WO2021159617A1 - 基于区块链的信息处理方法及平台、电子设备 - Google Patents

基于区块链的信息处理方法及平台、电子设备 Download PDF

Info

Publication number
WO2021159617A1
WO2021159617A1 PCT/CN2020/088012 CN2020088012W WO2021159617A1 WO 2021159617 A1 WO2021159617 A1 WO 2021159617A1 CN 2020088012 W CN2020088012 W CN 2020088012W WO 2021159617 A1 WO2021159617 A1 WO 2021159617A1
Authority
WO
WIPO (PCT)
Prior art keywords
hash value
picture
information
preset
sub
Prior art date
Application number
PCT/CN2020/088012
Other languages
English (en)
French (fr)
Inventor
林凡
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2021159617A1 publication Critical patent/WO2021159617A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Definitions

  • This application relates to the computer field, in particular to a blockchain-based information processing method and platform, electronic equipment, and computer-readable storage media.
  • Electronic service refers to the use of the Internet to transmit documents to the notified party.
  • the documents in the electronic service include documents with legal effects, such as litigation documents, legal documents, etc.
  • Traditional electronic delivery uses only the sending terminal to send the file and record the sending time; the receiving terminal to receive the file and record the receiving time.
  • This delivery method has too much communication pressure on the sending terminal (when n files need to be sent separately, n communication connections need to be established with different terminals, so there are a large number of files that need to be sent at the same time during the deadline. In this case, the communication pressure of the sending terminal will be greatly increased), when the file is wrong, it is difficult to trace back, and the sending time and receiving time are easily tampered with.
  • the main purpose of this application is to provide a blockchain-based information processing method and platform, electronic equipment, and computer-readable storage medium, which are designed to reduce the communication pressure on the message sending end, make it easier to trace file errors, and improve information availability. Reliability.
  • this application proposes an information processing method based on a block chain, in which a first hash value is pre-stored in the block chain, and the first hash value is hashed for specified information
  • the hash value obtained includes:
  • a preset identity verification method use the identity picture to verify the identity of the message sender, and determine whether the identity verification of the message sender passes;
  • the specified information is hashed to obtain a second hash value, the second hash value is stored in the blockchain, and the Obtaining the first hash value from the blockchain;
  • the first hash value is the same as the second hash value, dividing the specified information into a plurality of sub-information according to the plurality of division points;
  • the multiple pieces of sub-information are correspondingly sent to multiple user terminals.
  • This application provides a blockchain-based processing method, which is applied to a user terminal, and the user terminal receives corresponding sub-information sent by any one of the above-mentioned blockchain-based information processing methods, including:
  • a hash value acquisition request is sent to the corresponding blockchain node in the blockchain, and the hash value acquisition request is used to request to acquire the first hash value, the second hash value, and the second hash value.
  • a hash value and a reference sub-hash value wherein the reference sub-hash value refers to a sub-hash value corresponding to the user terminal among the plurality of sub-hash values;
  • first hash value and the second hash value are the same, perform a hash calculation on the corresponding sub-information according to a preset hash algorithm, so as to obtain a designated sub-hash value;
  • This application provides an information processing platform based on a block chain, in which a first hash value is pre-stored, and the first hash value is a hash value obtained by performing a hash calculation on specified information ,include:
  • a message receiving unit configured to receive a message sent by a message sender, the message having an identity picture and designated information, and the designated information is marked with multiple division points;
  • a message parsing unit configured to parse the message according to the format of the message, so as to obtain the identity picture and the specified information
  • An identity verification unit configured to use the identity picture to verify the identity of the message sender according to a preset identity verification method, and determine whether the identity verification of the message sender passes;
  • the second hash value storage unit is configured to perform a hash calculation on the designated information if the identity verification of the message sender is passed, so as to obtain a second hash value, and store the second hash value in The block chain, and obtaining the first hash value from the block chain;
  • a second hash value judging unit configured to judge whether the first hash value is the same as the second hash value
  • a designated information dividing unit configured to divide the designated information into a plurality of sub-information according to the plurality of division points if the first hash value is the same as the second hash value;
  • a sub-hash value obtaining unit configured to perform a hash calculation on the plurality of sub-information respectively to obtain a plurality of sub-hash values, and store the plurality of sub-hash values in the blockchain;
  • the sub-information sending unit is configured to correspondingly send the multiple sub-information to multiple user terminals according to the preset correspondence between the sub-information and the user terminal.
  • the present application provides an electronic device including a memory and a processor, the memory stores a computer program, and the processor implements the steps of any one of the above-mentioned methods when the computer program is executed by the processor.
  • the present application provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of any one of the methods described above are implemented.
  • This application reduces the communication pressure on the message sending end, makes it easy to trace file errors, and improves the credibility of information.
  • Fig. 1 is a schematic flow chart of a blockchain-based information processing method according to an embodiment of the application
  • FIG. 2 is a schematic block diagram of the structure of a blockchain-based information processing platform according to an embodiment of the application
  • FIG. 3 is a schematic block diagram of the structure of an electronic device according to an embodiment of the application.
  • an embodiment of the present application provides an information processing method based on a blockchain.
  • a first hash value is pre-stored in the blockchain, and the first hash value is hashed for specified information
  • the hash value obtained includes:
  • the blockchain-based information processing method of this application adopts a method of setting a special second terminal between the message sender (that is, the terminal that sends information) and the user terminal (that is, the terminal that receives information) to relieve the message
  • the communication pressure of the sender (the message sender only needs to focus on the generation of files or information, and does not need to pay attention to communication issues, while the second terminal only needs to consider disassembling and sending information, thereby achieving the technical effect of pressure sharing).
  • the message sending end stores the first hash value in the blockchain
  • the second terminal stores the second hash value and sub-hash values in the blockchain.
  • the blockchain Due to the fact that the blockchain is difficult to tamper with , To ensure that when there is an error in the file, the error can be traced back in time and accurately. And the corresponding hash value is stored in the blockchain, where the storage time is the corresponding date (for example, the storage time of the first hash value is the sending date). Furthermore, the use of special identity verification methods and blockchain information verification methods improves information security.
  • the message sent by the message sender is received, the message has an identity picture and designated information, and the designated information is marked with multiple division points; and the message sender has The first hash value is stored in a preset blockchain, and the first hash value refers to a hash value obtained by performing a hash calculation on the designated information in the message sending end.
  • the message is the carrier of communication exchange and transmission in the network, and is used to carry the identity picture and designated information.
  • the designated information may be any feasible information, for example, a document composed of multiple notices of litigation that need to be issued at the same time.
  • the identity picture is used to verify identity.
  • the designated information is formed by combining multiple sub-information, and the combining point is marked as the dividing point.
  • the message sending end does not need to consider how to send specific sub-information, and only needs to send the designated information to the second terminal.
  • the present application also guarantees the security of the information through the way that the message sender has stored the first hash value in the preset blockchain.
  • the message is parsed according to the format of the message to obtain the identity picture and the designated information.
  • the message can be a message of any structure, for example, including a message header, a message body, and so on. Therefore, according to the format of the message, the location of the identity picture and the designated information can be known, so that the identity picture and the designated information can be extracted.
  • the identity picture is used to verify the identity of the message sender, and it is determined whether the identity verification of the message sender is passed.
  • the identity verification method adopted in this application is: cutting off the identity picture to cut off a preset circular area in the identity picture, thereby obtaining a round hole picture; introducing all the images into a preset virtual three-dimensional space The circular hole picture, and a preset cylinder is set in the circular hole, wherein the radius of the cylinder is equal to the radius of the circular area, the virtual three-dimensional space conforms to the principle of light propagation, and the surface of the cylinder is smooth , The surface of the cylinder is used to map the image of the circular hole picture; according to a preset positioning method, a designated positioning position outside the cylinder is acquired, and an image of the cylinder is collected at the designated positioning position , So as to obtain a mapping picture mapped with a partial pattern of the circular hole picture; calculate the similarity value between the
  • the message sender guarantees that the stored identity picture is not stolen, it can ensure that the identity of the message sender is not stolen (because the second terminal only saves the mapping picture, and the mapping picture cannot be used as the basis for identity verification, so the second There is no possibility of information leakage at the terminal).
  • step S4 if the identity verification of the message sender is passed, the designated information is hashed to obtain a second hash value, and the second hash value is stored in the area.
  • Block chain and obtain the first hash value from the block chain.
  • the hash algorithm used in the hash calculation is the same as the hash algorithm used by the message sending end to ensure that the hash values are comparable.
  • the step of obtaining the first hash value from the blockchain does not precede the step of storing the second hash value in the blockchain to avoid the possibility of stealing the first hash value .
  • the hash value is smaller than the hashed data itself, storing the hash value in the blockchain instead of the data itself helps to keep the information confidential on the one hand, and on the other hand, it helps to reduce the amount of the blockchain. Store pressure.
  • step S5 it is determined whether the first hash value and the second hash value are the same. Since hash calculation is a one-way algorithm to achieve compression mapping, as long as the calculated data is slightly different, the calculated hash value will be significantly different. Therefore, only the same data can the calculated hash value be the same. Accordingly, by judging whether the first hash value is the same as the second hash value, it is determined whether there is a problem in the electronic delivery process.
  • the designated information is divided into a plurality of sub-information according to the plurality of division points. Since the specified information is a collection of multiple sub-information, and different sub-information will be sent to different terminals, it is necessary to divide the specified information into multiple sub-information according to the multiple division points.
