur de hachage de données d'image enregistrées est mémorisée à un réseau de chaîne de blocs au moment où les données d'image enregistrées sont mémorisées en tant que fichier ; et une unité de mémoire qui mémorise, dans une propriété de fichier ou un nom de fichier, des informations spécifiques concernant la transaction, telles qu'enregistrées sur la chaîne de blocs, la propriété de fichier et le nom de fichier n'affectant pas la valeur de hachage des données d'image enregistrées. Un dispositif de détermination comprend : une unité d'acquisition qui identifie la transaction sur la chaîne de blocs en fonction des informations spécifiques, telles qu'extraites de la propriété de fichier ou du nom de fichier, et acquiert la valeur de hachage à partir de la transaction identifiée ; et une unité de détermination qui compare une valeur de hachage des données d'image enregistrées à la valeur de hachage acquise à partir de la transaction sur la chaîne de blocs afin de déterminer si les données d'image enregistrées ont été modifiées ou non.
PCT/JP2019/017547 2018-11-12 2019-04-25 Système de traitement d'informations WO2020100326A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2018-212320 2018-11-12
JP2018212320A JP6533924B1 (ja) 2018-11-12 2018-11-12 情報処理システム

Publications (1)

Publication Number Publication Date
WO2020100326A1 true WO2020100326A1 (fr) 2020-05-22

Family

ID=67023710

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2019/017547 WO2020100326A1 (fr) 2018-11-12 2019-04-25 Système de traitement d'informations

Country Status (2)

Country Link
JP (1) JP6533924B1 (fr)
WO (1) WO2020100326A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115002141A (zh) * 2022-06-06 2022-09-02 上海加密原生科技有限公司 基于区块链的文件存储方法及装置
WO2023084814A1 (fr) * 2021-11-10 2023-05-19 日本電信電話株式会社 Système de communication, serveur, procédé de communication et programme de communication

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7418084B2 (ja) 2019-11-19 2024-01-19 キヤノン株式会社 撮像装置及び画像選別装置、並びに撮像システムの制御方法
JP2022072629A (ja) * 2020-10-30 2022-05-17 株式会社デンソー データ検索システム、データ検索用データ構造、およびデータ検索方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007533182A (ja) * 2004-04-08 2007-11-15 インターナショナル・ビジネス・マシーンズ・コーポレーション 署名付きファイルに証明書をリンクする方法およびシステム
JP2017098806A (ja) * 2015-11-26 2017-06-01 株式会社bitFlyer 電子データの存在証明プログラムおよび存在証明サーバ
JP2017204706A (ja) * 2016-05-10 2017-11-16 日本電信電話株式会社 コンテンツ流通システム、コンテンツ流通方法、コンテンツ生成装置及びコンテンツ生成プログラム
US20170331635A1 (en) * 2016-05-10 2017-11-16 Acronis International Gmbh System and method for file time-stamping using a blockchain network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6648555B2 (ja) * 2016-02-29 2020-02-14 富士ゼロックス株式会社 情報処理装置及びプログラム
FR3061792B1 (fr) * 2017-01-10 2020-11-06 Quantificare Procede et dispositif pour horodater des images numeriques

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007533182A (ja) * 2004-04-08 2007-11-15 インターナショナル・ビジネス・マシーンズ・コーポレーション 署名付きファイルに証明書をリンクする方法およびシステム
JP2017098806A (ja) * 2015-11-26 2017-06-01 株式会社bitFlyer 電子データの存在証明プログラムおよび存在証明サーバ
JP2017204706A (ja) * 2016-05-10 2017-11-16 日本電信電話株式会社 コンテンツ流通システム、コンテンツ流通方法、コンテンツ生成装置及びコンテンツ生成プログラム
US20170331635A1 (en) * 2016-05-10 2017-11-16 Acronis International Gmbh System and method for file time-stamping using a blockchain network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023084814A1 (fr) * 2021-11-10 2023-05-19 日本電信電話株式会社 Système de communication, serveur, procédé de communication et programme de communication
CN115002141A (zh) * 2022-06-06 2022-09-02 上海加密原生科技有限公司 基于区块链的文件存储方法及装置
CN115002141B (zh) * 2022-06-06 2024-04-12 上海加密原生科技有限公司 基于区块链的文件存储方法及装置

Also Published As

Publication number Publication date
JP6533924B1 (ja) 2019-06-26
JP2020080004A (ja) 2020-05-28

Similar Documents

Publication Publication Date Title
WO2020100326A1 (fr) Système de traitement d'informations
US11968199B2 (en) Methods for authenticating photographic image data
JP4785168B2 (ja) メタデータの認証および媒体信号の透かしへのメタデータの埋込
US20200311121A1 (en) Identifying Media Components
KR100865249B1 (ko) 파일 공유에 임베딩된 데이터의 사용
US10334217B2 (en) Video sequence assembly
US9848216B2 (en) Security and/or tracing video media-content
GB2533624A (en) Methods, devices, and computer programs for improving coding of media presentation description data
JP2009517971A (ja) ワークフローメタデータのシステムおよび方法
CN101273329A (zh) 有效描述资源之间的关系
EP3149652A1 (fr) Prise d'empreinte et mise en correspondance de contenus d'un fichier multimédia
US20200278948A1 (en) Method, apparatus and system for managing electronic fingerprint of electronic file
US7996489B2 (en) Method and apparatus for allowing a portable device to provide rich site summary service
US20080254777A1 (en) Systems and methods for facilitating automatic generation of metadata about data that is collected by a mobile device
WO2018212278A1 (fr) Appareil d'enregistrement vidéo et système de vérification d'enregistrement vidéo, et procédé d'enregistrement vidéo et procédé de vérification vidéo
US20130110945A1 (en) Information processing apparatus and method therefor
JP2007300456A (ja) 映像モニタリングシステム及びそのインデクス生成方法
EP3785444B1 (fr) Insertion côté serveur de fragments de média
KR20190091214A (ko) 동영상으로부터 장소 정보를 추출하는 장치 및 방법
JP6520254B2 (ja) 動画データ再生方法及びプログラム
US20170150195A1 (en) Method and system for identifying and tracking online videos
JP7260093B2 (ja) 情報処理システム
WO2023248858A1 (fr) Dispositif de génération de contenu et dispositif de gestion de contenu qui enregistrent des informations dans une chaîne de blocs à l'aide de données audio dans un fichier vidéo, et procédé et programme de commande associés
KR101960530B1 (ko) 영상과 센서 데이터 병합 저장 및 재생 시스템
JP2024026021A (ja) 映像取得装置、映像処理方法及びプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19885895

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19885895

Country of ref document: EP

Kind code of ref document: A1