  • the first hash value is the same as the second hash value, which indicates that there is no problem in the current step of electronic delivery. If the first hash value is different from the second hash value, it indicates an error, and the error lies in the message sender or the process of sending the message by the message sender, so that the cause can be quickly traced back.
  • the message sending end is, for example, a terminal corresponding to a court
  • the message is, for example, an HTTP protocol message
  • the message is, for example, a message that records a litigation document, which serves as a carrier for electronically served litigation documents.
  • the terminal can be any feasible terminal (it can be a terminal owned by the court for communication, or a terminal owned by a third party, preferably a terminal owned by a third party).
  • the communication pressure of the message sender (the message sender only needs to focus on the generation of files or information, and does not need to pay attention to communication issues, while the second terminal only needs to consider splitting and sending information, thereby achieving the technical effect of pressure sharing).
  • the message sending end stores the first hash value in the blockchain
  • the second terminal stores the second hash value and sub-hash value in the blockchain. Due to the fact that the blockchain is difficult to tamper with , To ensure that when there is an error in the file, the error can be traced back in time and accurately.
  • the corresponding hash value is stored in the blockchain, where the storage time is the corresponding date (for example, the storage time of the first hash value is the sending date).
  • the multiple sub-information is hashed to obtain multiple sub-hash values, and the multiple sub-hash values are stored in the blockchain.
  • the sub-hash value represents sub-information. Storing the multiple sub-hash values in the blockchain facilitates error tracing, that is, when the sub-information sent and received by the user terminal is incorrect, the block The sub-hash value of the chain can be used to know whether the second terminal has made an error.
  • the multiple sub-information is correspondingly sent to multiple user terminals according to the preset correspondence between the sub-information and the user terminal.
  • the process of correspondingly sending the multiple sub-information to multiple user terminals is set to be sent by the second terminal instead of the message sending end, thereby realizing pressure sharing.
  • the corresponding relationship between the preset sub-information and the user terminal is preset.
  • the sub-information and the corresponding terminal to which the sub-information is expected to be sent are pre-recorded in the designated data table, and then the designated data is inquired
  • the corresponding relationship can be obtained by the table.
  • the sub-information is, for example, a litigation document A (correspondingly, the specified information is, for example, a collection of multiple litigation documents), and the corresponding terminal to which the litigation document A is expected to be sent is client a, then The correspondence relationship between the litigation document A and the client a can be written into the designated data table in advance.
  • the step S3 of verifying the identity of the message sender by using the identity picture according to a preset identity verification method, and determining whether the identity verification of the message sender has passed includes:
  • S301 Perform cutting processing on the identity picture to cut out a preset circular area in the identity picture, thereby obtaining a round hole picture;
  • the identity picture is used to verify the identity of the message sender, and to determine whether the identity verification of the message sender is passed.
  • This application adopts the method of round hole picture-cylindrical surface pattern-mapping picture to convert from 2D-3D-2D graphics to realize identity verification and improve information security (that is, the mapped picture cannot be used as identity verification Therefore, the problem of information leakage is unlikely to occur in the second terminal).
  • this application uses a two-dimensional-three-dimensional-two-dimensional graphics conversion, the differences in the pictures may be enlarged, so that the similarity calculation is more accurate, and thus the identity recognition is more secure.
  • the message sent by the message sender is received, the message has an identity picture and designated information, and the designated information is marked with multiple division points; and the message sender has Store the first hash value in a preset blockchain, where the first hash value refers to the hash value obtained by hashing the designated information in the message sender before step S1 ,include:
  • S001 Retrieve four different rectangular pictures from a preset picture library, and arrange and splice the four different rectangular pictures in an upper left, upper right, lower left, and lower right manner, so as to obtain a rectangular identity picture.
  • the four different rectangular pictures have the same length and width;
  • S002 Perform cutting processing on the identity picture to cut off a preset circular area in the identity picture, so as to obtain a reference round hole picture;
  • the identity picture is sent to the message sender.
  • four different rectangular pictures are retrieved from a preset picture library, and the four different rectangular pictures are arranged and spliced in the upper left, upper right, lower left, and lower right modes, so as to obtain a rectangular identity picture .
  • the identity picture has at least four different patterns. Since the cylinder can only map a part of the pattern of the round hole picture, at least four different patterns can be mapped using the identity picture, which makes the identity more difficult to forge.
  • the method of obtaining the comparison picture is exactly the same as the method of obtaining the mapped picture, so as to ensure the feasibility of the similarity comparison.
  • send the identity picture to the message sender and delete the identity picture and the reference round hole picture, so that the second terminal only has a comparison picture, so that the identity picture only exists in the message
  • the sender prevents the leakage of information in the second terminal.
  • the step S304 of calculating the similarity value between the mapped picture and the preset comparison picture, and determining whether the similarity value is greater than the preset similarity threshold includes:
  • a preset pixel modification method modify the color value of the pixel of the mapped picture to the first color value or the second color value, and modify the color value of the pixel of the comparison picture to the first color Value or second color value;
  • the pixel modification method refers to setting pixels with a color value greater than a preset value as the first color value, and setting pixels with a color value less than or equal to the preset value as the second color value;
  • contour line of the mapped picture and the contour line of the comparison picture wherein the contour line refers to a dividing line between a first block and a second block, and the first block refers to a first color value.
  • a block formed by pixels of, and the second block refers to a block formed by pixels having a second color value;
  • the calculation of the similarity value M between the mapped picture and the preset comparison picture is realized.
  • the two-dimensional-three-dimensional-two-dimensional image conversion method of the present application makes the dependency of the complexity of the image low. Therefore, in order to reduce the calculation pressure, the present application also uses a pixel modification method to change pixels with a color value greater than a preset value. The point is set as the first color value, and the pixel point with the color value less than or equal to the preset value is set as the second color value.
  • the step S4 of storing the second hash value in the blockchain and obtaining the first hash value from the blockchain includes:
  • S402 Select a minimum distance from the multiple distances, and obtain a first blockchain node corresponding to the minimum distance;
  • S404 Receive storage confirmation information returned by the first blockchain node, where the storage confirmation information refers to information confirming that the second hash value is stored in the blockchain;
  • the second hash value is stored in the blockchain and the first hash value is obtained from the blockchain.
  • This application uses the method of selecting the minimum distance from the multiple distances, and obtaining the first blockchain node corresponding to the minimum distance, and selecting the blockchain node closest to the second terminal to improve communication speed.
  • the second hash value is stored before the first hash value is obtained, so as to avoid the possibility that the second terminal forges the first hash value.
  • the embodiment of the application provides a blockchain-based processing method, which is applied to a user terminal, and the user terminal receives corresponding sub-information sent by any one of the above-mentioned blockchain-based information processing methods, including:
  • the review instruction send a hash value acquisition request to the corresponding blockchain node in the blockchain, where the hash value acquisition request is used to request to acquire the first hash value, the A second hash value and a reference sub-hash value, wherein the reference sub-hash value refers to a sub-hash value corresponding to the user terminal among the plurality of sub-hash values;
  • the user terminal is used as the executive body to audit the corresponding sub-information. Because this application adopts the blockchain method, the error can be traced back. That is, receiving the first hash value, the second hash value, and the reference sub-hash value sent by the corresponding blockchain node; judging the first hash value and the second hash value Whether the values are the same; if the first hash value and the second hash value are the same, the corresponding sub-information is hashed according to the preset hash algorithm to obtain the designated sub-hash value ; Determine whether the designated sub-hash value and the reference sub-hash value are the same; if the designated sub-hash value is the same as the reference sub-hash value, determine the way in which the sub-information is approved, To determine whether there is any forgery of information during the electronic delivery process. If the first hash value and the second hash value are the same, and the designated sub-hash value is the same as the reference sub-hash value, it indicates that there is
  • the method includes:
  • ST62 Send an information resending request and a terminal replacement request to the message sending end, where the information resending request is used to request retransmission of the designated information, and the terminal review request is used to request replacement of the second terminal.
  • the message retransmission request and the terminal replacement request are sent to the message sender. If the designated sub-hash value and the reference sub-hash value are not the same, it indicates that an error has occurred in the second terminal. Therefore, the second terminal is not trusted, and the second terminal is disconnected accordingly. All communication connections. Since the second terminal is not trustworthy, and the corresponding sub-information received by the user terminal is wrong, it is necessary to obtain accurate corresponding sub-information. Therefore, an information resending request and a terminal replacement request are sent to the message sender again, the information resending request is used to request retransmission of the specified information, and the terminal review request is used to request replacement of the second terminal . Further, after sending an information resending request and a terminal replacement request to the message sender, the method further includes: sending a terminal review request to the message sender to review the cause of the error of the second terminal.
  • the blockchain-based information processing method of the present application receives a message sent by a message sender; the message sender has stored the first hash value in a preset blockchain; parses the message, In this way, the identity picture and the designated information are obtained; the identity picture is used to verify the identity of the message sender; if the identity verification of the message sender is passed, the designated information is hashed to obtain A second hash value, storing the second hash value in the blockchain, and obtaining the first hash value from the blockchain; if the first hash value and the If the second hash value is the same, the designated information is divided into multiple sub-information according to the multiple division points; the multiple sub-information is hashed to obtain multiple sub-hash values, and all sub-hash values are obtained.
  • the multiple sub-hash values are stored in the blockchain; and the multiple sub-information is correspondingly sent to multiple user terminals. This reduces the communication pressure on the message sending end, makes it easy to trace file errors, and improves the credibility of information.
  • an embodiment of the present application provides an information processing platform based on a blockchain.
  • a first hash value is pre-stored in the blockchain, and the first hash value is hashed for specified information.
  • the hash value obtained includes:
  • the message receiving unit 10 is configured to receive a message sent by a message sender, the message having an identity picture and designated information, and the designated information is marked with multiple division points;
  • the message parsing unit 20 is configured to parse the message according to the format of the message, so as to obtain the identity picture and the specified information;
  • the identity verification unit 30 is configured to use the identity picture to verify the identity of the message sender according to a preset identity verification method, and determine whether the identity verification of the message sender is passed;
  • the second hash value storage unit 40 is configured to perform a hash calculation on the designated information if the identity verification of the message sender is passed, so as to obtain a second hash value, and store the second hash value To the blockchain, and obtain the first hash value from the blockchain;
  • the second hash value judging unit 50 is configured to judge whether the first hash value is the same as the second hash value
  • a designated information dividing unit 60 configured to divide the designated information into a plurality of sub-information according to the plurality of division points if the first hash value is the same as the second hash value;
  • the sub-hash value obtaining unit 70 is configured to perform a hash calculation on the multiple sub-information respectively to obtain multiple sub-hash values, and store the multiple sub-hash values in the blockchain;
  • the sub-information sending unit 80 is configured to correspondingly send the multiple sub-information to multiple user terminals according to the preset correspondence between the sub-information and the user terminal.
  • the identity verification unit 30 includes:
  • a cutting processing subunit used to perform cutting processing on the identity picture to cut off a preset circular area in the identity picture to obtain a round hole picture
  • a cylinder setting subunit for introducing the circular hole picture in a preset virtual three-dimensional space, and setting a preset cylinder in the circular hole, wherein the radius of the cylinder is equal to the radius of the circular area,
  • the virtual three-dimensional space conforms to the principle of light propagation in a straight line, and the surface of the cylinder is smooth, and the surface of the cylinder is used to map the image of the circular hole picture;
  • the mapping picture acquisition subunit is configured to acquire a designated positioning position outside the cylinder according to a preset positioning method, and perform image collection on the cylinder at the designated positioning position, so as to obtain a picture mapped with the circular hole
  • the mapping picture of part of the pattern
  • the similarity value judgment subunit is used to calculate the similarity value between the mapped picture and the preset comparison picture, and judge whether the similarity value is greater than the preset similarity threshold;
  • the identity verification passing determination subunit is configured to determine that the identity verification of the message sender is passed if the similarity value is greater than a preset similarity threshold.
  • the device includes:
  • the rectangular picture splicing unit is used to retrieve four different rectangular pictures from a preset picture library, and arrange and splice the four different rectangular pictures in the upper left, upper right, lower left, and lower right manners, thereby obtaining the image
  • a reference round hole picture acquiring unit configured to perform cutting processing on the identity picture to cut off a preset circular area in the identity picture, thereby obtaining a reference round hole picture
  • the reference circular hole picture introduction unit is used to introduce the reference circular hole picture into a preset virtual three-dimensional space, and set a preset cylinder in the circular hole, wherein the radius of the cylinder is equal to the radius of the circular area, and the virtual three-dimensional space It conforms to the principle of light propagation in a straight line, and the surface of the cylinder is smooth, so that the surface of the cylinder can map the image of the reference circular hole picture;
  • the comparison picture acquisition unit is configured to acquire a reference positioning position outside the cylinder according to a preset positioning method, and perform image collection on the cylinder at the reference positioning position, so as to obtain the part where the reference circular hole picture is mapped Contrast pictures of patterns;
  • the identity picture sending unit is configured to send the identity picture to the message sending end, and delete the identity picture and the reference round hole picture.
  • the similarity value judgment subunit includes:
  • the pixel modification module is used to modify the color value of the pixel of the mapped picture to the first color value or the second color value according to a preset pixel modification method, and modify the color value of the pixel of the comparison picture Is the first color value or the second color value; wherein the pixel modification method refers to setting a pixel with a color value greater than a preset value as the first color value, and setting a pixel with a color value less than or equal to the preset value as the first color value. Dichroic value
  • the contour line obtaining module is used to obtain the contour line of the mapped picture and the contour line of the comparison picture; wherein the contour line refers to the dividing line of the first block and the second block, and the first block refers to A block formed by pixels having a first color value, and the second block refers to a block formed by pixels having a second color value;
  • the minimum circumscribed rectangle generation module is used to generate the first minimum circumscribed rectangle of the contour line of the mapped picture, and generate the second minimum circumscribed rectangle of the contour line of the comparison picture, and obtain the first minimum circumscribed rectangle of the first minimum circumscribed rectangle An area A and a second area B of the second smallest circumscribed rectangle;
  • the similarity value M calculation module is used according to the formula:
  • the second hash value storage unit 40 includes:
  • Multiple distance calculation subunits are used to obtain multiple first geographic locations corresponding to multiple blockchain nodes in the blockchain, and obtain the second geographic location of the second terminal, and calculate the total Multiple distances between the multiple first geographic locations and the second geographic location;
  • the minimum distance selection subunit is used to select the minimum distance from the multiple distances, and obtain the first blockchain node corresponding to the minimum distance;
  • the second hash value sending subunit is configured to send the second hash value to the first blockchain node and request the first blockchain node to store the second hash value in The blockchain;
  • the storage confirmation information receiving subunit is configured to receive storage confirmation information returned by the first blockchain node, where the storage confirmation information refers to information confirming that the second hash value is stored in the blockchain;
  • the first hash value receiving subunit is configured to send a first hash value acquisition request to the first blockchain node, and receive the first hash value sent by the first blockchain node.
  • the embodiment of the present application provides a blockchain-based processing device, which is applied to a user terminal, and the user terminal receives corresponding sub-information sent by any one of the above-mentioned blockchain-based information processing methods, including:
  • An audit instruction receiving unit configured to receive an audit instruction for auditing the corresponding sub-information
  • the hash value acquisition request sending unit is configured to send a hash value acquisition request to the corresponding blockchain node in the blockchain according to the review instruction, and the hash value acquisition request is used to request to acquire the A first hash value, the second hash value, and a reference sub-hash value, wherein the reference sub-hash value refers to a sub-hash value corresponding to the user terminal among the plurality of sub-hash values;
  • a hash value receiving unit configured to receive the first hash value, the second hash value, and the reference sub-hash value sent by the corresponding blockchain node;
  • a hash value identical judging unit configured to judge whether the first hash value and the second hash value are the same
  • the designated sub-hash value obtaining unit is configured to, if the first hash value and the second hash value are the same, perform a hash calculation on the corresponding sub-information according to a preset hash algorithm, thereby Get the specified sub-hash value;
  • a designated sub-hash value judgment unit for judging whether the designated sub-hash value and the reference sub-hash value are the same;
  • the sub-information approval determination unit is configured to determine that the sub-information has been approved if the designated sub-hash value is the same as the reference sub-hash value.
  • the device includes:
  • the communication connection disconnection unit is configured to disconnect all communication connections with the second terminal if the designated sub-hash value and the reference sub-hash value are not the same;
  • a terminal replacement request sending unit configured to send an information resending request and a terminal replacement request to the message sender, the information resending request is used to request retransmission of the specified information, and the terminal review request is used to request replacement The second terminal.
  • the blockchain-based information processing platform of the present application receives the message sent by the message sender; the message sender has stored the first hash value in the preset blockchain; parses the message, Thus, the identity picture and the designated information are obtained; the identity picture is used to verify the identity of the message sender; if the identity verification of the message sender is passed, the designated information is hashed to obtain A second hash value, storing the second hash value in the blockchain, and obtaining the first hash value from the blockchain; if the first hash value and the If the second hash value is the same, the designated information is divided into multiple sub-information according to the multiple division points; the multiple sub-information is hashed to obtain multiple sub-hash values, and all sub-hash values are obtained.
  • the multiple sub-hash values are stored in the blockchain; and the multiple sub-information is correspondingly sent to multiple user terminals. This reduces the communication pressure on the message sending end, makes it easy to trace file errors, and improves the credibility of information.
  • an embodiment of the present application also provides an electronic device.
  • the electronic device may be a server, and its internal structure may be as shown in the figure.
  • the electronic device includes a processor, a memory, a network interface, and a database connected through a system bus.
  • the processor designed by the computer is used to provide calculation and control capabilities.
  • the memory of the electronic device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system, a computer program, and a database.
  • the memory provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium.
  • the database of the electronic device is used to store the data used in the blockchain-based information processing method.
  • the network interface of the electronic device is used to communicate with an external terminal through a network connection.
  • the computer program is executed by the processor to realize a blockchain-based information processing method or a blockchain-based processing method.
  • the above-mentioned processor executes the above-mentioned blockchain-based information processing method or blockchain-based processing method, wherein the steps included in the method are respectively the same as executing the blockchain-based information processing method or the blockchain-based information processing method of the foregoing embodiment.
  • the steps of the processing method correspond to each other, so I won't repeat them here.
  • An embodiment of the present application also provides a computer-readable storage medium.
  • the computer-readable storage medium may be non-volatile or volatile.
  • a computer program is stored thereon. When the computer program is executed by a processor, the Blockchain-based information processing method or blockchain-based processing method, wherein the steps included in the method respectively correspond to the steps of performing the blockchain-based information processing method or the blockchain-based processing method of the foregoing embodiment in a one-to-one correspondence , I won’t repeat it here.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请揭示了一种基于区块链的信息处理方法及平台、电子设备,所述方法包括:接收报文发送端发送的报文;解析报文,从而得到身份图片和指定信息;利用身份图片验证报文发送端的身份;若报文发送端的身份验证通过,则对所述指定信息进行哈希计算,得到第二哈希值,将第二哈希值存储至区块链,并从区块链中获取第一哈希值;若第一哈希值与第二哈希值相同,则将所述指定信息划分为多个子信息;分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;将所述多个子信息对应发送给多个用户终端。从而减小了报文发送端的通信压力、使文件出错时容易追溯,提高了信息可信度。

Description

基于区块链的信息处理方法及平台、电子设备
本申请要求于2020年2月14日提交中国专利局、申请号为202010093382.2,申请名称为“基于区块链的信息处理方法及平台、电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及到计算机领域,特别是涉及到一种基于区块链的信息处理方法及平台、电子设备和计算机可读存储介质。
背景技术
电子送达是指使用网络将文件传送给被通知方,电子送达中的文件包括具有法律效应的文件,例如诉讼文书、法律文书等。在电子送达中,文件的安全性与完整性需要保证,文件的发送日期和被通知方接收到文件的接收日期,需要准确确定。传统技术的电子送达,只是利用发送终端发送文件,并记录下发送时间;利用接收终端接收文件,并记录下接收时间。发明人发现,这种送达方式存在发送终端通信压力过大(当需要分别发送n份文件时,需要与不同的终端建立n个通信连接,因此在截止期限时,存在大量文件需要同时发送的情况下,发送终端的通信压力将大大增加)、当文件出错时难以追溯、发送时间与接收时间容易被篡改等缺陷。
技术问题
本申请的主要目的为提供一种基于区块链的信息处理方法及平台、电子设备和计算机可读存储介质,旨在减小报文发送端的通信压力、使文件出错时容易追溯,提高信息可信度。
技术解决方案
为了实现上述发明目的,本申请提出一种基于区块链的信息处理方法,所述区块链中预先存储有第一哈希值,所述第一哈希值为对指定信息进行哈希计算而得到的哈希值,包括:
接收报文发送端发送的报文,所述报文中具有身份图片和指定信息,所述指定信息中标记有多个划分点;
根据所述报文的格式,解析所述报文,从而得到所述身份图片和所述指定信息;
根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过;
若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值;
判断所述第一哈希值与所述第二哈希值是否相同;
若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息;
分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;
根据预设的子信息与用户终端的对应关系,分别将所述多个子信息对应发送给多个用户终端。
本申请提供一种基于区块链的处理处理方法,应用于用户终端,所述用户终端接收上述任一项所述的基于区块链的信息处理方法发送的对应的子信息,包括:
接收对所述子信息进行审核的审核指令;
根据所述审核指令,向所述区块链中的对应的区块链节点发送哈希值获取请求,所述哈希值获取请求用于请求获取所述第一哈希值、所述第二哈希值和参照子哈希值,其中所述参照子哈希值指所述多个子哈希值中与所述用户终端对应的子哈希值;
接收所述对应的区块链节点发送的所述第一哈希值、所述第二哈希值和参照子哈希值;
判断所述第一哈希值和所述第二哈希值是否相同;
若所述第一哈希值和所述第二哈希值相同,则根据预设的哈希算法,对所述对应的子信息进行哈希计算,从而得到指定子哈希值;
判断所述指定子哈希值和所述参照子哈希值是否相同;
若所述指定子哈希值和所述参照子哈希值相同,则判断出所述子信息审核通过。
本申请提供一种基于区块链的信息处理平台,所述区块链中预先存储有第一哈希值,所述第一哈希值为对指定信息进行哈希计算而得到的哈希值,包括:
报文接收单元,用于接收报文发送端发送的报文,所述报文中具有身份图片和指定信息,所述指定信息中标记有多个划分点;
报文解析单元,用于根据所述报文的格式,解析所述报文,从而得到所述身份图片和所述指定信息;
身份验证单元,用于根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过;
第二哈希值存储单元,用于若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值;
第二哈希值判断单元,用于判断所述第一哈希值与所述第二哈希值是否相同;
指定信息划分单元,用于若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息;
子哈希值获取单元,用于分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;
子信息发送单元,用于根据预设的子信息与用户终端的对应关系,分别将所述多个子信息对应发送给多个用户终端。
本申请提供一种电子设备,包括存储器和处理器,所述存储器存储有计算机程序,所述处理器执行所述计算机程序时实现上述任一项所述方法的步骤。
本申请提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述任一项所述的方法的步骤。
有益效果
本申请减小了报文发送端的通信压力、使文件出错时容易追溯,提高了信息可信度。
附图说明
图1为本申请一实施例的基于区块链的信息处理方法的流程示意图;
图2为本申请一实施例的基于区块链的信息处理平台的结构示意框图;
图3为本申请一实施例的电子设备的结构示意框图。
本发明的最佳实施方式
参照图1,本申请实施例提供一种基于区块链的信息处理方法,所述区块链中预先存储有第一哈希值,所述第一哈希值为对指定信息进行哈希计算而得到的哈希值,包括:
S1、接收报文发送端发送的报文,所述报文中具有身份图片和指定信息,所述指定信息中标记有多个划分点;
S2、根据所述报文的格式,解析所述报文,从而得到所述身份图片和所述指定信息;
S3、根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过;
S4、若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值;
S5、判断所述第一哈希值与所述第二哈希值是否相同;
S6、若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息;
S7、分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;
S8、根据预设的子信息与用户终端的对应关系,分别将所述多个子信息对应发送给多个用户终端。
本申请的基于区块链的信息处理方法采用在报文发送端(即发送信息的终端)与用户终端(即接收信息的终端)之间,设置特殊的第二终端的方式,以缓解报文发送端的通信压力(报文发送端只需专注于文件或信息的生成,无需关注通信方面的问题,而第二终端只需考虑拆并发送信息,从而实现了压力分摊的技术效果)。同时信息处理过程中,由报文发送端将第一哈希值存入区块链、第二终端将第二哈希值和子哈希值存入区块链,由于区块链难以篡改的特性,保证了当文件出错时可及时准确追溯出错之处。并且区块链中存入了相应的哈希值,其中存储时间即为相应的日期(例如第一哈希值的存储时间即为发送日期)。更进一步地,采用特殊的身份验证方法和区块链的信息验证方法,提高了信息安全性。
如上述步骤S1所述,接收报文发送端发送的报文,所述报文中具有身份图片和指定信息,所述指定信息中标记有多个划分点;并且所述报文发送端已将第一哈希值存储至预设的区块链,所述第一哈希值指在所述报文发送端中对所述指定信息进行哈希计算而得到的哈希值。报文是网络中进行通信的交换与传输的载体,用于承载所述身份图片和指定信息。所述指定信息可为任意可行信息,例如为由在多份需要在同一时间发出的诉讼通知书组成的文件等。身份图片用于验证身份。其中所述指定信息由多个子信息结合而成,其结合点被标记为所述划分点。从而所述报文发送端无需考虑如何发送具体的子信息,只需将指定信息发送给第二终端即可。并且为了防止数据伪造,本申请还通过所述报文发送端已将第一哈希值存储至预设的区块链的方式,保证了信息的安全性。
如上述步骤S2所述,根据所述报文的格式,解析所述报文,从而得到所述身份图片和所述指定信息。报文可为任意结构的报文,例如包括报文头、报文主体等。因此根据报文的格式,即可获知身份图片和所述指定信息所在位置,从而提取出所述身份图片和所述指定信息。
如上述步骤S3所述,根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过。本申请采用的身份验证方法,例如为:对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到圆孔图片;在预设的虚拟立体空间中引入所述圆孔图片,并在所述圆孔中设置预设的圆柱,其中所述圆柱的半径等于所述圆形区域的半径,所述虚拟立体空间符合光线直线传播原理,且所述圆柱表面光滑,所述圆柱的表面用于映射出所述圆孔图片的影像;根据预设的定位方法,获取所述圆柱外的指定定位位置,并在所述指定定位位置上对所述圆柱进行图像采集,从而得到映射有所述圆孔图片的部分图案的映射图片;计算所述映射图片和预设的对比图片的相似度值,并判断所述相似度值是否大于预设的相似度阈值;若所述相似度值大于预设的相似度阈值,则判定所述报文发送端的身份验证通过。因此,只要报文发送端保证其保存的身份图片不失窃,即可保证报文发送端的身份不被窃用(因为第二终端只保存映射图片,而映射图片无法作为身份验证的依据,因此第二终端不存在信息泄漏的可能性)。
如上述步骤S4所述,若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值。其中哈希计算采用的哈希算法,与所述报文发送端采用的哈希算法相同,以保证哈希值可比较。其中,从所述区块链中获取所述第一哈希值的步骤,不在将所述第二哈希值存储至所述区块链的步骤之前,以避免窃取第一哈希值的可能。并且,由于哈希值要小于被哈希计算的数据本身,因此在区块链中存储哈希值而不是数据本身,一方 面有助于信息保密,另一方面有助于减少区块链的存储压力。
如上述步骤S5所述,判断所述第一哈希值与所述第二哈希值是否相同。由于哈希计算是一种单向算法以实现的压缩映射,作为计算的数据只要略有差异,计算而得的哈希值将明显不同。因此,只有完全相同的数据,计算而得的哈希值才能相同。据此,以判断所述第一哈希值与所述第二哈希值是否相同的方式,以确定电子送达过程是否存在问题。
如上述步骤S6所述,若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息。由于指定信息是多个子信息的集合,而不同的子信息将被发送至不同的终端,因此需要根据所述多个划分点,将所述指定信息划分为多个子信息。其中,所述第一哈希值与所述第二哈希值相同,表明在电子送达的当前步骤中,没有发生问题。若所述第一哈希值与所述第二哈希值不相同,表明出错,出错之处在于报文发送端或者报文发送端发送报文的过程,从而得以快速追溯原因。其中,所述报文发送端例如为与法院对应的终端,报文例如为HTTP协议报文,报文例如为记载有诉讼文书的报文,作为电子送达的诉讼文书发送的载体,第二终端可为任意可行的终端(可为法院所拥有的专门用于通信的终端,也可为第三方所拥有的终端,优选为第三方拥有的终端),用户终端例如为所述诉讼文书需要被送达的对象对应的终端。从而本申请的基于区块链的信息处理方法采用在报文发送端(即发送信息的终端)与用户终端(即接收信息的终端)之间,设置特殊的第二终端的方式,以缓解报文发送端的通信压力(报文发送端只需专注于文件或信息的生成,无需关注通信方面的问题,而第二终端只需考虑拆并发送信息,从而实现了压力分摊的技术效果)。同时信息发送过程中,由报文发送端将第一哈希值存入区块链、第二终端将第二哈希值和子哈希值存入区块链,由于区块链难以篡改的特性,保证了当文件出错时可及时准确追溯出错之处。并且区块链中存入了相应的哈希值,其中存储时间即为相应的日期(例如第一哈希值的存储时间即为发送日期)。更进一步地,采用特殊的身份验证方法和区块链的信息验证方法,提高了信息安全性。当本申请应用于以法院终端为报文发送端、报文记载有诉讼文书之时,由于法院终端无需考虑通信方面的问题,因此法院终端的压力得到缓解;并且在法院终端、第二终端发送诉讼文书时,分别将第一哈希值存入区块链,将第二哈希值和子哈希值存入区块链,因此不仅送达时间得到了保全,而送达内容也得到了保全,从而保证了当诉讼文书出错时(例如在中途遭到恶意伪造时)可及时准确追溯出错之处。
如上述步骤S7所述,分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链。所述子哈希值代表了子信息,将所述多个子哈希值存储至所述区块链,有利于错误追溯,即,当用户终端发送接收到的子信息有误时,通过区块链的子哈希值,即可得知是否是所述第二终端出错。
如上述步骤S8所述,根据预设的子信息与用户终端的对应关系,分别将所述多个子信息对应发送给多个用户终端。本申请将所述多个子信息对应发送给多个用户终端的过程,设置为由第二终端发送,而非是报文发送端,从而实现了压力分摊。进一步地,所述第二终端可以存在多个,从而进一步地避免压力过大,导致信息无法及时发出的可能。其中,所述预设的子信息与用户终端的对应关系是预先设置的,例如所述子信息及该子信息预计发送的对应终端被预先记录在指定数据表中,则通过查询所述指定数据表即可获知所述对应关系。更具体地举例:所述子信息例如为一份诉讼公文A(相应地,所述指定信息例如为多份诉讼公文的集合体),该诉讼公文A预计发送的对应终端为用户端a,则可预先将诉讼公文A-用户端a的对应关系写入指定数据表中。
在一个实施方式中,所述根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过的步骤S3,包括:
S301、对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到圆孔图片;
S302、在预设的虚拟立体空间中引入所述圆孔图片,并在所述圆孔中设置预设的圆柱, 其中所述圆柱的半径等于所述圆形区域的半径,所述虚拟立体空间符合光线直线传播原理,且所述圆柱表面光滑,所述圆柱的表面用于映射出所述圆孔图片的影像;
S303、根据预设的定位方法,获取所述圆柱外的指定定位位置,并在所述指定定位位置上对所述圆柱进行图像采集,从而得到映射有所述圆孔图片的部分图案的映射图片;
S304、计算所述映射图片和预设的对比图片的相似度值,并判断所述相似度值是否大于预设的相似度阈值;
S305、若所述相似度值大于预设的相似度阈值,则判定所述报文发送端的身份验证通过。
如上所述,实现了利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过。本申请采用的是将圆孔图片-圆柱表面的图案-映射图片的方式,以二维-三维-二维的图形转换,以实现身份验证,并提高信息安全性(即映射图片无法作为身份验证的标准,从而第二终端不可能发生信息泄漏的问题)。并且由于本申请采用的是二维-三维-二维的图形转换,因此图片中的差异之处有可能被放大,从而使相似度计算更为准确,因此身份认识更安全。
在一个实施方式中,所述接收报文发送端发送的报文,所述报文中具有身份图片和指定信息,所述指定信息中标记有多个划分点;并且所述报文发送端已将第一哈希值存储至预设的区块链,所述第一哈希值指在所述报文发送端中对所述指定信息进行哈希计算而得到的哈希值的步骤S1之前,包括:
S001、从预设的图片库中调取四张不同的矩形图片,并将所述四张不同的矩形图片以左上、右上、左下和右下的方式排列拼接,从而得到呈矩形的身份图片,其中所述四张不同的矩形图片具有相同的长和宽;
S002、对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到参考圆孔图片;
S003、在预设的虚拟立体空间中引入所述参考圆孔图片,并在圆孔中设置预设的圆柱,其中圆柱的半径等于圆形区域的半径,虚拟立体空间符合光线直线传播原理,且圆柱表面光滑,从而圆柱的表面能够映射出所述参考圆孔图片的影像;
S004、根据预设的定位方法,获取所述圆柱外的参考定位位置,并在所述参考定位位置上对圆柱进行图像采集,从而得到映射有所述参考圆孔图片的部分图案的对比图片;
S005、将所述身份图片发送给所述报文发送端,并删除所述身份图片和所述参考圆孔图片。
如上所述,实现了将所述身份图片发送给所述报文发送端。本申请通过从预设的图片库中调取四张不同的矩形图片,并将所述四张不同的矩形图片以左上、右上、左下和右下的方式排列拼接,从而得到呈矩形的身份图片。从而使身份图片至少具有四种不同的图案。由于圆柱只能映射出所述圆孔图片的部分图案,因此利用身份图片至少可映射出不同的四种图案,从而使得身份更难被伪造。其中,所述对比图片的获取方式,与所述映射图片的获取方式完全相同,以保证相似度比较的可行性。再将所述身份图片发送给所述报文发送端,并删除所述身份图片和所述参考圆孔图片,以使所述第二终端仅存有对比图片,从而身份图片仅存在于报文发送端,防止在第二终端中的信息泄漏。
在一个实施方式中,所述计算所述映射图片和预设的对比图片的相似度值,并判断所述相似度值是否大于预设的相似度阈值的步骤S304,包括:
S501、根据预设的像素修改方法,将所述映射图片的像素点的色值修改为第一色值或者第二色值,以及将所述对比图片的像素点的色值修改为第一色值或者第二色值;其中所述像素修改方法指将色值大于预设数值的像素点设置为第一色值,将色值小于或等于预设数值的像素点设置为第二色值;
S502、获取所述映射图片的轮廓线和所述对比图片的轮廓线;其中所述轮廓线指第一区块与第二区块的划分线,所述第一区块指具有第一色值的像素点构成的区块,所述第二 区块指具有第二色值的像素点构成的区块;
S503、生成所述映射图片的轮廓线的第一最小外接矩形,以及生成所述对比图片的轮廓线的第二最小外接矩形,并获取所述第一最小外接矩形的第一面积A和所述第二最小外接矩形的第二面积B;
S504、根据公式:
Figure PCTCN2020088012-appb-000001
计算所述映射图片和预设的对比图片的相似度值M。
如上所述,实现了计算所述映射图片和预设的对比图片的相似度值M。本申请的二维-三维-二维的图像转换方法,使得图像的复杂程度的依赖性较低,因此为了减小计算压力,本申请还以像素修改方法,将色值大于预设数值的像素点设置为第一色值,将色值小于或等于预设数值的像素点设置为第二色值。再获取所述映射图片的轮廓线和所述对比图片的轮廓线;生成所述映射图片的轮廓线的第一最小外接矩形,以及生成所述对比图片的轮廓线的第二最小外接矩形,并获取所述第一最小外接矩形的第一面积A和所述第二最小外接矩形的第二面积B;根据公式:
Figure PCTCN2020088012-appb-000002
计算所述映射图片和预设的对比图片的相似度值M。从而将图片的相似度,转化为面积的相似度,以提高计算速度。
在一个实施方式中,所述将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值的步骤S4,包括:
S401、获取所述区块链中的多个区块链节点分别对应的多个第一地理位置,以及获取所述第二终端的第二地理位置,并分别计算所述多个第一地理位置和所述第二地理位置之间的多个距离;
S402、从所述多个距离中选出最小距离,并获取所述最小距离对应的第一区块链节点;
S403、将所述第二哈希值发送给所述第一区块链节点,并要求所述第一区块链节点将所述第二哈希值存储入所述区块链;
S404、接收所述第一区块链节点返回的存储确认信息,所述存储确认信息指确认将所述第二哈希值存储入所述区块链的信息;
S405、向所述第一区块链节点发送第一哈希值获取请求,并接收所述第一区块链节点发送的所述第一哈希值。
如上所述,实现了将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值。本申请采用从所述多个距离中选出最小距离,并获取所述最小距离对应的第一区块链节点的方式,选出与所述第二终端最近的区块链节点,以提高通信速度。并且以将所述第二哈希值发送给所述第一区块链节点,并要求所述第一区块链节点将所述第二哈希值存储入所述区块链;接收所述第一区块链节点返回的存储确认信息,所述存储确认信息指确认将所述第二哈希值存储入所述区块链的信息;向所述第一区块链节点发送第一哈希值获取请求,并接收所述第一区块链节点发送的所述第一哈希值的方式,借助第一区块链节点实现第二哈希值的存储与第一哈希值的获取。并且,所述第二哈希值的存储在第一哈希值的获取之前,以避免第二终端伪造第一哈希值的可能。
本申请实施例提供一种基于区块链的处理方法,应用于用户终端,所述用户终端接收上述任一项所述的基于区块链的信息处理方法发送的对应的子信息,包括:
ST1、接收对所述子信息进行审核的审核指令;
ST2、根据所述审核指令,向所述区块链中的对应的区块链节点发送哈希值获取请求,所述哈希值获取请求用于请求获取所述第一哈希值、所述第二哈希值和参照子哈希值,其中所述参照子哈希值指所述多个子哈希值中与所述用户终端对应的子哈希值;
ST3、接收所述对应的区块链节点发送的所述第一哈希值、所述第二哈希值和参照子哈希值;
ST4、判断所述第一哈希值和所述第二哈希值是否相同;
ST5、若所述第一哈希值和所述第二哈希值相同,则根据预设的哈希算法,对所述对应的子信息进行哈希计算,从而得到指定子哈希值;
ST6、判断所述指定子哈希值和所述参照子哈希值是否相同;
ST7、若所述指定子哈希值和所述参照子哈希值相同,则判断出所述子信息审核通过。
如上所述,实现了以用户终端为执行主体,对对所述对应的子信息进行审核。由于本申请采用了区块链的方式,以实现错误可追溯。即,接收所述对应的区块链节点发送的所述第一哈希值、所述第二哈希值和参照子哈希值;判断所述第一哈希值和所述第二哈希值是否相同;若所述第一哈希值和所述第二哈希值相同,则根据预设的哈希算法,对所述对应的子信息进行哈希计算,从而得到指定子哈希值;判断所述指定子哈希值和所述参照子哈希值是否相同;若所述指定子哈希值和所述参照子哈希值相同,则判断出所述子信息审核通过的方式,以确定在电子送达过程,是否存在信息伪造等现象。若所述第一哈希值和所述第二哈希值相同,并且所述指定子哈希值和所述参照子哈希值相同,表明电子送达过程未出现错误,因此判断出所述子信息审核通过。
在一个实施方式中,所述判断所述指定子哈希值和所述参照子哈希值是否相同的步骤ST6之后,包括:
ST61、若所述指定子哈希值和所述参照子哈希值不相同,则断开与所述第二终端的全部通信连接;
ST62、向所述报文发送端发送信息再发送请求和终端更换请求,所述信息再发送请求用于请求重新发送所述指定信息,所述终端审核请求用于请求更换所述第二终端。
如上所述,实现了向所述报文发送端发送信息再发送请求和终端更换请求。若所述指定子哈希值和所述参照子哈希值不相同,表明在所述第二终端中发生了错误,因此所述第二终端不可信,据此断开与所述第二终端的全部通信连接。由于第二终端不可信,并且用户终端接收到的对应的子信息是错误的,因此需要获取准确的对应的子信息。因此,再向所述报文发送端发送信息再发送请求和终端更换请求,所述信息再发送请求用于请求重新发送所述指定信息,所述终端审核请求用于请求更换所述第二终端。进一步地,在向所述报文发送端发送信息再发送请求和终端更换请求之后,还包括:向所述报文发送端发送终端审核请求,以审核所述第二终端的出错原因。
本申请的基于区块链的信息处理方法,接收报文发送端发送的报文;所述报文发送端已将第一哈希值存储至预设的区块链;解析所述报文,从而得到所述身份图片和所述指定信息;利用所述身份图片验证所述报文发送端的身份;若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值;若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息;分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;将所述多个子信息对应发送给多个用户终端。从而减小了报文发送端的通信压力、使文件出错时容易追溯,提高了信息可信度。
参照图2,本申请实施例提供一种基于区块链的信息处理平台,所述区块链中预先存储有第一哈希值,所述第一哈希值为对指定信息进行哈希计算而得到的哈希值,包括:
报文接收单元10,用于接收报文发送端发送的报文,所述报文中具有身份图片和指定信息,所述指定信息中标记有多个划分点;
报文解析单元20,用于根据所述报文的格式,解析所述报文,从而得到所述身份图片和所述指定信息;
身份验证单元30,用于根据预设的身份验证方法,利用所述身份图片验证所述报文发 送端的身份,并判断所述报文发送端的身份验证是否通过;
第二哈希值存储单元40,用于若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值;
第二哈希值判断单元50,用于判断所述第一哈希值与所述第二哈希值是否相同;
指定信息划分单元60,用于若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息;
子哈希值获取单元70,用于分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;
子信息发送单元80,用于根据预设的子信息与用户终端的对应关系,分别将所述多个子信息对应发送给多个用户终端。
其中上述单元分别用于执行的操作与前述实施方式的基于区块链的信息处理方法的步骤一一对应,在此不再赘述。
在一个实施方式中,所述身份验证单元30,包括:
切除处理子单元,用于对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到圆孔图片;
圆柱设置子单元,用于在预设的虚拟立体空间中引入所述圆孔图片,并在所述圆孔中设置预设的圆柱,其中所述圆柱的半径等于所述圆形区域的半径,所述虚拟立体空间符合光线直线传播原理,且所述圆柱表面光滑,所述圆柱的表面用于映射出所述圆孔图片的影像;
映射图片获取子单元,用于根据预设的定位方法,获取所述圆柱外的指定定位位置,并在所述指定定位位置上对所述圆柱进行图像采集,从而得到映射有所述圆孔图片的部分图案的映射图片;
相似度值判断子单元,用于计算所述映射图片和预设的对比图片的相似度值,并判断所述相似度值是否大于预设的相似度阈值;
身份验证通过判定子单元,用于若所述相似度值大于预设的相似度阈值,则判定所述报文发送端的身份验证通过。
其中上述子单元分别用于执行的操作与前述实施方式的基于区块链的信息处理方法的步骤一一对应,在此不再赘述。
在一个实施方式中,所述装置,包括:
矩形图片拼接单元,用于从预设的图片库中调取四张不同的矩形图片,并将所述四张不同的矩形图片以左上、右上、左下和右下的方式排列拼接,从而得到呈矩形的身份图片,其中所述四张不同的矩形图片具有相同的长和宽;
参考圆孔图片获取单元,用于对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到参考圆孔图片;
参考圆孔图片引入单元,用于在预设的虚拟立体空间中引入所述参考圆孔图片,并在圆孔中设置预设的圆柱,其中圆柱的半径等于圆形区域的半径,虚拟立体空间符合光线直线传播原理,且圆柱表面光滑,从而圆柱的表面能够映射出所述参考圆孔图片的影像;
对比图片获取单元,用于根据预设的定位方法,获取所述圆柱外的参考定位位置,并在所述参考定位位置上对圆柱进行图像采集,从而得到映射有所述参考圆孔图片的部分图案的对比图片;
身份图片发送单元,用于将所述身份图片发送给所述报文发送端,并删除所述身份图片和所述参考圆孔图片。
其中上述单元分别用于执行的操作与前述实施方式的基于区块链的信息处理方法的步骤一一对应,在此不再赘述。
在一个实施方式中,所述相似度值判断子单元,包括:
像素修改模块,用于根据预设的像素修改方法,将所述映射图片的像素点的色值修改为第一色值或者第二色值,以及将所述对比图片的像素点的色值修改为第一色值或者第二色值;其中所述像素修改方法指将色值大于预设数值的像素点设置为第一色值,将色值小于或等于预设数值的像素点设置为第二色值;
轮廓线获取模块,用于获取所述映射图片的轮廓线和所述对比图片的轮廓线;其中所述轮廓线指第一区块与第二区块的划分线,所述第一区块指具有第一色值的像素点构成的区块,所述第二区块指具有第二色值的像素点构成的区块;
最小外接矩形生成模块,用于生成所述映射图片的轮廓线的第一最小外接矩形,以及生成所述对比图片的轮廓线的第二最小外接矩形,并获取所述第一最小外接矩形的第一面积A和所述第二最小外接矩形的第二面积B;
相似度值M计算模块,用于根据公式:
Figure PCTCN2020088012-appb-000003
计算所述映射图片和预设的对比图片的相似度值M。
其中上述模块分别用于执行的操作与前述实施方式的基于区块链的信息处理方法的步骤一一对应,在此不再赘述。
在一个实施方式中,所述第二哈希值存储单元40,包括:
多个距离计算子单元,用于获取所述区块链中的多个区块链节点分别对应的多个第一地理位置,以及获取所述第二终端的第二地理位置,并分别计算所述多个第一地理位置和所述第二地理位置之间的多个距离;
最小距离选取子单元,用于从所述多个距离中选出最小距离,并获取所述最小距离对应的第一区块链节点;
第二哈希值发送子单元,用于将所述第二哈希值发送给所述第一区块链节点,并要求所述第一区块链节点将所述第二哈希值存储入所述区块链;
存储确认信息接收子单元,用于接收所述第一区块链节点返回的存储确认信息,所述存储确认信息指确认将所述第二哈希值存储入所述区块链的信息;
第一哈希值接收子单元,用于向所述第一区块链节点发送第一哈希值获取请求,并接收所述第一区块链节点发送的所述第一哈希值。
其中上述子单元分别用于执行的操作与前述实施方式的基于区块链的信息处理方法的步骤一一对应,在此不再赘述。
本申请实施例提供一种基于区块链的处理装置,应用于用户终端,所述用户终端接收上述任一项所述的基于区块链的信息处理方法发送的对应的子信息,包括:
审核指令接收单元,用于接收对所述对应的子信息进行审核的审核指令;
哈希值获取请求发送单元,用于根据所述审核指令,向所述区块链中的对应的区块链节点发送哈希值获取请求,所述哈希值获取请求用于请求获取所述第一哈希值、所述第二哈希值和参照子哈希值,其中所述参照子哈希值指所述多个子哈希值中与所述用户终端对应的子哈希值;
哈希值接收单元,用于接收所述对应的区块链节点发送的所述第一哈希值、所述第二哈希值和参照子哈希值;
哈希值相同判断单元,用于判断所述第一哈希值和所述第二哈希值是否相同;
指定子哈希值获取单元,用于若所述第一哈希值和所述第二哈希值相同,则根据预设的哈希算法,对所述对应的子信息进行哈希计算,从而得到指定子哈希值;
指定子哈希值判断单元,用于判断所述指定子哈希值和所述参照子哈希值是否相同;
子信息审核通过判定单元,用于若所述指定子哈希值和所述参照子哈希值相同,则判断出所述子信息审核通过。
其中上述单元分别用于执行的操作与前述实施方式的基于区块链的处理方法的步骤一 一对应,在此不再赘述。
在一个实施方式中,所述装置,包括:
通信连接断开单元,用于若所述指定子哈希值和所述参照子哈希值不相同,则断开与所述第二终端的全部通信连接;
终端更换请求发送单元,用于向所述报文发送端发送信息再发送请求和终端更换请求,所述信息再发送请求用于请求重新发送所述指定信息,所述终端审核请求用于请求更换所述第二终端。
其中上述单元分别用于执行的操作与前述实施方式的基于区块链的处理方法的步骤一一对应,在此不再赘述。
本申请的基于区块链的信息处理平台,接收报文发送端发送的报文;所述报文发送端已将第一哈希值存储至预设的区块链;解析所述报文,从而得到所述身份图片和所述指定信息;利用所述身份图片验证所述报文发送端的身份;若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值;若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息;分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;将所述多个子信息对应发送给多个用户终端。从而减小了报文发送端的通信压力、使文件出错时容易追溯,提高了信息可信度。
参照图3,本申请实施例中还提供一种电子设备,该电子设备可以是服务器,其内部结构可以如图所示。该电子设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设计的处理器用于提供计算和控制能力。该电子设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机程序和数据库。该内存器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该电子设备的数据库用于存储基于区块链的信息处理方法所用数据。该电子设备的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现一种基于区块链的信息处理方法或者基于区块链的处理方法。
上述处理器执行上述基于区块链的信息处理方法或者基于区块链的处理方法,其中所述方法包括的步骤分别与执行前述实施方式的基于区块链的信息处理方法或者基于区块链的处理方法的步骤一一对应,在此不再赘述。
本申请一实施例还提供一种计算机可读存储介质,计算机可读存储介质可以是非易失性,也可以是易失性,其上存储有计算机程序,计算机程序被处理器执行时实现基于区块链的信息处理方法或者基于区块链的处理方法,其中所述方法包括的步骤分别与执行前述实施方式的基于区块链的信息处理方法或者基于区块链的处理方法的步骤一一对应,在此不再赘述。

Claims (19)

  1. 一种基于区块链的信息处理方法,所述区块链中预先存储有第一哈希值,所述第一哈希值为对指定信息进行哈希计算而得到的哈希值,所述方法包括:
    接收报文发送端发送的报文,所述报文中具有身份图片和所述指定信息,所述指定信息中标记有多个划分点;
    根据所述报文的格式,解析所述报文,从而得到所述身份图片和所述指定信息;
    根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过;
    若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值;
    判断所述第一哈希值与所述第二哈希值是否相同;
    若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息;
    分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;
    根据预设的子信息与用户终端的对应关系,分别将所述多个子信息对应发送给多个用户终端。
  2. 根据权利要求1所述的基于区块链的信息处理方法,其中,所述根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过的步骤,包括:
    对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到圆孔图片;
    在预设的虚拟立体空间中引入所述圆孔图片,并在所述圆孔中设置预设的圆柱,其中所述圆柱的半径等于所述圆形区域的半径,所述虚拟立体空间符合光线直线传播原理,且所述圆柱表面光滑,所述圆柱的表面用于映射出所述圆孔图片的影像;
    根据预设的定位方法,获取所述圆柱外的指定定位位置,并在所述指定定位位置上对所述圆柱进行图像采集,从而得到映射有所述圆孔图片的部分图案的映射图片;
    计算所述映射图片和预设的对比图片的相似度值,并判断所述相似度值是否大于预设的相似度阈值;
    若所述相似度值大于预设的相似度阈值,则判断出所述报文发送端的身份验证通过。
  3. 根据权利要求2所述的基于区块链的信息处理方法,其中,所述接收报文发送端发送的报文的步骤之前,包括:
    从预设的图片库中调取四张不同的矩形图片,并将所述四张不同的矩形图片以左上、右上、左下和右下的方式排列拼接,从而得到呈矩形的身份图片,其中所述四张不同的矩形图片具有相同的长和宽;
    对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到参考圆孔图片;
    在预设的虚拟立体空间中引入所述参考圆孔图片,并在圆孔中设置预设的圆柱,其中圆柱的半径等于圆形区域的半径,虚拟立体空间符合光线直线传播原理,且圆柱表面光滑,圆柱的表面用于映射出所述参考圆孔图片的影像;
    根据预设的定位方法,获取所述圆柱外的参考定位位置,并在所述参考定位位置上对圆柱进行图像采集,从而得到映射有所述参考圆孔图片的部分图案的对比图片;
    将所述身份图片发送给所述报文发送端,并删除所述身份图片和所述参考圆孔图片。
  4. 根据权利要求2所述的基于区块链的信息处理方法,其中,所述计算所述映射图片和预设的对比图片的相似度值,并判断所述相似度值是否大于预设的相似度阈值的步骤, 包括:
    根据预设的像素修改方法,将所述映射图片的像素点的色值修改为第一色值或者第二色值,以及将所述对比图片的像素点的色值修改为第一色值或者第二色值;其中所述像素修改方法指将色值大于预设数值的像素点设置为第一色值,将色值小于或等于预设数值的像素点设置为第二色值;
    获取所述映射图片的轮廓线和所述对比图片的轮廓线;其中所述轮廓线指第一区块与第二区块的划分线,所述第一区块指具有第一色值的像素点构成的区块,所述第二区块指具有第二色值的像素点构成的区块;
    生成所述映射图片的轮廓线的第一最小外接矩形,以及生成所述对比图片的轮廓线的第二最小外接矩形,并获取所述第一最小外接矩形的第一面积A和所述第二最小外接矩形的第二面积B;
    根据公式:
    Figure PCTCN2020088012-appb-100001
    计算所述映射图片和预设的对比图片的相似度值M。
  5. 根据权利要求1所述的基于区块链的信息处理方法,其中,所述将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值的步骤,包括:
    获取所述区块链中的多个区块链节点分别对应的多个第一地理位置,以及获取所述第二终端的第二地理位置,并分别计算所述多个第一地理位置和所述第二地理位置之间的多个距离;
    从所述多个距离中选出最小距离,并获取所述最小距离对应的第一区块链节点;
    将所述第二哈希值发送给所述第一区块链节点,并要求所述第一区块链节点将所述第二哈希值存储入所述区块链;
    接收所述第一区块链节点返回的存储确认信息,所述存储确认信息指确认将所述第二哈希值存储入所述区块链的信息;
    向所述第一区块链节点发送第一哈希值获取请求,并接收所述第一区块链节点发送的所述第一哈希值。
  6. 一种基于区块链的处理方法,应用于用户终端,所述用户终端接收权利要求1至5中任一项所述的基于区块链的信息处理方法发送的对应的子信息,包括:
    接收对所述子信息进行审核的审核指令;
    根据所述审核指令,向所述区块链中的对应的区块链节点发送哈希值获取请求,所述哈希值获取请求用于请求获取所述第一哈希值、所述第二哈希值和参照子哈希值,其中所述参照子哈希值指所述多个子哈希值中与所述用户终端对应的子哈希值;
    接收所述区块链节点发送的所述第一哈希值、所述第二哈希值和参照子哈希值;
    判断所述第一哈希值和所述第二哈希值是否相同;
    若所述第一哈希值和所述第二哈希值相同,则根据预设的哈希算法,对所述对应的子信息进行哈希计算,从而得到指定子哈希值;
    判断所述指定子哈希值和所述参照子哈希值是否相同;
    若所述指定子哈希值和所述参照子哈希值相同,则判断出所述子信息审核通过。
  7. 根据权利要求6所述的基于区块链的处理方法,其中,所述判断所述指定子哈希值和所述参照子哈希值是否相同的步骤之后,包括:
    若所述指定子哈希值和所述参照子哈希值不相同,则断开与所述第二终端的全部通信连接;
    向所述报文发送端发送信息再发送请求和终端更换请求,所述信息再发送请求用于请求重新发送所述对应的子信息,所述终端审核请求用于请求更换所述第二终端。
  8. 一种基于区块链的信息处理平台,所述区块链中预先存储有第一哈希值,所述第一 哈希值为对指定信息进行哈希计算而得到的哈希值,所述平台包括:
    报文接收单元,用于接收报文发送端发送的报文,所述报文中具有身份图片和指定信息,所述指定信息中标记有多个划分点;
    报文解析单元,用于根据所述报文的格式,解析所述报文,从而得到所述身份图片和所述指定信息;
    身份验证单元,用于根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过;
    第二哈希值存储单元,用于若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值;
    第二哈希值判断单元,用于判断所述第一哈希值与所述第二哈希值是否相同;
    指定信息划分单元,用于若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息;
    子哈希值获取单元,用于分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;
    子信息发送单元,用于根据预设的子信息与用户终端的对应关系,分别将所述多个子信息对应发送给多个用户终端。
  9. 一种电子设备,包括存储器和处理器,所述存储器存储有计算机程序,其中,所述处理器执行所述计算机程序时实现如下步骤:
    所述区块链中预先存储有第一哈希值,所述第一哈希值为对指定信息进行哈希计算而得到的哈希值,所述方法包括:
    接收报文发送端发送的报文,所述报文中具有身份图片和所述指定信息,所述指定信息中标记有多个划分点;
    根据所述报文的格式,解析所述报文,从而得到所述身份图片和所述指定信息;
    根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过;
    若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值;
    判断所述第一哈希值与所述第二哈希值是否相同;
    若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息;
    分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;
    根据预设的子信息与用户终端的对应关系,分别将所述多个子信息对应发送给多个用户终端。
  10. 根据权利要求9所述的电子设备,其中,所述根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过的步骤,包括:
    对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到圆孔图片;
    在预设的虚拟立体空间中引入所述圆孔图片,并在所述圆孔中设置预设的圆柱,其中所述圆柱的半径等于所述圆形区域的半径,所述虚拟立体空间符合光线直线传播原理,且所述圆柱表面光滑,所述圆柱的表面用于映射出所述圆孔图片的影像;
    根据预设的定位方法,获取所述圆柱外的指定定位位置,并在所述指定定位位置上对所述圆柱进行图像采集,从而得到映射有所述圆孔图片的部分图案的映射图片;
    计算所述映射图片和预设的对比图片的相似度值,并判断所述相似度值是否大于预设 的相似度阈值;
    若所述相似度值大于预设的相似度阈值,则判断出所述报文发送端的身份验证通过。
  11. 根据权利要求10所述的电子设备,其中,所述接收报文发送端发送的报文的步骤之前,包括:
    从预设的图片库中调取四张不同的矩形图片,并将所述四张不同的矩形图片以左上、右上、左下和右下的方式排列拼接,从而得到呈矩形的身份图片,其中所述四张不同的矩形图片具有相同的长和宽;
    对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到参考圆孔图片;
    在预设的虚拟立体空间中引入所述参考圆孔图片,并在圆孔中设置预设的圆柱,其中圆柱的半径等于圆形区域的半径,虚拟立体空间符合光线直线传播原理,且圆柱表面光滑,圆柱的表面用于映射出所述参考圆孔图片的影像;
    根据预设的定位方法,获取所述圆柱外的参考定位位置,并在所述参考定位位置上对圆柱进行图像采集,从而得到映射有所述参考圆孔图片的部分图案的对比图片;
    将所述身份图片发送给所述报文发送端,并删除所述身份图片和所述参考圆孔图片。
  12. 根据权利要求10所述的电子设备,其中,所述计算所述映射图片和预设的对比图片的相似度值,并判断所述相似度值是否大于预设的相似度阈值的步骤,包括:
    根据预设的像素修改方法,将所述映射图片的像素点的色值修改为第一色值或者第二色值,以及将所述对比图片的像素点的色值修改为第一色值或者第二色值;其中所述像素修改方法指将色值大于预设数值的像素点设置为第一色值,将色值小于或等于预设数值的像素点设置为第二色值;
    获取所述映射图片的轮廓线和所述对比图片的轮廓线;其中所述轮廓线指第一区块与第二区块的划分线,所述第一区块指具有第一色值的像素点构成的区块,所述第二区块指具有第二色值的像素点构成的区块;
    生成所述映射图片的轮廓线的第一最小外接矩形,以及生成所述对比图片的轮廓线的第二最小外接矩形,并获取所述第一最小外接矩形的第一面积A和所述第二最小外接矩形的第二面积B;
    根据公式:
    Figure PCTCN2020088012-appb-100002
    计算所述映射图片和预设的对比图片的相似度值M。
  13. 根据权利要求9所述的电子设备,其中,所述将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值的步骤,包括:
    获取所述区块链中的多个区块链节点分别对应的多个第一地理位置,以及获取所述第二终端的第二地理位置,并分别计算所述多个第一地理位置和所述第二地理位置之间的多个距离;
    从所述多个距离中选出最小距离,并获取所述最小距离对应的第一区块链节点;
    将所述第二哈希值发送给所述第一区块链节点,并要求所述第一区块链节点将所述第二哈希值存储入所述区块链;
    接收所述第一区块链节点返回的存储确认信息,所述存储确认信息指确认将所述第二哈希值存储入所述区块链的信息;
    向所述第一区块链节点发送第一哈希值获取请求,并接收所述第一区块链节点发送的所述第一哈希值。
  14. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如下步骤:
    所述区块链中预先存储有第一哈希值,所述第一哈希值为对指定信息进行哈希计算而 得到的哈希值,所述方法包括:
    接收报文发送端发送的报文,所述报文中具有身份图片和所述指定信息,所述指定信息中标记有多个划分点;
    根据所述报文的格式,解析所述报文,从而得到所述身份图片和所述指定信息;
    根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过;
    若所述报文发送端的身份验证通过,则对所述指定信息进行哈希计算,从而得到第二哈希值,将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值;
    判断所述第一哈希值与所述第二哈希值是否相同;
    若所述第一哈希值与所述第二哈希值相同,则根据所述多个划分点,将所述指定信息划分为多个子信息;
    分别对所述多个子信息进行哈希计算,从而得到多个子哈希值,并将所述多个子哈希值存储至所述区块链;
    根据预设的子信息与用户终端的对应关系,分别将所述多个子信息对应发送给多个用户终端。
  15. 根据权利要求15所述的计算机可读存储介质,其中,所述根据预设的身份验证方法,利用所述身份图片验证所述报文发送端的身份,并判断所述报文发送端的身份验证是否通过,包括:
    对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到圆孔图片;
    在预设的虚拟立体空间中引入所述圆孔图片,并在所述圆孔中设置预设的圆柱,其中所述圆柱的半径等于所述圆形区域的半径,所述虚拟立体空间符合光线直线传播原理,且所述圆柱表面光滑,所述圆柱的表面用于映射出所述圆孔图片的影像;
    根据预设的定位方法,获取所述圆柱外的指定定位位置,并在所述指定定位位置上对所述圆柱进行图像采集,从而得到映射有所述圆孔图片的部分图案的映射图片;
    计算所述映射图片和预设的对比图片的相似度值,并判断所述相似度值是否大于预设的相似度阈值;
    若所述相似度值大于预设的相似度阈值,则判断出所述报文发送端的身份验证通过。
  16. 根据权利要求16所述的计算机可读存储介质,其中,所述接收报文发送端发送的报文之前,包括:
    从预设的图片库中调取四张不同的矩形图片,并将所述四张不同的矩形图片以左上、右上、左下和右下的方式排列拼接,从而得到呈矩形的身份图片,其中所述四张不同的矩形图片具有相同的长和宽;
    对所述身份图片进行切除处理,以将所述身份图片中预设圆形区域切除,从而得到参考圆孔图片;
    在预设的虚拟立体空间中引入所述参考圆孔图片,并在圆孔中设置预设的圆柱,其中圆柱的半径等于圆形区域的半径,虚拟立体空间符合光线直线传播原理,且圆柱表面光滑,圆柱的表面用于映射出所述参考圆孔图片的影像;
    根据预设的定位方法,获取所述圆柱外的参考定位位置,并在所述参考定位位置上对圆柱进行图像采集,从而得到映射有所述参考圆孔图片的部分图案的对比图片;
    将所述身份图片发送给所述报文发送端,并删除所述身份图片和所述参考圆孔图片。
  17. 根据权利要求16所述的计算机可读存储介质,其中,所述计算所述映射图片和预设的对比图片的相似度值,并判断所述相似度值是否大于预设的相似度阈值,包括:
    根据预设的像素修改方法,将所述映射图片的像素点的色值修改为第一色值或者第二色值,以及将所述对比图片的像素点的色值修改为第一色值或者第二色值;其中所述像素修改方法指将色值大于预设数值的像素点设置为第一色值,将色值小于或等于预设数值的 像素点设置为第二色值;
    获取所述映射图片的轮廓线和所述对比图片的轮廓线;其中所述轮廓线指第一区块与第二区块的划分线,所述第一区块指具有第一色值的像素点构成的区块,所述第二区块指具有第二色值的像素点构成的区块;
    生成所述映射图片的轮廓线的第一最小外接矩形,以及生成所述对比图片的轮廓线的第二最小外接矩形,并获取所述第一最小外接矩形的第一面积A和所述第二最小外接矩形的第二面积B;
    根据公式:
    Figure PCTCN2020088012-appb-100003
    计算所述映射图片和预设的对比图片的相似度值M。
  18. 根据权利要求15所述的计算机可读存储介质,其中,所述将所述第二哈希值存储至所述区块链,并从所述区块链中获取所述第一哈希值,包括:
    获取所述区块链中的多个区块链节点分别对应的多个第一地理位置,以及获取所述第二终端的第二地理位置,并分别计算所述多个第一地理位置和所述第二地理位置之间的多个距离;
    从所述多个距离中选出最小距离,并获取所述最小距离对应的第一区块链节点;
    将所述第二哈希值发送给所述第一区块链节点,并要求所述第一区块链节点将所述第二哈希值存储入所述区块链;
    接收所述第一区块链节点返回的存储确认信息,所述存储确认信息指确认将所述第二哈希值存储入所述区块链的信息;
    向所述第一区块链节点发送第一哈希值获取请求,并接收所述第一区块链节点发送的所述第一哈希值。
  19. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如下步骤:
    接收对所述子信息进行审核的审核指令;
    根据所述审核指令,向所述区块链中的对应的区块链节点发送哈希值获取请求,所述哈希值获取请求用于请求获取所述第一哈希值、所述第二哈希值和参照子哈希值,其中所述参照子哈希值指所述多个子哈希值中与所述用户终端对应的子哈希值;
    接收所述区块链节点发送的所述第一哈希值、所述第二哈希值和参照子哈希值;
    判断所述第一哈希值和所述第二哈希值是否相同;
    若所述第一哈希值和所述第二哈希值相同,则根据预设的哈希算法,对所述对应的子信息进行哈希计算,从而得到指定子哈希值;
    判断所述指定子哈希值和所述参照子哈希值是否相同;
    若所述指定子哈希值和所述参照子哈希值相同,则判断出所述子信息审核通过。
PCT/CN2020/088012 2020-02-14 2020-04-30 基于区块链的信息处理方法及平台、电子设备 WO2021159617A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010093382.2A CN111382414A (zh) 2020-02-14 2020-02-14 基于区块链的信息处理方法及平台、电子设备
CN202010093382.2 2020-02-14

Publications (1)

Publication Number Publication Date
WO2021159617A1 true WO2021159617A1 (zh) 2021-08-19

Family

ID=71215194

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/088012 WO2021159617A1 (zh) 2020-02-14 2020-04-30 基于区块链的信息处理方法及平台、电子设备

Country Status (2)

Country Link
CN (1) CN111382414A (zh)
WO (1) WO2021159617A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865612A (zh) * 2020-07-17 2020-10-30 国网北京市电力公司 电力物联网终端的身份认证方法及装置
CN112801867B (zh) * 2020-12-30 2023-10-31 杭州趣链科技有限公司 基于区块链的卫星遥感图像拼接方法、装置及设备
CN113627561A (zh) * 2021-08-20 2021-11-09 北京软通智慧科技有限公司 一种数据融合的方法、装置、电子设备及存储介质
CN114564446B (zh) * 2022-03-01 2022-12-27 清华大学 一种文件存储的方法、装置、系统及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180101701A1 (en) * 2016-10-07 2018-04-12 Acronis International Gmbh System and method for file authenticity certification using blockchain network
CN108777691A (zh) * 2018-06-12 2018-11-09 山东智慧云链网络科技有限公司 网络安全防护方法及装置
CN110535654A (zh) * 2019-07-23 2019-12-03 平安科技(深圳)有限公司 基于区块链的并行系统部署方法、装置和计算机设备
CN110599180A (zh) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 一种基于区块链的疫苗流通管理方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180101701A1 (en) * 2016-10-07 2018-04-12 Acronis International Gmbh System and method for file authenticity certification using blockchain network
CN108777691A (zh) * 2018-06-12 2018-11-09 山东智慧云链网络科技有限公司 网络安全防护方法及装置
CN110535654A (zh) * 2019-07-23 2019-12-03 平安科技(深圳)有限公司 基于区块链的并行系统部署方法、装置和计算机设备
CN110599180A (zh) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 一种基于区块链的疫苗流通管理方法及装置

Also Published As

Publication number Publication date
CN111382414A (zh) 2020-07-07

Similar Documents

Publication Publication Date Title
WO2021159617A1 (zh) 基于区块链的信息处理方法及平台、电子设备
US11646902B2 (en) Methods for requesting and authenticating photographic image data
US7958361B2 (en) Information processing apparatus and method
US8738917B2 (en) Image data verification
US20180121635A1 (en) Systems and methods for authenticating video using watermarks
JP4245883B2 (ja) 電子文書およびこれの印刷媒体の真正性管理方法およびシステム、ならびにプログラム、記録媒体
CN112487011B (zh) 基于区块链的物联网终端数据上链方法及系统
CN110851877B (zh) 一种数据处理方法、装置及区块链节点设备、存储介质
CN105825115A (zh) 数字数据内容证明系统、计算机、用户终端以及证明方法
CN110969207A (zh) 电子证据处理方法、装置、设备以及存储介质
CN112367164A (zh) 业务请求处理方法、装置、计算机设备和存储介质
US11755695B2 (en) User-specific watermark for maintaining security of data files
CN111327680B (zh) 认证数据同步方法、装置、系统、计算机设备和存储介质
US20210099772A1 (en) System and method for verification of video integrity based on blockchain
US20230095939A1 (en) Signature Token System
CN113806815B (zh) 一种文件签署方法和系统
CN116127412A (zh) 一种操作日志防篡改方法及系统
CN115408590A (zh) 一种文档追踪溯源方法、装置及系统
JP2006195923A (ja) 画像情報処理システム、および画像情報処理方法
KR20200145133A (ko) 진본성과 무결성을 제공하는 전자 문서 관리 시스템 및 그 방법
CN117076161B (zh) 通过选取框选内容的方式获取和写入数据的方法
KR101669120B1 (ko) 발신 팩스 진위 검증 장치와 이의 작동 방법
CN114374662B (zh) 一种数据处理方法及电子设备
KR102603724B1 (ko) 인공지능 학습을 위한 데이터 관리 시스템 및 방법
US20060129532A1 (en) Form generation system and method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20919077

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23.12.2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20919077

Country of ref document: EP

Kind code of ref document: A1